'Mapping, And Sharing, The Consumer Genome' By Natasha Singer

Improved Essays
Mapping, and Sharing, the Consumer Genome Analysis Someone knowing who you are, what you like, and where you live is such a scary thought. In the article entitled “Mapping, and Sharing, the Consumer Genome”, Natasha Singer explains who this someone is, this someone is the company named Acxiom. Acxiom is a huge data collecting company, collection data on consumers. Singer gave readers a better understanding of what the consumer genome is and how it is being used every day. However to get a better understanding of this reading readers must analysis the text. Analysis Singers points, techniques, and the overall importance of the text to get a complete understanding.
Consumer Genome
In Conway, Arkansas there are over 23,000 computers collecting
…show more content…
One main point includes the fine line between stalking and customization. Acxiom collects data based on the consumer’s patterns and behaviors. In the article it explains how a journalist had to be aware of computer hackers, and to be more cautious as to who to give information to. Also, as to what is the argument Singer is making. Singer isn’t really making an argument, rather than raising a question. A question whether or not the practice of data mining that the company Acxiom practices is legal or not, and if it should be used. Singer uses multiple different techniques to persuade such as bias, emotional appeal, and fact. Singer uses bias to persuade the readers when she states Mr. Huge is a savvy single, meaning he banks online, is an upper class man and attends pro sports events. Singer uses emotional appeal when saying, Acxiom helped find 11of the 19 hijackers in the 2001 terrorist attacks. When Singer refers to Mr. Ward starting his company she is using fact to persuade. The tone Singer uses in “Mapping, and Sharing, the Consumer Genome” is concerned, concerned about how the system works and exactly how much information Acxiom actually has about the consumers. Some examples of this in the text is “fine line between customization and stalking”, “without asking their permission”, “people’s concerns about privacy” and “set off alarm bells” Singer (2012). …show more content…
Such as if this topic is important, was the text controversial and useful, and also the strengths and weaknesses of the author. Singer raises the importance of all of the companies having your personal information could make it easier for to retain your information. Also the importance of how Acxiom’s practices may be an invasion of privacy. These are all issues today due to companies and consumers being hack all the time. Also this text being controversial in the way that many consumers think data mining is a direct invasion of privacy instead of a way to be useful to companies to sell more product. This article however is very useful due to the fact it lets the consumers see the companies thoughts on data mining, and how this practice may not be an invasion of privacy but an aid for companies. Furthermore, Singers strengths include grabbing the attention of readers right away. An example is in the first sentence when Singer states “It knows who you are. It knows where you live. It knows what you do.” Singer (2012). Readers automatically want to know who “it” is. One weakness is the choice of topic. Not very many readers may be interested upon reading the title “Mapping, and Sharing, the Consumer Genome”. Also the Singers information isn’t very credible and information isn’t backed up well. However, the overall text importance is based on how

Related Documents

  • Improved Essays

    A strong feeling of disgust and shock is subtly incited in her text. The comparison of biosurveillance technology to a dystopian film is a foreboding feeling, like before someone dies in a horror film or watching a car crash in slow motion. As the author makes these subtle insults to MIT Tech labs and throwing the Supreme Court under the bus by using an example of a law that was passed yet goes against the Amendment IV, the right to privacy. She is making the audience feel distrust towards this concept of “people analytics” and sympathetic towards those that must undergo this crime, such as bank employees or even sports customers like NFL teams (Parramore). Parramore’s conception of emotional influence is vast and she creates a very persuasive…

    • 1002 Words
    • 5 Pages
    Improved Essays
  • Decent Essays

    The use of rhetorical devices, ethos pathos, and logos will make a stong case about the collecton and sale of personal data. Each article consists of ethos, pathos and logos. " Private License Plate Scanners Amassing Vast Databases Open to Highest Bidders” has an overall better claim and use of those rhetorical…

    • 249 Words
    • 1 Pages
    Decent Essays
  • Improved Essays

    Therefore, he continues, “all we’re doing is setting ourselves up to be sold to - to be branded, targeted, and data-mined,” by corporations. Ellis believes that by acting this way, we are slowly going under corporate regulation. This regulation informs us how to behave and express ourselves acceptably in today’s society. Ellis also states that social networks prevent people from individual expression, as they yearn to be liked by everyone. This causes one to create an unrealistic online personality.…

    • 815 Words
    • 4 Pages
    Improved Essays
  • Decent Essays

    Analysis: Blown To Bits

    • 312 Words
    • 2 Pages

    Chapter two of Blown to Bits by Hal Abelson, Ken Ledeen, and Harry Lewis was about how technology affects our privacy. In this chapter, the authors discussed how our privacy is being stripped away, the willingness with which we give this privacy away, and privacy policies. As experts in technology, Abelson, Ledeen, and Lewis discuss how technology has aided this progression of human ideologies to lead increasingly more public lives. Our privacy is constantly being stripped away from us thanks to the technological innovations. As technology becomes more and more widely used, more and more personal information is being stored through technological means.…

    • 312 Words
    • 2 Pages
    Decent Essays
  • Improved Essays

    Should Stores Be Allowed to Spy on You? Imagine that people are shopping at their favorite stores, all the time, and they are being watched secretly. Surveillance cameras are the equipment which records their every move such as where they go, what they look at, and what they buy. This has certainly already happened to people every day. Although some people consider the surveillance of customers by retail anthropologists is manipulative and unethical, others think it is reasonable and acceptable because it provides many valuable ways that include understanding the customers’ behaviors and satisfying their needs timely, helping the store managers to develop their business, and setting up the appropriate strategies in competition with the others.…

    • 1061 Words
    • 5 Pages
    Improved Essays
  • Improved Essays

    He goes on to explain that social media is designed for the information to be shared and mined for profit. Social media, according to the author, is built on the antithesis of privacy. Edmond’s point in this paragraph stumbles in the main argument. Data being sold to a company is different than allowing an employer to have access to your Facebook password. Data sold to a company is sorted through to find people with interests related to their product to target advertisements.…

    • 1331 Words
    • 6 Pages
    Improved Essays
  • Improved Essays

    Through a vast majority of the services we utilize daily, most of which often appear innocuous, data about users is collected and distributed to third parties. In the article “A Day in the Life of Big Brother”, Sherman guides the reader through the daily routine of an individual, referred to as J. Doe, and their interactions with a plethora of services that most individuals utilize daily. First, J. Doe wakes up and reads the news through Google. Google, and his Internet Service Provider, use analytical tools, such as cookies, to follow Doe’s reading habits online and use that information to analyze his preferences. Following this, Doe commutes to work through a state that utilizes electronic toll ways, which follow and record his path.…

    • 824 Words
    • 4 Pages
    Improved Essays
  • Decent Essays

    Consumerism In Feed

    • 55 Words
    • 1 Pages

    Consumerism is effectively commented upon in M.T. Anderson’s novel, Feed. The author uses grotesque lesions that appear on people’s bodies and intrusive advertisements via devices implanted in their brains to comment on the pervasiveness of consumerism in our world today. The Feed in one huge source of technology that is implanted in the human's head.…

    • 55 Words
    • 1 Pages
    Decent Essays
  • Improved Essays

    Today, more and more Americans communicate and work online (Shamshi, n.d.). People use the internet for banking, emailing, making doctors appointments, going to school, and using social media. Telecommunication companies and cable companies have developed a new business model relies on collecting and selling information from their users. Email providers and social media websites store chat logs of users, and mine information from them.…

    • 859 Words
    • 4 Pages
    Improved Essays
  • Improved Essays

    The marketing strategies primary role is to get a consumer to adopt elevated consumption of a product for the purpose of improving a firm 's revenue and profit maximization (Ferrell & Hartline, 2005). Other than just an act of randomly placing advertisements for consumers to read and see, marketing strategies go far beyond this point giving a strategic presentation of a product mix that will appeal to the target groups. For this part, an explicit discussion of the market research strategies that are highlighted in the documentaries “The Persuaders” is presented. This portion will further discuss the on the ethicality of this strategies and if they can be applicable in today 's market in 2015. In this documentary, the highlights on evident…

    • 855 Words
    • 4 Pages
    Improved Essays
  • Improved Essays

    In the essay entitled “George Orwell…Meet Mark Zuckerberg”, Lori Andrews discusses the malicious power of data aggregation and targeted advertising, and its immorality. She highlights the dangers of companies tailoring to specific demographics, and through her writing style, attempts at building trust with her readers. Andrews argues that the techniques used in targeted advertising and data aggregation are immoral, however she employs similar tactics to make her point. Andrews caters to a specific audience using jargon, as well as personal appeal to shock the technologically inexperienced with burdensome truths. Andrews begins her attack on the audience by first lulling them into a false sense of security, and then pouncing with powerful evidence.…

    • 758 Words
    • 4 Pages
    Improved Essays
  • Improved Essays

    To support this we look at Nicholas Thompson’s article “Bigger Brother: The Exponential Law of Privacy Loss.” Thompson argues that the internet is designed to collect information from people therefore, even with privacy laws in place, owners of sites will continue to find creative ways to socially connect people (Thompson 284). He continues by referencing software designed by carrier IQ that is specifically created to track searches, locations, and purchases. Thompson states that the purpose of this software is to better enhance the network as well as peoples average everyday lives (285). Nicholas later goes into detail explaining the exponential law of privacy loss.…

    • 974 Words
    • 4 Pages
    Improved Essays
  • Great Essays

    With the continuing development of the Internet, the center stage of individual, business, and government discussions became a new globally sought after resource, data. Since its origin, Internet users have been warned about the dangers of posting personal, intimate information publicly; however, recent events have shifted privacy discussions away from discouraging posting ill-advised information to bringing awareness to under the radar data collection. Data is a very broad term that encompasses almost all Internet activity. What users search, click, view, and type is all collected and processed by either the website, Internet browser, or even the device itself. The demand for this personal data is enormous.…

    • 1224 Words
    • 5 Pages
    Great Essays
  • Improved Essays

    Today’s internet has become an integral part of our daily lives. It changed the world in so many positive ways, but it has also a negative side to it. The negative issues that we are facing today with internet are our online privacy and data breaches. Recently, many people were divided in terms of their strong views about the importance of privacy and the exchange “between security needs and personal privacy” (Rainie & Maniam, 2016) as millions of Americans were also affected by online threats and privacy breaches and at the same time concerned with our security. The focus has been on government monitoring, although there are some other significant issues and concerns about how industries use our data.…

    • 952 Words
    • 4 Pages
    Improved Essays
  • Superior Essays

    With the collapse of the honest brand made the loyal clients felt disappointed. Another example, with the intelligence and acumen of the leaders, Apple don’t give up to develop and design the new products not to be disappointed for their customers because the improvement is updated continuously. Then, Iphone 7 is the proof for studying and developing is useful. If they don’t follow the tendency of the society, they won’t be supported by many fans around the world. Thus, the surveillance of consumers by retail anthropologists isn’t manipulative and unethical because it helps the retailers build a plan to complete with other…

    • 1091 Words
    • 5 Pages
    Superior Essays