还有 21 页未读 ,您可以 继续阅读 或 下载文档
1、本文档共计 21 页,下载后文档不带水印,支持完整阅读内容或进行编辑。
2、当您付费下载文档后,您只拥有了使用权限,并不意味着购买了版权,文档只能用于自身使用,不得用于其他商业用途(如 [转卖]进行直接盈利或[编辑后售卖]进行间接盈利)。
3、云校园所有内容均由同学或合作方上传,云校园不对文档的完整性、权威性及其观点立场正确性做任何保证或承诺!文档内容仅供研究参考,付费前请自行鉴别。
4、如文档内容存在违规,或者侵犯商业秘密、侵犯著作权等,请点击“违规举报”。
You must obtain ethics approval for any study involvinghuman participants.Question 1 AnswerTrueFalseFeedbackPlease review Lecture 3 for more information.Question 2CompleteMarked out of 2.00Flag questionQuestion textWhen a company shares its users'personal informationto marketers or other businesses,this is an example ofQuestion 2 Select one:a.Invisible information gatheringb.Data leakData miningd.Secondary useFeedbackSecondary use is the use of personal information for apurpose other than the purpose for which it wasprovided.Please review Lecture 4 for more information.Question 3CompleteMarked out of 2.00Flag questionQuestion textWhich of the following is NOT a legal framework'sresponsibility in protecting privacy?Question 3 Select one:a.It enforces agreements and contracts,for example,thepublished privacy policies of organizations.
请如实的对该文档进行评分-
-
-
-
-
0 分