Information Has Value
Vetting Sources:An exercise that teaches ChatGPT’s limitations. This exercise empowers students to verify the information AI generates, fostering responsible AI use.Ask ChatGPT to generate a list of 4 academic sources on a topic of your choice, and then evaluate the credibility and usability of those sources.Now answer:What is the topic you chose?What 4 citations were generated? (Paste the citations here)THEN complete the following:1. Are the citations actually real? Does such a journal/website/book exist? State which are not real and which are real. State whether any website used in a real citation where you found it is credible and why.2. State where those specific real citations are available full-text (check our library databses too). List the names of the places you found them (for example, name of such-and-such webite, name of database , etc...).3. Check the credentials of the lead author by doing a google search of their name in quotes. Are they trained in the field of the topic? State their credentials and/or academic degrees.4. Now run their name (in quotemarks) in a library database (like ProQuest or Ebscohost), use a drop down to search for AUTHOR - do they appear? IF YES, What are their other article/s (provide the permalink URLs) about?5. Now run a search for your same chosen topic in a library database. What are the top four most relevant (provide the four permalink URLs)? Note if they match any of the original four generated.Bonus 1 point: Talk about paid and unpaid access to this AI tool (look at pricing for different versions on the Chatgpt website) and how YOU think it might affect what you find in any tier of paid/unpaid access. This assignment tracks to the ACRL Information Literacy framework:"Information has Value"
Information Literacy Frame(s) Addressed:
License Assigned:
CC Attribution License CC-BY
The worksheet, activity, slides, and library instruction session outline for this assignment are a methodology for integrating information literacy and library research into testimonio writing in a first-year undergraduate Introduction to Higher Education (IHE) course in the College of Education at California State University, Los Angeles. In the testimonio, students reflect upon and write about their educational experiences while integrating academic sources into their work.
Information Literacy Frame(s) Addressed:
License Assigned:
CC Attribution-NonCommercial License CC-BY-NC
A visual representation of the publishing process and how access is provided that includes what free labor is contributed to the process and how publishing companies make astronomical profits from freely given materials
Information Literacy Frame(s) Addressed:
License Assigned:
CC Attribution-NonCommercial-ShareAlike License CC-BY-NC-SA
Easier access to research data is changing the research landscape. Investigate the data available for your research topic through the library’s catalog and open-access sources.
Information Literacy Frame(s) Addressed:
License Assigned:
CC Attribution-NonCommercial License CC-BY-NC
This lesson plan introduces students to lateral reading techniques using the SIFT method. Designed and implemented for a political science introduction to international relations course, this can easily be adapted to other media literacy contexts. Students will practice lateral reading with sample news articles. Worksheets, slides, and sample articles are linked in the lesson plan. Alternative news articles can be substituted.
Information Literacy Frame(s) Addressed:
License Assigned:
CC Attribution-NonCommercial-ShareAlike License CC-BY-NC-SA
This handout on business resources was designed in collaboration with the Ciocca Center for Entrepreneurship & Innovation. Although the quips aren't exactly witty, the aim of each remark is to answer the simple question: Why would I use this resource anyway? Even though the handout is created with a specific audience in mind, the quips could be used to highlight any of these resources, anywhere information is needed.
Information Literacy Frame(s) Addressed:
License Assigned:
CC Attribution License CC-BY
This exercise scaffolds Google and Library resources in order to help students prepare for "career conversations" with industry professionals. The presentation is designed for a business communication class in which students conduct industry research as prepartion for a strategic professional networking assignment. The assumption exercise is designed explicitly to encourage students to question their assumptions about librarians and other career professionals. Padlet is used to encourage group work and for assessment purposes.
Information Literacy Frame(s) Addressed:
License Assigned:
CC Attribution-ShareAlike License CC-BY-SA
How do you detmerine whether your research has had an impact? This lesson plan covers journal and author metrics such as Journal Impact Factors, H-index, citation counts, and altmetrics. After a mini-lecture of the definitions of these metrics and how to find them using Journal Citation Reports and Google Scholar Metrics, students create a researcher profile to position themselves as scholars. Supplies needed: Printed researcher profile handouts.This activity takes approxiately 30 minutes. Directions: Identify a university or research center you’d want to be affiliated with, and make up a title of an article you’d be interested in writing. Then, find a real journal that would publish that article. Use Google Scholar to look up the journal’s h-index and Ulrich’s to determine if it’s open access. Make up a number for how many times you think the article would be cited!
Information Literacy Frame(s) Addressed:
License Assigned:
CC Attribution-ShareAlike License CC-BY-SA
This sex-positive privacy literacy workshop engages participants in exploring how sex tech impacts intimate privacy and intimate relationships. Workshop content is contextualized with the theoretical frameworks of artificial intimacies (Brooks) and consentful tech (The Consentful Tech Project) and the concept of intimate privacy (Citron) and presented through a privacy literacy lens. Participants will identify artificial intimacies in order to assess real-world examples and their impact upon intimate privacy; evaluate the privacy of digital bodies under conditions of data promiscuity using a consentful tech framework; and understand intimate privacy and the impact of technology on intimate relationships and wellbeing.The workshop is designed for a 60-minute session, but can be extended to fill the time available.Includes workshop guide, presentation slides, learning activities, inclusive pedagogy tool, and assessment instrument.
Information Literacy Frame(s) Addressed:
License Assigned:
CC Attribution-NonCommercial-ShareAlike License CC-BY-NC-SA
This workshop engages participants in exploring corporate data collection, personal profiling, deceptive design, and data brokerage practices. Workshop content is contextualized with the theoretical frameworks of panoptic sort (Gandy), surveillance capitalism (Zuboff), and the four regulators (Lessig) and presented through a privacy and business ethics lens. Participants will learn how companies make money from data collection practices; explore how interface design can influence our choices and behaviors; and discuss business ethics regarding privacy and big data.The workshop is designed for 75-minute class sessions, but can be compressed into 60-minute sessions. Includes workshop guide, presentation slides, learning activities, and assessment instrument.
Information Literacy Frame(s) Addressed:
License Assigned:
CC Attribution-NonCommercial-ShareAlike License CC-BY-NC-SA
Pages