Return to Article Details Self-made Data Protection – is it Enough? Prevention and After-care of Identity Theft Download Download PDF