| Typicality: | 0.336 |
| Saliency: | 0.407 |
| because of the way | 6 | cause |
| from its initial source | 5 | other |
| by adding compromised applications | 4 | manner |
| hacker → access → sensitive data | 21 |
| hacker → obtain → sensitive data | 7 |
| hacker → access → other sensitive data | 4 |
| hacker → capture → sensitive data | 4 |
| hacker → take → sensitive data | 4 |
| hacker → get → sensitive data | 3 |
| hacker → get → hold of sensitive data | 3 |
| hacker → obtain → other sensitive data | 3 |
| hacker → gain → sensitive data | 3 |
| hacker → take → sensitive information | 3 |
| hacker → accessed → sensitive data | 3 |
| negative | neutral | positive |
| 0.603 | 0.378 | 0.019 |
| Raw frequency | 58 |
| Normalized frequency | 0.407 |
| Modifier score | 0.500 |
| Perplexity | 110.493 |