Fig. 2From: Review and insight on the behavioral aspects of cybersecurityVenn diagram for the interdisciplinary framework, based on Caulkins (2017)Back to article page