Fig. 4From: Baiting the hook: factors impacting susceptibility to phishing attacksSuccesses and failures per pageBack to article page