the security chain and the potential social engineering influences