首页
外语
计算机
考研
公务员
职业资格
财经
工程
司法
医学
专升本
自考
实用职业技能
登录
外语
Not long ago, friends of mine confessed over dinner that they had put spyware on their 15-year-oht son’s computer so they could
Not long ago, friends of mine confessed over dinner that they had put spyware on their 15-year-oht son’s computer so they could
admin
2011-01-08
14
问题
Not long ago, friends of mine confessed over dinner that they had put spyware on their 15-year-oht son’s computer so they could monitor all he did ratline. At first I was repelled at this invasion of privacy. Now, after doing a fair amount of research, I get it.
Make no mistake: If you put spyare on your computer, you have the ability to log every keystroke your child makes and thus a good portion of his or her private world. That’s what spyware is—at least the parental monitoring kind. You don’t have to be an expert to put it on your computer. You just download the software from a vendor and you will receive reports—weekly, daily, whatever—showing you everything your child is doing on the machine.
Scary. But a good idea. Most parents won’t even consider it.
Maybe it’s the word: spyware. It brings up associations of Dick Cheney sitting in a dark room, rubbing his hands together and reading your most private thoughts. But this isn’t the government we are talking about—this is your family. It’s a mistake to confuse the two. Loving parents are doing the surveillance here, not faceless bureaucrats. And most parents already monitor their children, watching over their home environment, their school.
Today’s overprotective parents fight their kids’ battles on the playground, berate coaches about playing time and fill out college applications—yet when it comes to chatting with pedophiles or watching beheadings or gambling away their entire life savings, then...then their children deserve independence?
Some will say that you should simply trust your child, and that if he is old enough to go on the Internet he is old enough to know the dangers. Trust is one thing, but surrendering parental responsibility to a machine that allows the entire world access to your home borders on negligence.
Some will say that it’s better just to use parental blocks that deny access to risky sites. I have found that they don’t work. Children know how to get around them. But more than that—and this is where it gets tough—I want to know what’s being said in e-mail and instant messages and in chat rooms.
There are two reasons for this. First, we’ve all read about the young boy unknowingly conversing with a pedophile or the girl who was cyberbullied to the point where she committed suicide. Would a watchful eye have helped? We rely in the real world on teachers and parents to guard against bullies—do we just dismiss bullying on the Internet and all it entails because we are entering difficult ethical ground?
Second, everything your" child types can already be seen by the world—teachers, potential employers, friends, neighbors, future dates. Shouldn’t he learn now that the Internet is not a haven of privacy?
One of the most popular" arguments against spyware is the claim that you are reading your teenager’s every thought, and that in today’s world, a computer is the little key-locked diary of the past. But posting thoughts on the Internet isn’t the same thing as hiding them under your mattress. Maybe you should buy your children one of those little key-locked diaries so that they too can understand the difference.
Am I suggesting eavesdropping on every conversation? No. With new technology comes new responsibility. That works both ways. There is a fine line between being responsibly protective and irresponsibly nosy. You shouldn’t monitor to find out if your daughter’s friend has a crush on Kevin next door or that Mrs. Peterson gives too much homework or what schoolmate snubbed your son. You are there to start conversations and to be a safety net. To borrow from the national intelligence lexicon—and yes, that’s uncomfortable—you’re listening for dangerous chatter.
Will your teenagers find other ways of communicating with their friends when they realize you may be watching? Yes. But text messages and cellphones don’t offer the anonymity and danger of the Internet. They are usually one-on-one with someone you know. It is far easier for a
predator
to troll chat rooms and MySpace and Facebook.
Parenting has never been for the faint of heart. One friend of mine, using spyware to monitor his college-bound, straight-A daughter, found out that not only was she using drugs but she was sleeping with her dealer. He wisely took a deep breath before confronting her. Then he decided to come clean, to let her know how he had found out, to speak with her about the dangers inherent in her behavior. He’d had these conversations before, of course, but this time he had context. She listened. There was no anger. Things seem better now.
Our knee-jerk reaction as freedom-loving Americans is to be suspicions of anything that hints at invasion of privacy. That’s a good and noble thing. But it’s not an absolute, particularly in the face of the new and evolving challenges presented by the Internet. And particularly when it comes to our children.
Do you tell your children that the spyware is on the computer? I side with yes, but it might be enough to show them this article, have a discussion about your concerns and let them know the possibility is there.
Most parents are reluctant to use the spyware because of
选项
A、the difficulty of handling the spyware.
B、the concern of violating their children’s privacy.
C、worries of being discovered by their children.
D、no easy access to the spyware.
答案
B
解析
细节题。作者在第三段指出大多数父母都不会考虑使用间谍软件,之后在第四段指明了原因,即间谍软件的名称让人想起特务在看别人的隐私(reading your most private thoughts),说明不想像特务一样打探孩子的隐私,是原因之一,故答案为[B]。通过第二段You just download the software from a vendor and you will receive reports可以看出得到和操作这个软件非常容易,故排除[A],[D];作者在文中没有提及该软件是否容易被孩子们发现,故排除[C]。
转载请注明原文地址:https://jikaoti.com/ti/nduYFFFM
0
专业英语八级
相关试题推荐
Nowastothematteroflying.Youwanttobeverycarefulaboutlying;otherwiseyouarenearlysuretogetcaught.Oncecaught
Ateamofinternationalresearchershasfoundnewevidencethatanendangeredsubspeciesofchimpanzeeisthesourceoftheviru
Ofallthecomponentsofagoodnight’ssleep,dreamsseemtobeleastwithinourcontrol.Indreams,awindowopensintoaworl
Thedeclineofcivilityandgoodmannersmaybeworryingpeoplemorethancrime,accordingtoGentilityRecalled,editedbyDigb
A、Bothwerewearingdarksweaters.B、Neitherwaswearingglasses.C、Bothwereaboutthesameage.D、Oneofthemwasmarkedbya
MurovyovkaNaturePark,aprivatenaturereserve,istheresultofthevisionanddeterminationofoneman,SergeiSmirenski.Th
A、hehimselfdidn’tintendtoB、histeacherpreventedhimC、hisparentspreventedhimD、hethoughtteachingwasubetterprofess
我认为,生活要求人不断地自我调整以适应现实。人愈能及时地进行调整,他的个人世界便愈有意义。调整绝非易事。我曾感到茫然害怕。但我很幸运。父母和老师在我身上发现了某种东西——可以称之为活下去的潜力吧——而我自己却没有发现。他们激励我誓与失明拼搏到底。我必烦学会
Northernmarshesarebeingturnedintoempty,desecratedmudflatwasteland.Theculprit?Snowgeese.Thesemarshesaretheb
Thetipofagirl’s40,000-year-oldpinkyfingerfoundinacoldSiberiancave,pairedwithfasterandcheapergeneticsequenci
随机试题
声音的事件驱动,就是指
Theangrywomansatinthestationoffice."Therailwayshouldpayme$12."ShesaidtoHarry,themanwho【21】theticket."Myti
下列哪些生理功能调节属于负反馈控制
国务院某部制定一规章规定,对某一行政违法行为,除可以给单位处以罚款以外,还可以给予直接责任人5000元以下罚款,但规定这一违法行为处罚的法律、行政法规并未规定可以对直接责任人处以行政处罚。下列有关该规章违法的理由的说法哪一项是正确的?()
信息管理手册编制和修订的工作流程属于建设项目信息管理任务中哪方面环节的工作()。
概算定额与预算定额的主要不同之处在于()。
耕地承包期为()年。
郭某是一位知名作家,2014年取得以下收入:(1)4月,出版一本小说取得稿费60000元。(2)7月,将境内一处住房出租,租赁期限1年,月租金4000元,当月发生修缮费1200元(不考虑其他税费)。(3)9月,应邀出国访
阅读下面的材料,回答后面的问题。胡锦涛总书记在纪念党的十一届三中全会召开30周年大会上的讲话中指出,必须把坚持社会主义基本制度同发展市场经济结合起来,发挥社会主义制度的优越性和市场配置资源的有效性,使全社会充满改革发展的创造活力。建立和完善社会主义
Thecostofplantandequipmentincludesallexpendituresreasonableandnecessaryinacquringtheassetandplacingitinapos
最新回复
(
0
)