What is the definition of cyberstalking A) the use of automated technology to collect information about identified people to build a profile about their online activities and interests B) unauthorized access to a computer system intended to be kept private reveals personally identifiable information about users C) the intentional finding and sharing of private information about a user of an online platform that enables others to identify them D) the use of personally identifiable information found about a user online to pursue or harass someone
What is the definition of cyberstalking A) the use of automated technology to collect information about identified people to build a profile about their online activities and interests B) unauthorized access to a computer system intended to be kept private reveals personally identifiable information about users C) the intentional finding and sharing of private information about a user of an online platform that enables others to identify them D) the use of personally identifiable information found about a user online to pursue or harass someone
Enhanced Discovering Computers 2017 (Shelly Cashman Series) (MindTap Course List)
1st Edition
ISBN:9781305657458
Author:Misty E. Vermaat, Susan L. Sebok, Steven M. Freund, Mark Frydenberg, Jennifer T. Campbell
Publisher:Misty E. Vermaat, Susan L. Sebok, Steven M. Freund, Mark Frydenberg, Jennifer T. Campbell
Chapter5: Digital Security, Ethics, And Privacy: Threats, Issues, And Defenses
Section: Chapter Questions
Problem 4M
Related questions
Question
What is the definition of cyberstalking
A) the use of automated technology to collect information about identified people to build a profile about their online activities and interests
B) unauthorized access to a computer system intended to be kept private reveals personally identifiable information about users
C) the intentional finding and sharing of private information about a user of an online platform that enables others to identify them
D) the use of personally identifiable information found about a user online to pursue or harass someone
Expert Solution
This question has been solved!
Explore an expertly crafted, step-by-step solution for a thorough understanding of key concepts.
Step by step
Solved in 3 steps
Knowledge Booster
Learn more about
Need a deep-dive on the concept behind this application? Look no further. Learn more about this topic, computer-science and related others by exploring similar questions and additional content below.Recommended textbooks for you
Enhanced Discovering Computers 2017 (Shelly Cashm…
Computer Science
ISBN:
9781305657458
Author:
Misty E. Vermaat, Susan L. Sebok, Steven M. Freund, Mark Frydenberg, Jennifer T. Campbell
Publisher:
Cengage Learning
Enhanced Discovering Computers 2017 (Shelly Cashm…
Computer Science
ISBN:
9781305657458
Author:
Misty E. Vermaat, Susan L. Sebok, Steven M. Freund, Mark Frydenberg, Jennifer T. Campbell
Publisher:
Cengage Learning