You are on page 1of 3

Assignment 2: Information Literacy

Corey Horsmon
1)
a) The keywords used to find the first article is computer security.
Keywords used for the second article is security at work.
b) The database used is ProQuest Central.
c) Teer, Faye P., S. E. Kruck, and Gregory P. Kruck. "EMPIRACAL STUDY OF
STUDENTS' COMPUTER SECURITY PRACTICES/PERCEPTIONS." The Journal of
Computer Information Systems 47.3 (2007): 105-10. ProQuest. Web. 16 Sep. 2015.
d) Yoon, Cheolho, and Hyungon Kim. "Understanding Computer Security
Behavioral Intention in the Workplace." Information Technology & People 26.4
(2013): 401-19. ProQuest. Web. 16 Sep. 2015.

e)

2)
In internet article 1, it is about how the computers at Homeland Security got
hacked in 2007. They were under a cyber-attack and illegal activity took place. It
was said that they took significant amounts of information. It isnt known who
they are, but Homeland is aware of what was taken. They are certain that no
classified information want taken although.
a) "Homeland Security Computers Hacked." CNN. Cable News Network,
24 Sept. 2007. Web. 16 Sept. 2015.
3)
a) The keywords are Computer Security
b)
Perlroth, Nicole. "Intelligence Start-Up Goes Behind Enemy Lines to Get
Ahead of Hackers." The New York Times. The New York Times, 13 Sept. 2015. Web.
16 Sept. 2015.
c) Google, Bing
d)
Google
Mostly has info on computer security and
practices on computer security
About 171,000,000 results

Bing
More info on computer protection and
antiviruses
About 88,800,000 results

4)
a) T- September 24th, 2007. Yes its been updated.
b) R- Yes it relates to my topic because cyber-attacks definitely have to
be computer security.
c) A- No authors are listed. It was written by investigators on the story.
d) A- Yes its trustworthy because they have talked to members of
Homeland themselves, so we know its a primary source and can trust it.
e) P- to inform. Its subjective. Its to educate people on that cyberattacks do happen, even at Homeland Security.
5) Internet Article 1
a) Very easy to access. The article caught my eye immediately.
b) The article is relatively recent, which makes it a reliable source to use
c) There are no specific authors on this article. A group of investigators
combined on this investigation.
Database Article 1
a) The article was very easy to access. The library database I used was very
quick and efficient.
b) Its also a pretty recent article. A good quality source to use.
c) The author is Faye Teer. She conducted the student studies of computer
security practices for the article.

You might also like