{"id":111,"date":"2018-07-09T16:01:54","date_gmt":"2018-07-09T16:01:54","guid":{"rendered":"http:\/\/localhost\/book\/?p=111"},"modified":"2018-07-26T11:51:07","modified_gmt":"2018-07-26T11:51:07","slug":"eum-laoreet-blandit-3","status":"publish","type":"post","link":"https:\/\/uxexperts.com\/hci-in-cybersecurity\/eum-laoreet-blandit-3\/","title":{"rendered":"Human Computer Interaction in  Cybersecurity"},"content":{"rendered":"<p>The &#8220;human agent&#8221; is at the center of all security research. Some people refer to human agents or users as the &#8220;weakest link in the security chain&#8221;. It is true that user behavior plays a part in many security failures. This introductory\/intermediate course in the human aspects of cyber security will provide an overview of HCI related sciences and technology within the growing field of cyber security. In addition to learning about cyber security, participants will also learn how to manage and monitor their own online activities, security, and protect themselves from cyber attacks.<!--more--><\/p>\n<p><strong>HCII 2018, Sunday, 15 July 2018, 08:30 \u2013 12:30 Caesars Palace, Los Vegas , Nevada, USA\u00a0<\/strong><\/p>\n<p><a href=\"https:\/\/cms.hci.international\/index.php?module=users&amp;norm_user_op=signup\">Click to Register for Tutorials<\/a><\/p>\n<p><strong>AHFEI 2018, Saturday, July 21, 2018 -13:00- 17:00 The Loews Sapphire Falls Resort, Orlando, Florida, USA\u00a0<\/strong><\/p>\n<p><a href=\"http:\/\/ahfe.net\/tutorial-registration.html\">Click to Register for Tutorials<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>The &#8220;human agent&#8221; is at the center of all security research. Some people refer to human agents or users as the &#8220;weakest link in the security chain&#8221;. It is true that user behavior plays a part in many security failures. This introductory\/intermediate course in the human aspects of cyber security<span class=\"excerpt-hellip\"> [\u2026]<\/span><\/p>\n","protected":false},"author":1,"featured_media":233,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[6],"tags":[],"class_list":["post-111","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-upcoming-workshop"],"acf":[],"_links":{"self":[{"href":"https:\/\/uxexperts.com\/hci-in-cybersecurity\/wp-json\/wp\/v2\/posts\/111","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/uxexperts.com\/hci-in-cybersecurity\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/uxexperts.com\/hci-in-cybersecurity\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/uxexperts.com\/hci-in-cybersecurity\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/uxexperts.com\/hci-in-cybersecurity\/wp-json\/wp\/v2\/comments?post=111"}],"version-history":[{"count":11,"href":"https:\/\/uxexperts.com\/hci-in-cybersecurity\/wp-json\/wp\/v2\/posts\/111\/revisions"}],"predecessor-version":[{"id":246,"href":"https:\/\/uxexperts.com\/hci-in-cybersecurity\/wp-json\/wp\/v2\/posts\/111\/revisions\/246"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/uxexperts.com\/hci-in-cybersecurity\/wp-json\/wp\/v2\/media\/233"}],"wp:attachment":[{"href":"https:\/\/uxexperts.com\/hci-in-cybersecurity\/wp-json\/wp\/v2\/media?parent=111"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/uxexperts.com\/hci-in-cybersecurity\/wp-json\/wp\/v2\/categories?post=111"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/uxexperts.com\/hci-in-cybersecurity\/wp-json\/wp\/v2\/tags?post=111"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}