Question: Complete the essay using the outline. The two main reasons are ,isuse of data and data breaches. For each paragraph add how the information may

Complete the essay using the outline. The two main reasons are ,isuse of data and data breaches. For each paragraph add how the information may present pathos,logos,ethos towards the audience and how it effects there feelings.

-The widespread use of facial recognition technology raises concerns about privacy infringement as it embezzles too much personal information.

The general use of facial recognition technology poses substantial risks to privacy due to its potential for excessive collection and misuse of personal information. This poses controversy, such as how facial recognition technology gathers and stores personal data and the implications for individual privacy. In particular, What are the potential consequences of unauthorized access to facial recognition databases or misuse of collected data? Some supplementary points to brace the contention include many data breaches and misuse of facial recognition technology by governmental and private entities; while an invaluable tool, it can also face challenges from presentation attacks or the manipulation of physical or digital likenesses, like masks or deepfakes, respectively (Ahmed). These presentation attacks and manipulations of likenesses pose significant privacy concerns as they can compromise individuals' data and biometric information.

Additionally, the widespread use of FRT increases the potential for unauthorized surveillance and tracking of individuals without their consent, raising serious ethical and privacy considerations. This highlights the need for greater scrutiny and regulation. Moreover, the lack of transparency in how facial recognition technology operates and the potential for algorithmic biases underscore the need for public awareness and oversight. My concern for privacy stems from believing in the fundamental right to autonomy and control over personal information.

There are concerns regarding the comprehensive use of facial recognition technology by authoritarian governments and commercial interests (Andrejevic and Selwyn). Furthermore, the comprehensive use of facial recognition technology by authoritarian governments and commercial entities exacerbates these concerns, as it can lead to mass surveillance and erosion of civil liberties. This widespread adoption of FRT without robust safeguards also raises inquiries about responsibility and the possibility of misusage or abuse of power by those controlling the technology. Furthermore, the rapid advancement and widespread adoption of facial recognition technology may outpace the development of adequate legal and ethical safeguards that we, as people, need to uncover. Personal experiences of navigating online privacy settings and witnessing the pervasiveness of surveillance technologies further shape my perspective on this issue.

(The 5 sources get info from these only)

Andrejevic, M., & Selwyn, N. (2019). Facial recognition technology in schools: critical questions and concerns. Learning, Media and Technology (Print), 45(2), 115-128. https://doi.org/10.1080/17439884.2020.1686014

"Hafiz Ahmed (2022), Facial Recognition Technology and Privacy Concerns." ISACA, www.isaca.org/resources/news-and-trends/newsletters/atisaca/2022/volume-51/facial-recognition-technology-and-privacy-concerns. Accessed 10 Apr. 2024

https://www.nature.com/articles/s41599-023-01673-3

Wang, M., Qin, Y., Liu, J., & Li, W. (2023). Identifying personal physiological data risks to the Internet of Everything: the case of facial data breach risks. Humanities & Social Sciences Communications, 10(1), 216-216.https://doi.org/10.1057/s41599-023-01673-3

ICYMI: UWD and Over 30 Human Rights Organizations Fight Back Against Dangerous Misuse of Facial Recognition, Surveillance Tech. (2024). In Targeted News Service. Targeted News Service.http://libproxy.utdallas.edu/login?url=https://www.proquest.com/wire-feeds/icymi-uwd-over-30-human-rights-organizations/docview/3037788625/se-2?accountid=7120

https://www-sciencedirect-com.libproxy.utdallas.edu/science/article/pii/S074756322100217X

OUTLINE

Setting up and Organizing the Argument EssayNotes from the Video Lecture

Introduction

-give an overview of the topic

-hook the reader

-give the reader context

Claim/Thesis

-give the main points of the paper + REASONSyou can also include your counterargument here

Body paragraphs/Sections

-supports the claim

-focused on reasons (you might have two

sections, one for each reasons)

Section 1: Background (Optional)

-Some topics, depending on your audience, may need a bit of background/history to situate your reader

Section 2: Reason 1 (you can have as many pars as you need in these reasons pars)

Support Par a

pathos

Support Par b

logos

Section 3: Reason 2

Support Par a

logos

Support Par b

logos

Support

Counterargument

  1. Name those that may disagree
  2. Introduce the alternative/counter perspective
    1. Use source(s)
  3. Make a concession
  4. Rebuttal

Conclusion

-summarize the ideas in paper

-restate the thesis

-connects the reader back to contextwhat did you as a writer learn and what can others learn

Example of Setting up P3:

Audience: Engineering faculty who teach writing intensive courses

Technical jargon

Quality of teaching

Students

Research/quantitative

Claim:

Engineering students are more successful at revision in research writing when provided with directive feedback and are taught how to apply feedback.

Section 1: Background

Research that shows that feedback for engineering students is important for promoting revision.

Section 2: Reason 1

Directive feedback more effective for engineering students.

Support: logos

Section 3: Reason 2

Engineering students are more successful with revision when taught how to apply feedback.

Support: pathos/student anecdote

Counterargument:

Some faculty believe providing feedback and teaching how to apply feedback is time-consuming and takes away from time that could be spent on research.

Step by Step Solution

There are 3 Steps involved in it

1 Expert Approved Answer
Step: 1 Unlock blur-text-image
Question Has Been Solved by an Expert!

Get step-by-step solutions from verified subject matter experts

Step: 2 Unlock
Step: 3 Unlock

Students Have Also Explored These Related Business Writing Questions!