You are on page 1of 6

Assignment 1: Information literacy

First article: Hidden Online Surveillance: What Librarians Should Know to Protect Their Own Privacy
and That of Their Patrons
I inserted Privacy and security on the internet in the key words section of the CCBC library website
in order to find the first article. I used the education source database because I figured that this
assignment was for educational purposes.
MLA Citation:
Fortier, Alexandre, and Jacquelyn Burkell. "Hidden Online Surveillance: What
Librarians Should Know to Protect Their Own Privacy and That of Their Patrons."
Http://eds.a.ebscohost.com/. N.p., Sept. 2015. Web.

Page
1

Second Article: Misuse of Library Public Access Computers: Balancing Privacy, Accountability,
and Security.
I also inserted Privacy and security on the internet in the key words section of the CCBC library
website in order to find this article. I also used the education source database because I figured this was
an educational assignment

MLA Citation:
Carter, Howard. "Misuse of Library Public Access Computers: Balancing Privacy,
Accountability, and Security." Http://eds.a.ebscohost.com/. N.p., 2002. Web.

Page
2

First Internet Article: You are not what you read: librarians purge user data to protect privacy
This article pertains to the Graduate Center at the City University of New York, and how they are
changing their policy for the privacy of patrons when it comes to accessing their interlibrary loan
records. Police have asked for library records in the past to connect the literature that suspects were
reading to a crime they committed. Librarians want to protect their users from investigations that use
poor evidence such as the books their users are reading. The librarians believe that you are not what
you read.
MLA Citation:
Thielman, Sam. "You Are Not What You Read: Librarians Purge User Data to Protect
Privacy." The Guardian. Guardian News and Media, 13 Jan. 2016. Web. 06 Feb.
2016.

Second Internet Article: Librarians Versus the NSA


Key words used for search
-

Libraries
Recent
Security
Privacy

MLA Citation:
Carpenter, Zoe. "Librarians Versus the NSA." The Nation. N.p., 06 May
2015. Web. 08 Feb. 2016.
Search Engine Table

Google search engine


-I found that google has many articles
from websites ending in .com
-Many of the articles were from
websites such as Buzz feed or
Huffington post
-Took me longer to find a reputable
source
-Very up to date

Yahoo search engine


-Almost all of the websites
ended in .org or .edu
- I found clearer Article Titles
-The words I used to search
the articles were in every title
-707,000,000 results

-318,000,000 results in 0.41

Page
3

Bing search engine


-Almost all of the websites
ended in .org or .edu
- Articles were not as up to
date
-707.000,000

Page
4

Search engine comparison


I usually always use Google when it comes to search engines. Looking up the key words I used into
Yahoo and Bing made me realize that Google isnt as reputable as I thought. It took me longer to find
legitimate sources for an article about the privacy and security in libraries. I also found that Yahoo had
more articles with the exact words I searched for. Bing was a little vaguer, but still seemed to have
more reputable sources. The only thing I liked more was that Google had more recent the articles. The
articles found on Yahoo and Bing were a little outdated

T.R.A.A.P
Time- the second internet article was written in May 2015, but updated in February 2016
Relevance- The article was about librarians taking a stand against government intruding on library
records, which does relate to the topic I chose for privacy and security. The article also goes along with
my topic libraries.
Authority- This article was written by Zoe Carpenter. Zoe is the Washington editor, and previously
worked for Rolling Stone and CNN. She has worked for multiple reputable sites, which leads me to
believe she can write a creditable article, although there is no evidence that she has any authority on the
subject of privacy and security in libraries.
Accurate- Im not sure whether this information has been tested for accuracy as she is telling the story
of a librarian, and using common knowledge of history to explain the advances in security and privacy
Purpose- The purpose of this article was to explain a librarians story of how she is trying to secure her
users information from the government and the history behind authorities using libraries to get
information on patrons.

Comparing the internet and Journal articles


Comparing the ease of access to both articles is fairly similar. I was easily able to access
the journal articles because there were specific instructions on how to do so; However if I had
not been given the step by step instructions listed I may have not found the journals as I have
not used the CCBC library website as a source. Now that I have a better understanding on the
use of the website I would say it is easy to access and find journals. There is a filtered system
on the lower left side of the website which can narrow down the choices given in order to
provide more appropriate selections. I found the access of the internet articles easy as well,
Page
5

because I am fairly familiar with using search engines such as google to find articles. Google is
well equipped when it comes to providing articles that best suit the key words put in the search
bar, and lists the title of the articles below. I find google slightly easier to access because there
are not as many steps to include when searching articles.
When it comes to the timeliness of both searching sources I find that google is much
more timely then the journals. When searching for journals on the libraries website it was
difficult for me to find recent entries. In fact, when I tried to find entries using only published
journals in 2016, I was only able to find about 3 or 4. When using google I find that the articles
are much more up to date, and adding the key word recent even helps a lot.
Google was very efficient at finding reputable sources. The first websites that popped up
were from the associate of research libraries which has a lot of authority when it comes to
libraries. Further down there were websites that were not as reputable such as Tumblr and
Reditt which are websites where anyone can post anything without needing any credentials
towards the subject to do so. Its hard to say whether the journal has much authority or not,
because when I look up the author of the journal, many people show up and I cant be sure
which one is the one from the article.

Page
6

You might also like