Is legal protection an effective countermeasure for privacy intrusion? Explain the difficulties or efficacy of using the law to provide privacy protection.

What will be an ideal response?

While legal protection is somewhat useful, the primary problem is that the victim often has no way of knowing when his/her privacy has been violated, as it often happens on a computer system that the victim will never even know exists. Another problem is the vague and context-­?dependent distinction between private and non-­? private information.

Computer Science & Information Technology

You might also like to view...

Computers that used integrated circuits are referred to as third-generation computers

Indicate whether the statement is true or false

Computer Science & Information Technology

Answer the following statements true (T) or false (F)

1) A growth function shows the relationship between the size of a problem and the part of an algorithm that we are trying to optimize. 2) When comparing two growth functions, a larger exponent on the problem size in the growth function indicates greater efficiency. 3) If the problem size is fairly small, then there is little difference between the efficiencies of different algorithms. 4) When determining the complexity of a segment of code, simple print statements are generally O(1). 5) When evaluating the complexity of a loop, all statements in the loop body are considered to be O(1).

Computer Science & Information Technology