Fig. 6From: Social engineering in cybersecurity: a domain ontology and knowledge graph application examplesTaxonomy of attacker (social engineer)Back to article page