Fig. 6From: Baiting the hook: factors impacting susceptibility to phishing attacksHeatmap for Page 4 (cropped)Back to article page