Suppose a telephone company maintained records on every telephone call it handled, showing the calling phone number; the called phone number; and the time, date, and duration of the call. What uses might the telephone company make of those records? What uses might commercial marketers make? What uses might a rival telephone company make? What uses might a government make? Which of those uses

violate individuals' privacy rights?

What will be an ideal response?


Possible
telephone
company
use:
Capacity
planning;
billing;
ideas
for
new
services.
Possible
marketer
use:
Data
mining
to
advertise
to
the
caller/recipient.
Possible
rival
telephone
company
use:
Market
research
to
woo
customers.
Possible
government
use:
Looking
for
suspicious
communications;
criminal
prosecution.
All
of
these
might
violate
individuals'
privacy
rights
depending
on
how
they
are
executed.

Computer Science & Information Technology

You might also like to view...

The identifiers Vanilla, Strawberry, and Chocolate, which appear inside the braces, are known as ____________.

Look at the following code sample: ``` enum Flavor { Vanilla, Strawberry, Chocolate } ``` a. constants b. references c. mnemonics d. enumerators

Computer Science & Information Technology

Some XML documents must also include a single root element that contains all other elements.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology

ActiveX controls can be used to embed tools from other applications

Indicate whether the statement is true or false

Computer Science & Information Technology

Which form of malware replicates itself and needs a host file on which to travel?

A. Trojan B. virus C. worm

Computer Science & Information Technology