develop your own crime scenario.
Discussion 3 B
Find a recent article that relates to data leakage related to user information. How was the information accessed? What were the ramifications? What type of data was lost? What could have been done differently to protect user data? Will this have an impact on users who adopt this technology?
Post your reply by Wednesday at midnight. Your response should be at least 300 words and appropriately cite your resources.
Respond to two of your classmates. Your responses should be at least 150 words and should be substantive. You should offer additional resources, insight, or other helpful feedback. A simple “I like your post” will result in a 0.
You will not be able to see other posts until you make your first post.