- •Unit 1. Employment Issues
- •Vocabulary and Listening
- •Vocabulary and Reading
- •Active Participation of Women in the Labour Force
- •Unit 2. Public Relations
- •Vocabulary and Reading
- •Unit 3. Spending on Education
- •Vocabulary and Listening
- •Investing in Brains
- •University fees
- •Unit 4. Corporate Morals. The Psychology of Power
- •Only the little people pay taxes...
- •Vocabulary
- •Unit 5. A Competitive Spirit in Business
- •Unit 6. The World Economy. New Dangers
- •Supply chains in China
- •Unit 7. Innovations
- •Opting for the quiet life
- •Vocabulary and Reading
- •Innovations in cell phones
- •Unit 8. Joint Bosses. The Trouble With Tandem
- •Vocabulary and Listening
- •Vocabulary
- •Unit 9. Storing and Managing Economic Information
- •Vocabulary and Reading
- •Unit 10. Food Production and Consumption
- •Vocabulary and Reading
- •Genetically modified food Attack of the really quite likeable tomatoes
- •More than strange fruits
- •Unit 11. Economy and Environment. Climate Change
- •Vocabulary and Listening
- •For peat’s sake, stop
- •Spin, science and climate change
- •Insuring against catastrophe
- •Unit 12. Intellectual Property Rights and Music Piracy
- •Vocabulary and Reading
- •How to sink pirates
- •Appendix 1. Role Plays
- •1. Read the situation:
- •2. Choose your role:
- •3. Study your role and get ready to present it:
- •1. Read the situation:
- •2. Choose your role:
- •3. Study your role and get ready to present it:
- •1. Read the situation:
- •2. Choose your role:
- •3. Study your role and get ready to present it:
- •1. Read the situation:
- •2. Choose your role:
- •3. Study your role and get ready to present it:
- •1. Read the situation:
- •2. Choose your role:
- •3. Study your role and get ready to present it:
- •1. Read the situation:
- •2. Choose your role:
- •3. Study your role and get ready to present it:
- •1. Read the situation:
- •2. Choose your role:
- •3. Study your role and get ready to present it:
- •1. Read the situation:
- •2. Choose your role:
- •3. Study your role and get ready to present it:
- •Unit 1. Employment Issues.
- •Unit 2. Public Relations
- •Unit 3. Spending on Education. Investing in Brain
- •University fees
- •Unit 4. Corporate Morals. The psychology of Power
- •Corporate crime is on the rise The rot spreads
- •Unit 5. A Competitive Spirit in Business Spit and polish
- •Unit 6. World Economy. New Dangers
- •Supply chains in China
- •Unit 7. Innovations
- •Unit 8. Joint Bosses. The Trouble With Tnadem
- •Unit 9. Storing and Managing Economic Information The data deluge
- •Unit 10. Food Production and Consumption
- •A hill of beans
- •Unit 11. Economy and Environment. Climate Change For peat’s sake, stop
- •Unit 12. Intellectual Property Rights and Music Piracy Singing a different tune
- •Bibliography
- •Contents
- •Вопросы мировой экономики/world economy issues
- •400131, Волгоград, просп. Им. В. И. Ленина, 28.
- •400131 Волгоград, ул. Советская, 35.
Vocabulary and Reading
Exercise 2. You are going to read the report on the problem of report on storing and managing economic information. Match English phrases with their Russian equivalents:
1. to restrict the flow of data |
обрабатывать данные |
2. Big Brotherishness |
ухватиться за возможность |
3. suspicious claims |
ограничивать поток данных |
4. law-enforcement agencies |
подозрительные заявки |
5. to identify fraudulent purchase |
контролировать каждую покупку |
6. to monitor every purchase |
выявлять мошеннические покупки |
7. to grasp the opportunity |
правоохранительные органы |
8. data deluge |
разведывательная служба |
9. an intelligence agency |
несанкционированный доступ |
10. privacy breech / privacy infringement |
адаптировать предложение товара в соответствии с конкретными предпочтениями покупателей |
11. to crunch data |
диктатура |
12. to pose risk |
наплыв информации |
13. to tailor promotions to particular customers’ preferences |
представлять угрозу |
14. foul play |
непреднамеренно |
15. unwittingly |
грязная игра |
Exercise 3. Read the first part of the report on storing and managing economic information and decide if the following statements are true (T) or false (F):
The quantity of information in the world is soaring.
The data deluge is already starting to transform business, government, science and everyday life.
Credit-card companies monitor every purchase and can identify fraudulent ones with a high degree of accuracy.
Stolen credit cards are more likely to be used to buy wine.
Retailers fail in data mining.
Online advertising is already far more accurately targeted than the offline sort.
Business intelligence is one of the slowest-growing parts of the software industry.
Eighteen months ago, Li & Fung, a firm that manages supply chains for retailers, saw 100 gigabytes of information flow through its network each day. Now the amount has increased tenfold.
Everywhere you look, the quantity of information in the world is soaring. According to one estimate, mankind created 150 exabytes (billion gigabytes) of data in 2005. This year, it will create 1,200 exabytes. Merely keeping up with this flood, and storing the bits that might be useful, is difficult enough. Analysing it, to spot patterns and extract useful information, is harder still. Even so, the data deluge is already starting to transform business, government, science and everyday life (see our special report in this issue). It has great potential for good – as long as consumers, companies and governments make the right choices about when to restrict the flow of data, and when to encourage it.
Plucking the diamond from the waste
A few industries have led the way in their ability to gather and exploit data. Credit-card companies monitor every purchase and can identify fraudulent ones with a high degree of accuracy, using rules derived by crunching through billions of transactions. Stolen credit cards are more likely to be used to buy hard liquor than wine, for example, because it is easier to fence. Insurance firms are also good at combining clues to spot suspicious claims: fraudulent claims are more likely to be made on a Monday than a Tuesday, since policyholders who stage accidents tend to assemble friends as false witnesses over the weekend. By combining many such rules, it is possible to work out which cards are likeliest to have been stolen, and which claims are dodgy.
Mobile-phone operators, meanwhile, analyse subscribers’ calling patterns to determine, for example, whether most of their frequent contacts are on a rival network. If that rival network is offering an attractive promotion that might cause the subscriber to defect, he or she can then be offered an incentive to stay. Older industries crunch data with just as much enthusiasm as new ones these days. Retailers, offline as well as online, are masters of data mining (or “business intelligence”, as it is now known). By analysing “basket data”, supermarkets can tailor promotions to particular customers’ preferences. The oil industry uses supercomputers to trawl seismic data before drilling wells. And astronomers are just as likely to point a software query-tool at a digital sky survey as to point a telescope at the stars.
There’s much further to go. Despite years of effort, law-enforcement and intelligence agencies’ databases are not, by and large, linked. In health care, the digitisation of records would make it much easier to spot and monitor health trends and evaluate the effectiveness of different treatments. But large-scale efforts to computerise health records tend to run into bureaucratic, technical and ethical problems. Online advertising is already far more accurately targeted than the offline sort, but there is scope for even greater personalisation. Advertisers would then be willing to pay more, which would in turn mean that consumers prepared to opt into such things could be offered a richer and broader range of free online services. And governments are belatedly coming around to the idea of putting more information-such as crime figures, maps, details of government contracts or statistics about the performance of public services – into the public domain. People can then reuse this information in novel ways to build businesses and hold elected officials to account. Companies that grasp these new opportunities, or provide the tools for others to do so, will prosper. Business intelligence is one of the fastest-growing parts of the software industry.
(“The Economist”, February 27th 2010)
Exercise 4. Comprehension check. Answer the following questions:
How has the amount of information flow increased recently?
Are storing bits of information and extracting useful information equally complicated?
In what case does data deluge have great potential for good?
Are insurance firms good at combining clues to spot suspicious claims?
When are fraudulent claims likely to be made? Why?
Why do mobile-phone operators analyse subscribers’ calling patterns?
Are law-enforcement and intelligence agencies’ databases linked anyway?
What is the typical result of large-scale efforts to computerize health records?
What idea are governments belatedly coming around?
Exercise 5: Study the report again (Exercise 3) and find the adequate English equivalents of the following words and phrases: 1) в десять раз, 2) стремительно повышаться, 3) выявлять, 4) застрахованное лицо, 5) нечестный, 6) изменить (переметнуться в лагерь противника), 7) база данных, 8) целиться, 9) запоздало, 10) лавина данных, 11) лжесвидетель, 12) здравоохранение, 13) в свою очередь, 14) добыча данных.
Listening
Exercise 6. You are going to listen to the report on storing and managing economic information. Match the words and phrases with their definitions:
1. to disclose |
the characteristic of being easy to see through |
2. to hand over |
the right to use or look at something |
3. to stifle innovation |
to give information to people, especially information that was secret |
4. to take something seriously |
to restrain new developments |
5. a sinister threat |
to treat something very attentively |
6. access to something |
stealing someone’s identification information |
7. transparency |
to give, to deliver |
8. to pose risk |
a disadvantage or the negative part of a situation |
9. to compel |
a person or company that sells goods directly to the public for their own use |
10. intricate regulation |
to cause the possibility of something bad happening |
11. a drawback |
to make somebody do something |
12. a retailer |
very detailed or complicated rule |
13. an identity theft |
ominous danger |
Exercise 7. Listen to the second part of the report on storing and managing economic information and say what risks are mentioned regarding the data deluge and what solutions are offered (“The Economist”, February 27th 2010).
Exercise 8. Listen to the report again and fill in the gaps in the script below using the target vocabulary (Exercise 6):
But the data deluge also ______________. Examples abound of databases being stolen: disks full of social-security data go __________, laptops loaded with tax records are left in taxis, credit-card numbers are stolen from online retailers. The result is privacy breaches, ____________________ and fraud. Privacy infringements are also possible even without such foul play: witness the periodic fusses when Facebook or Google unexpectedly change the privacy settings on their online social networks, causing members to reveal personal information unwittingly. A more ______________________ comes from Big Brotherishness of various kinds, particularly when governments compel companies to hand over personal information about their customers. Rather than owning and controlling their own personal data, people very often find that they have lost control of it.
The best way to deal with these ______________ of the data deluge is, paradoxically, to make more data available in the right way, by requiring greater transparency in several areas. First, users should be given greater ____________ to and control over the information held about them, including whom it is shared with. Google allows users to see what information it holds about them, and lets them delete their search histories or modify the targeting of advertising, for example. Second, organisations should be required to disclose details of security breaches, as is already the case in some parts of the world, to encourage bosses to __________ information security more seriously. Third, organisations should be subject to an annual security audit, with the resulting grade made public (though details of any problems exposed would not be). This would encourage companies to keep their security measures up to date.
Market incentives will then come into play as organisations that manage data well are favoured over those that do not. Greater transparency in these three areas would improve security and give people more control over their data without the need for intricate regulation that could ___________________. After all, the process of learning to cope with the data deluge, and working out how best to tap it, has only just begun.
Exercise 9. Translate the following sentences into English using the target vocabulary (Exercises 2, 5, 6):
Задача правоохранительных органов – бороться с противоправными действиями граждан.
Многие банки контролируют каждую покупку держателей кредитных карт, что позволяет им с высокой степенью точности выявлять мошеннические покупки.
Открытые базы данных позволяют извлекать полезную информацию не только спецслужбам, но и мошенникам.
Для стремительного повышения объема продаж необходимо адаптировать предложение товара в соответствии с конкретными предпочтениями покупателей.
Застрахованное лицо симулировало несчастный случай на производстве.
За нечестный поступок его уволили из системы здравоохранения.
Новое программное обеспечение дает возможность в десять раз увеличить скорость обработки данных.
Exercise 10. Paraphrase the following sentences using the target vocabulary (Exercises 2, 5, 6):
It would be foolhardy to restrain new developments through excessive bureaucracy and appeal processes.
She made him steal his partners’ identification information.
The Foundation Trust can continue to operate with information provided under an alias.
Are our personal collections of data in an ominous danger?
One of the main disadvantages of a child’s surfing the Internet is that the uncontrolled right to use it can lead to serious psychological problems.
Speaking
Exercise 11. Divide into two groups. Brainstorm a list of all advantages and disadvantages of the data deluge. Compare your ideas and share your personal experience of using and protecting information.
Exercise 12. Free discussion.
a) Answer the following questions. Give your opinion and justify it.
1) How do you understand the term “business intelligence”?
2) What risks might be posed by data deluge?
3) Do you believe that making data of any kind more available and transparent can lead to better security of personal information?
b) Write down a short summary based on the results of the discussion.
Exercise 13. Role play“Security Audit in Google Corporation”.
Turn to page 108 to choose your role and get ready to present it.
