In the article “The Perlis of
Over-sharing”, Emm (2014) asserts that the precautions should be taken to
prevent personal information from leakage. He explains, we might focus too much
on the Internet’s convenience and neglect the danger of sharing unnecessary
events online. Emm stresses that over-sharing might not only cause personal
consequences, but will also threaten the organization we work for. The author
also states that we might be in low-guard when using mobile devices as they are
not cybercriminals’ preys. In short, we should be cautious when making use of
Internet.
Throughout the whole article,
Emm supports his main idea, which is over-sharing causes exposure of our
personal details with a few key points and examples from different aspects.
Among these points, he discusses about the action of over-sharing and the
consequences of it.
Over-sharing can be categorized into two
streams, voluntary and involuntary. Voluntary over-sharing merely means sharing
without filtering, such as posting selfies and status on social media like
Instagram and Facebook. Emm mentions in the second paragraph that Internet is
now playing an important role in our daily life and we are growing dependent on
it. In second paragraph, “it also exposes the minutiae … data that we share”,
it implies Emm agrees with the point to some extends, making use of apps does
cause over-sharing problem. As we use these apps to aid us in daily life, they
bring convenience to us, but at the same time, our data, for example, our
buying preference and our whereabouts, is being collected without our
awareness. Therefore, it is considered involuntary over-sharing as we did not
intend to share these data with others.
On the other hand, the consequences asserted by
Emm can be divided into personal and non-personal two catogeries. The personal
consequences can be further catogerised into conscious and unconscious. Sharing
our photos and recent updates online is considered sharing consciously as we do
intend to share with others and to show these details to others, as mentioned
in “what prying eyes can see” and “ the mass of information that we choose to
put”, it is clearly shown that Emm agrees that sharing without filtering and
without setting limitation of access causes every single detail in our daily
life exposed to the public and it might threaten our safety as mentioned “ a
criminal knows where you live”.
However, from the example “exposes the minutiae
of our daily lives to those who have ability to gather the datait shows that
even when we are merely using the social media and never intend to share these
information with anyone, the providers are able to get access to them. “App
requests permission to read SMS and MMS messages”, it always happens when we
have to rely on social media to communicate, shopping online, i-banking or to
provide personal details to create an account. Therefore, the providers that
offer convenience to us at the same time able to gather our data. In such case,
we are unconsciously over-sharing as we are providing information in order to
enjoy the convenience but not to share with others, it is a must to share for
the consumers and it is the providers’ obligation to prevent leakage. However,
we are at the same time aware that we are going to share our personal
information with the providers, which contributes to the conscious
over-sharing.
For the non-personal over-sharing, as we share
the events of the company we working in, although one post does not matter
much, but would-be attacker gather all the data from various posts on various
social medias and acquire the important content about particular company.
Emm also comments on the use of mobile devices
as “a false sense of security when using a mobile device”, he explains, as we
sync our data onto online backup system such as iCloud , there is a possibility
for others to gain access to our information once they obtained our mobile
devices. Emm includes this example in the case of over-sharing, however, syncing
onto these systems is meant to be private and safe, even the providers have no
authority to access, this scenario is because of losing hardware, a security
problem, but not because of sharing over and unnecessarily online, therefore it
should be considered as a consequence of over-sharing.
Hi Elaine!
ReplyDeleteHere's some comments after reading your response:
Content & Organisation:
The summary was well written, with all main points covered in a concise manner. However, we are unable to identify your main thesis statement (your stand) on the topic. We understand that you are trying to discuss this portion of the article "Among these points, he discusses about the action of over-sharing and the consequences of it.", but we suggest that could focus more on one aspect of the idea (either over-sharing or consequences) and have a stand/view. For eg. "I agree/disagree with the author's view on ......."
From your outline, your main thesis statement was "over-sharing causes exposure/leakage of our personal information". It sounded to us that you are indeed agreeing with the author that over-sharing is bad. It seems like you're explaining what over-sharing is and what its consequences are, rather than arguing.
You did a very good job on connecting your response to the points the author mentioned in his article. However, you may want to consider using information from external sources to substantiate your points. It will help in giving more credibility in your response and also make it more interesting.
We also felt that the information on iCloud was not that relevant to your view on whether over-sharing is good/bad.
And remember to include your citations (:
Language use:
Like what Prof Brad said, remember to not use first person perspective in your writing. So you may want to consider using the word "users" to replace "we" in your response.
Do take note on verb tense mistakes too, for eg: "apps to aid us in daily life"
Use the word "applications" instead of "app", and since its "us", you have to use "daily lives" instead.
Cheers,
Jovyn & Anvis ((: