Sie sind auf Seite 1von 6

1

Taking Account of Privacy when Designing Cloud Computing Services Academic Language Analysis Name: ahangir Taghiyev !eorge "ason #niversity

2 The organi$ation and presentation of information is reasona%ly formulaic in academic writing& and each discipline has its own particular method for arranging a coherent document& as well as particular reasons for designing conformity' (nformation technology articles present %oth research and a recommendation& which is part of a conversation %etween the writer and the reader' The writer)s relationship to the speaker will determine the level of speciali$ed language& comple*ity of information& and formality of language' These varia%les work into a larger structure that is +uite standard in information technology and science article writings' After the title and author note& which directs the reader initially in the su%,ect material& an a%stract is presented& summari$ing the main ideas of the article and suggesting the recommendation which will later %e filled out %y supporting e*amples from references within the %ody of the article' The information is all organi$ed under appropriate headings and su%headings to %etter orient the reader and prepare them for the main themes that are to %e discussed' Developing a paper logically assists the reader)s a%ility to understand& which is why a coherent& homogenous structure is important in relaying information clearly and +uickly' The aim of most academic articles& and especially in the field of information technology& is to offer an opinion supported %y research& which the author hopes the reader will find agreement with and will value its contri%ution to the field' Siani Pearson)s Taking Account of Privacy when Designing Cloud Services -.//01& is an e*cellent e*ample for analy$ing the success of an article)s %asic structure& adeptness at presenting information clearly and succinctly& while demonstrating appropriate language use for the intended reader and providing a recommendation that follows from the research' This article also contains areas for criti+ue& which will enhance the current discussion on the importance and proper use of the academic article structure' Taking Account of Privacy when Designing Cloud Computing Services carefully inserts the main discussion topic& identifies the pro%lem area -privacy1& and locates it -cloud computing

3 services1& and details the process -design1' The a%stract then develops the title further %y stating the pro%lem& and hinting at solutions that will %e offered in design principles - p' 21' 3ithin the a%stract is the essence of the writer4reader relationship' The level of discussion already insinuates a level of technological savviness& and the argument that follows is consistent in this' The introduction follows with a topic sentence that clearly relates %ack to the a%stract& forming a clear picture of the topic under discussion very +uickly' The fourth sentence presents the importance and relevance of the paper& validating the pro,ect' (n this article& the author states that neglecting to take into account privacy issues at the level of initial design& could prove fatal to the cloud service itself' This point is reiterated in the introduction and then evaluated %ased on a %rief e*ample from research' This esta%lishes right away the approach the author will take -case studies and evaluations1& and demonstrates the a%ility to suggest relevant solutions& as evinced in the final paragraph of the introduction' (f the a%stract serves as a microcosm-nature1 for the article& the introduction opens one step further& offering %ackground information on the field of study& descri%ing& in this case& %y e*ample& the methodology used& and drawing conclusions from presented data' The author does this mostly %y using comple* sentences that link together an idea& and an e*planation of that idea in the conte*t of the topic' Con,unctive ver%s are used fre+uently to not only guide the reader toward a particular state of mind -i'e' in perceiving a conclusion or a furthering of an idea& as in the use of 5hence&6 or 5however61& %ut also simplifies the linguistic structure %y signaling transitional moments' 7mphasis is given to Pearson)s evaluation or e*planation %y the use of these con,unctive ver%s' (n a similar way& su%headings designate emphasis and act as a guiding principle for the reader and situates the argument in smaller topics& highlighting a particular area of discussion' 8or e*ample& in asking 53hat is Privacy96 in the su%heading& the reader knows they will read an answer& and Pearson delivers a definition that is consistent with the recommendation she will

4 later offer' ust for a moment& in this section& the academic neutrality is somewhat %roken& as Pearson)s definition demands for an acknowledgement of the 5fundamental human right6 that is privacy' She then su%:defines privacy& allowing for different forms& as in 5the right to %e left alone&6 and 5control of information a%out ourselves6 -p' 21' This appeal to emotion positions computing privacy at the level of privacy denoted %y the #nited Nations #niversal Declaration of ;uman <ights and the 7uropean Convention on ;uman <ights' Though the paper largely relies on empirical data& this moment is uni+ue in e*posing Pearson)s 5pitch'6 The following discussion e*hi%its the philosophy of integrated design& and shows how it will impact the reader' (n this sense& the article speaks %oth to those with speciali$ed cloud technology knowledge& and to the pu%lic at large& whose safety is the concern of the article' (n the opening sections of the data surveys and case studies& the language formality is toned down& and Pearson repeatedly defines terms' Later in the article& the technological language will amp up& and definitions will %ecome more sparse& suggesting that the main aim of the paper is to speak to those who can use the knowledge in e*panding the field of information technology and computer privacy' 7ach paragraph introduces a topic& followed %y an e*pansion of the introduction' Pearson carefully outlines the risks for %oth pu%lic consumers and %usinesses& succinctly and %riefly covering intended topics' The flow of the paper works to promote the urgency and necessity of the pro%lem' Negative ad,ectives and adver%s fill the paper& especially in the opening pages -p' .: =1' This repetition drives home the intent and gives emphasis to the problem addressed' 8or a paper whose recommendation section is the main contri%uting factor to the field& this rhetorical method is targeted at %ringing around an emotional response em%edded in the display of empirical data and logically drawn conclusions' >ther forms of supporting credi%ility is made possi%le %y using only the most current sources& which& in the field of information technology& is increasingly important due to rapidly evolving issues and practices'

5 (n descri%ing new ideas& Pearson& who was so thorough at creating definitions at the start of the article& looses the layperson to increased usage of technical ,argon& and to descriptions of ideas and design principles that are not clear or illustrative of how they work& limiting general understanding' ;owever& %ecause of the paper)s consistent construction& it is possi%le to reach conclusions %ased upon the less technical elements& as in the su%headings and conclusion' The su%headings reach a point of clear e*planation in the surrounding conte*t of the paper' (n issuing design strategies to ma*imi$e user protection& Pearson)s su%headings +uickly detail necessary steps' They read& for e*ample: 5Protect personal information in the cloud:&6 5"a*imi$e user control:&6 5Allow user choice:6 -p' ?@1' Simple& declarative constructs where%y the details to follow will address the su%headings make it easy for a reader to follow without needing to get into the technically e*panded detail' The overall article has a smooth flow& transitions from each topic in a clear and logical manner& and addresses all new information presented& even if it is sometimes ha$ily defined' Pearson)s conclusion is relatively simple& she stresses the importance of designing privacy into cloud computing at the outset& and her e*amples and scenarios clearly show why this is important' The conclusion essentially %acks up the %ody of the paper& and ropes the control %ack into the hands of the author who has pulled references in and out of the conversation' (t marks a return %ack to the formal structure of the article& and promotes the sense of a well:articulated argument'

6 <eferences Pearson& Siani' ATaking account of privacy when designing cloud computing'A Software engineering challenges of cloud computing. Washington D.C.: IEEE Computer Society, 2009. 44-52. rint.

Das könnte Ihnen auch gefallen