You are on page 1of 4

Mobile Security

Nida Salim
CSIT 101 MWF
1. Summarizing the article.
The internet article by Matthew Panzarino, !!le"# Tim Coo$ %oe# Some Security Strai&ht
Tal$in&' i# about a letter that Tim Coo$ !o#ted announcin& a new #ecurity !a&e( !!le i#
!ubli#hin& a web#ite to e)!lain how they ta$e care o* !er#onal in*ormation+ what they collect
and don"t collect( Tim Coo$ #tate# in hi# letter that they ha,e ne,er wor$ed with any
&o,ernment a&ency and that !!le"# em!loyee# ma$e !roduct# to a**ect the li,e# o* million#(
They are not -u#t there *or the !aychec$, yet all they want i# to ma$e an im!act( The article i#
mainly about the new #ecurity !a&e and that we #hould be mind*ul when it come# to #ecurity
and !ri,acy and how we #hare our !er#onal in*ormation(
2. Two additional Internet articles on the same topic.
The #earch en&ine# I u#ed were .in& and %uc$duc$&o( .oth en&ine# indicated i* I had ,i#ited
the lin$ be*ore( .in& howe,er, !ro,ided me with related #earche#' on the ri&ht #ide o* the
!a&e, yet duc$duc$&o did not ha,e any ad# on the #ide# or on to! o* the !a&e( %uc$duc$&o"#
*ir#t #earch lin$ &a,e me the lin$ I wa# loo$in& *or while on .in&, I had to #croll down to *ind
what I wa# #earchin&(

3. TRAAP sources.
Time /The article wa# written on Se!tember, 10, 1012 and ha#n"t been u!dated #ince then(
3ele,ance / The article clearly relate# to my to!ic, mobile #ecurity and an#wer# 4ue#tion#
about the !!le iPhone# #ecurity a# well(
1
Mobile Security
Nida Salim
CSIT 101 MWF
uthority / The author o* the article i# imee Chanthada,on&, who &ot her de&ree in
-ournali#m and i# a tech -ournali#t with 5%net(
ccurate / The in*ormation i# accurate becau#e it"# on a web#ite called 5%net, which i# a
bu#ine## technolo&y new# web#ite !ubli#hed by C.S interacti,e and Techre!ublic( The article
wa# written by a -ournali#t who #u!!orted her wor$ with *act#(
Pur!o#e / The !ur!o#e o* the article wa# to in*orm the audience and wa# unbia#ed becau#e it
re!re#ented *act# not o!inion(
4. Two scholarly ournal articles !rom the ""#" li$rary data$ases.
The $eyword# I u#ed to *ind the two article# were Mobile Security' and !!le iPhone#
#ecurity'( The databa#e I u#ed wa# cademic 6neFile *rom rticle# 7 3e#earch %ataba#e#(
The -ournal article !ro,ide# the author, #ource and co!yri&ht(
%. "omparing the Internet and &ournal articles.
The internet article# were ,ery ea#y to acce##( I *ound #o many di**erent o!tion# to choo#e *rom
that I could actually rely on( The internet article# were recent but the -ournal article# were
really old, where mo#t o* them did not include the author"# name( 6ne thin& I li$ed about the
-ournal article# wa# that it !ro,ided #ource citation# at the bottom o* the !a&e( .oth internet
and -ournal article# were *ull8te)t article#( It too$ a while to *ind article# related to my to!ic on
CC.C library databa#e# becau#e the web#ite ha#n"t been u!dated(
'. ()A !ormat.
1
Mobile Security
Nida Salim
CSIT 101 MWF
*or+ "ited

Panzarino, Matthew( 9!!le"# Tim Coo$ %oe# Some Security Strai&ht Tal$in& : hhiuh
TechCrunch(9 TechCrunch( Matthew Panzarino, 12 Se!t( 1012( Web( 10 Se!t( 1012(
Chanthada,on&, imee( 9!!le Protectin& Cu#tomer Pri,acy *rom ;o,ernment 3e4ue#t# :
-&-uh&5%Net(9 ZDNet( imee Chanthada,on&, 10 Se!t( 1012( Web( 10 Se!t( 1012(
Seltzer, <arry( 9The !!le Phi#h re Flyin& : 5%Net(9 ZDNet( <arry Seltzer, 1= Se!t( 1012(
hhiuh Web( 10 Se!t( 1012(
9!!le># data collection !ractice# #crutinized(9 Information Management Journal ?uly8u&(
hhiuh 1011@ 10( Academic OneFile( Web( 10 Se!t( 1012(
Aolbroo$, Bmily( 9Mobile a!!# and hidden ri#$#(9 Risk Management ?uly8u&( 1011@
hhiuh CD( Academic OneFile( Web( 10 Se!t( 1012(



E
Mobile Security
Nida Salim
CSIT 101 MWF



2

You might also like