Anda di halaman 1dari 6

Chinyere Peace Kingdom-Nwankwoala

Information Literacy
June 15, 2016
1.
a) The keywords used are cyber security, and DE "COMPUTER security"
b) The data base used is Education Source.
c) I chose the database because the database provided me with the full text of the Journal.
d) MLA Format.
Works cited
Arlitsch, Kenning1, and Adam2, kenning.arlitsch@montana.edu Edelman. Staying Safe:
Cyber Security For People And Organizations. Journal Of Library Administration 54.1
(2014): 46-56. Education Source. Web 14 June 2016.
e) MLA format.
Works cited
Steinmetz, Kevin1, kfsteinmetz@ksu.edu, and Jurg2, iccjxg@shsu.edu Gerber. It
Doesnt Have To Be This Way: Hacker Perspectives On Privacy. Social Justice 41.3
(2015): 29-51. Education Source. Web. 14 June 2016.

f) Insert a screen print of the search results to show you filtered to only review scholarly
articles Screen Print #1scholarly article #1

Screen Print #2scholarly article #2

2.
a). Alarming rise in ransomware tracked, an article on www.bbc.com talks about a software,
ransomware, that disorganizes or disrupts the data on a persons Personal Computer. This
software request that the person make a payment before the data could be restored. The increase
in this rasomware is supported by the skillful act applied by cyber-thieves in order not to be
caught by security software.
b) MLA format.

Mark, Ward. Alarming rise in rasomware tracked. Technology correspondent, BBC News.
(2016) (n.p): Technology. Web 15 June 2016.
3. a). The keywords used are computer security, and cyber security
b). MLA Format.
Consumer Information: Privacy & Identity. Federal Trade Commission. (n.d) (n.p). Web 15
June, 2016. https://www.consumer.ftc.gov/topics/privacy-identity
c). I used Google chrome, and Internet explorer.
d) Create a table: The internet explorer was better off than the google chrome.
Goggle Chrome

Internet explorer

Results

500,000,000

67,900,000

Time

0.57secs

Any time

Date of publication

Was not displayed at a glance

At a glance. I saw the date of


publication

4.
a) The article was written in June, 7 2016. No it has not been updated.
b) Relevance The article does relate to my topic in the sense that it talked about securing ones
computer from hackers and cyber thieves. The invasion of peoples identity and privacy by cyber
thieves.

c) Authority The author is Mark Ward, a Technology correspondent for BBC News. My
opinion is he is qualified to write about this topic, because he basically writes on IT,
computer and security, and he is well knowledgeable about them, and has written 254 articles
since July

2007.

d) Accurate The information is trustworthy, and it is supported by evidence.


e) Purpose The article was written to inform the general public. The material is objective.
5.
Compare the Internet article 1 and DB article 1 based on the following criteria. Use a separate
paragraph for each criteria.
a) Ease of access
The DB article 1 was readily accessed, unlike the article on the internet where I had to search
critically for a news on technology. The site in the DB article is easy to navigate, with options of
how to return to the home page.
b) Timeliness
The article on the database is a journal that is released quarterly or biannually, whereas the
internet article is published every other day, if not every day.
c) Authority
The DB article has a much better authority because they have authors, and they are affiliated to
an institution, whereas the internet article is not. Also, there was a mailing address of the author
included.

Anda mungkin juga menyukai