Saturday, March 13, 2010

Try this link

http://twoplayfulotters.com/students/jessicaelerick.html

OK, I can't get this to hyperlink! Please copy and paste the url into your browser. Thank you!

Jessica's Webpage

http://twoplayfulotters.com/students/jessicaelerick.html

I really enjoyed this assignment, but it took a really long time to do it. First I had a problem downloading Filezilla. I still don't have the hang of downloading files using Firefox. So while I thought I had down loaded Filezilla, I really hadn't. It took me literally an hour to figure this out! It's a good thing I am so persistent! I also enjoyed going back and forth making the different changes to the webpage. It was fun to keep hitting the "refresh" button and seeing the new comments that I had made.

I was bummed that I wasn't able to change the colors of the fonts. The webmonkey.com site was working. I kept getting an error message. :-(

Then when I tried to transfer the file to Filezilla, I couldn't find it. It took me another 30 minutes to find where I had saved the file, and I finally did. I saved it under "Documents" instead of "desktop". So while it was a frustrating process, I learned a lot from my mistakes. That seems to be the way of it for me. I seem to do things the hard way, but it's always a learning experience! :-)

If I had the time to really work with this, I could really have a good time developing my own website. It's not such a mystery anymore. I think it would take a lot of patience and a lot of corrections, but I used to create presentations for Executive meetings and it seems to be similar to that kind of work; painstaking and the simpler you can make it look, the more work went into the backend. Hopefully that makes sense!

Sue, thanks for the really cool assignments this week. It was a great way to end the quarter!

Sunday, February 28, 2010

Unit 8:

Searching for .gov:

Search Engine Used: Google

Search Strategy Used: (workplace privacy) site: .gov

Website chosen: http://www.eeoc.gov/

The title of the website is the US Equal Employment Opportunity Commission; it is responsible for enforcing federal laws and gives the expertise to laymen to understand their rights under the law. It is updated continually, and is written by the EEOC Commission; therefore its contents are relevant and timely.

Searching for .com:

Search Engine Used: Google

Search Strategy Used: (workplace privacy) site: .com

Website chosen: EPIC.com (Electronic Provacy Information Center)

EPIC is a public interest research center in Washington DC. They have no clients, customers or shareholders, so they are unbiased. The information they publish is up-to-date and current (they even have a section on their site about full body scanning in airports-this is new since December 2009). They publish a newsletter that is award winning on civil liberties in the electronic age.

Searching for .edu:

Search Engine Used: Google

Search Strategy Used: (workplace privacy) site: .edu

Website chosen: www.law.du.edu/ University of Denver

The Privacy Foundation was created at University of Denver and publishes research findings on its website that is accessible to professionals nationwide on different topics of privacy. They tout themselves as a dedicated, reliable advocate for privacy.

Searching for .org:

Search Engine Used: Google

Search Strategy Used: (workplace privacy) site: .org

Website chosen: privacyrights.org

This website bills itself as a Privacy Rights Clearinghouse. They have automatic email alerts (as recently as Valentine's Day warning warning emails). Their main goal is to protect the public and make them aware of all the ways their privacy can be violated and to give them the tools needed to prevent this. There are no single authors listed on the website.

Sunday, February 21, 2010

Search Engines

The search engine I chose was "ipl2', which is a merger of Internet Public Library and Librarian's Internet Index.

One of things I like most about this site is that is has specific search engines for kids and teens.
It is a teaching/learning site
There is an online librarian available to answer questions
Does not include website(s) in search results that cost money to access, i.e. all sites used are free

I am actually adding this website to my favorites because it has received so many awards and kudos from librarians and professors alike.

Saturday, February 13, 2010

Unit 6 Assignment

1st Search term: Privacy and Invasion
# of Articles: over 800 (too many, I think!)

Search Term: Privacy and Invasion and Employee
# of articles: 62 (a good number, I think!)

Popular Magazine Annotation:

Time Magazine, September 2006

I picked this article because it specifically deals with employers monitoring internet usage of employees in the workplace. It also dealt with the amount of time that employees spent on the phone. What was really good about this article is that it used data and statistics to back up its assertions.

Works Cited:

Dell, Kristina, and Lisa Takeuchi Kullen. "Snooping Bosses." Time 168.1 (2006): 62-64. Academic Search Premier. EBSCO. Web. 14 Feb. 2010.

Scholarly Journal Annotation:

Computer Law & Security Report, May 2005

This was a good article, because again, it deals with people in the workplace using company resources for personal business. It explains that with the advent of more and more technology employees are spending more and more time using the internet, phone, etc. for personal uses. Internet surfing is one of the most common sources of time wasted at work. It also covers from a legal prospective if tracking employee us of these company resources is an invasion of employee privacy or the right of an employer.

Works Cited:

Kierkegaard, Sylvia. "Privacy in Electroni Communication: Watch your email: Your Boss is Snooping!" Computer, Law & Security Report 21.3. (2005): 226-236. Academic Search Premeir. EBSCO. Web. 14 Feb. 2010.


Newspaper Annotation:

This article is a little different take on invasion of privacy in the workplace and was taken from the Wall Street Journal. The articles states that US customs officials and police officers are more and more searching laptops and cell phones for information that can then be used to arrest people. These searches are taking place without a search warrant and are a direct violation of privacy for individuals.

Works Cited:

Searcey, Dionne. "When the Police go Through you Email: Quirk of Search Law Sets Off Alarm Bells. Wall Street Journal - Eastern Edition. 30- Oct. 2008: A14. Academic Search Premier. EBSCO. Web. 14 Feb. 2010.

Jessica's Summary:

This was actually a good review for me because I am working on a big research paper and I have to find different types of articles and use the MLA standard for citing works. I did pretty well with the search for the first two articles, but for the newspaper article I had to change my search criteria little by adding the "email" and deleting the word "employee". Overall I was satisfied with the articles I chose; a lot of the articles were broader on the subject than I found was useful.

Friday, February 5, 2010

Boolean Search Activity

Search question:

Is it an invasion of privacy to record employees' access on their computers?

Boolean search string:

  • invasion and privacy and "employ* comput* access"

Sunday, January 31, 2010

Recap of Reseach Search Engines

For some reason, I didn't enjoy this assignment as much as the others. Part of it was because it seemed harder to determine if a source was reputable or not. It seems that would be easy to do, but it really took some tracking down to get that information.

I really liked the Summit Database best. It seemed to have more options of books, more search options and generally more information. Plus it is able to give more information than the Cannell Library. Well, maybe not more information, but more information with fewer keystrokes. Cannell is really good, but there are so many layers to get the information needed.

Google Book Search

Search Terms: Employee Workplace Privacy

Is book trustworthy? Well, the publisher isn't hugely well known, CyberAge Books, but the Forward is written by a professor of information systems at the Virginia Commonwealth University and has a PhD in information technology.

Citation Information for book: Jeffrey M. Stanton and Kathryn R. Stam, "The Visible Employee: Using Workplace Monitoring and Surveillance to Protect Information Assets--Without Compromising Employee Privacy or Trust", Medford, NJ, CyberAge Books, an imprint of Information Today, Inc, 2006.

Summit Search Engine

Search Term: Workplace and privacy

Citation: John Weckert, Hershey, PA: Idea Group Pub., 2005

Subject Headings: Electronic Monitoring in the Workplace, Privacy, Right of., Supervision of Employees and Personnel--Supervision.

Location and Call Number: University of Washington, Bothell/CCC, Stacks. HF5549.5.E37 E433 2005.

Credibility: The contributors to the book are experts in their field, from different countries and cultures and disciplines.

Different from Cannell Library: In Summit Search there were over 1000 titles to choose from. From the Cannell Library there were fewer than 20 titles.
I played around in IT Pro for awhile today. I used the basic search term "Home PC" and got about 1600 hits. I narrowed it down to books published after 2007 and narrowed the list to over 300 titles.

I then narrowed the search criteria even more by adding the term, "for Dummies". This narrowed my search down even more to merely 68 books.

I've always been afraid to use the advanced search on web pages; I was never sure what I would get. But I found out that it is pretty easy to use, and really worked in terms of narrowing and fine tuning my search.

Saturday, January 30, 2010

Cannell Library Book Caralog: Search Results

• Search Term(s) used: Privacy and workplace

• Citation information for one book: (author, title, city of publication, publisher, publication date):
Frederick S. Lane. "The Naked Employee: How Technology is Compromising Workplace Privacy". New York. AMACOM. 2003.

• Subject Headings (taken from the Subject Field): Employee Rights: United States, Privacy, Right Of: United States, Electronic Monitoring in the Workplace: United States, Supervision of Employees: United States.

• Is this a Circulating Book or an E-Book? Circulating, located on the 2nd floor of the Cannell Library.

• Location and Call Number for the Book: Cannell, 2nd Floor, HF5549.5.E428 L36 2003

• What clues in the book record lead you to believe that this book is credible, or trustworthy? (Remember the ASAP criteria from IRIS): Includes bibliographical references and index, is an attorney and expert witness.

Friday, January 22, 2010

1. Is it Constitutional for employers to track employee's internet use? Subject Encyclopedias might be good for this question. They would have current laws in place explaining what constitutes privacy in the workplace.


2. Is it an invasion of privacy to record what employees access on their computers? Academic Encyclopedias would be useful for this. Again, they would spell out what constitutes an invasion of privacy for employees and their computers.


3. How does the term "Information Privacy" impact what employers are legally allowed to record? Websites published by the government would be a good source for this question.

Any website to do with privacy rights would be helpful to answer all of these questions. A search of popular periodicals might give some good anecdotal information.

Sunday, January 17, 2010

Summary of Unit 2 Activity

This was an interesting exercise. In the past I have always used Wikipedia as my "go to" place on the internet. I didn't know it wasn't "official". However it is a good source of general information and a good place to start any kind of search for basic information.

This is my second year at Clark and I didn't know the online library was so extensive. I have actually *paid* money to use some of the articles. In comparing the two resources, clearly Cannell Library is the one to go with; it is crammed with information, and tips to dig even deeper to get even more information on a topic.

The term "Privacy" is so big and encompasses so many things. I decided to narrow the search down to, "What is privacy in the workplace?". I don't know that I would get enough information for a 10-page paper, but it would be a specific form of privacy that many people would be interested in.

I loved the IRIS tutorials. They were very easy to follow, and I especially liked the "tips" that were offered. I had no idea that librarians had to know so much information and how to research. That actually sounds like a pretty interesting job; helping people find what they need to do their research.

So far, I am really enjoying this class. It has already opened up so many research avenues I never knew existed!

Another thing I learned about this blog: I wrote my second blog post on Word and tried to copy and paste it, but Blogger wouldn't let me. I had to type it all over again. Grrr...

Three Research Questions

Narrowing the topic:

"Privacy in the Workplace"

1. Is it Constitutional for employers to track employee's internet use?
2. Is it an invasion of privacy to record what employees access on their computers?
3. How does the term "Information Privacy" impact what employers are legally allowed to record?

Privacy - As Found on Wikipedia

Title: "Privacy"
Search Tool: Wikipedia, English version
Search Term: Privacy
Keywords: Civil Liberties, model release, digital identity, personality rights, 1984, privacy enhancing technologies, privacy policy, private sphere, profiling practices, publicly, surveillance.

Citations:

1. "Ben Franklin's Web Site, Privacy and Curiosity from Plymouth Rock to the Internet", Robert Ellis Smith, Providence: Privacy Journal, 2004.

2. "In Pursuit of Privacy: Law, Ethics and the Rise of Technology", Judith Wagner DeCew, Ithaca: Cornell University Press, 1997.
Topic: Privacy
Tool Used: Gale Virtual Reference Library
Search Term: "Privacy"
List of keywords: Isolation, secretive, rights, autonomous, concealment, sacred, legal, constitutional, invasion, loans, disclosure, anonymous, locked, closed,intrusion, scrutiny.

Citations:

"Privacy", Arnold Simmel, pp. 480-487, International Encyclopedia of the Social Sciences, Ed. David L. Sills, Volume 12, New York, Macmillan, 1968.

"Privacy", William Simms Bainbridge, pp. 1101-1104, Encyclopedia of Community, Ed. Karen Christiensen and David Levinson, Volume 3, Thousand Oaks, CA, Sage Reference, 2003.

Topic: Privacy

Tool Used: Gale Virtual Reference Library

Search Term: “Privacy”

Key words: Tort privacy Informational privacy Isolation

Secretive Rights Autonomous

Concealment Sacred Legal

Constitutional Invasion Zones

Disclosure Anonymous Locked

Closed Intrusion Scrutiny

Citation:

1. Bainbridge, William Sims. "Privacy." Encyclopedia of Community. Ed. Karen Christensen and David Levinson. Vol. 3. Thousand Oaks, CA: Sage Reference, 2003.

1101-1104. Gale Virtual Reference Library. Gale. Clark College - Cannell Library. 17 Jan. 2010

.

2. "Privacy." International Encyclopedia of the Social Sciences. Ed. David L. Sills. Vol. 12. New York: Macmillan, 1968. 480-487.

Gale Virtual Reference Library. Gale. Clark College - Cannell Library. 17 Jan. 2010 .


My favorite three year old in the whole world is my Boo. His given name is William, but generally goes by many other names: Boo, Baby, Sweetheart, Monkey, Boogie Boy, etc.

He his my late life baby that my husband and I were so blessed with. After 6 years of trying to conceive, giving up and applying for adoption, I finally got pregnant.

Here is a picture of my Boo.