Preview

Peter Krapp Analysis

Good Essays
Open Document
Open Document
703 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Peter Krapp Analysis
Peter Krapp builds a well-constructed argument designed to persuade readers that computer hacking is a danger that steals our most valuable possession—personal information—from our most vulnerable people--students. The article focuses on personal information about college students stolen from college computer networks. The writer builds his argument brick by brick. He starts by giving an example of student data stolen from a college by hackers in China, relating his topic to an event that really happened. The writer quickly establishes himself as an expert in the topic so readers can trust his information. Krapp asks and answers questions about the theft of data, goes into more depth about the type of information stolen from college networks, and then briefly touches on the laws, or the lack of laws, to protect students. He points out that data is stolen from students by not only foreign hackers, but also by American companies. The writer finishes with a call for colleges to protect student data, clearly stating his purpose.
The theft of 18,000 students' data from Pennsylvania State University's College of Engineering is a
…show more content…
He gives two examples that are recognized and used by college students: Google and Pearson. He points out that students are particularly vulnerable to theft by the corporations that provide the apps and class materials that students must use for school. The school dictates which apps are to be used, so students "cannot opt out." He touches again on the law, but reveals that it doesn't protect college students. This information reinforces his arguments that college students are vulnerable to data theft. Presenting the facts this way says that college students are not only vulnerable, they are betrayed by the universities, US companies, and laws that should protect

You May Also Find These Documents Helpful

  • Satisfactory Essays

    Nt1310 Final Exam

    • 393 Words
    • 2 Pages

    The Motives Behind Hacking: Vandalism, Public Interest, Reveal Wrongdoing, Financial Gain, As a Protest, The Challenge (fun).…

    • 393 Words
    • 2 Pages
    Satisfactory Essays
  • Better Essays

    Epic Hacking Research Paper

    • 3326 Words
    • 14 Pages

    On Friday Aug.3.2012 Mat Honan’s personal Computer (PC) system was invaded by hackers. In the space of one hour, Mat’s entire digital life was destroyed. First his google account was taken over, then deleted. Next his twitter account was compromised, and used as a platform to broadcast racist and homophobic messages. And worst of all, Honan’s Apple ID account was broken into, and his hackers used it to remotely erase all of the data on his IPhone, IPad, and MacBook.…

    • 3326 Words
    • 14 Pages
    Better Essays
  • Good Essays

    Choicepoint Data Breach

    • 865 Words
    • 4 Pages

    Polstra, R. M. (2005). A case study on how to manage the theft of information. Proceedings of the 2nd annual conference on Information security curriculum development (pp. 135-138). New York: ACM.…

    • 865 Words
    • 4 Pages
    Good Essays
  • Good Essays

    He makes another good point when he says that by being careful and informed consumers, people can keep technology from killing their privacy. The reason this is a good point is because if people are well informed and pay good attention on what they agree on, then they can save their privacy and their identities from being stolen.…

    • 760 Words
    • 4 Pages
    Good Essays
  • Good Essays

    John Silber Case

    • 642 Words
    • 3 Pages

    Silber compares this system to medieval Europe, where the church's court was from the defendant’s point of view. In this situation, the college is actually in favor of the criminal, making any consequence received significantly less than anything given in legal court. Silber points out, campus courts are not allowed to give a fine or imprison anyone, thus making the “harshest” punishment expulsion. Also, administration encourages students to not take any criminal behavior to the police, but go through campus police first; this including rape, arson, and assault. For crimes such as those listed, expulsion is nothing but a slap on the wrist compared to an actual legal court consequence. As President Silber stated, “When colleges and universities usurp the role of the courts, they deny justice to the victims”. Consequently, not only does the wrong doing go against the legal justice…

    • 642 Words
    • 3 Pages
    Good Essays
  • Powerful Essays

    Physical crimes never cease to draw our attention. Victims, bloodiness, drama, motives, psychological issues and conflicts: they are at the heart of most physical crimes. Cyber crimes are not viewed as dramatic and pervasive by many, but its consequences can be even bloodier within seconds: hundreds of millions of victims and billions of dollars can be rapidly caused with two elements, a criminal mind and one computer. We are not safe from either bloody crimes or cyber crimes such as cyberstalking, cyberbullying, and financial theft. In fact, “cybercrime affects everyone-business, governments, and citizens.” (2). Wealth, a safe neighborhood, or bodyguards…

    • 1487 Words
    • 6 Pages
    Powerful Essays
  • Satisfactory Essays

    Capstone Analysis

    • 285 Words
    • 1 Page

    Regular stories featured in the media on computer crime include topics covering hacking to viruses, web hackers, to internet pedophiles, sometimes accurately portraying events, sometimes misconceiving the role of technology in such activities. The increase in cybercrime has been documented in the news media. Both the increase in the incidence of criminal activity and the possible emergence of new varieties of criminal activity pose challenges for the legal system, as well as for law enforcement. Some of the things I do to try and prevent falling victim to cybercrime is keeping the latest version of virus software on my computers. Using strong passwords that only my family knows. I do not fall prey to online offers of things like free TVs, or you have won $1,000.…

    • 285 Words
    • 1 Page
    Satisfactory Essays
  • Powerful Essays

    Since the beginning of the internet new opportunities for criminal activities have increased significantly. Most of America’s government agencies, businesses, citizens, online businesses activities have been subjects of numerous attacks. America is dependent upon its computer networks to ensure operations of its infrastructure and national security. Many problems can be attributed to international crimes like the attack on the financial networks on September 11, 2008. This caused the fall of the stock market from anonymous people using naked shorts that are considered illegal today which was used to destroy our financial…

    • 3358 Words
    • 14 Pages
    Powerful Essays
  • Satisfactory Essays

    Steal This Mp3

    • 509 Words
    • 3 Pages

    +He uses examples such as; how The Recording Industry Association of America… filed lawsuits against four college students, seeking huge damage for “an emporium of music piracy” run on campus networks.…

    • 509 Words
    • 3 Pages
    Satisfactory Essays
  • Better Essays

    On March 10, 2012, thousands of people fell victim to having their social security numbers, birthdays, names, addresses, and even their medical diagnosis stolen by computer hackers. On April 2, 2012, the breach was realized and 780,000 people learned that their identities were stolen and would now need to monitor their credit. Computer and internet fraud is defined by the federal law as “the use of a computer to create a dishonest misrepresentation of fact as an attempt to induce another to do or refrain from doing something which causes loss” (www.law.cornell.edu).…

    • 1109 Words
    • 5 Pages
    Better Essays
  • Good Essays

    should teachers be armed?

    • 723 Words
    • 3 Pages

    What this team found not only provides solutions for effective student protection, but also exposes vulnerabilities from past incidences involving the youth of our nation and put it all in a report.…

    • 723 Words
    • 3 Pages
    Good Essays
  • Better Essays

    Subramanian, R. (2008). Computer Security, Privacy, and Politics: Current Issues, Challenges, and Solutions. Hershey • New York: IRM Press.…

    • 1684 Words
    • 7 Pages
    Better Essays
  • Good Essays

    The computer world gives criminals a large amount of power because victims can just about anyone and can happen internationally (Maras, 2015). It can be hard for law enforcement to understand cybercrime because of how fast new crimes are committed and the new ways to commit those crimes is constantly changing (Maras, 2015). For example, various ways to commit cybercrime include hacking, malware, cyberterrorism, cyberextortion, and cybervandalism (Maras, 2015). It can be hard for law enforcement to keep up with these criminals because of how often technology is changing. Account holders of platforms such as social media, online bank accounts and billing accounts, email, and more have to be very cautious when using technology because of how easy…

    • 471 Words
    • 2 Pages
    Good Essays
  • Good Essays

    In his report, “Kid Kustomers,” Eric Schlosser discovers the tactics marketers and manufacturers utilize to target children. Schlosser claims that since the 1980s when working parents spent less and less time with their kids, they felt it necessity to spend more money on them. Manufacturers took advantage and began to promote a kid-related appearance. They started by observing children of specific ages to discover their interests and habits, receiving much of their information from the Internet and kids’ clubs. This provided the marketers insights on how to improve their business plan to attract more children and create “cradle-to-grave” customers. Their strategies often resulted in clever mascots…

    • 292 Words
    • 2 Pages
    Good Essays
  • Good Essays

    Imagine yourself going into the bank to get money out of your account for your rent or other important bill, and the account is dry and you just got paid the day before..or going to pay a bill with your credit card and card after card is maxed out then you find out that someone has stolen all your information and used all of your resources to live and pay bills. If this happened to me my heart would be beating so fast in panic id probably pass out considering I have so many kids to provide for. Well it happens everyday to people everywhere all over the world. One of the major problems causing this is called hacking which is defined by the company who created the website the free dictonary dot com, Houghton mifflin company, as to gain access to a computer file or network illegally or without authorization. It is a big problem not just here but in other countries as well.One incident id like to mention is the playstation store being hacked into…

    • 521 Words
    • 3 Pages
    Good Essays