Fig. 3From: Predicting individuals’ vulnerability to social engineering in social networksMeasurement ModelBack to article page