Understanding victims of identity theft: Preliminary insights
The seven scam types: Mapping the terrain of cybercrime
Authorship attribution for Twitter in 140 characters or less
Identity crime : The challenges in the regulation of identity crime
The importance of mandatory data breach notification to identity crime
Are you sure you would like to clear your session, including search history and login status?