• What is the context for this kind of text? • What are the similarities and differences between the argumentative and the expository essays in terms of structure, functions and language?
Let’s read the following argumentative essay and identify:
• sections and • functions The digital age has undoubtedly not only brought about a myriad of new possibilities but also posed new challenges for users. People can enjoy all sorts of benefits that certainly make life easier such as having access to and being able to share an enormous amount of information for various purposes. Most people somehow take part in the digitalization of processes involved in sharing personal information on social media and carrying out all kinds of business transactions on the web on a daily basis. Such unlimited access may be potentially dangerous though since many times it becomes very difficult to control what personal information is available online. Although it is true that there is quite a lot that users can do to effectively control how much information on their private lives they expose and give away through communication technology, users are placed in a vulnerable and even dangerous position. Online security may be threatened mainly by the almost unrestricted access to information all users have and by the non-consensual disclosure of private information, both of which put users in peril. The digital age has undoubtedly not only brought about a myriad of new possibilities but also posed new challenges for users. People can enjoy all sorts of benefits that certainly make life easier such as having access to and being able to share an enormous amount of information for various purposes. Most people somehow take part in the digitalization of processes involved in sharing personal information on social media and carrying out all kinds of business transactions on the web on a daily basis. Such unlimited access may be potentially dangerous though since many times it becomes very difficult to control what personal information is available online. Although it is true that there is quite a lot that users can do to effectively control how much information on their private lives they expose and give away through communication technology, users are placed in a vulnerable and even dangerous position. Online security may be threatened mainly by the almost unrestricted access to information all users have and by the non-consensual disclosure of private information, both of which put users in peril. There are certainly some measures users can take to protect themselves from having their private information shared online. In the last couple of years, many users began to fully grasp the extent of what is available online so they are often aware of the dangers that the devices and apps may bring about. In order to protect sensitive information, people might do without social media; users can block some functions of the apps and websites that could be hazardous and in that way feel relatively safer. However, as they keep using these communication technologies, they realize this sense of security is relative as these privacy settings are often complicated, constantly changing or even unable to be opted out. Therefore, even when users take action to protect themselves, communication technologies transmit and store all kinds of personal information and it becomes almost impossible to control all the ways in which that information can be potentially at risk. There are certainly some measures users can take to protect themselves from having their private information shared online. In the last couple of years, many users began to fully grasp the extent of what is available online so they are often aware of the dangers that the devices and apps may bring about. In order to protect sensitive information, people might do without social media; users can block some functions of the apps and websites that could be hazardous and in that way feel relatively safer. However, as they keep using these communication technologies, they realize this sense of security is relative as these privacy settings are often complicated, constantly changing or even unable to be opted out. Therefore, even when users take action to protect themselves, communication technologies transmit and store all kinds of personal information and it becomes almost impossible to control all the ways in which that information can be potentially at risk. One way in which users can be put at risk is by criminals’ unrestricted access to personal information involving location, contact and routines. Consequently, users’ physical and material well- being may be endangered. Another way in which users´s private data may be endangered is through non-consensual disclosure of financial information. Thus users’ financial security could be in jeopardy. Personal information may be leaked and stolen through the installation of, for example, credit card apps in cell phones. A number of apps, such as Visa’s PayWave app or Mastercard’s PayPass app, have been developed recently to make users´ lives easier. These apps replace the plastic card by uploading the user’s information on their phones and simplifying the task of carrying a wallet full of cards. These apps allow the users to store information by simply tapping on their phone to complete a transaction. The downside is that anyone can download them and store information in them. It is easy not only to make payments but also to steal information. Criminals do not have to touch a person to steal credit card information. As stated in the article Credit card data can be stolen with a wave and an app, “a thief can simply walk by, pause and read the information through an unwitting person´s coat and wallet. Then the information can be sent to another phone.” Clearly, even when users actually take steps to protect confidential financial information when doing online transactions, the existence of apps such as the one mentioned above seems to be beyond users’ control since they have almost no way of knowing someone is trying to steal their data and cannot protect themselves. Although these apps are perceived as harmless, they end up facilitating the job of thieves and causing material damage to victims not only because of the money that may be stolen but also because of the time spent in repairing the damage caused. Another way in which users´s private data may be endangered is through non-consensual disclosure of financial information. Thus users’ financial security could be in jeopardy. Personal information may be leaked and stolen through the installation of, for example, credit card apps in cell phones. A number of apps, such as Visa’s PayWave app or Mastercard’s PayPass app, have been developed recently to make users´ lives easier. These apps replace the plastic card by uploading the user’s information on their phones and simplifying the task of carrying a wallet full of cards. These apps allow the users to store information by simply tapping on their phone to complete a transaction. The downside is that almost anyone can download them and store information in them. It is easy not only to make payments but also to steal information. Criminals do not have to touch a person to steal credit card information. As stated in the article Credit card data can be stolen with a wave and an app, “a thief can simply walk by, pause and read the information through an unwitting person´s coat and wallet. Then the information can be sent to another phone.” Clearly, even when users actually take steps to protect confidential financial information when doing online transactions, the existence of apps such as the one mentioned above seems to be beyond users’ control since they have almost no way of knowing someone is trying to steal their data and cannot protect themselves. Although these apps are perceived as harmless, they end up facilitating the job of thieves and causing material damage to victims not only because of the money that may be stolen but also because of the time spent in repairing the damage caused. Clearly, even though there are some ways to protect our personal information, it becomes completely impossible to control what happens with all our information available online. Most people use communication and information technologies both as part of their personal and professional lives on a daily basis. Users´ information is disclosed in several different situations many times every day. Privacy may thus be threatened. Privacy and security are closely connected. Freer access to personal information has an impact on personal security. While users can take some steps to protect information they do not wish to become known outside their family or social circle, they cannot fully protect themselves from undesired exposure of private personal and financial information. Such information may be used to harm users. Being informed and aware of potential risks is the least users can do in order to make a smarter more careful use of these otherwise very useful and almost inevitable technologies. Thus we can at least minimize, as far as possible, the chances of suffering the unpleasant consequences of breaches of privacy. Clearly, even though there are some ways to protect our personal information, it becomes completely impossible to control what happens with all our information available online. Most people use communication and information technologies both as part of their personal and professional lives on a daily basis. Users´ information is disclosed in several different situations many times every day. Privacy may thus be threatened. Privacy and security are closely connected. Freer access to personal information has an impact on personal security. While users can take some steps to protect information they do not wish to become known outside their family or social circle, they cannot fully protect themselves from undesired exposure of private personal and financial information. Such information may be used to harm users. Being informed and aware of potential risks is the least users can do in order to make a smarter more careful use of these otherwise very useful and almost inevitable technologies. Thus we can at least minimize, as far as possible, the chances of suffering the unpleasant consequences of breaches of privacy. https://www.cbc.ca/news/canada/newfoundland-labrador/credit-card-data-can-be-stolen-with-a-wave-and-an- app-1.1386262, accessed on May 30th 2019.
Topic for essay 2:
Build a case for one of the two statements: o Information technology and social media promote, advance, stimulate depth of relationships and / or of mental processing. o Information technology and social media can get in the way of, hinder, reduce depth of relationships and / or of mental processing.
Cybersecurity: A Simple Beginner’s Guide to Cybersecurity, Computer Networks and Protecting Oneself from Hacking in the Form of Phishing, Malware, Ransomware, and Social Engineering