You are on page 1of 3

Candice Johnson

September 20, 2015


Assignment 1: Information Literacy

In the article it talks about how security systems in general are not up to the standard they
need to be. There are many people out there that is a victim of being hacked. People are
becoming pros at hacking your information; even the little things such as emails are being
hacked. In addition to the hacking of emails, you now have to watch out for certain malware
what you put on your phones or computer. Certain software that you put on your phone or
computer can gather important information.
When I typed in computer science in both bing and yahoo, they both gave me the same
results. However majority of them wasnt what I was looking for. Another internet article that I
found was called computer security. The article was written September 2011 and had some good
points, it mainly talked about the problems with security but towards the end it, it went from
informative to trying to sell something. Although there is no author, the article is still trustworthy
because it comes from a .gov website. The article was written for a little bit of both, to inform
and to sell.
The database that I used was called smart search. The reason why I used smart search was
because it has more information and the accuracy is perfect. The internet articles are not hard to
find however, the scholarly journals are a little bit harder to find because you have to have a
student id to access them.
The third article that I researched was a scholarly journal from a data base called smart
search. In the article it talks about how security systems in general are not up to the standard they
need to be. So many accounts have been hacked because hackers have come up with a program.
They can access your information such as card numbers, social security numbers etc. Even
though people are being hacked they are doing much better protecting people since the last
Page 1 of 3

Candice Johnson
September 20, 2015
Assignment 1: Information Literacy

couple years. It also talks about major companies such as Target and Neiman Marcus being
hacked and some of the procedures that have to be done if you were hacked.
Both the internet and scholarly journals have some similar information. However one is a
little more detailed than the other. Also some people may have a hard time finding the article or
may not have access to them. In addition one of the articles expire within a couple of days.

Work Cited
"Computer Security | OnGuard Online." Computer Security | OnGuard Online.
N.p., Sept. 2011. Web. 20 Sept. 2015.
Grime, Roger A. "10 Years On: 5 Big Changes to Computer Security."
InfoWorld. N.p., 18 Aug. 2015. Web. 20 Sept. 2015.
"Introduction to Computer Security." Introduction to Computer Security. N.p.,
Sept. 2015. Web. 20 Sept. 2015.
"Computer Security." Podiatry Management 34.7 (2015): 16-18 2p. CINAHL Complete. Web. 20 Sept. 2015

Arlitsch, Kenning1, and Adam2, kenning.arlitsch@montana.edu Edelman.


"Staying Safe: Cyber Security For People And Organizations." Journal Of Library
Administration 54.1 (2014): 46-56. Education Source. Web. 20 Sep. 2015.

Page 2 of 3

Candice Johnson
September 20, 2015
Assignment 1: Information Literacy

Page 3 of 3

You might also like