1. Starting point
1.1. Iconography guide
1.1.1. Needs to be done for next class
1.1.2. Already done
1.2. Introduction to the subject
1.2.1. Previous semesters videos
1.2.1.1. Writing books at the push of a button
1.2.1.2. Humans Need Not Apply
1.2.1.3. What happens when computers can write like humans
1.2.1.3.1. https://youtu.be/i0OakpLeaAM
1.2.2. Introductory topic
1.2.2.1. Evaluate this statement using resources on the Internet: For certain tasks, GPT3 is a better writer than you
1.2.2.2. Statement: For certain tasks, GPT3 is a better writer than you
1.2.3. Solution to the problem
1.2.3.1. Higher-order thinking
1.2.3.1.1. Critical thinking skills
1.2.3.1.2. Creative thinking processes
2. Digital Information Tools
2.1. Google Account
2.1.1. Documents and Presentations
2.1.2. Collect email accounts
2.1.3. Class activity
2.1.3.1. Metacognition
2.1.3.2. Searching activity
2.2. Searching as an Advanced Skill
2.2.1. Part 1
2.2.1.1. A co-processing mindset
2.2.1.1.1. Your brain and the Internet
2.2.1.2. Collecting information is easy
2.2.1.3. Part I: Query Input - Google Guide
2.2.1.4. Google Search Operators - Google Guide
2.2.1.5. Plagiarism temptations?
2.2.2. Part 2
2.2.2.1. Academic context
2.2.2.1.1. Academic Institutions
2.2.2.1.2. Academic Publications
2.2.2.2. Knowledge development
2.2.2.2.1. Lengthy processes
2.2.2.2.2. Processes checked by many
2.2.2.2.3. Standard methods
2.2.2.3. Disciplinary knowledge
2.2.2.3.1. Common set of constructs
2.2.2.3.2. Dr. Bonilla's Google Research Social Sciences
2.2.3. Part 3
2.2.3.1. Purpose of research activity
2.2.3.1.1. More of a one time event
2.2.3.1.2. Ongoing pursuit of knowledge
2.2.3.2. Automating searches
2.2.3.2.1. Garbage in, Garbage out
2.2.3.2.2. A lot of information
2.2.3.2.3. Google Alerts
2.3. Mind maps
2.3.1. MindMeister: Online Mind Mapping and Brainstorming
3. Using Mindmaps for Effective Research
3.1. Your tools
3.1.1. The Information Literacy User’s Guide
3.1.1.1. The Information Literacy Users Guide.pdf
3.1.2. Mind maps from previous classes
3.1.2.1. Permissions
3.1.2.1.1. Mindmaps
3.1.2.1.2. Papers
3.2. Defining an information need
3.2.1. Picking your topic is research
3.2.2. Review Pew Research Center list of Internet & Tech related topics
3.2.2.1. Using Pew's website and Google Scholar side-by-side
3.2.2.2. Topics of Interest
3.2.2.2.1. Web address of Pew article
3.2.3. Levels of research by currency
3.2.3.1. On the news, on the web
3.2.3.2. On Pew's website
3.2.3.3. On scholarly research
3.2.4. Selected topic
3.2.4.1. Once you know your final topic, please write it in this node in the group mind map
3.2.4.2. Your topic must NOT be related to privacy
3.2.5. Main research question
3.2.5.1. Once you decide your research question, please write it here
3.2.6. Focused research questions
3.2.6.1. Please write here
3.3. Finding and accessing information
3.3.1. Textbook readings. Chapter 2, Scope. Page 15 to 25.
3.3.2. Textbook readings. Chapter 3, Plan. Page 26 to 46.
3.3.3. Formulating a search strategy
3.3.3.1. Tutorials
3.3.4. Generating search terms
3.3.4.1. Tutorials
3.3.5. Google searching
3.3.5.1. Google Search Guide
3.3.5.1.1. Tutorials
3.3.5.1.2. 2 page cheat sheet
3.3.5.1.3. A Google a Day
3.3.5.2. Using Google Scholar
3.3.5.2.1. Tutorials
3.3.5.3. Get more out of Google
3.3.5.3.1. Graphic
3.3.6. Search terms
3.3.6.1. List all appropriate search terms
3.3.6.1.1. One term per node
3.3.6.2. List most successful search queries
3.3.6.2.1. One query per node
3.3.7. Wikipedia
3.3.7.1. Tutorials
3.3.8. Library databases
3.3.8.1. What is a library database?
3.3.8.2. From idea to library
3.3.9. Humans!
3.3.10. Other resources
3.3.10.1. Savvy searcher
3.3.10.2. Internet searching tips
3.3.10.2.1. Tutorials
3.3.10.3. Semantic Scholar | AI-Powered Research Tool
3.4. Evaluating information
3.4.1. Textbook reading. Pages 63 to 77.
3.4.2. Information sources
3.4.2.1. Primary and secondary sources
3.4.2.1.1. Primary
3.4.2.1.2. Secondary
3.4.2.1.3. Tutorials
3.4.2.2. Popular and scholarly sources
3.4.2.2.1. Popular
3.4.2.2.2. Commercial
3.4.2.2.3. Scholarly and peer-reviewed
3.4.2.2.4. Tutorials
3.4.2.3. Information sources
3.4.2.3.1. Page
3.4.3. Evaluating authority
3.4.3.1. Author(s)
3.4.3.1.1. Expertise
3.4.3.1.2. Academic background and credentials
3.4.3.1.3. Work-related or other experience
3.4.3.1.4. Licensure or certification
3.4.3.1.5. Affiliation
3.4.3.1.6. Other publications
3.4.3.2. Publisher
3.4.3.3. Sponsor or owner
3.4.3.4. Web address
3.4.4. Evaluating currency
3.4.4.1. Date and edition of a publication
3.4.4.2. Determining currency of a website
3.4.4.3. Website stability
3.4.5. Evaluating content
3.4.5.1. Intended audience
3.4.5.2. Purpose and scope
3.4.5.3. Objectivity
3.4.5.3.1. Recognizing bias
3.4.5.4. Accuracy and verifiability
3.4.5.5. Overall quality
3.4.6. Final sources of information
3.4.6.1. Title of article, book, or source (one node per source)
3.4.6.1.1. Primary or secondary
3.4.6.1.2. Popular or scholarly
3.4.6.1.3. Authority
3.4.6.1.4. Currency
3.4.6.1.5. Content
3.4.6.2. Title of article, book, or source (one node per source)
3.4.6.2.1. Primary or secondary
3.4.6.2.2. Popular or scholarly
3.4.6.2.3. Authority
3.4.6.2.4. Currency
3.4.6.2.5. Content
3.4.6.3. Title of article, book, or source (one node per source)
3.4.6.3.1. Primary or secondary
3.4.6.3.2. Popular or scholarly
3.4.6.3.3. Authority
3.4.6.3.4. Currency
3.4.6.3.5. Content
3.4.6.4. Title of article, book, or source (one node per source)
3.4.6.4.1. Primary or secondary
3.4.6.4.2. Popular or scholarly
3.4.6.4.3. Authority
3.4.6.4.4. Currency
3.4.6.4.5. Content
3.4.6.5. Title of article, book, or source (one node per source)
3.4.6.5.1. Primary or secondary
3.4.6.5.2. Popular or scholarly
3.4.6.5.3. Authority
3.4.6.5.4. Currency
3.4.6.5.5. Content
3.5. Analyzing information
3.5.1. Absorbing the information
3.5.1.1. Effective reading
3.5.1.1.1. SQ4R
3.5.1.2. A checklist for reasoning
3.5.1.2.1. Embedded image
3.5.1.2.2. Link to image
3.5.1.3. Practice journal article
3.5.1.3.1. I regretted the minute I pressed share
3.5.1.3.2. I regretted the minute I pressed share
3.5.1.4. Template for Analyzing the Logic of an Article (One per chosen article)
3.5.1.4.1. Main purpose
3.5.1.4.2. Key question/issues that the author is addressing
3.5.1.4.3. Most important information in the article
3.5.1.4.4. Main inferences/conclusions in article
3.5.1.4.5. The key concept(s) we need to understand in this article is (are)
3.5.1.4.6. Main assumption(s) underlying the author's thinking is (are)
3.5.1.4.7. Implications
3.5.1.5. Exemplary work so far
3.5.1.5.1. Fighting Misinformation on Social Media Using Crowdsourced Judgments of News Source Quality (Ryan)
3.5.1.5.2. Combating Fake News on Social Media with Source Ratings: The Effects of User and Expert Reputation Ratings (Ryan)
3.5.1.5.3. Thesis submitted to the Faculty of law at the University of Ottawa. Gendered Bullying and Cyberbullying: Assessing Ontario's New Legislation by Rebecca Jennifer Katz [Chapter 2] (Courtney)
3.5.1.5.4. Cyberbullying and LGBTQ Youth: A Systematic Literature Review and Recommendations for Prevention and Intervention (Courtney)
3.5.1.5.5. Procrastination, participation, and performance in online learning environments (name)
3.5.1.5.6. Online dating services--chronology and key features comparison with traditional dating - (Ramon)
3.5.2. Organizing information
3.5.2.1. Thinking process
3.5.2.1.1. After absorbing and analyzing the information, spend time by yourself, away from the computer, in silence and peacefully, to use your brain to make connections among all the pieces of knowledge.
3.5.2.2. Free flow mind mapping
3.5.2.3. Organizing by categories
3.5.2.4. Organizing by concepts
3.5.2.5. Chronological organization
3.5.2.6. Hierarchical organization
3.5.2.7. Blooms taxonomy
3.5.3. Organization mind map for your paper
3.5.3.1. Start creating branches here
3.5.3.2. If you followed the Template for Analyzing the Logic of an Article, this part will be easier
3.6. Synthesizing information
3.6.1. Thinking process
3.6.1.1. After absorbing and analyzing the information, spend time by yourself, away from the computer, in silence and peacefully, to use your brain to make connections among all the pieces of knowledge.
3.6.1.2. Retrieved from the Web Archive
3.6.2. Synthesis
3.6.2.1. Assumptions
3.6.2.1.1. Branches here
3.6.2.2. Main points / Most important information
3.6.2.2.1. Branches here
3.6.2.3. Conclusions
3.6.2.3.1. Branches here
3.6.2.4. Implications
3.6.2.4.1. If we take this line of reasoning seriously
3.6.2.4.2. If we fail to take this line of reasoning seriously
3.6.3. Important information
3.6.3.1. Your paper is about the connections among the different sources that you gathered based on your research question.
3.6.3.2. You should not summarize the different sources that you gathered. Summaries might work well for high school papers.
3.7. Communicating results
3.7.1. Audience
3.7.1.1. Tutorials
3.7.1.1.1. Introduction and overview
3.7.1.1.2. Writing for audiences in US academic settings
3.7.1.1.3. How to incorporate Audience into your writing?
3.7.2. Citing sources
3.7.2.1. Styles
3.7.2.1.1. Tutorials
3.7.2.1.2. Citation Machine
3.7.2.2. Tutorials
3.7.2.2.1. Why you need to cite sources
3.7.2.2.2. Citation Style Chart (PDF)
3.7.3. Guide to grammar and writing
3.7.4. Your final paper
3.7.4.1. Note: The paper may seem short. I am really after quality
3.7.4.1.1. True synthesis
3.7.4.1.2. Direct and Clear Writing
3.7.4.1.3. Clear ideas
3.7.4.2. Template here
3.7.4.3. Link to your final paper in Google Docs
4. Privacy
4.1. A quote from 1977
4.2. Privacy as a human right
4.2.1. Why privacy matters?
4.2.2. What will a future without secrets look like?
4.2.3. Google's Privacy Policy
4.3. Achieving privacy online - Google
4.3.1. 5 tips for staying safe on the web
4.3.2. Practicing password safety
4.3.3. Shopping safely online
4.3.4. Be careful with malware
4.3.5. Gmail security tips
4.3.6. Avoiding phishing scams
4.3.7. HTTPS and SSL tutorials
4.3.8. Wireless security
4.4. Privacy resources
4.4.1. ACLU Pizza
4.4.2. Electronic Privacy Information Center
4.4.3. Protect yourself from the unauthorized use of your data
4.4.3.1. Security Education Companion
4.4.3.2. Cybersecurity
4.4.4. Protect yourself from the authorized use of your data
4.4.4.1. Terms of Service
4.4.4.1.1. https://tosdr.org
4.4.4.2. Consumer Privacy
4.4.5. Privacy Rights Clearinghouse | Privacy Rights Clearinghouse
4.4.6. Office of the CA Attorney General