Review “Chapter Five Case: Targeting Target” at the end of Ch. 5 of Business Driven Technology.
Respond to the following in a minimum of 175 words:
- Authorities frequently tap online service providers to track down hackers. Do you think it is ethical for authorities to tap an online service provider and read people’s e-mails? Justify your position.
- What do you consider to be the best ways to protect yourself from identity theft?