Professional Documents
Culture Documents
1)
a) The keywords I used to find this article was iPhone securityand
cellphone hack.
b) The database I used was ScienceDirect for both articles.
c)I chose this database because it sounded more credible and straight
forward.
d) Murphy, Hilary Catherine, Meng-Mei Chen, and Mathieu Cossutta. "An
Investigation Of Multiple Devices And Information Sources Used In The Hotel
Booking Process." Tourism Management 52.(2016): 44-51. ScienceDirect. Web. 16
Sept. 2015.
e) Chen, P. S., Lin, S., & Sun, C. (2015). Simple and effective method for
detecting abnormal internet behaviors of mobile devices. Information Sciences,
321(Security and privacy information technologies and applications for wireless
pervasive computing environments), 193-204. doi:10.1016/j.ins.2015.04.035
Jaime Quansah
CSIT 101: assignment information literacy
Prof.Fred Bartlett
9/19/2015
f)
Jaime Quansah
CSIT 101: assignment information literacy
Prof.Fred Bartlett
9/19/2015
g)
2)
Jaime Quansah
CSIT 101: assignment information literacy
Prof.Fred Bartlett
9/19/2015
a) with apple unveiling ios 9 and the new iphone 6s many people are eager
for an upgrade. Some individuals could care less about the new color of theiphone
6s, they are rather worried about the security upgrade. In thebarticle six digit
passcodes: it informs us of how Apple are planning on upgrading their four digit
passcode to a six digit passcode. it will now be harder to break in to the iphone. The
possible combinations to break in to the iphone have now increased.
b) Barlow, Caleb. "Six-Digit Passcodes: Two Small Steps for Smartphones, One Giant
Leap for Mobile Security." Security Intelligence. 10 Sept. 2015. Web. 19 Sept. 2015.
3)
a) the keyword I used was smartphone banking security concerns
b) "Technology Is Changing the Banking Industry, One Smartphone at a Time - One Call
Now." One Call Now. 14 Sept. 2015. Web. 19 Sept. 2015.
c) the two different search engines I used were google and bing
d)
Questions
why
google
I use Google often and has
bing
Felt as if it wouldnt find my
how
results
I searched my keyword and
sources appeared
Google was by far the better
appeared
While using bing it took me a
How
Jaime Quansah
CSIT 101: assignment information literacy
Prof.Fred Bartlett
9/19/2015
select
4)
a) Time- it was written on September 1, 2015 and has not been updated.
b) relevance-yes it relates to my topic of phone sercurity
c) Authority- the author of the article is Kevin Beaver, a qualified independent
information security consultant.
d)Accurate- the information is trust worthy and is supported by evidence and quotes.
e) Purpose- it was written to inform people the dangers of disregarding smartphone
security. The material is objective because now in days hackers can get into any type of info and
ruin an individuals life.
5)
a) The database article was simpler to use compared to the internet article because
everything was right there in a paragraph or two. The internet article was pretty clear but not as
straight forward as the database article.
b) When it came to timeliness the internet source takes the win. The article on the internet
was more recent than the database. The article was just approximately 2 weeks old.
c) the internet article came from a more credible and qualified author whose career is
based off this topic.
Jaime Quansah
CSIT 101: assignment information literacy
Prof.Fred Bartlett
9/19/2015