SlideShare a Scribd company logo
1 of 13
Caroline Cabral
USEM 102
Professor Schacht
December 10, 2015
1
Working Claim: Although weak privacy on the Internet is in the
interest of technology companies, it is detrimental to the user
both financially and personally.
Now go back up to your claim and highlight the fact in yellow
and the opinion in blue.
Read through the outline, then replace the orange text with your
answers (in black, please).
Terms and Concepts:(Minimum 4)
1. Globalization is a global phenomenon that seeks to promote
the integration of a range of financial, commercial, economic,
political and other spheres.
2.
3. Encryption is the process of converting information or data
into code, especially to prevent unauthorized access.
4. Privacy is a personal right to keep personal information
matters and relationships secret.
5. Computer programming is the process of designing and
building an executable computer program for accomplishing a
specific computing task.
Jargon: (depends on area of research)
1. Cybersecurity is the practice of defending computers, servers,
mobile devices, electronic systems, networks, and data from
malicious attacks.
2. A data governance policy is a documented set of guidelines
for ensuring the proper management of an organization digital
information.
3. A security hacker is someone who seeks to breach defenses
and exploit weaknesses in a computer system or network.
4. IOT is the Internet of things that refer to the concept of
extending Internet connectivity beyond conventional computing
platforms such as personal computers and mobile devices, and
into any range of traditionally or non-internet-enabled physical
devices and everyday objects.
Argumentative Researched-Essay Outline
I.Introductory Paragraph
A.Hook: Technology has provided us with more communication
access to knowledge at our fingertips. Technology has overall
made life more comfortable, but it has made things a lot less
private.
B.Transition: That results in us having to be extra careful when
using the internet.
C.Lead: In the last few years, a lot of privacy issues shown on
the news like a Facebook issue, and WannaCry ransomware
attack.
D.Claim: : Although weak privacy on the Internet is in the
interest of technology companies, it is detrimental to the user
both financially and personally
E.Consider the audience: Internet security is essential to
protect privacy, protect data from viruses that could destroy a
piece of technology.
II.Background:
At this time, the Internet has become a tremendous electronic
gateway that provides instant access to global news and
information. The world is becoming digitized, interconnected,
and functional. The databases, documents, files, and programs
that are on Internet computers contain a tremendous amount of
data. Once the search for something, the result becomes on the
hand. However, there is no reason why those conveniences have
to come at the cost of giving up privacy inevitably. There are
several potential risks associated with the use of the Internet.
Hacking had become active in this era, so it is impossible to
secure data on the Internet, but if technology companies do save
user data in their storage, it might reduce the leakage of data.
III.Introduce your Argument
A. The security on the Internet is weak. Therefore, network
security needs to be high on technology companies list of
considerations.
B.Lead: Communications of the ACM
C.Significance: A lot of programs allow accessing personal
files. Facebook gave some companies more extensive access to
users’ personal Facebook data.
D.Evidence: Almost all programs ask to access to user data to
give a user the right to use the programs. Most of the users the
Internet give right for applications to access their data and that
leads to leaks user’s information on the Web.
E.Interpretation: when using social media apps, the Internet
company’s determination the user location.
F.Tie to claim: Technology companies can use a user location
to their benefit.
G.Lead: that leads to that the user will see ads on social media
apps, and the ads form in a user area.
H.Significance: People share more of their personal
information with marketers in return for services and benefits.
I.Evidence: The study findings show that receiving
compensation, especially when it is a monetary reward, reduces
consumer expectations for privacy protection.
J.Interpretation: Amazon gives a beautiful service, but the user
must provide financial data, and Amazon saves it on its web-
storage.
K.Tie to claim: Amazon must delete user financial data after a
pay.
Wang, H., Lee, M. K. O., & Wang, C. (1998, March). Consumer
privacy concerns about Internet marketing. Communications of
the ACM, 41(3), 63+. Retrieved from https://link-galegroup-
com.glacier.sou.edu/apps/doc/A20561633/AONE?u=s8391082&
sid=AONE&xid=0e431019
Gabisch, J. A., & Milne, G. R. (2014). The impact of
compensation on information ownership and privacy
control. The Journal of Consumer Marketing, 31(1), 13-26.
doi:http://dx.doi.org/10.1108/JCM-10-2013-0737
IV.Develop your Argument
A.There are advantages of s online storage data, but the
drawbacks are more.
B.Lead: Public Workshop on Consumer Privacy on the Global
Information Infrastructure.
C.Significance: The risks of expanded commercial use of the
Internet.
D.Evidence: Commercial activity online is virtually limitless.
Anyone can establish a commercial site on the Internet and
become a global marketer. Therefore, The Federal Trade
Commission imposed censorship on E-markets because fraud
rate has increased.
E.Interpretation: Fraud rate has increased because anyone can
create a commercial site on the Internet.
F.Tie to claim: A number of online stores are unlimited, so
people who have not knowledge about online store policy might
be lost their money.
G.Lead: The innovations in electronic commerce brought about
by the Internet have raised a variety of consumer privacy issues.
H.Significance: Electronic regimes for protecting consumer
privacy online.
I.Evidence: Technological standards such as the Platform for
Internet Content Selection (PICS) system is used to facilitate
automatic disclosure of privacy.
J.Interpretation: PICS used metadata to label webpages to
control it to what user could access on the Internet.
K.Tie to claim: Whatever the PICS are helpful to parents, but it
has a dark side which government or Internet companies can
control our lives.
Public Workshop on Consumer Privacy on the Global
Information Infrastructure. (1996). Staff report : Public
Workshop on Consumer Privacy on the Global Information
Infrastructure. Washington, D.C.]: [U.S. Federal Trade
Commission, Bureau of Consumer Protection]. https://alliance-
primo.hosted.exlibrisgroup.com/primo-
explore/fulldisplay?docid=CP71135457430001451&context=L&
vid=SOU&search_scope=sou_metasearch&tab=default_tab&lan
g=en_US
V.Develop your Argument or offer
Solution
A.The use of the Internet by the government to monitor users is
considered a positive thing in terms of social security, but when
using the Internet to intervene in matters of privacy is an
information crime.
B.Lead: Internet Governance and the Domain Name System
C.Significance: The Internet is often described as a “network of
networks” because it is not a single physical entity, but
hundreds of thousands of interconnected networks linking
hundreds of millions of
computers around the world.
D.Evidence: National governments have confessed that The
Internet Corporation for Assigned Names and Numbers
(ICANN) policy can control over the Internet. Therefore,
governments and Internet companies are controlling over the
Internet.
E.Interpretation: A more limited definition would encompass
the management and coordination of the technical
underpinnings of the Internet—such as domain names,
addresses, standards, and protocols that enable the Internet to
function.
F.Tie to claim: An organization or a company can control over
the Internet.
G.Lead: Internet of Things has connected to household items
which make life comfortable.
H.Significance: when we try to make our life better, we have to
waiver about our privacy.
I.Evidence: Many homes nowadays have security systems that
are interconnected. The benefit of owning one of these security
systems is the ability to view live video footage of a home
remotely, but also might someone can view it.
J.Interpretation: The IoT market from the development of
standalone point solutions to complete end-to-end offerings is
evolving rapidly.
K.Tie to claim: Because of IoT life is easier, but the risk of it
more.
Kruger, L., & Library of Congress. Congressional Research
Service. (2013). Internet Governance and the Domain Name
System : Issues for Congress.https://alliance-
primo.hosted.exlibrisgroup.com/primo-
explore/fulldisplay?docid=CP71207986520001451&context=L&
vid=SOU&search_scope=sou_metasearch&tab=default_tab&lan
g=en_US.
Public Workshop on Consumer Privacy on the Global
Information Infrastructure. (1996). Staff report : Public
Workshop on Consumer Privacy on the Global Information
Infrastructure. Washington, D.C.]: [U.S. Federal Trade
Commission, Bureau of Consumer Protection]. https://alliance-
primo.hosted.exlibrisgroup.com/primo-
explore/fulldisplay?docid=CP71135457430001451&context=L&
vid=SOU&search_scope=sou_metasearch&tab=default_tab&lan
g=en_US
VIIOpposition and Rebuttal
A.Opposition: Almost all technology companies.
B.Grounds: They stopped all Hackers attack, and they did not
lose user data.
C.Rebut: A lot of advertisements about Internet security that
means Internet security is weak because if it is high, they do not
need ads.
D.Lead: Marketing creates and promotes products and services
customers will pay for.
E.Evidence: The increase of advertisement, the use, and transfer
of private data and the development of programs that allow
access to personal files raise privacy concerns.
F.Interpretation: Ads are often in the area where the user is
located which means that once the net is used, the technology
companies get the user location.
VIII.Conclusion
A.In short, the importance of this topic is crucial to user
privacy on the Internet. A long time ago, this issue impacted
commercial, personal, and government data. Ransomware attack
and the Facebook issue made the users' the internet are scared
about using the Internet while it makes life easy. Life without
the Internet is difficult because This time is the technology era.
USem 103A Sense of Purpose: Navigating the World
FUSE: Final USem Essay Scoring Guide
Argument: Is your argument focused & strong?______ /60
Claim is unique, insightful, focused
Balance of logos/pathos
Claim is thought-provoking, focused
Claim is clear, somewhat focused
Claim is broad,
all fact or all opinion
Scope is defined through background, defined abstract terms
Scope is left quite open
Evidence is integrated with clear frames, authority and
credibility
Strong links to claim
Evidence is offered with some frames, some authority or
credibility.
Links to claim
Evidence is offered but dropped in without frame, or few direct
links to claim
Evidence is weak or absent; no ties to claim
Author drives the argument
Evidence drives the argument
Evidence* is strong and credible (peer-reviewed/academic
sources & gov. docs dominate the foundation of the argument)
Evidence is strong and credible (peer-reviewed sources used,
mixed with solid news and government documents)
Evidence is mostly credible
Some sources light or bias without acknowledgement
Sources are pulled from pop culture, websites and news
Thoughtfully offers a researched-based counter-perspective and
a rebuttal/research-based response
Acknowledges oppositional forces and addresses them with
opposing research
Acknowledges oppositional forces and addresses them
Does not thoughtfully address oppositional forces
Conclusion goes beyond simply restating the argument; it
enlightens, illuminates and places the claim in a broader picture
Conclusion places the claim in a broader picture and encourages
further thought
Conclusion attempts to place the claim in a broader picture
Conclusion restates argument & evidence
Information Literacy: did you use credible sources and honor
them?______/20
Used 3+ academic journals*
Used 2+ academic journals
Used 1 academic journal
Used no academic journals
Well-balanced and varied sources
Relying on multiple different works and authors
Mostly balanced and varied sources
Relying on several different works and authors
Somewhat balanced and varied sources
Relying on a few different works and authors
Unbalanced sources
relying primarily on a single work or author
All sources have MLA citations (direct quotes, paraphrases,
images)
Inconsistent in-text citations
Writer provides strong, credible evidence to support the claim
Writer provides credible evidence to support the claim
Writer provides evidence to support the claim but credibility
varies
evidence does not directly support the claim OR offers
suspicious evidence
Academic Writing Techniques: Is your writing assertive,
confident and authoritative? Did you consciously consider your
reader? Are your sources strong?(0-2 points each)______ / 20
_____ Complex ideas sheds new light on the topic
_____ Organization is clear, purposeful, and logically supports
the overall argument
_____ Transitions between ideas & paragraphs are deliberate,
meaningful and help guide the reader
_____ Evidence is offered with sophisticated frames for
understanding
_____ Tone conveys confidence and authority (including
credibility/credos, vocabulary, fluency, rhythm and effective
punctuation)
_____ Academic voice is sophisticated, precise and aware of the
discourse community (no “I” or “you”; no jargon, &
abstract words are defined)
_____ Powerful & effective vocabulary choices
_____ Accurate conventions of standard written English; few, if
any, distractions
Word Count: 1500-1750: ______

More Related Content

Similar to Caroline CabralUSEM 102Professor SchachtDecember 10, 2015.docx

MIS Notes For University Students.MANAGEMENT INFORMATION SYSTEM
MIS  Notes For University Students.MANAGEMENT INFORMATION SYSTEMMIS  Notes For University Students.MANAGEMENT INFORMATION SYSTEM
MIS Notes For University Students.MANAGEMENT INFORMATION SYSTEMShehanperamuna
 
Empowerment_Q1_Module1.pdf
Empowerment_Q1_Module1.pdfEmpowerment_Q1_Module1.pdf
Empowerment_Q1_Module1.pdfMichael Montarde
 
Creating Trustworthy AI: A Mozilla White Paper
Creating Trustworthy AI: A Mozilla White PaperCreating Trustworthy AI: A Mozilla White Paper
Creating Trustworthy AI: A Mozilla White PaperRebecca Ricks
 
International Journal of Engineering Research and Development
International Journal of Engineering Research and DevelopmentInternational Journal of Engineering Research and Development
International Journal of Engineering Research and DevelopmentIJERD Editor
 
Malcolm Crompton, IIS Partners Irish Future Internet Forum - Socioeconomics
Malcolm Crompton, IIS Partners Irish Future Internet Forum - SocioeconomicsMalcolm Crompton, IIS Partners Irish Future Internet Forum - Socioeconomics
Malcolm Crompton, IIS Partners Irish Future Internet Forum - SocioeconomicsIrish Future Internet Forum
 
Social Media Privacy Protection for Blockchain with Cyber Security Prediction...
Social Media Privacy Protection for Blockchain with Cyber Security Prediction...Social Media Privacy Protection for Blockchain with Cyber Security Prediction...
Social Media Privacy Protection for Blockchain with Cyber Security Prediction...IRJET Journal
 
Research on Privacy Protection in Big Data Environment
Research on Privacy Protection in Big Data EnvironmentResearch on Privacy Protection in Big Data Environment
Research on Privacy Protection in Big Data EnvironmentIJERA Editor
 
Research on Privacy Protection in Big Data Environment
Research on Privacy Protection in Big Data EnvironmentResearch on Privacy Protection in Big Data Environment
Research on Privacy Protection in Big Data EnvironmentIJERA Editor
 
Team 3_Final Project.docx
Team 3_Final Project.docxTeam 3_Final Project.docx
Team 3_Final Project.docxMarcusBrown87
 
ENMG 602 Homework Assignment 1 Problem 1 Observation.docx
ENMG 602 Homework Assignment 1 Problem 1  Observation.docxENMG 602 Homework Assignment 1 Problem 1  Observation.docx
ENMG 602 Homework Assignment 1 Problem 1 Observation.docxkhanpaulita
 
Computer_Ethics_importance_of_computer_ethics.pdf
Computer_Ethics_importance_of_computer_ethics.pdfComputer_Ethics_importance_of_computer_ethics.pdf
Computer_Ethics_importance_of_computer_ethics.pdfmt5854804210
 
WSIS10 Action Line C5 Building Confidence and Security in the use of ICT's
WSIS10 Action Line C5 Building Confidence and Security in the use of ICT'sWSIS10 Action Line C5 Building Confidence and Security in the use of ICT's
WSIS10 Action Line C5 Building Confidence and Security in the use of ICT'sDr Lendy Spires
 
The Internet of Things (IoT) brings tremendous new capabilities .docx
The Internet of Things (IoT) brings tremendous new capabilities .docxThe Internet of Things (IoT) brings tremendous new capabilities .docx
The Internet of Things (IoT) brings tremendous new capabilities .docxjmindy
 

Similar to Caroline CabralUSEM 102Professor SchachtDecember 10, 2015.docx (16)

Assignment
AssignmentAssignment
Assignment
 
MIS Notes For University Students.MANAGEMENT INFORMATION SYSTEM
MIS  Notes For University Students.MANAGEMENT INFORMATION SYSTEMMIS  Notes For University Students.MANAGEMENT INFORMATION SYSTEM
MIS Notes For University Students.MANAGEMENT INFORMATION SYSTEM
 
Empowerment_Q1_Module1.pdf
Empowerment_Q1_Module1.pdfEmpowerment_Q1_Module1.pdf
Empowerment_Q1_Module1.pdf
 
Creating Trustworthy AI: A Mozilla White Paper
Creating Trustworthy AI: A Mozilla White PaperCreating Trustworthy AI: A Mozilla White Paper
Creating Trustworthy AI: A Mozilla White Paper
 
International Journal of Engineering Research and Development
International Journal of Engineering Research and DevelopmentInternational Journal of Engineering Research and Development
International Journal of Engineering Research and Development
 
Iwamoto-Crews-Coe
Iwamoto-Crews-CoeIwamoto-Crews-Coe
Iwamoto-Crews-Coe
 
Malcolm Crompton, IIS Partners Irish Future Internet Forum - Socioeconomics
Malcolm Crompton, IIS Partners Irish Future Internet Forum - SocioeconomicsMalcolm Crompton, IIS Partners Irish Future Internet Forum - Socioeconomics
Malcolm Crompton, IIS Partners Irish Future Internet Forum - Socioeconomics
 
Social Media Privacy Protection for Blockchain with Cyber Security Prediction...
Social Media Privacy Protection for Blockchain with Cyber Security Prediction...Social Media Privacy Protection for Blockchain with Cyber Security Prediction...
Social Media Privacy Protection for Blockchain with Cyber Security Prediction...
 
Research on Privacy Protection in Big Data Environment
Research on Privacy Protection in Big Data EnvironmentResearch on Privacy Protection in Big Data Environment
Research on Privacy Protection in Big Data Environment
 
Research on Privacy Protection in Big Data Environment
Research on Privacy Protection in Big Data EnvironmentResearch on Privacy Protection in Big Data Environment
Research on Privacy Protection in Big Data Environment
 
Team 3_Final Project.docx
Team 3_Final Project.docxTeam 3_Final Project.docx
Team 3_Final Project.docx
 
ENMG 602 Homework Assignment 1 Problem 1 Observation.docx
ENMG 602 Homework Assignment 1 Problem 1  Observation.docxENMG 602 Homework Assignment 1 Problem 1  Observation.docx
ENMG 602 Homework Assignment 1 Problem 1 Observation.docx
 
Computer_Ethics_importance_of_computer_ethics.pdf
Computer_Ethics_importance_of_computer_ethics.pdfComputer_Ethics_importance_of_computer_ethics.pdf
Computer_Ethics_importance_of_computer_ethics.pdf
 
WSIS10 Action Line C5 Building Confidence and Security in the use of ICT's
WSIS10 Action Line C5 Building Confidence and Security in the use of ICT'sWSIS10 Action Line C5 Building Confidence and Security in the use of ICT's
WSIS10 Action Line C5 Building Confidence and Security in the use of ICT's
 
The Internet of Things (IoT) brings tremendous new capabilities .docx
The Internet of Things (IoT) brings tremendous new capabilities .docxThe Internet of Things (IoT) brings tremendous new capabilities .docx
The Internet of Things (IoT) brings tremendous new capabilities .docx
 
Tech trends
Tech trendsTech trends
Tech trends
 

More from annandleola

CASE 6B – CHESTER & WAYNE Chester & Wayne is a regional .docx
CASE 6B – CHESTER & WAYNE Chester & Wayne is a regional .docxCASE 6B – CHESTER & WAYNE Chester & Wayne is a regional .docx
CASE 6B – CHESTER & WAYNE Chester & Wayne is a regional .docxannandleola
 
CASE 9 Bulimia Nervosa Table 9-1   Dx Checklist   Bulimia Nervos.docx
CASE 9 Bulimia Nervosa Table 9-1   Dx Checklist   Bulimia Nervos.docxCASE 9 Bulimia Nervosa Table 9-1   Dx Checklist   Bulimia Nervos.docx
CASE 9 Bulimia Nervosa Table 9-1   Dx Checklist   Bulimia Nervos.docxannandleola
 
Case 9 Bulimia Nervosa in Gorenstein and Comer (2014)Rita was a.docx
Case 9 Bulimia Nervosa in Gorenstein and Comer (2014)Rita was a.docxCase 9 Bulimia Nervosa in Gorenstein and Comer (2014)Rita was a.docx
Case 9 Bulimia Nervosa in Gorenstein and Comer (2014)Rita was a.docxannandleola
 
Case 8.1 Pros and Cons of Balkan Intervention59Must the a.docx
Case 8.1 Pros and Cons of Balkan Intervention59Must the a.docxCase 8.1 Pros and Cons of Balkan Intervention59Must the a.docx
Case 8.1 Pros and Cons of Balkan Intervention59Must the a.docxannandleola
 
CASE 5Business Performance Evaluation Approaches for Thoughtf.docx
CASE 5Business Performance Evaluation Approaches for Thoughtf.docxCASE 5Business Performance Evaluation Approaches for Thoughtf.docx
CASE 5Business Performance Evaluation Approaches for Thoughtf.docxannandleola
 
Case 6-2 Not Getting Face Time at Facebook—and Getting the Last La.docx
Case 6-2 Not Getting Face Time at Facebook—and Getting the Last La.docxCase 6-2 Not Getting Face Time at Facebook—and Getting the Last La.docx
Case 6-2 Not Getting Face Time at Facebook—and Getting the Last La.docxannandleola
 
Case 6.4 The Case of the Poorly Performing SalespersonEd Markham.docx
Case 6.4 The Case of the Poorly Performing SalespersonEd Markham.docxCase 6.4 The Case of the Poorly Performing SalespersonEd Markham.docx
Case 6.4 The Case of the Poorly Performing SalespersonEd Markham.docxannandleola
 
Case 5.6Kelo v City of New London545 U.S. 469 (2005)Ye.docx
Case 5.6Kelo v City of New London545 U.S. 469 (2005)Ye.docxCase 5.6Kelo v City of New London545 U.S. 469 (2005)Ye.docx
Case 5.6Kelo v City of New London545 U.S. 469 (2005)Ye.docxannandleola
 
CASE 5.10 FIBREBOARD PAPER PRODUCTS CORP. V. NLRB SUPREME COURT OF.docx
CASE 5.10 FIBREBOARD PAPER PRODUCTS CORP. V. NLRB SUPREME COURT OF.docxCASE 5.10 FIBREBOARD PAPER PRODUCTS CORP. V. NLRB SUPREME COURT OF.docx
CASE 5.10 FIBREBOARD PAPER PRODUCTS CORP. V. NLRB SUPREME COURT OF.docxannandleola
 
Case 4 The McDonald’s China Food Supplier Scandal1. What we.docx
Case 4 The McDonald’s China Food Supplier Scandal1. What we.docxCase 4 The McDonald’s China Food Supplier Scandal1. What we.docx
Case 4 The McDonald’s China Food Supplier Scandal1. What we.docxannandleola
 
Case 3 Neesha Wilson Phoenix Rising Risks, Protective Factors, and.docx
Case 3 Neesha Wilson Phoenix Rising Risks, Protective Factors, and.docxCase 3 Neesha Wilson Phoenix Rising Risks, Protective Factors, and.docx
Case 3 Neesha Wilson Phoenix Rising Risks, Protective Factors, and.docxannandleola
 
Case 48 Sun Microsystems Done by Nour Abdulaziz Maryam .docx
Case 48 Sun Microsystems Done by Nour Abdulaziz  Maryam .docxCase 48 Sun Microsystems Done by Nour Abdulaziz  Maryam .docx
Case 48 Sun Microsystems Done by Nour Abdulaziz Maryam .docxannandleola
 
CASE 42 Myasthenia Gravis The immune response turns agai.docx
CASE 42 Myasthenia Gravis The immune response turns agai.docxCASE 42 Myasthenia Gravis The immune response turns agai.docx
CASE 42 Myasthenia Gravis The immune response turns agai.docxannandleola
 
Case 4 JetBlue Delighting Customers Through Happy JettingIn the.docx
Case 4 JetBlue Delighting Customers Through Happy JettingIn the.docxCase 4 JetBlue Delighting Customers Through Happy JettingIn the.docx
Case 4 JetBlue Delighting Customers Through Happy JettingIn the.docxannandleola
 
Case 4-2 Hardee TransportationThe Assignment Answer the four .docx
Case 4-2 Hardee TransportationThe Assignment Answer the four .docxCase 4-2 Hardee TransportationThe Assignment Answer the four .docx
Case 4-2 Hardee TransportationThe Assignment Answer the four .docxannandleola
 
Case 3-8 Accountant takes on Halliburton and Wins!1.      Descri.docx
Case 3-8 Accountant takes on Halliburton and Wins!1.      Descri.docxCase 3-8 Accountant takes on Halliburton and Wins!1.      Descri.docx
Case 3-8 Accountant takes on Halliburton and Wins!1.      Descri.docxannandleola
 
CASE 3.2 A Shift for Lieutenant Colonel AdamsEAM 751 Chapter.docx
CASE 3.2 A Shift for Lieutenant Colonel AdamsEAM 751 Chapter.docxCASE 3.2 A Shift for Lieutenant Colonel AdamsEAM 751 Chapter.docx
CASE 3.2 A Shift for Lieutenant Colonel AdamsEAM 751 Chapter.docxannandleola
 
Case 3 Ford’s Pinto Fires The Retrospective View of Ford’s Fiel.docx
Case 3 Ford’s Pinto Fires The Retrospective View of Ford’s Fiel.docxCase 3 Ford’s Pinto Fires The Retrospective View of Ford’s Fiel.docx
Case 3 Ford’s Pinto Fires The Retrospective View of Ford’s Fiel.docxannandleola
 
Case 3Competition in the Craft Brewing Industry in 2017John D. Var.docx
Case 3Competition in the Craft Brewing Industry in 2017John D. Var.docxCase 3Competition in the Craft Brewing Industry in 2017John D. Var.docx
Case 3Competition in the Craft Brewing Industry in 2017John D. Var.docxannandleola
 
CASE 3.2 Ethics, Schmethics-Enrons Code of EthicsIn Jul.docx
CASE 3.2 Ethics, Schmethics-Enrons Code of EthicsIn Jul.docxCASE 3.2 Ethics, Schmethics-Enrons Code of EthicsIn Jul.docx
CASE 3.2 Ethics, Schmethics-Enrons Code of EthicsIn Jul.docxannandleola
 

More from annandleola (20)

CASE 6B – CHESTER & WAYNE Chester & Wayne is a regional .docx
CASE 6B – CHESTER & WAYNE Chester & Wayne is a regional .docxCASE 6B – CHESTER & WAYNE Chester & Wayne is a regional .docx
CASE 6B – CHESTER & WAYNE Chester & Wayne is a regional .docx
 
CASE 9 Bulimia Nervosa Table 9-1   Dx Checklist   Bulimia Nervos.docx
CASE 9 Bulimia Nervosa Table 9-1   Dx Checklist   Bulimia Nervos.docxCASE 9 Bulimia Nervosa Table 9-1   Dx Checklist   Bulimia Nervos.docx
CASE 9 Bulimia Nervosa Table 9-1   Dx Checklist   Bulimia Nervos.docx
 
Case 9 Bulimia Nervosa in Gorenstein and Comer (2014)Rita was a.docx
Case 9 Bulimia Nervosa in Gorenstein and Comer (2014)Rita was a.docxCase 9 Bulimia Nervosa in Gorenstein and Comer (2014)Rita was a.docx
Case 9 Bulimia Nervosa in Gorenstein and Comer (2014)Rita was a.docx
 
Case 8.1 Pros and Cons of Balkan Intervention59Must the a.docx
Case 8.1 Pros and Cons of Balkan Intervention59Must the a.docxCase 8.1 Pros and Cons of Balkan Intervention59Must the a.docx
Case 8.1 Pros and Cons of Balkan Intervention59Must the a.docx
 
CASE 5Business Performance Evaluation Approaches for Thoughtf.docx
CASE 5Business Performance Evaluation Approaches for Thoughtf.docxCASE 5Business Performance Evaluation Approaches for Thoughtf.docx
CASE 5Business Performance Evaluation Approaches for Thoughtf.docx
 
Case 6-2 Not Getting Face Time at Facebook—and Getting the Last La.docx
Case 6-2 Not Getting Face Time at Facebook—and Getting the Last La.docxCase 6-2 Not Getting Face Time at Facebook—and Getting the Last La.docx
Case 6-2 Not Getting Face Time at Facebook—and Getting the Last La.docx
 
Case 6.4 The Case of the Poorly Performing SalespersonEd Markham.docx
Case 6.4 The Case of the Poorly Performing SalespersonEd Markham.docxCase 6.4 The Case of the Poorly Performing SalespersonEd Markham.docx
Case 6.4 The Case of the Poorly Performing SalespersonEd Markham.docx
 
Case 5.6Kelo v City of New London545 U.S. 469 (2005)Ye.docx
Case 5.6Kelo v City of New London545 U.S. 469 (2005)Ye.docxCase 5.6Kelo v City of New London545 U.S. 469 (2005)Ye.docx
Case 5.6Kelo v City of New London545 U.S. 469 (2005)Ye.docx
 
CASE 5.10 FIBREBOARD PAPER PRODUCTS CORP. V. NLRB SUPREME COURT OF.docx
CASE 5.10 FIBREBOARD PAPER PRODUCTS CORP. V. NLRB SUPREME COURT OF.docxCASE 5.10 FIBREBOARD PAPER PRODUCTS CORP. V. NLRB SUPREME COURT OF.docx
CASE 5.10 FIBREBOARD PAPER PRODUCTS CORP. V. NLRB SUPREME COURT OF.docx
 
Case 4 The McDonald’s China Food Supplier Scandal1. What we.docx
Case 4 The McDonald’s China Food Supplier Scandal1. What we.docxCase 4 The McDonald’s China Food Supplier Scandal1. What we.docx
Case 4 The McDonald’s China Food Supplier Scandal1. What we.docx
 
Case 3 Neesha Wilson Phoenix Rising Risks, Protective Factors, and.docx
Case 3 Neesha Wilson Phoenix Rising Risks, Protective Factors, and.docxCase 3 Neesha Wilson Phoenix Rising Risks, Protective Factors, and.docx
Case 3 Neesha Wilson Phoenix Rising Risks, Protective Factors, and.docx
 
Case 48 Sun Microsystems Done by Nour Abdulaziz Maryam .docx
Case 48 Sun Microsystems Done by Nour Abdulaziz  Maryam .docxCase 48 Sun Microsystems Done by Nour Abdulaziz  Maryam .docx
Case 48 Sun Microsystems Done by Nour Abdulaziz Maryam .docx
 
CASE 42 Myasthenia Gravis The immune response turns agai.docx
CASE 42 Myasthenia Gravis The immune response turns agai.docxCASE 42 Myasthenia Gravis The immune response turns agai.docx
CASE 42 Myasthenia Gravis The immune response turns agai.docx
 
Case 4 JetBlue Delighting Customers Through Happy JettingIn the.docx
Case 4 JetBlue Delighting Customers Through Happy JettingIn the.docxCase 4 JetBlue Delighting Customers Through Happy JettingIn the.docx
Case 4 JetBlue Delighting Customers Through Happy JettingIn the.docx
 
Case 4-2 Hardee TransportationThe Assignment Answer the four .docx
Case 4-2 Hardee TransportationThe Assignment Answer the four .docxCase 4-2 Hardee TransportationThe Assignment Answer the four .docx
Case 4-2 Hardee TransportationThe Assignment Answer the four .docx
 
Case 3-8 Accountant takes on Halliburton and Wins!1.      Descri.docx
Case 3-8 Accountant takes on Halliburton and Wins!1.      Descri.docxCase 3-8 Accountant takes on Halliburton and Wins!1.      Descri.docx
Case 3-8 Accountant takes on Halliburton and Wins!1.      Descri.docx
 
CASE 3.2 A Shift for Lieutenant Colonel AdamsEAM 751 Chapter.docx
CASE 3.2 A Shift for Lieutenant Colonel AdamsEAM 751 Chapter.docxCASE 3.2 A Shift for Lieutenant Colonel AdamsEAM 751 Chapter.docx
CASE 3.2 A Shift for Lieutenant Colonel AdamsEAM 751 Chapter.docx
 
Case 3 Ford’s Pinto Fires The Retrospective View of Ford’s Fiel.docx
Case 3 Ford’s Pinto Fires The Retrospective View of Ford’s Fiel.docxCase 3 Ford’s Pinto Fires The Retrospective View of Ford’s Fiel.docx
Case 3 Ford’s Pinto Fires The Retrospective View of Ford’s Fiel.docx
 
Case 3Competition in the Craft Brewing Industry in 2017John D. Var.docx
Case 3Competition in the Craft Brewing Industry in 2017John D. Var.docxCase 3Competition in the Craft Brewing Industry in 2017John D. Var.docx
Case 3Competition in the Craft Brewing Industry in 2017John D. Var.docx
 
CASE 3.2 Ethics, Schmethics-Enrons Code of EthicsIn Jul.docx
CASE 3.2 Ethics, Schmethics-Enrons Code of EthicsIn Jul.docxCASE 3.2 Ethics, Schmethics-Enrons Code of EthicsIn Jul.docx
CASE 3.2 Ethics, Schmethics-Enrons Code of EthicsIn Jul.docx
 

Recently uploaded

Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Krashi Coaching
 
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions  for the students and aspirants of Chemistry12th.pptxOrganic Name Reactions  for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions for the students and aspirants of Chemistry12th.pptxVS Mahajan Coaching Centre
 
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Sapana Sha
 
Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingTechSoup
 
Arihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfArihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfchloefrazer622
 
Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Celine George
 
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxPOINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxSayali Powar
 
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdfSoniaTolstoy
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introductionMaksud Ahmed
 
Privatization and Disinvestment - Meaning, Objectives, Advantages and Disadva...
Privatization and Disinvestment - Meaning, Objectives, Advantages and Disadva...Privatization and Disinvestment - Meaning, Objectives, Advantages and Disadva...
Privatization and Disinvestment - Meaning, Objectives, Advantages and Disadva...RKavithamani
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdfQucHHunhnh
 
Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3JemimahLaneBuaron
 
Mastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionMastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionSafetyChain Software
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxiammrhaywood
 
Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactPECB
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)eniolaolutunde
 

Recently uploaded (20)

Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
 
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions  for the students and aspirants of Chemistry12th.pptxOrganic Name Reactions  for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
 
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
 
Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy Consulting
 
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptxINDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
 
Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1
 
Arihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfArihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdf
 
Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17
 
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxPOINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
 
Mattingly "AI & Prompt Design: The Basics of Prompt Design"
Mattingly "AI & Prompt Design: The Basics of Prompt Design"Mattingly "AI & Prompt Design: The Basics of Prompt Design"
Mattingly "AI & Prompt Design: The Basics of Prompt Design"
 
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
 
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdfTataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introduction
 
Privatization and Disinvestment - Meaning, Objectives, Advantages and Disadva...
Privatization and Disinvestment - Meaning, Objectives, Advantages and Disadva...Privatization and Disinvestment - Meaning, Objectives, Advantages and Disadva...
Privatization and Disinvestment - Meaning, Objectives, Advantages and Disadva...
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdf
 
Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3
 
Mastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionMastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory Inspection
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
 
Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global Impact
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)
 

Caroline CabralUSEM 102Professor SchachtDecember 10, 2015.docx

  • 1. Caroline Cabral USEM 102 Professor Schacht December 10, 2015 1 Working Claim: Although weak privacy on the Internet is in the interest of technology companies, it is detrimental to the user both financially and personally. Now go back up to your claim and highlight the fact in yellow and the opinion in blue. Read through the outline, then replace the orange text with your answers (in black, please). Terms and Concepts:(Minimum 4) 1. Globalization is a global phenomenon that seeks to promote the integration of a range of financial, commercial, economic, political and other spheres. 2. 3. Encryption is the process of converting information or data into code, especially to prevent unauthorized access. 4. Privacy is a personal right to keep personal information matters and relationships secret. 5. Computer programming is the process of designing and building an executable computer program for accomplishing a specific computing task.
  • 2. Jargon: (depends on area of research) 1. Cybersecurity is the practice of defending computers, servers, mobile devices, electronic systems, networks, and data from malicious attacks. 2. A data governance policy is a documented set of guidelines for ensuring the proper management of an organization digital information. 3. A security hacker is someone who seeks to breach defenses and exploit weaknesses in a computer system or network. 4. IOT is the Internet of things that refer to the concept of extending Internet connectivity beyond conventional computing platforms such as personal computers and mobile devices, and into any range of traditionally or non-internet-enabled physical devices and everyday objects. Argumentative Researched-Essay Outline I.Introductory Paragraph A.Hook: Technology has provided us with more communication access to knowledge at our fingertips. Technology has overall made life more comfortable, but it has made things a lot less private. B.Transition: That results in us having to be extra careful when using the internet. C.Lead: In the last few years, a lot of privacy issues shown on the news like a Facebook issue, and WannaCry ransomware attack. D.Claim: : Although weak privacy on the Internet is in the interest of technology companies, it is detrimental to the user both financially and personally E.Consider the audience: Internet security is essential to
  • 3. protect privacy, protect data from viruses that could destroy a piece of technology. II.Background: At this time, the Internet has become a tremendous electronic gateway that provides instant access to global news and information. The world is becoming digitized, interconnected, and functional. The databases, documents, files, and programs that are on Internet computers contain a tremendous amount of data. Once the search for something, the result becomes on the hand. However, there is no reason why those conveniences have to come at the cost of giving up privacy inevitably. There are several potential risks associated with the use of the Internet. Hacking had become active in this era, so it is impossible to secure data on the Internet, but if technology companies do save user data in their storage, it might reduce the leakage of data. III.Introduce your Argument A. The security on the Internet is weak. Therefore, network security needs to be high on technology companies list of considerations. B.Lead: Communications of the ACM C.Significance: A lot of programs allow accessing personal files. Facebook gave some companies more extensive access to users’ personal Facebook data. D.Evidence: Almost all programs ask to access to user data to give a user the right to use the programs. Most of the users the Internet give right for applications to access their data and that leads to leaks user’s information on the Web. E.Interpretation: when using social media apps, the Internet company’s determination the user location. F.Tie to claim: Technology companies can use a user location to their benefit. G.Lead: that leads to that the user will see ads on social media
  • 4. apps, and the ads form in a user area. H.Significance: People share more of their personal information with marketers in return for services and benefits. I.Evidence: The study findings show that receiving compensation, especially when it is a monetary reward, reduces consumer expectations for privacy protection. J.Interpretation: Amazon gives a beautiful service, but the user must provide financial data, and Amazon saves it on its web- storage. K.Tie to claim: Amazon must delete user financial data after a pay. Wang, H., Lee, M. K. O., & Wang, C. (1998, March). Consumer privacy concerns about Internet marketing. Communications of the ACM, 41(3), 63+. Retrieved from https://link-galegroup- com.glacier.sou.edu/apps/doc/A20561633/AONE?u=s8391082& sid=AONE&xid=0e431019 Gabisch, J. A., & Milne, G. R. (2014). The impact of compensation on information ownership and privacy control. The Journal of Consumer Marketing, 31(1), 13-26. doi:http://dx.doi.org/10.1108/JCM-10-2013-0737 IV.Develop your Argument A.There are advantages of s online storage data, but the drawbacks are more. B.Lead: Public Workshop on Consumer Privacy on the Global Information Infrastructure. C.Significance: The risks of expanded commercial use of the Internet. D.Evidence: Commercial activity online is virtually limitless. Anyone can establish a commercial site on the Internet and become a global marketer. Therefore, The Federal Trade Commission imposed censorship on E-markets because fraud
  • 5. rate has increased. E.Interpretation: Fraud rate has increased because anyone can create a commercial site on the Internet. F.Tie to claim: A number of online stores are unlimited, so people who have not knowledge about online store policy might be lost their money. G.Lead: The innovations in electronic commerce brought about by the Internet have raised a variety of consumer privacy issues. H.Significance: Electronic regimes for protecting consumer privacy online. I.Evidence: Technological standards such as the Platform for Internet Content Selection (PICS) system is used to facilitate automatic disclosure of privacy. J.Interpretation: PICS used metadata to label webpages to control it to what user could access on the Internet. K.Tie to claim: Whatever the PICS are helpful to parents, but it has a dark side which government or Internet companies can control our lives. Public Workshop on Consumer Privacy on the Global Information Infrastructure. (1996). Staff report : Public Workshop on Consumer Privacy on the Global Information Infrastructure. Washington, D.C.]: [U.S. Federal Trade Commission, Bureau of Consumer Protection]. https://alliance- primo.hosted.exlibrisgroup.com/primo- explore/fulldisplay?docid=CP71135457430001451&context=L& vid=SOU&search_scope=sou_metasearch&tab=default_tab&lan g=en_US V.Develop your Argument or offer
  • 6. Solution A.The use of the Internet by the government to monitor users is considered a positive thing in terms of social security, but when using the Internet to intervene in matters of privacy is an information crime. B.Lead: Internet Governance and the Domain Name System C.Significance: The Internet is often described as a “network of networks” because it is not a single physical entity, but hundreds of thousands of interconnected networks linking hundreds of millions of computers around the world. D.Evidence: National governments have confessed that The Internet Corporation for Assigned Names and Numbers (ICANN) policy can control over the Internet. Therefore, governments and Internet companies are controlling over the Internet. E.Interpretation: A more limited definition would encompass the management and coordination of the technical underpinnings of the Internet—such as domain names, addresses, standards, and protocols that enable the Internet to
  • 7. function. F.Tie to claim: An organization or a company can control over the Internet. G.Lead: Internet of Things has connected to household items which make life comfortable. H.Significance: when we try to make our life better, we have to waiver about our privacy. I.Evidence: Many homes nowadays have security systems that are interconnected. The benefit of owning one of these security systems is the ability to view live video footage of a home remotely, but also might someone can view it. J.Interpretation: The IoT market from the development of standalone point solutions to complete end-to-end offerings is evolving rapidly. K.Tie to claim: Because of IoT life is easier, but the risk of it more. Kruger, L., & Library of Congress. Congressional Research Service. (2013). Internet Governance and the Domain Name System : Issues for Congress.https://alliance- primo.hosted.exlibrisgroup.com/primo- explore/fulldisplay?docid=CP71207986520001451&context=L& vid=SOU&search_scope=sou_metasearch&tab=default_tab&lan g=en_US.
  • 8. Public Workshop on Consumer Privacy on the Global Information Infrastructure. (1996). Staff report : Public Workshop on Consumer Privacy on the Global Information Infrastructure. Washington, D.C.]: [U.S. Federal Trade Commission, Bureau of Consumer Protection]. https://alliance- primo.hosted.exlibrisgroup.com/primo- explore/fulldisplay?docid=CP71135457430001451&context=L& vid=SOU&search_scope=sou_metasearch&tab=default_tab&lan g=en_US VIIOpposition and Rebuttal A.Opposition: Almost all technology companies. B.Grounds: They stopped all Hackers attack, and they did not lose user data. C.Rebut: A lot of advertisements about Internet security that means Internet security is weak because if it is high, they do not need ads. D.Lead: Marketing creates and promotes products and services customers will pay for. E.Evidence: The increase of advertisement, the use, and transfer of private data and the development of programs that allow access to personal files raise privacy concerns. F.Interpretation: Ads are often in the area where the user is
  • 9. located which means that once the net is used, the technology companies get the user location. VIII.Conclusion A.In short, the importance of this topic is crucial to user privacy on the Internet. A long time ago, this issue impacted commercial, personal, and government data. Ransomware attack and the Facebook issue made the users' the internet are scared about using the Internet while it makes life easy. Life without the Internet is difficult because This time is the technology era. USem 103A Sense of Purpose: Navigating the World FUSE: Final USem Essay Scoring Guide Argument: Is your argument focused & strong?______ /60 Claim is unique, insightful, focused Balance of logos/pathos Claim is thought-provoking, focused Claim is clear, somewhat focused Claim is broad, all fact or all opinion Scope is defined through background, defined abstract terms Scope is left quite open
  • 10. Evidence is integrated with clear frames, authority and credibility Strong links to claim Evidence is offered with some frames, some authority or credibility. Links to claim Evidence is offered but dropped in without frame, or few direct links to claim Evidence is weak or absent; no ties to claim Author drives the argument Evidence drives the argument Evidence* is strong and credible (peer-reviewed/academic sources & gov. docs dominate the foundation of the argument) Evidence is strong and credible (peer-reviewed sources used, mixed with solid news and government documents) Evidence is mostly credible Some sources light or bias without acknowledgement Sources are pulled from pop culture, websites and news Thoughtfully offers a researched-based counter-perspective and a rebuttal/research-based response Acknowledges oppositional forces and addresses them with
  • 11. opposing research Acknowledges oppositional forces and addresses them Does not thoughtfully address oppositional forces Conclusion goes beyond simply restating the argument; it enlightens, illuminates and places the claim in a broader picture Conclusion places the claim in a broader picture and encourages further thought Conclusion attempts to place the claim in a broader picture Conclusion restates argument & evidence Information Literacy: did you use credible sources and honor them?______/20 Used 3+ academic journals* Used 2+ academic journals Used 1 academic journal Used no academic journals Well-balanced and varied sources Relying on multiple different works and authors Mostly balanced and varied sources Relying on several different works and authors Somewhat balanced and varied sources Relying on a few different works and authors Unbalanced sources relying primarily on a single work or author
  • 12. All sources have MLA citations (direct quotes, paraphrases, images) Inconsistent in-text citations Writer provides strong, credible evidence to support the claim Writer provides credible evidence to support the claim Writer provides evidence to support the claim but credibility varies evidence does not directly support the claim OR offers suspicious evidence Academic Writing Techniques: Is your writing assertive, confident and authoritative? Did you consciously consider your reader? Are your sources strong?(0-2 points each)______ / 20 _____ Complex ideas sheds new light on the topic _____ Organization is clear, purposeful, and logically supports the overall argument _____ Transitions between ideas & paragraphs are deliberate, meaningful and help guide the reader _____ Evidence is offered with sophisticated frames for understanding
  • 13. _____ Tone conveys confidence and authority (including credibility/credos, vocabulary, fluency, rhythm and effective punctuation) _____ Academic voice is sophisticated, precise and aware of the discourse community (no “I” or “you”; no jargon, & abstract words are defined) _____ Powerful & effective vocabulary choices _____ Accurate conventions of standard written English; few, if any, distractions Word Count: 1500-1750: ______