ISM 5026 Management Information Systems
Changing technologies, like those you read about in Chapter 4 of your text, are sometimes ahead of laws that could regulate them; for that reason, you may find you have more protection against non-technological crimes and privacy invasions than technological ones.
Write a paper in which you complete the following:
- Select three technology tools.
- For each, explain how use of this tool has contributed to cyber crimes, focusing on how the crimes are committed and what related protection strategies exist.
- For each, explain how use of this tool can lead to a violation of privacy and what may be done to protect against that.
Assignment should be three to four pages in length.
For citation guidelines, please refer to the table in the APA Style section of the syllabus.