Figures & data
Figure 2. Threat-based versus risk-based perspectives on security. Adopted from Aradau et al. (Citation2008, pp. 148, 151), and Corry (Citation2012, pp. 246, 247).
![Figure 2. Threat-based versus risk-based perspectives on security. Adopted from Aradau et al. (Citation2008, pp. 148, 151), and Corry (Citation2012, pp. 246, 247).](/cms/asset/07ccc7af-125b-4d9d-94cd-f55c1026c76e/feus_a_1394845_f0002_b.gif)
Register now or learn more
Open access
Figure 2. Threat-based versus risk-based perspectives on security. Adopted from Aradau et al. (Citation2008, pp. 148, 151), and Corry (Citation2012, pp. 246, 247).
People also read lists articles that other readers of this article have read.
Recommended articles lists articles that we recommend and is powered by our AI driven recommendation engine.
Cited by lists all citing articles based on Crossref citations.
Articles with the Crossref icon will open in a new tab.