Modeling and analysis of identity threat behaviors through text mining of identity theft stories
Computers & Security2016Vol. 65, pp. 50–63
Citations Over TimeTop 1% of 2016 papers
Related Papers
- → Identity theft in an online world(2005)48 cited
- → A Review of Using Online Social Networks for Investigative Activities(2014)10 cited
- → Combatting Identity Theft: A Proposed Ethical Policy Statement and Best Practices(2017)4 cited
- The True Identity of Australian Identity Theft Offences: A Measured Response or an Unjustified Status Offence?(2010)
- Everything Is There for Full-blown Identity Theft(2011)