{"id":376,"date":"2024-02-23T16:35:45","date_gmt":"2024-02-23T16:35:45","guid":{"rendered":"https:\/\/sites.wp.odu.edu\/abcyber\/?p=376"},"modified":"2024-02-23T16:35:45","modified_gmt":"2024-02-23T16:35:45","slug":"journal-7","status":"publish","type":"post","link":"https:\/\/sites.wp.odu.edu\/abcyber\/2024\/02\/23\/journal-7\/","title":{"rendered":"Journal 7"},"content":{"rendered":"\n<h2 class=\"wp-block-heading\">Prompt: Review the following ten photos through a human-centered cybersecurity framework. Create a<br>meme for your favorite three, explaining what is going on in the individual\u2019s or individuals\u2019 mind(s). Explain how your memes relate to Human-centered cybersecurity.<\/h2>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\" \/>\n\n\n\n<h3 class=\"wp-block-heading\">Meme 1<\/h3>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"768\" src=\"https:\/\/sites.wp.odu.edu\/abcyber\/wp-content\/uploads\/sites\/35141\/2024\/02\/avi-richards-Z3ownETsdNQ-unsplash-1024x768.jpg\" alt=\"\" class=\"wp-image-377\" srcset=\"https:\/\/sites.wp.odu.edu\/abcyber\/wp-content\/uploads\/sites\/35141\/2024\/02\/avi-richards-Z3ownETsdNQ-unsplash-1024x768.jpg 1024w, https:\/\/sites.wp.odu.edu\/abcyber\/wp-content\/uploads\/sites\/35141\/2024\/02\/avi-richards-Z3ownETsdNQ-unsplash-300x225.jpg 300w, https:\/\/sites.wp.odu.edu\/abcyber\/wp-content\/uploads\/sites\/35141\/2024\/02\/avi-richards-Z3ownETsdNQ-unsplash-768x576.jpg 768w, https:\/\/sites.wp.odu.edu\/abcyber\/wp-content\/uploads\/sites\/35141\/2024\/02\/avi-richards-Z3ownETsdNQ-unsplash-1536x1152.jpg 1536w, https:\/\/sites.wp.odu.edu\/abcyber\/wp-content\/uploads\/sites\/35141\/2024\/02\/avi-richards-Z3ownETsdNQ-unsplash-2048x1536.jpg 2048w, https:\/\/sites.wp.odu.edu\/abcyber\/wp-content\/uploads\/sites\/35141\/2024\/02\/avi-richards-Z3ownETsdNQ-unsplash-400x300.jpg 400w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n\n\n\n<p>The man in this picture is designing a program, and his only concerns are technical aspects and whether it accomplishes the tasks it was created to complete. Because he neglects to consider how his customers may misuse or otherwise engage with the program, he fails to account for human factors in his software design process. As a result, he is putting the future users of the program in a precarious position where they may fall victim to a cyberattack or data loss if their behavior does not coincide with the programmers\u2019 expectations. This is similar to how the man pictured may meet an unfortunate end if he is startled while working on the edge of a tall building.<\/p>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\" \/>\n\n\n\n<h3 class=\"wp-block-heading\">Meme 2<\/h3>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"648\" src=\"https:\/\/sites.wp.odu.edu\/abcyber\/wp-content\/uploads\/sites\/35141\/2024\/02\/Summer_school_GLAM_giorno_1_1-1024x648.jpg\" alt=\"\" class=\"wp-image-378\" srcset=\"https:\/\/sites.wp.odu.edu\/abcyber\/wp-content\/uploads\/sites\/35141\/2024\/02\/Summer_school_GLAM_giorno_1_1-1024x648.jpg 1024w, https:\/\/sites.wp.odu.edu\/abcyber\/wp-content\/uploads\/sites\/35141\/2024\/02\/Summer_school_GLAM_giorno_1_1-300x190.jpg 300w, https:\/\/sites.wp.odu.edu\/abcyber\/wp-content\/uploads\/sites\/35141\/2024\/02\/Summer_school_GLAM_giorno_1_1-768x486.jpg 768w, https:\/\/sites.wp.odu.edu\/abcyber\/wp-content\/uploads\/sites\/35141\/2024\/02\/Summer_school_GLAM_giorno_1_1-1536x972.jpg 1536w, https:\/\/sites.wp.odu.edu\/abcyber\/wp-content\/uploads\/sites\/35141\/2024\/02\/Summer_school_GLAM_giorno_1_1-2048x1296.jpg 2048w, https:\/\/sites.wp.odu.edu\/abcyber\/wp-content\/uploads\/sites\/35141\/2024\/02\/Summer_school_GLAM_giorno_1_1-474x300.jpg 474w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n\n\n\n<p>This picture depicts a meeting between the executives of a company. The man in the back of the room is giving a presentation about specific behaviors that jeopardize the company\u2019s digital assets and provides information about how to mitigate these behaviors. He has called all of the other executives to the meeting because psychology research shows that an effective strategy to change the behavior of employees is to have leadership be exemplars of the standards they are setting for all employees. He emphasizes that if those at the top of the company do not modify their online actions, they will put the company at greater risk because all other employees will be less likely to observe proper cyber hygiene.<\/p>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\" \/>\n\n\n\n<h3 class=\"wp-block-heading\">Meme 3<\/h3>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"768\" height=\"1024\" src=\"https:\/\/sites.wp.odu.edu\/abcyber\/wp-content\/uploads\/sites\/35141\/2024\/02\/meme3-768x1024.jpg\" alt=\"\" class=\"wp-image-379\" srcset=\"https:\/\/sites.wp.odu.edu\/abcyber\/wp-content\/uploads\/sites\/35141\/2024\/02\/meme3-768x1024.jpg 768w, https:\/\/sites.wp.odu.edu\/abcyber\/wp-content\/uploads\/sites\/35141\/2024\/02\/meme3-225x300.jpg 225w, https:\/\/sites.wp.odu.edu\/abcyber\/wp-content\/uploads\/sites\/35141\/2024\/02\/meme3-1152x1536.jpg 1152w, https:\/\/sites.wp.odu.edu\/abcyber\/wp-content\/uploads\/sites\/35141\/2024\/02\/meme3-1536x2048.jpg 1536w, https:\/\/sites.wp.odu.edu\/abcyber\/wp-content\/uploads\/sites\/35141\/2024\/02\/meme3-630x840.jpg 630w, https:\/\/sites.wp.odu.edu\/abcyber\/wp-content\/uploads\/sites\/35141\/2024\/02\/meme3-960x1280.jpg 960w, https:\/\/sites.wp.odu.edu\/abcyber\/wp-content\/uploads\/sites\/35141\/2024\/02\/meme3-scaled.jpg 1920w\" sizes=\"(max-width: 768px) 100vw, 768px\" \/><\/figure>\n\n\n\n<p><span id=\"docs-internal-guid-220fe4f2-7fff-4cd4-5d05-00e965faebd8\" style=\"font-size:12pt;font-family:'Times New Roman',serif;color:#000000;background-color:transparent;font-weight:400;font-style:normal;font-variant:normal;text-decoration:none;vertical-align:baseline\">The woman in this picture just received an email informing her that she received a promotion for her recent work of leading a team that designed a human-centered cyber awareness program. Over the past year, after implementing continuous training for all employees on social engineering threats and how their behavior can impact the business\u2019s cybersecurity posture, a recent internal report showed that cybersecurity incidents are down 50% compared to years before the new training program. With this data, she has convinced her technology-focused superiors of the importance of considering human behavior when designing plans to secure the company network.<\/span><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Prompt: Review the following ten photos through a human-centered cybersecurity framework. Create ameme for your favorite three, explaining what is going on in the individual\u2019s or individuals\u2019 mind(s). Explain how your memes relate to Human-centered cybersecurity. Meme 1 The man in this picture is designing a program, and his only concerns are technical aspects and&#8230; <\/p>\n<div class=\"link-more\"><a href=\"https:\/\/sites.wp.odu.edu\/abcyber\/2024\/02\/23\/journal-7\/\">Read More<\/a><\/div>\n","protected":false},"author":26635,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":"","wds_primary_category":0},"categories":[3],"tags":[],"_links":{"self":[{"href":"https:\/\/sites.wp.odu.edu\/abcyber\/wp-json\/wp\/v2\/posts\/376"}],"collection":[{"href":"https:\/\/sites.wp.odu.edu\/abcyber\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/sites.wp.odu.edu\/abcyber\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/abcyber\/wp-json\/wp\/v2\/users\/26635"}],"replies":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/abcyber\/wp-json\/wp\/v2\/comments?post=376"}],"version-history":[{"count":1,"href":"https:\/\/sites.wp.odu.edu\/abcyber\/wp-json\/wp\/v2\/posts\/376\/revisions"}],"predecessor-version":[{"id":380,"href":"https:\/\/sites.wp.odu.edu\/abcyber\/wp-json\/wp\/v2\/posts\/376\/revisions\/380"}],"wp:attachment":[{"href":"https:\/\/sites.wp.odu.edu\/abcyber\/wp-json\/wp\/v2\/media?parent=376"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/abcyber\/wp-json\/wp\/v2\/categories?post=376"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/abcyber\/wp-json\/wp\/v2\/tags?post=376"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}