Annotated Bibliography: Smartphone Addiction

The following sample Communications annotated bibliography is 510 words long, in MLA format, and written at the undergraduate level. It has been downloaded 593 times and is available for you to use, free of charge.

Annotated Bibliography

Brauser, Deborah. "Smartphone 'Addiction' May Affect Adolescent Development.”Medscape Multispeciality. Medscape Medical News, 23 May 2013. Web. 17 Feb. 2014.

Deborah Brauser illustrates the growing problem of smartphone usage among the adolescent demographic, specifically in South Korea. The article discusses South Korea’s increasing problem with addictive smartphone usage. This article is very useful to my research because it provides a lot of statistical evidence to support the claim that smartphones have addictive qualities, particularly to adolescents in South Korea. The information, while self-reported from users, provides a good gauge to begin to unravel the negative impact of the addiction to smartphones.

Kwon, Min, Dai-Jin Kim, Hyun Cho, and Soo Yang. "The Smartphone Addiction Scale: Development and Validation of a Short Version for Adolescents." PLoS ONE 8.12 (2013): 1-7. Academic Search Premier. Web. 17 Feb. 2014.

Kwon et al. investigate, through a research study, how severe addiction to smartphones is among adolescents in South Korea. This study discusses addiction on a scale using three different methods to ascertain severity. This study is very useful to my research because it provides self-reported but also expert analysis on the degree of addiction that is present in this adolescent test group. This source complements several other sources in my research because South Korea is used as the country in the study. This testimony of South Korean adolescents and the addition of expert knowledge helps to objectively pinpoint how severe smartphone addiction is, which is pivotal to my research and goal in understanding the depths of smartphone addiction.

Loo, Alfred. "Security Threats of Smart Phones and Bluetooth." Communications of the ACM 52.3 (2009): 150-52. Academic Search Premier. Web. 17 Feb. 2014.

In this article, Alfred Loo points out a very specific security problem with smartphones: the use of Bluetooth. This article explains a very important experiment that was conducted to see how vulnerable the application of Bluetooth is for hacking on smartphones. The article is also very specific regarding what types of information are susceptible to hackers by using Bluetooth to infiltrate the security of smartphones. This source is very helpful in understanding specific, rather than generalized security problems that are present in smartphones. The article also provides solutions to the problem, including what owners of smartphones can do to lessen their risk of being hacked through Bluetooth.

Savage, Neil. "Stopping the Leaks." Communications of the ACM 56.1 (2013): 19-21.Academic Search Premier. Web. 17 Feb. 2014.

In this article, Neil Savage explains the generalized security problems that come with using a smartphone. This article helps to explain the advanced technological methods that hackers use in order to gain access to private information contained within smartphones. The article is also specific in its explanation through a step-by-step analysis of how hackers are able to obtain private information. Essentially, this article is important to my research because it explains in general terms how susceptible smartphones are to third party viewers, particularly Android platform smartphones. Fortunately, this source provides insight as to how smartphone consumers can protect themselves better and stay one step ahead of hackers.