Figure 3From: Digital security concerns and threats facing women entrepreneurs Interaction of fundamental security requirements in a system. Back to article page