Skip to main content
. 2022 Nov 24;22(2):305–317. doi: 10.1007/s10207-022-00637-z

Fig. 4.

Fig. 4

Means of cybersecurity behaviour across groups