Research Article

Detecting User Behavior in Cyber Threat Intelligence: Development of Honeypsy System

Figure 13

Correlations between Big-5 and expertise, including the dual effect.