Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 228,554,475 papers from all fields of science
Search
Sign In
Create Free Account
Data theft
Known as:
Data burglary
, Data-theft
, Datatheft
Data theft is a growing phenomenon primarily caused by system administrators and office workers with access to technology such as database servers…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
22 relations
Backup software
Computer forensics
Computer surveillance in the workplace
Data breach
Expand
Broader (1)
Data security
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
Review
2018
Review
2018
Addressing the incremental risks associated with adopting Bring Your Own Device
L. Weber
,
R. Rudman
2018
Corpus ID: 170031441
Bring Your Own Device (BYOD) involves allowing employees to use their own mobile devices to access their organisations’ networks…
Expand
2016
2016
Data Exfiltration in the Face of CSP
S. Acker
,
Daniel Hausknecht
,
A. Sabelfeld
ACM Asia Conference on Computer and…
2016
Corpus ID: 6145198
Cross-site scripting (XSS) attacks keep plaguing the Web. Supported by most modern browsers, Content Security Policy (CSP…
Expand
2016
2016
Malevolent app pairs: an Android permission overpassing scheme
Antonios Dimitriadis
,
P. Efraimidis
,
Vasilios Katos
Conf. Computing Frontiers
2016
Corpus ID: 16755520
Portable smart devices potentially store a wealth of information of personal data, making them attractive targets for data…
Expand
2016
2016
Statistical Traffic Anomaly Detection in Time-Varying Communication Networks Report
Jing Wang
,
I. Paschalidis
2016
Corpus ID: 5921900
Statistical Traffic Anomaly Detection in Time-Varying Communication Networks Report Title We propose two methods for traffic…
Expand
Highly Cited
2015
Highly Cited
2015
Exfiltrating data from Android devices
Quang Do
,
Ben Martini
,
Kim-Kwang Raymond Choo
Computers & security
2015
Corpus ID: 46515645
2015
2015
Regulating Smart Personal Devices in Restricted Spaces
Ferdinand Brasser
,
Daeyoung Kim
,
C. Liebchen
,
V. Ganapathy
,
L. Iftode
,
A. Sadeghi
2015
Corpus ID: 9823215
Smart personal devices equipped with a wide range of sensors and peripherals can potentially be misused in various environments…
Expand
2013
2013
Exposing software security and availability risks for commercial mobile devices
Ryan V. Johnson
,
Zhaohui Wang
,
A. Stavrou
,
J. Voas
Proceedings Annual Reliability and…
2013
Corpus ID: 8708927
The advent of smaller, faster, and always connected handheld devices along with the ever-increasing reliance on technology for…
Expand
2012
2012
Trail of Bytes: New Techniques for Supporting Data Provenance and Limiting Privacy Breaches
Srinivas Krishnan
,
Kevin Z. Snow
,
F. Monrose
IEEE Transactions on Information Forensics and…
2012
Corpus ID: 6878828
Forensic analysis of computer systems requires that one first identify suspicious objects or events, and then examine them in…
Expand
2009
2009
Detection of the Security Vulnerabilities in Web Applications
Marius Popa
2009
Corpus ID: 8537491
The contemporary organizations develop business processes in a very complex environment. The IT&C technologies are used by…
Expand
Review
2004
Review
2004
A Detection-Oriented Classification of Insider IT Misuse
A. H. Phyo
,
S. Furnell
2004
Corpus ID: 15761584
Although the problem of insider misuse of IT systems is frequently recognised in the results of computer security surveys, it is…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE