E-business managers need to determine to what extent they wish to monitor their employee’s online activities. The underlying goal of these monitoring activities is to:
ensure employees do not use the Internet.
Technological measures to protect against security threats include all of the following EXCEPT:
__________ refers to security threats such as viruses, worms, or Trojan horses.
There are three key areas to consider when reviewing the ethical issues, privacy concerns, and security risks related to e-business. They include all of the following EXCEPT:
Today, there are three primary revenue models for delivering content. Which of the following is NOT one of them?
A la carte
Typically, __________ refer to higher values such as freedom, privacy, or protection of property.
higher order values