Fig. 6From: Review and insight on the behavioral aspects of cybersecurityInterpretation of MARC process, based on Parush et al. (2017)Back to article page