Free Essay

Wiki Leaks Exposed

In:

Submitted By keentrax
Words 1065
Pages 5
Debate with your learning team whether Wikipedia is a credible and valid source of information.

Resource: Learning team debate and Ch. 9 Writing from Sources

Option I

Develop your own argument based on the debate outcomes.

Use the four steps for fairly presenting arguments indentified in Ch. 9 of Writing from Sources to guide your writing.

What are the four steps for fairly presenting arguments identified in Ch.9:

1. Present both sides of the argument.
One way of shading an argument to suit your own ends is to misrepresent the strength of the opposition. Let us assume that you are working
PRESENTING ARGUMENTS FAIRLY 4 1 3 negative view image of attack image of disease
0-312-62992-3 (c) Bedford/St. Martin's / bedfordstmartins.com with a number of articles, all of which are effectively presented and worth citing. Some clearly support your point of view; others are openly opposed; and a few avoid taking sides, emphasizing related but less controversial topics. If your essay cites only the favorable and neutral articles, and avoids any reference to the views of the opposition, you have presented the issue falsely. A one-sided presentation will make you appear to be either biased or sloppy in your research. If the sources are available and if their views are pertinent, they should be represented and, if you wish, refuted in your essay.
2. Provide a complete account of the argument.
Sometimes, distortions occur accidentally, because you have presented only a partial account of a source’s views. In the course of an article or a book, authors sometimes examine a variety of views before making it clear which ones they support. Or an author may have mixed opinions about the issue and see merit in more than one point of view. If you choose to quote or paraphrase material from only one section of such a work, then you must also inform your reader that these statements are not entirely representative of the writer’s overall views.
3. Make sure that you—and your reader—understand whether the source really supports the idea that you are citing.
Ideas can get distorted because of the researcher’s misunderstanding, careless note taking, or hasty reading. Review the entire section of the article or your notes before you attribute an opinion to your source.
Make sure that you are not taking a sentence out of context or ignoring a statement in the next paragraph or on the next page that may be more typical of the writer’s thinking. Writers often use an argumentative strategy that sets up a point with which they basically disagree in order to shoot it down shortly thereafter. Don’t confuse a statement made for the sake of argument with a writer’s real beliefs.
4. Provide a fair presentation.
You may be so eager to uphold your point of view that you will cite any bit of material that looks like supporting evidence. To do so, however, you may have to twist the words of the source to fit your ideas. This is one of the worst kinds of intellectual dishonesty—and one of the easiest for a suspicious reader to detect: one has only to look up the source. If your sources’ evidence does not sufficiently support your side, then you
Write a paper of no more than 1,050 words supporting your argument by identifying criteria used to evaluate the credibility of sources of information.

Format your paper consistent with APA guidelines.

Debate with your learning team whether Wikipedia is a credible and valid source of information.

Yes, I have used Wikipidia to get information that I needed
Yes, they have done reports that have shown the data from Wikipidia being accurate
Yes, there is a set of rules by which to follow and most people take this serious.

Outine; A. Define what Wikipidia is; i) The beginnings ii) Author iii) The need to start it
Need to quote sources and have relevant source
B.Find data and statistics from credible sources citing; B. Accuracy of Wikipidia C. Accuracy compared to other credible sites, prove credibility of sites you are talking about

Essay Introduction;
In this ever changing world where new cultures, discoveries and knowledge is emerging at a rate never seen in decades, the need for a dynamic source of information is necessary. Wikipidia is that source. Why? Wikipidia is providing real information from real people as they live it. As I try to piece together the significance of traditional sources of information such as dictionaries and printed materials, I see a communication mode slowly fading away into extinction like the dinosaurs in the ice age. When comparing traditional sources of information like books and materials to Wikipidia traditional sources are like movies with a well written script, rehearsed over and over again to get the exact feeling that the author intends for the reader whereas Wikipidia bears the freshness, simplicity and fake free nature of genuine TV reality shows. They sometimes bring diverse versions of information such as raw and unpolished all the way to simple and straight forward information that is understandable to the unique masses of people.

Servant Leadership describes a leadership whereby a Leader's desire is to serve first, then lead those he is serving. This kind of Leadership approach defines a Leader who places other peoples agenda and needs before their own. I haven't experienced too much of this kind of Leadership in the corporate world although I know and have heard about it in the service industry. I have also seen servant Leadership at Church, clergy members and Church leadership are charged with ensuring that their flocks needs are catered to, this is their top most priority. Servant Leadership has existed for thousands of years, my most favorite example outside of the corporate confines is a Biblical narrative of how Jesus served his disciples in the new testament book of John. This narrative describes Jesus washing and drying his disciples feet and challenging them to do the same to serve each other. After washing their feet, he concluded this action by telling them something to the effect of..."no servant is greater than his master and likewise no messenger is greater than the one who sent him". The above narrative is the reason why I am a firm believer of servant leadership.

Similar Documents

Free Essay

Whistle Blower

...thirty-five years in federal prison for the largest disclosure of secret government documents. Manning was a Computer Intelligence Analyst with the United States Army. From the seat of his computer work station in Iraq, Manning had access to SIPRNET(The Secret Internet Protocol Router Network). This is the private computer network that the government uses to transmit government files around the world. With a few key strokes, Manning had access to countless "secret" government files. When these files became too much to bare, Manning felt that the public needed to know the truth in order to make formal decisions for themselves. When he made this decision, Wiki leaks was the source to whom he leaked the information to. Within a couple of months, however, he was turned in to the proper authorities, trialed and convicted. Edward Snowden exposed Internet surveillance programs like PRISM, MUSCULAR, XKeyscore, Tempora and also a bulk collection of US and European telephone...

Words: 491 - Pages: 2

Premium Essay

Jet Copies Case Problem

...“IPad’s” Security Breach BUS 508: Contemporary Business August 16, 2011 Strayer University Dr. Robert L. Kight Assignment 4: iPad’s Security Breach This document will attempt to discuss hacking into a Web site. Is it ever justifiable? The document will create a corporate ethics statement for a computer security firm that would allow or even encourage activities like hacking. The document will discuss whether it is important for organizations like Gawker Media to be socially responsible. It will determine factors CEOs should consider when responding to a security breach. Finally, it will create an email script to be sent to AT&T customers informing them of the security breach and a plan to resolve the issue and state the rationale. Apply your theory to a real-world case in which someone hacked into a system, including the name of the company and details. As I attempt to discuss this assignment, I could not avoid thinking about the age-old opinion that Apple products were unique, and that they were protected against criminal encroachments. As such, Apple became one of the hottest technological innovations in the industry. Today, like most other such technology, Apple is becoming increasingly vulnerable to intrusion. It is becoming a medium for posing threats to an entire corporate network as well as devices for official and unofficial use. My answer to this question is twofold. In other words qualification of any kind for such conduct must be based...

Words: 1981 - Pages: 8

Premium Essay

Augustine Medical

...the company’s pricing strategy for both products. Company Background Dr. Scott Augustine, an anesthesiologist , founded Augustine Medical, Inc. in Minnesota in July 1987. In early 1988, Augustine developed the Bair Hugger Patient Warming System to warm post- surgical patients. The targeted market for this system is the hospital operating rooms and postoperative recovery rooms. The system is designed to treat hypothermia which is a condition found in 60-80 percent of all postop patients where the body temperature is below 36 degrees Centigrade or 96 degrees Fahrenheit which is the result of the patient’s exposure to cold operating room temperatures, heat loss due to evaporation of fluids used to scrub patients, evaporation from the exposed bowel and breathing of dry anesthetic gases. Competition, Hospital market and Industry There...

Words: 1297 - Pages: 6

Premium Essay

Disaster Management

...Bhopal disaster Co o r din at es: 2 3 °1 6 ′ 5 1 ″ N 7 7 °2 4 ′ 3 8 ″ E From Wikipedia, the free encyclopedia The Bhopal dis as te r (commonly referred to as Bhopal gas trage dy) was a gas leak incident in India, considered one of the world's worst industrial catastrophes.[1] It occurred on the night of December 2–3, 1984 at the Union Carbide India Limited (UCIL) pesticide plant in Bhopal, Madhya Pradesh, India. A leak of methyl isocyanate gas and other chemicals from the plant resulted in the exposure of hundreds of thousands of people. The toxic substance made its way in and around the shantytowns located near the plant.[2] Estimates vary on the death toll. The official immediate death toll was 2,259 and the government of Madhya Pradesh has confirmed a total of 3,787 deaths related to the gas release.[3] Others estimate 3,000 died within weeks and another 8,000 have since died from gas- related diseases.[4][5] A government affidavit in 2006 stated the leak caused 558,125 injuries including 38,478 temporary partial and approximately 3,900 severely and permanently disabling injuries.[6] UCIL was the Indian subsidiary of Union Carbide Corporation (UCC), with Indian Government controlled banks and the Indian public holding a 49.1 percent stake. In 1994, the Supreme Court of India allowed UCC to sell its 50.9 percent share. Union Carbide sold UCIL, the Bhopal plant operator, to Eveready Industries India Limited in 1994. The Bhopal plant was later sold to McLeod...

Words: 14829 - Pages: 60

Free Essay

Determination of Valency of Magnesium

...Title: Experiment 2 Determination of the valency of the magnesium Objective: -To study the quantitative relationship between the amount of reactants and products of a reaction. -A known starting mass of magnesium and the measured collection of hydrogen gas will be used to determine the reaction stoichiometry and the valency of magnesium. - To identify the unknown X value in the chemical equation between magnesium and hydrochloric acid - To determine the valency of magnesium Introduction: Stoichiometry is the study of the quantitative relationship between amounts of reactants and products of a reaction (that is, how many moles of A react with a given number of moles of B). In this section, a known starting mass of magnesium and the measured collection of hydrogen gas will be used to determine the reaction stoichiometry. Magnesium reacts with hydrochloric acid to form hydrogen gases. The aim of this experiment is to determine the value of x in the following equation: Mg + X HCI → MgCIX + H2 A known amount of magnesium is reacted with a large excess of HCl, and the volume of H2 evolved is measured. As HCl is in excess, all the magnesium will be consumed, and the yield of both MgClX and H2 is dependent on the amount of magnesium used. A comparison of the amount of hydrogen produced with the amount of magnesium consumed will enable the X value to be determined. Apparatus and Materials: Magnesium ribbon, 0.5M Hydrochloric acid, Burette (50 cm3), Pipette (25...

Words: 2246 - Pages: 9

Free Essay

Production of Materials

...Chemistry Research Assignment Part A – The Production of Materials: 1. Use available evidence to gather and present data from secondary sources and analyse progress in the recent development and use of a named biopolymer. This analysis should name the specific enzyme(s) used or organism used to synthesise the material and an evaluation of the use or potential use of the polymer produced related to its properties. a) Name a biopolymer (eg. Biopol) outlining how it’s produced. Biopol: Made in the 1960s In an American company. This biopolymer is a PHA and is produced industrially by growing it in tanks with bacteria such as Alcaligenes eutrophus along with a carbon based food source. It is then isolated from the tank to be purified by various methods such as dissolving the PHB in trichloromethane and then removing all its waste to create Biopol. b) Construct a table, relating its uses/possible uses to its properties. Uses Properties related Act as a carrier for slowly releasing insecticides and herbicides and fertilizers Biodegradable – able to break down in the natural environment Use as containers for plastics as well as shampoo containers and cosmetics insoluble in water and relatively high tensile strength Medical applications Biocompatibility and biodegradable Non toxic c) Evaluate the importance of this biopolymer now and its potential for use in the future based on part b. Biopol is quite an important biopolymer as a future resource because firstly, there...

Words: 6532 - Pages: 27

Premium Essay

Social Media and Business

...Social Media and Business Social media has always been a threat to not only security but also reputation of a business. Employees today have access to all kinds of social network sites to include Facebook, Myspace, Twitter, Instagram, online blogs, and many more. These sites are easily accessible to the user from their computer, tablets, and cellphones through various types of applications. Through my research I was able to find a trend in users using these media outputs to accidently leak information unintentionally and even intentionally. I found that any business can be susceptible to having data leaked and reputations tarnished from employees not handling social media correctly. I will cover this area of expertise, technology involved, future trends, security issues, some businesses involved, regulatory issues that arise, what business can do to handle social media, and global implications. When you consider what technology is being used most users will think of physical equipment. While this is the case that is the access medium that is used when thinking of social networking. Social media can be accessed in various ways to include your home computer, office computer if they allow you to view such sites, tablets, and your phone that could not be regulated depending on if it is a company phone. These access mediums must be regulated and users educated on the proper use of these devices. There are different types of online technologies that can be used to access social...

Words: 3437 - Pages: 14

Premium Essay

Wikileak

...     About us Advertise Contact Us Send Comments/Tips Home My FDL Firedoglake News TBogg La Figa Book Salon FDL Action The Dissenter Pam's House Blend Elections FDL TV Just Say Now Password Remember Me Login              Username: « Is the UK Torture Inquiry an Attempt to Limit Further Disclosure? Another Obama Recess Appointment For Someone Not Named Johnsen » Wikileaks Leaker Bradley Manning Finally Charged By: emptywheel Tuesday July 6, 2010 12:14 pm submit Tweet 93 The government has finally charged Bradley Manning, the Wikileaks leaker. He is charged with two counts of violating the UCMJ, one related to loading onto his own unsecure computer a set of information and adding unauthorized software to a military network computer, and the other related to accessing and passing information onto someone not entitled to have it. I find the charge sheet particularly interesting for two reasons. What the government says that Manning did with the material he accessed, and an apparent discrepancy between the government’s depiction of the timing and Wired’s depiction of it. What the government knows about what Manning did with the information First, it describes the information he accessed differently as follows:   The video of the July 12, 2007 Apache killing of Reuters journalists (obtained via unauthorized access, loaded onto his unsecured computer, transmitted to someone unauthorized to receive it) The Rejkjavik State Department...

Words: 8363 - Pages: 34

Premium Essay

Fractional Distillation Process

...HEALTH, SAFETY AND ENVIRONMENT TITLE: FRACTIONAL DISTILLATION PROCESS CONTENTS 1. Title………………………………………………………………………….1 2. Summary…………………………………………………………………….3 3. Introduction of Case Study…………….…………………………………….4 4. Risk Scenario Development…….…………………………………………...5 5. Justification of Fault Tree Analysis…………………………………………6 6. Procedures of Fault Tree Analysis…………………………………………..7 7. Fault Tree Analysis…………………………………………………………8 8. Possible Risk Associated with Hazards….………………………………...11 9. Accident Consequences…………………………………………………….13 10. Method to Control the Risk………………………………………………...15 11. Solution to Minimize the Risk……………………………………………..17 12. Conclusion………………………………………………………………….18 13. References………………………………………………………………….19 SUMMARY Figure 1: Fractioning Column (Copyright of science-resources.co.uk, 2009) Figure 1: Fractioning Column (Copyright of science-resources.co.uk, 2009) Crude oil is one the most important non-renewable sources on Earth. Demand for this black viscous liquid is growing every day in this era if modern technology. Electricity, vehicles and synthetics are among the major consumers of petroleum fluids or crude oil. Crude oil could be referred to as the ‘black gold’ due to its expensive price and complicated production process. Unlike gold, crude oil naturally is useless in its primary form. A process called fractional distillation or petroleum refining need to be carried out onto the crude oil to separate...

Words: 4500 - Pages: 18

Premium Essay

Bhopal Info

...Identify events that have impacted industrial safety To complete this unit you must 1. Read the chapter in the book 2. Review the PowerPoint slides 3. Look into the Bhopal accident using the video and searching the Internet to answer the following under the "Assignment tab" for : Session 2: History of Safety. 1. How many died as a result of the accident? 2. What has been the long term effects of the accident on residents 3. Look at the total number of injuries and deaths over for any 2 years on the BLS web site for (Take a look at data from Osha) Use the BLS link to find the data tutorials for: * Manufacturing * Construction * Mining * Agriculture en.wikipedia.org/wiki/Bhopal_disaster‎ Bhopal disaster From Wikipedia, the free encyclopedia Jump to: navigation, search | The neutrality of this article is disputed. Relevant discussion may be found on the talk page. Please do...

Words: 14078 - Pages: 57

Premium Essay

Dlp Dlp Dlp

...Interested in learning more about security? SANS Institute InfoSec Reading Room This paper is from the SANS Institute Reading Room site. Reposting is not permitted without express written permission. Data Loss Prevention AD Copyright SANS Institute Author Retains Full Rights . 08 , Au tho rr eta ins ful l rig hts Data Loss Prevention 20 Key fingerprint = AF19 FA27 2F94 998D FDB5 DE3D F8B5 Prevention Data Loss 06E4 A169 4E46 te GIAC Gold Certification Ins titu Author: Prathaben Kanagasingham Advisor: John C.A Bambenek © SA NS Accepted: August 15th 2008 Prathaben Kanagasingham © SANS Institute 2008, 1 As part of the Information Security Reading Room Author retains full rights. . ins Table of Contents ful l rig hts Data Loss Prevention Introduction....................................................................................3 2. Deeper Look at DLP Solution........................................................4 3. Identification of Sensitive Data......................................................6 tho rr eta 1. Data in Motion.....................................................................8 3.2 Data at Rest.....................................................................…9 3.3 Data at End Points.............................................................10 08 , Au 3.1 Choosing a Vendor...

Words: 8522 - Pages: 35

Free Essay

Lichen

...lichens are not related to mosses or any plant.[3]:3 Lichens don't have roots that absorb water and nutrients like in plants.[6]:2 Instead they produce their own food from sunlight, air, water, and minerals in their environment.[7] They are not parasites[->10] on the plants they may grow on, but only use them as a substrate to grow on or in. Lichens occur from sea level[->11] to high alpine[->12] elevations, in a very wide range of environmental conditions, and can grow on almost any surface.[7] Lichens are abundant growing on bark, leaves, mosses, on other lichens,[6] and hanging from branches "living on thin air" (epiphytes[->13]) in rain forests[->14] and in temperate woodland[->15]. They grow on bare rock, walls, gravestones, roofs, exposed soil surfaces, and in the soil as part of a biological soil crust[->16]. They can survive in some of the most extreme environments on Earth: arctic tundra[->17], hot...

Words: 11624 - Pages: 47

Premium Essay

Nuclear Energy

...Can Nuclear Energy Be the Answer? It is only possible to mitigate global warming if the world-wide consumption of fossil fuels can be drastically reduced in the next 10 to 15 years. There is simply no room for a scenario as it is depicted by Lester R. Brown in the book Plan B 4.0 Mobilizing to Save Civilization. The scenario plays out like a horror movie, poverty, depleted water supply, food shortages, terrorism, over population, disastrous floods, erratic changes in ocean currents and global warming. What is causing global warming? Carbon dioxide and other air pollution that is collecting in the atmosphere like a thickening blanket, trapping the sun's heat and causing the planet to warm up. Coal-burning power plants are the largest United States source of carbon dioxide pollution -- they produce 2.5 billion tons every year. Automobiles, the second largest source, create nearly 1.5 billion tons of CO2 annually. (Valentinas Mickūnaitis) The good news is there are many technologies that exist today to allow cars to operate more efficiently and use less gas. In order to reduce the amount of toxins in the atmosphere, older power plants need to be modernized and we need to reduce our electricity by putting into practice energy efficiency, these are just some suggestions to lowering the levels of CO2, we have to make sure they are implemented. Politicians are especially attracted to the restoration of nuclear power as a possible solution to averting global warming. When the...

Words: 3024 - Pages: 13

Premium Essay

Robert Jemison Van De Graaff Essay

...idea as the Van de Graaff generator. The reason why the Van de Graaff generator is far better is because it has less coronal discharge, where volts leak out because of exposed metal. Van de Graaff stayed for the remainder of his life in Boston, where he died on January 16, 1967. A crater on the far side of the moon is named after him (Wikipedia). Here’s what I learned from Van de Graaff’s story: Even very simple things can create large amounts of power and lead to large discoveries. The Van de Graaff generator allowed people to advance radiation therapy for cancer, create a focused X-ray that could be used by the navy, and even encouraged the use of a better insulation when dealing with high voltage. And the entire thing didn’t actually cost more than a normal person could afford. Finally, the Van de Graaff generator ended the long search for a viable electrostatic generator (that’s the official name for that kind of machine) that had been going on for a long time since the device that would become a battery was invented. Sources: http://www.encyclopedia.com/people/science-and-technology/physics-biographies/robert-jemison-van-de-graaff https://www.britannica.com/biography/Robert-Jemison-Van-de-Graaff https://en.wikipedia.org/wiki/Van_de_Graaff_generator http://ieeexplore.ieee.org/document/1380320/ https://en.wikipedia.org/wiki/Synthetic_element ...

Words: 1598 - Pages: 7

Premium Essay

Tangled Webs

...chance encounter between James E. Gansman, as successful M&A attorney, and Donna Murdoch, a successful investment broker. This relationship soon went past initial flirting, to where both parties became complicit in sharing of nonpublic information (insider trading). Soon after, Donna Murdoch, began to tip off more investors, such as Richard Branson, who she also meet on Ashley Madison and became her “go to” source of income to play these trades. All of these transactions began to catch the attention of SEC, who were tipped off based on the volume of option contracts, which in some cases Mrs. Murdoch was the sole buyer of. This attention by the SEC soon led to a full blown investigation, which exposed the relationship between Murdoch and Gansman. This relationship when exposed led to charges and convictions for both Gansman and Murdoch; however it put more of a spotlight on Ashley Madison, and made some question the ethics of a company like Ashley Madison. However, when the founder and his wife discuss how they feel about it ethically, they see it as a legitimate business within the confines of the law. Although this remains an unresolved debate that rages on today on whether a business basing itself on “unethical behavior “is in fact ethical. Analysis of the case The case was unique in a way as it made us realize that unethical behavior in a business sense can be related back to unethical behavior in a social sense. For example, insider trading is considered...

Words: 1964 - Pages: 8