Open Mind Advanced Students Book Unit 3 PDF

Download as pdf or txt
Download as pdf or txt
You are on page 1of 12

UNIT 3 Password protected

IN THIS UNIT YOU


learn language to talk about issues
related to digital security
read about electronic data
collection
talk about different attitudes to
privacy READING
text organisation
listen to a radio interview about
What is the purpose of
identity theft
a persuasive text? Where
write an email expressing views on might you see such a text?
a new proposal
learn about protecting digital
privacy
watch a video about keeping your
personal information secure online

SPEAKING
participating in a group
discussion
Why might it be important
to keep a group discussion
going? What techniques or
expressions can you use
to keep a discussion
going?

LIFE protecting digital privacy


How many forms of communication
SKILLS (email, etc) do you use regularly? Are
you concerned about digital privacy, and
SELF do you take any steps to protect your
& SOCIETY data? Why or why not?

0458086_OM_Advanced SB pp001-184.indb 32 27/01/2015 10:51


A Work in pairs. Take the survey. Rate each statement
from 1 (doesnt describe you at all) to 5 (describes you
very accurately). Share your answers with your partner
and give more detail on your responses.

I use a different password for every


P rivac y 4 website account.

Surve y
1 2 3 4 5
I worry that too many people and
1 organisations have private information 5 I almost never use a debit/credit card.
about me.

1 2 3 4 5 1 2 3 4 5

I dont talk about what Im doing on Im very careful about the information I
2 social media.
6 provide to websites.

1 2 3 4 5 1 2 3 4 5

I never let anyone else use my I prefer not to buy things online because I
3 electronic devices.
7 dont like giving out my information.

1 2 3 4 5 1 2 3 4 5

B Work with another pair. Discuss these questions.


1 Why do you think the issue of privacy receives a lot of attention in the media?
2 If someone looked at all the information about you that exists in cyberspace, what
kind of things would they know about you?
3 Do you think this information would give them an accurate impression of your life?

Password protected UNIT 3 33

0458086_OM_Advanced SB pp001-184.indb 33 27/01/2015 10:51


READING: text organisation page 10
Recognising the structure of a text you are reading helps you understand the text
more quickly. Persuasive texts (texts which try to convince the reader of an opinion)
often follow a cause-effect structure. The writer presents causes and explains the
effects in order to convince the reader of his/her opinion.

A Discuss these questions as a class.


1 What do you think cyber threat means?
2 How many different types of cyber threat can you think of?

B Read the article and discuss these questions in groups.


1 What does the writer want to persuade the reader to think?
2 What information does the writer use to persuade the reader?
3 Do you think the article will convince readers to agree with the writer?
Whyorwhynot?

O u r Data I s Not O u r Own!


by Stephen Shaw

Every time you make a call on your mobile phone, data terrorism. However, what if that information is then
is collected about where you are, who youre calling shared with other companies, who use it to direct their
and even what direction youre travelling in. Credit card advertisements at us more efficiently? Are you happy
payments leave detailed records of your purchases. with your personal data being used in that way?
Were told that monitoring online activity prevents
Then theres the question of what happens if we do
crime, helps in the fight against terrorism and makes life
nothing about the situation. There are valid reasons
easier for all of us. However, high-profile news stories
why companies and governments need to compile
about the amount of data that is collected on all of us,
certain information about peoples lives, but the result
as well as numerous incidents of hacking into retailers
of this is that they keep demanding more and more
databases, have highlighted the risk were taking by
information. Unless we all exert more control over our
allowing others to invade our privacy like this.
personal data, we will soon find that there is no aspect
We should all be concerned about online security of our private lives that is not in some way recorded,
to prevent criminals from getting our personal stored, used and potentially abused.
information because data theft can create horrifying
From shop loyalty cards to electronic travel cards,
problems. There have been a number of high-profile
and from emails to text messages, our everyday lives
cases where employees have lost mobile devices
create an enormous amount of information, and its
containing the data of thousands of customers, or
difficult to see how we can change that. We live, after
where criminals have hacked into databases. The
all, in the information age. However, we can affect
most common consequence of this sort of thing is
what happens to the information we produce. By
identity theft, when criminals get credit card or bank
demanding to know why our data is being collected
account numbers and spend a lot of money in another
and how its being used, we can all take back some of
persons name. Another problem is internet scams
the control over our private lives.
where criminals send you an email saying that youve
won a lot of money and you just need to send them
your bank details so that they can put the money in
your account. Finally, some people are left open to
blackmail when information about their private lives
falls into the wrong hands.
Even if the information doesnt fall into the hands
of criminals, there is still the possibility that it will
be shared among different companies or different
authorities. What are the possible effects of that? It
means that information collected for one purpose
could be used for a completely different purpose. We
might be happy with an airline collecting information
about us in the belief that this helps to prevent

34

0458086_OM_Advanced SB pp001-184.indb 34 27/01/2015 10:51


C The table represents the functions of the five paragraphs in the article.
Readthe article again and complete the table.
Function
1 Introduction: The size and scope of the problem is explained, with specific examples
2 Cause: data theft Effects: identity theft,
3 Cause: information sharing Effect:
4 Cause: Effect:
5 Conclusion: Summary of the situation and call to action

D VOCABULARY: DIGITAL PRIVACY


Complete the sentences with the words and phrases from the box.

blackmailcompile databasehack
identity theftinformation age
invade your privacyleave (someone) open tomonitorscam

1 I believe nobody should have the right to without your permission.


2 I dont worry about the fact that corporations information on each of us
all the time.
3 If you dont protect your digital privacy, you may yourself
theft by cyber criminals.
4 In the that we now live in, data is worth money.
5 Internet search engines what customers are looking at online to get
information they can sell to advertisers.
6 is the most common cybercrime these days, so we should be careful
about putting our documents online.
7 Cyber criminals know how to into databases and steal secret information.
8 Criminals are sometimes able to people for a lot of money by threatening
to do something to them or their families.
9 My brother lost a lot of money in an internet !
10 Companies often keep a with all their customers details in it.

E VOCABULARY: DIGITAL PRIVACY


Work in pairs. Decide whether you agree or disagree with the statements.
Explain why.
1 A certain amount of surveillance and invasion of our privacy makes us safer.
2 You should never shop online because you leave yourself open to crimes like identity theft.
3 Companies should be allowed to monitor online activity and sell their databases.

WRITING: a persuasive email


A 1.11 Read the notice on a university website. Then listen to the
conversation. What points do the students make in favour of and
against the proposal?

Notice to students with credit cards


There is a proposal for a new law that would allow parents to monitor their childrens
online credit card purchases as long as their children are in university and under 21.
Wewant to know your opinion, so please write to us at: [email protected]

B Write an email to the website explaining what you think the effects
of the proposed law will be. Try to persuade readers to agree withyou.

Password protected UNIT 3 35

0458086_OM_Advanced SB pp001-184.indb 35 27/01/2015 10:51


GRAMMAR: object complements Notice!
Circle the direct objects in the
A LANGUAGE IN CONTEXT Read the text. What advice text below. Does a direct object
does the writer give? Do you usually follow this advice? come after a noun or a verb?

Protect Your Identity


Identity thieves are out there, and theyre after your data!
Too many of us consider our personal information secure, and we dont
see identity theft as a problem. However, if you dont keep your data
secret, a criminal can find it very easy to steal money from you. This
can make your life very hard, and it can be extremely difficult to prove
yourself an innocent victim. Never throw personal documents in the bin.
Always shred anything that contains private information.

B ANALYsE Look at the text in Exercise A again.

Form Read the explanation and examples. Then find and underline six
object complements in the text in Exercise A.
After some verbs, we can provide information about the object of a sentence using an object
complement. The object complement may be an adjective or a noun. Some verbs take only
an adjective, some take only a noun and some can take either one. After verbs that say how
we see or describe something or someone, we often use as.

Form Examples
subject + verb + object + adjective We dont consider him dangerous.
I found the situation unacceptable.
You should keep it private.
subject + verb + object + noun They should make this a priority.
The writer called him a criminal.
whats right?
They finally proved him a thief.
You cant call yourself an
subject + verb + object + as + She described him as trustworthy. expert on this subject.
noun/adjective We know him as an honest man. You cant call you an
expert on this subject.
I dont see it as a problem.

C PRACTIsE Rewrite each sentence using the word in brackets and


a structure from Exercise B.
1 Do you think identity theft is very common? (consider)

2 You cant just say you are a police officer! (call)

3 Do you think invasion of privacy is a major problem? (see)

4 Its not always easy to show that an ID is fake. (prove)

5 The press says she is a great leader. (describes)

6 Did you think the article was interesting? (find)

D NOW YOU DO IT Work in pairs. Think about how you would complete the
sentences. Then compare your ideas with your partner.
1 It makes me when 3 I consider identity theft a/an issue because
2 I find the whole question of electronic data 4 Governments should make a priority.
collection

36

0458086_OM_Advanced SB pp001-184.indb 36 27/01/2015 10:51


LISTENING: to an interview
A Read the extract from an Radio Guide Thursday 6.00pm The Whole Story
entertainment guide. What do you
think happened to Justine when This weeks The Whole Story (Public Radio, 88.6 FM) looks at the
growing problem of identity theft. It features an interview with
her identity was stolen?
Justine Black, whose identity was stolen after thieves
hacked into an online database of customers of a
B 1.12 Listen to the interview.
well-known shop. Her story raises the question of
As you listen, choose T (true) or
whether any of us are actually safe online.
F(false).
1 Justine got herself into a lot of debt. T/F
2 She found out about the identity theft immediately. T/F
3 She found it difficult to convince the bank of her innocence. T/F
4 Her own carelessness probably caused the problem. T/F
5 Justine may still face further identity problems in the future. T/F

C VOCABULARY: PHRASAL VERBS


Listen to the interview again. Completethe phrasal verbs with
theprepositions from the box.

of (x2)
onout
throughup (x3)

1 call 3 run 5 get hold 7 clear


2 take 4 end 6 get out 8 go

D VOCABULARY: PHRASAL VERBS


Complete the sentences with the correct form of the phrasal verbs from
Exercise C. In pairs, discuss what each phrasal verb means and give one more
example of how to use each one.
1 I want to some good anti-piracy software, but I dont know how.
2 The thief used my mobile phone abroad and a huge bill.
3 After losing thousands of pounds in an internet scam, Edward had to
aloan to pay his rent before the matter was and he got his money back.
4 A group of identity theft victims is the government to do more to
prevent cybercrime.
5 Some people will do anything to paying their bills.
6 Im very cautious about putting information online now; Ive been a victim of identity theft
once and I dont want to that again.
7 If you start worrying too much about internet security, youll being too
scared to do anything online.

PRONUNCIATION: connected speech final consonant sound to first vowel sound


A 1.13 Listen to the phrasal verbs. What happens to the final consonant sound of the
first word in each case? Listen again and practise saying the phrasal verbs.
Phrase: end up get out take out run up call on clear up look at
Sounds /en-dp/ /e-tat/ /te-kat/ /r-np/ /k:-ln/ /kl-rp/ /l-kt/
like:

B 1.14 Listen to the sentences. Practise saying them using connected speech.
Then practise the sentences in pairs.
1 If you take out lots of credit cards, you might run up a lot of debt.
2 If you end up in debt, its hard to get out of it.
3 Sometimes you have to call on an expert to clear up questions.

Password protected UNIT 3 37

0458086_OM_Advanced SB pp001-184.indb 37 27/01/2015 10:51


GRAMMAR: negative structures with think, suppose, etc
A 1.15 LANGUAGE IN CONTEXT Listen to the conversation.
How does Robertas attitude to privacy differ from Susans?
Susan: Are you going to post these photos on Facebook?
Roberta: I dont think so. I dont use Facebook any more. I dont feel that
everyone needs to know what Im doing all the time.
Susan: Seriously? I didnt think there was anyone who wasnt on Facebook!
Youre probably the only one.
Roberta: Im not so sure. I dont expect Im the only person who
doesnt want to have a huge digital footprint.
Susan: Well, I guess not, but I dont suppose many people actually
think about their digital footprint.
Roberta: Yeah, I dont imagine so, but people really shouldnt give out so
much personal information. It leaves them open to problems.
Susan: True. I guess I shouldnt post about everything I do.

B ANALYsE Look at the conversation in Exercise A again.


Notice!
Form & Function Read the underlined example in the conversation. Circle six different opinion
Then choose the correct option to complete the rule. Complete the verbs in the conversation.
Which of the verbs have
table with examples from the conversation. other meanings apart from
When we express negative opinions with words like think or believe, weusually feelings or opinions?
make the first / second verb negative.

Verbs Affirmative Negative


think, believe, I feel that everyone needs to know (1)
imagine, feel I thought everyone was on Facebook! (2)

hope, guess, I guess I should post about everything (3)


suspect, assume
suppose, expect I suppose many people actually think about (4)
I expect Im the only person (5)

Negative short answers


Verbs Affirmative Negative
think, believe, imagine I imagine so. (6)

hope, guess, suspect, assume I guess so. (7)

suppose, expect I suppose so. I suppose not.


I dont suppose so.

C PRACTIsE Complete each response with negative forms using the words
and phrases in brackets.
1 Are people careful enough on social networking sites such as Facebook?
No, I (suspect). I (hope / identity theft / increase).
2 Are attitudes to privacy the same now as in the past?
No, I (think). I (believe / opinions / stay) the
same forever.
3 Do you think people will give up all privacy in the future?
Well, I (hope). I (imagine / people / will give up)
their privacy easily.
4 Does Twitter play a big part in your life?
No, I (guess). I (feel / it / help) me communicate
with people.

D NOW YOU DO IT Work in pairs. Ask and answer the questions from Exercise C.
38

0458086_OM_Advanced SB pp001-184.indb 38 27/01/2015 10:51


SPEAKING: participating in a group discussion
In a group discussion, its important to keep the conversation moving. At the same
time, everyone in the group should get to express their opinion. We use various
phrases for keeping the discussion moving, for politely interrupting a speaker, to
focus on relevant points and to invite contributions.

A 1.16 Listen to a group discussing how ideas of privacy differ.


As you listen, tick the points that are mentioned.
1 I dont want anyone to invade my privacy.
2 I share more information online than my parents.
3 People have less respect for privacy nowadays.
4 Different cultures view privacy differently.
5 Opinions about privacy depend on peoples experiences.

B Listen again. Then complete the phrases.


Starting, finishing and keeping the discussion moving:
Why dont we (1) by talking/thinking about
Maybe we should (2) to talking/thinking about
(3) lets make a note of
The next point for discussion is
Interrupting politely:
(4) to stop you, but maybe we should focus on
I dont mean to interrupt you, but the issue is
Inviting contributions:
Does anyone want to (5) anything on the topic of
Id be interested to know what you think about
I dont think weve heard from

C Work in groups. Discuss points 13. Use the phrases from


Exercise B to manage the discussion. Report back to the class on
your discussion.
1 Your attitude to privacy in general
2 How you feel about online privacy
3 How you expect privacy to be affected by technology in the future
A: Why dont we start by talking about our own attitudes to privacy?
B: OK, that sounds good. I can begin. Im not too concerned about privacy. I love
sharing what Im doing and what Im thinking. And I like knowing what my friends
are doing, too. It makes me feel connected all the time, but I dont imagine
that everyone else feels the same way about it.
C: Yeah, I dont suppose everyone agrees with you. For example, I dont think

Password protected UNIT 3 39

0458086_OM_Advanced SB pp001-184.indb 39 27/01/2015 10:51


LifeSkills
PROTECTING DIGITAL PRIVACY
Understand the potential threats to digital privacy.
Think about practical steps to take to increase digital security.
Take measures to keep your online data secure.

A Think about the online services and accounts you use (email, Twitter, Facebook,
Amazon, etc). Tick which of these pieces of information about you it might be possible
tofind online.
your full name your email address your birth date
your ID/passport number your address the place where you work/study
your phone number your credit card number family member names
bank account number

B Work in pairs. Look at your answers to Exercise A. Discuss the possible consequences
of this online information getting into the wrong hands. Make a list.
People could send spam to my email address.

C Read the article. Then work in pairs.


Student A, explain in your own words advice given regarding software and browsers.
Student B, explain what advice is given about email, secure payments and privacy policies.

Protect Yourself Online


Your personal information is valuable and you should make it a priority to protect your privacy.
Here are some online safety tips to help you protect your personal information and secure your computer.
YOUR SOFTWARE Use anti-virus, anti-spyware and firewall software and make sure its up to date. Anti-virus software
protects your computer from viruses that can allow people to hack into your computer. Spyware is a software program
installed on your computer without your consent to monitor your behaviour online or record your keystrokes. Anti-
spyware software can remove or disable spyware. Firewalls help keep hackers from getting access to your computer to
send out your personal information without your permission.
YOUR BROWSER Configure your browser or operating system to manage pop-ups, cookies or block specific websites.
YOUR EMAIL Use a separate email address for online transactions. Keep the inbox you use to communicate with
friends and family free of spam by using a separate email address when you
fill in forms as you shop or conduct other transactions online.
SECURE PAYMENTS When paying for anything online,
make sure the transaction is secure. Look for the
padlock symbol in the status bar of your browser. This
will keep criminals from getting hold of your card details
and running up debts in your name.
PRIVACY POLICIES When visiting a website for the first
time, always make sure the site has a posted privacy
policy and read it. It should explain how your personal
data will be collected and used or shared with other
parties. If a website doesnt have a privacy policy,
consider doing business elsewhere.

40

0458086_OM_Advanced SB pp001-184.indb 40 27/01/2015 10:51


Self and Society
Work and Career
Study and Learning
D Work in groups. Read the question posted on an
online forum. Discuss what advice you would give the
writer and make a list of key points. Share your ideas with
the whole class.

greenhorn92 Hi guys,
Ive been reading about protecting my privacy online,
and I was hoping you could give me some ideas about
how to increase my personal security. The thing Im
most interested in is passwords. Any tips out there on
making up secure passwords and things like that? I
dont want to end up having the problems some of my
registered: friends have had!
12th October
Thanks!
posts: 51 Monday 27th March 17.40

E Work in groups. Make a list of the top three pieces


of advice you would give to someone concerned about How to say it
online privacy. Then create a combined class list of advice. To keep your password secure, you
should
F Discuss these questions. I dont think you need to
We consider a good password one
1 What have you learnt about protecting digital privacy?
that
2 Considering what youve discussed, are you planning to make any
You should make it a priority to
changes to your online habits? If so, what?
Ive found it helpful to

Research
Find an example of an internet scam or another type
of cybercrime and tell your class about it. You can
Reflect How can knowing how to find peoples stories on the internet, or you may know
protect your digital privacy be useful to you in someone personally who has been a victim of this
Work and Career and Study and Learning? type of crime.

Password protected UNIT 3 41

0458086_OM_Advanced SB pp001-184.indb 41 27/01/2015 10:51


Language wrap-up
1 VOCABULARY
Complete the paragraph with the words from the box. (12 points)

clear upcompileddatabasesend upget hold ofhackidentity theft


information ageleaves us openprivacyrun up
take out

We live in the (1) , and as we conduct more and more of our lives
online, the increased danger of other people invading our (2) has
become a hot issue. Many people argue that companies have (3)
too much data about their customers and that this (4) to cybercrime.
They point to the fact that the information is often kept on (5)
that are far from secure, and which criminals can easily (6) into to
(7) information like our bank account numbers. This may allow them
to use our information to (8) credit cards and (9)
huge debts in our names. (10) is now one of the most common
crimes, and it can take years to (11) the problems that this causes.
People can even (12) having to pay debts that they didnt create!

1012 correct: I can use words and phrasal verbs connected to privacy.
09 correct: Look again at the Vocabulary sections on pages 34, 35 and 37.SCORE:/12

2 GRAMMAR
A Choose the correct option. (5 points)
1 Did anyone see your password? No, I think not / dont think so.
2 I assume he doesnt know / dont assume he knows my password.
3 Do you change your password often enough? No, I guess not / dont guess so.
4 I think not you are / dont think you are careful enough about keeping your
password secret.
5 Has anyone hacked into your account? I hope not / dont hope so.

B Put the words in the correct order to form sentences. Add any other
words that are necessary. (5 points)
1 all / we / priority / make / privacy / need / a / .

2 careful / keep / Im / private / some things / .

3 paranoid / me / can call / you / but / never / use / I / public computers / .

4 privacy / describe / you / would / important / to you / ?

5 finally / guilty / him / they / found / identity theft / .

810 correct: I can use object complements and negative structures, including
negative short answers.
07 correct: Look again at the Grammar sections on pages 36 and 38. SCORE:/10

42

0458086_OM_Advanced SB pp001-184.indb 42 27/01/2015 10:51


writing a
Writing Workshop for-and-against essay

A Read the essay about using social media. Is the writer generally in
favour of social media or against it? How do you know?

Do you believe that social media has primarily positive or negative effects on society?
Give reasons for your opinion.
We live in the information age, and these days there are very few people, especially young people, who do not
consider social media an important part of their lives. However, the fact that many people use social media does
not mean that it is a positive development for society.
Of course, there are good arguments in favour of social media. People can find old friends that they had lost
contact with. Its easy to stay in touch with friends and family who live far away, and you can easily share photos or
videos with them, which makes people feel closer to each other.
However, there are a number of problems with social media. Because people want to be connected 24/7, many
people now spend more time communicating with their electronic devices than in person. The effect of this is that
communication is becoming very impersonal. Also, when you use social media, you put an enormous amount
of information about yourself into cyberspace for anyone to see. That can result in data theft or even blackmail.
Finally, people are spending more and more time using electronic devices, and less and less time doing physical
activities. This is contributing to a worldwide obesity problem.
To summarise, although using social media allows us to communicate easily, it has many disadvantages.
Therefore, I believe that people should reduce the amount of time they spend using social media. Furthermore,
they should be very careful about how much information they share with the world.

B Look at the essay again and find these things.


Paragraph 1:
The main idea of the whole essay.
Paragraph 2:
The topic sentence of the paragraph. Is this in favour of or against the main idea?
Points that support the topic sentence. How many points are there?
Paragraph 3:
The topic sentence of the paragraph. Is this in favour of or against the main idea?
Points that support the topic sentence. How many points are there?
Paragraph 4:
A general statement of the writers opinion.

C Prepare a four-paragraph essay to answer the question in the box.


First, make notes on these points.

Do you think governments and businesses should be allowed to collect data such as
what phone numbers we call, what we buy and where we shop, and what types of
searches we do on the internet? Why or why not?

the main idea of the whole essay


the topic sentence of paragraph 2 HOW ARE YOU DOING?
points that support the topic sentence I have stated my general opinion in the
the topic sentence of paragraph 3 introduction and re-stated it in the conclusion.
points that support the topic sentence
I have written one paragraph in favour of the
a general statement of your opinion topic and one paragraph against the topic.
I have used words of addition (furthermore,
D Use your notes to write your essay. also) and cause-effect (because, as a result).
Writeabout 250 words.

Password protected UNIT 3 43

0458086_OM_Advanced SB pp001-184.indb 43 27/01/2015 10:51

You might also like