Skip to search formSkip to main contentSkip to account menu

Data theft

Known as: Data burglary, Data-theft, Datatheft 
Data theft is a growing phenomenon primarily caused by system administrators and office workers with access to technology such as database servers… 
Wikipedia (opens in a new tab)

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
Review
2018
Review
2018
Bring Your Own Device (BYOD) involves allowing employees to use their own mobile devices to access their organisations’ networks… 
2016
2016
Cross-site scripting (XSS) attacks keep plaguing the Web. Supported by most modern browsers, Content Security Policy (CSP… 
2016
2016
Portable smart devices potentially store a wealth of information of personal data, making them attractive targets for data… 
2016
2016
Statistical Traffic Anomaly Detection in Time-Varying Communication Networks Report Title We propose two methods for traffic… 
2015
2015
Smart personal devices equipped with a wide range of sensors and peripherals can potentially be misused in various environments… 
2013
2013
The advent of smaller, faster, and always connected handheld devices along with the ever-increasing reliance on technology for… 
2012
2012
Forensic analysis of computer systems requires that one first identify suspicious objects or events, and then examine them in… 
2009
2009
The contemporary organizations develop business processes in a very complex environment. The IT&C technologies are used by… 
Review
2004
Review
2004
Although the problem of insider misuse of IT systems is frequently recognised in the results of computer security surveys, it is…