{"guid":"33b2fbe5-845a-5c89-80e6-3cf994b48b6b","title":"How to be an Effective Terrorist: fear and loathing in cyber security","subtitle":null,"slug":"emf2014-74-how-to-be-an-effective-terrorist-fear-and-loathing-in-cyber-secu","link":"https://c3voc.de","description":"Dr Jessica Barker is a security consultant often present in the media helping people to understand the threats they are exposed to. She’ll be talking about how we should be explaining risks rather than hiding them from users, allowing people to effectively manage their online activity and protect themselves.","original_language":"eng","persons":["Dr Jessica Barker"],"tags":["emf2014","74","2014"],"view_count":9,"promoted":false,"date":"2014-08-29T17:00:00.000+02:00","release_date":"2024-08-26T00:00:00.000+02:00","updated_at":"2026-01-07T17:30:30.470+01:00","length":2964,"duration":2964,"thumb_url":"https://static.media.ccc.de/media/events/emf/2014/74-33b2fbe5-845a-5c89-80e6-3cf994b48b6b.jpg","poster_url":"https://static.media.ccc.de/media/events/emf/2014/74-33b2fbe5-845a-5c89-80e6-3cf994b48b6b_preview.jpg","timeline_url":"https://static.media.ccc.de/media/events/emf/2014/74-33b2fbe5-845a-5c89-80e6-3cf994b48b6b.timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/events/emf/2014/74-33b2fbe5-845a-5c89-80e6-3cf994b48b6b.thumbnails.vtt","frontend_link":"https://media.ccc.de/v/emf2014-74-how-to-be-an-effective-terrorist-fear-and-loathing-in-cyber-secu","url":"https://api.media.ccc.de/public/events/33b2fbe5-845a-5c89-80e6-3cf994b48b6b","conference_title":"Electromagnetic Field 2014","conference_url":"https://api.media.ccc.de/public/conferences/emf2014","related":[],"recordings":[{"size":129,"length":2964,"mime_type":"video/webm","language":"eng","filename":"emf2014-74-eng-How_to_be_an_Effective_Terrorist_fear_and_loathing_in_cyber_security_webm-sd.webm","state":"new","folder":"webm-sd","high_quality":false,"width":720,"height":576,"updated_at":"2024-08-27T00:05:57.853+02:00","recording_url":"https://cdn.media.ccc.de/events/emf/2014/webm-sd/emf2014-74-eng-How_to_be_an_Effective_Terrorist_fear_and_loathing_in_cyber_security_webm-sd.webm","url":"https://api.media.ccc.de/public/recordings/79081","event_url":"https://api.media.ccc.de/public/events/33b2fbe5-845a-5c89-80e6-3cf994b48b6b","conference_url":"https://api.media.ccc.de/public/conferences/emf2014"},{"size":197,"length":2964,"mime_type":"video/webm","language":"eng","filename":"emf2014-74-eng-How_to_be_an_Effective_Terrorist_fear_and_loathing_in_cyber_security_webm-hd.webm","state":"new","folder":"webm-hd","high_quality":true,"width":854,"height":480,"updated_at":"2024-08-26T23:52:49.079+02:00","recording_url":"https://cdn.media.ccc.de/events/emf/2014/webm-hd/emf2014-74-eng-How_to_be_an_Effective_Terrorist_fear_and_loathing_in_cyber_security_webm-hd.webm","url":"https://api.media.ccc.de/public/recordings/79075","event_url":"https://api.media.ccc.de/public/events/33b2fbe5-845a-5c89-80e6-3cf994b48b6b","conference_url":"https://api.media.ccc.de/public/conferences/emf2014"},{"size":45,"length":2964,"mime_type":"audio/mpeg","language":"eng","filename":"emf2014-74-eng-How_to_be_an_Effective_Terrorist_fear_and_loathing_in_cyber_security_mp3.mp3","state":"new","folder":"mp3","high_quality":false,"width":0,"height":0,"updated_at":"2024-08-26T23:46:45.994+02:00","recording_url":"https://cdn.media.ccc.de/events/emf/2014/mp3/emf2014-74-eng-How_to_be_an_Effective_Terrorist_fear_and_loathing_in_cyber_security_mp3.mp3","url":"https://api.media.ccc.de/public/recordings/79070","event_url":"https://api.media.ccc.de/public/events/33b2fbe5-845a-5c89-80e6-3cf994b48b6b","conference_url":"https://api.media.ccc.de/public/conferences/emf2014"},{"size":116,"length":2964,"mime_type":"video/mp4","language":"eng","filename":"emf2014-74-eng-How_to_be_an_Effective_Terrorist_fear_and_loathing_in_cyber_security_sd.mp4","state":"new","folder":"h264-sd","high_quality":false,"width":720,"height":576,"updated_at":"2024-08-26T23:45:42.819+02:00","recording_url":"https://cdn.media.ccc.de/events/emf/2014/h264-sd/emf2014-74-eng-How_to_be_an_Effective_Terrorist_fear_and_loathing_in_cyber_security_sd.mp4","url":"https://api.media.ccc.de/public/recordings/79069","event_url":"https://api.media.ccc.de/public/events/33b2fbe5-845a-5c89-80e6-3cf994b48b6b","conference_url":"https://api.media.ccc.de/public/conferences/emf2014"},{"size":29,"length":2964,"mime_type":"audio/opus","language":"eng","filename":"emf2014-74-eng-How_to_be_an_Effective_Terrorist_fear_and_loathing_in_cyber_security_opus.opus","state":"new","folder":"opus","high_quality":false,"width":0,"height":0,"updated_at":"2024-08-26T23:39:55.660+02:00","recording_url":"https://cdn.media.ccc.de/events/emf/2014/opus/emf2014-74-eng-How_to_be_an_Effective_Terrorist_fear_and_loathing_in_cyber_security_opus.opus","url":"https://api.media.ccc.de/public/recordings/79064","event_url":"https://api.media.ccc.de/public/events/33b2fbe5-845a-5c89-80e6-3cf994b48b6b","conference_url":"https://api.media.ccc.de/public/conferences/emf2014"},{"size":160,"length":2964,"mime_type":"video/mp4","language":"eng","filename":"emf2014-74-eng-How_to_be_an_Effective_Terrorist_fear_and_loathing_in_cyber_security_hd.mp4","state":"new","folder":"h264-hd","high_quality":true,"width":854,"height":480,"updated_at":"2024-08-26T23:37:54.933+02:00","recording_url":"https://cdn.media.ccc.de/events/emf/2014/h264-hd/emf2014-74-eng-How_to_be_an_Effective_Terrorist_fear_and_loathing_in_cyber_security_hd.mp4","url":"https://api.media.ccc.de/public/recordings/79061","event_url":"https://api.media.ccc.de/public/events/33b2fbe5-845a-5c89-80e6-3cf994b48b6b","conference_url":"https://api.media.ccc.de/public/conferences/emf2014"}]}