Research Article

Information Security Decisions with Consideration of Hacker Intrusion Propagation

Table 1

Conditions of hacker intrusion propagation or nonpropagation.

SituationAutonomous defenseOutsourcing information security
Conditions of hacker intrusion propagationConditions of hacker intrusion nonpropagationConditions of hacker intrusion propagationConditions of hacker intrusion nonpropagation

I

II
or or
or

III