Fig. 1From: Predicting individuals’ vulnerability to social engineering in social networksResearch ModelBack to article page