Fig. 4From: Review and insight on the behavioral aspects of cybersecurityTheory of Planned Behavior diagram, from Icek (2019)Back to article page