{"id":321,"date":"2024-12-09T03:36:44","date_gmt":"2024-12-09T03:36:44","guid":{"rendered":"https:\/\/sites.wp.odu.edu\/akey010\/?p=321"},"modified":"2024-12-09T03:36:44","modified_gmt":"2024-12-09T03:36:44","slug":"review-the-following-ten-photos-through-a-human-centered-cybersecurity-framework-create-a-meme-for-your-favorite-three-explaining-what-is-going-on-in-the-individuals-or-individuals","status":"publish","type":"post","link":"https:\/\/sites.wp.odu.edu\/akey010\/2024\/12\/09\/review-the-following-ten-photos-through-a-human-centered-cybersecurity-framework-create-a-meme-for-your-favorite-three-explaining-what-is-going-on-in-the-individuals-or-individuals\/","title":{"rendered":"Review the following ten photos through a human-centered cybersecurity framework. Create a meme for your favorite three, explaining what is going on in the individual\u2019s or individuals\u2019 mind(s)."},"content":{"rendered":"\n<figure class=\"wp-block-image\"><img decoding=\"async\" src=\"https:\/\/canvas.odu.edu\/users\/88880\/files\/41165578\/preview?verifier=d9WYJpflmDj31G5mzHZJGK8MyXgQULZyyDUtqIhZ\" alt=\"image.png\" \/><\/figure>\n\n\n\n<p>The man standing informs the group on the importance of meaningful training and awareness in a cybersecurity organization. Effective strategies and training methods make for a better company. &#8220;Mansur (2018) advocates that people are not the weakest link in&nbsp;cybersecurity; the problem is organizations failed to provide meaningful training&nbsp;and support to cybersecurity professionals&#8221;.<\/p>\n\n\n\n<figure class=\"wp-block-image\"><img decoding=\"async\" src=\"https:\/\/canvas.odu.edu\/users\/88880\/files\/41165865\/preview?verifier=NvsWIYQvwzzJMcn8fZwYuz6ZTMHYi7mEdNAATmdu\" alt=\"image.png\" \/><\/figure>\n\n\n\n<p>This meme illustrates a dog taking over a human job, reducing human errors. After years of studying human behavior, the dog became an expert, minimizing errors, and enhancing performance in cyber environments.&nbsp;&#8220;The human-centered cybersecurity model position humans as the central&nbsp;element of cybersecurity and information security procedures, frameworks,&nbsp;designs, and the integration of technology as an effort to reduced human-enabled errors (Nobles, 2018)&#8221;.<\/p>\n\n\n\n<figure class=\"wp-block-image\"><img decoding=\"async\" src=\"https:\/\/canvas.odu.edu\/users\/88880\/files\/41166121\/preview?verifier=SFYpEqJlBJmVtgUATKi6wc6uOSUZHLd1vSWLOLKO\" alt=\"image.png\" \/><\/figure>\n\n\n\n<p>The person in the photo is undergoing an annual human factors assessment as part of their application process for a new job. The assessment trials are designed to minimize discrepancies between individuals, technology, and procedures. &#8220;A possible objective for a human factors program is to ensure all employees undergo annual human factors training as well as for organizations to complete an annual human factors assessment&#8221;.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>The man standing informs the group on the importance of meaningful training and awareness in a cybersecurity organization. Effective strategies and training methods make for a better company. &#8220;Mansur (2018) advocates that people are not the weakest link in&nbsp;cybersecurity; the problem is organizations failed to provide meaningful training&nbsp;and support to cybersecurity professionals&#8221;. This meme illustrates&#8230; <\/p>\n<div class=\"link-more\"><a href=\"https:\/\/sites.wp.odu.edu\/akey010\/2024\/12\/09\/review-the-following-ten-photos-through-a-human-centered-cybersecurity-framework-create-a-meme-for-your-favorite-three-explaining-what-is-going-on-in-the-individuals-or-individuals\/\">Read More<\/a><\/div>\n","protected":false},"author":28225,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":"","wds_primary_category":0},"categories":[1],"tags":[],"_links":{"self":[{"href":"https:\/\/sites.wp.odu.edu\/akey010\/wp-json\/wp\/v2\/posts\/321"}],"collection":[{"href":"https:\/\/sites.wp.odu.edu\/akey010\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/sites.wp.odu.edu\/akey010\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/akey010\/wp-json\/wp\/v2\/users\/28225"}],"replies":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/akey010\/wp-json\/wp\/v2\/comments?post=321"}],"version-history":[{"count":1,"href":"https:\/\/sites.wp.odu.edu\/akey010\/wp-json\/wp\/v2\/posts\/321\/revisions"}],"predecessor-version":[{"id":322,"href":"https:\/\/sites.wp.odu.edu\/akey010\/wp-json\/wp\/v2\/posts\/321\/revisions\/322"}],"wp:attachment":[{"href":"https:\/\/sites.wp.odu.edu\/akey010\/wp-json\/wp\/v2\/media?parent=321"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/akey010\/wp-json\/wp\/v2\/categories?post=321"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/akey010\/wp-json\/wp\/v2\/tags?post=321"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}