Credit card companies track your transactions. How might they abuse this?

What will be an ideal response?

Many possible answers. They can sell the transaction data to other companies and they can use it to target individuals for advertising, promotions, and other potentially undesirable contact without individual consent.

Computer Science & Information Technology

You might also like to view...

Which of the following can be summed up as ensuring that IT infrastructure risks are known and managed?

A. Separation of duties B. Due diligence C. Due care D. Due process

Computer Science & Information Technology

Which of the following BEST describes server virtualization?

A. A single logical server operating on multiple physical servers. B. Applications hosted on a single server and deployed to multiple users. C. Multiple servers used to host applications for multiple users. D. Multiple logical servers operating on the same physical server.

Computer Science & Information Technology