(Programmer Thinking Deeply) – https://unsplash.com/photos/male-programmer-working-on-desktop-computer-with-many-monitors-at-office-in-software-develop-company-website-design-programming-and-coding-technologies-fxtpTGech0M
“Did I just go live to production. or was it the test server? ????”
Explanation:
This programmer appears to be lost in thought, maybe reading code or debugging. In a people-centric cybersecurity approach, this is cognitive workload—when individuals are distracted or overloaded, they can make mistakes that introduce security risks (e.g., releasing untested code, setting security settings incorrectly).
“When you finally hack into the system… but it was just your own Wi-Fi.”
Explanation:
The person in this image is hacking or penetration testing. Human-centered cybersecurity realizes that there is both malicious and ethical hacking, and security must be usability-oriented—enabling ethical users to test for weakness without enabling unauthorized access.
(Person Surfing Social Media) – https://unsplash.com/photos/person-holding-silver-iphone-6-BXiLSwwvqrY
“Me: I don’t post personal stuff online. Also me: Posts whole life on Instagram.”
Explanation:
The person is browsing social media, maybe engaging with personal content. This meme is highlighting a common cybersecurity issue—people believe they are privacy-conscious but unknowingly leave sensitive data online. Human-centric cybersecurity must address behavioral patterns and increase awareness on how to manage digital footprints.