Return to Article Details Method of vulnerabilities analysis of socio-technical systems to the social engineering influences Download Download PDF