Typicality: | 0.336 |
Saliency: | 0.407 |
because of the way | 6 | cause |
from its initial source | 5 | other |
by adding compromised applications | 4 | manner |
hacker → access → sensitive data | 21 |
hacker → obtain → sensitive data | 7 |
hacker → access → other sensitive data | 4 |
hacker → capture → sensitive data | 4 |
hacker → take → sensitive data | 4 |
hacker → get → sensitive data | 3 |
hacker → get → hold of sensitive data | 3 |
hacker → obtain → other sensitive data | 3 |
hacker → gain → sensitive data | 3 |
hacker → take → sensitive information | 3 |
hacker → accessed → sensitive data | 3 |
negative | neutral | positive |
0.603 | 0.378 | 0.019 |
Raw frequency | 58 |
Normalized frequency | 0.407 |
Modifier score | 0.500 |
Perplexity | 110.493 |