首页
外语
计算机
考研
公务员
职业资格
财经
工程
司法
医学
专升本
自考
实用职业技能
登录
外语
Much as we enjoy the convenience the Internet brings us, the threat to our privacy is getting more and more serious. We should n
Much as we enjoy the convenience the Internet brings us, the threat to our privacy is getting more and more serious. We should n
admin
2020-01-15
34
问题
Much as we enjoy the convenience the Internet brings us, the threat to our privacy is getting more and more serious. We should not ignore the danger brought by this violation of our privacy. Read the excerpt carefully and write your response in NO LESS THAN 300 WORDS, in which you should;
1. summarize briefly the different opinions;
2. give your comment.
Marks will be awarded for content relevance, content sufficiency, organization and language quality. Failure to follow the above instructions may result in a loss of marks.
Write your article on ANSWER SHEET FOUR.
Excerpt
Today, as companies strive to personalize the services and advertisements they provide over the Internet, the surreptitious collection of personal information is rampant. The very idea of privacy is under threat. Most of us view personalization and privacy as desirable things, and we understand that enjoying more of one means giving up some of the other. To have goods, services and promotions tailored to our personal circumstances and desires, we need to divulge information about ourselves to corporations, governments or other outsiders.
This trade-off has always been part of our lives as consumers and citizens. But now, thanks to the Net, we’re losing our ability to understand and control those trade-offs—to choose, consciously and with awareness of the consequences, what information about ourselves we disclose and what we don’t. Incredibly detailed data about our lives are being harvested from online databases without our awareness, much less our approval.
We often assume that we’re anonymous as we go about our business online. As a result, we treat the Net not just as a shopping mall but as a personal diary. Through the sites we visit and the searches we make, we disclose details not only about our jobs, hobbies, families, politics and health, but also about our secrets, fantasies, even our minor offences.
But our sense of anonymity is largely an illusion. Pretty much everything we do online is recorded, stored in cookies and corporate databases, and connected to our identities, either explicitly through our user names, credit-card numbers and the IP addresses assigned to our computers, or implicitly through our searching, surfing and purchasing histories.
Years ago, a team of scholars from the University of Minnesota described how easy it is for data-mining software to create detailed personal profiles of individuals. The software is based on a simple principle: People tend to leave lots of little pieces of information about themselves and their opinions in many different places on the Web. By identifying correspondences among the data, sophisticated algorithms can identify individuals with extraordinary precision. And it’s not a big leap from there to discovering the people’s names.
While Internet companies may be complacent about the erosion of personal privacy, the rest of us should be wary. There are real dangers.
First and most obvious is the possibility that our personal data will fall into the wrong hands. Powerful data-mining tools are available not only to legitimate corporations and researchers, but also to con men and creeps. Criminal syndicates can use stolen information about our identities to commit financial fraud, and stalkers can use locational data to track our whereabouts.
A second danger is the possibility that personal information may be used to influence our behavior and even our thoughts in ways that are invisible to us. Personalization’s evil twin is manipulation. As mathematicians and marketers refine data-mining algorithms, they gain more precise ways to predict people’s behavior as well as how they’ll react when they’re presented with online ads and other digital stimuli.
The greatest danger posed by the continuing erosion of personal privacy is that it may lead us as a society to devalue the concept of privacy, to see it as outdated and unimportant. That would be a tragedy. Privacy is not just a screen we hide behind when we do something naughty or embarrassing; privacy is intrinsic to the concept of liberty. When we feel that we’re always being watched, we begin to lose our sense of self-reliance and free will and, along with it, our individuality.
Privacy is not only essential to life and liberty; it’s essential to the pursuit of happiness, in the broadest and deepest sense. We human beings are not just social creatures; we’re also private creatures. The way that we choose to define the boundary between our public self and our private self will vary greatly from person to person, which is exactly why it’s so important to be ever vigilant in defending everyone’s right to set that boundary as he or she sees fit.
选项
答案
Internet Privacy Much as we enjoy the convenience brought by the Internet, we are sometimes unaware of the intrusion of our privacy via the Net because many of the things we do online are recorded by data-digging software. This violation of privacy may have serious consequences such as the possibility of the Internet criminal acts, unconscious manipulation of our thoughts based on the profile made by the stolen information left by us and worst of all the devaluation of the concept of privacy. In nature, intrusion into privacy is a crime against our liberty and happiness. Despite the lavish feast brought about by the Internet we relish every day, we have to admit that more frequently than ever, we are mired in the pothole of online security being breached and personal data being plundered. Incredibly myriad data about our lives are being harvested from the traces we leave on the Internet. This data-digging, either for the targeted advertisers or malicious cons and creeps, has eroded our privacy. One consequence is that our personal data may fall into the wrong hands, who can wantonly use the stolen information to commit crimes of various kinds. Another consequence is that it would be a violation of the privacy which is supposed to be mere when we surf the Internet. If whenever we go about our business online, we find someone else looking at our shoulder "electronically" , it would not only be a chilling lesson for our ethics but also the fiercest assault of our liberty. The very idea of free will and free speech ensured by the anonymity of the Internet might evaporate upon data-mining software run by either well-intended or ill-intended individuals or organizations. To solve this problem, privacy products should be developed and promoted. But a deeper look at this issue tells us that harsh punishment and moral lessons should be imposed on those data-vultures. Only in this way can the enshrined privacy be fully guaranteed.
解析
本题探讨的是互联网与个人隐私之间的关系。题目要求简要概括所给材料中的观点,并发表自己的评论。在具体行文方面,考生可以开篇点题,简要概括材料中的观点。第二、三段可以提出自己对这一问题的观点,并说明理由。最后一段总结全文,提出建议。
转载请注明原文地址:https://kaotiyun.com/show/TybK777K
0
专业英语八级
相关试题推荐
A、It’sharmful.B、It’ssurprising.C、It’sunlucky.D、It’snormal.A根据句(5)可知,男士认为,人们在食物上的花费大于在娱乐上的花费不足为奇,毕竟人都要吃东西,但是美国人把越来越多的钱花费在
AudienceAwarenessofWritingI.Introduction—contents,【T1】______andstylesdependontheaudience【T1】______—theimportance
A、Gotobedat3a.m.B、Gotobedasusual.C、Getupat10a.m.D、Wakeupnaturally.A盖茜博士建议有睡眠问题的人在自己计划睡觉的时间就寝,句(5—1)中男士提到自己在
A、HarvardUniversity.B、YaleUniversity.C、ReadCollege.D、MIT.C在谈到PrincetonReview的大学排行第一位时,主持人提到是ReadCollege,故选C项。
Earlyanthropologists,followingthetheorythatwordsdeterminethought,believedthatlanguageanditsstructurewereentirel
不管是好习惯还是坏习惯,都是逐渐养成的。当一个人重复做某件事时,一种看不见的力量驱使他去重复做同一件事,这样就养成了习惯。习惯一旦形成,要改掉它是困难的,有时是不可能的。所以,我们在形成习惯的时候要小心谨慎,这一点是非常重要的。小孩子常常会养成坏习惯。这些
今天承担家务的一些男人还在怀念昔日以男子为中心的年代。那时,他们下了班回家,热腾腾的晚餐已摆好在桌上,妻子儿女围上来问寒问暖;家中大事小事多由自己作主,因为男人作为一家之主承担了全家经济生活的来源。妇女走出家门就业后,男人的供养职责相对减小,在家庭的地位也
A、Sanskrit.B、Indian.C、Chinese.D、Japanese.A细节题。关于与欧洲语言相似的语言,受访者说道:TherearesignificantsimilaritiesamongmanyEuropeanlang
老家的大胡同属南北走向,地势北高南低,建筑设计独具匠心,从村南大街进入胡同头往里一看,有一个高大的门洞,雄伟壮阔,设计精美,古香古色,就像一个十分壮观的牌坊,门洞的两扇大门很大,木料很厚,很结实。沿着门洞再往里看,以为就是那么几栋房屋,也看到头了,可再往深
随机试题
李某2019年全年的工资、薪金所得为120000元,依法缴纳社会保险费和住房公积金合计12000元。李某的工资、薪金所得个人所得税应纳税所得额的计算公式是()
Canyou______meonthephonebythesoundofmyvoice?
中国共产党七届三中全会确定国民经济恢复时期的中心任务是()。
杜女士,34岁,孕1产1,妊娠39周,阵发性腹痛5小时。宫缩持续50秒,间歇1分钟,胎心152次/分,宫口开大6cm,羊膜囊明显膨出,骨盆各径线正常。对新生儿进行Apgar评分的主要项目是()
男性,40岁,3个月前着凉后发热,咯臭黄痰,间断抗感染治疗,胸片示右肺背段有4cm大小的圆形阴影,内可见空洞,诊断男性,65岁,吸烟40年,每日2包,近2个月来,刺激性咳嗽,痰中带血,持续性加重的右侧胸痛,X线示右肺团块影,有短毛刺
全冠修复体太薄,颌力过于集中可能导致全冠修复与牙体不密合,侧向力过大可导致
下列控制网是按照网形划分的是()。
在社会政策评估中,整合研究方法是指下列表述的哪一种方法?()
在结构化方法中,软件开发阶段用数据流程图(DFD)作为描述工具的是()。
ThecoreofGreece’stroublesistoomuchspending,toolittletax-collectingandbook-cooking.SpainandIrelandareintroubl
最新回复
(
0
)