Return to Article Details Interpretation model of assessments boundary information security risks Download Download PDF