Information Literacy
June 15, 2016
1.
a) The keywords used are cyber security, and DE "COMPUTER security"
b) The data base used is Education Source.
c) I chose the database because the database provided me with the full text of the Journal.
d) MLA Format.
Works cited
Arlitsch, Kenning1, and Adam2, kenning.arlitsch@montana.edu Edelman. Staying Safe:
Cyber Security For People And Organizations. Journal Of Library Administration 54.1
(2014): 46-56. Education Source. Web 14 June 2016.
e) MLA format.
Works cited
Steinmetz, Kevin1, kfsteinmetz@ksu.edu, and Jurg2, iccjxg@shsu.edu Gerber. It
Doesnt Have To Be This Way: Hacker Perspectives On Privacy. Social Justice 41.3
(2015): 29-51. Education Source. Web. 14 June 2016.
f) Insert a screen print of the search results to show you filtered to only review scholarly
articles Screen Print #1scholarly article #1
2.
a). Alarming rise in ransomware tracked, an article on www.bbc.com talks about a software,
ransomware, that disorganizes or disrupts the data on a persons Personal Computer. This
software request that the person make a payment before the data could be restored. The increase
in this rasomware is supported by the skillful act applied by cyber-thieves in order not to be
caught by security software.
b) MLA format.
Mark, Ward. Alarming rise in rasomware tracked. Technology correspondent, BBC News.
(2016) (n.p): Technology. Web 15 June 2016.
3. a). The keywords used are computer security, and cyber security
b). MLA Format.
Consumer Information: Privacy & Identity. Federal Trade Commission. (n.d) (n.p). Web 15
June, 2016. https://www.consumer.ftc.gov/topics/privacy-identity
c). I used Google chrome, and Internet explorer.
d) Create a table: The internet explorer was better off than the google chrome.
Goggle Chrome
Internet explorer
Results
500,000,000
67,900,000
Time
0.57secs
Any time
Date of publication
4.
a) The article was written in June, 7 2016. No it has not been updated.
b) Relevance The article does relate to my topic in the sense that it talked about securing ones
computer from hackers and cyber thieves. The invasion of peoples identity and privacy by cyber
thieves.
c) Authority The author is Mark Ward, a Technology correspondent for BBC News. My
opinion is he is qualified to write about this topic, because he basically writes on IT,
computer and security, and he is well knowledgeable about them, and has written 254 articles
since July
2007.