Sie sind auf Seite 1von 9

Assignment 1: Information Literacy

Celia Brandon

1a. The key words that I uses are internet privacy.


1b. I used the ProQuest database.
1c. They relate to both personal and as societal concerns regarding the internets protection and safety
that each of us need to know about our convenient resource/ past time.
1d. Hazari, S., & Brown, C. (2013). An empirical investigation of privacy awareness and concerns on
social networking sites. Journal of Information Privacy & Security, 9(4), 31-51. Retrieved from
http://search.proquest.com/docview/1502363116?accountid=3784
1e. Kuner, C., Cate, F. H., Millard, C., Dan Jerker, B. S., & Lynskey, O. (2014). When two worlds
collide: The interface between competition law and data protection. International Data Privacy
Law, 4(4), 247-248. doi:http://dx.doi.org/10.1093/idpl/ipu025

Page
1

Assignment 1: Information Literacy


Celia Brandon
1f.

Page
2

Assignment 1: Information Literacy


Celia Brandon

Page
3

Assignment 1: Information Literacy


Celia Brandon

Page
4

Assignment 1: Information Literacy


Celia Brandon

Page
5

Assignment 1: Information Literacy


Celia Brandon

2. In the article entitled What Happens to Privacy When the Internet is in Everything? there was a
discussion panel of technology buffs at the World Economic Forum in Davosho. They gave their
theories of the future of technology. They felt that there was no need to sneak and obtain individuals
personal information, because new technology would make it invisible by becoming embedded in
everything we interact with and accessing individual information without their permission. The more
points of connection, the more surveillance opportunities are opened up. However, they felt that laws
should be placed on data and data usage not on technology. (Schmidt, E.)
Page
6

Assignment 1: Information Literacy


Celia Brandon

Lomas, N. (2015, January 25) What Happens To Privacy When The Internet Is In Everything?
Retrieved from http://techcrunch.com/2015/01/25/what-happens-to-privacy-when-the-internet-is-ineverything/
3a.The keywords internet privacy where keyed into the search box.
3b. Wingfield, N. (2015, February 25) Privacy Group Files F.T.C. Complaint Against Samsungs VoiceOperated TVs. Retrieved from http://bits.blogs.nytimes.com/2015/02/25/privacy-group-files-f-t-ccomplaint-against-samsungs-voice-operated-tvs/
3c. I used BBC and zdnet.com.
3d.

Search

BBC

Zdnet,com

Not my first choice

I prefer zdnet.com

The Editors choices are listed first

Easy access viewable options on the left to

Engine
Preferenc
e
Reason

then they are listed by date

filter your search. Listed by date

Number

multiple pages that you must count

of results

individually

Page
7

569

Assignment 1: Information Literacy


Celia Brandon

4a. This article was written on January 25, 2015, and has not been updated.
4b. This article not only addresses my topic currently; it speculates the future privacy of the world.
4c. This article was written by Natasha Lomas, she has been a reporter for TechCrunch since September
2012 and is based out of London. I typed her name in their search box and this is what they shared: She
arrives after a stint reviewing smart phones for CNET UK and, prior to that, more than five years
covering business technology for silicon.com (now folded into TechRepublic.com). At silicon she
focused on mobile and wireless, telecoms and networking, and IT skills issues, and has also freelanced
for organizations including the Guardian and the BBC. Natasha studied English at Cambridge
University, and also holds an MA from Goldsmiths College, University of London.
4d. I was not able to pull them up on the Better Business Bureaus web site, however, I did Google
them and based on what I found I believe that they are a trustworthy company. I did not find any
articles on their inaccuracy since their start up in 2005.
4e.This article gives information and theories from multiple individuals in the technology/ science
industry and appears to clearly be written to inform without prejudice.
5a.
The journal article was written by two educated authorities who have conducted a research study on the
privacy awareness and concerns on social networking sites. They focused on the most popularly used
social networks. They used variables such as questioners and data analysis. They started with a theory
and concerns about how individuals information was being obtained and monitored. They were
Page
8

Assignment 1: Information Literacy


Celia Brandon

curious about the respondents attitudes towards privacy on social networks sites. They also wondered
whether or not social demographics and knowledge of privacy issues would influence the attitudes and
actions of the respondents. This is not an opinionated article this is a firsthand research study. The data
collected from studies such as this are what would be published and used in the educational arena as
well as a part of the legal precedence for the technical policies and procedures. This type of article is
quite lengthily and would probably have a healthy fee attached to the accessibility of it.
The web article is more of a summary of statistics and theories being openly discussed. It is much
shorter then a journal article. It is not a part of the research into the validity of theories but a group of
technology representatives sharing. Those mentioned in the article would not be considered to be
scholarly experts, but technology, business and marketing experts. Instead of a firsthand account of any
information this article is an observation of a meeting of specialist in the field of the evolution of digital
technology. They are the builders, chief officers and watch dogs of the communication era. This article
would not be found in schools, but would be subscribed to and found in industry magazines and
therefore easier to access.

Page
9

Das könnte Ihnen auch gefallen