Login / Signup
Phish or Treat? Understanding the Tactics and Responses to Electronic Identity Theft on the Internet.
Evangelos Moustakas
Penny Duquenoy
C. Ranganathan
Published in:
ECIW (2005)
Keyphrases
</>
identity theft
personal information
criminal activities
malicious activities
job search
online services
personal data
law enforcement
data mining
cyber crime
databases
information systems
email