Free Essay

Is Your Information Secure?

In:

Submitted By kiwiblonde11
Words 1126
Pages 5
Kalie Kollmar

ENG 3003

Professor Dale Ireland

Essay 1

July 19, 2015

Is Your Hotel Information Safe?
Checking into a hotel requires giving the hotel your personal information including name, address, phone number, and credit card. But is this information that you give them protected? Caroline Levander and Matthew Pratt Guterl use two modes of persuasion in their article, Are Hotels Dangerous?, to interest or appeal to the reader, those being pathos and logos. Levander and Guteral use pathos to relate to their readers that have stayed in hotel rooms; and logos by supporting their statements with facts. Such as, when they report that in a Supreme Court decision invalidated an ordinance that requires owners of a hotel to give law officials patron information without a warrant. They do not, however, use ethos effectively because there is not efficient credibility from the authors. Levander and Guterl do not use ethos, but successfully use pathos and logos to convince the readers that hotels are more unsafe than guests realize because police can access patrons information without a reasonable cause.
Ethos refers to the credibility of a writer. Neither Levander nor Guterl, are experts or workers in the hospitality field. There is no background information about the writer that would lead the reader to trust the information that they are providing. Even though large amounts of information were provided in their Are Hotels Dangerous? article, they cannot personally provide relevant information for the reader. Caroline Levander is an English professor at Rice University, and Matthew Pratt Guterl is an Africana and American studies professor at Brown University. They are co-authors of Hotel Life: The Story of a Place Where Anything Can Happen. Despite the fact they authored a book about hotels, they are not professionals on the subject of the hotel industry. And even though they write in a professional tone and with word choice that is appropriate for the audience, they do not seem to represent enough credibility to represent ethos in their writing. Just because ethos is not present, does not mean they do not appeal to the readers using another method, such as logos.
In order to create logos, Levander and Guterl gave valuable information with a Supreme Court case. This case directly related to their disagreement on police being able to obtain patron’s information without a warrant and the general unsafety of hotels. In the case of Los Angeles vs. Patel, the Supreme Court ruled in a 5-4 decision on June 22, 2015, invalidating a local ordinance that was 116 years old. This local ordinance required that owners of hotels were required to give guest information, such as that provided on check-in forms, to law enforcement (with or without a warrant), (Levander & Guterl, 2015).
Levander and Guterl mentioned a two letters written by two different Supreme Court justices that were involved in the decision making process. One letter was written by Justice Sonia Sotomayor, who was part of the majority decision. She stated that it was not dangerous to the guests for law officials to request guest’s information without a warrant. The authors also included a letter written by Justice Antonin Scalia, who was part of the minority decision. This letter by Scalia, is what assisted in developing pathos. Pathos is the sympathetic imagination and the emotions that the reader can more than likely relate to. The letter by Justice Antonin Scalia was able to develop pathos because readers have more than likely stayed in a hotel before and know how much personal information is given to the front desk and the type of people certain hotels can attract depending on its location. This knowledge can cause a guest to hesitate because their information could become compromised. The letter by Justice Scalia stated that hotels are a place that “provide housing to vulnerable transient populations” and “are a particularly attractive site for criminal activity ranging from drug dealing and prostitution to human trafficking.” Hotels also offer an anonymous and private place for cheap and has allowed for “rendezvous sites where child sex workers meet their clients on threat of violence,” (Levander & Guterl, 2015). Even though these opinions differ, anyone who has stayed in a hotel can relate to the viewpoints of both Supreme Court decision makers. Segway?
Logos is also apparent in Levander’s and Guterl’s mention of the history of hotels and the struggles that many hotel owner have. Historian A. K. Sandoval-Strausz, who is the author of “Hotel: An American History,” stated that owners of a hotel have tried to keep them pure and under control. They have attempted to steer away from prostitutes, seducers, and adulterers, as well as burglars, who will come to hotels because of the temporary cover and anonymity it gives them. During the 1890’s, detective agencies would provide “wanted” posters so that hotel owners could screen their guests and notify law officials of any sightings of criminals. In the 20th century, hotels became more and more transient and became a center for vice crimes. Private rooms, especially since the 1820’s and 1830’s, have provided an opportunity for planned and chance encounters where prostitutes can search for affluent businessmen. Identity theft through pick pocketing was also common in hotels that provided high-end private rooms. The Los Angeles vs. Patel case initiated an anti-vice campaign, due to the concern of seedier hotels that promote rates by the hour, making it available for a quick hit or hookup, (Levander & Guterl, 2015). With the history of hotels being provided, a reader can have background knowledge of the subject and understand the point of view of the writers with their providing of logos. Segway?
Levander and Guterl are able to appeal and persuade readers to see their viewpoint that personal information given to hotels is more unsafe than what guests realize. Even though they were unable to provide ethos and provide their personal credibility or knowledge, they were able to provide pathos and logos to gain the readers interest and trust. The writers used pathos to communicate effectively with those who have previously stayed in hotel rooms, and used logos to support their viewpoints with facts and information with the Supreme Court Los Angeles vs. Patel case along with history of the hotel industry. Levander and Guterl have used the methods of pathos and logos to encourage readers to take their view that law enforcement should not be able to access a hotel guest’s information without a warrant and that they should consider their safety before booking a stay at a hotel.

Reference:
Levander, C., & Guterl, M. (2015, July 1). Are Hotels Dangerous? Retrieved July 19, 2015, from http://www.nytimes.com/2015/07/02/opinion/are-hotels-dangerous.html?_r=0.

Similar Documents

Premium Essay

Hey This Is Werid

...Imation Data Storage and Information Management Document No.: M0-001-1408-8 Effective: 4-Dec-2009 Version: D Page: -0- Imation LOCK User Manual Security Application Program V2.0 - D Imation Data Storage and Information Management Document No.: M0-001-1408-8 Effective: 4-Dec-2009 Version: D Page: -1- Table of Contents A. B. C. D. E. Introduction ........................................................................................................................ 2 General Description............................................................................................................ 2 Features .............................................................................................................................. 2 Before Using the Security Application Program – Imation LOCK.................................... 3 Introduction to Imation LOCK........................................................................................... 4 E1. E2. Main Screen............................................................................................................ 4 Set Password / Change Password........................................................................... 4 F. G. H. E3. Disable Password ................................................................................................... 7 E4. Unlock Device........................................................................................................ 8 E5. Configure Partition...

Words: 2332 - Pages: 10

Free Essay

Webdisgne

...|Security and Confidentiality On the Internet | |You have to create a report on Security and Confidentiality on the Internet. Find 10 appropriate websites on the Internet on this topic and | |list them below. These websites will be used throughout your assignment: | |[1 X 10 = 10 Marks] | | | |1. www.livinginternet.com/tindex_s.htm | |2. www.jmir.org/2002/2/e12/ | |3. www.aib.ie/personal/home/Security-Policy | |4. www.fetac.ie/doc/WelcomeServlet?DocId=0901df9e80001f99 | |5. www.globalmednet.net/privacy.html | |6. technet.microsoft.com/en-us/library/cc780167(v=ws...

Words: 2358 - Pages: 10

Free Essay

Hrm - Roles in the Workplace

...contains confidential information and is intended only for the individual/s named. If you are not the named addressee you should not disseminate, distribute or copy this e-mail. Please notify the sender immediately by e-mail if you have received this e-mail by mistake and delete this e-mail from your system. E-mail transmission cannot be guaranteed to be secure or error-free as information could be intercepted, corrupted, lost, destroyed, arrive late or incomplete, or contain viruses. The sender therefore does not accept liability for any errors or omissions in the contents of this message, which arise as a result of e-mail transmission. If verification is required, please contact the sender as information of which is posted. CONFIDENTIAL NOTICE: This message contains confidential information and is intended only for the individual/s named. If you are not the named addressee you should not disseminate, distribute or copy this e-mail. Please notify the sender immediately by e-mail if you have received this e-mail by mistake and delete this e-mail from your system. E-mail transmission cannot be guaranteed to be secure or error-free as information could be intercepted, corrupted, lost, destroyed, arrive late or incomplete, or contain viruses. The sender therefore does not accept liability for any errors or omissions in the contents of this message, which arise as a result of e-mail transmission. If verification is required, please contact the sender as information of which is posted...

Words: 2396 - Pages: 10

Premium Essay

Pc Security

...Improving Web Application Security Threats and Countermeasures Forewords by Mark Curphey, Joel Scambray, and Erik Olson Improving Web Application Security Threats and Countermeasures patterns & practices J.D. Meier, Microsoft Corporation Alex Mackman, Content Master Srinath Vasireddy, Microsoft Corporation Michael Dunner, Microsoft Corporation Ray Escamilla, Microsoft Corporation Anandha Murukan, Satyam Computer Services Information in this document, including URL and other Internet Web site references, is subject to change without notice. Unless otherwise noted, the example companies, organizations, products, domain names, e-mail addresses, logos, people, places and events depicted herein are fictitious, and no association with any real company, organization, product, domain name, e-mail address, logo, person, place or event is intended or should be inferred. Complying with all applicable copyright laws is the responsibility of the user. Without limiting the rights under copyright, no part of this document may be reproduced, stored in or introduced into a retrieval system, or transmitted in any form or by any means (electronic, mechanical, photocopying, recording, or otherwise), or for any purpose, without the express written permission of Microsoft Corporation. Microsoft, MS-DOS, Windows, Windows NT, Active Directory, BizTalk, IntelliSense, MSDN, Visual Basic, Visual C#, Visual C++, and Visual Studio are either registered trademarks or trademarks of Microsoft...

Words: 83465 - Pages: 334

Premium Essay

E Business

...so you do not have to pay a programmer to do that. The problem with that is though when people wish to buy products from you they would print the page out, fill it out and then fax it with their credit card information to you. There are some drawbacks to doing business the print and fax method, most online shoppers won’t go near an insecure e-commerce page. Doing it this way makes it easier for Identify theft to happen as well because you have to fax them the information and people can keep the faxed copy. The BBB and the Federal Trade commission warn and advise people against site usage that does not provide a secure e-commerce transaction. When it comes to purchasing music or videos a person can get them right away by downloading them to their computers. Most people want to buy from sites that are easy for them to pay for the product and get it soon after they pay for it. The disadvantages defiantly outweigh the advantages on an insecure site. Having a secure site works better than an insecure because most of the customers will have confidence that their information will not get stolen (Brenner L.J.). There are studies proving that a large amount of people are concerned about privacy and security. One study shown that 87 percent of Americans fear their information will be stolen or misused (Rayport & Jaworski,...

Words: 878 - Pages: 4

Premium Essay

Transaction Security Schemes and How to Prevent Them

...According to Management, Information Systems (2011), “Transactions are events that occur as part of doing business, such as sales, purchases, deposits, withdrawals, refunds, and payments ” (p. 278). Criminals use technology to get people to send money, obtain banking/credit card account and personal information. The purpose of this paper is to prove that with awareness, the appropriate preventive measures in place, consumers can minimize or eliminate their risk of falling prey to these scams. Transaction Security Schemes and How to Prevent Them Secure Electronic Transaction (SET) was developed to ensure the security of financial transactions on the Internet. It was supported initially by MasterCard, Visa, Microsoft, Netscape, and others. A user is given an electronic wallet and a transaction is conducted and verified using a combination of digital certificates and digital signatures among the purchaser, a merchant, and the purchaser’s bank in a way that ensures privacy and confidentiality. A SET purchase involves three parties: the cardholder, the merchant, and the payment gateway or bank. The cardholder shares the order information with the merchant but not with the payment gateway. He shares the payment information with the bank but not with the merchant. A SET dual signature accomplishes this partial sharing of information: the cardholder makes separate hashes of the order information and the payment information and signs the pair...

Words: 3535 - Pages: 15

Premium Essay

Eight Domains of Isc2

...International Information Systems Security Certification Consortium is specializes in certificates for information Security. It is a non-profit and one of the world’s largest organizations for IT Security. The most common certificate they offer is the Certified Information Systems Security Professional (CISSP). The CISSP is a certification that is recognized worldwide and acknowledges that you are qualified to work in several fields of information security. To obtain the CISSP Certification you must first meet the Requirement. A minimum of 5 years of security work, experience and accept the code of ethics, a background check, and endorsed qualifications are just a few you might expect to have when deciding to take the exam for this certification. Professionals that hold this certification have higher salaries than those who don’t. This would be something to consider if you are starting a career in the Cyber security field. Once your certificate is obtained it will be valid for three years. To renew you must either retake the test or provide 20 Continuing Professional Education (CPE) credits and pay a fee of $85.00 each year. A CPE credit can be earned by taking more classes, teaching, volunteering, and attending conferences. Each hour spent equals one CPE credit. The points earned are more if you publish books or prepare training for others. It consisted of 10 domains until April of 2015 when it was updated to 8 because of the increase in cyber...

Words: 2654 - Pages: 11

Premium Essay

Mobile Computing and Social Networks

...applications are capable of providing your most sensitive information with and sometimes without your knowledge. The geolocation data can reveal a person’s physical location, and this can be done by a Global Positioning System (GPS), Internet Protocol (IP) geolocation using data bases that map IP addresses to geographic locations as well as financial transaction information. This technology has become very useful, especially in the social networking arena. It allows us to inform our friends and followers as to where we are and what we are doing. This technology created a way for us to do things once thought could only be done via telephone or desktop computer. This same technology has become a part of us and everything we do, we have grown to depend on it and it has proven to be most efficient and effective. Perhaps one of the greatest accomplishments of mobile based applications is mobile GPS, instead of doing things the traditional way by pulling directions up on our desktop and printing it out, we can now just plug the information into our mobile GPS and listen to the sound of a voice giving us step by step directions as we are driving via our mobile device from “Point A” to “Point B”. This is done via a chip installed within your mobile device, with this technology your device has a connection via the satellite to pinpoint your exact location. The efficiency of these devices does depend heavily on the signal your device is able to pull. As we all know...

Words: 2686 - Pages: 11

Free Essay

Zsdaasdasdwdadf

...security policies or laws they constantly need to be altered because of the changing technology. You are always up for an attack or an intrusion of your own privacy. Survivability is the key. Just the simple task of checking email, browsing, chatrooms, or even shopping can be harmful. You can be safe in this environment but you must always be on the alert for problems. Three kinds of Internet security issues that are the topic of conversation; Unauthorized access, back doors and loopholes and, the potential threat of confidential information sent over the internet can be viewed (Scott, 1998). There are several ways you can become a victim of these issues. Email, browsing, shopping or banking and chat rooms are a potential threat for your security. Email can be a type of security issue. America Online, Inc. was forced to admit that hackers had accessed member accounts recently through an email virus. Sending and receiving email from unknown people can cause a hazard. You can make common mistakes by revealing your identity from digital signatures and sending personal pictures of yourself. Although, it is highly unlikely for someone to capture your mail while it is in route to its destination, you should always think about whom you are sending this mail to. Encrypting also is a valuable key is you are mailing confidential information. Mostly email comes from a person or a group listed in the email. Sometimes people deliberately provide the...

Words: 1886 - Pages: 8

Free Essay

Android

...------------------------------------------------- ------------------------------------------------- COLLOQUIUM REPORT ------------------------------------------------- ------------------------------------------------- ON ------------------------------------------------- ------------------------------------------------- Data Mining ------------------------------------------------- ------------------------------------------------- Submitted as partial fulfillment for the award of ------------------------------------------------- ------------------------------------------------- MASTER OF COMPUTER APPLICATIONS ------------------------------------------------- ------------------------------------------------- DEGREE ------------------------------------------------- ------------------------------------------------- Session 2012-13 ------------------------------------------------- By + ------------------------------------------------- Jeetendra Kumar Maurya ------------------------------------------------- 1045914041 ------------------------------------------------- ------------------------------------------------- Under the guidance of ------------------------------------------------- MR. Vinod Kumar (Sr. Asst. Professor) ------------------------------------------------- ------------------------------------------------- ACADEMY...

Words: 6401 - Pages: 26

Premium Essay

You Decide: Book Bunker

...store grew and expanded. Recently Book Bunker has implemented an online presence, including their own website and is now looking for a secure online payment system to prevent losing any further online sales. This report will explain how an e-payment system works along with three researched e-payment systems recommendations. In addition, security suggestions for Book Bunkers website and e-payment system to secure their database and customer transactions will be discussed. In attempt to help Mary and Joe decide what e-payment system to use, I have made three recommendations including Authorize.net ,Wepay, and PayPal. I believe the information I’ve provided will give your business the direction it needs to choose the right e-payment system. How E-Payments Work There are many online payment service providers (PSP) available today, most of them accepting all major credit cards. Online credit card payments work by a customer imputing their credit card information into the payment system data base, acting as a promise to pay. The PSP the contacts the bank that issued the credit card who then authorizes the credit card. Many PSP’s can complete these steps in less than 30 seconds. Once the payment steps are completed, the issuing bank settles or pays the acquiring bank and the seller now has their payment. This payment happens through a secure network. Since you’re now world famous, I will list only merchant e-payment services that allow payments from all over the world. ...

Words: 777 - Pages: 4

Premium Essay

Securing Online Tranactions

...We take a look around and we have technology everywhere; Smartphones, tablets, laptops, desktops, and more. This access to technology gives us the access we need, access to send emails anywhere, look up information we may need, and able to purchase a shirt or even book a hotel online all from a phone or tablet. Being able to purchase items online is not new, it has been around for years, the thought of this is call ecommerce, ecommerce is the buying and selling or products or services via the internet (Merchant). Before the internet, before ecommerce, we had to go to Wal-Mart, or go into a GNC to get our vitamins that we need. We would spend so much time driving to store after store to get the things we needed, time and gas wasted. So when did online shopping start and how did it come about? The idea of online shopping dates back several decades, it was just not something that was thought of here recently in past few years. The idea of shopping and making purchases online were an idea of man named, Michael Aldrich. It was Michael Aldrich that was credited in the developing the start of online shopping (Merchant). It was Aldrich who back in the late 1970s, that took an old television and connected to a telephone and coined it "teleshopping" which he meant as shopping from a distance, this would be the start of the idea he had in mind (Merchant). The start and creation of the world wide web, or what we like to call the internet would be the milestone that was needed to reach...

Words: 3581 - Pages: 15

Free Essay

Securing Windows Xp

...(Millennium Edition). Windows XP has a much brighter look and better GUI (graphical user interface) technology. This operating system automatically keeps your PC up to date with the latest security enhancements such as windows firewall that helps to protect your computer from viruses and worms that are spread throughout the Internet. Windows XP also allows quicker access to wireless networks from your laptop and with the built-in Encrypting File System (EFS), found only in Windows XP Professional this provides an additional level of file protection from hackers and data theft by encrypting files with a randomly generated encryption key based cryptographic scheme that encrypts all files in a folder. Users with itinerant profiles can use the same key with trusted remote systems. EFS have some key features that it offers such as, transparent encryption, strong protection of encryption keys, integral data-recovery system and secure temporary and paging files. Most end-users with personal computers use Windows XP operating system on their home system; there are several steps that should be taken to secure your home PC just as a Network Administrator would secure their networks. First, lets talk about enabling a password for the guest account this should be done to ensure that no one can log into the computer and access valuable information since most of us store critical...

Words: 2078 - Pages: 9

Premium Essay

How to Guarantee Safe and Secure Use of a Specialist Communication Channel

...How to guarantee safe and secure use of a specialist communication channel Personal information is information that is just for you and nobody else. This could be an email address, a user name, credit card details etc. This helps ICT because it means that everyone will have a personal identification and they can log onto different sites using user specific details. Personal information is used on blogs to access you blogs and edit them. Personal information should not be given away because it would affect you by getting spam or people attacking your accounts and accessing everything you do. To avoid this you can be cautious with what details you give away and make sure things are safe and secure before entering any details. Once you have registered and set up your profile you can start adding your friends and sending them messages. As long as you are careful online, you can have a lot of fun with your mates. - Don't add anyone you don’t know to your friend list, even if they say they know you. If you don't know them, don't add them.  - People can create really great fake profiles, so be aware that even if someone says they are your age and into the same things as you, they might not be telling the truth.   - If you are doing a Prezi presentation make sure you its relevant with no personal information. - Don’t arrange to meet someone that you have met online. Some people may not be who they say they are.  - If you are contacted by someone that you are unsure of...

Words: 562 - Pages: 3

Free Essay

Protecting Wireless Devices and Enhancing Security in a Wireless Network

...Howstufworksvideo (12) they show you the basics on how to setup home Network Security. You can go there can see how it is done. Just a few years ago, (25 Sep 07) there were some so-called experts saying that there was no need to secure your wireless system. In an article, David Ramel alleges that the importance of wireless security is overhyped, that it's now trivial to secure wireless nets and that IT pros have far more serious security concerns they should be addressing -- while home users have little to lose even in the remote chance someone tries to breach their network. (3) This person was obviously living in a sheltered environment because identity theft and credit card theft was out of control then. Now he is saying don’t worry about protecting your network and to just hold on to your wallet; basically. Either he was very innocent or totally clueless and is eating humble pie about now. Here are a few disadvantages. A limited spectrum, war driving, interfering signals can be generated by other devices in the office environment, for example printers, microwave ovens and other electromechanical devices. Wireless is a public frequency network therefore its interface is highly risky because anyone can pick up your signal. No matter how your cut it, wireless is easier, more convenient and is here to stay, so you must protect is. Preston Gralla of Computerworld wrote an article on “How to protect...

Words: 2804 - Pages: 12