“…The technology boom of the past two decades has resulted in massive adoption of personal technology, which in turn has led to a massive aggregation of personal data on the Internet, leading to increased potential for identity theft (Lai, Li, & Hsieh, 2010;Yallapragada, Roe, & Toma, 2012). This adoption and daily use of technology for work, pleasure, and entertainment enables a broad spectrum of cyber crimes such as online scams, profile-cloning, and phishing-based attacks, which are all geared toward stealing people's identifying information and security credentials (Anderson, Durbin, & Salinger, 2008;Zhu, Caprenter, & Kulkarni, 2012). Once a miscreant gathers a sufficient amount of personal idenitifying information from various sources, they can conduct an identity theft attack (Lai et al, 2010;Yallapragada et al, 2012).…”