Preview

Cmgt 441 Week 2

Satisfactory Essays
Open Document
Open Document
262 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Cmgt 441 Week 2
Evaluating Writing Paper

CMGT/441
Professor: Dr. Shive Bhagan
May 26, 2012
University of Phoenix

Author 's Name: Doug Gross
Author 's Title or Position: Tech
Author 's Organizational Affiliation: Facebook Users
Date of Page Creation or Version: May 11, 2011

Introduction The article on Facebook apps leaked users’ information, security. Lawmakers says that hundreds of thousands apps may have gotten access tokens to user personal information into the hands of unauthorized parties. Supposedly the company has corrected the issue. This article will be evaluated on its usefulness and validity or appropriateness. After carefully reviewing the article critics will be able to evaluate the paper accordingly. The usefulness of the article support the augment to how Facebook apps leaked users’ information however, the augment does not show or has proof whether or not it is true and if so the article do not state how much information as leaked and who the information was leaked to. Here are some examples of my survey results: * Third parties * Mainly advertisers * Users’ profile * Photographs * Chat * Personal information * Symantec’s has reported inaccuracies
The information that can be challenged is that Symantec to address the problem but there has not been a thorough investigation that shows any information got into the hands of unauthorized parties. The author should that information provided misinterpret and was not thoroughly proved. The author showed that the claim to be invalid. On the contrary it showed some frequent bias in some part of the article.

References



References: http://articles.cnn.com/2011-05-11/tech/facebook.information.leak_1_facebook-accounts-facebook-platform-facebook-users?_s=PM:TECH

You May Also Find These Documents Helpful

  • Powerful Essays

    Cms 441 Week 1

    • 4767 Words
    • 20 Pages

    This discrepancy is between forward and reverse grouping owing to weak or missing antigens. This is a quite uncommon type of discrepancy. Some of the common causes in this group are:…

    • 4767 Words
    • 20 Pages
    Powerful Essays
  • Best Essays

    Cmgt 430 Week 2

    • 1585 Words
    • 7 Pages

    University of Phoenix (2005). Huffman Trucking Service Request SR-ht-001. Materials section. Retrieved February 08, 2011, from https://ecampus.phoenix.edu/secure/aapd/cist/…

    • 1585 Words
    • 7 Pages
    Best Essays
  • Satisfactory Essays

    The objective is to successfully convert the United States Army Medical Department from EMR to AHLTA. There are trainers that are set in place to ensure that the staff receives their full attention and that they also feel comfortable with the software. The outcome of this would be to have the ability to easily communicate electronically regarding patients and is up to date with today’s advanced technology which will allow the compliance with government standards as well as high reimbursement for every office. . While being trained the staff should feel very comfortable when working with the software and to ensure that this happens a questionnaire is given for feedback.…

    • 655 Words
    • 3 Pages
    Satisfactory Essays
  • Powerful Essays

    Cmgt 554 Week4

    • 1618 Words
    • 7 Pages

    References: Apollo Group, Inc. (2013). Patton-Fuller Community Hospital. Information Systems Overview. Retrieved from CMGT/554 – IT Infrastructure…

    • 1618 Words
    • 7 Pages
    Powerful Essays
  • Good Essays

    Legt2741 Week 4

    • 1192 Words
    • 6 Pages

    Enjoys greater capital resources compared to sole traders ⋄ increases pool of funds available for financing. However this can also be seen as a disadvantage when compared to companies as they cannot raise funds from the general public and are limited by section 115 of the Corporations Act 2001 to a maximum of 20 partners. A and D…

    • 1192 Words
    • 6 Pages
    Good Essays
  • Good Essays

    Cmgt/554 Week 2

    • 1453 Words
    • 6 Pages

    In order for an organization to be able to have an efficient and successful organization the proper Information Technology system (IT) must be in place, this document will demonstrate what system is in place to make sure system is running successfully.…

    • 1453 Words
    • 6 Pages
    Good Essays
  • Better Essays

    Cloud computing is a fast growing information technology trend that many companies including Google, Microsoft, and IBM are currently looking to get a stake in as demand for the service grows. Cloud computing is the concept of allowing both individuals and businesses to store data and applications on remote servers (owned and operated by a third party company), rather than on their own hard drives and data centers. The service boasts the ability to securely access data and applications from just about any device with an internet connection, allowing for such services as streaming music from a personal collection from multiple devices, and even to business development and storage of applications on remote servers. For the past few years, cloud computing has quickly grown in popularity, and as such, has come with its own set of risks and security concerns. As use of this service grows by both consumers and businesses, it will no doubt continue to attract the attention of hackers and cyber criminals, as it offers a central repository of data that can contain everything from financial statements, to company intellectual property. On 7/11/2011, eweek.com posted an article called “Cloud Computing Security: 10 Ways to Enforce It”, which attempts to give several suggestions on the best way to ensure that cloud computing is as safe as it is convenient.…

    • 1626 Words
    • 7 Pages
    Better Essays
  • Powerful Essays

    1. Use your text editor to open the jpftxt.css, stabletxt.css, and sudokutxt.htm from the tutorial.05\case1 folder included with your Data Files. Enter your name and the date in the comment section of each file. Save the files as jpf.css, stable.css, and sudoku.htm, respectively, in the same folder.…

    • 697 Words
    • 3 Pages
    Powerful Essays
  • Satisfactory Essays

    Cmgt Week 4

    • 345 Words
    • 2 Pages

    Read Ch. 8, “Improving Supply Chains and Strengthening Customer Relationships Using Enterprise Information Systems,” of Information Systems Today.…

    • 345 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    The information the author provides to support his position is… [How do we know there is a problem? What evidence is there that this problem exists?]…

    • 381 Words
    • 2 Pages
    Satisfactory Essays
  • Better Essays

    Cmgt400 Week 3

    • 1752 Words
    • 8 Pages

    Something you know refers to the use of passwords, passphrases, and codes or PINs. When creating a password, the user must make the decision to create a string of alphanumeric and special characters with differing cases. The longer and more complicated a password the user creates drastically reduces the risk of cracking or brute force attacks. The same password must also be something easily remembered by the user to dissuade it from being written down and stored onsite or left at the workstation. A solution to this is creating a passphrase, a common phrase or date abbreviated and linked together with special characters to create a personal passphrase difficult to crack but easy to remember. An example of this would be a favorite television show with the day and time it airs. A common rule is to create a string at least eight character longs with at least one number and one special character, which this example adheres.…

    • 1752 Words
    • 8 Pages
    Better Essays
  • Good Essays

    The word 'privacy' means different things to different people, it affect both personal and business. As individuals, we need some amount of privacy to succeed. As a person we need to protect our thoughts from intruders because if others new our must intimate thoughts they could use that information to manipulate our decision making process. Business, need to protect their trade secret and information they collect from their customer to succeed. My objectives for this week e-activity consist of, evaluating the circumstances that contributed to the privacy violation, the consequence to the company to the breach, and management’s response to the breach, indicating the appropriateness of the response. Facebook is an online social network that allows users to create detailed online profiles and connect with other users, with an emphasis on social relationships such as friendship. This network let users share information with other approved users, such as one’s gender, age, interests, educational background and employment, as well as files and links to music, photos and videos. As concerns about online privacy grow, users of social media sites are increasingly looking for new way to improve their social media experience by posting more personal information and intimate picture about themselves. A class action…

    • 820 Words
    • 4 Pages
    Good Essays
  • Good Essays

    Pop Culture Analysis Paper

    • 1367 Words
    • 6 Pages

    The prospectus that Facebook filed to the U.S. Securities and Exchange Commission on Wednesday Feb. 1st included a list of the company’s potential risks, inside financial details and statistics on the website’s growth. The IPO filing is optimistic but there are some issues Facebook shows concern with: the merchandising of user information. If they disclose personal information in an improper way or if hackers access their database, Facebook will face problems. They could also take a hit if its users get overly concerned about the privacy policies, an issue which was mentioned 35 times in the filing. Therefore, Facebook wrote they must avoid having policies related to sharing data which are perceived in a negative way by their users.…

    • 1367 Words
    • 6 Pages
    Good Essays
  • Good Essays

    Case Study Irm

    • 426 Words
    • 2 Pages

    * Yahoo Mail’s and Google Mail’s mandatory and automatic access to every user’s data on his/her email account which is sent to both Yahoo and Google’s business partners which results in Spam mails.…

    • 426 Words
    • 2 Pages
    Good Essays
  • Satisfactory Essays

    Facebook Hacking

    • 584 Words
    • 3 Pages

    Have Vulnerability In Their Applications So People Mostly Hack Facebook Using This Vulnerabilities And There Are Many…

    • 584 Words
    • 3 Pages
    Satisfactory Essays