Fig. 3From: User characteristics that influence judgment of social engineering attacks in social networksFramework validation methodBack to article page