{"id":530,"date":"2017-09-13T11:16:21","date_gmt":"2017-09-13T10:16:21","guid":{"rendered":"https:\/\/cybersecurity.bournemouth.ac.uk\/?p=530"},"modified":"2017-09-13T11:16:21","modified_gmt":"2017-09-13T10:16:21","slug":"the-psychology-of-cyber-security-workshop","status":"publish","type":"post","link":"https:\/\/cybersecurity.bournemouth.ac.uk\/?p=530","title":{"rendered":"The Psychology of Cyber Security workshop"},"content":{"rendered":"<p><a href=\"https:\/\/cybersecurity.bournemouth.ac.uk\/wp-content\/uploads\/2017\/09\/https-cdn.evbuc_.com-images-34572054-91006983541-1-original.jpg\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-531 size-full\" src=\"https:\/\/cybersecurity.bournemouth.ac.uk\/wp-content\/uploads\/2017\/09\/https-cdn.evbuc_.com-images-34572054-91006983541-1-original.jpg\" alt=\"\" width=\"800\" height=\"400\" srcset=\"https:\/\/cybersecurity.bournemouth.ac.uk\/wp-content\/uploads\/2017\/09\/https-cdn.evbuc_.com-images-34572054-91006983541-1-original.jpg 800w, https:\/\/cybersecurity.bournemouth.ac.uk\/wp-content\/uploads\/2017\/09\/https-cdn.evbuc_.com-images-34572054-91006983541-1-original-300x150.jpg 300w, https:\/\/cybersecurity.bournemouth.ac.uk\/wp-content\/uploads\/2017\/09\/https-cdn.evbuc_.com-images-34572054-91006983541-1-original-768x384.jpg 768w\" sizes=\"(max-width: 800px) 100vw, 800px\" \/><\/a>There is an increasing recognition of the importance of understanding the human elements of cyber security. This relates to all of the actors within cyber security, from victims to practitioners to those who are responsible for cyber attacks. \u00a0To explore how psychological research theories can be applied to the cyber security domain, and better understand the motivations, decision making processes and group dynamics of those involved, <a href=\"http:\/\/staffprofiles.bournemouth.ac.uk\/display\/jmcalaney\">John McAlaney<\/a> &#8212; with the support of BUCSR and the\u00a0<a href=\"http:\/\/www.gbsf.org.uk\/\" target=\"_blank\" rel=\"noopener noreferrer nofollow\">Great Britain Sasakawa Foundation<\/a>\u00a0&#8212; is organising a workshop on the Psychology of Cyber Security.<\/p>\n<p>The event takes place on Wednesday, 18th October from 1230 &#8211; 1615 at Bournemouth University, and is free to attend. \u00a0For more information about the workshop, together with details on how to attend, please visit the <a href=\"https:\/\/www.eventbrite.co.uk\/e\/the-psychology-of-cyber-security-tickets-37303261058\">Eventbrite<\/a> site.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>There is an increasing recognition of the importance of understanding the human elements of cyber security. This relates to all of the actors within cyber security, from victims to practitioners to those who are responsible for cyber attacks. \u00a0To explore how psychological research theories can be applied to the cyber security domain, and better understand [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"inline_featured_image":false,"_exactmetrics_skip_tracking":false,"_exactmetrics_sitenote_active":false,"_exactmetrics_sitenote_note":"","_exactmetrics_sitenote_category":0,"footnotes":""},"categories":[9],"tags":[],"_links":{"self":[{"href":"https:\/\/cybersecurity.bournemouth.ac.uk\/index.php?rest_route=\/wp\/v2\/posts\/530"}],"collection":[{"href":"https:\/\/cybersecurity.bournemouth.ac.uk\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/cybersecurity.bournemouth.ac.uk\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/cybersecurity.bournemouth.ac.uk\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/cybersecurity.bournemouth.ac.uk\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=530"}],"version-history":[{"count":1,"href":"https:\/\/cybersecurity.bournemouth.ac.uk\/index.php?rest_route=\/wp\/v2\/posts\/530\/revisions"}],"predecessor-version":[{"id":532,"href":"https:\/\/cybersecurity.bournemouth.ac.uk\/index.php?rest_route=\/wp\/v2\/posts\/530\/revisions\/532"}],"wp:attachment":[{"href":"https:\/\/cybersecurity.bournemouth.ac.uk\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=530"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/cybersecurity.bournemouth.ac.uk\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=530"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/cybersecurity.bournemouth.ac.uk\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=530"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}