Module 5 Assignment: Search

The assignment was to become familiar with a variety of search tools and their uses. In addition to this, preparation of an annotated bibliography on topics relating to the internet and WWW was also required. The topics were censorship, copyright, privacy, security, staying current, and time management within the electronic communication field.



Annotated Bibliography

I chose the American Psychological Association (APA) style of referencing electronic sources. The source came from Tong, J. (Updated May 22, 1996).
Electronic Sources Style Guide. [On-Line]. Available HTTP: http://libits.library.ualberta.ca/gpu/help/pathfinders/style/styleti.html


  1. Privacy.

    Sobel, D. L. (1996). The constitutionality of the Communications Decency Act: Censorship on the internet.

    University of Florida Journal of Technology Law and Policy [On-Line], 1(Spring), 14 paragraphs. Available HTTP: http://journal.law.ufl.edu/%7Etechlaw/1/sobel.html

    An examination of the technical feasibility of enforcing the American Communications Decency Act ("CDA"), which is part of the Telecommunications Act of 1996, the jurisdictional limitations of enforcement, and the problems with defining indecency. Sobel provides his own conclusions about the act and its utility within American constitutional law. Used the Webcrawler search engine and the query: "censorship and internet". Document 7.


  2. Copyright

    Karjala, D.S. and Menell, P.S. (1995).Applying fundamental copyright principles to Lotus Development Corporation v. Borland International Inc.

    Berkeley Technology Law Journal [On-Line], 10(1), 27 paragraphs. Available HTTP: http://server.berkeley.edu:80/BTJL/articles/10-1/m_k_1st.html

    An examination of a specific court case, Lotus v. Borland, in which the copyright of a computer program protects the user interface generated by that program. Used the Lycos CustomSearch search engine and the query: "internet copyright law". Document 2.


  3. Privacy

    Reid, C.A. (1996, Oct.21-24).The complexity of free speech, privacy, and intellectual freedom in a global network.

    ASIS Annual Meeting. Speakers: Jamie Love, Shabbir J. Sakdar, John Berry [On-Line]. 3 paragraphs. Available HTTP: http://lib2.med.cornell.edu/Library/HTML/asis.html#15

    American Society for Information Science AGM, Oct.21-24, 1996 as reported by Reid. Of the three speakers listed, the presentation by Sakdar specifically addresses privacy/confidentiality and states that it's virtually impossible to be anonymous on the internet. Used the Altavista search engine and the query: "internet privacy AND scholarly articles". Document 3.


  4. Security

    Froomkin, A. M. (1995). The metaphor is key: Cryptography, the clipper chip, and the constitution.

    University of Pennsylvania Law Review [On-Line], 143, p.709-897, 180 pages. Available HTTP: http://www.law.miami.edu/~froomkin/articles/clipper.htm

    The article is about the conflict between the individual's power to maintain secrecy from the state and the state's power to penetrate that secret. Froomkin looks at the isssues of encryption as a means of protection and the constitutional implications of a government proposal that would allow easier intercepition of private communication. Used the Yahoo search engine and the query: "internet security articles". Document 3 of site matches.


  5. Staying Current

    Sprunger, K. V. (1996) Extending the value of current content to the researcher's desk-top: From print to internet.

    [On-Line]. 1 paragraph. Available HTTP: http://www.sivb.org/sprunger.htm

    An abstract discussing the Institute for Scientific Information's (ISI) Current Contents serial publication and its transitional role from print to online source availabilty. Used Metacrawler "As a phrase" function and the query: "staying current". Document 7.


  6. Time Management

    Washington, R. and Hayes-Roth, B. (1989) Input data management in real-time AI systems.

    [On-Line]. 1 paragraph. Available HTTP: http://www-ksl.stanford.edu/KSL_Abstracts/KSL-89-06.html

    An abstract discussing artificial intelligence and the possibilty of an AI system being able to filter out much of the incoming data so as to respond to important or unexpected events. Possible applications: health care monitoring equipment in hospitals. Used World Wide Web Worm and the query: "time management". Document 55.


EdPsy 597 Assignments

[ Table] [ Module 1] [ Module 2] [ Module 3] [ Module 4] [ Module 5] [ Module 6] [ Module 7] [ Index]

URL: http://www.ualberta.ca/~barr/portfolio
Copyright © 1997 Sean J. Barr