Annotated Bibliography — Cassie Hoffman

  • Only you can keep Internet secure
    Background: This article discusses a movement that many major corporations (Microsoft, Facebook, Google, AT&T, etc.) are beginning in an effort to make the internet more secure. Their goal is to educate the public on the importance of knowing the dangers of the lack of utter security in the cyber world. Their campaign promotes the slogan, “Stop-Think-Connect,” and they wish to incorporate it into new public education programs. Its purpose is to decrease the amount of cyber criminal activity, including identity theft which was estimated to cost about $4.5 billion in losses and has become the fastest growing crime in America.
    How I Intend to Use It: I plan to use this article as a support for Facebook as far as their privacy standards for their users since Facebook is at the forefront of the initiative and their chief security officer is quoted in the article.
  • Cybersecurity in the Private Sector
    Background: This article discusses the current status of cybersecurity in relation to small corporations and people as individuals. It maps out what needs to be done to improve the level of security, but also explains what kind of issues we are faced with, such as government resistance and high cost. The author also explains how many companies, due to inadequate security, face the issue of security breaches and that rather than fight against the intrusions, they would rather absorb the losses so that they can protect their reputation as far as having tight security within their company.
    How I Intend to Use It: I really only want to use this article as a background piece on private cybersecurity to support facts or quotes from my other sources.
  • U.S. Counts on the Cloud to Boost Cyber–Security
    Background: This article gives insight towards the efforts that the military is making to increase cybersecurity via cloud computing. The NSA wants to move all of their databases over to cloud technology in order to save 30-50% of their IT budget and allow for their employees to focus more on enhancing cyberdefense instead of on operations of the databases.
    How I Intend to Use It: I want to use this article as a primary support on the NSA’s efforts towards cybersecurity, which is discussed in detail in the “Inside the Matrix” article in Wired about the building of the Utah Data Center.
  • Inside the Matrix (article in Wired)
    Background: This article gives background, dangers, reasons for, and uses of the Utah Data Center that is being built by the NSA. The data center is enormous — more than five times the size of the US Capitol — and is intended to capture, store, and analyze information shared through the world’s telecommunications networks. It is estimated to cost $2 billion to construct and is targeted to open in September 2013. The servers will process private emails, cell phone calls, Google searches, and “personal data trails” like parking receipts, travel itineraries, and bookstore purchases. It is also meant for code-breaking for data pieces like financial information, stock transactions, business deals, foreign military and diplomatic secrets, legal documents, and confidential personal communications.
    How I Intend to Use It: This article is going to be really important in explaining the dangers of posting personal information on social media sites (to be specific to my topic) and shows how literally nothing that we put out in the internet will ever be lost or overlooked. Information on Facebook is not just dangerous for job seeking, as I discussed in my definition essay, it is constantly monitored by the government, giving a feeling of a “Big Brother” society.
  • Why Going Public Sucks (article in Wired)
    Background: This article discusses the way in which Facebook is going to change the economy when it goes public this year, raising at least $5 billion and becoming the biggest Internet IPO in history.
    How I Intend to Use It: I have to sift through it and find highlights that will be most relevant to my paper, but it will definitely be an asset in showing how beneficial Facebook is for our current economy, which is also discussed in one of my first five sources that also talked about the financial predictions for Facebook becoming public.
  • The Facebook Economy
    Background:This article discusses the current financial status of the Facebook corporation, and explains what we can expect to happen as far as growth within the company when their $5 billion IPO goes through this spring.
    How I Intend to Use It: This article will be useful for the facts and statistics incorporated into it. It gives data regarding the current size of the company, as well as the number of jobs they will be expected to create within the next few years. It also gives more detail about the types of employees they are generally looking to hire.
  • Can Facebook Train Better Workers?
    Background:
    This article gives insight to the ways in which Facebook has been able to actually increase employee productivity rather than decrease it. It explains how employees who are more adapted to working with social networking sites end up being better workers because they are more capable of expanding the technological aspect of the company they work for, whether through  networking or advertising.
    How I Intend to Use It: This article will help measure the benefits of Facebook in the workplace, giving details from studies that were done to discover what type of skills students and employees possessed that made them more capable to function in the academic or professional setting that they worked in.
  • Paterson School Teacher Under Fire for Racist Comment on Facebook
    Background: This article shows the dangers of having a Facebook page when working in a professional environment, such as that of a school. A teacher in Paterson awaits a verdict from the state education commissioner, who will decide whether or not to adopt a judge’s recommendation, after presiding over her case, that she be terminated.
    How I Intend to Use It: This article will provide my paper with a somewhat anecdotal example to demonstrate to readers the repercussions that can take place at work when someone behaves a certain way via social networking sites like Facebook.
  •  Online
    Background: This article gives more in depth information about the ways in which companies use the task of perusing Facebook profiles as a pre-requisite for hiring someone and how college students who are beginning to enter their professional lives feel about the situation.
    How I Intend to Use It: As part of an argument concerning the concept of companies previewing prospective employers, I want to analyze this article to determine whether or not it is morally right for companies to employ this practice.
  • More Grads Use Social Media to Job Hunt
    Background:
    This article gives a lot of statistical data regarding the ways that college students are using social media sites like Facebook to find jobs after they graduate. How I Intend to Use It: I want to use the statistics that are given in this article to examine how beneficial Facebook really is in aiding graduates find jobs. I want to compare this data to that of the amount of jobs that are lost or not offered because of a company viewing an employee or prospective employee’s Facebook page if I can find that type of data.
  • “Is Facebook Making us Lonely?” – article in The Atlantic
    Background:
    This article discusses how technology has changed our lives drastically when it comes to connecting with others. The author explains that we now live in a world where it is impossible to fall out of contact with a single person for even a fraction of a second. But he also says that this constant connection is a reason why so many people have actually become even more introverted — by having a world where one is constantly connected to others virtually, it makes the desire for face to face interaction with others less necessary.
    How I Intend to Use It: It may not be entirely relevant to the general topic of Facebook invading our privacy, but it still serves as a good reference for understanding why Facebook has become as popular as it is.
  • Can Facebook Get Teachers Fired?
    Background: This article discusses how a Missouri public schoolteacher is trying to stop new state legislature that will limit how teachers can connect with their students on social networks, saying that it is unconstitutional and violates the protection of their first amendment rights.
    How I Intend to Use It: This source could be a good supporting source for my “Fired Over Facebook” source which explains how the rights of employees who are fired for questionable activity on their Facebook pages is unconstitutional.
  • Fired Over Facebook
    Background: This article gives details of two different cases in which a teacher and an EMT were both fired from their jobs for comments seen on their Facebook pages by their employers. In both cases, they ended up being reinstated, and the company that the EMT worked for was forced to restructure their social networking policies.
    How I Intend to Use It: This will be a strong basis for my Causal Essay, showing the cause and effect of Facebook comments being made and a job termination resulting.
  • Facebook for Snoopers
    Background: This article exposes the national data processing system that Britain currently has set in place that monitors all activity on phones and computers and even films street corners throughout London. The system is said to be for security purposes only, set in place after bombings took place in London.
    How I Intend to Use It: This article will be useful in showing the potential threat of privacy invasion that is essentially going to make its way to the United States with the introduction of the Utah Data Center.
  • Frequent Users Less Wary of Facebook
    Background: This article discusses a study that was done that showed that people who use Facebook and other social media sites more often are less concerned about what information others may be able to see.
    How I Intend to Use It: This will be a good counterargument to show that the concept of privacy is really dependent on how each person views it.
This entry was posted in x Annotated Bibliography. Bookmark the permalink.

Leave a Reply

Fill in your details below or click an icon to log in:

WordPress.com Logo

You are commenting using your WordPress.com account. Log Out /  Change )

Google photo

You are commenting using your Google account. Log Out /  Change )

Twitter picture

You are commenting using your Twitter account. Log Out /  Change )

Facebook photo

You are commenting using your Facebook account. Log Out /  Change )

Connecting to %s