Вы находитесь на странице: 1из 2

Wes Wynmor Annotative bibliography Barry, Keith. "Can Your Car Be Hacked." Car And Driver. 08 2011: n. page.

Web. 26 Feb. 2013. <http://www.caranddriver.com/features/can-your-car-be-hackedfeature>. Summary This article talks about how the advancement of car technology is actually making them more susceptible to security breaches. Cars are almost fully run by computers now, all kinds of different systems run a car, and many of them can be accessed pretty easily when close to the car. The article talks about how researchers have tested and proven that car systems can be hacked relatively easily. Then it reassures you a little bit by telling you how there has never been an incident where a car has been taken over, mainly the reason for that is its very difficult and quite expensive to do right now, which is why it shouldnt be much of a concern yet but is definitely going to be a problem soon. The article is from a well-accredited car magazine so I find it a good reliable resource, because cars are what they do. Its written in small paragraphs with a good point or subject for each one. Its easy to read and has good information, with researched material and strong facts. Its very helpful for my paper because its pretty much exactly what Im looking for and talking about in my paper. My paper will actually be pretty similar in some parts, except with more opinion in it. This article is good because it has a lot of research that was done in it which will be good for some good hard facts in my paper.

"Avoid These Dangers With Mobile Devices." Consumer Reports Money Adviser 10.2 (2013): 3. Business Source Complete. Web. 19 Feb. 2013.https://librarylink.uncc.edu/login?url=http://search.ebscohost.com/login.aspx ?direct=true&db=bth&AN=85143155&site=eds-live&scope=site This article talks about how app security and privacy is minimal, it goes into how some apps hide or dont have privacy terms and conditions. Some apps that are sold on the apple app store and android market come with imbedded program that can access all your contacts and also go into other parts of your phone and some can even take control of your phone remotely. This is relevant to my paper because thats the starting bases of getting access to almost everything, because we put pretty much everything on out phones now.

Wes Wynmor

P., John. "How I Hack Your Weak Cell Phone." Geek Beat Technology News. N.p., 14 Sept. 2012. Web. 12 Mar. 2013.< http://geekbeat.tv/how-id-hack-your-weak-cellphone/> This article talks about the type of hacking that is seen with cell phones right now. It mainly describes how its mostly a password thing. If you can figure out someones password you can access a lot on there phone, it this level its mainly, access to email accouts, and personal information and social network type privacy violations. This article can help in my paper by helping give a quick refrence on where cell phone hacking is at now. Murphy, Kate. "Build Up Your Phone's Defenses Against Hackers." The New York Times. The New York Times, 26 Jan. 2012. Web. 12 Mar. 2013. <http://www.nytimes.com/2012/01/26/technology/personaltech/protecting-acellphone-against-hackers.html?_r=0>. This article gives a very detailed research and observation and tips on what cell phone hacking is and how you can attempt to avoid it. It goes into some of the different types of cell phone hacking and even a little bit of how they work and what can be done with it. After describing all the different ways of getting into your phone it goes to ways you can try to avoid it. The ways to avoid it are mainly just avoiding doing certain things or downloading certain apps. Its deffinitly a helpful article that I can use to help conclude my paper and give a little hope to readers after hearing about all the bad things. Hey Wes, right off the bat I noticed that you didnt use the template Malcolm put up on moodle for the annotated bibliography. You should open that and copy and paste it into the template because there are a lot of things the template has that your missing for it to be standard MLA. Like this has to be times new roman not cambria font, a cover page, double spaced, and different margins. For sure give the template a look, you can find it in the powerpoint I believe he put up on annotative bibliographies. Your sources look alright as far as reliability, new york times, and car and driver are good for sure. What needs to happen with your paper is that you should find a source that opposes your inquiry question view. For example, in your case that would mean finding an article that talks about how tough it is to break into cars now a days. That was on the required list for the annotated bibliographies I read earlier. Also, remember to add whether you will use the source or not at the end of your annotation for each source. Another question you should think about is which cars specifically are easier to break into? Do certain car makes very in auto theft? Are nissans easier to steal than chevys? Does having a push to start car put you at a higher risk for threats? All good things to think about. You have plenty of research to back up your topic so thats most definitely helpful, youre on your way to a good paper for sure though.

Вам также может понравиться