SlideShare ist ein Scribd-Unternehmen logo
1 von 42
Downloaden Sie, um offline zu lesen
Stream	Two
People:	The	Strongest	Link
#CYBERUK17
Behaviour	Change,	
Cyber-Security	and	
lessons	from	other	
domains
Professor	Adam	Joinson,	
University	of	Bath
Lesson	1:	Identify	a	behaviour
to	change
• Fifteen	campaigns	
analysed
• Majority	awareness	
raising
• nature	of	cyber	
security
• raising	fear	of	
consequences
• One	presented	
evidence	of	
effectiveness
• Only	one	seemed	to	
be	based	on	behaviour	
change	principles
Password	management
Up-to-date	anti-virus	/	OS
Log	out	/	shut	down
Trusted	/	secure	connections	and	
sites
Stay	informed
Minimize	personal	identity
Be	aware	of	physical	surrounding
Reporting
https://www.gov.uk/government/uploads/system/
uploads/attachment_data/file/309652/14-835-
cyber-security-behavioural-insights.pdf
The ‘who and what?’ of security behaviour
“…the	styles,	approaches	and	values	that	the	organisation	
wishes	to	adopt	towards	security.	It	can	range	from	whether	
employees	adhere	to	a	clear	desk	policy	to	whether	they	
share	sensitive	information	on	social	networking	sites.”
http://www.cpni.gov.uk/Documents/Publications/2016/03.08.
2016%20SeCuRE%20Tool.pdf
8
COM-B system for analysing
behaviour in context (Michie et
al., 2011)
Michie	et	al.,	2011
Lesson	2:	Know	what	success
(and	failure)	looks	like
Intervention	mapping
Define	
‘Cyber’
Take	
Training
Measure	
Compliance
Lesson	3:	Look	to	understand	
the	causes of	the	behaviour
23
The Behaviour Change Wheel: hub
Michie	et	al.,	2011
24Michie	et	al.,	2011
Michie	et	al.,	2011
7
Common terms for methods for
inducing behaviour change
Educate
Train
Help
Expose to
Inform
Discuss
Suggest
Encourage
Incentivise
Ask
Order
Plead
Coerce
Force
Provide
Prompt
Constrain
Michie	et	al.,	2011
9
Common terms for methods for
inducing behaviour change
Capability
Educate
Train
Help
Motivation
Expose to
Inform
Discuss
Suggest
Encourage
Incentivise
Ask
Order
Plead
Coerce
Force
Opportunity
Provide
Prompt
Constrain
Michie	et	al.,	2011
self-monitoring in
cycling
Piwek, L., Joinson, A., & Morvan, J. (2015). The use of self-monitoring solutions
amongst cyclists: An online survey and empirical study. Transportation Research Part A:
Policy and Practice, 77, 126-136.
is	self-monitoring	mainly	relevant	for	
performance-oriented	cyclists?
13
NON-TRACKERS
12
TRACKERS
5 weeks
+
INITIAL
SURVEY
DEBRIEFING
INTERVIEW
pedometer
only
pedometer
+ calendar
+ cycling
computer
experience
sampling
calendar
total number of days cycled to campus in 5 weeks
total distance
cycled across
5 weeks (km)
non-trackers
trackers, high engagement with self-monitoring
trackers, low engagement with self-monitoring
self-monitoring	
is	mainly	relevant
for	performance-oriented	
cyclists
>
Spear Phishing Simulations
Working	with	organisations	in	the	CNI	(gov,	defence	industry,	finance)
Studying	their	results	from	internal	spear	phishing	exercises
>	120,000	spear	phish	emails	sent	to	staff
Coded	by	researchers	on	influence	technique
Some	individual	data	also	collected
In	one	case,	clicking	led	to	survey
Common	phishing	techniques
• Exploit	social	norms	and	decision-making	processes	
Social	
Influence
Processes
Sense	of	
Urgency
Invoking	
Emotions
Decision	
Biases
• Use	of	
deadlines
• Time	pressure
• Can	be	negative	
or	positive
• Excitement,	
desire,	hope	or	
curiosity
• Fear,	panic	or	
anxiety
• Anger
• Authority
• Liking	&	
similarity
• Reciprocity
• Conformity
• Truth	bias
• Confirmation	
bias
• Expectations
• Mimic	trusted	
entities
• Exploit	
authenticity	
cues
Legitimacy	
Cues
Click rates vary hugely
Average ~ 15% in largest data set (63,000)
Authority, Urgency, Curiosity worked best
Few demographic differences, subsets of
vulnerable users.
Follow	up	focus	groups
Example:	The	role	of	familiarity	and	
expectations
• “it’s	a	company	she	deals	with,	we’ve	currently	got	problems	
with	accounts	payable	…	and	actually	why	would	she	not	
believe	that	it	was	true.”	
• “when	I	first	came	here,	I	was,	because	I	wasn’t	familiar	with	
what	the	companies	were	that	were	going	to	email	me	
necessarily	I	was	just	sort	of	clicking	on	anything	…	but	it	was	
just	because	I	wasn’t	familiar	with	the	companies	that	we	were	
dealing	with”.
• “I	mean	there	are	some	places,	you	do	get,	you	get	some	emails	
from	America	and	they	write	in	a	different	way	and	it	does	
make	it	difficult	sometimes	to	sort	of	spot	the	difference”.
Williams, Hinds & Joinson (under
review) ‘Employee susceptibility to
phishing’
E-A-S-T	framework
Joinson,	A.,	&	Piwek,	L.	
(2016).	Technology	and	
the	formation	of	socially	
positive	behaviours.	
Beyond	Behaviour	
Change:	Key	Issues,	
Interdisciplinary	
Approaches	and	Future	
Directions,	157.
Lesson	4:	Accept	complexity
and	difficulty
Societal
Influences Individual
Psychology
Individual
Activity Activity
Environment
Food
production
industry
Consumption
and practices
Biological Factors
Type	of	trigger
Lesson	5:	Work	with the	flow,	
not	against	it
Kairos	– the	moment
• The	opportune	moment	to	aim	an	intervention	towards	users.
• B.	J.	Fogg:	Persuasive	Technology,	p.	41
Make it easier to do the right thing
Lesson	6:	Evaluate,	repeat
Thanks
a.joinson@bath.ac.uk
or	@joinson
www.joinson.com

Weitere ähnliche Inhalte

Was ist angesagt?

Was ist angesagt? (20)

The Information that You Gather: Application of Ethics & Privacy in Fundraising
The Information that You Gather: Application of Ethics & Privacy in FundraisingThe Information that You Gather: Application of Ethics & Privacy in Fundraising
The Information that You Gather: Application of Ethics & Privacy in Fundraising
 
Social Media Security Risk Slide Share Version
Social Media Security Risk Slide Share VersionSocial Media Security Risk Slide Share Version
Social Media Security Risk Slide Share Version
 
20160317 ARMA Wyoming Social Media Security Threats
20160317 ARMA Wyoming Social Media Security Threats20160317 ARMA Wyoming Social Media Security Threats
20160317 ARMA Wyoming Social Media Security Threats
 
UW-Extension Wisconsin Rural Partners Summit: Keynote 2015
UW-Extension Wisconsin Rural Partners Summit: Keynote 2015UW-Extension Wisconsin Rural Partners Summit: Keynote 2015
UW-Extension Wisconsin Rural Partners Summit: Keynote 2015
 
Social Media at Workplace
Social Media at WorkplaceSocial Media at Workplace
Social Media at Workplace
 
HIPAA Enforcement Heats Up in the Coldest State
HIPAA Enforcement Heats Up in the Coldest StateHIPAA Enforcement Heats Up in the Coldest State
HIPAA Enforcement Heats Up in the Coldest State
 
20160426 AIIM16 CIP Preconference Briefing
20160426 AIIM16 CIP Preconference Briefing20160426 AIIM16 CIP Preconference Briefing
20160426 AIIM16 CIP Preconference Briefing
 
The Internet State Filter
The Internet State FilterThe Internet State Filter
The Internet State Filter
 
Digital Curriculum, and the growth of BYOD and 1:1 learning : Is your mobile ...
Digital Curriculum, and the growth of BYOD and 1:1 learning: Is your mobile ...Digital Curriculum, and the growth of BYOD and 1:1 learning: Is your mobile ...
Digital Curriculum, and the growth of BYOD and 1:1 learning : Is your mobile ...
 
I4ADA 2019 - Presentation Jacques Kruse Brandao
I4ADA 2019 - Presentation  Jacques Kruse BrandaoI4ADA 2019 - Presentation  Jacques Kruse Brandao
I4ADA 2019 - Presentation Jacques Kruse Brandao
 
Social media and Security: How to Ensure Safe Social Networking
Social media and Security: How to Ensure Safe Social NetworkingSocial media and Security: How to Ensure Safe Social Networking
Social media and Security: How to Ensure Safe Social Networking
 
Steve Luczynski Mitigating Aviation Cyber Risk
Steve Luczynski  Mitigating Aviation Cyber RiskSteve Luczynski  Mitigating Aviation Cyber Risk
Steve Luczynski Mitigating Aviation Cyber Risk
 
An Administrator's Introduction to Social Networking
An Administrator's Introduction to Social NetworkingAn Administrator's Introduction to Social Networking
An Administrator's Introduction to Social Networking
 
Cmc, diffusion and social theories
Cmc, diffusion and social theoriesCmc, diffusion and social theories
Cmc, diffusion and social theories
 
2.2.1 dr jill tomlinson
2.2.1 dr jill tomlinson2.2.1 dr jill tomlinson
2.2.1 dr jill tomlinson
 
Guiding the Climb to Technological Competence
Guiding the Climb to Technological CompetenceGuiding the Climb to Technological Competence
Guiding the Climb to Technological Competence
 
Big Data and Privacy
Big Data and PrivacyBig Data and Privacy
Big Data and Privacy
 
PERSONAL INFORMATION PRIVACY SETTINGS OF ONLINE SOCIAL NETWORKS AND THEIR S...
PERSONAL INFORMATION PRIVACY SETTINGS OF  ONLINE SOCIAL NETWORKS AND THEIR  S...PERSONAL INFORMATION PRIVACY SETTINGS OF  ONLINE SOCIAL NETWORKS AND THEIR  S...
PERSONAL INFORMATION PRIVACY SETTINGS OF ONLINE SOCIAL NETWORKS AND THEIR S...
 
Internetregulationjapan
InternetregulationjapanInternetregulationjapan
Internetregulationjapan
 
SOCIAL MEDIA RISKS | HB EMERGING COMPLEX CLAIMS
SOCIAL MEDIA RISKS | HB EMERGING COMPLEX CLAIMSSOCIAL MEDIA RISKS | HB EMERGING COMPLEX CLAIMS
SOCIAL MEDIA RISKS | HB EMERGING COMPLEX CLAIMS
 

Andere mochten auch

Phishing exposed
Phishing exposedPhishing exposed
Phishing exposed
tamfin
 
Bloco Esquerda
Bloco EsquerdaBloco Esquerda
Bloco Esquerda
amattos76
 
Federalists vs. Republicans
Federalists vs. RepublicansFederalists vs. Republicans
Federalists vs. Republicans
mwhittakerms
 
Delivering Competitive Edge
Delivering Competitive EdgeDelivering Competitive Edge
Delivering Competitive Edge
Holonomics
 

Andere mochten auch (17)

Phishing exposed
Phishing exposedPhishing exposed
Phishing exposed
 
Sintesis informativa 29 de marzo 2017
Sintesis informativa 29 de marzo 2017Sintesis informativa 29 de marzo 2017
Sintesis informativa 29 de marzo 2017
 
Tues. March 7th Pine River Announcements
Tues. March 7th Pine River Announcements  Tues. March 7th Pine River Announcements
Tues. March 7th Pine River Announcements
 
Bloco Esquerda
Bloco EsquerdaBloco Esquerda
Bloco Esquerda
 
Estrés. Cómo se produce un ataque de estrés y estrategias para manejarlo.
Estrés. Cómo se produce un ataque de estrés y estrategias para manejarlo.Estrés. Cómo se produce un ataque de estrés y estrategias para manejarlo.
Estrés. Cómo se produce un ataque de estrés y estrategias para manejarlo.
 
Speed costs
Speed costsSpeed costs
Speed costs
 
Bn1029 demo sap sd
Bn1029 demo  sap sdBn1029 demo  sap sd
Bn1029 demo sap sd
 
Getting It Right: “Bad Paper” Legislation That Works
Getting It Right: “Bad Paper” Legislation That WorksGetting It Right: “Bad Paper” Legislation That Works
Getting It Right: “Bad Paper” Legislation That Works
 
Applied And Persuasive Applications For Museums
Applied And Persuasive Applications For MuseumsApplied And Persuasive Applications For Museums
Applied And Persuasive Applications For Museums
 
The Impact of Volatility on Wealth
The Impact of Volatility on WealthThe Impact of Volatility on Wealth
The Impact of Volatility on Wealth
 
Social Research on Violence
Social Research on ViolenceSocial Research on Violence
Social Research on Violence
 
Fläckvis lappning och vägreglernas förbud mot split friction, granlund wsp
Fläckvis lappning och vägreglernas förbud mot split friction, granlund wspFläckvis lappning och vägreglernas förbud mot split friction, granlund wsp
Fläckvis lappning och vägreglernas förbud mot split friction, granlund wsp
 
Federalists vs. Republicans
Federalists vs. RepublicansFederalists vs. Republicans
Federalists vs. Republicans
 
Facial tissue making machine
Facial tissue making machineFacial tissue making machine
Facial tissue making machine
 
UNFEA : point sur le marché de l'étiquette adhésive en France
UNFEA : point sur le marché de l'étiquette adhésive en FranceUNFEA : point sur le marché de l'étiquette adhésive en France
UNFEA : point sur le marché de l'étiquette adhésive en France
 
Machine learning – 101
Machine learning – 101Machine learning – 101
Machine learning – 101
 
Delivering Competitive Edge
Delivering Competitive EdgeDelivering Competitive Edge
Delivering Competitive Edge
 

Ähnlich wie Behaviour Change and Cyber-Security

Current_Cybersecurity_Trends_AD_Rodriguez_UCSP615_09252015(Final)
Current_Cybersecurity_Trends_AD_Rodriguez_UCSP615_09252015(Final)Current_Cybersecurity_Trends_AD_Rodriguez_UCSP615_09252015(Final)
Current_Cybersecurity_Trends_AD_Rodriguez_UCSP615_09252015(Final)
Angel Rodriguez
 
IT 833 INFORMATION GOVERNANCEDr. Isaac T. GbenleChapte
IT 833 INFORMATION GOVERNANCEDr. Isaac T. GbenleChapteIT 833 INFORMATION GOVERNANCEDr. Isaac T. GbenleChapte
IT 833 INFORMATION GOVERNANCEDr. Isaac T. GbenleChapte
mariuse18nolet
 
IT 833 INFORMATION GOVERNANCEDr. Isaac T. GbenleChapte.docx
IT 833 INFORMATION GOVERNANCEDr. Isaac T. GbenleChapte.docxIT 833 INFORMATION GOVERNANCEDr. Isaac T. GbenleChapte.docx
IT 833 INFORMATION GOVERNANCEDr. Isaac T. GbenleChapte.docx
vrickens
 
Running head POLICIES FOR MANAGING PRIVACY1POLICIES FOR M.docx
Running head POLICIES FOR MANAGING PRIVACY1POLICIES FOR M.docxRunning head POLICIES FOR MANAGING PRIVACY1POLICIES FOR M.docx
Running head POLICIES FOR MANAGING PRIVACY1POLICIES FOR M.docx
jeanettehully
 
Running head POLICIES FOR MANAGING PRIVACY1POLICIES FOR M.docx
Running head POLICIES FOR MANAGING PRIVACY1POLICIES FOR M.docxRunning head POLICIES FOR MANAGING PRIVACY1POLICIES FOR M.docx
Running head POLICIES FOR MANAGING PRIVACY1POLICIES FOR M.docx
glendar3
 
Running head POLICIES FOR MANAGING PRIVACY1POLICIES FOR M.docx
Running head POLICIES FOR MANAGING PRIVACY1POLICIES FOR M.docxRunning head POLICIES FOR MANAGING PRIVACY1POLICIES FOR M.docx
Running head POLICIES FOR MANAGING PRIVACY1POLICIES FOR M.docx
todd581
 
A Bring Your Own Device Risk Assessment Model
A Bring Your Own Device Risk Assessment ModelA Bring Your Own Device Risk Assessment Model
A Bring Your Own Device Risk Assessment Model
CSCJournals
 
Cybersecurity Management: Preventing Data Breaches in the Age of Big Data, 25...
Cybersecurity Management: Preventing Data Breaches in the Age of Big Data, 25...Cybersecurity Management: Preventing Data Breaches in the Age of Big Data, 25...
Cybersecurity Management: Preventing Data Breaches in the Age of Big Data, 25...
360 BSI
 
Start With A Great Information Security Plan!
Start With A Great Information Security Plan!Start With A Great Information Security Plan!
Start With A Great Information Security Plan!
Tammy Clark
 

Ähnlich wie Behaviour Change and Cyber-Security (20)

Components of a Model of Cybersecurity Behavior Adoption
Components of a Model of Cybersecurity Behavior AdoptionComponents of a Model of Cybersecurity Behavior Adoption
Components of a Model of Cybersecurity Behavior Adoption
 
Current_Cybersecurity_Trends_AD_Rodriguez_UCSP615_09252015(Final)
Current_Cybersecurity_Trends_AD_Rodriguez_UCSP615_09252015(Final)Current_Cybersecurity_Trends_AD_Rodriguez_UCSP615_09252015(Final)
Current_Cybersecurity_Trends_AD_Rodriguez_UCSP615_09252015(Final)
 
STAYING SAFE AND SECURED ON TODAY AND TOMORROW’S AFRICA CYBERSPACE WORKSHOP 2017
STAYING SAFE AND SECURED ON TODAY AND TOMORROW’S AFRICA CYBERSPACE WORKSHOP 2017STAYING SAFE AND SECURED ON TODAY AND TOMORROW’S AFRICA CYBERSPACE WORKSHOP 2017
STAYING SAFE AND SECURED ON TODAY AND TOMORROW’S AFRICA CYBERSPACE WORKSHOP 2017
 
Paper Titled Information Security in an organization
Paper Titled Information Security in an organizationPaper Titled Information Security in an organization
Paper Titled Information Security in an organization
 
820 1961-1-pb
820 1961-1-pb820 1961-1-pb
820 1961-1-pb
 
IT 833 INFORMATION GOVERNANCEDr. Isaac T. GbenleChapte
IT 833 INFORMATION GOVERNANCEDr. Isaac T. GbenleChapteIT 833 INFORMATION GOVERNANCEDr. Isaac T. GbenleChapte
IT 833 INFORMATION GOVERNANCEDr. Isaac T. GbenleChapte
 
IT 833 INFORMATION GOVERNANCEDr. Isaac T. GbenleChapte.docx
IT 833 INFORMATION GOVERNANCEDr. Isaac T. GbenleChapte.docxIT 833 INFORMATION GOVERNANCEDr. Isaac T. GbenleChapte.docx
IT 833 INFORMATION GOVERNANCEDr. Isaac T. GbenleChapte.docx
 
Automatski - The Internet of Things - Security Standards
Automatski - The Internet of Things - Security StandardsAutomatski - The Internet of Things - Security Standards
Automatski - The Internet of Things - Security Standards
 
Week 1&2 intro_ v2-upload
Week 1&2 intro_ v2-uploadWeek 1&2 intro_ v2-upload
Week 1&2 intro_ v2-upload
 
Monitoring security in the externalised organisation (Auscert 2013)
Monitoring security in the externalised organisation (Auscert 2013)Monitoring security in the externalised organisation (Auscert 2013)
Monitoring security in the externalised organisation (Auscert 2013)
 
Information Security at the Workplace
Information Security at the WorkplaceInformation Security at the Workplace
Information Security at the Workplace
 
Running head POLICIES FOR MANAGING PRIVACY1POLICIES FOR M.docx
Running head POLICIES FOR MANAGING PRIVACY1POLICIES FOR M.docxRunning head POLICIES FOR MANAGING PRIVACY1POLICIES FOR M.docx
Running head POLICIES FOR MANAGING PRIVACY1POLICIES FOR M.docx
 
Running head POLICIES FOR MANAGING PRIVACY1POLICIES FOR M.docx
Running head POLICIES FOR MANAGING PRIVACY1POLICIES FOR M.docxRunning head POLICIES FOR MANAGING PRIVACY1POLICIES FOR M.docx
Running head POLICIES FOR MANAGING PRIVACY1POLICIES FOR M.docx
 
Running head POLICIES FOR MANAGING PRIVACY1POLICIES FOR M.docx
Running head POLICIES FOR MANAGING PRIVACY1POLICIES FOR M.docxRunning head POLICIES FOR MANAGING PRIVACY1POLICIES FOR M.docx
Running head POLICIES FOR MANAGING PRIVACY1POLICIES FOR M.docx
 
A Bring Your Own Device Risk Assessment Model
A Bring Your Own Device Risk Assessment ModelA Bring Your Own Device Risk Assessment Model
A Bring Your Own Device Risk Assessment Model
 
Cybersecurity Management: Preventing Data Breaches in the Age of Big Data, 25...
Cybersecurity Management: Preventing Data Breaches in the Age of Big Data, 25...Cybersecurity Management: Preventing Data Breaches in the Age of Big Data, 25...
Cybersecurity Management: Preventing Data Breaches in the Age of Big Data, 25...
 
Reinstating Trust in the Digital Age
Reinstating Trust in the Digital AgeReinstating Trust in the Digital Age
Reinstating Trust in the Digital Age
 
Start With A Great Information Security Plan!
Start With A Great Information Security Plan!Start With A Great Information Security Plan!
Start With A Great Information Security Plan!
 
Rothke rsa 2012 what happens in vegas goes on youtube using social networks...
Rothke rsa 2012   what happens in vegas goes on youtube using social networks...Rothke rsa 2012   what happens in vegas goes on youtube using social networks...
Rothke rsa 2012 what happens in vegas goes on youtube using social networks...
 
Building A Modern Security Policy For Social Media and Government
Building A  Modern  Security  Policy For  Social  Media and GovernmentBuilding A  Modern  Security  Policy For  Social  Media and Government
Building A Modern Security Policy For Social Media and Government
 

Kürzlich hochgeladen

Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Safe Software
 

Kürzlich hochgeladen (20)

ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
Corporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxCorporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptx
 
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdf
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
 
A Beginners Guide to Building a RAG App Using Open Source Milvus
A Beginners Guide to Building a RAG App Using Open Source MilvusA Beginners Guide to Building a RAG App Using Open Source Milvus
A Beginners Guide to Building a RAG App Using Open Source Milvus
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
 
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
Navi Mumbai Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Navi Mumbai Call Girls 🥰 8617370543 Service Offer VIP Hot ModelNavi Mumbai Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Navi Mumbai Call Girls 🥰 8617370543 Service Offer VIP Hot Model
 

Behaviour Change and Cyber-Security