Fig. 1From: Social engineering in cybersecurity: a domain ontology and knowledge graph application examplesOverview of methodology to develop domain ontology of social engineeringBack to article page