You are on page 1of 4

HANSEL WEI

UWRT-1104-29

ANNOTATED BIBLIOGRAPHY Draft

PURPOSE: What is the importance of privacy vs security in context of social media, censorship,
and cybersecurity in the modern world of technology?
SOURCE

ANNOTATION

THOUGHTS/CONNEC
TIONS

Obama, B. (2009, May 29).


Remarks by the President on
Securing Our Nation's Cyber
Infrastructure. Retrieved
September 20, 2016, from
https://www.whitehouse.gov/the
-press-office/remarkspresident-securing-our-nationscyber-infrastructure

The internet is now known


as the backbone that
underpins a prosperous
economy and a strong
military and an open and
efficient government
according to the U.S.
president Barack Obama.
Bank accounts, trade, art,
music, and news have been
more effective than before
due to the speed of the
internet and
telecommunications;
however, this causes the
continuity of the same
historic problemsthreats,
war, and terrorism.

Now that the world now


is more connected than
ever, it has changed the
definition of security
and privacy. Faster,
more efficient
communications have
led to the growth of
securing these
messages in times of
diplomacy, but wars are
now changed due to
how the
communications of
uprisings and warfare
are fought. Constantly,
everyone is using
technology and are at
potential risk of being
monitored and hacked.

Social Media: A double-edged


sword in Syria. (2011).
Retrieved September 20, 2016,
from
http://www.reuters.com/article/u
s-syria-social-mediaidUSTRE76C3DB20110713

Using the internet in


modern technologies
propaganda is simple.
Assad along with the Syrian
government created
Instagram, Twitter, and
YouTube to show the
glorified Syrian state and
decorated military.
In addition, social media is
being used to censor the
media in by discrediting

Propaganda is a form of
social engineering which
in modern days can be a
double edged sword. It
can be used as a tool to
push governments to
take action or surpass its
citizens

genuine facts and footage.


Bellovin, S. M. (January 01,
2009). The Government and
Cybersecurity. Ieee Security &
Privacy, 7, 2, 96-96.

Most people in the US,


assume that the
government or law
enforcement should take
control beyond selfgovernance like looking out
for your neighbors and
yourself such as houses
are protected with locks
and if a key is left in a car.
However, criminal behavior
has extended to the internet
rather than just private
property, it has extended to
intellectual property.
Counter hacking is
seemingly increasingly hard
because the location of the
hacker might be faked. In
addition, countless hacking
behavior is done in more
complex manner by nationstates and foreign
governments. Since reality
is much different from
cyberspace, which is
supposedly a neutral
environment between
governments, there is a
huge disconnect in the laws
that govern that region;
theres no 12-mile limit in
cyberspace.

Bowie, N. E., & Jamal, K.


(January 01, 2006). Privacy
Rights On The Internet.
Business Ethics Quarterly, 16,
3, 323-342.

Privacy on the internet and


the use of technology is
viewed at a philosophical
and ethical level.

Sam Phillips, 2015. The Mobile

Sam Phillips spoke at the

The author raises


awareness that there
may be a debate if there
should be more stringent
laws in place assuming
that people already look
for law. People are not
likely to discuss these
matters or even pay
attention to them.
Raising awareness that
this is actually an issue
of infringing human
rights to privacy is often
dismissed with a shrug
until the person
becomes the victim of a
cybercrime which is
extremely likely. On the
other side of the story is
where other
governments are the
ones gathering
information which is
used

Especially for mobile

Aware CISO: Security as a


Business Enabler [Powerpoint
slides]. Retrieved from
http://www.slideshare.net/SamsungBu
sinessUSA/the-mobile-aware-cisosecurity-as-a-business-enabler.

At the UNCC Cyber Security


Symposium Speaker 2
Hunting in the Dark
(Securing endpoints, Mr. Robot
technical writer...)
Ryan Kazanciyan, Chief Security
Architect, Tanium

http://cybersecurity.uncc.edu/sp
eakers#93
Lecture slides
https://speakerdeck.com/ryank
az/hunting-in-the-dark-unccybersecurity-symposium-2016

UNCC symposium about the


uniqueness of security when
it comes to mobility and
devices that deals with
mobility. Speaking in context
of simplifying, connecting,
innovating, and transforming.
He gave an anecdote during
his presentation about his
wife lecturing him about
getting more exercise. She
found out through his
smartwatch laying on the
table which inevitably reveals
sensitive health information
up to the time of day of an
activity. In addition he gives
an example on how mobility
and confidentiality has
worked in a cohesive way
with the example of airline
boarding passes being digital
with instant changes in
detailed information.
Rewards cards, location
awareness, and other retail
apps have driven consumers
to quick access to complex
services for less.
Ryan Kazanciyan is the
Chief Security Architect for
Tantium and is also a
technical writer for the
famous hacking TV series
Mr. Robot and even
confirmed the possibility of
season 4. In his
presentation Hunting in the
Dark He describes on a
technical level, the tactics
hackers use to gain access
to information and how
analysts combat the noise

devices we carry around,


we must be self-aware of
the capabilities and what
information is left on
there in case we loose
our device. Since
security on
smartwatches and
fitness bands are weak,
one must think on what
health information we
should share. One must
consider how location is
being used to track our
movements and how
potentially a hacker can
come between these
services.

of a lot of information to
identify threats. Separating
the logistics of how
attackers

You might also like