for michael smith only

11


Title Goes Here

Judus Carter

English/100

July 2017

Julie Pal-Agrawal

Thesis Statement: Identity theft can be avoided by concealing the personal data as well as information, securing the documents with personal information to ensure that they do not get in the wrong hands, and finally ensuring that the document with personal information that needs to be discarded are is properly shredded before they are it is disposed.

Items in a sentence should agree in number. Does not agree: The visitor gave their keys to the attendant. Visitor is singular, but their is plural. Agrees: The visitor gave the keys to the attendant. Also agrees, but perhaps not as fluid: The visitor gave his or her keys to the attendant. Does not agree: Each student should turn in their work on time. Agrees: Each student should turn in work on time. Agrees: Each student should turn his or her work in on time.

Good clear thesis: The thesis forecasts the key points to be discussed in the body paragraphs. The writer always asks questions like these when composing: What is the main claim of this paper? What will this paper prove to the reader? What are the key points that will be discussed in this essay?

The thesis serves as a map of your essay. As the last sentence of the introduction, the thesis states the main topic and the writer's idea or claim about the topic and lists the key points (reasons supporting the main idea) to be discussed in the body paragraphs. Three-point thesis examples: A is better than B because of X, Y, and Z. A needs reform because of X, Y, and Z. While A might seem like a workable solution, there are problems with X, Y, and Z. A should not be implemented because of X, Y, and Z.

Each paragraph of the body should start with a topic sentence. The first topic sentence should be related to X. (The second body paragraph and topic sentence will be about Y, etc.)

Conceal Personal Information

Work on a clearer topic sentence: Identity theft can be avoided by concealing the personal data as well as information. For one to adequately prevent any chance of experiencing a scenario of identity theft, the first step should be to ensure that the documents containing the personal information are not exposed. This will ensure that anyone with malicious motive cannot gain access to the personal information as well as the raw data. The attackers find it very The word "very" is usually not needed. Mark Twain famously said, "Substitute 'd@mn' every time you're inclined to write 'very'; your editor will delete it and the writing will be just as it should be."

easy to exploit any form of personal data irrespective of whether it is detailed or not. This means that every single bit of personal data should not be exposed at any cost except to a second party where by there is an assurance of confidentiality as well as privacy. This may include individuals such as legal advisors who are guided by the legal duty of care. Concealing personal information is not a difficult task. It Be careful starting sentences with pronouns (it, he, she, they, etc.). Example: It contributes to the spread of disease. Fixed: Poor hygiene habits contribute to the spread of disease. Sometimes the usage of pronouns makes for unclear sentences. involves the use of very simple techniques such screensavers when a computer containing open documents is not in use to complex approaches such as data encryption (Hassan, 2016). Concealing personal information can be used on its own as way of preventing attacks in form of identity theft. It Be careful starting sentences with pronouns (it, he, she, they, etc.). Example: It contributes to the spread of disease. Fixed: Poor hygiene habits contribute to the spread of disease. Sometimes the usage of pronouns makes for unclear sentences. can also be used as complement to other methods making the process even more efficient.

Work on clear topic sentences. The format for an academic argumentative paper should be:

1. Paragraph 1: Introduction provides a general overview. Introduction also ends in a three-point thesis (identifies points A, B, C). Thesis statement is a single, declarative sentence that is the last sentence in the first paragraph. Something like: In order to understand the issue of X, it is important to consider A, B, and C.

2. Paragraph 2: Body paragraph that starts with a topic sentence related to A. Each topic sentence is followed by detail. The final sentence in the paragraph is often a transition sentence into the next paragraph.

Sometimes (atypically) these body paragraphs can be broken up into two, but each topic sentence should be related to one point in the thesis.

3. Paragraph 3: Body paragraph/topic sentence that relates to B

4. Paragraph 4: Body paragraph/topic sentence that relates to C

5. Paragraph 5: Conclusion that includes a restated thesis using fresh language

Securing Documents with Personal Information

Work on a clearer topic sentence: Identity theft can be avoided by securing the documents with personal information to ensure that they do not get in the wrong hands. Another approach towards toward, forward, etc. being safe from identity theft is to ensure that security measures are put in place to help prevent any kind of data breach which Which and that do not mean the same thing. Whenever a comma is needed, use which. Otherwise, use that. Examples: She had a job that she loved. She had a job that she loved but a schedule that she did not. She had trouble finding parking, which was a recurring issue. She was always happy when Mondays rolled around, which meant she ate lunch with her best friend. For a more detailed explanation, see http://grammar.quickanddirtytips.com/which-versus-that.aspx can be exploited to steal ones identity. To achieve this, one must ensure that documents containing personal information are both secured online and offline. The best ways to protect personal information offline is to ensure that they are safely locked in safe place, empty the mailbox as soon as possible to ensure no unauthorized individual gets their hands on the mails and limit documents being carried around. In terms of the online security an individual should avoid sharing personal data online with unknown individuals, use strong passwords and encryption keys and avoid sharing to much information on the networking websites. Keep sentences concise. Some people say a good guideline is 17 words, and other people say 23 words. There is no real rule, but I think an easy-to-understand sentence can be read aloud on one breath. The more complicated the material, the shorter the sentences need to be. If a sentence must be long, surround it with shorter sentences. Furthermore, the documents with personal information can be secured by ensuring that the devices are safe in the case where the documents are softcopies. This can be attained by using antispyware, a firewall, and an antivirus (Russell, Thompson, Butler & Houston LLP, n.d). Work on correct in-text citations Leaving documents lying around in the offices on desks can make one vulnerable to identity theft because everyone an organization is capable of using the information for selfish gains. Due to the dire consequences of identity theft, it is crucial to every technique and tool available to protect the documents containing person data.

The most common format is the author-date method, which includes the author's last name and the year of publication.
(Smith, 2007)
If the source has no listed author, give the first few words of the title in the in-text citation. Place quotes around the shortened versions of the titles of articles, web pages, or chapters. Use italics for titles of periodicals, books, or reports.
The shortened version of the title in quotes or italics should retain the original capitalization of the source.
("Marketing Strategies Improve Sales," 2007)
(Field Guide to Florida, 2003)
If no publication date or copyright year is given, use the abbreviation n.d., which stands for "no date."
(Smith, n.d.)
If the source has no listed author and does not give a publication date, use the first few words of the title and the n.d. abbreviation.
("Study Skills for Students," n.d.)
Using Author or Title Information in the Body of the Text
The author's last name and the year of publication do not always have to be in parentheses. Instead, you can use a signal phrase. The signal phrase usually is comprised of the author's last name and a verb, or the author name and then the cited information.
Paraphrased information:
According to Johnson (2008), theories constantly change as our society changes.
Quoted information Example 1:
Johnson (2008, p.43) stated, "Although we would like to say that theories are the basic idea of why we behave in a certain manner, these theories are in a constant flux as our society adapts to change."
Quoted information Example 2:
Johnson (2008) noted, "Although we would like to say that theories are the basic idea of why we behave in a certain manner, these theories are in a constant flux as our society adapts to change" (p. 43).
In-text citations to sources with no identified authors can also use signal phrases.
The article "Parenting teens" (2008) stated that parental respect and firm boundaries deter lots of dangerous and risky teen behavior.

Shredding Document Containing Personal Information

Work on a clearer topic sentence: Identity theft can be avoided by ensuring that the document with personal information that need to be discarded are properly shredded before they are disposed. There are a number of reasons why documents are disposed semicolon however; comma the most important consideration is on how to dispose them safely. These documents usually contain some data which can be manipulated to steal an individual’s identity. The best approach which can be used in order to avoid this is to ensure that the documents with personal information are properly shredded before they are disposed. This is a technique which involves ensuring that data is secure offline (Russell Thompson Buttler & Houston LLP, n.d). By shredding the documents, those with the intention of stealing an individual’s identity will have a difficult time putting the documents back together and if they try to do so, there is a very The word "very" is usually not needed. Mark Twain famously said, "Substitute 'd@mn' every time you're inclined to write 'very'; your editor will delete it and the writing will be just as it should be." high probability that they will not get the right information.

Work on adding transitions between paragraphs. A transition is a word or phrase that connects one idea to another. This connection can occur within a paragraph or between paragraphs. Effective transitions highlight the key information from one paragraph to the next and help to create a logic flow between ideas. Some good ones to start paragraphs off are listed below:

Sequence/Order: first, second, third, ... next, then, finally

Example for example, for instance, namely, specifically, to illustrate

Additional Support or Evidence: additionally, again, also, and, as well, besides, equally important, further, furthermore, in addition, moreover, then

The strategy is to keep the seed of an idea you left off with in a previous paragraph with you as you begin the new paragraph. Acknowledging your direction for the reader helps to keep your reader focused (and you, too, as the writer!), and keeps your readers confident that you will continue to guide and control them throughout this “essay-long” journey.

References you needed to include two scholarly sources from the UoP Library

Hassan, N. (2016, June 2). Data Hiding Techniques in Windows OS: A Practical Approach to Investigation and Defense 1st Edition. Retrieved from Linkedin: https://www.linkedin.com/pulse/data-hiding-techniques-windows-os-practical-approach-defense-hassan

Russell Thompson Butler & Houston LLP. (n.d). How to keep information secure to avoid identity theft. 1-2.

Week 3 Rubric

Points Available

Points Earned

Comments

Thesis statement is present at the top of the page 2 in the template to present the supporting points that will be discussed in the body paragraphs.

Good job!

The draft is complete enough for constructive feedback and is at least 350 words in length.

Yes

3 paragraphs submitted (7 to 10 sentences per paragraph) – each with a topic sentence, supporting details, and a concluding sentence that leads the reader to the next point.

Major points are stated clearly, are organized logically, and are supported by specific details, examples, or analysis.

2.5

Work on strong topic sentences that stem from a clear three point thesis.

Every Argument Paper is based on a Thesis—a statement that readers may not already accept and that they will not accept without good reason.

Sample Thesis: Learning about French culture, cuisine, and art made my year in Paris enlightening.

• Body paragraph 1 will discuss how learning about French culture made this year in Paris enlightening.

• Body paragraph 2 will discuss how learning about French cuisine made this year in Paris enlightening.

• Body paragraph 3 will discuss how learning about French art made this year in Paris enlightening.

Two scholarly article sources are added to the Reference list at the end of the paper

1.5

Work on finding scholarly articles in the UoP Library

The body paragraphs are double spaced and either Times New Roman, Arial, or Courier 12-point font (APA required) is used.

Yes

Mechanics – writing is free of spelling and grammatical errors

1.5

Please see my comments above

Late penalty 10% per day

Total Points

12

10.5

Overall good work Judus! Please use my feedback above to revise your draft before submitting Week 4 assignment.