Sign In
Not register? Register Now!
Pages:
3 pages/β‰ˆ825 words
Sources:
6 Sources
Style:
MLA
Subject:
Literature & Language
Type:
Annotated Bibliography
Language:
English (U.S.)
Document:
MS Word
Date:
Total cost:
$ 10.8
Topic:

Arguments on Technology and Privacy

Annotated Bibliography Instructions:

Introduction
This semester’s readings focus on technology—highlighting the concerns and hopes, attitudes and expectations that people have in the face of new technologies. This assignment asks you to identify a relevant theme about our attitudes toward technology and to trace it through several of our class readings. Identifying and grouping authors who join in a specific conversation about technology and its impact will prepare you to make your own contribution to that debate. This assignment will help you begin to focus on a specific conversation about technology, which you will develop more fully and respond to in subsequent assignments.
First Task: Choosing a Thematic Focus and Locating Authors
The conversations revolving around technology involve many issues. To be able to compose your own essay contributing to the conversation (our final assignment), you will need to focus on one of these issues and what our class authors have to say about it. You start to do this by noticing and following themes and issues which link several authors together. For this assignment, choose a theme about technology which shows up in several class readings and which interests you. Your annotated bibliography will be organized around this issue and will include those class readings which address it. For instance, you might focus on the idea that technology is a tool and on the authors who espouse that idea.
Second Task: Writing Theme Overview
Write a paragraph which identifies and describes the theme/focus of your annotated bibliography.
Third Task: Writing Annotation Entries
An annotated bibliography is an alphabetized list of sources relevant to a particular area of inquiry (theme): each entry includes both bibliographic information and a descriptive summary of the source (the annotation).
Once you have chosen which theme/issue you would like to focus on, you will write annotations for 6 class readings that address that theme in some fashion. Create an entry for each source which includes:
MLA citation
Summary of the source. Describe the author’s argument, including the author’s main claim and relevant reasons, evidence.
Description of how the source addresses/incorporates the theme and how it connects to other authors around this theme or issue.
Essay Details as Checklist:
Contains all features Annotated Bib template: named theme, theme overview, alphabetized annotations of relevant class readings.
Includes 6 class sources
Follows MLA page formatting and citation style

Annotated Bibliography Sample Content Preview:
Student Name
Professor Name
Course
Date
Annotated Bibliography -- Tech and Privacy
Overview: We are living in the so-called digital era where everything is connected to the internet, such as businesses, education, research, household activities, and of course, health. It looks like our survival is not possible without technological devices and the internet. With the advancements of science and technology, almost all people (children, teenagers, and adults) have increased their dependence on information technology. The primary purpose is to get the answers to all questions, to access a wide range of tools and resources, and to bring a lot of comforts in one’s life. With the increased use of technology, a lot of privacy issues have also originated. For example, people who are doing businesses on the internet remain concerned about the security of their data especially payment details. It’s safe to say that hackers keep trying to steal our personal details and some of them are expert enough to transfer the money from one’s PayPal or other online accounts to theirs. The fact is that it is almost impossible to get complete rid of these online criminals who are always into stealing the money of businessmen and ruining the reputation of multinational brands and companies by sending fake messages to their customers. Even when we install some software or advanced programs, it is no possible to stay safe on the internet, meaning all of us are always on the radar of hackers.
Begany, Grace. “Information Policy and Mobile Privacy.” Bulletin of the Association for Information Science and Technology, vol. 40, no. 2, Oct. 2014, pp. 17–21., doi:10.1002/bult.2014.1720400207.
Grace Begany argues that we have become increasingly dependent on the internet, which is not a good thing at all. Besides using technological devices and websites for targeting customers worldwide, we use social media and other platforms to communicate with friends and family abroad and to make new relationships. Many of us rely on mobile phones for day-to-day tasks and connectivity, and the hackers are likely to steal our data through these mediums. The lifestyle of a person would be changed if he does not ensure his privacy while using the internet. If he is a businessman, the chance is that his global clients will turn to other places considering his online platform unreliable and full of errors. Thus, it is essential to fix the errors that are related to one’s privacy.
Reeder, Robert, et al. “152 Simple Steps to Stay Safe Online: Security Advice for Non-Tech-Savvy Users.” IEEE Security & Privacy, 2017, pp. 1–1., do...
Updated on
Get the Whole Paper!
Not exactly what you need?
Do you need a custom essay? Order right now:

πŸ‘€ Other Visitors are Viewing These MLA Annotated Bibliography Samples:

HIRE A WRITER FROM $11.95 / PAGE
ORDER WITH 15% DISCOUNT!