Watch this video on YouTube
What is the primary consideration when choosing an information security metric?