SlideShare a Scribd company logo
Inventing Arguments by Analyzing Artifacts Todd Sumerfield
Articles Choosing an artifact can oftentimes be the most difficult part of the argument.  The most interesting articles are most often not the ones that are the most readily obvious. Try to find an article which seems to speak to a point that is not exactly what you originally thought the point of the exhibit was.
Exigence To analyze the article, one must know what the point of the article is. This is called the exigence of the article, or the major point that the article was created to speak to, or the message it intends to get across.
Analyzing the Article Directly When looking at the exigence of your article, do not look at the obvious reasoning for the piece, or how it is most likely meant to function, look for a deeper reason that may not be obvious to the untrained eye.  In order to do this, one must examine the audience that the article is meant to address. This can provide an insight into the article.
The Audience The audience of the article is one of the most important aspects of the analysis.  An article means different things to different people, so the meaning and purpose of the article must be found with respect to the particular audience.
Writing Your Analysis Once you have compiled all of your information (article, exigence and audience), it is time to analyze the article.  Find that one thing in particular which is unique about the article and start piecing together your analysis of the audience and what the article will specifically mean to them.  It is important to portray your information in a way that will be most effective to your audience as well, just as was the case with the article.
Example Below I have included an example analysis which I did, analyzing a video that was shown to a group of organized protestors in Denver.  The audience was a group which was already taking part in protests, but the actual exigence of the video was that the people aren’t doing enough. The images of people around the world losing their lives for their cause is meant to instill a deeper sense of responsibility in the protestors and move them to action.
Example Continued Notice how the example piece is creatively displayed; using the imagination of the audience by engaging them in pictures, text and videos.  The example analyzes the article in the context of the particular audience. Although the movie did not mean the same thing or portray the same message to all of the audience, the general exigence to a group of protestors could very well have been a call to action and to arms.
Your Assignment Your assignment is to find an article around campus to analyze. Take your time in choosing an article, and don’t forget the great resources we have in the art displays. The article may be off campus if it is approved by the instructor.  Make sure you engage yourself in the people around the artifact, immersing yourself in the people and culture surrounding the article.  The article doesn’t have to be something physical, it can be a speech or meeting as well.
With your article chosen, explain in a creative form what the article was made or created to do, and how it goes about its exigence.  Explain if the method is effective and how it appeared to affect the audience.  Feel free to portray your analysis in a visually pleasing format such as that of the example. There are no rules or required word counts for this project, so feel free to explore possibilities outside of Microsoft Word or Power Point.  Good Luck! And have fun with this!

More Related Content

What's hot

Argumentative essay outline
Argumentative essay outlineArgumentative essay outline
Argumentative essay outline
Aina Baig
 
Writing arguments (pros and cons)
Writing arguments (pros and cons)Writing arguments (pros and cons)
Writing arguments (pros and cons)englishbites
 
Argument Intro
Argument IntroArgument Intro
Argument Intro
Andy Lombardo
 
Argument lesson
Argument lessonArgument lesson
Argument lesson
Paula Munts
 
Argumentative essay redux
Argumentative essay reduxArgumentative essay redux
Argumentative essay redux
CameronKennedy23
 
Argumentative essay
Argumentative essayArgumentative essay
Argumentative essay
Riitta Lähde
 
Audience 1 b
Audience 1 bAudience 1 b
Audience 1 bMs Olive
 
Writing an Argumentative Essay
Writing an Argumentative EssayWriting an Argumentative Essay
Writing an Argumentative Essay
Karen Acal
 
Teaching counter claim
Teaching counter claimTeaching counter claim
Teaching counter claimkrochalek
 
Persuasive Writing
Persuasive WritingPersuasive Writing
Persuasive Writingamjanney
 
Argumentative essay outline
Argumentative essay outlineArgumentative essay outline
Argumentative essay outline
EssayAcademy
 
Argumentation Theory
Argumentation TheoryArgumentation Theory
Argumentation Theorycsmicho
 
Argumentative essay
Argumentative essay Argumentative essay
Argumentative essay
alexandra diaz
 
Argumentative essays writing
Argumentative essays writingArgumentative essays writing
Argumentative essays writingUTPL UTPL
 
Argumentative paragraph
Argumentative paragraphArgumentative paragraph
Argumentative paragraph
University of Panama
 
Persuasive Writing
Persuasive WritingPersuasive Writing
Persuasive Writing
Tasneem Ahmad
 
Writing an argumentative essay
Writing an argumentative essayWriting an argumentative essay
Writing an argumentative essay
Karen Rothermich
 
English 104: Argumentative Writing
English 104:  Argumentative WritingEnglish 104:  Argumentative Writing
English 104: Argumentative Writing
theresa_lee
 
Evaluating arguments lesson2
Evaluating arguments lesson2Evaluating arguments lesson2
Evaluating arguments lesson2rainah delacruz
 

What's hot (20)

Argumentative essay outline
Argumentative essay outlineArgumentative essay outline
Argumentative essay outline
 
Writing arguments (pros and cons)
Writing arguments (pros and cons)Writing arguments (pros and cons)
Writing arguments (pros and cons)
 
Argument Intro
Argument IntroArgument Intro
Argument Intro
 
Argument lesson
Argument lessonArgument lesson
Argument lesson
 
Argumentative essay redux
Argumentative essay reduxArgumentative essay redux
Argumentative essay redux
 
Argumentative essay
Argumentative essayArgumentative essay
Argumentative essay
 
Audience 1 b
Audience 1 bAudience 1 b
Audience 1 b
 
Writing an Argumentative Essay
Writing an Argumentative EssayWriting an Argumentative Essay
Writing an Argumentative Essay
 
Teaching counter claim
Teaching counter claimTeaching counter claim
Teaching counter claim
 
Persuasive Writing
Persuasive WritingPersuasive Writing
Persuasive Writing
 
Argumentative essay outline
Argumentative essay outlineArgumentative essay outline
Argumentative essay outline
 
Argumentation Theory
Argumentation TheoryArgumentation Theory
Argumentation Theory
 
Argumentative essay
Argumentative essay Argumentative essay
Argumentative essay
 
Op ed
Op edOp ed
Op ed
 
Argumentative essays writing
Argumentative essays writingArgumentative essays writing
Argumentative essays writing
 
Argumentative paragraph
Argumentative paragraphArgumentative paragraph
Argumentative paragraph
 
Persuasive Writing
Persuasive WritingPersuasive Writing
Persuasive Writing
 
Writing an argumentative essay
Writing an argumentative essayWriting an argumentative essay
Writing an argumentative essay
 
English 104: Argumentative Writing
English 104:  Argumentative WritingEnglish 104:  Argumentative Writing
English 104: Argumentative Writing
 
Evaluating arguments lesson2
Evaluating arguments lesson2Evaluating arguments lesson2
Evaluating arguments lesson2
 

Similar to Inventing arguments by analyzing artifacts

Inventing arguments by analyzing artifacts
Inventing arguments by analyzing artifactsInventing arguments by analyzing artifacts
Inventing arguments by analyzing artifactsTodd Sumerfield
 
Introductions
IntroductionsIntroductions
Introductions
Chantelle Messier
 
Literature Review On Employee Engagement
Literature Review On Employee EngagementLiterature Review On Employee Engagement
Literature Review On Employee Engagement
Buying Papers Mars Hill University
 
Journal
JournalJournal
写科研论文的高级方法学
写科研论文的高级方法学写科研论文的高级方法学
写科研论文的高级方法学chengcheng zhou
 
What Can One Person Do Secondary Research Project Y.docx
What Can One Person Do Secondary Research Project   Y.docxWhat Can One Person Do Secondary Research Project   Y.docx
What Can One Person Do Secondary Research Project Y.docx
philipnelson29183
 
Enc 1102 summer b july 9 (1)
Enc 1102 summer b july 9 (1)Enc 1102 summer b july 9 (1)
Enc 1102 summer b july 9 (1)Laura Martinez
 
FIN  340  Useful  Excel  Functions  for  Capital.docx
FIN  340  Useful  Excel  Functions  for  Capital.docxFIN  340  Useful  Excel  Functions  for  Capital.docx
FIN  340  Useful  Excel  Functions  for  Capital.docx
ssuser454af01
 
Artifact Analysis WorksheetAn artifact is something made by a hu.docx
Artifact Analysis WorksheetAn artifact is something made by a hu.docxArtifact Analysis WorksheetAn artifact is something made by a hu.docx
Artifact Analysis WorksheetAn artifact is something made by a hu.docx
davezstarr61655
 
Composition II Advocacy Assignment · Peer Review Essay III bet
Composition II Advocacy Assignment · Peer Review Essay III betComposition II Advocacy Assignment · Peer Review Essay III bet
Composition II Advocacy Assignment · Peer Review Essay III bet
LynellBull52
 
Module 2.pptx
Module 2.pptxModule 2.pptx
Module 2.pptx
VBPCLASS
 
GLIT 6757 (PEI) Winter 2012: Seminar 2
GLIT 6757 (PEI) Winter 2012: Seminar 2GLIT 6757 (PEI) Winter 2012: Seminar 2
GLIT 6757 (PEI) Winter 2012: Seminar 2
Michele Knobel
 
Week 4 english 145 (1)
Week 4 english 145 (1)Week 4 english 145 (1)
Week 4 english 145 (1)lisyaseloni
 
How to write an essay hook
How to write an essay hookHow to write an essay hook
How to write an essay hook
calltutors
 
GLIT mississauga, Seminar 2
GLIT  mississauga, Seminar 2GLIT  mississauga, Seminar 2
GLIT mississauga, Seminar 2
Michele Knobel
 
due in 8 hours........ must have done in 8 hours no late work do.docx
due in 8 hours........ must have done in 8 hours no late work do.docxdue in 8 hours........ must have done in 8 hours no late work do.docx
due in 8 hours........ must have done in 8 hours no late work do.docx
kanepbyrne80830
 
PROBLEM Suppose a manager for X Corporation is having a hard time.docx
PROBLEM Suppose a manager for X Corporation is having a hard time.docxPROBLEM Suppose a manager for X Corporation is having a hard time.docx
PROBLEM Suppose a manager for X Corporation is having a hard time.docx
briancrawford30935
 
Position-Paper.pptx Media& Information Sources
Position-Paper.pptx Media& Information SourcesPosition-Paper.pptx Media& Information Sources
Position-Paper.pptx Media& Information Sources
MacabentaJoan
 
Inventing arguments 6 7
Inventing arguments 6 7Inventing arguments 6 7
Inventing arguments 6 7palderman
 

Similar to Inventing arguments by analyzing artifacts (20)

Inventing arguments by analyzing artifacts
Inventing arguments by analyzing artifactsInventing arguments by analyzing artifacts
Inventing arguments by analyzing artifacts
 
Introductions
IntroductionsIntroductions
Introductions
 
Research paper 101
Research paper 101Research paper 101
Research paper 101
 
Literature Review On Employee Engagement
Literature Review On Employee EngagementLiterature Review On Employee Engagement
Literature Review On Employee Engagement
 
Journal
JournalJournal
Journal
 
写科研论文的高级方法学
写科研论文的高级方法学写科研论文的高级方法学
写科研论文的高级方法学
 
What Can One Person Do Secondary Research Project Y.docx
What Can One Person Do Secondary Research Project   Y.docxWhat Can One Person Do Secondary Research Project   Y.docx
What Can One Person Do Secondary Research Project Y.docx
 
Enc 1102 summer b july 9 (1)
Enc 1102 summer b july 9 (1)Enc 1102 summer b july 9 (1)
Enc 1102 summer b july 9 (1)
 
FIN  340  Useful  Excel  Functions  for  Capital.docx
FIN  340  Useful  Excel  Functions  for  Capital.docxFIN  340  Useful  Excel  Functions  for  Capital.docx
FIN  340  Useful  Excel  Functions  for  Capital.docx
 
Artifact Analysis WorksheetAn artifact is something made by a hu.docx
Artifact Analysis WorksheetAn artifact is something made by a hu.docxArtifact Analysis WorksheetAn artifact is something made by a hu.docx
Artifact Analysis WorksheetAn artifact is something made by a hu.docx
 
Composition II Advocacy Assignment · Peer Review Essay III bet
Composition II Advocacy Assignment · Peer Review Essay III betComposition II Advocacy Assignment · Peer Review Essay III bet
Composition II Advocacy Assignment · Peer Review Essay III bet
 
Module 2.pptx
Module 2.pptxModule 2.pptx
Module 2.pptx
 
GLIT 6757 (PEI) Winter 2012: Seminar 2
GLIT 6757 (PEI) Winter 2012: Seminar 2GLIT 6757 (PEI) Winter 2012: Seminar 2
GLIT 6757 (PEI) Winter 2012: Seminar 2
 
Week 4 english 145 (1)
Week 4 english 145 (1)Week 4 english 145 (1)
Week 4 english 145 (1)
 
How to write an essay hook
How to write an essay hookHow to write an essay hook
How to write an essay hook
 
GLIT mississauga, Seminar 2
GLIT  mississauga, Seminar 2GLIT  mississauga, Seminar 2
GLIT mississauga, Seminar 2
 
due in 8 hours........ must have done in 8 hours no late work do.docx
due in 8 hours........ must have done in 8 hours no late work do.docxdue in 8 hours........ must have done in 8 hours no late work do.docx
due in 8 hours........ must have done in 8 hours no late work do.docx
 
PROBLEM Suppose a manager for X Corporation is having a hard time.docx
PROBLEM Suppose a manager for X Corporation is having a hard time.docxPROBLEM Suppose a manager for X Corporation is having a hard time.docx
PROBLEM Suppose a manager for X Corporation is having a hard time.docx
 
Position-Paper.pptx Media& Information Sources
Position-Paper.pptx Media& Information SourcesPosition-Paper.pptx Media& Information Sources
Position-Paper.pptx Media& Information Sources
 
Inventing arguments 6 7
Inventing arguments 6 7Inventing arguments 6 7
Inventing arguments 6 7
 

Recently uploaded

Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
James Anderson
 
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
SOFTTECHHUB
 
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
Neo4j
 
The Future of Platform Engineering
The Future of Platform EngineeringThe Future of Platform Engineering
The Future of Platform Engineering
Jemma Hussein Allen
 
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptxSecstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
nkrafacyberclub
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Albert Hoitingh
 
Pushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 daysPushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 days
Adtran
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
Ana-Maria Mihalceanu
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
Kari Kakkonen
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
ControlCase
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
Alan Dix
 
Free Complete Python - A step towards Data Science
Free Complete Python - A step towards Data ScienceFree Complete Python - A step towards Data Science
Free Complete Python - A step towards Data Science
RinaMondal9
 
UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5
DianaGray10
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
KatiaHIMEUR1
 
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to ProductionGenerative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Aggregage
 
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
Neo4j
 
Introduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - CybersecurityIntroduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - Cybersecurity
mikeeftimakis1
 
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfObservability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Paige Cruz
 
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
BookNet Canada
 
By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024
Pierluigi Pugliese
 

Recently uploaded (20)

Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
 
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
 
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
 
The Future of Platform Engineering
The Future of Platform EngineeringThe Future of Platform Engineering
The Future of Platform Engineering
 
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptxSecstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
 
Pushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 daysPushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 days
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
 
Free Complete Python - A step towards Data Science
Free Complete Python - A step towards Data ScienceFree Complete Python - A step towards Data Science
Free Complete Python - A step towards Data Science
 
UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
 
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to ProductionGenerative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to Production
 
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
 
Introduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - CybersecurityIntroduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - Cybersecurity
 
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfObservability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
 
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
 
By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024
 

Inventing arguments by analyzing artifacts

  • 1. Inventing Arguments by Analyzing Artifacts Todd Sumerfield
  • 2. Articles Choosing an artifact can oftentimes be the most difficult part of the argument. The most interesting articles are most often not the ones that are the most readily obvious. Try to find an article which seems to speak to a point that is not exactly what you originally thought the point of the exhibit was.
  • 3. Exigence To analyze the article, one must know what the point of the article is. This is called the exigence of the article, or the major point that the article was created to speak to, or the message it intends to get across.
  • 4. Analyzing the Article Directly When looking at the exigence of your article, do not look at the obvious reasoning for the piece, or how it is most likely meant to function, look for a deeper reason that may not be obvious to the untrained eye. In order to do this, one must examine the audience that the article is meant to address. This can provide an insight into the article.
  • 5. The Audience The audience of the article is one of the most important aspects of the analysis. An article means different things to different people, so the meaning and purpose of the article must be found with respect to the particular audience.
  • 6. Writing Your Analysis Once you have compiled all of your information (article, exigence and audience), it is time to analyze the article. Find that one thing in particular which is unique about the article and start piecing together your analysis of the audience and what the article will specifically mean to them. It is important to portray your information in a way that will be most effective to your audience as well, just as was the case with the article.
  • 7. Example Below I have included an example analysis which I did, analyzing a video that was shown to a group of organized protestors in Denver. The audience was a group which was already taking part in protests, but the actual exigence of the video was that the people aren’t doing enough. The images of people around the world losing their lives for their cause is meant to instill a deeper sense of responsibility in the protestors and move them to action.
  • 8. Example Continued Notice how the example piece is creatively displayed; using the imagination of the audience by engaging them in pictures, text and videos. The example analyzes the article in the context of the particular audience. Although the movie did not mean the same thing or portray the same message to all of the audience, the general exigence to a group of protestors could very well have been a call to action and to arms.
  • 9. Your Assignment Your assignment is to find an article around campus to analyze. Take your time in choosing an article, and don’t forget the great resources we have in the art displays. The article may be off campus if it is approved by the instructor. Make sure you engage yourself in the people around the artifact, immersing yourself in the people and culture surrounding the article. The article doesn’t have to be something physical, it can be a speech or meeting as well.
  • 10. With your article chosen, explain in a creative form what the article was made or created to do, and how it goes about its exigence. Explain if the method is effective and how it appeared to affect the audience. Feel free to portray your analysis in a visually pleasing format such as that of the example. There are no rules or required word counts for this project, so feel free to explore possibilities outside of Microsoft Word or Power Point. Good Luck! And have fun with this!