{"id":378,"date":"2025-12-05T03:13:24","date_gmt":"2025-12-05T03:13:24","guid":{"rendered":"https:\/\/sites.wp.odu.edu\/jteasley28\/?p=378"},"modified":"2025-12-05T03:13:24","modified_gmt":"2025-12-05T03:13:24","slug":"journal-entry-7","status":"publish","type":"post","link":"https:\/\/sites.wp.odu.edu\/jteasley28\/2025\/12\/05\/journal-entry-7\/","title":{"rendered":"Journal Entry #7"},"content":{"rendered":"\n<p><strong>Review the following photos through a human-centered cybersecurity framework.\u00a0Create a meme for your favorite three, explaining what is going on in the individual\u2019s or individuals\u2019 mind(s).<\/strong><\/p>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\" \/>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"835\" height=\"1024\" src=\"https:\/\/sites.wp.odu.edu\/jteasley28\/wp-content\/uploads\/sites\/38590\/2025\/12\/image-2-835x1024.png\" alt=\"\" class=\"wp-image-382\" srcset=\"https:\/\/sites.wp.odu.edu\/jteasley28\/wp-content\/uploads\/sites\/38590\/2025\/12\/image-2-835x1024.png 835w, https:\/\/sites.wp.odu.edu\/jteasley28\/wp-content\/uploads\/sites\/38590\/2025\/12\/image-2-245x300.png 245w, https:\/\/sites.wp.odu.edu\/jteasley28\/wp-content\/uploads\/sites\/38590\/2025\/12\/image-2-768x942.png 768w, https:\/\/sites.wp.odu.edu\/jteasley28\/wp-content\/uploads\/sites\/38590\/2025\/12\/image-2.png 899w\" sizes=\"(max-width: 835px) 100vw, 835px\" \/><\/figure>\n\n\n\n<p><strong>What\u2019s going on in their mind:<\/strong><br>They\u2019re initially excited or curious about what the email says, maybe thinking it\u2019s something urgent or important but then they realize it\u2019s fake just in time. Relief and amusement kick in.<\/p>\n\n\n\n<p><strong>Human-Centered Cybersecurity Explanation:<\/strong><br>This meme reflects how emotional responses like curiosity or urgency can override rational security thinking. Human-centered cybersecurity emphasizes understanding and designing for these natural human reactions, helping users recognize phishing attempts through better design, training, and alerts that align with how people think and behave.<\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"781\" height=\"518\" src=\"https:\/\/sites.wp.odu.edu\/jteasley28\/wp-content\/uploads\/sites\/38590\/2025\/12\/image.png\" alt=\"\" class=\"wp-image-380\" srcset=\"https:\/\/sites.wp.odu.edu\/jteasley28\/wp-content\/uploads\/sites\/38590\/2025\/12\/image.png 781w, https:\/\/sites.wp.odu.edu\/jteasley28\/wp-content\/uploads\/sites\/38590\/2025\/12\/image-300x199.png 300w, https:\/\/sites.wp.odu.edu\/jteasley28\/wp-content\/uploads\/sites\/38590\/2025\/12\/image-768x509.png 768w, https:\/\/sites.wp.odu.edu\/jteasley28\/wp-content\/uploads\/sites\/38590\/2025\/12\/image-452x300.png 452w\" sizes=\"(max-width: 781px) 100vw, 781px\" \/><\/figure>\n\n\n\n<p><strong>What\u2019s going on in their mind:<\/strong><br>They feel relaxed and productive, assuming the caf\u00e9\u2019s Wi-Fi is safe because it feels like a friendly, casual environment. Security isn\u2019t top of mind; convenience and comfort are.<\/p>\n\n\n\n<p><strong>Human-Centered Cybersecurity Explanation:<\/strong><br>This meme highlights how people\u2019s sense of trust often depends on their environment rather than actual technical safety. In human-centered cybersecurity, designers and educators aim to create systems and prompts that remind users to secure their connections (like using a VPN or verifying networks) without disrupting their natural workflow or comfort.<\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"781\" height=\"522\" src=\"https:\/\/sites.wp.odu.edu\/jteasley28\/wp-content\/uploads\/sites\/38590\/2025\/12\/image-1.png\" alt=\"\" class=\"wp-image-381\" srcset=\"https:\/\/sites.wp.odu.edu\/jteasley28\/wp-content\/uploads\/sites\/38590\/2025\/12\/image-1.png 781w, https:\/\/sites.wp.odu.edu\/jteasley28\/wp-content\/uploads\/sites\/38590\/2025\/12\/image-1-300x201.png 300w, https:\/\/sites.wp.odu.edu\/jteasley28\/wp-content\/uploads\/sites\/38590\/2025\/12\/image-1-768x513.png 768w, https:\/\/sites.wp.odu.edu\/jteasley28\/wp-content\/uploads\/sites\/38590\/2025\/12\/image-1-449x300.png 449w\" sizes=\"(max-width: 781px) 100vw, 781px\" \/><\/figure>\n\n\n\n<p><strong>What\u2019s going on in their minds:<\/strong><br>They\u2019re feeling excited and proud, relieved that the training they thought would be boring or difficult turned out to be easy. It\u2019s a shared sense of accomplishment and fun.<\/p>\n\n\n\n<p><strong>Human-Centered Cybersecurity Explanation:<\/strong><br>This meme highlights the importance of positive reinforcement and teamwork in cybersecurity culture. When people feel engaged and supported rather than punished or bored, they\u2019re more likely to remember safe practices and contribute to a secure environment. Human-centered cybersecurity focuses on motivation, collaboration, and making security education more relatable and enjoyable.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Review the following photos through a human-centered cybersecurity framework.\u00a0Create a meme for your favorite three, explaining what is going on in the individual\u2019s or individuals\u2019 mind(s). What\u2019s going on in their mind:They\u2019re initially excited or curious about what the email says, maybe thinking it\u2019s something urgent or important but then they realize it\u2019s fake just&#8230; <\/p>\n<div class=\"link-more\"><a href=\"https:\/\/sites.wp.odu.edu\/jteasley28\/2025\/12\/05\/journal-entry-7\/\">Read More<\/a><\/div>\n","protected":false},"author":30586,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":"","wds_primary_category":5},"categories":[5],"tags":[],"_links":{"self":[{"href":"https:\/\/sites.wp.odu.edu\/jteasley28\/wp-json\/wp\/v2\/posts\/378"}],"collection":[{"href":"https:\/\/sites.wp.odu.edu\/jteasley28\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/sites.wp.odu.edu\/jteasley28\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/jteasley28\/wp-json\/wp\/v2\/users\/30586"}],"replies":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/jteasley28\/wp-json\/wp\/v2\/comments?post=378"}],"version-history":[{"count":1,"href":"https:\/\/sites.wp.odu.edu\/jteasley28\/wp-json\/wp\/v2\/posts\/378\/revisions"}],"predecessor-version":[{"id":383,"href":"https:\/\/sites.wp.odu.edu\/jteasley28\/wp-json\/wp\/v2\/posts\/378\/revisions\/383"}],"wp:attachment":[{"href":"https:\/\/sites.wp.odu.edu\/jteasley28\/wp-json\/wp\/v2\/media?parent=378"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/jteasley28\/wp-json\/wp\/v2\/categories?post=378"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/jteasley28\/wp-json\/wp\/v2\/tags?post=378"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}