Consumer Genome
In Conway, Arkansas there are over 23,000 computers collecting …show more content…
One main point includes the fine line between stalking and customization. Acxiom collects data based on the consumer’s patterns and behaviors. In the article it explains how a journalist had to be aware of computer hackers, and to be more cautious as to who to give information to. Also, as to what is the argument Singer is making. Singer isn’t really making an argument, rather than raising a question. A question whether or not the practice of data mining that the company Acxiom practices is legal or not, and if it should be used. Singer uses multiple different techniques to persuade such as bias, emotional appeal, and fact. Singer uses bias to persuade the readers when she states Mr. Huge is a savvy single, meaning he banks online, is an upper class man and attends pro sports events. Singer uses emotional appeal when saying, Acxiom helped find 11of the 19 hijackers in the 2001 terrorist attacks. When Singer refers to Mr. Ward starting his company she is using fact to persuade. The tone Singer uses in “Mapping, and Sharing, the Consumer Genome” is concerned, concerned about how the system works and exactly how much information Acxiom actually has about the consumers. Some examples of this in the text is “fine line between customization and stalking”, “without asking their permission”, “people’s concerns about privacy” and “set off alarm bells” Singer (2012). …show more content…
Such as if this topic is important, was the text controversial and useful, and also the strengths and weaknesses of the author. Singer raises the importance of all of the companies having your personal information could make it easier for to retain your information. Also the importance of how Acxiom’s practices may be an invasion of privacy. These are all issues today due to companies and consumers being hack all the time. Also this text being controversial in the way that many consumers think data mining is a direct invasion of privacy instead of a way to be useful to companies to sell more product. This article however is very useful due to the fact it lets the consumers see the companies thoughts on data mining, and how this practice may not be an invasion of privacy but an aid for companies. Furthermore, Singers strengths include grabbing the attention of readers right away. An example is in the first sentence when Singer states “It knows who you are. It knows where you live. It knows what you do.” Singer (2012). Readers automatically want to know who “it” is. One weakness is the choice of topic. Not very many readers may be interested upon reading the title “Mapping, and Sharing, the Consumer Genome”. Also the Singers information isn’t very credible and information isn’t backed up well. However, the overall text importance is based on how