What Do You Think About Your Company's Leaks? A Survey on End-Users Perception Toward Data Leakage Mechanisms
Data leakage can lead to severe issues for a company, including financial loss, damage of goodwill, reputation, lawsuits and loss of future sales. To prevent these problems, a company can use other mechanisms on top of traditional Access Control. These mechanisms include for instance Data Leak Preve...
Saved in:
Published in: | Frontiers in big data Vol. 8; p. 568257 |
---|---|
Main Authors: | , , |
Format: | Journal Article |
Language: | English |
Published: |
Switzerland
Frontiers
30-10-2020
Frontiers Media S.A |
Subjects: | |
Online Access: | Get full text |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Summary: | Data leakage can lead to severe issues for a company, including financial loss, damage of goodwill, reputation, lawsuits and loss of future sales. To prevent these problems, a company can use other mechanisms on top of traditional Access Control. These mechanisms include for instance Data Leak Prevention or Information Rights Management and can be referred as Transmission Control. However, such solutions can lack usability and can be intrusive for end-users employees. To have a better understanding of the perception and usage of such mechanisms within business infrastructures, we have conducted in this article an online survey on 150 employees. These employees come from different companies of different sizes and sectors of activity. The results show that whatever the size of the company or its sector of activity, security mechanisms such as access control and transmission control can be considered as quite intrusive and blocking for employees. Moreover, our survey also shows interesting results regarding more acceptable and user-friendly anti-data leakage mechanisms that could be used within companies. |
---|---|
Bibliography: | ObjectType-Article-1 SourceType-Scholarly Journals-1 ObjectType-Feature-2 content type line 23 PMCID: PMC7931931 Edited by: Andrea Di Sorbo, University of Sannio, Italy This article was submitted to Cybersecurity and Privacy, a section of the journal Frontiers in Big Data Amartya Sen, Oakland University, United States Reviewed by: Riccardo Spolaor, Shandong University, China |
ISSN: | 2624-909X 2624-909X |
DOI: | 10.3389/fdata.2020.568257 |