Suppose a telephone company maintained records on every telephone call it handled, showing the calling phone number; the called phone number; and the time, date, and duration of the call

What uses might the telephone company make of those records? What uses might commercial marketers make? What uses might a rival telephone company make? What uses might a government make? Which of those uses violate individuals’ privacy rights?


Possible telephone company use: Capacity planning; billing; ideas for new services.
Possible marketer use: Data mining to advertise to the caller/recipient.
Possible rival telephone company use: Market research to woo customers.
Possible government use: Looking for suspicious communications; criminal prosecution.

Computer Science & Information Technology

You might also like to view...

The second task described in a task dependency is called the ____________________ task.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology

Which devices are used for WAN connectivity?

What will be an ideal response?

Computer Science & Information Technology

Briefly discuss the importance of debugging in the software lifecycle, and provide some insight on the errors that are corrected during the debugging process.

What will be an ideal response?

Computer Science & Information Technology

The default position for a transformation point is the ____ of the object.

A. upper left corner B. center C. center of each main edge D. bottom

Computer Science & Information Technology