SlideShare a Scribd company logo
1 of 9
2
Anonymous Comment by Amolsch, Rianna: Correct MLA
heading
ENGL 1190—Amolsch
Rhetorical Analysis
9/28/15
Pirating Democracy Comment by Amolsch, Rianna: Unique title
that hints at the overall topic
Democracy is being boarded by pirates and taken back to
ancient Greece, and those pirates are using technology to do so.
These are not Jack Sparrow type pirates, but rather political
parties who are using the age of the internet to create open-
source democracy. Open-source democracy is essentially direct
democracy that is all run through the convenience of your
smartphone; it is voting directly on legislation through the
channel of technology. These grassroots populist movements
have started a very deliberate revolution that is slowly changing
the way democracy operates in the modern world. Cole Edick,
an author for the Harvard International Review, serves as an
advocate for pirate parties by providing many examples of
different pirates around the world, offering up reasons why the
parties are not reaching wider audiences, and explaining the
implications of a return to direct democracy via the internet.
While Edick presents a multitude of facts and thought-
provoking assertions, his central argument is rendered impotent
by his hazy sense of purpose. Comment by Amolsch, Rianna:
Up to this point, student has introduced general topic/issue in
his own words. Comment by Amolsch, Rianna: Here, the student
transitions to introduce the article and author to his readers.
Comment by Amolsch, Rianna: Student summarizes the
author’s overall argument. Comment by Amolsch, Rianna:
Student writes a thesis that evaluates the author’s argument.
In his article, “The golden age of piracy: can open-source
democracy redefine citizenship for the internet age?” Cole
Edick asserts that while pirate parties are making enough gains
in the international political realm to be noticed, their platforms
for organizing are not attractive enough to users. Edick
illustrates the different practices of pirates by using the
examples of the Pirate Parties in Iceland and Germany, the Net
Party in Argentina, and the Podemas Party in Spain. Edick
argues that one of the most resounding qualities of the pirate
parties is that “pirates boast a unique modal of political
organizing and decision-making...” This modal being
crowdsourcing, the opening up of issues online for the masses
to deliberate on. Edick contrasts the systems of LiquidFeedback
in Germany to that of DemocracyOS in Argentina; they are both
tools to organize meetings, propose votes, and vote on
legislation online. Edick argues that DemocracyOS should be
the tool that launches all of open-source democracy into the
mainstream because it is more user-friendly. Edick believes this
is exactly what open-source democracy needs, an attractive
platform like DemocracyOS but with a large and energetic
political party. With a platform like DemocracyOS, the world
could return to direct democracy by allowing people to express
their political views with no major time consumption to their
daily lives. Edick lastly stresses the dangers of this implication
arguing that “the open-source revolution may end up pirating
not from the establishment, but from the already
disenfranchised,” meaning that those who currently have a
difficult time making their voice heard would continue to be
silenced. Comment by Amolsch, Rianna: This whole paragraph
summarizes the article. Notice how the student uses the author’s
name throughout the paragraph to make it clear that he is
talking about the author’s text/ideas.
Edick crafts an argument that is overflowing with evidence
and research making it highly informative for the reader,
however; the purpose is often lost in the landslide of facts.
Edick is attempting to achieve multiple purposes: inform about
pirate parties and the platforms they use to operate, discuss the
implications of an open-source revolution, explain why such a
revolution cannot be stopped, but also argue for why the world
should not want one. This muddled purpose makes the argument
tremendously ineffective, making it challenging for readers to
identify Edick’s claim. However, the most effective part of
Edick’s argument is how he contrasts the platform of
LiquidFeedback with that of DemocracyOS by presenting solid
evidence on both, effectively proving why DemocracyOS is a
necessity in the new direct democracy revolution. Comment by
Amolsch, Rianna [2]: The student makes an assertion about the
argument being made: there is plenty of evidence, but a lack of
purpose.
The strongest facet of Edick’s argument is the approach
that is used to reach the intended audience. The topic of pirate
parties is very broad and has a conversation on the international
stage of politics; by publishing this article in the Harvard
International Review the article has the ability to reach a wide
audience across the world. In stark contrast to Edick reaching
his intended audience, the style and tone of the article make it a
very difficult read. Edick puts the language into easy to
understand terms but often repeats himself in multiple
paragraphs due to a lack of organization of the argument. Edick
quickly jumps between different topics and pirate parties,
leaving him with over-saturated paragraphs that begin to feel
repetitive and often contain irrelevant information that is not
necessary to the claim. Comment by Amolsch, Rianna [2]:
The student continues to evaluate the argument by identifying a
strength in the article.
The most glaring problem with Edick’s article is the
omission of opposition and rebuttal. Edick did not address any
opposition to pirate parties, except for briefly mentioning how
mainstream politics has rejected much of their ideals. This
makes his argument completely one-sided and hallows out his
already convoluted claim. Edick does however deliberate the
problems that he foresees an open-source revolution creating in
a very confusing stream of consciousness paragraph filled with
mostly questions. At this point in his argument Edick has lost
the majority of his credibility by omitting the opposition and
having a rebuttal session with only himself. This approach
leaves the reader wanting to seek out more information on the
topic, not because of a sparked interest but rather because it is
undeniable that certain information is simply not there.
Comment by Amolsch, Rianna [2]: Again, the student is
evaluating the argumentative strategies being used in the article,
and explaining the reasoning for his evaluations.
While Edick’s argument falters in certain areas, his does
bring about many important and interesting points about the
future of democracy. The most thought provoking point that
Edick brings to light is the implication that an open-source
revolution could lead contemporary citizens to a democracy
with the governance of ancient Greece without being a slave-
owning society. This is because citizens in ancient Greece had
slaves perform all of the daily tasks in order for them to be able
to participate in their hands-on direct democracy. The advent of
technology has oddly enough made that practice out of date, but
at the same time, has made it possible to have a direct
democracy once again in a vastly unique way. Technology is a
crucial player in the game of the pirates, and there are even
connections to the issue of net neutrality in the United States. In
order for a pirate party to form in the United States, net
neutrality has to be present. Parties that thrive on an open
platform and the accessibility of the internet would never be
possible if the internet is not a fair and equal playing field.
Comment by Amolsch, Rianna [2]: More evaluation of the
argument being made in the article. Notice how the student
supports his assertions with explanations and references to the
article.
The grassroots movement of the pirate parties has been
making a foothold in countries across the globe. The topic of
pirate parties is one small part of a much larger occurrence, the
people of democracies are ready to embrace a new type of
government, and that new type of government is an updated
form of the original direct democracy that is iconic to ancient
Greece. Technology will be directly tied with an open-source
revolution, and the issue of net neutrality in the United States
could be the deciding factor for the future of pirate parties.
There is no way for this democratic revolution to occur without
pirate parties in the United States; the inclusion of the United
States in the pirate party revolution due to permanently fortified
net neutrality rules will be the catalyst that sparks the whole
reaction. The ship of democracy has been boarded by pirates
and that ship is being taken around the world as direct
democracy. Comment by Amolsch, Rianna [2]: The
conclusion begins without overtly announcing it with a phrase
like “In conclusion.” Comment by Amolsch, Rianna [2]:
Conclusion looks to the future and predicts how the topic might
evolve in the future.
Work Cited Comment by Amolsch, Rianna [2]: Work Cited
(“Work” because there is only one source) aligns perfectly with
MLA formatting.
Edick, Cole. "The golden age of piracy: can open-source
democracy redefine citizenship for the internet age?" Harvard
International Review 36.4 (2015): 7+. Opposing Viewpoints in
Context. Web. 21 Sept. 2015.
Rhetorical Analysis Essay
What is a Rhetorical Analysis?
To begin, let us define what a rhetorical analysis is NOT. A
rhetorical analysis is not merely a summary of a scholarly
article. Instead, a rhetorical analysis requires you to apply your
critical reading skills in order to “break down” a text. In
essence, you break off the “parts” from the “whole” of the piece
you’re analyzing. The goal of a rhetorical analysis is to
articulate HOW the author writes, rather than WHAT they
actually wrote. To do this, you will analyze the rhetorical
strategies the author uses to achieve his or her goal or purpose
of writing their piece. You will also determine whether or not
those strategies were effective and why.
The overall purpose of this paper is to show your analysis and
evaluation of an author’s ideas and writing strategies. Choose
ONE text that has an issue/controversy worthy of academic
attention at the center of it. Provide an explanation of the issue
and a detailed summary of the article early on to orient your
reader, but the majority of the paper should focus on an in-
depth rhetorical analysis, which should include your judgment
about whether or not the article's argument was effective, as
well as your own responses to the writer’s claims.
Considerations for Reading
1. What is the thesis, what is the overall argument the author
presents?
2. What did the author choose to study? Why?
3. What is the writer’s purpose? To inform? To persuade? To
criticize?
4. Who is the author’s intended audience?
5. How does the writer arrange his or her ideas?
Chronologically?
6. How does the writer use diction? (Word choice, arrangement,
accuracy, is it formal, informal? Technical versus slang?)
7. Does the writer use dialogue? Quotations? Why?
8. Are important terms repeated?
9. What is the sentence structure of text? Are there fragments,
run ons? Is it declarative, imperative, exclamatory? What effect
does this have?
10. Does the writer use punctuation to create an effect? Italics,
underlining, parentheses? Which marks does the writer use, and
when?
Considerations for Writing
So, you’ve analyzed your article, answered the questions above,
and identified the rhetorical strategies the author uses. Now
what?
1. First, you’ll need to come up with your own thesis for your
rhetorical analysis. What point do you want to make about the
author’s rhetorical choices? Do the author’s rhetorical strategies
make his/her article a strong argument? A weak one?
2. After identifying your thesis, try to arrange the rhetorical
strategies you’ve identified in a logical way. For example, you
could start by identifying the purpose of the intended audience
and why the author chose to write about their topic. Next, you
could identify specific stylistic choices, such as word choice,
formal/informal language, etc. The idea is to logically transition
from analyzing one rhetorical strategy to another. Stay on topic
with the strategies that the author uses often and actually has a
purpose for using.
3. With each point you make, have a strong topic sentence
declaring the overall purpose of the rhetorical strategies you are
about to discuss. This will help identify the argument you are
making, transition your ideas, and add fluidity.
4. Keep in mind that while authors use different strategies to
achieve their purposes, you also need to be making points and
evaluations about these strategies, not simply summarizing
them. For example, instead of simply stating the author uses
formal language in his essay, state what effect is created by
using formal language. By doing this you are not only
identifying the rhetorical strategy, by analyzing its purpose.
5. As with all academic writing, check for grammar, transitional
ease, fluidity, and a logical argument. Proofread, proofread,
proofread!
A Successful Rhetorical Analysis Essay
· Provides a concise and accurate summary of the article early
on to orient reader
· Has a thesis that makes an evaluative judgment about
the effectiveness of the author’s argument
· Offers strong support for its thesis by using specific details
and critical analysis of how the author effectively or
ineffectively supports his or her argument
· Uses analytical tools appropriate to the argument he or she is
evaluating
· Paraphrases and integrates quotations from the article
effectively, smoothly, and ethically through appropriate signal
phrases and parenthetical citations in MLA style
· Uses third-person voice to analyze the article, not first- or
second-person voices
2AnonymousComment by Amolsch, Rianna Correct MLA headingEN.docx

More Related Content

Similar to 2AnonymousComment by Amolsch, Rianna Correct MLA headingEN.docx

Rules For Essay Writing.pdf
Rules For Essay Writing.pdfRules For Essay Writing.pdf
Rules For Essay Writing.pdfCarrie Brooks
 
Social Media as a political voice in many societies
Social Media as a political voice in many societiesSocial Media as a political voice in many societies
Social Media as a political voice in many societiesOrlando Zambrano Romero
 
Offline Activism - How successful activism facilitate social media
Offline Activism - How successful activism facilitate social mediaOffline Activism - How successful activism facilitate social media
Offline Activism - How successful activism facilitate social mediaWilson Fung
 
Lovink, Not Working Dutch Article
Lovink, Not Working Dutch ArticleLovink, Not Working Dutch Article
Lovink, Not Working Dutch Articletedperl
 
Do Artifacts Have PoliticsAuthor(s) Langdon WinnerS.docx
 Do Artifacts Have PoliticsAuthor(s) Langdon WinnerS.docx Do Artifacts Have PoliticsAuthor(s) Langdon WinnerS.docx
Do Artifacts Have PoliticsAuthor(s) Langdon WinnerS.docxaryan532920
 
Do artifacts have politics author(s) langdon winnersou
 Do artifacts have politics author(s) langdon winnersou Do artifacts have politics author(s) langdon winnersou
Do artifacts have politics author(s) langdon winnersouVivan17
 
Thesis Statement Anchor Chart - Ho. Online assignment writing service.
Thesis Statement Anchor Chart - Ho. Online assignment writing service.Thesis Statement Anchor Chart - Ho. Online assignment writing service.
Thesis Statement Anchor Chart - Ho. Online assignment writing service.Joyce Williams
 
Extreme Democracy: Strategy
Extreme Democracy: StrategyExtreme Democracy: Strategy
Extreme Democracy: StrategyPaul Schumann
 
Democracy - an operating system for the people
Democracy - an operating system for the peopleDemocracy - an operating system for the people
Democracy - an operating system for the peopleHåkon Skramstad
 
Extreme Democracy: Politics And Networks
Extreme Democracy: Politics And NetworksExtreme Democracy: Politics And Networks
Extreme Democracy: Politics And NetworksPaul Schumann
 
Richard Wright Essay.pdf
Richard Wright Essay.pdfRichard Wright Essay.pdf
Richard Wright Essay.pdfAndrea Santiago
 
Richard Wright Essay.pdf
Richard Wright Essay.pdfRichard Wright Essay.pdf
Richard Wright Essay.pdfHeather Lopez
 

Similar to 2AnonymousComment by Amolsch, Rianna Correct MLA headingEN.docx (15)

Rules For Essay Writing.pdf
Rules For Essay Writing.pdfRules For Essay Writing.pdf
Rules For Essay Writing.pdf
 
Social Media as a political voice in many societies
Social Media as a political voice in many societiesSocial Media as a political voice in many societies
Social Media as a political voice in many societies
 
Offline Activism - How successful activism facilitate social media
Offline Activism - How successful activism facilitate social mediaOffline Activism - How successful activism facilitate social media
Offline Activism - How successful activism facilitate social media
 
We media sample essay
We media sample essayWe media sample essay
We media sample essay
 
Lovink, Not Working Dutch Article
Lovink, Not Working Dutch ArticleLovink, Not Working Dutch Article
Lovink, Not Working Dutch Article
 
Do Artifacts Have PoliticsAuthor(s) Langdon WinnerS.docx
 Do Artifacts Have PoliticsAuthor(s) Langdon WinnerS.docx Do Artifacts Have PoliticsAuthor(s) Langdon WinnerS.docx
Do Artifacts Have PoliticsAuthor(s) Langdon WinnerS.docx
 
Clay shirky
Clay shirkyClay shirky
Clay shirky
 
Revision notes
Revision notesRevision notes
Revision notes
 
Do artifacts have politics author(s) langdon winnersou
 Do artifacts have politics author(s) langdon winnersou Do artifacts have politics author(s) langdon winnersou
Do artifacts have politics author(s) langdon winnersou
 
Thesis Statement Anchor Chart - Ho. Online assignment writing service.
Thesis Statement Anchor Chart - Ho. Online assignment writing service.Thesis Statement Anchor Chart - Ho. Online assignment writing service.
Thesis Statement Anchor Chart - Ho. Online assignment writing service.
 
Extreme Democracy: Strategy
Extreme Democracy: StrategyExtreme Democracy: Strategy
Extreme Democracy: Strategy
 
Democracy - an operating system for the people
Democracy - an operating system for the peopleDemocracy - an operating system for the people
Democracy - an operating system for the people
 
Extreme Democracy: Politics And Networks
Extreme Democracy: Politics And NetworksExtreme Democracy: Politics And Networks
Extreme Democracy: Politics And Networks
 
Richard Wright Essay.pdf
Richard Wright Essay.pdfRichard Wright Essay.pdf
Richard Wright Essay.pdf
 
Richard Wright Essay.pdf
Richard Wright Essay.pdfRichard Wright Essay.pdf
Richard Wright Essay.pdf
 

More from rhetttrevannion

Discuss three (3) ways that large organizations are increasingly eng.docx
Discuss three (3) ways that large organizations are increasingly eng.docxDiscuss three (3) ways that large organizations are increasingly eng.docx
Discuss three (3) ways that large organizations are increasingly eng.docxrhetttrevannion
 
Discuss this week’s objectives with your team sharing related rese.docx
Discuss this week’s objectives with your team sharing related rese.docxDiscuss this week’s objectives with your team sharing related rese.docx
Discuss this week’s objectives with your team sharing related rese.docxrhetttrevannion
 
Discuss theoretical considerations or assumptions relevant to yo.docx
Discuss theoretical considerations or assumptions relevant to yo.docxDiscuss theoretical considerations or assumptions relevant to yo.docx
Discuss theoretical considerations or assumptions relevant to yo.docxrhetttrevannion
 
Discuss theprinciple events of PROCESS AND THREAD used in both t.docx
Discuss theprinciple events of PROCESS AND THREAD used in both t.docxDiscuss theprinciple events of PROCESS AND THREAD used in both t.docx
Discuss theprinciple events of PROCESS AND THREAD used in both t.docxrhetttrevannion
 
Discuss the Windows Registry System Hive1) What information.docx
Discuss the Windows Registry System Hive1) What information.docxDiscuss the Windows Registry System Hive1) What information.docx
Discuss the Windows Registry System Hive1) What information.docxrhetttrevannion
 
Discuss the way the idea of heroism develops from Gilgamesh th.docx
Discuss the way the idea of heroism develops from Gilgamesh th.docxDiscuss the way the idea of heroism develops from Gilgamesh th.docx
Discuss the way the idea of heroism develops from Gilgamesh th.docxrhetttrevannion
 
Discuss the ways in which the history of the U.S. was presented in t.docx
Discuss the ways in which the history of the U.S. was presented in t.docxDiscuss the ways in which the history of the U.S. was presented in t.docx
Discuss the ways in which the history of the U.S. was presented in t.docxrhetttrevannion
 
Discuss the value of Lean Systems Engineering to systems develop.docx
Discuss the value of Lean Systems Engineering to systems develop.docxDiscuss the value of Lean Systems Engineering to systems develop.docx
Discuss the value of Lean Systems Engineering to systems develop.docxrhetttrevannion
 
discuss the various pathways interest groups use to influence politi.docx
discuss the various pathways interest groups use to influence politi.docxdiscuss the various pathways interest groups use to influence politi.docx
discuss the various pathways interest groups use to influence politi.docxrhetttrevannion
 
Discuss the various tools and techniques used by an HCO to incre.docx
Discuss the various tools and techniques used by an HCO to incre.docxDiscuss the various tools and techniques used by an HCO to incre.docx
Discuss the various tools and techniques used by an HCO to incre.docxrhetttrevannion
 
Discuss the various means by which slaves resisted the slave system..docx
Discuss the various means by which slaves resisted the slave system..docxDiscuss the various means by which slaves resisted the slave system..docx
Discuss the various means by which slaves resisted the slave system..docxrhetttrevannion
 
Discuss the typica l clinical presentation of the diagnosis , Hip Os.docx
Discuss the typica l clinical presentation of the diagnosis , Hip Os.docxDiscuss the typica l clinical presentation of the diagnosis , Hip Os.docx
Discuss the typica l clinical presentation of the diagnosis , Hip Os.docxrhetttrevannion
 
Discuss the types of resources, tools, and methods that are availabl.docx
Discuss the types of resources, tools, and methods that are availabl.docxDiscuss the types of resources, tools, and methods that are availabl.docx
Discuss the types of resources, tools, and methods that are availabl.docxrhetttrevannion
 
Discuss the types of items that should be examined in a firewall log.docx
Discuss the types of items that should be examined in a firewall log.docxDiscuss the types of items that should be examined in a firewall log.docx
Discuss the types of items that should be examined in a firewall log.docxrhetttrevannion
 
Discuss the types of property, providing an example of each an.docx
Discuss the types of property, providing an example of each an.docxDiscuss the types of property, providing an example of each an.docx
Discuss the types of property, providing an example of each an.docxrhetttrevannion
 
Discuss the type of personality it takes to become a police officer..docx
Discuss the type of personality it takes to become a police officer..docxDiscuss the type of personality it takes to become a police officer..docx
Discuss the type of personality it takes to become a police officer..docxrhetttrevannion
 
Discuss the two major sources of crime statistics for the United Sta.docx
Discuss the two major sources of crime statistics for the United Sta.docxDiscuss the two major sources of crime statistics for the United Sta.docx
Discuss the two major sources of crime statistics for the United Sta.docxrhetttrevannion
 
Discuss the two most prominent theories related to the stage of adul.docx
Discuss the two most prominent theories related to the stage of adul.docxDiscuss the two most prominent theories related to the stage of adul.docx
Discuss the two most prominent theories related to the stage of adul.docxrhetttrevannion
 
Discuss the two elements required for the consent defense. In ad.docx
Discuss the two elements required for the consent defense. In ad.docxDiscuss the two elements required for the consent defense. In ad.docx
Discuss the two elements required for the consent defense. In ad.docxrhetttrevannion
 
Discuss the Truth in Lending Act and what role it places in financia.docx
Discuss the Truth in Lending Act and what role it places in financia.docxDiscuss the Truth in Lending Act and what role it places in financia.docx
Discuss the Truth in Lending Act and what role it places in financia.docxrhetttrevannion
 

More from rhetttrevannion (20)

Discuss three (3) ways that large organizations are increasingly eng.docx
Discuss three (3) ways that large organizations are increasingly eng.docxDiscuss three (3) ways that large organizations are increasingly eng.docx
Discuss three (3) ways that large organizations are increasingly eng.docx
 
Discuss this week’s objectives with your team sharing related rese.docx
Discuss this week’s objectives with your team sharing related rese.docxDiscuss this week’s objectives with your team sharing related rese.docx
Discuss this week’s objectives with your team sharing related rese.docx
 
Discuss theoretical considerations or assumptions relevant to yo.docx
Discuss theoretical considerations or assumptions relevant to yo.docxDiscuss theoretical considerations or assumptions relevant to yo.docx
Discuss theoretical considerations or assumptions relevant to yo.docx
 
Discuss theprinciple events of PROCESS AND THREAD used in both t.docx
Discuss theprinciple events of PROCESS AND THREAD used in both t.docxDiscuss theprinciple events of PROCESS AND THREAD used in both t.docx
Discuss theprinciple events of PROCESS AND THREAD used in both t.docx
 
Discuss the Windows Registry System Hive1) What information.docx
Discuss the Windows Registry System Hive1) What information.docxDiscuss the Windows Registry System Hive1) What information.docx
Discuss the Windows Registry System Hive1) What information.docx
 
Discuss the way the idea of heroism develops from Gilgamesh th.docx
Discuss the way the idea of heroism develops from Gilgamesh th.docxDiscuss the way the idea of heroism develops from Gilgamesh th.docx
Discuss the way the idea of heroism develops from Gilgamesh th.docx
 
Discuss the ways in which the history of the U.S. was presented in t.docx
Discuss the ways in which the history of the U.S. was presented in t.docxDiscuss the ways in which the history of the U.S. was presented in t.docx
Discuss the ways in which the history of the U.S. was presented in t.docx
 
Discuss the value of Lean Systems Engineering to systems develop.docx
Discuss the value of Lean Systems Engineering to systems develop.docxDiscuss the value of Lean Systems Engineering to systems develop.docx
Discuss the value of Lean Systems Engineering to systems develop.docx
 
discuss the various pathways interest groups use to influence politi.docx
discuss the various pathways interest groups use to influence politi.docxdiscuss the various pathways interest groups use to influence politi.docx
discuss the various pathways interest groups use to influence politi.docx
 
Discuss the various tools and techniques used by an HCO to incre.docx
Discuss the various tools and techniques used by an HCO to incre.docxDiscuss the various tools and techniques used by an HCO to incre.docx
Discuss the various tools and techniques used by an HCO to incre.docx
 
Discuss the various means by which slaves resisted the slave system..docx
Discuss the various means by which slaves resisted the slave system..docxDiscuss the various means by which slaves resisted the slave system..docx
Discuss the various means by which slaves resisted the slave system..docx
 
Discuss the typica l clinical presentation of the diagnosis , Hip Os.docx
Discuss the typica l clinical presentation of the diagnosis , Hip Os.docxDiscuss the typica l clinical presentation of the diagnosis , Hip Os.docx
Discuss the typica l clinical presentation of the diagnosis , Hip Os.docx
 
Discuss the types of resources, tools, and methods that are availabl.docx
Discuss the types of resources, tools, and methods that are availabl.docxDiscuss the types of resources, tools, and methods that are availabl.docx
Discuss the types of resources, tools, and methods that are availabl.docx
 
Discuss the types of items that should be examined in a firewall log.docx
Discuss the types of items that should be examined in a firewall log.docxDiscuss the types of items that should be examined in a firewall log.docx
Discuss the types of items that should be examined in a firewall log.docx
 
Discuss the types of property, providing an example of each an.docx
Discuss the types of property, providing an example of each an.docxDiscuss the types of property, providing an example of each an.docx
Discuss the types of property, providing an example of each an.docx
 
Discuss the type of personality it takes to become a police officer..docx
Discuss the type of personality it takes to become a police officer..docxDiscuss the type of personality it takes to become a police officer..docx
Discuss the type of personality it takes to become a police officer..docx
 
Discuss the two major sources of crime statistics for the United Sta.docx
Discuss the two major sources of crime statistics for the United Sta.docxDiscuss the two major sources of crime statistics for the United Sta.docx
Discuss the two major sources of crime statistics for the United Sta.docx
 
Discuss the two most prominent theories related to the stage of adul.docx
Discuss the two most prominent theories related to the stage of adul.docxDiscuss the two most prominent theories related to the stage of adul.docx
Discuss the two most prominent theories related to the stage of adul.docx
 
Discuss the two elements required for the consent defense. In ad.docx
Discuss the two elements required for the consent defense. In ad.docxDiscuss the two elements required for the consent defense. In ad.docx
Discuss the two elements required for the consent defense. In ad.docx
 
Discuss the Truth in Lending Act and what role it places in financia.docx
Discuss the Truth in Lending Act and what role it places in financia.docxDiscuss the Truth in Lending Act and what role it places in financia.docx
Discuss the Truth in Lending Act and what role it places in financia.docx
 

Recently uploaded

Science 7 - LAND and SEA BREEZE and its Characteristics
Science 7 - LAND and SEA BREEZE and its CharacteristicsScience 7 - LAND and SEA BREEZE and its Characteristics
Science 7 - LAND and SEA BREEZE and its CharacteristicsKarinaGenton
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxheathfieldcps1
 
URLs and Routing in the Odoo 17 Website App
URLs and Routing in the Odoo 17 Website AppURLs and Routing in the Odoo 17 Website App
URLs and Routing in the Odoo 17 Website AppCeline George
 
Concept of Vouching. B.Com(Hons) /B.Compdf
Concept of Vouching. B.Com(Hons) /B.CompdfConcept of Vouching. B.Com(Hons) /B.Compdf
Concept of Vouching. B.Com(Hons) /B.CompdfUmakantAnnand
 
How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17Celine George
 
Class 11 Legal Studies Ch-1 Concept of State .pdf
Class 11 Legal Studies Ch-1 Concept of State .pdfClass 11 Legal Studies Ch-1 Concept of State .pdf
Class 11 Legal Studies Ch-1 Concept of State .pdfakmcokerachita
 
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdfssuser54595a
 
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPTECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPTiammrhaywood
 
Employee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxEmployee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxNirmalaLoungPoorunde1
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxiammrhaywood
 
Interactive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationInteractive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationnomboosow
 
How to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxHow to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxmanuelaromero2013
 
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Sapana Sha
 
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions  for the students and aspirants of Chemistry12th.pptxOrganic Name Reactions  for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions for the students and aspirants of Chemistry12th.pptxVS Mahajan Coaching Centre
 
Mastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionMastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionSafetyChain Software
 
Accessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactAccessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactdawncurless
 
mini mental status format.docx
mini    mental       status     format.docxmini    mental       status     format.docx
mini mental status format.docxPoojaSen20
 
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17Celine George
 
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptxContemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptxRoyAbrique
 

Recently uploaded (20)

Science 7 - LAND and SEA BREEZE and its Characteristics
Science 7 - LAND and SEA BREEZE and its CharacteristicsScience 7 - LAND and SEA BREEZE and its Characteristics
Science 7 - LAND and SEA BREEZE and its Characteristics
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptx
 
URLs and Routing in the Odoo 17 Website App
URLs and Routing in the Odoo 17 Website AppURLs and Routing in the Odoo 17 Website App
URLs and Routing in the Odoo 17 Website App
 
Concept of Vouching. B.Com(Hons) /B.Compdf
Concept of Vouching. B.Com(Hons) /B.CompdfConcept of Vouching. B.Com(Hons) /B.Compdf
Concept of Vouching. B.Com(Hons) /B.Compdf
 
How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17
 
Class 11 Legal Studies Ch-1 Concept of State .pdf
Class 11 Legal Studies Ch-1 Concept of State .pdfClass 11 Legal Studies Ch-1 Concept of State .pdf
Class 11 Legal Studies Ch-1 Concept of State .pdf
 
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
 
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPTECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
 
Employee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxEmployee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptx
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
 
Interactive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationInteractive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communication
 
Model Call Girl in Bikash Puri Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Bikash Puri  Delhi reach out to us at 🔝9953056974🔝Model Call Girl in Bikash Puri  Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Bikash Puri Delhi reach out to us at 🔝9953056974🔝
 
How to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxHow to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptx
 
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
 
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions  for the students and aspirants of Chemistry12th.pptxOrganic Name Reactions  for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
 
Mastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionMastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory Inspection
 
Accessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactAccessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impact
 
mini mental status format.docx
mini    mental       status     format.docxmini    mental       status     format.docx
mini mental status format.docx
 
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
 
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptxContemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
 

2AnonymousComment by Amolsch, Rianna Correct MLA headingEN.docx

  • 1. 2 Anonymous Comment by Amolsch, Rianna: Correct MLA heading ENGL 1190—Amolsch Rhetorical Analysis 9/28/15 Pirating Democracy Comment by Amolsch, Rianna: Unique title that hints at the overall topic Democracy is being boarded by pirates and taken back to ancient Greece, and those pirates are using technology to do so. These are not Jack Sparrow type pirates, but rather political parties who are using the age of the internet to create open- source democracy. Open-source democracy is essentially direct democracy that is all run through the convenience of your smartphone; it is voting directly on legislation through the channel of technology. These grassroots populist movements have started a very deliberate revolution that is slowly changing the way democracy operates in the modern world. Cole Edick, an author for the Harvard International Review, serves as an advocate for pirate parties by providing many examples of different pirates around the world, offering up reasons why the parties are not reaching wider audiences, and explaining the implications of a return to direct democracy via the internet. While Edick presents a multitude of facts and thought- provoking assertions, his central argument is rendered impotent by his hazy sense of purpose. Comment by Amolsch, Rianna: Up to this point, student has introduced general topic/issue in his own words. Comment by Amolsch, Rianna: Here, the student transitions to introduce the article and author to his readers. Comment by Amolsch, Rianna: Student summarizes the author’s overall argument. Comment by Amolsch, Rianna: Student writes a thesis that evaluates the author’s argument.
  • 2. In his article, “The golden age of piracy: can open-source democracy redefine citizenship for the internet age?” Cole Edick asserts that while pirate parties are making enough gains in the international political realm to be noticed, their platforms for organizing are not attractive enough to users. Edick illustrates the different practices of pirates by using the examples of the Pirate Parties in Iceland and Germany, the Net Party in Argentina, and the Podemas Party in Spain. Edick argues that one of the most resounding qualities of the pirate parties is that “pirates boast a unique modal of political organizing and decision-making...” This modal being crowdsourcing, the opening up of issues online for the masses to deliberate on. Edick contrasts the systems of LiquidFeedback in Germany to that of DemocracyOS in Argentina; they are both tools to organize meetings, propose votes, and vote on legislation online. Edick argues that DemocracyOS should be the tool that launches all of open-source democracy into the mainstream because it is more user-friendly. Edick believes this is exactly what open-source democracy needs, an attractive platform like DemocracyOS but with a large and energetic political party. With a platform like DemocracyOS, the world could return to direct democracy by allowing people to express their political views with no major time consumption to their daily lives. Edick lastly stresses the dangers of this implication arguing that “the open-source revolution may end up pirating not from the establishment, but from the already disenfranchised,” meaning that those who currently have a difficult time making their voice heard would continue to be silenced. Comment by Amolsch, Rianna: This whole paragraph summarizes the article. Notice how the student uses the author’s name throughout the paragraph to make it clear that he is talking about the author’s text/ideas. Edick crafts an argument that is overflowing with evidence and research making it highly informative for the reader, however; the purpose is often lost in the landslide of facts. Edick is attempting to achieve multiple purposes: inform about
  • 3. pirate parties and the platforms they use to operate, discuss the implications of an open-source revolution, explain why such a revolution cannot be stopped, but also argue for why the world should not want one. This muddled purpose makes the argument tremendously ineffective, making it challenging for readers to identify Edick’s claim. However, the most effective part of Edick’s argument is how he contrasts the platform of LiquidFeedback with that of DemocracyOS by presenting solid evidence on both, effectively proving why DemocracyOS is a necessity in the new direct democracy revolution. Comment by Amolsch, Rianna [2]: The student makes an assertion about the argument being made: there is plenty of evidence, but a lack of purpose. The strongest facet of Edick’s argument is the approach that is used to reach the intended audience. The topic of pirate parties is very broad and has a conversation on the international stage of politics; by publishing this article in the Harvard International Review the article has the ability to reach a wide audience across the world. In stark contrast to Edick reaching his intended audience, the style and tone of the article make it a very difficult read. Edick puts the language into easy to understand terms but often repeats himself in multiple paragraphs due to a lack of organization of the argument. Edick quickly jumps between different topics and pirate parties, leaving him with over-saturated paragraphs that begin to feel repetitive and often contain irrelevant information that is not necessary to the claim. Comment by Amolsch, Rianna [2]: The student continues to evaluate the argument by identifying a strength in the article. The most glaring problem with Edick’s article is the omission of opposition and rebuttal. Edick did not address any opposition to pirate parties, except for briefly mentioning how mainstream politics has rejected much of their ideals. This makes his argument completely one-sided and hallows out his already convoluted claim. Edick does however deliberate the problems that he foresees an open-source revolution creating in
  • 4. a very confusing stream of consciousness paragraph filled with mostly questions. At this point in his argument Edick has lost the majority of his credibility by omitting the opposition and having a rebuttal session with only himself. This approach leaves the reader wanting to seek out more information on the topic, not because of a sparked interest but rather because it is undeniable that certain information is simply not there. Comment by Amolsch, Rianna [2]: Again, the student is evaluating the argumentative strategies being used in the article, and explaining the reasoning for his evaluations. While Edick’s argument falters in certain areas, his does bring about many important and interesting points about the future of democracy. The most thought provoking point that Edick brings to light is the implication that an open-source revolution could lead contemporary citizens to a democracy with the governance of ancient Greece without being a slave- owning society. This is because citizens in ancient Greece had slaves perform all of the daily tasks in order for them to be able to participate in their hands-on direct democracy. The advent of technology has oddly enough made that practice out of date, but at the same time, has made it possible to have a direct democracy once again in a vastly unique way. Technology is a crucial player in the game of the pirates, and there are even connections to the issue of net neutrality in the United States. In order for a pirate party to form in the United States, net neutrality has to be present. Parties that thrive on an open platform and the accessibility of the internet would never be possible if the internet is not a fair and equal playing field. Comment by Amolsch, Rianna [2]: More evaluation of the argument being made in the article. Notice how the student supports his assertions with explanations and references to the article. The grassroots movement of the pirate parties has been making a foothold in countries across the globe. The topic of pirate parties is one small part of a much larger occurrence, the people of democracies are ready to embrace a new type of
  • 5. government, and that new type of government is an updated form of the original direct democracy that is iconic to ancient Greece. Technology will be directly tied with an open-source revolution, and the issue of net neutrality in the United States could be the deciding factor for the future of pirate parties. There is no way for this democratic revolution to occur without pirate parties in the United States; the inclusion of the United States in the pirate party revolution due to permanently fortified net neutrality rules will be the catalyst that sparks the whole reaction. The ship of democracy has been boarded by pirates and that ship is being taken around the world as direct democracy. Comment by Amolsch, Rianna [2]: The conclusion begins without overtly announcing it with a phrase like “In conclusion.” Comment by Amolsch, Rianna [2]: Conclusion looks to the future and predicts how the topic might evolve in the future. Work Cited Comment by Amolsch, Rianna [2]: Work Cited (“Work” because there is only one source) aligns perfectly with MLA formatting. Edick, Cole. "The golden age of piracy: can open-source democracy redefine citizenship for the internet age?" Harvard International Review 36.4 (2015): 7+. Opposing Viewpoints in Context. Web. 21 Sept. 2015.
  • 6. Rhetorical Analysis Essay What is a Rhetorical Analysis? To begin, let us define what a rhetorical analysis is NOT. A rhetorical analysis is not merely a summary of a scholarly article. Instead, a rhetorical analysis requires you to apply your critical reading skills in order to “break down” a text. In essence, you break off the “parts” from the “whole” of the piece you’re analyzing. The goal of a rhetorical analysis is to articulate HOW the author writes, rather than WHAT they actually wrote. To do this, you will analyze the rhetorical strategies the author uses to achieve his or her goal or purpose of writing their piece. You will also determine whether or not those strategies were effective and why. The overall purpose of this paper is to show your analysis and evaluation of an author’s ideas and writing strategies. Choose ONE text that has an issue/controversy worthy of academic attention at the center of it. Provide an explanation of the issue and a detailed summary of the article early on to orient your reader, but the majority of the paper should focus on an in- depth rhetorical analysis, which should include your judgment about whether or not the article's argument was effective, as well as your own responses to the writer’s claims. Considerations for Reading
  • 7. 1. What is the thesis, what is the overall argument the author presents? 2. What did the author choose to study? Why? 3. What is the writer’s purpose? To inform? To persuade? To criticize? 4. Who is the author’s intended audience? 5. How does the writer arrange his or her ideas? Chronologically? 6. How does the writer use diction? (Word choice, arrangement, accuracy, is it formal, informal? Technical versus slang?) 7. Does the writer use dialogue? Quotations? Why? 8. Are important terms repeated? 9. What is the sentence structure of text? Are there fragments, run ons? Is it declarative, imperative, exclamatory? What effect does this have? 10. Does the writer use punctuation to create an effect? Italics, underlining, parentheses? Which marks does the writer use, and when? Considerations for Writing So, you’ve analyzed your article, answered the questions above, and identified the rhetorical strategies the author uses. Now what? 1. First, you’ll need to come up with your own thesis for your rhetorical analysis. What point do you want to make about the author’s rhetorical choices? Do the author’s rhetorical strategies make his/her article a strong argument? A weak one? 2. After identifying your thesis, try to arrange the rhetorical strategies you’ve identified in a logical way. For example, you could start by identifying the purpose of the intended audience and why the author chose to write about their topic. Next, you could identify specific stylistic choices, such as word choice, formal/informal language, etc. The idea is to logically transition from analyzing one rhetorical strategy to another. Stay on topic with the strategies that the author uses often and actually has a purpose for using. 3. With each point you make, have a strong topic sentence
  • 8. declaring the overall purpose of the rhetorical strategies you are about to discuss. This will help identify the argument you are making, transition your ideas, and add fluidity. 4. Keep in mind that while authors use different strategies to achieve their purposes, you also need to be making points and evaluations about these strategies, not simply summarizing them. For example, instead of simply stating the author uses formal language in his essay, state what effect is created by using formal language. By doing this you are not only identifying the rhetorical strategy, by analyzing its purpose. 5. As with all academic writing, check for grammar, transitional ease, fluidity, and a logical argument. Proofread, proofread, proofread! A Successful Rhetorical Analysis Essay · Provides a concise and accurate summary of the article early on to orient reader · Has a thesis that makes an evaluative judgment about the effectiveness of the author’s argument · Offers strong support for its thesis by using specific details and critical analysis of how the author effectively or ineffectively supports his or her argument · Uses analytical tools appropriate to the argument he or she is evaluating · Paraphrases and integrates quotations from the article effectively, smoothly, and ethically through appropriate signal phrases and parenthetical citations in MLA style · Uses third-person voice to analyze the article, not first- or second-person voices