PLEASE READ CAREFULLY AND PAY ATTENTION TO THE INSTRUCTIONS .
Read PRISM and the Response of IT Giants on pages 379 – 381 of the textbook Reynolds, G.W. (2016). Information technology for managers (2nd ed.). Boston, MA: Cengage Learning . After reading the case, write a 2-page single spaced analysis answering each of the following questions adequately:
- What measures should IT companies take to protect their customer’s privacy?
- Some people have claimed that consumers have more to worry about from hackers and identity thieves than from government snoops focused on terrorist suspects. Do you agree? Why or why not?
- Some hackers who are skilled in unauthorized computer access have found that it makes more sense to be paid for their computer skills than to continue to operate outside the law. Do you think that companies should hire these ethical hackers to protect their IT infrastructure? Why or why not?
- Companies are also amassing personal data from their customers for behavioral targeting. Discuss the pros and cons of behavioral targeting.
Please be sure to follow the APA style format in your writing, making sure that your answer is well supported using material from the book or any additional sources. Use at least five references in your paper and cite them properly. If material from any source (including the assigned case or book) is used, these references should be specified using the APA format. The font should be 12-point Times New Roman. The margins should be 1 inch all around. The line spacing should be single spaced with no spacing between paragraphs. Your work should be original as it would be checked for plagiarism.