COMPUTER ETHICS AND SECURITY
ETHICS IN COMPUTING
Question
[CLICK ON ANY CHOICE TO KNOW THE RIGHT ANSWER]
|
|
Yes
|
|
No
|
|
Either A or B
|
|
None of the above
|
Detailed explanation-1: -Definition. An individual’s need to selectively control the access of others to the individual self with the aim of achieving a desired level of physical or psychological privacy – in other words, a form of solitude, intimacy, anonymity, or reserve.
Detailed explanation-2: -It covers the amount of online security available for personal and financial data, communications, and preferences. Internet users often attempt to increase online privacy through anti-virus software, strong password choices, turning off tracking, reviewing site security, and opting for stricter privacy settings.
Detailed explanation-3: -A privacy incident is the unauthorized collection, use, access, retention or disclosure of personal or otherwise sensitive information.