Free Essay

To Catch a Thief

In:

Submitted By Plagiaristsuck
Words 676
Pages 3
I was most interested in Lui’s work about online reading and the necessity of having a complex and detailed definition of that kind of reading. I suppose since there is so much more online than just reading that reading has mutated into something quite different than it was when we did our reading primarily in print. There were no hyperlinks, immediately accessible related reading, the ability to contribute and read comments, the ability to save and pass on the reading itself. The material text is extremely limited in what we can do with it. We can basically read it and write on it. Depending on our purpose with the text, that may be all we need to do with. A 20-page academic article is difficult to read on a screen, our ability to annotate it is limited and clunky if not impossible, and it’s not like you’re going to re-tweet the link, unless you have extremely like-minded friends who have time for that kind of thing. We don’t particularly like to print things out, either, because of cost, or the desire to be green, or the knowledge that’s one more pile of paper we have to juggle, carry around, store, and not lose. Neither medium seems particularly ideal, especially for longer, content-heavy pieces. There is difficulty with lighter reading as well online, especially those with a broader scope aimed at the average reader. These pieces are often poorly researched and hastily produced, we might find the tone engaging or the content interesting, and it encourages us to read it quickly, not ask questions, and disseminate it to our friends. Of course, there’s more to it than that, but the point is, really, that we need an consciousness that is aware and alert to how reading, writing, and our accessed to both changed when they went online. The part of Lui’s definition I found particularly helpful engages “the usage side of the continuum, specific topics of interest include: browsing, searching, scanning, jumping, filtering, aggregating, organizing, and other kinds of discontinuous, low-attention, peripheral-vision, or machine-assisted reading practices that only partially map over predecessor practices of literacy. But also: new ways to focalize or intensify reading among the clutter (as in the ability of RSS and similar tools to create a virtual “my newspaper”).,”
The emphasis on how our attention is divided and diluted by the many, many possibilities the webbiness of the web offers us is, I think, the crux of the “trouble” with online reading practices. The advantages can often function as disadvantages when there isn’t a conscious effort to make these things work for us instead of distract us. I guess this stuck out to me particularly because I personally am so prone to distraction in any setting, so the constant struggle I have to focus on and finish a text that I am either reading or writing on an electronic platform is a huge factor in how I operate. Many of my peers have the same trouble and we talk about how we unplug our routers so that we can focus on just a single thing and not be pulled off by other possibilities and portals offered by the web. Many of my students have this same difficulty with focus, but also with the type of focus and attention they bring to online documents. They are further crippled by lacking critical reading skills, in part because of the broad, information-shallow type of reading that is more easily and quickly available to them online.
This always makes me think about just being aware as a reader about how different texts are generated, by whom, and why. I guess it’s important to cultivate a frame work and a method of reading to apply to the online context that is significantly different from that of traditional text, OR, maybe taking that type of interrogative spirit we tend to have in the humanities and start focusing that on online texts and asking them, “Just what are you trying to do?”

Similar Documents

Free Essay

To Catch a Thief Movie Review

...“It takes a thief to catch a thief.” Well, that’s the saying we’ve always heard. In modern day times, we’ve seen it in productions like Fast and Furious, Criminal Minds, and even in comedies like 22 Jump Street. Hitchcock based his movie, To Catch a Thief, solely based on this saying. John Robie (the infamous jewel thief from previous years) is being framed as stealing multiple precious jewels around the city. The culprit has the same technique and does it with the same stealth as Robie did. The police think Robie could be the only one to commit these crimes so he conjures up the idea that he has to catch the actual thief to prove his innocence. In his struggle to do so, he comes into contact with an old friend (Danielle), a jewel insurer, and two ladies from America (a mother and daughter), all who help contribute to the smooth transitions between scenes and an exciting ending. Therefore, To Catch a Thief is a striking movie, being both witty and suspenseful; Alfred Hitchcock creates this feeling by making the movie not too predictable, scripting engaging characters, and keeping scenes implicit. First off, Hancock set up the movie to where it wasn’t obvious who the jewel thief was, but if you paid attention to detail, you could make a good guess. From the way characters talked, it was believed that a man was the thief. For Robie even says, “He picks perfect victims and only the right stones. Goes up walls, over the roofs, down through the skylights. Leaves no clue and then...

Words: 729 - Pages: 3

Free Essay

Applied to Negotiation 36 Chinese Strategies

...APPLIED TO NEGOTIATION 36 CHINESE STRATEGIES The Original 36 Strategies Contemporary Maxims 1 Cross the Sea by Deceiving the Sky. Act in the open, but hide your true intentions. 2 Besiege Wei to Rescue Zhao. Attack their Achilles heel. 3 Kill with a Borrowed Knife. Attack using the strength of another person. 4 Relax and Wait for the Adversary to Tire Himself Out. Await leisurely the exhausted enemy. Exercise patience and wear them down 5 Loot a Burning House. Hit them when they are down. 6 Make a Feint to the East While Attacking in the West. Fake to the right; attack to the left. 7 Create Something Out of Nothing. Turn something that is not substantial into reality. 8 Secretly Utilize the Chen Cang Passage (CNC). Pretend to Advance Down One Path While Taking Another Hidden Path (LB). Pretend to care about an issue and later give it up to get what you really want. 9 Watch the Fire Burning from Across the River. Allow them to fight your other enemy while you rest and observe. Later, defeat the exhausted survivor. 10 Conceal a Dagger in a Smile. Befriend them to get their guard down, then attack their weakest point. 11 Sacrifice a Plum Tree to Save a Peach Tree (RM). Let the Plum Tree Wither in Place of the Peach Tree (TF). Trade up! Take a small loss for a large gain. 12 Take Away a Goat in Passing. Take advantage of every small opportunity. 13 Beat the Grass to Startle the Snake. Stir things up before beginning to negotiate for your true interests. 14...

Words: 868 - Pages: 4

Premium Essay

Water Scandal Research Paper

...However, every time he thought he could take a shot the opportunity had vanished, this continued for three weeks. After the three weeks had passed Leoso decides to quit and gives both the photo and information that he gathered to the police. When they saw what he had gathered, the police just laughed at the idea that a fourteen year old girl could stump both the police and other bounty hunters for longer than a month. At that Leoso goes back to the mill and leaves Rosa a note stating that he would like to team up with her since the police didn't respect him or the skills he used to find out who the game thief was. Just as he was leaving, he glanced back at the note and saw that it was gone and heard a female voice say, " We'll see, but why do you wish to team up with me." He answered," I'm tired of the ridicule and losing out on the bounties to the younger...

Words: 825 - Pages: 4

Free Essay

Dogs

...The dog is a loving companion to a man. He is happy to go everywhere with his master. He shows his affection for his master by wagging his tail and licking his hand or face. If his master is blind, the dog helps him to cross the street and acts as his loving guide. No man can feel lonely when he has a dog for company. A dog keeps watch over his master’s house. He will not allow anyone to touch anything belonging to his master. He will bark when a stranger approaches the house. He might even bite a thief who is not scared away by his bark. A dog is useful to a shepherd to look after his sheep. If any of the sheep stray from the flock, the dog will bring it back. He will not allow a wolf or fox to attack the sheep. A dog is useful in catching thieves and criminals. The thief may hide anywhere. Yet the dog will use his keen sense of smell to find out where the thief is hiding. Police dogs are used to catch murderers and criminals. The dog by his sense of smell will lead the police to the hiding place of a murderer. A dog is loyal and faithful to his master. Nothing will induce him to leave his master. His master might be a poor man or even a beggar but, still his dog will not leave him to go with anyone else. A dog worships his master as if he were a God. A dog has a sharp sense of hearing and smell. He can hear footsteps from a great distance. At night he will be up and about at the least sound. He can smell his master from far off. He will rush out of the...

Words: 392 - Pages: 2

Premium Essay

A Soldier's Death Depicted In The Book Thief

...believing ourselves. "I'm okay" we say. "I'm alright". But sometimes the truth arrives on you and you can't get it off. That's when you realize that sometimes it isn't even an answer--it's a question. Even now, I wonder how much of my life is convinced.” Death is convinced to be many things, in The Book Thief, he is the narrator of the story. In the poem Its Death Again, he is a ghoul in a hood standing and stalking. “It’s Death again - He’s always there - Watching, waiting - e’er the stare! Every time I look behind or reach to pull the window blind, I catch a glimpse of grubby hood…” The death in The Book Thief however. Describes himself differently. He describes himself almost human like, a person with a heart....

Words: 429 - Pages: 2

Premium Essay

Cormac Mccarthy The Road Analysis

...Because the man is exuding his power, he orders the thief to remove all of his clothing, and goes on to say, “I’m going to leave you the way you left us.” (McCarthy 257). Opposing the moralities of the Old Testament, the son encourages the New Testament moralities that consist of love and forgiveness. This part of the novel can also connect to the New Testament story of the thief who was crucified next to Jesus. Jesus says so him, “To day shalt thou be with me in paradise.” (Luke 23:43). The thief in the bible saw the goodness in Jesus, and looked to him for mercy. The thief in the novel did the same to the boy because he saw his goodness, as well as his ability to love and forgive. The novel states, “The thief looked at the child and what he saw was very sobering to him” (McCarthy 256). The boy’s sense of divinity is reveled through these scenes by exemplifying the moralities of the New...

Words: 1158 - Pages: 5

Free Essay

Papr Thing

...Whitney Noel Hicks Mrs. Cunningham AP English March 11, 2015 DQ 1 Death Character Analysis In the novel The Book Thief by Markus Zusak the narration is done by Death. As he tells the story of the book thief you catch on to his dark sense of humor. He is amused by how humans see him, “I liken this human idea of the grim reaper.” (Zusak 75) He finds it funny to be thought of as a simply skeleton dressed in a cloak with a scythe. Noticing his amusement with humans he seems to possess human like traits like emotion. Although his job is to take souls he does not enjoy it. So in order to distract himself from the truth of his job he focuses on colors. It is his form of vacation from work. As another form of distraction from his job he collects stories, like the one he is telling now about Liesel. He has these stories saved forever as a way to give himself more meaning. Also perhaps to prove himself wrong about humans, “to prove that you, and your human existence, are worth it.” (Zusak 15) He carries the stories as a way to prove that all humans are destructive when in fear, but are kind like Liesel, Hans, or Rudy. Because of those humans, the one who are destructive, he is result. As he explained in the beginning of the book he is not violent he is just the result of the destructiveness of cowardly...

Words: 253 - Pages: 2

Free Essay

Ice Breaker

...Big Groups: Stand Up! Its recommended to have at least 5 people to play it so I’ll explain it with 5 players. Everyone has to sit down. Now someone has to stand up and shout “1”. But there’s no settled order. No one knows who will stand up but if more than one person stands up and shouts “1”, they are all out and the remaining players continue the game starting with 1 again. If only one person stands up and shouts “1”, the person is safe until the game ends. Now the next person to stand up has to shout “2”. If this person was also the only one and the one to shout 3 and 4 too, then the remaining last person loses the game. The Flying Coin materials needed: tape, a bowl (not too large but also not too small) with a bit water in it and coins. You make a line on the floor with the tape and put the bowl a few meters behind the tape-line, about 2~3 meters (you can change the gap). One team starts. The members of the team have to stand ina a row behind the line. One after another, they have to throw the coin into the bowl. The first team where ALL members get their coin in with one try will win the game. Small groups: Hit The Mark materials needed: piece of paper, marker, tape, (prizes optional) instructions: place a poster high up on a wall. one person runs across the room and jumps up, placing a mark as high as they can. then they are told to try again but place it higher. then the team is told they will be rewarded (ice cream, longer lunch honker, etc) if...

Words: 537 - Pages: 3

Premium Essay

The Image of Dsire

...“The Image of Desire” is a narrative poem about a group of boys keeping vigil for a fox during the night. They have the desire to protect their “fortress” from the undesirable foe. The boys believed that their honor was on the line, as if they are soldiers in a war. The poem is enjoyable to read and not something one can take figuratively. The poem has some great rhythmic qualities and displays the story of the boys as it unfolds. I will walk you the reader through the poem line by line for a better understanding of the poem. The poem is written as an Italian sonnet. The poem contains fourteen lines and written usually in iambic pentameter. The octave rhyme scheme is a b b a, a b b a, and the sestet rhyme scheme is c d e c d e, which Italian sonnets are normally written and the last two lines do not rhyme. This form of a sonnet is a more rhythmic tone and quality. The way the story was told through sonnet form gives the reader a better image. The story could be told in a boring nonchalant way. For example, I was in a loft with some other boys waiting all night if a fox came to the farm. The speaker could have told the story this way but that would not be enjoyable. Like other poems, it tells a story that the reader may learn from. The first line of the poem makes the readers feel alert. This is because the opening line begins with the unknown knowledge of when the next time fox might strike again. I thought in the beginning that the fox will soon strike and...

Words: 1157 - Pages: 5

Premium Essay

Ethical Dilemma Cash Sales

...the benefit of the doubt to those that you have a positive relationship with. Just as I would hope that if someone was suspicious or unsure what I was doing they would ask me first before assuming I was doing something wrong or unethical. This would be especially true for those that I have an established relationship with. I do have an obligation to my employer to let them know what I suspect but I wouldn’t point fingers at anyone specifically as it’s only a suspicion and there could very well be someone else doing it or more than one person. To be fair, they should look at everyone and not just focus on one person. If only one person is looked at, the employer might spook others or the real thief. When the stealing stops it could be for that reason and not that they identified the thief by blaming Nathan. The primary risk in not saying anything is that the employer could find on their own that Nathan is not recording all the cash sales and, knowing that the team splits the tips evenly, feel that all have stolen from them. Everyone could lose their job and possibly face prosecution for theft. I think most people would answer that they would tell the employer of their suspicions and allow them to take it from there. In...

Words: 495 - Pages: 2

Free Essay

Computer Ethics

...vital and necessary aspect in the world today. With the growth of computer use and technology it is imperative that some standards and guidelines are set to protect the public. Today it is common that each household has multiple computers that is utilized by everyone in the household, including children. According to Wall, the term ‘cybercrime’ is widely used today to describe the crimes or harms that result from opportunities created by networked technologies. With the increase of user knowledge comes the increase potential for crimes committed with the use of technology. Cybercrimes can be committed without ever leaving the comfort of ones home and is getting harder to prevent. In this paper specific cybercrimes such as hacking, identify thief, embezzlement, and secure fraud will be analyzed. The one of the most common cybercrimes is hacking. Computer hacking is when someone gains access to another individual's or company's computer network without their knowledge or permission. There are several different types of hacking. Bluetooth hacking is one form. Bluetooth hacking is when the Java programming language is used to gain access to various cellular phones. For this process to work the phone that is targeted to be hacked must be able to support JSR-82, this is the official Java Bluetooth Application Programming Interface. The best way to prevent your phone from being hacked using a bluetooth is to set your bluetooth security level to Security Level 3. In this mode an authorization...

Words: 1560 - Pages: 7

Premium Essay

Anything Gets Bits Character Analysis

...One day a man stops at a red light, looks over at Bit and begins making small talk. The man told Bit that he would give him twenty dollars as long as he told the truth about what he was going to buy to drink or smoke with the cash, so when asked what he was going to spend the cash on Bit replied, “The new Harry Potter book.” (Walter 3) That day Bit was not scraping up cash and coins to go buy a bottle of liquor, he was trying to just enough money together so that he could give his son a gift. No one likes a thief. Most people know exactly what they would do if they saw someone stealing from them. Most people would confront the person, call the cops, or maybe even take it upon themselves to handle the situation; all of these seem like simple solutions on how to handle a stranger who is stealing from you, but how does one handle the situation if the one who is stealing is one of your own children? This is the problem that Wayne is facing in the story “Thief.” Wayne is a hard working man who tries his best to provide for his family. Wayne has jar that he puts money...

Words: 1015 - Pages: 5

Free Essay

The One

...verbs have do make have a bath have a drink have a good time have a haircut have a holiday have a problem have a relationship have a rest have lunch have sympathy do business do nothing do someone a favour do the cooking do the housework do the shopping do the washing up do your best do your hair do your homework make a difference make a mess make a mistake make a noise make an effort make furniture make money make progress make room make trouble take break catch take a break take a chance take a look take a rest take a seat take a taxi take an exam take notes take someone's place take someone's temperature break a habit break a leg break a promise break a record break a window break someone's heart break the ice break the law break the news to someone break the rules catch a ball catch a bus catch a chill catch a cold catch a thief catch fire catch sight of catch someone's attention catch someone's eye catch the flu pay save keep pay a fine pay attention pay by credit card pay cash pay interest pay someone a compliment pay someone a visit pay the bill pay the price pay your respects save electricity save energy save money save one's strength save someone a seat save someone's life save something to a disk save space save time save yourself the trouble keep a diary keep a promise keep a secret keep an appointment keep calm keep control keep in touch keep quiet keep someone's...

Words: 617 - Pages: 3

Free Essay

Entry

...A cat may look at a king 
A chain is only as strong as its weakest link 
A change is as good as a rest
 A dog is a man's best friend
A drowning man will clutch at a straw
 A fish always rots from the head down 
 A fool and his money are soon parted
A friend in need is a friend indeed
A golden key can open any door
 A good beginning makes a good ending
A good man is hard to find
 A house divided against itself cannot stand
 A house is not a home
A journey of a thousand miles begins with a single step
A leopard cannot change its spots
A little knowledge is a dangerous thing
A little learning is a dangerous thing
A little of what you fancy does you good
A man who is his own lawyer has a fool for his client
A miss is as good as a mile
A new broom sweeps clean
A nod's as good as a wink to a blind horse 
A penny saved is a penny earned
A person is known by the company he keeps
A picture paints a thousand words
A place for everything and everything in its place
A poor workman always blames his tools 
A problem shared is a problem halved
A prophet is not recognized in his own land
A rising tide lifts all boats
A rolling stone gathers no moss
A soft answer turneth away wrath
A stitch in time saves nine
A swarm in May is worth a load of hay; a swarm in June is worth a silver spoon; but a swarm in July is not worth a fly
A thing of beauty is a joy forever
A trouble shared is a trouble halved
A volunteer is worth twenty pressed men
A watched pot never boils
A woman's place is in the...

Words: 3612 - Pages: 15

Premium Essay

Categories of Computer Crime

...affected via a computer. A computer crime it is like a normal crime. The only thing difference from it is that in which the computer crime is carried out. A person can commit theft, trespassing, embezzlement and fraud. The rules to what is a felony act depend of what jurisdiction of the crime commit. The starter of the internet has increased the warning of these crimes. It been difficult for the laws to inspect computer crimes and capture computer criminals. The government officials have passed legislation that defines forms of computer crimes (Computer Crime Research Center, (2005). The Computer Crime Research Center teamed up with law enforcement to create methods to capture the offenders. Law enforcement has improved their tactic to catch the computer criminals. The typical investigation ways it was not working when it came to computer crimes. (Computer Crime Research Center, (2005). Law officials paid a lot into new ways to increase their opportunities to capture the criminals. The government has also stepped in and passed approximately 40 federal statues for computer related crimes. The legislations cover crimes from copyright infringement to child pornography. If you are a regular user at home or a big business person you are vulnerable to all computer crimes. Security packages are very important for your computer to be safe and your private information. For all the businesses, it is very important to have the best security system possible to protect private information...

Words: 867 - Pages: 4