V. Anandpara, A. Dingman, M. Jakobsson, D. Liu, and H. Roinestad, Phishing IQ Tests Measure Fear, Not Ability, Proceedings of the 11th International Conference on Financial cryptography and 1st International conference on Usable Security, pp.362-66, 2007.
DOI : 10.1007/978-3-540-77366-5_33

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.109.987

A. Group, Global Phishing Survey: Trends and Domain Name Use in 2H2009 Available from: <http://www.antiphishing, 2010.

J. Downs, M. Holbrook, and L. Cranor, Decision strategies and susceptibility to phishing, Proceedings of the second symposium on Usable privacy and security , SOUPS '06, pp.79-90, 2006.
DOI : 10.1145/1143120.1143131

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.364.8084

J. Downs, M. Holbrook, and L. Cranor, Behavioral response to phishing risk, Proceedings of the anti-phishing working groups 2nd annual eCrime researchers summit on , eCrime '07, pp.37-44, 2007.
DOI : 10.1145/1299015.1299019

URL : http://repository.cmu.edu/cgi/viewcontent.cgi?article=1044&context=isr

S. Frederick, Cognitive Reflection and Decision Making, Journal of Economic Perspectives, vol.19, issue.4, pp.25-42, 2005.
DOI : 10.1257/089533005775196732

S. Furnell, Phishing: can we spot the signs? Computer Fraud & Security, pp.10-15, 2007.
DOI : 10.1016/s1361-3723(07)70035-0

S. Furnell, V. Tsaganidi, and A. Phippen, Security beliefs and barriers for novice Internet users, Computers & Security, vol.27, issue.7-8, pp.235-275, 2008.
DOI : 10.1016/j.cose.2008.01.001

D. Green and J. Swets, Signal Detection Theory and Psychophysics, 1966.

A. Herzberg, Why Johnny can't surf (safely)? Attacks and defenses for web users, Computers & Security, vol.28, issue.1-2, pp.63-71, 2009.
DOI : 10.1016/j.cose.2008.09.007

T. Jagatic, N. Johnson, M. Jakobsson, and F. Menczer, Social phishing, Communications of the ACM, vol.50, issue.10, pp.94-100, 2007.
DOI : 10.1145/1290958.1290968

O. John, E. Donahue, and R. Kentle, The Big Five Inventory--Versions 4a and 54, 1991.

O. John, L. Naumann, and C. Soto, Paradigm shift to the integrative big-five trait taxonomy: History, measurement, and conceptual issues Handbook of personality: Theory and research, pp.114-58, 2008.

O. John and S. Srivastava, The big-five trait taxonomy: History, measurement, and theoretical perspectives, Handbook of personality: Theory and research, pp.102-141, 1999.

P. Kumaraguru, Y. Rhee, S. Sheng, S. Hasan, A. Acquisti et al., Getting users to pay attention to anti-phishing education, Proceedings of the anti-phishing working groups 2nd annual eCrime researchers summit on , eCrime '07, pp.70-81, 2007.
DOI : 10.1145/1299015.1299022

T. Moore and R. Clayton, An empirical analysis of the current state of phishing attack and defence, Proceedings of the Sixth Workshop on the Economics of Information Security, pp.1-20, 2007.

K. Parsons, A. Mccormac, M. Butavicius, and L. Ferguson, Human Factors and Information Security: Individual, Culture and Security Environment, 2010.

S. Sheng, M. Holbrook, P. Kumaraguru, L. Cranor, and J. Downs, Who falls for phish? A demographic analysis of phishing susceptibility and effectiveness of interventions, Proceedings of the 28 th International Conference on Human Factors in Computing Systems, pp.373-82, 2010.

H. Stanislaw and N. Todorov, Calculation of signal detection theory measures, Behavior Research Methods, Instruments, & Computers, vol.83, issue.1, pp.137-186, 1999.
DOI : 10.3758/BF03207704

L. Tam, M. Glassman, and M. Vandenwauver, The psychology of password management: a tradeoff between security and convenience, Behaviour & Information Technology, vol.29, issue.3, pp.233-277, 2010.
DOI : 10.1080/01449290903121386

A. Tversky and D. Kahneman, The framing of decisions and the psychology of choice, Science, vol.185, pp.453-58, 1981.