High Conscientiousness: Difference between revisions

From Cognitive Attack Taxonomy
Line 19: Line 19:
== '''Description:''' ==
== '''Description:''' ==


'''Brief Description:''' <br>
'''Brief Description:''' High Conscientiousness as a potential cognitive vulnerability <br>


'''Closely Related Concepts:''' <br>
'''Closely Related Concepts:''' Low Conscientiousness <br>


'''Mechanism:''' <br>
'''Mechanism(s):''' Deliberate False Statement [https://cognitiveattacktaxonomy.org/index.php/Deliberate_False_Statement| CAT-2022-152 ] <br>


'''Multipliers:''' <br>
'''Multiplier(s):''' The Need To Correct [https://cognitiveattacktaxonomy.org/index.php/Need_to_Correct| CAT-2024-007 ] <br>


'''Detailed Description:''' Big 5 Personality dimension describing how attentative an individual is to detail. <br>
'''Detailed Description:''' Big 5 Personality dimension describing how attentative an individual is to detail. <br>


'''INTERACTIONS''' [VETs]:  <br>
 
<!-- '''INTERACTIONS''' [VETs]:  <br> -->


== '''Examples:''' ==
== '''Examples:''' ==

Revision as of 15:15, 25 October 2025

High Conscientiousness

Short Description: Personality dimension, high attentativeness to detail

CAT ID: CAT-2021-002

Layer: 8

Operational Scale: Tactical

Level of Maturity: Well-Established

Category: Vulnerability

Subcategory:

Also Known As:

Description:

Brief Description: High Conscientiousness as a potential cognitive vulnerability

Closely Related Concepts: Low Conscientiousness

Mechanism(s): Deliberate False Statement CAT-2022-152

Multiplier(s): The Need To Correct CAT-2024-007

Detailed Description: Big 5 Personality dimension describing how attentative an individual is to detail.


Examples:

Use Case Example(s):
Halevi et al (2015) found a heightened susceptibility to spear phishing attacks against individuals high on the Conscientiousness personality dimension when presented with a phishing email presented as an error on a form which required a correction. This [need to correct] errors is a potential vulnerability in individuals high in Conscientiousness[1].

Comments:

References:

Halevi, T., Memon, N., & Nov, O. (2015). Spear-phishing in the wild: A real-world study of personality, phishing self-efficacy and vulnerability to spear-phishing attacks. Phishing Self-Efficacy and Vulnerability to Spear-Phishing Attacks (January 2, 2015).

  1. Halevi, T., Memon, N., & Nov, O. (2015). Spear-phishing in the wild: A real-world study of personality, phishing self-efficacy and vulnerability to spear-phishing attacks.