This essay has been submitted by a student. This is not an example of the work written by professional essay writers.
Academic Year

Rhetorical/Genre Analysis Essay

Pssst… we can write an original essay just for you.

Any subject. Any type of essay. We’ll even meet a 3-hour deadline.

GET YOUR PRICE

writers online

Rhetorical/Genre Analysis Essay

 

In the academic journal of “The impact of neglecting user-centered information design principles when delivering online information,” Dr. Maria, Dr. David, and Dr. Hey-Won are investigating whether information design principles are essential when delivering information or not. They established the results by comparing two websites, Cyber Aware and Get Safe Online. The primary audience for this journal is anyone in the cybersecurity field. It is also as important to people in the web development industry who are responsible for designing web pages. Also, people interested in web security can find this journal interesting as it is full of helpful information. The authors established their goals by providing studies and logical deductions and showing credibility by relying on reliable sources.

The journal is full of studies, charts, statistics, and quotes from experts, which is vital to persuade readers with reason. The authors did a great job explaining the findings of their research using charts and tables. They also followed up each table with a brief description telling the readers what was accomplished. “The choice of three words to describe the website is illustrated in Table 4.1 and Figure 7.1. The highest choice was the word ‘Accessible’ (31.1%), selected for the Cyber Aware website, and the word ‘Complex’ (23.0%) for the Get Safe Online website.” (Lonsdale et al.) Here authors managed to narrow down what is essential from the table that was full of results. The purpose of these illustrations is to help audiences understand the situation without wasting time reading through long texts. Authors also made sure to rely on experts when it comes to quoting information.

It is crucial as it is the reason for readers to believe this information. “claimed by Nielsen (2011), users do not stay on a web page for very long. Users usually leave in 10–20 seconds, with the average page visit lasting a little less than a minute.” (Nielsen qtd. In Lonsdale et al.) here authors used a quote from Jakob Nielsen, who has a Ph.D. in human-computer interaction. Breaches are due to human error” (Lonsdale et al.) Here authors used The International Business Machines Corporation (IBM), which is a leading computer hardware company as their source of information to strengthen their credibility. They also used the governmental office as a source of information. “As noted by GCHQ Director Robert Hannigan, ‘the baseline of understanding across society and government is still very low'” (Lonsdale et al.) Authors here relied on the Government Communications Headquarters in the United Kingdom (GCHQ) and Robert Hannigan, a cybersecurity specialist, as a source of information. Their use of reliable sources has strengthened their credibility and created secure connections with the audience.

Throughout the article, authors relied on trustworthy sources to use as a source of information to back up their claims. Some of the keywords utilized in the report include information design, online information, information processing, user-centered information design principles, and cybersecurity. The principles of information design are overlooked in cybersecurity awareness websites as the information design process and model aids in interpreting and framing the way online information is generated. The models also help in identifying the role played by information design principles in facilitating the entire process. Lonsdale et al. (152), elaborate on the recent one-point nine billion euros cybersecurity strategy investment implemented by the UK government in 2016 for the next five years.

Don't use plagiarised sources.Get your custom essay just from $11/page

Consequently, the US’s yearly spendings on cybersecurity have gone up to nineteen billion dollars, which made the cyber command to be elevated to a complete unified combatant command status. Regardless of these critical advancements in organizational structure and funding, both countries have to improve their strategies because most of the businesses and individuals are still failing to manage cyber risk properly. This is a serious concern, according to Lonsdale et al. (152), because all internet users play a significant role in cybersecurity. Human error is the leading cause of security breaches. Both the US and the UK comprehend the implications of cybersecurity and hence developed different strategies such as increasing cybersecurity awareness and skills and building a culture of preparedness and sharing of information.

Even though the governments have established various techniques to promote cybersecurity, these methods have received several criticisms, including their costs and the anticipated outcome. Therefore the article presents a theoretical information processing model that explains the procedure of searching for information online, the effective strategies applied when looking for information, the aspects that influence the information-seeking method as well as the impacts of poor online information design on the performance of the users. Such a model is critical in helping to structure and understand how online content is processed and the role of web management concepts in promoting such processing.

Additionally, Lonsdale et al. (153) suggest that information processing entails three vital stages, and they are: the need for the information, seeking the info and the use of the acquired data. While all three phases are listed, as they are similarly essential and strongly interconnected, the suggested design emphasizes on Phase two, Info Search. That’s because this is the point at which design has a significant impact on success when it comes to searching for information online. The article also provides an in-depth evaluation of design principles (Lonsdale et al. 159). A structure containing a total of 82 design principles has been established to clarify better which design values may have a detrimental impact on cognitive load and pressure, speed of reading and navigation, interaction and concentration, memory, and recall. Such ideas have been derived from the Information and Web Design fields in the’ Domain Architecture’ and’ Naviga ‘ material zones.

Based on these initial results, the researchers examined the theory that neglecting data and site design concepts that are user-centered undermines privacy understanding by compromising users ‘ ability to identify, recognize and maintain knowledge that is essential to privacy protection. The findings thereby enable the authors to have an original insight: that one design theory, which appears to have been entirely overlooked in the field of online content management (and web design), in particular intending to obtain, learn, maintaining and acting on knowledge, is the concept of’ lasting impression’ (Lonsdale et al. 167). It has been debated and studied how to make a strong first impression that draws the interest of consumers. However, if the aim is for consumers to apply what they have discovered and experienced, then the’ other experience’ counts as well as the’ initial experience.’

The integration of content built by user-centric methods is critical in influencing functionality and allowing organizations to achieve their objectives, such as to keep the public safe and consumers to fulfill their demands. Client-centered design is invaluable in both the public and private sectors in the preparation of online material designed to support customers in building confidence in the knowledge that the company provides and in raising the possibility that they can act on it. Concerning the private industry, the article has also reported that the private sector has not made the requisite strides in information protection, forcing the government to assume the lead in defending both the Vital National Infrastructure and individuals from malicious cyberspace operations

 

Finally, the authors managed to establish their goals by persuading readers with studies and logical deductions and showing credibility by relying on dependable sources (Lonsdale et al. 174). The journal started with an appeal to the readers‘ logical reasoning. Throughout the memoir, there were a lot of statistics and studies to prove their point. Also, the authors managed to illustrate all the tables and charts in the journal to the audience to help them understand it without much effort. There were also many quotes from experts, which was a way to persuade readers to believe this information.

 

Works Cited

 

Lonsdale, Maria Dos Santos, et al. “The Impact of Neglecting User-Centered Information Design

Principles When Delivering Online Information.” Information Design Journal, vol. 24,

  1. 2, 18 Apr. 2018, pp. 151–177., doi:10.1075/idj.00005.san.

  Remember! This is just a sample.

Save time and get your custom paper from our expert writers

 Get started in just 3 minutes
 Sit back relax and leave the writing to us
 Sources and citations are provided
 100% Plagiarism free
error: Content is protected !!
×
Hi, my name is Jenn 👋

In case you can’t find a sample example, our professional writers are ready to help you with writing your own paper. All you need to do is fill out a short form and submit an order

Check Out the Form
Need Help?
Dont be shy to ask