You are on page 1of 3

Davis 1

Michael Davis
Professor Joy A. McDonald
English 101 - 13
28 October 2016
The Relationship Between Users and Their Data
Madden, Mary. "Public Perceptions of Privacy and Security in the Post-Snowden Era; Few See
Core Communications Channels as "very Secure" Places to Share Private Information.",
2014.
Mary Madden is a senior researcher at pew Research Center. Pew Research Center is a
nonpartisan research center. Using public opinion polling, demographic research, content
analysis and other data-driven social science research, they write reports on various
issues. In this report, Madden explains just how large the chasm has become between the
American people who feel that their data is safe and those who do not. She shows through
percentages and charts that wherever technology is present, users of such technology feel
that their data is constantly being threatened. As the report ends, Madden introduces a chart
explaining just how sensitive Americans feel about certain aspects of their personal
information being stolen or abused. This report is important because it shows how wary
the American are about the safety, privacy, and security of their data.

"Inadequate Security Precautions Taken by Mobile Users Leave Corporate Data Vulnerable to
Recovery & Cyber Theft." PR Newswire, PR Newswire Association LLC, 2015.
In this article, the results of a study, conducted by Blancco Technology Group, a leading,
global provider of data erasure solutions and mobile device diagnostics is discussed. The

Davis 2
study surveyed over 1400 mobile users in 4 different countries. The survey revealed that
29 percent of surveyed users do not know when their personal information has been
accessed without their consent. According to Paul Henry who is an IT Security Consultant
for Blancco Technology Group, There is no excuse for not knowing what is happening
with your data be it personal information on a users smartphone or tablet, or company
files and intellectual property on those same mobile devices. This article is important
because it explains just how much of a part the user plays in the safety of their own data,
and how the user needs to take ownership of their own security.

Parker, Tom. Cyber Adversary Characterization : Auditing The Hacker Mind. Rockland, MA:
Syngress, 2004. eBook Collection (EBSCOhost). Web. 23 Oct. 2016.
In this book, Parker, explores the mind of a hacker, from amateur hackers in their
basements, to whole governments attacking other countries. In chapter 9 of the book,
Parker explains the governments role in the protection of Americas critical cyber
infrastructure. He talks about how the Department of Defense along with the pentagon have
created organizations and agencies specifically to combat the possible cyber-attacks
against the United States, from foreign countries. For example, the Joint Task Force of
Computer Network Defenses job is to reduce the technical vulnerabilities of major
computer networks across the United States. This book is important because it documents
the steps the US government has taken to protect the United States from cyber attacks.

D'Onfro, Jillian. "NSA Chief: This Is What Keeps Me up at Night." Business Insider. Business
Insider, Inc, 20 Oct. 2015. Web. 23 Oct. 2016.

Davis 3
In this web article, the director of the National Security Agency, Michael Rogers explains
the severity of cyber-attacks against our nation. He states that an attack is not a matter of
if but a matter of when. Rogers then goes through the different possible attacks that are
bound to happen if the front line of defense which is the NSA does not step to the plate, to
include, data manipulation, and infrastructure damage. He says that Historically, we've
largely been focused on stopping the extraction of data, whether for intellectual property
or criminal advantage, but what happens when suddenly our data is manipulated and you
no longer can believe what you're physically seeing? This web article is important because
it describes the severity of the cybersecurity issue that looms over the United States. The
point is driven home because these words are coming from the director of the NSA.

Eadicicco, Lisa. "How To Prevent Cyber Attacks - Business Insider." Business Insider. N.p., 28
May 2014. Web. 23 Oct. 2016.
In this web article Eadicicco goes through the different ways that users can protect
themselves from cyber-attacks. Some methods mentioned are to keep an eye out for
phishing scams. Phishing is when an email is sent to a user, proclaiming themselves to be
a credible company, only to steal the users information, whether financial or personal.
Eadicicco goes on to explain that the methods suggested are simple and quick to implement
into a users life of technology. This article is important because it explains how easy it is
for users to protect themselves, and that without taking these simple steps, users are at a
great risk of becoming hacked and losing their personal information.

You might also like