Research Article
Information Security Decisions with Consideration of Hacker Intrusion Propagation
Table 1
Conditions of hacker intrusion propagation or nonpropagation.
| Situation | Autonomous defense | Outsourcing information security | Conditions of hacker intrusion propagation | Conditions of hacker intrusion nonpropagation | Conditions of hacker intrusion propagation | Conditions of hacker intrusion nonpropagation |
| I | | | | |
| II | | | | | | | | | or | | or | or |
| III | | | | | | | | | | |
|
|