首页
外语
计算机
考研
公务员
职业资格
财经
工程
司法
医学
专升本
自考
实用职业技能
登录
外语
Much as we enjoy the conveniences the Internet brings us, the threat to our privacy is getting more and more serious. We should
Much as we enjoy the conveniences the Internet brings us, the threat to our privacy is getting more and more serious. We should
admin
2021-02-24
48
问题
Much as we enjoy the conveniences the Internet brings us, the threat to our privacy is getting more and more serious. We should not ignore the danger brought by this violation of our privacy. Read the excerpt carefully and write your response in about 300 words, in which you should:
1. summarize briefly the different opinions;
2. give your comment.
Marks will be awarded for content relevance, content sufficiency, organization and language quality. Failure to follow the above instructions may result in a loss of marks.
Today, as companies strive to personalize the services and advertisements they provide over the Internet, the surreptitious collection of personal information is rampant. The very idea of privacy is under threat. Most of us view personalization and privacy as desirable things, and we understand that enjoying more of one means giving up some of the other. To have goods, services and promotions tailored to our personal circumstances and desires, we need to divulge information about ourselves to corporations, governments or other outsiders.
This trade-off has always been part of our lives as consumers and citizens. But now, thanks to the Net, we’re losing our ability to understand and control those trade-offs—to choose, consciously and with awareness of the consequences, what information about ourselves we disclose and what we don’t. Incredibly detailed data about our lives are being harvested from online databases without our awareness, much less our approval.
We often assume that we’re anonymous as we go about our business online. As a result, we treat the Net not just as a shopping mall but as a personal diary. Through the sites we visit and the searches we make, we disclose details not only about our jobs, hobbies, families, politics and health, but also about our secrets, fantasies, even our minor offences.
But our sense of anonymity is largely an illusion. Pretty much everything we do online is recorded, stored in cookies and corporate databases, and connected to our identities, either explicitly through our user names, credit-card numbers and the IP addresses assigned to our computers, or implicitly through our searching, surfing and purchasing histories.
Years ago, a team of scholars from the University of Minnesota described how easy it is for data-mining software to create detailed personal profiles of individuals. The software is based on a simple principle: People tend to leave lots of little pieces of information about themselves and their opinions in many different places on the Web. By identifying correspondences among the data, sophisticated algorithms can identify individuals with extraordinary precision. And it’s not a big leap from there to discovering the people’s names.
While Internet companies may be complacent about the erosion of personal privacy, the rest of us should be wary. There are real dangers.
First and most obvious is the possibility that our personal data will fall into the wrong hands. Powerful data-mining tools are available not only to legitimate corporations and researchers, but also to con men and creeps. Criminal syndicates can use stolen information about our identities to commit financial fraud, and stalkers can use locational data to track our whereabouts.
A second danger is the possibility that personal information may be used to influence our behavior and even our thoughts in ways that are invisible to us. Personalization’s evil twin is manipulation. As mathematicians and marketers refine data-mining algorithms, they gain more precise ways to predict people’s behavior as well as how they’ll react when they’re presented with online ads and other digital stimuli.
The greatest danger posed by the continuing erosion of personal privacy is that it may lead us as a society to devalue the concept of privacy, to see it as outdated and unimportant. That would be a tragedy. Privacy is not just a screen we hide behind when we do something naughty or embarrassing; privacy is intrinsic to the concept of liberty. When we feel that we’re always being watched, we begin to lose our sense of self-reliance and free will and, along with it, our individuality.
Privacy is not only essential to life and liberty; it’s essential to the pursuit of happiness, in the broadest and deepest sense. We human beings are not just social creatures; we’re also private creatures. The way that we choose to define the boundary between our public self and our private self will vary greatly from person to person, which is exactly why it’s so important to be ever vigilant in defending everyone’s right to set that boundary as he or she sees fit.
Write your response on ANSWER SHEET FOUR.
选项
答案
Internet Privacy Much as we enjoy the conveniences brought by the Internet, we are sometimes unaware of the intrusion of our privacy via the net because many of the things we do online are recorded by data-digging software. This violation of privacy may have serious consequences such as the possibility of the Internet criminal acts, unconscious manipulation of our thoughts based on the profile made by the stolen information left by us and worst of all the devaluation of the concept of privacy. In nature, intrusion into privacy is a crime against our liberty and happiness. Despite the lavish feast brought about by the Internet we relish every day, we have to admit that more frequently than ever, we are mired in the pothole of online security being breached and personal data being plundered. Incredibly myriad data about our lives are being harvested from the traces we leave on the Internet. This data-digging, either for the targeted advertisers or malicious cons and creeps, has eroded our privacy. One consequence is that our personal data may fall into the wrong hands, who can wantonly use the stolen information to commit crimes of various kinds. Another consequence is that it would be a violation of the privacy which is supposed to be there when we surf the Internet. If whenever we go about our business online, we find someone else looking at our shoulder "electronically" , it would not only be a chilling lesson for our ethics but also the fiercest assault of our liberty. The very idea of free will and free speech ensured by the anonymity of the Internet might evaporate upon data-mining software run by either well-intended or ill-intended individuals or organizations. To solve this problem, privacy products should be developed and promoted. But a deeper look at this issue tells us that harsh punishment and moral lessons should be imposed on those data-vultures. Only in this way can the enshrined privacy be fully guaranteed.
解析
本题探讨的是互联网与个人隐私之间的关系。题目要求简要概括所给材料中的观点,并发表白己的评论。在具体行文方面,考生可以开篇点题,简要概括材料中的观点。第二、三段可以提出自己对这一问题的观点,并说明理由。最后一段总结全文,提出建议。
转载请注明原文地址:https://kaotiyun.com/show/dbIK777K
0
专业英语八级
相关试题推荐
A、BecauseitfocusesonteachingEnglishasasecondlanguage.B、Becauseitemphasizesmoreontrivialstoriesanddrillsinlan
A、Hehatedgrowingup.B、Heread4bookswrittenbyHinton.C、Hehaddifficultiesinreading.D、Hedeterminedtobeawriter.C访
Thethirdisproximity,postureandechoing.Proximityreferstothe【T1】______betweenspeakers.Thiscanindicateanumberoft
A、Greatgeneralknowledge.B、Frequentinteraction.C、Morespontaneity.D、Goodintonation.D此题询问在演讲过程中要注意什么。其中女士说到声音的起伏也很重要,这会让人听
EuropeanimmigrantstoColonialAmericabroughtwiththemtheirculture,traditionsandphilosophyabouteducation.Manyof【S1】_
A、Oneminute.B、Halfaminute.C、20seconds.D、10seconds.D访谈中女士提到,招聘者在每份简历上只会花10秒左右的时间,因此本题选D。
区别于其他形式的校园暴力,霸凌行为通常并不会造成严重的一次性肢体伤害,但却往往会给受害人带来持久性隐形创伤。如果没有受到专业的心理引导,受害者有可能转变为报复社会的人,进而从受害者转变为施暴者,将自己的遭遇原封不动或放大百倍地转嫁到他人身上。美国相关机构的
朋友居五伦之末,其实朋友是极重要的一伦。所谓友谊实即人与人之间的一种良好的关系,其中包括了解、欣赏、信任、容忍、牺牲……诸多美德。如果以友谊作基础,则其他的各种关系如父子夫妇兄弟之类均可圆满地建立起来。当然父子兄弟是无可选择的永久关系,夫妇虽有选择余地,但
A、Sheownedacar.B、Shedrovewell.C、Shelikeddrivers’uniforms.D、Itwasherchildhooddream.D此题需要根据相关内容进行推理和归纳。女士说她从小就想学车,
我的藏书都像是我的朋友,而且是密友。我虽然对它们并不是每一本都认识,它们中的每一本却都认识我。我每一走进我的书斋,书籍们立即活跃起来,我仿佛能听到它们向我问好的声音,我仿佛能看到它们向我招手的情景,倘若有人问我,书籍的嘴在什么地方?而手又在什么地方呢?我只
随机试题
Iftheonlineserviceisfreethenyouaretheproduct,technicianssay.GoogleandFacebookmakea【C1】________collectingperson
水泥体积安定性不合格,应降低等级使用。()
1980年12月国务院批转《全国城市规划工作会议纪要》下发全国实施,它第一次提出()。
关于建设工程等步距异节奏流水施工特点的说法,正确的是()。
空调设备自动监控系统是依据()来判断需要清洗过滤网。
施工过程中,承包人负责采购的材料设备使用前需进行检验或试验,由( )。
对公用电信网与专用电信网之问的网间互联,国务院信息产业主管部门在()中对双方的义务、联网原则、有关费用、联网程序、专用网与其他电信业务经营者的电信网联网原则,联网后的网络管理等内容做出了规定。[2005年真题]
由于出售无形资产属于企业的日常活动,因此出售无形资产所取得的收入应通过“其他业务收入”科目核算。()
材料背景:第一段:A市农业、畜牧业发达,轻工业比较差,想发展轻工业。第二段:你是市招商局的会展处工作人员,主要职责。第三段:你们市想做一个规模比以往更大、知名企业更多的商品洽谈贸易会。第四段:会议大体流程和要求。
Whatisnecessaryinagoodresume?
最新回复
(
0
)