PROBLEM CONTEXT
Organizations continue to invest in technical controls, yet social engineering attacks remain highly effective because attackers exploit predictable human psychology such as fear, urgency, trust, and authority bias. Existing studies were fragmented and lacked an integrated, evidence-based vulnerability map.