Social media and the Big Five

March 2013 News & Events

Have you ever been baited, stalked or hounded on social media? Then welcome to the world of the Big Five on the computer. Some things never change. We thought that computers would be fun, harmless and oh-so-civilised, but once in the while along comes the hunter gatherer, out in the darkness or even broad daylight, and gets the best of us.

Unfortunately, both the hunters and the prey have legitimate pug-marks and even names, so it is easy to get through the usual rigmarole of security in the virtual grasslands, so how do we defend ourselves? Let us for a moment see what the real Big Five do in real jungles. The elephant is large, but usually hides behind tall grass most of the time, and at the appropriate moment charges at his purported hunter, giving him the fright of his life. It works. On websites, they charge (at) you by asking for your credit card number, and all this while you never saw the elephant hiding in the tall grass. It is, indeed time to run.

In case you spot a black rhinoceros, you better run anyway. Do not worry, the magnificent beasts are vegetarians, but surely there is a poacher somewhere around who might (thankfully) miss his target, but get your nose instead. The most in numbers though would be the magnificent Cape buffalo, and they kill, especially if wounded, and they are seen in herds. Just keep a safe distance, and what if you see the lion? The best, they say, is to make a quick decision whether you want to be the hunter or the hunted, and get on with it.

You have of course heard of buzzing commerce websites, doing roaring business in and around the social media. The leopard of course is the most difficult to spot (though some say they are born that way) and if you are hunting one, it could take a long-long time, but if you are getting hunted, then this one could be the quickest.

Indeed such hazards are becoming so commonplace, that along with reading books like ‘Social Media for Dummies’, it might be equally useful to have Peter H. Capstick’s old classic: ‘Safari, The Last Adventure’, also at hand.

But psychologists will tell you of another Big Five that you need to be aware of on the Internet – the personality traits that come into play in the uninhibited world of cyber reality. But this one is filled with complicated words like circumplex and superordinate, and is truly a twenty-first century science, though it looks suspiciously like Confucius’ Five Virtues. The theory talks of opposing-reinforcing pairs of personality traits like volatility & withdrawal, compassion & politeness, industriousness & orderliness, enthusiasm & assertiveness, and finally, openness & intellect. The wise old Chinese simply stated – benevolence, honesty, conscientiousness, altruism and good manners – as good virtues.

Truly, how much of all this do we see in ourselves when we are in our imagined worlds on social media. It took mankind thousands of years to get from the jungle to the computer, but have we in some ways, come back to the same place?

Stop ladies and gentlemen, and think!

Polonius, when not appearing in Shakespeare’s Hamlet, is a Hi-Tech Security Solutions’ writer with fantasies of big game hunting and adventure.





Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

Highest increase in global cyberattacks in two years
Information Security News & Events
Check Point Global Research released new data on Q2 2024 cyber-attack trends, noting a 30% global increase in Q2 2024, with Africa experiencing the highest average weekly per organisation.

Read more...
The power of PKI and private sector innovation
Access Control & Identity Management News & Events Government and Parastatal (Industry)
At the recent ID4Africa 2025 Summit in Addis Ababa, the spotlight was firmly on building secure, inclusive, and scalable digital identity ecosystems for the African continent.

Read more...
Bosch Security renamed Keenfinity
News & Events
Globally renowned brands for video systems, access control and intrusion alarm systems, as well as communication systems, unite under the roof of the new company Keenfinity Group.

Read more...
2025 video surveillance market set for improved fortunes
News & Events Surveillance
Novaira Insights has unveiled its latest report, World Market for Video Surveillance Hardware and Software – 2025 Edition, forecasting a healthy growth rate of 8,1% until 2029, excluding China.

Read more...
Wialon announces integration with fleet maintenance and optimisation platform
News & Events Transport (Industry) Logistics (Industry)
Fleet management software platform integrates with a fleet maintenance and optimisation platform to support mutual customers for better workflows and deeper insights into fleet operations.

Read more...
DeepSneak deception
Information Security News & Events
Kaspersky Global Research & Analysis researchers have discovered a new malicious campaign which is distributing a Trojan through a fake DeepSeek-R1 Large Language Model (LLM) app for PCs.

Read more...
Almost 50% of companies choose to pay the ransom
News & Events Information Security
This year’s Sophos State of Ransomware 2025 report found that nearly 50% of companies paid the ransom to get their data back, the second-highest rate of ransom payment for ransom demands in six years.

Read more...
Value and industry insight
Securex South Africa Training & Education News & Events
Securex South Africa 2025, co-located with A-OSH EXPO, Facilities Management Expo, and Firexpo, drew thousands of security professionals from across the continent and beyond, offering a platform for networking, product discovery, and knowledge sharing.

Read more...
Gallagher Security achieves ISO 27001 recertification
News & Events Training & Education
Gallagher Security has successfully achieved certification to the updated ISO/IEC 27001:2022 standard for Information Security Management Systems (ISMS). This accomplishment builds on previous certifications and reflects a continued commitment to the highest standards of information security.

Read more...
Survey highlights cost of cyberdamage to industrial companies
Kaspersky Information Security News & Events
The majority of industrial organisations estimate their financial losses caused by cyberattacks to be over $1 million, while almost one in four report losses exceeding $5 million, and for some, it surpasses $10 million.

Read more...










While every effort has been made to ensure the accuracy of the information contained herein, the publisher and its agents cannot be held responsible for any errors contained, or any loss incurred as a result. Articles published do not necessarily reflect the views of the publishers. The editor reserves the right to alter or cut copy. Articles submitted are deemed to have been cleared for publication. Advertisements and company contact details are published as provided by the advertiser. Technews Publishing (Pty) Ltd cannot be held responsible for the accuracy or veracity of supplied material.




© Technews Publishing (Pty) Ltd. | All Rights Reserved.