you have to respond to bellow paper I also give example of someone who already rrspond to Baker Baker Post Data becomes useful information when it is provided with context. A single piece of data is useless without being included with a way to relate that data to something else. For instance, a number by itself means nothing without some type of context applied to it. Boyle gives this example: “Take the number 37…now give it some context: 37 degrees C is normal body temperature” (Boyle, 2011). The number by itself is merely a data point, but when provided context it becomes a useful piece of information that can be put to use. However, as our society has become so reliant on the internet, data is often pushed out instantly without any chance to provide a true context to the situation. There have been an unprecedented amount of controversial situations in recent memory that were brought to public attention without proper context being provided. This has the effect of allowing the public to form opinions without all the information necessary to have a truly informed opinion. Fayoyin and Ngwainmbi wrote, “Data and social statistics have been misinterpreted and misrepresented causing major misinformation within interpersonal and mass communication” (Fayoyin and Ngwainmbi, 2014). This is a problem that has been constant for a long time but has only been made significantly worse with the emergence of social media. A primary source is an original document or source of some kind. If the source of information is an eyewitness or you get the information directly from an expert in a given field it would be considered a primary source. An example would be an autobiography as an individual is writing about their experiences first hand. A secondary source is when the information is derived from someone who was either told about or heard about the information from the primary source. A good example for a secondary source would be a biography that either takes the information from the individual themselves or from things they have written. For my paper I have found a primary source that was written by one of the most wanted hackers of all time: Kevin Mitnick titled Famed Hacker Kevin Mitnick Shows You How to Go Invisible Online. Mitnick here gives a common example of how hackers today are able to ensure they cover their tracks and are not detected, at least with any certainty. Another primary source I will use was written by Richard Hummel from the SANS Institute who wrote a paper entitled, Securing Against the Most Common Vectors o Cyber Attacks. A secondary source that I will be utilizing is one that discusses many of the biggest known cyber attacks written by Bruce Middleton titled A History of Cyber Security Attacks: 1980 to Present. 1. Boyle, Rebecca. Data Harmony: How We Can Turn Piles of Raw Data into Usable Knowledge, https://www.popsci.com/science/article/2011-11/turning-raw-data ...