Fig. 12
From: Social engineering in cybersecurity: a domain ontology and knowledge graph application examples

Taxonomy of social interaction in social engineering
From: Social engineering in cybersecurity: a domain ontology and knowledge graph application examples
Taxonomy of social interaction in social engineering