Research Article

Information Security Risk Management Model for Big Data

Figure 1

Flow chart of information security risk management.