Review “Chapter Five Case: Targeting Target” at the end of Ch. 5 of Business Driven Technology.

Respond to the following in a minimum of 175 words: 

  • Authorities frequently tap online service providers to track down hackers. Do you think it is ethical for authorities to tap an online service provider and read people’s e-mails? Justify your position.
  • What do you consider to be the best ways to protect yourself from identity theft?