{"id":47,"date":"2016-11-18T21:52:42","date_gmt":"2016-11-18T21:52:42","guid":{"rendered":"http:\/\/wp.lancs.ac.uk\/cyberpsy-projects\/?p=47"},"modified":"2016-12-02T09:56:21","modified_gmt":"2016-12-02T09:56:21","slug":"2015-student-projects","status":"publish","type":"post","link":"http:\/\/wp.lancs.ac.uk\/cyberpsy-projects\/2016\/11\/18\/2015-student-projects\/","title":{"rendered":"2015 cyber-psychology student projects"},"content":{"rendered":"<p><em>Cyber Psychology Projects submitted in 2014 (alphabetical order)<\/em><\/p>\n<blockquote class=\"wp-embedded-content\" data-secret=\"cjPTK3Ezd5\"><p><a href=\"http:\/\/wp.lancs.ac.uk\/cyberpsy-projects\/does-self-control-predict-online-scam-compliance\/\">Does Self-Control Predict Online Scam Compliance?<\/a><\/p><\/blockquote>\n<p><iframe loading=\"lazy\" class=\"wp-embedded-content\" sandbox=\"allow-scripts\" security=\"restricted\" style=\"position: absolute; clip: rect(1px, 1px, 1px, 1px);\" title=\"&#8220;Does Self-Control Predict Online Scam Compliance?&#8221; &#8212; Student HLC projects\" src=\"http:\/\/wp.lancs.ac.uk\/cyberpsy-projects\/does-self-control-predict-online-scam-compliance\/embed\/#?secret=mUlQjUrEAL#?secret=cjPTK3Ezd5\" data-secret=\"cjPTK3Ezd5\" width=\"470\" height=\"265\" frameborder=\"0\" marginwidth=\"0\" marginheight=\"0\" scrolling=\"no\"><\/iframe><\/p>\n<blockquote class=\"wp-embedded-content\" data-secret=\"5fsyHJh1yp\"><p><a href=\"http:\/\/wp.lancs.ac.uk\/cyberpsy-projects\/gullible-decision-hypothesis\/\">Gullible Decision Hypothesis<\/a><\/p><\/blockquote>\n<p><iframe loading=\"lazy\" class=\"wp-embedded-content\" sandbox=\"allow-scripts\" security=\"restricted\" style=\"position: absolute; clip: rect(1px, 1px, 1px, 1px);\" title=\"&#8220;Gullible Decision Hypothesis&#8221; &#8212; Student HLC projects\" src=\"http:\/\/wp.lancs.ac.uk\/cyberpsy-projects\/gullible-decision-hypothesis\/embed\/#?secret=xzZ2vpRJhR#?secret=5fsyHJh1yp\" data-secret=\"5fsyHJh1yp\" width=\"470\" height=\"265\" frameborder=\"0\" marginwidth=\"0\" marginheight=\"0\" scrolling=\"no\"><\/iframe><\/p>\n<blockquote class=\"wp-embedded-content\" data-secret=\"wa2pjcZXH2\"><p><a href=\"http:\/\/wp.lancs.ac.uk\/cyberpsy-projects\/sender-familiarity-and-email-authenticity-judgements\/\">Sender Familiarity and Email Authenticity Judgements<\/a><\/p><\/blockquote>\n<p><iframe loading=\"lazy\" class=\"wp-embedded-content\" sandbox=\"allow-scripts\" security=\"restricted\" style=\"position: absolute; clip: rect(1px, 1px, 1px, 1px);\" title=\"&#8220;Sender Familiarity and Email Authenticity Judgements&#8221; &#8212; Student HLC projects\" src=\"http:\/\/wp.lancs.ac.uk\/cyberpsy-projects\/sender-familiarity-and-email-authenticity-judgements\/embed\/#?secret=23okEcSHtg#?secret=wa2pjcZXH2\" data-secret=\"wa2pjcZXH2\" width=\"470\" height=\"265\" frameborder=\"0\" marginwidth=\"0\" marginheight=\"0\" scrolling=\"no\"><\/iframe><\/p>\n<blockquote class=\"wp-embedded-content\" data-secret=\"EXUJJxaI8L\"><p><a href=\"http:\/\/wp.lancs.ac.uk\/cyberpsy-projects\/understanding-the-mechanisms-underlying-scam-vulnerability\/\">Understanding the Mechanisms Underlying Scam Vulnerability<\/a><\/p><\/blockquote>\n<p><iframe loading=\"lazy\" class=\"wp-embedded-content\" sandbox=\"allow-scripts\" security=\"restricted\" style=\"position: absolute; clip: rect(1px, 1px, 1px, 1px);\" title=\"&#8220;Understanding the Mechanisms Underlying Scam Vulnerability&#8221; &#8212; Student HLC projects\" src=\"http:\/\/wp.lancs.ac.uk\/cyberpsy-projects\/understanding-the-mechanisms-underlying-scam-vulnerability\/embed\/#?secret=C642jfWa8M#?secret=EXUJJxaI8L\" data-secret=\"EXUJJxaI8L\" width=\"470\" height=\"265\" frameborder=\"0\" marginwidth=\"0\" marginheight=\"0\" scrolling=\"no\"><\/iframe><\/p>\n<blockquote class=\"wp-embedded-content\" data-secret=\"TyVs1Py7Y0\"><p><a href=\"http:\/\/wp.lancs.ac.uk\/cyberpsy-projects\/size-of-the-prize\/\">Size of the prize<\/a><\/p><\/blockquote>\n<p><iframe loading=\"lazy\" class=\"wp-embedded-content\" sandbox=\"allow-scripts\" security=\"restricted\" style=\"position: absolute; clip: rect(1px, 1px, 1px, 1px);\" title=\"&#8220;Size of the prize&#8221; &#8212; Student HLC projects\" src=\"http:\/\/wp.lancs.ac.uk\/cyberpsy-projects\/size-of-the-prize\/embed\/#?secret=MDzAr4DarJ#?secret=TyVs1Py7Y0\" data-secret=\"TyVs1Py7Y0\" width=\"470\" height=\"265\" frameborder=\"0\" marginwidth=\"0\" marginheight=\"0\" scrolling=\"no\"><\/iframe><\/p>\n<blockquote class=\"wp-embedded-content\" data-secret=\"EAOPXbZVXq\"><p><a href=\"http:\/\/wp.lancs.ac.uk\/cyberpsy-projects\/the-effect-of-training-on-phishing-email-identification\/\">The Effect of Training on Phishing Email Identification<\/a><\/p><\/blockquote>\n<p><iframe loading=\"lazy\" class=\"wp-embedded-content\" sandbox=\"allow-scripts\" security=\"restricted\" style=\"position: absolute; clip: rect(1px, 1px, 1px, 1px);\" title=\"&#8220;The Effect of Training on Phishing Email Identification&#8221; &#8212; Student HLC projects\" src=\"http:\/\/wp.lancs.ac.uk\/cyberpsy-projects\/the-effect-of-training-on-phishing-email-identification\/embed\/#?secret=X7ygFMB670#?secret=EAOPXbZVXq\" data-secret=\"EAOPXbZVXq\" width=\"470\" height=\"265\" frameborder=\"0\" marginwidth=\"0\" marginheight=\"0\" scrolling=\"no\"><\/iframe><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Cyber Psychology Projects submitted in 2014 (alphabetical order) Does Self-Control Predict Online Scam Compliance? Gullible Decision Hypothesis Sender Familiarity and Email Authenticity Judgements Understanding the&#8230;<\/p>\n","protected":false},"author":620,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[1],"tags":[],"class_list":["post-47","post","type-post","status-publish","format-standard","hentry","category-titles"],"_links":{"self":[{"href":"http:\/\/wp.lancs.ac.uk\/cyberpsy-projects\/wp-json\/wp\/v2\/posts\/47","targetHints":{"allow":["GET"]}}],"collection":[{"href":"http:\/\/wp.lancs.ac.uk\/cyberpsy-projects\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"http:\/\/wp.lancs.ac.uk\/cyberpsy-projects\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"http:\/\/wp.lancs.ac.uk\/cyberpsy-projects\/wp-json\/wp\/v2\/users\/620"}],"replies":[{"embeddable":true,"href":"http:\/\/wp.lancs.ac.uk\/cyberpsy-projects\/wp-json\/wp\/v2\/comments?post=47"}],"version-history":[{"count":4,"href":"http:\/\/wp.lancs.ac.uk\/cyberpsy-projects\/wp-json\/wp\/v2\/posts\/47\/revisions"}],"predecessor-version":[{"id":72,"href":"http:\/\/wp.lancs.ac.uk\/cyberpsy-projects\/wp-json\/wp\/v2\/posts\/47\/revisions\/72"}],"wp:attachment":[{"href":"http:\/\/wp.lancs.ac.uk\/cyberpsy-projects\/wp-json\/wp\/v2\/media?parent=47"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"http:\/\/wp.lancs.ac.uk\/cyberpsy-projects\/wp-json\/wp\/v2\/categories?post=47"},{"taxonomy":"post_tag","embeddable":true,"href":"http:\/\/wp.lancs.ac.uk\/cyberpsy-projects\/wp-json\/wp\/v2\/tags?post=47"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}