{"id":380,"date":"2024-11-28T15:35:27","date_gmt":"2024-11-28T15:35:27","guid":{"rendered":"https:\/\/sites.wp.odu.edu\/kendaltaylor\/?page_id=380"},"modified":"2024-11-29T15:45:41","modified_gmt":"2024-11-29T15:45:41","slug":"behavioral-science-and-cybersecurity-human-factors","status":"publish","type":"page","link":"https:\/\/sites.wp.odu.edu\/kendaltaylor\/behavioral-science-and-cybersecurity-human-factors\/","title":{"rendered":"Behavioral Science and Cybersecurity\/Human Factors"},"content":{"rendered":"\n<h2 class=\"wp-block-heading\"><span style=\"text-decoration: underline\">Supporting Artifact 1: Article Review on Behavioral Aspects of Cybersecurity <\/span><\/h2>\n\n\n\n<p>Analyzed and reviewed an article that stresses the importance of not just technical issues, but behavioral based issues. Helped to inform readers on how to take into account the many aspects of cognition, personality, and bias that affects one\u2019s behavior in the digital world.\u00a0<\/p>\n\n\n\n<div data-wp-interactive=\"\" class=\"wp-block-file\"><object data-wp-bind--hidden=\"!selectors.core.file.hasPdfPreview\" hidden class=\"wp-block-file__embed\" data=\"https:\/\/sites.wp.odu.edu\/kendaltaylor\/wp-content\/uploads\/sites\/33772\/2024\/11\/Article-Review-1.docx.pdf\" type=\"application\/pdf\" style=\"width:100%;height:600px\" aria-label=\"Embed of Article-Review-1.docx.\"><\/object><a id=\"wp-block-file--media-c2f1c143-d6ab-4b79-a5b0-6ab25f82461c\" href=\"https:\/\/sites.wp.odu.edu\/kendaltaylor\/wp-content\/uploads\/sites\/33772\/2024\/11\/Article-Review-1.docx.pdf\">Article-Review-1.docx<\/a><a href=\"https:\/\/sites.wp.odu.edu\/kendaltaylor\/wp-content\/uploads\/sites\/33772\/2024\/11\/Article-Review-1.docx.pdf\" class=\"wp-block-file__button wp-element-button\" download aria-describedby=\"wp-block-file--media-c2f1c143-d6ab-4b79-a5b0-6ab25f82461c\">Download<\/a><\/div>\n\n\n\n<h2 class=\"wp-block-heading\"><span style=\"text-decoration: underline\">Supporting Artifact 2: Article Review on Social Networking Services and the Fear of Victimization<\/span><\/h2>\n\n\n\n<p>I wrote an article review on the effects of the level of engagement with social networks and the increased likelihood of cybercrime victimization. Supports the idea that higher SNS usage contributes to a higher risk of cyber victimization. It also supports the idea that a previous experience with cyber victimization causes an increased fear of re-victimization. This article utilized findings from \u201cRoutine Activities Theory\u201d, which describes a theory of how crime occurs.<\/p>\n\n\n\n<div data-wp-interactive=\"\" class=\"wp-block-file\"><object data-wp-bind--hidden=\"!selectors.core.file.hasPdfPreview\" hidden class=\"wp-block-file__embed\" data=\"https:\/\/sites.wp.odu.edu\/kendaltaylor\/wp-content\/uploads\/sites\/33772\/2024\/11\/Article-Review-2.docx.pdf\" type=\"application\/pdf\" style=\"width:100%;height:600px\" aria-label=\"Embed of Article-Review-2.docx.\"><\/object><a id=\"wp-block-file--media-976bb12a-f28b-4bf4-8041-dd200cb17487\" href=\"https:\/\/sites.wp.odu.edu\/kendaltaylor\/wp-content\/uploads\/sites\/33772\/2024\/11\/Article-Review-2.docx.pdf\">Article-Review-2.docx<\/a><a href=\"https:\/\/sites.wp.odu.edu\/kendaltaylor\/wp-content\/uploads\/sites\/33772\/2024\/11\/Article-Review-2.docx.pdf\" class=\"wp-block-file__button wp-element-button\" download aria-describedby=\"wp-block-file--media-976bb12a-f28b-4bf4-8041-dd200cb17487\">Download<\/a><\/div>\n\n\n\n<h2 class=\"wp-block-heading\"><span style=\"text-decoration: underline\">Supporting Artifact 3: Memorandum <\/span><\/h2>\n\n\n\n<p>Created a memorandum posing as a government official advising the governor about our state\u2019s privacy laws, and how human factors contribute to this.<\/p>\n\n\n\n<div data-wp-interactive=\"\" class=\"wp-block-file\"><object data-wp-bind--hidden=\"!selectors.core.file.hasPdfPreview\" hidden class=\"wp-block-file__embed\" data=\"https:\/\/sites.wp.odu.edu\/kendaltaylor\/wp-content\/uploads\/sites\/33772\/2024\/11\/Writing-Assignment-2.pdf\" type=\"application\/pdf\" style=\"width:100%;height:600px\" aria-label=\"Embed of Writing-Assignment-2.\"><\/object><a id=\"wp-block-file--media-f72b2df1-17d0-4fdf-a72c-71ec120fc6f4\" href=\"https:\/\/sites.wp.odu.edu\/kendaltaylor\/wp-content\/uploads\/sites\/33772\/2024\/11\/Writing-Assignment-2.pdf\">Writing-Assignment-2<\/a><a href=\"https:\/\/sites.wp.odu.edu\/kendaltaylor\/wp-content\/uploads\/sites\/33772\/2024\/11\/Writing-Assignment-2.pdf\" class=\"wp-block-file__button wp-element-button\" download aria-describedby=\"wp-block-file--media-f72b2df1-17d0-4fdf-a72c-71ec120fc6f4\">Download<\/a><\/div>\n","protected":false},"excerpt":{"rendered":"<p>Supporting Artifact 1: Article Review on Behavioral Aspects of Cybersecurity Analyzed and reviewed an article that stresses the importance of not just technical issues, but behavioral based issues. Helped to inform readers on how to take into account the many aspects of cognition, personality, and bias that affects one\u2019s behavior in the digital world.\u00a0 Supporting&#8230; <\/p>\n<div class=\"link-more\"><a href=\"https:\/\/sites.wp.odu.edu\/kendaltaylor\/behavioral-science-and-cybersecurity-human-factors\/\">Read More<\/a><\/div>\n","protected":false},"author":27206,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"_links":{"self":[{"href":"https:\/\/sites.wp.odu.edu\/kendaltaylor\/wp-json\/wp\/v2\/pages\/380"}],"collection":[{"href":"https:\/\/sites.wp.odu.edu\/kendaltaylor\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/sites.wp.odu.edu\/kendaltaylor\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/kendaltaylor\/wp-json\/wp\/v2\/users\/27206"}],"replies":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/kendaltaylor\/wp-json\/wp\/v2\/comments?post=380"}],"version-history":[{"count":3,"href":"https:\/\/sites.wp.odu.edu\/kendaltaylor\/wp-json\/wp\/v2\/pages\/380\/revisions"}],"predecessor-version":[{"id":418,"href":"https:\/\/sites.wp.odu.edu\/kendaltaylor\/wp-json\/wp\/v2\/pages\/380\/revisions\/418"}],"wp:attachment":[{"href":"https:\/\/sites.wp.odu.edu\/kendaltaylor\/wp-json\/wp\/v2\/media?parent=380"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}