Fig. 8From: Baiting the hook: factors impacting susceptibility to phishing attacksAverage time analysis for the best participantsBack to article page