Gathering and Evaluating Information

In: English and Literature

Submitted By jwatkins1277
Words 1127
Pages 5
Associate Level Material
Appendix I

Strategies for Gathering Information

Fill in the following information for each of your sources:

• List the APA reference citation for the source. • Determine the credibility of the source. Consider the following criteria:

o What is the purpose and affiliation of the organization or author related to the article? o What are the author’s credentials? o Is the information current? When was the information last updated? o Does the information cross-reference with other sources? o Does the source contain bias without evidence to support the claim?

• Explain in at least two to four sentences what information you can gather from this source.

|Source (formatted consistent with APA guidelines) |What makes the |What information can |
| |source credible or |you gather from this |
| |noncredible? |source? |
|Alvarez, B. (2013). As more schools embrace tablets, do textbooks have a fighting chance. Retrieved from |This author has |This article is about |
| |written information |a school district that|
| |that is credible. |switched from |
| |She has studied a |textbooks to iPads. It|

Similar Documents

Strategies for Gathering and Evaluating Sources

...Material Appendix E Strategies for Gathering and Evaluating Sources Source | What makes the source credible or what does not make it credible? Consider the following when addressing the source: What is the author’s affiliation to any organization related to the subject of the article? Does he or she have an ulterior motive? * What is the author’s experience with the subject, including academic or professional credentials related to the subject of the source article? Does she or he have what it takes to understand the complexities of the subject? * Does this article report on information that the author experienced personally, or is it a summary or retelling of information from other sources? How close is the author to the actual information? * Is the information current? When was the information published or last updated? Might there be resources with more current information? * In general, does the information in the source article match the information found in other sources? Or is the information different or unique? Can this information be confirmed by more sources than just this one? * Does the source make any claims without having evidence to support them? | Explain in at least two to four sentences what information you can gather from this source? | Source nameMetaphors, Monuments and Texts: The Life Course in Roman Culture by Ray Laurence from World Archaeology, Feb 2000, Vol.31, Issue 3 | I consider this source of information credible because it......

Words: 579 - Pages: 3

Information Gathering

...------------------------------------------------- University of Phoenix Material Personal Financial Planning Worksheet Directions Based on your readings and discussions in class this week, answer the following multiple choice questions. 1. The process of creating a detailed plan to meet your financial needs and prepare for the future is called a. developing goals b. personal financial planning c. collecting financial information d. personal finance D. 2. Which of the following is not one of the five major steps of the financial planning process? e. Analyze your current finances. f. Establish and implement your plan. g. Collect and organize your financial information. h. Reevaluate and revise your plan as needed. C. 3. Which phase in life is commonly associated with focus on marriage, family, purchasing a home, and career development? i. Teenage years j. Between your 50s and 60s k. Late 20s through your 40s l. During retirement C. 4. Which of the following is a benefit of having a college degree that can affect your financial planning? m. The potential to make a higher salary n. Jobs with retirement plans and benefits o. The ability to receive promotions and wage increases p. All of the above D. 5. Which of the following elements of a comprehensive financial plan involves analyzing future needs, such as saving......

Words: 944 - Pages: 4

Information Gathering Plan

...IS4560 Unit 3 Assignment 1 Information Gathering Plan The explosive growth and popularity of the world-wide web have resulted in thousands of structured query able information sources on the Internet, and the promise of unprecedented information-gathering capabilities to lay users. Unfortunately, the promise has not yet been transformed into reality. While there are sources relevant to virtually any user-queries, the morass of sources presents a formidable hurdle to effectively accessing the information. One way of alleviating this problem is to develop a information gatherer which take the user’s query, and develop and execute an effective information gathering plan that accesses the relevant sources to answer the user’s query efficiently. Most organizations are familiar with Penetration Testing (often abbreviated to, “pen testing”) and other ethical hacking techniques as a means to understanding the current security status of their information system assets. Consequently, much of the focus of research, discussion, and practice, has traditionally been placed upon active probing and exploitation of security vulnerabilities. Since this type of active probing involves interacting with the target, it is often easily identifiable with the analysis of firewall and intrusion detection/prevention device (IDS or IPS) log files. However, too many organizations fail to identify the potential threats from information unintentionally leaked, freely available over the Internet,...

Words: 596 - Pages: 3

Evaluating Electronic Information

...Evaluating Electronic Information Information is only good as the source. Anyone, anywhere, can put anything on the internet. The information might be true; it may also not be tru. How can we determine if the information that is given to us by these soures is legitimate? Developing the ability to evaluate information critically on the internet is important today because many people rely and depend on electronic sources of information in so many areas of their lives. Every people doesn’t want to be steered wrong in many areas so we must carefully asssess the wealth of information available. Nowadays, Internet publications and web site content can claim the same legal protection as books, newspapers and etc., that are protected by the law. For most part, infoemation on internet is easily copied which causes other resources in having copyright rules. But as a person, we must give credit to the information giver. Most of the students do this to share that the information they have searched were true so they cite the resources to give proper merit to the one that given you the informationthat is not truly your original thought. Most importantly, the ease of obtaining information from the intenet and of the publishing information on it can contribute other problems. Internet hoaxes, urban legends, and false information continue to increase because opf the internet. Using the internet introduces legal and ethical issues also such as plagiarism which is copying information......

Words: 454 - Pages: 2

Benefits of Db and Gathering Information Techniqeusts

...Benefits of a Database and Information-Gathering Techniques CIS111 July 27, 2013 I am being interviewed by ACME Global Consulting services as a potential new employee to its growing work force of world-class systems analysts and requirements engineering group. Through a tip, I found out that they will be asking several questions relating to planning for a new database for one of their national restaurant chains. I found out that one of the executives at the restaurant chain only believes in using Microsoft Excel for running reports. For this assignment I will be focusing on 3 main topics. First, I will describe the benefits of using a database management system and how it supports this restaurant chain. Second, I will propose how I would address the issues with flat file systems, such as Excel and Text files, for storing data. Lastly, I will list and describe three tools, techniques, or methodologies for eliciting and documenting requirements related to the development of a new database. So, as you see, you have your plenty of things to get ready for. A Database Management System (DBMS) is the software system that allows users to define, create and maintain a database and provides controlled access to the data provided by your database administrator(s). DBMS is an intermediate layer between programs and the data. Programs access the DBMS, which then accesses the data. There are different types of DBMS ranging from small systems that run on personal computers,......

Words: 941 - Pages: 4

Gathering Information and Writing a Research Paper

...Gathering Information and Writing a Research Paper Writing a research paper for the first time can be a difficult task if not given the proper instruction to complete such an assignment. Breaking a research paper down into separate tasks and sections might ease frustrations for the researcher and give them some fundamental tools for future research projects. A good question to ask your self is “Where do I begin my research?” Some students that are tasked with writing a research paper for the first time might struggle with the topic that they will choose depending on the writing assignment given to them by the instructor. Generally, one main topic can be concentrated on is based off of a research question the student must be able to answer or expound upon described in the course syllabus. Within the syllabus the instructor should have provided several topics to begin the research. Also the instructor should point out what format he or she is requiring, according to a rubric within the syllabus, to be turned in such as APA, MLA or Chicago. Once an individual has selected a topic that he or she would like to discuss, it’s time to begin looking for the facts. There are numerous resources at your disposal when you conduct your research such as the library, The Internet, and. You have to decide which source is likely to be most useful to you. For example, if you are searching for information on a historical event the library is an reliable place to find a book that...

Words: 1669 - Pages: 7

Finding and Evaluating Information

...TCHE2079 – Tertiary Teaching and Learning This model is from a different subject, but the process of evaluation is the same. Evaluating a Source 1. Refer to the most important source (book/article/webpage) you used in your Synthesis Essay. Respond to the topics and questions below and evaluate the source. Source: Davies M 2009, „Computer assisted argument mapping: a rationale approach‟, Higher Education, vol. 58, no. 6, pp. 799-820. Full citation of the source, according to RMIT referencing guide for “Reference Lists” Topic Evaluation Authority (50 words)  Is that author an expert?  What evidence is there to support this? Martin Davies is an expert in this field. I Googled his name and found that he has 2 doctorates and is presently a Senior Lecturer in Higher Education in the Teaching and Learning Unit and an Honorary Research Fellow in the Department of Economics at Melbourne University. His page on the Melb. Uni. website lists all his publications (about 70), many of which are concerned with critical thinking in tertiary learning. Validity & Accuracy (50 words)  How do you know the information is accurate?  Is it from a valid source, e.g. an educational institution?  Find out if it is peer reviewed or been passed by an editorial panel, eg is it in a refereed journal? His article includes an appendix in which he has placed all the data from the quantitative study he conducted. Though I can‟t be sure that this data were analysed......

Words: 1028 - Pages: 5

Strategies for Gathering and Evaluating Sources

...University of Phoenix Material Strategies for Gathering and Evaluating Sources Evaluate three sources for your final project by completing this worksheet. Your responses provide the information you need to complete the annotated bibliography for your Week Three assignment. Source 1 |Source Information | | | | | |Questions to Consider |Answers (one sentence each should suffice) | |Is the author affiliated with an organization related to the subject |American Rich Ling is a senior research scientist at Telenor, Norway's| |of the article? (Does he or she have an ulterior motive?) |largest telecommunications company. There is no ulterior motive other | | |than the study of technology and how it affects the public. | |What is the author’s experience with the subject, including related |as behind his Telenor responsibilities, which involve studying the | |academic or professional credentials? (Is......

Words: 1090 - Pages: 5

Strategies for Gathering and Evaluating Sources

...University of Phoenix Material Strategies for Gathering and Evaluating Sources Evaluate three sources for your final project by completing this worksheet. Your responses provide the information you need to complete the annotated bibliography for your Week Three assignment. Source 1 |Source Information | |Brown University | | | |,_tobacco,_&_other_drugs/marijuana.php | |Questions to Consider |Answers (one sentence each should suffice) | |Is the author affiliated with an organization related to the subject |The author is affiliated with an organization related to the subject, | |of the article? (Does he or she have an ulterior motive?) |due to the research done at brown University. No they do not have an | | |ulterior motive. ...

Words: 930 - Pages: 4

Benefits of a Database and Information-Gathering Techniques

...Running head: BENEFITS OF A DATABASE AND INFORMATION-GATHERING Benefits of a Database and Information-Gathering Techniques Benefits of a Database and Information-Gathering Techniques Hello Mr. ACME Global Consulting interviewing person, I'm Alucard Lazarus, it's a pleasure to meet you. I can offer over a hundred years of experience in consulting, managing employees, customer logistics, and excellent database management system or DBMS knowledge. All of which should make me the ultimate candidate for your organization. Let me explain to you how I can improve upon the current schema for the company’s new restaurant using DBMS. First of all let me explain what I know is DBMS; it’s software that allows data to be manipulated, stored, and retrieved from the data stored which can be accessed by multiple users. The application programs used for those operations are Microsoft Access, SQL Server, and Oracle. The advantages of a DBMS are maintaining what terms are used to search by therefore making searches quick and easy, keeps control of data redundancy (it’s a process from 1NF to 2NF to 3NF), information security feature with keeping those that require certain access to data, has the automatic functions necessary to save and recall data for back up recovery, it makes sure that data can be accessed through any application that the company will use, there are different interfaces for users to get to the data that they need to get to, and it uses whatever rules that the......

Words: 841 - Pages: 4

Gathering Information Pertaining to a Glba Compliance

...Lab#5 Define a process for Gathering Information pertaining to a GLBA Compliance 1. GLBA repealed parts of an act. Name the act and explain why it was significant for financial institutions and insurance companies. Parts of the glass Steagall act of 1933 GLBA allows financial institutions such as banks to act as insurance companies. GLBA covers both financial institutions and insurance companies since both can perform financial services for its customers. This reform requires banks and insurance companies to comply with both the privacy and safeguard rules of GLBA. 2. What is another name for obtaining information under false pretenses and what does it have to do with GLBA? What is an example of the safeguard pertinent to this requirement? Pre-texting or social engineering. GLBA specifically mentions this in title 15 US code chapter 94 sub chapter 2, section 6821. GLBA encourages companies to implement safeguards around pre-texting and social engineering. Security awareness training and periodic reminders of awareness to pre-texting and social engineering is a best practice performed within the user domain. 3. How does GLBA impact information system security and the need for information systems security practitioners and professionals? The safeguards rule within GLBA requires financial institutions and insurance companies to develop security plan detailing how they will protect their customers nonpublic personal information. The safeguards rule impacts the......

Words: 1267 - Pages: 6

Gathering Information

...Gathering information at my current job Robert D Johnson ITT Technical Institute My current job is working as a forklift operator at Ashley’s furniture; I pull orders from a pick list and prepare the manufactures with the items necessary. I have item numbers on my pick list that vary by the amounts, for example ill have an item number and it’ll tell me to get 24 pieces, each box contains an amount of 3 pieces 4 pieces and 6 pieces in each box so I have to determine how many boxes I will have to pick on put on my pallet to complete the order. I also put away items that are received in trucks and place them in the correct location marked in 14 aisles labeled from AQ to AZ with 3 tears high labeled 1-3, the other side of the aisle is labeled BQ to BZ the 3 tears also. When I scan the item plate it’ll direct me to a destination to put the pallet in its proper location. Gathering the right information at my job is very critical, if I have an order that needs me to pick 3 orders of 36 pieces which is 108 pieces and I short the order by not gathering the right information and give our manufactures a short amount of pieces it will stop the assembly line which can cause the lines to stop and all productivity as at a standstill, now the supervisor is on me because the company is losing out on money. Also if I gather my information wrong and over pick the amount of pieces necessary for the order that causes the manufacturing to now stop the production, re label the item and......

Words: 425 - Pages: 2

Information Gathering

...can” because a collection of choices are mixed and then chosen to match a problem to a solution. Per the article, “The choice situation becomes a “garbage can” in which problems and solutions are dumped” (Nutt, 606). According to the political model, decision makers base decisions on personal decisions rather than organizational issues. An irrational decision is rational to them because it achieves their ultimate goal. “ This prompts decision makers to seek information that bolsters their position by maintaining images of self, attitudes and the like. Decision makers create the impression that they have arrived at an unbiased inference by making their interpretation of trends and events seem equitable to all concerned” (Nutt, 606). In conclusion, the decision-making models do relate to the information described in the explanatory variable Table 1. As decision makers need to find the appropriate approach to solve problems and execute the best decision. #2. The approach that Nutt suggested in the article, in regards to gathering and extrapolating data involves a two-step process. The first step involves the process of decoding a performance gap, which is used to motivate action. The performance gap can be measured with different degrees of precision, which in turn is used to classify three specific variables. Those value variables can be quantitative, qualitative or impressionistic. Once a variable has been chosen, then you can move the next step. The other step involves,......

Words: 1111 - Pages: 5

Seven Steps of Information Gathering

...Ethical Hacker Unit 2 Project Presented By Sandra Grannum To Dr. Pace On December 13, 2011 Table of Contents Abstact………………………………………………………………………………………………………..3 Seven steps of Information gathering…………………………………………………..………..4 Popular Reconnaissance tools……………………………………………………………………….5 Methods to crack passwords on windows linux and Mac…………………………….…..8 Password Cracker downloads…………………………………………………………….………….9 Security Plan……………………………………………………………………………………………….. 9-11 Steps to remove evidence……………………………………………………………………………. 11 References:…………………………………………………………………………………………………..12 Abstract This paper list and describe the seven steps of information gathering and describe some of the most popular reconnaissance tools while explaining the benefits and limitations of each. Included as well is the method to crack passwords on Windows, Linux, and Mac. There is also a password cracker tool that was downloaded on my home computer that describes the steps and outcomes. Least but not last, a security plan is also included in this project and the steps to remove evidence of an attack on a network. Define the seven-step information gathering process • Information gathering is divided into seven steps. These steps include gathering information, determining the network range, identifying active machines, finding open ports and access points, OS fingerprinting, fingerprinting services, and mapping the network. Define footprinting ......

Words: 2645 - Pages: 11

Benefits of a Database and Information-Gathering Techniques

...Brian Morgan James.Neiman CIS 111 Benefits of a Database and Information-Gathering Techniques April 28, 2012 Benefits of a Database and Information-Gathering Techniques Database: Database is the collection of data or information, so that it can be easily fetched, managed and update. In database data or information is stored in the forms of tables. Each table in a database has it unique name and table duplication is not allowed. Example of database: Oracle 10g, MySQL, SQL Server, IBM DB2 etc. DBMS terms refer to the database management system. A database management system (DBMS) is a collection of software application package with some computer programs that are used to store, create, fetch, modify and extract the information from the database. Each DBMS system has some set of rules and pre-defined paradigm on which each database is working. There are many different types of DBMSs, ranging from small systems that run on personal computers to huge systems that run on mainframes or Solaris servers. Some of the example of DBMS is 1.> Air lines flight management system. 2.> Employee’s payroll management system for an organization. 3.> Inventory management system for warehouse operations. 4.> Student management system for Schools and Colleges. Advantages of DBMS 1.> It reduces the data redundancy (duplicate data in the database). 2.> Scalable: DBMS systems are highly scalable i.e. these systems can be scaled to store more data as required......

Words: 777 - Pages: 4