Is legal protection an effective countermeasure for privacy intrusion? Explain the difficulties or efficacy of using the law to provide privacy protection.

What will be an ideal response?


While legal protection is somewhat useful, the primary problem is that the victim often has no way of knowing when his/her privacy has been violated, as it often happens on a computer system that the victim will never even know exists. Another problem is the vague and context-­?dependent distinction between private and non-­? private information.

Computer Science & Information Technology

You might also like to view...

Which of the following Dir class methods can be used to create a new folder?

A. mkdir B. createdir C. mk D. create

Computer Science & Information Technology

If a computer's video subsystem does not contain a separate video adapter, where would you find the electronic circuits for sending instructions to the monitor?

A) On the sound card B) On the special RAM chips C) On the motherboard Flash BIOS chip D) On the motherboard

Computer Science & Information Technology

Physical security, authentication, users and groups, and security policies are all aspects of _______________.

A. access control B. environmental controls C. database management D. network locks

Computer Science & Information Technology

When you send an email from the US to Europe, it likely is transmitted from one continent to another through one of the ______ that connect America and Europe.

a. submarine cables b. satellites c. telephone lines d. boats e. modems

Computer Science & Information Technology