Fig. 5From: Review and insight on the behavioral aspects of cybersecuritySocial Cognition Theory basic diagramBack to article page