Вы находитесь на странице: 1из 12

LANGUAGE IV 2019

WRITING WORKSHOP

The argumentative essay


• What is the context for this kind of text?
• What are the similarities and differences between the
argumentative and the expository essays in terms of structure,
functions and language?

Let’s read the following argumentative essay and identify:


• sections and
• functions
The digital age has undoubtedly not only brought about a myriad of new possibilities but also
posed new challenges for users. People can enjoy all sorts of benefits that certainly make life easier such
as having access to and being able to share an enormous amount of information for various purposes.
Most people somehow take part in the digitalization of processes involved in sharing personal
information on social media and carrying out all kinds of business transactions on the web on a daily
basis. Such unlimited access may be potentially dangerous though since many times it becomes very
difficult to control what personal information is available online. Although it is true that there is quite a
lot that users can do to effectively control how much information on their private lives they expose and
give away through communication technology, users are placed in a vulnerable and even dangerous
position. Online security may be threatened mainly by the almost unrestricted access to information all
users have and by the non-consensual disclosure of private information, both of which put users in peril.
The digital age has undoubtedly not only brought about a myriad of new possibilities but also
posed new challenges for users. People can enjoy all sorts of benefits that certainly make life easier such
as having access to and being able to share an enormous amount of information for various purposes.
Most people somehow take part in the digitalization of processes involved in sharing personal
information on social media and carrying out all kinds of business transactions on the web on a daily
basis. Such unlimited access may be potentially dangerous though since many times it becomes very
difficult to control what personal information is available online. Although it is true that there is quite a
lot that users can do to effectively control how much information on their private lives they expose and
give away through communication technology, users are placed in a vulnerable and even dangerous
position. Online security may be threatened mainly by the almost unrestricted access to information all
users have and by the non-consensual disclosure of private information, both of which put users in peril.
There are certainly some measures users can take to protect themselves from having their
private information shared online. In the last couple of years, many users began to fully grasp the extent
of what is available online so they are often aware of the dangers that the devices and apps may bring
about. In order to protect sensitive information, people might do without social media; users can block
some functions of the apps and websites that could be hazardous and in that way feel relatively safer.
However, as they keep using these communication technologies, they realize this sense of security is
relative as these privacy settings are often complicated, constantly changing or even unable to be
opted out. Therefore, even when users take action to protect themselves, communication technologies
transmit and store all kinds of personal information and it becomes almost impossible to control all the
ways in which that information can be potentially at risk.
There are certainly some measures users can take to protect themselves from having their
private information shared online. In the last couple of years, many users began to fully grasp the extent
of what is available online so they are often aware of the dangers that the devices and apps may bring
about. In order to protect sensitive information, people might do without social media; users can block
some functions of the apps and websites that could be hazardous and in that way feel relatively safer.
However, as they keep using these communication technologies, they realize this sense of security is
relative as these privacy settings are often complicated, constantly changing or even unable to be
opted out. Therefore, even when users take action to protect themselves, communication technologies
transmit and store all kinds of personal information and it becomes almost impossible to control all the
ways in which that information can be potentially at risk.
One way in which users can be put at risk is by criminals’ unrestricted access to personal
information involving location, contact and routines. Consequently, users’ physical and material well-
being may be endangered.
Another way in which users´s private data may be endangered is through non-consensual
disclosure of financial information. Thus users’ financial security could be in jeopardy. Personal
information may be leaked and stolen through the installation of, for example, credit card apps in cell
phones. A number of apps, such as Visa’s PayWave app or Mastercard’s PayPass app, have been
developed recently to make users´ lives easier. These apps replace the plastic card by uploading the
user’s information on their phones and simplifying the task of carrying a wallet full of cards. These apps
allow the users to store information by simply tapping on their phone to complete a transaction. The
downside is that anyone can download them and store information in them. It is easy not only to make
payments but also to steal information. Criminals do not have to touch a person to steal credit card
information. As stated in the article Credit card data can be stolen with a wave and an app, “a thief can
simply walk by, pause and read the information through an unwitting person´s coat and wallet. Then the
information can be sent to another phone.” Clearly, even when users actually take steps to protect
confidential financial information when doing online transactions, the existence of apps such as the one
mentioned above seems to be beyond users’ control since they have almost no way of knowing
someone is trying to steal their data and cannot protect themselves. Although these apps are perceived
as harmless, they end up facilitating the job of thieves and causing material damage to victims not only
because of the money that may be stolen but also because of the time spent in repairing the damage
caused.
Another way in which users´s private data may be endangered is through non-consensual
disclosure of financial information. Thus users’ financial security could be in jeopardy. Personal
information may be leaked and stolen through the installation of, for example, credit card apps in cell
phones. A number of apps, such as Visa’s PayWave app or Mastercard’s PayPass app, have been
developed recently to make users´ lives easier. These apps replace the plastic card by uploading the
user’s information on their phones and simplifying the task of carrying a wallet full of cards. These apps
allow the users to store information by simply tapping on their phone to complete a transaction. The
downside is that almost anyone can download them and store information in them. It is easy not only to
make payments but also to steal information. Criminals do not have to touch a person to steal credit
card information. As stated in the article Credit card data can be stolen with a wave and an app, “a thief
can simply walk by, pause and read the information through an unwitting person´s coat and wallet. Then
the information can be sent to another phone.” Clearly, even when users actually take steps to protect
confidential financial information when doing online transactions, the existence of apps such as the one
mentioned above seems to be beyond users’ control since they have almost no way of knowing
someone is trying to steal their data and cannot protect themselves. Although these apps are perceived
as harmless, they end up facilitating the job of thieves and causing material damage to victims not only
because of the money that may be stolen but also because of the time spent in repairing the damage
caused.
Clearly, even though there are some ways to protect our personal information, it becomes completely
impossible to control what happens with all our information available online. Most people use
communication and information technologies both as part of their personal and professional lives on a
daily basis. Users´ information is disclosed in several different situations many times every day. Privacy
may thus be threatened. Privacy and security are closely connected. Freer access to personal
information has an impact on personal security. While users can take some steps to protect information
they do not wish to become known outside their family or social circle, they cannot fully protect
themselves from undesired exposure of private personal and financial information. Such information
may be used to harm users. Being informed and aware of potential risks is the least users can do in
order to make a smarter more careful use of these otherwise very useful and almost inevitable
technologies. Thus we can at least minimize, as far as possible, the chances of suffering the unpleasant
consequences of breaches of privacy.
Clearly, even though there are some ways to protect our personal information, it becomes completely
impossible to control what happens with all our information available online. Most people use
communication and information technologies both as part of their personal and professional lives on a
daily basis. Users´ information is disclosed in several different situations many times every day. Privacy
may thus be threatened. Privacy and security are closely connected. Freer access to personal
information has an impact on personal security. While users can take some steps to protect information
they do not wish to become known outside their family or social circle, they cannot fully protect
themselves from undesired exposure of private personal and financial information. Such information
may be used to harm users. Being informed and aware of potential risks is the least users can do in
order to make a smarter more careful use of these otherwise very useful and almost inevitable
technologies. Thus we can at least minimize, as far as possible, the chances of suffering the unpleasant
consequences of breaches of privacy.
https://www.cbc.ca/news/canada/newfoundland-labrador/credit-card-data-can-be-stolen-with-a-wave-and-an-
app-1.1386262, accessed on May 30th 2019.

Topic for essay 2:


Build a case for one of the two statements:
o
Information technology and social media promote, advance, stimulate depth of relationships and / or
of mental processing.
o
Information technology and social media can get in the way of, hinder, reduce depth of
relationships and / or of mental processing.

Вам также может понравиться