Вы находитесь на странице: 1из 4

Assignment 2: Information Literacy

1. a) List the keywords you used to find the articles.


Ethics, emerging, technology
b) Identify the journal you used.
1. Business Ethic Quarterly
2. Nursing Ethics
c) Why did you choose this database?
I used these journals because they are scholarly articles.
d) Cite DB article 1 in APA or MLA format.
(Kim, 2014)
e) Cite DB article 2 in APA or MLA format.
(Cannaerts, Gastmans, & Casterl, 2014)
f) Insert a screen print of the search results to show you filtered to only review
scholarly articles

Assignment 2: Information Literacy

2. Anatomy of the Target data breach: Missed opportunities and lessons learned.
a. It is unclear if or how the Target breachers conducted any surveillance on Target but it
would have been as easy as an internet search. The people who breached the Target
network backed their way into it by first breaching the network of a third party
associated with target. It was noted in the investigation that the third parties did not
have malware protection up to par with that of a massive retailer.
b. (Kassner, 2015)
3. a) List the keywords you used to do the search.
Target, hack
b)Cite Internet article 2 in APA or MLA format.
(Michael Riley, March)

Assignment 2: Information Literacy


c)Run the same search (using the same keywords) on two different search
engines. Identify the search engines you used.
Yahoo.com, Google.com

4. TRAAP your sources.


Evaluate the Internet article you found in step 2 by answering the following
questions:
a) Time when was it written? Has it been updated?
The article was written March 13, 2014. The article has not been updated.
b) Relevance does it relate to your topic or answer your question?
The article is extremely relevant to my topic.
b) Authority who is/are the author(s)? Are they qualified to write about this
topic? How do you know?
Michael Riley, Ben Elgin, Dune Lawrence, and Carol Matlack. The authors
are qualified to write on the topic. Bloomberg gives a brief on each of the
authors, independently of others. Combined, the team has many years of
reporting experience along with awards for covering former President Bill
Clinton.
c) Accurate is the information trustworthy? Is it supported by evidence? Has it
been tested for accuracy?
The information is trustworthy because it is supported by evidence. The information
is accurate because it is from investigations and interviews.
d) Purpose why was it written, to inform, sell, persuade? Is there a bias or is the
material objective?
The authors purpose for writing this article it to inform people who are interested in
business about the target hacking.

5. Compare the Internet and Journal articles.


Compare the Internet article 1 and DB article 1 based on the following criteria. Use a
separate paragraph for each criterion.
a) Ease of access
The internet article is very easy to access. It takes only a few seconds to open a search
engine and type in keywords which will bring a user to this article. The database article is
easy to find but more difficult relatively. Finding a scholarly journal requires finding a
scholarly article database to use and first setting search criteria.
b) Timeliness
The article and journal found are up to date only as much as the user of the search
engine requires or sets settings for.
c) Authority
The scholarly journal is peer reviewed. In order to be one of the peers reviewing the
journal one must also write credibly. Each journal has its own set of peers. The article is
somewhat credible coming from Bloomberg but still is not worthy of being cited in a
research paper as it is from a .com website.
3

Assignment 2: Information Literacy

6. Formatting of document.
a) Place the title of the assignment and your name on the left side of the header.
Okay.
b) Place the page number in the center of the footer.
Consider it done.

Вам также может понравиться