CURRENTLY ON AIR ⇒
  • NEWS
    Friday, 7:00 am - 7:15 am
    [ - ]

feedback@radioislam.org.za

logo


((( Listen Live )))))
Radio Islam Logo


Study finds agreeable personalities prime targets for Cybercriminals: Stellenbosch University Findings

Azra Hoosen | ah@radioislam.co.za
10 May 2024 | 13:30 CAT
2 min read

In a groundbreaking study conducted by University of Stellenbosch system analyst Vian Smit, startling revelations have emerged about the vulnerability of agreeable individuals to cybercriminal manipulation.

Released amidst a concerning surge in cybercrime victimization, the study sheds light on the psychological dynamics at play, suggesting that those with trusting dispositions are at heightened risk. However, amidst these findings, glimmers of hope emerge as the research unveils potential resilience among neurotic and open-minded individuals against falling prey to cyber scams.

Smit surveyed nearly 700 individuals to examine their personality traits and propensity to fall for various social engineering attacks. These attacks involve cybercriminals deceiving individuals into disclosing private information and passwords or clicking on harmful links, aiming to gauge their vulnerability to such tactics.

Speaking to Radio Islam, Smit highlights that cybercriminals exploit our psychological needs, such as the desire for social acceptance, trust, and approval, to manipulate us. By employing social engineering tactics, they aim to trigger these psychological needs, compelling individuals to share private information.

“These cybercriminals typically use social engineering attacks, which utilise psychological manipulation techniques to exploit human vulnerabilities,” he said.

According to Smit, individuals with an agreeable personality are characterised by traits such as compassion, altruism, friendliness, trust, and kindness. Their desire to please and help others makes them vulnerable to social engineering attacks, as they may overlook signs of deceit or manipulation.

“These character traits make them more susceptible to social engineering attacks. These attacks follow certain phases, and in this, they can determine the personality type of their victims, then execute the further steps of the cycle,” he said.

The study indicated that individuals with agreeable personalities are prone to various cyberattacks such as phishing, spear phishing, impersonation, pretexting, watering hole, QRishing, and smishing. Neurotic types are vulnerable to fake applications or plug-ins attacks, while extroverts are targeted by malvertisements and Wi-Fi evil twin attacks. Conscientious individuals are susceptible to a range of attacks including phishing, spear phishing, impersonation, pretexting, watering hole, and QRishing, whereas open-minded individuals are more prone to pretexting, watering hole, and Wi-Fi evil twin attacks.

Smit suggests that understanding people’s personality types and their vulnerability to social engineering attacks could assist cybersecurity teams in businesses and organisations. This understanding would enable the implementation of tailored mitigation strategies for each personality type. Additionally, organisations would be better equipped to identify employees who are more susceptible to such attacks through a deeper comprehension of their personality traits.

LISTEN to the full interview Ml M. Waja and System Analyst Vian Smit, here. 

 

 

 

ADVERTISE HERE

Prime Spot!!!

Contact:
advertisingadmin@radioislam.co.za 

Related Articles

The Asia Pacific Report

The Asia Pacific Report

21 May 2026 | 11:40 CAT 1-minute read The plight of the Rohingya remains one of the world’s longest-running humanitarian crises, with growing concerns over safety, accountability and the future of millions of displaced people. Speaking on Radio Islam International’s...

read more
The Africa Report

The Africa Report

19 May 2026 | 11:46 CAT 4-minute read Digital fraud crisis in Africa Africa is experiencing a rapidly accelerating digital fraud crisis as cybercriminals exploit the continent's booming mobile connectivity. Driven by AI tools, deepfakes, and social engineering, fraud...

read more
Middle East Report

Middle East Report

15 May 2026 | 11:45 CAT 3-minute read Strait of Hormuz: a competition of endurance The 2026 conflict in the Strait of Hormuz has devolved into a high-stakes war of attrition between the United States and Iran, marked by a collapsed, fragile ceasefire and persistent...

read more
The Resilience Of President Ramaphosa

The Resilience Of President Ramaphosa

Rabia Mayet | rabiamayet@radioislam.co.za 14 May 2026 3-minute read Reigniting the impeachment debate around accountability and constitutional processes in his concord drama, President Cyril Ramaphosa is once again at the centre of political and legal turbulence,...

read more
The Asia Pacific Report

The Asia Pacific Report

14 May 2026 | 12:50 CAT 4-minute read Trump’s China visit Donald Trump’s May 2026 state visit to Beijing marks his first visit to the country during his second presidential term, and is markedly different from his October 2025 meeting with Xi Jinping in Busan, South...

read more

Subscribe to our Newsletter

0 Comments