Sarah Granger's "Social Engineering Fundamentals, Part I: Hacker Tactics"
Read this page. After you read, explain how the attacker identifies the target/victim and how to carry out social engineering via various approaches (phones, online chatting, Dumpster diving, reverse engineering etc.).