Login / Signup

Understanding victim-enabled identity theft.

David LaceyJim ZaissK. Suzanne Barber
Published in: PST (2016)
Keyphrases
  • identity theft
  • personal information
  • personal data
  • databases
  • data mining
  • social media
  • data sources
  • criminal activities
  • cyber crime