Fig. 5From: Baiting the hook: factors impacting susceptibility to phishing attacksHeatmap for Page 1 (cropped)Back to article page