What Do You Think About Your Company's Leaks? A Survey on End-Users Perception Toward Data Leakage Mechanisms

Data leakage can lead to severe issues for a company, including financial loss, damage of goodwill, reputation, lawsuits and loss of future sales. To prevent these problems, a company can use other mechanisms on top of traditional Access Control. These mechanisms include for instance Data Leak Preve...

Full description

Saved in:
Bibliographic Details
Published in:Frontiers in big data Vol. 8; p. 568257
Main Authors: Bertrand, Yoann, Boudaoud, Karima, Riveill, Michel
Format: Journal Article
Language:English
Published: Switzerland Frontiers 30-10-2020
Frontiers Media S.A
Subjects:
Online Access:Get full text
Tags: Add Tag
No Tags, Be the first to tag this record!
Description
Summary:Data leakage can lead to severe issues for a company, including financial loss, damage of goodwill, reputation, lawsuits and loss of future sales. To prevent these problems, a company can use other mechanisms on top of traditional Access Control. These mechanisms include for instance Data Leak Prevention or Information Rights Management and can be referred as Transmission Control. However, such solutions can lack usability and can be intrusive for end-users employees. To have a better understanding of the perception and usage of such mechanisms within business infrastructures, we have conducted in this article an online survey on 150 employees. These employees come from different companies of different sizes and sectors of activity. The results show that whatever the size of the company or its sector of activity, security mechanisms such as access control and transmission control can be considered as quite intrusive and blocking for employees. Moreover, our survey also shows interesting results regarding more acceptable and user-friendly anti-data leakage mechanisms that could be used within companies.
Bibliography:ObjectType-Article-1
SourceType-Scholarly Journals-1
ObjectType-Feature-2
content type line 23
PMCID: PMC7931931
Edited by: Andrea Di Sorbo, University of Sannio, Italy
This article was submitted to Cybersecurity and Privacy, a section of the journal Frontiers in Big Data
Amartya Sen, Oakland University, United States
Reviewed by: Riccardo Spolaor, Shandong University, China
ISSN:2624-909X
2624-909X
DOI:10.3389/fdata.2020.568257