Research Article

Information Security Decisions with Consideration of Hacker Intrusion Propagation

Figure 1

The state evolution process of firms based on the SIR model.