Tuesday, March 19, 2013

SWA 4


         Neither my Facebook nor twitter feed is credible in my opinion. I do not use or follow many credible or reliable sources. My feeds do establish good character at time though. They also establish common ground with the audience. Overall, there is not much ethos because any and everybody can post what they please. It is sometimes difficult to filter out credible and inaccurate information.

        The article I chose to analyze is credible. I selected an article on the CNN website titled “U.S. Flies B-52s over South Korea”, written Brad Lendon. Brad establishes credibility by just writing for CNN. CNN is a reliable source for current events. Brad also interviews a credible source, a Pentagon spokesman. This too helps the ethos in his article. Lastly, Brad writes in detail about the U.S. Air Force and North and South Korea. He is not biased about what America is doing for defense. He simply writes this article based of facts, and other sources who are involved in keeping up with the activity between Korea and America.

        The second article I selected is from the ESPN website called “Heat Secure 23rd Straight Win despite Jeff Green’s 43-point Night” written by Garden.  Similar to the previous article I selected, this article also has ethos just because it is on the ESPN site. ESPN is known for keeping up with the most current sporting events. Garden interview’s LeBron James, Shane Battier, and the coach of the Miami Heat, Erik Spoelstra. He makes his article more credible by adding these inside sources because they actually were in the game. Garden gives a little background history about NBA team’s winning streaks, which also adds to the ethos.

        These different websites create different ethos because some of them are more credible than others. For example, a Facebook or twitter feed does not contain as much ethos as CNN. One may not believe something is credible until they see it on a trusteed reliable source or site. A person could have tweeted about the NBA basketball team, Miami Heat, winning their 23rd consecutive game, but not believe it until they have seen it on ESPN. The different websites also create different ethoses because the subjects vary.

        Ethos has much to do with a varying audience because each audience member may have much knowledge about the topic that is being argued. Therefore, they will know if the argument contains ethos or not. This could also alienate other audience members because they may not know much about a specific argument and understand what has ethos and what does not. 

Monday, March 4, 2013

ILP 7

1) Situated Logos
         The key piece of evidence in this article is how the Pentagon wants to increase the Defense Department’s Command. They want more than 4,000 people to be a part of the Cyber Command than the current 900. They would like to implement three different forces under the Cyber Command to ensure security on the Pentagon’s computer systems, including “national mission force”, which protects computer systems that support the nation’s power grid and critical infrastructure; “combat mission forces,” plans and executes attacks on adversaries; and “cyber protection forces,” which secures the Pentagons computer system. According to the Pentagon, the forces are important to decrease the vulnerability of foreign computer hackers.
            I do trust the Pentagon’s opinion on why we should increase the cyber security there. I think the evidence the writer provided was enough and could not have included any other kinds of evidence. The article included a proposal on what should be done about the Pentagon’s cyber security, why it should specifically be done, and then gave example on what could happen if cyber security is not increased and the tragic things that have already happened.

2) Invented Logos
          The text makes use of the evidence by providing many examples. The author writes that the United States may have been facing a possible “Cyber-Pearl Harbor” without the needed protection. Then later goes on to state that America could be in for a national catastrophe if more technological advances are made in China, Russia, Iran and militant groups and if we don’t have the right protection.
The reasoning for this is understood because of their use of cause and effect in the article. There is only one main kind of value system being presupposed. That is, the Cyber Command increasing at the Pentagon to protect America, even though it may mean cuts in other areas at the Pentagon. They believe it’s vital to stop against emerging war attacks form the Iran in cyberspace, dismantling of the nation’s grid, transportation systems, financial network and security. The logic of the arguments made in the text makes the author credible because he interviews worker from the Pentagon, and gives many current examples.

3) Invention
           A potential research project that comes to mind when pondering upon this article is one consisting of why cyber security is important, why it needs to be stronger, examples of what could and can happen if we do not tighten our protection, and examples/ events of how it already has affected us.  I would have a great amount of detail on my project, and spend most of my time looking at proposals; seeing which ones work best for America. The majority of the articles, that I have read, go into to detail about how we should protect our cyber systems. Some proposals differentiate from one another, while others have similar plans to protect. Cyber security is a great challenge for America, and will no way be an easy task to protecting our systems. First, engineers have to be on one accord and agree upon how to make cyberspace safer, and then actually go about implementing just that.