“…Challenge of unrestricted collaboration [20], [23], [58], [79] CH12 Using unsuitable performance metrics for security evaluation [2], [69], [78], [79] CH13 Abundance of information is a serious threat to secure data [60], [62], [80] CH14 Use of immature automated deployment tools [61], [81], [82] CH15 Inadequate channel to monitor the collaboration of teams [52], [53], [71], [79]…”