Discusses a plan for preventing phishing. There are 2 sources listed in the bibliography of this 3-page paper.