Return to Article Details Data Mining Method for Use Identify Deliberate Deception and Secure Privacy Download Download PDF