Answer:
Step-by-step explanation:
1. the use of centralized planning in an attempt to manage social change and regulate the future development and behavior of a society.
2.
(in the context of information security) the use of deception to manipulate individuals into divulging confidential or personal information that may be used for fraudulent purposes.
"people with an online account should watch for phishing attacks and other forms of social engineering"