Sei sulla pagina 1di 2

Assignment 2: Information Literacy

By Chris Hammond

1.
a. Mobile Devices, Security
b. Academic Search Premier
c. APA FORMAT:
Friedman, J., & Hoffman, D. V. (2008). Protecting data on mobile devices: A taxonomy of security threats to mobile
computing and review of applicable defenses. Information Knowledge Systems Management, 7(1/2), 159-180.

d. MLA FORMAT:

di Pietro, Roberto, and Luigi V. Mancini. "Security And Privacy Issues." Communications Of The ACM 46.9 (2003):
75-79. Academic Search Premier. Web. 18 Sept. 2015.

e.

2.
Title: Sensory brings mobile device security through combined voice and face
detection
Summary:
Instead of using either face or voice recognition to verify your identity, TrulySecure
uses both by using your camera to verify it is you, and then using your microphone
and allowing you to say a previously captured phrase, in order to unlock an app. You
can customize it to allow you to use one or the other for apps that require less
robust security, or requiring both to open up an app. Choosing to use one of the
methods makes it faster to access an app or data. Sensory also says that its
software is smart enough to see the difference between a person and a picture of a
person.
a. Tofel, Kevin. "Sensory Brings Mobile Device Security through Combined
Voice and Face Detection | ZDNet." ZDNet. Zdnet.com, 20 Aug. 2015.
Web. 18 Sept. 2015.
3.
1

a. security for mobile devices site:techcrunch.com


b.
Alton, Larry. "Next-Gen Cybersecurity Is All About Behavior Recognition."
TechCrunch. Techcrunch.com, 23 Aug. 2015. Web. 18 Sept. 2015.
c. Using Google and Bing
d. Search settings: past month
Google
Bing
61,200,000 results
497,000 results
Less ads
More on topic results
4.
Better options for
Shows a related
a. Written on August 20, 2015
searching
searches option
and never updated.
b. It is related to my topic,
although does not answer my question.
c. The author is Kevin Tofel. I believe he is qualified to write about this topic
from his previous and current experience.
He has been writing about the mobile industry and wearable devices since 2003
when he left his 15 year IT career. His work has been featured on various websites
and in print, including PC World and New York Times.
d. The information may be trustworthy. It is not supported by evidence, but it
can be tested by peers.
e. The article was written to inform. The material is objective, because the
writer does not have an affiliation with the product.
5.
a. The internet article seemed to be easier to access and read then the DB
article, mostly in part due to the searching abilities of the websites. The DB article
supplys the sources, summary, articles, and authors in a much better format, and
are much easier to cite than the Internet article.
b. The DB article was published in 2008, and with the industry constantly
changing, the newer the article is, the better it may be. The Internet
article was published much more recently.
c. The author of the internet article has 15 years of IT experience, and 13
years of writing experience for the mobile industry. I cannot find any
biography on either of the DB articles authors to find out any of their
authority, although they are affiliated with two companies in the industry.

Potrebbero piacerti anche