Skip to search formSkip to main contentSkip to account menu

Data theft

Known as: Data burglary, Data-theft, Datatheft 
Data theft is a growing phenomenon primarily caused by system administrators and office workers with access to technology such as database servers… 
Wikipedia (opens in a new tab)

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
Review
2018
Review
2018
Bring Your Own Device (BYOD) involves allowing employees to use their own mobile devices to access their organisations’ networks… 
2017
2017
Cyber-criminals can distribute malware to control computers on a networked system and leverage these compromised computers to… 
2016
2016
Cross-site scripting (XSS) attacks keep plaguing the Web. Supported by most modern browsers, Content Security Policy (CSP… 
2015
2015
Insider threats are evolving constantly and misuse the granted resource access for various malicious activities. These insider… 
2013
2013
The advent of smaller, faster, and always connected handheld devices along with the ever-increasing reliance on technology for… 
2010
2010
Supply Chain Risk Management (SCRM) is one of the 12 Comprehensive National Cybersecurity Inititiatives (CNCI), but the range of… 
2010
2010
Current best practices heavily control user permissions on network systems. This effectively mitigates many insider threats… 
Review
2004
Review
2004
Although the problem of insider misuse of IT systems is frequently recognised in the results of computer security surveys, it is…