Photo #1
Meme:
“Using ‘Password123’ because your computer knows you so great.”
Explanation (Human Centered-Cybersecurity):
This image depicts a person looking relaxed with their lap top open and engaged confidently. It shows how users typically value convenience above security when choosing passwords. All humans, from a human-centered cybersecurity perspective love ease and routine. Instead of expecting users to take responsibility for their password choices, designers must focus on creating systems, such as password managers and pre-populated password security strength meters, that parameterize and encourage better security behavior – without additional friction.
Photo #2
Meme:
“When the facilitator says to ‘Just click yes to install the updates’ and everyone clicks yes with no further questions.”
Explanation (Human Centered-Cybersecurity):
This image depicts a group of people learned together, potentially in an educational style program or collaborative environment. The image depicts a fact that users have a tendency to rely on social cues and status when making security related decisions. In the world of cybersecurity, this symbolizes that there’s often inherently humanistic behavior that has an affected by trust. Human centered design focuses on creating frameworks in the call or patterns of thinking. and allowing users to think critically and create an awareness of why security matters, when they trust the source of the information.
Photo #3
Meme:
“When your Wi-Fi signal is strong, but your password is still ‘qwerty.’”
Explanation (Human-Centered Cybersecurity):
Here’s an individual being productive on their laptop at a clean modern desk—virtuously enjoying the comfort of their digital surroundings. The image symbolizes the false sense of security that technology falsely provides. Leigh et al. (2017) describes how people use the assumptions of safety based on secure physical spaces to establish weak passwords or ignore best practices. With human-centered cybersecurity, the need is for security systems that allow users to engage or take action seamlessly (e.g. automated multi-factor authentications or use passwordless logins) so the user doesn’t need to exert any additional effort to be safe.