Return to Article Details Analysis of the vulnerability of IT system users to a phishing attack Download Download PDF