Caroline Cabral
USEM 102
Professor Schacht
December 10, 2015
1
Working Claim: Although weak privacy on the Internet is in the interest of technology companies, it is detrimental to the user both financially and personally.
Now go back up to your claim and highlight the fact in yellow and the opinion in blue.
Read through the outline, then replace the orange text with your answers (in black, please).
Terms and Concepts:(Minimum 4)
1. Globalization is a global phenomenon that seeks to promote the integration of a range of financial, commercial, economic, political and other spheres.
2.
3. Encryption is the process of converting information or data into code, especially to prevent unauthorized access.
4. Privacy is a personal right to keep personal information matters and relationships secret.
5. Computer programming is the process of designing and building an executable computer program for accomplishing a specific computing task.
Jargon: (depends on area of research)
1. Cybersecurity is the practice of defending computers, servers, mobile devices, electronic systems, networks, and data from malicious attacks.
2. A data governance policy is a documented set of guidelines for ensuring the proper management of an organization digital information.
3. A security hacker is someone who seeks to breach defenses and exploit weaknesses in a computer system or network.
4. IOT is the Internet of things that refer to the concept of extending Internet connectivity beyond conventional computing platforms such as personal computers and mobile devices, and into any range of traditionally or non-internet-enabled physical devices and everyday objects.
Argumentative Researched-Essay Outline
I.Introductory Paragraph
A.Hook: Technology has provided us with more communication access to knowledge at our fingertips. Technology has overall made life more comfortable, but it has made things a lot less private.
B.Transition: That results in us having to be extra careful when using the internet.
C.Lead: In the last few years, a lot of privacy issues shown on the news like a Facebook issue, and WannaCry ransomware attack.
D.Claim: : Although weak privacy on the Internet is in the interest of technology companies, it is detrimental to the user both financially and personally
E.Consider the audience: Internet security is essential to protect privacy, protect data from viruses that could destroy a piece of technology.
II.Background:
At this time, the Internet has become a tremendous electronic gateway that provides instant access to global news and information. The world is becoming digitized, interconnected, and functional. The databases, documents, files, and programs that are on Internet computers contain a tremendous amount of data. Once the search for something, the result becomes on the hand. However, there is no reason why those conveniences have to come at the cost of giving up privacy inevitably. There are several potential risks associated .
1. Caroline Cabral
USEM 102
Professor Schacht
December 10, 2015
1
Working Claim: Although weak privacy on the Internet is in the
interest of technology companies, it is detrimental to the user
both financially and personally.
Now go back up to your claim and highlight the fact in yellow
and the opinion in blue.
Read through the outline, then replace the orange text with your
answers (in black, please).
Terms and Concepts:(Minimum 4)
1. Globalization is a global phenomenon that seeks to promote
the integration of a range of financial, commercial, economic,
political and other spheres.
2.
3. Encryption is the process of converting information or data
into code, especially to prevent unauthorized access.
4. Privacy is a personal right to keep personal information
matters and relationships secret.
5. Computer programming is the process of designing and
building an executable computer program for accomplishing a
specific computing task.
2. Jargon: (depends on area of research)
1. Cybersecurity is the practice of defending computers, servers,
mobile devices, electronic systems, networks, and data from
malicious attacks.
2. A data governance policy is a documented set of guidelines
for ensuring the proper management of an organization digital
information.
3. A security hacker is someone who seeks to breach defenses
and exploit weaknesses in a computer system or network.
4. IOT is the Internet of things that refer to the concept of
extending Internet connectivity beyond conventional computing
platforms such as personal computers and mobile devices, and
into any range of traditionally or non-internet-enabled physical
devices and everyday objects.
Argumentative Researched-Essay Outline
I.Introductory Paragraph
A.Hook: Technology has provided us with more communication
access to knowledge at our fingertips. Technology has overall
made life more comfortable, but it has made things a lot less
private.
B.Transition: That results in us having to be extra careful when
using the internet.
C.Lead: In the last few years, a lot of privacy issues shown on
the news like a Facebook issue, and WannaCry ransomware
attack.
D.Claim: : Although weak privacy on the Internet is in the
interest of technology companies, it is detrimental to the user
both financially and personally
E.Consider the audience: Internet security is essential to
3. protect privacy, protect data from viruses that could destroy a
piece of technology.
II.Background:
At this time, the Internet has become a tremendous electronic
gateway that provides instant access to global news and
information. The world is becoming digitized, interconnected,
and functional. The databases, documents, files, and programs
that are on Internet computers contain a tremendous amount of
data. Once the search for something, the result becomes on the
hand. However, there is no reason why those conveniences have
to come at the cost of giving up privacy inevitably. There are
several potential risks associated with the use of the Internet.
Hacking had become active in this era, so it is impossible to
secure data on the Internet, but if technology companies do save
user data in their storage, it might reduce the leakage of data.
III.Introduce your Argument
A. The security on the Internet is weak. Therefore, network
security needs to be high on technology companies list of
considerations.
B.Lead: Communications of the ACM
C.Significance: A lot of programs allow accessing personal
files. Facebook gave some companies more extensive access to
users’ personal Facebook data.
D.Evidence: Almost all programs ask to access to user data to
give a user the right to use the programs. Most of the users the
Internet give right for applications to access their data and that
leads to leaks user’s information on the Web.
E.Interpretation: when using social media apps, the Internet
company’s determination the user location.
F.Tie to claim: Technology companies can use a user location
to their benefit.
G.Lead: that leads to that the user will see ads on social media
4. apps, and the ads form in a user area.
H.Significance: People share more of their personal
information with marketers in return for services and benefits.
I.Evidence: The study findings show that receiving
compensation, especially when it is a monetary reward, reduces
consumer expectations for privacy protection.
J.Interpretation: Amazon gives a beautiful service, but the user
must provide financial data, and Amazon saves it on its web-
storage.
K.Tie to claim: Amazon must delete user financial data after a
pay.
Wang, H., Lee, M. K. O., & Wang, C. (1998, March). Consumer
privacy concerns about Internet marketing. Communications of
the ACM, 41(3), 63+. Retrieved from https://link-galegroup-
com.glacier.sou.edu/apps/doc/A20561633/AONE?u=s8391082&
sid=AONE&xid=0e431019
Gabisch, J. A., & Milne, G. R. (2014). The impact of
compensation on information ownership and privacy
control. The Journal of Consumer Marketing, 31(1), 13-26.
doi:http://dx.doi.org/10.1108/JCM-10-2013-0737
IV.Develop your Argument
A.There are advantages of s online storage data, but the
drawbacks are more.
B.Lead: Public Workshop on Consumer Privacy on the Global
Information Infrastructure.
C.Significance: The risks of expanded commercial use of the
Internet.
D.Evidence: Commercial activity online is virtually limitless.
Anyone can establish a commercial site on the Internet and
become a global marketer. Therefore, The Federal Trade
Commission imposed censorship on E-markets because fraud
5. rate has increased.
E.Interpretation: Fraud rate has increased because anyone can
create a commercial site on the Internet.
F.Tie to claim: A number of online stores are unlimited, so
people who have not knowledge about online store policy might
be lost their money.
G.Lead: The innovations in electronic commerce brought about
by the Internet have raised a variety of consumer privacy issues.
H.Significance: Electronic regimes for protecting consumer
privacy online.
I.Evidence: Technological standards such as the Platform for
Internet Content Selection (PICS) system is used to facilitate
automatic disclosure of privacy.
J.Interpretation: PICS used metadata to label webpages to
control it to what user could access on the Internet.
K.Tie to claim: Whatever the PICS are helpful to parents, but it
has a dark side which government or Internet companies can
control our lives.
Public Workshop on Consumer Privacy on the Global
Information Infrastructure. (1996). Staff report : Public
Workshop on Consumer Privacy on the Global Information
Infrastructure. Washington, D.C.]: [U.S. Federal Trade
Commission, Bureau of Consumer Protection]. https://alliance-
primo.hosted.exlibrisgroup.com/primo-
explore/fulldisplay?docid=CP71135457430001451&context=L&
vid=SOU&search_scope=sou_metasearch&tab=default_tab&lan
g=en_US
V.Develop your Argument or offer
6. Solution
A.The use of the Internet by the government to monitor users is
considered a positive thing in terms of social security, but when
using the Internet to intervene in matters of privacy is an
information crime.
B.Lead: Internet Governance and the Domain Name System
C.Significance: The Internet is often described as a “network of
networks” because it is not a single physical entity, but
hundreds of thousands of interconnected networks linking
hundreds of millions of
computers around the world.
D.Evidence: National governments have confessed that The
Internet Corporation for Assigned Names and Numbers
(ICANN) policy can control over the Internet. Therefore,
governments and Internet companies are controlling over the
Internet.
E.Interpretation: A more limited definition would encompass
the management and coordination of the technical
underpinnings of the Internet—such as domain names,
addresses, standards, and protocols that enable the Internet to
7. function.
F.Tie to claim: An organization or a company can control over
the Internet.
G.Lead: Internet of Things has connected to household items
which make life comfortable.
H.Significance: when we try to make our life better, we have to
waiver about our privacy.
I.Evidence: Many homes nowadays have security systems that
are interconnected. The benefit of owning one of these security
systems is the ability to view live video footage of a home
remotely, but also might someone can view it.
J.Interpretation: The IoT market from the development of
standalone point solutions to complete end-to-end offerings is
evolving rapidly.
K.Tie to claim: Because of IoT life is easier, but the risk of it
more.
Kruger, L., & Library of Congress. Congressional Research
Service. (2013). Internet Governance and the Domain Name
System : Issues for Congress.https://alliance-
primo.hosted.exlibrisgroup.com/primo-
explore/fulldisplay?docid=CP71207986520001451&context=L&
vid=SOU&search_scope=sou_metasearch&tab=default_tab&lan
g=en_US.
8. Public Workshop on Consumer Privacy on the Global
Information Infrastructure. (1996). Staff report : Public
Workshop on Consumer Privacy on the Global Information
Infrastructure. Washington, D.C.]: [U.S. Federal Trade
Commission, Bureau of Consumer Protection]. https://alliance-
primo.hosted.exlibrisgroup.com/primo-
explore/fulldisplay?docid=CP71135457430001451&context=L&
vid=SOU&search_scope=sou_metasearch&tab=default_tab&lan
g=en_US
VIIOpposition and Rebuttal
A.Opposition: Almost all technology companies.
B.Grounds: They stopped all Hackers attack, and they did not
lose user data.
C.Rebut: A lot of advertisements about Internet security that
means Internet security is weak because if it is high, they do not
need ads.
D.Lead: Marketing creates and promotes products and services
customers will pay for.
E.Evidence: The increase of advertisement, the use, and transfer
of private data and the development of programs that allow
access to personal files raise privacy concerns.
F.Interpretation: Ads are often in the area where the user is
9. located which means that once the net is used, the technology
companies get the user location.
VIII.Conclusion
A.In short, the importance of this topic is crucial to user
privacy on the Internet. A long time ago, this issue impacted
commercial, personal, and government data. Ransomware attack
and the Facebook issue made the users' the internet are scared
about using the Internet while it makes life easy. Life without
the Internet is difficult because This time is the technology era.
USem 103A Sense of Purpose: Navigating the World
FUSE: Final USem Essay Scoring Guide
Argument: Is your argument focused & strong?______ /60
Claim is unique, insightful, focused
Balance of logos/pathos
Claim is thought-provoking, focused
Claim is clear, somewhat focused
Claim is broad,
all fact or all opinion
Scope is defined through background, defined abstract terms
Scope is left quite open
10. Evidence is integrated with clear frames, authority and
credibility
Strong links to claim
Evidence is offered with some frames, some authority or
credibility.
Links to claim
Evidence is offered but dropped in without frame, or few direct
links to claim
Evidence is weak or absent; no ties to claim
Author drives the argument
Evidence drives the argument
Evidence* is strong and credible (peer-reviewed/academic
sources & gov. docs dominate the foundation of the argument)
Evidence is strong and credible (peer-reviewed sources used,
mixed with solid news and government documents)
Evidence is mostly credible
Some sources light or bias without acknowledgement
Sources are pulled from pop culture, websites and news
Thoughtfully offers a researched-based counter-perspective and
a rebuttal/research-based response
Acknowledges oppositional forces and addresses them with
11. opposing research
Acknowledges oppositional forces and addresses them
Does not thoughtfully address oppositional forces
Conclusion goes beyond simply restating the argument; it
enlightens, illuminates and places the claim in a broader picture
Conclusion places the claim in a broader picture and encourages
further thought
Conclusion attempts to place the claim in a broader picture
Conclusion restates argument & evidence
Information Literacy: did you use credible sources and honor
them?______/20
Used 3+ academic journals*
Used 2+ academic journals
Used 1 academic journal
Used no academic journals
Well-balanced and varied sources
Relying on multiple different works and authors
Mostly balanced and varied sources
Relying on several different works and authors
Somewhat balanced and varied sources
Relying on a few different works and authors
Unbalanced sources
relying primarily on a single work or author
12. All sources have MLA citations (direct quotes, paraphrases,
images)
Inconsistent in-text citations
Writer provides strong, credible evidence to support the claim
Writer provides credible evidence to support the claim
Writer provides evidence to support the claim but credibility
varies
evidence does not directly support the claim OR offers
suspicious evidence
Academic Writing Techniques: Is your writing assertive,
confident and authoritative? Did you consciously consider your
reader? Are your sources strong?(0-2 points each)______ / 20
_____ Complex ideas sheds new light on the topic
_____ Organization is clear, purposeful, and logically supports
the overall argument
_____ Transitions between ideas & paragraphs are deliberate,
meaningful and help guide the reader
_____ Evidence is offered with sophisticated frames for
understanding
13. _____ Tone conveys confidence and authority (including
credibility/credos, vocabulary, fluency, rhythm and effective
punctuation)
_____ Academic voice is sophisticated, precise and aware of the
discourse community (no “I” or “you”; no jargon, &
abstract words are defined)
_____ Powerful & effective vocabulary choices
_____ Accurate conventions of standard written English; few, if
any, distractions
Word Count: 1500-1750: ______