Friday, 6 February 2015

Outline of reader response

Outline thesis: The dangers of the online world shared by the author are exaggerated to gain online readership.

Idea 1. Government collecting Data
-For the many ordinary citizens who go about their daily lives, the government monitoring your online activities should not alarm you. Most of us have little to hide. Why would what online games you play, the items you buy online, the content you put up on forums,
As long as the government uses these information gathered in a respectable manner, most of us should not be alarmed. After all, this data is meant to combat crimes/
However, some will cry an invasion of privacy. I argue that privacy is not intruded as the actual person monitoring your online behaviour has no physical connection to you, and has and will never come into contact with you or anyone you know. He/she is as good as non-existent to you.

Idea 2. How sensitive is the data you have access too actually?
-Information that we make online poses a threat to us is a point, which is heavily dramatized.
How many of us works in key installations such as a nuclear power plant or leading research and development departments where what we work on is so sensitive such that there are hackers constantly plotting and stalking these company’s employees to try exploit some information that might inadvertently be revealed. Even in these companies the management would properly brief its employees how to handle such data, thus preventing such leaks.
For the rest of us common man, sure that there has been reports and instances that hackers have gained access into the company network by enticing employees to click onto links which automatically downloads a virus. But if we take a look at what we are working on, how much of what we have there can be useful to a particular someone else, and would even justify a capable professional hacker to extract that information out on your folly?
Idea 3.

Finally, the author talks about the consequence of oversharing. Emm uses the example of a boss reading an employees facebook page, a story we all are too familiar with. However, how much of this is actually applicable in our lives? To the minority who enjoy such a life of late night parties and take part in questionable content which they might want to avoid their boss seeing, even fewer from these group are foolish enough to make such information available to their colleagues and bosses. This problem surely plagues a special few.

1 comment:

  1. The summary part is quite good. The whole article is well-organised, and also attractive. Language is fluent. Author can use some real life examples in this response. What's more, author use some question sentence in article to make his points more convincing. Generally, this article is really good.

    ReplyDelete