Você está na página 1de 5

Jenika Brown

Assignment 1: Information Literacy

1. a.) The keywords I used to find the two articles to aid me for this assignment were,
information and security.
b.) I used the CCBC database for this assignment.
c.) I used the CCBC database because it was a requirement for this assignment, as well as
it being a dependable place to obtain my sources.
d.) DB Article 1 Citation:
Chatterjee, Sutirtha, Suprateek Sarker, and Joseph S. Valacich. The Behavioral Roots of
Information Systems Security: Exploring Key Factors Related to Unethical IT
Use. Journal of Management Information 31.4 (2015): 49-87. Web. 12 Feb 2016.
e.) DB Article 2 Citation:
Ravi, Sean, and Sharad Borle. Estimating the Contextual Risk of Data Breach: An
Empirical Approach. Journal of Management Information Systems 32.2 (2015):
314-341. Web. 12 Feb 2016.

Jenika Brown
Assignment 1: Information Literacy

f.) Screen Print #1- The Behavioral Roots of Information Systems Security: Exploring
Key Factors Related to Unethical IT Use

Jenika Brown
Assignment 1: Information Literacy

Screen Print #2- Estimating the Contextual Risk of Data Breach: An Empirical Approach

2. a.) The reader is enlightened about the risks of their personal information being leaked
through the common, fun, and seemingly harmless dating apps that they dont think twice
about installing onto their phone. In Top dating apps are just waiting to be hackedanalysis, it goes into depth about the vulnerability of some of the top dating apps today,
3

Jenika Brown
Assignment 1: Information Literacy

such as one of the apps that were analyzed not having secure communications. This
allows a hacker to easily intercept data being exchanged through the app and the server.
Also, out of the 5 dating apps used for this analysis, not one of them had protection to
prevent unauthorized decompiling. But it doesnt stop there, this article also provides the
reader with snippets of the codes they used for this study that give an example of how
hackers could go about finding and exploiting a code, allowing the readers to gain a
better understanding of how easy it is to find these codes with just the basic knowledge of
coding. This article is wrapped up with some helpful tips for app developers to take in
order to make their apps more secure for users.
b.) Internet Article 1 Citation:
Hong, Min-Pyo. Top Dating Apps Are Just Waiting to Be Hacked-analysis.
VentureBeat.com. Venture Beat, 13 Feb. 2016. Web. 14 Feb 2016.
3. a.) The keywords I used for this search was information and security.
b.) Internet Article 2 Citation
Yadron, Danny. White House Seeks Its First Ever Chief Information Security Officer.
TheGuardian. The Guardian, 9 Feb. 2016. Web. 14 Feb. 2016.
c.) I ran the same search, using the terms information and security on Bing and
Yahoo.
d.)
Bing

Yahoo

Millions of hits
Credible websites were on the top of the

Millions of hits
Good amount of credible sources

search results
4. a.) The article, White House Seeks Its First Ever Chief Information Security Officer
was written on February 9, 2016 and it has not been updated since.
b.) This article relates directly to my topic, Information Security because it addresses the
problem of cyber security in the United States.
4

Jenika Brown
Assignment 1: Information Literacy

c.) The author of this article, Danny Yadron is a credible source and deems qualified to
write on this topic due to his position as a technology reporter for The Guardian in San
Francisco.
d.) The information presented in this article is trustworthy, because it only states facts on
the actions that are being taken currently to stop hackers, as well as the steps that the
White House planned to take.
e.) This article was written to simply inform the reader of the steps being made by the
White House to finally get on top of the problems and loop holes in the nations cyber
security.
5. a.) When it comes to the ease of access for the article provided to me by the CCBC database
and the article founded on the internet, I would naturally say the database was easier by an inch.
The only reason the database beat out the article founded on the internet was simply because it
was easy to filter out an academic journal and I knew that all of the results would be credible, no
need to scroll on endlessly until a credible source came about.
b.) The timeliness for both articles were fine. I would say internet searches are a great way to
find relevant articles, because the most recent articles are usually the first ones to pop up; that
was the case with me. On the other hand, through the database I was able to filter out a timeline
and find an article relevant.
c.) The authority was by far better coming from the journal founded on the database, because it
was a fact that whatever I chose from the results after I filtered my search, would be coming
from an undeniably, credible source. With the internet article I also found authors that were more
than authorized to write what they did on the topic of their article, however a little bit of
background search has to go into that, as far as checking out who the author is and where the
article was published.
5

Você também pode gostar