Social media and the Big Five

March 2013 News & Events

Have you ever been baited, stalked or hounded on social media? Then welcome to the world of the Big Five on the computer. Some things never change. We thought that computers would be fun, harmless and oh-so-civilised, but once in the while along comes the hunter gatherer, out in the darkness or even broad daylight, and gets the best of us.

Unfortunately, both the hunters and the prey have legitimate pug-marks and even names, so it is easy to get through the usual rigmarole of security in the virtual grasslands, so how do we defend ourselves? Let us for a moment see what the real Big Five do in real jungles. The elephant is large, but usually hides behind tall grass most of the time, and at the appropriate moment charges at his purported hunter, giving him the fright of his life. It works. On websites, they charge (at) you by asking for your credit card number, and all this while you never saw the elephant hiding in the tall grass. It is, indeed time to run.

In case you spot a black rhinoceros, you better run anyway. Do not worry, the magnificent beasts are vegetarians, but surely there is a poacher somewhere around who might (thankfully) miss his target, but get your nose instead. The most in numbers though would be the magnificent Cape buffalo, and they kill, especially if wounded, and they are seen in herds. Just keep a safe distance, and what if you see the lion? The best, they say, is to make a quick decision whether you want to be the hunter or the hunted, and get on with it.

You have of course heard of buzzing commerce websites, doing roaring business in and around the social media. The leopard of course is the most difficult to spot (though some say they are born that way) and if you are hunting one, it could take a long-long time, but if you are getting hunted, then this one could be the quickest.

Indeed such hazards are becoming so commonplace, that along with reading books like ‘Social Media for Dummies’, it might be equally useful to have Peter H. Capstick’s old classic: ‘Safari, The Last Adventure’, also at hand.

But psychologists will tell you of another Big Five that you need to be aware of on the Internet – the personality traits that come into play in the uninhibited world of cyber reality. But this one is filled with complicated words like circumplex and superordinate, and is truly a twenty-first century science, though it looks suspiciously like Confucius’ Five Virtues. The theory talks of opposing-reinforcing pairs of personality traits like volatility & withdrawal, compassion & politeness, industriousness & orderliness, enthusiasm & assertiveness, and finally, openness & intellect. The wise old Chinese simply stated – benevolence, honesty, conscientiousness, altruism and good manners – as good virtues.

Truly, how much of all this do we see in ourselves when we are in our imagined worlds on social media. It took mankind thousands of years to get from the jungle to the computer, but have we in some ways, come back to the same place?

Stop ladies and gentlemen, and think!

Polonius, when not appearing in Shakespeare’s Hamlet, is a Hi-Tech Security Solutions’ writer with fantasies of big game hunting and adventure.





Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

Visual Intelligence for driver and vehicle safety
News & Events Asset Management Transport (Industry)
Webfleet, Bridgestone’s fleet management solution, and Peregrine.ai, a Berlin-based startup transforming mobility through AI-powered vision systems, announced the launch of a next-generation driver assistance solution.

Read more...
Inaugural Command the Future event in Cape Town
Gallagher News & Events Perimeter Security, Alarms & Intruder Detection
Gallagher Security Africa’s inaugural Command the Future 2025 event was a resounding success, reinforcing Gallagher’s commitment to innovation, collaboration, and long-term growth in Africa’s rapidly evolving security industry.

Read more...
From the editor's desk: The beginning of the end
Technews Publishing News & Events
            As we come to the final issue of SMART Security Solutions, we can look back on a tough year: long decision-making cycles, squeezed budgets and the expectation of miracles on a shoestring. SMART Security ...

Read more...
ONVIF to end support for Profile S
News & Events Surveillance
ONVIF has announced that it will end support for ONVIF Profile S and recommends using its successor, Profile T. Profile S is the first-ever profile introduced by ONVIF in 2011.

Read more...
Kaspersky finds security flaws that threaten vehicle safety.
News & Events Information Security Transport (Industry)
At its Security Analyst Summit 2025, Kaspersky presented the results of a security audit that exposed a significant security flaw enabling unauthorised access to all connected vehicles of one automotive manufacturer.

Read more...
Global hub for predictive road safety intelligence
News & Events Asset Management Transport (Industry)
One year since its formation, Netstar’s advanced Global Fleet Bureau is more than an operational facility for international fleet management, it has become a big-data nerve centre delivering unprecedented value to clients.

Read more...
Global Threat Intelligence Report for October 2025
Information Security News & Events
Africa was pipped to the post as the most attacked region by Latin America, which averaged 2966 attacks per organisation per week (+16% YoY). Africa followed with (2782, – 15%) and APAC (2703, – 8%).

Read more...
Is your entrance security secure?
SMART Security Solutions Centurion Systems Technews Publishing News & Events Access Control & Identity Management Smart Home Automation
While Centurion Systems may be known as a leader in gate and door motors in 72 countries, the company has developed more than hardware and now offers an automation ecosystem for access control security.

Read more...
From prevention to protection
Securex South Africa News & Events Fire & Safety
The Western Cape’s varied landscapes and rapid urban development present a range of fire safety challenges, from densely populated city centres to remote industrial sites, and from heritage buildings to new high-rise developments.

Read more...
Workflow and asset management solutions
Asset Management News & Events
Zamatrack’s innovative workflow and asset management solutions feature the Worxit platform. This all-in-one solution allows businesses to streamline operations with real-time tracking, GPS data, and custom reports.

Read more...










While every effort has been made to ensure the accuracy of the information contained herein, the publisher and its agents cannot be held responsible for any errors contained, or any loss incurred as a result. Articles published do not necessarily reflect the views of the publishers. The editor reserves the right to alter or cut copy. Articles submitted are deemed to have been cleared for publication. Advertisements and company contact details are published as provided by the advertiser. Technews Publishing (Pty) Ltd cannot be held responsible for the accuracy or veracity of supplied material.




© Technews Publishing (Pty) Ltd. | All Rights Reserved.