SlideShare a Scribd company logo
Communicating with Others “ We have two ears and one mouth so that we can listen twice as much as we speak.” -Epictetus Chapter 1
What is Communication? ,[object Object],Communication  is the transferring of information from one person to another.
SENDER   MESSAGE CHANNEL RECEIVER    NOISE  NOISE  NOISE  NOISE  NOISE  NOISE  NOISE FEEDBACK ENCODES DECODES TRANSMISSION MODEL OF COMMUNICATION
Parts of the Model of Communication ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Communication on two levels ,[object Object],Nonverbal  - communication through non-liguistic means including body language, eye contact, facial expressions, appearance, and touch
Five types of Communication Environments ,[object Object],[object Object],[object Object],[object Object],[object Object]
What is the Goal of Communication? -An argument occurs when there is disagreement,  confusion, or ignorance about an issue to be resolved How is an argument solved? -If we seek the truth, we must find complete  accuracy of propositions, statements,  sentences, assertions, and beliefs. -Personal certainty does not equal truth.  The Right Approach to Argumentation -Validity is the strength of our conclusions. -When we talk about validity we are referring to the internal  Consistency of an argument.
Truth  VS  Validity How to recognize valid positions and finding most valid argument is the goal of a argumentation and critical thinking class Acquiring truth is not the goal of a course in argumentation and critical thinking Arguing validity promotes open-mindedness, encouraging constructive argumentation Arguing over truth promotes dogmatism, discouraging constructive argumentation Goal of validity is to find most valid argument, the most valid position can change as new info is found Based on self-esteem,  Resolving truth arguments leads to a win or lose environment Threshold for validity is measured using the entire Continuum of Certainty Threshold of truth is measured by absolute certainty On any subject there can be many valid positions On any one subject there can be only one truth Internal consistency of an argument, conclusion reached is consistent with information used Complete accuracy, beyond doubt, dispute or debate
THRESHOLD Threshold  refers to the degree of validity on the Continuum of Certainty  that the addvocate must demonstate before an audience will commit to  a decision. -Each audience and individual person has a different “breakthrough  point” at which they are convinced of a specific argument. THE CONTINUUM OF ARGUMENTATIVE CERTAINTY 0%------------25%------------50%------------75%------------100% Opinion  Assertion  Inference  Fact
The critical thinker should keep the following in mind when arguing outside the courtroom: -No two people necessarily have the  same threshold on the same topics. -Audience adherence to a point of view  is not possible until an advocate reaches  the threshold of his or her target audience. -On some topics, people may have  thresholds that cannot be reached at all. -Threshold will also vary depending on  the topic. -Threshold is affected by both psychological  and physiological conditions. -Threshold can be lowered.

More Related Content

Viewers also liked

What is working for others
What is working for othersWhat is working for others
What is working for others
Jamal Ahmad
 
Rewriting history jost corrected
Rewriting history jost correctedRewriting history jost corrected
Rewriting history jost correctedWaldorf Oberberg
 
Working with others using git and Github
Working with others using git and GithubWorking with others using git and Github
Working with others using git and Github
Jacob Jenkins
 
Communicating With Others
Communicating With OthersCommunicating With Others
Communicating With Others
home
 
Kelab anti dadah sjk ( c ) yong 1
Kelab anti dadah sjk ( c ) yong 1Kelab anti dadah sjk ( c ) yong 1
Kelab anti dadah sjk ( c ) yong 1Hamizah Hussin
 
Working With Other Others - Authorial Strategies 2003 - 2014
Working With Other Others - Authorial Strategies 2003 - 2014Working With Other Others - Authorial Strategies 2003 - 2014
Working With Other Others - Authorial Strategies 2003 - 2014
otheragent
 
Communicating with others slideshare
Communicating with others slideshareCommunicating with others slideshare
Communicating with others slideshare
gracesoudah
 
Git rewriting git history
Git   rewriting git  historyGit   rewriting git  history
Git rewriting git historyLearningTech
 
Communication Disorders
Communication DisordersCommunication Disorders
Communication Disorderseswauger
 
Achieving Work|Life Balance
Achieving Work|Life BalanceAchieving Work|Life Balance
Achieving Work|Life Balance
TargetX
 
Content Personalities: Working with Others without Going Insane
Content Personalities: Working with Others without Going InsaneContent Personalities: Working with Others without Going Insane
Content Personalities: Working with Others without Going Insane
Andrea Goulet
 
Corporate social responsibilty
Corporate social responsibiltyCorporate social responsibilty
Corporate social responsibilty
JosephinDyna
 
Social Responsibility PPT
Social Responsibility PPTSocial Responsibility PPT
Social Responsibility PPT
Samuel pongen
 
Small and medium scale enterprise
Small and medium scale enterpriseSmall and medium scale enterprise
Small and medium scale enterprise
Kalahub
 
work life balance ppt
work life balance pptwork life balance ppt
work life balance ppt
Mudit Deval
 
Leadership ppt
Leadership pptLeadership ppt
Leadership pptDivya Rani
 
Presentation on leadership
Presentation on leadershipPresentation on leadership
Presentation on leadership
sd college
 

Viewers also liked (19)

Activities Presentation
Activities PresentationActivities Presentation
Activities Presentation
 
What is working for others
What is working for othersWhat is working for others
What is working for others
 
Rewriting history jost corrected
Rewriting history jost correctedRewriting history jost corrected
Rewriting history jost corrected
 
Working with others using git and Github
Working with others using git and GithubWorking with others using git and Github
Working with others using git and Github
 
Communicating With Others
Communicating With OthersCommunicating With Others
Communicating With Others
 
Kelab anti dadah sjk ( c ) yong 1
Kelab anti dadah sjk ( c ) yong 1Kelab anti dadah sjk ( c ) yong 1
Kelab anti dadah sjk ( c ) yong 1
 
Working With Other Others - Authorial Strategies 2003 - 2014
Working With Other Others - Authorial Strategies 2003 - 2014Working With Other Others - Authorial Strategies 2003 - 2014
Working With Other Others - Authorial Strategies 2003 - 2014
 
Communicating with others slideshare
Communicating with others slideshareCommunicating with others slideshare
Communicating with others slideshare
 
Git rewriting git history
Git   rewriting git  historyGit   rewriting git  history
Git rewriting git history
 
Communication Disorders
Communication DisordersCommunication Disorders
Communication Disorders
 
Achieving Work|Life Balance
Achieving Work|Life BalanceAchieving Work|Life Balance
Achieving Work|Life Balance
 
Content Personalities: Working with Others without Going Insane
Content Personalities: Working with Others without Going InsaneContent Personalities: Working with Others without Going Insane
Content Personalities: Working with Others without Going Insane
 
Corporate social responsibilty
Corporate social responsibiltyCorporate social responsibilty
Corporate social responsibilty
 
Definitions of communication
Definitions of communicationDefinitions of communication
Definitions of communication
 
Social Responsibility PPT
Social Responsibility PPTSocial Responsibility PPT
Social Responsibility PPT
 
Small and medium scale enterprise
Small and medium scale enterpriseSmall and medium scale enterprise
Small and medium scale enterprise
 
work life balance ppt
work life balance pptwork life balance ppt
work life balance ppt
 
Leadership ppt
Leadership pptLeadership ppt
Leadership ppt
 
Presentation on leadership
Presentation on leadershipPresentation on leadership
Presentation on leadership
 

Similar to Speech104 extra credit

Communicating extra credit
Communicating extra creditCommunicating extra credit
Communicating extra credit
arjunghatak24
 
Truth vs. Validity
Truth vs. Validity Truth vs. Validity
Truth vs. Validity Lorik10
 
Transmission model of_communication[1]
Transmission model of_communication[1]Transmission model of_communication[1]
Transmission model of_communication[1]melisa nahimana
 
Transmission model of communication
Transmission model of communicationTransmission model of communication
Transmission model of communicationmelisa nahimana
 
Speech101 powerpoint
Speech101 powerpointSpeech101 powerpoint
Speech101 powerpoint
saponmely
 
Argumentative communication
Argumentative communicationArgumentative communication
Argumentative communication
Škola Futura
 
Communicating with Others
Communicating with OthersCommunicating with Others
Communicating with Others
Cynthia Bryan
 
Communicating with Others
Communicating with OthersCommunicating with Others
Communicating with Others
Cynthia Bryan
 
Communicating with Others
Communicating with OthersCommunicating with Others
Communicating with Others
Cynthia Bryan
 
Dorling Kindersley RFThinkstockLearning Objectives By.docx
Dorling Kindersley RFThinkstockLearning Objectives By.docxDorling Kindersley RFThinkstockLearning Objectives By.docx
Dorling Kindersley RFThinkstockLearning Objectives By.docx
jacksnathalie
 
The levelsofcommunication
The levelsofcommunicationThe levelsofcommunication
The levelsofcommunication
Aditya Jobalia
 
Communication Extra Credit
Communication Extra CreditCommunication Extra Credit
Communication Extra Creditauragranados
 
Why Communication is Important [Autosaved].ppt
Why Communication is Important [Autosaved].pptWhy Communication is Important [Autosaved].ppt
Why Communication is Important [Autosaved].ppt
Afzaal Ali
 
160210107006
160210107006160210107006
160210107006
mustafabharmal11
 
Rethinking Informed Consent (Review)
Rethinking Informed Consent (Review)Rethinking Informed Consent (Review)
Rethinking Informed Consent (Review)
Chris Willmott
 
The Rhetoric of Argument
The Rhetoric of Argument The Rhetoric of Argument
The Rhetoric of Argument frickewi
 
Persuasive and Communication is the art of negotiation.
Persuasive and Communication is the art of negotiation.Persuasive and Communication is the art of negotiation.
Persuasive and Communication is the art of negotiation.
aruny7087
 
Chapter two f
Chapter two fChapter two f
Chapter two fserrjust
 

Similar to Speech104 extra credit (20)

Communicating extra credit
Communicating extra creditCommunicating extra credit
Communicating extra credit
 
Truth vs. Validity
Truth vs. Validity Truth vs. Validity
Truth vs. Validity
 
Transmission model of_communication[1]
Transmission model of_communication[1]Transmission model of_communication[1]
Transmission model of_communication[1]
 
Transmission model of communication
Transmission model of communicationTransmission model of communication
Transmission model of communication
 
Speech101 powerpoint
Speech101 powerpointSpeech101 powerpoint
Speech101 powerpoint
 
Argumentative communication
Argumentative communicationArgumentative communication
Argumentative communication
 
Communicating with Others
Communicating with OthersCommunicating with Others
Communicating with Others
 
Communicating with Others
Communicating with OthersCommunicating with Others
Communicating with Others
 
Communicating with Others
Communicating with OthersCommunicating with Others
Communicating with Others
 
SPH 107 Ch 1
SPH 107 Ch 1SPH 107 Ch 1
SPH 107 Ch 1
 
Dorling Kindersley RFThinkstockLearning Objectives By.docx
Dorling Kindersley RFThinkstockLearning Objectives By.docxDorling Kindersley RFThinkstockLearning Objectives By.docx
Dorling Kindersley RFThinkstockLearning Objectives By.docx
 
Communication ppt
Communication pptCommunication ppt
Communication ppt
 
The levelsofcommunication
The levelsofcommunicationThe levelsofcommunication
The levelsofcommunication
 
Communication Extra Credit
Communication Extra CreditCommunication Extra Credit
Communication Extra Credit
 
Why Communication is Important [Autosaved].ppt
Why Communication is Important [Autosaved].pptWhy Communication is Important [Autosaved].ppt
Why Communication is Important [Autosaved].ppt
 
160210107006
160210107006160210107006
160210107006
 
Rethinking Informed Consent (Review)
Rethinking Informed Consent (Review)Rethinking Informed Consent (Review)
Rethinking Informed Consent (Review)
 
The Rhetoric of Argument
The Rhetoric of Argument The Rhetoric of Argument
The Rhetoric of Argument
 
Persuasive and Communication is the art of negotiation.
Persuasive and Communication is the art of negotiation.Persuasive and Communication is the art of negotiation.
Persuasive and Communication is the art of negotiation.
 
Chapter two f
Chapter two fChapter two f
Chapter two f
 

Recently uploaded

Generative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to ProductionGenerative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Aggregage
 
UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5
DianaGray10
 
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
SOFTTECHHUB
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
DanBrown980551
 
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfObservability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Paige Cruz
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
ControlCase
 
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
Neo4j
 
Large Language Model (LLM) and it’s Geospatial Applications
Large Language Model (LLM) and it’s Geospatial ApplicationsLarge Language Model (LLM) and it’s Geospatial Applications
Large Language Model (LLM) and it’s Geospatial Applications
Rohit Gautam
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Albert Hoitingh
 
Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?
Nexer Digital
 
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
Neo4j
 
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptxSecstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
nkrafacyberclub
 
Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1
DianaGray10
 
How to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptxHow to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptx
danishmna97
 
UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6
DianaGray10
 
RESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for studentsRESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for students
KAMESHS29
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
Ana-Maria Mihalceanu
 
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
Neo4j
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance
 
Artificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopmentArtificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopment
Octavian Nadolu
 

Recently uploaded (20)

Generative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to ProductionGenerative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to Production
 
UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5
 
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
 
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfObservability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
 
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
 
Large Language Model (LLM) and it’s Geospatial Applications
Large Language Model (LLM) and it’s Geospatial ApplicationsLarge Language Model (LLM) and it’s Geospatial Applications
Large Language Model (LLM) and it’s Geospatial Applications
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
 
Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?
 
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
 
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptxSecstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
 
Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1
 
How to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptxHow to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptx
 
UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6
 
RESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for studentsRESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for students
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
 
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
 
Artificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopmentArtificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopment
 

Speech104 extra credit

  • 1. Communicating with Others “ We have two ears and one mouth so that we can listen twice as much as we speak.” -Epictetus Chapter 1
  • 2.
  • 3. SENDER MESSAGE CHANNEL RECEIVER    NOISE NOISE NOISE NOISE NOISE NOISE NOISE FEEDBACK ENCODES DECODES TRANSMISSION MODEL OF COMMUNICATION
  • 4.
  • 5.
  • 6.
  • 7. What is the Goal of Communication? -An argument occurs when there is disagreement, confusion, or ignorance about an issue to be resolved How is an argument solved? -If we seek the truth, we must find complete accuracy of propositions, statements, sentences, assertions, and beliefs. -Personal certainty does not equal truth. The Right Approach to Argumentation -Validity is the strength of our conclusions. -When we talk about validity we are referring to the internal Consistency of an argument.
  • 8. Truth VS Validity How to recognize valid positions and finding most valid argument is the goal of a argumentation and critical thinking class Acquiring truth is not the goal of a course in argumentation and critical thinking Arguing validity promotes open-mindedness, encouraging constructive argumentation Arguing over truth promotes dogmatism, discouraging constructive argumentation Goal of validity is to find most valid argument, the most valid position can change as new info is found Based on self-esteem, Resolving truth arguments leads to a win or lose environment Threshold for validity is measured using the entire Continuum of Certainty Threshold of truth is measured by absolute certainty On any subject there can be many valid positions On any one subject there can be only one truth Internal consistency of an argument, conclusion reached is consistent with information used Complete accuracy, beyond doubt, dispute or debate
  • 9. THRESHOLD Threshold refers to the degree of validity on the Continuum of Certainty that the addvocate must demonstate before an audience will commit to a decision. -Each audience and individual person has a different “breakthrough point” at which they are convinced of a specific argument. THE CONTINUUM OF ARGUMENTATIVE CERTAINTY 0%------------25%------------50%------------75%------------100% Opinion Assertion Inference Fact
  • 10. The critical thinker should keep the following in mind when arguing outside the courtroom: -No two people necessarily have the same threshold on the same topics. -Audience adherence to a point of view is not possible until an advocate reaches the threshold of his or her target audience. -On some topics, people may have thresholds that cannot be reached at all. -Threshold will also vary depending on the topic. -Threshold is affected by both psychological and physiological conditions. -Threshold can be lowered.