%PDF-1.4
%
1 0 obj
<>stream
iText 4.2.0 by 1T3XT2019-08-12T15:32:00+05:30Arbortext Advanced Print Publisher2019-09-15T13:53:18-07:002019-09-15T13:53:18-07:00uuid:8addd02c-2a8d-4824-a074-0375b52bef83uuid:9735c38c-787b-4f5b-aca7-e8422204bc96JournalCryptologia© 2019 Taylor & Francis Group, LLC0161-11941558-1586001-1511510.1080/01611194.2019.1623343https://doi.org/10.1080/01611194.2019.1623343application/pdf10.1080/01611194.2019.1623343en-USPhishing in an academic community: A study of user susceptibility and behaviorTaylor & FrancisCryptologia, 2019. doi: 10.1080/01611194.2019.1623343Diaz AlejandraSherman Alan T.Joshi Anupambilling problem tacticcontest winner tacticcyber demographicscybersecurityexpiration date tacticphishingsocial engineeringuser susceptibilityVoR2019-08-13truewww.tandfonline.com10.1080/01611194.2019.1623343www.tandfonline.comtrue2019-08-1310.1080/01611194.2019.1623343
endstream
endobj
4 0 obj
<>stream
xY͎$5S/܀88\x}lNRݵvhNU*qg'_PUC._I7>hJ6g~;_^c6<}6@n-d!֚ż989Xzq۞ޘ~glbǺ׳
ku8jRkw8*_afqCivy[7?omBJZ
>nK*E{卉]zu ClYϽ?-ƋTY6ҷ4G&v̧&KʢĬN6ޏ"r}K/χ`:?8zSHヷާ֊y1ܾ:~ix+1ZŇjh'QKD 6ҿś8jݝ.X6"h̾i-\n$b|ڲ.%)醀{C&H}52_{̇3 ]!'nik0:=rf3"Ni^)J5@ݯ-JdѬnŋl=FlV5qn&0Ug]X$aZ%l븰Xo^%+=FiB'` !aߌe[9 p*ûtg}]I; rDsY$2uS}O]:]ie'I(-o֥YJxӴ>J`Kf ܽX`
)BEKa>q} ub"ox̹3fE'(5RPFCZv}#AHGEH GqYoT*xr-[mQul7ӝPe>3H^Q$trG>dI1\uz,O$4J8XCp/|7܄lI"JSx{oXm<̌tʺP@ezE5G\ݨ:r?e:4IZ{4(V$}:B. yH-U*Ud67Xd_hU69 Nc@+I?^BHܴ'Mzsjf`i*6Ζz<zu'*\YzW[j辢>/B[u+v,^OeYGbz>^N<@o
c9~EP- 3f`PWw8[8yr
uчXTysKp)pd˺ a5pMaOcUNɇe):" VlXa/Y`'
endstream
endobj
26 0 obj
<>stream
xwXSsN`$!l{@ ٢ $@TR)XZԉ(
RZD|y L0V@(#q `= nnWXX0+Зȕ;ѫ R1{Ol (Lγx\䜙/V'LKP0RX~@9k(8u?̰yBOΑr y
<)_Έ"<?_l)
F+s9H
MI #~__ Q$.R$sŅg%f,a6GTLΟEQԖ!/Bſ)EogEA?l kJ^-ؒ \?l{ P&d\EAt{6~/ÇfJq2bFn6g0<8aO"yD|TyE