Data leakage incidents can be characterized based on the following attributes: where the leakage occurred, who caused the leakage, what was leaked (data state), how was access to the data gained, and how did the data leak. These parameters affect decision making for data-leakage defense measures.
CITATION STYLE
Shabtai, A., Elovici, Y., & Rokach, L. (2012). Data Leakage/Misuse Scenarios. In SpringerBriefs in Computer Science (Vol. 0, pp. 39–46). Springer. https://doi.org/10.1007/978-1-4614-2053-8_5
Mendeley helps you to discover research relevant for your work.