Friday, July 26, 2019

Logical Fallacies; Argument Structure Assignment

Logical Fallacies; Argument Structure - Assignment Example It creates the notion that the public sector entities are knowledgeable on cyber security issues as compared to modern enterprises because of the period of service covered (over a decade). Appeal to belief is evident in that assumption because Microsoft attempts to rule out the viability of enterprises in tackling cyber security because they are modern organizations. The target market gets the impression that the ‘older’ company stands a better chance to handle cyber security issues. In addition, Microsoft claims that public sector entities have tackled multiple national and local threats; hence, stand a better chance to handle cyber security threats. Such an assumption indicates misleading vividness. Despite having the experience with cyber security concerns, Microsoft ought not to rule out modern enterprises in their attempt to handle such concerns. Modern enterprises can offer a lesson to the public sector entities regardless of their period of operation. In the adver tisement, Microsoft employs an appeal to fear by claiming that tables may have turned when it comes to matters of security best practices. Such an assumption attempts to overrule the general belief that public sector entities can derive important lessons from modern enterprises. The target market gets the impression that though the modern enterprises offer valuable lessons to public sector entities, the public sector entities are invincible in matters of cyber security. Logical fallacies exist in every research or argument. People utilize logical fallacies to satisfy their arguments; hence, establishing subjective arguments and judgments. However, it is important to be aware of logical fallacies. In the Microsoft advertisement, the company attempts to market its security services to the target market. With the increase in cyber security threats, individuals and organizations worry about the security of their databases and key technologies. Microsoft

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.