Fig. 5From: User characteristics that influence judgment of social engineering attacks in social networksGender comparisonBack to article page