Dear Professor, I am writing to you today on behalf of the residents of coastal areas all over the world. That includes not just humans but all creatures large and small that inhabit the beaches. The natural world is under attack on all fronts from all angles, from chemicals in the air to deforestation to…
Rhetorical Remix/Analysis
Remix: Genre Analysis For my genre remix I have turned my research paper on the negative effect of tourism into a powerpoint presentation. This presentation would be used by myself, a marine conservationist, to convince investors to fund projects and legislation that would limit tourism in order to protect the marine ecosystem. The purpose of…
Research Paper
The Effects of Tourism Our planet is dying faster than ever before. Pollution caused by humans is destroying entire ecosystems, and for places like coastal cities a big part of the problem is also part of the solution. The economy of many coastal cities depend on tourism, and it is used to promote environmental friendliness…
Annotated Bibliography
Affatati, Alice. “The Role of Operators in Sustainable Whale-Watching Tourism: Proposing a Continuous Training Framework.” PloS One, vol. 19, no. 1, 2024, pp. e0296241–e0296241. PLOS One, https://doi.org/10.1371/journal.pone.0296241. (Affatati #1)A popular and common activity for tourists visiting coastal areas is whale watching. It has become increasingly popular worldwide since the 1990s and has caused a range…
Career Paper
Cybersecurity Analyst With the rapid evolution of technology and its integration into our everyday lives it is now more important than ever that we safeguard our digital information. This is the role that falls upon the shoulders of cybersecurity analysts. It is their job to protect our networks and systems from cyber attacks and unauthorized…
Article Review #2
Celina Clark-Evans CYSE201S April 12, 2025 Article Review II Review of The Electronic Contract In Civil and Commercial Codes The article “The Electronic Contract In Civil and Commercial Codes” by Ahmad Mahmoud Al Masadeh , Ahmed M.Khawaldeh , Mohammad Assaf Al-salamat describes how legal frameworks cannot adapt fast enough to the rapid pace of the…
Journal Entry 8
Movies can be people’s first introduction to hacking and cybersecurity. In fact, the hacker in the video admits to being inspired to start hacking after watching the movie “Hackers” (1995). The media unrealistically portrays hacking as very fast-paced and intense. Despite their flaws, movies do showcase some realistic characteristics of actual hacking and cybersecurity. Especially…
Journal 14
There are many common illegal actions that people do on the internet knowingly and unknowingly. A lot of the time people may not know that a certain action is illegal, and if they do know, then they might not think it’s very serious. I believe that the five most serious violations on this list are…
Blog: Remix Ideas
For the rhetorical situation remix of my paper on the negative effect of tourism, I have chosen to make a PowerPoint presentation to convince investors to give me funding to address this issue. However, to make my case as convincing as possible, I will be focusing more on the economic benefits that tourism has on…
Journal 13
The article discusses the efficiency and practicality of using “bug bounties.” That is when companies and organizations of all sizes can pay freelance cybersecurity researchers to find and explain the vulnerabilities in their systems, promoting safer and more cost-effective cybersecurity practices. The study shows that using bug bounty hunters is more effective and cost-efficient than…