Skip to main content
. 2017 Apr 27;19(4):e131. doi: 10.2196/jmir.7065

Figure 3.

Figure 3

Quadrant diagram of the importance and performance of the security of the system.