User:Oakv17/sandbox

Week 4: Active Bat Article Plan
This article is very slim. There is little to no information as to what Active Bat is. All that exists in the article is a brief overview of what it is, then one reference and two external links. So I basically need to build the article from the ground up, adding more information on Active Bat and Indoor Localization Systems.

Week 3: Citation Exercise
Article edited was from Citation Hunt Tool: Web beacon

Citation added to this line:

A web beacon is any of a number of techniques used to track who is visiting a web page. They can also be used to see if an email was read or forwarded or if a web page was copied to another website.

It needed a citation at the end so I added the one above

Week 2: Evaluating article assignment:

Which article are you evaluating?
Article 1: Information privacy

Article 2: Data security

Why you have chosen this article to evaluate?
I chose these articles to look at the burgeoning topic of information privacy.

Evaluate the article
Article 1:

Everything in the article is related to the topic and it explores a wide-range of areas that stem from information privacy. I feel as though there are more areas to cover in terms of 'information types' which could potentially be added to the article to cover more ground on the topic. The article does a great job of explaining all the information that I believe it is meant to display. To possibly improve the article, there could be more information added to the introduction since it only covers the minimum amount of information on the topic.

There is no bias to the article, it discusses data privacy in a way that just explains what it is, who it's governed by, the different types. It is all displayed in a neutral tone and does not underrepresent or overrepresent anything.

Majority of the links work for this article, there was one that I tried accessing that resulted in an error. All the sources used appear to have successfully support the claims or purpose of the article. The sources primarily come from websites like the New York Times or national and educational databases, they are mainly neutral sources, however if they aren't, the information that is presented from them is done in a non-biased manner. All the sources are diverse in origin, coming from diverse backgrounds, countries, journals. The only issue here is that some of the articles are fairly outdated and it's important to have up-to-date articles for a topic that is only ever progressing.

There is quite a bit of activity on the talk page of the article. The comments consist of changing details to moving sections to around and providing suggestions as to what to do with the page. For example, there is an edit that took out a phrase that could be viewed as opinionated which should not be in the article. The main critique is that the article should be moved from 'Information Privacy' to 'Informational Privacy'. This article is very well rated and also part of three different WikiProjects including Computing, Internet, and Mass Surveillance.

Article 2:

This article glosses over quite a few topics in a short amount of time. Everything in the article is relevant to the topic, it talks about the technologies of data security and the laws governing it. In order to be improved, more information about more areas of data security, the article only really touches on how we protect data and not answering other questions like why and what data.

This article is completely neutral, it displays the material in an informative and unbiased manner.

The sources come from a wide array of avenues, there are newsletters, government documents, journals and websites. However, some of the links did not work, and some seemed like they were not the greatest of sources and could potentially be biased; yet it did not reflect in the paper when they used said sources.

There is not much action on the talk page, most of the discussions are about combining this article with information privacy based on the argument that they are very similar. This article is part of the Computer Security WikiProject.