You are on page 1of 2

Information Literacy Assignment

Gregory Franklin
1

2. Write a paragraph summarizing the article
The article I read was titled, Privacy under attack, but does anyone care? , and It
was about how Americans are oblivious to the fact that the government and everyday
people in general are evading the average Americans privacy all the time. Whether it is
cameras in a bathroom or someone tapping in to your phone and retrieving secretive
information we all have probably been violated. And the article says to be more aware of
your surroundings and to put extra locks in your phone and to also backup your
electronics. Americans should demand privacy so we need to speak up and protest, and
there are not a lot of places to hide so pick and choose wisely.
3.
Keywords- Current event articles, Privacy, CNN
Search engines- Google, Yahoo
Google was faster and easier to use because of my familiarity with it and it gave me more
results about 510,000,000 in about .23 seconds, yahoo was 500,000,000 in .60 sec.


4. TRAAP your sources.

1. Time- Sept. 18, 2014 | 2:02 p.m. No it has not been updated.
2. Relevance- Yes, it relates to my topic of privacy because it talks about how Apple
vows privacy for iOS 8 and the new iPhone 6. Yes, it answers my question about
how to keep my phone more private.
3. Authority- The author is Tom Risen. It does not give you any background
information on this author; therefore it is hard to say if he is qualified to write
about this topic.
4. Accurate- Yes, this information is trustworthy because Tom Risen is a reporter for
the U.S. News & World Report and it is a national website. There is no evidence
supporting this information. No, it was not tested for accuracy, but it seems very
accurate due to the fact that multiple websites say the same thing, like NBC and
CNN.
5. Purpose- This article was written to inform readers about the privacy policy for
iOS 8 and the iPhone 6. This article is objective because he quotes the CEO of
Apple, Tim Cook, to get his information.









Information Literacy Assignment
Gregory Franklin
2


5.Keywords- Piracy, Articles, Current Event
Database: Business Source Premier Publications
I used that database because of my prior experience with it in another class it felt like
second nature.






6. The first internet article I found was actually pretty easy compared to the ccbc
article because the internet article is as simple as typing it on Google. The Internet
article took less time to find because again its something I do all the time the ccbc
database in not as familiar. The ccbc database journal article seemed it was more
bias towards the topic because he is just a random writer the Internet author is a
reporter for a nationally known site.

7. MLA

Blanger, France, and Robert E. Crossler. "Privacy In The Digital Age: A Review Of
Information Privacy Research In Information Systems." MIS Quarterly 35.4 (2011):
1017-A36. Business Source Premier. Web. 21 Sept. 2014.

Sullivan, Bob. "Privacy under Attack, but Does Anybody Care?" Msnbc.com. NBC
News, 6 Sept. 2014. Web. 18 Sept. 2014.

DARIES, JON P., et al. "Privacy, Anonymity, And Big Data In The Social Sciences."
Communications Of The ACM 57.9 (2014): 56-63. Business Source Premier. Web. 21
Sept. 2014.

Liptak, Adam. "Challenging the Privacy of Statements Made During Jury Deliberations."
The New York Times. The New York Times, 15 Sept. 2014. Web. 21 Sept. 2014.

Risen, Tom . "Apple Vows Privacy for iOS 8, iPhone 6." US News. U.S.News & World
Report, 18 Sept. 2014. Web. 21 Sept. 2014.

You might also like