Skip to main contentdfsdf

  • File Sharing

  • Oct 12, 13

    Score: 92

    You navigate through the site with no problem. The updates were current, as well as the content of the article.
    The access was quick and I had no problems with the videos and being able to get to specific links which were all compatible with the article in case I needed to do extra research. No citations and I would have thought the copyright would have been at the end of the article but wasn't.

    • Copyright law is extremely complex. It's so complex that lawyers, lawmakers, and experts heavily argue over how it's interpreted and applied.
    • If you decide to store a few songs online and share them openly with others — even if it's solely for the purpose of collective listening at a party or office environment — you run the risk of account suspension with the company hosting your files.
  • Oct 12, 13

    Score: 88

    60% of the 10 C's were visible on this website. Emailing the author who was visible at the beginning of the article which helps to identify with the source. I am starting to figure out quite a few webpages don't display if the article is copyrighted or not.

    • It has been known for years that many of the mainline P2P applications can quietly make much more than audio and video files in your shared folder available for downloading by others.
    • if a downloaded file is moved out of the shared folder, that file can give most file-sharing applications access to all the data in the new folder as well.
  • Oct 13, 13

    Score: 95

    The USA Today is a credible news source. They use all the 10 C's are recognizable within the article I chose for my presentation. The only setback was not being able to email the author because the article us a few years old.

    • Every college across the country must either have installed software to block illegal file-sharing or have created some other procedure for preventing it
    • The University of North Carolina website lists expulsion as a possible consequence

    1 more annotation...

  • Pirate Software

  • Oct 12, 13

    Score: 96

    This site gave me the credibility I was looking for when researching Pirate Software. The facts were accurate when formulating them when the 10 C's. Credibilty, Content, even Copyright at the bottom of the website.

    • The BSA also upped its reward money from $5,000 to $20,000 for whistle blowers during July 2012 by bringing back a reward incentive that it last offered in 2010.
    • Australia’s software piracy rates are decreasing at the rate of 1 per cent every year.
  • Oct 12, 13

    Score: 79

    The source I would consider credible for the information that was needed. The site was average at best. The author fulfill most of the 10 C's. Critical Thinking about software pirates and the statistics and sources for backing up his research was a key element. At the end of the article he stated some of his credentials which would allow me extra research on him if it was needed.

    • The heaviest users of pirated software are manufacturing companies, but other companies, nonprofit organizations, government agencies, schools and individuals have all been caught pirating, according to the BSA.
    • In actuality, the loss to software companies was an estimated $53 billion worldwide last year — approaching total software sales, which was $88 billion, according to the BSA.

    2 more annotations...

  • Oct 12, 13

    Score: 70

    This one is a little tricky to evaluate because this was an academic paper from the school library and doesn't have a web site. Although the HTML Text which I run off of my computer was easy to access. The author had clear and precise thinking to addressing the subject of pirate software. 70% of the 10 C's were noticeable. Content, along with context were the key elements.

    • 35 percent of all software programs being used in the United States are being used illegally,
    • During a court-ordered audit of Utica Enterprises of Shelby Township, Mich., the BSA, as a result of a report to its antipiracy hotline, found illegal copies of software programs. Here again the BSA took legal action after informal warnings to the company failed. Last April, the company agreed to pay $260,000 in fines.
  • Hacking

  • Oct 12, 13

    Score: 98

    There is not too much that you wouldn't considered credible coming from a news print publication like Time Magazine who prides themselves on making sure they have the most accurate sources with whatever story they come across.

    • "What we are seeing is beyond a technical improvement," says Dave Jevans, chairman of the Web-security firm IronKey. "They have a social element to bring people together [via the network] to create more sophisticated attacks than we've ever seen. That's what makes it accelerate."
    • Companies are also figuring out new ways to protect themselves from employees who work at home beyond the corporate firewall and from the growing threats
  • Oct 12, 13

    Score: 98

    PBS prides themselves on being precise when researching a story with credible sources. It's not too many times if at all PBS has had to re-cant a story because their source wasn't credible. Everything from navigating through the site to the content was Grade A.

    • The Computer Fraud and Abuse Act (CFAA) [18 U.S.C. Section 1030] makes it illegal for anyone to distribute computer code or place it in the stream of commerce if they intend to cause either damage or economic loss.
    • According to a March 1999 study in Information & Communications Technology Law, 33 states have enacted their own laws to combat computer crime, while 11 more have laws pending in state legislatures. The laws from state to state vary widely in structure and wording, but not in intent. Almost all of the present state laws criminalize the unauthorized access to or use of computers and databases, using a computer as an instrument of fraud, and known and foreseeable acts of computer sabotage.
  • Oct 12, 13

    Score: 97


    The NBC website is great with the information being updated frequently. The 10 C's are visible when evaluating the article as the website contents completely accurate to navigate through with ease.

    • Use your roommate's Netflix account to watch movies on your iPad? You're violating the CFAA.
    • Check your Facebook page at work, even if your employer forbids it? Better call your lawyer.
  • Virus

  • Oct 13, 13

    Score:94

    It was easy to maneuver through. The author was right upfront within the article as was most of the 10 C's after going through the process. Overall the website was very credible to help with accurate information on viruses.

    • A virus is something that lives. In real life you can't make a kind of animal. You can in the computer.
    • 2 percent of all traffic the security firm MessageLabs received contained viruses.
  • Oct 13, 13

    Score: 92

    At times from personally reading the LA Times, they can be a little bias through their editorial. But what paper doesn't have its favorites. I like the fact the email was present after the article. Some more main-stream news websites didn't have that. But it helps me in case I need to email this author for further detail just in case some of their credibility is questioned. But, there were no issues when evaluating through the 10 C's as well.

    • Reveton ransomware virus, a malware program that can engage as soon as a victim clicks on a compromised website.
  • Oct 13, 13

    Score: 93

    Evaluating the web page to make sure to have the proper information helps to assess the credit of which this author comes across at being legitimate. The only thing was, their was no access to email.

    • Malware makers have determined how to bamboozle web browsers and lay land mines on innocent-looking web sites, and occasionally these tricks can figuratively blow up your computer and make your life a mess.
  • Identity Theft

  • Oct 13, 13

    Score: 89

    The author stood out mostly by letting us know the things he has done, which allows me to go back and check his credentials. He had email, as well as, website access from the article. The Critical Thinking could be read through his article and overall evaluation of the webpage was pretty good. I guess, I am always expecting a little more for the computer information based websites.

    • What? You haven't been a victim of identity theft yet? Don't worry, you will be soon
    • Identity theft is being stoked by computers programmed to blindly issue credit cards or telephone calling cards to vermin who apply in other people's names.
  • Oct 13, 13

    Score: 85

    I want to do something different by adding a poll to help with my statement. Evaluating the webpage helped and was solid with the criteria but the 10 C's was more challenging in making sure to be a credible source. It barely passed.

    • one in five Americans say they've experienced identity theft.
    • One in six Americans say they have had financial information -- such as their bank or credit card numbers -- stolen.

    1 more annotation...

  • Oct 13, 13

    Score: 81

    The article was solid with its information. The author was easily identifiable, along with her email. But the site took some time to load. But overall it was still good. The majority of the 10 C's could be recognized within the article.

    • if someone takes your identity, they have access to, well, they can reroute Social Security checks, they can abscond with quite a bit
    • It can take years to clear up the results of a stolen identity,
1 - 20 of 20
20 items/page
List Comments (0)