Fig. 12From: Social engineering in cybersecurity: a domain ontology and knowledge graph application examplesTaxonomy of social interaction in social engineeringBack to article page