High Conscientiousness: Difference between revisions

From Cognitive Attack Taxonomy
Line 35: Line 35:
'''Use Case Example(s):'''  <br>
'''Use Case Example(s):'''  <br>


'''Example(s) From The Wild: Halevi et al (2015) found a heightened susceptibility to spear phishing attacks against individuals high on the Conscientiousness personality dimension when presented with a phishing email presented as an error on a form which required a correction. This need to correct...'''  <br>
'''Example(s) From The Wild: '''  <br>Halevi et al (2015) found a heightened susceptibility to spear phishing attacks against individuals high on the Conscientiousness personality dimension when presented with a phishing email presented as an error on a form which required a correction. This [[https://cognitiveattacktaxonomy.org/index.php/Need_to_Correct| need to correct]] errors is a potential vulnerability in individuals high in Conscientiousness<ref>[1]</ref>.


== '''Comments:''' ==
== '''Comments:''' ==

Revision as of 15:00, 25 October 2025

High Conscientiousness

Short Description: Personality dimension, high attentativeness to detail

CAT ID: CAT-2021-002

Layer: 8

Operational Scale: Tactical

Level of Maturity: Well-Established

Category: Vulnerability

Subcategory:

Also Known As:

Description:

Brief Description:

Closely Related Concepts:

Mechanism:

Multipliers:

Detailed Description: Big 5 Personality dimension describing how attentative an individual is to detail.

INTERACTIONS [VETs]:

Examples:

Use Case Example(s):

Example(s) From The Wild:
Halevi et al (2015) found a heightened susceptibility to spear phishing attacks against individuals high on the Conscientiousness personality dimension when presented with a phishing email presented as an error on a form which required a correction. This [need to correct] errors is a potential vulnerability in individuals high in Conscientiousness[1].

Comments:

References:

Halevi, T., Memon, N., & Nov, O. (2015). Spear-phishing in the wild: A real-world study of personality, phishing self-efficacy and vulnerability to spear-phishing attacks. Phishing Self-Efficacy and Vulnerability to Spear-Phishing Attacks (January 2, 2015).

  1. [1]