Sunday, April 10, 2011

Class Reflection

Well, this Winter was my first semester at BYU. I was a little scared because I was supposed to take a basic writing class but when they saw my writing SAT scores they said I was good enough for this class, so I registered for it. It was a completely new way of living, just doing everything in english, but I got used to it after a couple weeks. I liked the professor, Mr. Holland seemed really fair for grading our homework and he is always willing to give us an extra day or two for turning in our papers. Class was fun, maybe funnier than I expected with the games and stuff.

Academically, I needed a class like this because I needed to get used to writing in english. Maybe I don't use the most technical words ever, but I have noticed my papers get better as I write more and more of them. I wrote at least 40 pages when I mix the blog posts and the papers, which really helped me develop my writing skills in english. I learned a lot about rhetorics and how to make your ideas sound really convincing, as well as some more grammar, punctuation and I learned how to criticize what other people writes, which really homes in handy everyday when talking to people. Now I can probably express myself more clearly when speaking in english and I think I can make stronger arguments not only writing but while speaking too. Overall, I enjoyed this class very much, and it wasn't as hard as I thought it would be because of the new language and because I'm the kind of guy who would rather do math than write a paper. It was good to have this class,

Gustavo

Friday, April 8, 2011

My Proposal Reflection!

Our incredibly awesome proposal's topic is online safety for kids and families. We chose it because we think it is a very relevant issue in today's society because of the increasing popularity of the Internet, giving it a good Kairos. We used many colors in our design to give the proposal a happy look and to promote happiness between families and how many bad situations can be avoided by just following our proposal's suggestions. We walked through each one of the staces, starting by the definition of the problem and ending with our suggestions. The phrases we put all over the proposal stand out to make a call for action. The best part of it is we can all do something about it and not wait for someone to actually care and start investing money or something! It is a proposal that everyone can apply on their lives and it will not only help their families but their friends' families. Many proposals focus on one person or institution that can take it or not, but we were more realistic and made it so everyone can apply it on their lives if they really care about their health.

We appeal to ethos, pathos and logos with strong arguments and the cohesion and flow of the sentences makes it really easy for anyone to read. There's no complex wording and it doesn't become too long or too boring to read. We also found some really good pictures to describe what the problem looks like sometimes, and these make an impact on the reader that calls for action and supports our proposal. The design is really entertaining, standing out to the reader because of all the colours and pictures. And the best part is, we got cool pictures of mixed words to make it look professional, like this one!




 Certainly, nothing can be better than our proposal. We deserve an A!

Monday, April 4, 2011

Issues Paper Reflection


My paper, titled “Online Safety”, makes a clear argument about the crisis that the security online has been suffering during the last decade. The introduction is well supported with plenty of background and information to put the reader in context, while following the staces. This argument is important to a wide variety of readers because of its kairos, as it is a topic that most readers will find interesting because of Internet’s popularity. This makes the paper stronger and more interesting. The thesis is well presented, clear and easy to understand and it introduces what is going to be touched throughout the paper. The thesis creates interest in the reader, as everyone is interested in what measures to take in order to protect themselves from the online dangers.

The biggest counter argument is that of the government’s actions, which is well taken care of, as it is proved with supporting research that the government has done more than enough and the power to change this remains in the very same population of Internet users. Logos, Pathos and Ethos are all found throughout the paper when citing sources, giving examples of children and teenagers who have died due to Internet Safety issues and logic statements. The organization is really good, dividing the issue into its two main topics and every paragraph and sentence is in the right place to create a good flow as one reads the paper. There is definitely a voice that suggests that this paper was written by a person, and not any person, but one who is part of the public and is concerned about security. MLA format is obeyed and the grammar and punctuation is really good. Suggestions made by the author are not repetitions of argument other authors have done about this issue, making this paper unique because the suggestions are actually applicable by any reader of this paper. The conclusion touches the main topics, definitions and suggestions, finishing off with an interesting and touching phrase to leave the reader anxious to follow the suggestions and help.

Saturday, March 12, 2011

Analysis of "Cyber-Predators"

The article Cyber Predator is based on the dangers kids face everyday when surfing the internet. It makes a study of "cyber-predators" attempting to have sexual meetings with innocent minors. The author, Bryan Hensen, successfully convinces the audience that this is a very important issue that should be taken care of. He uses many tools such as examples, statistics and citations to build ethos, logos and even some pathos.

Examples are used throughout the whole article. Stories of young internet users being sexually harassed  help the author establish some background that supports this issue and appeals to pathos by getting to the reader's feelings successfully. These kinds of examples are found very often, from the beginning until the end of the article. They also help specify the ways these predators work.

Statistics are used a few times. At first, a graphic of incident reports helps the reader to understand how big this problem is. The number of minors using the internet is also a way to convince the public of the magnitude of this issue. Then statistics about the average age of the victims (which is 13) also gets to the feelings of people because of the low age of these youngsters. Finally, statistics showing the measures people take against online pornography are presented. All of these help establish logos and credibility. They make clear the importance and magnitude of this issue, making a call for action.

Citations by experts are wisely used to build ethos, as this helps the author gain credibility and makes the argument more convincing. Experts of the area in the US are cited, explaining some of the ways this issue is being taken care of, but also giving reasons to understand why it is so hard to control this problem. Without these quotes, the article would lose a lot of credibility.

We can conclude this article is effectively addressing a real issue, with a big range of possible victims that has to be taken care of. The suggestions at the end of the text are useful, and the tools successfully appeal to logic, credibility and feelings to create a supporting response by the readers.

Summary of "Cyber-Predators"


The article “Cyber-Predators”, by Brian Hansen, centers its attention on online safety. More specifically, it talks about sexual child harassment on the Internet.

The author starts off by defining the problem and then he gives examples and cites some experts about it. After that he talks about the government measures against this and continues to explain how the dangers of online surfing have multiplied over the last 10 years. One example of measures taken by the government is the undercover agents who go online and get in chat rooms pretending to be kids to catch the “online predators”. He gives some statistics on number of children in the US using internet (by the date the article was posted) and also shows some statistics about kids who have been at least attempted to contact by these “predators”.

Examples and names of predators captured by the law are used very often throughout the text to show examples of how they work and are caught. Experts on the topic’s opinions are also cited, like US Custom Services spokesmen.

The article states how predators always cover by saying they’ve been entrapped, which is when they say undercover policemen made them do things they wouldn’t do otherwise, and it explains other ways they try to avoid the law.

The author continues to talk about predator attacks and people taking care of this and trying to entrap them, concluding with some suggestions to parents and kids who can be target of such attacks to end his article.

Saturday, March 5, 2011

Comment on "Online Privacy"

The article "Online Privacy" is primarily based on the ways that modern-day websites and advertisers track our online activities to improve their advertising and knowledge of our information to better sell products. After reviewing the antecedents and many examples and opinions about it, the article focuses on the present measures being taken to aid this problem in the Congress.

The thesis successfully convinces the online users to believe their privacy is at risk and should be taken care of through the law. Throughout the article there are plenty of examples, statistics and credible sources and antecedents that explain how this privacy can affect us, the internet users. Opinions of privacy experts are found constantly, giving the article a lot of credibility. Ethos, Pathos and Logos are appeals found in the article, making it a very strong argument.

Statistics show opinions of internet users and how comfortable they feel about their privacy when websites adopt privacy policies or not, proving that older people cares the most about their online privacy. This appeals to logic. Examples appeal to credibility when citing experts from companies such as American Civil Liberties Union.

The article also takes care of counter arguments when citing social networking advocates and their pros of social networks. The author explains how while it is true that social networkers are aware that their information is being posted, they're not aware that this information is being used by advertisers and other websites under the table, which supports the thesis.

Suggestions are also useful in this article, like the tips to make your Facebook account safer, which comes in handy for the reader but also puts him on the same page as the author, identifying him with the issue.

Overall, this article gets to the point, states the issues and gives good suggestions to help to prevent this issue. I think the author did a really good job by doing all the research and writing this article. The author  seems very reliable and it looks like he did a good research. Tools are well used, and the thesis is well supported throughout the article.

10 Topos

1) Young Users of Online Social Networks usually don't understand the range of danger that giving personal information on these sites represents.


2) Some users of Online Social Networks develop addiction to these sites, wasting valuable time and even changing their personalities.


3) Antecedent and consequence: Kidnappings and sexual harassment have happened in these sites as a consequence of the amount of personal easy-to-access information found in them.




4) Division of whole into parts: Online social networks affect users in several ways: Addiction, Privacy issues, Safety and Cyberbullying.


5) Precedents: Online Social Network Facebook had to change privacy settings and make them stronger due to privacy charges put by users and companies.


6) Precedents: In suburban Dardenne Prairie, Mo., near St. Louis, 13-year-old Megan Meier hangs herself after receiving cruel messages on the social-networking site MySpace.


7) Authority: Experts say cyberbullying has become a scourge of the adolescent world, inflicting painful scars on youngsters and vexing adults unable to stop the abuse. 


8) Statistics: About 9 percent of respondents ages 10 through 17 said they were victims of threats or other offensive behavior, not counting sexual solicitation, that was sent online to them or about them for others to see, according to a 2005 University of New Hampshire survey.


9) Antecedents and Consequence: Bachelorette party pictures on Facebook cost Spanish teacher Ginger D'Amico a 30-day suspension. This is a clear example of privacy loss.


10) Comparison by difference/Statistics: Older online social network users are least likely to take steps to limit information availability than young users according to previous research.