Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 230,589,730 papers from all fields of science
Search
Sign In
Create Free Account
Data theft
Known as:
Data burglary
, Data-theft
, Datatheft
Data theft is a growing phenomenon primarily caused by system administrators and office workers with access to technology such as database servers…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
22 relations
Backup software
Computer forensics
Computer surveillance in the workplace
Data breach
Expand
Broader (1)
Data security
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
Review
2018
Review
2018
Addressing the incremental risks associated with adopting Bring Your Own Device
L. Weber
,
R. Rudman
2018
Corpus ID: 170031441
Bring Your Own Device (BYOD) involves allowing employees to use their own mobile devices to access their organisations’ networks…
Expand
2016
2016
Data Exfiltration in the Face of CSP
S. Acker
,
Daniel Hausknecht
,
A. Sabelfeld
ACM Asia Conference on Computer and…
2016
Corpus ID: 6145198
Cross-site scripting (XSS) attacks keep plaguing the Web. Supported by most modern browsers, Content Security Policy (CSP…
Expand
Highly Cited
2015
Highly Cited
2015
Exfiltrating data from Android devices
Quang Do
,
Ben Martini
,
Kim-Kwang Raymond Choo
Computers & security
2015
Corpus ID: 46515645
2015
2015
Regulating Smart Personal Devices in Restricted Spaces
Ferdinand Brasser
,
Daeyoung Kim
,
C. Liebchen
,
V. Ganapathy
,
L. Iftode
,
A. Sadeghi
2015
Corpus ID: 9823215
Smart personal devices equipped with a wide range of sensors and peripherals can potentially be misused in various environments…
Expand
2014
2014
Bridging the Air Gap: Inaudible Data Exfiltration by Insiders
Samuel J. O'Malley
,
Kim-Kwang Raymond Choo
Americas Conference on Information Systems
2014
Corpus ID: 6557788
As critical systems are increasingly dependent on software and are connected to the Internet, insider threats will be of ongoing…
Expand
2013
2013
Exposing software security and availability risks for commercial mobile devices
Ryan V. Johnson
,
Zhaohui Wang
,
A. Stavrou
,
J. Voas
Proceedings Annual Reliability and…
2013
Corpus ID: 8708927
The advent of smaller, faster, and always connected handheld devices along with the ever-increasing reliance on technology for…
Expand
2012
2012
Trail of Bytes: New Techniques for Supporting Data Provenance and Limiting Privacy Breaches
Srinivas Krishnan
,
Kevin Z. Snow
,
F. Monrose
IEEE Transactions on Information Forensics and…
2012
Corpus ID: 6878828
Forensic analysis of computer systems requires that one first identify suspicious objects or events, and then examine them in…
Expand
2010
2010
SCORPION II persistent surveillance system update
M. Coster
,
C. Hunt
Defense + Commercial Sensing
2010
Corpus ID: 121108386
This paper highlights the most recently added features and benefits available in the latest generation of Northrop Grumman…
Expand
Review
2010
Review
2010
Legal implications of BIM: model ownership and other matters arising
Oa A. Olatunji
,
W. Sher
2010
Corpus ID: 55874280
Building information modelling (BIM) promises some potentially radical benefits if it is fully adopted and correctly deployed on…
Expand
Review
2004
Review
2004
A Detection-Oriented Classification of Insider IT Misuse
A. H. Phyo
,
S. Furnell
2004
Corpus ID: 15761584
Although the problem of insider misuse of IT systems is frequently recognised in the results of computer security surveys, it is…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE