<?xml version="1.0" encoding="UTF-8"?>
<!DOCTYPE article PUBLIC "-//NLM//DTD Journal Publishing DTD v2.3 20070202//EN" "journalpublishing.dtd">
	<article xmlns:mml="http://www.w3.org/1998/Math/MathML" xmlns:xlink="http://www.w3.org/1999/xlink" article-type="research-article">
		<front>
			<journal-meta>
				<journal-id journal-id-type="publisher-id">Front. Big Data</journal-id>
				<journal-title>Frontiers in Big Data</journal-title>
				<abbrev-journal-title abbrev-type="pubmed">Front. Big Data</abbrev-journal-title>
				<issn pub-type="epub">2624-909X</issn>
				<publisher>
					<publisher-name>Frontiers Media S.A.</publisher-name>
				</publisher>
			</journal-meta>
			<article-meta>
				<article-id pub-id-type="publisher-id">568257</article-id>
				<article-id pub-id-type="doi">10.3389/fdata.2020.568257</article-id>
				<article-categories>
					<subj-group subj-group-type="heading">
						<subject>Big Data</subject>
						<subj-group>
							<subject>Original Research</subject>
						</subj-group>
					</subj-group>
				</article-categories>
				<title-group>
					<article-title>What Do You Think About Your Company&#x2019;s Leaks? A Survey on End-Users Perception Toward Data Leakage Mechanisms</article-title>
					<alt-title alt-title-type="left-running-head">Bertrand et al.</alt-title>
					<alt-title alt-title-type="right-running-head">End-Users Perception on Company&#x2019;s Leaks</alt-title>
				</title-group>
				<contrib-group>
					<contrib contrib-type="author">
						<name>
							<surname>Bertrand</surname>
							<given-names>Yoann</given-names>
						</name>
					</contrib>
					<contrib contrib-type="author" corresp="yes">
						<name>
							<surname>Boudaoud</surname>
							<given-names>Karima</given-names>
						</name>
						<xref ref-type="corresp" rid="c001">
							<sup>&#x2a;</sup>
						</xref>
						<uri xlink:href="http://loop.frontiersin.org/people/985469/overview"/>
					</contrib>
					<contrib contrib-type="author">
						<name>
							<surname>Riveill</surname>
							<given-names>Michel</given-names>
						</name>
					</contrib>
				</contrib-group>
				<aff>Universit&#xe9; C&#xf4;te d&#x2019;Azur, CNRS, I3S, <addr-line>Sophia Antipolis</addr-line>, <country>France</country>
				</aff>
				<author-notes>
					<fn fn-type="edited-by">
						<p>
							<bold>Edited by:</bold>
							<ext-link ext-link-type="uri" xlink:href="https://loop.frontiersin.org/people/559286/overview">Andrea Di Sorbo</ext-link>, University of Sannio, Italy</p>
					</fn>
					<fn fn-type="edited-by">
						<p>
							<bold>Reviewed by:</bold>
							<ext-link ext-link-type="uri" xlink:href="https://loop.frontiersin.org/people/557831/overview">Riccardo Spolaor</ext-link>, Shandong University, China</p>
						<p>
							<ext-link ext-link-type="uri" xlink:href="https://loop.frontiersin.org/people/555594/overview">Amartya Sen</ext-link>, Oakland University, United States</p>
					</fn>
					<corresp id="c001">&#x2a;Correspondence: Karima Boudaoud, <email>karima.boudaoud@unice.fr</email>
					</corresp>
					<fn fn-type="other" id="fn001">
						<p>This article was submitted to Cybersecurity and Privacy, a section of the journal Frontiers in Big Data</p>
					</fn>
				</author-notes>
				<pub-date pub-type="epub">
					<day>30</day>
					<month>10</month>
					<year>2020</year>
				</pub-date>
				<pub-date pub-type="collection">
					<year>2020</year>
				</pub-date>
				<volume>8</volume>
				<elocation-id>568257</elocation-id>
				<history>
					<date date-type="received">
						<day>31</day>
						<month>05</month>
						<year>2020</year>
					</date>
					<date date-type="accepted">
						<day>14</day>
						<month>09</month>
						<year>2020</year>
					</date>
				</history>
				<permissions>
					<copyright-statement>Copyright &#x00A9; 2020 Bertrand, Boudaoud and Riveill</copyright-statement>
					<copyright-holder>BERTRAND, BOUDAOUD and RIVEILL</copyright-holder>
					<license xlink:href="http://creativecommons.org/licenses/by/4.0/">
						<p>This is an open-access article distributed under the terms of the Creative Commons Attribution License (CC BY). The use, distribution or reproduction in other forums is permitted, provided the original author(s) and the copyright owner(s) are credited and that the original publication in this journal is cited, in accordance with accepted academic practice. No use, distribution or reproduction is permitted which does not comply with these terms.</p>
					</license>
				</permissions>
				<abstract>
					<p>Data leakage can lead to severe issues for a company, including financial loss, damage of goodwill, reputation, lawsuits and loss of future sales. To prevent these problems, a company can use other mechanisms on top of traditional Access Control. These mechanisms include for instance Data Leak Prevention or Information Rights Management and can be referred as Transmission Control. However, such solutions can lack usability and can be intrusive for end-users employees. To have a better understanding of the perception and usage of such mechanisms within business infrastructures, we have conducted in this article an online survey on 150 employees. These employees come from different companies of different sizes and sectors of activity. The results show that whatever the size of the company or its sector of activity, security mechanisms such as access control and transmission control can be considered as quite intrusive and blocking for employees. Moreover, our survey also shows interesting results regarding more acceptable and user-friendly anti-data leakage mechanisms that could be used within companies.</p>
				</abstract>
				<kwd-group>
					<kwd>security</kwd>
					<kwd>data leakage</kwd>
					<kwd>access control</kwd>
					<kwd>transmission control</kwd>
					<kwd>security policies</kwd>
					<kwd>usability</kwd>
					<kwd>online survey</kwd>
					<kwd>end-users perception</kwd>
				</kwd-group>
				<contract-sponsor id="cn001">Fonds Unique Interminist&#xe9;riel<named-content content-type="fundref-id">10.13039/501100003391</named-content>
				</contract-sponsor>
				<counts>
					<page-count count="0"/>
				</counts>
			</article-meta>
		</front>
		<body>
			<sec id="s1">
				<title>Introduction</title>
				<p>While doing business, a company creates, exchanges and saves meaningful data. These meaningful data are valuable for the company wealth, good functioning and reliability. Thus, a company has to protect these information. To do so, a company can use Access Control (AC), which is a set of techniques that restrict the access to resources to specific and authorized users by defining &#x201c;who can access what?&#x201d; However, due to the growth of networks and connected computers, a security issue, called data leakage, has arisen.</p>
				<p>Data leakage has been defined as the unauthorized distribution of confidential or sensitive data (by sensitive, we include information that poses a risk to a company if discovered by a competitor or the general public.) to an unauthorized entity (<xref ref-type="bibr" rid="B33">Shabtai et al., 2012</xref>). For this reason, data leakage can create various problems for a company, such as financial loss, damage of goodwill and reputation, lawsuits, loss of future sales or exposure of intellectual properties (<xref ref-type="bibr" rid="B46">Cisco Systems, 2009</xref>). The cause of leakage can either be external (i.e., from outsiders) or internal (i.e., from employees, collaborators, etc.). Moreover, data leakage can be:</p>
				<list list-type="bullet">
					<list-item>
						<p>
							<italic>Intentional</italic>: which means done with full knowledge of the facts (i.e., I know that I do not have the right to do it, for example sending a document, or I bypass on purpose the security mechanism). Intentional data leakage can be done by a spy, hacker or a malicious employee motivated by grudge or revenge;</p>
					</list-item>
					<list-item>
						<p>
							<italic>Unintentional</italic>: which means done without full knowledge of the facts and without intent to cause harm. This kind of data leak can be due to human errors, lack of awareness, clumsiness, etc.</p>
					</list-item>
				</list>
				<p>In this paper, we focus on unintentional data leakage.</p>
				<p>To avoid data leakage, a company can use other solutions besides AC, such as Data Leak Prevention (DLP) and Information Rights Management (IRM). However, these mechanisms can be complex to apprehend (i.e., not easy to understand and use) for end-users. For example:</p>
				<list list-type="bullet">
					<list-item>
						<p>Some end-users may have difficulties to understand why they need to apply specific security mechanisms and follow security rules. Even if most of users understand that security is a fundamental need, the security restrictions can be seen by employees as a lack of confidence from the employer or a depreciation of their skill and professionalism.</p>
					</list-item>
					<list-item>
						<p>Some end-users may struggle with security mechanisms when doing their work, which can be frustrating and very time-consuming and push some of them to bypass security rules.</p>
					</list-item>
					<list-item>
						<p>Some employees, in the case of small companies, may need to understand the technical basics of the security mechanisms (such as security of data at rest, security of data in-use and security of data in-motion, etc.) even if they do not have the knowledge.</p>
					</list-item>
				</list>
				<p>Having a security mechanism that is difficult to apprehend does not help to adopt it. Generally, most of people/end-users &#x201c;give up&#x201d; when a security mechanism become complex to understand and/or use. Thus, what is needed is an anti-data leakage solution that is user-friendly, usable, acceptable and non-intrusive for the employees of a company. In order to provide such solution, we present in this article a survey we have conducted among employees of several companies. This survey serves the following purposes:</p>
				<list list-type="bullet">
					<list-item>
						<p>Gather information on the employees&#x27; position, computer skills and sector of activity.</p>
					</list-item>
					<list-item>
						<p>Gain insight on the employee&#x2019;s knowledge and perception toward access control and data leakage.</p>
					</list-item>
					<list-item>
						<p>Determine the mechanisms the employees would prefer to prevent them from performing unintentional data leakage.</p>
					</list-item>
				</list>
				<p>Regarding the activity sector, we target all kind of domains:</p>
				<list list-type="bullet">
					<list-item>
						<p>Information and Communication Technology</p>
					</list-item>
					<list-item>
						<p>Health</p>
					</list-item>
					<list-item>
						<p>Energy</p>
					</list-item>
					<list-item>
						<p>Defence</p>
					</list-item>
					<list-item>
						<p>Consulting</p>
					</list-item>
					<list-item>
						<p>Scientific, Research, and Development</p>
					</list-item>
					<list-item>
						<p>Industrial (mechanic, cars, metallurgy, etc.)</p>
					</list-item>
					<list-item>
						<p>Construction</p>
					</list-item>
					<list-item>
						<p>Consumer goods, Transport, Hotel, Food, Catering</p>
					</list-item>
					<list-item>
						<p>Insurance/Banking/Financial institution</p>
					</list-item>
					<list-item>
						<p>Housing</p>
					</list-item>
					<list-item>
						<p>Public administration, academic</p>
					</list-item>
				</list>
				<p>The rest of the article is structured as follows: &#x201c;Related Works&#x201d; section gives an overview about existing works on access control, data leak prevention, information right management and surveys on security and usability. &#x201c;Online Survey<bold>&#x201d;</bold> details our survey. Sections &#x201c;Feedbacks on Context, Participants&#x2019; Positions and Skills,&#x201d; &#x201c;Feedbacks on Awareness, Knowledge and Perception Towards Security Policies and Data Leakage&#x201d; and &#x201c;Feedbacks Towards Data Leak Prevention Mechanisms&#x201d; present the results we have obtained. &#x201c;Discussion&#x201d; section discusses the most interesting correlations we have identified. Finally, &#x201c;Conclusion and Future Works&#x201d; section concludes the article and give insights on future works.</p>
			</sec>
			<sec id="s2">
				<title>Related Works</title>
				<p>Many existing works have focused on designing and developing AC, DLP, and IRM mechanisms to prevent data leakage. All these mechanisms have advantages and disadvantages from a technical point of view. However, even if these mechanisms are powerful, unintentional data leakage happens in all kinds of activity sector (see <xref ref-type="table" rid="T1">Table 1</xref>). This is mainly due to human factors (<xref ref-type="bibr" rid="B21">Kirlappos et al., 2014</xref>; <xref ref-type="bibr" rid="B2">Alotaibi et al., 2016</xref>; <xref ref-type="bibr" rid="B5">Beautement et al., 2016</xref>; <xref ref-type="bibr" rid="B39">Wan Basri and Maryati, 2018</xref>) as these mechanisms are generally not user-centric (<xref ref-type="bibr" rid="B41">Workman et al., 2008</xref>; <xref ref-type="bibr" rid="B5">Beautement et al., 2016</xref>) and have been designed without considering the point of view of the end-user. Several studies have been conducted to analyze human factors regarding the use of security mechanisms and security policies (<xref ref-type="bibr" rid="B27">Pahnila et al., 2007</xref>; <xref ref-type="bibr" rid="B41">Workman et al., 2008</xref>; <xref ref-type="bibr" rid="B28">Rhee et al., 2009</xref>; <xref ref-type="bibr" rid="B21">Kirlappos et al., 2014</xref>; <xref ref-type="bibr" rid="B5">Beautement et al., 2016</xref>). However, to the best of our knowledge, none of these studies have focused on the end-users perception regarding data leakage within companies.</p>
				<table-wrap id="T1" position="float">
					<label>TABLE 1</label>
					<caption>
						<p>Some example of real cases of data leakage.</p>
					</caption>
					<table frame="hsides" rules="groups">
						<thead>
							<tr>
								<th>Date</th>
								<th align="center">Organization</th>
								<th align="center">Information</th>
							</tr>
						</thead>
						<tbody>
							<tr>
								<td>2007</td>
								<td>U.S. Nuclear Laboratory</td>
								<td>An employee transmitted confidential information on US atomic weapons by email via non-secured networks to members of the board of los Alamos National security</td>
							</tr>
							<tr>
								<td>2008</td>
								<td>Norway Government</td>
								<td align="left">The tax agency mistakenly sent CDs containing confidential information about nearly 4 millions (i.e., 85%) of Norwegian adults to nine major media groups</td>
							</tr>
							<tr>
								<td>2011</td>
								<td>Sogeti</td>
								<td>A file containing the personal information and evaluations of 298 employees was unintentionally sent by email to these employees. Among personal information such as salaries and raise the file included commentaries on employees performances</td>
							</tr>
							<tr>
								<td>2016</td>
								<td>Google</td>
								<td>A company&#x2019;s staff benefits vendor mistakenly sent an email containing employee&#x2019;s sensitive information to the wrong recipient</td>
							</tr>
							<tr>
								<td>2016</td>
								<td>Australian Government</td>
								<td>An administrative error from the prime minister&#x2019;s department revealed a mailing list of 800 addresses that were supposed to be confidential</td>
							</tr>
							<tr>
								<td>2016</td>
								<td>Federal Deposit Insurance Corporation</td>
								<td>Former employee accidentally made a copy of 44.000 customers on a USB drive</td>
							</tr>
						</tbody>
					</table>
				</table-wrap>
				<p>In this section, we first give an overview about the main works on Access Control, Data Leak Prevention and Information Right Management. However, we will not compare these mechanisms, as this is not the goal of this work. Then, we outline the existing surveys conducted regarding usability and security.</p>
				<sec id="s2-1">
					<title>Access Control</title>
					<p>Access Control (AC) aims at restricting access to resources. Traditionally, Access Control can be divided in two categories: Discretionary Access Control (DAC) (<xref ref-type="bibr" rid="B23">Lampson, 1974</xref>; <xref ref-type="bibr" rid="B31">Saltzer and Schroeder, 1975</xref>; <xref ref-type="bibr" rid="B16">Harrison et al., 1976</xref>) and Mandatory Access Control (MAC) (<xref ref-type="bibr" rid="B6">Bell and LaPadula, 1973</xref>; <xref ref-type="bibr" rid="B7">Biba, 1977</xref>). In DAC models, users can set, modify or share the access control of their resources. Most modern operating systems such as Windows, GNU/Linux and Mac OS are based on DAC models. On the contrary, MAC refers to a family of models where owners do not have to choose the rights over their resources. In this type of access control, the system assigns security labels or classifications to resources (for instance &#x201c;classified,&#x201d; &#x201c;secret,&#x201d; or &#x201c;top secret&#x201d;) and allows access to subjects or applications depending on their level of clearance. Over the last decades, several models have been proposed to cover the problem of Access Control. These models propose to take into account various notions, including roles (RBAC) (<xref ref-type="bibr" rid="B32">Sandhu, 1996</xref>), attributes (ABAC) (<xref ref-type="bibr" rid="B17">Hu, 2013</xref>), context (<xref ref-type="bibr" rid="B9">Corrad, 2004</xref>), history (<xref ref-type="bibr" rid="B4">Banerjee and Naumann, 2004</xref>), risk (<xref ref-type="bibr" rid="B19">Kandala et al., 2011</xref>), authorization (<xref ref-type="bibr" rid="B20">Karp et al., 2010</xref>) or trust (<xref ref-type="bibr" rid="B18">Kagal et al., 2001</xref>).</p>
				</sec>
				<sec id="s2-2">
					<title>Data Leak Prevention</title>
					<p>In <xref ref-type="bibr" rid="B33">Shabtai et al., 2012</xref>, a DLP has been described as a &#x201c;system that monitors and enforces policies on fingerprinted data that are at rest (i.e., in storage), in-motion (i.e., across a network) or in-use (i.e., during an operation) on public or private computer/network.&#x201d; DLPs are usually based on policies. These policies can help security experts and administrators to prevent data leakage by defining rules such as &#x201c;send an email when user U1 sends document X to user U2.&#x201d; Since 2006, several larger vendors have bought smaller companies specialized in data security.<xref ref-type="fn" rid="FN1">
							<sup>b</sup>
						</xref> Thanks to these buyouts, DLPs technologies have started to arise since 2008, proposing scalable and business oriented solutions. Nowadays, the biggest vendors are Websense,<xref ref-type="fn" rid="FN2">
							<sup>c</sup>
						</xref> Trend Micro,<xref ref-type="fn" rid="FN3">
							<sup>d</sup>
						</xref> RSA,<xref ref-type="fn" rid="FN4">
							<sup>e</sup>
						</xref> Symantec<xref ref-type="fn" rid="FN5">
							<sup>f</sup>
						</xref> and Palisade Systems.<xref ref-type="fn" rid="FN6">
							<sup>g</sup>
						</xref>
					</p>
					<p>From the academic point of view, researchers have focused on several problems, including emails leakage protection (<xref ref-type="bibr" rid="B44">Zilberman et al., 2011</xref>), network and Web based protection (<xref ref-type="bibr" rid="B8">Caputo et al., 2009</xref>) and misuse detection in database (<xref ref-type="bibr" rid="B14">Harel et al., 2010</xref>; <xref ref-type="bibr" rid="B15">Harel et al., 2012</xref>). Moreover, solutions have been proposed to improve detection methods by using machine learning (<xref ref-type="bibr" rid="B13">Gafny et al., 2010</xref>; <xref ref-type="bibr" rid="B26">Mathew et al., 2010</xref>; <xref ref-type="bibr" rid="B24">Li et al., 2015</xref>). Closer to industrial preoccupations (<xref ref-type="bibr" rid="B1">Alawneh and Abbadi, 2008</xref>), have proposed a framework to protect the data shared between collaborative organizations. Finally, some works have been proposed to tackle sensitive data (<xref ref-type="bibr" rid="B10">Chae et al., 2015</xref>) or confidentiality (<xref ref-type="bibr" rid="B11">di Vimercati, 2011</xref>).</p>
				</sec>
				<sec id="s2-3">
					<title>Information Rights Management</title>
					<p>IRM is a subset of Digital Rights Management (DRM). A DRM is a mechanism that aims at preventing unauthorized redistribution of a digital media (e.g., document, music, video) and restricts the ways consumers can use this content (copy, distribution to others, etc.). DRM solutions have been developed in response to the increase of online piracy (i.e., redistribution of copyrighted information over the Internet thanks to peer-to-peer networks). Within companies, IRM [Other names, such as Enterprise DRM, can also be found in the research field] can be used. IRM refers to Rights Management technology specifically designed for enterprise documents. Thus, IRM aims at protecting sensitive information, such as patents, employees personal information or financial data.</p>
					<p>The main vendors in the domain are Seclore,<xref ref-type="fn" rid="FN7">
							<sup>h</sup>
						</xref> Microsoft,<xref ref-type="fn" rid="FN8">
							<sup>i</sup>
						</xref> Covertix,<xref ref-type="fn" rid="FN9">
							<sup>j</sup>
						</xref> and EMC.<xref ref-type="fn" rid="FN10">
							<sup>k</sup>
						</xref> From the academic point of view, traditional DRM have been discussed in many papers (<xref ref-type="bibr" rid="B29">Rosenblatt et al., 2001</xref>; <xref ref-type="bibr" rid="B36">Subramanya and Yi, 2006</xref>; <xref ref-type="bibr" rid="B38">Van Tassel, 2006</xref>). Different IRM solutions have also been proposed and compared (<xref ref-type="bibr" rid="B37">van Beek, 2007</xref>), especially to tackle problems such as insiders leak (<xref ref-type="bibr" rid="B43">Yu and Chiueh, 2004</xref>), usage tracking (<xref ref-type="bibr" rid="B42">Yang et al., 2013</xref>) and storage efficiency issues (<xref ref-type="bibr" rid="B35">Soliman et al., 2015</xref>).</p>
				</sec>
				<sec id="s2-4">
					<title>Surveys on Security and Usability</title>
					<p>Many surveys on security and usability have been proposed over the years. For instance, specific types of users, such as administrators or security experts have been targeted by surveys such as CryptzoneSurvey.<xref ref-type="fn" rid="FN11">
							<sup>l</sup>
						</xref> In this survey, administrators have been asked to give insights on the usage of network Access Control technologies and best practices. In SANS survey,<xref ref-type="fn" rid="FN12">
							<sup>m</sup>
						</xref> security experts have been solicited to have insights on end-users security behavior. Closely to end-users themselves, security and usability have been studied in many ways, covering fields such as privacy (<xref ref-type="bibr" rid="B22">Kumaraguru and Cranor, 2005</xref>) and behavior (<xref ref-type="bibr" rid="B5">Beautement et al., 2016</xref>). Moreover, studies have been conducted to determine the perception of security properties such as confidentiality (<xref ref-type="bibr" rid="B3">Bai et al., 2016</xref>; <xref ref-type="bibr" rid="B30">Ruoti et al., 2016</xref>) and authentication (<xref ref-type="bibr" rid="B34">Stobert and Biddle, 2014</xref>) while other works have proposed mechanisms such as recommendation systems (<xref ref-type="bibr" rid="B25">Liu et al., 2016</xref>) and indicators (<xref ref-type="bibr" rid="B12">Felt et al., 2016</xref>) to help the end-users.</p>
					<p>Finally, other works have been proposed in the DLP field to take into account usability. For instance (<xref ref-type="bibr" rid="B45">Ko et al., 2014</xref>), have proposed a user-centric mantrap-inspired DLP solution, implemented in Debian Linux to inform end-users about potential data leak and allow them to fully decide sending or not the data. In addition, DLP vendors such as Clearswift<xref ref-type="fn" rid="FN13">
							<sup>n</sup>
						</xref> and Teramind<xref ref-type="fn" rid="FN14">
							<sup>o</sup>
						</xref> propose adaptive dashboards and reporting in order to make their products more usable and user-friendly. However, to the best of our knowledge, no survey has been proposed to specifically target the end-users perception toward data leakage within companies. Thus, we aim at gathering information on this topic by proposing an online survey. This survey is described in the next section.</p>
				</sec>
			</sec>
			<sec id="s3">
				<title>Online Survey</title>
				<p>In this Section, we present the online survey that we have designed to collect data from a broad audience of employees having different profiles (in terms of position and computer skill) and working in different companies (in terms of size and activity sector). The ultimate goal was to gather information on employees and their awareness, perception and knowledge regarding security policies and data leakage, within their working environment, to investigate three research questions:<list list-type="bullet">
						<list-item>
							<p>What is the knowledge and perception of employees regarding security policies, more specifically Access Control (&#x201c;who can access what?&#x201d;) and Transmission Control (&#x201c;Who can send what to whom?&#x201d;), and data leakage.</p>
						</list-item>
						<list-item>
							<p>Are the employees aware of what they can or cannot do?</p>
						</list-item>
						<list-item>
							<p>What are the mechanisms they would prefer to avoid unintentional data leakage?</p>
						</list-item>
					</list>
				</p>
				<p>Therefore, we have defined the most pertinent questions to collect useful answers for these research questions and have feedbacks of the participants on:<list list-type="bullet">
						<list-item>
							<p>Context (size of the company and activity sector), position and skill;</p>
						</list-item>
						<list-item>
							<p>Awareness, knowledge and perception toward security policies and data leakage;</p>
						</list-item>
						<list-item>
							<p>Data leak prevention mechanisms.</p>
						</list-item>
					</list>
				</p>
				<p>The survey included closed-ended multiple-choice questions, open-ended questions, and rating questions using a Likert scale. It was implemented using Google Form and was composed of 16 questions. The survey has been proposed in English<xref ref-type="fn" rid="FN15">
						<sup>p</sup>
					</xref> and French<xref ref-type="fn" rid="FN16">
						<sup>q</sup>
					</xref> and has been online for 10&#xa0;months. Concerning the answers, we have gathered 150 results by proposing our survey through social media (LinkedIn, Twitter), personal contacts list and personal Website. <xref ref-type="table" rid="T2">Table 2</xref> gives information on the questions and the type of answers. In the next subsections, we present the results we have obtained.</p>
				<table-wrap id="T2" position="float">
					<label>TABLE 2</label>
					<caption>
						<p>Questions and types of answers of our online survey.</p>
					</caption>
					<table frame="hsides" rules="groups">
						<thead>
							<tr>
								<th>ID</th>
								<th align="center">Questions</th>
								<th align="center">Types of answer</th>
							</tr>
						</thead>
						<tbody>
							<tr>
								<td rowspan="14" align="center">1</td>
								<td>What is the sector of your company?</td>
								<td rowspan="14">Radio button</td>
							</tr>
							<tr>
								<td align="left">&#x2022; Industrial (mechanic, cars, metallurgy, etc.)</td>
							</tr>
							<tr>
								<td>&#x2022; Construction</td>
							</tr>
							<tr>
								<td align="left">&#x2022; Consumer goods, transport, hotel, food, catering</td>
							</tr>
							<tr>
								<td>&#x2022; Information and communication</td>
							</tr>
							<tr>
								<td>&#x2022; Insurance/banking/financial institution</td>
							</tr>
							<tr>
								<td>&#x2022; Housing</td>
							</tr>
							<tr>
								<td align="left">&#x2022; Scientific, research, and development</td>
							</tr>
							<tr>
								<td align="left">&#x2022; Public administration, academic</td>
							</tr>
							<tr>
								<td>&#x2022; Health</td>
							</tr>
							<tr>
								<td>&#x2022; Energy</td>
							</tr>
							<tr>
								<td>&#x2022; Defense</td>
							</tr>
							<tr>
								<td>&#x2022; Consulting</td>
							</tr>
							<tr>
								<td>&#x2022; Other</td>
							</tr>
							<tr>
								<td rowspan="5" align="center">2</td>
								<td>What is the size of your company?</td>
								<td rowspan="5">Radio button</td>
							</tr>
							<tr>
								<td>&#x2022; Between 0 and 19 employees</td>
							</tr>
							<tr>
								<td>&#x2022; Between 20 and 249 employees</td>
							</tr>
							<tr>
								<td align="left">&#x2022; Between 250 and 5,000 employees</td>
							</tr>
							<tr>
								<td align="left">&#x2022; More than 5,000 employees</td>
							</tr>
							<tr>
								<td align="center">3</td>
								<td>What is your position?</td>
								<td>Short text area</td>
							</tr>
							<tr>
								<td align="center">4</td>
								<td>How would you rate your computer skills?</td>
								<td>Likert scale (1&#x2013;7)</td>
							</tr>
							<tr>
								<td align="center">5</td>
								<td align="left">In your work, do you have to manage sensitive data?</td>
								<td>Radio button</td>
							</tr>
							<tr>
								<td rowspan="4" align="center">6</td>
								<td align="left">If so, do you often manipulate such data?</td>
								<td rowspan="4">Radio button</td>
							</tr>
							<tr>
								<td>&#x2022; Rarely (&#x201c;it is never common in my work to manipulate sensitive data.&#x201d;)</td>
							</tr>
							<tr>
								<td>&#x2022; Often (&#x201c;from time to time, I have to manipulate sensitive data.&#x201d;)</td>
							</tr>
							<tr>
								<td>&#x2022; Frequently (&#x201c;A significant part of my work is to manipulate sensitive data.&#x201d;)</td>
							</tr>
							<tr>
								<td rowspan="5" align="center">7</td>
								<td align="left">In your company, are you aware of the security policies that concern you?</td>
								<td rowspan="5">Radio button</td>
							</tr>
							<tr>
								<td align="left">By security policies, we mean policies of access control (&#x201c;who can access what?&#x201d;) and transmission control (&#x201c;who can send what to whom?&#x201d;)</td>
							</tr>
							<tr>
								<td align="left">&#x2022; Yes, I know what I can/cannot do</td>
							</tr>
							<tr>
								<td align="left">&#x2022; No, I know that they exist, but I do not know what I can do/cannot do</td>
							</tr>
							<tr>
								<td align="left">&#x2022; No, and I do not know if they exist</td>
							</tr>
							<tr>
								<td rowspan="5" align="center">8</td>
								<td align="left">If you are aware of such policies, have you ever done anything to bypass them?</td>
								<td rowspan="5">Radio button</td>
							</tr>
							<tr>
								<td align="left">Example: Send a document to someone who had no access to this resource</td>
							</tr>
							<tr>
								<td align="left">&#x2022; Yes, and I was aware that I was bypassing security</td>
							</tr>
							<tr>
								<td align="left">&#x2022; Yes, but I was not aware that I was bypassing security</td>
							</tr>
							<tr>
								<td align="left">&#x2022; No, never</td>
							</tr>
							<tr>
								<td align="center">9</td>
								<td>Do you think that not being aware of such policies is an obstacle for your work?</td>
								<td>Likert scale (1&#x2013;5)</td>
							</tr>
							<tr>
								<td rowspan="5" align="center">10</td>
								<td align="left">According to you, data leakage can be</td>
								<td rowspan="5">Radio button</td>
							</tr>
							<tr>
								<td align="left">&#x2022; A problem for the company (financial loss, image, etc.)</td>
							</tr>
							<tr>
								<td align="left">&#x2022; A problem for the employee (official warning, dismissal, etc.)</td>
							</tr>
							<tr>
								<td>&#x2022; A problem for both</td>
							</tr>
							<tr>
								<td>&#x2022; A problem for neither of them</td>
							</tr>
							<tr>
								<td align="center">11</td>
								<td>Are you aware of security mechanisms implemented within your company?</td>
								<td>Radio button</td>
							</tr>
							<tr>
								<td align="center">12</td>
								<td>Do you think that these mechanisms are an obstacle to your work?</td>
								<td>Likert scale (1&#x2013;5)</td>
							</tr>
							<tr>
								<td align="center">13</td>
								<td>Do you think that these mechanisms are intrusive for employees?</td>
								<td>Likert scale (1&#x2013;5)</td>
							</tr>
							<tr>
								<td rowspan="8" align="center">14</td>
								<td align="left">According to you, what are the most efficient mechanisms to avoid data leakage?</td>
								<td rowspan="8">Checkboxes</td>
							</tr>
							<tr>
								<td align="left">&#x2022; Notify users that an action is going to cause a data leakage and let her/him choose (e.g., popup messages)</td>
							</tr>
							<tr>
								<td>&#x2022; Notify users that an action is going to cause a data leakage and prevent this action</td>
							</tr>
							<tr>
								<td>&#x2022; Send an email to the administrator/manager to notify her/him and automatically prevent the action</td>
							</tr>
							<tr>
								<td>&#x2022; Send an email to the administrator/manager in order for her/him to choose if the action can be performed or not</td>
							</tr>
							<tr>
								<td align="left">&#x2022; Automatically deactivate actions that can cause data leakage (for instance, automatically deactivate the &#x201c;send&#x201d; button when a confidential attached document is put within an email)</td>
							</tr>
							<tr>
								<td>&#x2022; Prevent the action without notifying the user</td>
							</tr>
							<tr>
								<td>&#x2022; Other form of mechanisms (you can share ideas at the end of the form)</td>
							</tr>
							<tr>
								<td align="center">15</td>
								<td>In the end, you would prefer a mechanism that let you decide, but might let you perform data leakage or a mechanism that prevent you from unintentional data leakage, but does not let you decide</td>
								<td>Radio button</td>
							</tr>
							<tr>
								<td align="center">16</td>
								<td align="left">If you have any ideas of mechanisms, some remarks or comments.</td>
								<td>Text area</td>
							</tr>
						</tbody>
					</table>
				</table-wrap>
			</sec>
			<sec id="s4">
				<title>Feedbacks on Context, Participants&#x2019; Positions and Skills</title>
				<p>In this subsection, we first present the results we have obtained concerning the context (i.e., size of the companies and sectors of activity). Then, we present the results on the participants&#x2019; positions and computer&#x2019;s skills.</p>
				<sec id="s4-1">
					<title>Sectors of Activity</title>
					<p>The question 1 (<italic>What is the sector of your company?</italic>) of the survey is related to the sector the participants are working in <xref ref-type="fig" rid="F1">Figure 1</xref> shows various results due to the fact that different mediums have been used to share the survey. Thus, various sectors are represented, such as IT (28%), business/transport/hotel/food/catering (13.3%), housing (12%) or Insurance/banking/financial institution (8.6%). Other fields, such as defense (2%) construction (1.3%) or energy (0.6%) are anecdotal.</p>
					<fig id="F1" position="float">
						<label>FIGURE 1</label>
						<caption>
							<p>Distribution of the different sectors of activity.</p>
						</caption>
						<graphic xlink:href="fdata-03-568257-g001.tif"/>
					</fig>
				</sec>
				<sec id="s4-2">
					<title>Size and Types of Companies</title>
					<p>Thanks to the question 2 (<italic>What is the size of your company?</italic>)<italic>,</italic> we have underlined that all sizes of companies are also represented. Indeed, results in <xref ref-type="fig" rid="F2">Figure 2</xref> show that roughly 52% (30.6 &#x2b; 21.3) of the participants work in companies that employ less than 250 employees. Moreover, results show that big companies (i.e., strictly more than 5,000 employees) are also well represented (29.3%).</p>
					<fig id="F2" position="float">
						<label>FIGURE 2</label>
						<caption>
							<p>Distribution of the size of the companies.</p>
						</caption>
						<graphic xlink:href="fdata-03-568257-g002.tif"/>
					</fig>
				</sec>
				<sec id="s4-3">
					<title>Position of the Participants</title>
					<p>Thanks to the question 3 (<italic>What is your position?</italic>), the survey shows various results regarding the position of the participants. Indeed, <xref ref-type="table" rid="T3">Table 3</xref> shows a snippet of the results we have obtained. As one can see, various profiles can be underlined, including technical positions such as IT engineers, administrators, developers and security experts. Moreover, other profiles can be highlighted, such as accountant, bankers, Ph.D. students/researchers and employees from human resources. Finally, other types of participants have also answered the survey, including librarians, CEOs, professional photographs and building architects.</p>
					<table-wrap id="T3" position="float">
						<label>TABLE 3</label>
						<caption>
							<p>Snippet of some of our participants&#x2019; positions.</p>
						</caption>
						<table frame="hsides" rules="groups">
							<thead>
								<tr>
									<th>Position</th>
									<th align="center">Number of participants fitting a position</th>
									<th align="center">Sector of activity</th>
								</tr>
							</thead>
							<tbody>
								<tr>
									<td>Accountant</td>
									<td align="center">6</td>
									<td>Insurance/banking/financial institution</td>
								</tr>
								<tr>
									<td>Solution architect</td>
									<td align="center">1</td>
									<td>Information and communication</td>
								</tr>
								<tr>
									<td>Community manager</td>
									<td align="center">1</td>
									<td>Information and communication</td>
								</tr>
								<tr>
									<td>Head of vessel finance team</td>
									<td align="center">2</td>
									<td>Consumer goods, transport, hotel, food, catering</td>
								</tr>
								<tr>
									<td>Librarian</td>
									<td align="center">3</td>
									<td align="left">Public administration, academic</td>
								</tr>
								<tr>
									<td>Senior risk advisor</td>
									<td align="center">1</td>
									<td>Insurance/banking/financial institution</td>
								</tr>
								<tr>
									<td>Entrepreneur</td>
									<td align="center">3</td>
									<td>Other</td>
								</tr>
								<tr>
									<td>Operation executive</td>
									<td align="center">1</td>
									<td>Consulting</td>
								</tr>
								<tr>
									<td>CEO</td>
									<td align="center">1</td>
									<td>Housing</td>
								</tr>
								<tr>
									<td>Investigator</td>
									<td align="center">1</td>
									<td>Defense</td>
								</tr>
								<tr>
									<td>Broker</td>
									<td align="center">2</td>
									<td>Insurance/banking/financial institution</td>
								</tr>
								<tr>
									<td>SEO specialist</td>
									<td align="center">1</td>
									<td>Information and communication</td>
								</tr>
								<tr>
									<td>Web designer</td>
									<td align="center">1</td>
									<td>Information and communication</td>
								</tr>
								<tr>
									<td>Architect</td>
									<td align="center">5</td>
									<td>Energy</td>
								</tr>
								<tr>
									<td>Business analyst</td>
									<td align="center">1</td>
									<td>Insurance/banking/financial institution</td>
								</tr>
								<tr>
									<td>IT security expert</td>
									<td align="center">1</td>
									<td>Industry</td>
								</tr>
								<tr>
									<td>International sales and Marketing manager</td>
									<td align="center">1</td>
									<td>Consumer goods, transport, hotel, food, catering</td>
								</tr>
							</tbody>
						</table>
					</table-wrap>
					<table-wrap id="T4" position="float">
						<label>TABLE 4</label>
						<caption>
							<p>The average perceived skill for each size of company.</p>
						</caption>
						<table frame="hsides" rules="groups">
							<thead>
								<tr>
									<th>Size of the company</th>
									<th align="center">Average perceived skill</th>
								</tr>
							</thead>
							<tbody>
								<tr>
									<td>Micro-enterprise</td>
									<td align="center">4.54</td>
								</tr>
								<tr>
									<td>SME</td>
									<td align="center">4.65</td>
								</tr>
								<tr>
									<td>MidCaps company</td>
									<td align="center">5.61</td>
								</tr>
								<tr>
									<td>Large company</td>
									<td align="center">5.56</td>
								</tr>
							</tbody>
						</table>
					</table-wrap>
				</sec>
				<sec id="s4-4">
					<title>Computer Skills</title>
					<p>The results of the question 4 (<italic>How would you rate your computer skills?</italic>) depicted in <xref ref-type="fig" rid="F3">Figure 3</xref> underline that the level of knowledge and skill is a very subjective and personal perception. For instance, some accountants have set a very high score (6 out of 7) while some IT professionals have set a smaller level for their own skills. Nevertheless, it is safe to state that whatever the position, most participants consider that they know some things on computers.</p>
					<fig id="F3" position="float">
						<label>FIGURE 3</label>
						<caption>
							<p>Distribution of the perceived computer skill on a scale from 1 to 7 (in percentage).</p>
						</caption>
						<graphic xlink:href="fdata-03-568257-g003.tif"/>
					</fig>
					<p>Generally, there is no correlation between the perceived computer skill and the position except for the participants who have a very high skill level (7) where 60% of the participants have a technical profile in Information and Communication Technology (developer, IT support, architect, team leader, engineer, etc.). However, we noticed that there is a correlation between the perceived skill and the size of the company. The skill increases slightly with the size of the company as we can see it in the table below.</p>
					<p>Now that we have described the results concerning the context and employees, we describe in the next subsection the questions and results that target employees&#x2019; awareness, knowledge and perception on security policies and data leakage.</p>
				</sec>
			</sec>
			<sec id="s5">
				<title>Feedbacks on Awareness, Knowledge and Perception Toward Security Policies and Data Leakage</title>
				<p>In this subsection, we present the results of the questions 5&#x2013;13 that we have proposed to:<list list-type="order">
						<list-item>
							<p>Determine if the participants:</p>
							<list list-type="bullet">
								<list-item>
									<p>Use sensitive data (Question 5 and 6);</p>
								</list-item>
								<list-item>
									<p>Are aware of any security policies within their companies (Question 7);</p>
								</list-item>
								<list-item>
									<p>Have ever been the cause of intentional or unintentional data leakage (Question 8).</p>
								</list-item>
							</list>
						</list-item>
						<list-item>
							<p>Collect the feeling and perception of the participants toward security policies and data leak prevention mechanisms.</p>
						</list-item>
					</list>
				</p>
				<sec id="s5-1">
					<title>Usage of Sensitive Data</title>
					<p>Thanks to questions 5 (<italic>In your work, do you have to manage sensitive data?</italic>) and 6 (<italic>If so, do you often manipulate such data?</italic>), we have noticed that 88.7% of participants manipulates sensitive data. We underline that the survey gives a definition of what a sensitive data is, in order to reduce biais induced by participant&#x2019;s own definition. While filling the form, we present the following definition for sensitive data: &#x201c;By sensitive data, we mean data containing confidential information that needs to be kept between a restricted set of users (patent, accounting, personal information, etc.).&#x201d;</p>
					<p>Concerning the occurrences, we have seen that 41.1% of participants manage sensitive data frequently (&#x201c;A significant part of my work is to manipulate sensitive data.&#x201d;), as against 19.2% who have declared that manipulating such data is rare (&#x201c;It is never common in my work to manipulate sensitive data.&#x201d;). Finally, 40% of participants have declared that they manage sensitive data in a quite regular basis (&#x201c;From time to time, I have to manipulate sensitive data.&#x201d;).</p>
					<p>We can conclude that many employees have to deal with sensitive data (e.g., patent, accounting, personal information) while performing their day to day tasks.</p>
					<p>The results obtained showed no correlation between the usage of sensitive data and the size of the company/activity sector or the position of the participants.</p>
				</sec>
				<sec id="s5-2">
					<title>Security Policies Awareness</title>
					<p>The next question (i.e., question 7: <italic>In your company, are you aware of the security policies that concern you?</italic>) we have asked to the participants refers to their knowledge regarding security policies within the company. Results shows that 69.5% of them are aware of the security policies and know what they can/cannot do in terms of security (i.e., Access and Transmission Control). However, we underline that roughly a quarter of them (23.8%) have declared that they do not really know what they can/cannot do, despite the fact that they are aware that some security policies exist. Finally, only 6.7% of the participants have declared that they are not aware of any security policies within their company. Based on these results, we can conclude that most participants have some knowledge on the security policies applied within their companies.</p>
					<p>The results obtained showed no correlation between awareness regarding security policies and the size of the company/activity sector or the position of the participants.</p>
				</sec>
				<sec id="s5-3">
					<title>Security Policy Bypassing</title>
					<p>Another question that we have asked is about bypassing security policies (i.e., question 8: <italic>If you are aware of such policies, have you ever done anything to bypass them?</italic>). Results show that 43.7% of the participants have bypassed a security policy without knowing it, causing a potential unintentional data leakage. Moreover, results show that 35.1% have declared that they have never bypassed a policy, while 21.2% have declared that they have bypassed a policy intentionally.</p>
					<p>While exchanging with the 10 participants who gave their email address, we have discovered that some unintentional bypasses have been performed for the following reasons (words in italic are words that have been used by the participants):<list list-type="bullet">
							<list-item>
								<p>
									<italic>Lack of awareness</italic>: security policies are not well specified or too obscure for the employees, preventing them to specifically know &#x201c;what can be done with the document.&#x201d;</p>
							</list-item>
							<list-item>
								<p>
									<italic>Lack of usability</italic>: security policies are blocking an employee on her/his task or context. Thus, she/he has to &#x201c;improvise.&#x201d;</p>
							</list-item>
							<list-item>
								<p>
									<italic>Carelessness</italic>: the participant does not consider the leakage of a particular data as &#x201c;critical&#x201d; or &#x201c;important.&#x201d;</p>
							</list-item>
						</list>
					</p>
					<p>The results obtained showed no correlation between the fact to bypass security policies and the size of the company/activity sector or the position/computer skill of the participants. However, concerning, the 65 participants who have answered that they have bypassed the security policies, their response regarding the question 7: &#x201c;In your company, are you aware of the security policies that concern you?&#x201d; was as follow:<list list-type="bullet">
							<list-item>
								<p>&#x201c;No, and I do not know if they exist&#x201d; for six of them;</p>
							</list-item>
							<list-item>
								<p>&#x201c;Yes, I know what I can/cannot do&#x201d; for 29 of them;</p>
							</list-item>
							<list-item>
								<p>&#x201c;No, I know that they exist but I do not know what I can do/cannot do&#x201d; for 30 of them.</p>
							</list-item>
						</list>
					</p>
				</sec>
				<sec id="s5-4">
					<title>Feelings Toward the Lack of Awareness and Knowledge</title>
					<p>Based on the previous declarations, we have asked participants their feelings on the lack of awareness and knowledge regarding the security policies of the company. Results of the question 9 (<italic>Do you think that not being aware of such policies is an obstacle for your work?</italic>) show that 61.6% have declared that not knowing the policies is an obstacle for their tasks (while only 17.2% have declared that it is not an obstacle at all). Thus, we can say that the lack of knowledge regarding the security policies can increase the difficulty of performing some tasks, like editing and sending documents such as patent, photos, reports or accounting files.</p>
					<p>The results obtained showed no correlation between the feelings toward the lack of awareness and knowledge regarding security policies and the size of the company/activity sector or the position of the participants.</p>
				</sec>
				<sec id="s5-5">
					<title>Data Leakage Perception</title>
					<p>In this Section, we present the results of the question 10 <italic>According to you, data leakage can be:</italic>
						<list list-type="bullet">
							<list-item>
								<p>A problem for the company (financial loss, image, etc.),</p>
							</list-item>
							<list-item>
								<p>A problem for the employee (official warning, dismissal, etc.),</p>
							</list-item>
							<list-item>
								<p>A problem for both,</p>
							</list-item>
							<list-item>
								<p>A problem for neither of them).</p>
							</list-item>
						</list>
					</p>
					<p>The results show that most of the participants (71.5%) are aware that a data leak can be a very big problem for both companies and employees. Moreover, 23.2% of them have declared that only companies are impacted after a data leakage. Finally, the other choices (i.e., &#x201c;a problem for the employee&#x201d; and &#x201c;a problem for neither of them&#x201d;) are anecdotal (respectively 4.6 and 0.7%). Thus, we can conclude that most participants are aware that data leakage can be a problem for both companies and employees independently from the size of the company/activity sector and their position.</p>
				</sec>
				<sec id="s5-6">
					<title>Mechanisms to Prevent Data Leakage</title>
					<p>Concerning the mechanisms to tackle the problem of data leakage, the results of the question 11 (<italic>Are you aware of security mechanisms implemented within your company?</italic>) show that 55% of participants have declared being aware that their company uses some kind of data leak prevention mechanisms. According to the 13 participants who have commented the form (thanks to the last question, i.e., question 16: <italic>If you have any ideas of mechanisms, some remarks or comments&#x2025;</italic>.), we can state that these mechanisms embed network filtering, document ciphering, Document Management System (DMS) and DLP (Symantec). However, no IRM mechanism has been cited yet.</p>
					<p>Most of the 13 participants, who have provided comments about the security mechanisms, have a technical profile (i.e., computer skills) and work for large companies in high tech domain (see <xref ref-type="table" rid="T5">Tables 5</xref>&#x2013;<xref ref-type="table" rid="T7">7</xref>).</p>
					<table-wrap id="T5" position="float">
						<label>TABLE 5</label>
						<caption>
							<p>Number of participants with comments per company size.</p>
						</caption>
						<table frame="hsides" rules="groups">
							<thead>
								<tr>
									<th>Size of the company</th>
									<th align="center">Numbers of participants</th>
								</tr>
							</thead>
							<tbody>
								<tr>
									<td>Micro-enterprise</td>
									<td align="center">3 (23%)</td>
								</tr>
								<tr>
									<td>SME</td>
									<td align="center">2 (15.4%)</td>
								</tr>
								<tr>
									<td>MidCaps company</td>
									<td align="center">4 (30.8%)</td>
								</tr>
								<tr>
									<td>Large company</td>
									<td align="center">4 (30.8%)</td>
								</tr>
							</tbody>
						</table>
					</table-wrap>
					<table-wrap id="T6" position="float">
						<label>TABLE 6</label>
						<caption>
							<p>Number of participants with comments per activity sector.</p>
						</caption>
						<table frame="hsides" rules="groups">
							<thead>
								<tr>
									<th>Activity sector</th>
									<th align="center">Numbers of participants</th>
								</tr>
							</thead>
							<tbody>
								<tr>
									<td>ICT</td>
									<td align="center">6 (46.15%)</td>
								</tr>
								<tr>
									<td>Industrial</td>
									<td align="center">4 (30.8%)</td>
								</tr>
								<tr>
									<td>Scientific, research and development</td>
									<td align="center">1 (7.7%)</td>
								</tr>
								<tr>
									<td>Construction</td>
									<td align="center">1 (7.7%)</td>
								</tr>
								<tr>
									<td>Insurance/banking/finanicial institution</td>
									<td align="center">1 (7.7%)</td>
								</tr>
							</tbody>
						</table>
					</table-wrap>
					<table-wrap id="T7" position="float">
						<label>TABLE 7</label>
						<caption>
							<p>The level of computer skill of the participants who have provided comments.</p>
						</caption>
						<table frame="hsides" rules="groups">
							<thead>
								<tr>
									<th>Level of computer skill</th>
									<th align="center">Numbers of participants</th>
								</tr>
							</thead>
							<tbody>
								<tr>
									<td align="left">1</td>
									<td align="center">0</td>
								</tr>
								<tr>
									<td align="left">2</td>
									<td align="center">1 (7.7%)</td>
								</tr>
								<tr>
									<td align="left">3</td>
									<td align="center">0</td>
								</tr>
								<tr>
									<td align="left">4</td>
									<td align="center">1 (7.7%)</td>
								</tr>
								<tr>
									<td align="left">5</td>
									<td align="center">3 (23%)</td>
								</tr>
								<tr>
									<td align="left">6</td>
									<td align="center">5 (38.4%)</td>
								</tr>
								<tr>
									<td align="left">7</td>
									<td align="center">3 (23%)</td>
								</tr>
							</tbody>
						</table>
					</table-wrap>
					<p>Concerning the other results, the survey shows that 21.2% of participants are not aware of security mechanisms within their company (as against 23.8% who have declared that such mechanism exists within their company, without having explicit knowledge of it).</p>
					<p>The results obtained showed a correlation between awareness and knowledge regarding data leak prevention mechanisms and the size of the company. This is discussed in &#x201c;Discussion.&#x201d;</p>
				</sec>
				<sec id="s5-7">
					<title>Feelings Toward Anti-Data Leakage Mechanisms</title>
					<p>Answers gathered thanks to questions 12 (<italic>Do you think that these mechanisms are an obstacle to your work?</italic>) and 13 (<italic>Do you think that these mechanisms are intrusive for employees?</italic>) show interesting results regarding the perception of data leak prevention mechanisms (see <xref ref-type="table" rid="T8">Table 8</xref>). On one hand, we can underline that for a non-negligible part of participants, these mechanisms are quite blocking. Indeed, if we consider levels 4 and 5, these mechanisms are quite constraining for 44% of participants. However, roughly a quarter of the participants (31.1%) considered that these mechanisms are not very constraining.</p>
					<table-wrap id="T8" position="float">
						<label>TABLE 8</label>
						<caption>
							<p>Perceived level of constraint on a scale from1 to 5 (5 is very constraining).</p>
						</caption>
						<table frame="hsides" rules="groups">
							<thead>
								<tr>
									<th>Level of constraint</th>
									<th align="center">Numbers of participants</th>
								</tr>
							</thead>
							<tbody>
								<tr>
									<td align="left">1</td>
									<td align="center">15/150 (10%)</td>
								</tr>
								<tr>
									<td align="left">2</td>
									<td align="center">32/150 (21.3%)</td>
								</tr>
								<tr>
									<td align="left">3</td>
									<td align="center">37/150 (24.6%)</td>
								</tr>
								<tr>
									<td align="left">4</td>
									<td align="center">51/150 (34%)</td>
								</tr>
								<tr>
									<td align="left">5</td>
									<td align="center">15/150 (10%)</td>
								</tr>
							</tbody>
						</table>
					</table-wrap>
					<p>Concerning the intrusiveness, <xref ref-type="table" rid="T9">Table 9</xref> shows that roughly 44% of participants think that these mechanisms are intrusive, while 31% have declared that it is not the case. Thus, we can conclude that the perception of constraint and intrusiveness varies from one individual (and context) to another. However, it is safe to state that these mechanisms are not imperceptible by most employees.</p>
					<table-wrap id="T9" position="float">
						<label>TABLE 9</label>
						<caption>
							<p>Perceived level of intrusiveness on a scale from 1 to 5 (5 is very intrusive).</p>
						</caption>
						<table frame="hsides" rules="groups">
							<thead>
								<tr>
									<th>Level of intrusiveness</th>
									<th align="center">Numbers of participants</th>
								</tr>
							</thead>
							<tbody>
								<tr>
									<td align="left">1</td>
									<td align="center">20/150 (13.3%)</td>
								</tr>
								<tr>
									<td align="left">2</td>
									<td align="center">25/150 (16.6%)</td>
								</tr>
								<tr>
									<td align="left">3</td>
									<td align="center">37/150 (24.6%)</td>
								</tr>
								<tr>
									<td align="left">4</td>
									<td align="center">53/150 (35.3%)</td>
								</tr>
								<tr>
									<td align="left">5</td>
									<td align="center">15/150 (10%)</td>
								</tr>
							</tbody>
						</table>
					</table-wrap>
					<p>The results obtained showed no correlation between the perception and feelings of the participants regarding data leak prevention mechanisms and the size of the company/activity sector or the position of the participants.</p>
				</sec>
			</sec>
			<sec id="s6">
				<title>Feedbacks Toward Data Leak Prevention Mechanisms</title>
				<p>In this section, we present the results of the questions 14 and 15.</p>
				<sec id="s6-1">
					<title>Preferred Anti-Data Leak Mechanisms</title>
					<p>The goal of the question 14 (see below) was to collect information about the preferences of the participants regarding anti-data leak mechanisms in terms of non-intrusiveness, ease-of use and efficiency.</p>
					<p>Question 14: According to you, what are the most efficient mechanisms to avoid data leakage?<list list-type="bullet">
							<list-item>
								<p>Notify users that an action is going to cause a data leakage and let her/him choose (e.g., popup messages).</p>
							</list-item>
							<list-item>
								<p>Notify users that an action is going to cause a data leakage and prevent this action.</p>
							</list-item>
							<list-item>
								<p>Send an email to the administrator/manager to notify her/him and automatically prevent the action.</p>
							</list-item>
							<list-item>
								<p>Send an email to the administrator/manager in order for her/him to choose if the action can be performed or not.</p>
							</list-item>
							<list-item>
								<p>Automatically deactivate actions that can cause data leakage (for instance, automatically deactivate the &#x201c;send&#x201d; button when a confidential attached document is put within an email).</p>
							</list-item>
							<list-item>
								<p>Prevent the action without notifying the user.</p>
							</list-item>
							<list-item>
								<p>Other form of mechanisms (you can share ideas at the end of the form).</p>
							</list-item>
						</list>
					</p>
					<p>The obtained results to this question are presented in <xref ref-type="table" rid="T10">Table 10</xref>.</p>
					<table-wrap id="T10" position="float">
						<label>TABLE 10</label>
						<caption>
							<p>Proposed mechanisms and their attractiveness.</p>
						</caption>
						<table frame="hsides" rules="groups">
							<thead>
								<tr>
									<th>Proposed mechanisms</th>
									<th align="center">Attractiveness (multiple choices)</th>
								</tr>
							</thead>
							<tbody>
								<tr>
									<td>Notify users that an action is going to cause a data leakage and let her/him choose (ex: popup messages)</td>
									<td align="center">68/150 (45.3%)</td>
								</tr>
								<tr>
									<td>Notify users that an action is going to cause a data leakage and prevent this action</td>
									<td align="center">68/150 (45.3%)</td>
								</tr>
								<tr>
									<td>Send an email to the administrator/manager to notify her/him and automatically prevent the action</td>
									<td align="center">37/150 (24.6%)</td>
								</tr>
								<tr>
									<td>Send an email to the administrator/manager in order for her/him to choose if the action can be performed or not</td>
									<td align="center">48/150 (32%)</td>
								</tr>
								<tr>
									<td>Automatically deactivate actions that can cause data leakage (for instance, automatically deactivate the &#x201c;send&#x201d; button when a confidential attached document is put within an email)</td>
									<td align="center">67/150 (44.6%)</td>
								</tr>
								<tr>
									<td>Prevent the action without notifying the user</td>
									<td align="center">14/150 (9.33%)</td>
								</tr>
								<tr>
									<td>Other form of mechanisms</td>
									<td align="center">7/150 (4.6%)</td>
								</tr>
							</tbody>
						</table>
					</table-wrap>
					<p>Moreover, we underline that an open question (i.e., the last Radio button: <italic>Other form of mechanisms</italic>) has been proposed to allow the participants to cite other mechanisms. Among the obtained results, we can cite:<list list-type="bullet">
							<list-item>
								<p>Use a Public Key Infrastructure.</p>
							</list-item>
							<list-item>
								<p>Use different levels of mechanisms depending on the sensitivity and the confidentiality of the data.</p>
							</list-item>
							<list-item>
								<p>Raise awareness of users (with training, recommendation systems, guidelines, etc.).</p>
							</list-item>
							<list-item>
								<p>Include a logging mechanism in case of conflict between a user and her/his hierarchy.</p>
							</list-item>
						</list>
					</p>
					<p>As we can see in <xref ref-type="table" rid="T5">Table 5</xref>, most of the participants would like to be notified that an action is going to cause a data leakage. 45% of the participants prefer to decide to continue or not the action they are performing. 56% of the participants prefer to not take any responsibility and leave the decision to the administrator/manager to prevent or not an action. However, 9% of the participants want to be considered and informed if an action is prevented. 69% are in favor of automatic actions (i.e., automatically prevent/deactivate action).</p>
				</sec>
				<sec id="s6-2">
					<title>Security vs &#x201c;Freedom&#x201d;</title>
					<p>The goal of the question 15 was to ask the participants if they would prefer a mechanism that let them decide, but might let them perform a data leakage (more &#x201c;freedom&#x201d;), or if they would prefer a mechanism that prevent them to perform unintentional data leakage, without letting them decide (more security). Results show that more than 55% of them prefer security over freedom, whatever the type of participants (i.e., positions and skills). However, we have discovered interesting correlation with the size of the companies. These correlations are presented in the next subsection.</p>
				</sec>
			</sec>
			<sec sec-type="discussion" id="s7">
				<title>Discussion</title>
				<p>In this final subsection, we discuss correlations we have identified between answers in order to underline some interesting results regarding the link between the size of a company and perception toward security. These correlations are presented in the next subsections.</p>
				<sec id="s7-1">
					<title>Correlation Between the Size of the Company and Security vs. Freedom</title>
					<p>By comparing the size of the companies and the previous question (i.e., question 15: <italic>In the end, you would prefer a mechanism that let you decide, but might let you perform data leakage or a mechanism that prevent you from unintentional data leakage, but does not let you decide</italic>), we have discovered that participants from very small companies tend to prefer a mechanism that promotes security over a certain freedom.</p>
					<p>Indeed, <xref ref-type="table" rid="T11">Table 11</xref> shows that, in the case of middle-sized, big, and very big companies, the ratio between answers are quite equivalent. In the case of very small companies, the distribution is very different, underlining that employees of these companies rather prefer a mechanism that prevent them to leak data, even if this mechanism is too restrictive. In order to have a better understanding of these results, we have asked some participants, in small companies, to explain their choice. Among the answers, we can highlight the following remarks (the words in italic are the ones used by the participants):<list list-type="bullet">
							<list-item>
								<p>&#x201c;The data are my bread and butter, I cannot lose them over a mistake.&#x201d; (Entrepreneur).</p>
							</list-item>
							<list-item>
								<p>&#x201c;It can be a big problem for me to send my pictures to the wrong person.&#x201d; (Professional photograph).</p>
							</list-item>
							<list-item>
								<p>&#x201c;As a member of a small company, everyone knows everyone, I guess it would be a shame to leak a personal information.&#x201d; (Secretary).</p>
							</list-item>
						</list>
					</p>
					<table-wrap id="T11" position="float">
						<label>TABLE 11</label>
						<caption>
							<p>Correlation between the perception of mechanisms and the size of the companies.</p>
						</caption>
						<table frame="hsides" rules="groups">
							<thead>
								<tr>
									<th>Company size</th>
									<th align="center">Number of participants</th>
									<th align="center">Security over &#x201c;freedom&#x201d;</th>
									<th align="center">&#x201c;Freedom&#x201d; over security</th>
								</tr>
							</thead>
							<tbody>
								<tr>
									<td>Micro-enterprise</td>
									<td align="center">46/150 (30.6%)</td>
									<td align="center">(73.9%)</td>
									<td align="center">(26.1%)</td>
								</tr>
								<tr>
									<td>SME</td>
									<td align="center">32/150 (21.3%)</td>
									<td align="center">(53.1%)</td>
									<td align="center">(46.9%)</td>
								</tr>
								<tr>
									<td>MidCaps company</td>
									<td align="center">28/150 (16.6%)</td>
									<td align="center">(57.2%)</td>
									<td align="center">(42.8%)</td>
								</tr>
								<tr>
									<td>Large company</td>
									<td align="center">44/150 (29.3%)</td>
									<td align="center">(47.7%)</td>
									<td align="center">(52.3%)</td>
								</tr>
							</tbody>
						</table>
					</table-wrap>
					<p>These answers show that a smaller infrastructure tends to make the leaker &#x201c;more responsible,&#x201d; probably because of the social proximity with the other employees.</p>
					<p>As a conclusion, we can say that the smaller the company, the bigger the need for security. Employees of bigger companies prefer having more freedom over security.</p>
				</sec>
				<sec id="s7-2">
					<title>Correlation Between the Size of the Company and Awareness Toward the Security Mechanisms</title>
					<p>When analyzing the results obtained for the question 11 (<italic>Are you aware of security mechanisms&#x2a; implemented within your company?</italic>), we have noticed that there is a correlation between awareness of the participants toward the security mechanisms and the size of the company (see <xref ref-type="table" rid="T12">Table 12</xref>
						<bold>)</bold>. Indeed, participants from bigger infrastructures tend to have a better awareness and knowledge of the security mechanisms used by their company. We hypothesize that bigger infrastructures are more likely to inform, raise the awareness and educate the employees, thanks to dedicated guidelines and training.</p>
					<table-wrap id="T12" position="float">
						<label>TABLE 12</label>
						<caption>
							<p>Correlation between the awareness of security mechanisms and the size of the company.</p>
						</caption>
						<table frame="hsides" rules="groups">
							<thead>
								<tr>
									<th>Company size</th>
									<th align="center">Number of participants</th>
									<th align="center">Yes</th>
									<th align="center">No, (but know they exist)</th>
									<th align="center">No, (do not know if they exist)</th>
								</tr>
							</thead>
							<tbody>
								<tr>
									<td>Micro-enterprise</td>
									<td align="center">46/150 (30.6%)</td>
									<td align="center">(58.7%)</td>
									<td align="center">(21.7%)</td>
									<td align="center">(19.6%)</td>
								</tr>
								<tr>
									<td>SME</td>
									<td align="center">32/150 (21.3%)</td>
									<td align="center">(46.9%)</td>
									<td align="center">(50%)</td>
									<td align="center">(3.1%)</td>
								</tr>
								<tr>
									<td>MidCaps company</td>
									<td align="center">28/150 (16.6%)</td>
									<td align="center">(75%)</td>
									<td align="center">(25%)</td>
									<td align="center">0</td>
								</tr>
								<tr>
									<td>Large company</td>
									<td align="center">44/150 (29.3%)</td>
									<td align="center">(93.2%)</td>
									<td align="center">(6.8%)</td>
									<td align="center">0</td>
								</tr>
							</tbody>
						</table>
					</table-wrap>
				</sec>
			</sec>
			<sec id="s8">
				<title>Conclusion and Future Works</title>
				<p>In this article, we have presented the results of an online survey that we have proposed to 150 employees from different companies. Among other things, the survey has been able to gather information on the context (e.g., size of the company, sector of activity) and the participants themselves (e.g., computer&#x2019;s skill, position). The survey has been used to have insights on the employee&#x2019;s knowledge and perception toward sensitive data and security policies. However, unlike existing works, we have been able to gather information on the attitude and perception of the employees regarding data leakage within companies and the used prevention mechanisms.</p>
				<p>The results have shown that the mechanisms used by the companies are quite known by end-users. However, many of them considered that these mechanisms are quite intrusive and blocking for their work. In addition, the survey has underlined that most of the participants have been involved in both intentional and unintentional data leakage for several reasons, including lack of awareness, lack of usability and carelessness. Moreover, we have spotted out differences between small and big companies. Indeed, the results have shown that employees of small infrastructures tends to prefer mechanisms that prevent data leak, even if this protection does not let them decide what to do. Concerning the awareness, the results also show that employees of bigger companies tend to be more aware and trained when it comes to security.</p>
				<p>Finally, we have used the survey to ask participants the mechanisms they would prefer in order to prevent them from unintentional data leakage. Based on the collected results, we will integrate the favorite solutions to an existing data leakage prevention policy engine. Moreover, we aim at using the context (i.e., type and sensitivity of the data, company&#x2019;s guideline, etc.) and the user preferences to dynamically change these mechanisms in order to provide contextual, usable, acceptable, non-intrusive and user-friendly anti-data leakage mechanisms.</p>
			</sec>
			<sec id="s9">
				<title>Data Availability Statement</title>
				<p>The raw data supporting the conclusions of this article will be made available by the authors, without undue reservation.</p>
			</sec>
			<sec id="s10">
				<title>Ethics Statement</title>
				<p>Ethical review and approval was not required for the study on human participants in accordance with the local legislation and institutional requirements. Written informed consent for participation was not required for this study in accordance with the national legislation and the institutional requirements.</p>
			</sec>
			<sec id="s11">
				<title>Author Contributions</title>
				<p>YB and KB designed the study. YB conducted the study and analyzed the results. KB and MR supervised the work done by YB. YB and KB contributed to manuscript revision. All the authors approved the submitted version.</p>
			</sec>
			<sec id="s12">
				<title>Funding</title>
				<p>This work was supported partly by the FUI (Fond Unique Interministriel) project named 4TRAX.</p>
			</sec>
			<sec sec-type="COI-statement" id="s13">
				<title>Conflict of Interest</title>
				<p>The authors declare that the research was conducted in the absence of any commercial or financial relationships that could be construed as a potential conflict of interest.</p>
			</sec>
		</body>
		<back>
			<ack>
				<p>The authors thank Patrice Pena and Marco Winckler for their useful feedback.</p>
			</ack>
			<fn-group>
				<fn id="FN1" fn-type="other">
					<label>b</label>
					<p>
						<ext-link ext-link-type="uri" xlink:href="http://www.zdnet.com/article/">http://www.zdnet.com/article/</ext-link>trend-micro-makes-dlp-move-symantec-stands-pat/.</p>
				</fn>
				<fn id="FN2" fn-type="other">
					<label>c</label>
					<p>
						<ext-link ext-link-type="uri" xlink:href="https://www.forcepoint.com/fr/product/web-filtering/websense-web-filter-security">https://www.forcepoint.com/fr/product/web-filtering/websense-web-filter-security</ext-link>
					</p>
				</fn>
				<fn id="FN3" fn-type="other">
					<label>d</label>
					<p>
						<ext-link ext-link-type="uri" xlink:href="http://www.trendmicro.fr/grandes-entreprises/protection-des-donnees/prevention-des-pertes-de-donnees-integree/">http://www.trendmicro.fr/grandes-entreprises/protection-des-donnees/prevention-des-pertes-de-donnees-integree/</ext-link>
					</p>
				</fn>
				<fn id="FN4" fn-type="other">
					<label>e</label>
					<p>
						<ext-link ext-link-type="uri" xlink:href="https://www.rsa.com/en-us">https://www.rsa.com/en-us</ext-link>
					</p>
				</fn>
				<fn id="FN5" fn-type="other">
					<label>f</label>
					<p>
						<ext-link ext-link-type="uri" xlink:href="https://www.symantec.com/fr/fr/data-loss-prevention/">https://www.symantec.com/fr/fr/data-loss-prevention/</ext-link>
					</p>
				</fn>
				<fn id="FN6" fn-type="other">
					<label>g</label>
					<p>
						<ext-link ext-link-type="uri" xlink:href="http://palisadesystems.com/">http://palisadesystems.com/</ext-link>
					</p>
				</fn>
				<fn id="FN7" fn-type="other">
					<label>h</label>
					<p>(<ext-link ext-link-type="uri" xlink:href="http://www.seclore.com/">http://www.seclore.com/</ext-link>).</p>
				</fn>
				<fn id="FN8" fn-type="other">
					<label>i</label>
					<p>
						<ext-link ext-link-type="uri" xlink:href="https://technet.microsoft.com/en-us/library/dd638140(v=exchg.150).aspx">https://technet.microsoft.com/en-us/library/dd638140(v&#x3d;exchg.150).aspx</ext-link>
					</p>
				</fn>
				<fn id="FN9" fn-type="other">
					<label>j</label>
					<p>
						<ext-link ext-link-type="uri" xlink:href="http://www.covertix.com/">http://www.covertix.com/</ext-link>
					</p>
				</fn>
				<fn id="FN10" fn-type="other">
					<label>k</label>
					<p>
						<ext-link ext-link-type="uri" xlink:href="http://france.emc.com/enterprise-content-management/information-rights-management.htm">http://france.emc.com/enterprise-content-management/information-rights-management.htm</ext-link>.</p>
				</fn>
				<fn id="FN11" fn-type="other">
					<label>l</label>
					<p>
						<ext-link ext-link-type="uri" xlink:href="https://www.cryptzone.com/pdfs/Whitepapers/CryptzoneNetwork-Access-Security-Survey-2015">https://www.cryptzone.com/pdfs/Whitepapers/CryptzoneNetwork-Access-Security-Survey-2015</ext-link>
					</p>
				</fn>
				<fn id="FN12" fn-type="other">
					<label>m</label>
					<p>
						<ext-link ext-link-type="uri" xlink:href="http://www.sans.org/readingroom/whitepapers/analyst/cybersecurity-professionaltrends-survey-34615">http://www.sans.org/readingroom/whitepapers/analyst/cybersecurity-professionaltrends-survey-34615</ext-link>
					</p>
				</fn>
				<fn id="FN13" fn-type="other">
					<label>n</label>
					<p>
						<ext-link ext-link-type="uri" xlink:href="https://www.clearswift.com/solutions/adaptive-data-loss-prevention">https://www.clearswift.com/solutions/adaptive-data-loss-prevention</ext-link>
					</p>
				</fn>
				<fn id="FN14" fn-type="other">
					<label>o</label>
					<p>
						<ext-link ext-link-type="uri" xlink:href="https://www.teramind.co/product/dlp-data-loss-prevention">https://www.teramind.co/product/dlp-data-loss-prevention</ext-link>
					</p>
				</fn>
				<fn id="FN15" fn-type="other">
					<label>p</label>
					<p>
						<ext-link ext-link-type="uri" xlink:href="https://goo.gl/forms/4HcEFZ8ifNWXRPM52">https://goo.gl/forms/4HcEFZ8ifNWXRPM52</ext-link>
					</p>
				</fn>
				<fn id="FN16" fn-type="other">
					<label>q</label>
					<p>
						<ext-link ext-link-type="uri" xlink:href="https://goo.gl/forms/TknBWkGnsFySgryT2">https://goo.gl/forms/TknBWkGnsFySgryT2</ext-link>
					</p>
				</fn>
			</fn-group>
			<ref-list>
				<title>References</title>
				<ref id="B1">
					<citation citation-type="book">
						<person-group person-group-type="author">
							<name>
								<surname>Alawneh</surname>
								<given-names>M.</given-names>
							</name>
							<name>
								<surname>Abbadi</surname>
								<given-names>I. M</given-names>
							</name>
						</person-group>. (<year>2008</year>). &#x201c;<article-title>Preventing information leakage between collaborating organisations</article-title>,&#x201d; in <conf-name>Proceedings of the 10th international conference on electronic commerce</conf-name> Innsbruck, Austria, August 2008 (<publisher-loc>New York, NY</publisher-loc>: <publisher-name>ACM</publisher-name>).</citation>
				</ref>
				<ref id="B2">
					<citation citation-type="journal">
						<person-group person-group-type="author">
							<name>
								<surname>Alotaibi</surname>
								<given-names>M.</given-names>
							</name>
							<name>
								<surname>Furnell</surname>
								<given-names>S.</given-names>
							</name>
							<name>
								<surname>Clarke</surname>
								<given-names>N</given-names>
							</name>
						</person-group>. (<year>2016</year>). &#x201c;<article-title>Information security policies: a review of challenges and influencing factors</article-title>,&#x201d; in <conf-name>The 2016 11th international conference for internet technology and secured transactions (ICITST)</conf-name> Barcelona, Spain, <fpage>352</fpage>&#x2013;<lpage>358</lpage>.</citation>
				</ref>
				<ref id="B3">
					<citation citation-type="journal">
						<person-group person-group-type="author">
							<name>
								<surname>Bai</surname>
								<given-names>W.</given-names>
							</name>
							<name>
								<surname>Kim</surname>
								<given-names>D.</given-names>
							</name>
							<name>
								<surname>Namara</surname>
								<given-names>M.</given-names>
							</name>
							<name>
								<surname>Qian</surname>
								<given-names>Y.</given-names>
							</name>
							<name>
								<surname>Kelley</surname>
								<given-names>P. G.</given-names>
							</name>
							<name>
								<surname>Mazurek</surname>
								<given-names>M. L.</given-names>
							</name>
						</person-group> (<year>2016</year>). <article-title>An inconvenient trust: user attitudes toward security and usability tradeoffs for key-directory encryption systems</article-title>, in Proceedings of the 12th Symposium On Usable Privacy and Security (SOUPS 2016), Denver, CO, June 22&#x2013;24, 2016. </citation>
				</ref>
				<ref id="B4">
					<citation citation-type="book">
						<person-group person-group-type="author">
							<name>
								<surname>Banerjee</surname>
								<given-names>A.</given-names>
							</name>
							<name>
								<surname>Naumann</surname>
								<given-names>D. A.</given-names>
							</name>
						</person-group> (<year>2004</year>). &#x201c;<article-title>History-based access control and secure information flow</article-title>,&#x201d; in <conf-name>International workshop on construction and analysis of safe, secure, and interoperable smart devices</conf-name> (<publisher-loc>New York, NY</publisher-loc>: <publisher-name>Springer</publisher-name>), <fpage>27</fpage>&#x2013;<lpage>48</lpage>.</citation>
				</ref>
				<ref id="B5">
					<citation citation-type="journal">
						<person-group person-group-type="author">
							<name>
								<surname>Beautement</surname>
								<given-names>A.</given-names>
							</name>
							<name>
								<surname>Becker</surname>
								<given-names>I.</given-names>
							</name>
							<name>
								<surname>Parkin</surname>
								<given-names>S.</given-names>
							</name>
							<name>
								<surname>Krol</surname>
								<given-names>K.</given-names>
							</name>
							<name>
								<surname>Sasse</surname>
								<given-names>A.</given-names>
							</name>
						</person-group> (<year>2016</year>). &#x201c;<article-title>Productive security: a scalable methodology for analysing employee security behaviours</article-title>,&#x201d; in <conf-name>Symposium on usable privacy and security (SOUPS)</conf-name>, Denver, CO, June 22&#x2013;24, 2016, <fpage>253</fpage>&#x2013;<lpage>270</lpage>.</citation>
				</ref>
				<ref id="B6">
					<citation citation-type="journal">
						<person-group person-group-type="author">
							<name>
								<surname>Bell</surname>
								<given-names>D. E.</given-names>
							</name>
							<name>
								<surname>LaPadula</surname>
								<given-names>L. J.</given-names>
							</name>
						</person-group> (<year>1973</year>). <article-title>Secure computer systems: mathematical foundations</article-title>. <comment>ESD/AFSC Technical Rep No. ESD-TR-73-278, DTIC Document</comment>.</citation>
				</ref>
				<ref id="B7">
					<citation citation-type="journal">
						<person-group person-group-type="author">
							<name>
								<surname>Biba</surname>
								<given-names>K. J.</given-names>
							</name>
						</person-group> (<year>1977</year>). <article-title>Integrity considerations for secure computer systems</article-title>. <comment>Technical report, DTIC Document</comment>.</citation>
				</ref>
				<ref id="B8">
					<citation citation-type="journal">
						<person-group person-group-type="author">
							<name>
								<surname>Caputo</surname>
								<given-names>D.</given-names>
							</name>
							<name>
								<surname>Maloof</surname>
								<given-names>M.</given-names>
							</name>
							<name>
								<surname>Stephens</surname>
								<given-names>G.</given-names>
							</name>
						</person-group> (<year>2009</year>). <article-title>Detecting insider theft of trade secrets</article-title>. <source>IEEE Secur. Priv.</source>
						<volume>7</volume> (<issue>6</issue>), <fpage>14</fpage>&#x2013;<lpage>21</lpage>. <pub-id pub-id-type="doi">10.1109/msp.2009.110</pub-id>
					</citation>
				</ref>
				<ref id="B46">
					<citation citation-type="book">
						<collab>Cisco Systems</collab> (<year>2009</year>). <article-title>Data leakage worldwide: Common risks and mistakes employees make. Cisco Systems, Inc</article-title>. Available at: <ext-link ext-link-type="uri" xmlns:xlink="http://www.w3.org/1999/xlink" xlink:href="http://www.cisco.com/en/US/solutions/collateral/ns170/ns896/ns895/white_paper_c11- 499060.html">http://www.cisco.com/en/US/solutions/collateral/ns170/ns896/ns895/white_paper_c11-499060.html</ext-link>.</citation>
				</ref>
				<ref id="B9">
					<citation citation-type="book">
						<person-group person-group-type="author">
							<name>
								<surname>Corrad</surname>
								<given-names>A.</given-names>
							</name>
							<name>
								<surname>Montanari</surname>
								<given-names>R.</given-names>
							</name>
							<name>
								<surname>Tibaldi</surname>
								<given-names>D.</given-names>
							</name>
						</person-group> (<year>2004</year>). &#x201c;<article-title>Context-based access control management in ubiquitous environments</article-title>,&#x201d; in <conf-name>Proceedings of the third IEEE international symposium on network computing and applications</conf-name>, Cambridge, MA, <conf-date>2004</conf-date> (<publisher-loc>New York, NY</publisher-loc>: <publisher-name>IEEE)</publisher-name>, <fpage>253</fpage>&#x2013;<lpage>260</lpage>.</citation>
				</ref>
				<ref id="B10">
					<citation citation-type="journal">
						<person-group person-group-type="author">
							<name>
								<surname>Chae</surname>
								<given-names>C.-J.</given-names>
							</name>
							<name>
								<surname>Shin</surname>
								<given-names>Y.</given-names>
							</name>
							<name>
								<surname>Choi</surname>
								<given-names>K.</given-names>
							</name>
							<name>
								<surname>Kim</surname>
								<given-names>K.-B.</given-names>
							</name>
							<name>
								<surname>Choi</surname>
								<given-names>K.-N.</given-names>
							</name>
						</person-group>. (<year>2015</year>). <article-title>A privacy data leakage prevention method in p2p networks</article-title>. <source>Peer-to-Peer Netw. Appl.</source>
						<volume>9</volume> (<issue>3</issue>), <fpage>508</fpage>&#x2013;<lpage>519</lpage>. <pub-id pub-id-type="doi">10.1007/s12083-015-0371-x</pub-id>
					</citation>
				</ref>
				<ref id="B11">
					<citation citation-type="book">
						<person-group person-group-type="author">
							<name>
								<surname>di Vimercati</surname>
								<given-names>S. D. C.</given-names>
							</name>
							<name>
								<surname>Foresti</surname>
								<given-names>S.</given-names>
							</name>
							<name>
								<surname>Paraboschi</surname>
								<given-names>S.</given-names>
							</name>
							<name>
								<surname>Pelosi</surname>
								<given-names>G.</given-names>
							</name>
							<name>
								<surname>Samarati</surname>
								<given-names>P.</given-names>
							</name>
						</person-group> (<year>2011</year>). &#x201c;<article-title>Efficient and private access to outsourced data</article-title>,&#x201d; in <conf-name>31st International conference on distributed computing systems (ICDCS)</conf-name> Minneapolis, MN, June 20&#x2013;24, 2011 (<publisher-loc>New York, NY</publisher-loc>: <publisher-name>IEEE</publisher-name>), <fpage>710</fpage>&#x2013;<lpage>719</lpage>.</citation>
				</ref>
				<ref id="B12">
					<citation citation-type="journal">
						<person-group person-group-type="author">
							<name>
								<surname>Felt</surname>
								<given-names>A. P.</given-names>
							</name>
							<name>
								<surname>Reeder</surname>
								<given-names>R. W.</given-names>
							</name>
							<name>
								<surname>Ainslie</surname>
								<given-names>A.</given-names>
							</name>
							<name>
								<surname>Harris</surname>
								<given-names>H.</given-names>
							</name>
							<name>
								<surname>Walker</surname>
								<given-names>M.</given-names>
							</name>
							<name>
								<surname>Thompson</surname>
								<given-names>C.</given-names>
							</name>
							<etal/>
						</person-group> (<year>2016</year>). &#x201c;<article-title>Rethinking connection security indicators</article-title>.&#x201d; in Proceedings of the 12th Symposium On Usable Privacy and Security (SOUPS 2016), Denver, CO, June 22&#x2013;24, 2016, 1-14</citation>
				</ref>
				<ref id="B13">
					<citation citation-type="book">
						<person-group person-group-type="author">
							<name>
								<surname>Gafny</surname>
								<given-names>M. A.</given-names>
							</name>
							<name>
								<surname>Shabtai</surname>
								<given-names>A.</given-names>
							</name>
							<name>
								<surname>Rokach</surname>
								<given-names>L.</given-names>
							</name>
							<name>
								<surname>Elovici</surname>
								<given-names>Y.</given-names>
							</name>
						</person-group>. (<year>2010</year>). &#x201c;<article-title>Detecting data misuse by applying context-based data linkage</article-title>,&#x201d; in <conf-name>Proceedings of the 2010 ACM workshop on Insider threats</conf-name> Chicago, IL, October 2010 (<publisher-loc>New York, NY</publisher-loc>: <publisher-name>ACM</publisher-name>), <fpage>3</fpage>&#x2013;<lpage>12</lpage>,</citation>
				</ref>
				<ref id="B14">
					<citation citation-type="book">
						<person-group person-group-type="author">
							<name>
								<surname>Harel</surname>
								<given-names>A.</given-names>
							</name>
							<name>
								<surname>Shabtai</surname>
								<given-names>A.</given-names>
							</name>
							<name>
								<surname>Rokach</surname>
								<given-names>L.</given-names>
							</name>
							<name>
								<surname>Elovici</surname>
								<given-names>Y.</given-names>
							</name>
						</person-group> (<year>2010</year>). &#x201c;<article-title>M-score: estimating the potential damage of data leakage incident by assigning misuseability weight</article-title>,&#x201d; in <conf-name>Proceedings of the 2010 ACM workshop on Insider threats, IL, October 2010</conf-name> (<publisher-loc>New York, NY</publisher-loc>: <publisher-name>ACM</publisher-name>), <fpage>13</fpage>&#x2013;<lpage>20</lpage>.</citation>
				</ref>
				<ref id="B15">
					<citation citation-type="journal">
						<person-group person-group-type="author">
							<name>
								<surname>Harel</surname>
								<given-names>A.</given-names>
							</name>
							<name>
								<surname>Shabtai</surname>
								<given-names>A.</given-names>
							</name>
							<name>
								<surname>Rokach</surname>
								<given-names>L.</given-names>
							</name>
							<name>
								<surname>Elovici</surname>
								<given-names>Y.</given-names>
							</name>
						</person-group> (<year>2012</year>). <article-title>M-score: a misuseability weight measure</article-title>. <source>IEEE Trans. Depend. Secure Comput.</source>
						<volume>9</volume> (<issue>3</issue>), <fpage>414</fpage>&#x2013;<lpage>428</lpage>. <pub-id pub-id-type="doi">10.1109/tdsc.2012.17</pub-id>
					</citation>
				</ref>
				<ref id="B16">
					<citation citation-type="journal">
						<person-group person-group-type="author">
							<name>
								<surname>Harrison</surname>
								<given-names>M. A.</given-names>
							</name>
							<name>
								<surname>Ruzzo</surname>
								<given-names>W. L.</given-names>
							</name>
							<name>
								<surname>Ullman</surname>
								<given-names>J. D.</given-names>
							</name>
						</person-group>. (<year>1976</year>). <article-title>Protection in operating systems</article-title>. <source>Commun. ACM.</source>
						<volume>19</volume> (<issue>8</issue>), <fpage>461</fpage>&#x2013;<lpage>471</lpage>. <pub-id pub-id-type="doi">10.1145/360303.360333</pub-id>
					</citation>
				</ref>
				<ref id="B17">
					<citation citation-type="journal">
						<person-group person-group-type="author">
							<name>
								<surname>Hu</surname>
								<given-names>V. C.</given-names>
							</name>
							<name>
								<surname>Ferraiolo</surname>
								<given-names>D.</given-names>
							</name>
							<name>
								<surname>Kuhn</surname>
								<given-names>R.</given-names>
							</name>
							<name>
								<surname>Friedman</surname>
								<given-names>A. R.</given-names>
							</name>
							<name>
								<surname>Lang</surname>
								<given-names>A. J.</given-names>
							</name>
							<name>
								<surname>Cogdell</surname>
								<given-names>M. M.</given-names>
							</name>
							<etal/>
						</person-group> (<year>2013</year>). <article-title>Guide to attribute based access control (abac) definition and considerations (draft)</article-title>. <source>NIST Spec. Publ.</source>
						<volume>800</volume>, <fpage>162</fpage>.</citation>
				</ref>
				<ref id="B18">
					<citation citation-type="journal">
						<person-group person-group-type="author">
							<name>
								<surname>Kagal</surname>
								<given-names>L.</given-names>
							</name>
							<name>
								<surname>Finin</surname>
								<given-names>T.</given-names>
							</name>
							<name>
								<surname>Joshi</surname>
								<given-names>A.</given-names>
							</name>
						</person-group> (<year>2001</year>). <article-title>Trust-based security in pervasive computing environments</article-title>. <source>Computer</source>
						<volume>34</volume> (<issue>12</issue>), <fpage>154</fpage>&#x2013;<lpage>157</lpage>. <pub-id pub-id-type="doi">10.1109/2.970591</pub-id>
					</citation>
				</ref>
				<ref id="B19">
					<citation citation-type="book">
						<person-group person-group-type="author">
							<name>
								<surname>Kandala</surname>
								<given-names>S.</given-names>
							</name>
							<name>
								<surname>Sandhu</surname>
								<given-names>R.</given-names>
							</name>
							<name>
								<surname>Bhamidipati</surname>
								<given-names>V.</given-names>
							</name>
						</person-group> (<year>2011</year>). &#x201c;<article-title>An attribute based framework for risk-adaptive access control models</article-title>,&#x201d; in <conf-name>2011 sixth international conference on availability, reliability and security (ARES)</conf-name> Vienna, Austria, August 22&#x2013;26, 2011 (<publisher-loc>New York, NY</publisher-loc>: <publisher-name>IEEE</publisher-name>), <fpage>236</fpage>&#x2013;<lpage>241</lpage>.</citation>
				</ref>
				<ref id="B20">
					<citation citation-type="book">
						<person-group person-group-type="author">
							<name>
								<surname>Karp</surname>
								<given-names>A.</given-names>
							</name>
							<name>
								<surname>Haury</surname>
								<given-names>H.</given-names>
							</name>
							<name>
								<surname>Davis</surname>
								<given-names>M.</given-names>
							</name>
						</person-group> (<year>2010</year>). &#x201c;<article-title>From abac to ZBAC: the evolution of access control models</article-title>. ISSA J. 8. 22-30</citation>
				</ref>
				<ref id="B21">
					<citation citation-type="journal">
						<person-group person-group-type="author">
							<name>
								<surname>Kirlappos</surname>
								<given-names>I.</given-names>
							</name>
							<name>
								<surname>Parkin</surname>
								<given-names>S.</given-names>
							</name>
							<name>
								<surname>Angela Sasse</surname>
								<given-names>M.</given-names>
							</name>
						</person-group> (<year>2014</year>). &#x201c;<article-title>Learning from &#x201c;Shadow Security&#x201d;: why understanding non-compliant behaviors provides the basis for effective security</article-title>,&#x201d; in <conf-name>Proceedings of Workshop on usable security</conf-name> San Diego, CA, February 23, 2014. <pub-id pub-id-type="doi">10.14722/usec.2014.23007</pub-id>
					</citation>
				</ref>
				<ref id="B45">
					<citation citation-type="journal">
						<person-group person-group-type="author">
							<name>
								<surname>Ko</surname>
								<given-names>R. K. L.</given-names>
							</name>
							<name>
								<surname>Tan</surname>
								<given-names>A. Y. S.</given-names>
							</name>
							<name>
								<surname>Gao</surname>
								<given-names>T.</given-names>
							</name>
						</person-group> (<year>2014</year>). &#x201c;<article-title>A Mantrap-Inspired, User-Centric Data Leakage Prevention (DLP) Approach</article-title>,&#x201d; in 6th International Conference on Cloud Computing Technology and Science, Singapore, 1033-1039. <pub-id pub-id-type="doi">10.1109/CloudCom.2014.23</pub-id>
					</citation>
				</ref>
				<ref id="B22">
					<citation citation-type="journal">
						<person-group person-group-type="author">
							<name>
								<surname>Kumaraguru</surname>
								<given-names>P.</given-names>
							</name>
							<name>
								<surname>Cranor</surname>
								<given-names>L. F.</given-names>
							</name>
						</person-group> (<year>2005</year>). <article-title>Privacy indexes: a survey of westin&#x2019;s studies</article-title>. Technical report. Carnegie Mellon University, School of Computer Science, Institute for Software Research International.</citation>
				</ref>
				<ref id="B23">
					<citation citation-type="journal">
						<person-group person-group-type="author">
							<name>
								<surname>Lampson</surname>
								<given-names>B. W.</given-names>
							</name>
						</person-group> (<year>1974</year>). <article-title>Protection. ACM SIGOPS</article-title>. <source>Oper. Syst. Rev.</source>
						<volume>8</volume> (<issue>1</issue>), <fpage>18</fpage>&#x2013;<lpage>24</lpage>. <pub-id pub-id-type="doi">10.1145/775265.775268</pub-id>
					</citation>
				</ref>
				<ref id="B24">
					<citation citation-type="book">
						<person-group person-group-type="author">
							<name>
								<surname>Li</surname>
								<given-names>H.</given-names>
							</name>
							<name>
								<surname>Peng</surname>
								<given-names>Z.</given-names>
							</name>
							<name>
								<surname>Feng</surname>
								<given-names>X.</given-names>
							</name>
							<name>
								<surname>Ma</surname>
								<given-names>H.</given-names>
							</name>
						</person-group> (<year>2015</year>). &#x201c;<article-title>Leakage prevention method for unstructured data based on classification</article-title>,&#x201d; in <conf-name>Proceedings of the 6th International Conference on Applications and techniques in information security</conf-name> Beijing, China, November 4&#x2013;6, 2015 (<publisher-loc>New York, NY</publisher-loc>: <publisher-name>Springer</publisher-name>), <fpage>337</fpage>&#x2013;<lpage>343</lpage>.</citation>
				</ref>
				<ref id="B25">
					<citation citation-type="journal">
						<person-group person-group-type="author">
							<name>
								<surname>Liu</surname>
								<given-names>B.</given-names>
							</name>
							<name>
								<surname>Andersen</surname>
								<given-names>M. S.</given-names>
							</name>
							<name>
								<surname>Schaub</surname>
								<given-names>F.</given-names>
							</name>
							<name>
								<surname>Almuhimedi</surname>
								<given-names>H.</given-names>
							</name>
							<name>
								<surname>Zhang</surname>
								<given-names>S.</given-names>
							</name>
							<name>
								<surname>Sadeh</surname>
								<given-names>N.</given-names>
							</name>
							<etal/>
						</person-group> (<year>2016</year>). &#x201c;<article-title>Follow my recommendations: a personalized privacy assistant for mobile app permissions</article-title>,&#x201d; in <conf-name>Proceedings of 12th Symposium on usable privacy and security</conf-name> Denver, CO, June 22-24, 2016.</citation>
				</ref>
				<ref id="B26">
					<citation citation-type="book">
						<person-group person-group-type="author">
							<name>
								<surname>Mathew</surname>
								<given-names>S.</given-names>
							</name>
							<name>
								<surname>Petropoulos</surname>
								<given-names>M.</given-names>
							</name>
							<name>
								<surname>Ngo</surname>
								<given-names>H. Q.</given-names>
							</name>
							<name>
								<surname>Upadhyaya</surname>
								<given-names>S.</given-names>
							</name>
						</person-group> (<year>2010</year>). &#x201c;<article-title>A data-centric approach to insider attack detection in database systems</article-title>,&#x201d; in <conf-name>International workshop on recent advances in intrusion detection</conf-name> Ottawa, ON, Canada, September 15&#x2013;17, 2010 (<publisher-loc>New York, NY</publisher-loc>: <publisher-name>Springer</publisher-name>), <fpage>382</fpage>&#x2013;<lpage>401</lpage>. <pub-id pub-id-type="doi">10.1007/978-3-642-15512-3_20</pub-id>
					</citation>
				</ref>
				<ref id="B27">
					<citation citation-type="book">
						<person-group person-group-type="author">
							<name>
								<surname>Pahnila</surname>
								<given-names>S.</given-names>
							</name>
							<name>
								<surname>Siponen</surname>
								<given-names>M.</given-names>
							</name>
							<name>
								<surname>Mahmood</surname>
								<given-names>A</given-names>
							</name>
						</person-group> (<year>2007</year>). &#x201c;<article-title>Employees&#x2019; behavior towards IS security policy compliance</article-title>,&#x201d; in <conf-name>Annual Hawaii international conference on system sciences (HICSS)</conf-name> Waikoloa, HI, January 3&#x2013;6, 2007 (<publisher-loc>New York, NY</publisher-loc>: <publisher-name>IEEE</publisher-name>), <fpage>156b</fpage>.</citation>
				</ref>
				<ref id="B28">
					<citation citation-type="journal">
						<person-group person-group-type="author">
							<name>
								<surname>Rhee</surname>
								<given-names>H.-S.</given-names>
							</name>
							<name>
								<surname>Kim</surname>
								<given-names>C.</given-names>
							</name>
							<name>
								<surname>Ryu</surname>
								<given-names>Y. U.</given-names>
							</name>
						</person-group> (<year>2009</year>). <article-title>Self-efficacy in information security: its influence on end users&#x2019; information security practice behavior</article-title>. <source>Comput. Secur.</source>
						<volume>28</volume> (<issue>8</issue>), <fpage>816</fpage>&#x2013;<lpage>826</lpage>. <pub-id pub-id-type="doi">10.1016/j.cose.2009.05.008</pub-id>
					</citation>
				</ref>
				<ref id="B29">
					<citation citation-type="book">
						<person-group person-group-type="author">
							<name>
								<surname>Rosenblatt</surname>
								<given-names>W.</given-names>
							</name>
							<name>
								<surname>Mooney</surname>
								<given-names>S.</given-names>
							</name>
							<name>
								<surname>Trippe</surname>
								<given-names>W.</given-names>
							</name>
						</person-group> (<year>2001</year>). <source>Digital rights management: business and technology</source>. <publisher-loc>Hoboken</publisher-loc>: <publisher-name>John Wiley &#x26; Sons</publisher-name>.</citation>
				</ref>
				<ref id="B30">
					<citation citation-type="journal">
						<person-group person-group-type="author">
							<name>
								<surname>Ruoti</surname>
								<given-names>S.</given-names>
							</name>
							<name>
								<surname>Neill</surname>
								<given-names>M. O.</given-names>
							</name>
							<name>
								<surname>Zappala</surname>
								<given-names>D.</given-names>
							</name>
							<name>
								<surname>Seamons</surname>
								<given-names>K.</given-names>
							</name>
						</person-group> (<year>2016</year>). &#x201c;<article-title>User attitudes toward the inspection of encrypted traffic</article-title>,&#x201d; in <conf-name>Proceedings of SOUPS 2016: twelfth symposium on usable privacy and security</conf-name>, Denver, CO, June 22&#x2013;24, 2016, <fpage>131</fpage>&#x2013;<lpage>146</lpage>.</citation>
				</ref>
				<ref id="B31">
					<citation citation-type="journal">
						<person-group person-group-type="author">
							<name>
								<surname>Saltzer</surname>
								<given-names>J. H.</given-names>
							</name>
							<name>
								<surname>Schroeder</surname>
								<given-names>M. D.</given-names>
							</name>
						</person-group> (<year>1975</year>). <article-title>The protection of information in computer systems</article-title>. <source>Proc. IEEE.</source>
						<volume>63</volume> (<issue>9</issue>), <fpage>1278</fpage>&#x2013;<lpage>1308</lpage>. <pub-id pub-id-type="doi">10.1109/proc.1975.9939</pub-id>
					</citation>
				</ref>
				<ref id="B32">
					<citation citation-type="journal">
						<person-group person-group-type="author">
							<name>
								<surname>Sandhu</surname>
								<given-names>R. S.</given-names>
							</name>
							<name>
								<surname>Coyne</surname>
								<given-names>E. J.</given-names>
							</name>
							<name>
								<surname>Feinstein</surname>
								<given-names>H. L.</given-names>
							</name>
							<name>
								<surname>Youman</surname>
								<given-names>C. E.</given-names>
							</name>
						</person-group> (<year>1996</year>). <article-title>Role-based access control models</article-title>. <source>Computer</source>
						<volume>29</volume> (<issue>2</issue>), <fpage>38</fpage>&#x2013;<lpage>47</lpage>. <pub-id pub-id-type="doi">10.1109/2.485845</pub-id>
					</citation>
				</ref>
				<ref id="B33">
					<citation citation-type="book">
						<person-group person-group-type="author">
							<name>
								<surname>Shabtai</surname>
								<given-names>A.</given-names>
							</name>
							<name>
								<surname>Elovici</surname>
								<given-names>Y.</given-names>
							</name>
							<name>
								<surname>Rokach</surname>
								<given-names>L.</given-names>
							</name>
						</person-group> (<year>2012</year>). <source>A survey of data leakage detection and prevention solutions</source>. <publisher-loc>Berlin</publisher-loc>: <publisher-name>Springer Science &#x26; Business Media</publisher-name>).</citation>
				</ref>
				<ref id="B34">
					<citation citation-type="journal">
						<person-group person-group-type="author">
							<name>
								<surname>Stobert</surname>
								<given-names>E.</given-names>
							</name>
							<name>
								<surname>Biddle</surname>
								<given-names>R.</given-names>
							</name>
						</person-group> (<year>2014</year>). &#x201c;<article-title>The password life cycle: user behaviour in managing passwords</article-title>,&#x201d; in <conf-name>Proceedings of the SOUPS</conf-name>. <pub-id pub-id-type="doi">10.1145/2683467.2683471</pub-id>
					</citation>
				</ref>
				<ref id="B35">
					<citation citation-type="book">
						<person-group person-group-type="author">
							<name>
								<surname>Soliman</surname>
								<given-names>A. H.</given-names>
							</name>
							<name>
								<surname>Ibrahim</surname>
								<given-names>M. H.</given-names>
							</name>
							<name>
								<surname>El-Ramly</surname>
								<given-names>S. H.</given-names>
							</name>
						</person-group> (<year>2015</year>). &#x201c;<article-title>Enhancing efficiency of enterprise digital rights management</article-title>,&#x201d; in <conf-name>2015 International conference on advanced computer science and information systems (ICACSIS)</conf-name> Denton, TX, July 2015 (<publisher-loc>New York, NY</publisher-loc>: <publisher-name>IEEE</publisher-name>), <fpage>91</fpage>&#x2013;<lpage>96</lpage>.</citation>
				</ref>
				<ref id="B36">
					<citation citation-type="journal">
						<person-group person-group-type="author">
							<name>
								<surname>Subramanya</surname>
								<given-names>S. R.</given-names>
							</name>
							<name>
								<surname>Yi</surname>
								<given-names>B. K.</given-names>
							</name>
						</person-group> (<year>2006</year>). <article-title>Digital rights management</article-title>. <source>IEEE Potent.</source>
						<volume>25</volume> (<issue>2</issue>), <fpage>31</fpage>&#x2013;<lpage>34</lpage>. <pub-id pub-id-type="doi">10.1109/mp.2006.1649008</pub-id>
					</citation>
				</ref>
				<ref id="B37">
					<citation citation-type="book">
						<person-group person-group-type="author">
							<name>
								<surname>van Beek</surname>
								<given-names>M.</given-names>
							</name>
						</person-group> (<year>2007</year>). <source>Comparison of enterprise digital rights management systems</source>. <comment>Master Thesis Computer Science MT Advice report. Aia Software. Thesis number 565. June 22, 2007, Radboud University Nijmegen</comment>.</citation>
				</ref>
				<ref id="B38">
					<citation citation-type="book">
						<person-group person-group-type="author">
							<name>
								<surname>Van Tassel</surname>
								<given-names>J.</given-names>
							</name>
						</person-group> (<year>2006</year>). <source>Digital rights management</source>. <publisher-loc>London</publisher-loc>: <publisher-name>Taylor &#x26; Francis</publisher-name>.</citation>
				</ref>
				<ref id="B39">
					<citation citation-type="journal">
						<person-group person-group-type="author">
							<name>
								<surname>Wan Ismail</surname>
								<given-names>W. B.</given-names>
							</name>
							<name>
								<surname>Yusof</surname>
								<given-names>M.</given-names>
							</name>
						</person-group> (<year>2018</year>). <article-title>Mitigation strategies for unintentional insider threats on information leaks</article-title>. <source>Int. J. Secur. Appl.</source>
						<volume>12</volume>
						<issue>(1)</issue>, <fpage>37</fpage>&#x2013;<lpage>46</lpage>. <pub-id pub-id-type="doi">10.14257/ijsia.2018.12.1.03</pub-id>
					</citation>
				</ref>
				<ref id="B41">
					<citation citation-type="journal">
						<person-group person-group-type="author">
							<name>
								<surname>Workman</surname>
								<given-names>M.</given-names>
							</name>
							<name>
								<surname>Bommer</surname>
								<given-names>W. H.</given-names>
							</name>
							<name>
								<surname>Straub</surname>
								<given-names>D.</given-names>
							</name>
						</person-group> (<year>2008</year>). <article-title>Security lapses and the omission of information security measures: a threat control model and empirical test</article-title>. <source>Comput. Hum. Behav.</source>
						<volume>24</volume>(<issue>6</issue>), <fpage>2799</fpage>&#x2013;<lpage>2816</lpage>. <pub-id pub-id-type="doi">10.1016/j.chb.2008.04.005</pub-id>
					</citation>
				</ref>
				<ref id="B42">
					<citation citation-type="journal">
						<person-group person-group-type="author">
							<name>
								<surname>Yang</surname>
								<given-names>J.-H.</given-names>
							</name>
							<name>
								<surname>Sun</surname>
								<given-names>H.-M.</given-names>
							</name>
							<name>
								<surname>Chen</surname>
								<given-names>P.-L.</given-names>
							</name>
						</person-group> (<year>2013</year>). <article-title>An enterprise digital right management scheme with anonymous trust for mobile devices</article-title>. <source>Informatica</source>
						<volume>37</volume> (<issue>3</issue>), <fpage>307</fpage>&#x2013;<lpage>313</lpage>.</citation>
				</ref>
				<ref id="B43">
					<citation citation-type="book">
						<person-group person-group-type="author">
							<name>
								<surname>Yu</surname>
								<given-names>Y.</given-names>
							</name>
							<name>
								<surname>Chiueh</surname>
								<given-names>T.-C.</given-names>
							</name>
						</person-group> (<year>2004</year>). <article-title>Enterprise digital rights management: solutions against information theft by insiders</article-title>. <comment>Research Proficiency Examination (RPE) report TR-169</comment>, <publisher-name>Department of Computer Science, Stony Brook University</publisher-name>, 33.</citation>
				</ref>
				<ref id="B44">
					<citation citation-type="book">
						<person-group person-group-type="author">
							<name>
								<surname>Zilberman</surname>
								<given-names>P.</given-names>
							</name>
							<name>
								<surname>Dolev</surname>
								<given-names>S.</given-names>
							</name>
							<name>
								<surname>Katz</surname>
								<given-names>G.</given-names>
							</name>
							<name>
								<surname>Elovici</surname>
								<given-names>Y.</given-names>
							</name>
							<name>
								<surname>Shabtai</surname>
								<given-names>A.</given-names>
							</name>
						</person-group> (<year>2011</year>). &#x201c;<article-title>Analyzing group communication for preventing data leakage via email</article-title>,&#x201d; in <conf-name>2011 IEEE international conference on intelligence and security informatics (ISI)</conf-name> Beijing, China, August 2011 (<publisher-loc>New York, NY</publisher-loc>: <publisher-name>IEEE</publisher-name>), <fpage>37</fpage>&#x2013;<lpage>41</lpage>.</citation>
				</ref>
			</ref-list>
		</back>
	</article>