{"id":202,"date":"2024-10-20T20:16:02","date_gmt":"2024-10-20T20:16:02","guid":{"rendered":"https:\/\/sites.wp.odu.edu\/aladj\/?p=202"},"modified":"2024-10-20T20:16:02","modified_gmt":"2024-10-20T20:16:02","slug":"review-the-following-ten-photos-through-a-human-centered-cybersecurity-framework-create-a-meme-for-your-favorite-three-explaining-what-is-going-on-in-the-individuals-or-individuals","status":"publish","type":"post","link":"https:\/\/sites.wp.odu.edu\/aladj\/2024\/10\/20\/review-the-following-ten-photos-through-a-human-centered-cybersecurity-framework-create-a-meme-for-your-favorite-three-explaining-what-is-going-on-in-the-individuals-or-individuals\/","title":{"rendered":"Review the following ten photos through a human-centered cybersecurity framework. Create a meme for your favorite three, explaining what is going on in the individual\u2019s or individuals\u2019 mind(s)."},"content":{"rendered":"\n<h3 class=\"wp-block-heading\">Meme 1: &#8220;The Overwhelmed User&#8221;<\/h3>\n\n\n\n<p><strong>Image Concept:<\/strong> A person staring at a computer with a confused expression, surrounded by security alerts and notifications.<\/p>\n\n\n\n<p><strong>Text:<\/strong><br><em>Top: &#8220;When you receive 10 security alerts in one day&#8230;&#8221;<\/em><br><em>Bottom: &#8220;Is it a breach or just my computer being dramatic?&#8221;<\/em><\/p>\n\n\n\n<p><strong>Relation to Human-Centered Cybersecurity:<\/strong> This meme captures the confusion and stress that users often feel when faced with overwhelming security notifications. A human-centered approach recognizes the need for clear communication and user-friendly interfaces to reduce anxiety and improve response effectiveness.<\/p>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\" \/>\n\n\n\n<h3 class=\"wp-block-heading\">Meme 2: &#8220;The Reluctant Password Changer&#8221;<\/h3>\n\n\n\n<p><strong>Image Concept:<\/strong> A person looking frustrated while trying to create a new password on their device.<\/p>\n\n\n\n<p><strong>Text:<\/strong><br><em>Top: &#8220;Change your password regularly, they said&#8230;&#8221;<\/em><br><em>Bottom: &#8220;Why does my brain only remember &#8216;123456&#8217;?&#8221;<\/em><\/p>\n\n\n\n<p><strong>Relation to Human-Centered Cybersecurity:<\/strong> This highlights the cognitive load on users when they are required to manage complex passwords. A human-centered approach would advocate for easier password management solutions, such as password managers, to enhance user compliance without overloading their memory.<\/p>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\" \/>\n\n\n\n<h3 class=\"wp-block-heading\">Meme 3: &#8220;The Suspicious Click&#8221;<\/h3>\n\n\n\n<p><strong>Image Concept:<\/strong> A person hesitating with their finger hovering over a &#8220;click here&#8221; button, looking skeptical.<\/p>\n\n\n\n<p><strong>Text:<\/strong><br><em>Top: &#8220;When you receive an email from &#8216;your bank&#8217;&#8230;&#8221;<\/em><br><em>Bottom: &#8220;But you\u2019ve never had a bank account.&#8221;<\/em><\/p>\n\n\n\n<p><strong>Relation to Human-Centered Cybersecurity:<\/strong> This meme illustrates the skepticism users must develop to protect themselves from phishing attacks. Human-centered cybersecurity emphasizes the importance of educating users about recognizing threats and encouraging healthy skepticism while still making sure they feel empowered to act confidently online.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Meme 1: &#8220;The Overwhelmed User&#8221; Image Concept: A person staring at a computer with a confused expression, surrounded by security alerts and notifications. Text:Top: &#8220;When you receive 10 security alerts in one day&#8230;&#8221;Bottom: &#8220;Is it a breach or just my&#8230; <a class=\"more-link\" href=\"https:\/\/sites.wp.odu.edu\/aladj\/2024\/10\/20\/review-the-following-ten-photos-through-a-human-centered-cybersecurity-framework-create-a-meme-for-your-favorite-three-explaining-what-is-going-on-in-the-individuals-or-individuals\/\">Continue Reading &rarr;<\/a><\/p>\n","protected":false},"author":28242,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":"","wds_primary_category":0},"categories":[1],"tags":[],"_links":{"self":[{"href":"https:\/\/sites.wp.odu.edu\/aladj\/wp-json\/wp\/v2\/posts\/202"}],"collection":[{"href":"https:\/\/sites.wp.odu.edu\/aladj\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/sites.wp.odu.edu\/aladj\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/aladj\/wp-json\/wp\/v2\/users\/28242"}],"replies":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/aladj\/wp-json\/wp\/v2\/comments?post=202"}],"version-history":[{"count":1,"href":"https:\/\/sites.wp.odu.edu\/aladj\/wp-json\/wp\/v2\/posts\/202\/revisions"}],"predecessor-version":[{"id":203,"href":"https:\/\/sites.wp.odu.edu\/aladj\/wp-json\/wp\/v2\/posts\/202\/revisions\/203"}],"wp:attachment":[{"href":"https:\/\/sites.wp.odu.edu\/aladj\/wp-json\/wp\/v2\/media?parent=202"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/aladj\/wp-json\/wp\/v2\/categories?post=202"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/aladj\/wp-json\/wp\/v2\/tags?post=202"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}