The seven scam types: Mapping the terrain of cybercrime
Authorship attribution for Twitter in 140 characters or less
China's domestic migration and crime: A case study of Shanghai
Understanding victims of identity theft: Preliminary insights
Identity crime : The challenges in the regulation of identity crime
The importance of mandatory data breach notification to identity crime
The role of love stories in Romance Scams : A qualitative analysis of fraudulent profiles
Are you sure you would like to clear your session, including search history and login status?