User vulnerabilities in the data cycle