SlideShare a Scribd company logo
1 of 12
Chen1
Annotated Bibliography
“Malice Domestic: The Cambridge Analytica Dystopia.”
Computer, no. 5, 2018, p. 84.
EBSCOhost, doi:10.1109/MC.2018.2381135.
The author of this article is Hal Berghel, a Fellow in IEEE and
ACM, also a computer science
professor from the University of Nevada. The purpose of this
article is to try to tell people
companies like cambridge analytica had manipulate the
Electorates by used the data
analytics, to control the election. In the content, they uses
various methods to manipulate the
electorates, and tells about how they use data analysis to catch
users’ psychology and
manipulate it. The audience for this article could be the people
who had been psychologically
manipulated, the author used this article to warn them about
this. The observation by the
author is the authors conclude that free online services have
been used as weapons for dealing
with us. Also, the author has concluded about the future, the
Cambridge Analytica would
become less controversy due to the support from the right-wing
political; or even the
Cambridge Analytica go out of business, more and more
companies will get into this field of
business. With the development of network technology, more
and more people are affected
by the information network on the Internet, and it is easier to
expose our privacy. Therefore, I
can use this resource in future articles, because it is normal for
people like Cambridge to
manipulate us through data analysis. Therefore, I think this
article is designed to help people
awake to avoid being affected by malware attackers.
Heawood, Jonathan. “Pseudo-Public Political Speech:
Democratic Implications of the
Cambridge Analytica Scandal.” Information Polity: The
International Journal of
Government & Democracy in the Information Age, vol. 23, no.
4, Oct. 2018, pp.
429–434. EBSCOhost, doi:10.3233/IP-180009.
Chen2
The author is Jonathan Heawood: Chief Executive Officer,
impress, and the director of the
English Centre of International PEN. The purpose of this article
is to tell people about the
companies uses users’ personal data to get political benefits by
microtargeting. The contents
of this article expressed how Cambridge analytica uses users’
personal data to gain political
benefits. And talks about the harmful of the microtargeting,
because the microtargeting might
have false information. The audience is possible audience of
this article would be the people
who use Facebook or other social media. The evaluate of the
author concluded that
microtargeting is harmful to people because it’s using our
personal data without our
permission, it contains false information and blurred the
difference between advertising and
other kinds of content. Also, we can’t correct the claim made by
other individuals on social
media, so there could be lots of misleading information. I could
use this source to express
why micro targets are harmful to us. Because people use false
information to seduce us to
achieve some of their unknown purpose.
FULGONI, GIAN M., et al. “The Power of Political
Advertising: Lessons for Practitioners.”
Journal of Advertising Research, vol. 56, no. 3, Sept. 2016, pp.
239–244. EBSCOhost,
doi:10.2501/JAR-2016-034.
Gian Mark Fulgoni is a British businessman, entrepreneur and
market research consultant.
Andrew Lipsman is a former Vice President, Marketing &
Insights at comScore, where he
covered multiple industries and oversaw the company’s
marketing communications, insights
and thought leadership initiatives. Carol Davidsen is currently
co-founder at cir.cl, INC, the
Director of Integration & Media Targeting at Obama for
America leasing development efforts
of Narwhal and "The Optimizer". The purpose of the article is
to explain how they use the
"The Optimizer" and Narwhal as tools to collect user data and
social media responses as data
for analysis and to maximize the benefits for candidates for US
presidential campaigns,
Chen3
including the 2012 and 2016 campaigns. The content of the
article is about Carol Davidsen,
Andrew Lipsman and Gian Fulgoni used real-life examples like
the 2012 US presidential
election, how they used "The Optimizer" and Narwhal as tools
to collect data from candidate
Obama and candidate Romney to provide commercial
advertising advice. The audience is
mainly readers of this article may be people who use social
media and interested in politics.
The authors conclude that they can streamline the media data
and media of political campaign
advertising to achieve their campaign goals, because in 2010,
the Supreme Court of Citizens
decided to allow large amounts of foreign capital to enter the
election, so they needed them to
use these statistics to analyze how to make the biggest profit for
advertising revenue. My
reflection is since 2012, presidential candidates have been using
data analysis as a weapon for
presidential campaigns. Who can better conduct data analysis or
market analysis, who may
use advertisements or media to influence voters, but it may lose
the original intention of the
election for my point of view, the election support to create the
best interests for the people of
the country, not to act according to market demand.
Larson, Eric C., and Carl Vieregger. “Teaching Case Strategic
Actions in a Platform Context:
What Should Facebook Do Next?” Journal of Information
Systems Education, vol.
30, no. 2, Spring 2019, pp. 97–105. EBSCOhost,
search.ebscohost.com/login.aspx?direct=true&db=bsu&AN=136
851147&site=eds-liv
e&scope=site.
The author's name is Eric c. Larson, Ph.D. from the University
of Washington, Associate
Professor in Computer Science in the Bobby B. Lyle School of
Engineering, Southern
Methodist University. He also is a member of the Darwin
Deason Institute for
Cyber-security, and member of the ATT center for
virtualization. Carl Vieregger is an
Assistant Professor of Management and researcher at Drake
University. Carl’s PhD is in
Chen4
Business and Corporate Strategy from Washington University in
St. Louis. Before he got his
PhD, he also earned an MBA from Columbia Business School
and a B.A. from Northwestern
University. The author’s purpose of this article is to introduce
the impact of network effects
by using facebook and Cambridge Analytica to help students or
other people interested in the
case include information systems strategies, digital and social
media strategies, and
management information systems. This article is for study only
and will not involve politics.
In conclusion, the author describes the influence of Facebook
and social media, then
describes how Cambridge analysts use them to influence in the
European Brexit and Hillary
Clinton and Donald's permission for the 2016 US presidential
election.And then explains the
role of Facebook and Cambridge and the consequences and
strategies of Facebook after a
user violation. The audience in the article would be the people
who use Facebook or other
social media. This article can help me explains in Cambridge
Analytica Cause. It tells us that
even if you do manipulate Internet users, the people who are
ultimately hurt will still come
together to resist violations of their privacy and manipulation.
Bocetta, Sam. “Have Consumers Already Lost the Online
Privacy War?: Sam Bocetta.” FEE
Freeman Article, Foundation for Economic Education, 20 May
2019,
https://fee.org/articles/have-consumers-already-lost-the-online-
privacy-war/.
The article author is Sam Bocetta is a former security analyst
for the DoD. the purpose of the
article is to tell us as consumers rely more on the internet, more
personal privacy is being
threatened. the author trying to convince people should use
VPN, Brave browser and long
password to protect their privacy. The content of this article
shows that companies like
Google and Facebook have sold user information to
governments or other companies.
Therefore, the author uses this article to warn people that our
privacy is at risk and everyone
should be aware of this issue. Also, ask us how to avoid
revealing our information and how to
Chen5
protect our privacy. Possible readers of this article may be
people who have been
psychologically manipulated, or who use Facebook or Google.
My observation is that it is sad
that most users don't know how to protect and determine the
type of data they want to share
or retain, and it's important to know how to protect privacy.
Madrigal, Alexis C. “What Took Facebook So Long?” The
Atlantic, Atlantic Media
Company, 18 Mar. 2018,
https://www.theatlantic.com/technology/archive/2018/03/facebo
ok-cambridge-analyti
ca/555866/.
Alexis Madrigal graduated from Harvard University with a
Bachelor of Arts degree. (With
excellent results), he is also an associate editor of The Atlantic.
The purpose of this article is
to tell people how Facebook uses 30 million US Facebook user
data profiles for targeted
political or profit-making advertising. The content of this
article expresses how Facebook
uses its personal data to gain political advantage through
"Global Science Research". People
already worry about Facebook have manipulates all kinds of
information (even thoughts) and
they don't agree to give it to anyone. The audience is possible
audience of this article would
be the people who use Facebook or other social media. The
author's assessment concludes
that Facebook has developed a method for classifying people
based on personal data, which
may exploit advertising revenue or political goals. This article
can help me illustration of the
timeline, detailing how Facebook uses data to build a model of
Cambridge Analytica to
manipulate Internet users.
Chen6
The purpose of my article is to try to tell people that data
companies like Cambridge Analytics
have used electoral analysis to manipulate voters to control
elections for political gain. This
violates people’s personal privacy and violates people’s rights.
microtargeting
microtargeting is harmful to people because it’s using our
personal data without our permission,
it contains false information and blurred the difference between
advertising and other kinds of
content.
real-life examples
Like the 2012 US presidential election, how they used "The
Optimizer" and Narwhal as tools to
collect data from candidate Obama and candidate Romney to
provide commercial advertising
advice.
Why should we stop it
since 2012, presidential candidates have been using data
analysis as a weapon for presidential
campaigns. Who can better conduct data analysis or market
analysis, who may use
advertisements or media to influence voters, but it may lose the
original intention of the election
for my point of view, the election support to create the best
interests for the people of the
country, not to act according to market demand.
How should we protect our internet privacy
People should use VPN, Brave browser and long password to
protect their privacy.
My observation is that it is sad that most users don't know how
to protect and determine the
type of data they want to share or retain, and it's important to
know how to protect privacy.

More Related Content

Similar to Chen1 A.docx

Outstanding women in analytics 2017
Outstanding women in analytics 2017Outstanding women in analytics 2017
Outstanding women in analytics 2017metabrown
 
ChristineChildsFacebookDataBreachFinalpptx.pptx
ChristineChildsFacebookDataBreachFinalpptx.pptxChristineChildsFacebookDataBreachFinalpptx.pptx
ChristineChildsFacebookDataBreachFinalpptx.pptxChristineChilds6
 
ChristineChildsFacebookDataBreach.pptx
ChristineChildsFacebookDataBreach.pptxChristineChildsFacebookDataBreach.pptx
ChristineChildsFacebookDataBreach.pptxChristineChilds6
 
The Future of Big Data
The Future of Big Data The Future of Big Data
The Future of Big Data EMC
 
Big Data, Republicans and 2016
Big Data, Republicans and 2016Big Data, Republicans and 2016
Big Data, Republicans and 2016steveparkhurst
 
CMC Group 3: WhatsThat Chrome Extension
CMC Group 3: WhatsThat Chrome ExtensionCMC Group 3: WhatsThat Chrome Extension
CMC Group 3: WhatsThat Chrome ExtensionLarissaChurchill
 
Big Data, Transparency & Social Media Networks
Big Data, Transparency & Social Media NetworksBig Data, Transparency & Social Media Networks
Big Data, Transparency & Social Media NetworksSylvia Ogweng
 
Mosley (1) twitter reseaech for insurance
Mosley (1) twitter reseaech for insuranceMosley (1) twitter reseaech for insurance
Mosley (1) twitter reseaech for insuranceOdanga Madung
 
week 1 Day 2 Power of Media and Information Literacy.pptx
week 1 Day 2 Power of Media and Information Literacy.pptxweek 1 Day 2 Power of Media and Information Literacy.pptx
week 1 Day 2 Power of Media and Information Literacy.pptxdanielloberiz1
 
Attracting Top Talent and Pitfalls of Virtual Recruiting
Attracting Top Talent and Pitfalls of Virtual RecruitingAttracting Top Talent and Pitfalls of Virtual Recruiting
Attracting Top Talent and Pitfalls of Virtual RecruitingJessica Miller-Merrell
 
1FACEBOOK DATA SCANDALNameCourse Code and Nam
1FACEBOOK DATA SCANDALNameCourse Code and Nam1FACEBOOK DATA SCANDALNameCourse Code and Nam
1FACEBOOK DATA SCANDALNameCourse Code and NamAnastaciaShadelb
 
Cambridge analytica facebook
Cambridge analytica facebookCambridge analytica facebook
Cambridge analytica facebookRohan Hirani
 
Social Media Digital Portfolio
Social Media Digital Portfolio Social Media Digital Portfolio
Social Media Digital Portfolio rovalencia0209
 
The Crisis of Self Sovereignty in The Age of Surveillance Capitalism
The Crisis of Self Sovereignty in The Age of Surveillance CapitalismThe Crisis of Self Sovereignty in The Age of Surveillance Capitalism
The Crisis of Self Sovereignty in The Age of Surveillance CapitalismJongseung Kim
 
The use-of-social-media-in-the-recruitment-process
The use-of-social-media-in-the-recruitment-processThe use-of-social-media-in-the-recruitment-process
The use-of-social-media-in-the-recruitment-processPreeti Bhaskar
 

Similar to Chen1 A.docx (20)

Outstanding women in analytics 2017
Outstanding women in analytics 2017Outstanding women in analytics 2017
Outstanding women in analytics 2017
 
ChristineChildsFacebookDataBreachFinalpptx.pptx
ChristineChildsFacebookDataBreachFinalpptx.pptxChristineChildsFacebookDataBreachFinalpptx.pptx
ChristineChildsFacebookDataBreachFinalpptx.pptx
 
ChristineChildsFacebookDataBreach.pptx
ChristineChildsFacebookDataBreach.pptxChristineChildsFacebookDataBreach.pptx
ChristineChildsFacebookDataBreach.pptx
 
The Future of Big Data
The Future of Big Data The Future of Big Data
The Future of Big Data
 
Big Data, Republicans and 2016
Big Data, Republicans and 2016Big Data, Republicans and 2016
Big Data, Republicans and 2016
 
CMC Group 3: WhatsThat Chrome Extension
CMC Group 3: WhatsThat Chrome ExtensionCMC Group 3: WhatsThat Chrome Extension
CMC Group 3: WhatsThat Chrome Extension
 
Big Data, Transparency & Social Media Networks
Big Data, Transparency & Social Media NetworksBig Data, Transparency & Social Media Networks
Big Data, Transparency & Social Media Networks
 
Hsci538 ppt
Hsci538 pptHsci538 ppt
Hsci538 ppt
 
Mosley (1) twitter reseaech for insurance
Mosley (1) twitter reseaech for insuranceMosley (1) twitter reseaech for insurance
Mosley (1) twitter reseaech for insurance
 
Dissertation Proposal MBA
Dissertation Proposal MBADissertation Proposal MBA
Dissertation Proposal MBA
 
week 1 Day 2 Power of Media and Information Literacy.pptx
week 1 Day 2 Power of Media and Information Literacy.pptxweek 1 Day 2 Power of Media and Information Literacy.pptx
week 1 Day 2 Power of Media and Information Literacy.pptx
 
09135
0913509135
09135
 
Attracting Top Talent and Pitfalls of Virtual Recruiting
Attracting Top Talent and Pitfalls of Virtual RecruitingAttracting Top Talent and Pitfalls of Virtual Recruiting
Attracting Top Talent and Pitfalls of Virtual Recruiting
 
1FACEBOOK DATA SCANDALNameCourse Code and Nam
1FACEBOOK DATA SCANDALNameCourse Code and Nam1FACEBOOK DATA SCANDALNameCourse Code and Nam
1FACEBOOK DATA SCANDALNameCourse Code and Nam
 
Cambridge analytica facebook
Cambridge analytica facebookCambridge analytica facebook
Cambridge analytica facebook
 
Social Media Digital Portfolio
Social Media Digital Portfolio Social Media Digital Portfolio
Social Media Digital Portfolio
 
Csa instagram
Csa instagramCsa instagram
Csa instagram
 
Lisa's research
Lisa's researchLisa's research
Lisa's research
 
The Crisis of Self Sovereignty in The Age of Surveillance Capitalism
The Crisis of Self Sovereignty in The Age of Surveillance CapitalismThe Crisis of Self Sovereignty in The Age of Surveillance Capitalism
The Crisis of Self Sovereignty in The Age of Surveillance Capitalism
 
The use-of-social-media-in-the-recruitment-process
The use-of-social-media-in-the-recruitment-processThe use-of-social-media-in-the-recruitment-process
The use-of-social-media-in-the-recruitment-process
 

More from ShiraPrater50

Read Chapter 3. Answer the following questions1.Wha.docx
Read Chapter 3. Answer the following questions1.Wha.docxRead Chapter 3. Answer the following questions1.Wha.docx
Read Chapter 3. Answer the following questions1.Wha.docxShiraPrater50
 
Read Chapter 15 and answer the following questions 1.  De.docx
Read Chapter 15 and answer the following questions 1.  De.docxRead Chapter 15 and answer the following questions 1.  De.docx
Read Chapter 15 and answer the following questions 1.  De.docxShiraPrater50
 
Read Chapter 2 and answer the following questions1.  List .docx
Read Chapter 2 and answer the following questions1.  List .docxRead Chapter 2 and answer the following questions1.  List .docx
Read Chapter 2 and answer the following questions1.  List .docxShiraPrater50
 
Read chapter 7 and write the book report  The paper should be .docx
Read chapter 7 and write the book report  The paper should be .docxRead chapter 7 and write the book report  The paper should be .docx
Read chapter 7 and write the book report  The paper should be .docxShiraPrater50
 
Read Chapter 7 and answer the following questions1.  What a.docx
Read Chapter 7 and answer the following questions1.  What a.docxRead Chapter 7 and answer the following questions1.  What a.docx
Read Chapter 7 and answer the following questions1.  What a.docxShiraPrater50
 
Read chapter 14, 15 and 18 of the class textbook.Saucier.docx
Read chapter 14, 15 and 18 of the class textbook.Saucier.docxRead chapter 14, 15 and 18 of the class textbook.Saucier.docx
Read chapter 14, 15 and 18 of the class textbook.Saucier.docxShiraPrater50
 
Read Chapter 10 APA FORMAT1. In the last century, what historica.docx
Read Chapter 10 APA FORMAT1. In the last century, what historica.docxRead Chapter 10 APA FORMAT1. In the last century, what historica.docx
Read Chapter 10 APA FORMAT1. In the last century, what historica.docxShiraPrater50
 
Read chapter 7 and write the book report  The paper should b.docx
Read chapter 7 and write the book report  The paper should b.docxRead chapter 7 and write the book report  The paper should b.docx
Read chapter 7 and write the book report  The paper should b.docxShiraPrater50
 
Read Chapter 14 and answer the following questions1.  Explain t.docx
Read Chapter 14 and answer the following questions1.  Explain t.docxRead Chapter 14 and answer the following questions1.  Explain t.docx
Read Chapter 14 and answer the following questions1.  Explain t.docxShiraPrater50
 
Read Chapter 2 first. Then come to this assignment.The first t.docx
Read Chapter 2 first. Then come to this assignment.The first t.docxRead Chapter 2 first. Then come to this assignment.The first t.docx
Read Chapter 2 first. Then come to this assignment.The first t.docxShiraPrater50
 
Journal of Public Affairs Education 515Teaching Grammar a.docx
 Journal of Public Affairs Education 515Teaching Grammar a.docx Journal of Public Affairs Education 515Teaching Grammar a.docx
Journal of Public Affairs Education 515Teaching Grammar a.docxShiraPrater50
 
Learner Guide TLIR5014 Manage suppliers TLIR.docx
 Learner Guide TLIR5014 Manage suppliers TLIR.docx Learner Guide TLIR5014 Manage suppliers TLIR.docx
Learner Guide TLIR5014 Manage suppliers TLIR.docxShiraPrater50
 
Lab 5 Nessus Vulnerability Scan Report © 2012 by Jone.docx
 Lab 5 Nessus Vulnerability Scan Report © 2012 by Jone.docx Lab 5 Nessus Vulnerability Scan Report © 2012 by Jone.docx
Lab 5 Nessus Vulnerability Scan Report © 2012 by Jone.docxShiraPrater50
 
Leveled and Exclusionary Tracking English Learners Acce.docx
 Leveled and Exclusionary Tracking English Learners Acce.docx Leveled and Exclusionary Tracking English Learners Acce.docx
Leveled and Exclusionary Tracking English Learners Acce.docxShiraPrater50
 
Lab 5 Nessus Vulnerability Scan Report © 2015 by Jone.docx
 Lab 5 Nessus Vulnerability Scan Report © 2015 by Jone.docx Lab 5 Nessus Vulnerability Scan Report © 2015 by Jone.docx
Lab 5 Nessus Vulnerability Scan Report © 2015 by Jone.docxShiraPrater50
 
MBA 6941, Managing Project Teams 1 Course Learning Ou.docx
 MBA 6941, Managing Project Teams 1 Course Learning Ou.docx MBA 6941, Managing Project Teams 1 Course Learning Ou.docx
MBA 6941, Managing Project Teams 1 Course Learning Ou.docxShiraPrater50
 
Inventory Decisions in Dells Supply ChainAuthor(s) Ro.docx
 Inventory Decisions in Dells Supply ChainAuthor(s) Ro.docx Inventory Decisions in Dells Supply ChainAuthor(s) Ro.docx
Inventory Decisions in Dells Supply ChainAuthor(s) Ro.docxShiraPrater50
 
It’s Your Choice 10 – Clear Values 2nd Chain Link- Trade-offs .docx
 It’s Your Choice 10 – Clear Values 2nd Chain Link- Trade-offs .docx It’s Your Choice 10 – Clear Values 2nd Chain Link- Trade-offs .docx
It’s Your Choice 10 – Clear Values 2nd Chain Link- Trade-offs .docxShiraPrater50
 
MBA 5101, Strategic Management and Business Policy 1 .docx
 MBA 5101, Strategic Management and Business Policy 1 .docx MBA 5101, Strategic Management and Business Policy 1 .docx
MBA 5101, Strategic Management and Business Policy 1 .docxShiraPrater50
 
MAJOR WORLD RELIGIONSJudaismJudaism (began .docx
 MAJOR WORLD RELIGIONSJudaismJudaism (began .docx MAJOR WORLD RELIGIONSJudaismJudaism (began .docx
MAJOR WORLD RELIGIONSJudaismJudaism (began .docxShiraPrater50
 

More from ShiraPrater50 (20)

Read Chapter 3. Answer the following questions1.Wha.docx
Read Chapter 3. Answer the following questions1.Wha.docxRead Chapter 3. Answer the following questions1.Wha.docx
Read Chapter 3. Answer the following questions1.Wha.docx
 
Read Chapter 15 and answer the following questions 1.  De.docx
Read Chapter 15 and answer the following questions 1.  De.docxRead Chapter 15 and answer the following questions 1.  De.docx
Read Chapter 15 and answer the following questions 1.  De.docx
 
Read Chapter 2 and answer the following questions1.  List .docx
Read Chapter 2 and answer the following questions1.  List .docxRead Chapter 2 and answer the following questions1.  List .docx
Read Chapter 2 and answer the following questions1.  List .docx
 
Read chapter 7 and write the book report  The paper should be .docx
Read chapter 7 and write the book report  The paper should be .docxRead chapter 7 and write the book report  The paper should be .docx
Read chapter 7 and write the book report  The paper should be .docx
 
Read Chapter 7 and answer the following questions1.  What a.docx
Read Chapter 7 and answer the following questions1.  What a.docxRead Chapter 7 and answer the following questions1.  What a.docx
Read Chapter 7 and answer the following questions1.  What a.docx
 
Read chapter 14, 15 and 18 of the class textbook.Saucier.docx
Read chapter 14, 15 and 18 of the class textbook.Saucier.docxRead chapter 14, 15 and 18 of the class textbook.Saucier.docx
Read chapter 14, 15 and 18 of the class textbook.Saucier.docx
 
Read Chapter 10 APA FORMAT1. In the last century, what historica.docx
Read Chapter 10 APA FORMAT1. In the last century, what historica.docxRead Chapter 10 APA FORMAT1. In the last century, what historica.docx
Read Chapter 10 APA FORMAT1. In the last century, what historica.docx
 
Read chapter 7 and write the book report  The paper should b.docx
Read chapter 7 and write the book report  The paper should b.docxRead chapter 7 and write the book report  The paper should b.docx
Read chapter 7 and write the book report  The paper should b.docx
 
Read Chapter 14 and answer the following questions1.  Explain t.docx
Read Chapter 14 and answer the following questions1.  Explain t.docxRead Chapter 14 and answer the following questions1.  Explain t.docx
Read Chapter 14 and answer the following questions1.  Explain t.docx
 
Read Chapter 2 first. Then come to this assignment.The first t.docx
Read Chapter 2 first. Then come to this assignment.The first t.docxRead Chapter 2 first. Then come to this assignment.The first t.docx
Read Chapter 2 first. Then come to this assignment.The first t.docx
 
Journal of Public Affairs Education 515Teaching Grammar a.docx
 Journal of Public Affairs Education 515Teaching Grammar a.docx Journal of Public Affairs Education 515Teaching Grammar a.docx
Journal of Public Affairs Education 515Teaching Grammar a.docx
 
Learner Guide TLIR5014 Manage suppliers TLIR.docx
 Learner Guide TLIR5014 Manage suppliers TLIR.docx Learner Guide TLIR5014 Manage suppliers TLIR.docx
Learner Guide TLIR5014 Manage suppliers TLIR.docx
 
Lab 5 Nessus Vulnerability Scan Report © 2012 by Jone.docx
 Lab 5 Nessus Vulnerability Scan Report © 2012 by Jone.docx Lab 5 Nessus Vulnerability Scan Report © 2012 by Jone.docx
Lab 5 Nessus Vulnerability Scan Report © 2012 by Jone.docx
 
Leveled and Exclusionary Tracking English Learners Acce.docx
 Leveled and Exclusionary Tracking English Learners Acce.docx Leveled and Exclusionary Tracking English Learners Acce.docx
Leveled and Exclusionary Tracking English Learners Acce.docx
 
Lab 5 Nessus Vulnerability Scan Report © 2015 by Jone.docx
 Lab 5 Nessus Vulnerability Scan Report © 2015 by Jone.docx Lab 5 Nessus Vulnerability Scan Report © 2015 by Jone.docx
Lab 5 Nessus Vulnerability Scan Report © 2015 by Jone.docx
 
MBA 6941, Managing Project Teams 1 Course Learning Ou.docx
 MBA 6941, Managing Project Teams 1 Course Learning Ou.docx MBA 6941, Managing Project Teams 1 Course Learning Ou.docx
MBA 6941, Managing Project Teams 1 Course Learning Ou.docx
 
Inventory Decisions in Dells Supply ChainAuthor(s) Ro.docx
 Inventory Decisions in Dells Supply ChainAuthor(s) Ro.docx Inventory Decisions in Dells Supply ChainAuthor(s) Ro.docx
Inventory Decisions in Dells Supply ChainAuthor(s) Ro.docx
 
It’s Your Choice 10 – Clear Values 2nd Chain Link- Trade-offs .docx
 It’s Your Choice 10 – Clear Values 2nd Chain Link- Trade-offs .docx It’s Your Choice 10 – Clear Values 2nd Chain Link- Trade-offs .docx
It’s Your Choice 10 – Clear Values 2nd Chain Link- Trade-offs .docx
 
MBA 5101, Strategic Management and Business Policy 1 .docx
 MBA 5101, Strategic Management and Business Policy 1 .docx MBA 5101, Strategic Management and Business Policy 1 .docx
MBA 5101, Strategic Management and Business Policy 1 .docx
 
MAJOR WORLD RELIGIONSJudaismJudaism (began .docx
 MAJOR WORLD RELIGIONSJudaismJudaism (began .docx MAJOR WORLD RELIGIONSJudaismJudaism (began .docx
MAJOR WORLD RELIGIONSJudaismJudaism (began .docx
 

Recently uploaded

Crayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon ACrayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon AUnboundStockton
 
Solving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxSolving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxOH TEIK BIN
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxheathfieldcps1
 
Separation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and ActinidesSeparation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and ActinidesFatimaKhan178732
 
APM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across SectorsAPM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across SectorsAssociation for Project Management
 
Introduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher EducationIntroduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher Educationpboyjonauth
 
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions  for the students and aspirants of Chemistry12th.pptxOrganic Name Reactions  for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions for the students and aspirants of Chemistry12th.pptxVS Mahajan Coaching Centre
 
CARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxCARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxGaneshChakor2
 
Paris 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityParis 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityGeoBlogs
 
Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingTechSoup
 
Accessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactAccessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactdawncurless
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)eniolaolutunde
 
MENTAL STATUS EXAMINATION format.docx
MENTAL     STATUS EXAMINATION format.docxMENTAL     STATUS EXAMINATION format.docx
MENTAL STATUS EXAMINATION format.docxPoojaSen20
 
Presiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsPresiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsanshu789521
 
Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3JemimahLaneBuaron
 
Sanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfSanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfsanyamsingh5019
 
A Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformA Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformChameera Dedduwage
 

Recently uploaded (20)

Crayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon ACrayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon A
 
Solving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxSolving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptx
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptx
 
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdfTataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
 
Separation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and ActinidesSeparation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and Actinides
 
APM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across SectorsAPM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across Sectors
 
Introduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher EducationIntroduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher Education
 
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
 
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions  for the students and aspirants of Chemistry12th.pptxOrganic Name Reactions  for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
 
Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1
 
CARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxCARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptx
 
Paris 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityParis 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activity
 
Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy Consulting
 
Accessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactAccessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impact
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)
 
MENTAL STATUS EXAMINATION format.docx
MENTAL     STATUS EXAMINATION format.docxMENTAL     STATUS EXAMINATION format.docx
MENTAL STATUS EXAMINATION format.docx
 
Presiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsPresiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha elections
 
Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3
 
Sanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfSanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdf
 
A Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformA Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy Reform
 

Chen1 A.docx

  • 1. Chen1 Annotated Bibliography “Malice Domestic: The Cambridge Analytica Dystopia.” Computer, no. 5, 2018, p. 84. EBSCOhost, doi:10.1109/MC.2018.2381135. The author of this article is Hal Berghel, a Fellow in IEEE and ACM, also a computer science professor from the University of Nevada. The purpose of this article is to try to tell people companies like cambridge analytica had manipulate the Electorates by used the data analytics, to control the election. In the content, they uses various methods to manipulate the electorates, and tells about how they use data analysis to catch users’ psychology and manipulate it. The audience for this article could be the people who had been psychologically manipulated, the author used this article to warn them about this. The observation by the author is the authors conclude that free online services have
  • 2. been used as weapons for dealing with us. Also, the author has concluded about the future, the Cambridge Analytica would become less controversy due to the support from the right-wing political; or even the Cambridge Analytica go out of business, more and more companies will get into this field of business. With the development of network technology, more and more people are affected by the information network on the Internet, and it is easier to expose our privacy. Therefore, I can use this resource in future articles, because it is normal for people like Cambridge to manipulate us through data analysis. Therefore, I think this article is designed to help people awake to avoid being affected by malware attackers. Heawood, Jonathan. “Pseudo-Public Political Speech: Democratic Implications of the Cambridge Analytica Scandal.” Information Polity: The International Journal of Government & Democracy in the Information Age, vol. 23, no. 4, Oct. 2018, pp. 429–434. EBSCOhost, doi:10.3233/IP-180009.
  • 3. Chen2 The author is Jonathan Heawood: Chief Executive Officer, impress, and the director of the English Centre of International PEN. The purpose of this article is to tell people about the companies uses users’ personal data to get political benefits by microtargeting. The contents of this article expressed how Cambridge analytica uses users’ personal data to gain political benefits. And talks about the harmful of the microtargeting, because the microtargeting might have false information. The audience is possible audience of this article would be the people who use Facebook or other social media. The evaluate of the author concluded that microtargeting is harmful to people because it’s using our personal data without our permission, it contains false information and blurred the difference between advertising and other kinds of content. Also, we can’t correct the claim made by other individuals on social media, so there could be lots of misleading information. I could use this source to express
  • 4. why micro targets are harmful to us. Because people use false information to seduce us to achieve some of their unknown purpose. FULGONI, GIAN M., et al. “The Power of Political Advertising: Lessons for Practitioners.” Journal of Advertising Research, vol. 56, no. 3, Sept. 2016, pp. 239–244. EBSCOhost, doi:10.2501/JAR-2016-034. Gian Mark Fulgoni is a British businessman, entrepreneur and market research consultant. Andrew Lipsman is a former Vice President, Marketing & Insights at comScore, where he covered multiple industries and oversaw the company’s marketing communications, insights and thought leadership initiatives. Carol Davidsen is currently co-founder at cir.cl, INC, the Director of Integration & Media Targeting at Obama for America leasing development efforts of Narwhal and "The Optimizer". The purpose of the article is to explain how they use the "The Optimizer" and Narwhal as tools to collect user data and social media responses as data for analysis and to maximize the benefits for candidates for US
  • 5. presidential campaigns, Chen3 including the 2012 and 2016 campaigns. The content of the article is about Carol Davidsen, Andrew Lipsman and Gian Fulgoni used real-life examples like the 2012 US presidential election, how they used "The Optimizer" and Narwhal as tools to collect data from candidate Obama and candidate Romney to provide commercial advertising advice. The audience is mainly readers of this article may be people who use social media and interested in politics. The authors conclude that they can streamline the media data and media of political campaign advertising to achieve their campaign goals, because in 2010, the Supreme Court of Citizens decided to allow large amounts of foreign capital to enter the election, so they needed them to use these statistics to analyze how to make the biggest profit for advertising revenue. My reflection is since 2012, presidential candidates have been using data analysis as a weapon for
  • 6. presidential campaigns. Who can better conduct data analysis or market analysis, who may use advertisements or media to influence voters, but it may lose the original intention of the election for my point of view, the election support to create the best interests for the people of the country, not to act according to market demand. Larson, Eric C., and Carl Vieregger. “Teaching Case Strategic Actions in a Platform Context: What Should Facebook Do Next?” Journal of Information Systems Education, vol. 30, no. 2, Spring 2019, pp. 97–105. EBSCOhost, search.ebscohost.com/login.aspx?direct=true&db=bsu&AN=136 851147&site=eds-liv e&scope=site. The author's name is Eric c. Larson, Ph.D. from the University of Washington, Associate Professor in Computer Science in the Bobby B. Lyle School of Engineering, Southern Methodist University. He also is a member of the Darwin Deason Institute for Cyber-security, and member of the ATT center for virtualization. Carl Vieregger is an
  • 7. Assistant Professor of Management and researcher at Drake University. Carl’s PhD is in Chen4 Business and Corporate Strategy from Washington University in St. Louis. Before he got his PhD, he also earned an MBA from Columbia Business School and a B.A. from Northwestern University. The author’s purpose of this article is to introduce the impact of network effects by using facebook and Cambridge Analytica to help students or other people interested in the case include information systems strategies, digital and social media strategies, and management information systems. This article is for study only and will not involve politics. In conclusion, the author describes the influence of Facebook and social media, then describes how Cambridge analysts use them to influence in the European Brexit and Hillary Clinton and Donald's permission for the 2016 US presidential election.And then explains the role of Facebook and Cambridge and the consequences and strategies of Facebook after a
  • 8. user violation. The audience in the article would be the people who use Facebook or other social media. This article can help me explains in Cambridge Analytica Cause. It tells us that even if you do manipulate Internet users, the people who are ultimately hurt will still come together to resist violations of their privacy and manipulation. Bocetta, Sam. “Have Consumers Already Lost the Online Privacy War?: Sam Bocetta.” FEE Freeman Article, Foundation for Economic Education, 20 May 2019, https://fee.org/articles/have-consumers-already-lost-the-online- privacy-war/. The article author is Sam Bocetta is a former security analyst for the DoD. the purpose of the article is to tell us as consumers rely more on the internet, more personal privacy is being threatened. the author trying to convince people should use VPN, Brave browser and long password to protect their privacy. The content of this article shows that companies like Google and Facebook have sold user information to governments or other companies.
  • 9. Therefore, the author uses this article to warn people that our privacy is at risk and everyone should be aware of this issue. Also, ask us how to avoid revealing our information and how to Chen5 protect our privacy. Possible readers of this article may be people who have been psychologically manipulated, or who use Facebook or Google. My observation is that it is sad that most users don't know how to protect and determine the type of data they want to share or retain, and it's important to know how to protect privacy. Madrigal, Alexis C. “What Took Facebook So Long?” The Atlantic, Atlantic Media Company, 18 Mar. 2018, https://www.theatlantic.com/technology/archive/2018/03/facebo ok-cambridge-analyti ca/555866/. Alexis Madrigal graduated from Harvard University with a Bachelor of Arts degree. (With excellent results), he is also an associate editor of The Atlantic.
  • 10. The purpose of this article is to tell people how Facebook uses 30 million US Facebook user data profiles for targeted political or profit-making advertising. The content of this article expresses how Facebook uses its personal data to gain political advantage through "Global Science Research". People already worry about Facebook have manipulates all kinds of information (even thoughts) and they don't agree to give it to anyone. The audience is possible audience of this article would be the people who use Facebook or other social media. The author's assessment concludes that Facebook has developed a method for classifying people based on personal data, which may exploit advertising revenue or political goals. This article can help me illustration of the timeline, detailing how Facebook uses data to build a model of Cambridge Analytica to manipulate Internet users.
  • 11. Chen6 The purpose of my article is to try to tell people that data companies like Cambridge Analytics have used electoral analysis to manipulate voters to control elections for political gain. This violates people’s personal privacy and violates people’s rights. microtargeting microtargeting is harmful to people because it’s using our personal data without our permission, it contains false information and blurred the difference between advertising and other kinds of content. real-life examples Like the 2012 US presidential election, how they used "The Optimizer" and Narwhal as tools to
  • 12. collect data from candidate Obama and candidate Romney to provide commercial advertising advice. Why should we stop it since 2012, presidential candidates have been using data analysis as a weapon for presidential campaigns. Who can better conduct data analysis or market analysis, who may use advertisements or media to influence voters, but it may lose the original intention of the election for my point of view, the election support to create the best interests for the people of the country, not to act according to market demand. How should we protect our internet privacy People should use VPN, Brave browser and long password to protect their privacy. My observation is that it is sad that most users don't know how to protect and determine the type of data they want to share or retain, and it's important to know how to protect privacy.