Create a Working Outline First

Printed Page 114

Begin with a working outline (many experts and instructors suggest using full sentences) before transferring its ideas to a speaking outline that uses key words or phrases. Creating a working outline will give you confidence that you’ve satisfactorily fleshed out your speech points and that they follow in a logical and compelling progression.

Checklist: Steps in Creating a Working Outline

Write out your topic, general purpose, specific speech purpose, and thesis.

Establish your main points (optimally two to five).

Flesh out supporting points.

Check for correct subordination and coordination; follow the numbering system shown on p. 98.

Label each speech part (i.e., “Introduction,” “Body,” and “Conclusion”).

Write out each speech point in sentence format.

Label and write out transitions.

Note sources for the bibliography.

Assign the speech a title.

Print this Checklist


SAMPLE WORKING OUTLINE

The following outline is from a speech delivered by John Coulter at Salt Lake Community College. It uses the sentence format and includes labeled transitions as well as the wording John will use to cite his sources. John briefly notes his sources in parentheses (e.g., FTC, “Quick Facts”) for ease in assembling a required bibliography.

Staying ahead of Spyware

JOHN COULTER

Salt Lake Community College

TOPIC: Problems and solutions associated with spyware
SPECIFIC PURPOSE: To inform my audience of the dangers of spyware so that they may take steps to prevent infection
THESIS STATEMENT: Computer and mobile device users must understand the evolving nature of spyware and what it can do in order to take the necessary steps to protect themselves.

INTRODUCTION

  1. Do you worry about identity theft online?
  2. Are you anxious about the security of your passwords and credit card numbers? (Attention getter)
  3. Many of you are aware of software known as spyware that can install itself on your computer and smartphone and harvest sensitive information without your knowledge.
  4. Spyware is constantly evolving, however, and to stay safe, we need to stay on top of new developments and arm ourselves against the threats spyware poses. (Thesis statement)
  5. Today, I’ll talk about what forms spyware takes, how it gets into your computer and phone, the harm it causes, and how to keep from becoming infected by it. (Preview)

TRANSITION: So, what’s the state of spyware today?

BODY

  1. Spyware is a type of privacy invasion “malware,” or “malicious software” that installs itself on a computer or mobile device, gathers data from it, and sends it back to a remote computer without your consent. (FTC, “Quick Facts”)
    1. Some types of spyware track your Web-browsing habits, selling this information to marketers.
    2. Some spyware programs capture passwords and other sensitive information, leading to identity theft.
    3. One particularly spooky type of spyware can secretly record everything you type or text.
    4. Adware refers to programs that display ads on your computer. (PC Magazine, “Nine Ways”)

      1. Adware may be annoying, but it doesn’t contain software that can track you.
      2. Spyware, on the other hand, does what its name suggests—it sends your stolen data to “the lair of its evil creator,” as tech writer Neil Rubenking so aptly puts it. (“Nine Ways”)
    5. Unlike spyware, viruses are designed to replicate themselves.
      1. Individuals generally write viruses in order to brag about causing damage, whereas spyware often is written by corporate teams to make money. (CNET Video)
      2. Viruses are illegal, whereas legislation outlawing spyware, such as the Internet Spyware Prevention Act, has thus far failed passage, according to GovTrack.us, a Web site that tracks the status of federal legislation. (GovTrack.us, “I-SPY”)
  2. Spyware takes various routes into your computer depending on what it’s programmed to do, from tracking your Internet browsing habits to stealing your identity.

    1. Spyware often “piggybacks” onto downloadable programs, such as free file-sharing applications and games.
    2. Links in pop-up ads and the “unsubscribe” button in spam are known sources.
    3. Legitimate-seeming antispyware protection programs, called “scareware,” promise to fix your problems, but install spyware when downloaded. (Microsoft, “Fake Virus”)
    4. Keystroke logging software can capture your keystrokes, enabling actual spying as well as identity theft.
      1. Some people deliberately install keystroke loggers to spy on spouses, children, employees, or students.
      2. Reporting in the June 29, 2010 edition of Newsweek, Jessica Ramirez writes that keystroke loggers can be attached to smartphone apps. (Newsweek: Spying on Your Cellphone”)
    5. Clicking on pop-up ads on social media sites or accepting invitations to take certain quizzes or join certain groups can activate spyware.

  3. The symptoms and problems associated with spyware are fairly easy to recognize.
    1. One sign of infiltration, according to Google’s Web search help page, is a constant stream of pop-up ads. (Google, “Help”)
    2. Strange toolbars may appear on the desktop.
    3. Browser settings may be hijacked, forcing users to strange Web pages.
    4. The computer may behave sluggishly, files may disappear, or the computer may crash.
  4. Prevention is the best way to avoid spyware’s harmful and potentially dangerous effects.

    1. There are some good antispyware programs on the market.
      1. Microsoft now distributes Windows Defender with its operating systems and offers a free program called Microsoft Security Essentials.
      2. PC Magazine’s Editor’s Choice for stand-alone malware protection is Spyware Doctor with Antivirus; its choice for security suite is Norton Internet Security. (PC Magazine, “Free Virus and Spyware Protection”)
      3. Be aware that free antispyware software, according to PC Magazine, doesn’t do as thorough a job as rated commercial software, and some free programs actually contain spyware.
    2. Keep your browser up-to-date to take advantage of security updates.

    3. Don’t install any software without reading the fine print, or first checking for reviews of it.
    4. Download free software or any smartphone apps only from sites you know and trust.
    5. Don’t click on links in pop-up windows.
    6. Don’t reply to or even open spam or e-mail that isn’t from someone you know.
    7. Don’t hit the “unsubscribe” button in spam because spyware is known to lurk here.
    8. Use the maximum security level settings on social media sites.
    9. As suggested on the Web site Identity Theft 911, use strong passwords that can’t be easily guessed and don’t set up your smartphone to automatically remember them. (ID Theft 911, “Smartphones”)

CONCLUSION

  1. The makers of spyware are in it for the money, so the problem is likely to be long-lasting. (Signals close of speech)
  2. II. Spyware appears in various guises in order to use personal information stored on computers or smartphones without your consent, but taking the right steps can help you avoid unwanted intrusions. (Summarizes main points)
  3. III. One final suggestion is to stay abreast of developments related to spyware and malware by consulting reputable Web sites such as Stopbadware.org and StaySafeOnline.org. (Leaves audience with something to think about)
  4. IV. Be vigilant, stay safe, and good luck! (Memorable close)

TRANSITION: Many people are confused about the differences between spyware, adware, and another type of malware—the computer virus.

TRANSITION: You may be wondering how spyware gains a foothold in your computer.

TRANSITION: Spyware even lurks on social networking sites such as Facebook and Twitter.

TRANSITION: Now for the good news. You can protect yourself from spyware.

TRANSITION: Along with the antispyware software you can install, what else can you do?

Works Cited

Federal Trade Commission. “Spyware: Quick Facts.” OnGuardOnline.gov Web site. March 2010. http://www.onguardonline.gov/topics/spyware.aspx.

“H.R. 1525: Internet Spyware (I-SPY) Prevention Act of 2007.” GovTrack.us. http://www.govtrack.us/congress/bill.xpd?bill=h110-1525.

Identity Theft 911. “Get Wise about Smartphones.” August 2010 Newsletter. http://www.idt911.com/KnowledgeCenter/Articles/ArticleDetail.aspx?a={C73BB83D-981E-4523-9D2D-89419AC5EAF5}.

Ramirez, Jessica. “Is Someone Spying on Your Cellphone Calls?” Newsweek, June 29, 2010, 16.

Rubenking, Neil. “Free Virus and Spyware Protection: What’s Right for You?” PC Magazine, July 6, 2010. http://www.pcmag.com/article2/0,2817,2356509,00.asp.

---. “Nine Ways to Wipe Out Spyware.” PC Magazine, February 5, 2008. http://www.pcmag.com/article2/0,2817,2255854,00.asp.

“Suspicious Results and Strange Behavior: Strange Pop-Ups and Other Malware.” Google Web Search Help. Accessed August 30, 2010. http://www.google.com/support/websearch/bin/answer.py?hl=en&answer=809.

“Virus vs. Spyware.” CNET.com. Videos section. September 1, 2010. http://cnettv.cnet.com/?tag=hdr;snav.

“Watch Out for Fake Virus Alerts.” Microsoft Security Web site. Accessed August 25, 2010. www.microsoft.com/security/antivirus/rogue.aspx.