首页
外语
计算机
考研
公务员
职业资格
财经
工程
司法
医学
专升本
自考
实用职业技能
登录
外语
The simple act of surrendering a telephone number to a store clerk may not seem harmful—so much so that many consumers do it wit
The simple act of surrendering a telephone number to a store clerk may not seem harmful—so much so that many consumers do it wit
admin
2013-08-03
55
问题
The simple act of surrendering a telephone number to a store clerk may not seem harmful—so much so that many consumers do it with no questions asked. Yet that one action can set in motion a cascade of silent events, as that data point is acquired, analyzed, categorized, stored and sold over and over again. Future attacks on your privacy may come from anywhere, from anyone with money to purchase that phone number you surrendered. If you doubt the multiplier effect, consider your e-mail inbox. If it’s loaded with spam, it’s undoubtedly because at some point in time you unknowingly surrendered your e-mail to the wrong Web site.
Do you think your telephone number or address is handled differently? A cottage industry of small companies with names you’ve probably never heard of—like Acxiom or Merlin—buy and sell your personal information the way other commodities like corn or cattle futures are bartered. You may think your cell phone is unlisted, but if you’ve ever ordered a pizza, it might not be. Merlin is one of many commercial data brokers that advertises sale of unlisted phone numbers compiled from various sources—including pizza delivery companies. These unintended, unpredictable consequences that flow from simple actions make privacy issues difficult to grasp, and grapple with.
In a larger sense, privacy also is often cast as a tale of "Big Brother"—the government is watching you or a big corporation is watching you. But privacy issues don’t necessarily involve large faceless institutions: A spouse takes a casual glance at her husband’s Blackberry, a co-worker looks at e-mail over your shoulder or a friend glances at a cell phone text message from the next seat on the bus. While very little of this is news to anyone—people are now well aware there are video cameras and Internet cookies everywhere—there is abundant evidence that people live their lives ignorant of the monitoring, assuming a mythical level of privacy. People write e-mails and type instant messages they never expect anyone to see. Just ask Mark Foley or even Bill Gates, whose e-mails were a cornerstone of the Justice Department’s antitrust case against Microsoft.
And polls and studies have repeatedly shown that Americans are indifferent to privacy concerns. The general defense for such indifference is summed up a single phrase: "I have nothing to hide." If you have nothing to hide, why shouldn’t the government be able to peek at your phone records, your wife see your e-mail or a company send you junk mail? It’s a powerful argument, one that privacy advocates spend considerable time discussing and strategizing over.
It is hard to deny, however, that people behave different when they’re being watched. And it is also impossible to deny that Americans are now being watched more than at any time in history.
What do companies like Acxiom and Merlin do?
选项
A、Compile telephone directories for businessmen.
B、Collect and sell personal information to make a profit.
C、Trade commodities like corn on the market.
D、Crack down crimes like stealing private information.
答案
B
解析
细节推断题。根据Acxiom和Merlin定位到第2段第2句。该句第2个破折号说明了这两家公司的性质,指出他们买卖个人信息就像买卖玉米和牛期货证券一样,故选B。文中提到Merlin公司出售那些未登记过的电话号码,这些号码汇编来源多样,A只是利用原文个别单词设置的干扰项;文中只是说这些公司买卖个人信息的方式就像在市场买卖玉米的方式一样,故C错;D“破解如窃取个人信息的犯罪行为”在文中没有提及。
转载请注明原文地址:https://kaotiyun.com/show/aBLK777K
0
专业英语四级
相关试题推荐
Accordingtothenews,Leeson
RichardSatava,programmanagerforadvancedmedicaltechnologies,hasbeenadrivingforceinbringingvirtualrealitytomedic
Suicide,thenumber-twokillerofcollegestudent,claimsthelivesofapproximately5,000college-agepeopleeachyear.Thatnu
Peoplelikebeingtrusted.Theyareannoyed,angry,orfeelhurtiftheyareregardedwith【C1】______.Theythinkthattheyare【C
Peoplelikebeingtrusted.Theyareannoyed,angry,orfeelhurtiftheyareregardedwith【C1】______.Theythinkthattheyare【C
Iknowwhenthesnowmeltsandthefirstrobins(知更鸟)cometocall,whenthelaughterofchildrenreturnstotheparksandplayg
The6-daynegotiationsbetweenthePLOandIsraelaremainlyabout______
Becauseofthecomplexityofthemodernofficeequipment,mostofficesrequiresecretaries______.
Aestheticthoughtofadistinctivelymodernbentemergedduringthe18thcentury.Thewesternphilosophersandcriticsofthist
PeterfeltveryguiltyfornotbeingabletoreunitewithhisfamilyonChristmasEve,sohedecidedto______.Hewantedtowo
随机试题
关于先天性心脏病,错误的是
以下哪支静脉不属于门静脉属支
关于横向弛豫的叙述,错误的是
患者,男性,52岁,患肝炎后肝硬化已5年,近日因腹围增大就诊。查体腹水征(+),查血红细胞3.00×1012/L,白细胞3.5×109/L,血小板65×109/L,大便潜血试验(+),腹水化验为渗出液,每日尿量500ml,血尿素氯及血肌酐均高。腹水化验
在教学过程中师生双方为实现一定的教学目的、完成一定的教学任务而采取的教与学相互作用的活动方式称之为()。
加强党的执政能力建设的历史动力是()。
王某将自家三层楼房的承建工程承包给没有施工资质的包工头李某。双方合同约定,李某“包工不包料”,在施工过程中产生的一切责任由李某承担。李某找来邻居张某帮工,工资100元/天。施工过程中脚手架倒塌,将在地面上递砖块的张某压成重伤。张某要求包工头李某赔偿医药费、
2008年对主要国家和地区货物进出口贸易逆差额(进口额一出口额)最大的国家(地区)是()。
阅读以下叙述,回答问题【说明】某单位甲建设数据中心管理系统,与乙公司签订了单价建设合同,与丙公司签订了监理合同。建设合同中规定:系统提供的网络宽带不低于2Mb/s,操作响应时间不超过5秒,可支持的最大并发用户数不少于5000个。乙公司项目
在数据库技术中使用数据模型的概念来描述数据库的结构和语义。数据模型有概念数据模型和结构数据模型两类,实体联系模型(E-R模型)是【】数据模型。
最新回复
(
0
)