SlideShare a Scribd company logo
you have to respond to bellow paper
I also give example of someone who already rrspond to Baker
Baker Post
Data becomes useful information when it is provided with
context. A single piece of data is useless without being
included with a way to relate that data to something else. For
instance, a number by itself means nothing without some type of
context applied to it. Boyle gives this example: “Take the
number 37…now give it some context: 37 degrees C is normal
body temperature” (Boyle, 2011). The number by itself is
merely a data point, but when provided context it becomes a
useful piece of information that can be put to use. However, as
our society has become so reliant on the internet, data is often
pushed out instantly without any chance to provide a true
context to the situation. There have been an unprecedented
amount of controversial situations in recent memory that were
brought to public attention without proper context being
provided. This has the effect of allowing the public to form
opinions without all the information necessary to have a truly
informed opinion. Fayoyin and Ngwainmbi wrote, “Data and
social statistics have been misinterpreted and misrepresented
causing major misinformation within interpersonal and mass
communication” (Fayoyin and Ngwainmbi, 2014). This is a
problem that has been constant for a long time but has only
been made significantly worse with the emergence of social
media.
A primary source is an original document or source
of some kind. If the source of information is an eyewitness or
you get the information directly from an expert in a given field
it would be considered a primary source. An example would be
an autobiography as an individual is writing about their
experiences first hand. A secondary source is when the
information is derived from someone who was either told about
or heard about the information from the primary source. A good
example for a secondary source would be a biography that either
takes the information from the individual themselves or from
things they have written.
For my paper I have found a primary source that was
written by one of the most wanted hackers of all time: Kevin
Mitnick titled Famed Hacker Kevin Mitnick Shows You How to
Go Invisible Online. Mitnick here gives a common example of
how hackers today are able to ensure they cover their tracks and
are not detected, at least with any certainty. Another primary
source I will use was written by Richard Hummel from the
SANS Institute who wrote a paper entitled, Securing Against the
Most Common Vectors o Cyber Attacks. A secondary source
that I will be utilizing is one that discusses many of the biggest
known cyber attacks written by Bruce Middleton titled A
History of Cyber Security Attacks: 1980 to Present.
1. Boyle, Rebecca. Data Harmony: How We Can Turn Piles
of Raw Data into Usable Knowledge,
https://www.popsci.com/science/article/2011-11/turning-raw-
data-useful-ingredients (Accessed 27 June 2018)
2. Fayoyin, Adebayo and Ngwainmbi, Emmanuel. Use and
Misuse of Data in Advocacy, Media and Opinion Polls in
Africa: Realities, Challenges and Opportunities,
https://www.ajol.info/index.php/jdcs/article/view/112465/10221
6 (Accessed 27 June 2018)
3. Hummel, Richard. Securing Against the Most Common
Vectors of Cyber Attacks, https://www.sans.org/reading-
Example of someone who response to Baker post
enjoyed reading your statement in regard on when data can
become usable. I do agree with you a single data with no access
for dissemination does not provide a chance for others to
dispute data validity. Data with no verification is just data that
it cannot be use. Last year during US senator’s election many
television outlets started informing the audience unverified
information on the news and after too many allegations many of
those candidates just decided to drop their names from the list
of participants even if they only had the best intention to serve
their communities. The Television news that it supposed to
report after information has been verified. Hackers do the same
when they get a hold a new phone number usually they start
calling to phishing for verifying to whom belongs the phone
number and try to get as much information as possible for them
to used data for future attack or financial gain. Great primary
source for your paper, I am sure you will do well. Thanks for
sharing your ideas.
Our country remains divided in so many issues like some states
approving drugs into their states with the idea to build revenue
for their states on behaves of the youth. Many senators openly
promotes approving marihuana in their states. We have at least
11 states who openly proclaims to be openly to try into their
states and we are glad that the majority of people are against
this idea. The news outlets needs to become more responsible
in telling the people the truth in regards how drugs is affecting
our way of life and the future of our teens.
**** Please response to Baker ****

More Related Content

DOCX
Social-Media
PDF
Isao MATSUNAMI - Digital security in japanese journalism
PDF
Fact-checking in the newsroom: best practices, open questions
PDF
Invasion Of Privacy In Canadian Media
PPTX
Can Artificial Intelligence Predict The Spread Of Online Hate Speech?
PPT
Selina Rust Libel
PDF
Joy Luck Club Essay Ideas
DOCX
250 word discussion response james wk 7.docx
Social-Media
Isao MATSUNAMI - Digital security in japanese journalism
Fact-checking in the newsroom: best practices, open questions
Invasion Of Privacy In Canadian Media
Can Artificial Intelligence Predict The Spread Of Online Hate Speech?
Selina Rust Libel
Joy Luck Club Essay Ideas
250 word discussion response james wk 7.docx

More from laquandabignell (20)

DOCX
Give an example of a parent conference to explain to the parents the.docx
DOCX
Gender and sexuality are intertwined in many cultures. (Gardiner & K.docx
DOCX
General Directions The length of the essay is roughly 750 words. .docx
DOCX
Give an example of technological innovation from the last two decade.docx
DOCX
Give A Description of the selected disorder (Identify the DSM di.docx
DOCX
Generating Ideas for WritingWriting is a selection of words and .docx
DOCX
Geography Project – Rationale InstructionsYou will identify a .docx
DOCX
Geography Project – Project Plan InstructionsFollowing your Module.docx
DOCX
Geographic LocationThey are found throughout the Pacific, Atlan.docx
DOCX
Geographers have been working with geographic information systems (G.docx
DOCX
General Moters was selected for week 2.Find the company select.docx
DOCX
Geography Project – Outline InstructionsReferencing the Geograph.docx
DOCX
give a general historical background on CongoWhich European Count.docx
DOCX
Geneticists compare DNA base sequences among organisms and from th.docx
DOCX
Gene A crosses over 16.5 percent of the time with gene B. Gene B c.docx
DOCX
Generations in the WorkplaceFor the first time in history, four .docx
DOCX
geo 101 Q&A1. We see may cultures disappearing today. Will there c.docx
DOCX
Genre, a category of artistic production characterized by similariti.docx
DOCX
Geert Hofstede is one of the leading experts on intercultural commun.docx
DOCX
Gen499Discussion #1 Examine the relationship between adva.docx
Give an example of a parent conference to explain to the parents the.docx
Gender and sexuality are intertwined in many cultures. (Gardiner & K.docx
General Directions The length of the essay is roughly 750 words. .docx
Give an example of technological innovation from the last two decade.docx
Give A Description of the selected disorder (Identify the DSM di.docx
Generating Ideas for WritingWriting is a selection of words and .docx
Geography Project – Rationale InstructionsYou will identify a .docx
Geography Project – Project Plan InstructionsFollowing your Module.docx
Geographic LocationThey are found throughout the Pacific, Atlan.docx
Geographers have been working with geographic information systems (G.docx
General Moters was selected for week 2.Find the company select.docx
Geography Project – Outline InstructionsReferencing the Geograph.docx
give a general historical background on CongoWhich European Count.docx
Geneticists compare DNA base sequences among organisms and from th.docx
Gene A crosses over 16.5 percent of the time with gene B. Gene B c.docx
Generations in the WorkplaceFor the first time in history, four .docx
geo 101 Q&A1. We see may cultures disappearing today. Will there c.docx
Genre, a category of artistic production characterized by similariti.docx
Geert Hofstede is one of the leading experts on intercultural commun.docx
Gen499Discussion #1 Examine the relationship between adva.docx
Ad

Recently uploaded (20)

PPTX
Tissue processing ( HISTOPATHOLOGICAL TECHNIQUE
PDF
A GUIDE TO GENETICS FOR UNDERGRADUATE MEDICAL STUDENTS
PPTX
CHAPTER IV. MAN AND BIOSPHERE AND ITS TOTALITY.pptx
PDF
Weekly quiz Compilation Jan -July 25.pdf
PPTX
202450812 BayCHI UCSC-SV 20250812 v17.pptx
PPTX
Cell Types and Its function , kingdom of life
PDF
Trump Administration's workforce development strategy
PPTX
Radiologic_Anatomy_of_the_Brachial_plexus [final].pptx
PDF
GENETICS IN BIOLOGY IN SECONDARY LEVEL FORM 3
PPTX
Lesson notes of climatology university.
PPTX
Chinmaya Tiranga Azadi Quiz (Class 7-8 )
PDF
Classroom Observation Tools for Teachers
PDF
OBE - B.A.(HON'S) IN INTERIOR ARCHITECTURE -Ar.MOHIUDDIN.pdf
PDF
ChatGPT for Dummies - Pam Baker Ccesa007.pdf
PDF
Computing-Curriculum for Schools in Ghana
PPTX
Introduction to Building Materials
PDF
LNK 2025 (2).pdf MWEHEHEHEHEHEHEHEHEHEHE
PDF
RMMM.pdf make it easy to upload and study
PPTX
Onco Emergencies - Spinal cord compression Superior vena cava syndrome Febr...
DOC
Soft-furnishing-By-Architect-A.F.M.Mohiuddin-Akhand.doc
Tissue processing ( HISTOPATHOLOGICAL TECHNIQUE
A GUIDE TO GENETICS FOR UNDERGRADUATE MEDICAL STUDENTS
CHAPTER IV. MAN AND BIOSPHERE AND ITS TOTALITY.pptx
Weekly quiz Compilation Jan -July 25.pdf
202450812 BayCHI UCSC-SV 20250812 v17.pptx
Cell Types and Its function , kingdom of life
Trump Administration's workforce development strategy
Radiologic_Anatomy_of_the_Brachial_plexus [final].pptx
GENETICS IN BIOLOGY IN SECONDARY LEVEL FORM 3
Lesson notes of climatology university.
Chinmaya Tiranga Azadi Quiz (Class 7-8 )
Classroom Observation Tools for Teachers
OBE - B.A.(HON'S) IN INTERIOR ARCHITECTURE -Ar.MOHIUDDIN.pdf
ChatGPT for Dummies - Pam Baker Ccesa007.pdf
Computing-Curriculum for Schools in Ghana
Introduction to Building Materials
LNK 2025 (2).pdf MWEHEHEHEHEHEHEHEHEHEHE
RMMM.pdf make it easy to upload and study
Onco Emergencies - Spinal cord compression Superior vena cava syndrome Febr...
Soft-furnishing-By-Architect-A.F.M.Mohiuddin-Akhand.doc
Ad

you have to respond to bellow paper I also give example of someo.docx

  • 1. you have to respond to bellow paper I also give example of someone who already rrspond to Baker Baker Post Data becomes useful information when it is provided with context. A single piece of data is useless without being included with a way to relate that data to something else. For instance, a number by itself means nothing without some type of context applied to it. Boyle gives this example: “Take the number 37…now give it some context: 37 degrees C is normal body temperature” (Boyle, 2011). The number by itself is merely a data point, but when provided context it becomes a useful piece of information that can be put to use. However, as our society has become so reliant on the internet, data is often pushed out instantly without any chance to provide a true context to the situation. There have been an unprecedented amount of controversial situations in recent memory that were brought to public attention without proper context being provided. This has the effect of allowing the public to form opinions without all the information necessary to have a truly informed opinion. Fayoyin and Ngwainmbi wrote, “Data and social statistics have been misinterpreted and misrepresented causing major misinformation within interpersonal and mass communication” (Fayoyin and Ngwainmbi, 2014). This is a problem that has been constant for a long time but has only been made significantly worse with the emergence of social media. A primary source is an original document or source of some kind. If the source of information is an eyewitness or
  • 2. you get the information directly from an expert in a given field it would be considered a primary source. An example would be an autobiography as an individual is writing about their experiences first hand. A secondary source is when the information is derived from someone who was either told about or heard about the information from the primary source. A good example for a secondary source would be a biography that either takes the information from the individual themselves or from things they have written. For my paper I have found a primary source that was written by one of the most wanted hackers of all time: Kevin Mitnick titled Famed Hacker Kevin Mitnick Shows You How to Go Invisible Online. Mitnick here gives a common example of how hackers today are able to ensure they cover their tracks and are not detected, at least with any certainty. Another primary source I will use was written by Richard Hummel from the SANS Institute who wrote a paper entitled, Securing Against the Most Common Vectors o Cyber Attacks. A secondary source that I will be utilizing is one that discusses many of the biggest known cyber attacks written by Bruce Middleton titled A History of Cyber Security Attacks: 1980 to Present. 1. Boyle, Rebecca. Data Harmony: How We Can Turn Piles of Raw Data into Usable Knowledge, https://www.popsci.com/science/article/2011-11/turning-raw- data-useful-ingredients (Accessed 27 June 2018) 2. Fayoyin, Adebayo and Ngwainmbi, Emmanuel. Use and Misuse of Data in Advocacy, Media and Opinion Polls in
  • 3. Africa: Realities, Challenges and Opportunities, https://www.ajol.info/index.php/jdcs/article/view/112465/10221 6 (Accessed 27 June 2018) 3. Hummel, Richard. Securing Against the Most Common Vectors of Cyber Attacks, https://www.sans.org/reading- Example of someone who response to Baker post enjoyed reading your statement in regard on when data can become usable. I do agree with you a single data with no access for dissemination does not provide a chance for others to dispute data validity. Data with no verification is just data that it cannot be use. Last year during US senator’s election many television outlets started informing the audience unverified information on the news and after too many allegations many of those candidates just decided to drop their names from the list of participants even if they only had the best intention to serve their communities. The Television news that it supposed to report after information has been verified. Hackers do the same when they get a hold a new phone number usually they start calling to phishing for verifying to whom belongs the phone number and try to get as much information as possible for them to used data for future attack or financial gain. Great primary source for your paper, I am sure you will do well. Thanks for
  • 4. sharing your ideas. Our country remains divided in so many issues like some states approving drugs into their states with the idea to build revenue for their states on behaves of the youth. Many senators openly promotes approving marihuana in their states. We have at least 11 states who openly proclaims to be openly to try into their states and we are glad that the majority of people are against this idea. The news outlets needs to become more responsible in telling the people the truth in regards how drugs is affecting our way of life and the future of our teens. **** Please response to Baker ****