Instruction: Review the following ten photos through a human-centered cybersecurity framework. Create a meme for your favorite three, explaining what is going on in the individual or individual’s mind(s).
Response:

Image one (shown above) is based on a human-centered cybersecurity framework lens as the individual is debating on if a link is legitimate. We know that humans are the weakest link of any network falling to malicious links that seem to be real typically embedded in phishing emails which cyber victims are also vulnerable to as explained by human factors, thus, it is important human factor experts and cybersecurity professionals collaborate.

Image two (shown above) is based on a human-centered cybersecurity framework lens as the individual has received malware on their computer which could be from many sources. In this scenario, the user received malware from a peer which is common in peer networks when one person gets infected it is likely that someone they know will also have their systems compromised. Human factors helps us understand how this works in a peer environment as more people are interacting in cyberspace vs face-to-face in person.

Image three (shown above) is based on a human-center cybersecurity framework lens as the pup is contemplating on if they should make a rude remark online in order to embarrass another pup. As discussed in this module, it is more likely that a peer will act out in ways that they see other peers do and this is no different in cyberspace. This pup is considering on if they should participate in a form of cyberbullying or not, cyberbullying is a common problem online that can be understood through human factors.
Leave a Reply