Fig. 3From: Social engineering in cybersecurity: a domain ontology and knowledge graph application examplesEdit relations, relation description and characteristicBack to article page