Social media and the Big Five

March 2013 News & Events

Have you ever been baited, stalked or hounded on social media? Then welcome to the world of the Big Five on the computer. Some things never change. We thought that computers would be fun, harmless and oh-so-civilised, but once in the while along comes the hunter gatherer, out in the darkness or even broad daylight, and gets the best of us.

Unfortunately, both the hunters and the prey have legitimate pug-marks and even names, so it is easy to get through the usual rigmarole of security in the virtual grasslands, so how do we defend ourselves? Let us for a moment see what the real Big Five do in real jungles. The elephant is large, but usually hides behind tall grass most of the time, and at the appropriate moment charges at his purported hunter, giving him the fright of his life. It works. On websites, they charge (at) you by asking for your credit card number, and all this while you never saw the elephant hiding in the tall grass. It is, indeed time to run.

In case you spot a black rhinoceros, you better run anyway. Do not worry, the magnificent beasts are vegetarians, but surely there is a poacher somewhere around who might (thankfully) miss his target, but get your nose instead. The most in numbers though would be the magnificent Cape buffalo, and they kill, especially if wounded, and they are seen in herds. Just keep a safe distance, and what if you see the lion? The best, they say, is to make a quick decision whether you want to be the hunter or the hunted, and get on with it.

You have of course heard of buzzing commerce websites, doing roaring business in and around the social media. The leopard of course is the most difficult to spot (though some say they are born that way) and if you are hunting one, it could take a long-long time, but if you are getting hunted, then this one could be the quickest.

Indeed such hazards are becoming so commonplace, that along with reading books like ‘Social Media for Dummies’, it might be equally useful to have Peter H. Capstick’s old classic: ‘Safari, The Last Adventure’, also at hand.

But psychologists will tell you of another Big Five that you need to be aware of on the Internet – the personality traits that come into play in the uninhibited world of cyber reality. But this one is filled with complicated words like circumplex and superordinate, and is truly a twenty-first century science, though it looks suspiciously like Confucius’ Five Virtues. The theory talks of opposing-reinforcing pairs of personality traits like volatility & withdrawal, compassion & politeness, industriousness & orderliness, enthusiasm & assertiveness, and finally, openness & intellect. The wise old Chinese simply stated – benevolence, honesty, conscientiousness, altruism and good manners – as good virtues.

Truly, how much of all this do we see in ourselves when we are in our imagined worlds on social media. It took mankind thousands of years to get from the jungle to the computer, but have we in some ways, come back to the same place?

Stop ladies and gentlemen, and think!

Polonius, when not appearing in Shakespeare’s Hamlet, is a Hi-Tech Security Solutions’ writer with fantasies of big game hunting and adventure.





Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

The impact of misguided viral campaigns
News & Events Training & Education
For many years, traditional media have been perceived as slower, more inflexible, and less responsive compared to digital platforms. But in an ecosystem flooded with content, its value is becoming clearer: verification, context, and accountability.

Read more...
Gallagher Security strengthens KwaZulu-Natal presence
Gallagher News & Events Integrated Solutions
Gallagher Security has reinforced its commitment to the KwaZulu-Natal region with its Command the Future event. The full-day event welcomed over 100 channel partners, end users, and consultants, marking Gallagher’s third major event in Durban.

Read more...
Rise in malicious insider threat reports
News & Events Information Security
Mimecast Study finds 46% of SA organisations report a rise in malicious insider threat reports over the past year: reveals disconnect between security awareness and technical controls as AI-powered attacks accelerate.

Read more...
Centurion raises the bar at HomeSec Expo
Centurion Systems News & Events Access Control & Identity Management Residential Estate (Industry) Smart Home Automation Commercial (Industry)
Centurion Systems unveiled its latest product lines at HomeSec Expo 2026, introducing SMART+, a simpler way for installers and end users to manage their Centurion installations - as well as a few new products.

Read more...
Duxbury SA Milesight distributor
Duxbury Networking News & Events Surveillance
Duxbury Networking has been appointed the exclusive distributor of Milesight surveillance solutions in South Africa, expanding its surveillance portfolio with a platform designed to deliver AI-driven analytics, rapid deployment, and open integration for modern security environments.

Read more...
New campaign exploiting Google Tasks notifications
News & Events Information Security
New phishing scheme abuses legitimate Google Tasks notifications to trick corporate users into revealing corporate login credentials, which can then be used to gain unauthorised access to company systems, steal data, or launch further attacks.

Read more...
SMARTpod talks about HomeSec Expo 2026
SMART Security Solutions Technews Publishing News & Events Residential Estate (Industry) Videos
SMARTpod, the podcast from SMART Security Solutions, finds out more about the upcoming HomeSec Expo happening at Gallagher Estate on 4 & 5 March 2026.

Read more...
“This Is Theft!” SASA slams Mafoko Security
News & Events Security Services & Risk Management Associations
The Security Association of South Africa (SASA) has issued a stark warning that the long-running Mafoko Security Patrols scandal is no longer an isolated case of employer misconduct, but evidence of a systemic failure in South Africa’s regulatory and governance structures.

Read more...
Coordinated efforts lead to successful crime response
News & Events Surveillance Integrated Solutions
A synchronised operation involving Vumacam’s control room operators, the Johannesburg Metropolitan Police Department (JMPD), and 24/7 Drone Force, resulted in the successful identification and apprehension of a suspect linked to a reported theft case.

Read more...
2025 Global OSPAs winners
News & Events
Bringing together the very best of the global security industry, the second Global Outstanding Security Performance Awards (OSPAs) was streamed live to a worldwide audience on 05 February 2026.

Read more...










While every effort has been made to ensure the accuracy of the information contained herein, the publisher and its agents cannot be held responsible for any errors contained, or any loss incurred as a result. Articles published do not necessarily reflect the views of the publishers. The editor reserves the right to alter or cut copy. Articles submitted are deemed to have been cleared for publication. Advertisements and company contact details are published as provided by the advertiser. Technews Publishing (Pty) Ltd cannot be held responsible for the accuracy or veracity of supplied material.




© Technews Publishing (Pty) Ltd. | All Rights Reserved.