Answered step by step
Verified Expert Solution
Link Copied!

Question

1 Approved Answer

Discussion Question 5 For the following question, you will prepare and submit a response. The response should be well thought out utilizing what you

image text in transcribed

Discussion Question 5 For the following question, you will prepare and submit a response. The response should be well thought out utilizing what you have learned from the Essentials of MIS textbook (LL), your other courses, and your personal experience. You are also expected to comment on at least one of your classmates. The comment should not be just "I agree," or "I disagree." The comment should be why you agree or disagree with it or it should add something new to the discussion. We live in a dangerous world in regards to protecting your privacy online. What kind of data do you think is generated by your day-to-day activities? Name and explain a few examples. What are companies doing with this data that is collected on you? How do you protect your privacy while using technology? Examples of technology include but are not limited to: the Internet; your phone; and computers of any kind.

Step by Step Solution

There are 3 Steps involved in it

Step: 1

blur-text-image

Get Instant Access to Expert-Tailored Solutions

See step-by-step solutions with expert insights and AI powered tools for academic success

Step: 2

blur-text-image_2

Step: 3

blur-text-image_3

Ace Your Homework with AI

Get the answers you need in no time with our AI-driven, step-by-step assistance

Get Started

Recommended Textbook for

Successful Project Management

Authors: Jack Gido, Jim Clements

4th Edition

9780324656152, 324656130, 978-0324656138

More Books

Students also viewed these General Management questions

Question

What is the effect of word war second?

Answered: 1 week ago