Research Article

Information Security Decisions with Consideration of Hacker Intrusion Propagation

Figure 6

curve of outsourcing.