0% found this document useful (0 votes)
22 views

Csit Assignment 1

The document discusses three articles the author found on internet privacy and security. It describes searching different databases and search engines to find the articles, and evaluates aspects like the date, author credibility, and differences between database and internet articles.

Uploaded by

api-266899353
Copyright
© © All Rights Reserved
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
22 views

Csit Assignment 1

The document discusses three articles the author found on internet privacy and security. It describes searching different databases and search engines to find the articles, and evaluates aspects like the date, author credibility, and differences between database and internet articles.

Uploaded by

api-266899353
Copyright
© © All Rights Reserved
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 7

Marisa Kekich

Prof. Fred Bartlett Jr.


CSIT MWF 11:15-11:10
February 27, 2015
Information Literacy Assignment
1. The first article I read was called Regulating the Internet of Things: First Steps
Toward Managing Discrimination, Privacy, Security and Consent written by Scott R.
Peppet. In order to find this article I searched the phrases security rights and
internet privacy into the CCBC database. The database this article came from is
called Business Source Premier. I chose this database because the topic I chose was
internet privacy. I believed that a business related database would be appropriate for
my topic because in the business world, internet privacy is very important, for
without it someone could easily find out what the company is doing. Therefore, I
found this database to be credible. The second article I came across I found using the
Academic Search Premier database. I chose this database because it was said to be a
general purpose database. I wanted to be able to read an article that discussed how
internet privacy affected individuals and not just businesses or companies. The article
I read was called Privacy and the Internet: Intrusion, Surveillance, and Personal
Data. In order to find this article I typed the phrase individual internet privacy into
the search bar.

KEKICH 1

2. In order to find an internet article, I used zdnet.com. The article I read, Anonymous
targets ISIS social media, recruitment drives in #OpISIS campaign discussed how
the activist group Anonymous were able to hack into the social media accounts of
hundreds of ISIS terrorists. The hackers took down the accounts, limiting ISIS from
being able to spread their ideas through the internet.
3. I used the Google search engine in order to find my last article. In order to find my
article I typed the phrases internet security and social media privacy into the
search engine. The article I found on The Huffington Post website discussed a
hacking involving the website LinkedIn. The other two search engines I used were
Yahoo and Bing. When I typed the same phrases into the search bar on Yahoo my
search results consisted mainly of websites giving me tips to promote internet
security, or websites selling internet security programs such as McAfee and Microsoft
programs. When using Bing my search results included more websites with internet
security tips, but it my results also gave me news articles discussing the different
levels of security that different websites have, or stories about certain websites being
hacked.

Yahoo

Bing

Mostly similar results (Ads for


products)
Gave me a lot of results
Not very relevant to my topic

KEKICH 2

A Variety of different results


Found to be better than Bing
Gave me a lot of search results
Relevant results

4.

The internet article I found on zdnet.com was an appropriate article to choose


because it was written on February 9, 2015. It is better to choose an article that was
recently written in order to get the most current information. The article is also
relevant because it discusses how Anonymous was able to breach the security of
terrorists social media accounts. I know that the author, Charlie Osborne is a credible
source because the Zdnet website includes a link with a small biography of the author.
Following this link, I learned that Osborne is a medical anthropologist who studied at
the University of Kent. She is also a journalist for other news related websites. The
information is accurate because I looked up other articles relating to the topic and the
information was the same. The purpose of this article was to inform people about the
latest news regarding the ISIS Organization. The material is biased based on whether
or not the reader is associated with, or follows the beliefs of ISIS.

5.

The database article compared to the internet article were drastically different.
The internet article was much easier to understand and comprehend because it was
written for the commonly educated reader. The database article, however, was written
by an educated being for the purpose of being read and used for professional
purposes. The word choices used in the database article were very difficult and most
readers would not know the meaning.
The internet article was also written more recently than the database article.

The timeliness of an article is important because if an article is more recent it may

KEKICH 3

include information that wasnt yet known at the time the first article was written. The
more recent an article is written the more credible it is.
The authority of an article is also very important. An article is more credible and
reliable if the author is more knowledgeable on a topic. The database article was a better
judgment of the topic than the internet topic because the author was more credible than
the author of the news article.

KEKICH 4

Screen Shot of Database Search Screen

KEKICH 5

KEKICH 6

APA Format Works Cited


Balz, S. D., & Hance, O. (1996). Privacy and the Internet: Intrusion, surveillance and..
International Review Of Law, Computers & Technology, 10(2), 219.
Peppet, S. R. (2014). Regulating the Internet of Things: First Steps Toward Managing
Discrimination, Privacy, Security, and Consent. Texas Law Review, 93(1), 85-178.
MLA Format Works Cited
Miles, Kathleen. "LinkedIn Sued For 'Hacking' Users' Email Accounts To Spam Friends." The
Huffington Post. TheHuffingtonPost.com, 22 Sept. 2013. Web. 16 Feb. 2015.
Osborne, Charlie. "Anonymous Targets ISIS Social Media, Recruitment Drives in #OpISIS
Campaign |ZDNet." ZDNet. N.p., 9 Feb. 2015. Web. 15 Feb. 2015.

KEKICH 7

You might also like