Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 224,884,424 papers from all fields of science
Search
Sign In
Create Free Account
Data theft
Known as:
Data burglary
, Data-theft
, Datatheft
Data theft is a growing phenomenon primarily caused by system administrators and office workers with access to technology such as database servers…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
22 relations
Backup software
Computer forensics
Computer surveillance in the workplace
Data breach
Expand
Broader (1)
Data security
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
Review
2018
Review
2018
Addressing the incremental risks associated with adopting Bring Your Own Device
L. Weber
,
R. Rudman
2018
Corpus ID: 170031441
Bring Your Own Device (BYOD) involves allowing employees to use their own mobile devices to access their organisations’ networks…
Expand
2017
2017
A Stackelberg Game Model for Botnet Data Exfiltration
T. Nguyen
,
Michael P. Wellman
,
Satinder Singh
Decision and Game Theory for Security
2017
Corpus ID: 2090032
Cyber-criminals can distribute malware to control computers on a networked system and leverage these compromised computers to…
Expand
2016
2016
Data Exfiltration in the Face of CSP
S. Acker
,
Daniel Hausknecht
,
A. Sabelfeld
ACM Asia Conference on Computer and…
2016
Corpus ID: 6145198
Cross-site scripting (XSS) attacks keep plaguing the Web. Supported by most modern browsers, Content Security Policy (CSP…
Expand
Highly Cited
2015
Highly Cited
2015
Exfiltrating data from Android devices
Quang Do
,
Ben Martini
,
Kim-Kwang Raymond Choo
Computers & security
2015
Corpus ID: 46515645
2015
2015
Complex Event Processing based Hybrid Intrusion Detection System
Ranjan Mohan
,
V. Vaidehi
,
Ajay Krishna A
,
M. Mahalakshmi
,
S. Chakkaravarthy
3rd International Conference on Signal Processing…
2015
Corpus ID: 17306268
Insider threats are evolving constantly and misuse the granted resource access for various malicious activities. These insider…
Expand
2013
2013
Exposing software security and availability risks for commercial mobile devices
Ryan V. Johnson
,
Zhaohui Wang
,
A. Stavrou
,
J. Voas
Proceedings Annual Reliability and…
2013
Corpus ID: 8708927
The advent of smaller, faster, and always connected handheld devices along with the ever-increasing reliance on technology for…
Expand
Highly Cited
2011
Highly Cited
2011
Patient-centric authorization framework for electronic healthcare services
Jing Jin
,
Gail-Joon Ahn
,
Hongxin Hu
,
M. Covington
,
Xinwen Zhang
Computers & security
2011
Corpus ID: 14191863
2010
2010
Supply chain risk mitigation for IT electronics
F. McFadden
,
Richard D. Arnold
IEEE International Conference on Technologies for…
2010
Corpus ID: 17651084
Supply Chain Risk Management (SCRM) is one of the 12 Comprehensive National Cybersecurity Inititiatives (CNCI), but the range of…
Expand
2010
2010
Browser-Based Covert Data Exfiltration
Kenton Born
arXiv.org
2010
Corpus ID: 9789727
Current best practices heavily control user permissions on network systems. This effectively mitigates many insider threats…
Expand
Review
2004
Review
2004
A Detection-Oriented Classification of Insider IT Misuse
A. H. Phyo
,
S. Furnell
2004
Corpus ID: 15761584
Although the problem of insider misuse of IT systems is frequently recognised in the results of computer security surveys, it is…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE