1 Identity - Keynote

2y ago
107 Views
14 Downloads
4.62 MB
10 Pages
Last View : 8d ago
Last Download : 3m ago
Upload by : Mariam Herr
Transcription

1Identity1.1 4 04, the story of a pagenot foundIn 1990, RENNY GLEESON graduated from Yale University with a BA in Fine andStudio Arts. He then earned his MFA (Master of Fine Arts) from the University ofPennsylvania, graduating in 1993. After working for some years as a gamedesigner and animator, he joined the global advertising agency Saatchi& Saatchi. It was 1997 and the Internet was still new, but expertscould see its potential for advertising. Gleeson helped to set up DarwinDigital, an interactive marketing division of Saatchi & Saatchi, and heworked as its Creative Director until 1999. Gleeson began working forthe National Basketball Association (NBA) in 2001 as their Senior Directorof Global Media. In 2006, he joined advertising agency Wieden Kennedy,where he is the Global Director of Interactive Strategies. Gleeson’s creativebackground and experience drive his success in developing strong relationshipsbetween brands and customers.CAREER PATHWAYS1 Read the text. Match the questions (1–5) and answersRenny Gleeson3 Complete the sentences with the words in the a–g). Two answers are not used.1 What was the first university degree that Renny Gleeson earned?2 Darwin Digital is part of which company? 3 When did Gleeson leave Saatchi & Saatchi? 4 In which organization was he the Senior Director of Global Media?5 Which company does he work for now? abcdefgNBA1997BA1999Saatchi & SaatchiWieden KennedyMFATED PLAYLIST2 Other TED speakers are interested in topics similar toRenny Gleeson’s TED Talk. Read the descriptions of fiveTED Talks at the top of page 5. In your opinion, which isthe best title for this playlist, a, b or c?a The science of the Internetb The dangers of the Internetc The Internet as a community1 Margaret Gould Stewart describes how the combinationhelp the design process.of art and2 Steven Johnson explains how the different areas ofseparately ascities, just like the Internet,well as together.3 According to Clay Shirky, big companies work betterwhen they are run in an open way with more flexible.4 Jimmy Wales talks about Wikipedia as a group effort run.by various5 Jonathan Zittrain illustrates how online strangers often.treat each other with4 Choose the correct definition (a or b) of these words fromthe TED playlist.1 globala regional   b worldwide2 independentlya relying on outside support   b without other support3 benefitsa advantages   b issues4 monitora improve; update   b observe; keep an eye on5 rewarda something which is given to repay a favour or kindnessb help which is given when someone is in difficulty4B2 WB 02 unit01 004-011 ptg01.indd 421/01/16 9:51 AM

Steven Johnson: The Web as a citySteven Johnson compares the Internet to a city. It is builtand shared by many people, but it is completely controlledby no one. Like a city, although its various parts are closelyconnected, many of them function independently. Even whenone area is experiencing serious problems, the other areascontinue as normal.Clay Shirky: Institutions vs. collaborationalways handled by closed groups. Using major websitessuch as Flickr and Wikipedia as examples, Shirkydemonstrates the benefits of replacing tight systems withlooser practices in which small contributors have biggerroles, and co-operation is more open and flexible.When design is on a global scale, how do you pleaseeveryone? Margaret Gould Stewart describes the challengeof designing elements, such as the Facebook ‘like’ button,which are seen and used billions of times every day. Sheexplains how the art of creating good design is informed bythe science of understanding and meeting the needs of overa billion Facebook users.Unit 1 Identity Margaret Gould Stewart: How giant websites design for you(and a billion others, too)Jimmy Wales: The birth of WikipediaJimmy Wales talks about how he provided a mixed groupof volunteers with the tools to create the free, onlineencyclopedia that we all know as Wikipedia. He describesthe community spirit at Wikipedia, where everyone workstogether to develop, maintain and monitor the site.Jonathan Zittrain: The Web as random acts of kindnessWe hear many negative stories about how people treat eachother cruelly on the Internet, but Jonathan Zittrain provides adifferent view. He presents various acts of Internet kindness,carried out by complete strangers for absolutely no rewardexcept the knowledge that they are doing the right thing.Clay Shirky recognizes the value of changing the traditionalbusiness model in which planning and management are5 Which talk would you most like to see? Why? Watch thetalk at TED.com.AUTHENTIC LISTENING SKILLSRecognizing key terms61 1 You are going to hear a podcast in whicha member of the Keynote team talks about JonathanZittrain’s TED Talk, The Web as random acts of kindness.Read these extracts from the podcast. How would youpronounce the words in bold? Then listen and check.1 and even though so many of us are ‘connected’ 24/7on some device or other 2 but you can always block or unfriend those guys.3 So, it’s not just about trolls and identity theft 4 tons of times I’ve witnessed situations LISTENING71 2 Listen to the full podcast. Are the sentencestrue (T) or false (F)?1 Overall, Eunice agrees with the main points made in Zittrain’s TED Talk.2 Eunice has personally observed strangers being kind to each other online.3 Eunice points out that we all follow strict rules when we are online.4 Eunice wishes that Zittrain had brought more humour into his TED Talk.81 2 Listen again. Choose the correct option tocomplete the sentences.1 Eunice likes how Zittrain’s talk confirms / alters her beliefthat people can be kind to each other online.2 She explains how Zittrain demonstrates an online senseof community by mentioning sites such as Facebook andTwitter / Couchsurfing and Craigslist.3 According to Eunice, Zittrain makes the web seem morestrict / human.4 Zittrain provides an example of how the Internetcommunity saved a young man’s embarrassment /website.5 Eunice particularly likes Zittrain’s presentation style,which is amusing / entire and clear.VOCABULARY IN CONTEXT9 Read the extracts from the podcast. Choose the correctmeaning of the words in bold.1 We’re constantly being told that it’s making us lonelier a neverb alwaysc sometimes2 . that’s true to some extent, but it’s not the whole a in partb in fullc in exceptional cases3 . it’s very easy to criticize, but what about a say bad things b be cruelc misunderstand4 . tons of times I’ve witnessed situations a a few timesb all the time c many times5 Zittrain makes the vast web seem a hugeb scaryc tiny5B2 WB 02 unit01 004-011 ptg01.indd 521/01/16 9:51 AM

1.2 Building identityGRAMMAR Present tenses: activeand passive1 Match the sentence halves to make correct statements.Then decide if each statement is active (A) or passive (P).1 These days, manypeople area different identities on differentsites.2 Others share lots ofpersonalb are checked by potentialemployers.3 Experts are advisingc hiding their real identityonline.4 Some people used people to protect their identityonline.5 Privacy settings arebeinge increased by many Facebookusers today.6 Sometimes, socialmedia accountsf information on socialnetworking sites.2 Choose the correct form of the verb to completethe sentences.1 Nowadays, more and more companies are being used /are using video ads to boost their online identity.2 These video ads are posted / are posting on majorwebsites such as newspaper sites or TV channels.3 Video ads post / are being posted on social-networkingsites, too.4 Over 12% of all videos that are being viewed / areviewing online are video ads.5 One video advertising company, LiveRail, is posted / isposting more than seven billion video ads a month.6 LiveRail is being owned / is owned by Facebook.7 It is believed / believe that Facebook paid more than 400 million for LiveRail.3 Choose the correct options to complete the paragraph.Instead of traditional interviews, video interviews 1 areusing / are being used by more and more companiesthese days. These video interviews 2 are seen / are seeingas an effective way to decide which candidates should beinvited to the next stage in the interview process. Whilemany video interviews are interactive, that is, where thecandidate and the interview panel 3 are spoken / speakto each other live, another type of video interview 4 isbecoming / becomes more popular nowadays. This is thepre-recorded video interview, where a question 5 is beingsent / is sent to the candidate in advance. The candidatethen 6 is filming / films himself or herself answering thequestion. Usually the video file 7 is emailed / emails tothe company, and the candidate 8 is waiting / waits forfeedback.41 3 Complete the conversation with the correctform of the verb in brackets. Then listen and check.a video interview at theA: So, Sam 1moment. (do)scary. I’d be incredibly nervous!B: That 2(sound)the questions inA: Well, the candidate 3advance, so that helps. (give)over theB: And this type of interview 4Internet? (do)by the company. (film)A: Yes, exactly. It 5well. (go)B: Wow, I hope it 6A: Me too.GRAMMAR EXTRA! The passive form5 Rewrite these active sentences using the passive form.1 Online shopping is replacing traditional shopping in someplaces.by onlineTraditional shoppingshopping in some places.2 Currently, adults under the age of 35 are spending a lotof money online.online byCurrently, a lot of moneyadults under the age of 35.3 Social media provides a link between online shoppersand brands.A link between online shoppers and brandsby social media.4 Fewer people use their smart phones to order goods online.by fewer people toSmart phonesorder goods online.5 Many online stores are reporting new trends.by many online stores.New trends6 Usually, a strong brand identity attracts more customers.by aUsually, more customersstrong brand identity.6B2 WB 02 unit01 004-011 ptg01.indd 621/01/16 9:51 AM

4 a The latest software doesn’t function like the old version.b He’s going to an office function and then to the airport.phrases in bold (1–8).5 a I estimate that it will take about two years to buildthe brand.b This is just an estimate, but we’re confident aboutthe numbers.Unit 1 Identity6 Read the text. Correct the mistakes in the words or6 a We have the potential to develop more products like this.b There’s a potential issue with this item, but we can fix it.DICTATIONOnline identityMore studies 1 is being done which show that the waypeople normally behave is not the way they tend to behaveonline. This 2 is seeing on social-networking sites inparticular, where many of us publicly 3 shares details aboutour everyday lives. While some people 4 are upload photosthat make their family and home appear perfect, others5are being posted cruel status updates and comments.It 6 is claims by some experts that self-esteem may be thecause of bad behaviour on social-networking sites. If onlineinteraction 7 make people feel better about themselves,they may continue to present a version of their life that ismore positive than the reality. Equally, when a person 8 arepresented with the idea that everyone else is happier thanthey are, it is not unusual for them to feel miserable or angry.12345678PRONUNCIATION Word stress71 4 Read the sentences. Underline the part of theword in bold that should be stressed. Then listen andcheck.1 a We’re watching the progress of the new sales team.b Your career won’t progress if you don’t work hard.2 a Amy has a new research post at the university; sheloves it!b Do some research about the company before yourinterview.3 a It’s a good project, but it’s very time-consuming.b They project a small increase in profits this year.81 5 Listen to some information about thepopularity of video blogs (vlogs). Complete the sentences.1 Video blogs, or vlogs,popular than ever.2 Most vlogsor, sometimes, two people.3 Some vloggerspage views per month.4 Successful vloggerscompanies.5 Top vloggershandle their contracts.6 Somemention certain brands.7 No one reallymoney they receive.8 Should they state when theyto endorse a product?moreby one personmillions ofby biga lawyer toa lot of money just tohow much7B2 WB 02 unit01 004-011 ptg01.indd 721/01/16 9:51 AM

1.3 Who am I?READING1 Read the article. Choose the correct term to complete thesentences.identity fraud  phishing  identity theft1is when someone is tricked into revealingtheir personal information.is when a person’s private information is2stolen.is when a thief uses stolen information to3make money.2 Read the article again. Change one word or number ineach sentence to make it correct.1 In the UK, credit card identity theft cost nearly 40 million in 2012.2 The number of phishing websites aimed against UKbanks and building societies dropped to 41,734in 2012.3 According to the article, one British man lost more than 1,000,000 in a 2012 phishing incident.4 Booking.com customers affected by the 2014phishing scam were given 10,000 refunds by thecompany.5 In phishing scams, callers are persuaded to reveal theirpersonal information.Protecting your identityWhen someone steals another person’s privateare often individual members of the public, but entireinformation, such as their date of birth, passportorganizations can be hit, too.or banking details, it is called identity theft. If thatIn 2012, one British woman was robbed of her life savingsinformation is obtained and used by the thief for theirown financial benefit, it is called identity fraud.(over 1,000,000) when she fell for a phishing scam.Fortunately, the criminals – in this case, a gang of fourteenThere are many types of identity fraud. A criminalpeople – were later caught and arrested. In 2014, the hotelstopped for a traffic offence may avoid going to court orreservations website, Booking.com, was hit by a majorpaying a fine by presenting a stolen driver’s licence tophishing scam which affected about 10,000 people. Thethe police. Stolen forms of identification can be used in acompany paid full refunds to every customer who hadnumber of ways, for example to order goods or to set uplost money, and made important changes to its technicalmobile phone contracts. And while cyber-criminals oftensecurity features. Phishing is also frequently done by emailuse stolen information to transfer money from a victim’sor over the phone. The sender, or caller, pretends to bebank account, the information may also be used to takefrom a genuine bank or company and persuades the victimout bank loans or credit cards in that person’s name. It isto reveal their account information or password.not unusual for the victim to remain unaware that theirIdentity theft and fraud can be very stressful experiences.personal information has been stolen until they applyfor a credit card or a loan themselves. In 2013, almost 40 million was lost to credit card identity theft in the UK.Always take a cautious approach whenever anyonerequests your personal information. While it could be saidthat some victims of phishing and identity fraud haveIdentity theft and fraud are not new problems but, withnot been cautious enough, it should be noted that manythe rise of the Internet, they have become significantlycyber-criminals are extremely clever and convincing.more common. In the early days of the Internet, onlinesecurity was not as advanced as it is today, and peoplewere less informed about how to protect their personalinformation online.Different methods are used to trick people into revealingtheir banking information. Some of these are quitesimple, while others are more sophisticated. Manypeople have been deceived by websites that aredesigned to look exactly like their bank’s site. These arecalled phishing websites. In August 2005, there were160 phishing websites aimed at banks and buildingsocieties in the UK. By August 2012, that number hadrisen to 41,734 sites. The targets of phishing scams8B2 WB 02 unit01 004-011 ptg01.indd 821/01/16 9:51 AM

41 6 Listen to an expert talking about identity fraud.Number the items (1–6) in the order that you hear them.abcdefcommon sensestrong passwordanti-virus softwareimportant documentscredit reportsecure web addressVOCABULARY Tasks and interests5 Complete the sentences. Use the words and phrases inthe box.co-ordinatehead upoffercreatedeal withhelpinterested inpassionate aboutfocus oninvolved in1 Rosa and Lauren work in customer support, but theyon the sales side, too.2 I don’t know very much about their marketing strategieslearning moreand I’m quiteabout them.3 It’s annoying that we have tonew passwords for so many different sites!4 When you organize a big conference, it can be difficultall the different events, buttohaving a great team makes it easier.5 Darrel and Kenji run most of the operations, but twothe entiremore senior peoplecompany.the customer’s6 It’s important toneeds or the brand won’t be successful.7 Kelly absolutely loves writing her fashion blog. She’snew styles and designs.various online groups,8 Lee isincluding a community forum that shares trafficinformation.9 If you discover anything unusual about your bankitstatement, you shouldimmediately.10 The technical team fixes issues very quickly. They alsoadvice and tips that are veryuseful.6 Read the sentences. Match each word or phrase in boldwith its synonym (a–h).1 According to the article, a criminal could get away with not paying a traffic fine by presenting astolen driver’s licence to the police.2 Most victims of identity theft never find out that their information has been stolen.3 The arrival of the Internet has increased the cases of identity theft and fraud.4 Phishing scams are limited to individual members of the public.5 All phishing scams are carried out by phone. 6 It’s important to be extremely careful because cyber-criminals are usually very smart.1 You might go through a period when you have fewer creative ideas, but don’t give up!2 The designers were furious when they learned that someone had copied their logo.3 It was a dreadful year financially, but we learned some important lessons about the brand.4 Leo sold most of his personal belongings in order to raise money for his business.5 Customers love their latest product. They’ve made a fortune!6 The first thing we need to do is sort out the issues with the company’s image.7 Keep trying to build the brand and you’re bound to be successful, eventually.8 Our former marketing manager wanted to change the brand identity, but everyone strongly disagreed.abcdefgha lot of moneyawfulexperiencefixUnit 1 IdentityWORDBUILDING Synonyms3 Are the sentences true (T) or false (F)?in the endoldstuffvery angry7 Read the paragraph. Complete the sentences usingsynonyms from Exercise 6.I was a victim of identity theft a few years ago. It was1! It happened when I moved to a new,house. I was so busy packing all my 2I forgot to tell the post office to send my post on to my, but by then thenew address. I did it 3problem had already started, though I was unaware of itat the time. A credit card offer went to my 4address and someone filled it out in my name. Theyoverreceived the credit card and spent 5six months. When I discovered what had happened, I was6. It took absolutely ages to 7.the same nightmare.I don’t want you to 8WORD FOCUS bring8 Match the sentence halves to complete the definitions.1 To bring something tothe table meansa t o make somethinghappen.2 To bring something tomind meansb t o do something that’sdifficult.3 To bring yourself to dosomething meansc t o raise a point ortopic.4 To bring someonedown meansd t o be reminded ofsomething.5 To bring something upmeanse t o contribute somethinguseful.6 To bring somethingabout meansft o make a person feelbad.9B2 WB 02 unit01 004-011 ptg01.indd 921/01/16 9:51 AM

1.4 I don’t think we’ve metMEETING PEOPLE131 7 Listen. You will hear six questions orcomments from three conversations. Choose the bestresponse to each one.Conversation 1Conversation 12 a It’s not far from my house.b Well, it’s good mostly.c It finishes at five o’clock.Conversation 35 a I spoke to Ann in Human Resources, which was helpful.b I lived here when I was student, so I know the city.c Yes. Luckily I love data, so I’m looking forward to it.6 a Astra project?b It’s a fantastic project.c Do you have the paperwork?21 8 Now listen to the full conversations and checkyour answers to Exercise 1.?2 So, how?3 What’s?4 How’s he?Conversation 3Conversation 24 a Great. He loves it!b No, it’s over there.c Your phone is ringing.1 Excuse me,Conversation 21 a Yes, I’m fine, thanks.b It’s nice to meet you.c Not at all. It’s free.3 a He knows my cousin in Mexico.b He’s still with the same company.c Yes, he phoned me just yesterday.1 8 Listen to the conversations again andcomplete the questions.5 You’ll be?6 Shall we?PRONUNCIATION Using intonationto ask a question41 9 Read the questions. Practise asking eachone, paying attention to your intonation. Then listenand check.123456789101112And the slides have very little text?Lessig method?So, that’s your presentation style, too?Excuse me, are you Lilian?Sorry, and you are?So, things are going well, Anton?Wow. What’s it like?Hey, do you have time for a coffee now?So, are we ready to get the meeting started?Is today your first day?So, how do you like living in London?Astra project?10B2 WB 02 unit01 004-011 ptg01.indd 1021/01/16 9:51 AM

as a paragraph using full sentences.words are not used.athashtag123456back slashhyphenEvan Brantdotforward slashunderscore5 Write the correct word next to each symbol (1–5). Two8 Look at part of an online profile. Rewrite the informationUnit 1 IdentityWRITING SKILL Symbols and notesFinancial planningadministratorLondon, UK#./@1 10 Listen and write the missing symbols.1 You can find me on Skype as samsummers.2 The email address is ken.com.3 Tweet us your ideas using4 The filename is meeting5 Find us online at utions.7 Rewrite the sentences in note form.1234567I started my career as a graphic designer in 2005.I can work with all major design programmes.People say that I’m a good team leader.I won several awards for excellence last year.I hope to get more involved in management.My professional references are attached.I speak several languages, including Frenchand Japanese.8 In my spare time I volunteer at a local school.Areas of expertisefinancial reportingresearch and analysisstrategic planningAreas of interestenvironmental causescommunicationsnetworkingOther languagesGerman (fluent)Spanish (improving)EducationTrinity College, DublinUniversity College, LondonOther interestsblogging, travel writing,photography1234567811B2 WB 02 unit01 004-011 ptg01.indd 1121/01/16 9:51 AM

Presentation 1 DESCRIBING A MEMORABLE EVENTYOUR IDEA1 Read the paragraphs about a memorable event. Match2 Write notes about your own memorable events. Thinkabout several ideas so you can choose the best one.the paragraphs with the photos (a–c).1 I’ve never seen anything like it. It was like a sea ofcolour – there were so many people dressed up inbeautiful costumes of reds, greens, yellows and blues.It was very noisy, but not in an annoying way. Musicseemed to come from all around, with people playinginstruments like steel drums and trumpets. There werehuge speakers and DJs were playing CDs. I’ll neverforget it.2 I love action and this event certainly provided that.I’m usually quite excited when I go to watch sport – Ithink professional athletes are so inspiring and some ofthe things they do are just unbelievable. This event hadit all – goals, great play, two teams that both wanted towin. At times it was a bit aggressive, but that just showsyou how much the players wanted to win.3 The most amazing thing I’ve ever done was travelling inthe rainforest. It was scary at times and it took severaldays to make the journey through the jungle. Whenyou’re sleeping at night, it’s never quiet – there are thesounds of all the animals and other creatures that callthis place home. Some people get very afraid in that kindof situation, but I found it made me feel very brave.a3 Choose one event from your notes in Exercise 2. Answerthe questions about it.1 Where and when did this event take place?2 Who was involved in the event?3 What made it memorable for you?4 What picture could you use to show this event to otherpeople?4 Practise talking about your memorable event out loud.Remember to practise b using words and expressions that are easy tounderstand. telling a story that can be followed easily. choosing examples about your memorable event thatyour audience can relate to personally.ORGANIZING YOUR PRESENTATION5 Match the four steps of a presentation with the examplesof useful language (a–d).c1234Introduce yourself and your topic Say what memorable event you want to talk about Give more details and examples Finish a This was a time when I travelled to South America andsaw the Iguazu Falls.b Now you know a little more about this memorable event.Thanks for listening.c My name’s . Today my talk is about a memorableevent.d Now it’s time to give you a few more details about thisevent.12B2 WB 03 pres01 012-013 ptg01.indd 1221/01/16 9:51 AM

YOUR PRESENTATION6 Read the useful language on the left and make notes for your presentation.1 Introduce yourself and your topicMy name’s . Today my talk isabout I’m . Let me tell you about 2 Say what memorable event youwant to talk aboutThis was a time when I This happened to me when 3 Give more details and examplesThe next part of the talk gives a littlemore information about Now it’s time to give you a few moredetails about This is an example of This is one of the 4 FinishThat’s the end of this talk about Thanks for .Thanks for your attention. Do youhave any questions?7 Film yourself giving your presentation or practise in front of a mirror.Give yourself marks out of ten for telling the story of your memorable event so it is easy to follow.using examples that your audience can relate to.following the four steps in Exercise 6.using correct grammar./10/10/10/1013B2 WB 03 pres01 012-013 ptg01.indd 1321/01/16 9:51 AM

2 Choose the correct form of the verb to complete the sentences. 1 Nowadays, more and more companies are being used / are using video ads to boost their online identity. 2 These video ads are posted / are posting on major websites such as newspaper sites or TV channels. 3 Video ads

Related Documents:

keynote numbers can be combinations of letters, numbers, dashes, etc. The keynote numbers cannot include a tab character, but must be followed by a tab. Keynote descriptions must follow the keynote number, separated only by a tab. The description can be as long or

Why Keynote? Easy to use. Nobody is afraid of Keynote! Prototype with very simplistic wireframe shapes (as well as more refined ones) Allows for side notes and examples to clarify issues about the app screens Easy to share with non-technical people Visualize the same mockup on the Mac and on the iPad/ iPhone in Keynote format

There is more than one way to verify an identity. Here is another way to verify the identity in Example 1. Rewrite as the difference of fractions. Reciprocal identity Pythagorean identity Combining Fractions Before Using Identities Ve rify the identity Solution Add fractions. Simplify. Pythagorean identity

Identity fabrication: A completely fictitious identity without any real PII Identity manipulation: Using slightly modified real PII to create a new identity Identity compilation: A combination of real and fake PII to form a new identity Until now, credit bureaus or financial institutions lacked means of matching social security .

Identity, Credential, and Access Management (ICAM) Identity Manager User Guide - Access Role User: OCIO MobileLinc_IT-Support-OCIO-IT 5 P a g e USDA For Official Use Only 2. Log into Identity Manager 2.1 Access the Identity Manager User Interface To access EEMS Identity Manager, go to the following URL: https://www.eauth.usda.gov

A framework for identity management (ISO/IEC 24760) A framework for identity management Prof. Dr. Kai Rannenberg . 6.1 Access to identity information 10 6.2 Identity information lifecycle management 11 6.3 Quality of identity information 12 6.3.1 General 12

SAP NetWeaver Identity Management Distribution of users and role assignments for SAP and non-SAP systems Definition and rule-based assignment of meta roles Central Identity store Approval Workflows Identity Mgmt. monitoring & Audit HCM Integration e.g. Order2Cash e.g. on-boarding HCM Identity virtualization and identity as service through .

identity theft and restore their identity if it has been compromised. There is no standard term to describe these services, which sometimes are also referred to as "identity theft protection services," "identity protection services, " "identity monitoring services, " and "credit monitoring services," among other variations.