Skip to search formSkip to main contentSkip to account menu

Data theft

Known as: Data burglary, Data-theft, Datatheft 
Data theft is a growing phenomenon primarily caused by system administrators and office workers with access to technology such as database servers… 
Wikipedia (opens in a new tab)

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
Review
2018
Review
2018
Bring Your Own Device (BYOD) involves allowing employees to use their own mobile devices to access their organisations’ networks… 
2016
2016
Cross-site scripting (XSS) attacks keep plaguing the Web. Supported by most modern browsers, Content Security Policy (CSP… 
2015
2015
Smart personal devices equipped with a wide range of sensors and peripherals can potentially be misused in various environments… 
2014
2014
As critical systems are increasingly dependent on software and are connected to the Internet, insider threats will be of ongoing… 
2013
2013
The advent of smaller, faster, and always connected handheld devices along with the ever-increasing reliance on technology for… 
2012
2012
Forensic analysis of computer systems requires that one first identify suspicious objects or events, and then examine them in… 
2010
2010
This paper highlights the most recently added features and benefits available in the latest generation of Northrop Grumman… 
Review
2010
Review
2010
Building information modelling (BIM) promises some potentially radical benefits if it is fully adopted and correctly deployed on… 
Review
2004
Review
2004
Although the problem of insider misuse of IT systems is frequently recognised in the results of computer security surveys, it is…