the use of technology to observe a user's actions often without the user's knowledge is known as:
A) Unauthorized access
B) Industrial espionage
C) Computer surveillance
D) Denial-of-service attack