Survey
* Your assessment is very important for improving the workof artificial intelligence, which forms the content of this project
* Your assessment is very important for improving the workof artificial intelligence, which forms the content of this project
Warm-Up Mini-News Reading Text A Text B Warm-up Do you post anything online? What kind of information do you post online? What may threaten the cyber security? What can we do to ensure our cyber security? Mini-News Reading whistleblower: 告密者 surveillance: 监视 NSA: National Security Agency 国家安全局 embroil:使(自己或他人)卷入纠纷 What is your understanding of this piece of news? Have you worried about the security of your own IT facilities? Text A Text A 1. have a Facebook account 2. post something online 3. wind up in the public eye 4. gotten a text or a call 5. permission 6. it comes to the internet 7. world wide web 8. In that desk drawer 9. in a written form 10. ignorance 11. failure 12. need guidance Text A Directions: Read Text A and try to divide it into three parts. Then summarize the main idea of each part. Part 1 (para. 1-2): Real name system is adopted to regulate the internet anonymity . Part 2 (para. 3-7): Real name registration online threatens cyber security. Part 3 (para. 8-9): It is a dilemma to strike a balance between anonymity and privacy. Comprehension Read paragraphs 1-2 and answer the following questions. * What does the cartoon featuring two dogs sitting in front of a computer try to reveal? 1. Why do some websites ask the users to provide their real names? Comprehension * What does the cartoon featuring two dogs sitting in front of a computer try to reveal? • The cartoon featuring two dogs sitting in front of a computer captured the freewheeling anonymity of the early stages of internet adoption, which doesn’t work now. Comprehension 1. Why do some websites ask the users to provide their real names? • Some websites ask the users to provide their real names because in this way on-line discussions will be expected to be more civil if people have to reveal their identities. Comprehension Read paragraphs 3-7 and answer the following questions. 2. Could you name any techniques mentioned in this passage which can be used to reveal users’ identity? * Can you give an example to illustrate the unfavorable application of “cookies”? Comprehension 2. Could you name any techniques mentioned in this passage which can be used to reveal users’ identity? • One way involves “cookies”, which are snippets of data deposited on visitors’ computers, so that returning visitors can be recognized. • Another technique relies on “history stealing”, in which a security flaw in a user’s web browser allows rogue websites to retrieve fragments of the user’s browsing history. Comprehension * Can you give an example to illustrate the unfavorable application of “cookies”? • In 2010, however, privacy experts twice pointed out that Facebook was sending information about its users to the same advertisers that track browsing using cookies. Comprehension Read paragraphs 8-9 and answer the following questions. 3. What is the difference between privacy and anonymity, according to Eric Schmidt? 4. What does the author mean by saying “anonymity is freeing”? 5. What might be the consequence if the days of anonymous browsing are over? 6. What do you think of anonymous browsing? Do you think it should be abolished? Give your reasons. Comprehension 3. What is the difference between privacy and anonymity, according to Eric Schmidt? • According to Eric Schmidt, privacy should be respected, while absolute anonymity mustn’t be encouraged, since it may lead to some very difficult decisions for the government and society as a whole. Comprehension 4. What does the author mean by saying “anonymity is freeing”? • This term means that anonymity allows people to do all types of activities without subjecting themselves to unpleasant judgment, which would not be possible if their identities are revealed. Comprehension 5. What might be the consequence if the days of anonymous browsing are over? • If the days of anonymous browsing are over, it would “frost keyboards”, which means to discourage people from using the Internet. Comprehension 6. What do you think of anonymous browsing? Do you think it should be abolished? Give your reasons. Open Question. Summary • • • • • • • • 1. anonymity 2. preliminary 3. eroded 4. pseudonym 5. comments 6. threat 7. privacy 8. associated • • • • • • • 9. target 10. vulnerability 11. network 12. prophet 13. access 14. chilling 15. discourage Chart-Filling ① ② ③ ④ ⑤ ⑥ freewheeling anonymity real name registration check identity cookies history stealing reveal everything about its users Text B Comprehension Read Text B and answer the following questions. 1. What does real name registration refer to in China? Why is this policy being implemented? 2. Why is implementing real name registration easier said than done? 3. What is the significance of online socialization to most netizens? 4. What options could the government have when it comes to enforcing the policy? What might be their implications? 5. Are you for or against the real name Internet policy? Why / Why not? Comprehension * What methods does Chinese government employ to exorcise “bad speech” from the Internet? Governments employ a number of methods to exorcise "bad speech" from the Internet. Real name registration is just one tool of the trade. Some might suggest that real name registration and other methods, such as the occasional "purge" of outspoken commentators, is working for China. Comprehension 1. What does real name registration refer to in China? Why is this policy being implemented? Real name registration refers to the rule requiring web users to register their real name and their national identification number with online service providers before posting comments on providers' websites. The purported targets are the usual suspects: libel, fraud, pornography, and rumor. Free speech advocates have raised legitimate concerns. Comprehension 2. Why is implementing real name registration easier said than done? Implementing real name registration is easier said than done because online service providers and citizens may have better reasons to resist. It's fair to ask whether the relevant government agencies have the wherewithal to force the issue. Therefore, successful implementation of real name registration policies will vary depending on the type of media. Platforms like Facebook, which are largely social-driven ---- that is, structured around interpersonal relationships ---- are going to have an easier time getting users to comply with real name policies compared with more content-driven platforms like microblogs. Comprehension 3. What is the significance of online socialization to most netizens? For many netizens, life without online social interaction is unimaginable. Social media pervades everyday lives. In societies where the state has restricted traditional media, the Internet offers an eyeopening and unique atmosphere. Moreover, the ability to connect to a broader network is meaningful to people because it affirms their individual dignity. Minorities and people open to unconventional views can see that they are not alone. Comprehension 4. What options could the government have when it comes to enforcing the policy? What might be their implications? Government could agglomerate users onto one or a few of the more pliant platforms; or shut down a platform that is not fully cooperating with the real name policy . Comprehension 4. What options could the government have when it comes to enforcing the policy? What might be their implications? Real name registration might work to undermine market consolidation; a prolonged shutdown could produce widespread public discontent, further fracture the market, and probably force the government to deal with new market entrants, who may be even less cooperative than the “devils that they know.” Comprehension 5. Are you for or against the real name Internet policy? Why / Why not? (Open Question) Translation 1. Taking this one step further, if real name registration were successfully implemented, and anonymity were effectively banned on the Internet, that would likely degrade content in the eyes of platform users and probably drive users away from China's popular microblogs. (para. 7) 往前推进一步来看,即使成功实施实名制并有效 阻止网络匿名行为,这将有可能有损网络平台用 户对信息内容的评价,进而很可能降低中国境内 备受欢迎的微博点击率。 Translation 2. A prolonged shutdown, however, could produce widespread public discontent, further fracture the market, and probably force the government to deal with new market entrants, who may be even less cooperative than the "devils that they know." (para. 14) 长期关闭某些网络平台将引起民众的广泛不满, 进一步扰乱市场,从而很可能迫使政府应对各类 新网络平台的涌入。而这些新平台或许会比“他 们以往所接触的‘问题’平台”更难以开展合作。 Buzzwords