Return to Article Details Data Mining Method for Use Identify Deliberate Deception and Secure Privacy