Preview

Cmgt 441 Week 2

Satisfactory Essays
Open Document
Open Document
262 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Cmgt 441 Week 2
Evaluating Writing Paper

CMGT/441
Professor: Dr. Shive Bhagan
May 26, 2012
University of Phoenix

Author 's Name: Doug Gross
Author 's Title or Position: Tech
Author 's Organizational Affiliation: Facebook Users
Date of Page Creation or Version: May 11, 2011

Introduction The article on Facebook apps leaked users’ information, security. Lawmakers says that hundreds of thousands apps may have gotten access tokens to user personal information into the hands of unauthorized parties. Supposedly the company has corrected the issue. This article will be evaluated on its usefulness and validity or appropriateness. After carefully reviewing the article critics will be able to evaluate the paper accordingly. The usefulness of the article support the augment to how Facebook apps leaked users’ information however, the augment does not show or has proof whether or not it is true and if so the article do not state how much information as leaked and who the information was leaked to. Here are some examples of my survey results: * Third parties * Mainly advertisers * Users’ profile * Photographs * Chat * Personal information * Symantec’s has reported inaccuracies
The information that can be challenged is that Symantec to address the problem but there has not been a thorough investigation that shows any information got into the hands of unauthorized parties. The author should that information provided misinterpret and was not thoroughly proved. The author showed that the claim to be invalid. On the contrary it showed some frequent bias in some part of the article.

References



References: http://articles.cnn.com/2011-05-11/tech/facebook.information.leak_1_facebook-accounts-facebook-platform-facebook-users?_s=PM:TECH

You May Also Find These Documents Helpful

  • Powerful Essays

    Cms 441 Week 1

    • 4767 Words
    • 20 Pages

    This discrepancy is between forward and reverse grouping owing to weak or missing antigens. This is a quite uncommon type of discrepancy. Some of the common causes in this group are:…

    • 4767 Words
    • 20 Pages
    Powerful Essays
  • Good Essays

    CMGT/430 Week 4

    • 622 Words
    • 3 Pages

    Lafleur Trading Company, established in 1975, is a worldwide supplier of the finest foods and wines. With buyers dealing strictly with reputable producers and exporters, Lafleur Trading Company guarantees the highest quality products. Some concerns have surfaced about the direction the organization should take in regards to some key areas.…

    • 622 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    CMGT 575 Week 6 Summary

    • 385 Words
    • 2 Pages

    This work of CMGT 575 Week 6 Learning Team Assignment SR-kf-001 Project Final Presentation includes: Kudler Fine Foods - Coupons Project SR-kf-001…

    • 385 Words
    • 2 Pages
    Satisfactory Essays
  • Best Essays

    Cmgt 430 Week 2

    • 1585 Words
    • 7 Pages

    University of Phoenix (2005). Huffman Trucking Service Request SR-ht-001. Materials section. Retrieved February 08, 2011, from https://ecampus.phoenix.edu/secure/aapd/cist/…

    • 1585 Words
    • 7 Pages
    Best Essays
  • Satisfactory Essays

    The objective is to successfully convert the United States Army Medical Department from EMR to AHLTA. There are trainers that are set in place to ensure that the staff receives their full attention and that they also feel comfortable with the software. The outcome of this would be to have the ability to easily communicate electronically regarding patients and is up to date with today’s advanced technology which will allow the compliance with government standards as well as high reimbursement for every office. . While being trained the staff should feel very comfortable when working with the software and to ensure that this happens a questionnaire is given for feedback.…

    • 655 Words
    • 3 Pages
    Satisfactory Essays
  • Powerful Essays

    Cmgt 554 Week4

    • 1618 Words
    • 7 Pages

    References: Apollo Group, Inc. (2013). Patton-Fuller Community Hospital. Information Systems Overview. Retrieved from CMGT/554 – IT Infrastructure…

    • 1618 Words
    • 7 Pages
    Powerful Essays
  • Good Essays

    Legt2741 Week 4

    • 1192 Words
    • 6 Pages

    Enjoys greater capital resources compared to sole traders ⋄ increases pool of funds available for financing. However this can also be seen as a disadvantage when compared to companies as they cannot raise funds from the general public and are limited by section 115 of the Corporations Act 2001 to a maximum of 20 partners. A and D…

    • 1192 Words
    • 6 Pages
    Good Essays
  • Good Essays

    Cmgt/554 Week 2

    • 1453 Words
    • 6 Pages

    In order for an organization to be able to have an efficient and successful organization the proper Information Technology system (IT) must be in place, this document will demonstrate what system is in place to make sure system is running successfully.…

    • 1453 Words
    • 6 Pages
    Good Essays
  • Good Essays

    HCA 415 Week 3 DQ 2

    • 496 Words
    • 3 Pages

    Provide concrete examples to support your discussion. Your initial post should be a minimum of 250-300 words and utilize at least two scholarly sources, cited in APA format.…

    • 496 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    The information the author provides to support his position is… [How do we know there is a problem? What evidence is there that this problem exists?]…

    • 381 Words
    • 2 Pages
    Satisfactory Essays
  • Better Essays

    Cmgt400 Week 3

    • 1752 Words
    • 8 Pages

    Something you know refers to the use of passwords, passphrases, and codes or PINs. When creating a password, the user must make the decision to create a string of alphanumeric and special characters with differing cases. The longer and more complicated a password the user creates drastically reduces the risk of cracking or brute force attacks. The same password must also be something easily remembered by the user to dissuade it from being written down and stored onsite or left at the workstation. A solution to this is creating a passphrase, a common phrase or date abbreviated and linked together with special characters to create a personal passphrase difficult to crack but easy to remember. An example of this would be a favorite television show with the day and time it airs. A common rule is to create a string at least eight character longs with at least one number and one special character, which this example adheres.…

    • 1752 Words
    • 8 Pages
    Better Essays
  • Good Essays

    The word 'privacy' means different things to different people, it affect both personal and business. As individuals, we need some amount of privacy to succeed. As a person we need to protect our thoughts from intruders because if others new our must intimate thoughts they could use that information to manipulate our decision making process. Business, need to protect their trade secret and information they collect from their customer to succeed. My objectives for this week e-activity consist of, evaluating the circumstances that contributed to the privacy violation, the consequence to the company to the breach, and management’s response to the breach, indicating the appropriateness of the response. Facebook is an online social network that allows users to create detailed online profiles and connect with other users, with an emphasis on social relationships such as friendship. This network let users share information with other approved users, such as one’s gender, age, interests, educational background and employment, as well as files and links to music, photos and videos. As concerns about online privacy grow, users of social media sites are increasingly looking for new way to improve their social media experience by posting more personal information and intimate picture about themselves. A class action…

    • 820 Words
    • 4 Pages
    Good Essays
  • Good Essays

    Pop Culture Analysis Paper

    • 1367 Words
    • 6 Pages

    The prospectus that Facebook filed to the U.S. Securities and Exchange Commission on Wednesday Feb. 1st included a list of the company’s potential risks, inside financial details and statistics on the website’s growth. The IPO filing is optimistic but there are some issues Facebook shows concern with: the merchandising of user information. If they disclose personal information in an improper way or if hackers access their database, Facebook will face problems. They could also take a hit if its users get overly concerned about the privacy policies, an issue which was mentioned 35 times in the filing. Therefore, Facebook wrote they must avoid having policies related to sharing data which are perceived in a negative way by their users.…

    • 1367 Words
    • 6 Pages
    Good Essays
  • Good Essays

    Case Study Irm

    • 426 Words
    • 2 Pages

    * Yahoo Mail’s and Google Mail’s mandatory and automatic access to every user’s data on his/her email account which is sent to both Yahoo and Google’s business partners which results in Spam mails.…

    • 426 Words
    • 2 Pages
    Good Essays
  • Satisfactory Essays

    Facebook Hacking

    • 584 Words
    • 3 Pages

    Have Vulnerability In Their Applications So People Mostly Hack Facebook Using This Vulnerabilities And There Are Many…

    • 584 Words
    • 3 Pages
    Satisfactory Essays

Related Topics