• It provides rich information security
strategies, procedures and theories for researchers, information security decision makers, planners, providers and users; thereby they can get a better understanding of information security in terms of different perspectives.