首页
外语
计算机
考研
公务员
职业资格
财经
工程
司法
医学
专升本
自考
实用职业技能
登录
外语
Imagine you’re an employer, looking to hire me for a job. You subscribe to a Web site that gives you background information, and
Imagine you’re an employer, looking to hire me for a job. You subscribe to a Web site that gives you background information, and
admin
2015-07-27
84
问题
Imagine you’re an employer, looking to hire me for a job. You subscribe to a Web site that gives you background information, and this is what you find. Jessica Rose Bennett, 29, spends 30 hours a week on social-networking sites — while at work. She is an excessive drinker, a drug user, and sexually promiscuous. She swears a lot, and spends way beyond her means shopping online. Her writing ability? Superior. Cost to hire? Cheap.
In reality, only part of this is true: yes, I like a good bourbon. But drugs? That conies from my reporting projects — and one in particular that took me to a pot farm in California. The promiscuity? My boyfriend of five years would beg to differ on that, but I did once write a story about polyamory. I do spend hours on social-networking sites, but it’s part of my job. And I’m not nearly as cheap to hire as the Web would have you believe. (Take note, future employers!)
The irony, of course, is that if this were a real job search, none of this would matter — I’d have already lost the job. But this is the kind of information surmisable to anybody with a Web connection and a bit of background data, who wants to take the time to compile it all. For this particular experiment, we asked ReputationDefender, a company that works to keep information like this private, to do a scrub of the Web, with nothing but my (very common) name and e-mail address to go on. Three Silicon Valley engineers, several decades of experience, and access to publicly available databases like Spokeo, Facebook, and LinkedIn (no, they didn’t do any hacking)—and voila. Within 30 minutes, the company had my Social Security number; in two hours, they knew where I lived, my body type, my hometown, and my health status. (Note: this isn’t part of Reputation Defender’s service; they did the search — and accompanying graphic — exclusively for Newsweek, to show how much about a person is out there for the taking.)
It’s scary stuff, but scarier when you realize it’s the kind of information that credit-card companies and data aggregators are already selling, for pennies, to advertisers every day. Or that it’s the kind of data, as The Wall Street Journal revealed last week, that’s being blasted to third parties when you download certain apps on Facebook. (Under close watch by Congress, Facebook has said it’s working to "dramatically limit" its users’ personal exposure.) "Most people are still under the illusion that when they go online, they’re anonymous," says Nicholas Carr, the author of The Shallows: What the Internet Is Doing to Our Brains. "But in reality, every move they make is being collected into a database."
This, say tech experts, is the credit score of the future — a kind of aggregated ranking for every aspect of your life. It’s an assessment that goes beyond the limits of targeted advertising — you know, those pesky shoe banners that follow a visit to Zappos, made possible by tracking devices we know as "cookies" — by making use of the data in ways that are more personal and, potentially, damaging. Think HMOs, loan applications, romantic partners. Let’s say you’ve been hitting up a burger joint twice a week, and you happen to joke, in a post on Twitter, how all the meat must be wreaking havoc on your cholesterol. Suddenly your health-insurance premiums go up. Now imagine your job is listed on Salary.com; your vacation preferences linked to Orbitz. Think how this could affect your social standing, or your ability to negotiate a raise or apply for a loan. Finally, what if you could know, based on Web history and location tracking, that a prospective mate had a communicable disease. Wouldn’t you pay to find out? "Most of us just don’t realize the potential consequences of this," says Lorrie Cranor, a Web-privacy expert at Carnegie Mellon University.
Which of the following is within the business line of ReputationDefender?
选项
A、To supply technical support to Internet users.
B、To provide legal service to defend one’s reputation.
C、To protect people’s personal information.
D、To do research and graphic for Newsweek.
答案
C
解析
根据第三段第三句,ReputationDefender是一家保障信息隐私的公司,[C]是其同义转述。第三段第四句话提到来自ReputationDefender公司的三位工程师,说明这个公司确实是搞技术的,但并不是为网络用户提供技术支持的,[A]错误。[B]的错误在于其望文生义。第三段最后一句说ReputationDefender为Newsweek做这个实验,只是为了验证一下通过这些渠道能够获得多少个人信息,并不是说ReputationDefender这个公司就是专为Newsweek作检索,画图表的,排除[D]。
转载请注明原文地址:https://kaotiyun.com/show/qSOO777K
0
专业英语八级
相关试题推荐
WhichofthefollowingisNOTamongShakespeare’sfourgreattragedies?
Thiswasthecapital’smostanxiousweeksinceSeptember11th.OnMondaythegovernmentissuedaredalertthatterroristattac
SomepeoplehavedrawntheconclusionfromBowlby’sworkthatchildrenshouldbesubjectedtodaycarebeforetheageofthree
SomepeoplehavedrawntheconclusionfromBowlby’sworkthatchildrenshouldbesubjectedtodaycarebeforetheageofthree
D.H.LawrencewroteallthefollowingEXCEPT
______isthesecondlargestcityofCanada.
Anovertimpactofmodeminformationsystemsconcernstheindividual’sstandardandstyleofliving.Informationsystemsaffect
A、Followingclassroominstructions.B、Watchingplentyofmoviesonline.C、BreakingdownCulturalbarriers.D、Backpackingaround
A、Money.B、Enthusiasm.C、Newchallenge.D、Professionalknowledge.C
WhatdoesMr.Stevensonthinkofhisprofession?
随机试题
审美意象虽是艺术品的核心,但它却是精神性的,这是因为审美意象()
某种学习主义的观点认为,学生并不是空着脑袋走进教室的。在学生的日常生活中他们已经形成了丰富的经验,小到身边的衣食住行,大到宇宙星体,从自然现象到社会生话,他们都有一些自己的看法。教师在教育教学过程中要充分发挥学生的这些已有的知识经验。这是(
普通合伙企业的事务执行方式有()。
Directions:Forthispart,youarerequiredtowriteacompositionof120to180words.Yourwritingshouldbebasedonthetitl
下列表述是关于必要共同诉讼人中的一人或者部分人提出的上诉,其中正确的有:()
根据《水电水利工程模板施工规范》和《水工建筑物滑动模板施工技术规范》(DL/T5400—2007),下列关于模板施工的说法正确的是()
故意,是指违反治安管理行为的主体已经预见自己的行为会构成违反治安管理的事实而轻信能够避免的心理态度。()
洋务运动期间,洋务派首先兴办的是军用工业。曾国藩支持李鸿章筹办的上海江南制造总局,是当时国内最大的兵工厂。左宗棠在福建创办福州船政局,附设有船政学堂,是当时国内最大的造船厂。洋务派在创办军事工业中遇到资金奇缺,原料和燃料供应不足,以及交通运输落后等困难,需
求极限.
在考生文件夹下打开文档Word.docx,按照要求完成下列操作并以该文件名(Word.docx)保存文件。按照参考样式“Word参考样式.jpg”完成设置和制作。具体要求如下:设置第四至第六段文字,要求首行缩进2个字符。将第四至第六段的段首“《报告
最新回复
(
0
)