Notes on Logical Arguments

Size: px
Start display at page:

Download "Notes on Logical Arguments"

Transcription

1 Notes on Logical Arguments CSci 1001 January 19, Introduction Logic can mean different things to computer scientists. For example, computer architects often deal with bit-level logic. A specific example of this is doing logical operations like AND and OR on a bit-by-bit basis to two bytes of data. Computer programmers must deal with program logic such as the different branches a program can take depending on the conditions in the program. Theoretical computer scientists must prove results using logically rigourous arguments. The resulting proofs are often quite similar to the types of proofs you may have seen in a math class. Finally, computer scientists, and all people, use logic when using natural language to communicate. It s this last type of logic that we ll look at in this note. One (of the many) ways we judge if information is reliable is whether the information presented is logically convincing. There are different ways that an argument can fail to be convincing. One problem occurs if the facts used as a basis for the argument are incorrect. For example, the claim Since the Internet was invented in France, countries other than the U.S. should have a larger role in Internet governance is not very convincing. The reason for this is that the premise the Internet was invented in France is not true (French researchers contributed to the creation of the Internet, but the bulk of the work was done in the United States). So even if you believe that countries other than the U.S. should have a larger role in Internet governance you would not find the given argument convincing because the premise is false. Another way arguments can fail to be convincing is when the premises and conclusion are all true, but the line of reasoning to get from the premises to the conclusion is not rigorous. For example, support someone says The CSci 1001 lab room is in the EE/CSci Building. Room is a computer lab in the EE/CSci Building. Therefore the CSci 1001 lab is in EE/CSci Each of the three statements here is true, but you can t logically conclude the third from the first two for example, replace with Then you have the same argument, with the first two statements being true, but the conclusion being false. Still another type of problem can occur when people draw invalid conclusions from correct facts. For example, the argument In 1997 a computer beat the world chess 1

2 champion; therefore computers are smarter than humans. is invalid. The first statement, In 1997 a computer beat the world chess champion, is indeed correct. However, the conclusion, computers are smarter than humans, does not follow logically from this since smartness means more than one party defeating another in a single chess match. Logicians have identified a number of fallacies that commonly occur and result in invalid arguments. It is important to remember that an invalid argument does not necessarily mean the premises or conclusion are untrue it just means that the argument for going from the premises to the conclusion does not follow logically in some way. In the remainder of this note we ll look at some of the many logical fallacies, as well as a few biases that often appear in arguments. 2 Ad hominem fallacy An ad hominem argument attacks a person or organization making an claim rather than examining the claim itself. The general form is A says X. A is not reputable. Therefore X is not true. For example, consider the argument Microsoft says Vista is the best operating system. However, Microsoft is a company that has been accused of some questionable business practices. Therefore Vista is not a good operating system. Notice that the argument here is invalid; it tries to imply that Microsoft is not reputable rather than analyzing the merits and/or shortcomings of Vista. Remember again that the argument being invalid does not imply the conclusion is true; neither does it imply it is false. Vista may or may not be a good operating system the point here is that the argument being made isn t made in such a way that we can use it to determine whether Vista is a good operating system. 3 Appeal to authority fallacy An appeal to authority argument claims that because an authoritative person or organization says something, it must be true. While it is true that people or organizations often have special expertise that makes their claims more likely to be true, the appeal to authority fallacy takes the claims at face value without any further scrutiny. For example, the argument The NFL (National Football League) claims that any reuse of a football telecast is illegal, unless it is authorized by the NFL. Therefore any non-authorized Internet posting of any part of a NFL football telecast is illegal. is an appeal to authority based on the expertise of the NFL. However, is the claim really correct? For example, what do the relevant copyright laws say? Is it possible that there are some reuses of football telecasts that wouldn t violate copyright laws? 2

3 4 Appeal to the people fallacy An appeal to the people argument claims that because everyone (or the majority, or at least a significant number) believes something, then that something is true. Notice the connection of this argument to the ethical system of cultural relativism. A common type of argument based on this fallacy is the everyone s doing it or many people are doing it argument; for example: Because many people download copyrighted music for free, it s legal for me to do it. 5 Begging the question Begging the question occurs when an argument s premise contains the desired conclusion. For example: Microsoft s Windows operating system is more popular than Linux is. Therefore more PCs have been sold with Windows on them than with Linux. 6 Confirmation bias Confirmation bias is tendency to be seek and interpret information so as to confirm what one already believes. For example, if I am a partisan member of political party A, then positive information about parts A s members or actions might more easily catch my eye, but I might be less likely to read or believe negative information. 7 Eyewitness fallacy The fallacy of believing that eyewitnesses are always 100% accurate in the recall of events. There are be a number of reasons why eyewitnesses may not be totally accurate. These include a biased viewpoint, a faulty memory, and an imperfect understanding of what transpired. 8 False cause fallacy The false cause fallacy is the contention that because one event preceded a second event, it caused the second event. As an example, take the argument World War II required massive computations, for example, for ballistics. The first computers appeared shortly after World War II. Therefore World War II was the cause of the first computers. While the computational requirements of World War II were certainly a factor in the rise of computers, this argument neglects the many other contributing factors, such as pre-wwii office machinery. Additional note: the example in the above paragraph is also an example of the single cause fallacy, the fallacy that events have only one cause. There are a number of fallacies, 3

4 some of which can overlap at times. The ones listed here not only give you an idea of some of the types of fallacies, but are the more important ones for this class. 9 Hindsight bias Hindsight bias is the tendency to overestimate what we knew in the past, or what could have been foreseen. For example, as we ll see in class, computer representation of numbers is done using the binary number system. We take the advantages of this for granted nowadays, to the point where it s easy to assume that using binary numbers must have been an obvious choice in early computers. It wasn t. Hindsight bias is one reason why doing a consequentialist ethical analysis of past events can be difficult: since we often know some of the consequences, we assume that the people involved in making the decision either knew of the consequences, or could have easily foreseen them. 10 Many-any fallacy The many-any fallacy is the fallacy that because many items in a group have a certain characteristic, all items in that group do. As an example of this, consider the argument Many Apple products have been major successes in terms of their impact on popular culture. The Newton personal digital assistant was an Apple product. Therefore the Newton had a major impact on popular culture. 11 Nirvana fallacy The Nirvana fallacy is the contention that a solution must be perfect in order to be useful. One common example of this relates to Internet regulation: the argument goes that because the Internet is decentralized, crosses international boundaries, etc. it is impossible for any Internet regulations to be 100% effective, and therefore the Internet should not be regulated. This disregards the fact that even if a regulation is not 100% effective, it may nonetheless promote desired behavior and reduce unwanted behavior. 12 Slippery slope fallacy A slippery slope argument is the contention that if one event is allowed it will inevitably lead to a larger undesirable event. This type of argument can be fallacious if the consequent event is taken as inevitable without any further justification. For example, If we allow the government to regulate the Internet, then the government will start collecting all sorts of data from the Internet, and then the government will use this data in all sorts of ways that will undermine people s privacy. There may (or may not) be reasons to 4

5 limit Internet regulation, and having more Internet regulation may (or may not) lead to a decrease in privacy. But the argument here that more Internet regulation will inevitably lead to a major loss of privacy is not valid it does not establish why more Internet regulation will necessarily lead to a loss of privacy. 13 Virtuality fallacy The virtuality fallacy claims that because something happens in virtual space (e.g., on a computer or on a communication network) it is not real. For example, some malicious hackers will claim that because they are not physically trepassing when they hack into a computer system, their actions are acceptable and no harm is done. The virtuality argument fails to take into account that cyberspace costs are real (so, for example, even if a hacker did not steal or damage any information in a computer system, but only viewed it, there are still costs, for example to the system administrator who must investigate whether the hacker did any harm). Moreover, actions in cyberspace can have very real effects on people. For example, slander in cyberspace can be as hurtful to people as slander in speech or hardcopy written communications. 5

Reviewfrom Last Class

Reviewfrom Last Class Reviewfrom Last Class The most used fallacy on Earth! Ad Hominem Several Types of Ad Hominem Fallacies 1. Personal Attack Ad Hominem 2. Inconsistency Ad Hominem 3. Circumstantial Ad Hominem 4. Poisoning

More information

Read this syllabus very carefully. If there are any reasons why you cannot comply with what I am requiring, then talk with me about this at once.

Read this syllabus very carefully. If there are any reasons why you cannot comply with what I am requiring, then talk with me about this at once. LOGIC AND CRITICAL THINKING PHIL 2020 Maymester Term, 2010 Daily, 9:30-12:15 Peabody Hall, room 105 Text: LOGIC AND RATIONAL THOUGHT by Frank R. Harrison, III Professor: Frank R. Harrison, III Office:

More information

Picking Distractors for Multiple Choice Questions

Picking Distractors for Multiple Choice Questions Picking Distractors for Multiple Choice Questions Maplesoft, a division of Waterloo Maple Inc., 008 Multiple choice questions are an appealing format for both instructors and students. In fact, some instructors

More information

Where's Gone? LEAD GENERATION PRINTABLE WORKBOOK

Where's Gone? LEAD GENERATION PRINTABLE WORKBOOK Have you ever stopped to think why you are in business? Good question, isn t it? But before we take a closer look at this, spend a few moments now thinking about what you believe your reasons to be. Jot

More information

ONLINE SAFETY TEACHER S GUIDE:

ONLINE SAFETY TEACHER S GUIDE: TEACHER S GUIDE: ONLINE SAFETY LEARNING OBJECTIVES Students will learn how to use the Internet safely and effectively. Students will understand that people online are not always who they say they are.

More information

DB to DC: Inevitable and It Begins in Two Years With George Pandaleon of Inland Institutional Capital Partners

DB to DC: Inevitable and It Begins in Two Years With George Pandaleon of Inland Institutional Capital Partners DB to DC: Inevitable and It Begins in Two Years With George Pandaleon of Inland Institutional Capital Partners Is the shift from DB to DC pension funds going to take a generation to enact? George Pandaleon,

More information

Boston University Security Awareness. What you need to know to keep information safe and secure

Boston University Security Awareness. What you need to know to keep information safe and secure What you need to know to keep information safe and secure Introduction Welcome to Boston University s Security Awareness training. Depending on your reading speed, this presentation will take approximately

More information

Mathematical Induction

Mathematical Induction Mathematical Induction (Handout March 8, 01) The Principle of Mathematical Induction provides a means to prove infinitely many statements all at once The principle is logical rather than strictly mathematical,

More information

Bailouts and Stimulus Plans. Eugene F. Fama

Bailouts and Stimulus Plans. Eugene F. Fama Bailouts and Stimulus Plans Eugene F. Fama Robert R. McCormick Distinguished Service Professor of Finance Booth School of Business University of Chicago There is an identity in macroeconomics. It says

More information

Website Maintenance Information For My Clients Bob Spies, Flying Seal Systems, LLC Updated: 08- Nov- 2015

Website Maintenance Information For My Clients Bob Spies, Flying Seal Systems, LLC Updated: 08- Nov- 2015 Website Maintenance Information For My Clients Bob Spies, Flying Seal Systems, LLC Updated: 08- Nov- 2015 This document has several purposes: To explain what website maintenance is and why it's critical

More information

June 4, 2012. Ms. Jan Munro Deputy Director International Ethics Standards Board for Accountants 545 Fifth Avenue, 14 th Floor New York 10017 USA

June 4, 2012. Ms. Jan Munro Deputy Director International Ethics Standards Board for Accountants 545 Fifth Avenue, 14 th Floor New York 10017 USA June 4, 2012 Ms. Jan Munro Deputy Director International Ethics Standards Board for Accountants 545 Fifth Avenue, 14 th Floor New York 10017 USA By E-mail: janmunro@ethicsboard.org Dear Jan, Re: International

More information

Sybex CCENT 100-101 Chapter 4: Easy Subnetting. Instructor & Todd Lammle

Sybex CCENT 100-101 Chapter 4: Easy Subnetting. Instructor & Todd Lammle Sybex CCENT 100-101 Chapter 4: Easy Subnetting Instructor & Todd Lammle Chapter 4 Objectives The CCENT Topics Covered in this chapter include: IP addressing (IPv4 / IPv6) Describe the operation and necessity

More information

ThinkReliability. Six Common Errors when Solving Problems. Solve Problems. Prevent Problems.

ThinkReliability. Six Common Errors when Solving Problems. Solve Problems. Prevent Problems. Six Common Errors when Solving Problems Mark Galley Organizations apply a variety of tools to solve problems, improve operations and increase reliability many times without success. Why? More than likely,

More information

What Are Certificates?

What Are Certificates? The Essentials Series: Code-Signing Certificates What Are Certificates? sponsored by by Don Jones W hat Are Certificates?... 1 Digital Certificates and Asymmetric Encryption... 1 Certificates as a Form

More information

How to. Create Personas For Your B2B Content Marketing Strategy

How to. Create Personas For Your B2B Content Marketing Strategy How to Create Personas For Your B2B Content Marketing Strategy Introduction Content marketers are never short on things to do. Whether it s determining the best time to promote to your social media accounts,

More information

TesT AuTomATion Best Practices

TesT AuTomATion Best Practices Test Automation Best Pr actices 2 Which test Cases should be automated? A test case or use case scenario is a simulated situation in which a user performs determinate actions when using a particular app.

More information

A. Arguments are made up of statements, which can be either true or false. Which of the following are statements?

A. Arguments are made up of statements, which can be either true or false. Which of the following are statements? Critical Thinking University of St Andrews March 2007 Bullet point material is not on the students copies. Feel free to use the material as you see fit, depending on timing, ability, enthusiasm etc. Good

More information

Pirate Bay owners plan to fight High Court ruling ordering ISP site block Page 1 of 5. Questions to consider before listening.

Pirate Bay owners plan to fight High Court ruling ordering ISP site block Page 1 of 5. Questions to consider before listening. Pirate Bay owners plan to fight High Court ruling ordering ISP site block Page 1 of 5 Questions to consider before listening 1. Complete the following mindmap: Piracy 2. How much time do you spend on the

More information

Business Intelligence: Putting the Power of Analytics to Work to Improve Results

Business Intelligence: Putting the Power of Analytics to Work to Improve Results Business Intelligence: Putting the Power of Analytics to Work to Improve Results Business Intelligence: Putting the Power of Analytics to Work to Improve Results You Can t Afford to Do Nothing: Why You

More information

Sample lesson from I Think: Economics What is Economics? Correlates to Common Core Standards!!

Sample lesson from I Think: Economics What is Economics? Correlates to Common Core Standards!! Getting in the Game Sample lesson from I Think: Economics What is Economics? Correlates to Common Core Standards!! Objective: The student will be able to describe the various degrees of competition that

More information

Deduplication as security issue in cloud services, and its representation in Terms of Service Agreements

Deduplication as security issue in cloud services, and its representation in Terms of Service Agreements Deduplication as security issue in cloud services, and its representation in Terms of Service Agreements Cecilia Wirfelt Louise Wallin Email: {cecwi155, louwa538}@student.liu.se Supervisor: Jan-Åke Larsson,

More information

Divine command theory

Divine command theory Today we will be discussing divine command theory. But first I will give a (very) brief overview of the semester, and the discipline of philosophy. Why do this? One of the functions of an introductory

More information

Victor Shoup Avi Rubin. fshoup,rubing@bellcore.com. Abstract

Victor Shoup Avi Rubin. fshoup,rubing@bellcore.com. Abstract Session Key Distribution Using Smart Cards Victor Shoup Avi Rubin Bellcore, 445 South St., Morristown, NJ 07960 fshoup,rubing@bellcore.com Abstract In this paper, we investigate a method by which smart

More information

Review from last time. CS 537 Lecture 3 OS Structure. OS structure. What you should learn from this lecture

Review from last time. CS 537 Lecture 3 OS Structure. OS structure. What you should learn from this lecture Review from last time CS 537 Lecture 3 OS Structure What HW structures are used by the OS? What is a system call? Michael Swift Remzi Arpaci-Dussea, Michael Swift 1 Remzi Arpaci-Dussea, Michael Swift 2

More information

ANOTHER GENERATION OF GENERAL EDUCATION

ANOTHER GENERATION OF GENERAL EDUCATION ANOTHER GENERATION OF GENERAL EDUCATION Peter K. Bol Charles H. Carswell Professor of East Asian Languages and Civilizations I was asked to set forth some personal reflections rather than to summarize

More information

Institute of Southern Punjab, Multan

Institute of Southern Punjab, Multan Institute of Southern Punjab, Multan Network Security Brief Introduction Lecture#1 Mazhar Hussain E-mail: mazhar.hussain@isp.edu.pk Blog https://mazharhussainatisp.wordpress.com/ Grading Policy Classification

More information

It is time for companies to take their blinders off. Social networking is not going away.

It is time for companies to take their blinders off. Social networking is not going away. Social Networking As featured in the New York State Bar Association Journal By Mark Grossman It is time for companies to take their blinders off. Social networking is not going away. You can choose to

More information

Acronis Digital Assets Research Findings: Unveiling Backup & Recovery Practices across Europe

Acronis Digital Assets Research Findings: Unveiling Backup & Recovery Practices across Europe Acronis Digital Assets Research Findings: Unveiling Backup & Recovery Practices across Europe March 2010 Contents - Executive Summary: Count the cost of a lost day - Methodology - Research Finding 1: Companies

More information

Discrete Mathematics and Probability Theory Fall 2009 Satish Rao, David Tse Note 10

Discrete Mathematics and Probability Theory Fall 2009 Satish Rao, David Tse Note 10 CS 70 Discrete Mathematics and Probability Theory Fall 2009 Satish Rao, David Tse Note 10 Introduction to Discrete Probability Probability theory has its origins in gambling analyzing card games, dice,

More information

Point of View. Planning for success after a merger or acquisition. Danny A Davis, Programme Director, Mergers & Acquisitions

Point of View. Planning for success after a merger or acquisition. Danny A Davis, Programme Director, Mergers & Acquisitions Point of View Planning for success after a merger or acquisition Danny A Davis, Programme Director, Mergers & Acquisitions Without understanding the motive behind the deal, a clear link to postdeal activity

More information

FIREARMS BUSINESS. Volume 7 Issue 4 August 2014 WHAT ENTREPRENEURIAL TEENAGERS NEED TO KNOW ABOUT PATENTS AND TRADEMARKS

FIREARMS BUSINESS. Volume 7 Issue 4 August 2014 WHAT ENTREPRENEURIAL TEENAGERS NEED TO KNOW ABOUT PATENTS AND TRADEMARKS BULLETPROOF THE FIREARMS BUSINESS THE LEGAL SECRETS TO SUCCESS UNDER FIRE Volume 7 Issue 4 August 2014 WHAT ENTREPRENEURIAL TEENAGERS NEED TO KNOW ABOUT PATENTS AND TRADEMARKS I m not dumbing down the

More information

Just for Teachers: An Introduction to Workplace Health and Safety

Just for Teachers: An Introduction to Workplace Health and Safety Just for Teachers: An Introduction to Workplace Health and Safety This introduction is intended to give you an overview of the eight key aspects of workplace health and safety in Nova Scotia workplaces,

More information

Check Out These Wonder Tips About Reputation Management In The Article Below

Check Out These Wonder Tips About Reputation Management In The Article Below Check Out These Wonder Tips About Reputation Management In The Article Below In the business world, reputation is just about everything. Without a good reputation, a business will have a hard time flourishing.

More information

Terminology and Scripts: what you say will make a difference in your success

Terminology and Scripts: what you say will make a difference in your success Terminology and Scripts: what you say will make a difference in your success Terminology Matters! Here are just three simple terminology suggestions which can help you enhance your ability to make your

More information

how 140 characters can ruin your reputation essential reading for retailers ebook

how 140 characters can ruin your reputation essential reading for retailers ebook how 140 characters can ruin your reputation essential reading for retailers ebook it only takes 140 characters to ruin your reputation The empowered consumer has you in the palm of their hand. Most ecommerce

More information

Your Guide To Crowdfunding With Superior Ideas

Your Guide To Crowdfunding With Superior Ideas Your Guide To Crowdfunding With Superior Ideas TIP GUIDE 1.0 Table Of Contents: From Our Team... 3 Welcome! Crowdfunding... 4 Questions to ask yourself Creating Your Project... 6 Project set up & multimedia

More information

A Statistical Analysis of Popular Lottery Winning Strategies

A Statistical Analysis of Popular Lottery Winning Strategies CS-BIGS 4(1): 66-72 2010 CS-BIGS http://www.bentley.edu/csbigs/vol4-1/chen.pdf A Statistical Analysis of Popular Lottery Winning Strategies Albert C. Chen Torrey Pines High School, USA Y. Helio Yang San

More information

Adelaide University Football Club. Community Partnership Program.

Adelaide University Football Club. Community Partnership Program. Adelaide University Football Club. Community Partnership Program. From BankSA. Hi Adelaide University Football Club, Over the past 170 years, the generations of teams working in BankSA have always been

More information

pm4dev, 2016 management for development series Project Scope Management PROJECT MANAGEMENT FOR DEVELOPMENT ORGANIZATIONS

pm4dev, 2016 management for development series Project Scope Management PROJECT MANAGEMENT FOR DEVELOPMENT ORGANIZATIONS pm4dev, 2016 management for development series Project Scope Management PROJECT MANAGEMENT FOR DEVELOPMENT ORGANIZATIONS PROJECT MANAGEMENT FOR DEVELOPMENT ORGANIZATIONS A methodology to manage development

More information

Why Your Business Needs a Website: Ten Reasons. Contact Us: 727.542.3592 Info@intensiveonlinemarketers.com

Why Your Business Needs a Website: Ten Reasons. Contact Us: 727.542.3592 Info@intensiveonlinemarketers.com Why Your Business Needs a Website: Ten Reasons Contact Us: 727.542.3592 Info@intensiveonlinemarketers.com Reason 1: Does Your Competition Have a Website? As the owner of a small business, you understand

More information

Plato gives another argument for this claiming, relating to the nature of knowledge, which we will return to in the next section.

Plato gives another argument for this claiming, relating to the nature of knowledge, which we will return to in the next section. Michael Lacewing Plato s theor y of Forms FROM SENSE EXPERIENCE TO THE FORMS In Book V (476f.) of The Republic, Plato argues that all objects we experience through our senses are particular things. We

More information

MEDWAY PUBLIC SCHOOLS Medway, MA. Acceptable Use Policy for School Network, Internet, and Equipment Grades 7-12

MEDWAY PUBLIC SCHOOLS Medway, MA. Acceptable Use Policy for School Network, Internet, and Equipment Grades 7-12 MEDWAY PUBLIC SCHOOLS Medway, MA Policy #21-A Acceptable Use Policy for School Network, Internet, and Equipment Grades 7-12 The District s goal in providing computer network technology and Internet access

More information

Full details of the course syllabus, support and examination arrangements are provided below.

Full details of the course syllabus, support and examination arrangements are provided below. A Level Studies in conjunction with Oxford College Study House is pleased to be able to offer students the opportunity to study A levels through our partner Oxford College who will provide study materials

More information

REPUTATION MANAGEMENT SURVIVAL GUIDE. A BEGINNER S GUIDE for managing your online reputation to promote your local business.

REPUTATION MANAGEMENT SURVIVAL GUIDE. A BEGINNER S GUIDE for managing your online reputation to promote your local business. REPUTATION MANAGEMENT SURVIVAL GUIDE A BEGINNER S GUIDE for managing your online reputation to promote your local business. About Main Street Hub: Main Street Hub is the voice for more local businesses

More information

Research Article. Research of network payment system based on multi-factor authentication

Research Article. Research of network payment system based on multi-factor authentication Available online www.jocpr.com Journal of Chemical and Pharmaceutical Research, 2014, 6(7):437-441 Research Article ISSN : 0975-7384 CODEN(USA) : JCPRC5 Research of network payment system based on multi-factor

More information

BYOD QUESTIONS & ANSWERS

BYOD QUESTIONS & ANSWERS BYOD QUESTIONS & ANSWERS Bring Your Own Device Year 9 and 10-2016 We introduced a BYOD programme to Year 9 students in 2015, and are pleased to report that the implementation has been very positive. Students

More information

Consumer Behavior, MKT 3230 (A03): Winter 2014 Department of Marketing University of Manitoba

Consumer Behavior, MKT 3230 (A03): Winter 2014 Department of Marketing University of Manitoba Consumer Behavior, MKT 3230 (A03): Winter 2014 Department of Marketing University of Manitoba Instructor: Olya Bullard Office: 371 C, Drake Centre Telephone: (204) 474-7036 Email: umbryksi@cc.umanitoba.ca

More information

2014 New Jersey Core Curriculum Content Standards - Technology

2014 New Jersey Core Curriculum Content Standards - Technology 2014 New Jersey Core Curriculum Content Standards - Technology Content Area Standard Strand Grade Level bands Technology 8.2 Technology Education, Engineering, Design, and Computational Thinking - Programming:

More information

The Economics of. Software as a Service (SaaS) VS. Software as a Product. By Scott Sehlhorst

The Economics of. Software as a Service (SaaS) VS. Software as a Product. By Scott Sehlhorst The Economics of Software as a Service (SaaS) VS. Software as a Product By Scott Sehlhorst There are numerous ways of selling software these days. Software as a Service (SaaS) has been in the consumer

More information

Whitepaper on AuthShield Two Factor Authentication and Access integration with Microsoft outlook using any Mail Exchange Servers

Whitepaper on AuthShield Two Factor Authentication and Access integration with Microsoft outlook using any Mail Exchange Servers Whitepaper on AuthShield Two Factor Authentication and Access integration with Microsoft outlook using any Mail Exchange Servers By INNEFU Labs Pvt. Ltd Table of Contents 1. Overview... 3 2. Threats to

More information

So, why should you have a website for your church? Isn't it just another thing to add to the to-do list? Or will it really be useful?

So, why should you have a website for your church? Isn't it just another thing to add to the to-do list? Or will it really be useful? Why Have A Website? So, why should you have a website for your church? Isn't it just another thing to add to the to-do list? Or will it really be useful? Obviously, 'everyone else does' it not a good enough

More information

Invest Your Heartbeats

Invest Your Heartbeats Invest Your Heartbeats Wisely Practical, Philosophical, and Principled Leadership Concepts for Business and Life Theo Etzel GREENLEAF BOOK GROUP PRESS www.gbgpress.com This publication is designed to provide

More information

Frequently Asked Questions (FAQ s)

Frequently Asked Questions (FAQ s) Frequently Asked Questions (FAQ s) 1. What is the Internet Modem Server? 2. A fee based service? Why do I have to pay to program DoorKing systems? 3. How s does the Internet Modem Server work? 4. What

More information

How to fill every seat in the house. An event manager s guide to SMS Marketing

How to fill every seat in the house. An event manager s guide to SMS Marketing How to fill every seat in the house An event manager s guide to SMS Marketing - Why should you use SMS messaging? When was the last time you didn t have your mobile? Chances are you can t remember (because

More information

What is a Credit Score and Why Do I Care What It Is?

What is a Credit Score and Why Do I Care What It Is? What is a Credit Score and Why Do I Care What It Is? Your Credit Score is a lot like the score you get on a test. You get points for good credit decisions and behavior and you get points taken away for

More information

How to Use Solo Ads to. Grow Your Business

How to Use Solo Ads to. Grow Your Business How to Use Solo Ads to Grow Your Business By: Reed Floren http://www.soloaddirectory.com The Basics of Solo Ads Solo ads a great way to market your business using a small scale method. Solo ads are basically

More information

SAMPLE DOCUMENT Social Media Policy

SAMPLE DOCUMENT Social Media Policy SAMPLE DOCUMENT Social Media Policy Disclaimer: This resource is intended to be used only as guidance in the development of a social media policy. Any policy developed should be reviewed by that organization

More information

Security Management. Security is taken for granted until something goes wrong.

Security Management. Security is taken for granted until something goes wrong. Security Management Security Management Security is taken for granted until something goes wrong. Concerns about security have existed for as long as has mankind. The most obvious manifestation of this

More information

Contents. Introduction. Creating a list. Growing your list. Managing unsubscribes. Handling spam complaints. Managing bounces

Contents. Introduction. Creating a list. Growing your list. Managing unsubscribes. Handling spam complaints. Managing bounces Managing your data Contents 01 02 03 04 05 06 07 08 09 10 11 Introduction Creating a list Growing your list Managing unsubscribes Handling spam complaints Managing bounces Dealing with Out of Office notifications

More information

Dr. Candace Walkington, Assistant Professor of Mathematics Education Southern Methodist University

Dr. Candace Walkington, Assistant Professor of Mathematics Education Southern Methodist University 5-E Classroom STEM Activity: ETHICAL HACKING: HOW LONG DOES IT TAKE TO BREAK YOUR PASSWORD? Dr. Candace Walkington, Assistant Professor of Mathematics Education Southern Methodist University CYBER SECURITY

More information

Merchant Gateway Services Agreement

Merchant Gateway Services Agreement Merchant Gateway Services Agreement This Merchant Gateway Services Agreement ( Agreement ) is made as of, 20 ( Effective Date ), by and between American POS Alliance, LLC ( Reseller ) and the merchant

More information

Chapter Four: How to Collaborate and Write With Others

Chapter Four: How to Collaborate and Write With Others Chapter Four: How to Collaborate and Write With Others Why Collaborate on Writing? Considering (and Balancing) the Two Extremes of Collaboration Peer Review as Collaboration * A sample recipe for how peer

More information

Internet Acceptable Use Policy

Internet Acceptable Use Policy 1. Overview Quincy College provides Internet access to students, faculty, staff, and administration as part of its educational mission. When the Internet is used appropriately, it can provide a wealth

More information

Lesson Plan for Senior Secondary

Lesson Plan for Senior Secondary Lesson Plan for Senior Secondary Introduction Purpose Introduce the National Day of Action against Bullying and Violence (NDA) campaign Explore the role of bystanders to bullying Investigate the theme

More information

KEY PERFORMANCE INDICATORS (KPIS): DEFINE AND ACT

KEY PERFORMANCE INDICATORS (KPIS): DEFINE AND ACT KEY PERFORMANCE INDICATORS (KPIS): DEFINE AND ACT Integrating KPIs into your company s strategy By Jacques Warren WHITE PAPER ABOUT JACQUES WARREN Jacques Warren has been working in online marketing for

More information

Managed Security Monitoring: Network Security for the 21st Century

Managed Security Monitoring: Network Security for the 21st Century Managed Security Monitoring: Network Security for the 21st Century Introduction The importance of Security The Internet is critical to business. Companies have no choice but to connect their internal networks

More information

Protection Ripple in ERP 802.11 WLANs White Paper

Protection Ripple in ERP 802.11 WLANs White Paper Protection Ripple in ERP 802.11 WLANs White Paper June 2004 Planet3 Wireless, Inc. Devin Akin, CTO Devin@cwnp.com Copyright 2004 The CWNP Program www.cwnp.com Page 1 Understanding Use of 802.11g Protection

More information

Why Diagnosing Application Problems is Too Hard

Why Diagnosing Application Problems is Too Hard The Essentials Series: Improving Application Performance Troubleshooting Why Diagnosing Application Problems is Too Hard sponsored by by Why Diagnosing Application Pro blems Is Too Hard... 1 It Starts

More information

SECURITY FIRST: AN ESSENTIAL GUIDE TO PENETRATION TESTING

SECURITY FIRST: AN ESSENTIAL GUIDE TO PENETRATION TESTING WHITE PAPER SMART THINKING. DELIVERED. SECURITY FIRST: AN ESSENTIAL GUIDE TO PENETRATION TESTING WWW.SERVERCHOICE.COM INTRODUCTION Penetration testing, or pen tests, can be a confusing subject for many

More information

The dispute is about the sale of a payment protection insurance (PPI) policy in connection with a credit card account with the firm in April 2007.

The dispute is about the sale of a payment protection insurance (PPI) policy in connection with a credit card account with the firm in April 2007. FINAL DECISION complaint by: Mr E complaint about: the firm complaint reference: date of decision: April 2009 This final decision is issued by me, Robert Short, an ombudsman with the Financial Ombudsman

More information

Why you MUST protect your customer data

Why you MUST protect your customer data Why you MUST protect your customer data If you think you re exempt from compliance with customer data security and privacy laws because you re a small business, think again. Businesses of all sizes are

More information

the future of digital trust

the future of digital trust the future of digital trust A European study on the nature of consumer trust and personal data September 2014 2 the future of digital trust my data value As outlined in the first instalment of The Future

More information

Software Engineering. Introduc)on

Software Engineering. Introduc)on Software Engineering Introduc)on Software engineering The economies of ALL developed nations are dependent on software. More and more systems are software controlled Software engineering is concerned with

More information

WSI White Paper. Prepared by: Eric Cook Digital Marketing Consultant, WSI

WSI White Paper. Prepared by: Eric Cook Digital Marketing Consultant, WSI Blogging to Build a Reputation Online WSI White Paper Prepared by: Eric Cook Digital Marketing Consultant, WSI Introduction Dear Diary, you wouldn t believe what happened to me today... To some of you,

More information

What is a digital certificate, why do I need one, and how do I get it?

What is a digital certificate, why do I need one, and how do I get it? PKI FAQ s What is a digital signature and how do you get one? You can t buy a digital signature. It s not like a handwritten one. A digital signature is different every time it is made, and is related

More information

Saint Martin s Catholic Academy

Saint Martin s Catholic Academy Saint Martin s Catholic Academy E-Safety Policy - Acceptable Use - Students January 2015 Why have an Acceptable Use Policy? An Acceptable Use Policy is about ensuring that you, as a student at Saint Martin

More information

Technical Assistance to Support Evidence-Based Policymaking: A Conversation With the Regional Comprehensive Centers

Technical Assistance to Support Evidence-Based Policymaking: A Conversation With the Regional Comprehensive Centers Technical Assistance to Support Evidence-Based Policymaking: A Conversation With the Regional Comprehensive Centers Facilitated By Betheny Gross November 2015 2015 Edvance Research, Inc. 53 the SEA of

More information

Computer Science CS 2334: Programming structures and abstractions

Computer Science CS 2334: Programming structures and abstractions Computer Science CS 2334: Programming structures and abstractions Instructor: Dr. McGovern Spring 2013 1 Course Overview This is your second course in programming. We will focus on abstraction and programming

More information

Comp 255Q - 1M: Computer Organization Lab #3 - Machine Language Programs for the PDP-8

Comp 255Q - 1M: Computer Organization Lab #3 - Machine Language Programs for the PDP-8 Comp 255Q - 1M: Computer Organization Lab #3 - Machine Language Programs for the PDP-8 January 22, 2013 Name: Grade /10 Introduction: In this lab you will write, test, and execute a number of simple PDP-8

More information

Data Security: Fight Insider Threats & Protect Your Sensitive Data

Data Security: Fight Insider Threats & Protect Your Sensitive Data Data Security: Fight Insider Threats & Protect Your Sensitive Data Marco Ercolani Agenda Data is challenging to secure A look at security incidents Cost of a Data Breach Data Governance and Security Understand

More information

Subject : April Referral G 03 / 08 Case G03/08 Referral under Article 112(1)b) EPC ("Patentability of programs for computers")

Subject : April Referral G 03 / 08 Case G03/08 Referral under Article 112(1)b) EPC (Patentability of programs for computers) Enlarged Board of Appeal European Patent Office Erhardtstrasse 27 80331 München Paris, April 29 th, 2009 Subject : April Referral G 03 / 08 Case G03/08 Referral under Article 112(1)b) EPC ("Patentability

More information

An Employer's Guide to Conducting Internal Investigations

An Employer's Guide to Conducting Internal Investigations An Employer's Guide to Conducting Internal Investigations Source: Corporate Compliance & Regulatory Newsletter. Brooke Iley and Mark Blondman www.investigationsystem.com Tel: (613) 244-5111/ 1-800-465-6089

More information

Expert Reference Series of White Papers. Basics of IP Address Subnetting

Expert Reference Series of White Papers. Basics of IP Address Subnetting Expert Reference Series of White Papers Basics of IP Address Subnetting 1-800-COURSES www.globalknowledge.com Basics of IP Address Subnetting Norbert Gregorio, Global Knowledge Instructor Introduction

More information

If Your HR Process is Broken, No Technology Solution will Fix It

If Your HR Process is Broken, No Technology Solution will Fix It If Your HR Process is Broken, No Technology Solution will Fix It Joyce Y. Quindipan, Partner, Cambria Consulting Audit and align your HR processes before you invest in and implement a At the HR Technology

More information

Business Ethics Course Notes. This area of study in your course for Commercial Law is not covered in the prescribed textbook.

Business Ethics Course Notes. This area of study in your course for Commercial Law is not covered in the prescribed textbook. INTRODUCTION This area of study in your course for Commercial Law is not covered in the prescribed textbook. The material chosen to cover the concept of Business Ethics is available as a free download

More information

SPICE EduGuide EG0015 Security of Administrative Accounts

SPICE EduGuide EG0015 Security of Administrative Accounts This SPICE EduGuide applies to HSC information systems, specifically Administrative login accounts; (aka Admin accounts) and the faculty, staff and students who use them. Admin accounts are logon IDs and

More information

FAQ: (Data) security and privacy

FAQ: (Data) security and privacy Shockwave Traffic Jams A58 FAQ: (Data) security and privacy The strength of the shockwave traffic jam service developed in the project Shockwave Traffic Jams A58 is that the participants receive customized

More information

Five Tips for Presenting Data Analyses: Telling a Good Story with Data

Five Tips for Presenting Data Analyses: Telling a Good Story with Data Five Tips for Presenting Data Analyses: Telling a Good Story with Data As a professional business or data analyst you have both the tools and the knowledge needed to analyze and understand data collected

More information

STATEMENT OF ETHICAL PRACTICE

STATEMENT OF ETHICAL PRACTICE STATEMENT OF ETHICAL PRACTICE Preamble Records and information management (RIM) is the branch of the information professions primarily concerned with the efficient and systematic control of the creation,

More information

Four Strategies for Smarter Inventory Control

Four Strategies for Smarter Inventory Control Whitepaper April 2016 Four Strategies for Smarter Inventory Control Section 01 Synopsis This paper is provided for companies that carry inventory (manufacturers, distributors, retailers and service providers)

More information

Our Code is for all of us

Our Code is for all of us This is Our Code This is Our Code Our Code How we behave forms the character of our company and dictates how others see us. How we conduct ourselves determines if people want to do business with us, work

More information

Family Law - Divorce FAQ

Family Law - Divorce FAQ Family Law - Divorce FAQ We have only been married a short time when can I start a divorce? You cannot start a divorce until you have been married for at least 12 months and you must show that the marriage

More information

Scams and Schemes LESSON PLAN UNIT 1. Essential Question What is identity theft, and how can you protect yourself from it?

Scams and Schemes LESSON PLAN UNIT 1. Essential Question What is identity theft, and how can you protect yourself from it? LESSON PLAN Scams and Schemes Essential Question What is identity theft, and how can you protect yourself from it? Lesson Overview Students learn strategies for guarding against identity theft and scams

More information

Instant Site Flipping Riches

Instant Site Flipping Riches Instant Site Flipping Riches Site Flipping for Massive Profits Made Easy Module 04: Adding Massive Value to Your Virtual Real Estate Important Learning Advisory: To experience better learning, it is recommended

More information

IPDET Module 6: Descriptive, Normative, and Impact Evaluation Designs

IPDET Module 6: Descriptive, Normative, and Impact Evaluation Designs IPDET Module 6: Descriptive, Normative, and Impact Evaluation Designs Intervention or Policy Evaluation Questions Design Questions Elements Types Key Points Introduction What Is Evaluation Design? Connecting

More information

Why Hire an Immigration Lawyer?

Why Hire an Immigration Lawyer? Why Hire an Immigration Lawyer? Remember that immigration applications with the government are legal documents, similar to filing court documents for a lawsuit. Don t be deceived that these applications

More information

SME BUSINESS INSURANCE MADE SIMPLE

SME BUSINESS INSURANCE MADE SIMPLE SME BUSINESS INSURANCE MADE SIMPLE Working with the profession to simplify the language of insurance PUTTING INSURANCE TO WORK Business insurance is about protecting your livelihood. For SMEs in particular,

More information

TECHNICAL WHITE PAPER. TLS encryption: Is it really the answer to securing email?

TECHNICAL WHITE PAPER. TLS encryption: Is it really the answer to securing email? TECHNICAL WHITE PAPER TLS encryption: Is it really the answer to securing email? The digital age has fundamentally changed the way all organisations operate, driving greater efficiency, scalability and

More information

Communications Council Best Practice Guide Social Media and Online Commentary Code of Conduct

Communications Council Best Practice Guide Social Media and Online Commentary Code of Conduct Communications Council Best Practice Guide Social Media and Online Commentary Code of Conduct Revised Mar 13 2015 social media and online commentary code of conduct Purpose In the past few years social

More information

Why are thesis proposals necessary? The Purpose of having thesis proposals is threefold. First, it is to ensure that you are prepared to undertake the

Why are thesis proposals necessary? The Purpose of having thesis proposals is threefold. First, it is to ensure that you are prepared to undertake the Guidelines for writing a successful MSc Thesis Proposal Prof. Dr. Afaf El-Ansary Biochemistry department King Saud University Why are thesis proposals necessary? The Purpose of having thesis proposals

More information