Inductive and Deductive Arguments on: Aaron Swartz By Thaxton Hainrick September 4, 2015 HUM 200BLA Dr. Jennifer Dustow Part 1 1a: Identify Components of Arguments a. Argument: Aaron Swartz was arrested and indicted Premises or Reasons: Unauthorized access to a computer network Premises or Reasons: Intent of computer fraud. b. Argument: Aaron Swartz was a computer genius and believed in the freedom of information where everybody is entitled to public record online. Premises or Reasons: He was trying to make public record accessible to everybody without paying a fee to few the information. Premises or Reasons: Co-writer of the Guerilla Open Access Manifesto- free of charge information that was being sold and held by corporations …show more content…
and publishers. 1b: Identify Argument as Inductive or Deductive Argument A: Aaron Swartz was arrested and indicted.
I think it is pretty cut and dry. If someone gain access of a locked area of computer should be arrested for unauthorized entry. Also anybody who intent to commit computer fraud should be arrested. In our society of computers and online access, protecting privacy is a very serious matter. Therefore anybody found having to gain access to a computer without authorization should be punished. It is a deductive argument. He unlawfully entered a facility and computer network; therefore, he should be punished. Argument B: Aaron Swartz was a computer genius and believes in the freedom of information where everybody is entitled to public records online. Aaron Swartz is a computer genius, I have no doubt about that. I mean by the age of 13, he won the Arsdigita prize. Furthermore,he believed in the free access of public record online. Henceforth, in 2006 he made information available and free while working at Wired magazin. In 2007 he also united with Simon Carstensen and build a site where anyone can create a simple site. This is an Inductive Argument because all the information shows that Aaron Swartz was a computer genius and believed in freedom of information online. Part …show more content…
2 2a. Argument Identification and Analysis Argument: Aaron should not have died at an early age. He was made an example of or a scape goat for anyone and everybody in the cyber world. He had so much to life for but sadly he died at an early age. Conclusion:Aaron died too early, a brilliant young computer genius, and he blamed MIT as well as the prosecutor’s office. Reasons for conclusion: Aaron was a great guy and he made the Internet and also the world a better place because of what he did during his 26 years on this earth.
He spent most of his life in the world of the internet and everybody knew him and what he did which made information possible for everybody now online. Construct an inductive argument and deductive argument: Deductive argument: Argument: Aaron Swartz was a genius and a computer programmer. In 1999 he won the ArsDigita prize, and in 2000 he was part of the improvement of the software behind the RSS web syndication service. His company, Infogami merged with Reddit in 2005. He worked on Markdown with John Guber which allow people to convert plain text into HTML code for the internet. Therefore he is a genius that love computer programing. Inductive argument: Argument: Aaron Swartz was labeled a “Hacker” by the US prosecutor, Stephen Heymann-a overzealous prosecutor. He was accused of unauthorized access into one of MIT computer network and downloaded public documents. Since the definition of “Hacker” as a person who gain computer access withouth authorization, Aaron was labeled as such and was to be made an example such. A bad person who gained access for his own good or benefit. Therefore, this is an inductive
argument. Works Cites: Bradner, S. (2013). The end of an extraordinary life: Aaron swartz. Network World (Online), Retrieved from http://search.proquest.com/docview/1271614420?accountid=34899 Brown, I. (2013). The global online freedom act. Georgetown Journal of International Affairs, 14(1), 153-160. Retrieved from http://search.proquest.com/docview/1462384325?accountid=34899 Denny, R. T. (2010). BEYOND MERE THEFT:WHY COMPUTER HACKERS TRADING ON WRONGFULLY ACQUIRED INFORMATION SHOULD BE HELD ACCOUNTABLE UNDER THE SECURITIES EXCHANGE ACT. Utah Law Review, 2010(3), 963-982. Gibbs, M. (1994). Hackers revisited: Definitions, ducks and ne'er-do-wells. Network World, 11(22), 29. Retrieved from http://search.proquest.com/docview/215923785?accountid=34899
uses logos strongly by providing not only his viewpoint from a business perspective, but also a conceding viewpoint that works in his favor. Edmond references work that involves children, and claims that “the hiring process” of such employees is the most ethically sound time to discover if the prospective hires engage in “inappropriate social media communication with minors” (Edmond Jr. 133). Typically, in the hiring process, a background check is done on the prospective employee. However, a background check won’t necessarily reveal if they commit undesirable behaviors in their private lives. Therefore, Edmond strengthens his logos immensely by referencing a particular scenario where his claim works. Edmond also addresses individuals who believe that having access to an employee’s Facebook is a “horrible invasion of privacy” by stating that sharing personal information on Facebook is similar to “shouting your private business” in public (Edmond Jr. 134). In his comparison, Edmond reveals to his audience that sharing on Facebook can have harsh side-effects, as would shouting in the street. Since Edmond is able to reference a contingent argument and still get his point across, his logos receives another boost. Logos acts as an essential part in Edmond’s essay, and works efficiently to prove his
Chamberlain, Kenneth, “History: The Day the Freedom of Information Act Expanded”. Nationaljournal.com 20 Nov. 2012 General OneFile. Web 26 April 2014.
In conclusion, Nicholas Carr is able to create a compelling argument using Aristotle’s three styles for effective argumentation (logos, pathos, and ethos) in his essay “Is Google Making Us Stupid?”. The process of
"The Triumph of Technique – The Logic of the NSA." LibrarianShipwreck. WordPress.com, 22 June 2013. Web. 08 Feb. 2014.
There is a great battle between the FBI and Apple, one of the most valuable company in the world. It is the fight between national security and privacy. Compromise is not an option; decryption code must either be developed or remain undeveloped. In an attempt to convince Attorney General Lynch to support Apple, Pen America created letter, explaining the consequences iPhone users may have to face if the FBI wins the case. The letter to Attorney General contains many rhetorical strategies, the dominant devices being Juxtaposition and inductive reasoning.
The struggle between the company of Apple Incorporated and the Federal Bureau of Investigation concerning locating information contained on a terrorist’s iPhone via hacking caused a large spike in public concern for data safety and privacy in early 2016. While in the midst of controversy over Apple’s decision to not provide further assistance to the FBI, CEO of the company, Tim Cook, published a statement on the company’s official website addressing concerns and clarifying his position on the matter. In his message, Cook uses various examples of word choice, logic, and amiable appeals in order to convey his reasoning behind not aiding the FBI and to hopefully persuade the audience to support or qualify his decision.
Edward Snowden. This is a name that will be in the history books for ages. He will be branded a traitor or a whistleblower depending on where you look. Many Americans feel that Edward Snowden is a traitor who sold the United States’ secrets aiming to harm the nation. Others believe that he was simply a citizen of the United States who exercised his right to expose the government for their unconstitutional actions. It is important to not only know the two sides to the argument of friend or foe, but to also know the facts as well. My goal in this paper is to present the facts without bias and to adequately portray the two sides of the argument.
The documentary Rise of the Hackers, focuses on the rising criminal use of hacking and how it is effecting multiple areas of technology. The documentary describes simple and complicated situations concerning hacking, but there still questions that must be answered when it comes to hacking and crime. The main question is in trying to determine why a person would choose to commit computer hacking. There are various theories already present within the criminal justice system that may explain at a micro-level and macro-level. These theories would explain why offenders would commit the crimes, but it may not answer the full scope of the question. The Routine Activities Theory would help to explain why offenders offend, why victims are victimized,
Andrews presents an argument from an unidentified authority. As an example, she states that the Internal Revenue Service searches Facebook and MySpace for evidence on tax evaders, and the United States Citizenship and Immigration Services search photos and posts to confirm family relationships (p.552). Says who? The essay also
saw the future demands of the computer industry. He was able to build a personal
Most of his essay was composed of logical appeals because it is a serious more focused topic. Before Edmond explained why he was for sharing passwords with employers, he stated that in Facebook’s terms of rights and responsibilities it forbids used from sharing passwords. This fact helps support why employers should not ask and sets up a good counter argument. Next, he provides reasons for allowing employers to have one’s password. By having the password to access a future employees social media can allow the employer to make the best hire, and protect everyone in the work environment. He goes on to point out how Facebook is not safe even though they provide “privacy tools and special settings”. Finally, he explains that social media is meant for sharing information with the public that can be found in the future. That is why one should never post something personal on their social
Aaron Swartz believed people should be guaranteed their freedoms and liberty that should come with use of the internet, which was pinnacle in
In Conclusion Tim Berners-Lee is quite possible the best innovators in the the world. This invention helps the entire world to share ideas or opinions.
One of the most recent examples of ethics and technology conflicts in the United States are privacy issues and how we cite, distribute and publish intellectual property on the internet. For instance, many corporations and people take advantage of the open access of the internet and the lack of legislation governing the right to post and upload information to the internet. Today, nearly every household in the United States has a computer with int...
In 1973, the U.S. Defense Advanced Research Projects Agency (DARPA) initiated a research program to investigate techniques and technologies for interlinking packet networks of various kinds. It then expanded to other governmental agencies and then to higher education. This was called the Internetting project and the system of networks, which emerged from the research, was known as the "Internet." Al Gore is described as "an advocate of the information superhighway". He helped bring it to our national attention that he invented the Internet. It is not true that he invented the Internet but it is true that he had a small part in its development. Since the early sixties, when Al Gore was still in high school, the development of networking technology had already started. It is true that the Internet has grown and flourished tremendously during Gore's tenure, but that hardly means he caused it to happen.