User:Niki Grapes/Choose an Article

Article Selection
Please list articles that you're considering for your Wikipedia assignment below. Begin to critique these articles and find relevant sources.

Option 1

 * Article title
 * Critical Theory


 * Article Evaluation
 * The article is well written, and straight to the point. Not all claims have citations, but most information is present. Large portions of the introduction can be added to the overview instead.


 * Sources

Option 2

 * Article title
 * Sheila Jasanoff


 * Article Evaluation
 * There are several issues with this article. The introduction is too short to fully represent all topics within the article, and major amounts of information is missing from Sheila's background.


 * Sources
 * Sheila Jasanoff https://sheilajasanoff.org/
 * Sheila S. Jasanoff | Harvard Law School https://hls.harvard.edu/faculty/directory/10429/Jasanoff/publications
 * Jasanoff, Sheila | Climate Change https://climatechange.environment.harvard.edu/sheila-jasanoff

Option 3

 * Article title
 * Computer security


 * Article Evaluation
 * The introduction is well written, giving a basic summary of the article in a simple and easy to understand manner. Some information provided is incorrect. Information that should be added to expand on topics discussed in the article is missing. Security measures could be greatly expanded upon by including the ways browers and other applications defend users from downloading malicious software, or some features windows has by preventing software/apps from being runned if they come from a unknown or unreliable source.


 * Sources
 * https://support.microsoft.com/en-us/help/17187/windows-10-protect-your-pc
 * https://docs.microsoft.com/en-us/microsoft-edge/deploy/group-policies/security-privacy-management-gp
 * https://www.howtogeek.com/285819/is-microsoft-edge-really-safer-than-chrome-or-firefox/

Option 4

 * Article title
 * Mac Spoofing


 * Article Evaluation
 * Similar to the article Computer Security, there is more information that could be provided in the article. Not statements within the article has an citation, however all information is correct.


 * Sources
 * https://neurensic.com/spoofing-works-illegal/
 * https://fossbytes.com/arp-spoofing-attacks-detection-prevention/

Option 5

 * Article title
 * Certified Ethical Hacker


 * Article Evaluation
 * Not all statements have a source, but all information is relevant and accurate. All links work, and the introduction summarizes the topic well.


 * Sources
 * https://www.howmuchisit.org/ceh-certification-cost/