Multiple Choice
Electronic information security that restricts secondary use of data according to laws and preferences of the subjects is called ________.
A) proxy information
B) data privacy
C) content analysis
D) empathic design
E) scenario building
Correct Answer:

Verified
Correct Answer:
Verified
Q16: When going international,all the assumptions that were
Q17: The aim of international research is to
Q18: Which of the following is NOT one
Q19: Data obtained directly for a specific research
Q20: Systematic evaluation of communication for frequency of
Q22: Explain the seven attributes an information system
Q23: Micro data that are most crucial for
Q24: A user-centered design approach that observes customers
Q25: _ are usually conducted via questionnaires that
Q26: _ is electronic information security that restricts