What's Wrong (APA style)?
Source Types
ARP: Fact or Fiction?
Find it in the ASU Database
Find It In The Syllabus
100

Eric Bouhassira & Krishna S. Vyas. (2015). The SAGE encyclopedia of stem cell research (Second edition). Los Angeles: SAGE Reference.

What is author's names written incorrectly? [Author names should be Bouhassira, E., & Vyas, K.S. (Eds.)]

What is title not italicized?

What is edition written out? [Edition statement should be written as the following: (2nd ed.)

What is place of publication included?

100

A personal diary or personal journal

What is a primary source?

100

The Applied Research Project counts 20% of your final grade in this LIB 1000 course.

What is Fact?

100

Professor Young gives you the following journal article title ONLY: Performing Cybersecurity Expertise: Challenges for Public Utility Commissions

Identify the journal in which this article appears.

What is Berkeley Technology Law Journal?

100

Professor Young's current office hours and credentials

What is MWF, 1:00 p.m.-5:00 p.m.; T/TH, 8:00 a.m.-11:00 a.m., 1:00 p.m.-5:00 p.m?

What is B.A., M.A., and M.L.S. (Master of Library Science)?

200

Friedman, Matthew J. (2015). Posttraumatic and acute stress disorders (Sixth edition.). Springer.

What is author name spelled out/formatted incorrectly? [Friedman, M.J.]

What is book title not italicized?

What is edition written incorrectly? (should be written 6th ed.)

200

A biography of former U.S. President, Barack Obama

What is a secondary source?

200

Students working on the Applied Research Project should address with their topic a social, political, economic, and sovereignty issue facing indigenous peoples / communities.

What is "fiction?"

Students address a social, political, economic, and sovereignty issue. For the specific issue, what is ___________[accept multiple answers as long as it is legitimate]

200

Now, Professor Young asks you to look at the subject terms listed in the database record which might relate to the topic of cybersecurity as contained in the journal article: Performing Cybersecurity Expertise: Challenges for Public Utility Commissions

Name 3 relevant subject terms which might help college students working on this topic.

What are Internet Security Laws, Computer Security, and Cyber Intelligence (Computer Security)?

200

Identify the 5 General Education Objectives for this LIB 1000 course.

What is Communication, Critical Thinking, Problem Solving, Technology, and Lifelong Learning?

300

Burns, Gary (2006). Fifty years of popular music and society: Workin' on a groovy thing. Popular Music and Society, 44(5). 491–503. https://doi.org/10.1080/03007766.2021.2000101

What is author name spelled out?

What is Journal article and volume number not italicized? 

What is citation missing DOI?


300

An encyclopedia or dictionary in a Reference Collection.

What is a tertiary source?

300

The Applied Research Project addresses these specific questions. 

[Note: Students should be asking the following questions]:

What is the issue?

Who is affected?

How is this being addressed?

What help / support is needed?

What can I do?

300

In Academic Search Ultimate, describe the process of evaluating the journal article entitled "Performing Cybersecurity Expertise: Challenges for Public Utility Commissions" for the 3-R method. [Note: You will need to put your process in the form of 3 questions for how you would evaluate this article for the 3-R method that you have learned about this Fall 2023 semester.]

What is the click on the author name and search for them out on the Web looking for their reliability in terms of what other works that they have published on this topic?

What is check subject terms in the article record on ASU to check for the article relevance or connection to my research topic of cybersecurity?

What is check journal article recentness by looking closely at the publication date? [Note: In this case, the article was published in 2020 so it is recent].

300

Identify the 5 Class Learning Objectives in the LIB 1000 course.

What is Applying critical thinking skills, Implementing practical research skills, Implementing specific research skills focusing on Indigenous Cultures and Communities, Understanding ethical and legal uses of information, and Recognizing and demonstrating good study habits and organization methods?

400

Fagan, Melinda Bonnie (2013). Philosophy of stem cell biology : knowledge in flesh and blood. Houndmills, Basingstoke, Hampshire: Palgrave Macmillan.

What is author name spelled out fully?

What is book title not italicized? 

What is place of publication included?

400

Some original poetry by Maya Angelou or the transcript of an interview with President Joe Biden

What are primary sources?

400

For the ARP, students will submit their final project as both an assignment on Canvas and as a discussion post and these 2 assignments are worth 100 points and 50 points, respectively. 

What is Fiction? The ARP assignment is worth 100 points and the Discussion Post is worth 30 points.

400

Now, Professor Young asks LIB 1000 students to Choose 3 additional databases (APA PsycArticles, APA PsycInfo, and SocIndex with Full-Text). You are asked to look at the psychological impact of cybersecurity on businesses or the business employees. 

Place in the form of a question the keyword search that you can do using these databases.

Locate the journal article, "Cybersecurity and Moral Hazard" and name the article author.

What is cybersecurity or cyber security AND business AND effects or consequences? [Professor Young will accept multiple answers]

Who is Jeffrey L. Vagle?

400

Identify in the course syllabus at least 3 aspects of being "actively engaged" in this LIB 1000 course.

What is taking notes, participating in class discussions, supporting classmates, and, actively listening?

500

Bentzley, B.S., Molet, J., Bolton, J.L., Baram, T.Z., & Mahler, S.V. (2021). On The Early Life Origins of Vulnerability To Opioid Addiction. Molecular Psychiatry, 26(8), 4409–4416. https://doi.org/10.1038/s41380-019-0628-5

What is APA citation missing some of the authors? [The authors are: S.C. Levis, B.S. Bentzley, J. Molet, J.L. Bolton, C. R. Perrone, T.Z. Baram, & Mahler, S.V.]

What is every word of article title capitalized?

What is Journal title & volume number (26) not in italics?

500

Primo, Livermore Library search engine/online catalog.

What is a tertiary source?

500

According to the Applied Research Project instructions/components, there are 8 specific components that students should include in their project. 

What is Fact? 

The specific components are as follows:

What is Topic & Research Question?

What is Search Methods Descriptions?

What is First Three Sources + Citations

What is Source Evaluation Section?

What is Complete Reference List?

What is Final Project Check-In?

What is Final Project: Applied Research Project?

What is Applied Research Project Discussion?

500

Using the article title, "Cybersecurity and Moral Hazard," describe the process in the form of a 3 questions for how students can analyze or evaluate this journal article for the 3-R method if Cybersecurity effects on business or business personnel is the given research topic.

What is click on the author, check out on the Web his credentials or other articles on the topic that he has written in order to check for author reliability?

What is check article abstract, and subject terms to look for article relevance or connection to research topic?

What is look at when article was published to look for article recentness or currency?

500

In the syllabus, classroom etiquette is defined this way.

What is "treating everyone else with dignity and respect—especially respect for the ideas and thoughts of others?"