Tag Archives: google

Research Journal Post

I used Google Scholar to search the web.  It was great, found some great articles. If I couldn’t read the whole thing i just searched the web for the article and I could find it.  The only problem i found with using it was that you would have to pay for some of the articles which you really don’t if you search hard enough. i don’t find the advanced search that great with Google. If you know what to type into the regular search then you are set. I was getting the same types of sites and articles with both. I myself find it very easy to search the web. I can usually find anything I want if I look hard enough for it. I DO NOT like a lot of the portals that are found on the net though. A lot of them are full of garbage and pop ups and bunk links!

Using strategy

I used Google Scholar as a searching strategy. I found this particular site to be helpful and useful. However, there were a few documents that seemed interesting but unfortunately required a payment or registration. There were other articles and links where I was able to view but were not relevant to my Research topic. I found many sources while using standard Google and read through a few. Google Scholar has more technical articles, whereas standard Google is a bit more cluttered and less organized. Standard Google wasn’t as technical or written in a business or academic matter.

– Jessica Deng

Research Journal

My research topic is internet privacy but I decided to work in-depth by focusing mainly on the security of popular social networking websites and search engine phenomena Google. The search exercise last Thursday allowed us to be aware on the quality of the information rather than the quantity. My first search was done through Google Scholar, I did stumble upon a scholarly article but felt it didn’t do much justice to the topic, not to mention that the information was out of date. I kept in mind that when researching technology related issues–the information is never constant since technology is rapidly changing and information is constantly being updated. As I further searched, I noticed that there was a pattern to internet privacy–specifically about the security on posting content on popular social networking websites and became aware that this was something many people are occasionally concerned about.–why not search directly in the website itself?. I went ahead and started with Google, Google has a support site dedicated only for frequently asked questions, Google marketing and advertising, in-depth information about handling your Google account and an entire section purely dedicated to user privacy. They also have video illustrations of how and what Google does to protect privacy and several privacy related videos such as “what happens to our Google searches.” I noticed that instead of searching the free internet on these particular issues, why not just go to the various social networking websites and read their privacy statement.
I did find this different from using search engines such as Bing! and Yahoo because I was directed to specific sources containing only the information I was looking for rather than going through enormous volumes of content. I plan to take this information and compare and contrast the privacy statement with the various social networking sites I decide to state in my upcoming research paper.


Research Journal Post

The topic I chose for research as most know is- internet security/privacy. I chose this topic to become more aware on precautions we should all take when surfing the net stress free. While creating the brainstorming map in class, I realized this topic is far to broad and when narrowing it down, the lines of my map kept extending. There are several conflicts with internet usage, such as viruses, hackers, anti-virus protection programs,  information storage, advertisements, Google searches, Google maps, cookies, java-script, and of course the list goes on. They’re all relevant and they all should be addressed in my research but it seems writing aspect will be quite long. Internet security-in general, is an enormous amount to take in, there seems to be plenty of academic research, journals and articles on this subject and its quite difficult to decide which to use as reference. I do in fact feel that the topic chosen, is a bit to technological, and I might have to rethink this over a bit more.

Being so, the research I’ve done so far, seems to provide insightful tips on internet protetcion and did you know that there are actual laws that protects us on this issue?


Research Journal Blog 2

Whenever I start to do research on anything I usually start by looking into Google with a basic searches. After I have collected all the information I can through the basic Google searches I start to look in library databases for anything I might have missed. The only reason I don’t start with libraries is because the Internet is a giant library. For my search I used Google and got a lot of good stuff. I only really god articles people have published or random sites by people in the industry. Not really any books on the subject itself. When I looked in the NYC Public Library’s database I got a lot of books and journals. I did get some video media from the library though. I still use the library sources because experts in the field, depending on what kind of book or topic it is, usually write them. Some of the words and phrases I used in my searches were; Copyright, Music Copyright, copyright infringement, musical copyright court cases, remixing, Sampling, remixing rules and regulations.

Class notes 10/7/10

In class we discussed search mechanics: databases, search engines and a bit on search strategies (we will spend more time on this in the coming weeks).

• How Google Works is a short video by Google which works well with the content of the Liddy article: http://www.google.com/howgoogleworks/.

• This image may also be useful for understanding how Google searches the internet: http://ppcblog.com/how-google-works/

• Yippy is a clustering search engine (mentioned in Badke Ch. 4 as Clusty): http://www.yippy.com

• Quintura bills itself as a visual search engine: http://quintura.com/

• Searching the library catalog from the Queens Public Library returns 3 kinds of results: a visual depiction of subject headings (like Quintura), the list of books/other media themselves, and a list of subject headings, formats, dates, etc. (similar to Clusty): http://queenslibrary.org/

• During our searching session in class, Richard found a search engine called Zuula that aggregates results from many search engines, including Google, Yahoo, etc.: http://zuula.com/

Here are the powerpoint notes from the first part of the class: LIB1201_1007 (PDF)

Class notes 9/28/10

In today’s class we discussed preservation.

What is preservation?

Preservation of paper objects:
• What’s more impt: object or content?
• Reproduction introduces errors
• Marginalia and “paratexts”: important?
• Who decides what to preserve?
• Digitization pros: access, search, fragility
• Digitization cons: errors, cost, format rot

Preservation of digital objects:
• Format lifespan: hardware, software
• Bigger issue w/born digital information
    – Produced in great volume
    – How to handle it?
• Managing access to and insuring the preservation of digital info are NOT the same
• Metadata is critical for findability

We also looked at the Google Books Library Project as a case study that exemplifies some of these issues: http://books.google.com/googlebooks/library.html