--%>

Critics of online communities

The Critics of online communities discuss that there is very big potential for deceit in online relationships in comparison to face-to face ones. Explain the advantages or disadvantages of having the capability to represent yourself differently in an online community in contrary to a face-to-face community. If you think there are ethical issues here, then explain the ethical issues. If you feel ethics are irrelevant to this issue, then explain why?

   Related Questions in Computer Network Security

  • Q : Define Google click fraud Google click

    Google click fraud: It is a type of internet crime which occurs in pay per click online advertising while a person, automated script, or computer program imitates legitimate user of any web browser clicking on an ad, for producing a charge per click w

  • Q : What is Sub Bytes Explain what is meant

    Explain what is meant by Sub Bytes.

  • Q : Primitive operations in RC5 Explain the

    Explain the primitive operations which are used in the RC5?

  • Q : What is ReefEdge Connect System

    ReefEdge Connect System: The ReefEdge connect system works on three layers of security: privacy, access control and authentication. The system then recognizes the technologies needed to address the security requirement for each of the above mentioned

  • Q : Ip Question 4 - You have been asked to

    Question 4 - You have been asked to design an IP addressing plan for a medium size corporation, Corporation (X) converting to an IP network. The corporation currently has 88 locations but plans to expand to approximately 100 Locations within the next year. Each location should have a user network

  • Q : Critics of online communities The

    The Critics of online communities discuss that there is very big potential for deceit in online relationships in comparison to face-to face ones. Explain the advantages or disadvantages of having the capability to represent yourself differently in an

  • Q : Function areas of IP security Specify

    Specify various function areas of the IP security?

  • Q : Mono-alphabetic and Playfair cipher

    Define: a) Mono-alphabetic cipher b) Playfair cipher c) Transposition cipher

  • Q : Requirements for process of message

    State requirements for the process of message authentication.

  • Q : Computer crime Explain the term

    Explain the term Computer crime and what are the Suggestion to stop them ?