Answer:
The answer is: Phishing
Explanation:
Phishing is carried out by individuals who are trying to scan users. This is done by sending emails to try to collect someone else's credit card information, online banking accounts, or other type of login information. Phishing can also be done through web pages that are designed to illegally collect their users' information.
<span>You are using M-Commerce (Mobile Commerce).
It is a
type of e-commerce that can be handled from a mobile phone, a PDA or smartphone
The first M-Commerce was launched in 1997, and since then its use has become
widely spread worldwide. There are different payment methods to choose from,
such as: contactless payment, credit cards and debit cards, micropayment
services, and stored-value cards</span>
The best suggestion to give to Frank when he asked about
what could be done with the data that is being generated is that the data may
be of good use when the social media are being used in having to find out the
customer’s recommendations and the ones that they are buying in which could be
the common interest of buyers.
Ddddddddddddddddddddddddddddddddd
I think it’s b chapter 10