The continuing and increasing reliance on computers represents a serious threat to the privacy of the individual, Recently, we have seen numerous examples of teenage and other “hackers” breaking the security codes of stores and banks and obtaining sensitive financial information about customers.
The argument above depends upon which of the following assumptions?
1. People who obtain sensitive financial information about others will not share it.
2. It is not possible to develop a security system for a computer that cannot be broken.
3. Computers are not more efficient than other systems of record keeping.