You are on page 1of 6

Jaime Quansah

CSIT 101: assignment information literacy


Prof.Fred Bartlett
9/19/2015

Assignment 1: information Literacy

1)
a) The keywords I used to find this article was iPhone securityand
cellphone hack.
b) The database I used was ScienceDirect for both articles.
c)I chose this database because it sounded more credible and straight
forward.
d) Murphy, Hilary Catherine, Meng-Mei Chen, and Mathieu Cossutta. "An
Investigation Of Multiple Devices And Information Sources Used In The Hotel
Booking Process." Tourism Management 52.(2016): 44-51. ScienceDirect. Web. 16
Sept. 2015.
e) Chen, P. S., Lin, S., & Sun, C. (2015). Simple and effective method for
detecting abnormal internet behaviors of mobile devices. Information Sciences,
321(Security and privacy information technologies and applications for wireless
pervasive computing environments), 193-204. doi:10.1016/j.ins.2015.04.035

Jaime Quansah
CSIT 101: assignment information literacy
Prof.Fred Bartlett
9/19/2015
f)

Jaime Quansah
CSIT 101: assignment information literacy
Prof.Fred Bartlett
9/19/2015
g)

2)

Jaime Quansah
CSIT 101: assignment information literacy
Prof.Fred Bartlett
9/19/2015
a) with apple unveiling ios 9 and the new iphone 6s many people are eager
for an upgrade. Some individuals could care less about the new color of theiphone
6s, they are rather worried about the security upgrade. In thebarticle six digit
passcodes: it informs us of how Apple are planning on upgrading their four digit
passcode to a six digit passcode. it will now be harder to break in to the iphone. The
possible combinations to break in to the iphone have now increased.
b) Barlow, Caleb. "Six-Digit Passcodes: Two Small Steps for Smartphones, One Giant

Leap for Mobile Security." Security Intelligence. 10 Sept. 2015. Web. 19 Sept. 2015.
3)
a) the keyword I used was smartphone banking security concerns
b) "Technology Is Changing the Banking Industry, One Smartphone at a Time - One Call
Now." One Call Now. 14 Sept. 2015. Web. 19 Sept. 2015.
c) the two different search engines I used were google and bing
d)
Questions
why

google
I use Google often and has

bing
Felt as if it wouldnt find my

how

more recent articles


I searched for latest in the last

results
I searched my keyword and

month and multiple accurate

many irrelevant sources

sources appeared
Google was by far the better

appeared
While using bing it took me a

How

search engine I had millions of while to find good sources to

Jaime Quansah
CSIT 101: assignment information literacy
Prof.Fred Bartlett
9/19/2015

great recent sources to view

select

4)
a) Time- it was written on September 1, 2015 and has not been updated.
b) relevance-yes it relates to my topic of phone sercurity
c) Authority- the author of the article is Kevin Beaver, a qualified independent
information security consultant.
d)Accurate- the information is trust worthy and is supported by evidence and quotes.
e) Purpose- it was written to inform people the dangers of disregarding smartphone
security. The material is objective because now in days hackers can get into any type of info and
ruin an individuals life.
5)
a) The database article was simpler to use compared to the internet article because
everything was right there in a paragraph or two. The internet article was pretty clear but not as
straight forward as the database article.
b) When it came to timeliness the internet source takes the win. The article on the internet
was more recent than the database. The article was just approximately 2 weeks old.
c) the internet article came from a more credible and qualified author whose career is
based off this topic.

Jaime Quansah
CSIT 101: assignment information literacy
Prof.Fred Bartlett
9/19/2015

You might also like