The many faces of data vulnerability: Information can be tapped when resident in memory. It can also be intercepted en route, on paper, and elsewhere | IEEE Journals & Magazine | IEEE Xplore