Fig. 13From: Social engineering in cybersecurity: a domain ontology and knowledge graph application examplesTaxonomy of social engineering attack consequenceBack to article page