Sie sind auf Seite 1von 3

Tonette Cherry

Assignment 1: Information Literacy


CSIT 101 M/W/F 11:15 AM
1


2. The rapid advancement of technology and its emergence into our personal lives has
changed the way we share our information. Passwords and other security precautions lead us to
have a false sense of security about our computers, and other devices that are connected to the
vast World Wide Web. It is only when we are put in a situation like celebrities, Jennifer
Lawrence and Jennifer Hudsons, nude photos being distributed without their consent that we
realize how vulnerable we are as a technological society. I believe it is a violation of privacy that
companies that we have never had contact with, like IBM and CISCO, can make an agreement to
put our information on computer servers that are backed up to the Cloud and are easily
available to hackers. By default, personal information is now accessible by the public.
3. The two search engines I used were Bing and Google. I searched for articles in relation
to Jennifer Lawrence and Jennifer Hudsons nude photos being leaked. The Bing search showed
results from websites such as the Huffington Post, New York Daily Times, The Washington
Post, and Fox news, whereas Googles top hits for this search were gossip websites such as tmz,
hollywoodlife, glamourmagazine etc. This led me as a user, searching for reliable information, to
lean more towards using Bing for research purposes.
4. This article was written on September 2, 2014 4:42 PM ET, and it has not been
updated as of the present time. This relates to my first topic as it is discussing the privacy, ethics,
security, and the emergence of technology. It is written by David Goldman, Jose Pagiliery,and
Laurie Segall who are qualified technology reporters that are employed by CNN. The
information is trustworthy due to the status of CNN in the reporting world, and also validated by
Tonette Cherry
Assignment 1: Information Literacy
CSIT 101 M/W/F 11:15 AM
2

three separate technology reporters. This article hypothesized that the hackers broke into the
system through the use of weak passwords and this was confirmed by Apple that they did indeed
do so. This article was to inform the public of safety and privacy and the precautionary steps one
could take to protect ones personal information.
5. The keywords I searched were technology and privacy. The database used for this
search was ProQuest Central as the website stated it was the number one search engine.
6. I conducted two searches on the topic of technology and privacy through the internet
and the library database; I found the search engines, Google and Bing, to be faster, easier to
access. The timelines of my articles were between March 2012 and September 2014. The
authority of CNN is a reliable source according to the popular opinion. The academic journals
are reliable sources because they are written by academic scholars and reviewed by their
colleagues.
7. Citation MLA Format
Almeida, V. A. F. (2012). Privacy problems in the online world. IEEE Internet
Computing, 16(2), 4-6. doi:http://dx.doi.org/10.1109/MIC.2012.36
Cakrani, E. (2013). Technology and privacy, internet effects on privacy. Mediterranean
Journal of Social Sciences, 4(9), 279-283. Retrieved from
http://search.proquest.com/docview/1528527897?accountid=3784
O'Donnell , Christine. "Forensic Analyst says Phishing Scam Likely in Celebrity Hacking
Case." Forensic Analyst says Phishing Scam Likely in Celebrity Hacking. N.p., n.d. Web. 17
Tonette Cherry
Assignment 1: Information Literacy
CSIT 101 M/W/F 11:15 AM
3

Sept. 2014. <http://www.myfoxla.com/story/26418581/nude-photos-of-jennifer-lawrence-other-
celebs-leaked-online-by-hacker>.
Pagliery, Jose. "Naked celeb hack lesson: 'Delete' doesn't mean delete." CNNMoney.
Cable News Network, 2 Sept. 2014. Web. 17 Sept. 2014.
<http://money.cnn.com/2014/09/02/technology/security/cloud-delete/>.
Pagilery, Jose. Naked celeb hack lesson: Delete doesnt mean delete. CNNMoney.
Cable News Network, 2 Sept. 2014.Web.10 Sept. 2014.
http://money.cnn.com/2014/09/02/technology/security/cloud-delete.

Das könnte Ihnen auch gefallen