Return to Article Details Human information security vulnerability of organization: methodology of assessment Download Download PDF