Documenti di Didattica
Documenti di Professioni
Documenti di Cultura
BreAnna Williams
March 20th 2019
Specific Goal: My audience will understand (or learn or realize or become acquainted with) identity theft.
(Identify in one phrase exactly the ONE meaningful idea you want your audience to understand. You
will echo this idea again in your thesis and finally in your conclusion. You will not say your specific goal
out loud.)
My Narrowed Topic:
a. Strategy: I’ll teach my topic by explaining what identity theft is and how it occurs, also what you can
do to prevent yourself from being a victim and what you can do if you are victimized.
b. Narrow Focus: ( The focus of your speech must be narrow enough for a five –minute “post-hole” -
narrow but deep speech. Narrow your topic twice choose one of your main points and turn that into
your entire speech).
Ethos: -Primary Ethos: As a bank fraud investigator, I speak with victims of identity theft every day, part of
my job is to try to identify when I am speaking to an impersonator (someone who has stolen one’s identity)
and I have also been a victim of identity theft.
Audience Knowledge Level: Most audience members have heard of the topic, or have little knowledge of
the topic.
Adaptation to Audience Knowledge: I will help my audience understand my topic by using examples, stories,
statistics, and trying to avoid information overload.
Identity Theft
Introduction:
I. Hook: Most of us have hear of identity theft or seen an identity theft monitoring service commercial, but
most of us brush it off because we don’t think that it will happen to us, or that if it does happen to us it is not a
big deal.
II. Thesis: I’m here to tell you that it is a big deal, because once someone has that information, they have it
forever and it’s important to know how to protect yourself.
III. Ethos: As a Bank Fraud Investigator, I speak with victims of identity theft every day, part of my job is to try
to identify when I am speaking to an impersonator (someone who has stolen one’s identity) and I have also
been a victim of identity theft.
IV. Preview:
1. How identity theft occurs
2. What you can do to help prevent identity theft
3. What you can do if you are already a victim of identity theft
Body
I. There are many ways that identity theft occurs and information gets spread
A. Information compromised
i. Someone who you gave access to information, but they used it in a way they weren’t
supposed to
ii. Databreach with information stolen and sold on the dark web
B. Darkweb
i. Dark web is accessed using the onion router, created by the navy (Shadel, D., &
Wertheimer, N. 2018)
ii. “Fullz” profiles are sold online with information for as low as $2.99 (Shadel, D., &
Wertheimer, N. 2018)
Transition: Now we need to know how to prevent our information from landing in the wrong hands as best we
can.
Conclusion:
I. Summarize main points/thesis: Now that you know how it occurs, what you can do to prevent it, or
what to do if you become a victim,
II. Bookend: you can help protect your credit and know that identity theft is a big deal.
III. End the speech memorably: In 2019, things as little as getting a phone plan requires good credit, so
taking these steps can help you lead a brighter financial future.
References:
Insert here complete bibliographical information for your references (at least three are required).
Arrange references in alphabetical order. Use APA format. You can use Microsoft Word, easybib.com,
and many other sites/programs to do the works cited section for you!
‘
Free Security Freeze. (2018, November 01). Retrieved from https://www.experian.com/blogs/ask-
experian/credit-education/preventing-fraud/security-freeze/
Harrell, E. (2018, January 8). Victims of Identity Theft, 2016. Retrieved March 21, 2019 from
https://www.bjs.gov/index.cfm?ty=pbdetail&iid=6467
Loftsgordon, A., & O’Neil, C. (2017). CHAPTER 11: Avoiding and Dealing With Identity Theft. Credit Repair, 251–
273. Retrieved from
https://libprox1.slcc.edu/login?url=http://search.ebscohost.com/login.aspx?direct=true&db=lir&AN=1260190
25&site=eds-live
Luthi, B. (2019, April 02). How Does Identity Theft Happen? Retrieved from
https://www.experian.com/blogs/ask-experian/how-does-identity-theft-happen/
SHADEL, D., & WERTHEIMER, N. (2018). INSIDE THE DARK WEB. (cover story). AARP Bulletin, 59(7), 10.
Retrieved from
https://libprox1.slcc.edu/login?url=http://search.ebscohost.com/login.aspx?direct=true&db=f6h&AN=131416
096&site=eds-live