Return to Article Details Development of a model for choosing strategies for investing in information security Download Download PDF