{"id":44,"date":"2024-02-18T23:47:48","date_gmt":"2024-02-19T04:47:48","guid":{"rendered":"https:\/\/student.wp.odu.edu\/ebedo001\/?p=44"},"modified":"2024-02-18T23:47:48","modified_gmt":"2024-02-19T04:47:48","slug":"motive-scale","status":"publish","type":"post","link":"https:\/\/student.wp.odu.edu\/ebedo001\/2024\/02\/18\/motive-scale\/","title":{"rendered":"Motive Scale"},"content":{"rendered":"\n<ol>\n<li>Huaman-Centered cybersecurity<\/li>\n<\/ol>\n\n\n\n<p>Humans are the reason why there are so many breaches in the system. This will look at human behavior and make them the center of prevention. Humans are the main reason why they get hacked. <\/p>\n\n\n\n<p>2. Planned Behavior<\/p>\n\n\n\n<ol><\/ol>\n\n\n\n<p>This views human behavior in a positive or negative state of mind. If a human has a positive environment then they are unlikely to make an error. However, if they are in a negative environment then they will fall for scams because they want to move up or be appraised by the company. This is based on human behavior however it is just one angle of looking at it<\/p>\n\n\n\n<p>3. Technological Determinism<\/p>\n\n\n\n<ol>\n<li><\/li>\n<\/ol>\n\n\n\n<p>These are new technologies that help humans limit from thinking and acting. This will help to prevent humans from getting into scams. However, humans are the reason we get into security breaches in the company.<\/p>\n\n\n\n<p>4. Change Management<\/p>\n\n\n\n<ol>\n<li><\/li>\n<\/ol>\n\n\n\n<p>Management has an expectation and a policy. However, humans are incapable of questioning policy and do what they are told. This can cause people to phish.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Humans are the reason why there are so many breaches in the system. This will look at human behavior and make them the center of prevention. Humans&hellip; <span class=\"read-more\"><a class=\"more-link\" href=\"https:\/\/student.wp.odu.edu\/ebedo001\/2024\/02\/18\/motive-scale\/\" rel=\"bookmark\">Read more <span class=\"screen-reader-text\">&#8220;Motive Scale&#8221;<\/span><\/a><\/span><\/p>\n","protected":false},"author":28375,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":"","wds_primary_category":0},"categories":[1],"tags":[],"_links":{"self":[{"href":"https:\/\/student.wp.odu.edu\/ebedo001\/wp-json\/wp\/v2\/posts\/44"}],"collection":[{"href":"https:\/\/student.wp.odu.edu\/ebedo001\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/student.wp.odu.edu\/ebedo001\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/student.wp.odu.edu\/ebedo001\/wp-json\/wp\/v2\/users\/28375"}],"replies":[{"embeddable":true,"href":"https:\/\/student.wp.odu.edu\/ebedo001\/wp-json\/wp\/v2\/comments?post=44"}],"version-history":[{"count":1,"href":"https:\/\/student.wp.odu.edu\/ebedo001\/wp-json\/wp\/v2\/posts\/44\/revisions"}],"predecessor-version":[{"id":45,"href":"https:\/\/student.wp.odu.edu\/ebedo001\/wp-json\/wp\/v2\/posts\/44\/revisions\/45"}],"wp:attachment":[{"href":"https:\/\/student.wp.odu.edu\/ebedo001\/wp-json\/wp\/v2\/media?parent=44"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/student.wp.odu.edu\/ebedo001\/wp-json\/wp\/v2\/categories?post=44"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/student.wp.odu.edu\/ebedo001\/wp-json\/wp\/v2\/tags?post=44"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}