Psychology and Law
2026. Vol. 16, no. 1, 240–265
doi:10.17759/psylaw.2026160115
ISSN: 2222-5196 (online)
Development and testing of a methodology for diagnosing vulnerability to social engineering techniques based on L.N. Sobchik's individual-typological approach
Abstract
Context and relevance. In the era of digitalization, with its high risk of personal data breaches on the Internet, people are increasingly becoming victims of cyber fraud based on social engineering techniques. Understanding which individual-typological personality traits predispose individuals to vulnerability to fraudsters is crucial for developing more effective counter-fraud strategies and improving cybersecurity overall. Objective. To develop, describe, and conduct initial testing of an original methodology for diagnosing individual vulnerability to social engineering techniques, based on L.N. Sobchik's theory of leading personality tendencies. Hypothesis. There is a statistically significant relationship between an individual's profile of leading personality tendencies (according to L.N. Sobchik) and their level of vulnerability to social engineering techniques. Methods and materials. The study involved 185 respondents aged 18 to 30 (M = 21.5, SD = 2.8; 68% female). Individual-typological personality traits were assessed using the L.N. Sobchik methodology, while vulnerability to social engineering was diagnosed using the developed author's methodology. Results. It was empirically confirmed that various configurations of personality tendencies lead to a specific vulnerability to certain manipulative techniques. Based on the research results, stable risk profiles were identified, confirming the construct validity and diagnostic value of the developed methodology for revealing “weak spots” in an individual's psychological defense. Conclusions. The developed methodology has demonstrated its diagnostic validity and opens up opportunities for transitioning to personalized information security awareness programs. The fundamental possibility and effectiveness of using L.N. Sobchik's individual-typological approach (theory of leading tendencies) for diagnosing vulnerability to social engineering has been confirmed: deep-seated personality characteristics are a significant predictor of behavior in situations of manipulative influence, which expands existing understanding of the nature of vulnerability in cybersecurity.
General Information
Keywords: social engineering, cyber fraud, individual-typological traits, cognitive errors, personality, theory of leading tendencies
Journal rubric: Interdisciplinary Studies
Article type: scientific article
DOI: https://doi.org/10.17759/psylaw.2026160115
Received 25.11.2025
Revised 16.01.2026
Accepted
Published
For citation: Nurmukhametova, I.F., Nurmuhametov, E.A. (2026). Development and testing of a methodology for diagnosing vulnerability to social engineering techniques based on L.N. Sobchik's individual-typological approach. Psychology and Law, 16(1), 240–265. (In Russ.). https://doi.org/10.17759/psylaw.2026160115
© Nurmukhametova I.F., Nurmuhametov E.A., 2026
License: CC BY-NC 4.0
References
- Vlasova, N.V., Buslaeva, E.L. (2022). Psychological Features of Individuals Prone to Cyber Victimization. Psychology and Law,12(2), 194—206. (In Russ.). https://doi.org/10.17759/psylaw.2022120214
- Dozortseva, L.M. Karnozova, I.N. Konopleva, E.G. Pastukhova, F.S. Safuanov (Eds.), Interuniversity Scientific-Practical Internet Conference on Legal Psychology: Collection of Abstracts from the Scientific-Practical Internet Conference on Legal Psychology (May 15-23, 2025) (pp. 82—85). Moscow: MSUPE Publ. (In Russ.). URL: https://psyjournals.ru/nonserialpublications/jurpsyconf2025/ (viewed: 05.11.2025).
- Monakhova, E., Gorodnicheva, J.M., Morozova, A.N., Shestakova, A.N., Moiseeva, V.V., Klucharev, V.A. (2024). Trust in Manipulative Information: From Perception to Decision Making. Monitoring of Public Opinion: Economic and Social Changes, 3, 42—66. (In Russ.). https://doi.org/10.14515/monitoring.2024.3.2544
- Rozenova, M.I., Ognev, A.S., Likhacheva, E.V. (2025). Psychological mechanisms of destructive manipulation and strategies for preventing digital fraud. Journal of Modern Foreign Psychology, 14(2), 26—37. (In Russ.). https://doi.org/10.17759/jmfp.2025140203
- Rozova, E.A., Khitina, A.A., Eremeeva, A.S., Semenova, L.E. (2020). The tendency to manipulation and the need for thrills of female and male persons. Nizhny Novgorod Psychological Almanac, 1(2), 135—143. (In Russ.). URL: https://www.elibrary.ru/zwgylp (viewed: 05.11.2025).
- Sobchik, L.N. (2022). Theory and practice of psychology of individuality. Psychological Journal, 43(6), 119— (In Russ.). https://doi.org/10.31857/S020595920023651-2
- Milgram, S. (1963). Behavioral study of obedience. The Journal of Abnormal and Social Psychology, 67(4), 371—378.
- Sleep, C.E., Lynam, D.R., Miller, J.D. (2021). A comparison of the validity of very brief measures of the big five / fivefactor model of personality. Assessment, 28(3), 739—758. http://doi.org/10.1177/1073191120939160
- Stanovich, K.E., West, R.F. (2000). Individual differences in reasoning: Implications for the rationality debate? Behavioral and Brain Sciences, 23(5), 645— http://doi.org/10.1017/s0140525x00003435
- Starcke, K., Brand, M. (2012). Decision making under stress: A selective review. Neuroscience & Biobehavioral Reviews, 36(4), 1228— http://doi.org/10.1016/j.neubiorev.2012.02.003
Information About the Authors
Metrics
Web Views
Whole time: 5
Previous month: 0
Current month: 5
PDF Downloads
Whole time: 1
Previous month: 0
Current month: 1
Total
Whole time: 6
Previous month: 0
Current month: 6