You are on page 1of 7

HANSEL WEI

Final Draft (Edited)


UWRT-1104-29

ANNOTATED BIBLIOGRAPHY

PURPOSE: What is the importance of privacy vs security in context of social media,


censorship, and cybersecurity in the modern world of technology?
SOURCE

ANNOTATION

THOUGHTS/CONNECTI
ONS

Remarks by the president on


securing our nations Cyber
infrastructure," in The White House,
whitehouse.gov, 2010. [Online].
Available:
https://www.whitehouse.gov/thepress-office/remarks-presidentsecuring-our-nations-cyberinfrastructure. Accessed: Jun. 16,
2016.

The internet is
now known as
the backbone
that underpins a
prosperous
economy and a
strong military
and an open and
efficient
government
according to the
U.S. president
Barack Obama.
Bank accounts,
trade, art, music,
and news have
been more
effective than
before due to the
speed of the
internet and
telecommunicati
ons; however,
this causes the
continuity of the
same historic
problems
threats, war, and
terrorism.

Now that the world now


is more connected than
ever, it has changed the
definition of security and
privacy. Faster, more
efficient communications
have led to the growth of
securing these messages
in times of diplomacy,
but wars are now
changed due to how the
communications of
uprisings and warfare are
fought. Constantly,
everyone is using
technology and are at
potential risk of being
monitored and hacked.

R. Editorial, "Social media: A doubleedged sword in Syria," Reuters, 2011.


[Online]. Available:
http://www.reuters.com/article/ussyria-social-mediaidUSTRE76C3DB20110713. Accessed:
Dec. 15, 2016.

Using the
internet in
modern
technologies
propaganda is
simple. Assad
along with the

Propaganda is a form of
social engineering which
in modern days can be a
double edged sword. It
can be used as a tool to
push governments to take
action or surpass its

S. M. Bellovin "The Government and


Cybersecurity." Security & Privacy,
vol. 7, no. 2, pp. 96-96, Jan. 2006. [EBook].

Syrian
government
created
Instagram,
Twitter, and
YouTube to show
the glorified
Syrian state and
decorated
military.
In addition, social
media is being
used to censor
the media in by
discrediting
genuine facts
and footage.

citizens

Most people in
the US, assume
that the
government or
law enforcement
should take
control beyond
self-governance
like looking out
for your
neighbors and
yourself such as
houses are
protected with
locks and if a key
is left in a car.
However,
criminal behavior
has extended to
the internet
rather than just
private property,
it has extended
to intellectual
property.
Counter
hacking is
seemingly

The author raises


awareness that there may
be a debate if there
should be more stringent
laws in place assuming
that people already look
for law. People are not
likely to discuss these
matters or even pay
attention to them. Raising
awareness that this is
actually an issue of
infringing human rights to
privacy is often dismissed
with a shrug until the
person becomes the
victim of a cybercrime
which is extremely likely.
On the other side of the
story is where other
governments are the ones
gathering information
which is used

increasingly hard
because the
location of the
hacker might be
faked. In
addition,
countless
hacking behavior
is done in more
complex manner
by nation-states
and foreign
governments.
Since reality is
much different
from cyberspace,
which is
supposedly a
neutral
environment
between
governments,
there is a huge
disconnect in the
laws that govern
that region;
theres no 12mile limit in
cyberspace.
N. E. Bowie and K. Jamal, "Privacy
Rights on the Internet: SelfRegulation or Government
Regulation?," Business Ethics
Quarterly, vol. 16, no. 3, pp. 323
342, Jul. 2006. [Online]. Available:
https://www.cambridge.org/core/articl
e/div-class-title-privacy-rights-on-theinternet-self-regulation-orgovernment-regulationdiv/82470263C7CB422ECC0A51FDB6
37A247.

S. Phillips and Samsung Business


USA, "The Mobile Aware CISO:
Security as a Business Enabler,"
2015. [Online]. Available:

Privacy on the
internet and the
use of
technology is
viewed at a
philosophical and
ethical level.

Sam Phillips spoke


at the UNCC
symposium about
the uniqueness of

Especially for mobile


devices we carry around,
we must be self-aware of
the capabilities and what

http://www.slideshare.net/SamsungB
usinessUSA/the-mobile-aware-cisosecurity-as-a-business-enabler.
Accessed: Dec. 15, 2016.

security when it
comes to mobility
and devices that
deals with
mobility. Speaking
in context of
simplifying,
connecting,
innovating, and
transforming. He
gave an anecdote
during his
presentation
about his wife
lecturing him
about getting
more exercise.
She found out
through his
smartwatch laying
on the table which
inevitably reveals
sensitive health
information up to
the time of day of
an activity. In
addition he gives
an example on
how mobility and
confidentiality has
worked in a
cohesive way with
the example of
airline boarding
passes being
digital with instant
changes in
detailed
information.
Rewards cards,
location
awareness, and
other retail apps
have driven
consumers to
quick access to
complex services

information is left on there


in case we loose our
device. Since security on
smartwatches and fitness
bands are weak, one must
think on what health
information we should
share. One must consider
how location is being used
to track our movements
and how potentially a
hacker can come between
these services.

for less.
R. Kazanciyan, "Hunting in the dark UNC Cybersecurity symposium
2016," in Hunting in the Dark,
Speaker Deck, 2016. [Online].
Available:
https://speakerdeck.com/ryankaz/hun
ting-in-the-dark-unc-cybersecuritysymposium-2016. Accessed: Dec. 15,
2016.

Ryan Kazanciyan
is the Chief
Security
Architect for
Tantium and is
also a technical
writer for the
famous hacking
TV series Mr.
Robot and even
confirmed the
possibility of
season 4. In his
presentation
Hunting in the
Dark He
describes on a
technical level,
the tactics
hackers use to
gain access to
information and
how analysts
combat the
noise of a lot of
information to
identify threats.
Separating the
logistics of how
attackers

L. F. Cranor, "Whats wrong with your


pa$$w0rd?," Google+, 2014.
[Online]. Available:
https://www.ted.com/talks/lorrie_faith
_cranor_what_s_wrong_with_your_pa_
w0rd. Accessed: Dec. 15, 2016.

This ted talk


explored the
importance and
simplicity to
create simple,
yet complex
passwords that
are easily
remembered:
Lorrie Faith
Cranor studied
thousands of real
passwords to
figure out the
surprising, very

common
mistakes that
users and
secured sites
make to
compromise
security. And
how, you may
ask, did she
study thousands
of real passwords
without
compromising
the security of
any users? That's
a story in itself.
It's secret data
worth knowing,
especially if your
password is
123456 ...
J. Lyne, "Everyday cybercrime and
what you can do about it," Google+,
2013. [Online]. Available:
https://www.ted.com/talks/james_lyne
_everyday_cybercrime_and_what_you
_can_do_about_it#t-81545. Accessed:
Dec. 15, 2016.

This Ted Talk


speaker explores
the viewpoints of
cybercriminals
and what a cyber
experts look like
and how
malicious code
target our daily
lives, he asks
How do you pick
up a malicious
online virus, the
kind of malware
that snoops on
your data and
taps your bank
account? Often,
it's through
simple things
you do each day
without thinking
twice. James
Lyne reminds us
that it's not only
the NSA that's

watching us, but


ever-moresophisticated
cybercriminals,
who exploit both
weak code and
trusting human
nature.

You might also like