Login / Signup
Some Recommended Protection Technologies for Cyber Crime Based on Social Engineering Techniques -- Phishing
Wajeb Gharibi
Published in:
CoRR (2012)
Keyphrases
</>
identity theft
cyber crime
personal information
social networking
global economy
business world
social networks
personal data
online services
social media
criminal activities
data mining
privacy protection
internet technology
information security
cyber attacks