Examination of the vulnerable levels of user groups based on an IT security model | IEEE Conference Publication | IEEE Xplore