Development and testing of a methodology for diagnosing vulnerability to social engineering techniques based on L.N. Sobchik's individual-typological approach

 
Audio is AI-generated
1

Abstract

Context and relevance. In the era of digitalization, with its high risk of personal data breaches on the Internet, people are increasingly becoming victims of cyber fraud based on social engineering techniques. Understanding which individual-typological personality traits predispose individuals to vulnerability to fraudsters is crucial for developing more effective counter-fraud strategies and improving cybersecurity overall. Objective. To develop, describe, and conduct initial testing of an original methodology for diagnosing individual vulnerability to social engineering techniques, based on L.N. Sobchik's theory of leading personality tendencies. Hypothesis. There is a statistically significant relationship between an individual's profile of leading personality tendencies (according to L.N. Sobchik) and their level of vulnerability to social engineering techniques. Methods and materials. The study involved 185 respondents aged 18 to 30 (M = 21.5, SD = 2.8; 68% female). Individual-typological personality traits were assessed using the L.N. Sobchik methodology, while vulnerability to social engineering was diagnosed using the developed author's methodology. Results. It was empirically confirmed that various configurations of personality tendencies lead to a specific vulnerability to certain manipulative techniques. Based on the research results, stable risk profiles were identified, confirming the construct validity and diagnostic value of the developed methodology for revealing “weak spots” in an individual's psychological defense. Conclusions. The developed methodology has demonstrated its diagnostic validity and opens up opportunities for transitioning to personalized information security awareness programs. The fundamental possibility and effectiveness of using L.N. Sobchik's individual-typological approach (theory of leading tendencies) for diagnosing vulnerability to social engineering has been confirmed: deep-seated personality characteristics are a significant predictor of behavior in situations of manipulative influence, which expands existing understanding of the nature of vulnerability in cybersecurity.

General Information

Keywords: social engineering, cyber fraud, individual-typological traits, cognitive errors, personality, theory of leading tendencies

Journal rubric: Interdisciplinary Studies

Article type: scientific article

DOI: https://doi.org/10.17759/psylaw.2026160115

Received 25.11.2025

Revised 16.01.2026

Accepted

Published

For citation: Nurmukhametova, I.F., Nurmuhametov, E.A. (2026). Development and testing of a methodology for diagnosing vulnerability to social engineering techniques based on L.N. Sobchik's individual-typological approach. Psychology and Law, 16(1), 240–265. (In Russ.). https://doi.org/10.17759/psylaw.2026160115

© Nurmukhametova I.F., Nurmuhametov E.A., 2026

License: CC BY-NC 4.0

References

  1. Vlasova, N.V., Buslaeva, E.L. (2022). Psychological Features of Individuals Prone to Cyber Victimization. Psychology and Law,12(2), 194—206. (In Russ.). https://doi.org/10.17759/psylaw.2022120214
  2. Dozortseva, L.M. Karnozova, I.N. Konopleva, E.G. Pastukhova, F.S. Safuanov (Eds.), Interuniversity Scientific-Practical Internet Conference on Legal Psychology: Collection of Abstracts from the Scientific-Practical Internet Conference on Legal Psychology (May 15-23, 2025) (pp. 82—85). Moscow: MSUPE Publ. (In Russ.). URL: https://psyjournals.ru/nonserialpublications/jurpsyconf2025/ (viewed: 05.11.2025).
  3. Monakhova, E., Gorodnicheva, J.M., Morozova, A.N., Shestakova, A.N., Moiseeva, V.V., Klucharev, V.A. (2024). Trust in Manipulative Information: From Perception to Decision Making. Monitoring of Public Opinion: Economic and Social Changes, 3, 42—66. (In Russ.). https://doi.org/10.14515/monitoring.2024.3.2544
  4. Rozenova, M.I., Ognev, A.S., Likhacheva, E.V. (2025). Psychological mechanisms of destructive manipulation and strategies for preventing digital fraud. Journal of Modern Foreign Psychology, 14(2), 26—37. (In Russ.). https://doi.org/10.17759/jmfp.2025140203
  5. Rozova, E.A., Khitina, A.A., Eremeeva, A.S., Semenova, L.E. (2020). The tendency to manipulation and the need for thrills of female and male persons. Nizhny Novgorod Psychological Almanac, 1(2), 135—143. (In Russ.). URL: https://www.elibrary.ru/zwgylp (viewed: 05.11.2025).
  6. Sobchik, L.N. (2022). Theory and practice of psychology of individuality. Psychological Journal, 43(6), 119— (In Russ.). https://doi.org/10.31857/S020595920023651-2
  7. Milgram, S. (1963). Behavioral study of obedience. The Journal of Abnormal and Social Psychology, 67(4), 371—378.
  8. Sleep, C.E., Lynam, D.R., Miller, J.D. (2021). A comparison of the validity of very brief measures of the big five / fivefactor model of personality. Assessment, 28(3), 739—758. http://doi.org/10.1177/1073191120939160
  9. Stanovich, K.E., West, R.F. (2000). Individual differences in reasoning: Implications for the rationality debate? Behavioral and Brain Sciences, 23(5), 645— http://doi.org/10.1017/s0140525x00003435
  10. Starcke, K., Brand, M. (2012). Decision making under stress: A selective review. Neuroscience & Biobehavioral Reviews, 36(4), 1228— http://doi.org/10.1016/j.neubiorev.2012.02.003

Information About the Authors

Irina F. Nurmukhametova, Candidate of Science (Psychology), Associate Professor, Associate Professor, Department of General Psychology, Higher School of Philosophy, Psychology and Sociology, Institute of Humanities and Social Sciences, Ufa University of Science and Technology, Ufa, Russian Federation, ORCID: https://orcid.org/0000-0003-2029-618X, e-mail: if44@bk.ru

Ernest A. Nurmuhametov, Candidate of Science (Psychology), Psychologist at the Coordination Center, Ufa University of Science and Technology, Ufa, Russian Federation, ORCID: https://orcid.org/0000-0003-2880-1275, e-mail: misall@mail.ru

Metrics

 Web Views

Whole time: 5
Previous month: 0
Current month: 5

 PDF Downloads

Whole time: 1
Previous month: 0
Current month: 1

 Total

Whole time: 6
Previous month: 0
Current month: 6