Watch this video on YouTube
What is the primary concern related to end-user computing (EUC) from an information security perspective?