Friday, July 26, 2019

The Effects of Social Media in Todays Society Annotated Bibliography

The Effects of Social Media in Todays Society - Annotated Bibliography Example The author refers to usability as how well a system supports the needs of users and the ability of the system to accomplish a task. Greiter acknowledges that, even though usability testing is a common practice, the software of usability of security requires more consideration. My team could use this article to examine why computer users often circumvent the security mechanisms in places or why common users of computer may lack confidence in the security system that they use. This book explores the events surrounding the scandal of WikiLeaks and the issues concerning security. Brenner examines the legal challenges that were presented by the incident. My team could use this source in our report on security issues associated with collaborative online tools. Some of the recommendations made in this paper may be used for our conclusion. This paper examines privacy as a key aspect of the experience of computer user when online as well as on computing devices by reviewing the perspective that the users of computers have on computer system in order to aid in improving privacy through Human-Computer Interaction (HCI). My team could use this source to explain privacy as a process through which computer users can control personal data effectively. This article reports a survey of 115 information technology companies that was conducted in India and the United States jointly by the US trade association ITAA and the Indian trade association NASSCOM. The paper reports that companies are more concerned with security than ever before. 75% of the companies showed that information security is a vital differentiator in the provided services. My team could use this paper to cite background information on security case that involved Geometric Software Solutions, which included virus and spam problems. This article addresses security risk concerns to clients from the vendor workers from who

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.