Watch this video on YouTube
In which of the following models does the organization have the MOST control over the security of its information systems?