Research Article

Analysis of Digital Security Governance under the Objectives of Digital Ecology: A Three-Party Evolutionary Game Approach

Figure 5

Sensitivity of data security event probability.