Fig. 4From: User characteristics that influence judgment of social engineering attacks in social networksThe three highest rated factorsBack to article page