Return to Article Details A short analysis of the user's behavior about network security Download Download PDF