After you have read this chapter, you should be able to:
Identify the most significant concerns for effective implementation of computer technology.
Discuss the primary privacy issues of accuracy, property, and access.
Describe the impact of large databases, private networks, the Internet, and the web on privacy.
Discuss online identity and the major laws on privacy.
Discuss cybercrimes including creation of malicious programs such as viruses, worms, Trojan horses, and zombies as well as denial of service attacks, Internet scams, identity theft, cyberbullying, rogue Wi-Fi hotspots, and data manipulation.
Detail ways to protect computer security including restricting access, encrypting data, anticipating disasters, and preventing data loss.
Discuss computer ethics including copyright law, software piracy, digital rights management, the Digital Millennium Copyright Act, as well as plagiarism and ways to identify plagiarism.
To learn more about the book this website supports, please visit its Information Center.