COM/220 RESEARCH WRITING
posted by Anonymous on .
Can anyone help me or help me get started please?
1. CheckPoint: Full-Sentence Outline
• Resources: Organizing Your Research Paper & Bias, Rhetorical Devices, and Argumentation
• Due Date: Day 4 [Individual forum]
• Review the criteria for full-sentence outlines in Organizing Your Research Paper on the student web page.
• Create a full-sentence outline that includes effective arguments and counterarguments to support your thesis. (Note: Outline only the body of your paper.) Remember to avoid bias and fallacies and to include rhetorical devices that strengthen your writing.
• Answer the following: Where did you place the most effective arguments in your paper? Explain your reasoning. How did you address counterarguments without weakening your own premise?
• Post the full-sentence outline as a Microsoft® Word attachment.
My Thesis statement
Even though most personal information is protected, identity is an easy crime to commit because personal information is easily accessible.
I plan to support my thesis with compelling arguments and counter arguments by looking for opposing viewpoints and finding evidence to refute them and I will examine the bold acts of Identity Theft from all sides. I am going to address any bias or fallacies that I may come across. I am going to find the strongest possible evidence to support my claims. I will take detailed notes during my research and give credit where it is due. My research will be credible and trustworthy. I will gather information from different types of sources and make sure the information is current. I will allow significant time for gathering my information and keep in mind that eighty percent of my paper should be my own thoughts and ideas. I will also remember that no more than twenty percent should consist of quotations.
Possible compelling arguments include: -- How easy it is to find personal information online -- People are willing to provide personal information online, on the phone, and in person without knowing who is asking for the information.
Possible compelling counterarguments include: -- Many companies provide protection for their customers and would lose business if every customer became a victim of identity theft -- Some people choose not to provide their personal information because they want to protect themselves from identify theft.