Unraveling the establishment of residual risk in cybersecurity | Publicación