Fig. 1From: User characteristics that influence judgment of social engineering attacks in social networksGeneral taxonomy of social engineering attacks in social networksBack to article page