Social Networking Privacy Threats

Use techniques for critical reading Develop an informed argument based upon previous reading and study Conduct basic library database and web searches Practice responsible use and correct citation of sources Implement a mixture of summary, paraphrase, and quoting Argue with a specific audience in mind Synthesize multiple readings in an unbiased academic essay
Instructions: Reread the articles between pages 310-325 about social networking privacy threats. After reading the four sources provided between those pages, write an Argument Synthesis Essay about one of the textbook articles and another online source (that you locate on your own) that discusses the same topic. For example, if you want to write about anonymous cyberbullying, you could pair Jonathan Mahler’s ‘Who Spewed That Abuse? Anonymous Yik Yak App Isn’t Telling” with another web article that discusses internet anonymity.
After evaluating the articles and developing your own perspective of the central topic, use the subject matter discussed in the two articles to help you argue an original point about social media privacy. More specifically, you will compose an arguable thesis about social media privacy, but you will use the support of two articles to lend credibility to your claim.

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

Sample Solution

ACED ESSAYS