"

13 Appendix B-1

Informative Speech: Culture/Identity
(Required speech for the TU COMM 131 course)

Speech Description

Based on your own experiences, you will present a clear, organized, informative speech to the class by concentrating on the structure of your message, by developing a logical thought progression, and by using effective delivery/performance techniques. The topic you choose must relate to your cultural heritage or personal identity, which can include anything in your life that you feel has shaped you as a person and influenced your ideas, beliefs, or traditions. Think about your own identity and how it has been formed.

Some topics that previous students have used: Being raised by biracial parents, growing up in America while growing closer to my Nigerian culture, the effects of divorce on my identity, the influence of having a Russian father and American mother, living with a learning disability, the cultural significance of my African American hair, how music shaped my passions, influence of internet (or COVID-era) on my childhood, playing youth sports made me who I am, caring for a disabled sibling, growing up as an only child/as a twin, being a first generation Asian-American college student, the influence of my Italian upbringing, finding belonging in the hardcore punk scene, etc. Topics must be submitted and approved by your instructor before your final speech preparations begin.

This speech should be 4-5 minutes and will be delivered to the class audience during class time. The speech must include material from at least 2 credible sources, and you will orally cite each of your sources during your speech. One source can be something that a family member has said to you and will be cited as ‘personal communication’. You will turn in an outline with in-text citations and an APA formatted references page. Do not write your speech out in paragraph form word for word, and do not use generative AI to write a full speech for you.

You must visit the Public Communication Center (PCC) and meet with a student mentor for at least a 30-minute appt. You are responsible for making your own PCC appt. If you procrastinate until there are no available PCC appointments, you will miss out on the points associated with this class requirement. Making use of this University resource is an important part of this class, and one that will help you along the path of becoming a stronger public speaker. Once you make an appt with the PCC, if you are a no-show without sending an email to cancel your appt in advance, points could be deducted from your speech grade, and you may be unable to use the PCC for future speeches. It is critical that you keep the appts you make. This speech is worth 100 points.

An Informative Speech Outline Template, Example Student Outline & Rubric are included on the next pages for your reference. Confirm with your instructor before using these documents, in case there are any changes to the course requirements.

Preparation Outline Guide

This is a guide/template to use as you develop a preparation outline for your speech. The elements needed in the outline – title, specific purpose statement, thesis statement, introduction, body, conclusion, transitions, references – should all be included. Delete all this red instructional text before submitting your personal outline. The title of your speech should be centered at the top of the page. When you see brackets with options, choose the appropriate words and delete the others. For example, for the Specific Purpose Statement below, you would choose ‘inform’ when you are developing your informative speech and delete ‘entertain’ and ‘demonstrate’. Other brackets include instructions and those should not stay as part of your final outline.

Title

Specific Purpose Statement: To [inform/entertain/demonstrate] my audience…..

Thesis Statement: [One sentence that states the purpose and goal of your entire speech; why it matters and how you are going to support your claims]

Introduction

  1. Attention Getter / Reveal Topic: [create interest in your topic right away]
  2. Establish Credibility: [relate topic to yourself / how you know what you know]
  3. Establish Relatability: [relate topic to your audience / why should they care]
  4. Preview Main Points: [what your audience can expect to hear from you]

Transition: [A sentence that lets the audience know you are moving from one point to another]

Body

I. First Main Point: [A single complete sentence expressing the main point (claim) of this section of speech]

A. Evidence: [The example, testimony, or statistic you use to support the main pt]

B. Warrant: [Explain how the evidence you used supports the claim you made

Transition: [A sentence that lets the audience know you are moving from one point to another]

II. Second Main Point: [A single complete sentence expressing the main point (claim) of this section of speech]

A. Evidence: [The example, testimony, or statistic you use to support the main pt]

B. Warrant [Explain how the evidence you used supports the claim you made]

Transition: [A sentence that lets the audience know you are moving from one point to another]

III. Third Main Point [A single complete sentence expressing the main point (claim) of this section of speech]

A. Evidence [The example, testimony, or statistic you use to support the main pt]

B. Warrant [Explain how the evidence you used supports the claim you made]

Transition: [A sentence that lets the audience know you are moving from one point to another]

Conclusion

  1. Signal the conclusion [use more creative words than, “in conclusion…”]
  2. Restate the main points [this is a review, so nothing new]
  3. Clincher [a strong ending that leaves a lasting impression]

References

[All sources are to be included here and listed in APA format, using the APA manual 7th edition. Use in-text citations in your outline, and full citations on the references page. Every source you cite must also be orally cited in your speech. The references page should begin at the top of a brand-new page. Use a page break to guarantee proper placement. Examples will be provided.]

Cyber Attacks on Infrastructure

Specific Purpose Statement: To inform my audience of the risks and rising number of cyber-attacks on critical infrastructure in the United States.

Thesis Statement: Cybersecurity is needed to protect infrastructures, strengthen vulnerabilities, and put a stop to exploitation in order to secure the quality of our daily lives.

Introduction

  1. Attention Getter/Reveal Topic: Have you ever thought about what it would be like if you woke up one day and didn’t have any working electricity or running water? What about if you need to put gas in your car and there was suddenly no way to get any?
  2. Establish Credibility: I am an IT major and have been researching cyber–attacks heavily for the past year, and what I have learned has brought me here to warn you.
  3. Establish Relatability: I know these scenarios sound frightening or apocalyptic even, but they are very real possibilities with the rise of cyber-attacks on critical infrastructure. I’m sure we have all seen the recent stories in the news where these cyber events are already on the rise.
  4. Preview Main Points: Cybersecurity is becoming increasingly more important in maintaining the well-being and functionality of daily life. Today I would like to discuss with you the importance of this issue, including the vulnerabilities our current infrastructure faces, how these are already being exploited, and what we can do to better protect and secure these systems.

Transition: The first thing to do is take a look at how things are right now.

Body

I. Many modern systems that are used to manage and control critical infrastructure are highly vulnerable to attack.

A. Evidence: Critical infrastructure such as electric power grids, water distribution systems, air traffic control, the Global Positioning System (GPS), and many others could have devastating impacts to the United States as a nation if they were to be successfully attacked. This would have negative effects on entire sectors of the economy, and individual citizens that depend on them every day (Pate-Cornell et al., 2018).

B. Warrant: Think about how these critical infrastructure components are interconnected, relying on or feeding into one another. This leaves the possibility that if one were to be attacked or compromised, most or all the systems connected to it would also fail.

Transition: Recognizing the amount of vulnerability that exists, let’s now take a look at some of the cyber-attacks we’ve already seen take place.

II. Multiple high-profile cyber-attacks have already taken place, impacting large private-sector entities, government agencies, and critical infrastructure within the last several years.

A. In 2021, we saw the ransomware attack on the Colonial Pipeline, which supplies a large portion of fuel to the entire East Coast of the United States. The pipeline was shut down for multiple days, leading to long lines and panic-buying at gas stations across multiple states (Sanger & Perlroth, 2021).

B. Millions of personnel records, including Social Security numbers and fingerprints, were stolen from the OPM starting in 2014 (Pate-Cornell et al., 2018).

C. Consider the impact on small businesses, families, and individuals if the infrastructure of our country is at risk and nothing we do can stop these attacks. We must be able to rely on our government and private businesses to protect all of us.

Transition: In light of these recent attacks, some work towards a solution is critical.

III. Both the United States government and private industry are working towards implementing additional, more effective security measures to prevent any future attacks from doing serious damage.

A. President Joe Biden has issued an executive order, focusing on specific mandates to improve the nation’s cybersecurity posture. The order specifically suggests the U.S. government make “bold changes and significant investments”, partnering with the private sector in a collaborative effort to improve security for the nation (The White House, 2021).

B. We can see that the need for change has been recognized and the work toward a
solution has already begun.

Transition: It is great that actions are being taken on a national level, and I hope it is enough.

Conclusion

  1. Signal the conclusion: Ultimately, it is all of us that will be impacted if it isn’t enough.
  2. Review of main points/thesis: While cybersecurity has become a focal point for most of America, our infrastructure has been vulnerable and the threats taking place are very real and cannot continue. We have seen the potential dangers that a successful breach could bring to our nation and cybersecurity places a large role in securing our country and our lives. Thankfully swift action is being taken.
  3. Clincher (memorable ending): When our nation is harmed, it is each of us that suffers the daily consequences, and we cannot even imagine how much worse things could be if cyber-attacks are ignored.

    References

    Palleti, V. R., Adepu, S., Mishra, V. K., & Mathur, A. (2021). Cascading effects of cyber-attacks on interconnected infrastructure. Cybersecurity, 4(1). doi:10.1186/s42400-021-00071-z

    Pate-Cornell, E., Kuypers, M., Smith, M., & Keller, P. (2018). Cyber risk management for critical infrastructure: A risk analysis model and 3 case studies. Risk Analysis: An International Journal, 38(2), 226-241. https://www-wiley-com.proxy-tu.researchport.umd.edu/en-us

    Sanger, D., & Perlroth, N. (2021). Pipeline attack yields urgent lessons about U.S. cybersecurity. https://www.nytimes.com/2021/05/14/us/politics/pipeline-hack.html

    The White House, (2021). Executive order on improving the nation’s cybersecurity. Presidential Actions. https://www.whitehouse.gov/briefing-room/presidential-actions/2021/05/12/executive-order-on-improving-the-nations-cybersecurity/

Informative Speech Rubric

Evaluative Concept 

Excellent

Good

Average

Below Average

Poor

Missing

SPEECH PREPARATION 

Outline – The outline is in full-sentences with in-text citations and a references page in APA format (use the provided template).

10

8

6

4

2

0

CONTENT 

Language Choice – Free of serious grammar & word choice errors. Speaker uses language accurately, clearly, vividly, appropriately, and inclusively.

5

4

3

2

1

0

ThesisThe student uses a strong thesis statement within the framework of the topic assigned. 

5

4

3

2

1

0

Introduction – The introduction contains a strong attention getter, establishes credibility & relatability, and previews the main points of the speech.

10

8

6

4

2

0

Main Points – The main points are identifiable claims, support the thesis, and are well developed using a variety of supporting material.

10

8

6

4

2

0

Supporting Material – The supporting material utilized in the speech is highly credible and the sources used strengthen the information in the speech. At least 2 credible sources are required for this speech.

10

8

6

4

2

0

Oral Citations – The speech contains oral citations for each source used that includes the author, year, and credibility factor relevant to the citation.

5

4

3

2

1

0

Transitions – The speaker uses transitions to indicate when they are moving to each new point and uses nonverbal cues to reinforce the transitions.

5

4

3

2

1

0

Organization – The speech has an identifiable organizational pattern and flows in a logical way.

5

4

3

2

1

0

Conclusion – The conclusion begins with a clear transition, signals the end, reviews the main points (thesis), and closes in an engaging way.

5

8

6

4

2

0

DELIVERY 

Vocalics – The speaker can be heard and understood throughout the speech and vocal variety is used to keep audience attention. The speaker uses pronunciation, articulation, volume, pitch, rate, tone, and strategic pauses to strengthen speech delivery.

5

4

3

2

1

0

Nonverbal Consistency – The speaker uses gestures, movement, and facial expressions to enhance the speech and maintain audience attention.

5

4

3

2

1

0

Extemporaneous – The speaker delivers the speech in an extemporaneous way, using notecards sparingly, and displays confidence that demonstrates a well-rehearsed speech. Strong eye contact with the audience is maintained and the speaker does not read from their preparation outline.

15

8

6

4

2

0

Time – The speech is 4-5 minutes long.

5

4

3

2

1

0

TOTAL 

100

80 

60 

40

20

License

Icon for the Creative Commons Attribution-NonCommercial-ShareAlike 4.0 International License

Use Your Voice: Public Speaking as Advocacy Copyright © 2024 by Melanie R. Morris; Jennifer E. Potter, Ph.D.; and Dr. Kanika Jackson is licensed under a Creative Commons Attribution-NonCommercial-ShareAlike 4.0 International License, except where otherwise noted.