High Conscientiousness: Difference between revisions
| Line 35: | Line 35: | ||
'''Use Case Example(s):''' <br> | '''Use Case Example(s):''' <br> | ||
'''Example(s) From The Wild: ''' <br>Halevi et al (2015) found a heightened susceptibility to spear phishing attacks against individuals high on the Conscientiousness personality dimension when presented with a phishing email presented as an error on a form which required a correction. This [[https://cognitiveattacktaxonomy.org/index.php/Need_to_Correct| need to correct]] errors is a potential vulnerability in individuals high in Conscientiousness<ref>[ | '''Example(s) From The Wild: ''' <br>Halevi et al (2015) found a heightened susceptibility to spear phishing attacks against individuals high on the Conscientiousness personality dimension when presented with a phishing email presented as an error on a form which required a correction. This [[https://cognitiveattacktaxonomy.org/index.php/Need_to_Correct| need to correct]] errors is a potential vulnerability in individuals high in Conscientiousness<ref>Halevi, T., Memon, N., & Nov, O. (2015). [https://papers.ssrn.com/sol3/papers.cfm?abstract%20id=2544742 Spear-phishing in the wild]: A real-world study of personality, phishing self-efficacy and vulnerability to spear-phishing attacks.</ref>. | ||
== '''Comments:''' == | == '''Comments:''' == | ||
Revision as of 15:04, 25 October 2025
High Conscientiousness
Short Description: Personality dimension, high attentativeness to detail
CAT ID: CAT-2021-002
Layer: 8
Operational Scale: Tactical
Level of Maturity: Well-Established
Category: Vulnerability
Subcategory:
Also Known As:
Description:
Brief Description:
Closely Related Concepts:
Mechanism:
Multipliers:
Detailed Description: Big 5 Personality dimension describing how attentative an individual is to detail.
INTERACTIONS [VETs]:
Examples:
Use Case Example(s):
Example(s) From The Wild:
Halevi et al (2015) found a heightened susceptibility to spear phishing attacks against individuals high on the Conscientiousness personality dimension when presented with a phishing email presented as an error on a form which required a correction. This [need to correct] errors is a potential vulnerability in individuals high in Conscientiousness[1].
Comments:
References:
Halevi, T., Memon, N., & Nov, O. (2015). Spear-phishing in the wild: A real-world study of personality, phishing self-efficacy and vulnerability to spear-phishing attacks. Phishing Self-Efficacy and Vulnerability to Spear-Phishing Attacks (January 2, 2015).
- ↑ Halevi, T., Memon, N., & Nov, O. (2015). Spear-phishing in the wild: A real-world study of personality, phishing self-efficacy and vulnerability to spear-phishing attacks.
