2. The rapid advancement of technology and its emergence into our personal lives has changed the way we share our information. Passwords and other security precautions lead us to have a false sense of security about our computers, and other devices that are connected to the vast World Wide Web. It is only when we are put in a situation like celebrities, Jennifer Lawrence and Jennifer Hudsons, nude photos being distributed without their consent that we realize how vulnerable we are as a technological society. I believe it is a violation of privacy that companies that we have never had contact with, like IBM and CISCO, can make an agreement to put our information on computer servers that are backed up to the Cloud and are easily available to hackers. By default, personal information is now accessible by the public. 3. The two search engines I used were Bing and Google. I searched for articles in relation to Jennifer Lawrence and Jennifer Hudsons nude photos being leaked. The Bing search showed results from websites such as the Huffington Post, New York Daily Times, The Washington Post, and Fox news, whereas Googles top hits for this search were gossip websites such as tmz, hollywoodlife, glamourmagazine etc. This led me as a user, searching for reliable information, to lean more towards using Bing for research purposes. 4. This article was written on September 2, 2014 4:42 PM ET, and it has not been updated as of the present time. This relates to my first topic as it is discussing the privacy, ethics, security, and the emergence of technology. It is written by David Goldman, Jose Pagiliery,and Laurie Segall who are qualified technology reporters that are employed by CNN. The information is trustworthy due to the status of CNN in the reporting world, and also validated by Tonette Cherry Assignment 1: Information Literacy CSIT 101 M/W/F 11:15 AM 2
three separate technology reporters. This article hypothesized that the hackers broke into the system through the use of weak passwords and this was confirmed by Apple that they did indeed do so. This article was to inform the public of safety and privacy and the precautionary steps one could take to protect ones personal information. 5. The keywords I searched were technology and privacy. The database used for this search was ProQuest Central as the website stated it was the number one search engine. 6. I conducted two searches on the topic of technology and privacy through the internet and the library database; I found the search engines, Google and Bing, to be faster, easier to access. The timelines of my articles were between March 2012 and September 2014. The authority of CNN is a reliable source according to the popular opinion. The academic journals are reliable sources because they are written by academic scholars and reviewed by their colleagues. 7. Citation MLA Format Almeida, V. A. F. (2012). Privacy problems in the online world. IEEE Internet Computing, 16(2), 4-6. doi:http://dx.doi.org/10.1109/MIC.2012.36 Cakrani, E. (2013). Technology and privacy, internet effects on privacy. Mediterranean Journal of Social Sciences, 4(9), 279-283. Retrieved from http://search.proquest.com/docview/1528527897?accountid=3784 O'Donnell , Christine. "Forensic Analyst says Phishing Scam Likely in Celebrity Hacking Case." Forensic Analyst says Phishing Scam Likely in Celebrity Hacking. N.p., n.d. Web. 17 Tonette Cherry Assignment 1: Information Literacy CSIT 101 M/W/F 11:15 AM 3