Found on website Login Helper, this is the phishing email flowchart, a companion to their how to identify fishing attacks guide. It handy in that it's visual, but I'm not sure it's the most elegantly designed version it could be. Having this material in a flow chart (decision support framework at all?) might be one useful way of visualising online privacy protecting behaviour, and general advivce/guidance.
(I found it on LifeHacker.com, highly recommended)