You are on page 1of 4

1

Jed Enriquez
Assignment #1: Information Literacy

The summarized article from The New York Times was written on September 4
th
and it
covers the topics privacy and security. Following a recent hack from a number of celebrities
Apple iCloud accounts, which resulted in the publication of nude photos and videos, Apple
announced that it would improve its security measures against future hackers. The company
plans to implement a new notification system that would inform users about possible signs of
break-in activities. The system will send emails and alerts users in the event of a suspicious
activity. The company plans to release the update in the middle of September.
Using the Yahoo search engine, I found an article relating to the same topic titled Apple
Investigating Reports of iCloud Vulnerabilities which talks about the Apple Company looking
into the hacking of the iCloud service after its weak security was exploited. I found another
article with the same topic titled Apple CEO Promises New Security Measures After iCloud
Celebrity Photo Hack but this time I found it using the Bing search engine. The article talks
about the Apple hardware receiving a new update which will alert and inform users if any
changes in their iCloud accounts occur. Based on the search results shown between Yahoo and
Bing, Yahoo is a much better search engine due to its timely and fast updates compared to Bing.
Bing is a few hours behind in showing new articles. It also gives the user suggestions such as
iCloud Activation Lock Removal or iCloud Password Cracker which are not very reassuring
to web surfers because it gives them information on how to hack in to iCloud accounts.
The article was written on September 1 and was updated the following day. The article is
relevant as it relates to cloud service and security. The author of the article is Daisuke

2

Wakabayashi of the Wall Street Journal. He is qualified to write this article. According to his
biography he worked for the journal in Tokyo reporting on technology, electronics, and
videogames. He was then transferred from the Tokyo bureau to San Francisco bureau to cover on
rising technology and Apple. Since the topic concerns technology and the company Apple, this
person is qualified to write about this topic. The information is trustworthy because the author
provided an interview with the chief executive of security research and comments from an Apple
representative that helped support his article. The author also included a video from WSJLive
and an audio WSJ Radio discussing the hacking of the iCloud service which supported his
article. This article was written to inform the readers about the iCloud service and Apples
response in regards to a recent break-in. There is no bias as the author was not discussing other
companies other than Apple. There was no subjective information including authors opinions.
The article is objective and reported only factual information and covered information
surrounding the issue.
I found a journal article titled Security Issues on Cloud Computing which discusses
several security and trust issues concerning cloud network. The second journal I found titled A
New Model to Ensure Security in Cloud Computing Services talks about a new proposal model
to address security and privacy risks in the cloud computing environment. The keywords I used
to find the journal articles were iCloud and cloud security. The two scholarly journal articles
were both found on ProQuest Science Journals. I used this database because it had about 16,000
scholarly journals relating to my topic compared to the other databases like Elsevier and
Ebscohost which offered little to none. There were many journal articles on ProQuest that were
available relating to cloud security.

3

Internet articles are easier to find and access compared to journal articles because they
can easily be searched using any search engines by simply typing the desired topic. Journal
articles are difficult to find and access because often they require you to have access to a
database website which typically requires a subscription fee or being a student at a college which
gives you free access. Journal articles also sometimes require users to narrow or specify their
topic in order to obtain the desired search results. Internet articles are much faster in getting
published online as journal articles may take several months due to research and study. The two
internet articles are more recent. When comparing authority, journal article authors are more
qualified in writing about this topic because they are usually written by researchers and experts.
Some internet article authors have no information. For example, the author of the article, Trevor
Mogg, has no information about himself anywhere even if searched. The journal articles on the
other hand provide a list of authors who contributed to the work. The database also gives
authors information and their education.











4

Bibliography (MLA)
Alzain, Mohammed A., Ben Soh, and Eric Pardede. "A New Model to Ensure Security in Cloud
Computing Services." Journal of Service Science Research 4.1 (2012): 49-
70. ProQuest. Web. 5 Sep. 2014. Retrieved from
http://search.proquest.com.ccbcmd.idm.oclc.org/docview/1030088370/abstract/765B569
4A6904C26PQ/7?accountid=3784
Chen, Brian X. "Apple Says It Will Add New ICloud Security Measures After Celebrity
Hack." Bits Apple Says It Will Add New ICloud Security Measures After Celebrity Hack
Comments. The New York Times, 04 Sept. 2014. Web. 05 Sept. 2014. Retrieved from
http://bits.blogs.nytimes.com/2014/09/04/apple-says-it-will-add-new-security-measures-
after-celebrity-hack/?module=Search&mabReward=relbias%3As
Mogg, Trevor. "Apple CEO Promises New Security Measures after ICloud Celebrity Photo
Hack." Fox News. FOX News Network, 05 Sept. 2014. Web. 05 Sept. 2014. Retrieved
from http://www.foxnews.com/tech/2014/09/05/apple-ceo-promises-new-security-
measures-after-icloud-celebrity-photo-hack/
Shah, H., Anandane, S. S., & Shrikanth. (2013). Security issues on cloud computing.
International Journal of Computer Science and Information Security, 11(8), 25-34.
Retrieved from http://search.proquest.com/docview/1467725412?accountid=3784
Wakabayashi, Daisuke. "Apple Investigating Reports of ICloud Vulnerabilities." The Wall Street
Journal. Dow Jones & Company, 01 Sept. 2014. Web. 05 Sept. 2014. Retrieved from
http://online.wsj.com/articles/apple-investigating-reports-of-icloud-vulnerabilities-
1409608366

You might also like