Fig. 6From: Don’t click: towards an effective anti-phishing training. A comparative literature reviewClick-through value ranges for the phishing emails used in [50]Back to article page