You are on page 1of 4

Eli Frenkel

Assignment 1: Information Literacy

7/25/16
CSIT 101

1)
a) The keywords I used to find the articles were online security and privacy.
b) The database used was the ProQuest science and technology database.
c) because I figured that it would be more specific to the kind of articles that I was
looking for.
d) Article 1 (APA Format)
Benassi, P. (1999). TRUSTe: An online privacy seal program. Association for Computing
Machinery.Communications of the ACM, 42(2), 56-59. Retrieved from
http://ccbcmd.idm.oclc.org/login?
url=http://search.proquest.com.ccbcmd.idm.oclc.org/docview/237053938?
accountid=3784 accessed 7/25/16
e) Article 2 (APA Format)
Ghosh, A. K., & Swaminatha, T. M. (2001). Software security and privacy risks in mobile
e-commerce. Association for Computing Machinery.Communications of the ACM,
44(2), 51-57. Retrieved from http://ccbcmd.idm.oclc.org/login?
url=http://search.proquest.com.ccbcmd.idm.oclc.org/docview/237041051?

accountid=3784 accessed 7/25/16


f)
1

Eli Frenkel
Assignment 1: Information Literacy

7/25/16
CSIT 101

Article #1

Article #2

2.
2

Eli Frenkel
7/25/16
Assignment 1: Information Literacy
CSIT 101
a) Extreme online security measures to protect your digital privacy a
guide
The article discusses a few ways to protect your online presence. A few of
them are; using a virtual environment on instead of your usual machine in case of
viruses you can easily protect and reset the environment. Another method of
protection is using VPN or a virtual private network so that you can tunnel past your
ISP or if youre using an open network to stay anonymous. Setting your router to not
transmit your SSID is another method to protect against outside entry so that only
those who know the name can access your network.
b) Internet Article 1 (MLA format)
Graham-Smith, Darien. "Extreme Online Security Measures to Protect Your Digital
Privacy a Guide." The Guardian. Guardian News and Media, 03 July 2016. Web. 25
July 2016.
3.
a) The keywords I used in my search were online security privacy.
b) Internet Article 2 (MLA format)
Paul, Ian. "3 Essential Techniques to Protect Your Online Privacy." PCWorld. IDG
Consumer & SMB, 9 Oct. 2013. Web. 25 July 2016.
c) The search engines I used were google.com and bing.com.
d)
Search Engines
# of results
Accurate results

Google
335,000,000
Results much more
relevant to what I was
looking for than Bing

Format
Ads

Very similar to Bing


None with Adblock on

Preferred

Google the results were


exactly what I was looking
for.

4)

Bing
552,000,000
Results were all from
different government and
companies. Not really
from news sources.
Very similar to Google
Way too many ads on top
of the results and the side

a) Time: The article was written July 3rd 2016. The article has not been

updated since publication.


b) Relevance: The article related to the topic of online privacy and security.
3

Eli Frenkel
7/25/16
Assignment 1: Information Literacy
CSIT 101
c) Authority: The author is Darien Graham-Smith. I dont know how qualified
he is to write up on this topic but from his Wikipedia page (not a very reliable
source) it appears he has contributed journalistically, quite a bit in the field of
technology.
d) Accuracy: The information is trustworthy as most of the advice is common
sense as well as being mentioned in quite a few articles Ive read. I also implement
a lot of the articles measures myself.
e) Purpose: The purpose of the article is to inform the reader of the dangers
of not implementing these security measures and the importance of being secured
and protected. It is a very objective and unbiased article.

You might also like