Wednesday, February 25, 2009

Reading Reaction Journal #3

Reference

Pereira, J.(n.d.). How to avoid getting your information stolen via wireless connections. Retrieved February 17, 2009 from http://computer-news-article.blogspot.com/2007/05/how-to-avoid-getting-your-information.html

Summary

This article is about the fact that personal information could be pilfered even by wireless internet. If you suddenly send information through sites that are not trusted, It's like showing your information to the public. many people stole personal information using wireless technology. The way they stole personal information is very easy. Most crimes are performed at cars. They drive cars with laptops and use other people's wireless connections, and copy from their personal information to a financial one; It is called war-driving.

Reaction

I didn't know that personal information could be stolen by wireless connections. It's a very useful title, but I don't think this article is good. Body sentences are totally seperate from the title. If you see the title, as you know, you may expect the way to avoid crimes in which your information is stolen via wireless technology. I'm sure you didn't get the information, because the article just mentions how the crime is performed and how dangerous it is. If the author just wants to write about crimes, he has to change the title.
I can't believe that personal information is stolen even by wireless connections. I don't think I can believe in IT, even if it is convenient. After developing the computer, it is true that our life is much more convenient compared to before. We don't have to go to the bank, shopping, and so on by ourselves, because computer can do almost everything we have to do more conveniently, but it also causes other problems. Problems are that crimes using computers have increased and our personal information is not safe anymore. Protecting our information strongly has to be made as soon as possible, and also people shouldn't trust the compuer totally, and have to be careful not to have thier information stolen.

No comments:

Post a Comment