0% found this document useful (0 votes)
97 views

Csit 101 Assignment1

Uploaded by

api-266677293
Copyright
© © All Rights Reserved
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
97 views

Csit 101 Assignment1

Uploaded by

api-266677293
Copyright
© © All Rights Reserved
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 3

Brandon Riser

CSIT 101 Assignment #1: Information Literacy



Page 1
The current event article that I have chosen for this project is about privacy and security. The
article was found in the CNN Website in the technology section. The name of the article was
Tim Cook did not address Apples real privacy problem by David Goldman, dated September
18, 2014. In this article, Tim Cook talks about the problem Apple is having with its security and
privacy. He gave several examples of how it takes several months to address its many problems
with privacy and security. One example was that it took Apple over six months to address the
theft of celebrities nude photos from their iCloud accounts. Other problems include security and
privacy issues with Apple Pay, iPad and iPhones. Even though Apple is trying to improve its
security and privacy issues, Tim Cook says they can do better. He says Apple needs to be more
transparent and faster to respond to issues if Apple wants to keep its customers happy.
The first additional internet article was found using www.zdnet.com. The title of the article is
Apple doubles-down on security, shut out law enforcement from accessing iPhones, iPads by
Zach Whittaker, dated September 18, 2014. The second additional internet article was found
using www.techcrunch.com. The title of the article is Apples Tim Cook Does Some Security
Straight Talking by Matthew Panzarino, dated September 18, 2014. Using these two search
engines to find related articles were both fairly easy to use. In each search engine, all I had to do
was to type in Apple Security in the search box and click on the search box and hundreds of
results appeared. On each search engine once the list of the results appeared, I could scroll
through the results and see which ones were best and I could also click on how recent I wanted to
have my article. Once I found the article I liked, I just clicked on it and the whole article
appeared. I think both search engines were equal in ease of use. Chen, Brian X. "After Celebrity
Brandon Riser
CSIT 101 Assignment #1: Information Literacy

Page 2
The internet article that I am going to use to TRAAP my sources is Apples Tim Cook Does
Some Security Straight Talking. It was written on September 18, 2014 and it has not been
updated since then. The topic relates to the original question of security within Apple. The author
is Matthew Panzarino. This author is qualified to write about this subject matter. I clicked on his
name in the article and I found out that he is a managing editor on the Next Web along with
being a co-editor for TechCrunch. He is also well known as a writer that covers for Apple and
Twitter. I believe the information in the article is trustworthy. The author gives many examples
and facts to support his statements. I believe the purpose of the article is to inform the public
about the security matters of Apple. Even though the author follows Apple a lot and is harsh on
the company, this article seems to be fair and objective.
The two scholarly journal articles found from the CCBC Library Database are After
Celebrity Hack, Apple to Add Security Measures written by Brain X. Chen and Why Apple
Cares About Your Privacy written by Rich Mogull. The keywords that I used to find these
articles were Apple Security. I went to the article database and then I went to the business
news section. I used this section since Apple is a major business in the world.
When comparing the journal articles and the internet articles, it was easier for me to find
information using the internet websites. All I had to do was go to the website and type in my
subject matter in the search box and click the search button. When trying to find journal articles,
I had to click on more areas to narrow my search. It took me more steps to find the information.
The internet articles seem to be more recent than the journal articles. Both the internet and
journal articles had people with equal authority. The following is my sources using
www.easybib.com for this project.
Brandon Riser
CSIT 101 Assignment #1: Information Literacy

Page 3

Chen, Brian X. "After Celebrity Hack, Apple to Add Security Measures." (September 5,
2014): B2. Literature Resource Center. Web. 20 Sept. 2014.
<http://search.proquest.com.ccbcmd.idm.oclc.org/docview/1560003682>.
Goldman, David. "Tim Cook Didn't Address Apple's Real Privacy Problem." CNNMoney.
Cable News Network, 18 Sept. 2014. Web. 20 Sept. 2014.
Mogull, Rich. "Why Apple Cares About Privacy." 13.10 (October 2014): n. pag. Business
Source Premier. Web. 20 Sept. 2014.
<http://eds.a.ebscohost.com/eds/detail/detail?vid=5&sid=ebffc3cc-f541-4fb1-8b6f-
813b8211cf4d%40sessionmgr4003&hid=4210&bdata=JnNpdGU9ZWRzLWxpdmUmc2NvcGU
9c2l0ZQ%3d%3d#db=buh&AN=97781585>.
Panzarino, Matthew. "Apples Tim Cook Does Some Security Straight Talking |
TechCrunch." TechCrunch. N.p., 18 Sept. 2014. Web. 20 Sept. 2014.
Whittaker, Zack. "Apple Doubles-down on Security, Shuts out Law Enforcement from
Accessing IPhones, IPads | ZDNet." ZDNet. N.p., 18 Sept. 2014. Web. 20 Sept. 2014.

You might also like