Browse Definitions :
Definition

arachniography

An arachniography (pronounced uh-RAK-nee-AH-gruf-ee) is a bibliography of Web pages. The term was coined by Andrew J. Butrica of NASA who first considered "webography" but didn't like the mixing of word origins. He asked his brother, James, who teaches Classics at Memorial University, for a classical language equivalent of "web." In Greek, arachne means both the spider and its web. So, for his history of NASA's X-33 project, Andrew called his annotated list of Web pages an annotated arachniography. Since the Web is not a "biblio," this particular neologism would seem to be useful.

The term has not yet been widely used, but it's still early in the history of the Web. Meanwhile, if you are including Web sites in a bibliography for an academic or other formal paper or printed work, the Style Guide of the Modern Language Association (MLA) tells how to write a citation. The MLA guideline includes a number of examples of citations for use as models. For a Web site that is a scholarly project, they offer this model:

 Victorian Women Writers Project. Ed. Perry Willett. Apr. 1997. Indiana U. 26 Apr. 1997 <http://www.indiana.edu/~letrs/vwwp/>.

A drawback in the MLA's Web citation style is that, if the Uniform Resource Locator and its angular brackets are transferred to a Web page, the URL will no longer be visible when viewed on a browser. This is because Web browsers view the information within a matched pair of angular brackets as an HTML tag and therefore not to be displayed. When creating the URL part of a citation, we recommend enclosing it within parentheses instead of angular brackets.

This was last updated in April 2005

Continue Reading About arachniography

Start the conversation

Send me notifications when other members comment.

Please create a username to comment.

-ADS BY GOOGLE

File Extensions and File Formats

SearchCompliance

  • privacy compliance

    Privacy compliance is a company's accordance with established personal information protection guidelines, specifications or ...

  • data governance policy

    A data governance policy is a documented set of guidelines for ensuring that an organization's data and information assets are ...

  • risk management

    Risk management is the process of identifying, assessing and controlling threats to an organization's capital and earnings.

SearchSecurity

  • juice jacking

    Juice jacking is a form of hacking that compromises a device's USB charging port or charging cable, allowing hackers to break ...

  • DNS attack

    A DNS attack is an exploit in which an attacker takes advantage of vulnerabilities in the domain name system (DNS).

  • Advanced Encryption Standard (AES)

    The Advanced Encryption Standard, or AES, is a symmetric block cipher chosen by the U.S. government to protect classified ...

SearchHealthIT

SearchDisasterRecovery

SearchStorage

  • M.2 SSD

    An M.2 SSD is a solid-state drive (SSD) that conforms to a computer industry specification written for internally mounted storage...

  • RAID (redundant array of independent disks)

    RAID (redundant array of independent disks) is a way of storing the same data in different places on multiple hard disks or ...

  • cache memory

    Cache memory, also called CPU memory, is high-speed static random access memory (SRAM) that a computer microprocessor can access ...

Close