1. Identify and discuss three examples of computer crime problem in business and society.
2. Name and discuss three specific types of cybercrime and cyberproblems.
3.What is identity theft? Describe and discuss three ways identity thieves acquire victims’ information.
1. Do employees need to be notified by their employers that they are subject to investigation of their possible employee misconduct? Discuss your answer.
2. You are the regional manager of pre-employment background investigations for a major contract security services company. Your company is under consideration to be hired by a large hospital in your area to conduct background investigations of all personnel they intend to hire. The hospital administrator tells you that the hospital has suffered signifi cant liability