SlideShare a Scribd company logo
1 of 14
Research on the Internet
American Intercontinental University
Greg Fowler
Effective Information Searches
• Effective searching is important because of the vast
amount of information available.
HOW DO WE SEARCH THE
INTERNET EFFECTIVELY?
BOOLEAN searches
Boolean searches save time…
BOOLEAN searches
Utilize operators to SAVE TIME!
OR
AND
NOT
-
+
“quotation marks”
Finding and Using Primary Sources
Primary sources include:
• Physical artifacts
• Recordings
• Original documents
• Peer-reviewed original findings
However…
“As critical thinkers, they [students] must learn that it
can be problematic to rely on a single source for
information.” – Morgan and Rasinski
The Influence of Web 2.0
Web 2.0 has opened a gateway to utilizing primary
sources…
Individuals can view (in real-time):
• Source photos
• Maps
• Documents
• Movie
• Audio files
Verifying Resources
We look for the most reliable resources in order to get
the most accurate information, so…
WHY DO WE NEED TO VERIFY THE SOURCE?
In accurate information = problems
Deciding on Validity: Areas to Consider
1. Authority – who is dishing out the info?
2.Independent corroboration – what do others say
about the information source?
Deciding on Validity: Areas to Consider
3. Plausibility and support – does the information
mentioned seem factual?
• Unrealistic expectations or findings
4. Presentation – is the source professional
looking/sounding?
• Spelling/grammar
Keeping Track of Fluid Info Sources
Once a credible information source is found, it must be
bookmarked and monitored…
RSS (real simple syndication) Feeds
RSS allows users to continually receive the information
they desire whenever it is published.
RSS feeds allow users to organize and filter their
information.
The Bottom Line…
Information can be heavily filtered to suit a user’s
needs.
Time can be saved if these filtering techniques are
learned and utilized.
The information found needs to be credible, and there
are methods to use to ensure this.
Current technologies allow for the immediate retrieval
of desired information.
References
Anderson, M. (2010). Expanding the Power of Primary
Sources With Web 2.0. Multimedia & Internet@Schools,
17(4), 36-38. Retrieved from
http://search.ebscohost.com.proxy.cecybrary.com/login.a
spx?direct=true&db=ehh&AN=52707160&site=ehost-
live
Clinton, D. (2005). The Art of Effective Web Searching. T H
E Journal, 33(2), 32. Retrieved from
http://search.ebscohost.com.proxy.cecybrary.com/login.a
spx?direct=true&db=ehh&AN=18404154&site=ehost-
live
References (continued)
Fallis, D. (2004). On Verifying the Accuracy of Information:
Philosophical Perspectives. Library Trends, 52(3), 463-487.
Retrieved from
http://search.ebscohost.com.proxy.cecybrary.com/login.aspx?direct=t
rue&db=ehh&AN=12885268&site=ehost-live
Morgan, D. N., & Rasinski, T. V. (2012). The Power and Potential of
Primary Sources. Reading Teacher, 65(8), 584-594.
doi:10.1002/TRTR.01086
Stephens, W. (2012). AMPLIFY YOUR PROFESSIONAL
KNOWLEDGE THROUGH RSS. Knowledge Quest, 41(2), 26-28.
Retrieved from
http://search.ebscohost.com.proxy.cecybrary.com/login.aspx?direct=t
rue&db=ehh&AN=83341511&site=ehost-live

More Related Content

What's hot

Intro lis550 winter 2012
Intro lis550 winter 2012Intro lis550 winter 2012
Intro lis550 winter 2012Brian Rowe
 
Leg 500 assignment 2 the value of digital privacy in an information technolog...
Leg 500 assignment 2 the value of digital privacy in an information technolog...Leg 500 assignment 2 the value of digital privacy in an information technolog...
Leg 500 assignment 2 the value of digital privacy in an information technolog...printwork4849
 
Research Workshop: Speech Multicultural Project
Research Workshop: Speech Multicultural ProjectResearch Workshop: Speech Multicultural Project
Research Workshop: Speech Multicultural ProjectAmy Ferguson
 
Information literacy studies for webinars
Information literacy studies for webinarsInformation literacy studies for webinars
Information literacy studies for webinarsKalle Covert
 
ECA 2010 Abstract: Archival Access from the User’s Perspective (Romijn-Wixley...
ECA 2010 Abstract: Archival Access from the User’s Perspective (Romijn-Wixley...ECA 2010 Abstract: Archival Access from the User’s Perspective (Romijn-Wixley...
ECA 2010 Abstract: Archival Access from the User’s Perspective (Romijn-Wixley...drs. Julia Romijn-Wixley MA
 
Information Seeking Behaviour in Electronic Environment: Issues and Trends
Information Seeking Behaviour in Electronic Environment: Issues and TrendsInformation Seeking Behaviour in Electronic Environment: Issues and Trends
Information Seeking Behaviour in Electronic Environment: Issues and TrendsDebashisnaskar
 
Publish or Perish Workshop Presentation
Publish or Perish Workshop PresentationPublish or Perish Workshop Presentation
Publish or Perish Workshop PresentationMaurice Dawson
 
Plagiarisme di edukasi
Plagiarisme di edukasiPlagiarisme di edukasi
Plagiarisme di edukasiRakaRinanda
 
Year 7 information and communications technologies
Year 7 information and communications technologiesYear 7 information and communications technologies
Year 7 information and communications technologiesmrscooper
 
Cyberwarfare focusing on higher education as a prime target
Cyberwarfare focusing on higher education as a prime targetCyberwarfare focusing on higher education as a prime target
Cyberwarfare focusing on higher education as a prime targetNicholas Davis
 
Effective use of sources year 9 slavery
Effective use of sources  year 9 slaveryEffective use of sources  year 9 slavery
Effective use of sources year 9 slaveryterracelibrary
 
Zhang d lis551_assignment3
Zhang d lis551_assignment3Zhang d lis551_assignment3
Zhang d lis551_assignment3Dibiboi
 
Effective use of sources year 9 slavery
Effective use of sources  year 9 slaveryEffective use of sources  year 9 slavery
Effective use of sources year 9 slaverylibguide
 
Incremental Persuasion through Microblogging: A Survey of Twitter Users in La...
Incremental Persuasion through Microblogging: A Survey of Twitter Users in La...Incremental Persuasion through Microblogging: A Survey of Twitter Users in La...
Incremental Persuasion through Microblogging: A Survey of Twitter Users in La...Agnis Stibe
 
The Ethics of Twitter Research: A Topology of Disciplines, Methods and Ethics...
The Ethics of Twitter Research: A Topology of Disciplines, Methods and Ethics...The Ethics of Twitter Research: A Topology of Disciplines, Methods and Ethics...
The Ethics of Twitter Research: A Topology of Disciplines, Methods and Ethics...Michael Zimmer
 

What's hot (20)

Intro lis550 winter 2012
Intro lis550 winter 2012Intro lis550 winter 2012
Intro lis550 winter 2012
 
Access and licencing of data
Access and licencing of dataAccess and licencing of data
Access and licencing of data
 
Leg 500 assignment 2 the value of digital privacy in an information technolog...
Leg 500 assignment 2 the value of digital privacy in an information technolog...Leg 500 assignment 2 the value of digital privacy in an information technolog...
Leg 500 assignment 2 the value of digital privacy in an information technolog...
 
Research Workshop: Speech Multicultural Project
Research Workshop: Speech Multicultural ProjectResearch Workshop: Speech Multicultural Project
Research Workshop: Speech Multicultural Project
 
Information literacy studies for webinars
Information literacy studies for webinarsInformation literacy studies for webinars
Information literacy studies for webinars
 
Anovelidea
AnovelideaAnovelidea
Anovelidea
 
Taking the Time: Using a Rubric to Analyze How Students Find, Document, and I...
Taking the Time: Using a Rubric to Analyze How Students Find, Document, and I...Taking the Time: Using a Rubric to Analyze How Students Find, Document, and I...
Taking the Time: Using a Rubric to Analyze How Students Find, Document, and I...
 
ECA 2010 Abstract: Archival Access from the User’s Perspective (Romijn-Wixley...
ECA 2010 Abstract: Archival Access from the User’s Perspective (Romijn-Wixley...ECA 2010 Abstract: Archival Access from the User’s Perspective (Romijn-Wixley...
ECA 2010 Abstract: Archival Access from the User’s Perspective (Romijn-Wixley...
 
Information Seeking Behaviour in Electronic Environment: Issues and Trends
Information Seeking Behaviour in Electronic Environment: Issues and TrendsInformation Seeking Behaviour in Electronic Environment: Issues and Trends
Information Seeking Behaviour in Electronic Environment: Issues and Trends
 
Publish or Perish Workshop Presentation
Publish or Perish Workshop PresentationPublish or Perish Workshop Presentation
Publish or Perish Workshop Presentation
 
Plagiarisme di edukasi
Plagiarisme di edukasiPlagiarisme di edukasi
Plagiarisme di edukasi
 
Research, internet and libraries
Research, internet and librariesResearch, internet and libraries
Research, internet and libraries
 
Year 7 information and communications technologies
Year 7 information and communications technologiesYear 7 information and communications technologies
Year 7 information and communications technologies
 
Cyberwarfare focusing on higher education as a prime target
Cyberwarfare focusing on higher education as a prime targetCyberwarfare focusing on higher education as a prime target
Cyberwarfare focusing on higher education as a prime target
 
Effective use of sources year 9 slavery
Effective use of sources  year 9 slaveryEffective use of sources  year 9 slavery
Effective use of sources year 9 slavery
 
Zhang d lis551_assignment3
Zhang d lis551_assignment3Zhang d lis551_assignment3
Zhang d lis551_assignment3
 
Effective use of sources year 9 slavery
Effective use of sources  year 9 slaveryEffective use of sources  year 9 slavery
Effective use of sources year 9 slavery
 
171209 lingnan
171209 lingnan171209 lingnan
171209 lingnan
 
Incremental Persuasion through Microblogging: A Survey of Twitter Users in La...
Incremental Persuasion through Microblogging: A Survey of Twitter Users in La...Incremental Persuasion through Microblogging: A Survey of Twitter Users in La...
Incremental Persuasion through Microblogging: A Survey of Twitter Users in La...
 
The Ethics of Twitter Research: A Topology of Disciplines, Methods and Ethics...
The Ethics of Twitter Research: A Topology of Disciplines, Methods and Ethics...The Ethics of Twitter Research: A Topology of Disciplines, Methods and Ethics...
The Ethics of Twitter Research: A Topology of Disciplines, Methods and Ethics...
 

Similar to EFFECTIVE INTERNET SEARCH

Unpacking Steps 3 to5 of The Big Six Research Process
Unpacking Steps 3 to5 of The Big Six Research ProcessUnpacking Steps 3 to5 of The Big Six Research Process
Unpacking Steps 3 to5 of The Big Six Research Processekhoogestraat
 
Engl 153 beining spring 2011 part 1
Engl 153 beining spring 2011 part 1Engl 153 beining spring 2011 part 1
Engl 153 beining spring 2011 part 1Traciwm
 
Usability Report - Discovery Tools
Usability Report - Discovery ToolsUsability Report - Discovery Tools
Usability Report - Discovery ToolsNikki Kerber
 
Introduction to information literacy part 1
Introduction to information literacy part 1Introduction to information literacy part 1
Introduction to information literacy part 1mhayes2006
 
Online-Resources-and-ICT-in-Research.pptx
Online-Resources-and-ICT-in-Research.pptxOnline-Resources-and-ICT-in-Research.pptx
Online-Resources-and-ICT-in-Research.pptxRomaSmart1
 
Creating Sustainable Communities in Open Data Resources: The eagle-i and VIVO...
Creating Sustainable Communities in Open Data Resources: The eagle-i and VIVO...Creating Sustainable Communities in Open Data Resources: The eagle-i and VIVO...
Creating Sustainable Communities in Open Data Resources: The eagle-i and VIVO...Robert H. McDonald
 
English 2.8 presentation
English 2.8 presentationEnglish 2.8 presentation
English 2.8 presentationDioLibrary
 
Research Strategies
Research StrategiesResearch Strategies
Research StrategiesEliot Boden
 
HIBERLINK: Reference Rot and Linked Data: Threat and Remedy
HIBERLINK: Reference Rot and Linked Data: Threat and RemedyHIBERLINK: Reference Rot and Linked Data: Threat and Remedy
HIBERLINK: Reference Rot and Linked Data: Threat and RemedyPRELIDA Project
 
Profile Locally Network Globally
Profile Locally Network GloballyProfile Locally Network Globally
Profile Locally Network Globallyericmeeks
 
Meeting Federal Research Requirements
Meeting Federal Research RequirementsMeeting Federal Research Requirements
Meeting Federal Research RequirementsICPSR
 
Digital Humanities Venice Group Presentation - Opening the Libro d'Oro
Digital Humanities Venice Group Presentation - Opening the Libro d'OroDigital Humanities Venice Group Presentation - Opening the Libro d'Oro
Digital Humanities Venice Group Presentation - Opening the Libro d'OroMichael Mitchell
 
FORCE11: Creating a data and tools ecosystem
FORCE11:  Creating a data and tools ecosystemFORCE11:  Creating a data and tools ecosystem
FORCE11: Creating a data and tools ecosystemMaryann Martone
 
FSU SLIS InfoSvcs Wk 3 - Web Search & Evaluation
FSU SLIS InfoSvcs Wk 3 - Web Search & EvaluationFSU SLIS InfoSvcs Wk 3 - Web Search & Evaluation
FSU SLIS InfoSvcs Wk 3 - Web Search & EvaluationLorri Mon
 
OER Curation and Search - The Issues at Hand
OER Curation and Search - The Issues at HandOER Curation and Search - The Issues at Hand
OER Curation and Search - The Issues at HandIshan Abeywardena, Ph.D.
 

Similar to EFFECTIVE INTERNET SEARCH (20)

Unpacking Steps 3 to5 of The Big Six Research Process
Unpacking Steps 3 to5 of The Big Six Research ProcessUnpacking Steps 3 to5 of The Big Six Research Process
Unpacking Steps 3 to5 of The Big Six Research Process
 
Engl 153 beining spring 2011 part 1
Engl 153 beining spring 2011 part 1Engl 153 beining spring 2011 part 1
Engl 153 beining spring 2011 part 1
 
Usability Report - Discovery Tools
Usability Report - Discovery ToolsUsability Report - Discovery Tools
Usability Report - Discovery Tools
 
Introduction to information literacy part 1
Introduction to information literacy part 1Introduction to information literacy part 1
Introduction to information literacy part 1
 
Online-Resources-and-ICT-in-Research.pptx
Online-Resources-and-ICT-in-Research.pptxOnline-Resources-and-ICT-in-Research.pptx
Online-Resources-and-ICT-in-Research.pptx
 
Online-Resources-and-ICT-in-Research.pptx
Online-Resources-and-ICT-in-Research.pptxOnline-Resources-and-ICT-in-Research.pptx
Online-Resources-and-ICT-in-Research.pptx
 
Creating Sustainable Communities in Open Data Resources: The eagle-i and VIVO...
Creating Sustainable Communities in Open Data Resources: The eagle-i and VIVO...Creating Sustainable Communities in Open Data Resources: The eagle-i and VIVO...
Creating Sustainable Communities in Open Data Resources: The eagle-i and VIVO...
 
Accessing internet resources best practices
Accessing internet resources  best practicesAccessing internet resources  best practices
Accessing internet resources best practices
 
English 2.8 presentation
English 2.8 presentationEnglish 2.8 presentation
English 2.8 presentation
 
howtoresearch colai
howtoresearch colaihowtoresearch colai
howtoresearch colai
 
Research Strategies
Research StrategiesResearch Strategies
Research Strategies
 
ir.pptx
ir.pptxir.pptx
ir.pptx
 
HIBERLINK: Reference Rot and Linked Data: Threat and Remedy
HIBERLINK: Reference Rot and Linked Data: Threat and RemedyHIBERLINK: Reference Rot and Linked Data: Threat and Remedy
HIBERLINK: Reference Rot and Linked Data: Threat and Remedy
 
Profile Locally Network Globally
Profile Locally Network GloballyProfile Locally Network Globally
Profile Locally Network Globally
 
Mam assign
Mam assignMam assign
Mam assign
 
Meeting Federal Research Requirements
Meeting Federal Research RequirementsMeeting Federal Research Requirements
Meeting Federal Research Requirements
 
Digital Humanities Venice Group Presentation - Opening the Libro d'Oro
Digital Humanities Venice Group Presentation - Opening the Libro d'OroDigital Humanities Venice Group Presentation - Opening the Libro d'Oro
Digital Humanities Venice Group Presentation - Opening the Libro d'Oro
 
FORCE11: Creating a data and tools ecosystem
FORCE11:  Creating a data and tools ecosystemFORCE11:  Creating a data and tools ecosystem
FORCE11: Creating a data and tools ecosystem
 
FSU SLIS InfoSvcs Wk 3 - Web Search & Evaluation
FSU SLIS InfoSvcs Wk 3 - Web Search & EvaluationFSU SLIS InfoSvcs Wk 3 - Web Search & Evaluation
FSU SLIS InfoSvcs Wk 3 - Web Search & Evaluation
 
OER Curation and Search - The Issues at Hand
OER Curation and Search - The Issues at HandOER Curation and Search - The Issues at Hand
OER Curation and Search - The Issues at Hand
 

Recently uploaded

WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure servicePooja Nehwal
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsMark Billinghurst
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsMemoori
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 3652toLead Limited
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxOnBoard
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptxLBM Solutions
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationSafe Software
 
How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?XfilesPro
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 

Recently uploaded (20)

WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial Buildings
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptx
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptx
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
 
How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food Manufacturing
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 

EFFECTIVE INTERNET SEARCH

  • 1. Research on the Internet American Intercontinental University Greg Fowler
  • 2. Effective Information Searches • Effective searching is important because of the vast amount of information available. HOW DO WE SEARCH THE INTERNET EFFECTIVELY?
  • 4. BOOLEAN searches Utilize operators to SAVE TIME! OR AND NOT - + “quotation marks”
  • 5. Finding and Using Primary Sources Primary sources include: • Physical artifacts • Recordings • Original documents • Peer-reviewed original findings However… “As critical thinkers, they [students] must learn that it can be problematic to rely on a single source for information.” – Morgan and Rasinski
  • 6. The Influence of Web 2.0 Web 2.0 has opened a gateway to utilizing primary sources… Individuals can view (in real-time): • Source photos • Maps • Documents • Movie • Audio files
  • 7. Verifying Resources We look for the most reliable resources in order to get the most accurate information, so… WHY DO WE NEED TO VERIFY THE SOURCE? In accurate information = problems
  • 8. Deciding on Validity: Areas to Consider 1. Authority – who is dishing out the info? 2.Independent corroboration – what do others say about the information source?
  • 9. Deciding on Validity: Areas to Consider 3. Plausibility and support – does the information mentioned seem factual? • Unrealistic expectations or findings 4. Presentation – is the source professional looking/sounding? • Spelling/grammar
  • 10. Keeping Track of Fluid Info Sources Once a credible information source is found, it must be bookmarked and monitored…
  • 11. RSS (real simple syndication) Feeds RSS allows users to continually receive the information they desire whenever it is published. RSS feeds allow users to organize and filter their information.
  • 12. The Bottom Line… Information can be heavily filtered to suit a user’s needs. Time can be saved if these filtering techniques are learned and utilized. The information found needs to be credible, and there are methods to use to ensure this. Current technologies allow for the immediate retrieval of desired information.
  • 13. References Anderson, M. (2010). Expanding the Power of Primary Sources With Web 2.0. Multimedia & Internet@Schools, 17(4), 36-38. Retrieved from http://search.ebscohost.com.proxy.cecybrary.com/login.a spx?direct=true&db=ehh&AN=52707160&site=ehost- live Clinton, D. (2005). The Art of Effective Web Searching. T H E Journal, 33(2), 32. Retrieved from http://search.ebscohost.com.proxy.cecybrary.com/login.a spx?direct=true&db=ehh&AN=18404154&site=ehost- live
  • 14. References (continued) Fallis, D. (2004). On Verifying the Accuracy of Information: Philosophical Perspectives. Library Trends, 52(3), 463-487. Retrieved from http://search.ebscohost.com.proxy.cecybrary.com/login.aspx?direct=t rue&db=ehh&AN=12885268&site=ehost-live Morgan, D. N., & Rasinski, T. V. (2012). The Power and Potential of Primary Sources. Reading Teacher, 65(8), 584-594. doi:10.1002/TRTR.01086 Stephens, W. (2012). AMPLIFY YOUR PROFESSIONAL KNOWLEDGE THROUGH RSS. Knowledge Quest, 41(2), 26-28. Retrieved from http://search.ebscohost.com.proxy.cecybrary.com/login.aspx?direct=t rue&db=ehh&AN=83341511&site=ehost-live

Editor's Notes

  1. Effective searching is important because the quantity of information is greater than it has ever been and time is usually of the essence. Information search techniques are not limited to the internet (good information can still be found in books, magazines, and other materials that are not found online), but internet searches will be the focus in this presentation since the world of information and technology is growing at an exponential rate.Clinton (2005) states, “That simple little box at the top of every search engine has opened up a boundless new world for millions of people” (p. 1). The key word here being boundless. With boundless information that floods the screen after a user types a keyword into the little box at the top of the screen comes the need for more efficient ways of sorting the information.
  2. Boolean searches, and other effective information-specific searches, will save a user a vast amount of time. They will not have to scour through so much garbage that can be pulled up during searches. With advertising and money being a driving force behind the internet at times, the ability to get rid of the junk mail quicker and find the check in the mail is needed.
  3. Boolean searches utilize operators such as: OR, NOT, AND, +, -, and quotation marks. OR allows users to search for two different terms. The sites brought up will display either of the terms. NOT allows users to exclude certain terms from the search. AND allows users to bring up sites that display all terms connected by the AND operator. For example, cats AND dogs would bring up sites that include both terms whereas using the OR operator would bring up sites that have information on either cats OR dogs. The + and – operators simply allow users to add or subtract certain terms from the sites the query generates. For example, while searching “information literacy,” a user may add children to the search by entering +children. If they are looking for information literacy in adults, the user may want to enter +adults and –children. This would look for pages with the term adults and exclude pages with the term children.
  4. Using primary sources allows students the benefit of experiencing, or reading about, first-hand accounts or information. Primary sources include: physical artifacts, recordings, original documents, peer-reviewed research papers reporting experimental findings, etc. Secondary sources typically cite or comment on primary sources. However, in today’s technological world, primary sources can be found easily on the internet. “When exposed to multiple sources, students must learn through observation and analysis how to integrate this information…” (Morgan & Rasinski, 2012, p. 587). It is also crucial for individuals to understand that “As critical thinkers, they [students] must learn that it can be problematic to rely on a single source for information” (Morgan & Rasinski, 2012, p. 587).
  5. Primary sources are more reliable than most. Therefore, students should continually be pushed to use them. Web 2.0 has opened up a huge gateway to viewing and sharing primary sources. Anderson (2010) mentions a Web 2.0 tool called VoiceThread. This tool, along with countless other Web 2.0 tools, “…have the potential to foster engaged discussion about a primary source photo, map, broadside, document, movie, or audio file” (Anderson, 2010, p. 36).
  6. Why do we try and find information sources? And why is it important that we verify them? Fallis (2004) offers that following about finding quality information, “The main reason that we are interested in finding information sources that are authoritative, objective, and current is that we think that they are more likely to be accurate” (p. 1). So after the quality information is found, we must then verify it. Inaccurate information can cause too many problems. For example, a consumer of health information found on the internet may inadvertently harm themselves by taking a certain medication they read was supposed to help their condition.
  7. Based on the work of David Hume (1977) and Alvin Goldman (1999 and 2001), Fallis (2004) suggests four areas to consider when deciding on the validity of a source:Authority. Who is providing the original piece of information? Is a lawyer giving medical advice? Also, has this source of information been a credible one in the past?Independent corroboration. Do other people believe the origination of the information to be a credible one? What do others say about the source? Have other professional research investigations used this source?
  8. Plausibility and support. How plausible is the information given? If a diet pill claims to make you lose 8 pounds a day, is this plausible? If an overweight person is trying to sell you the diet pill and claiming that it has done wonders for them, is this genuine support?Presentation. If wondering if a source found on the web is accurate, then take a look at the presentation. Are there spelling or grammatical errors? Is it .com, .gov, .edu, or .net? Also, are the references for the information displayed credible? If the author is citing erroneous sources, then why believe the author/source?
  9. Once a credible information source has been determined, then bookmarking and monitoring the source is crucial. With today’s technology, fluid internet sources can be easily monitored. Most computer operating systems offer bookmarking systems which allow the user to copy the URL of a website so they may reference it at a later time. However, RSS feeds offer users a much more advanced version of bookmarking.
  10. RSS (real simple syndication) feeds offer users the ability of keeping track of changing news without having to search for it. Once a user finds a credible site with the information they need, they simply prescribe to that sites RSS feed (if it has one). Whenever new information is uploaded to the site, the user is notified and can access it. The user can narrow the information the RSS feed takes from the site by using tags. “For people overwhelmed by the multiple sites you must monitor for both personal and professional news, a couple of hours spent subscribing to and organizing RSS feeds might end up being an investment in 21st-century sanity” (Stephens, 2012, p. 28).
  11. ReferencesAnderson, M. (2010). Expanding the Power of Primary Sources With Web 2.0. Multimedia & Internet@Schools, 17(4), 36-38. Retrieved from http://search.ebscohost.com.proxy.cecybrary.com/login.aspx?direct=true&db=ehh&AN=52707160&site=ehost-liveClinton, D. (2005). The Art of Effective Web Searching. T H E Journal, 33(2), 32. Retrieved from http://search.ebscohost.com.proxy.cecybrary.com/login.aspx?direct=true&db=ehh&AN=18404154&site=ehost-live
  12. ReferencesFallis, D. (2004). On Verifying the Accuracy of Information: Philosophical Perspectives. Library Trends, 52(3), 463-487. Retrieved from http://search.ebscohost.com.proxy.cecybrary.com/login.aspx?direct=true&db=ehh&AN=12885268&site=ehost-liveMorgan, D. N., & Rasinski, T. V. (2012). The Power and Potential of Primary Sources. Reading Teacher, 65(8), 584-594. doi:10.1002/TRTR.01086Stephens, W. (2012). AMPLIFY YOUR PROFESSIONAL KNOWLEDGE THROUGH RSS. Knowledge Quest, 41(2), 26-28. Retrieved from http://search.ebscohost.com.proxy.cecybrary.com/login.aspx?direct=true&db=ehh&AN=83341511&site=ehost-live