Fig. 6From: User characteristics that influence judgment of social engineering attacks in social networksA service scenario for using UCFBack to article page