[Ahmad A., Bosua R., Scheepers R. 2014. Protecting organizational competitive advantage. A knowledge leakage perspective. Computers & Security, Vol. 42, 27-39. DOI: 10.1016/j.cose.2014.01.001.10.1016/j.cose.2014.01.001]Open DOISearch in Google Scholar
[Alneyadi S., Sithirasenan E., Muthukkumarasamy V. 2016. A survey on data leakage prevention systems Journal of Network and Computer Applications, Vol. 62, 137-152. DOI: 10.1016/j.jnca.2016.01.008.10.1016/j.jnca.2016.01.008]Open DOISearch in Google Scholar
[Boridko I. S. et al. 2013. DLP-systems: insider protection, Security of information technology, 1, 82-84, ISSN: 2074-7128eISSN: 2074-7136.]Search in Google Scholar
[Comparisonleakageprotectionsystems (DLP) 2014. Part 1, URL: https://www.antimal-ware.ru/comparisons/data_leak_protection_2014_part1.]Search in Google Scholar
[Comparisonleakageprotectionsystems (DLP) 2014. Part 2, URL: https://www.anti-malware.ru/comparisons/data_leak_protection_2014_part2]Search in Google Scholar
[ESET Press-centre 2014. URL: https://www.esetnod32.ru/company/press/center/38-sotrudnikovslivali-sekrety-eks-rabotodateley/.]Search in Google Scholar
[Gost P 51275-2006. Data protection. Information of the object. Factors affecting the information. General Provisions.]Search in Google Scholar
[Grudzień Ł., Hamrol A. 2016. Information quality in design process documentation of quality management systems. International Journal of Information Management, Vol. 36 (4), 599-606. DOI: 10.1016/j.ijinfomgt.2016.03.011.10.1016/j.ijinfomgt.2016.03.011]Open DOISearch in Google Scholar
[InfoWatch Analytical Center Report Dataleakage. Russia. 2016. URL: https://www.infowatch.ru/analytics/reports/17962.]Search in Google Scholar
[Katz G., Elovici Y. Shapira B. 2014. CoBAn. A context based model for data leakage prevention. Information Sciences, Vol. 262, 137–158. DOI: 10.1016/j.ins.2013.10.005.10.1016/j.ins.2013.10.005]Open DOISearch in Google Scholar
[Shamala P., Ahmad R., Zolait A., Sedek M. 2017. Integrating Information Quality dimensions into information security risk management (ISRM). Journal of Information Security and Applications, Vol. 36, 1-10. DOI: 10.1016/j.jisa.2017.07.004.10.1016/j.jisa.2017.07.004]Open DOISearch in Google Scholar
[Sulavko A. Y. 2014. Technologies of protection from inner threats of information security, Bulletin of the Siberian State Automobile and Highway Academy.]Search in Google Scholar
[Xu Changbao, Zhao Yanlong, Zhang Ji-Feng, Qi Hongsheng 2017. System Identification under Information Security. IFACPapersOnLine, Vol. 50 (1), 3756–3761. DOI: 10.1016/j.ifacol.2017.08.477.10.1016/j.ifacol.2017.08.477]Open DOISearch in Google Scholar
[Żywiołek J. 2016. The application of value stream mapping method for identifying basic drawbacks and reducing duration of information process in a company, Production Engineering Archives, Vol. 11, No. 2, 36-39.10.30657/pea.2016.11.09]Open DOISearch in Google Scholar