{"id":374,"date":"2024-09-22T21:25:39","date_gmt":"2024-09-22T21:25:39","guid":{"rendered":"https:\/\/sites.wp.odu.edu\/johnryan\/?page_id=374"},"modified":"2024-12-04T21:55:52","modified_gmt":"2024-12-04T21:55:52","slug":"cybersecurity-today-multimedia","status":"publish","type":"page","link":"https:\/\/sites.wp.odu.edu\/johnryan\/cybersecurity-today-multimedia\/","title":{"rendered":"Cybersecurity and the Social Sciences Today (Multimedia)"},"content":{"rendered":"\n<figure class=\"wp-block-embed is-type-video is-provider-youtube wp-block-embed-youtube wp-embed-aspect-16-9 wp-has-aspect-ratio\"><div class=\"wp-block-embed__wrapper\">\n<iframe loading=\"lazy\" title=\"Cybersecurity and the Social Sciences\" width=\"1000\" height=\"563\" src=\"https:\/\/www.youtube.com\/embed\/u4BjJOLezQQ?feature=oembed\" frameborder=\"0\" allow=\"accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture; web-share\" referrerpolicy=\"strict-origin-when-cross-origin\" allowfullscreen><\/iframe>\n<\/div><\/figure>\n\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"1024\" src=\"https:\/\/sites.wp.odu.edu\/johnryan\/wp-content\/uploads\/sites\/32203\/2024\/12\/Brain.png\" alt=\"\" class=\"wp-image-432\" srcset=\"https:\/\/sites.wp.odu.edu\/johnryan\/wp-content\/uploads\/sites\/32203\/2024\/12\/Brain.png 1024w, https:\/\/sites.wp.odu.edu\/johnryan\/wp-content\/uploads\/sites\/32203\/2024\/12\/Brain-300x300.png 300w, https:\/\/sites.wp.odu.edu\/johnryan\/wp-content\/uploads\/sites\/32203\/2024\/12\/Brain-150x150.png 150w, https:\/\/sites.wp.odu.edu\/johnryan\/wp-content\/uploads\/sites\/32203\/2024\/12\/Brain-768x768.png 768w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><figcaption class=\"wp-element-caption\">Source:  https:\/\/010grp.ca\/mind-games-the-psychology-of-cybersecurity\/<\/figcaption><\/figure>\n\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"480\" src=\"https:\/\/sites.wp.odu.edu\/johnryan\/wp-content\/uploads\/sites\/32203\/2024\/12\/95percent.jpg\" alt=\"\" class=\"wp-image-426\" srcset=\"https:\/\/sites.wp.odu.edu\/johnryan\/wp-content\/uploads\/sites\/32203\/2024\/12\/95percent.jpg 1024w, https:\/\/sites.wp.odu.edu\/johnryan\/wp-content\/uploads\/sites\/32203\/2024\/12\/95percent-300x141.jpg 300w, https:\/\/sites.wp.odu.edu\/johnryan\/wp-content\/uploads\/sites\/32203\/2024\/12\/95percent-768x360.jpg 768w, https:\/\/sites.wp.odu.edu\/johnryan\/wp-content\/uploads\/sites\/32203\/2024\/12\/95percent-600x281.jpg 600w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><figcaption class=\"wp-element-caption\">Source:  https:\/\/www.linkedin.com\/pulse\/human-factor-cyber-security-why-matters-luis-soares-msc\/<\/figcaption><\/figure>\n\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"606\" height=\"343\" src=\"https:\/\/sites.wp.odu.edu\/johnryan\/wp-content\/uploads\/sites\/32203\/2024\/12\/Social-Engineering.jpg\" alt=\"\" class=\"wp-image-419\" srcset=\"https:\/\/sites.wp.odu.edu\/johnryan\/wp-content\/uploads\/sites\/32203\/2024\/12\/Social-Engineering.jpg 606w, https:\/\/sites.wp.odu.edu\/johnryan\/wp-content\/uploads\/sites\/32203\/2024\/12\/Social-Engineering-300x170.jpg 300w, https:\/\/sites.wp.odu.edu\/johnryan\/wp-content\/uploads\/sites\/32203\/2024\/12\/Social-Engineering-530x300.jpg 530w\" sizes=\"(max-width: 606px) 100vw, 606px\" \/><figcaption class=\"wp-element-caption\">Source:  https:\/\/www.linkedin.com\/pulse\/social-engineering-human-factor-cyber-security-satendra-gaundar-1c\/<\/figcaption><\/figure>\n\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"800\" height=\"607\" src=\"https:\/\/sites.wp.odu.edu\/johnryan\/wp-content\/uploads\/sites\/32203\/2024\/12\/SocialMediaSecurity.jpg\" alt=\"\" class=\"wp-image-429\" srcset=\"https:\/\/sites.wp.odu.edu\/johnryan\/wp-content\/uploads\/sites\/32203\/2024\/12\/SocialMediaSecurity.jpg 800w, https:\/\/sites.wp.odu.edu\/johnryan\/wp-content\/uploads\/sites\/32203\/2024\/12\/SocialMediaSecurity-300x228.jpg 300w, https:\/\/sites.wp.odu.edu\/johnryan\/wp-content\/uploads\/sites\/32203\/2024\/12\/SocialMediaSecurity-768x583.jpg 768w, https:\/\/sites.wp.odu.edu\/johnryan\/wp-content\/uploads\/sites\/32203\/2024\/12\/SocialMediaSecurity-395x300.jpg 395w\" sizes=\"(max-width: 800px) 100vw, 800px\" \/><figcaption class=\"wp-element-caption\">Source:  https:\/\/www.trendmicro.com\/vinfo\/us\/security\/news\/cybercrime-and-digital-threats\/linking-the-enterprise-to-social-media-security<\/figcaption><\/figure>\n\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"1000\" height=\"622\" src=\"https:\/\/sites.wp.odu.edu\/johnryan\/wp-content\/uploads\/sites\/32203\/2024\/12\/Human-Factors.jpg\" alt=\"\" class=\"wp-image-422\" srcset=\"https:\/\/sites.wp.odu.edu\/johnryan\/wp-content\/uploads\/sites\/32203\/2024\/12\/Human-Factors.jpg 1000w, https:\/\/sites.wp.odu.edu\/johnryan\/wp-content\/uploads\/sites\/32203\/2024\/12\/Human-Factors-300x187.jpg 300w, https:\/\/sites.wp.odu.edu\/johnryan\/wp-content\/uploads\/sites\/32203\/2024\/12\/Human-Factors-768x478.jpg 768w, https:\/\/sites.wp.odu.edu\/johnryan\/wp-content\/uploads\/sites\/32203\/2024\/12\/Human-Factors-482x300.jpg 482w\" sizes=\"(max-width: 1000px) 100vw, 1000px\" \/><figcaption class=\"wp-element-caption\">Source:  https:\/\/cyberoregon.com\/2017\/12\/05\/new-research-finds-human-error-greatest-cybersecurity-threat<\/figcaption><\/figure>\n\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"1024\" src=\"https:\/\/sites.wp.odu.edu\/johnryan\/wp-content\/uploads\/sites\/32203\/2024\/11\/Cyber-Stats.png\" alt=\"\" class=\"wp-image-411\" srcset=\"https:\/\/sites.wp.odu.edu\/johnryan\/wp-content\/uploads\/sites\/32203\/2024\/11\/Cyber-Stats.png 1024w, https:\/\/sites.wp.odu.edu\/johnryan\/wp-content\/uploads\/sites\/32203\/2024\/11\/Cyber-Stats-300x300.png 300w, https:\/\/sites.wp.odu.edu\/johnryan\/wp-content\/uploads\/sites\/32203\/2024\/11\/Cyber-Stats-150x150.png 150w, https:\/\/sites.wp.odu.edu\/johnryan\/wp-content\/uploads\/sites\/32203\/2024\/11\/Cyber-Stats-768x768.png 768w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><figcaption class=\"wp-element-caption\">Source:  https:\/\/financesonline.com\/cybersecurity-statistics\/<\/figcaption><\/figure>\n\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"527\" src=\"https:\/\/sites.wp.odu.edu\/johnryan\/wp-content\/uploads\/sites\/32203\/2024\/11\/Cybersecurity-Workforce-1.jpg\" alt=\"\" class=\"wp-image-404\" srcset=\"https:\/\/sites.wp.odu.edu\/johnryan\/wp-content\/uploads\/sites\/32203\/2024\/11\/Cybersecurity-Workforce-1.jpg 1024w, https:\/\/sites.wp.odu.edu\/johnryan\/wp-content\/uploads\/sites\/32203\/2024\/11\/Cybersecurity-Workforce-1-300x154.jpg 300w, https:\/\/sites.wp.odu.edu\/johnryan\/wp-content\/uploads\/sites\/32203\/2024\/11\/Cybersecurity-Workforce-1-768x395.jpg 768w, https:\/\/sites.wp.odu.edu\/johnryan\/wp-content\/uploads\/sites\/32203\/2024\/11\/Cybersecurity-Workforce-1-583x300.jpg 583w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><figcaption class=\"wp-element-caption\">Source:  https:\/\/identitytheft.org\/statistics\/cyber-security\/<\/figcaption><\/figure>\n\n\n\n<figure class=\"wp-block-embed is-type-video is-provider-youtube wp-block-embed-youtube wp-embed-aspect-16-9 wp-has-aspect-ratio\"><div class=\"wp-block-embed__wrapper\">\n<iframe loading=\"lazy\" title=\"ePortfolio\" width=\"1000\" height=\"563\" src=\"https:\/\/www.youtube.com\/embed\/8bOioWXPaFs?feature=oembed\" frameborder=\"0\" allow=\"accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture; web-share\" referrerpolicy=\"strict-origin-when-cross-origin\" allowfullscreen><\/iframe>\n<\/div><\/figure>\n","protected":false},"excerpt":{"rendered":"","protected":false},"author":25983,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"_links":{"self":[{"href":"https:\/\/sites.wp.odu.edu\/johnryan\/wp-json\/wp\/v2\/pages\/374"}],"collection":[{"href":"https:\/\/sites.wp.odu.edu\/johnryan\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/sites.wp.odu.edu\/johnryan\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/johnryan\/wp-json\/wp\/v2\/users\/25983"}],"replies":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/johnryan\/wp-json\/wp\/v2\/comments?post=374"}],"version-history":[{"count":5,"href":"https:\/\/sites.wp.odu.edu\/johnryan\/wp-json\/wp\/v2\/pages\/374\/revisions"}],"predecessor-version":[{"id":433,"href":"https:\/\/sites.wp.odu.edu\/johnryan\/wp-json\/wp\/v2\/pages\/374\/revisions\/433"}],"wp:attachment":[{"href":"https:\/\/sites.wp.odu.edu\/johnryan\/wp-json\/wp\/v2\/media?parent=374"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}