首页
外语
计算机
考研
公务员
职业资格
财经
工程
司法
医学
专升本
自考
实用职业技能
登录
外语
Shoppers who have flocked to online stores for their holiday shopping are losing privacy with every mouse click, according to a
Shoppers who have flocked to online stores for their holiday shopping are losing privacy with every mouse click, according to a
admin
2015-12-01
32
问题
Shoppers who have flocked to online stores for their holiday shopping are losing privacy with every mouse click, according to a new report.
The study by the Washington-based Electronic Privacy Information Center scrutinized privacy policies on 100 of the most popular online shopping sites and compared those policies with a set of basic privacy principles that have come to be known as "fair information practices".
The group found that none of the 100 sites met all of the basic criteria for privacy protection, which include giving notice of what information is collected and how it is used, offering consumers a choice over whether the information will be used in certain ways, allowing access to data that give consumers a chance to see and correct the information collected, and instituting the kind of security measures that ensure that information won’t fall into the wrong hands.
"This study shows that somebody else, other than Santa, is reading your Christmas list," said Jeff Chester, executive director of the Center for Media Education, which also worked on the survey.
The online privacy of children is protected by Federal Trade Commission rules, but adults do not share the same degree of privacy protection. The movement, like the online shopping industry, favors self-regulation over imposition of further movement restrictions on electronic commerce.
Marc Rosenberg, executive director of the privacy group, said the study shows that self regulations have failed, "We need legislation to enforce fair information practices," he said, "Consumers are at greater risk than they were in 1997," when the group released its first report.
The survey also asked whether the 100 sites used "profile-based" advertising, and whether the sites incorporate "cookies" technology, which gives Websites basic information on visitors. Profiling is the practice of gathering in then used to create targeted advertising on Websites.
All but 18 of the top shopping sites did display a privacy policy, a major improvement over the early days of electronic commerce, when such policies were scarce. But that did not satisfy the privacy group. "Companies are posting privacy policies, but these policies are not the same thing as fair information practices," Rosenberg said.
The sites also did not perform well by other measures, the group said it found that 35 of the sites feature profile-based advertising, and 87 percent use cookies. The group concluded that the phonies that were posted "are typically confusing, incomplete, and inconsistent". The report, "Surfer Beware III: Privacy Policies Without Privacy Protection, " is the third such survey by the group. It called for further development of technologies that help consumers protect their privacy and even anonymity when exploring the Internet.
Which of the following is not in the list of the basic criteria of privacy protection mentioned in paragraph 3?
选项
A、Give notice of what information is collected and how it is used to consumers.
B、Allow access to data that give consumers a chance to see and correct the information collected.
C、Make consumers believe that the information provided by the sites is surely correct.
D、Institute the kind of security measures that ensure that the information won’t fall into the wrong hands.
答案
C
解析
本题可参照文章第3段的the basic criteria for privacy protection,which includegiving…offering…allowing…and instituting…,从中可知只有C项没有列出,因此C项为正确答案。
转载请注明原文地址:https://kaotiyun.com/show/a7LO777K
0
考博英语
相关试题推荐
Smallbusinessownersmustaccepttheburdensofentrepreneurship.Beinginbusinessforyour-selfrequiresyourfullattention
ThehistoryofAfrican-Americansduringthepast400yearsistraditionallynarrated【21】anongoingstraggleagainst【22】andindif
Themulti-billion-dollarWesternpopmusicindustryisunderfire.ItisbeingblamedbytheUnitedNationsforthedramaticris
TheAleuts,residingonseveralislandsoftheAleutianChain,thePribilofIslands,andtheAlaskanpeninsulahavepossesseda
Eversincethe1750s,whenthewriter,satirist,statesmanandinventorBenjaminFranklinputpoliticalcartooningonthemapby
Mostofustellonetwoliesaday,accordingtoscientistswhostudythesethings.Andwerarelygetcaught,becausetheliesw
ThechangesingloballyaveragedtemperaturethathaveoccurredattheEarth’ssurfaceoverthepastcenturyaresimilarinsize
Citiesdevelopasaresultoffunctionsthattheycanperform,somefunctionsresultdirectlyfromtheingenuityofthecitizenr
Statusesaremarveloushumaninventionsthatenableustogetalongwithoneanotherandtodeterminewherewe"fit"insociety.
Thedevelopmentofwritingwasoneofthegreathumaninventions.Itisdifficult【C1】______manypeopletoimaginelanguagewi
随机试题
“巧妇难为无米之炊”说明主观能动性的发挥,必须依赖一定的物质条件和物质手段。()
高适《燕歌行》:__________,玉箸应啼别离后。
试述麻醉后苏醒期间的护理要点。
A.肺气肿B.大量胸腔积液C.气胸D.支气管肺炎E.肺空洞胸部叩诊呈实音的是
下列所列各软件中,最靠近硬件一层的是()。
撤销权自债权人知道或者应知道撤销事由之日起( )年内行使。自债务人的行为发生之时起( )年内没有行使撤销权的,该撤销权消灭。
细辛是一种在森林下生活的植物,滨藜是一种在沙漠中生活的植物。下图是光照强度对两种植物(甲、乙)光合作用强度影响的曲线。请据图作答:图中e点时,限制甲植物增产的主要环境因素是光照强度,限制乙植物增产的主要环境因素是_________。
表达式divmod(40,3)的结果是()。
在面向对象方法中,实现信息隐蔽是依靠
ANiceCupofTeaTheLegendaryOriginsofTeaA)ThestoryofteabeganinancientChinaover5,000yearsago.Accordingto
最新回复
(
0
)