1. Complete the following table to describe the results you discovered about your own personalty identifiable information on the internet. 2. Was there encugh personal information returned that could potentially be used for identity theit? Explain wity or why not. 3. How can identity thieves take advantage of soclat networking users to steal personal information? 4. According to Facebook com, who owns the information posted by a user? Include specific text from Facebook. com in your answer. 5. What is a secunity feature you should always look for in any website that will ask for personal information to share with others? 7. What is the risk of combining your tamily and personal thends with your business contacts and associates? 8. What type of personal information couidd an attacker obtain from a user profile on Linkedin.com that he or she could use for identity theft? 9. Suppose someone posted your highly corfidential personal information on a social networking site, and you wish to have the results removed from the Google search engine. Describe some actions you could take to have the information removed. 11. What are some options if you wish to continue using Twitter.com, but need to protect the inlormation you send from public view? 12. List the type of information you can obtain from a background search on sites such as InstantCheckmate com. .