首页
外语
计算机
考研
公务员
职业资格
财经
工程
司法
医学
专升本
自考
实用职业技能
登录
考研
Data has a habit of spreading. It slips past military security and it can also leak from WikiLeaks. It even slipped past the ban
Data has a habit of spreading. It slips past military security and it can also leak from WikiLeaks. It even slipped past the ban
admin
2017-12-11
63
问题
Data has a habit of spreading. It slips past military security and it can also leak from WikiLeaks. It even slipped past the bans of the Guardian and other media organisations involved in this story when a rogue copy of Der Spiegel accidentally went on sale in Basle, Switzerland. Someone bought it, realised what they had, and began scanning the pages, translating them from German to English and posting up-dates on Twitter. It would seem digital data respects no authority, be it the Pentagon, WikiLeaks or a newspaper editor.
Individually, we have all already experienced the massive changes resulting from digitisation. Events or information that we once considered momentary and private are now accumulated, permanent, public. Governments hold our personal data in huge databases. It used to cost money to disclose and distribute information. In the digital age it costs money not to.
But when data breaches happen to the public, politicians don’t care much. Our privacy is expendable. It is no surprise that the reaction to these leaks is different. What has changed the dynamic of power in a revolutionary way isn’t just the scale of the databases being kept, but that individuals can upload a copy and present it to the world.
To some this marks a crisis, to others an opportunity. Technology is breaking down traditional social barriers of status, class, power, wealth and geography—replacing them with an ethos of collaboration and transparency.
Leaks are not the problem; they are the symptom. They reveal a disconnect between what people want and need to know and what they actually do know. The greater the secrecy, the more likely a leak. The way to move beyond leaks is to ensure a strong managing system for the public to access important information.
We are at a key moment where the visionaries in the leading position of a global digital age are clashing with those who are desperate to control what we know. WikiLeaks is the guerrilla front in a global movement for greater transparency and participation. It used to be that a leader controlled citizens by controlling information. Now it’ s harder than ever for the powerful to control what people read, see and hear. Technology gives people the ability to band together and challenge authority. The powerful have long spied on citizens as a means of control, now citizens are turning their collected eyes back upon the powerful.
This is a revolution, and all revolutions create fear and uncertainty. Will we move to a New Information Enlightenment or will the strong resistance from those who seek to maintain control no matter the cost lead us to a new totalitarianism? What happens in the next five years will define the future of democracy for the next century, so it would be well if our leaders responded to the current challenge with an eye on the future.
Politicians care much about the leak from WikiLeaks mainly because
选项
A、it posed a threat to digitisation.
B、it involved their own privacy.
C、it triggered the change of power.
D、it brought opportunities to them.
答案
C
解析
细节题。第三段前三句表明,以往政治家们对公众信息泄露并不很在意,而维基解密事件 引发的反应则完全不同(政治家们对此十分在意)。末句指出政治家们在意的原因:维基解密泄 露事件表明,“个人上传文件并把它呈现给全世界”的做法可以改变权力动态,即,会影响到权力 的改变,C选项正确。A、B选项利用文中个别词汇digital isation,privacy捏造干扰,从文中无法 推知。由第四段内容可知,维基解密事件表明技术可以打破社会障碍,显然,对政治家来说,它带 来的是危机,而不是机会,D选项与文意不符。
转载请注明原文地址:https://www.kaotiyun.com/show/SoBZ777K
0
考研英语一
相关试题推荐
ScientistshavediscoveredapowerfulantibioticinthebloodstreamofgiantpandasthatcandestroybacteriaTheChineseresea
ScientistshavediscoveredapowerfulantibioticinthebloodstreamofgiantpandasthatcandestroybacteriaTheChineseresea
【C1】______thewayitfeels,lonelinessoftenhasnothingtodowithbeingalone.Forsomepeople,feelingsof【C2】______aresharp
AsValentine’sDayapproaches,manysinglepeoplebegintofeelalittlesorryforthemselves.Onaday【C1】______bycouples,thi
Britain’sprivateschoolsareoneofitsmostsuccessfulexports.Thechildrenofthewealthy【C1】______tothem,whetherfromChi
Britain’sprivateschoolsareoneofitsmostsuccessfulexports.Thechildrenofthewealthy【C1】______tothem,whetherfromChi
Niceguysknewit,nowtwostudieshaveconfirmedit:badboysgetthemostgirls.Thefindingmayhelpexplainwhyanastysuit
Datahasahabitofspreading.ItslipspastmilitarysecurityanditcanalsoleakfromWikiLeaks.Itevenslippedpasttheban
"Projectgold"and"ProjectNexus"soundlikeplansforbankrobberiesormilitaryattacks.Inreality,theyarethenamesforK
随机试题
急性传染病时,嗜酸粒细胞直接计数显著减少的机制是
感冒的风热犯表型治法为()
患者女,45岁。因反复双侧腮腺区肿大伴口干10余年,肿大与进食有关。临床检查示:轻压双侧腮腺区可见少量半浑浊的液体自腮腺导管口流出,导管口稍红肿;左侧腮腺区可扪及一结节状物,约2cm×3cm大小,表面光滑,活动度一般。继续采用放射性核素99mTc显像检
甲承包经营某矿井采矿业务。甲为了降低采矿成本,提高开采量,便动员当地矿工和村民将子女带到矿井上班,并许诺给他们的子女以高工资。矿工和村民纷纷将他们的子女带到矿井上班,从事井下采矿作业,其中有二十余人为10~16周岁的未成年人。后因甲所承诺的高工资未兑现,二
城市总体规划纲要可根据实际需要进行编制,它的编制时间是在()之前。
()是我国在资本项目未完全开放的背景下选择的一种过渡性资本市场开放制度。
侵权行为之债是指行为人不法侵害他人财产权利或人身权利而使他人遭受损害时,行为人依法应对受害人承担责任,构成侵权行为之债。其构成要件包括:(1)行为的违法性;(2)有损害事实的存在;(3)侵权行为与损害事实之间有因果关系;(4)行为人有过错。根据上述定义,下
根据所给材料,回答下列问题。①普通话普及率提高到73%左右,识字人口使用规范汉字比例超过95%,语言行业年产值超2800亿元……不久前,教育部、国家语委发布《中国语言文字事业发展报告》等系列白皮书,让语言这个“百姓日用而不知”的交流工具进入大众视
《中华人民共和国商标法》第8条规定:“任何能够将自然人、法人或者其他组织的商品与他人的商品区别开的可视性标志,包括文字、图形、字母、数字、三维标志和颜色组合,以及上述要素的组合,均可以作为商标申请注册。”
一子弹穿透某铁板,已知入射子弹的速度为v0,穿出铁板时的速度为v1,以子弹入射铁板时为起始时间,又知穿透铁板的时间为t1.子弹在铁板内的阻力与速度平方成正比,比例系数k>0.(Ⅰ)求子弹在铁板内的运动速度v与时间t的函数关系v=v(t);
最新回复
(
0
)