{"id":313,"date":"2023-10-14T22:27:46","date_gmt":"2023-10-14T22:27:46","guid":{"rendered":"https:\/\/sites.wp.odu.edu\/aacyber\/?p=313"},"modified":"2023-10-14T22:27:46","modified_gmt":"2023-10-14T22:27:46","slug":"journal-7","status":"publish","type":"post","link":"https:\/\/sites.wp.odu.edu\/aacyber\/2023\/10\/14\/journal-7\/","title":{"rendered":"Journal 7"},"content":{"rendered":"\n<p>These memes relate to the HSI framework by emphasizing the central role of users in the cybersecurity equation. The importance of user-centric approaches, education, collaboration, and participation is emphasized in order to improve cybersecurity practices and establish a more secure digital environment for all individuals.<br>Individual Engaging in Typing Activity: &#8220;Enhancing Digital Security through Incremental Keystrokes.&#8221; The significance of individuals in upholding cybersecurity through conscientious digital conduct is underscored.<\/p>\n\n\n\n<p>The presence of a dog wearing glasses and sitting on a laptop serves as a visual representation of the notion that cybersecurity is a responsibility that extends to all individuals, including our beloved pets. Emphasizing the imperative of promoting cybersecurity awareness among all individuals, including non-human entities such as pets.<\/p>\n\n\n\n<p>Individual using a MacBook: &#8220;The Significance of Positive User Interaction in Cybersecurity: A User-Centered Perspective.&#8221; Emphasizing the significance of user happiness in the design of secure systems.<\/p>\n\n\n\n<p>Man Editing with Laptop: &#8220;Empowering Users, Strengthening Security &#8211; Together.&#8221; This paper aims to elucidate the symbiotic relationship between users and security measures in the context of bolstering cybersecurity.<\/p>\n\n\n\n<p>Black Smartphone: &#8220;Understanding Users&#8217; Needs: A Key to Cybersecurity Success.&#8221; &#8211; Highlighting the importance of user feedback in the development of effective security solutions.<\/p>\n\n\n\n<p>Woman with iPhone: &#8220;Digital Conversations, Digital Safety &#8211; Engaging Users in Cybersecurity.&#8221; &#8211; Facilitating the cultivation of open discourse and active user participation within the realm of cybersecurity discourse.<\/p>\n\n\n\n<p>Person with iPhone: &#8220;A Pictorial Look into Cyber Awareness: Guarding Your Digital Treasures.&#8221; This paper aims to emphasize the significance of visual content in the context of promoting awareness regarding cybersecurity.<\/p>\n\n\n\n<p>Computer User at Desk: &#8220;User-Centric Cybersecurity: A Secure Desk is a Strong Defense.&#8221; Promoting a user-centric approach to ensuring the security of digital environments.<\/p>\n\n\n\n<p>Summer School Presentation: &#8220;Learning Together, Securing Together: Cyber Education for All.&#8221; &#8211; Proposing the implementation of comprehensive cybersecurity education across all contexts.<\/p>\n\n\n\n<p>Taking a Picture with Phone: &#8220;Capturing Moments, Protecting Memories: Secure Your Digital World.&#8221; Emphasizing the significance of safeguarding digital assets via cybersecurity measures.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>These memes relate to the HSI framework by emphasizing the central role of users in the cybersecurity equation. The importance of user-centric approaches, education, collaboration, and participation is emphasized in order to improve cybersecurity practices and establish a more secure digital environment for all individuals.Individual Engaging in Typing Activity: &#8220;Enhancing Digital Security through Incremental Keystrokes.&#8221;&#8230; <\/p>\n<div class=\"link-more\"><a href=\"https:\/\/sites.wp.odu.edu\/aacyber\/2023\/10\/14\/journal-7\/\">Read More<\/a><\/div>\n","protected":false},"author":27074,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":"","wds_primary_category":0},"categories":[3],"tags":[],"_links":{"self":[{"href":"https:\/\/sites.wp.odu.edu\/aacyber\/wp-json\/wp\/v2\/posts\/313"}],"collection":[{"href":"https:\/\/sites.wp.odu.edu\/aacyber\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/sites.wp.odu.edu\/aacyber\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/aacyber\/wp-json\/wp\/v2\/users\/27074"}],"replies":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/aacyber\/wp-json\/wp\/v2\/comments?post=313"}],"version-history":[{"count":1,"href":"https:\/\/sites.wp.odu.edu\/aacyber\/wp-json\/wp\/v2\/posts\/313\/revisions"}],"predecessor-version":[{"id":314,"href":"https:\/\/sites.wp.odu.edu\/aacyber\/wp-json\/wp\/v2\/posts\/313\/revisions\/314"}],"wp:attachment":[{"href":"https:\/\/sites.wp.odu.edu\/aacyber\/wp-json\/wp\/v2\/media?parent=313"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/aacyber\/wp-json\/wp\/v2\/categories?post=313"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/aacyber\/wp-json\/wp\/v2\/tags?post=313"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}