Discussion: Security Structure
o From the e-Activity, determine the key considerations for developing a customized security structure for the technology business that you researched. Include a brief description of the business.
e-Activity: Research the Internet or the Strayer Library for a technology business that seems like it would need funding from an equity source. Be prepared to discuss.
The response must include a reference list. Using Times New Roman 12 pnt font, double-space, one-inch margins, and APA style of writing and citations.