首页
外语
计算机
考研
公务员
职业资格
财经
工程
司法
医学
专升本
自考
实用职业技能
登录
外语
Imagine you’re an employer, looking to hire me for a job. You subscribe to a Web site that gives you background information, and
Imagine you’re an employer, looking to hire me for a job. You subscribe to a Web site that gives you background information, and
admin
2012-12-01
102
问题
Imagine you’re an employer, looking to hire me for a job. You subscribe to a Web site that gives you background information, and this is what you find. Jessica Rose Bennett, 29, spends 30 hours a week on social-networking sites — while at work. She is an excessive drinker, a drug user, and sexually promiscuous. She swears a lot, and spends way beyond her means shopping online. Her writing ability? Superior. Cost to hire? Cheap.
In reality, only part of this is true: yes, I like a good bourbon. But drugs? That conies from my reporting projects — and one in particular that took me to a pot farm in California. The promiscuity? My boyfriend of five years would beg to differ on that, but I did once write a story about polyamory. I do spend hours on social-networking sites, but it’s part of my job. And I’m not nearly as cheap to hire as the Web would have you believe. (Take note, future employers!)
The irony, of course, is that if this were a real job search, none of this would matter — I’d have already lost the job. But this is the kind of information surmisable to anybody with a Web connection and a bit of background data, who wants to take the time to compile it all. For this particular experiment, we asked ReputationDefender, a company that works to keep information like this private, to do a scrub of the Web, with nothing but my (very common) name and e-mail address to go on. Three Silicon Valley engineers, several decades of experience, and access to publicly available databases like Spokeo, Facebook, and LinkedIn (no, they didn’t do any hacking)—and voila. Within 30 minutes, the company had my Social Security number; in two hours, they knew where I lived, my body type, my hometown, and my health status. (Note: this isn’t part of Reputation Defender’s service; they did the search — and accompanying graphic — exclusively for Newsweek, to show how much about a person is out there for the taking.)
It’s scary stuff, but scarier when you realize it’s the kind of information that credit-card companies and data aggregators are already selling, for pennies, to advertisers every day. Or that it’s the kind of data, as The Wall Street Journal revealed last week, that’s being blasted to third parties when you download certain apps on Facebook. (Under close watch by Congress, Facebook has said it’s working to "dramatically limit" its users’ personal exposure.) "Most people are still under the illusion that when they go online, they’re anonymous," says Nicholas Carr, the author of The Shallows: What the Internet Is Doing to Our Brains. "But in reality, every move they make is being collected into a database."
This, say tech experts, is the credit score of the future — a kind of aggregated ranking for every aspect of your life. It’s an assessment that goes beyond the limits of targeted advertising — you know, those pesky shoe banners that follow a visit to Zappos, made possible by tracking devices we know as "cookies" — by making use of the data in ways that are more personal and, potentially, damaging. Think HMOs, loan applications, romantic partners. Let’s say you’ve been hitting up a burger joint twice a week, and you happen to joke, in a post on Twitter, how all the meat must be wreaking havoc on your cholesterol. Suddenly your health-insurance premiums go up. Now imagine your job is listed on Salary.com; your vacation preferences linked to Orbitz. Think how this could affect your social standing, or your ability to negotiate a raise or apply for a loan. Finally, what if you could know, based on Web history and location tracking, that a prospective mate had a communicable disease. Wouldn’t you pay to find out? "Most of us just don’t realize the potential consequences of this," says Lorrie Cranor, a Web-privacy expert at Carnegie Mellon University.
"Facebook" is cited as an example to
选项
A、illustrate the usefulness of the database collected by websites.
B、assess the efficiency of government supervision over websites.
C、demonstrate the fact of personal information being obtained by websites.
D、show the efforts to protect people’s privacy by websites.
答案
C
解析
第四段第二句大意是:就像上周华尔街日报披露的那样,当你下载Facebook上提供的某些应用程序时,就会将信息泄露给第三方。结合文章中心思想,那么Facebook的例证是为了证明网站收集用户个人信息这一事实,所以[C]是答案。虽然第三段第二句后括号中内容大意是,在国会密切关注下,Facebook表示其正在努力“最大限度地”避免用户的个人信息外泄,说明国家和政府意识到这个问题,并开始对网站进行监管,但政府监管并不是文章的重点所在,所以排除[B]。同样,虽然Facebook正在努力“最大限度地”避免用户的个人信息外泄,但[D]也不是文章重点,因而被排除。第四段最后一句虽然提到网民的一举一动都被收入数据库,但文章并未谈及这种数据库的作用,排除[A]。
转载请注明原文地址:https://kaotiyun.com/show/42aO777K
0
专业英语八级
相关试题推荐
IftherewasonethingAmericanshadarighttoexpectfromCongress,itwasafederalplantohelptheelderlypayforprescrip
WhichofthefollowingmadetheearliestinvasionofEngland?
Theperiodofadolescence,i.e.,thepersonbetweenchildhoodandadulthood,maybelongorshort,dependingonsocialexpectati
WhichofthefollowingisNOTamasterpieceofWilliam.Faulkner?
HowtoReadEffectivelyManystudentstendtoreadbookswithoutanypurpose.Theyoftenreadabookslowlyandingreatdetail
中华民族历来尊重人的尊严和价值。还在遥远的古代,我们的先人就已提出“民为贵”的意想,认为“天生万物,唯人为贵”,一切社会的发展和步,都取决于人的发展和进步,取决于人的尊严的维护和价值的发挥。中国共产党领导人民进行革命、建设和改革,就是要确保全中国人民获得广
BythetimeIbeganteachingintheearly1970s,everyonealreadyseemedtobeinbusinessforhimself,lookingforthebestdea
A、Accountancyandcomputing.B、Businessandfinance.C、Lawandbusiness.D、Architectureandengineering.A
TheChamberlain’sMen,inShakespeare’stime,werearemarkablegroupofpeople-excellent______whowerealsobusinesspartnersa
为了看日出,我常常早起。那时天还没有大亮,周围非常清静,船上只有机器的响声。天空还是一片浅蓝,颜色很浅。转眼问天边出现了一道红霞,慢慢地在扩大它的范围,加强它的亮光。我知道太阳要从天边升起来了,便目不转眼地望着那里。果然过了一会儿,在那个地方出现了太阳的小
随机试题
酶蛋白质子转移的机制
A.粪-口传播B.血液传播C.性行为传播D.飞沫传播E.虫媒传播丙型肝炎的主要传播途径是
胆管结石急性发作和急性胆管炎典型三联征
在某工程网络计划中,如果发现工作L的总时差和自由时差分别为4d和2d,监理工程师检查实际进度时发现该工作的持续时间延长了1d,则说明工作L的实际进度( )。
施工图预算审查的重点是()。
()是由出票银行签发的,由其在见票时按照实际结算金额无条件支付给收款人或持票人的票据。
股票分割会使股票的每股市价下降,可以提高股票的流动性。()(2013年)
甲公司为上市公司,系增值税一般纳税人,适用的增值税税率为17%。为提高市场占有率及实现多元化经营,甲公司在2014年及以后进行了一系列投资和资本运作。2014年以前甲公司仅有一家子公司乙公司。以下资料不考虑所得税等因素的影响。(1)甲公司于2014年7月
软件设计中模块划分应遵循的准则是()。
Manyanelderlyman______willingtocontinueworkingafterretirementsothattimecanbeeasilykilled.
最新回复
(
0
)