Sunday, January 31, 2010
Recap of Reseach Search Engines
I really liked the Summit Database best. It seemed to have more options of books, more search options and generally more information. Plus it is able to give more information than the Cannell Library. Well, maybe not more information, but more information with fewer keystrokes. Cannell is really good, but there are so many layers to get the information needed.
Google Book Search
Is book trustworthy? Well, the publisher isn't hugely well known, CyberAge Books, but the Forward is written by a professor of information systems at the Virginia Commonwealth University and has a PhD in information technology.
Citation Information for book: Jeffrey M. Stanton and Kathryn R. Stam, "The Visible Employee: Using Workplace Monitoring and Surveillance to Protect Information Assets--Without Compromising Employee Privacy or Trust", Medford, NJ, CyberAge Books, an imprint of Information Today, Inc, 2006.
Summit Search Engine
Citation: John Weckert, Hershey, PA: Idea Group Pub., 2005
Subject Headings: Electronic Monitoring in the Workplace, Privacy, Right of., Supervision of Employees and Personnel--Supervision.
Location and Call Number: University of Washington, Bothell/CCC, Stacks. HF5549.5.E37 E433 2005.
Credibility: The contributors to the book are experts in their field, from different countries and cultures and disciplines.
Different from Cannell Library: In Summit Search there were over 1000 titles to choose from. From the Cannell Library there were fewer than 20 titles.
I then narrowed the search criteria even more by adding the term, "for Dummies". This narrowed my search down even more to merely 68 books.
I've always been afraid to use the advanced search on web pages; I was never sure what I would get. But I found out that it is pretty easy to use, and really worked in terms of narrowing and fine tuning my search.
Saturday, January 30, 2010
Cannell Library Book Caralog: Search Results
• Citation information for one book: (author, title, city of publication, publisher, publication date):
Frederick S. Lane. "The Naked Employee: How Technology is Compromising Workplace Privacy". New York. AMACOM. 2003.
• Subject Headings (taken from the Subject Field): Employee Rights: United States, Privacy, Right Of: United States, Electronic Monitoring in the Workplace: United States, Supervision of Employees: United States.
• Is this a Circulating Book or an E-Book? Circulating, located on the 2nd floor of the Cannell Library.
• Location and Call Number for the Book: Cannell, 2nd Floor, HF5549.5.E428 L36 2003
• What clues in the book record lead you to believe that this book is credible, or trustworthy? (Remember the ASAP criteria from IRIS): Includes bibliographical references and index, is an attorney and expert witness.
Friday, January 22, 2010
2. Is it an invasion of privacy to record what employees access on their computers? Academic Encyclopedias would be useful for this. Again, they would spell out what constitutes an invasion of privacy for employees and their computers.
3. How does the term "Information Privacy" impact what employers are legally allowed to record? Websites published by the government would be a good source for this question.
Any website to do with privacy rights would be helpful to answer all of these questions. A search of popular periodicals might give some good anecdotal information.
Sunday, January 17, 2010
Summary of Unit 2 Activity
This is my second year at Clark and I didn't know the online library was so extensive. I have actually *paid* money to use some of the articles. In comparing the two resources, clearly Cannell Library is the one to go with; it is crammed with information, and tips to dig even deeper to get even more information on a topic.
The term "Privacy" is so big and encompasses so many things. I decided to narrow the search down to, "What is privacy in the workplace?". I don't know that I would get enough information for a 10-page paper, but it would be a specific form of privacy that many people would be interested in.
I loved the IRIS tutorials. They were very easy to follow, and I especially liked the "tips" that were offered. I had no idea that librarians had to know so much information and how to research. That actually sounds like a pretty interesting job; helping people find what they need to do their research.
So far, I am really enjoying this class. It has already opened up so many research avenues I never knew existed!
Another thing I learned about this blog: I wrote my second blog post on Word and tried to copy and paste it, but Blogger wouldn't let me. I had to type it all over again. Grrr...
Three Research Questions
"Privacy in the Workplace"
1. Is it Constitutional for employers to track employee's internet use?
2. Is it an invasion of privacy to record what employees access on their computers?
3. How does the term "Information Privacy" impact what employers are legally allowed to record?
Privacy - As Found on Wikipedia
Search Tool: Wikipedia, English version
Search Term: Privacy
Keywords: Civil Liberties, model release, digital identity, personality rights, 1984, privacy enhancing technologies, privacy policy, private sphere, profiling practices, publicly, surveillance.
Citations:
1. "Ben Franklin's Web Site, Privacy and Curiosity from Plymouth Rock to the Internet", Robert Ellis Smith, Providence: Privacy Journal, 2004.
2. "In Pursuit of Privacy: Law, Ethics and the Rise of Technology", Judith Wagner DeCew, Ithaca: Cornell University Press, 1997.
Tool Used: Gale Virtual Reference Library
Search Term: "Privacy"
List of keywords: Isolation, secretive, rights, autonomous, concealment, sacred, legal, constitutional, invasion, loans, disclosure, anonymous, locked, closed,intrusion, scrutiny.
Citations:
"Privacy", Arnold Simmel, pp. 480-487, International Encyclopedia of the Social Sciences, Ed. David L. Sills, Volume 12, New York, Macmillan, 1968.
"Privacy", William Simms Bainbridge, pp. 1101-1104, Encyclopedia of Community, Ed. Karen Christiensen and David Levinson, Volume 3, Thousand Oaks, CA, Sage Reference, 2003.
Topic: Privacy
Tool Used: Gale Virtual Reference Library
Search Term: “Privacy”
Key words: Tort privacy Informational privacy Isolation
Secretive Rights Autonomous
Concealment Sacred Legal
Constitutional Invasion Zones
Disclosure Anonymous Locked
Closed Intrusion Scrutiny
Citation:
1. Bainbridge, William Sims. "Privacy." Encyclopedia of Community. Ed. Karen Christensen and David Levinson. Vol. 3.
1101-1104. Gale Virtual Reference Library. Gale.
2. "Privacy." International Encyclopedia of the Social Sciences. Ed. David L. Sills. Vol. 12.
Gale Virtual Reference Library. Gale.

My favorite three year old in the whole world is my Boo. His given name is William, but generally goes by many other names: Boo, Baby, Sweetheart, Monkey, Boogie Boy, etc.
He his my late life baby that my husband and I were so blessed with. After 6 years of trying to conceive, giving up and applying for adoption, I finally got pregnant.
Here is a picture of my Boo.