Monday, February 25, 2013

ILP 6


The Senate and Cyber security: Finding a Path Forward written by Nilmini Rubin is about the Senate passing a cyber-security bill.  The cyber-security bills that are being proposed are not up to par with what the Senate is looking for. Therefore, the senate will not approve.  The Information Technology Industry (ITI) has worked with Senators to help make an improved cyber-security structure for Americas that will protect individuals and the country as a whole. ITI has received positive feedback for the Senate and agree that the cyber-security bill should have a strong information sharing system that is adaptable to meet constant changing dangers (Rubin, paragraph 3). For this, the article, The Senate and Cyber security: Finding a Path Forward has two strong claims, definition and policy, and also shows the claim fact.
The article displays the claim definition through the stasis theory by stating the necessities in any cyber proposal. Understanding what should be included in a cyber-proposal makes it easier to shape one and makes it easier to get it approved by senate. The writer also shows the claim definition in the article by writing about the core principles and issues in building awareness and sharing information (Rubin, paragraph 4).  One really needs to have a full grasp of what cyber security is to make a credential proposal that lives up to the Senate’s standards; therefore, definition is important in this article.
The claim policy from the stasis theory is very strong in the article. The ITI goes into depth on what they think will improve cyber security in America. They believe that leveraging public-private partnerships and building upon existing initiatives and resource commitments will help (Rubin, paragraph 5). They also believe that being able to adapt rapidly to emerging threats, technologies, and business, will help as well. They also speak upon how the proposal should focus on awareness, bad actors and their threats.
Lastly, the article states a lot of facts. The claim facts adds ethos to the article. Rubin goes in detail of what  how cyber security protects against one’s name, address, social security, credit card information, and how these things represent 95 percent of all the data compromised by cyber intrusion (Rubin, paragraph 6). She the writes, “Criminals then use the data for identity theft, phishing campaigns, and other fraud.  New breeds of cybercriminals, hacktivists, and rogue nations have become adept at exploiting the vulnerabilities of our digital world, placing consumer information as well as private and government data and proprietary systems at risk (Rubin, paragraph 6).”

Work Cited
Rubin, Milmini G. "The Senate and Cybersecurity: Finding a Path Forward - ITI Blog." ITI Website. N.p., n.d. Web. 25 Feb. 2013.

Wednesday, February 20, 2013

SWA 3


I would like to do my English research paper on cyber defense. I think it would be interesting to research this topic because of the recent social security hacking in South Carolina. Securing cyberspace is an engineering grand challenge. As an engineering-major student, I think it would be amusing to pursue this topic to see what actions people are taking to make cyberspace safe. Personal privacy and national security in this century is hard to protect because of the modernized system-sets that are being used for cyberspace. Cyber defense is vital to America for protecting identities and keeping certain things confidential. Electronic information flow is now embedded in nearly every aspect of modern life, so the topic needs to be addressed. 

Monday, February 18, 2013

SWA 2

Always-On/ Always-On-You reaches more than one stage in the stasis theory. The first stage that this article reaches is fact. Sherry Turkle writes about the usage of mobile electronic devices increasing. They are literally “always on” and close to the owner of the device. Not only that, but most people consume more and more of their time on them, which is affecting public social skills. She writes, “for the most part, our everyday language for talking about technology’s effects assumes a life both on and off the screen; it assumes the existence of separate worlds, plugged and unplugged (Turkle 136).” She later goes on to explain how we spend so much time on the devices by communicating to people, being on web pages, voice-mail, games, and artificial intelligences (Turkle 136).
Another stage that this excerpt reaches is quality. From this writing, Turkle believes that the communication devices are becoming a serious issue. However, a reader can be unsure if this issue is a good or bad thing because she uses a device as well. But, she does state that “the self, now attached to it device, occupies a liminal space between the physical reals and lives on the screen (Turkel 137).” This writing would also be the quality stage because Turkle is talking about our society learning a new communication style of sending and receiving speedy messages. For this she is left wondering if we are taking our time with anything anymore.
               Lastly, I think this excerpt would be causal because Turkle is talking about the long term effects that communication devices may have on the society we live in. She gives examples of what we are doing with these devices and how they contribute to our everyday lives. She also writes how these acts are affecting our lives on a daily and the time we may be wasting with them “always on” and so close to us. She uses the example of how a train station is no longer a communal space, but a space of social collection; tethered selves come together, but do not speak to each other (Turkle 137).

Tuesday, February 12, 2013

ILP 4

  1. I should find articles that are from scholarly and credible sources. Some searching methods that would procure credible sources would be using online sources that one initially knew were credible, such as CNN, New York Times, or other news sources. Another method would we be using Google scholar or news. If one is unsure if the person who wrote the article is credible, one could try to look up some background information on the writer.
  2. I chose to analyze “Dissecting Twitter’s Role in Tech, Society, Politics” written by Edward F. Moltzen, from CRN, and “How Twitter Will Change the Way We Live” written Steven Johnson in the Times Magazine. I was able to identify the writes of both articles with ease. They both also had a time stamp on their work, which made them even more credible. I do not think the articles were peer reviewed by academics, but I know the publication of Time Magazine is known for its reliable information.  
  3. To research the topic, I simply typed in “twitter in the society” into Google and then proceeded to an advance search.  By doing this, I was able to put a limit on the sources I would receive via my search. This also increased the amount of credible sources I would be receiving. To find more reliable sources next time when researching, I would probably start by looking at online sources that I already knew were credible. Then I would probably do a search on Google scholar.


Monday, February 4, 2013

ILP 3: The Carolina Reader

“Organic Foods: Do Eco-Friendly Attitudes Predict Eco-Friendly Behaviors?” by Molly J. Dahm, Aurelia V. Samonte, and Amy R. Shows is an article written for the Journal of America College Health. This article is focusing on awareness, attitudes, and behaviors of university students towards organic foods (Dahm 333). The three writers are trying to prove there is association between the consumption of organic foods and other environmentally behaviors (Dahm 335). “Environmentally things” could range from recycling, energy conservation to carpooling or driving hybrid cars (Duhm 334). In order to prove their argument, they decide to sample and survey 443 political science major college students at a university in the southeastern part of the United States. They stated, “the sampling method ensured a representative sample of the student body (Dahm 336)."

After gathering a sample group, Dahm, Samonte, and Shows then issued surveys out to the students. The survey consisted of questions  about demographics, knowledge on organic food,  one’s attitude about organic food, eating behaviors, and behaviors regarding other eco-friendly behaviors. From the surveys taken, the writers were able to collect much data and display many results. They were able to determine statics about the university student who had taken the survey. Such as, race, age, gender, grade level, household annual income, if they were knowledgeable about organic foods, if one purchased organically grown food, and much more. Dahm, Samonte, and Shows were also able to construct tables, charts and graphs to display their results. 

Dahm, Samonte, and Shows were able to conclude from their experimentation that attitudes towards organic food was found to be suggestively linked to buying and consumption of organic food on campus, in restaurants and at home via multiple correlations they examined (Dahm 339).  They wrote, “attitude was found to be a significant predictor (p<.01) of all three behaviors (Dahm 339)”. They stated as well, “most students (56.4%) were neutral in their opinion about organic foods, but 41.3% either “accept organic foods” or “only eat organic foods”(Duham 338).” Through this article, Dahm, Samonte, and Shows were able to prove that there is an association between the consumption of organic foods and other environmentally behaviors. They wrote, “the respondents’ attitudes about an eco-friendly behavior such as recycling, energy, conservation were significantly related to supportive behaviors such as recycling, energy conservation, driving hybrid cars or carpooling, and ozone protection (Duham 340).”

Work Cited
Bauknight, Lee, and William W. Garland. Organic Foods:Do Eco-Friendly Attitudes Predict Eco-Friendly Behaviors? The Carolina Reader. Southlake, TX: Fountainhead, 2013. 333-44. Print.