Library Activity 1
Scan Maximum body size ... and Komodo Dragons have a secret ..., and answer the questions about the two articles. NOTE: Put all answers for activities into a Word document.
1. For each article, which of the following seems to best describe the purpose of the article – a) to describe original research? Or b) to inform or add to someone’s understanding?
2. How/why would you use each article?
Library Activity 2
Click here for a group work area for the in-class activity.
https://docs.google.com/document/d/1Nq4vQbAfUJxgqSJ4FLF-LHpbrmLu_FD2ovdI3oZ5op4/edit?usp=sharing
Library Activity 3
Read article: Chasing the Magic Dragon and answer these questions.
1. Who is the most likely audience for this article - Scientists or general public?
2. What are the names of the researchers mentioned in the article?
3. How could you use this article to find more information on the topic?
Library Activity 4
For each of these items, determine whether the full article can be found (without payment) using Journal Finder or Google Scholar or both.
1. Gowtham, R., & Krishnamurthi, I. (2014). PhishTackle-a web services architecture for anti-phishing. Cluster Computing, 17(3), 1051-1068. doi:10.1007/s10586-013-0320-5
2.Sheng, S., Holbrook, M., Kumaraguru, P., Cranor, L., & Downs, J. (2010). Who falls for Phish?: A demographic analysis of phishing susceptibility and effectiveness of interventions. SIGCHI Conference on Human Factors in Computing Systems, 373-382. doi:10.1145/1753326.1753383
3. T. Churi, P. Sawardekar, A. Pardeshi and P. Vartak, "A secured methodology for anti-phishing," 2017 International Conference on Innovations in Information, Embedded and Communication Systems (ICIIECS), Coimbatore, 2017, pp. 1-4.
doi: 10.1109/ICIIECS.2017.8276081