Which of the following forms of identity theft involves posing as a legitimate researcher to ask for personal information?
research spoofing
cyberstalking
phishing
pretexting