Thursday, December 6, 2007

D16, WP3 Revisions

Jared Zucker

Mr. Devon Adams

English 102 – 7891

WP#3 Final Delete this for proper MLA formatting.

21 Nov. 2007.

Identity Theft

“The FTC estimates that as many as 9 million Americans have their identities stolen each year.” (Federal Trade Commission). Identity theft is a crime on the uprising and is growing larger by the year. Identity theft is a continuously escalating crime, perhaps some of you have been victims of it. In the early 90’s it was not too uncommon to get mugged walking down the street, having your driver’s license stolen, a couple of credit cards, or maybe even your Social Security Card if you were gutsy enough to carry that on you. In today’s society, this has gone even a step further. Identity theft over the Internet is vastly becoming one of our most common crimes. Family members of mine have been victims of identity theft, much like most of yours probably have been as well. What can the United States Federal Government put in place to aid in the fight of identity theft?

The only way to truly fight crime, is by putting in place some sort of restriction here and there to prevent the crime. This is where the true controversy comes into place. Some people would rather things such as the internet be practically on lockdown than have to really worry about crimes like identity theft over the internet. Others would rather the U.S. Government leave the internet alone because it is all a form of freedom of speech and should not be regulated. So, what should the U.S. Government do? This is where the controversy gets twisted and complicated.

“In December 2003, the Internet Fraud Complaint Center (IFCC) was renamed the Internet Crime Complaint Center (IC3) to better reflect the broad character of such criminal matters having a cyber (Internet) nexus. The 2006 Internet Crime Report is the sixth annual compilation of information on complaints received and referred by the IC3 to law enforcement or regulatory agencies for appropriate action. From January 1, 2006December 31, 2006, the IC3 website received 207,492 complaint submissions. This is a 10.4% decrease when compared to 2005 when 231,493 complaints were received. These filings were composed of fraudulent and non-fraudulent complaints primarily related to the Internet.” (IC3). According to the IC3, 4447 of those complaints were in Arizona alone in 2006. Two percent were identity theft alone. However, 71.1% of those reported a monetary loss, with a medium loss of $1374.19. Other crimes such as credit card fraud and check fraud had higher numbers, but usually have some sort of correlation with identity theft after excessive use.

Some people agree the government needs to step up and help fight the battle of identity theft over the Internet. However, there are also a group of people who think the government should be left out of the Internet all together because it is an invasion of their privacy. If the government steps in to protect the internet, they will have to protect more than just identity theft. For instance, if the government were to lockdown websites so they had to have a special key issued out by the government to be able to sell products online, this would pose a threat as to who is the one responsible for whether one business is truly more legit than another. According to YouDebate.com, “The First Amendment prevents the government from imposing, or from coercing industry into imposing, a mandatory Internet ratings scheme. Libraries are free speech zones. The First Amendment prevents the government, including public libraries, from mandating the use of user-based blocking software.” This means that Delete 'this means that' websites and such should not be philtered out which is one way the government could potentially help prevent identity theft over the Internet. There should be a higher standard to authorize merchants to sell products online. It should be tougher to retain an SSL (Secure-Socket-Layer) and have to be approved by some kind of government agency before you are allowed to sell your products over the Internet. Anyone can purchase an online store and be running within six hours, which is mainly the time it takes to setup the actual store, not the authorization side of it. This is unacceptable and just makes it that much easier to commit a crime of identity theft over the Internet.

One way to also help prevent identity theft in general, would be first for all credit cards to be required to be protected by a 4-8 digit pin number. This would help cut down the number of credit cards stolen and used just simply using a signature. People are always on the go and always want a quicker way to purchase something, proven by Visa’s new Express Pay where you just hover your card over the credit card processing machine and it automatically authorizes you. No signature or pin number needed for entry. With new technology like this, it only makes it that much easier to continue on with identity theft. The government has the power to help regulate things like this if they really wanted to.

A school I was doing a work study program through ended up getting burglarized in the middle of the night. They smashed the windows and stole the computers in the room. The computers that were stolen had all the personal information of many students involved in this program, I was one of them. My Social Security number was stolen, and now I have to have an ongoing fraud alert on my credit report. My brother-in-law was mugged in Los Angeles once, where his whole wallet was stolen. Ten years later, he has a maxed out credit card of $25,000 spent in a state he has never even been to, where the person even had a cell phone in his name. It took him over a year to get everything cleared out and to prove he had been a victim of identity theft. When my parents first moved out here, they also became victims. The investigation took almost three months, and during this time their checking account had to become frozen since that is where the theft was from. My father had direct deposit from his work, and with all his money in his checking account, he was left with nothing until his next pay day which could not be direct deposited because the account was frozen. You can see how this can create an instant hard ship and is never fun to go through. After the investigation the account was finally unfrozen and had to be moved over to a new account. Because of issues like these, the government needs a quicker way to authorize who is the true person. This gets complicated and cloudy because of the authenticity forged documents can attain. Maybe they do have the resources to quickly obtain who the true John Doe is but just not enough people to work through the long queue provided. One suggestion for the revision here would be to take out all of the personal anecdotes here. I would rewrite this to be a third person story instead of more of a first person.

LifeLock, a company that specializes in protecting identity theft, guarantees your identity and will reimbursement you up to one million dollars if you are a victim of identity theft while a client of theirs. They are so sure of themselves, the CEO puts his Social Security number all over moving vehicles and all over his website. Most of the ways they protect clients are steps everyone can take to prevent identity theft. They even list these methods and steps on their website, just comparing themselves to an oil change specialist. Why do it yourself when you can have someone do it for you? Todd Davis, the CEO, says you need to: set fraud alerts on your credit, be removed from those pre-approved credit cards and another junk mail, and order your annual credit report. These are all steps to follow to help protect you from identity theft. According to Davis, the pre-approved credit cards and other junk mail is the most common way identities are hijacked. Of course, the government could put these in place for everyone in America knowing that if you do not yourself you are very susceptible to identity theft. However, it seems doubtful they will do that.

Even though the controversy, I feel the government has to take action and step in. If we were to let the Internet not be regulated, we would have even more crimes than we do now, ones not even linked to identity theft. There is always a new story out about child molesters trying to meet new young girls online or something of that sort. If not for the government stepping in on situations like that, the number would be even greater. We need to have a happy median of the government getting involved but also staying back, however we are far from that point as of right now. Higher standards must be required by the government when allowing merchants to do ecommerce. In the end, like with everything, you are your most reliable source. You must follow the steps in preventing your own crime, becoming a victim of identity theft.


I would need to write more about the other argument. The majority of the paper was a little bias and leaned more to one side.

Works Cited:

“Annual Reports.” Internet Crime Complaint Center. 2007. IC3. 20 Sept. 2007

.

Davis, Todd, Jim Greener, and Chini Krishnan. "Identity Theft Protection." Lifelock. 2006. National Crime Prevention Council. 20 Sept. 2007 .

Desai, Jenny. "Tricksters Populate Our Internet Landscape." Science & Spirit 18.1 (2007): 65. Academic Search Premier. EBSCO. Mesa Community College, Mesa. 20 Sept. 2007.

.

FBI – Cybercrime. FBI. 2007. U.S. Federal Government. 3 Sept. 2007 .

"Internet Censorship Debate and Poll." YouDebate.com. 20 Oct 2007

.

Katel, Peter. "Identity Theft." CQ Researcher 15.22 (2005): 517-540. CQ Researcher Online. CQ Press. Mesa Community College Library, Mesa, AZ. 13 Sept. 2007 .

NCL’s National Fraud Information Center/Internet Fraud Watch. National Consumers League. 2007. National Consumers League. 3 Sept. 2007 .

D16, WP2 Revisions

Jared Zucker

Mr. Devon Adams

English 102 - 7891

10/25/2007 Change date to proper MLA, 6 Dec. 2007

I need to add a couple more sentences to each annotated bib. All the citations were done properly, I just did not write enough about each source.

WP#2 Final – Annotated Bibliography

My topic I am researching is identity theft, mainly focusing on the Internet. It will go over what the government can do to stop Internet crime, specifically identity theft. Some of the controversy comes into play because some do not want the government involved in the privacy settings of the Internet at all. Others think the government needs to step in more and have more rules and regulations when it comes to the Internet. This causes a big problem and becomes very controversial. Below are some of my sources I have been gathering for my research.

“Annual Reports.” Internet Crime Complaint Center. 2007. IC3. 20 Sept. 2007

.

This website has statistics about Internet crime right from the FBI, one of the best sources you can get it from. Not only does it give you statistics from previous years, but also current statistics which are sometimes hard to find. This will be a great asset when writing my paper because I will have some major statistics as part of my research.

Clark, Charles S. "Regulating the Internet." CQ Researcher 5.24 (1995): 561-584. CQ Researcher Online. CQ Press. Mesa Community College Library, Mesa, AZ. 13 Sept. 2007 .

This article was also found from the CQ Researcher within the MCC Online Library. This article talks about how if we as people can really regulate the Internet. The really good thing about this article is it is a little old (1995) so I can compare what we thought then and we have done to solve those situations, to what issues we have now and what we are doing to solve them.

Clemmitt, Marcia. "Controlling the Internet." CQ Researcher 16.18 (2006): 409-432. CQ Researcher Online. CQ Press. Mesa Community College Library, Mesa, AZ. 13 Sept. 2007 .

This article was found using the CQ Researcher, which is a resource from the MCC Online Library. This article is dedicated to whether we can control the Internet, going into the political aspect of it. This is important since I will be writing about Internet crime and what our government can do to help.

Collins, Judith M. Preventing Identity Theft in Your Business : How to Protect Your Business, Customers, and Employees. John Wiley & Sons, Incorporated, 2005. 27 Sept. 2007 .

This book is about preventing identity theft in your business. This will be a great resource when writing my final paper because I can see what is being done just by businesses to help prevent this. It will give me fresh ideas when brainstorming about different ways the government will be able to contribute in the fight against identity theft.

Davis, Todd, Jim Greener, and Chini Krishnan. "Identity Theft Protection." Lifelock. 2006. National Crime Prevention Council. 20 Sept. 2007 .

This is the website of a company who specializes in protecting your identity. They even have a commercial of Todd Davis, a CEO giving everybody his Social Security number, not worried about identity theft because his company’s system works. It is good to get a point of view from this side and find a company who is trying to help prevent Internet crimes, making the government’s job a little easier.

Desai, Jenny. "Tricksters Populate Our Internet Landscape." Science & Spirit 18.1 (2007): 65. Academic Search Premier. EBSCO. Mesa Community College, Mesa. 20 Sept. 2007.

.

This is a short article that talks about different scammers and people who were victims of identity fraud. This will help with my research paper because it offers different views that may be used as testimonials.

FBI – Cybercrime. FBI. 2007. U.S. Federal Government. 3 Sept. 2007 .

I found this using the regular Google search engine. This site is authoritative because it is on fbi.gov, which means it is a source funded and ran by the United States Government. This is a great website because it has different areas in which they help fight Internet crime. It also contains stories of investigations they’ve done and people they have caught that have committed a cyber crime. I will be able to use this source for facts about criminals pertaining to Internet crimes.

"Internet Censorship Debate and Poll." YouDebate.com. 20 Oct 2007

.

 
Although this source seems shady because it has a lack of author’s name and even a lack of publication for it, it can still be a valuable source.  It has a few pros and a few cons dealing with government interference and the internet.  Sometimes when you lean towards one way a lot more, it is hard to think of any pros to having the government control the Internet.  This source helps bring a few of those reasons to mind.

Katel, Peter. "Identity Theft." CQ Researcher 15.22 (2005): 517-540. CQ Researcher Online. CQ Press. Mesa Community College Library, Mesa, AZ. 13 Sept. 2007 .

I found this article from CQ Researcher, which is an online resource provided by the MCC Library. This article goes over identity theft, including some statistics and also by providing commentary on what the government can do. This is vital to my research project because it is exactly what I am writing about. How the U.S. Government can help fight Internet crime.

NCL’s National Fraud Information Center/Internet Fraud Watch. National Consumers League. 2007. National Consumers League. 3 Sept. 2007 .

I found this using the Google Web Directory. You can tell this site is pretty much legitimate because for one they have a number listed on their home page that you can call with questions. They are also powered by the National Consumers League. This is a great site because it contains a lot of statistics on Internet fraud which helps a lot with research. I will be able to use this for evidence to support my claims to show how bad of a crime identity theft really is.

Salkever, Alex. "A Key Weapon to Thwart Cybercrime." Business Week Online (2003). Military & Government. EBSCOhost. Mesa Community College, Mesa. 20 Sept. 2007.

.

This is a great website because it has brief stories about the FBI tracking down and fighting Internet crime. This helps because I can see what the government already does to protect against Internet crime. Using these recent stories, I can think of better ideas on how to fight against Internet crime.

Tynan, Dan. “THE INTERNET IS Sick…BUT WE CAN MAKE IT BETTER.” Popular Science (2006): 82-88. EBSCOhost Research Databases. Mesa Community College Library, Mesa, AZ. 13 Sept. 2007 .

This article was found through the MCC Online Library, as one of our other online databases. This article contains many statistics on many different Internet crimes, not all related to identity theft. It goes over how to help protect yourself and also why the criminals do what they do in the first place.

I realized with doing some of the research that the government is stepping in on identity theft. They are coming out with regulations to help websites become more secure, and also more noticeable as being secure so you know which websites are good and which are not. Also by doing this research, I found a company who actually specializes in keeping you from being a victim of identity theft. I did not know they had companies like that and so it will be very interesting to research them some more.

D16, WP1 Revisions

Jared Zucker

10/04/2007

WP#1 - Final [Would fix the header to be proper MLA format:]


Jared Zucker

Mr. Devon Adams

Eng 102-7891

6 Dec. 2007

Identity Theft

Identity theft is a continuously escalating crime, perhaps some of you have been victims of it. In the early 90’s it was not too delete "too" uncommon to get mugged walking down the street, having your driver’s license stolen, a couple of credit cards, or maybe even your Social Security Card if you were gutsy enough to carry that on you. In today’s society, this has gone even a step further; identity theft over the internet is vastly becoming one of our most common crimes. Family members of mine have been victims of identity theft, much like most of yours probably have been as well. Delete "My research question" My research question: What can the U.S. Federal Government put in place to aid in the fight of identity theft?

The only way to truly fight crime, is by putting in place some sort of restriction here and there. This is where the true controversy comes into place. Some people would rather things such as the internet be practically on lockdown than have to really worry about crimes like identity theft over the internet. Others would rather the U.S. Government leave the internet alone because it is all a form of freedom of speech and should not be regulated. So, what should the U.S. Government do? This is where the controversy gets twisted and complicated.

A school I was doing a work program through ended up getting burglarized in the middle of the night. They smashed the windows and stole the computers in the room. The computers that were stolen had all the personal information of many students involved in this program, I was one of them. My social security number was stolen, and now I have to have an ongoing fraud alert on my credit report. My brother-in-law was mugged in Los Angeles once, where his whole wallet was stolen. Ten years later, he has a maxed out credit card of $25,000 spent in a state he has never even been to, where the person even had a cell phone in his name. It took him over a year to get everything cleared out and to prove he had been a victim of identity theft. When my parents first moved out here, they also became victims. The investigation took almost three months, and during this time their checking account had to become frozen since that is where the theft was from. My father had direct deposit from his work, and with all his money in his checking account, he was left with nothing until his next pay day which could not be direct deposited because the account was frozen. You can see how this can create an instant hard ship and is never fun to go through. After the investigation the account was finally unfrozen and had to be moved over to a new account.

Even though the controversy, I feel the government has to take action and step in. If we were to let the internet not be regulated, we would have even more crimes than we do now, ones not even linked to identity theft. There is always a new story out about child molesters trying to meet new young girls online or something of that sort. If not for the government stepping in on situations like that, the number would be even greater. We need to have a happy median of the government getting involved but also staying back, however we are far from that point as of right now. My audience will be the U.S. Government, in hopes that they will be able to see what changes need to be taken care of so we can get closer to stopping these criminal acts.

As for the timeline, the annotated bibliography is due October 25th, with the actual research paper due November 22nd. Followed by that will be the portfolio containing all the main writings along with the weekly homework, which will be due December 13th.


What I would also need to change would be to add more proposal into this. Most of the content here was informational, rather than an actual research proposal for the upcoming WP3.

D16, Reflective Cover Letter

Jared Zucker

Mr. Devon Adams

Eng 102-7891

6 Dec. 2007

Reflective Cover Letter

Taking all the past deadlines into consideration, I can definitely show that my strength has a writer has done nothing but improve. I have learned a lot in this class, including organizational skills and being effective in research.

The first course outcome included writing “for specific rhetorical contexts”, which also included things like purpose and audience. In Deadline 3, Homework Assignment 3, I had to create a search plan for my ultimate research question. By doing this it helped me narrow down my audience and my topic.

The second course outcome included organizing my writing to support my main research question. Writing Project #2, the Annotated Bibliography, helped with this tremendously. It helped me organize all of my sources, especially for both sides of the argument. When writing Writing Project #3, it was easy to find a lot of great statistics and information to use in the project, due to Writing Project #2.

Having to use a proper tone, diction and grammar consistently was the third course outcome. Almost all of the writing assignments had key elements relating to each of those. Every grammar assignment helped work towards that, showing the growth of writing. For instance, I had a hard time with transitioning one paragraph to the next to keep a constant flow. Using The Owl at Purdue as one of my resources, I was able to learn how to make my paragraphs connect and link together better by writing better transitions.

The fourth, evaluating both online and print sources. I prefer online research much more than print sources, just because the ease of access and effectiveness of it. However, you can usually trust a book that is in a library and give it credibility. This is not the same for the Internet. You really have to examine the websites and online journals you are pulling research from, because it is not always valuable or truthful information. Writing Project #2, the Annotated Bibliography, is evidence of research I have conducted using the Internet, such as online databases, directories, and actual book research.

The fifth outcome was to integrate different sources to develop my own ideas. I was to do this by taking someone else’s writing and turning it into my own, like summarizing or paraphrasing. Throughout all of the reading reflections and different writing projects one can see my citations in MLA format. This can sometimes be difficult to do, especially when pulling a lot of statistics from one source, but I have definitely learned a lot about MLA format and plagiarism by Writing Project #3 alone.

Number six refers to using proper MLA-style formatting, which was the required format for this class. It was a little tricky for me at first, with citing my sources. However, by the time Writing Project 2, the Annotated Bibliography came around, I was able to cite all of my sources properly as proven by the instructor’s critique.

Peer reviewing was the seventh course outcome. I love peer reviewing, mostly because I love opinions and suggestions on my writing. I am no where near a perfect writer, and when I can get any input on my writing I really enjoy it, because I can only grow more as a writer from it. Comparing my drafts of my writing projects to the finals you can see the changes I made because of helpful peer reviewing.

We then had to assess our own strengths in writing, which was the eight outcome. Having the instructor critique my different writing projects, I was able to learn from my mistakes, especially with MLA formatting. Most of the corrections and/or suggestions always made to me were to fix my MLA. I think I definitely was able to grasp MLA a lot better thanks to all the feedback which helped me grow as a writer. In my different deadline and writing project reflections, I also show this and other areas of where I was improving.

Number nine was use technology to assist us with the entire class. Being in the technology field already, I was not too worried about this. However, after having to use some technology I never really touched on, like Google Docs, I was able to learn a lot. Google Docs is an amazing tool because of how you can distribute and share it to anyone, and its ability to handle live editing from each shared user. This is a great piece of technology and I plan to use it in the future, for both work and school as I progress.

Monday, December 3, 2007

D15, HW2, Peer Review

Peer reviewed: Kathy & Stephann

This time around it was a lot harder to peer edit. I think it has to do with people did grow a lot as a writer just from this class alone. The other thing is, because in this type of paper you can be very personal, it is also a little harder to peer edit. I did learn from peer reviewing and also from being peer reviewed I do need to link back to my blog. Before, I just was pointing out the different deadlines as evidence, but I do need to link to them to make it easier to understand. I think that everyone, including myself, has improved and grown as a writer looking back at the beginning of this class.

Thursday, November 29, 2007

D14, HW1, WP#4 Draft

Jared Zucker

Eng 102-7891

29 Nov. 2007

WP4 Draft

Reflective Cover Letter

Taking all the past deadlines into consideration, I can definitely show that my strength has a writer has done nothing but improve. I have learned a lot in this class, including organizational skills and being effective in research.

The first course outcome included writing “for specific rhetorical contexts”, which also included things like purpose and audience. In Deadline 3, Homework Assignment 3, I had to create a search plan for my ultimate research question. By doing this it helped me narrow down my audience and my topic.

The second course outcome included organizing my writing to support my main research question. Writing Project #2, the Annotated Bibliography helped with this tremendously. It helped me organize all of my sources, especially for both sides of the argument. I was able to brainstorm with ideas even while organizing all of these because I had such a plentiful amount of resources.

Having to use a proper tone, diction and grammar consistently was the third course outcome. Almost all of the writing assignments had key elements relating to each of those. Every grammar assignment helped work towards that, showing the growth of writing. For instance, I had a hard time with transitioning one paragraph to the next to keep a constant flow. Using The Owl at Purdue as one of my resources, I was able to learn how to make my paragraphs connect and link together better by writing better transitions.

The forth, evaluating both online and print sources. I prefer online research much more than print sources, just because the ease of access and effectiveness of it. However, you can usually trust a book that is in a library and give it credibility. This is not the same for the Internet. You really have to examine the websites and online journals you are puling research from, because it is not always valuable or truthful information. Writing Project #2, the Annotated Bibliography, is evidence of research I have conducted using the Internet, such as online databases and directories, and also actual book research.

The fifth outcome was to integrate different sources to develop my own ideas. I was to do this by taking someone else’s writing and turning it into my own, like summarizing or paraphrasing. Throughout all of the reading reflections and different writing projects one can see my citations in MLA format. This can sometimes be difficult to do, especially when pulling a lot of statistics from one source, but I have definitely learned a lot about MLA format and plagiarism by Writing Project #3 alone.

Number six refers to using proper MLA-style formatting, which was the required format for this class. It was a little tricky for me at first, with citing my sources. However, by the time Writing Project 2, the Annotated Bibliography came around, I was able to cite all of my sources properly as proven by the instructor’s critique.

Peer reviewing was the seventh course outcome. I love peer reviewing, mostly because I love opinions and suggestions on my writing. I am no where near a perfect writer, and when I can get any input on my writing I really enjoy it, because I can only grow more as a writer from it. Comparing my drafts of my writing projects to the finals you can see the changes I made because of helpful peer reviewing.

We then had to assess our own strengths in writing, which was the eight outcome. Having the instructor critique my different writing projects, I was able to learn from my mistakes, especially with MLA formatting. Most of the corrections and/or suggestions always made to me were to fix my MLA. I think I definitely was able to grasp MLA a lot better thanks to all the feedback which helped me grow as a writer. In my different deadline and writing project reflections, I also show this and other areas of where I was improving.

Number nine was use technology to assist us with the entire class. Being in the technology field already, I was not too worried about this. However, after having to use some technology I never really touched on, like Google Docs, I was able to learn a lot. Google Docs is an amazing tool because of how you can distribute and share it to anyone, and its ability to handle live editing from each shared user. This is a great piece of technology and I plan to use it in the future, for both work and school as I progress.

Wednesday, November 21, 2007

D13, HW7, Deadline Reflection

This week was a little easier, just having the main focus on the final touches on the paper. No one peer reviewed my essay which is one thing I wish would have happened..I like peer editing and enjoy criticism on my writing, because fresh ideas are always a great touch. I look forward to completing WP4 as well.

http://laceyariz.blogspot.com - Kathy, D13, HW7, Deadline Reflection | D13, HW3, Writing Reflection

http://ktmdude88.blogspot.com - Mike, D13, HW3, Writing Reflection | D13, HW7, Deadline Reflection

http://sparizek-armywife.blogspot.com - Stephann - D13, HW3, Writing Reflection

D13, HW3, Writing Reflection

The steps I took to complete this project was mainly research! I did a lot of research to come up with a lot of good sources to write a well-rounded paper, avoiding the bias opinions. I found out a lot of interesting statistics as well. Large-scale revisions was also another step taken to complete this project. I would like to have more peer reviews however. I think they are very helpful and maybe having some peer editing on the intro and conclusion separately would be helpful. I am definitely proud of the amount of time and effort put into the entire project. I have never really worked on one project so long, with all of the research and such. I really learned a lot with research in general and look forward to implying these later on. I really worked on trying to link the different paragraphs together better, using more transitions.

D13, HW2, Turnitin

Submitted.

Monday, November 19, 2007

D13, HW4, Writing Project Reflections

The writing reflections help with summarizing the entire process in completing that specific writing project. By looking at the different reflections I can see not only how I advanced in my projects, but also my growth in different areas, like research and actual writing. Using these reflections, I can create a strategy to continue my advancement in research and writing, which can all be placed into my final reflection.

D13, HW6, Deadline Reflections

The deadline reflections are helpful because it really gives an entire capture on that week's deadline. Using these from day 1 to now, it will show my progression and room for improvement in overall projects. For instance, I usually talk about how much I procrastinated, so I know that that is an issue when looking at all of them in whole. That can be used in a strategy to help my current growth and improvement.

D13, HW5, Reading Reflections

Since the final reflection letter needs to be about progress and growth, taking a look at past writings and to the most present will help me develop a strategy to improve further. I will be able to see how well I have progressed, if any at all, and to make sure I continue progressing.

D13, HW1, Grammar Assignment

I chose to learn more about hyphens from The Owl at Purdue. I learned a few things I did not know about them, for instance, you "use a hyphen to join two or more words serving as a single adjective before a noun." Using this, I revised 2 paragraphs adding hyphens when possible. Some places that could have used one though, I still did not because I did not want to have an overkill.

According to the IC3, 4447 of those complaints were in Arizona alone in 2006. Two-percent were identity-theft alone. However, 71.1% of those reported a monetary-loss, with a medium-loss of $1374.19. Other crimes such as credit card fraud and check fraud had higher numbers, but usually have some sort of correlation with identity-theft after excessive use.

Some agree the government needs to step-up and help fight the battle of identity-theft over the Internet. However, there are also a group of people who think the government should be left out of the Internet all together because it is an invasion of their privacy. If the government steps in to protect the internet, they will have to protect more than just identity-theft. For instance, if the government were to lock-down websites so they had to have a special key issued out by the government to be able to sell products online, this would pose a threat as to who is the one responsible for whether one business is truly more legit than another.

Thursday, November 15, 2007

D12, HW9, Deadline Reflection

There was a lot work this week so I was kept busy. The larger revisions helped a lot and I think I definitely am making my paper stronger, much stronger than it was. Reviewing other's papers made me realize how important proofing was and I do not do it as often or as thorough as I should.

http://laceyariz.blogspot.com - Kathy - D12, HW6, Page Layout
http://camlunamcc.blogspot.com - Cam - D12, HW7 / D12, HW8, Peer Reflection
http://harding302.blogspot.com - Coralee - D12, HW8, Peer Review Reflection
http://sparizek-armywife.blogspot.com - Stephann - D12, HW6, Page Layout

D12, HW8, Peer Review Reflection

Peer reviewed: Kathy & Paulette

I learned that it is highly important to proof read my work before I finish. In some of the papers I found many mistakes, not only in spelling and grammar, but sentences that did not even look like sentences and had weird citations mixed in with the paragraphs. It is easy to tell on others who put more effort into a paper, and with your own you always think you put a lot of effort into and someone else may disagree. No one has proofed my paper yet but I hope it is noticeable that I did put effort and work into mine.

Monday, November 12, 2007

D12, HW4, Style in Argument

Section1

I think word choice was very critical in in my 3rd paragraph, which talks about IC3 and all of the statistics they had on identity theft. It is very crucial because I often find that when quoting numbers like that, it feels hard to not commit some sort of plagiarism by accident. So, I find this one of the most creative times because you really have to be careful.

Section 2

This will have to relate back to Section 1. Plagiarism can happen very easily even when trying to give credit to the original source. With statistics, it always seems like there is not many ways to approach it, so you have to make sure word choice and sentence structure are both properly in place.

Section 3

In the paragraph that talks about LifeLock, I have a list going on and I used a colon right before the list. I did this to make it more noticeable it is a list and also to be hopefully be more effective because it is almost like a check list.

D12, HW5, Figurative Language

If I was to use a more figurative approach, I would probably focus on similes. I find them very useful because it can help the audience relate to something if they are not sure what it is. For instance, "Having your identity stole and your bank account frozen because of it, is like seeing your friend get your favorite bike and you can't afford it." It is not that great of an analogy but it helps get the point across, and maybe even adds in a little humor...maybe..

D12, HW6, Page Layout

In Chapter 16 or The Bedford Researcher, it talked about the important of layout design and the role it can partake in with your audience. One change would better facilitate the reading would be graphs. I used a lot of statistics and numbers in my report and I think a graphic would definitely make it easier to read and actually maybe make it hit home more about how high these numbers really are.

D12, HW3, More Revisions

Posted 3rd draft and analysis to go with it:

http://jmzucker.blogspot.com/2007/11/d10-hw3-wp3-draft.html

D12, HW2, Revisions

Posted 2nd draft and analysis to go with it:

http://jmzucker.blogspot.com/2007/11/d10-hw3-wp3-draft.html

D12, HW1, Reading Reflection

In Chapter 15 on page 189 of The Bedford Researcher, it gives you a basic list with a description of how to revise your paper. It is much similar to some of the steps needed in this week's deadline. On page 203 it tells you what are the important parts of your paper and what you should focus on when revising, like spellings of every name and checking facts. In Chapter 16 on page 210-211 it explains how important design is. Your audience when reading through multiple pages expect to see some kind of navigation, like page numbers, etc. However, a lot of this text about design in this chapter would seem more appropriate when doing something with pictures, like a newspaper article. In Chapter 12 of Everything's an Argument, it goes over the power of punctuation on page 375. They say even a semicolon is powerful, as noted by Mary Gordon. On page 389 they are showing many quotes from both fictional and nonfictional characters. This is interesting because you are able to see many different types of style in this section.

Thursday, November 8, 2007

D11, HW1, Reading Reflection

In Chapter 12 i goes over different ways to construct an introduction and a paragraph. These are on pages 163-165 and 170-172. I found these very helpful and was really able to apply it well to my research paper. In Chapter 14 on page 189 it explains what plagiarism is, including some examples. The whole chapter is based on plagiarism, and explains how you can avoid it. It has some resourceful information, such as what is considered common knowledge and fair. Chapter 18, page 244 it gives examples on how to cite sources within the text of your writings.

D11, HW3, Deadline Reflection

This week was a little less strenuous so that was a plus. Reading chapter 12 and doing the exercise about writing 2 new introductions/conclusions helped out and I think I revised them to be much better than the original.

http://laceyariz.blogspot.com - Kathy - D11, HW2, Intros/Conclusions

http://winterjustin88.blogspot.com - Justin - D11, HW3, Deadline Reflection

http://sparizek-armywife.blogspot.com - Stephann - D11, HW3, Deadline Reflection

D11, HW2, Constructing introductions & conclusions

Introductions

James, my brother-in-law was walking down the streets of Orange County on a nice cool night. As he is walking he is suddenly grabbed by the neck, shoved to the nearest wall face first, with a gun to the back of his head. The robber demanded James’ wallet in exchange for his life. James eagerly gave up the wallet and was left alone. After calling the police and having his credit cards canceled, he thought he was okay. Nonetheless, ten years later he gets denied credit approval through a bank, and found out he had been a victim of identity theft. He had a mysterious maxed out credit card of $25,000 and even a P.O. Box and cell phone registered in his name. Have you or have you known someone who has been a victim of identity theft? We need some kind of better system to help protect one from being a victim in the escalating crime of identity theft. What can the United States Federal Government put in place to aid in the fight of identity theft?

“The FTC estimates that as many as 9 million Americans have their identities stolen each year.” (Federal Trade Commission). Identity theft is a crime on the uprising and is growing larger by the year. Perhaps you yourself are apart of this statistic, or know someone who has been a victim. It can be an extremely rigorous process mentally and physically to go through. Your funds can be frozen and the agony of trying to prove you are the real John Doe seems to never be as easy as it should be. Many of these crimes are being committed over the Internet. The United States Government can definitely give out a helping hand to start decreasing this number. However, what can the United States Federal Government put in place to aid in the fight of identity theft?


Conclusions

James eventually was able to get the situation cleared up with police after several months and the person was apprehended. However, the agony he had to go through to get his name cleared was not a fun nor simple task. If a better system were to have been in place to either identity James as the real person, or stop the crime from being so easily committed in the first place, he might have been able to be spared from the evils of identity theft. Hopefully with some of the new third party companies rising up to help in identity theft, and the government stepping in we will start to see a decrease in the numbers of yearly identity thefts.

With identity theft continuing on it’s path up, the government it seems the government and third party companies are stepping in to help fight. With the combination of what everyone can do to protect themselves, along with what the government and these other companies can do, I believe there will be a shift sometime soon to where we start to see the numbers be much lower, pertaining to identity theft. However, how much can the government really do without compromising some of our rights, like freedom?

Thursday, November 1, 2007

D10, HW5, Paragraph Revision

I was sort of confused by this assignment, because I felt most of my paragraphs incorporated this already..however, I'll give it a shot!

According to the IC3, 4447 of those complaints were in Arizona alone in 2006. Two percent were identity theft alone, as stated by IC3. However, 71.1% of those reported a monetary loss, with a medium loss of $1374.19. Other crimes such as credit card fraud and check fraud had higher numbers, but usually have some sort of correlation with identity theft after excessive use. (IC3).


All of the bibliography information is in WP3.

D10, HW2, Annotated Bibliography

Gage, Debbie. "Should the Government Regulate Internet Security?" FINDARTICLES (2004). 1 Nov. 2007 .

This site goes into detail about internet security and government's role in all of it. It goes into say how people do not code programs to be as secure as they should be, and the government is part to blame. This source will be great for an opposing view for my research paper.

Hands Off the Internet
. 09 Oct. 2007. 1 Nov. 2007 .

This site is dedicated to saving the internet, not letting the government becoming involved. It has many facts and affiliations with other websites dealing with the same idea. This is going to help out a lot with the final version of my research paper because this offers another view at keeping the government out of our internet.

D10, HW3, WP3 Draft

Jared Zucker
Mr. Devon Adams
English 102 – 7891
WP#3 Draft
11/01/2007

Identity Theft

Identity theft is a continuously escalating crime, perhaps some of you have been victims of it. In the early 90’s it was not too uncommon to get mugged walking down the street, having your driver’s license stolen, a couple of credit cards, or maybe even your Social Security Card if you were gutsy enough to carry that on you. In today’s society, this has gone even a step further. Identity theft over the Internet is vastly becoming one of our most common crimes. Family members of mine have been victims of identity theft, much like most of yours probably have been as well. What can the United States Federal Government put in place to aid in the fight of identity theft?

The only way to truly fight crime, is by putting in place some sort of restriction here and there to prevent the crime. This is where the true controversy comes into place. Some people would rather things such as the internet be practically on lockdown than have to really worry about crimes like identity theft over the internet. Others would rather the U.S. Government leave the internet alone because it is all a form of freedom of speech and should not be regulated. So, what should the U.S. Government do? This is where the controversy gets twisted and complicated.

“In December 2003, the Internet Fraud Complaint Center (IFCC) was renamed the Internet Crime Complaint Center (IC3) to better reflect the broad character of such criminal matters having a cyber (Internet) nexus. The 2006 Internet Crime Report is the sixth annual compilation of information on complaints received and referred by the IC3 to law enforcement or regulatory agencies for appropriate action. From January 1, 2006 – December 31, 2006, the IC3 website received 207,492 complaint submissions. This is a 10.4% decrease when compared to 2005 when 231,493 complaints were received. These filings were composed of fraudulent and non-fraudulent complaints primarily related to the Internet.” (IC3). According to the IC3, 4447 of those complaints were in Arizona alone in 2006. Two percent were identity theft alone. However, 71.1% of those reported a monetary loss, with a medium loss of $1374.19. Other crimes such as credit card fraud and check fraud had higher numbers, but usually have some sort of correlation with identity theft after excessive use.

Some agree the government needs to step up and help fight the battle of identity theft over the Internet. However, there are also a group of people who think the government should be left out of the Internet all together because it is an invasion of their privacy. If the government steps in to protect the internet, they will have to protect more than just identity theft. For instance, if the government were to lockdown websites so they had to have a special key issued out by the government to be able to sell products online, this would pose a threat as to who is the one responsible for whether one business is truly more legit than another. According to YouDebate.com, “The First Amendment prevents the government from imposing, or from coercing industry into imposing, a mandatory Internet ratings scheme. Libraries are free speech zones. The First Amendment prevents the government, including public libraries, from mandating the use of user-based blocking software.” This means that websites and such should not be philtered out which is one way the government could potentially help prevent identity theft over the Internet. There should be a higher standard to authorize merchants to sell products online. It should be tougher to retain an SSL (Secure-Socket-Layer) and have to be approved by some kind of government agency before you are allowed to sell your products over the Internet. Anyone can purchase an online store and be running within six hours, which is mainly the time it takes to setup the actual store, not the authorization side of it. This is unacceptable and just makes it that much easier to commit a crime of identity theft over the Internet.

One way to also help prevent identity theft in general, would be first for all credit cards to be required to be protected by a 4-8 digit pin number. This would help cut down the number of credit cards stolen and used just simply using a signature. People are always on the go and always want a quicker way to purchase something, proven by Visa’s new Express Pay where you just hover your card over the credit card processing machine and it automatically authorizes you. No signature or pin number needed for entry. With new technology like this, it only makes it that much easier to continue on with identity theft. The government has the power to help regulate things like this if they really wanted to.

A school I was doing a work study program through ended up getting burglarized in the middle of the night. They smashed the windows and stole the computers in the room. The computers that were stolen had all the personal information of many students involved in this program, I was one of them. My Social Security number was stolen, and now I have to have an ongoing fraud alert on my credit report. My brother-in-law was mugged in Los Angeles once, where his whole wallet was stolen. Ten years later, he has a maxed out credit card of $25,000 spent in a state he has never even been to, where the person even had a cell phone in his name. It took him over a year to get everything cleared out and to prove he had been a victim of identity theft. When my parents first moved out here, they also became victims. The investigation took almost three months, and during this time their checking account had to become frozen since that is where the theft was from. My father had direct deposit from his work, and with all his money in his checking account, he was left with nothing until his next pay day which could not be direct deposited because the account was frozen. You can see how this can create an instant hard ship and is never fun to go through. After the investigation the account was finally unfrozen and had to be moved over to a new account. Because of issues like these, the government needs a quicker way to authorize who is the true person. This gets complicated and cloudy because of the authenticity forged documents can attain. Maybe they do have the resources to quickly obtain who the true John Doe is but just not enough people to work through the long queue provided.

LifeLock, a company that specializes in protecting identity theft, guarantees your identity and will reimbursement you up to one million dollars if you are a victim of identity theft while a client of theirs. They are so sure of themselves, the CEO puts his Social Security number all over moving vehicles and all over his website. Most of the ways they protect clients are steps everyone can take to prevent identity theft. They even list these methods and steps on their website, just comparing themselves to an oil change specialist. Why do it yourself when you can have someone do it for you? Todd Davis, the CEO, says you need to: set fraud alerts on your credit, be removed from those pre-approved credit cards and another junk mail, and order your annual credit report. These are all steps to follow to help protect you from identity theft. According to Davis, the pre-approved credit cards and other junk mail is the most common way identities are hijacked. Of course, the government could put these in place for everyone in America knowing that if you do not yourself you are very susceptible to identity theft. However, it seems doubtful they will do that.

Even though the controversy, I feel the government has to take action and step in. If we were to let the Internet not be regulated, we would have even more crimes than we do now, ones not even linked to identity theft. There is always a new story out about child molesters trying to meet new young girls online or something of that sort. If not for the government stepping in on situations like that, the number would be even greater. We need to have a happy median of the government getting involved but also staying back, however we are far from that point as of right now. Higher standards must be required by the government when allowing merchants to do ecommerce. In the end, like with everything, you are your most reliable source. You must follow the steps in preventing your own crime, becoming a victim of identity theft.


Works Cited:

“Annual Reports.” Internet Crime Complaint Center. 2007. IC3. 20 Sept. 2007

.

Davis, Todd, Jim Greener, and Chini Krishnan. "Identity Theft Protection." Lifelock. 2006. National Crime Prevention Council. 20 Sept. 2007 .

Desai, Jenny. "Tricksters Populate Our Internet Landscape." Science & Spirit 18.1 (2007): 65. Academic Search Premier. EBSCO. Mesa Community College, Mesa. 20 Sept. 2007.

.

FBI – Cybercrime. FBI. 2007. U.S. Federal Government. 3 Sept. 2007 .

"Internet Censorship Debate and Poll." YouDebate.com. 20 Oct 2007

.

Katel, Peter. "Identity Theft." CQ Researcher 15.22 (2005): 517-540. CQ Researcher Online. CQ Press. Mesa Community College Library, Mesa, AZ. 13 Sept. 2007 .

NCL’s National Fraud Information Center/Internet Fraud Watch. National Consumers League. 2007. National Consumers League. 3 Sept. 2007 .

D10, HW4, Turnitin

Not required.

D10, HW7, Deadline Reflection

I could only post on one person's essay analysis because only one had person had done it so far. This week seemed like sort of a lot of work with the fact of having to do the research paper this week as well. HW5 was a little confusing to me so I wasn't really sure how to redo 2 of my paragraphs.

I posted on these blogs:
http://teufelheunden.blogspot.com - Alex - D9HW4 Outline

http://laceyariz.blogspot.com - Kathy - D#10,HW#5 Paragraphs

D10, HW1, Reading Reflection

In Everything’s an Argument, in Chapter 10 on page 297-299 they give you examples of how to really develop a casual argument. They go into detail on how cause and effect works, for example on page 288 it shows how you can switch them all around. On page 308 it gives examples of different casual arguments so you can compare. With Chapter 11, it is all about proposals. On page 335 it explains to even have a proposal in the first place, you will to ‘make a proposal to solve a problem or prevent one.’ This is crucial to making the proposal work properly.

Thursday, October 25, 2007

D9, HW7, Deadline Reflection

This week was a little tougher for me with all the outlines and also having to go through and double check my annotated bibliography. I learned if I spend more time with it the first time, I won't have to spend as much time with it during the revision.

http://laceyariz.blogspot.com/ - Kathy - D#9,HW#6 Outline, D#9,HW#4 Toulmin outline

http://sparizek-armywife.blogspot.com/ - Stephann - D9HW7 Deadline reflection, D9HW4 Out-line

D9, HW6, Outline

Intro:
To see what the U.S. Government can do to help prevent identity theft via the Internet.

Section 1:
Discuss what the government can do to prevent identity theft via Internet, if they should be allowed to at all.

Section 2:
Discuss if the government should be allowed to interfere with the Internet or whether they should have no say in it at all.

Section 3:
Discuss what is already being done to help prevent identity theft to get a better idea of what they can do for future improvements.

Conclusion:
This will be tying everything together on what the government already does or what they can do to help prevent identity theft better than what is already in place.

D9, HW5, Cluster

Some major hubs:

What the government can do to prevent identity theft
If the government should be allowed to interfere with the Internet
What is already being done to help prevent identity theft

This activity was very useful because it helped me lay out all me ideas on paper and really get a feel for what I will be writing about. I was able to brain storm ideas and key points to get a more clear understanding of what I will need to write about.

D9, HW3, Writing Reflection

I did a lot of searching using the internet to complete this task. I searched for different sources to help me for my final research paper. These sources will help me back up my different points with evidence and also provide me with different views based around my research project. After doing the research with these sources I had to properly cite them using MLA format and combined everything into one MLA style annotated bibliography. If I were to complete this project again, I would have taken more time originally citing the sources to make sure everything was properly done with the citing. I had to spend a lot of time double checking my sources and making correction. Getting this done in the beginning would have made this step of the process much more painless. I am proud that I was able to find so many sources revolving around my topic. I never had to do a lot of research for any assignment before, so this helped me really dig deep on the internet for different sources. If I had more time I would have really liked to find more sources that support government control of the internet, and also spend more time with my annotations. I feel I definitely improved on understanding MLA, with the research I had to do on properly citing for MLA. I definitely need to put more time into the rough draft so I do not have as many edits later on for the final draft.

D9, HW4, Toulmin method outline

Project's Claim: The U.S. Government needs to do more to help stop identity theft over the Internet.

Reason #1: It is one of the leading Internet crimes.
Warrant/Principle: No one wants to be victims of identity theft.
Backing: No one would disagree with this.

Evidence #1: FBI statistics have these numbers reported.
Warrant/Principle: People trust numbers provided by the FBI
Backing: The FBI is pretty much as high as it goes, if you can't trust them with the numbers you can't trust anybody.

Evidence #2: It messes up a lot of people's financial situation.
Warrant/Principle: When a victim of identity theft, they usually freeze your bank account not allowing any access to it, which can be a big financial burden.

Backing: Testimonials can show this.
Objection: Testimonials can be forged.
Rebuttal: So can pretty much anything, but with most people knowing at least one person who has been a victim of identity theft they can relate.


Reason #2: It affects society as a whole, which can eventually be an issue with inflation.

Evidence #1: With people's bank accounts being frozen, they can not buy as much of other stuff and when enough people are victims it will start to hurt the economy.
Warrant/Principle: When a victim of identity theft, they usually freeze your bank account not allowing any access to it.


Evidence #2: If the government does not step in, it could be a way for terrorists to mess with our economy as well.
Backing: With this happening it also backs the point in Reason 2 Evidence 1 more.

Wednesday, October 24, 2007

D9, HW1, Reading Reflection

In Chapter 7, of Everything’s an Argument it has a really good section on how to organize your arguments. This is on page 199 and has a 9 point list on different things to be aware of when organizing, such as if your transitions are strong enough. In Chapter 17 on page 505 it talks about the “Flashpoints of Logical Arguments,” which is interesting because it explains how every argument that has a flaw there can be a flashpoint within the argument. In Chapter 11 of The Bedford Researcher it talks about help with organizing and outlining a research project. On page 151 it goes over what type of outline you should create and even on how to create an informal outline.

Thursday, October 18, 2007

D8, HW4, The Case against Coldplay

Jon Pareles, the author of the essay "The Case against Coldplay" gave a very critiquing review about the band Coldplay. Although he does mention some of Coldplay's good qualities and recognizes them as a band, he has no respect for them. At one point, he says the singer, Mr. Martin sounds 'somewhere between a yodel and a hiccup.' His audience could be the band itself, cover bands of Coldplay, fans of Coldplay, people who hate Coldplay, or anyone even thinking of listening to Coldplay. He wants it to be known that Coldplay is a terrible band. It is obvious that Pareles had negative thoughts about the band before writing the review. Sometimes it is not fair to the band getting reviewed by someone who already dislikes you. I would think it would be more fair to have someone more neutral to the band to not get such a bias view towards their music. On the contrary, Pareles is a well-respected journalist, graduating from Yale University and working for Rolling Stone Magazine, and now the New York Times, so he definitely has a background to give him the right to critique as much as he has done.

D8, HW6, Deadline Reflection

http://teufelheunden.blogspot.com - Alex - D8HW2 and 5 Peer Review/Grammar Assignment

http://teufelheunden.blogspot.com - Alex - D8HW4 Case Against Coldplay

http://camlunamcc.blogspot.com - Cam D8HW2 Peer Review and D8HW4 The Case against Coldplay

http://laceyariz.blogspot.com - Kathy - D8HW6, Deadline Reflection

The suggestions made for my annotated bibliography will definitely help me when I go to do the final version. From these suggestions I learned I need to tweak my MLA formatting a bit more, and also add a source or two for my opposing side.

D8, HW3, Peer Review Reflection

Kathleen peer reviewed my annotated bibliography. I agree with her edits and suggestions. One suggestion she made was to make sure I get a source pertaining to government control with the internet. I peer reviewed Tara and Coralee. What I learned from peer reviewing these two are to make sure I put the time and effort into the projects that they deserve. Sometimes it is easy for others to spot work that seems like it was just thrown together, and then it is also easy to see the ones who really spent time to complete their projects almost flawlessly.

Monday, October 15, 2007

D8, HW1, Reading Reflection

In Everything’s an Argument, in chapter 5 on page 105 it talks about how to really break down your paper and to focus on a few rhetorical questions. It also wants you to make sure you can “show how the key devices in argument actually make it succeed or fail.” In chapter 6 on page 147, the book goes into explaining the Toulmin Argument, which was started by Stephen Toulmin in The Uses of Argument (1958). Toulmin was a British philosopher who “described the way people make convincing and reasonable arguments.” Toulmin has become a very popular method and logic for help with arguments in the real world.

Thursday, October 11, 2007

D7, HW2 Annotated Bibliography

Antonopoulos, Andreas. "The Black Market for Identity Theft." Editorial. Network World 17 Sept.-Oct. 2007: 42. This source seems like it will be pretty good and will also help give me a little bit different view on identity theft. This article covers how identity theft affects the black market, which helps in raising the crime level directed towards identity theft.

David, Fay W. "Protecting Yourself From Identity Theft." Inside Tucson Business 17 (2007): 24. MasterFILE Premier. EBSCO. Mesa Community College, Mesa. 11 Oct. 2007. Keyword: identity theft. This article is a nice prevention article on how to protect yourself from identity theft. This will be a great help when writing about what the government can do to help protect people from identity theft because I can get an idea on what is already out there to help protect people.

Emeagwali, Susan N. "Identity Theft: Protect Yourself." Techniques: Connecting Education & Careers 82 (2007): 60. MasterFILE Premier. EBSCO. Mesa Community College, Mesa. 11 Oct. 2007. Keyword: identity theft. This article is a nice prevention article on how to protect yourself from identity theft. This will be a great help when writing about what the government can do to help protect people from identity theft because I can get an idea on what is already out there to help protect people.

D7, HW5, Deadline Reflection

This week was a little easier for me to keep up with since the deadlines were a little less and not having class. I learned through the readings how important it is to make sure you supply a lot of evidence and make sure you keep the same voice throughout the paper.

Alex - D7, HW5 Deadline Reflection
Alex - D7, HW3 Annotated Bib Draft
Kathy - D7, HW5 Deadline Reflection
Tara - D7, HW1 Reading Reflection
Coralee - D7, HW1 Reading Reflection

D7, HW1, Reading Reflection

In Chapter 2, on page 56 of the book, Everything's an Arguement, they talk about using humor when presenting an argument. One of the statements they said that I thought was good, was that nobody says "no" when they are laughing. When I was trying to compare it to a lot of real life scenarios, it really is true. In Chapter 3, on page 69 it explains how important creditability of the author is. The statements you bring up in your writing must be supported by lots of evidence and facts, especially if not a too-well-known author where everything you say will be put under the microscope.

Monday, October 8, 2007

D7, HW3, WP#2 Annotated Bibliography Draft

Jared Zucker

Eng 102 – 7891

10-11-2007

WP#2 Draft

My topic I am researching is identity theft, mainly focusing on the internet. It will go over what the government can do to stop internet crime, like identity theft. Some of the controversy comes into play because some do not want the government involved on the internet at all. Others, think the government needs to step in more and have more rules and regulations when it comes to the internet. This causes a big problem and becomes very controversial. Below are some of my sources I have been gathering for my research.

“Annual Reports.” Internet Crime Complaint Center. 2007. IC3. 20 Sept. 2007

<http://www.ic3.gov/media/annualreports.aspx>

This website has statistics about internet crime right from the FBI, one of the best sources you can get it from. Not only does it give you stats from years ago, but also current statistics which is sometimes hard to find. This will be a great asset when writing my paper because I will have some major statistics as part of my research.

Salkever, Alex. "A Key Weapon to Thwart Cybercrime." Business Week Online (2003). Military & Government. EBSCOhost. Mesa Community College, Mesa. 20 Sept. 2007.

Keyword: internet crime. This is a great website because it has brief stories about the FBI tracking down and fighting internet crime. This helps because I can see what the government already does to protect against internet crime, to think of better ideas on how to fight against it.

Desai, Jenny. "Tricksters Populate Our Internet Landscape." Science & Spirit 18.1 (2007): 65. Academic Search Premier. EBSCO. Mesa Community College, Mesa. 20 Sept. 2007.

<http://web.ebscohost.com.ezp.mc.maricopa.edu/ehost/detail?vid=3&hid=16&sid=a6313dfb-42f4-4399-b55f-952fd316fe13%40sessionmgr8>

Keyword: internet crime. This is a short article that talks about different scammers and people who were victims of identity fraud. This will help with my research paper because it offers different views and will maybe serve as a testimonial.

Davis, Todd, Jim Greener, and Chini Krishnan. "Identity Theft Protection." Lifelock. 2006. National Crime Prevention Council. 20 Sept. 2007 . This is the website of a company who specializes in protecting your identity. They even have a commercial of Todd Davis, a CEO giving everybody his Social Security number, not worried of identity theft because his company works. It is good to get a point of view from this side and find a company who is trying to help prevent it besides the government.

Clemmitt, Marcia. "Controlling the Internet." CQ Researcher 16.18 (2006): 409-432. CQ Researcher Online. CQ Press. Mesa Community College Library, Mesa, AZ. 13 Sept. 2007 .

This article was found using the CQ Researcher, which is a resource from the MCC Online Library. This article is dedicated to whether we can control the internet, going into the political aspect of it. This is important since I will be writing about internet crime and what our government can do to help.

Katel, Peter. "Identity Theft." CQ Researcher 15.22 (2005): 517-540. CQ Researcher Online. CQ Press. Mesa Community College Library, Mesa, AZ. 13 Sept. 2007 .

I found this article from CQ Researcher, which is an online resource provided by the MCC Library. This article goes over identity theft, including some statistics and also by providing commentary on what the government can do. This is vital to my research project because it is exactly what I am writing about. How the U.S. Government can help fight internet crime.

Tynan, Dan. “THE INTERNET IS Sick…BUT WE CAN MAKE IT BETTER.” Popular Science (2006): 82-88. EBSCOhost Research Databases. Mesa Community College Library, Mesa, AZ. 13 Sept. 2007 <http://web.ebscohost.com.ezp.mc.maricopa.edu/ehost/detail?vid=6&hid=8&sid=1729476a-d9bf-4773-bd7c-2f2c493bfed6%40sessionmgr3>

This article was found through the MCC Online Library, as one of our other online databases. This article contains MANY statistics on many different internet crimes, not all related to identity theft. It goes over how to help protect yourself and also why the criminals do what they do in the first place.

Clark, Charles S. "Regulating the Internet." CQ Researcher 5.24 (1995): 561-584. CQ Researcher Online. CQ Press. Mesa Community College Library, Mesa, AZ. 13 Sept. 2007 .

This article was also found from the CQ Researcher within the MCC Online Library. This article talks about how if we as people can really regulate the internet. The really good thing about this article is it is a little old (1995) so I can compare what we thought then and we have done to solve those situations, to what issues we have now and what we are doing to solve them.


Identity theft and consumer health education: a case study teaching the skill of decision making.(Teaching Technique).Cristy A. Jefson. Journal of School Health 77.7 (Sept 2007): p373(6).

<http://find.galegroup.com.ezp.mc.maricopa.edu/itx/retrieve.do?contentSet=IAC-Documents&resultListType=RESULT_LIST&qrySerId=Locale%28en%2C%2C%29%3AFQE%3D%28KE%2CNone%2C14%29identity+theft%24&sgHitCountType=None&inPS=true&sort=DateDescend&searchType=BasicSearchForm&tabID=T002&prodId=ITOF&searchId=R1&currentPosition=3&userGroupName=mcc_mesa&docId=A168361921&docType=IAC>

This journal has some great statistics and goes over a lot of detail pertaining to identity theft. It explains the urgency to report to the police department when you have been a victim, and also a nice statistic on how many actually do not report it. This was found using MCC’s online library so it is very creditable.

Identity theft: protect yourself.(OTHER WISE).N. Susan Emeagwali. Techniques 82.6 (Sept 2007): p60(1).
<http://find.galegroup.com.ezp.mc.maricopa.edu/itx/retrieve.do?contentSet=IAC-Documents&resultListType=RESULT_LIST&qrySerId=Locale%28en%2C%2C%29%3AFQE%3D%28KE%2CNone%2C14%29identity+theft%24&sgHitCountType=None&inPS=true&sort=DateDescend&searchType=BasicSearchForm&tabID=T002&prodId=ITOF&searchId=R1&currentPosition=4&userGroupName=mcc_mesa&docId=A169162510&docType=IAC>

A great journal with a first hand experience with identity theft. It also has some statistics talking about credit reporting companies and how identity theft affects it. This is also a great source and creditable because it was found using MCC’s online library.

Mann, Joseph. "Internet Use Increases the Risk of Identity Theft." At Issue: Does the Internet Increase the Risk of Crime?. Ed. Lisa Yount. San Diego: Greenhaven Press, 2006. Opposing Viewpoints Resource Center. Thomson Gale. Mesa Community College. 1 Oct. 2007 &contentSet=GSRC&type=retrieve&tabID=T010&prodId=OVRC&docId=EJ3010367209&source=gale&srcprod=OVRC&userGroupName=mcc_mesa&version=1.0>.

This article is really perfect. It contains first hand experiences with identity theft, the various types of identity theft like inside jobs, or even identity theft caused from ecommerce. It has statistics and mentions many different companies and people’s names, giving it a lot of creditability.

Wall, David. Crime and the Internet. Routledge, 2001. Crime and the Internet. 27 Sept. 2007 <http://site.ebrary.com.ezp.mc.maricopa.edu/lib/mesa/Top?channelName=mesa&cpage=1&f00=text&frm=smp.x&hitsPerPage=10&id=5004260&layout=document&p00=internet+crime&sch=%A0%A0%A0%A0%A0Search%A0%A0%A0%A0%A0&sortBy=score&sortOrder=desc>.

This book seems like a great source because it goes into detail about the internet and the crime that is going on, on the internet. It is from a creditable source, it is the ebrary which is a source Mesa Community College connects you to.

Wang, Wallace. Steal This Computer Book 4.0 : What They Won'T Tell You About the Internet. No Starch P, Incorporated, 2006. 4.0 : What They Won'T Tell You About the Internet. 27 Sept. 2007 <http://site.ebrary.com.ezp.mc.maricopa.edu/lib/mesa/Top?channelName=mesa&cpage=1&docID=10124798&f00=text&frm=smp.x&hitsPerPage=10&layout=document&p00=internet+crime&sch=%A0%A0%A0%A0%A0Search%A0%A0%A0%A0%A0&sortBy=score&sortOrder=desc>. This book is great because it goes into detail about different hacking techniques and how to do it. This is good because to understand how to fight internet crime you need to know how it is done first.

Collins, Judith M. Preventing Identity Theft in Your Business : How to Protect Your Business, Customers, and Employees. John Wiley & Sons, Incorporated, 2005. 27 Sept. 2007 <http://site.ebrary.com.ezp.mc.maricopa.edu/lib/mesa/Top?channelName=mesa&cpage=1&docID=10114184&f00=text&frm=smp.x&hitsPerPage=10&layout=document&p00=identity+theft&sch=%A0%A0%A0%A0%A0Search%A0%A0%A0%A0%A0&sortBy=score&sortOrder=desc>. This book is about preventing identity theft in your business. This will be a great resource when writing my final paper because I can see what is being done just by business's to help prevent this. It will give me fresh ideas when brainstorming about different ways the government will be able to contribute in the fight against identity theft.

NCL’s National Fraud Information Center/Internet Fraud Watch. National Consumers League. 2007. National Consumers League. 3 Sept. 2007 <http://www.fraud.org>

I found this using the Google Web Directory. You can tell this site is pretty much legit because for one they have a number you can call with questions and even powered by the National Consumers League. This is a great site because it contains a lot of statistics on internet fraud which helps a lot with research.

FBI – Cybercrime. FBI. 2007. U.S. Federal Government. 3 Sept. 2007 <http://www.fbi.gov/cyberinvest/cyberhome.htm>

I found this using the regular Google search engine. This site is authoritative because it is on fbi.gov. This is a great website because it has different areas in which they help fight internet crime. It also contains stories of investigations they’ve done and people they have caught that have commit a cyber crime.

I realized with doing some of the research that the government is stepping in on identity theft. They are coming out with regulations to help websites become more secure, and also more noticeable as being secure so you know which websites are good and which are not. Also by doing this research, I found a company who actually specializes in keeping you from being a victim of identity theft. I did not know they had companies like that and so it will be very interesting to research them some more.