1. Who are the potential victims of an organization's data breach?
2. What is social engineering? Give an example.
3. Explain how identity theft can occur.
4. List benefits of e-business. What are the major types of e-business transactions?
5. What is the advantage of using cloud computing as the platform for e-government?