Fig. 3From: Human-as-a-security-sensor for harvesting threat intelligenceIHaaSS Incident Model and TaxonomyBack to article page