____________ takes place when a hacker links multiple strings of data together and develops a data package that the target considers a compilation of private information, despite the public sources from which the hacker composed the package.
a. Cyber invasion of privacy
b. Cyberterrorism
c. Data mining
d. Cyberdisparagement