Return to Article Details Vulnerability analysis in the university community using social engineering and phishing applications Download Download PDF