Editor’s note: The following article first appeared in the JACR: “Protocol Design and Optimization,” Boland, Giles W. et al. Journal of the American College of Radiology, volume 11, issue 5, 440–441.
entering data on a landing page, opening an attachment, enabling a macro on an attachment, or replying to the simulated phishing email. Since a single user may take more than one of these actions, an ...