Answer: b. deceptively observing people type in personal information
Explanation: This term is used in computer security, and it represents a type of social engineering technique that is misused for obtaining confidential information. These confidential data, such as personal identification numbers - PINs, passwords, and other confidential information - can be viewed by looking over the shoulder of those who enter these confidential data.