Saturday, October 3, 2015

Analyzing Rhetorical Stragegies in Information Hacking Hacking

 This post will answer the questions regarding rhetorical strategies in relation to my rhetorical situation.
Image result for strategy
"Chess strategy" via pixabay CC0 Public Domain



Appeals to Credibility: 
There are a variety of appeals to credibility in the article, especially in the form of refrences to credible sources. They include:
  •  Personal stories
  • References to credible sources
  • Tone
  • Acknowledgement of counterarguments 
They are used effectively throughout and make the article significantly more credible, as it makes it more than just a recounting of events with opinions thrown in.

The strategies also certainly effect the perception of the author, as he comes across as a more moderate and reliable source. 

These strategies add to the effectiveness of the text, by providing extra perspective and making the text more reliable to the audience.

The inherent biases of the author are present, but their inclusion of many sources circumvents the single mindedness that would impact their credibility.

Appeals to Emotion:
 There is a certain amount of appeal to emotion, mostly firsthand quotes from federal workers who potentially had their information stolen.
  • Personal stories
  • Repetition of key words
The author is trying to create an emotional response by showing how the attacks could potentially harm those affected.  He does this by quoting federal workers who's information could be stolen.

The result is effective, but it is not a major part of the article, merely a supporting appeal to emotion.

These emotions are effective for the situation because in the situation of information being stolen there is often a disconnect, and the audience most likely has trouble understanding the implications of the hacking.

The emotional appeals do not detract from the credibility in any way.

Appeals to logic:
The primary appeal of this article is to logic, through statistics and more.
  • History
  • Statistics
  • Expert opinions
  • Clear transitions
  • Arrangement for sequence
The author employs these techniques in order to create a more reliable and trustworthy article.

He is effective in this, as through his arrangement and organization alongside the factual presentation of the article.  It comes across as trustworthy and a good source.

These strategies are effective, especially on the subject of computers, information and hacking, in which factual information is significantly more important that opinion in most cases.  When the facts are the primary focus it allows for greater reliability in the article.





1 comment:

  1. It seems that personal stories is the most effective rhetorical strategy because it helps appeal to emotion and the credibility of the author. Both of these helps the audience connect, believe and understand what the article is about. I think that statistics is a little under underdeveloped because that too can help develop the author's credibility. Great work!

    ReplyDelete