Thursday, October 25, 2007
D9, HW7, Deadline Reflection
http://laceyariz.blogspot.com/ - Kathy - D#9,HW#6 Outline, D#9,HW#4 Toulmin outline
http://sparizek-armywife.blogspot.com/ - Stephann - D9HW7 Deadline reflection, D9HW4 Out-line
D9, HW6, Outline
To see what the U.S. Government can do to help prevent identity theft via the Internet.
Section 1:
Discuss what the government can do to prevent identity theft via Internet, if they should be allowed to at all.
Section 2:
Discuss if the government should be allowed to interfere with the Internet or whether they should have no say in it at all.
Section 3:
Discuss what is already being done to help prevent identity theft to get a better idea of what they can do for future improvements.
Conclusion:
This will be tying everything together on what the government already does or what they can do to help prevent identity theft better than what is already in place.
D9, HW5, Cluster
What the government can do to prevent identity theft
If the government should be allowed to interfere with the Internet
What is already being done to help prevent identity theft
This activity was very useful because it helped me lay out all me ideas on paper and really get a feel for what I will be writing about. I was able to brain storm ideas and key points to get a more clear understanding of what I will need to write about.
D9, HW3, Writing Reflection
I did a lot of searching using the internet to complete this task. I searched for different sources to help me for my final research paper. These sources will help me back up my different points with evidence and also provide me with different views based around my research project. After doing the research with these sources I had to properly cite them using MLA format and combined everything into one MLA style annotated bibliography. If I were to complete this project again, I would have taken more time originally citing the sources to make sure everything was properly done with the citing. I had to spend a lot of time double checking my sources and making correction. Getting this done in the beginning would have made this step of the process much more painless. I am proud that I was able to find so many sources revolving around my topic. I never had to do a lot of research for any assignment before, so this helped me really dig deep on the internet for different sources. If I had more time I would have really liked to find more sources that support government control of the internet, and also spend more time with my annotations. I feel I definitely improved on understanding MLA, with the research I had to do on properly citing for MLA. I definitely need to put more time into the rough draft so I do not have as many edits later on for the final draft.
D9, HW4, Toulmin method outline
Reason #1: It is one of the leading Internet crimes.
Warrant/Principle: No one wants to be victims of identity theft.
Backing: No one would disagree with this.
Evidence #1: FBI statistics have these numbers reported.
Warrant/Principle: People trust numbers provided by the FBI
Backing: The FBI is pretty much as high as it goes, if you can't trust them with the numbers you can't trust anybody.
Evidence #2: It messes up a lot of people's financial situation.
Warrant/Principle: When a victim of identity theft, they usually freeze your bank account not allowing any access to it, which can be a big financial burden.
Backing: Testimonials can show this.
Objection: Testimonials can be forged.
Rebuttal: So can pretty much anything, but with most people knowing at least one person who has been a victim of identity theft they can relate.
Reason #2: It affects society as a whole, which can eventually be an issue with inflation.
Evidence #1: With people's bank accounts being frozen, they can not buy as much of other stuff and when enough people are victims it will start to hurt the economy.
Warrant/Principle: When a victim of identity theft, they usually freeze your bank account not allowing any access to it.
Evidence #2: If the government does not step in, it could be a way for terrorists to mess with our economy as well.
Backing: With this happening it also backs the point in Reason 2 Evidence 1 more.
Wednesday, October 24, 2007
D9, HW1, Reading Reflection
In Chapter 7, of Everything’s an Argument it has a really good section on how to organize your arguments. This is on page 199 and has a 9 point list on different things to be aware of when organizing, such as if your transitions are strong enough. In Chapter 17 on page 505 it talks about the “Flashpoints of Logical Arguments,” which is interesting because it explains how every argument that has a flaw there can be a flashpoint within the argument. In Chapter 11 of The Bedford Researcher it talks about help with organizing and outlining a research project. On page 151 it goes over what type of outline you should create and even on how to create an informal outline.
Thursday, October 18, 2007
D8, HW4, The Case against Coldplay
D8, HW6, Deadline Reflection
http://teufelheunden.blogspot.com - Alex - D8HW4 Case Against Coldplay
http://camlunamcc.blogspot.com - Cam D8HW2 Peer Review and D8HW4 The Case against Coldplay
http://laceyariz.blogspot.com - Kathy - D8HW6, Deadline Reflection
The suggestions made for my annotated bibliography will definitely help me when I go to do the final version. From these suggestions I learned I need to tweak my MLA formatting a bit more, and also add a source or two for my opposing side.
D8, HW3, Peer Review Reflection
Kathleen peer reviewed my annotated bibliography. I agree with her edits and suggestions. One suggestion she made was to make sure I get a source pertaining to government control with the internet. I peer reviewed Tara and Coralee. What I learned from peer reviewing these two are to make sure I put the time and effort into the projects that they deserve. Sometimes it is easy for others to spot work that seems like it was just thrown together, and then it is also easy to see the ones who really spent time to complete their projects almost flawlessly.
Monday, October 15, 2007
D8, HW1, Reading Reflection
In Everything’s an Argument, in chapter 5 on page 105 it talks about how to really break down your paper and to focus on a few rhetorical questions. It also wants you to make sure you can “show how the key devices in argument actually make it succeed or fail.” In chapter 6 on page 147, the book goes into explaining the Toulmin Argument, which was started by Stephen Toulmin in The Uses of Argument (1958). Toulmin was a British philosopher who “described the way people make convincing and reasonable arguments.” Toulmin has become a very popular method and logic for help with arguments in the real world.
Thursday, October 11, 2007
D7, HW2 Annotated Bibliography
David, Fay W. "Protecting Yourself From Identity Theft." Inside Tucson Business 17 (2007): 24. MasterFILE Premier. EBSCO. Mesa Community College, Mesa. 11 Oct. 2007. Keyword: identity theft. This article is a nice prevention article on how to protect yourself from identity theft. This will be a great help when writing about what the government can do to help protect people from identity theft because I can get an idea on what is already out there to help protect people.
Emeagwali, Susan N. "Identity Theft: Protect Yourself." Techniques: Connecting Education & Careers 82 (2007): 60. MasterFILE Premier. EBSCO. Mesa Community College, Mesa. 11 Oct. 2007. Keyword: identity theft. This article is a nice prevention article on how to protect yourself from identity theft. This will be a great help when writing about what the government can do to help protect people from identity theft because I can get an idea on what is already out there to help protect people.
D7, HW5, Deadline Reflection
Alex - D7, HW5 Deadline Reflection
Alex - D7, HW3 Annotated Bib Draft
Kathy - D7, HW5 Deadline Reflection
Tara - D7, HW1 Reading Reflection
Coralee - D7, HW1 Reading Reflection
D7, HW1, Reading Reflection
Monday, October 8, 2007
D7, HW3, WP#2 Annotated Bibliography Draft
Jared Zucker
Eng 102 – 7891
10-11-2007
WP#2 Draft
My topic I am researching is identity theft, mainly focusing on the internet. It will go over what the government can do to stop internet crime, like identity theft. Some of the controversy comes into play because some do not want the government involved on the internet at all. Others, think the government needs to step in more and have more rules and regulations when it comes to the internet. This causes a big problem and becomes very controversial. Below are some of my sources I have been gathering for my research.
“Annual Reports.”
<http://www.ic3.gov/media/annualreports.aspx>
This website has statistics about internet crime right from the FBI, one of the best sources you can get it from. Not only does it give you stats from years ago, but also current statistics which is sometimes hard to find. This will be a great asset when writing my paper because I will have some major statistics as part of my research.
Salkever, Alex. "A Key Weapon to Thwart Cybercrime." Business Week Online (2003). Military & Government. EBSCOhost.
Keyword: internet crime. This is a great website because it has brief stories about the FBI tracking down and fighting internet crime. This helps because I can see what the government already does to protect against internet crime, to think of better ideas on how to fight against it.
Desai, Jenny. "Tricksters Populate Our Internet Landscape." Science & Spirit 18.1 (2007): 65. Academic Search Premier. EBSCO.
Keyword: internet crime. This is a short article that talks about different scammers and people who were victims of identity fraud. This will help with my research paper because it offers different views and will maybe serve as a testimonial.
Davis, Todd, Jim Greener, and Chini Krishnan. "Identity Theft Protection." Lifelock. 2006. National Crime Prevention Council. 20 Sept. 2007
Clemmitt, Marcia. "Controlling the Internet." CQ Researcher 16.18 (2006): 409-432. CQ Researcher Online. CQ Press. Mesa Community College Library,
This article was found using the CQ Researcher, which is a resource from the MCC Online Library. This article is dedicated to whether we can control the internet, going into the political aspect of it. This is important since I will be writing about internet crime and what our government can do to help.
Katel, Peter. "Identity Theft." CQ Researcher 15.22 (2005): 517-540. CQ Researcher Online. CQ Press. Mesa Community College Library,
I found this article from CQ Researcher, which is an online resource provided by the MCC Library. This article goes over identity theft, including some statistics and also by providing commentary on what the government can do. This is vital to my research project because it is exactly what I am writing about. How the U.S. Government can help fight internet crime.
Tynan, Dan. “THE INTERNET IS Sick…BUT WE CAN MAKE IT BETTER.” Popular Science (2006): 82-88. EBSCOhost Research Databases.
This article was found through the MCC Online Library, as one of our other online databases. This article contains MANY statistics on many different internet crimes, not all related to identity theft. It goes over how to help protect yourself and also why the criminals do what they do in the first place.
Clark, Charles S. "Regulating the Internet." CQ Researcher 5.24 (1995): 561-584. CQ Researcher Online. CQ Press. Mesa Community College Library,
This article was also found from the CQ Researcher within the MCC Online Library. This article talks about how if we as people can really regulate the internet. The really good thing about this article is it is a little old (1995) so I can compare what we thought then and we have done to solve those situations, to what issues we have now and what we are doing to solve them.
Identity theft and consumer health education: a case study teaching the skill of decision making.(Teaching Technique).Cristy A. Jefson. Journal of School Health 77.7 (Sept 2007): p373(6).
This journal has some great statistics and goes over a lot of detail pertaining to identity theft. It explains the urgency to report to the police department when you have been a victim, and also a nice statistic on how many actually do not report it. This was found using MCC’s online library so it is very creditable.
Identity theft: protect yourself.(OTHER WISE).N. Susan Emeagwali. Techniques 82.6 (Sept 2007): p60(1).
<http://find.galegroup.com.ezp.mc.maricopa.edu/itx/retrieve.do?contentSet=IAC-Documents&resultListType=RESULT_LIST&qrySerId=Locale%28en%2C%2C%29%3AFQE%3D%28KE%2CNone%2C14%29identity+theft%24&sgHitCountType=None&inPS=true&sort=DateDescend&searchType=BasicSearchForm&tabID=T002&prodId=ITOF&searchId=R1¤tPosition=4&userGroupName=mcc_mesa&docId=A169162510&docType=IAC>
A great journal with a first hand experience with identity theft. It also has some statistics talking about credit reporting companies and how identity theft affects it. This is also a great source and creditable because it was found using MCC’s online library.
Mann, Joseph. "Internet Use Increases the Risk of Identity Theft." At Issue: Does the Internet Increase the Risk of Crime?. Ed. Lisa Yount. San Diego: Greenhaven Press, 2006. Opposing Viewpoints Resource Center. Thomson Gale. Mesa Community College. 1 Oct. 2007 &contentSet=GSRC&type=retrieve&tabID=T010&prodId=OVRC&docId=EJ3010367209&source=gale&srcprod=OVRC&userGroupName=mcc_mesa&version=1.0>.
This article is really perfect. It contains first hand experiences with identity theft, the various types of identity theft like inside jobs, or even identity theft caused from ecommerce. It has statistics and mentions many different companies and people’s names, giving it a lot of creditability.
Wall, David. Crime and the Internet. Routledge, 2001. Crime and the Internet. 27 Sept. 2007 <http://site.ebrary.com.ezp.mc.maricopa.edu/lib/mesa/Top?channelName=mesa&cpage=1&f00=text&frm=smp.x&hitsPerPage=10&id=5004260&layout=document&p00=internet+crime&sch=%A0%A0%A0%A0%A0Search%A0%A0%A0%A0%A0&sortBy=score&sortOrder=desc>.
This book seems like a great source because it goes into detail about the internet and the crime that is going on, on the internet. It is from a creditable source, it is the ebrary which is a source Mesa Community College connects you to.
Wang, Wallace. Steal This Computer Book 4.0 : What They Won'T Tell You About the Internet. No Starch P, Incorporated, 2006. 4.0 : What They Won'T Tell You About the Internet. 27 Sept. 2007 <http://site.ebrary.com.ezp.mc.maricopa.edu/lib/mesa/Top?channelName=mesa&cpage=1&docID=10124798&f00=text&frm=smp.x&hitsPerPage=10&layout=document&p00=internet+crime&sch=%A0%A0%A0%A0%A0Search%A0%A0%A0%A0%A0&sortBy=score&sortOrder=desc>. This book is great because it goes into detail about different hacking techniques and how to do it. This is good because to understand how to fight internet crime you need to know how it is done first.
Collins, Judith M. Preventing Identity Theft in Your Business : How to Protect Your Business, Customers, and Employees. John Wiley & Sons, Incorporated, 2005. 27 Sept. 2007 <http://site.ebrary.com.ezp.mc.maricopa.edu/lib/mesa/Top?channelName=mesa&cpage=1&docID=10114184&f00=text&frm=smp.x&hitsPerPage=10&layout=document&p00=identity+theft&sch=%A0%A0%A0%A0%A0Search%A0%A0%A0%A0%A0&sortBy=score&sortOrder=desc>. This book is about preventing identity theft in your business. This will be a great resource when writing my final paper because I can see what is being done just by business's to help prevent this. It will give me fresh ideas when brainstorming about different ways the government will be able to contribute in the fight against identity theft.
NCL’s National Fraud Information Center/Internet Fraud Watch. National Consumers League. 2007. National Consumers League. 3 Sept. 2007 <http://www.fraud.org>
I found this using the Google Web Directory. You can tell this site is pretty much legit because for one they have a number you can call with questions and even powered by the National Consumers League. This is a great site because it contains a lot of statistics on internet fraud which helps a lot with research.
FBI – Cybercrime. FBI. 2007. U.S. Federal Government. 3 Sept. 2007 <http://www.fbi.gov/cyberinvest/cyberhome.htm>
I found this using the regular Google search engine. This site is authoritative because it is on fbi.gov. This is a great website because it has different areas in which they help fight internet crime. It also contains stories of investigations they’ve done and people they have caught that have commit a cyber crime.
I realized with doing some of the research that the government is stepping in on identity theft. They are coming out with regulations to help websites become more secure, and also more noticeable as being secure so you know which websites are good and which are not. Also by doing this research, I found a company who actually specializes in keeping you from being a victim of identity theft. I did not know they had companies like that and so it will be very interesting to research them some more.
Thursday, October 4, 2007
D#6,HW#8 Deadline Reflection
http://sparizek-armywife.blogspot.com - Stephann - D6HW8 Deadline Reflection
http://teufelheunden.blogspot.com - Alexander - D6HW3 Writing Reflection
http://pauletteestrada.blogspot.com - Paulettee - Deadline #5 HW #6 Deadline reflcetion
This week really helped me with understanding editorial notes from peer reviewing. It also helped me really critque sources and evaluate them to make sure they are creditable. This will help me apply this to WP2 and WP3.
Monday, October 1, 2007
D6, HW4, Annotated Bibliography
Identity theft and consumer health education: a case study teaching the skill of decision making.(Teaching Technique).Cristy A. Jefson. Journal of School Health 77.7 (Sept 2007): p373(6).
This journal has some great statistics and goes over a lot of detail pertaining to identity theft. It explains the urgency to report to the police department when you have been a victim, and also a nice statistic on how many actually do not report it. This was found using MCC’s online library so it is very creditable.
Identity theft: protect yourself.(OTHER WISE).N. Susan Emeagwali. Techniques 82.6 (Sept 2007): p60(1).
<http://find.galegroup.com.ezp.mc.maricopa.edu/itx/retrieve.do?contentSet=IAC-Documents&resultListType=RESULT_LIST&qrySerId=Locale%28en%2C%2C%29%3AFQE%3D%28KE%2CNone%2C14%29identity+theft%24&sgHitCountType=None&inPS=true&sort=DateDescend&searchType=BasicSearchForm&tabID=T002&prodId=ITOF&searchId=R1¤tPosition=4&userGroupName=mcc_mesa&docId=A169162510&docType=IAC>
A great journal with a first hand experience with identity theft. It also has some statistics talking about credit reporting companies and how identity theft affects it. This is also a great source and creditable because it was found using MCC’s online library.
Mann, Joseph. "Internet Use Increases the Risk of Identity Theft." At Issue: Does the Internet Increase the Risk of Crime?. Ed. Lisa Yount. San Diego: Greenhaven Press, 2006. Opposing Viewpoints Resource Center. Thomson Gale. Mesa Community College. 1 Oct. 2007
This article is really perfect. It contains first hand experiences with identity theft, the various types of identity theft like inside jobs, or even identity theft caused from ecommerce. It has statistics and mentions many different companies and people’s names, giving it a lot of creditability.
D6, HW3, Writing Reflection
The steps I took to complete this writing project were first doing some preliminary research and figure out which topic I would choose. I did some research on a couple different topics to really narrow down what I wanted to do my research on. I then had to find many sources pertaining to that research topic to get a general feel for it and make sure it is what I wanted to do my research on. I then figured out a research question, in which I had to change because it did not make too much sense. I have a problem procrastinating, however these weekly assignments all leading up to the writing assignment, help me not be so much of a procrastinator. Something I would definitely try to do different next time is still not procrastinate as much as I did. I am most proud of in this writing project of the amount of work I put in. I usually do not put so many hours and all the research leading up to this as normal. If I had more time, I would have liked to put some actual statistics into my research proposal, just to make it seem more interesting. One writing skill I would like to work on is using better diction. Sometimes when I write, I feel I use a lot of verbiage over and over, or even too easy of words and would like to change them out for more complex ones.