discussion 100-200 words

timer Asked: Jul 26th, 2018
account_balance_wallet $5

Question Description

you will take the opportunity to ask any questions about your upcoming research paper and receive responses from your peers. For example, you can ask about one of your sources; you can ask a question about MLA formatting; you can provide your thesis and receive some feedback on that; etc.Now that you have read the Research Paper Student Sample Essays and received feedback on your rough draft, reply to this thread in 100-200 words, and ask 1-2 questions you still have about the research paper. Include a word count in parentheses at the end of your thread.

Here are the three most pressing things to work on for your final draft:

-Aim for an introduction, 3-5 body paragraphs, and a conclusion. Right now, you have too many paragraph breaks and should not be labeling any of your sections. -You need 4-6 current and credible sources. Right now, your sources are not credible. Review the “Researching Credible Sources” handout for more clarification on this. Avoid web sites. -All sources should be quoted or paraphrased in text and those references should be green. I need to be able to tell the difference between your ideas and the ones from your sources.

Unformatted Attachment Preview

Sample 1 Student Sample Professor Sarah Martin English 120 28 May 2017 Word Count: 1547 Unwanted Attention How much information do you share with others on the Internet? More and more people share information about themselves over the web without thinking about the risks associated with increasing technology in their lives. With new social media apps such as Twitter, Instagram, and Facebook it is more common for the average individual to put their lives on display for others to see. While using these apps could be beneficial for connecting with family and friends, it also opens the door for criminals to select potential victim behind the screen of a computer. Therefore, technological advancements have increased the risk of becoming a target of cybercrimes. As technology has advanced, the rate of Internet crimes has risen as well. There are many different types of cybercrimes that are ever so prominent with our society’s technological advancements. A few of these cybercrimes include cyber stalking, identity fraud, and common computer scams. Cyberstalking involves harassing another individual through utilizing electronic forms of communication. The use of social media has created a convenient way to share updates with your friends and family but it has become common today to dismiss the dangers of who has access to that information. With enough information out in the open, it is possible for an individual to know all about you without ever formally meeting you. Furthermore, identity fraud is a type of Sample 2 cybercrime that involves stealing personal/ private information for self-gain. This can be done to a victim without their knowledge. Having your identify stolen can be very damaging to an individual’s life if it gets into the wrong hands, as it gives them access to private records as well as your bank accounts. Computer scams are scams that you see more commonly when you are on the Internet. These scams target individuals by promoting someone eye catching that entices them to click on it. Once it is clicked on it opens the door to virus’s or potential hackers. These scams can also be in the form of an email that weasels its way through the spam folder. Once the virus or hacker has control of your computer, the information you have saved is no longer protected. All of the different types of cybercrimes go to show that the Internet and rising technology has given individuals numerous opportunities to commit these crimes. There are also risk factors that go hand and hand with what should and shouldn’t be shared on the Internet or be put on display for public view. Nowadays there are social media apps that allow anybody to post pictures of what they are doing, where they are going, and who they are with. The risk of publicly promoting your every move is that with so much personal information out for display it makes it extremely easy for a cyber offender to pick their next victim. According to Matti Näsi in the article “Cybercrime Victimization among Young People: A Multi-Nation Study” young people are at a much higher risk of becoming a victim of a cybercrime. The evidence shows that in survey taken in 2012 “5.3% of people ages 15- 24 reported being a victim of a cybercrime, while roughly 10% of Internet users reported being a victim of online scams or phishing” (Näsi 204). The target of younger victims could simply be due to their more active approach on the Internet. Another risk factor associated with cybercrime is the ability to advertise it as Sample 3 something else. Many people assume that if they see a link shared by a friend online that it is harmless, but there are numerous ways of phishing through these means. As computers get hacked it gives the hacker the ability to share virus’s hidden in appealing links that make it intriguing to click on. Once the link is clicked it can be a matter of seconds before you are the next victim. As technology advances and becomes more of a common necessity, more and more people tend to rely on their computers and Internet to keep track of their public and private information. The reliance on our electronic devises for vital information makes it much easier for a cyber offender to pick their potential victim. As technology rises, the risk factors and types of cybercrimes previously stated are subject to increase. Yet some readers may challenge my view by insisting that advancements in technology have actually helped fight crime. In the CNBC news article, “The High-Tech Future of Fighting Crime” author Julia Boorstin sheds light on the new technological tools that are being used against criminals. In Boortstin’s view, she describes that there are new tools such as “remote-control aerial vehicles give law enforcement eyes from above to help with everything from bomb threats to search-andrescue, hazmat spills and active-shooter situations” (Boortstin). Although I grant that advancing technology has helped law enforcement fight crimes on the ground, I still maintain that these advancements have created simpler mechanisms to commit cybercrimes. Despite the advancements that have aided law enforcement fight cybercrimes; there are significant weaknesses that play a role in the prevalence of these criminal occurrences. Although there are security programs offered for cyber tools there are Sample 4 loopholes that a persistent offender may get through. Some of these programs do not have strict guidelines such as required changes in passwords or procedures to lock out an account. In businesses however, the sensitive information stored in computers are subject to the same loopholes. Once an offender breaks through the server the information is up for display. This could give a cyber offender the opportunity to get access to employee information, or banking accounts. In the journal “Cybercrime and Social Ties” author E.R. Leukfeldt maintains that technology and social ties both play a vital role in the weaknesses of security against cybercrimes. Leukfeldt states that technology gives offenders a place to network or recruit, while cybercrime plays a social role of “recruitment through social contacts and encounters on the street” (Leukfeldt 243). In making this comment, he urges readers to identify the different approaches to cybercrime and use proactive strategies to avoid them. It is important to keep in mind the weaknesses of cyber security, and know strategies to avoid falling victim to a cybercrime. In her periodical, “FBI Director: Information Sharing Is Key to Battling Cyber-Crime,” Fahmida Rashid explains how cyber threats are growing and that the FBI is taking it into serious matters. According to Rashid, “each of the 56 FBI field offices around the country now has a dedicated cybersecurity squad, and there are 1,000 agents and analysts focused on cyber-threats” (Rashid). This statement has important implications for the broader domain of steps we can take to protect ourselves from cybercrime. One vital strategy that is often overlooked is changing and creating different passwords. Creating different passwords for different information makes it more difficult for hackers to get access to more than one account. Furthermore, using a creative password that only you would know is another way of Sample 5 ensuring others won’t gain access. Another strategy to avoid cybercrimes includes providing more than one verification backup on each account. This could be a backup email address and a phone number; that way, there is more than one wall to get through. A simple yet effective strategy to protect oneself from a cybercrime is to report it when it happens. Many companies offer security services, such as notifications that alert you when something looks off with your account. Each of these notifications is important to thoroughly check, and report before it’s too late. The essence of these strategies is that there are multiple ways that an individual can easily take to protect themselves on the Internet. Ultimately, what is at stake here is that the technological advancements we make each day add to the growing risk of cybercrimes. As beneficial as it is to use the Internet and social media apps to communicate with friends or family, this information you share online is never truly private. Sharing too much information about yourself or storing sensitive documents in your hardware can have a lasting negative impact for a victim if it gets into the wrong hands. Crimes such as identify theft, stalking, and phishing scams are just a few of the cybercrimes that are lurking in the cyber world. Being aware of the risk factors, identifying weaknesses, and utilizing strategies to avoid cybercrimes before they happen will serve as vital protection for Internet users. Next time before you share personal or private information on the Internet, think twice about what you are posting before it gets into the wrong hands of someone from the dark web. Sample 6 Works Cited Boorstin, Julia. "The High-Tech Future of Fighting Crime." CNBC. CNBC, 21 Apr. 2017. Web. 25 May 2017. Leukfeldt, E. "Cybercrime and Social Ties." Trends in Organized Crime, vol. 17, no. 4, Dec. 2014, pp. 231-249. EBSCOhost. Näsi, Matti, et al. "Cybercrime Victimization among Young People: A Multi-Nation Study." Journal of Scandinavian Studies in Criminology & Crime Prevention, vol. 16, no. 2, Dec. 2015, pp. 203-210. EBSCOhost. Rashid, Fahmida Y. "FBI Director:Information Sharing Is Key to Battling Cyber-Crime." Eweek, 02 Mar. 2012, p. 1. EBSCOhost. Sample 1 Student Sample Professor Sarah Martin English 120 24 May 2017 Word Count: 1,513 Hungry for Technology When I think of technology and food, the first thing that comes to mind is my Instagram feed. All the yummy food that bloggers and foodies post to their social media feeds makes me think happy thoughts. However, there is more to food and technology than just pictures of food and trying to find the location they’re from. Advancement in communication and technology are helping with the understanding of the food industry and community. In this day in age we are becoming more aware of what we eat, where it comes from, how it’s made and why it matters. This is now the golden age of technology and there are many things in our everyday lives that it affects without us paying much attention. Technology isn’t just one thing; it’s a broad word that includes information, biotechnology, and automation to name a few. In addition, corporations, government offices, researchers and scientists are using technology to track data, help farmers and promote food to consumers. Our countries population is growing by the minute, not to mention the global population as well. We are connected to one another so easily through technology. As this number grows, so do our needs. Technology is imperative to help us as societies understand the importance of food and how our “hunger” is connected to technology like never before. As consumers, we do our best to understand what we are putting in our bodies. For the most part we read labels, do research, look online and try to be healthy. The reality is many Sample 2 people do not do the things I listed. Genetically modified food ingredients or what we know them by GMO’s have been around for a very long time. GMO’s are generally safe for people and the earth. That’s why now it’s more important than ever that technology play a part in helping farmers who in turn help consumers and the environment. For example, a genetically engineered crop called DroughtGard was approved by the U.S. Department of Agriculture six years ago. This crop can continue to grow even throughout droughts. In addition to this crop, there is a soybean genetically modified being used in Argentina that can withstand water shortages. These GMO’s are helping farmers around the world provide food in safe way. However, this is not without concerns. While many countries in Europe have not fully embraced this type of technology, it may be only a matter of time. In his article, “Doubts About the Promised Bounty of Genetically Modified Crops”, Danny Hakim states, “An analysis by The Times using United Nations data showed that the United States and Canada have gained no discernible advantage in yields – food per acre – when measured against Western Europe, a region with comparably modernized agricultural like France and Germany”. Although I grant that these are valid numbers, I still maintain changes are already happening in the ecosystems, climate changes and at this point farmers need all the help they can get. The benefits of GMO’s with changing technology will only improve as time goes on. Agriculture and farmers are now turning to technology to provide support on farms across the country. Farmers are now using drones, satellites, soil sensors, smart phones and computers to name a few, to assist with all aspects of keeping the farm running and feeding America. According to Jayson Lusk, in his article “Why Industrial Farms Are Good for the Environment”, “That’s one reason they’re turning to high-tech solutions like precision agriculture. Using location-specific information about soil nutrients, moisture and productivity of Sample 3 the previous year, new tools, known as ‘variable rate applicators,’ can put fertilizer only on those areas of the field that need it (which may reduce nitrogen runoff into waterways)”. Technology is helping with the use of water, fertilizer, gmo’s and even herbicide-resistance crops. These crops are a good example of helping famers control weeds, all without plowing. It has become common today to dismiss farmers. However, they are the reason we are alive and this new technology will help ease the burden on farmers of having to feed us. A long time ago there was an animated show called The Jetsons. It was set in a futuristic utopia with robots, aliens and other innovative things. So when I read about 3-D food printing, I envisioned Rosie the Robot “cooking” food for the family using a 3-D printer. Although that was just a kid’s show about the future, the reality is 3-D food printing does exist now. Granted, this technology is still in its early stage, it does have a promising future. As Chris Horton states, in his article “Commercial Kitchens Getting a Taste of 3-D Printed Food”, “At the heart of this concept is 3-D printing technology, still in its earliest stages, but offering the promise of greater efficiency in the production of food, with less waste and more customization”. The costs of these machines are quite expensive, which is why it’s mostly being used in commercial settings. Not to mention it’s taking away from the art of cooking. Here many chefs would probably object that these will replace chefs and cooks. However, once all the flaws and kinks are worked out, this technology will help the average person provide nutrient filled meals for themselves and their family. These may even become as common as a microwave in the future. Hunger in the United States, has been an underreported, sad problem that’s been going on since the first days of this country. We live in a time where people throw away and waste food like it’s no big deal. Except it is a big deal and it’s one that needs to addressed. According to Tina Rosenburg, in her article “Going Digital to Rescue Food”, “By some estimates, about 40 Sample 4 percent of all food in America is wasted. Much of it ends up in landfills, where it emits dangerous-to-the-plant methane gas”. Yet many families are going to be hungry because they don’t have enough food. New technology is helping organizations like Feeding America, Food Rescue USA and Rescuing Leftover Cuisine. Using an algorithm, recipients and donors are matched up through Meal Connect. This will give restaurants instant connections with their closest food banks. Smaller organizations like Food Rescue USA use apps to guide volunteers. Giving those instructions and calendars on where they can find food and where to take it. I too am guilty of throwing food away, when it’s perfectly good. But with this new technology, hopefully it will make people more aware and eager to help the less fortunate. Food is one of the most popular topics on social media. As technology is growing so is the marketing of food products. Twitter, Facebook, Instagram, apps for your smart phone are altering the way we view food. Social media “Influencers” are changing the game. Influencers are typically average people on social media that take it upon themselves to promote things they like. Companies send them free goods or even pay them to promote their products on social media. Madeleine Shaw who is food vlogger and blogger is a good example of this. She would blog her healthy recipes to her website and started building a following. She has over 200,000 followers on Instagram and is working on a cookbook. Technology is taking this type of marketing by storm, proving you don’t always need a celebrity or a super bowl ad to get the word out. In her article, “Social Media ‘Influencers’: A Marketing Experiment Grows into a Mini-Economy”, Sarah Halzack maintains that “In other words, while influencer marketing rose to prominence as a raw, credible antidote to the slick world of television and glossy magazines, it has metastasized into something every bit as calculated”. Anyone familiar with technology should agree that social media has changed the way we view things like food. Influencers, of Sample 5 course, may want to question whether changing technology will either hurt or help them. Nonetheless, technology has revolutionized the landscape of marketing and promoting food on social networks. In conclusion, we can’t think about food without truly thinking about technology. Technology is important because it has made it easier to farm, sell, promote, prepare and eat food. Sure we can start a garden in our backyard and throw a few chickens and cows back there too. Except for most people that’s not a reality. Ultimately, what is at stake here is the simple way we consume food. Technology keeps growing and changing, and it affects every single one of us. For example, when I sit down for dinner the last thing on my mind is the farmer who used new gmo’s to grow the soybeans, which were bought by the company that made the pasta, which I then purchased after seeing it advertised online. I even acknowledge that I might throw away my leftovers, of course that is before writing this paper. Now I look at food and technology different and understand there’s more to it. My conclusion is that we have to remind ourselves how important technology is in all aspects of our lives, including the food we eat. Sample 6 Works Cited Hakim, Danny. "Doubts About the Promised Bounty of Genetically Modified Crops." The New York Times. The New York Times, 29 Oct. 2016. Web. 18 May 2017. Halzack, Sarah. "Social Media 'influencers': A Marketing Experiment Grows into a Minieconomy." The Washington Post. WP Company, 02 Nov. 2016. Web. 18 May 2017. Horton, Chris. "Commercial Kitchens Getting a Taste of 3-D-Printed Food." The New York Times. The New York Times, 24 Oct. 2016. Web. 17 May 2017. Lusk, Jayson. "Why Industrial Farms Are Good for the Environment." The New York Times. The New York Times, 23 Sept. 2016. Web. 17 May 2017. Rosenberg, Tina. "Going Digital to Rescue Food." The New York Times. The New York Times, 02 May 2017. Web. 09 May 2017. . Senthilingam, Meera. "The Tech Solutions to End Global Hunger." CNN. Cable News Network, 24 Feb. 2017. Web. 08 May 2017. . Robinson 1 Catrina Robinson Professor Sarah Martin English 120 Section # 9676 12 July 2016 Word Count: 1,714 Medic ...
Purchase answer to see full attachment

Tutor Answer

School: UT Austin


Student Name:
Course Name & Number:
Professor’s Name:
Questions regarding my final draft
1. Does my thesis statement give a substantial overview of my paper? Here is my thesis
In this discussion of technology and...

flag Report DMCA

Thank you! Reasonably priced given the quality not just of the tutors but the moderators too. They were helpful and accommodating given my needs.

Brown University

1271 Tutors

California Institute of Technology

2131 Tutors

Carnegie Mellon University

982 Tutors

Columbia University

1256 Tutors

Dartmouth University

2113 Tutors

Emory University

2279 Tutors

Harvard University

599 Tutors

Massachusetts Institute of Technology

2319 Tutors

New York University

1645 Tutors

Notre Dam University

1911 Tutors

Oklahoma University

2122 Tutors

Pennsylvania State University

932 Tutors

Princeton University

1211 Tutors

Stanford University

983 Tutors

University of California

1282 Tutors

Oxford University

123 Tutors

Yale University

2325 Tutors