The importance of mandatory data breach notification to identity crime
Authorship attribution for Twitter in 140 characters or less
The role of love stories in Romance Scams : A qualitative analysis of fraudulent profiles
Identity crime : The challenges in the regulation of identity crime
China's domestic migration and crime: A case study of Shanghai
Understanding victims of identity theft: Preliminary insights
The seven scam types: Mapping the terrain of cybercrime
Are you sure you would like to clear your session, including search history and login status?