Fig. (1)
The needs for and improvement cycle of data Security Management.