You are on page 1of 4

CSIT Assignment 1, Kunning Zhang

1

Kunning Zhang
Paulette Comet
CSIT 101
21 September 2014

1. Article Name: Security: Users show more paranoia than practical skills
2. Summarizing
Earlier this year, Kapersky Labs released a survey which paid attention to protection of
digital identity and privacy, valuable financial and personal data in the modern internet. In
the survey, 58 percent of respondents were concerned their personal data may be stolen. 75
percent of respondents believe that banks, payment system and online stores should provide
them with special solutions for secure transactions on their endpoints. The fact are a number
of vendors likes Apple, LinkedIn, Facebook are starting to offer or require users to use two-
factor (2FA) or multifactor authentication (MFA), and Google , Twitter, and Salesforce
establish an organization of vendors and companies called the FIDO Alliance to move
security closer to the everyday actions and applications of computer and device users.
3. Two additional internet articles on the same topic
Google: Sweeping security law would have computer users surrender privacy
Bing: Security Awareness Training for a Computer User
Google got about 61,800,000 results in 0.35 seconds, Bing got 60,000,000 results. In the
first page of Bing result, there were some results from Microsoft.com; however I couldnt
find these results at first result page of google. Both search engines are great, because almost
results were focusing on teaching home computer users how to protect their privacy.
CSIT Assignment 1, Kunning Zhang

2

4. TRAAP the sources
Evaluating the article Security Awareness Training for a Computer User (found in Bing).
1) Time: April 14, 2010. It has not been undated since it was posted.
2) Relevance: Yes, it relates to my topic.
3) Authority: The author is Tara Duggan, who is eHow Contributor. She is qualified to
write about this topic. I know that from her biography that is posted on eHow
website.
4) Accurate: This article is trustworthy. Its an advice that demonstrates people how to
use computer network safety.
5) Purpose: The articles purposes are demonstrate users understand, comply with
security policies and procedures before they can access systems, and prevent errors
and information technology vulnerabilities.
5. Two scholarly journal articles on the same topic from the CCBC library database
Two scholarly journal articles: Security and Privacy Enhancing for Dynamic Groups in the
Cloud Using Batch Auditing, and Electronic Security Issues: Protecting our Electronic Life
from Social Engineering Attacks.
Keyword: computer privacy
I used EBSCO HOST to find these two academic journals, because this database focuses on
Science/technology articles.
6. Compare the internet and journal articles
First, Internet articles are easy to find by searching engines, but its difficult to find
journal articles by common searching engines. I must access to librarys data base as student
ID to find them. Second, the internet articles almost are latest; however I can find the journal
CSIT Assignment 1, Kunning Zhang

3

articles which were publicized on 1994. Last but not least, I can figure out the authority for
both kinds of articles, but journal articles are more scholarly. Each journal articles state
source, author affiliations, and subjects.
















CSIT Assignment 1, Kunning Zhang

4

Work Cited
Duggan, Tara. "Security Awareness Training for a Computer User." EHow. Demand Media, 14
Apr. 2010. Web. 22 Sept. 2014.
Fontana, John. "Security: Users Show More Paranoia than Practical Skills | ZDNet." ZDNet.
ZDNet, 17 Sept. 2014. Web. 22 Sept. 2014.
Hardy, Keiran. "Sweeping Security Law Would Have Computer Users Surrender
Privacy." Sweeping Security Law Would Have Computer Users Surrender Privacy. Phys,
18 Sept. 2014. Web. 22 Sept. 2014.
Onwudebelu, Ugochukwu. "Electronic Security Issues: Protecting Our Electronic Life From
Social Engineering Attacks." International Journal of Advanced Research In Computer
Science 3.4 (2012): 1-7. Science Full Text Select (H.W. Wilson). Web. 22 Sept. 2014.
Selvan,Tamil. "Security And Privacy Enhancing For Dynamic Groups In The Cloud Using
Batch Auditing." International Journal of Advanced Research In Computer Science 4.10
(2013): 154-156. Science Full Text Select (H.W. Wilson). Web. 22 Sept. 2014.

You might also like