Woellert, however, quickly establishes her credentials as an objective observer by recounting the state of the union and admitting a climate of fear and anxiety. She does not immediately begin disparaging the opposite point-of-view which she intends to contend. She states the case for National ID cards, and then poses the question: Will they work? No, she says, calmly and clearly -- they will not.
Woellert's standpoint is one of practicality and efficiency. While Magnusson displays the kind of religious belief that technocrats place in Silicon Valley's "next big thing," Woellert sounds the alarm of prudential American thinking: "A national ID card would rip at the fabric of our constitutional freedoms. It would cost billions and be technologically imperfect. Most troubling, it would lull the populace into a false sense of security." Her thesis is clear, palpable, and logical. Magnusson offers mere hyperbole.
Woellert's essay also stays focused on her thesis by showing exactly how such a card would be cost-ineffective, and how it would do nothing to prevent malefactors from (presumably) using the same technology to garner their own false IDs. Magnusson, on the other hand, cannot stick to his argument, which, apparently, is that there is no need to argue since "the
What such has to do with civil liberties and protection against terrorism is hard to discern. Yet Magnusson includes the information for the sole purpose of promoting the great new technology. Magnusson's argument is not a legitimate response to Woellert's concerns; it is a promotional aid for companies like Oracle Corp. And Gartner Group. Woellert, however, considers her audience, understands its fears and concerns, and levels with it -- not by berating it or abusing its intelligence -- but by supplying available information from credible sources.
In conclusion, Woellert and Magnusson take on the issue of National ID cards in a post-9/11 United States with varying results. While Woellert effectively argues against their dispersal by preparing a reasonable thesis, giving supporting evidence, engaging her audience respectfully and considerately, and acknowledging the counter-points of the opposing argument; Magnusson takes the inefficient stance of one who has no argument to make, admits it, and instead belittles those who would prefer to think the issue has not already be resolved by a technology that has all the answers.
National Incident Management System Theoretical Analysis of National Incident Management System (NIMS) The Federal Government established the National Incident Management System (NIMS) under the Homeland Security Presidential Directive number 5 in February 2003. The Secretary of Homeland Security played an important role of developing and administering national incident management system. NIMS provide a reliable and consistent approach to responding to all forms of incidents irrespective of size and scope (Walsh 2012). The
Please see "Stake Holder: The Taliban" for more information regarding virtue ethics. The farmers who are growing poppy plants have a logical stake in this moral dilemma as well. If their crops are destroyed they will have no alternative but to join the Taliban to help settle their debts. They are in a precarious position where they are often forced to grow poppies because they are a very lucrative and
However, eventually people stopped paying much attention to the color of the threat level for that day, and the news media stopped talking about it. Now, it is not discussed at all. Was it effective? Perhaps as a short-term measure, but certainly not as a long-term solution. The government argues that the American people are much safer today, because there have been no more terrorist attacks. However, correlation does
According to Harlan (2004), "Sample retention is problematic not only because of these individuals' innocence, but also because of the resulting availability of sensitive genetic information and the lack of legislative and jurisprudential protections guarding release of the information" (p. 179). This point is also made by Beecher-Monas and Garcia-Rill (2006), who caution that modern DNA identification techniques can be used to extrapolate far more than just an individual's
57. The Deterrent Effects of Arrest for Domestic Assault (Lawrence W. Sherman and Richard A. Berk) Domestic violence Types of data/methods: Sherman and Berk found that arresting batterers reduced by half the rate of subsequent offenses against the same victim within a 6-month followup period. However, in follow-up studies, sometimes offenders assigned to the arrest group had higher levels of (recidivism) while others showed a reduction in repeat cases. Advantages/Disadvantages: Although the repeat
Hurricane Katrina and Hurricane Sandy Tropical cyclones can badly destroy settlements and structures along the coast. Recent destructive tropical cyclones such as the 2005 Katrina and the Sandy which happened in 2012 affirm that the destruction caused by a land-falling tropical cyclone is not merely dependent on its categorization on the Saffir-Simpson hurricane scale. The hurricane Sandy of 2012 caused a lot of destruction. Only the hurricane Katrina which happened in
Our semester plans gives you unlimited, unrestricted access to our entire library of resources —writing tools, guides, example essays, tutorials, class notes, and more.
Get Started Now