[DigitalScholarship] INTERNET SECURITY : GOVERNMENT : BUSINESS : PRIVACY: Government Business and Privacy

 

.

.

Government Business and Privacy

.

Research Guide Directory :

Discussion Group Directory

https://sites.google.com/site/researchguidesonsites/

.

APPLE THE FBI AND SURVEILLANCE

The I-Phone Apple and the FBI

https://sites.google.com/site/governmentbusinessandprivacy/the-i-phone-apple-and-the-fbi

.

NSA releases email in dispute over Snowden ‘internal whistleblowing’

Dan Roberts in Washington

Thursday 29 May 2014 16.23 EDT

The Guardian

http://www.theguardian.com/world/2014/may/29/nsa-email-snowden-surveillance-internal-whistleblowing

Snowden tells NBC it was his duty to reveal sprawling NSA surveillance but going home meant ‘walking into a jail cell’.

Edward Snowden: ‘If I could go anywhere that place would be home’

.

INTERNET: LAW LEGAL POLITICAL AND GOVERNMENTAL ISSUES :

PRIVACY :

BUSINESS: CORPORATIONS: NAMED CORPORATIONS: GOOGLE:

Berlin Court Rules Google Privacy Policy Violates Data Protection Law

Loek Essers

IDG News Service

November 20, 2013 5:05 AM

PC World

http://tinyurl.com/m4dkxct

.

UNITED STATES: GOVERNMENT :

INFORMATION LEAKS :

ESPIONAGE AND SURVEILLANCE :

SPYS AND SPYING:

Edward Snowden’s NSA Leaks Show We Need a Debate

By Eugene Robinson

Published: June 10, 2013

Washington Post

Opinions

http://www.washingtonpost.com/opinions/eugene-robinson-snowdens-

nsa-leaks-show-we-need-a-debate/2013/06/10/002911b6-d203-

11e2-8cbe-1bcbee06f8f8_story.html

http://tinyurl.com/mn5nd46

.

REFERENCE: ENCYCLOPEDIAS: SUBJECT :

BOOKS :

LAW :

GOVERNMENT :

MEDIA :

INTERNET:

Encyclopedia of Privacy

http://tinyurl.com/hfstue8 

.

Title Encyclopedia of Privacy: A-M

Volume 1 of Encyclopedia of Privacy, William G. Staples, ISBN 0313334773,

9780313334771

Author William G. Staples

Editor William G. Staples

Contributor William G. Staples

Publisher Greenwood Publishing Group, 2007

ISBN 0313334781, 9780313334788

Length 676 pages

 

.

 

Title Encyclopedia of Privacy: N-Z

Author William G. Staples

Editor William G. Staples

Publisher Greenwood Press., 2006

ISBN 0313334773, 9780313334771

Length 744 pages

.

.

Selected Reviews and Sources Citing or Noting This Encyclopedia:

.

.

Encyclopedia of Privacy

by Martin Guha

Reference Reviews,

ISSN 0950-4125,

05/2008, Volume 22, Issue 3, p. 20

 

.

 

REFERENCE & INTERNET

by Anonymous

Choice, ISSN 0009-4978,

06/2011, Volume 48, Issue 10, p. 1861

 

.

 

Compromising confidentiality

by Mary Ellen Quinn

American Libraries,

ISSN 0002-9769,

08/2007, Volume 38, Issue 7, p. 87

 

.

 

Prying Eyes: Privacy in the Twenty-first Century

by John Peters

The Booklist,

ISSN 0006-7385,

01/2008, Volume 104, Issue 9/10, p. 70

 

.

 

Web 2.0, Prosumption, and Surveillance

by Christian Fuchs;

Samhlsvetenskapliga fakulteten; Humanistisk-samhlsvetenskapliga

vetenskapsomret; Uppsala universitet;

Institutionen f informatik och media;

Medier och kommunikation Surveillance & Society,

ISSN 1477-7487,

01/2011, Volume 8, Issue 3, p. 288

 

.

 

Pride, shame and stigma in private spaces

by Warren, Carol AB

Ethnography,

ISSN 1466-1381,

09/2010, Volume 11, Issue 3, pp. 425 – 442

 

.

 

Personal information, borders, and the new surveillance studies

by Marx, GT and Muschert,

GW ANNUAL REVIEW OF LAW AND SOCIAL SCIENCE,

ISSN 1550-3585,

2007, Volume 3, Issue 1, pp. 375 – 395

 

.

 

Subject Listings: Social Sciences  Library Journal,

ISSN 0363-0277,

11/2006, Volume 131, Issue 19, p. 15 …

 

0-415-97314-7. hc. $695; until 1/31/07, $595. UG GA

Encyclopedia of Privacy. 2 vols. Greenwood. Dec.

672p. ISBN 0-313-33477-3. hc. $199.95.

 

.

 

Disclosing or Protecting? Teenagers Online Self-Disclosure

by Walrave, Michel and Heirman,

Wannes Computers,

Privacy and Data Protection: an Element of Choice,

2011, ISBN 9400706405,

pp. 285 – 307

 

.

 

Google Books

 

http://books.google.com/books?hl=en&lr=&id=sFv1ZltBhR0C&oi=

fnd&pg=PR5&dq=%22encyclopedia+of+privacy%22&ots=

Kmk1NC0i9t&sig=zFOWOYgHbQw2RLcWMxsokNPrXek

 

.

 

A shorter URL for the above link:

 

.

 

http://tinyurl.com/3pfoxhf

 

.

 

Broken promises of privacy: Responding to the surprising failure

of anonymization

Ohm, P

Journal: UCLA law review

ISSN: 0041-5650 Date: 2010

Volume: 57 Page: 1701

 

.

 

Personal Information, Borders, and the New Surveillance Studies

Marx, Gary T.

Journal: Annual review of law and social science

ISSN: 1550-3585 Date: 12/2007

Volume: 3 Issue: 1 Page: 375

DOI: 10.1146/annurev.lawsocsci.3.081806.112824

 

.

 

Damages Under the Privacy Act: Is Emotional Harm” Actual”?

Quallen, NM

Journal: North Carolina law review

ISSN: 0029-2524 Date: 2009

Volume: 88 Page: 334

 

.

 

Sex Offenders: Identification, Risk Assessment, Treatment, and Legal

Issues

Editors Fabian M. Saleh, Albert J. Grudzinskas, John M. Bradford, M.D.,

Daniel J. Brodsky

Edition illustrated

Publisher Oxford University Press US, 2009

ISBN 0195177045, 9780195177046

Length 480 pages

p. 412

 

.

 

An Alternative View of Privacy on Facebook

Fuchs, Christian

Journal: Information

ISSN: 2078-2489 Date: 03/2011

Volume: 2 Issue: 1 Page: 140

DOI: 10.3390/info2010140

 

.

 

Disclosing or Protecting? Teenagers Online Self-Disclosure

Walrave, Michel

Book: Computers, Privacy and Data Protection: An Element of Choice

ISBN: 9400706405, 9789400706408 Date: 2011 Page: 285

Place: Dordrecht Publisher: Springer

DOI: 10.1007/978-94-007-0641-5_14

 

.

 

Information technology in librarianship: new critical approaches

Library and Information Science Series

Author Gloria J. Leckie

Editors Gloria J. Leckie, John Buschman

Publisher ABC-CLIO, 2009

ISBN 1591586291, 9781591586296

Length 297 pages

p. 48

 

.

 

Dredging up the past: Lifelogging, memory, and surveillance

Allen, AL

Journal: The University of Chicago law review

ISSN: 0041-9494 Date: 2008

Page: 47

 

.

 

Pride, shame and stigma in private spaces

Warren, C. A.

Journal: Ethnography

ISSN: 1466-1381 Date: 09/2010

Volume: 11 Issue: 3 Page: 425

DOI: 10.1177/1466138110370495

 

.

 

Temple Summon Search

 

http://tinyurl.com/zrs5vze

 

Source Type

  • Book / eBook (23)
  • Book Chapter (1)
  • Book Review (9)
  • Conference Proceeding (1)
  • Journal Article (17)
  • Magazine Article (1)
  • Manuscript (8)
  • Newspaper Article (8)
  • Reference (256)
  • Trade Publication Article (1)

.

.

WEBBIB1516

http://tinyurl.com/q8tavoy

.

.

UNITED STATES: GOVERNMENT :

SURVEILLANCE :

PRIVACY :

LIBRARIES: LIBRARIANS:

Librarians Versus the NSA

Your local library is on the front lines against government surveillance.

Zo Carpenter

May 6, 2015

This article appeared in the May 25, 2015 edition of The Nation.

http://www.thenation.com/article/206561/librarians-versus-nsa

.

Computers, Privacy and Data Protection: an Element of Choice

Editors      Serge Gutwirth, Yves Poullet, Paul de Hert, Ronald Leenes

Edition      illustrated

Publisher  Springer Science & Business Media, 2011

ISBN 9400706413, 9789400706415

Length      457 pages

 

http://tinyurl.com/guwo3u6

 

.

 

No Place to Hide: Edward Snowden, the NSA,

and the U.S. Surveillance State

Author       Glenn Greenwald

Publisher  Metropolitan Books, 2014

ISBN 1627790748, 9781627790741

Length      272 pages

 

http://tinyurl.com/hvvckp5

 

.

 

Computers, Business, and Security:

The New Role for Security

Author       James A Schweitzer

Publisher  Butterworth-Heinemann, 2014

ISBN 1483144895, 9781483144894

Length      166 pages

 

http://tinyurl.com/h3enn3q

 

.

 

Protecting Patron Privacy: Safe Practices for Public Computers:

Safe Practices for Public Computers

Author       Matthew Beckstrom

Publisher  ABC-CLIO, 2015

ISBN 1610699971, 9781610699976

Length      104 pages

 

http://tinyurl.com/zewn36d

 

.

 

National Security Agency Surveillance:

Reflections and Revelations 2001-2013

Author       Wayne Madsen

Publisher  Lulu.com, 2013

ISBN 1304272133, 9781304272133

 

http://tinyurl.com/za8sela

 

.

.

.

 

 Please Ignore All Links to JIGLU
in search results for Net-Gold and related lists.
The Net-Gold relationship with JIGLU has
been terminated by JIGLU and these are dead links.
http://groups.yahoo.com/group/Net-Gold/message/30664

.

.

 

.

 

 

[Net-Gold] CYBERSECURITY : CYBERCRIME : CYBERTERRORISM : COMPUTER AND DEVICE SECURITY: A Bibliography of Selected Publications About Cybersecurity, Cybercrime and Cyberterrorism

 

.

 

.

 

CYBERSECURITY :

CYBERCRIME :

CYBERTERRORISM :

COMPUTER AND DEVICE SECURITY:

A Bibliography of Selected Publications About Cybersecurity, Cybercrime and Cyberterrorism

 

.

 

.

 

 

 

What is computer security?

Author: Bishop, M. View Author Profile

Journal: IEEE security & privacy

ISSN: 1540-7993

Date: 01/2003

Volume: 1 Issue: 1 Page: 67-69

DOI: 10.1109/MSECP.2003.1176998

 

http://tinyurl.com/hzfnuy5

 

.

 

Gordon, L. A., and Loeb, M. P.

(2006).

Managing cybersecurity resources: a cost-benefit analysis

(Vol. 1).

New York: McGraw-Hill.

 

http://tinyurl.com/gtfk85g

 

.

 

Denning, D. E.

(2001).

Activism, hacktivism, and cyberterrorism:

The Internet as a tool for influencing foreign policy.

Networks and netwars: The future of terror, crime, and militancy,

239, 288.

 

http://tinyurl.com/jcjhsom

 

.

 

Gollmann, D.

(2010).

Computer security.

Wiley Interdisciplinary Reviews:

Computational Statistics, 2(5), 544-554.

 

http://tinyurl.com/j8s3ppy

 

.

 

Studying users’ computer security behavior: A health belief perspective

Author: Ng, Boon-Yuen View Author Profile

Journal: Decision Support Systems

Date: 03/2009

Volume: 46   Issue: 4   Page: 815-825

DOI: 10.1016/j.dss.2008.11.010

 

http://tinyurl.com/z4mbtbe

 

.

 

Cybercrime and Society

Author:       Majid Yar   

Cybercrime and Society

Sage Publications Ltd. ©2006

ISBN:1412907535

 

http://tinyurl.com/zln6b5p

 

.

 

Examining the Applicability of Lifestyle-Routine Activities

Theory for Cybercrime Victimization

Author: Holt, Thomas J. View Author Profile

Journal: Deviant behavior

ISSN: 0163-9625

Date: 11/2008

Volume: 30 Issue: 1 Page: 1-25

DOI: 10.1080/01639620701876577

 

http://tinyurl.com/hdke5jl

 

.

 

Anderson, R., Barton, C., Böhme, R., Clayton, R., Van Eeten, M. J., Levi, M., …

and Savage, S.

(2013).

Measuring the cost of cybercrime.

In The economics of information security and privacy

(pp. 265-300).

Springer Berlin Heidelberg.

 

http://tinyurl.com/ja9umg3

 

.

 

Scene of the Cybercrime

Scene of the Cybercrime: Computer Forensics Handbook Series

Authors      Debra Littlejohn Shinder, Michael Cross

Edition        2

Publisher    Syngress, 2008

ISBN  0080486991, 9780080486994

Length        744 pages

 

http://tinyurl.com/zzaw8vo

 

.

 

Song, D., Brumley, D., Yin, H., Caballero, J., Jager, I., Kang, M. G., …

and Saxena, P.

(2008).

BitBlaze: A new approach to computer security via binary analysis.

In Information systems security

(pp. 1-25).

Springer Berlin Heidelberg.

 

http://tinyurl.com/jqgnmob

 

.

 

Cybersecurity for Critical Infrastructures: Attack and Defense Modeling

Author: Ten, Chee-Wooi View Author Profile

Journal: IEEE Transactions on Systems, Man, and Cybernetics –

Part A: Systems and Humans

ISSN: 1083-4427

Date: 07/2010

Volume: 40 Issue: 4 Page: 853-865

DOI: 10.1109/TSMCA.2010.2048028

 

http://tinyurl.com/gvhzqkd

 

.

 

Principles of Cybercrime

Author        Jonathan Clough

Edition        2

Publisher    Cambridge University Press, 2015

ISBN  1316409295, 9781316409299

 

http://tinyurl.com/jp8tfpk

 

.

 

Wilson, C.

(2008, January).

Botnets, cybercrime, and cyberterrorism:

Vulnerabilities and policy issues for congress.

LIBRARY OF CONGRESS WASHINGTON DC

CONGRESSIONAL RESEARCH SERVICE.

 

http://tinyurl.com/zoh3ehg

 

.

 

Encyclopedia of Cybercrime

Editor         Samuel C. McQuade

Publisher    Greenwood Press, 2009

Original from       the University of California

Digitized    Sep 10, 2009

ISBN  0313339740, 9780313339745

Length        210 pages

 

http://tinyurl.com/jojvrky

 

.

 

 

Cybersecurity: What Everyone Needs to Know

What Everyone Needs To Know

Authors      Peter W. Singer, Allan Friedman

Publisher    OUP USA, 2014

ISBN  0199918112, 9780199918119

Length        306 pages

 

http://tinyurl.com/haobnny

 

.

 

Cybercrime: Investigating High-Technology Computer Crime

Author        Robert Moore

Edition        revised

Publisher    Routledge, 2010

ISBN  1437755836, 9781437755831

Length        312 pages

 

http://tinyurl.com/hozhreo

 

.

 

Cybercrime: Security and Surveillance in the Information Age

Editors        Brian D. Loader, Douglas Thomas

Publisher    Routledge, 2013

ISBN  1135122644, 9781135122645

Length        320 pages

 

http://tinyurl.com/z34ufrc

 

.

 

Cybercrime 2.0 when the cloud turns dark

Author: Provos, Niels

Journal: Communications of the ACM

ISSN: 0001-0782

Date: 04/2009

Volume: 52 Issue: 4 Page: 42

DOI: 10.1145/1498765.1498782

 

http://tinyurl.com/jrg4jj5

 

.

 

Fundamentals of Computer Security

Authors      Josef Pieprzyk, Thomas Hardjono, Jennifer Seberry

Edition        illustrated

Publisher    Springer Science & Business Media, 2013

ISBN  3662073242, 9783662073247

Length        677 pages

 

http://tinyurl.com/j9aasyw

 

.

 

Kshetri, N.

(2010).

The global cybercrime industry:

economic, institutional and strategic perspectives.

Springer Science & Business Media.

 

http://tinyurl.com/gptjflg

 

.

 

Cybercrime victimization:

An examination of individual and situational level factors

Author: Ngo, FT View Author Profile

Journal: International journal of cyber criminology

ISSN: 0974-2891

Date: 2011

Volume: 5 Issue: 1 Page: 773

 

http://tinyurl.com/hh8lre5

 

.

 

Reeder, R. W., Bauer, L., Cranor, L. F., Reiter, M. K., Bacon, K., How, K., and

Strong, H.

(2008, April).

Expandable grids for visualizing and authoring computer security policies.

In Proceedings of the SIGCHI Conference on Human Factors

in Computing Systems

(pp. 1473-1482). ACM.

 

http://tinyurl.com/jmz28w8

 

.

 

Data Mining and Machine Learning in Cybersecurity

Authors      Sumeet Dua, Xian Du

Edition        illustrated

Publisher    CRC Press, 2011

ISBN  1439839433, 9781439839430

Length        256 pages

 

http://tinyurl.com/h9ls8j7

 

.

 

Cybercrime: Criminal Threats from Cyberspace

Crime, media, and popular culture, ISSN 1549-196X

Author        Susan W. Brenner

Publisher    ABC-CLIO, 2010

ISBN  0313365466, 9780313365461

Length        281 pages

 

http://tinyurl.com/hbolpfs

 

.

 

Dumitras, T., & Shou, D.

(2011, April).

Toward a standard benchmark for computer security research:

The Worldwide Intelligence Network Environment (WINE).

In Proceedings of the First Workshop on Building Analysis Datasets

and Gathering Experience Returns for Security (pp. 89-96). ACM.

 

http://tinyurl.com/gmld5bl

 

.

 

Sommer, P., and Brown, I.

(2011).

Reducing systemic cybersecurity risk.

Organisation for Economic Cooperation and Development

Working Paper No. IFP/WKP/FGS (2011), 3.

 

http://tinyurl.com/z6y7lz6

 

.

 

Computer Security

Author        John M. Carroll

Edition        2

Publisher    Butterworth-Heinemann, 2014

ISBN  1483103013, 9781483103013

Length        462 pages

 

https://www.google.com/search?tbm=bks&q=%22Computer+Security%22

 

.

 

Winkler, V. J.

(2011).

Securing the Cloud: Cloud computer Security techniques and tactics.

Elsevier.

 

http://tinyurl.com/jdsrchp

 

.

 

Cybersecurity: Stakeholder incentives, externalities, and policy options

Author: Bauer, Johannes M. View Author Profile

Journal: Telecommunications policy

ISSN: 0308-5961

Date: 11/2009

Volume: 33 Issue: 10-11 Page: 706-719

DOI: 10.1016/j.telpol.2009.09.001

 

http://tinyurl.com/h5tkuzm

 

.

 

Cybersecurity Strategies: The QuERIES Methodology

Author: Carin, Lawrence View Author Profile

Journal: Computer (Long Beach, Calif.)

ISSN: 0018-9162

Date: 08/2008

Volume: 41 Issue: 8 Page: 20-26

DOI: 10.1109/MC.2008.295

 

http://tinyurl.com/gvu6cyd

 

.

 

Against cyberterrorism

Author: Conway, Maura

Journal: Communications of the ACM

ISSN: 0001-0782

Date: 02/2011

Volume: 54 Issue: 2 Page: 26

DOI: 10.1145/1897816.1897829

 

http://tinyurl.com/hw6yklc

 

.

 

Takahashi, T., Kadobayashi, Y., and Fujiwara, H.

(2010, September).

Ontological approach toward cybersecurity in cloud computing.

In Proceedings of the 3rd international conference on

Security of information and networks (pp. 100-109). ACM.

 

http://tinyurl.com/zuqzb7v

 

.

 

Computer Security Fundamentals

Author        William (Chuck) Easttom II

Edition        2

Publisher    Pearson Education, 2011

ISBN  0132828324, 9780132828321

Length        550 pages

 

http://tinyurl.com/gw4v49d

 

.

 

The growing phenomenon of crime and the internet:

A cybercrime execution and analysis model

Author: Hunton, Paul View Author Profile

Journal: Computer law & security review

ISSN: 0267-3649

Date: 11/2009

Volume: 25 Issue: 6 Page: 528-535

DOI: 10.1016/j.clsr.2009.09.005

 

http://tinyurl.com/jd457uv

 

.

 

Whitty, M. T., and Buchanan, T.

(2012).

The online romance scam: A serious cybercrime.

CyberPsychology, Behavior, and Social Networking, 15(3), 181-183.

 

http://tinyurl.com/j9csnd5

 

.

 

Gable, K. A.

(2010).

Cyber-Apocalypse Now: Securing the Internet Against Cyberterrorism

and Using Universal Jurisdiction as a Deterrent.

Vand. J. Transnat’l L., 43, 57.

 

http://tinyurl.com/hjdmsaw

 

.

 

Wash, R.

(2010, July).

Folk models of home computer security.

In Proceedings of the Sixth Symposium on Usable Privacy and Security

(p. 11). ACM.

 

http://tinyurl.com/zptm7go

 

.

 

Higgins, G. E.

(2010).

Cybercrime: An introduction to an emerging phenomenon

(p. 3).

McGraw-Hill Higher Education.

 

http://tinyurl.com/jkvbvch

 

.

 

Markets for Cybercrime Tools and Stolen Data: Hackers’ Bazaar

EBSCO ebook academic collection

Authors      Lillian Ablon, Martin C. Libicki, Andrea A. Golay

Publisher    Rand Corporation, 2014

ISBN  0833085743, 9780833085740

Length        82 pages

 

http://tinyurl.com/zd6gy8f

 

.

 

Cybercrime and the Culture Of Fear

Social science fiction(s) and the production of knowledge about cybercrime

Author: Wall, David S. View Author Profile

Journal: Information, Communication and Society

Date: 09/2008

  Volume: 11   Issue: 6   Page: 861-884

DOI: 10.1080/13691180802007788

 

http://tinyurl.com/gkprw4h

 

.

 

Kontostathis, A., Edwards, L., and Leatherman, A.

(2010).

Text mining and cybercrime. Text Mining: Applications and Theory.

John Wiley & Sons, Ltd, Chichester, UK.

 

http://tinyurl.com/jmw8f85

 

.

 

For Immediate ReleaseFebruary 12, 2013

Executive Order — Improving Critical Infrastructure Cybersecurity

 

EXECUTIVE ORDER

 

– – – – – – –

 

IMPROVING CRITICAL INFRASTRUCTURE CYBERSECURITY

 

https://www.whitehouse.gov/the-press-office/2013/02/12/executive-order-improving-critical-infrastructure-cybersecurity

 

OR

 

http://tinyurl.com/o8yzyxd

 

By the authority vested in me as President by the Constitution and the laws of the United States of America, it is hereby ordered as follows:

 

Section 1. Policy. Repeated cyber intrusions into critical infrastructure demonstrate the need for improved cybersecurity. The cyber threat to critical infrastructure continues to grow and represents one of the most serious national security challenges we must confront. The national and economic security of the United States depends on the reliable functioning of the Nation’s critical infrastructure in the face of such threats. It is the policy of the United States to enhance the security and resilience of the Nation’s critical infrastructure and to maintain a cyber environment that encourages efficiency, innovation, and economic prosperity while promoting safety, security, business confidentiality, privacy, and civil liberties. We can achieve these goals through a partnership with the owners and operators of critical infrastructure to improve cybersecurity information sharing and collaboratively develop and implement risk-based standards.

 

Sec. 2. Critical Infrastructure. As used in this order, the term critical infrastructure means systems and assets, whether physical or virtual, so vital to the United States that the incapacity or destruction of such systems and assets would have a debilitating impact on security, national economic security, national public health or safety, or any combination of those matters.

 

Sec. 3. Policy Coordination. Policy coordination, guidance, dispute resolution, and periodic in-progress reviews for the functions and programs described and assigned herein shall be provided through the interagency process established in Presidential Policy Directive-1 of February 13, 2009 (Organization of the National Security Council System), or any successor.

 

Sec. 4. Cybersecurity Information Sharing. (a) It is the policy of the United States Government to increase the volume, timeliness, and quality of cyber threat information shared with U.S. private sector entities so that these entities may better protect and defend themselves against cyber threats. Within 120 days of the date of this order, the Attorney General, the Secretary of Homeland Security (the “Secretary”), and the Director of National Intelligence shall each issue instructions consistent with their authorities and with the requirements of section 12(c) of this order to ensure the timely production of unclassified reports of cyber threats to the U.S. homeland that identify a specific targeted entity. The instructions shall address the need to protect intelligence and law enforcement sources, methods, operations, and investigations.

 

(b) The Secretary and the Attorney General, in coordination with the Director of National Intelligence, shall establish a process that rapidly disseminates the reports produced pursuant to section 4(a) of this order to the targeted entity. Such process shall also, consistent with the need to protect national security information, include the dissemination of classified reports to critical infrastructure entities authorized to receive them. The Secretary and the Attorney General, in coordination with the Director of National Intelligence, shall establish a system for tracking the production, dissemination, and disposition of these reports.

 

(c) To assist the owners and operators of critical infrastructure in protecting their systems from unauthorized access, exploitation, or harm, the Secretary, consistent with 6 U.S.C. 143 and in collaboration with the Secretary of Defense, shall, within 120 days of the date of this order, establish procedures to expand the Enhanced Cybersecurity Services program to all critical infrastructure sectors. This voluntary information sharing program will provide classified cyber threat and technical information from the Government to eligible critical infrastructure companies or commercial service providers that offer security services to critical infrastructure.

 

(d) The Secretary, as the Executive Agent for the Classified National Security Information Program created under Executive Order 13549 of August 18, 2010 (Classified National Security Information Program for State, Local, Tribal, and Private Sector Entities), shall expedite the processing of security clearances to appropriate personnel employed by critical infrastructure owners and operators, prioritizing the critical infrastructure identified in section 9 of this order.

 

(e) In order to maximize the utility of cyber threat information sharing with the private sector, the Secretary shall expand the use of programs that bring private sector subject-matter experts into Federal service on a temporary basis. These subject matter experts should provide advice regarding the content, structure, and types of information most useful to critical infrastructure owners and operators in reducing and mitigating cyber risks.

 

Sec. 5. Privacy and Civil Liberties Protections. (a) Agencies shall coordinate their activities under this order with their senior agency officials for privacy and civil liberties and ensure that privacy and civil liberties protections are incorporated into such activities. Such protections shall be based upon the Fair Information Practice Principles and other privacy and civil liberties policies, principles, and frameworks as they apply to each agency’s activities.

 

(b) The Chief Privacy Officer and the Officer for Civil Rights and Civil Liberties of the Department of Homeland Security (DHS) shall assess the privacy and civil liberties risks of the functions and programs undertaken by DHS as called for in this order and shall recommend to the Secretary ways to minimize or mitigate such risks, in a publicly available report, to be released within 1 year of the date of this order. Senior agency privacy and civil liberties officials for other agencies engaged in activities under this order shall conduct assessments of their agency activities and provide those assessments to DHS for consideration and inclusion in the report. The report shall be reviewed on an annual basis and revised as necessary. The report may contain a classified annex if necessary. Assessments shall include evaluation of activities against the Fair Information Practice Principles and other applicable privacy and civil liberties policies, principles, and frameworks. Agencies shall consider the assessments and recommendations of the report in implementing privacy and civil liberties protections for agency activities.

 

(c) In producing the report required under subsection (b) of this section, the Chief Privacy Officer and the Officer for Civil Rights and Civil Liberties of DHS shall consult with the Privacy and Civil Liberties Oversight Board and coordinate with the Office of Management and Budget (OMB).

 

(d) Information submitted voluntarily in accordance with 6 U.S.C. 133 by private entities under this order shall be protected from disclosure to the fullest extent permitted by law.

 

Sec. 6. Consultative Process. The Secretary shall establish a consultative process to coordinate improvements to the cybersecurity of critical infrastructure. As part of the consultative process, the Secretary shall engage and consider the advice, on matters set forth in this order, of the Critical Infrastructure Partnership Advisory Council; Sector Coordinating Councils; critical infrastructure owners and operators; Sector-Specific Agencies; other relevant agencies; independent regulatory agencies; State, local, territorial, and tribal governments; universities; and outside experts.

 

Sec. 7. Baseline Framework to Reduce Cyber Risk to Critical Infrastructure. (a) The Secretary of Commerce shall direct the Director of the National Institute of Standards and Technology (the “Director”) to lead the development of a framework to reduce cyber risks to critical infrastructure (the “Cybersecurity Framework”). The Cybersecurity Framework shall include a set of standards, methodologies, procedures, and processes that align policy, business, and technological approaches to address cyber risks. The Cybersecurity Framework shall incorporate voluntary consensus standards and industry best practices to the fullest extent possible. The Cybersecurity Framework shall be consistent with voluntary international standards when such international standards will advance the objectives of this order, and shall meet the requirements of the National Institute of Standards and Technology Act, as amended (15 U.S.C. 271 et seq.), the National Technology Transfer and Advancement Act of 1995 (Public Law 104-113), and OMB Circular A-119, as revised.

 

(b) The Cybersecurity Framework shall provide a prioritized, flexible, repeatable, performance-based, and cost-effective approach, including information security measures and controls, to help owners and operators of critical infrastructure identify, assess, and manage cyber risk. The Cybersecurity Framework shall focus on identifying cross-sector security standards and guidelines applicable to critical infrastructure. The Cybersecurity Framework will also identify areas for improvement that should be addressed through future collaboration with particular sectors and standards-developing organizations. To enable technical innovation and account for organizational differences, the Cybersecurity Framework will provide guidance that is technology neutral and that enables critical infrastructure sectors to benefit from a competitive market for products and services that meet the standards, methodologies, procedures, and processes developed to address cyber risks. The Cybersecurity Framework shall include guidance for measuring the performance of an entity in implementing the Cybersecurity Framework.

 

(c) The Cybersecurity Framework shall include methodologies to identify and mitigate impacts of the Cybersecurity Framework and associated information security measures or controls on business confidentiality, and to protect individual privacy and civil liberties.

 

(d) In developing the Cybersecurity Framework, the Director shall engage in an open public review and comment process. The Director shall also consult with the Secretary, the National Security Agency, Sector-Specific Agencies and other interested agencies including OMB, owners and operators of critical infrastructure, and other stakeholders through the consultative process established in section 6 of this order. The Secretary, the Director of National Intelligence, and the heads of other relevant agencies shall provide threat and vulnerability information and technical expertise to inform the development of the Cybersecurity Framework. The Secretary shall provide performance goals for the Cybersecurity Framework informed by work under section 9 of this order.

 

(e) Within 240 days of the date of this order, the Director shall publish a preliminary version of the Cybersecurity Framework (the “preliminary Framework”). Within 1 year of the date of this order, and after coordination with the Secretary to ensure suitability under section 8 of this order, the Director shall publish a final version of the Cybersecurity Framework (the “final Framework”).

 

(f) Consistent with statutory responsibilities, the Director will ensure the Cybersecurity Framework and related guidance is reviewed and updated as necessary, taking into consideration technological changes, changes in cyber risks, operational feedback from owners and operators of critical infrastructure, experience from the implementation of section 8 of this order, and any other relevant factors.

 

Sec. 8. Voluntary Critical Infrastructure Cybersecurity Program. (a) The Secretary, in coordination with Sector-Specific Agencies, shall establish a voluntary program to support the adoption of the Cybersecurity Framework by owners and operators of critical infrastructure and any other interested entities (the “Program”).

 

(b) Sector-Specific Agencies, in consultation with the Secretary and other interested agencies, shall coordinate with the Sector Coordinating Councils to review the Cybersecurity Framework and, if necessary, develop implementation guidance or supplemental materials to address sector-specific risks and operating environments.

 

(c) Sector-Specific Agencies shall report annually to the President, through the Secretary, on the extent to which owners and operators notified under section 9 of this order are participating in the Program.

 

(d) The Secretary shall coordinate establishment of a set of incentives designed to promote participation in the Program. Within 120 days of the date of this order, the Secretary and the Secretaries of the Treasury and Commerce each shall make recommendations separately to the President, through the Assistant to the President for Homeland Security and Counterterrorism and the Assistant to the President for Economic Affairs, that shall include analysis of the benefits and relative effectiveness of such incentives, and whether the incentives would require legislation or can be provided under existing law and authorities to participants in the Program.

 

(e) Within 120 days of the date of this order, the Secretary of Defense and the Administrator of General Services, in consultation with the Secretary and the Federal Acquisition Regulatory Council, shall make recommendations to the President, through the Assistant to the President for Homeland Security and Counterterrorism and the Assistant to the President for Economic Affairs, on the feasibility, security benefits, and relative merits of incorporating security standards into acquisition planning and contract administration. The report shall address what steps can be taken to harmonize and make consistent existing procurement requirements related to cybersecurity.

 

Sec. 9. Identification of Critical Infrastructure at Greatest Risk. (a) Within 150 days of the date of this order, the Secretary shall use a risk-based approach to identify critical infrastructure where a cybersecurity incident could reasonably result in catastrophic regional or national effects on public health or safety, economic security, or national security. In identifying critical infrastructure for this purpose, the Secretary shall use the consultative process established in section 6 of this order and draw upon the expertise of Sector-Specific Agencies. The Secretary shall apply consistent, objective criteria in identifying such critical infrastructure. The Secretary shall not identify any commercial information technology products or consumer information technology services under this section. The Secretary shall review and update the list of identified critical infrastructure under this section on an annual basis, and provide such list to the President, through the Assistant to the President for Homeland Security and Counterterrorism and the Assistant to the President for Economic Affairs.

 

(b) Heads of Sector-Specific Agencies and other relevant agencies shall provide the Secretary with information necessary to carry out the responsibilities under this section. The Secretary shall develop a process for other relevant stakeholders to submit information to assist in making the identifications required in subsection (a) of this section.

 

(c) The Secretary, in coordination with Sector-Specific Agencies, shall confidentially notify owners and operators of critical infrastructure identified under subsection (a) of this section that they have been so identified, and ensure identified owners and operators are provided the basis for the determination. The Secretary shall establish a process through which owners and operators of critical infrastructure may submit relevant information and request reconsideration of identifications under subsection (a) of this section.

 

Sec. 10. Adoption of Framework. (a) Agencies with responsibility for regulating the security of critical infrastructure shall engage in a consultative process with DHS, OMB, and the National Security Staff to review the preliminary Cybersecurity Framework and determine if current cybersecurity regulatory requirements are sufficient given current and projected risks. In making such determination, these agencies shall consider the identification of critical infrastructure required under section 9 of this order. Within 90 days of the publication of the preliminary Framework, these agencies shall submit a report to the President, through the Assistant to the President for Homeland Security and Counterterrorism, the Director of OMB, and the Assistant to the President for Economic Affairs, that states whether or not the agency has clear authority to establish requirements based upon the Cybersecurity Framework to sufficiently address current and projected cyber risks to critical infrastructure, the existing authorities identified, and any additional authority required.

 

(b) If current regulatory requirements are deemed to be insufficient, within 90 days of publication of the final Framework, agencies identified in subsection (a) of this section shall propose prioritized, risk-based, efficient, and coordinated actions, consistent with Executive Order 12866 of September 30, 1993 (Regulatory Planning and Review), Executive Order 13563 of January 18, 2011 (Improving Regulation and Regulatory Review), and Executive Order 13609 of May 1, 2012 (Promoting International Regulatory Cooperation), to mitigate cyber risk.

 

(c) Within 2 years after publication of the final Framework, consistent with Executive Order 13563 and Executive Order 13610 of May 10, 2012 (Identifying and Reducing Regulatory Burdens), agencies identified in subsection (a) of this section shall, in consultation with owners and operators of critical infrastructure, report to OMB on any critical infrastructure subject to ineffective, conflicting, or excessively burdensome cybersecurity requirements. This report shall describe efforts made by agencies, and make recommendations for further actions, to minimize or eliminate such requirements.

 

(d) The Secretary shall coordinate the provision of technical assistance to agencies identified in subsection (a) of this section on the development of their cybersecurity workforce and programs.

 

(e) Independent regulatory agencies with responsibility for regulating the security of critical infrastructure are encouraged to engage in a consultative process with the Secretary, relevant Sector-Specific Agencies, and other affected parties to consider prioritized actions to mitigate cyber risks for critical infrastructure consistent with their authorities.

 

Sec. 11. Definitions. (a) “Agency” means any authority of the United States that is an “agency” under 44 U.S.C. 3502(1), other than those considered to be independent regulatory agencies, as defined in 44 U.S.C. 3502(5).

 

(b) “Critical Infrastructure Partnership Advisory Council” means the council established by DHS under 6 U.S.C. 451 to facilitate effective interaction and coordination of critical infrastructure protection activities among the Federal Government; the private sector; and State, local, territorial, and tribal governments.

 

(c) “Fair Information Practice Principles” means the eight principles set forth in Appendix A of the National Strategy for Trusted Identities in Cyberspace.

 

(d) “Independent regulatory agency” has the meaning given the term in 44 U.S.C. 3502(5).

 

(e) “Sector Coordinating Council” means a private sector coordinating council composed of representatives of owners and operators within a particular sector of critical infrastructure established by the National Infrastructure Protection Plan or any successor.

 

(f) “Sector-Specific Agency” has the meaning given the term in Presidential Policy Directive-21 of February 12, 2013 (Critical Infrastructure Security and Resilience), or any successor.

 

Sec. 12. General Provisions. (a) This order shall be implemented consistent with applicable law and subject to the availability of appropriations. Nothing in this order shall be construed to provide an agency with authority for regulating the security of critical infrastructure in addition to or to a greater extent than the authority the agency has under existing law. Nothing in this order shall be construed to alter or limit any authority or responsibility of an agency under existing law.

 

(b) Nothing in this order shall be construed to impair or otherwise affect the functions of the Director of OMB relating to budgetary, administrative, or legislative proposals.

 

(c) All actions taken pursuant to this order shall be consistent with requirements and authorities to protect intelligence and law enforcement sources and methods. Nothing in this order shall be interpreted to supersede measures established under authority of law to protect the security and integrity of specific activities and associations that are in direct support of intelligence and law enforcement operations.

 

(d) This order shall be implemented consistent with U.S. international obligations.

 

(e) This order is not intended to, and does not, create any right or benefit, substantive or procedural, enforceable at law or in equity by any party against the United States, its departments, agencies, or entities, its officers, employees, or agents, or any other person.

 

BARACK OBAMA

 

.

 

.

 

 

Cybercrime, media and insecurity:

The shaping of public perceptions of cybercrime1

Author: Wall*, David S. View Author Profile

Journal: International review of law, computers & technology

ISSN: 1360-0869

Date: 07/2008

Volume: 22 Issue: 1-2 Page: 45-63

DOI: 10.1080/13600860801924907

 

http://tinyurl.com/hd732fk

 

.

 

Burstein, A. J.

(2008).

Conducting Cybersecurity Research Legally and Ethically.

LEET, 8, 1-8.

 

http://tinyurl.com/jskqjr2

 

.

 

Moore, T.

(2010).

The economics of cybersecurity: principles and policy options.

International Journal of Critical infrastructure Protection, 3(3), 103-117.

 

http://tinyurl.com/zaver45

 

.

 

Brito, J., and Watkins, T.

(2011).

Loving the Cyber Bomb-The Dangers of Threat Inflation in Cybersecurity Policy.

Harv. Nat’l Sec. J., 3, 39.

 

http://tinyurl.com/h3hakxa

 

.

 

Thierer, A. D.

(2013).

Technopanics, threat inflation, and the danger of

an information technology precautionary principle.

Minnesota Journal of Law, Science and Technology, 14(1), 12-09.

 

http://tinyurl.com/z87xk7h

 

.

 

Yan, C.

(2011, October).

Cybercrime forensic system in cloud computing.

In Image Analysis and Signal Processing (IASP),

2011 International Conference on (pp. 612-615). IEEE.

 

http://tinyurl.com/h96fh58

 

.

 

The need for a national cybersecurity research and development agenda

Author: Maughan, Douglas

Journal: Communications of the ACM

ISSN: 0001-0782

Date: 02/2010

Volume: 53 Issue: 2 Page: 29

DOI: 10.1145/1646353.1646365

 

http://tinyurl.com/z57wxtz

 

.

 

The need for a national cybersecurity research and development agenda

Author: Maughan, Douglas

Journal: Communications of the ACM

ISSN: 0001-0782

Date: 02/2010

Volume: 53 Issue: 2 Page: 29

DOI: 10.1145/1646353.1646365

 

http://tinyurl.com/z57wxtz

 

.

 

Lachow, I.

(2009).

Cyber terrorism: Menace or myth.

Cyberpower and national security, 434-467.

 

http://tinyurl.com/zecdyjw

 

.

 

Holt, T. J.

(2012).

Exploring the intersections of technology, crime, and terror.

Terrorism and Political Violence, 24(2), 337-354.

 

http://tinyurl.com/zuvqwgk

 

.

 

Nojeim, G. T.

(2010).

Cybersecurity and Freedom on the Internet.

J. Nat’l Sec. L. and Pol’y, 4, 119.

 

http://tinyurl.com/zezsdlt

 

.

 

Decision support for Cybersecurity risk planning

Author: Rees, Loren Paul View Author Profile

Journal: Decision Support Systems

Date: 06/2011

 Volume: 51   Issue: 3   Page: 493-505

DOI: 10.1016/j.dss.2011.02.013

 

http://tinyurl.com/z8zfzhf

 

.

 

The Seven Scam Types: Mapping the Terrain of Cybercrime

Author: Stabek, Amber

Book: Cybercrime and Trustworthy Computing Workshop (CTC),

2010 Second

ISBN: 1-4244-8054-X, 978-1-4244-8054-8

Date: 07/2010

Page: 41-51

DOI: 10.1109/CTC.2010.14

 

http://tinyurl.com/zkmqlt5

 

.

 

.

 

WEBBIB1516

 

http://tinyurl.com/q8tavoy

 

.

 

.

 

Sincerely,

David Dillard

Temple University

(215) 204 – 4584

jwne@temple.edu

http://workface.com/e/daviddillard

Net-Gold

http://groups.yahoo.com/group/net-gold

http://listserv.temple.edu/archives/net-gold.html

https://groups.io/org/groupsio/Net-Gold/archives

http://net-gold.3172864.n2.nabble.com/

General Internet & Print Resources

http://tinyurl.com/pwyg37u

COUNTRIES

http://tinyurl.com/p7s2z4u

EMPLOYMENT

http://tinyurl.com/oxa9w52

TOURISM

http://tinyurl.com/pnla2o9

DISABILITIES

http://tinyurl.com/pl7gorq

INDOOR GARDENING

https://groups.yahoo.com/neo/groups/IndoorGardeningUrban/info

Educator-Gold

http://groups.yahoo.com/group/Educator-Gold/

K12ADMINLIFE

http://groups.yahoo.com/group/K12AdminLIFE/

The Russell Conwell Learning Center Research Guide:

THE COLLEGE LEARNING CENTER

http://tinyurl.com/obcj6rf

Information Literacy

http://tinyurl.com/78a4shn

Research Guides

https://sites.google.com/site/researchguidesonsites/

Nina Dillard’s Photographs on Net-Gold

http://tinyurl.com/36qd2o

and also at

http://www.flickr.com/photos/neemers/

Twitter: davidpdillard

Temple University Site Map

https://sites.google.com/site/templeunivsitemap/home

Bushell, R. & Sheldon, P. (eds),

Wellness and Tourism: Mind, Body, Spirit,

Place, New York: Cognizant Communication Books.

Wellness Tourism: Bibliographic and Webliographic Essay

David P. Dillard

http://tinyurl.com/p63whl

RailTram Discussion Group

From the Union Pacific to BritRail and Beyond

https://groups.yahoo.com/neo/groups/railtram/info  

INDOOR GARDENING

Improve Your Chances for Indoor Gardening Success

https://groups.yahoo.com/neo/groups/IndoorGardeningUrban/info

SPORT-MED

https://www.jiscmail.ac.uk/lists/sport-med.html

http://groups.yahoo.com/group/sports-med/

http://listserv.temple.edu/archives/sport-med.html

HEALTH DIET FITNESS RECREATION SPORTS TOURISM

https://groups.yahoo.com/neo/groups/healthrecsport/info

http://listserv.temple.edu/archives/health-recreation-sports-tourism.html

.

.

Please Ignore All Links to JIGLU

in search results for Net-Gold and related lists.

The Net-Gold relationship with JIGLU has

been terminated by JIGLU and these are dead links.

http://groups.yahoo.com/group/Net-Gold/message/30664

http://health.groups.yahoo.com/group/healthrecsport/message/145

Temple University Listserv Alert :

Years 2009 and 2010 Eliminated from Archives

https://sites.google.com/site/templeuniversitylistservalert/

.

.

.
_._,_._,_

.

.

 

.

 

Groups.io Links:

You receive all messages sent to this group.

View This Message (#3827)

 

 

.

 

 

.

 

 

 

[Tourism] Re: WRITING AND WRITERS: CREDIBLE SOURCES : REFERENCE TOOLS: ENCYCLOPEDIAS: WIKIPEDIA : RESEARCH SKILLS: Scholarly Research and Applications of the Wikipedia Metropolitan Destinations That Straddle International Borders : “Albeit Wikipedia”

 

.

.

WRITING AND WRITERS: CREDIBLE SOURCES :

REFERENCE TOOLS: ENCYCLOPEDIAS:

WIKIPEDIA :

RESEARCH SKILLS:

Scholarly Research and Applications of the Wikipedia
RE: Metropolitan Destinations That Straddle International Borders : “Albeit Wikipedia”

PUBLIC LINK TO THIS BLOG POST

https://netgoldblog.wordpress.com/2016/03/12/tourism-re-writing-and-writers-credible-sources-reference-tools-encyclopedias-wikipedia-research-skills-scholarly-research-and-applications-of-the-wikipedia-metropolitan-destinations-that-s/

OR

http://tinyurl.com/hd2bmft

On a tourism discussion group the question below was asked and an excellent response provided perhaps the only source out there with an answer, perhaps there are other sources of this information, perhaps not.
The key fact is that an apology of sorts was needed for this information as the answer provided came from the black sheep of academic knowledge in the minds of many academicians. DO NOT USE THE WIKIPEDIA AS A SOURCE IN YOUR PAPERS.  Really?

The Question

“I am looking for examples of major urban destinations that straddle a national boundary.  In North America, Niagara Falls is an illustration.  Are there other examples of significant bi-national (border-crossing) destinations?”

Answer Source: Wikipedia

https://en.wikipedia.org/wiki/
List_of_metropolitan_areas_that_overlap_multiple_countries

OR

http://tinyurl.com/z7tkfe6

.

.

First of all, the question is a most interesting one and I am glad a good answer was found.  It is no surprise that the Wikipedia was the source of this answer.  The Wikipedia also suggests vocabulary that could be used in a search for this type of information with the phrase “multiple countries”.

(“tourist sites” OR “tourist attractions” OR “tourist attraction” OR “tourist destination”) AND (“shared site”) AND (“two countries” OR “dual countries” OR “multiple countries”)

A search of Google Books with that search strategy produces limited results and offers at the end a link to get omitted results which finds 42 items.  The relevance of all is poor it would appear scanning titles, the closest that I found in looking was about water management by two countries in Yellowstone Park

Connecting Place to Practice – Park Planning and Policy Lab.
www.parklab.uiuc.edu/Connecting%20Place%20to%20Practice%20DRAFT...
The two countries cooperate to manage these waters jointly and protect them for future generations. …… river with Yellowstone National Park, texts centered on the Park as a tourist destination are …. Competing perspectives of a shared site.

http://www.parklab.uiuc.edu/Connecting%20Place%20to%20Practice%20DRAFT.pdf

“albeit Wikipedia”

This is a very mild statement of a much stronger edict heard from high school teachers and from college professors frequently. I am not advocating that tourism faculty change this rule for their students, I have actually encountered quite a few teachers at college who do not want any encyclopedia cited in student research papers despite the embarrassment of riches of scholarly subject specific encyclopedias in many subject fields.

http://tinyurl.com/hucsczo

https://www.google.com/search?tbm=bks&q=encyclopedia+OR+encyclopedias

OR

http://tinyurl.com/z69s42a

OR consider this link from Google Books

(encyclopedia OR encyclopedias) AND (tourism OR tourist OR tourists OR hospitality OR geography OR places OR countries OR country)

http://tinyurl.com/zqewdas

In all of these encyclopedias in Google Books, no such list of multiple country tourist sites was found with the search of Google Books by the strategy cited above.

Encyclopedias and the use of Google searches are the way in which the general public and also academicians gain a basic understanding or starting point for learning about an unfamiliar topic. The Wikipedia is probably the leading encyclopedia for this learning.  Would student learning through research assignments be improved in the area of critical thinking and critical evaluation of sources if instead of banning the Wikipedia, citing Wikipedia articles came with the requirement of comparing the articles content and value with other encyclopedia articles or with the other sources cited in the research paper?

Actually, it may come as a surprise that the Wikipedia has been the subject or part of the topic of academic research quite extensively.

Google Scholar

https://scholar.google.com/scholar?hl=en&q=
wikipedia&btnG=&as_sdt=1%2C39&as_sdtp=

OR

http://tinyurl.com/zfba43g

Google Scholar Again

wikipedia AND (“digital humanities” OR “digital initiatives” OR “digital scholarship” OR “research projects” OR “scholarly research”)

http://tinyurl.com/jcxallq

.

Google Books

https://www.google.com/search?tbm=bks&q=wikipedia

Google Books Again

https://www.google.com/search?tbm=bks&q=wikipedia+AND+
%28%22digital+humanities%22+OR+%22digital+initiatives%22+
OR+%22digital+++scholarship%22+OR+%22research+projects%22+
OR+%22scholarly+research%22%29

OR

http://tinyurl.com/jp6gqxh

.

Google Domain Limited Web Search (JSTOR)

http://tinyurl.com/gqdpmta

.

Google Domain Limited Web Search (BLOGS)

https://www.google.com/#q=WIKIPEDIA+AND+SITE:+BLOGS&start=0

.

Google Domain Limited Web Search (GOV)

https://www.google.com/#q=WIKIPEDIA+AND+SITE:+GOV&start=0

.

Google Domain Limited Web Search (ORG)

https://www.google.com/#q=WIKIPEDIA+AND+SITE:+ORG&start=0

Finds among much else

Wiki Education Foundation

https://wikiedu.org/

“The Wiki Education Foundation connects higher education resources in the USA and Canada to the publishing power of Wikipedia. We cultivate learning that enriches Wikipedia and universities, creating a world where any learner can contribute to open scholarship and education for all. We change the lives of students by helping students change the world.

We engage students in solving real-world problems.
Rather than writing a term paper that ends up in a drawer, students contribute to a knowledge base the world uses every day. Its service learning with a lasting impact.

We expand access to university resources.
We believe that access to information is a human right. But large amounts of information are still bottled up. We open access to that knowledge by connecting universities, classrooms, and libraries to Wikipedia.”

.

Google Domain Limited Web Search (EDU)

https://www.google.com/#q=WIKIPEDIA+AND+SITE:+EDU

Leads to this sampling of sources in the search results:

Use Wikipedia Effectively for Research

Should you use Wikipedia as a credible resource

Wiki Workshop 2016 – SNAP – Stanford University

The Wikipedia Corpus – Brigham Young University

Gould Library: Using Wikipedia | Carleton College

How today’s college students use Wikipedia for course-related

Wiki vs. Blog | The College of Wooster

Wikilinks – Information Extraction and Synthesis Laboratory

Guide to Writing for Wikipedia

[PDF] Wikis in Higher Education – University of Delaware

The Authority of Wikipedia – Jean Goodwin – Iowa State …

Note regarding the use of Wikipedia on this site

Can Wikipedia Be Trusted?

From Wikipedia to the Classroom – College of Computing

Can History be Open Source? Wikipedia and the Future of the Past
Roy Rosenzweig
This article was originally published in The Journal of American History Volume 93, Number 1 (June, 2006): 117-46 and is reprinted here with permission.

http://chnm.gmu.edu/essays-on-history-new-media/essays/?essayid=42

.

Google Domain Limited Web Search (SCIENCEDIRECT)

https://www.google.com/#q=WIKIPEDIA+AND+SITE:+SCIENCEDIRECT&start=0

.

Google Domain Limited Web Search (PUBMED)

https://www.google.com/#q=WIKIPEDIA+AND+SITE:+PUBMED

.

.

Temple Summon Search

http://tinyurl.com/jqjo8zr

285,338 results

SOURCE TYPE  Sort Order

Archival Material (49)
Art (1)
Article (2)
Audio Recording (1,012)
Book / eBook (39,619)
Book Chapter (17,900)
Book Review (3,900)
Conference Proceeding (17,743)
Data Set (19)
Database (1)
Dissertation (9,860)
Electronic Resource (184)
Government Document (321)
Image (25)
Journal / eJournal (5)
Journal Article (50,912)
Kit (1)
Magazine (9)
Magazine Article (14,093)
Manuscript (235)
Map (3)
Market Research (77)
Newsletter (4,395)
Newspaper (30)
Newspaper Article (123,176)
Pamphlet (3)
Paper (188)
Patent (1,555)
Photograph (25)
Poster (3)
Presentation (47)
Publication (150)
Reference (3,330)
Report (611)
Research Guide (1,542)
Slide (2)
Special Collection (6)
Standard (3)
Streaming Audio (6)
Streaming Video (92)
Student Thesis (42)
Technical Report (45)
Trade Publication Article (3,381)
Transcript (1,871)
Video Recording (122)
Web Resource (7,073)

Peer Reviewed Journal Articles

30,293 results

http://temple.summon.serialssolutions.com/search?s.q=wikipedia#!/
search?ho=f&fvf=ContentType,Journal%20Article,f%
7CIsPeerReviewed,true,f&l=en&q=wikipedia

OR

http://tinyurl.com/h97y4zl

.

Temple Summon Search Again

wikipedia AND (“digital humanities” OR “digital initiatives” OR “digital scholarship” OR “research projects” OR “scholarly research”)

http://tinyurl.com/zu7pkpg

Leads to this sampling of sources:

Digital Scholarship, Digital Humanities, Digital Initiatives and Innovation Centers Sources

Debates in the digital humanities

Digital Humanities Pedagogy: Practices, Principles and Politics

Defining digital humanities: a reader

Understanding digital humanities

The sum of all human knowledge: A systematic review of scholarly research on the content of Wikipedia

Common knowledge?: an ethnography of Wikipedia

Crowdsourcing Knowledge: Interdiscursive flows from Wikipedia into scholarly research

Wikipedia in the eyes of its beholders: A systematic review of scholarly research on Wikipedia readers and readership

.

Temple Summon Search : A Third Time

Limiting the search immediately above to sources with the word Wikipedia in the title in Peer Reviewed Journal Articles

36 results

http://tinyurl.com/j634bek

.

.

Finally, moving to the home ballpark, what is being said about the Wikipedia and the world of tourism?

.

Google Scholar

http://tinyurl.com/j6cxvds

.

Temple Summon Search

http://tinyurl.com/hbtl3l7

164,653 results

SOURCE TYPE

Archival Material (10)
Audio Recording (760)
Book / eBook (36,608)
Book Chapter (10,286)
Book Review (1,990)
Conference Proceeding (9,223)
Data Set (1)
Dissertation (7,866)
Electronic Resource (106)
Government Document (305)
Image (2)
Journal Article (32,352)
Magazine Article (7,577)
Map (2)
Market Research (71)
Newsletter (2,724)
Newspaper (30)
Newspaper Article (54,899)
Pamphlet (3)
Paper (99)
Patent (61)
Photograph (2)
Poster (1)
Presentation (6)
Publication (47)
Reference (2,477)
Report (372)
Research Guide (1,036)
Slide (1)
Special Collection (1)
Standard (2)
Streaming Audio (1)
Streaming Video (19)
Student Thesis (5)
Technical Report (5)
Trade Publication Article (1,662)
Transcript (1,505)
Video Recording (13)
Web Resource (2,304)

DISCIPLINE

agriculture (710)
anatomy & physiology (695)
anthropology (2,773)
applied sciences (942)
architecture (1,239)
astronomy & astrophysics (265)
biology (1,475)
botany (170)
business (10,373)
chemistry (811)
computer science (15,386)
dance (96)
dentistry (133)
diet & clinical nutrition (251)
drama (588)
ecology (662)
economics (6,750)
education (8,253)
engineering (13,945)
environmental sciences (884)
film (1,126)
forestry (87)
geography (1,749)
geology (528)
government (1,488)
history & archaeology (10,974)
international relations (1,096)
journalism & communications (2,486)
languages & literatures (5,504)
law (3,445)
library & information science (6,055)
mathematics (2,215)
medicine (4,474)
meteorology & climatology (196)
military & naval science (683)
music (1,751)
nursing (537)
occupational therapy & rehabilitation (71)
oceanography (109)
parapsychology & occult sciences (124)
pharmacy, therapeutics, & pharmacology (509)
philosophy (2,393)
physical therapy (95)
physics (1,347)
political science (4,431)
psychology (2,381)
public health (1,836)
recreation & sports (1,085)
religion (2,047)
sciences (1,830)
social sciences (4,189)
social welfare & social work (2,524)
sociology & social history (3,152)
statistics (723)
veterinary medicine (102)
visual arts (1,471)
women’s studies (1,000)
zoology (267)

Related Research Guides

TOURISM RESEARCH GUIDE
http://guides.temple.edu/tourism-guide

Digital Humanities and Digital Initiatives Sources
http://guides.temple.edu/digital-humanities

DISSERTATIONS: Finding and Writing Dissertations and Theses
http://guides.temple.edu/dissertations

Hospitality Lodging and Restaurants
http://guides.temple.edu/hospitality-guide

META ANALYSIS AND SYSTEMATIC REVIEW:
How to Create a Meta Analysis and a Systematic Review
http://guides.temple.edu/Meta-Analysis

RESEARCH PAPERS: How to Write a Research Paper
http://guides.temple.edu/research-papers

STATISTICS: Databases, Sources and Database Search Results for Statisitical Data Compilations and Publications
http://guides.temple.edu/statistics-sources

TOURISM GEOGRAPHY : Tourism Research Guide Series :
Geography’s Roles in Tourism, Hospitality and Event Management
http://guides.temple.edu/tourism-geography

The Wikipedia and the Academic Learning Environment http://tinyurl.com/hw2dbw2

There is a great deal to learn about and from the Wikipedia and increasingly with the passage of time it is no longer a source that faculty at high schools and colleges can brush of with a do not use warning label as there are oceans of knowledge to be gained by student evaluation of its content for its value, weaknesses and basic overviews of topics.

.

.

.

Sincerely,
David Dillard
Temple University
(215) 204 – 4584
jwne@temple.edu
http://workface.com/e/daviddillard

Net-Gold
https://groups.io/g/Net-Gold
http://groups.yahoo.com/group/net-gold
http://listserv.temple.edu/archives/net-gold.html
https://groups.io/org/groupsio/Net-Gold/archives
http://net-gold.3172864.n2.nabble.com/

Temple University and Google Sites Research Guides
AND Discussion Group Directory
http://tinyurl.com/ngda2hk

OR

https://sites.google.com/site/researchguidesonsites/

RESEARCH PAPER WRITING
http://guides.temple.edu/research-papers
EMPLOYMENT
http://guides.temple.edu/employment-guide
INTERNSHIPS
http://guides.temple.edu/employment-internships
HOSPITALITY
http://guides.temple.edu/hospitality-guide
DISABILITIES AND EMPLOYMENT
http://guides.temple.edu/c.php?g=134557
INDOOR GARDENING
https://groups.io/g/indoor-gardening
Educator-Gold
http://groups.yahoo.com/group/Educator-Gold/
K12ADMINLIFE
http://groups.yahoo.com/group/K12AdminLIFE/

PUBLIC HEALTH RESOURCES INCLUDING EBOLA
http://guides.temple.edu/public-health-guide

STATISTICS SOURCES RESEARCH GUIDE
http://guides.temple.edu/statistics-sources

Social Work and Social Issues Discussion Group
https://groups.io/g/social-work

Tourism Discussion Group
https://groups.io/g/Tourism

Digital Scholarship Discussion Group
https://groups.io/g/DigitalScholarship/threads
https://listserv.temple.edu/cgi-bin/wa?A0=DIGITAL-SCHOLARSHIP
https://groups.yahoo.com/neo/groups/digital-scholarship/info
https://digitalscholarshipandscholarlypublication.wordpress.com/

Copyright Research Guide
Copyright, Intellectual Property and Plagiarism Sources
http://guides.temple.edu/copyright-plagiarism
Fair Use
http://guides.temple.edu/fair-use

Blog
https://educatorgold.wordpress.com/

Articles by David Dillard
https://sites.google.com/site/daviddillardsarticles/

Information Literacy (Russell Conwell Guide)
http://tinyurl.com/78a4shn

Nina Dillard’s Photographs on Net-Gold
http://www.flickr.com/photos/neemers/

Twitter: davidpdillard

Temple University Site Map
https://sites.google.com/site/templeunivsitemap/home

Bushell, R. & Sheldon, P. (eds),
Wellness and Tourism: Mind, Body, Spirit,
Place, New York: Cognizant Communication Books.
Wellness Tourism: Bibliographic and Webliographic Essay
David P. Dillard
http://tinyurl.com/o4pn4o9

Rail Transportation
https://groups.io/org/groupsio/RailTransportation

INDOOR GARDENING
Improve Your Chances for Indoor Gardening Success
http://tech.groups.yahoo.com/group/IndoorGardeningUrban/

SPORT-MED
https://www.jiscmail.ac.uk/lists/sport-med.html
http://groups.yahoo.com/group/sports-med/
http://listserv.temple.edu/archives/sport-med.html

HEALTH DIET FITNESS RECREATION SPORTS TOURISM
https://groups.yahoo.com/neo/groups/healthrecsport/info
http://listserv.temple.edu/archives/health-recreation-sports-tourism.html

.

.

Please Ignore All Links to JIGLU
in search results for Net-Gold and related lists.
The Net-Gold relationship with JIGLU has
been terminated by JIGLU and these are dead links.
http://groups.yahoo.com/group/Net-Gold/message/30664
http://health.groups.yahoo.com/group/healthrecsport/message/145
Temple University Listserv Alert :
Years 2009 and 2010 Eliminated from Archives
https://sites.google.com/site/templeuniversitylistservalert/

.

.

.

-=-=-=-=-=-=-=-=-=-=-=-

.

.

.

Groups.io Links:

You receive all messages sent to this group.

View This Message (#109):

https://groups.io/g/Tourism/message/109

.

.

[SportMed] DATABASE SEARCH RESULTS : RESEARCH PAPERS : WRITING AND WRITERS: CITATION GENERATORS : RESEARCH GUIDES : HOW TO: Endnote Guides and Guidance from Database Search Results

 

.

.

DATABASE SEARCH RESULTS :

RESEARCH PAPERS :

WRITING AND WRITERS: CITATION GENERATORS :

RESEARCH GUIDES :

HOW TO:

Endnote Guides and Guidance from Database Search Results

.

.

Endnote Guides and Guidance from Database Search Results

.

.

.

Research Guide Directory :

Discussion Group Directory

https://sites.google.com/site/researchguidesonsites/
.
.

Google Web Search

http://tinyurl.com/h9cxdqw

.

Google Books

http://tinyurl.com/hpwwdou

.

Google Videos

http://tinyurl.com/jdsdrmj

.

Google Images

http://tinyurl.com/hnfe2kz

.

Google Domain Limited Web Search (BLOGS)

http://tinyurl.com/hpedm99

.

Temple Summon Search

http://tinyurl.com/jf7vgwl

196,622 results

SOURCE TYPE

Archival Material (11)

Audio Recording (7)

Book / eBook (57,021)

Book Chapter (5,600)

Book Review (18,468)

Conference Proceeding (543)

Dissertation (11,112)

Electronic Resource (27)

Exam (2)

Government Document (1,919)

Journal / eJournal (1)

Journal Article (78,340)

Magazine (1)

Magazine Article (11,617)

Manuscript (6)

Market Research (2)

Newsletter (743)

Newspaper (5)

Newspaper Article (7,395)

Paper (136)

Patent (2)

Poem (20)

Presentation (2)

Publication (1,230)

Publication Article (1)

Reference (1,263)

Report (2,216)

Research Guide (2,944)

Special Collection (1)

Standard (6)

Streaming Video (10)

Technical Report (3)

Trade Publication Article (1,783)

Transcript (130)

Video Recording (2)

Web Resource (2,059)

.

.

.

WEBBIB1516

http://tinyurl.com/q8tavoy

.

.

Sincerely,
David Dillard
Temple University
(215) 204 – 4584
jwne@temple.edu
http://workface.com/e/daviddillard

Net-Gold
https://groups.io/g/Net-Gold
http://groups.yahoo.com/group/net-gold
http://listserv.temple.edu/archives/net-gold.html
https://groups.io/org/groupsio/Net-Gold/archives
http://net-gold.3172864.n2.nabble.com/

Temple University and Google Sites Research Guides
AND Discussion Group Directory
http://tinyurl.com/ngda2hk

OR

https://sites.google.com/site/researchguidesonsites/

RESEARCH PAPER WRITING
http://guides.temple.edu/research-papers
EMPLOYMENT
http://guides.temple.edu/employment-guide
INTERNSHIPS
http://guides.temple.edu/employment-internships
HOSPITALITY
http://guides.temple.edu/hospitality-guide
DISABILITIES AND EMPLOYMENT
http://guides.temple.edu/c.php?g=134557
INDOOR GARDENING
https://groups.io/g/indoor-gardening
Educator-Gold
http://groups.yahoo.com/group/Educator-Gold/
K12ADMINLIFE
http://groups.yahoo.com/group/K12AdminLIFE/

PUBLIC HEALTH RESOURCES INCLUDING EBOLA
http://guides.temple.edu/public-health-guide

STATISTICS SOURCES RESEARCH GUIDE
http://guides.temple.edu/statistics-sources

Social Work and Social Issues Discussion Group
https://groups.io/g/social-work

Tourism Discussion Group
https://groups.io/g/Tourism

Digital Scholarship Discussion Group
https://groups.io/g/DigitalScholarship/threads
https://listserv.temple.edu/cgi-bin/wa?A0=DIGITAL-SCHOLARSHIP
https://groups.yahoo.com/neo/groups/digital-scholarship/info
https://digitalscholarshipandscholarlypublication.wordpress.com/

Copyright Research Guide
Copyright, Intellectual Property and Plagiarism Sources
http://guides.temple.edu/copyright-plagiarism
Fair Use
http://guides.temple.edu/fair-use

Blog
https://educatorgold.wordpress.com/

Articles by David Dillard
https://sites.google.com/site/daviddillardsarticles/

Information Literacy (Russell Conwell Guide)
http://tinyurl.com/78a4shn

Nina Dillard’s Photographs on Net-Gold
http://www.flickr.com/photos/neemers/

Twitter: davidpdillard

Temple University Site Map
https://sites.google.com/site/templeunivsitemap/home

Bushell, R. & Sheldon, P. (eds),
Wellness and Tourism: Mind, Body, Spirit,
Place, New York: Cognizant Communication Books.
Wellness Tourism: Bibliographic and Webliographic Essay
David P. Dillard
http://tinyurl.com/o4pn4o9

Rail Transportation
https://groups.io/org/groupsio/RailTransportation

INDOOR GARDENING
Improve Your Chances for Indoor Gardening Success
http://tech.groups.yahoo.com/group/IndoorGardeningUrban/

SPORT-MED
https://www.jiscmail.ac.uk/lists/sport-med.html
http://groups.yahoo.com/group/sports-med/
http://listserv.temple.edu/archives/sport-med.html

HEALTH DIET FITNESS RECREATION SPORTS TOURISM
https://groups.yahoo.com/neo/groups/healthrecsport/info
http://listserv.temple.edu/archives/health-recreation-sports-tourism.html

.

.

Please Ignore All Links to JIGLU
in search results for Net-Gold and related lists.
The Net-Gold relationship with JIGLU has
been terminated by JIGLU and these are dead links.
http://groups.yahoo.com/group/Net-Gold/message/30664
http://health.groups.yahoo.com/group/healthrecsport/message/145
Temple University Listserv Alert :
Years 2009 and 2010 Eliminated from Archives
https://sites.google.com/site/templeuniversitylistservalert/

.

.

.

-=-=-=-=-=-=-=-=-=-=-=-

.

.

.

 

Groups.io Links:

You receive all messages sent to this group.

View This Message (#268): https://groups.io/g/SportMed/message/268

 

.

 

.

 

 

 

 

[DigitalScholarship] PSYCHOLOGY : RESEARCH: DESIGN: FLAWS : STATISTICS : DATA : DATABASE SEARCH RESULTS: New Critique Sees Flaws in Landmark Analysis of Psychology Studies

 

.

.

PSYCHOLOGY :

RESEARCH: DESIGN: FLAWS:

STATISTICS :

DATA :

DATABASE SEARCH RESULTS:

New Critique Sees Flaws in Landmark Analysis of Psychology Studies

.

.

New Critique Sees Flaws in Landmark Analysis of Psychology Studies

By BENEDICT CAREY

MARCH 3, 2016

http://www.nytimes.com/2016/03/04/science/ psychology-replication-reproducibility-project.html

.

A shorter URL for the above link:

.

http://tinyurl.com/h3oo3mg

.

.

A landmark 2015 report that cast doubt on the results of dozens of published psychology studies has exposed deep divisions in the field, serving as a reality check for many working researchers but as an affront to others who continue to insist the original research was sound.

.

On Thursday, a group of four researchers publicly challenged the report, arguing that it was statistically flawed and, as a result, wrong.

.

The 2015 report, called the Reproducibility Project, found that less than 40 studies in a sample of 100 psychology papers in leading journals held up when retested by an independent team. The new critique by the four researchers countered that when that teams statistical methodology was adjusted, the rate was closer to 100 percent.

.

Neither the original analysis nor the critique found evidence of fraud or manipulation of data.

.

The critique was published in Science, the journal that published the original report. On Thursday, Science also published a strong rebuttal from the authors of the original replication project.

.

That study got so much press, and the wrong conclusions were drawn from it, said Timothy D. Wilson, a professor of psychology at the University of Virginia and an author of the new critique. Its a mistake to make generalizations from something that was done poorly, and this we think was done poorly.

.

Brian A. Nosek, a colleague of Dr. Wilsons at Virginia who coordinated the original replication project, which took several years, countered that the critique was highly biased: They are making assumptions based on selectively interpreting data and ignoring data thats antagonistic to their point of view.

.

The challenge comes as the field of psychology is facing a generational change, with young researchers beginning to share their data and study designs before publication, to improve transparency. Still, the new critique is likely to feed an already lively debate about how best to conduct and evaluate so-called replication projects of studies.

.

.

The complete article may be read at the URL above.

.

.

Comment on Estimating the reproducibility of psychological science
Daniel T. Gilbert1,*,, Gary King1, Stephen Pettigrew1, Timothy D. Wilson2
+ Author Affiliations
?*Corresponding author. E-mail: gilbert@wjh.harvard.edu
Science  04 Mar 2016:
Vol. 351, Issue 6277, pp. 1037
DOI: 10.1126/science.aad7243

http://science.sciencemag.org/content/351/6277/1037.2

.

Estimating the reproducibility of psychological science
Open Science Collaboration*,
+ Author Affiliations
Corresponding author. E-mail: nosek@virginia.edu
Science  28 Aug 2015:
Vol. 349, Issue 6251, pp.
DOI: 10.1126/science.aac4716
[Full Text]

http://science.sciencemag.org/content/349/6251/ aac4716.full?ijkey=1xgFoCnpLswpk&keytype=ref&siteid=sci

OR

http://tinyurl.com/zz2b2dl

.

CONCLUSION

No single indicator sufficiently describes replication success, and the five indicators examined here are not the only ways to evaluate reproducibility. Nonetheless, collectively these results offer a clear conclusion: A large portion of replications produced weaker evidence for the original findings despite using materials provided by the original authors, review in advance for methodological fidelity, and high statistical power to detect the original effect sizes. Moreover, correlational evidence is consistent with the conclusion that variation in the strength of initial evidence (such as original P value) was more predictive of replication success than variation in the characteristics of the teams conducting the research (such as experience and expertise). The latter factors certainly can influence replication success, but they did not appear to do so here.

.

Reproducibility is not well understood because the incentives for individual scientists prioritize novelty over replication. Innovation is the engine of discovery and is vital for a productive, effective scientific enterprise. However, innovative ideas become old news fast. Journal reviewers and editors may dismiss a new test of a published idea as unoriginal. The claim that we already know this belies the uncertainty of scientific evidence. Innovation points out paths that are possible; replication points out paths that are likely; progress relies on both. Replication can increase certainty when findings are reproduced and promote innovation when they are not. This project provides accumulating evidence for many findings in psychological research and suggests that there is still more work to do to verify whether we know what we think we know.

.

DATA COLADA
THINKING ABOUT EVIDENCE AND VICE VERSA

03.03.16
by Uri Simonsohn
[47] EVALUATING REPLICATIONS: 40% FULL ? 60% EMPTY

http://datacolada.org/2016/03/03/47/

.

Summary

.

1. Replications must be analyzed in ways that allow for results to be inconclusive, not just success/fail

.

2. Design differences between original and replication should be prominently disclosed.

.

.

Database Search Results

Google Domain Limited Web Search (BLOGS)

http://tinyurl.com/j7urc95

.

Google Domain Limited Web Search (NEWS)

http://tinyurl.com/zmeoe98

.

Google Videos

http://tinyurl.com/h9rohlq

.

Google Domain Limited Web Search (VIDEOS)

http://tinyurl.com/ze5sahh

.

Google Images

http://tinyurl.com/goueks9

.

Google Domain Limited Web Search (IMAGES)

http://tinyurl.com/hckfpe6

.

Google Domain Limited Web Search (PUBMED)

http://tinyurl.com/hxyvmcq

.

PUBMED

http://tinyurl.com/gvs5lqe

.

Google Domain Limited Web Search (GOV)

http://tinyurl.com/hd6e95d

.

.

WEBBIB1516

http://tinyurl.com/q8tavoy

.

.

Sincerely,
David Dillard
Temple University
(215) 204 – 4584
jwne@temple.edu
http://workface.com/e/daviddillard

Net-Gold
https://groups.io/g/Net-Gold
http://groups.yahoo.com/group/net-gold
http://listserv.temple.edu/archives/net-gold.html
https://groups.io/org/groupsio/Net-Gold/archives
http://net-gold.3172864.n2.nabble.com/

Temple University and Google Sites Research Guides
AND Discussion Group Directory
http://tinyurl.com/ngda2hk

OR

https://sites.google.com/site/researchguidesonsites/

RESEARCH PAPER WRITING
http://guides.temple.edu/research-papers
EMPLOYMENT
http://guides.temple.edu/employment-guide
INTERNSHIPS
http://guides.temple.edu/employment-internships
HOSPITALITY
http://guides.temple.edu/hospitality-guide
DISABILITIES AND EMPLOYMENT
http://guides.temple.edu/c.php?g=134557
INDOOR GARDENING
https://groups.io/g/indoor-gardening
Educator-Gold
http://groups.yahoo.com/group/Educator-Gold/
K12ADMINLIFE
http://groups.yahoo.com/group/K12AdminLIFE/

PUBLIC HEALTH RESOURCES INCLUDING EBOLA
http://guides.temple.edu/public-health-guide

STATISTICS SOURCES RESEARCH GUIDE
http://guides.temple.edu/statistics-sources

Social Work and Social Issues Discussion Group
https://groups.io/g/social-work

Tourism Discussion Group
https://groups.io/g/Tourism

Digital Scholarship Discussion Group
https://groups.io/g/DigitalScholarship/threads
https://listserv.temple.edu/cgi-bin/wa?A0=DIGITAL-SCHOLARSHIP
https://groups.yahoo.com/neo/groups/digital-scholarship/info
https://digitalscholarshipandscholarlypublication.wordpress.com/

Copyright Research Guide
Copyright, Intellectual Property and Plagiarism Sources
http://guides.temple.edu/copyright-plagiarism
Fair Use
http://guides.temple.edu/fair-use

Blog
https://educatorgold.wordpress.com/

Articles by David Dillard
https://sites.google.com/site/daviddillardsarticles/

Information Literacy (Russell Conwell Guide)
http://tinyurl.com/78a4shn

Nina Dillard’s Photographs on Net-Gold
http://www.flickr.com/photos/neemers/

Twitter: davidpdillard

Temple University Site Map
https://sites.google.com/site/templeunivsitemap/home

Bushell, R. & Sheldon, P. (eds),
Wellness and Tourism: Mind, Body, Spirit,
Place, New York: Cognizant Communication Books.
Wellness Tourism: Bibliographic and Webliographic Essay
David P. Dillard
http://tinyurl.com/o4pn4o9

Rail Transportation
https://groups.io/org/groupsio/RailTransportation

INDOOR GARDENING
Improve Your Chances for Indoor Gardening Success
http://tech.groups.yahoo.com/group/IndoorGardeningUrban/

SPORT-MED
https://www.jiscmail.ac.uk/lists/sport-med.html
http://groups.yahoo.com/group/sports-med/
http://listserv.temple.edu/archives/sport-med.html

HEALTH DIET FITNESS RECREATION SPORTS TOURISM
https://groups.yahoo.com/neo/groups/healthrecsport/info
http://listserv.temple.edu/archives/health-recreation-sports-tourism.html

.

.

Please Ignore All Links to JIGLU
in search results for Net-Gold and related lists.
The Net-Gold relationship with JIGLU has
been terminated by JIGLU and these are dead links.
http://groups.yahoo.com/group/Net-Gold/message/30664
http://health.groups.yahoo.com/group/healthrecsport/message/145
Temple University Listserv Alert :
Years 2009 and 2010 Eliminated from Archives
https://sites.google.com/site/templeuniversitylistservalert/

.

.

.

-=-=-=-=-=-=-=-=-=-=-=-

.

.

Groups.io Links:

You receive all messages sent to this group.

View This Message (#82): https://groups.io/g/DigitalScholarship/message/82

.

.

[Net-Gold] [webdev] Web Design Update: March 4, 2016

 

.

.

Date: Fri, 4 Mar 2016 06:03:50 -0600
From: Laura Carlson <lcarlson@d.umn.edu>
To: webdev <webdev@d.umn.edu>
Subject: [webdev] Web Design Update: March 4, 2016

+++ WEB DESIGN UPDATE.

– Volume 14, Issue 36, March 4, 2016.

An email newsletter to distribute news and information about web
design and development.

++ISSUE 36 CONTENTS.

SECTION ONE: New references.

What’s new at the Web Design Reference site?

http://www.d.umn.edu/itss/training/online/webdesign/

New links in these categories:

01: ACCESSIBILITY.

02: CASCADING STYLE SHEETS.

03: EVALUATION & TESTING.

04: EVENTS.

05: JAVASCRIPT.

06: TOOLS.

07: USABILITY.

SECTION TWO:

08: What Can You Find at the Web Design Reference Site?

[Contents ends.]

++ SECTION ONE: New references.

+01: ACCESSIBILITY.

Keyboard and Overflow

By Adrian Roselli.

“Imagine that as a user you regularly use the keyboard for
non-data-entry tasks. Think about how frustrating it is to have to
grab the mouse to hover over something on the screen just to see it.
Now imagine that you are a keyboard-only user…”

http://adrianroselli.com/2016/02/keyboard-and-overflow.html

YouTube’s Automatic Captions Prove Insufficient for ADA Compliance

By Courtney Duerig.

“…Since the intelligibility of captioning drops dramatically at even
a 2% error rate, most of the time YouTube’s computer generated
captions are incomprehensible…”

http://www.automaticsync.com/captionsync/youtube-automatic-captions/

How to Make Videos Accessible for Blind, Disabled Users

By Joseph C. Dolson.

“A video is a compelling option when you want to demonstrate a product
or show off its features. But a video can cause accessibility
challenges…”

http://www.practicalecommerce.com/articles/ 97439-How-to-Make-Videos-Accessible-for-Blind-Disabled-Users

What Will It Take to Move the Needle of Change?

By Cyndi Rowland.

“…For me, I think that if anyone is actually interested in
accessible content they will find the technical specifications that
already exist (i.e., WCAG 2.0, Section 508) and just get to work. So I
am left with thinking that after all this time and our collective
efforts we either don’t have the awareness, the motivation, the
support, or the oversight…”

http://webaim.org/blog/moving-the-needle-of-change/

Accessibility – Why I Got Into This and Why I’m Still Here

By Elle Waters.

“My manager asked me to make the company’s website accessible to
people with disabilities. And when I realized how artificial yet
systemic the barriers were that prevented this website from being
fully accessible, a lifetime accessibility zealot was born…”

http://simplyaccessible.com/article/why-i-got-into-this/

Why Accessibility is Key for Search and Visibility

By Rebecca Sentance.

“If you’re involved with SEO, you’ve no doubt thought about all sorts
of ways and means to boost your site in the search rankings. But if
your site isn’t web accessible, your efforts will be in vain for 1/5
of your potential visitors…”

https://searchenginewatch.com/2016/02/25/ why-accessibility-is-key-for-search-and-visibility/

Mobile Assistive Technology Gesture References

By Adrian Roselli.

“During a recent consultation on a mobile project, I broached the
topic of gestures that are used by assistive technology on various
devices…”

http://adrianroselli.com/2016/02/ mobile-assistive-technology-gesture-references.html

+02: CASCADING STYLE SHEETS.

Use Rems for Global Sizing, Use Ems for Local Sizing

By Richard Rutter.

“The web has always been a type-based medium. Cascading Style Sheets
joined HTML as a part of the web in 1996, and did so with typographic
foundations from their inception. The principal underpinning to those
foundations is the em unit…”

http://clagnut.com/blog/2384/

Sass – When To Use @mixin And When To Use @extend

By Steven Bradley.

“Mixins are ways to reuse styles across your project and their ability
to take arguments makes them very powerful and flexible…”

http://vanseodesign.com/css/sass-mixin-or-extend/

The Ultimate CSS Survey – Standards and Learning

By Louis Lazaris.

“…let’s look at some quick tidbits from part two, which focused on
CSS tools and workflow…”

http://www.sitepoint.com/the-ultimate-css-survey-standards-and-learning/

+03: EVALUATION & TESTING.

Are Focus Groups a Useful Research Technique in UX?

By Juliet Richardson.

“…Do focus groups work? In a word: no…There are many reasons, but
among the main factors contributing to the ineffectiveness of focus
groups are: Peer pressure…Lack of time…Unnatural
setting…Participants lie, albeit unintentionally…”

http://www.nomensa.com/blog/2016/ are-focus-groups-useful-research-technique-ux

Why Everyone Should do Usability Testing (Even You)

By Rian van der Merwe.

“…Usability testing is a very powerful (and shamefully underused)
user research methodology-when it is used correctly. In fact,
usability testing is probably the only method that can be relied on to
consistently produce measurable improvements to the usability of a
product…”

http://www.elezea.com/2016/02/why-everyone-should-do-usability-testing/

Using the Microsoft Desirability Toolkit to Test Visual Appeal

By Kate Meyer.

“Measure people’s attitudes toward a user interface by a controlled
vocabulary test: give users the list of product reaction words and
asks them to select those that best describe the design…”

https://www.nngroup.com/articles/microsoft-desirability-toolkit/

How to Handle Multiple Comparisons

By Jeff Sauro.

“…The danger of false positives applies to more than just blood work
and pet-scans; it applies to p-values used in data science and
customer experience research, too…”

http://www.measuringu.com/blog/multiple-comparisons.php

+04: EVENTS.

Making Media Accessible by Adding Captions and Audio Description
March 14, 2016.
Online
http://easi.cc/clinic.htm#march

Audio Description: The Visual Made Verbal
Online
March 15, 2016.
http://www.adasoutheast.org/eventscalendar.php?eventid=1102

Providing Accessible Media Using Able Player
March 15, 2016.
Online
http://easi.cc/clinic.htm#march

The Importance of User Testing for Accessibility
March 15, 2016.
Online
http://www.peatworks.org/content/webinars/2016/03/Knowbility

2016 Accessibility Conference
May 30-June 1, 2016.
Guelph, Ontario, Canada
http://accessconf.ca/

UX Week
August 9-12, 2016.
San Francisco, California, U.S.A.
http://uxweek.com/

BigDesign
September 8-10, 2016.
Addison, Texas, U.S.A.
http://bigdesignevents.com/conference/

+05: JAVASCRIPT.

Quick Tip – How to Create and Manipulate Arrays in JavaScript

By Stephen Chapman.

“The length property of Array objects is one that many who are
relatively new to JavaScript do not understand…”

http://www.sitepoint.com/ quick-tip-create-manipulate-arrays-in-javascript/

+06: TOOLS.

ARIA Label Bookmarklet

By Ted Drake.

“I love simple bookmarklets that visualize coding patterns. I was
working on a project today and wanted to verify that aria-labels were
sufficiently descriptive. So I put together this quick bookmarklet.”

http://www.last-child.com/aria-label-bookmarklet/

+07: USABILITY.

Infinite Scrolling, Pagination Or ‘Load More’ Buttons? Usability

Findings In eCommerce

By Christian Holst.

“We tested (among other things) these three design patterns for
loading products, both on desktop and mobile.”

https://www.smashingmagazine.com/2016/03/ pagination-infinite-scrolling-load-more-buttons/

Young Adults Appreciate Flat Design More than Their Parents

By Kate Meyer.

“18-to-25-year olds rated flat UIs as slightly more attractive than
older adults did. That increased aesthetic appeal may not be worth the
usability costs of flat design.”

https://www.nngroup.com/articles/young-adults-flat-design/

[Section one ends.]

++ SECTION TWO:

+08: What Can You Find at the Web Design Reference Site?

Accessibility Information.
http://www.d.umn.edu/itss/training/online/webdesign/accessibility.html

Association Information.
http://www.d.umn.edu/itss/training/online/webdesign/associations.html

Book Listings.
http://www.d.umn.edu/itss/training/online/webdesign/books.html

Cascading Style Sheets Information.
http://www.d.umn.edu/itss/training/online/webdesign/css.html

Color Information.
http://www.d.umn.edu/itss/training/online/webdesign/color.html

Drupal Information.
http://www.d.umn.edu/itss/training/online/webdesign/drupal.html

Evaluation & Testing Information.
http://www.d.umn.edu/itss/training/online/webdesign/testing.html

Event Information.
http://www.d.umn.edu/itss/training/online/webdesign/events.html

HTML Information.
http://www.d.umn.edu/itss/training/online/webdesign/html.html

Information Architecture Information.
http://www.d.umn.edu/itss/training/online/webdesign/architecture.html

JavaScript Information.
http://www.d.umn.edu/itss/training/online/webdesign/javascript.html

Miscellaneous Web Information.
http://www.d.umn.edu/itss/training/online/webdesign/misc.html

Navigation Information.
http://www.d.umn.edu/itss/training/online/webdesign/navigation.html

PHP Information.
http://www.d.umn.edu/itss/training/online/webdesign/php.html

Sites & Blogs Listing.
http://www.d.umn.edu/itss/training/online/webdesign/sites.html

Standards, Guidelines & Pattern Information.
http://www.d.umn.edu/itss/training/online/webdesign/standards.html

Tool Information.
http://www.d.umn.edu/itss/training/online/webdesign/tools.html

Typography Information.
http://www.d.umn.edu/itss/training/online/webdesign/type.html

Usability Information.
http://www.d.umn.edu/itss/training/online/webdesign/usability.html

XML Information.
http://www.d.umn.edu/itss/training/online/webdesign/xml.html

[Section two ends.]

++END NOTES.

+ SUBSCRIPTION INFO.

WEB DESIGN UPDATE is available by subscription. For information on how
to subscribe and unsubscribe please visit:

http://www.d.umn.edu/itss/training/online/webdesign/webdev_listserv.html

The Web Design Reference Site also has a RSS 2.0 feed for site updates.

+ TEXT EMAIL NEWSLETTER (TEN).

As a navigation aid for screen readers we do our best to conform to
the accessible Text Email Newsletter (TEN) guidelines.  Please let me
know if there is anything else we can do to make navigation easier.
For TEN guideline information please visit:

http://www.headstar.com/ten

+ SIGN OFF.

Until next time,

Laura L. Carlson

Information Technology Systems and Services

University of Minnesota Duluth

Duluth, MN U.S.A. 55812-3009

mailto:lcarlson@d.umn.edu

[Issue ends.]

.

.

-=-=-=-=-=-=-=-=-=-=-=-

.

.

Groups.io Links:

You receive all messages sent to this group.

View This Message (#3759):

https://groups.io/g/Net-Gold/message/3759

.

.