Você está na página 1de 4

Information Literacy

Teresa Lawler
1.
a) The key words that were used to fin the articles were
technology and security and computer security.
b) The database used was to find the articles was all
databases.
C) I used all databases to search for my topic of security
because I was searching for security within the technology/computer
world and it is not an issue confined to just computer science or
computer technologies. It is a topic that is important in every way
technology is used from government to hospitals, to schools and
entertainment, and even in the home. I wanted to ensure that I was
covering all avenues that security might be addressed.
d) MLA

Denning,Tamara,KohnoTadayoshi,andHenryLevy."ComputerSecurity
andtheModernHome."CommunicationsoftheACM56.1(2013):94103.
BusinessSourcePremier.Web.15Feb.2015.
http://eds.a.ebscohost.com/eds/detail/.
e)MLA
Juhee,Kwon,andEricJohnson."ProactiveVersusReactiveSecurity
InvestmentsintheHealthcareSector."MISQuarterly38.2(2014):451A3.
BusinessSourcePremier.Web.15Feb.2015.
<http://eds.a.ebscohost.com/eds/detail/detail.

f)Screenprint#1

Information Literacy
Teresa Lawler

Screen Print #22)


a) Within the article N.S.A. Breached North Korean Networks
Before Sony Attack, Officials Say, cyber attacks between North Korea
and the United States were examined. Authors David Sanger and
Martin Fackler point out that the Unites States National Security
Agency hacked into North Koreas computer network long before the
Sony hacking occurred. Sanger and Fackler explain how President
Obama was advised that North Korea was behind the Sony cyber
attack, and with that information President Obama pointed the finger
at North Korea and inflicted economic sanctions against them. But,
many questioned how the United States was able to attribute the Sony
cyber attack to North Korea so quickly unless they had an inside view.
b) MLA

Sanger,David,andMartinFackler."N.S.A.BreachedNorthKorean
NetworksBeforeSonyAttack,OfficialsSay."TheNewYorkTimes18Jan.
2015.TheNewYorkTimes.Web.15Feb.2015.
<http://www.nytimes.com/2015/01/19/world/asia/nsatappedintonorth
koreannetworksbeforesonyattackofficialssay.html?_r=0>.
3)
a) The keywords used to do the search were, security and
technology articles.
2

Information Literacy
Teresa Lawler
b) MLA

Singer,Natasha."UncoveringSecurityFlawsinDigitalEducationProducts
forSchoolchildren."TheNewYorkTimes8Feb.2015.TheNewYork
Times.Web.15Feb.2015.
<http://www.nytimes.com/2015/02/09/technology/uncoveringsecurity
flawsindigitaleducationproductsforschoolchildren.html?ref=topics>.
c) Thefirstsearchwasraningoogle.Thesecondsearchwasranin
yahoo.
d)
Search
Engine
Google

Yahoo

Why /how
better
Googles
layout is
better and
easier to
read
through
Harder to
read
through,
but this
engine
provided
recent
articles
first

# Search
Results
350,000,00
0

37,100,000

4)
a) Time- January 18, 2015, it has not been updated.
b) Relevance- Yes, this article relates to my topic of security. It is
a real world example of what can happen with security breaches
internationally, within the government and even within private
companies.
d) Authority- The authors are David Sanger and Martin Fackler.
Both authors are qualified to write about the topic in reference
to its ties to government, business, foreign relations and
economic effects. Sanger and Fackler are correspondents
3

Information Literacy
Teresa Lawler
within Asia, one author is also a White House correspondent,
and both are experienced in foreign policy, economic and
business reporting. I know the qualifications of these authors
by reading their biographies.
d) Accurate-The information is trust worthy. The article was
written by a credible and well-known News Paper, the New York
Times has fact checkers and well-credentialed sources. The
evidence available within the article, to support its claims, is
timing and expert opinion. It is the opinion of the expert
quoted within the article that the hastiness of the United States
government to blame North Korea proves that the US has some
type of insider view into the North Korean computer network.
e) Purpose- My interpretation of why the article was written was
to shed light on the fact that the United States was quick to
point the finger at North Korea for the cyber attack on Sony,
but yet we (the United States) were, and apparently had
been, hacked into North Koreas network for years. The article
makes you wonder if we were right to inflict sanctions on
North Korea when we technically did the same thing. I would
say that the article is somewhat biased in that it makes the
United States look guilty of something too.
5)
a) The Internet article was easier to access then the DB article.
b) The Internet article was more current than the DB articles, but
that is not to say that the DB did not have more current articles.
c) The DB articles had more authority being that they were more
deeply researched and over a greater amount of time. The DB
article had more resources that were cited, but the Internet
article had one to two sources used.
6) header/ footer

Você também pode gostar