Which of the following is an example of amplification effect of information systems?
A) Information stored on the Internet can be hacked and stolen by anyone, irrespective of their geographic location.
B) Data on email services can be hacked leading to privacy breaches and exposing of private communication.
C) Information on a person's social networking account can easily be distributed to an unintended audience.
D) Data from email or photo uploads to the Internet can be secured by choosing the appropriate privacy settings.
C
You might also like to view...
When an accountant has behaved negligently causing damage to a third party, the third party ________
A) cannot sue the accountant under any circumstance B) cannot bring a tort action against the accountant to recover damages C) cannot sue the accountant for breach of contract D) cannot claim constructive but not actual fraud on part of the defendant
Which of the following terms best describes feelings that tend to be less intense than emotions?
A) affect B) cognition C) moods D) thoughts E) reactions