Upload
vantu
View
216
Download
0
Embed Size (px)
Citation preview
Stanley Yu Galan
Reflection Essay
Before Englcom, I had a very different and frankly quite inaccurate perception of academic
writing. To me, academic writing always seemed stale and stuffy; constantly droning about numbers and
data. The class showed me that the essence of academic writing was the use of well-grounded logic and
fact, not excessive pedanticism. In class, I saw how academic papers act like fascinating windows into
the world around us; presenting pressing and relevant issues that require our awareness. The focus of
the class was teaching us how refine our critical thinking skill, not the adoption of an aloof academic
writing style. What mattered was not proving your superiority through haughty language, but learning
how to present a logical and well thought out point a view.
In both the extended definition and argumentative essays, the greatest difficulty I encountered
was giving a comprehensive and well-defended discussion on polarizing issues without falling into the
trap of personal bias. In topics with two contradictory viewpoints, it is easy to be mindlessly drawn to
one side, leading to bias. In class, I saw that the solution was to gain comprehensive knowledge of the
topic before passing judgment. A full understanding of the issue would allow the opinions you form to
be supported by facts and sound logic. You no longer parroting facts, but present a valid opinion to the
table.
Overall, I felt that the class enabled me to create fair and unbiased discussions. Previously, I
would state an opinion and gather information to support it, inadvertently excluding other viewpoints. It
was through this class that I saw the importance of acknowledging both sides of an argument when
discussing your stand. Looking at both sides does not imply holding no opinion, instead, the bird’s eye
view it gives us allows us to think more logically and understand our own opinions better.
I believe that I achieved all of the objectives of the class and portfolio; having submitted quality
work for all the requirements. I placed my best effort into everything I wrote for class, treating
everything as an important piece of writing rather than as a mere requirement. However, I felt that the
most important thing I took home from class wasn’t the grades. The topics discussed in class could not
just be taken in a vacuum, but taken to heart. The logic and open-mindedness we learned in class plays
an important part, not just in writing, but in all aspects of our lives. Although, I felt I did well in class, I
believe that my real success was being able to apply what I learned in the classroom in real life.
Entrance Essay
Two increasingly common phenomena in the videogame industry are in-game micro
transactions and “Day one DLCs” (Downloadable Content). Ideally these development would be a boon
for consumers, a means to expand and enrich games even after they are released. Unfortunately, that
isn’t always the case.
For example, videogame developers such as Zynga are well known for their use of micro
transactions in their videogames. Commonly, a few dollars spent in a Zynga game would net you a few
items or some in-game currency. This in itself is well and good, but the way they design their games
makes such transactions almost inevitable. Oftentimes, players are faced with situations, wherein
metaphorically throwing money at the screen is the only way to progress. In game micro transactions
capitalize on the human desire to succeed and they do so in order to make a killing. Each day, Zynga
earns about 750,000 a day from candy crush alone essentially milking consumers like mindless cattle.
Another practice is the “day one DLC”, a downloadable content package made available the
same day a game is released. Rather than providing the consumer with a full game for the $60 that they
paid for, many developers ship 6/7 of a game for $60 dollars and offer the remaining 1/7 as a “day one
DLC” for an additional $20. They urge customers to buy both for a grand total of $80 in order to enjoy
the “full experience”. In the past, games were released complete and whole with additional content a
year down the line for a fee. There is nothing wrong with providing expansions to a game and charging a
fee for it. It is the greedy practice of selling incomplete games and “expansions” to make an extra profit
that poses a problem.
These two phenomena show the increasing corruption in the videogame industry. Indeed
videogame developers deserve to be paid for their work, but their methods of making additional cash
don’t sit well with gamers, often these features are implemented into games at the cost of overall
quality and enjoyment. As videogame developers shift towards a more corporate attitude, profits would
come before the consumer and issues like these will become far more common.
Exit Essay
Recently, the videogame industry has drawn ire for its increasingly greedy business practices.
Most notably the use of DLCs (DownLoadable Content) and in-game micro transactions. Ideally these
development would be a boon for consumers, a means to expand and enrich games. Unfortunately,
they aren’t used for such a purpose and their inclusion is often a bane to the consumer.
A DLC is a downloadable videogame expansion that enriches and expands gameplay. There is
nothing inherently wrong with DLCs since they enable video game developers to enhance a game post-
release; the problem however lies in the misuse of this practice. Back in the early 2000s, DLCs (more
commonly referred to as expansion packs back then since they were often sold on physical media) were
released a year after the original game, and added a significant amount of content to the base game
(sometimes enough content to constitute an entirely new game) for about $30. Today, videogame
developers such as EA remove portions of their games, repackage and sell them to consumers as DLCs.
Customers are forced into buying an incomplete game for $60 and must purchase an additional “day
one” DLC for about $15 to have the full game experience. The practice of clipping off content from
games and reselling them as DLCs requires minimal effort and is extremely profitable for game
developers.
Another often misused industry practice is in-game micro transactions. These are small in game
purchases that a player can make to enhance their gaming experience such as items and power ups.
Again, if implemented with restraint, this system provides players a more dynamic and enjoyable
gaming experience. Game developers, however, force this one-sided micro economy upon its customers
in an attempt to make a quick buck. Companies such as Zynga are notorious for making their games
extremely frustrating if the user chooses not to use micro transactions. In its popular game Candy Crush,
higher levels are impossible to win without spending money on power ups and additional lives. This
system feeds on the human desire to win in order to promote binge spending. During moments of
difficulty and failure, windows peddling power ups and lives present themselves to the desperate player.
A single press of a button (and a silent credit card transaction) later, instant gratification… which doesn’t
last long and encourages recurrent spending. The effectiveness of this sly tactic cannot be doubted,
every day, Zynga earns $838k from candy crush’s micro transactions alone.
It is worrying to see how the videogame industry is shifting its priorities from delighting
customers to making a larger profit. Misuse of DLCs butcher games while micro transactions attempt to
swindles customers. The current state of things is deplorable as is and will only worsen if videogame
developers keep a “profit comes first” mindset.
Reference Summary Paraphrase Direct Quote R/C/Q
Internet leaders
speak out on the
need for government reform
of surveillance.
(2013, December 9).
theguardian.
com. Retrieved January 26, 2014,
from
http://www.thegua
rdian.com/world/gallery/
2013/dec/09
/internet-leaders-
speak-out-
on-the-need-for-
government-
reform-of-
surveillance
Various leaders requesting the
government to reform their surveillance
operations Large internet companies claim that user privacy is their utmost concern.
An increase in government
transparency is called for
“'Reports about
government surveillance have shown
there is a real need for greater
disclosure and new
limits on how governments
collect information.”
- Mark Zuckerburg
? People won’t
use technology they don’t
trust” –Brad Smith
The companies
never mentioned
if they actually
participated in the
surveillance.
Is this just a publicity stunt because selling information is very profitable
Qiang, X. (2008,
November 24). How
China's Internet Police
Control Speech on the
Internet. How China's Internet Police
Control Speech on the
Internet. Retrieved
January 26, 2014, from http://www.rfa.o
rg/english/comm
entaries/china_in
ternet-
1124200813410
8.html
Chinese internet is heavily censored
Firewalls and proxy
servers are used to filter traffic.
Fake website does not
exist messages and other fake errors
Blocks sensitive key
terms
Analyze and block even encrypted data if it
contains sensitive terms
Cuts connections between computers
The Golden Shield
Program, better known as the great firewall of
China is used to block and
censor foreign websites
DNS poisoning
works by sending back
false addresses to make the
website inaccessible
The Great
Firewall blocks unwanted IP
addresses
“China
censors
content for a variety of
reasons,
often
because it’s critical
of the
Chinese governmen
t or
contrary to Communist
Party
policy”
A lot of people
don’t seem to mind the censorship
The
controversy is caused by
a vocal minority
Does this censorship really help China
China’s Internet police warn
netizens not to spread “harmful
information,”
Is the information they block
truly harmful
Segan, S. (2011, June
27). Life Behind the
Great Firewall of China.
PCMAG. Retrieved
January 23, 2014, from
http://www.pcmag.com/
slideshow/story/266213/l
ife-behind-the-great-
firewall-of-china
You can’t find Facebook in ShenZhen
Websites are blocked to promote the growth of Chinese knock-offs such as QQ & baidu. People use proxies and VPNs to circumvent the censorship
World news is sporadically
blocked
Terms like “Falun Gong” are blocked
Some
businesses are allowed
unrestricted access to the
internet
“Some foreign-
based social networking sites such as Facebook,
Twitter, and Foursquare
are blocked.”
Chinese surveillance
is quite covert
Scherer, M. (2013, June
24). The Geeks Who
Leak. Time, 181, 22.
Bradley Manning leaked documents and was
sentenced to life imprisonment 3 years
ago
Edward Snowden’s leak implicated Google,
Facebook and Microsoft as participants in the NSA’s spying program
Google claims to have nothing to do with the internet surveillance
project
Bradley Manning
Supposedly violated the
anti-espionage act of 1917
The country had a split
opinion on the discovery of
the NSA’s surveillance
programs
“only 43% of the country thought the government should ‘cut
back on programs
that threaten privacy’ “
According to
Lindsey Graham, the
south Carolina
republican on the armed
services committee “I
don’t care what we
need to do. We need to bring this
guy (Edward Snowden) to Justice for deterrence
sake
The US government seems very harsh when it comes to information
leaks.
Grossman, L., & Newton-
Small, J. (2013,
November 11). The Deep
Web. time, 182, 24.
Ross Ulbricht known online as the Dread
Pirate Roberts created an illegal online bazaar called the Silk Road.
Jihadists sometimes used
the Deep web to communicate
Transactions are made in bitcoins, a new internet
form of internet currency independent from banks
and countries
Ross Ulbricht possesses a reputation as an
antiestablishment hero due to his creation.
Silk Road sells drugs, Fake IDs, hacking software and even assassination services
An internet service called Tor allows users to covertly access the deep web.
“Technically the Deep
Web refers to the
collection of all websites
and databases
that search engines like Google don’t
or can’t index.”
“7,500
Terabytes” of data is not
indexed
It’s surprising how little we know about the internet.
It is
interesting how the
deep web is similar to the more
private and less
connected internet of
old.
Kelley, M. (2013, June
15). The Best
Explanation Yet Of How
The NSA's PRISM
Surveillance Program
Works. Business Insider.
Retrieved January 24,
2014, from
http://www.businessinsid
er.com/ how-prism-
surveillance-works-2013-
6
User data is gathered from Apple, Google,
Microsoft, and Facebook.
The government does not collect everyone’s
information. It claims to only gatehr information
regarding suspicious individuals
The courts allow the
government to collect user data freely
"the NSA copies In
ternet traffic as it enters and leaves the
United States, then routes it
to the NSA for analy
sis,"
“So PRISM leverages the direct access
the NSA has to the Internet's
major pipelines and
then uses court orders authorized by Section 702 of the
Foreign Intelligence Surveillance
The government claims to be very precise
and unintrusive with their
surveillance but it
probably isn’t the
case.
Act (FISA) to collect
specific data from tech
companies. “
MacAskill, E. (2013,
August 23). NSA paid
millions to cover Prism
compliance costs for tech
companies. The Guardian.
Retrieved January 26,
2014, from
http://www.theguardian.
com/world/ 2013/aug/23/ns
a-prism-costs-
tech-companies-
paid
Tax money was utilized to fund this program.
The NSA collects about
56,000 US based communications every
year.
The Prism project breaks the 4th amendment
which protects against unlawful searching and
seizure
The companies claim no
involvement with the
government surveillance
program.
“The National Security
Agency paid millions of dollars to cover the costs of major
internet companies involved in
the Prism surveillance progr
am “
"Federal law requires the
US government to reimburse providers for
costs incurred to respond to compulsory
legal process imposed by
the government.
We have requested
reimbursement consistent with this law."
The government
and its partner
companies will
continuously deny the
spying allegations
Sarlin, B. (2014, January
24). RNC condemns NSA
spying in huge
turnaround. MSNBC.
Retrieved January 26, 2014, from
http://www.msnbc.com/
msnbc/rnc-condemns-
nsa-spying-shock-
turnaround-0
Government surveillance intrudes on individual
freedom.
The NSA’s program also intrudes on
the privacy of innocent citizens
“the Republican
National Committee
voted Friday to adopt a resolution
demanding an
investigation into the
This shows that not all politicians
support the NSA’s spying
projects
National Security Agency’s
spy programs.”
“I have to
thank Edward
Snowden for bringing forth the blatant
trampling of our First and
Fourth Amendment rights in the
guise of security,”-
Diana Orrock