Brown, C. et al (2012). Managing Information Technology (7th Edition). Upper Saddle River, NJ: Prentice-Hall.
Companies are using eBusiness applications to build profiles of customers…privacy advocates consider this practice to be dangerous…do you agree…where do you draw the line…why?
