describe who are the potential victims of the organization's data breach? What is meant by social engineering? Providde the ex. Describe how identity theft can happen. prepare down benefits of e-business. prepare down the major kinds of e-business transactions? prepare down the advantage of using cloud computing as platform for e-government?