Está en la página 1de 3

Oladele Awolusi

Information Literacy assignment


Oladele Awolusi
CSIT 101 E2A
Assignment 1: Information Literacy
1. I used the keyword privacy to find a current article.
2. The article in from the New York Times starts off with a description of a recent meeting of the tech
industrys biggest executives. This meeting included Tim Cook CEO of Apple and Obamas top national
security officials discussing data encryption of consumer products and the need for law enforcement to
have access to said data for investigation. The rest of the article talks about how apple in particular and
Silicon Valley in general are trying to show they do not agree with the governments privacy infringement
actions. This issue has become a major problem between the government and American tech firms since
the NSA privacy breach revealed by Edward Snowden. The article ends with speculating on a rift forming
between American Tech firms and the government law enforcement.
3. I used the keyword like privacy, Apple and encryption. I used Bing and Yahoo search engines to find 2
more articles. The Bing Search engine was faster and provided more links than the yahoo.
4. TRAAP
FBI tells Apple, Google their privacy efforts could hamstring investigations article from
CNN.com

It was written 12/10/2014. It was updated but Im not sure when.


It was relevant to the first article I found. It predicted the very situation of my first article.
The authors are Pamela Brown and Evan Perez. Both are justice correspondents for several media

outlets.
The article paraphrase the Director of the FBI as well reference several legal battle between the

government and GOOGLE.


The main purpose of the article was to inform about the concerns of law enforcement and data
encryption of consumer products.

Oladele Awolusi
Information Literacy assignment
5. I used the keywords privacy, encryption, cellphone and computing privacy to find the journals. I used
ProQuest computing database. I choose that particular database due to its main subject matter of
computing.

6. The internet articles was much easier to find. With the use of a few keywords
articles of interest came up first. The journal article was much difficult to access.
Also finding a journal takes much more time especially if you use vague keywords
and looking through each one to find exactly what you need. Both article and
journal are from accredited sources.

Works Cited using APA formating


Barret, B. (2016, February 24). "The Apple-FBI Fight Isnt About Privacy vs. Security.
Dont Be Misled.". Retrieved from Wired.com:
http://www.wired.com/2016/02/apple-fbi-privacy-security/

Oladele Awolusi
Information Literacy assignment
Jacob T. Biehl, E. G. (2013). When privacy and utility are in harmony: towards better
design of presence technologies. Personal and Ubiquitous Computing, 50318.
Michael D. Shear, K. B. (2016, February 26). "Apples Privacy Fight Tests
Relationship With White House." . Retrieved from The New York Times:
http://www.nytimes.com/2016/02/27/technology/apples-privacy-fight-testsrelationship-with-white-house.html
Pamela Brown, E. P. (2014, October 12). "FBI Concerned about Apple, Google
Encryption.". Retrieved from CNN:
http://www.cnn.com/2014/09/25/politics/fbi-apple-google-privacy/index.html
Xiong, J. F. (2014). A full lifecycle privacy protection scheme for sensitive data in
cloud computing. Peer-to-Peer Networking and Applications , 1025-1037.

También podría gustarte