Professional Documents
Culture Documents
Assignment 2 - Information Literacy
Assignment 2 - Information Literacy
1.)
a.) Mobile technology
b.) Education Source
c.) I chose education source, because I thought it would be
interesting to
look at mobile technology as it relates to education.
d.) MLA Citation:
NAWI, Aliff, Mohd Isa HAMZAH, and Azwin Arif ABDUL RAHIM. "Teachers
Acceptance of Mobile Learning Teaching and Learning in Islamic Education:
A Preliminary Study." Turkish Online Journal of Distance Education 16.1
(2015): 184-92. Education Source. Web. 5 June. 2015.
f.)
g.)
h.)
2.)
a.) In her recent New York Times article, Uncovering Security
Flaws in Digital Education Products for Schoolchildren, Natasha Singer
raises awareness about the widespread security issue that many
educational websites and mobile apps face. The article is based on
research of Tony Porterfield, a software engineer with two school age
sons. When his sons came home with an assignment to complete on
www.Raz-Kids.com, Porterfield decided to visit the site first, in order to
satiate his curiosity about how the site dealt with data security.
Surprisingly, Porterfields investigation revealed that the site was
unencrypted, and stored passwords in plain text. This alarming
discovery lead Porterfield to investigate other educational sites, where
his found similar issues. The article mentions several other popular
educational sites that have been known to have security issues, and
how they have been addressed. The article also digs a bit deeper and
attempts to explain why security is such a widespread issue amongst
educational websites, and how the government has attempted to
intervene.
b.) MLA Citation:
Bing
Yahoo
50,500,000
56,900,000
Ability to
filter
results
based on
date (Y/N)
Y
Y
Number of
relevant
sources on
first page
Ability to
search for
scholarly
articles
(Y/N)
7
6
b.) Timeliness:
The New York Times Article was slightly more recent than the
article from the scholarly journal. This is to be expected given
that newspapers are published daily, and journals are
generally published monthly, or quarterly.
However, the
primary article that I used from the library was quite relevant,
as it was published in June 2015.
c.) Authority:
The scholarly article is undoubtedly the best choice when it
comes to the authority of the author. This is the case because
in order to be published, the authors credentials must be
verified, and in order to qualify as scholarly, qualified peers
must review the article. Thus, before I even open an article,
from the library database, I am able to determine the
authority of the author. In the case of scholarly articles, the
authors authority is confirmed during the initial search, by
adjusting the desired criteria. However, in order to determine
the authority of the author of the internet article, it requires
more concern. Moreover, once the search results come up,
the first step is to determine whether or not the website is
credible. Once the websites credibility is determined, one
must decipher who the author is and then do more
investigation into the authors background in order to
decipher whether or not he/she is can be trusted to deliver
substantiated information.