Login / Signup
Shadow-IT System and Insider Threat: An Assessment of an Opportunity Dimension for the Identity Theft.
Asif Shaikh
Published in:
HCI (30) (2018)
Keyphrases
</>
malicious activities
identity theft
insider threat
personal information
personal data
intrusion detection system
data streams
criminal activities
privacy violations
database
data sets
email
intrusion detection
online social networks
information security
private information