Login / Signup
Internet anonymity practices in computer crime.
Helen L. Armstrong
Patrick J. Forde
Published in:
Inf. Manag. Comput. Secur. (2003)
Keyphrases
</>
computer users
personal computer
criminal activities
computer forensics
case study
internet users
law enforcement
computer systems
email
ring signature scheme
website
information services
computer technology
web technologies
high school
computer skills
payment scheme