100% (1)
page:
7 pages/≈1925 words
Sources:
7
Style:
APA
Subject:
Literature & Language
Type:
Research Paper
Language:
English (U.S.)
Document:
MS Word
Date:
Total cost:
$ 30.24
Topic:

Public Security and Personal Privacy

Research Paper Instructions:

In class, we have emphasized the need first to understand the topic and its surrounding conversation and then to craft an argument in response. Now that you have carefully and inquisitively conducted research, it is time for you to join the conversation. 

Argument

For this assignment, compose an essay which responds to the research that you conducted for the annotated bibliography. Initially, you may have chosen a topic that you had some questions or ideas about. Now, your task is to develop a well-argued response that is supported by the research that you conducted.  

Through your research, you have hopefully located a conversation about your topic. Your task is to share that conversation with your reader by discussing what other writers have argued about your topic and then respond with your thesis – your stance on this topic. 

As you respond to that conversation, your thesis should address questions of “So what?” and “Who cares?” In this essay you’ll have a clear, explicit thesis, but that thesis should be complex and nuanced; you shouldn’t merely present a “yes/no” argument.

This essay should establish the significance of your argument, and your goal is to persuade the reader that your insights are valid.

Research

To develop this essay, you should include at least six (6) sources.  At least four (4) of these sources should be scholarly, academic texts (journal articles, scholarly books, research studies, etc.). 

You may, of course, include as many sources as you consider necessary; however, you should always be aware of how those sources contribute to what you have to say about the issues. 

Regardless of how many sources you use, you should never let the sources overwhelm your own perspective on the subject or do the speaking for you. This essay must not become an “information dump”: a series of quotations and facts from other sources, linked together without a clear thesis determining their organization and use. You also should be doing more than simply using sources to confirm your claims.  Instead, the sources should be helping you develop the larger conversation that surrounds your topic and adding complexity and nuance to what you have to say about it. 

These sources should be attributed and integrated into your conversation using strategies from They Say / I Say and cited according to APA format.

So What? The Purpose of This Assignment

This is a linear, thesis-driven research essay, in which the body paragraphs develop the validity and complexity of the thesis. Most of your academic writing in college will involve research, analysis, and argument; in this paper, we’re bringing all three elements together. 

Your audience in this essay is therefore primarily scholarly or academic; while you may be addressing a topic of interest to the general public, our conversation is with readers who are interested in thinking critically about these issues and ideas and building knowledge through analysis.

Regardless of your topic, your goal in this essay will be to make a detailed, logical, and carefully researched and supported argument that in some way responds to, agrees with, or counters the research that you are presenting.  It should consider potential counter-arguments and demonstrate a clear awareness of multiple perspectives, all in the development of your own point and purpose. 

Evaluation Criteria

I will be evaluating this essay according to the College Writing Program rubric. However, I will be paying particular attention to the following questions:

  • Does the essay include a clear, explicitly stated thesis?  Does that thesis demonstrate ambition, thoughtfulness, and appropriate specificity?
  • Does the argument demonstrate a clear awareness of multiple perspectives and provide an original response to the “conversation”?
  • Does the essay effectively incorporate (at least) 6 sources in service to that thesis, using specific strategies from They Say / I Say?
  • Do those sources (from a variety of genres and perspectives) receive correct APA citation and formatting (along with a references page)?
  • Is the essay organized logically and effectively, and does the main argument clearly develop from the thesis?
  • Is it written with a clear sense of an academic audience, anticipating and addressing a reader’s questions and expectations?  Does it maintain a tone and style that are effective and consistent with audience and context?
  • Does the essay reflect the writer’s developing grasp of academic language conventions (as evidenced by use of common academic words and phrases and lexical variety)? Does the essay exhibit attention to detail as a result of careful editing and proofreading?

Due Dates & Details

A rough draft of this essay will be due on Thursday, April 18th by the beginning of class (submitted on Blackboard). This rough draft should be at least 7 pages long (NOT INCLUDING your title page OR your list of references).

A revised version of the essay will be due on Thursday, May 2nd by 5:00 p.m. (submitted on Blackboard).

Your essay must be 7-9 double-spaced pages in length, NOT INCLUDING your title page OR your references page. The font must be Times New Roman size 12.

Research Paper Sample Content Preview:
Public Security and Personal Privacy Student’s Name Institutional Affiliation Public Security and Personal Privacy Introduction The united states of America are facing a real and a grave security threat. International terrorism and extremism have thrived and flourished in many parts of the globe. These insecurities have been threatening the United States warfighters, the homeland and their allies. The regional conflicts have also led to severe security threats in the United States. The newest threats and dangers that the country is facing is the one associated with the cyberspace. The cybersecurity threat has increasingly continued to face the US national government each year. The threat has posed a dangerous security impact on the United States economy and also its citizens. The hackers, cybercriminals, and foreign adversaries have become more complex and sophisticated in the use of the internet to cause harm to the United States. Due to these potential dangers of insecurity, the relevant part of the government is that it monitors the personal privacy of many people for the sake of national security. Personal privacy is critical and should be protected at all costs for all citizens. While personal privacy is critical and needs to be protected, the government is obligated to put in place various security improvements that not only improve the security situation of the citizens, but also ensure that their privacy is not violated. Background Before the 9/11, the United States national government instituted policies which were aimed at protecting personal privacy. This was mainly catalysed by the emergence of the new technology which made it essential for regulations against the privacy breach. In the year 1960, the government enacted laws that protected the telephone calls even when they happened in a public pay phone. This law mostly limited the ability of the police officers to listen to private phone calls. After the 9/11 incidence, the relevant authorities of the government have instituted several measures to counter the insecurity issue in the United States. Some of these policies include the mass surveillance of citizen’s personal information. As a result, this issue has raised many questions among the stakeholders. The Government Should Not Sacrifice the Privacy of Citizens to Achieve the Purpose of Security Security is a significant concern today due to the rising levels of terrorism and cyber-attacks. It is for this reason that the American government is devoted to protecting its citizens by the use of all means possible. National security is one of the most import things that the government can provide to its citizens. The primary role of the government is to provide the required security to its citizens (Elmaghraby & Losavio, 2014). Therefore, the relevant government department has decided to come up with the new measures to protect its citizen from the threats facing them. Some of the tools and policies that are used in maintaining security include sacrificing personal privacy to curb insecurity. The efforts by the government to protect the Americans deserve to be praised, but the only problem with their actions is that they have not considered personal security as a priority. The argument here is that personal privacy is also part of the individual security. It is, therefore, questionable whether the government can provide public security without sacrificing personal privacy (Mitchener-Nissen, 2013). It is worth understanding that personal privacy and public security are not a zero-sum game. Providing security to the public does not imply that personal privacy has to be sacrificed. There are many methods that the government can employ to achieve its objectives of giving enough security to its citizens. Some of these methods would enable the government to have control over security issues while still maintaining the personal data and information privacy. People would choose to have security rather than privacy if asked to choose between the two. Everyone requires security for survival, but privacy is a human social need. In a recent poll to determine what people would consider important between security and privacy, it is not by surprise that 51% of the people chose security over privacy (Li, Wang & Sun, 2017). It appears that security is more crucial even for those who don’t subscribe to Maslow's hierarchy of need. Security is essential for people to experience happiness in their daily endeavours. Despite being so crucial to human survival, there need to be a balance between privacy and security which helps to improve the level of individual privacy. Privacy is a unique aspect that is enjoyed by human beings. Security is also one of the most crucial aspects for the human beings existence and survival. In the light of the competing importance between the two, the security departments need to establish at what circumstances when security cannot be compromised for privacy and the instances when the privacy does not need to be given up for security. This step will help improve the national security as well as protect the personal privacy. From the preceding privacy versus the security trade-off relationship, it makes sense to forego privacy to some extent to safeguard security. In specific situations like in airports, prioritizing security over privacy can be seen a feasible move since a simple body scanning exercise is capable of saving a multitude of people from a great danger of terrorist attack (Valkenburg, 2014). This is one of the privacy versus security trade-off model that can be used to determine the extent to which privacy can be foregone to provide security. It is well understood that sacrificing a small piece of privacy might be inevitable where additional security is indispensable. However, the protection of both the privacy and provision of security requires the contribution of all the stakeholders. People should be willing to give a certain degree of their privacy while the government should be willing to protect personal privacy by all means. Further exposing the Americans data and information to provide security is a wrong move. The criminals are also using sophisticated technologies to execute their plans. That implies that the exposed information about the citizens can be used by the terrorists to execute even fatal attacks (Sandler, 2014). It is worth noting that everyone can access the information accessed by the government through the use of the right spying soft wares. This move will make the nation to be even more vulnerable to security threats. It exposes people to the threat of ...
Updated on
Get the Whole Paper!
Not exactly what you need?
Do you need a custom essay? Order right now:

👀 Other Visitors are Viewing These APA Essay Samples:

Sign In
Not register? Register Now!