SlideShare a Scribd company logo
1 of 35
1
Safety First: Open Carry Firearms on Higher Education
Campuses in Arizona
Student Name
Columbia Southern University
EH 1020 English Composition II
Instructor Name
Due Date
Full title of the paper with the
major words beginning with a
capital letter
Top of page, plain
number on right of
header
Student’s first and last
name
Name of the institution
will always be
“Columbia Southern
University.”
Unit IV Color Key:
• Blue: APA document formatting
• Red: Example common mistakes in APA style
• Brown: Paragraph number and label
• Green: Sentence-level number and
explanation
Please note that the margins are a little wider than standard on
this example paper so as to make room for the comment
bubbles.
2
Safety First: Open Carry Firearms on Higher Education
Campuses in Arizona
Much has been made in the past few years about gun restrictions
in the U.S.
Proponents of gun regulation are in a constant state of lobbying
for state and federal bills
that restrict access to firearms, whether that takes the form of
more extensive background
checks on potential gun owners or longer waiting periods before
guns may be sold to
individuals. On the other side, the National Rifle Association
(NRA) and other like-
minded individuals advocate for looser restrictions on the sale
and carrying of firearms.
For these supporters of pro-gun legislation, owning and carrying
guns is a fundamental
right—even a civil right. While this national debate continues to
loom over the hot topic
of guns, there are breaking news stories, especially within the
last few months, that bring
this fundamental debate to the threshold of our nations’
colleges, high schools, even
elementary schools. Seung-Hui Cho’s massacre at Virginia Tech
(April 16, 2007) is
perhaps one of the more infamous school shootings, but there
are others that are perhaps
more difficult to remember, like the deaths of 27 killed at Sandy
Hook Elementary
School in Newton, Connecticut (December 14, 2012) (CNN,
2015). Shootings like these
in educational settings have drawn attention from both anti -gun
proponents and pro-gun
lobbyists, and the State of Arizona is no exception to this
firestorm. The Arizona State
legislature has proposed SB 1474, a gun bill that will allow
students and faculty to carry
guns on the campus grounds of its three state-funded
universities. Supporters of the bill
claim that Arizona is an open carry state, and those rights
should not be restricted simply
because the carrier crosses the border of a college campus.
Those against the bill assert
that guns have no place in education and that those who support
the bill are only after
their own election-year agendas. While the Second Amendment
should be upheld, the
Full title presented again at the top of the page.
Para 1:
Introductio
n
Sentence 1
(S1): Amanda
introduces
the main
topic (gun
control) in a
generalized
manner; this
sentence also
introduces
the con side
of the
controversy.
S2 & S3:
Follows S1
by
introducing
the position
of the pro
side; again,
Amanda is
general,
focusing on
the larger
controversy.
S4: Amanda
begins to
narrow the
scope of the
project by
pointing
towards a
specific
debate within
the
controversy
of gun
control: gun
control in
educational
settings.
S5: Specific
examples
from the
news. Note
that these are
examples of
school
shootings
with which
most people
are familiar.
This grounds
the project to
what is at
stake in
making
arguments
about this
topic.
S6: Amanda
again
narrows the
scope of the
project by
moving from
gun control
in
educational
settings to
this debate
as it takes
place in a
specific
location:
Arizona.
S7: In this
sentence, the
writer
introduces
the specific
topic of the
project: the
controversy
around
SB1474.
S8 & 9:
Following the
same order
from above
(con first,
then pro),
Amanda
presents the
sides of the
controversy
by
introducing
each specific
position.
3
educational learning environment should be protected;
therefore, SB 1474 is a
detrimental and dangerous bill that has the potential to change
the university campus
culture in Arizona state universities.
The Literature Review
In order to better understanding the origins of SB1474 and the
controversy that
surrounds it, the history of gun violence in school settings must
be taken into account;
therefore, a brief look at some of the events of the past few
decades is presented. Further,
this review will examine in greater detail the positions of the
two sides of the
controversy, beginning with the pro-SB1474 side, which is in
favor of allowing open
carry on all Arizona state-funded campuses. Then the position
of those against SB1474
will be presented; again, this con side is arguing for Arizona
campuses to remain as they
are now: a place without firearms.
A Brief Look at Gun Violence in Schools
The topic of gun control in educational environments exploded
in 1999 when Eric
Harris and Dylan Klebold walked into a virtually unknown high
school in Littleton, CO,
and killed twelve students and one teacher (Gibbs and Roche,
1999). Questions of how
such events could occur and concerns about the violence of
which teens and young adults
are capable became the concern of pressured administrators and
horrified parents in big
cities and small towns alike. A string of school gun-centered
violence followed over the
next few years. Perhaps most striking though was the way in
which this one incident
changed the culture of America: clear backpacks, more metal
detectors, and (of course)
S10: Amanda
presents her
thesis
statement.
She responds
to the
controversy
by crafting a
thesis
statement
that
simultaneousl
y agrees and
disagrees.
Para 2: Preface of the
Literature Review
Para 3: Brief
History
This is a
second-level
heading. It is
left-hand
justified and
bold. All
major words
are
capitalized.
This tells the
reader that
this next
section is a
division of
the first-level
heading that
is directly
above.
First-level heading: All major sections of the paper will
be first-level, including The literature Review, Body, and
Conclusion. You may choose to mark the Introduction,
but it is typically not done because the title of the
paper stands for the heading level. Note that the title is
centered and bold with title-case capitalization.
Note how
Amanda
prefaces the
LR by giving
the reader an
idea of what
will be
included. You
might also
note that the
paragraph is
written in
passive voice
so that she
can avoid
using
personal
pronouns
such as “I.”
Amanda has made a mistake: Only
the ampersand (&) should be used in
a parenthetical citation.
This citation
is in APA. It
shows the
authors and
year of
publication.
This
sentence is a
paraphrase
of Gibbs and
Roche. The
reader can
look at the
references
page to find
the original
document.
4
fear. Cloud (1999) points out some of the extreme, “zero
tolerance” actions taken by
schools shortly following the Columbine shootings:
A seven-year-old boy in Cahokia, Ill., is suspended for having a
nail clipper at
school. A 10th-grader at Surry County High School in Virginia
is booted for
having blue-dyed hair. A Minnesota high school nixes a
yearbook photo of an
Army enlistee in the senior class because it shows her sitting
atop a cannon
outside a Veterans of Foreign Wars post.
Far from the exception, these actions considered these many
years later seem
unreasonable, even in a post-9/11 world filled with uncertainty.
The Argument for Open Carry Everywhere in Arizona
However, in Arizona, the newly proposed SB 1474 would not
seek to disarm
students; on the contrary, the bill would allow students the right
to concealed carry on
state-funded university campuses. Proponents of the bill assert
that such a measure is
long over due. According to an NRA poster that were taped to
message boards all over
The University of Arizona campus, “[s]elf-defense is one of the
most fundamental rights
of every human being.” Further, the poster states that the NRA
has worked diligently
over the past 25 years to expand the right of open carry: the
NRA has been “working for
passage of fair Right-to-Carry laws, expansion of carry
reciprocity between the states and
the elimination of many ‘no-carry’ zones that only affect the
law-abiding.” For the NRA,
one of the major private-public backers of the SB 1474, the
restriction of concealed carry
on college campuses is an infringement on these basic rights.
The flyer goes on to state
the following:
Here is another
way to include a
parenthetical
citation. Amanda
has incorporated
the author’s
name into the
sentence. Note
that the year of
publication is
presented after
the author, but
there is no
citation at the
end of the
sentence
because the
information is
already
presented at the
beginning.
This quotation is called a
“block.” If a quotation is
over 40 words long, then
you must “block” it by
removing the quotation
marks and indenting the
entire quotation ½” from
the left-hand margin. If
this quotation would
have been from a print
text, then the page
number would have been
included at the end of
the sentence, but it was
an electronic source.
Para 4: Pro
side
There are three second-level headings in the
LR. Headings help you and the reader to see
the organization of your paper.
Amanda
presents a
closer look at
the pro side
before the con
side. Note that
she is not
engaging with
the
arguments,
only
presenting
them as fairly
as she can.
The LR is
about the
arguments of
others.
Amanda
knows she will
be able to
make her own
arguments in
the Body of
the paper.
5
Those who oppose campus carry [of firearms] argue that
educational institutions
should be treated differently, based on emotional claims that
places of higher
learning are somehow exempt from real-world violence. But the
truth is, despite
current prohibitions on legally carrying on campuses, crimes
already occur on
campus, and the right to self- defense from those violent acts
should be respected.
(NRA, 2012)
The NRA is correct. In fact, given the number of school-related
shootings in the past few
months alone, it would seem that a student’s chances of being
shot on campus seem
greater than if that same student were walking the streets of the
community. From larger
cities to small towns, it seems that the size of the community
does not matter: the
violence of a shooting can occur anywhere. However, even with
this fact floating in the
backs of students’ minds, students must still attend classes and
while it would seem
obvious that lawmakers on both sides want student safety, they
just see the means to that
safety from different sides of the same coin.
The Case for Campuses as Unique
Eugene Sander (2012), the Interim President of the University
of Arizona,
released the following statement about SB 1474: “I have been a
gun owner for all my
adult life, and am fully supportive of the right to own a gun.
However, having faculty,
staff or students bringing weapons into classrooms and other
campus activities will do
nothing to make our campus safer.” While Sander does not go
into detail about what this
newly proposed bill does have to do with, he makes his case on
the basis that 50,000
students, staff, and faculty attend the campus daily, along with
over 20,000 visitors
annually. For Sander (2015), the educational environment is a
“unique atmosphere that is
Para 5: Con
side
This citation is correct. Amanda did not have to include
the author’s first name, but it is fine to do so the first
time that the author’s name is mentioned.
Amanda has
made a
mistake. Each
time an
author is
included, the
year of
publication
must follow.
So this
should read
as follows:
“While Sander
(2012)…”
Amanda
has made a
mistake.
The actual
year of the
publication
is 2012. Be
careful
about
editing for
errors like
this in your
own paper.
6
dependent on open and vigorous debate. Introducing guns into
classrooms would
dramatically and negatively impact the ability to engage in
constructive dialogue.” In
other words, even if the NRA does not believe that the
university is a unique atmosphere,
as Sander and others do, then there is still a possibility that
introducing the right to carry
concealed weapons on campus might lead to a change to the
very culture of the
university.
While Arizona lawmakers continue to debate the merits of
SB1474, the public
debate grows, as this issue concerns both public safety and
citizens’ rights. Because the
three state universities in Arizona are publicly funded, the
debate about allowing open
carry is very much a concern held by the communities in which
these universities reside.
Those who are in favor of the change to an open carry status on
university campuses wish
(a) for the open carry laws of the State of Arizona to be
extended to all areas, which
includes all publicly funding institutions, such as the
universities, and (b) for the open
carry of firearms to act as a deterrent to gun-related violence on
college campuses. For
those who are against the passing of SB1474, many of whom
occupy the space of the
university as professors, students, or administrators, the
question of allowing the open
carry of firearms is no actual question at all: there is simply no
need to involve weapons
in a space that is meant for open dialogue and debate. In as
much as the Second
Amendment should be observed and upheld in the fashion
adopted by the State of
Arizona in the form of open carry, the university setting is
unique in that concerns about
open and free expression should be at the forefront—essentially
making this bill a
potentially dangerous one that should be reconsidered or
withdrawn completely.
Para 6: LR
Conclusion S1 & 2:
Amanda creates
a topic
sentence that
encapsulates
the concern of
the
controversy,
and she
includes a
second
sentence to
increase
understanding.
S3: Amanda
summarizes
the two main
arguments of
the pro side,
which favors
the passing
of SB1474.
S4: Amanda
summarizes the
main argument
of the con side,
those who are
against the
passing of
SB1474
S5: Amanda
reiterates her
own position by
reasserting her
thesis
statement. Note
that the thesis
statement is
slightly different
than the
original at the
end of the
Introduction
paragraph.
7
References
CNN Library. (2015, October 19). 28 deadliest mass shootings
in U.S. history fast facts.
CNN. http://www.cnn.com/2013/09/16/us/20-deadliest-mass-
shootings-in-u-s-
history-fast-facts/
Cloud, J. (1999, November 28). The Columbine effect. Time.
http://content.time.com/time/magazine/article/0,9171,35098,00.
html
Gibbs, N. & Roche, T. (1999, December 20). The Columbine
tapes. Time.
http://content.time.com/time/magazine/article/0,9171,992873,00
.html
National Rifle Association. (2012). Arizona Self-Defense on
Campus [Flyer]. NRA:
Author.
Sander, Eugene. (2012, March 20). UA President opposes
campus guns bill. KGUN-TV.
http://www.kgun9.com
An APA list of references should be
labeled “References,” not “Works Cited”
or “Bibliograph.”
Titles in APA are presented in
sentence-case capitalization,
meaning that only the first word
or any proper noun should
begin with a capital letter.
Amanda has
made a
mistake. Only
the “A” in
Arizona
should be
capitalized in
this title.
Amanda has made
a mistake by
including the full
name of the author
here.
The last name
is presented
first; then the
first name and
middle (if
present) are
included as
initials. An
ampersand
(&) is used for
more than
one author.
http://www.cnn.com/2013/09/16/us/20-deadliest-mass-
shootings-in-u-s-%20history-fast-facts/
http://www.cnn.com/2013/09/16/us/20-deadliest-mass-
shootings-in-u-s-%20history-fast-facts/
http://content.time.com/time/magazine/article/0,9171,35098,00.
html
http://content.time.com/time/magazine/article/0,9171,992873,00
.html
http://www.kgun9.com/
Running head: ARTIFICIAL INTELLIGENCE 1
Artificial Intelligence
English Composition II (EH 1020)
February 25, 2021
ARTIFICIAL INTELLIGENCE 2
Artificial Intelligence in Fighting Cyber Crime
Cyber insecurity has led to different methods evolving to help
curb it, including artificial
intelligence. Those in support of this new technology believe
that it can work beyond human
capacities, hence detecting threats and stopping them faster.
Those opposed to it see it as a platform
the attackers are using to diversify their attacks. However, these
discussions are all based on the
need to secure the business environment and free it from
cybercrime. Artificial intelligence has
increased visibility in the attack environment for businesses to
take the right precautions in
preventing it. For example, the system flags the anomalies
making the security analyst work on
them and save time and save the business costs (Anwar &
Hassan, 2017). The experts also suggest
using intelligent systems in accurately detecting and
remediating the attacks in real-time in the
future. Artificial intelligence can also solve difficult situations
that humans have no answer for but
have some information on what to be expected. Artificial
intelligence is a tool that enables
companies to remain visibly aware of the evolving threats. This
ensures that the security analysts
take a right to measures and quickly respond to the business's
issues. However, artificial
intelligence has opened up a new wave of threats that negatively
impact businesses' operations. The
poisoning attacks are capable of manipulating the input and
giving out output that is similar to the
attacker's goals. Therefore, although artificial intelligence is an
essential technology for combating
cybersecurity threats, it is essential to consider the dangers it
poses to the business environment
because it is capable of changing the business operations if, in
any case, it becomes a pathway of
attacks.
Literature Review
Amanda Laroche
Good thesis statement! You want to be sure the reasons you
state in your thesis statement become the topic of your body
paragraphs in units VI & VII.
ARTIFICIAL INTELLIGENCE 3
The issue of artificial intelligence in fighting cybercrime can be
understood by first looking
into cybercrime and the failure of the different methods
adopted. This will be followed by an
analysis of the two sides of the controversy, the pro, and the
con. The pro side supports artificial
intelligence in curbing cybercrime, whereas the con side is
against this method, especially in
businesses.
Brief Summary of Cyber Crime
The issue of malware and cybercrime can be traced back to
connected computing days
because it coincides with the evolution of the internet. The
internet grew, allowing for the crimes to
become more complicated, with a significant wave of attacks
happening in the 1980s using emails'
proliferation. The Nigerian Prince Scam is one of the earliest
forms of cyber-attacks delivered to
several inboxes requesting money to set up a transfer and later
to share it. However, the growth of
cybercrime was seen in the 2000s when social media came into
life (Taddeo, McCutcheon
&Floridi, 2019). People started putting all information in
profile databases, and this led to identity
theft. The cyber attackers were now interested in accessing bank
accounts and accessing personal
information for their benefit. Cybercrime has grown into an
industry that is totaling nearly half a
trillion dollars yearly. The hackers have gone on a spree with
several incidences, such as the
Russian hackers' attack on the Ukrainian energy company. The
attacks have led to organizations
changing the approaches they give to cybersecurity. Attention is
on preventing them before they
occur. The reason businesses are struggling to deal with
cybercrime is due to the economic losses;
in 2020, the loss was predicted to be over $3 trillion, with 74%
of businesses being hacked
(Mosteanu, 2020).
The argument for Adopting Artificial Intelligence in Businesses
Amanda Laroche
Needs in-text citation.
Amanda Laroche
Need to define what this means.
Amanda Laroche
Amanda Laroche
Amanda Laroche
Find alternative ways to say "pro" and "con" to help improve
the formal tone of your assignment.
ARTIFICIAL INTELLIGENCE 4
As the threat of cyber insecurity is continually evolving,
businesses must adapt survival
measures. Artificial Intelligence is centrally placed because it
can detect threats irrespective of their
shape in attack and defense. This is a multifaceted tool capable
of collecting data, organizing it, and
protecting it against outside forces' access. AI increases data
security systems' efficiency by
spotting the potential threats early enough before they come to
fruition. It also squashes the
incoming attacks at speeds that are above human capabilities.
According to Mosteanu, the benefits
of AI go beyond anticipating the attacks (2020). It makes
organizations ready for the proper
response at all times since cybercriminals keep intensifying
their attacks.
Artificial Intelligence Downside against Fighting Cybercrime
Those opposed to using AI in preventing cybercrime state
various reasons why it is
detrimental to businesses. Terrorists in the 21st century no
longer need bombs and sophisticated
weapons but rather the ability to hack into the company or
government systems. Through this, they
can bring the operations of critical infrastructure to their knees
and acquire a ransom. AI is prone to
manipulations that are aimed at causing malfunction. According
to Li and Zhang, the attacks can be
input or poisoning attacks. The input attacks are fed to the AI
system to alter the output (2017).
This is because the AI System has a machine at its core
responsible for manipulating the input to
give an output. When the attackers alter the input, then the
output is corrupted. The poisoning
attacks are manifested by corrupting the process, causing a
malfunction desired by the attacker.
This can include poisoning the data used in a process. These
attacks are capable of causing great
harm to the business and affecting the efficiency of operation.
Artificial intelligence was designed to ensure that the system
takes the attacks before they
cause harm to the business database. However, cybercrime has
evolved, and the AI attacks are
Amanda Laroche
If this is the conclusion, you need a section header.
Amanda Laroche
Amanda Laroche
What does this mean?
Amanda Laroche
Reword: 21st century terrorists
Amanda Laroche
What is "it"? Be specific.
ARTIFICIAL INTELLIGENCE 5
different from the traditional attacks it was designed to detect.
The attacks are enabled by the
limitations in the algorithms that cannot be fixed. This means
that various methods can be used to
execute attacks, including physical objects. For example, the
attackers can transform a stop sign
into green light using an AI attack by using pieces of tape on
the sign (Anwar & Hassan, 2017). At
the same time, it is possible to weaponize data, requiring the
collection, storage, and use of data to
be reviewed. AI attacks are affecting the most critical parts of
society. This includes the military,
law enforcement, and civil society. This poses a threat to the
privacy of these institutions, mostly
because they deal with critical information. According to Soni,
AI security compliance programs
must be introduced to protect against this new version of attacks
(2020). This approach will reduce
the risk of successful attacks and lower the impact when they
occur. The Regulators should also
ensure the government and institutions at high risk of AI attacks
have adhered to the compliance
set. This is especially in areas that would have a severe impact
on society. This is because AI
technologies have brought many high-end attacks, such as
Capital One, that compromised the data
of more than 100 million Americans (Mosteanu, 2020). This
shows that irrespective of the
approach used to mitigate the attacks, they persist.
Amanda Laroche
Choppy sentences. Revise and combine.
Amanda Laroche
Choppy sentences. Revise and combine.
ARTIFICIAL INTELLIGENCE 6
References
Anwar, A., & Hassan, S. I. (2017). Applying Artificial
Intelligence Techniques to Prevent Cyber
Assaults. International Journal of Computational Intelligence
Research, 13(5), 883-889.
Li, X., & Zhang, T. (2017, April). An exploration on artificial
intelligence application: From
security, privacy and ethic perspective. In 2017 IEEE 2nd
International Conference on
Cloud Computing and Big Data Analysis (ICCCBDA) (pp. 416-
420). IEEE.
Mosteanu, N. R. (2020). Artificial Intelligence and Cyber
Security–A Shield against Cyberattack as
a Risk Business Management Tool–Case of European Countries.
Quality-Access to
Success, 21(175).
Mosteanu, N. R. (2020). Artificial Intelligence And Cyber
Security–Face To Face With Cyber
Attack–A Maltese Case Of Risk Management Approach. Eco
forum Journal, 9(2).
Soni, V. D. (2020). Challenges and
Solution
for Artificial Intelligence in Cybersecurity of the
USA. Available at SSRN 3624487.
Taddeo, M., McCutcheon, T., &Floridi, L. (2019). Trusting
artificial intelligence in cybersecurity is
a double-edged sword. Nature Machine Intelligence, 1(12), 557-
560.

More Related Content

Similar to 1 Safety First Open Carry Firearms on Higher Edu

DescriptionThe front cover of the book shows a p
DescriptionThe front cover of the book shows a pDescriptionThe front cover of the book shows a p
DescriptionThe front cover of the book shows a pLinaCovington707
 
!#$OPINIONHow armed police officers on ca
!#$OPINIONHow armed police officers on ca!#$OPINIONHow armed police officers on ca
!#$OPINIONHow armed police officers on caSilvaGraf83
 
!#$OPINIONHow armed police officers on ca
!#$OPINIONHow armed police officers on ca!#$OPINIONHow armed police officers on ca
!#$OPINIONHow armed police officers on caSilvaGraf83
 
Short paper case study rubric (undergraduate)guidelines fo
Short paper case study rubric (undergraduate)guidelines foShort paper case study rubric (undergraduate)guidelines fo
Short paper case study rubric (undergraduate)guidelines foAKHIL969626
 
Capstone Paper Introduction Students will select a s.docx
Capstone Paper Introduction Students will select a s.docxCapstone Paper Introduction Students will select a s.docx
Capstone Paper Introduction Students will select a s.docxhumphrieskalyn
 
Please show each little step you take in your calculations 1..docx
Please show each little step you take in your calculations 1..docxPlease show each little step you take in your calculations 1..docx
Please show each little step you take in your calculations 1..docxLeilaniPoolsy
 
Fall Of The Roman Empire Essay
Fall Of The Roman Empire EssayFall Of The Roman Empire Essay
Fall Of The Roman Empire EssaySheila Espinoza
 
Campus Gun Control Works Boston Review httpbostonrevi.docx
Campus Gun Control Works Boston Review httpbostonrevi.docxCampus Gun Control Works Boston Review httpbostonrevi.docx
Campus Gun Control Works Boston Review httpbostonrevi.docxjasoninnes20
 
Essay 2 Enter the ConversationPercentage of Final Grade 15 or.docx
Essay 2 Enter the ConversationPercentage of Final Grade 15 or.docxEssay 2 Enter the ConversationPercentage of Final Grade 15 or.docx
Essay 2 Enter the ConversationPercentage of Final Grade 15 or.docxgreg1eden90113
 

Similar to 1 Safety First Open Carry Firearms on Higher Edu (11)

DescriptionThe front cover of the book shows a p
DescriptionThe front cover of the book shows a pDescriptionThe front cover of the book shows a p
DescriptionThe front cover of the book shows a p
 
!#$OPINIONHow armed police officers on ca
!#$OPINIONHow armed police officers on ca!#$OPINIONHow armed police officers on ca
!#$OPINIONHow armed police officers on ca
 
!#$OPINIONHow armed police officers on ca
!#$OPINIONHow armed police officers on ca!#$OPINIONHow armed police officers on ca
!#$OPINIONHow armed police officers on ca
 
Short paper case study rubric (undergraduate)guidelines fo
Short paper case study rubric (undergraduate)guidelines foShort paper case study rubric (undergraduate)guidelines fo
Short paper case study rubric (undergraduate)guidelines fo
 
MLA Citations
MLA CitationsMLA Citations
MLA Citations
 
Capstone Paper Introduction Students will select a s.docx
Capstone Paper Introduction Students will select a s.docxCapstone Paper Introduction Students will select a s.docx
Capstone Paper Introduction Students will select a s.docx
 
Please show each little step you take in your calculations 1..docx
Please show each little step you take in your calculations 1..docxPlease show each little step you take in your calculations 1..docx
Please show each little step you take in your calculations 1..docx
 
april19
april19april19
april19
 
Fall Of The Roman Empire Essay
Fall Of The Roman Empire EssayFall Of The Roman Empire Essay
Fall Of The Roman Empire Essay
 
Campus Gun Control Works Boston Review httpbostonrevi.docx
Campus Gun Control Works Boston Review httpbostonrevi.docxCampus Gun Control Works Boston Review httpbostonrevi.docx
Campus Gun Control Works Boston Review httpbostonrevi.docx
 
Essay 2 Enter the ConversationPercentage of Final Grade 15 or.docx
Essay 2 Enter the ConversationPercentage of Final Grade 15 or.docxEssay 2 Enter the ConversationPercentage of Final Grade 15 or.docx
Essay 2 Enter the ConversationPercentage of Final Grade 15 or.docx
 

More from AbbyWhyte974

1. Use Postman” to test API at  httpspostman-echo.coma. Use
1. Use Postman” to test API at  httpspostman-echo.coma. Use1. Use Postman” to test API at  httpspostman-echo.coma. Use
1. Use Postman” to test API at  httpspostman-echo.coma. UseAbbyWhyte974
 
1. Use the rubric to complete the assignment and pay attention t
1. Use the rubric to complete the assignment and pay attention t1. Use the rubric to complete the assignment and pay attention t
1. Use the rubric to complete the assignment and pay attention tAbbyWhyte974
 
1. True or false. Unlike a merchandising business, a manufacturing
1. True or false. Unlike a merchandising business, a manufacturing1. True or false. Unlike a merchandising business, a manufacturing
1. True or false. Unlike a merchandising business, a manufacturingAbbyWhyte974
 
1. Top hedge fund manager Sally Buffit believes that a stock with
1. Top hedge fund manager Sally Buffit believes that a stock with 1. Top hedge fund manager Sally Buffit believes that a stock with
1. Top hedge fund manager Sally Buffit believes that a stock with AbbyWhyte974
 
1. This question is on the application of the Binomial option
1. This question is on the application of the Binomial option1. This question is on the application of the Binomial option
1. This question is on the application of the Binomial optionAbbyWhyte974
 
1. Tiktaalik httpswww.palaeocast.comtiktaalikW
1. Tiktaalik        httpswww.palaeocast.comtiktaalikW1. Tiktaalik        httpswww.palaeocast.comtiktaalikW
1. Tiktaalik httpswww.palaeocast.comtiktaalikWAbbyWhyte974
 
1. This week, we learned about the balanced scorecard and dashboar
1. This week, we learned about the balanced scorecard and dashboar1. This week, we learned about the balanced scorecard and dashboar
1. This week, we learned about the balanced scorecard and dashboarAbbyWhyte974
 
1. The company I chose was Amazon2.3.4.1) Keep i
1. The company I chose was Amazon2.3.4.1) Keep i1. The company I chose was Amazon2.3.4.1) Keep i
1. The company I chose was Amazon2.3.4.1) Keep iAbbyWhyte974
 
1. Think about a persuasive speech that you would like to present
1. Think about a persuasive speech that you would like to present 1. Think about a persuasive speech that you would like to present
1. Think about a persuasive speech that you would like to present AbbyWhyte974
 
1. The two properties about a set of measurements of a dependent v
1. The two properties about a set of measurements of a dependent v1. The two properties about a set of measurements of a dependent v
1. The two properties about a set of measurements of a dependent vAbbyWhyte974
 
1. The Danube River flows through 10 countries. Name them in the s
1. The Danube River flows through 10 countries. Name them in the s1. The Danube River flows through 10 countries. Name them in the s
1. The Danube River flows through 10 countries. Name them in the sAbbyWhyte974
 
1. The 3 genes that you will compare at listed below. Take a look.
1. The 3 genes that you will compare at listed below. Take a look.1. The 3 genes that you will compare at listed below. Take a look.
1. The 3 genes that you will compare at listed below. Take a look.AbbyWhyte974
 
1. Student and trainer detailsStudent details Full nameStu
1. Student and trainer detailsStudent details  Full nameStu1. Student and trainer detailsStudent details  Full nameStu
1. Student and trainer detailsStudent details Full nameStuAbbyWhyte974
 
1. Student uses MS Excel to calculate income tax expense or refund
1. Student uses MS Excel to calculate income tax expense or refund1. Student uses MS Excel to calculate income tax expense or refund
1. Student uses MS Excel to calculate income tax expense or refundAbbyWhyte974
 
1. Socrates - In your view, what was it about Socrates’ teachings
1. Socrates - In your view, what was it about Socrates’ teachings 1. Socrates - In your view, what was it about Socrates’ teachings
1. Socrates - In your view, what was it about Socrates’ teachings AbbyWhyte974
 
1. Select a patient” (friend or family member) on whom to perform
1. Select a patient” (friend or family member) on whom to perform1. Select a patient” (friend or family member) on whom to perform
1. Select a patient” (friend or family member) on whom to performAbbyWhyte974
 
1. Respond to your classmates’ question and post. Submission to y
1. Respond to your classmates’ question and post.  Submission to y1. Respond to your classmates’ question and post.  Submission to y
1. Respond to your classmates’ question and post. Submission to yAbbyWhyte974
 
1. Review the HCAPHS survey document, by clicking on the hyperlink
1. Review the HCAPHS survey document, by clicking on the hyperlink1. Review the HCAPHS survey document, by clicking on the hyperlink
1. Review the HCAPHS survey document, by clicking on the hyperlinkAbbyWhyte974
 
1. Saint Leo Portal loginUser ID[email protected]
1. Saint Leo Portal loginUser ID[email protected]          1. Saint Leo Portal loginUser ID[email protected]
1. Saint Leo Portal loginUser ID[email protected] AbbyWhyte974
 
1. Reference is ch. 5 in the e-text, or ch. 2 in paper text...plea
1. Reference is ch. 5 in the e-text, or ch. 2 in paper text...plea1. Reference is ch. 5 in the e-text, or ch. 2 in paper text...plea
1. Reference is ch. 5 in the e-text, or ch. 2 in paper text...pleaAbbyWhyte974
 

More from AbbyWhyte974 (20)

1. Use Postman” to test API at  httpspostman-echo.coma. Use
1. Use Postman” to test API at  httpspostman-echo.coma. Use1. Use Postman” to test API at  httpspostman-echo.coma. Use
1. Use Postman” to test API at  httpspostman-echo.coma. Use
 
1. Use the rubric to complete the assignment and pay attention t
1. Use the rubric to complete the assignment and pay attention t1. Use the rubric to complete the assignment and pay attention t
1. Use the rubric to complete the assignment and pay attention t
 
1. True or false. Unlike a merchandising business, a manufacturing
1. True or false. Unlike a merchandising business, a manufacturing1. True or false. Unlike a merchandising business, a manufacturing
1. True or false. Unlike a merchandising business, a manufacturing
 
1. Top hedge fund manager Sally Buffit believes that a stock with
1. Top hedge fund manager Sally Buffit believes that a stock with 1. Top hedge fund manager Sally Buffit believes that a stock with
1. Top hedge fund manager Sally Buffit believes that a stock with
 
1. This question is on the application of the Binomial option
1. This question is on the application of the Binomial option1. This question is on the application of the Binomial option
1. This question is on the application of the Binomial option
 
1. Tiktaalik httpswww.palaeocast.comtiktaalikW
1. Tiktaalik        httpswww.palaeocast.comtiktaalikW1. Tiktaalik        httpswww.palaeocast.comtiktaalikW
1. Tiktaalik httpswww.palaeocast.comtiktaalikW
 
1. This week, we learned about the balanced scorecard and dashboar
1. This week, we learned about the balanced scorecard and dashboar1. This week, we learned about the balanced scorecard and dashboar
1. This week, we learned about the balanced scorecard and dashboar
 
1. The company I chose was Amazon2.3.4.1) Keep i
1. The company I chose was Amazon2.3.4.1) Keep i1. The company I chose was Amazon2.3.4.1) Keep i
1. The company I chose was Amazon2.3.4.1) Keep i
 
1. Think about a persuasive speech that you would like to present
1. Think about a persuasive speech that you would like to present 1. Think about a persuasive speech that you would like to present
1. Think about a persuasive speech that you would like to present
 
1. The two properties about a set of measurements of a dependent v
1. The two properties about a set of measurements of a dependent v1. The two properties about a set of measurements of a dependent v
1. The two properties about a set of measurements of a dependent v
 
1. The Danube River flows through 10 countries. Name them in the s
1. The Danube River flows through 10 countries. Name them in the s1. The Danube River flows through 10 countries. Name them in the s
1. The Danube River flows through 10 countries. Name them in the s
 
1. The 3 genes that you will compare at listed below. Take a look.
1. The 3 genes that you will compare at listed below. Take a look.1. The 3 genes that you will compare at listed below. Take a look.
1. The 3 genes that you will compare at listed below. Take a look.
 
1. Student and trainer detailsStudent details Full nameStu
1. Student and trainer detailsStudent details  Full nameStu1. Student and trainer detailsStudent details  Full nameStu
1. Student and trainer detailsStudent details Full nameStu
 
1. Student uses MS Excel to calculate income tax expense or refund
1. Student uses MS Excel to calculate income tax expense or refund1. Student uses MS Excel to calculate income tax expense or refund
1. Student uses MS Excel to calculate income tax expense or refund
 
1. Socrates - In your view, what was it about Socrates’ teachings
1. Socrates - In your view, what was it about Socrates’ teachings 1. Socrates - In your view, what was it about Socrates’ teachings
1. Socrates - In your view, what was it about Socrates’ teachings
 
1. Select a patient” (friend or family member) on whom to perform
1. Select a patient” (friend or family member) on whom to perform1. Select a patient” (friend or family member) on whom to perform
1. Select a patient” (friend or family member) on whom to perform
 
1. Respond to your classmates’ question and post. Submission to y
1. Respond to your classmates’ question and post.  Submission to y1. Respond to your classmates’ question and post.  Submission to y
1. Respond to your classmates’ question and post. Submission to y
 
1. Review the HCAPHS survey document, by clicking on the hyperlink
1. Review the HCAPHS survey document, by clicking on the hyperlink1. Review the HCAPHS survey document, by clicking on the hyperlink
1. Review the HCAPHS survey document, by clicking on the hyperlink
 
1. Saint Leo Portal loginUser ID[email protected]
1. Saint Leo Portal loginUser ID[email protected]          1. Saint Leo Portal loginUser ID[email protected]
1. Saint Leo Portal loginUser ID[email protected]
 
1. Reference is ch. 5 in the e-text, or ch. 2 in paper text...plea
1. Reference is ch. 5 in the e-text, or ch. 2 in paper text...plea1. Reference is ch. 5 in the e-text, or ch. 2 in paper text...plea
1. Reference is ch. 5 in the e-text, or ch. 2 in paper text...plea
 

Recently uploaded

ICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptxICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptxAreebaZafar22
 
Micro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdfMicro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdfPoh-Sun Goh
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfciinovamais
 
Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingTechSoup
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdfQucHHunhnh
 
Unit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptxUnit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptxVishalSingh1417
 
On National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan FellowsOn National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan FellowsMebane Rash
 
Unit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptxUnit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptxVishalSingh1417
 
Unit-IV; Professional Sales Representative (PSR).pptx
Unit-IV; Professional Sales Representative (PSR).pptxUnit-IV; Professional Sales Representative (PSR).pptx
Unit-IV; Professional Sales Representative (PSR).pptxVishalSingh1417
 
Making and Justifying Mathematical Decisions.pdf
Making and Justifying Mathematical Decisions.pdfMaking and Justifying Mathematical Decisions.pdf
Making and Justifying Mathematical Decisions.pdfChris Hunter
 
Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactPECB
 
Measures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeMeasures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeThiyagu K
 
Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104misteraugie
 
General Principles of Intellectual Property: Concepts of Intellectual Proper...
General Principles of Intellectual Property: Concepts of Intellectual  Proper...General Principles of Intellectual Property: Concepts of Intellectual  Proper...
General Principles of Intellectual Property: Concepts of Intellectual Proper...Poonam Aher Patil
 
How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17Celine George
 
Sociology 101 Demonstration of Learning Exhibit
Sociology 101 Demonstration of Learning ExhibitSociology 101 Demonstration of Learning Exhibit
Sociology 101 Demonstration of Learning Exhibitjbellavia9
 
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in DelhiRussian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhikauryashika82
 
ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.MaryamAhmad92
 
Python Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docxPython Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docxRamakrishna Reddy Bijjam
 
Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Celine George
 

Recently uploaded (20)

ICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptxICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptx
 
Micro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdfMicro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdf
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdf
 
Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy Consulting
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdf
 
Unit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptxUnit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptx
 
On National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan FellowsOn National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan Fellows
 
Unit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptxUnit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptx
 
Unit-IV; Professional Sales Representative (PSR).pptx
Unit-IV; Professional Sales Representative (PSR).pptxUnit-IV; Professional Sales Representative (PSR).pptx
Unit-IV; Professional Sales Representative (PSR).pptx
 
Making and Justifying Mathematical Decisions.pdf
Making and Justifying Mathematical Decisions.pdfMaking and Justifying Mathematical Decisions.pdf
Making and Justifying Mathematical Decisions.pdf
 
Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global Impact
 
Measures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeMeasures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and Mode
 
Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104
 
General Principles of Intellectual Property: Concepts of Intellectual Proper...
General Principles of Intellectual Property: Concepts of Intellectual  Proper...General Principles of Intellectual Property: Concepts of Intellectual  Proper...
General Principles of Intellectual Property: Concepts of Intellectual Proper...
 
How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17
 
Sociology 101 Demonstration of Learning Exhibit
Sociology 101 Demonstration of Learning ExhibitSociology 101 Demonstration of Learning Exhibit
Sociology 101 Demonstration of Learning Exhibit
 
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in DelhiRussian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
 
ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.
 
Python Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docxPython Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docx
 
Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17
 

1 Safety First Open Carry Firearms on Higher Edu

  • 1. 1 Safety First: Open Carry Firearms on Higher Education Campuses in Arizona Student Name Columbia Southern University EH 1020 English Composition II Instructor Name Due Date Full title of the paper with the major words beginning with a
  • 2. capital letter Top of page, plain number on right of header Student’s first and last name Name of the institution will always be “Columbia Southern University.” Unit IV Color Key: • Blue: APA document formatting • Red: Example common mistakes in APA style • Brown: Paragraph number and label • Green: Sentence-level number and explanation Please note that the margins are a little wider than standard on this example paper so as to make room for the comment bubbles.
  • 3. 2 Safety First: Open Carry Firearms on Higher Education Campuses in Arizona Much has been made in the past few years about gun restrictions in the U.S. Proponents of gun regulation are in a constant state of lobbying for state and federal bills that restrict access to firearms, whether that takes the form of more extensive background checks on potential gun owners or longer waiting periods before guns may be sold to individuals. On the other side, the National Rifle Association (NRA) and other like- minded individuals advocate for looser restrictions on the sale and carrying of firearms. For these supporters of pro-gun legislation, owning and carrying guns is a fundamental right—even a civil right. While this national debate continues to loom over the hot topic of guns, there are breaking news stories, especially within the last few months, that bring
  • 4. this fundamental debate to the threshold of our nations’ colleges, high schools, even elementary schools. Seung-Hui Cho’s massacre at Virginia Tech (April 16, 2007) is perhaps one of the more infamous school shootings, but there are others that are perhaps more difficult to remember, like the deaths of 27 killed at Sandy Hook Elementary School in Newton, Connecticut (December 14, 2012) (CNN, 2015). Shootings like these in educational settings have drawn attention from both anti -gun proponents and pro-gun lobbyists, and the State of Arizona is no exception to this firestorm. The Arizona State legislature has proposed SB 1474, a gun bill that will allow students and faculty to carry guns on the campus grounds of its three state-funded universities. Supporters of the bill claim that Arizona is an open carry state, and those rights should not be restricted simply because the carrier crosses the border of a college campus. Those against the bill assert that guns have no place in education and that those who support the bill are only after
  • 5. their own election-year agendas. While the Second Amendment should be upheld, the Full title presented again at the top of the page. Para 1: Introductio n Sentence 1 (S1): Amanda introduces the main topic (gun control) in a generalized manner; this sentence also introduces the con side of the controversy. S2 & S3: Follows S1 by introducing the position of the pro side; again, Amanda is general, focusing on the larger
  • 6. controversy. S4: Amanda begins to narrow the scope of the project by pointing towards a specific debate within the controversy of gun control: gun control in educational settings. S5: Specific examples from the news. Note that these are examples of school shootings with which most people are familiar.
  • 7. This grounds the project to what is at stake in making arguments about this topic. S6: Amanda again narrows the scope of the project by moving from gun control in educational settings to this debate as it takes place in a specific location: Arizona. S7: In this sentence, the writer introduces the specific topic of the project: the controversy around SB1474.
  • 8. S8 & 9: Following the same order from above (con first, then pro), Amanda presents the sides of the controversy by introducing each specific position. 3 educational learning environment should be protected; therefore, SB 1474 is a detrimental and dangerous bill that has the potential to change the university campus culture in Arizona state universities. The Literature Review In order to better understanding the origins of SB1474 and the controversy that surrounds it, the history of gun violence in school settings must be taken into account;
  • 9. therefore, a brief look at some of the events of the past few decades is presented. Further, this review will examine in greater detail the positions of the two sides of the controversy, beginning with the pro-SB1474 side, which is in favor of allowing open carry on all Arizona state-funded campuses. Then the position of those against SB1474 will be presented; again, this con side is arguing for Arizona campuses to remain as they are now: a place without firearms. A Brief Look at Gun Violence in Schools The topic of gun control in educational environments exploded in 1999 when Eric Harris and Dylan Klebold walked into a virtually unknown high school in Littleton, CO, and killed twelve students and one teacher (Gibbs and Roche, 1999). Questions of how such events could occur and concerns about the violence of which teens and young adults are capable became the concern of pressured administrators and horrified parents in big cities and small towns alike. A string of school gun-centered
  • 10. violence followed over the next few years. Perhaps most striking though was the way in which this one incident changed the culture of America: clear backpacks, more metal detectors, and (of course) S10: Amanda presents her thesis statement. She responds to the controversy by crafting a thesis statement that simultaneousl y agrees and disagrees. Para 2: Preface of the Literature Review Para 3: Brief History This is a second-level heading. It is left-hand justified and
  • 11. bold. All major words are capitalized. This tells the reader that this next section is a division of the first-level heading that is directly above. First-level heading: All major sections of the paper will be first-level, including The literature Review, Body, and Conclusion. You may choose to mark the Introduction, but it is typically not done because the title of the paper stands for the heading level. Note that the title is centered and bold with title-case capitalization. Note how Amanda prefaces the LR by giving the reader an idea of what will be included. You might also note that the paragraph is written in passive voice so that she can avoid
  • 12. using personal pronouns such as “I.” Amanda has made a mistake: Only the ampersand (&) should be used in a parenthetical citation. This citation is in APA. It shows the authors and year of publication. This sentence is a paraphrase of Gibbs and Roche. The reader can look at the references page to find the original document. 4 fear. Cloud (1999) points out some of the extreme, “zero tolerance” actions taken by schools shortly following the Columbine shootings:
  • 13. A seven-year-old boy in Cahokia, Ill., is suspended for having a nail clipper at school. A 10th-grader at Surry County High School in Virginia is booted for having blue-dyed hair. A Minnesota high school nixes a yearbook photo of an Army enlistee in the senior class because it shows her sitting atop a cannon outside a Veterans of Foreign Wars post. Far from the exception, these actions considered these many years later seem unreasonable, even in a post-9/11 world filled with uncertainty. The Argument for Open Carry Everywhere in Arizona However, in Arizona, the newly proposed SB 1474 would not seek to disarm students; on the contrary, the bill would allow students the right to concealed carry on state-funded university campuses. Proponents of the bill assert that such a measure is long over due. According to an NRA poster that were taped to message boards all over The University of Arizona campus, “[s]elf-defense is one of the most fundamental rights
  • 14. of every human being.” Further, the poster states that the NRA has worked diligently over the past 25 years to expand the right of open carry: the NRA has been “working for passage of fair Right-to-Carry laws, expansion of carry reciprocity between the states and the elimination of many ‘no-carry’ zones that only affect the law-abiding.” For the NRA, one of the major private-public backers of the SB 1474, the restriction of concealed carry on college campuses is an infringement on these basic rights. The flyer goes on to state the following: Here is another way to include a parenthetical citation. Amanda has incorporated the author’s name into the sentence. Note that the year of publication is presented after the author, but there is no citation at the end of the
  • 15. sentence because the information is already presented at the beginning. This quotation is called a “block.” If a quotation is over 40 words long, then you must “block” it by removing the quotation marks and indenting the entire quotation ½” from the left-hand margin. If this quotation would have been from a print text, then the page number would have been included at the end of the sentence, but it was an electronic source. Para 4: Pro side There are three second-level headings in the LR. Headings help you and the reader to see the organization of your paper. Amanda presents a closer look at the pro side
  • 16. before the con side. Note that she is not engaging with the arguments, only presenting them as fairly as she can. The LR is about the arguments of others. Amanda knows she will be able to make her own arguments in the Body of the paper. 5 Those who oppose campus carry [of firearms] argue that educational institutions should be treated differently, based on emotional claims that places of higher learning are somehow exempt from real-world violence. But the truth is, despite
  • 17. current prohibitions on legally carrying on campuses, crimes already occur on campus, and the right to self- defense from those violent acts should be respected. (NRA, 2012) The NRA is correct. In fact, given the number of school-related shootings in the past few months alone, it would seem that a student’s chances of being shot on campus seem greater than if that same student were walking the streets of the community. From larger cities to small towns, it seems that the size of the community does not matter: the violence of a shooting can occur anywhere. However, even with this fact floating in the backs of students’ minds, students must still attend classes and while it would seem obvious that lawmakers on both sides want student safety, they just see the means to that safety from different sides of the same coin. The Case for Campuses as Unique Eugene Sander (2012), the Interim President of the University of Arizona,
  • 18. released the following statement about SB 1474: “I have been a gun owner for all my adult life, and am fully supportive of the right to own a gun. However, having faculty, staff or students bringing weapons into classrooms and other campus activities will do nothing to make our campus safer.” While Sander does not go into detail about what this newly proposed bill does have to do with, he makes his case on the basis that 50,000 students, staff, and faculty attend the campus daily, along with over 20,000 visitors annually. For Sander (2015), the educational environment is a “unique atmosphere that is Para 5: Con side This citation is correct. Amanda did not have to include the author’s first name, but it is fine to do so the first time that the author’s name is mentioned. Amanda has made a mistake. Each time an author is included, the year of
  • 19. publication must follow. So this should read as follows: “While Sander (2012)…” Amanda has made a mistake. The actual year of the publication is 2012. Be careful about editing for errors like this in your own paper. 6 dependent on open and vigorous debate. Introducing guns into classrooms would dramatically and negatively impact the ability to engage in constructive dialogue.” In other words, even if the NRA does not believe that the university is a unique atmosphere,
  • 20. as Sander and others do, then there is still a possibility that introducing the right to carry concealed weapons on campus might lead to a change to the very culture of the university. While Arizona lawmakers continue to debate the merits of SB1474, the public debate grows, as this issue concerns both public safety and citizens’ rights. Because the three state universities in Arizona are publicly funded, the debate about allowing open carry is very much a concern held by the communities in which these universities reside. Those who are in favor of the change to an open carry status on university campuses wish (a) for the open carry laws of the State of Arizona to be extended to all areas, which includes all publicly funding institutions, such as the universities, and (b) for the open carry of firearms to act as a deterrent to gun-related violence on college campuses. For those who are against the passing of SB1474, many of whom occupy the space of the university as professors, students, or administrators, the
  • 21. question of allowing the open carry of firearms is no actual question at all: there is simply no need to involve weapons in a space that is meant for open dialogue and debate. In as much as the Second Amendment should be observed and upheld in the fashion adopted by the State of Arizona in the form of open carry, the university setting is unique in that concerns about open and free expression should be at the forefront—essentially making this bill a potentially dangerous one that should be reconsidered or withdrawn completely. Para 6: LR Conclusion S1 & 2: Amanda creates a topic sentence that encapsulates the concern of the controversy, and she includes a second sentence to increase
  • 22. understanding. S3: Amanda summarizes the two main arguments of the pro side, which favors the passing of SB1474. S4: Amanda summarizes the main argument of the con side, those who are against the passing of SB1474 S5: Amanda reiterates her own position by reasserting her thesis statement. Note that the thesis statement is slightly different than the original at the end of the Introduction paragraph.
  • 23. 7 References CNN Library. (2015, October 19). 28 deadliest mass shootings in U.S. history fast facts. CNN. http://www.cnn.com/2013/09/16/us/20-deadliest-mass- shootings-in-u-s- history-fast-facts/ Cloud, J. (1999, November 28). The Columbine effect. Time. http://content.time.com/time/magazine/article/0,9171,35098,00. html Gibbs, N. & Roche, T. (1999, December 20). The Columbine tapes. Time. http://content.time.com/time/magazine/article/0,9171,992873,00 .html National Rifle Association. (2012). Arizona Self-Defense on Campus [Flyer]. NRA: Author. Sander, Eugene. (2012, March 20). UA President opposes campus guns bill. KGUN-TV. http://www.kgun9.com
  • 24. An APA list of references should be labeled “References,” not “Works Cited” or “Bibliograph.” Titles in APA are presented in sentence-case capitalization, meaning that only the first word or any proper noun should begin with a capital letter. Amanda has made a mistake. Only the “A” in Arizona should be capitalized in this title. Amanda has made a mistake by including the full name of the author here. The last name is presented first; then the first name and middle (if present) are included as initials. An ampersand (&) is used for more than
  • 25. one author. http://www.cnn.com/2013/09/16/us/20-deadliest-mass- shootings-in-u-s-%20history-fast-facts/ http://www.cnn.com/2013/09/16/us/20-deadliest-mass- shootings-in-u-s-%20history-fast-facts/ http://content.time.com/time/magazine/article/0,9171,35098,00. html http://content.time.com/time/magazine/article/0,9171,992873,00 .html http://www.kgun9.com/ Running head: ARTIFICIAL INTELLIGENCE 1 Artificial Intelligence English Composition II (EH 1020) February 25, 2021 ARTIFICIAL INTELLIGENCE 2 Artificial Intelligence in Fighting Cyber Crime Cyber insecurity has led to different methods evolving to help curb it, including artificial intelligence. Those in support of this new technology believe that it can work beyond human capacities, hence detecting threats and stopping them faster. Those opposed to it see it as a platform
  • 26. the attackers are using to diversify their attacks. However, these discussions are all based on the need to secure the business environment and free it from cybercrime. Artificial intelligence has increased visibility in the attack environment for businesses to take the right precautions in preventing it. For example, the system flags the anomalies making the security analyst work on them and save time and save the business costs (Anwar & Hassan, 2017). The experts also suggest using intelligent systems in accurately detecting and remediating the attacks in real-time in the future. Artificial intelligence can also solve difficult situations that humans have no answer for but have some information on what to be expected. Artificial intelligence is a tool that enables companies to remain visibly aware of the evolving threats. This ensures that the security analysts take a right to measures and quickly respond to the business's issues. However, artificial intelligence has opened up a new wave of threats that negatively impact businesses' operations. The poisoning attacks are capable of manipulating the input and giving out output that is similar to the
  • 27. attacker's goals. Therefore, although artificial intelligence is an essential technology for combating cybersecurity threats, it is essential to consider the dangers it poses to the business environment because it is capable of changing the business operations if, in any case, it becomes a pathway of attacks. Literature Review Amanda Laroche Good thesis statement! You want to be sure the reasons you state in your thesis statement become the topic of your body paragraphs in units VI & VII. ARTIFICIAL INTELLIGENCE 3 The issue of artificial intelligence in fighting cybercrime can be understood by first looking into cybercrime and the failure of the different methods adopted. This will be followed by an analysis of the two sides of the controversy, the pro, and the con. The pro side supports artificial intelligence in curbing cybercrime, whereas the con side is against this method, especially in businesses.
  • 28. Brief Summary of Cyber Crime The issue of malware and cybercrime can be traced back to connected computing days because it coincides with the evolution of the internet. The internet grew, allowing for the crimes to become more complicated, with a significant wave of attacks happening in the 1980s using emails' proliferation. The Nigerian Prince Scam is one of the earliest forms of cyber-attacks delivered to several inboxes requesting money to set up a transfer and later to share it. However, the growth of cybercrime was seen in the 2000s when social media came into life (Taddeo, McCutcheon &Floridi, 2019). People started putting all information in profile databases, and this led to identity theft. The cyber attackers were now interested in accessing bank accounts and accessing personal information for their benefit. Cybercrime has grown into an industry that is totaling nearly half a trillion dollars yearly. The hackers have gone on a spree with several incidences, such as the Russian hackers' attack on the Ukrainian energy company. The attacks have led to organizations
  • 29. changing the approaches they give to cybersecurity. Attention is on preventing them before they occur. The reason businesses are struggling to deal with cybercrime is due to the economic losses; in 2020, the loss was predicted to be over $3 trillion, with 74% of businesses being hacked (Mosteanu, 2020). The argument for Adopting Artificial Intelligence in Businesses Amanda Laroche Needs in-text citation. Amanda Laroche Need to define what this means. Amanda Laroche Amanda Laroche Amanda Laroche Find alternative ways to say "pro" and "con" to help improve the formal tone of your assignment. ARTIFICIAL INTELLIGENCE 4 As the threat of cyber insecurity is continually evolving, businesses must adapt survival measures. Artificial Intelligence is centrally placed because it can detect threats irrespective of their
  • 30. shape in attack and defense. This is a multifaceted tool capable of collecting data, organizing it, and protecting it against outside forces' access. AI increases data security systems' efficiency by spotting the potential threats early enough before they come to fruition. It also squashes the incoming attacks at speeds that are above human capabilities. According to Mosteanu, the benefits of AI go beyond anticipating the attacks (2020). It makes organizations ready for the proper response at all times since cybercriminals keep intensifying their attacks. Artificial Intelligence Downside against Fighting Cybercrime Those opposed to using AI in preventing cybercrime state various reasons why it is detrimental to businesses. Terrorists in the 21st century no longer need bombs and sophisticated weapons but rather the ability to hack into the company or government systems. Through this, they can bring the operations of critical infrastructure to their knees and acquire a ransom. AI is prone to manipulations that are aimed at causing malfunction. According to Li and Zhang, the attacks can be
  • 31. input or poisoning attacks. The input attacks are fed to the AI system to alter the output (2017). This is because the AI System has a machine at its core responsible for manipulating the input to give an output. When the attackers alter the input, then the output is corrupted. The poisoning attacks are manifested by corrupting the process, causing a malfunction desired by the attacker. This can include poisoning the data used in a process. These attacks are capable of causing great harm to the business and affecting the efficiency of operation. Artificial intelligence was designed to ensure that the system takes the attacks before they cause harm to the business database. However, cybercrime has evolved, and the AI attacks are Amanda Laroche If this is the conclusion, you need a section header. Amanda Laroche Amanda Laroche What does this mean? Amanda Laroche Reword: 21st century terrorists Amanda Laroche
  • 32. What is "it"? Be specific. ARTIFICIAL INTELLIGENCE 5 different from the traditional attacks it was designed to detect. The attacks are enabled by the limitations in the algorithms that cannot be fixed. This means that various methods can be used to execute attacks, including physical objects. For example, the attackers can transform a stop sign into green light using an AI attack by using pieces of tape on the sign (Anwar & Hassan, 2017). At the same time, it is possible to weaponize data, requiring the collection, storage, and use of data to be reviewed. AI attacks are affecting the most critical parts of society. This includes the military, law enforcement, and civil society. This poses a threat to the privacy of these institutions, mostly because they deal with critical information. According to Soni, AI security compliance programs must be introduced to protect against this new version of attacks (2020). This approach will reduce the risk of successful attacks and lower the impact when they occur. The Regulators should also ensure the government and institutions at high risk of AI attacks
  • 33. have adhered to the compliance set. This is especially in areas that would have a severe impact on society. This is because AI technologies have brought many high-end attacks, such as Capital One, that compromised the data of more than 100 million Americans (Mosteanu, 2020). This shows that irrespective of the approach used to mitigate the attacks, they persist. Amanda Laroche Choppy sentences. Revise and combine. Amanda Laroche Choppy sentences. Revise and combine. ARTIFICIAL INTELLIGENCE 6 References Anwar, A., & Hassan, S. I. (2017). Applying Artificial Intelligence Techniques to Prevent Cyber Assaults. International Journal of Computational Intelligence Research, 13(5), 883-889. Li, X., & Zhang, T. (2017, April). An exploration on artificial intelligence application: From security, privacy and ethic perspective. In 2017 IEEE 2nd International Conference on
  • 34. Cloud Computing and Big Data Analysis (ICCCBDA) (pp. 416- 420). IEEE. Mosteanu, N. R. (2020). Artificial Intelligence and Cyber Security–A Shield against Cyberattack as a Risk Business Management Tool–Case of European Countries. Quality-Access to Success, 21(175). Mosteanu, N. R. (2020). Artificial Intelligence And Cyber Security–Face To Face With Cyber Attack–A Maltese Case Of Risk Management Approach. Eco forum Journal, 9(2). Soni, V. D. (2020). Challenges and Solution for Artificial Intelligence in Cybersecurity of the USA. Available at SSRN 3624487. Taddeo, M., McCutcheon, T., &Floridi, L. (2019). Trusting artificial intelligence in cybersecurity is a double-edged sword. Nature Machine Intelligence, 1(12), 557-
  • 35. 560.