When financial or personal information is stolen through the use of computer science in some sort of illegal use or fraudulent activity, it is called ______________.
a. hacker b. cyber-terrorism c. cyber-marketing d. cyber-slacking e. cyber-squatting