Fig. 3From: Review and insight on the behavioral aspects of cybersecurityProposed UIM human error as insider-anomaly conceptBack to article page