Cyber Welfare

Cyber Welfare Program helps you to defend from online threats by creating antibodies with the concepts of Privacy, Security and Anonymity

The program has proved to provide and incorporate the conceptual and cognitive tools to improve privacy, security and anonymity online by building and modelling a secure student behaviour with conscious and instinctive reflexes to the online threats.

Program Main Lines of Action

A primary target audience of the program are people with low privacy and security knowledge and skills

ENGAGE AND HELP PEOPLE WHO ARE NEW TO PRIVACY AND SECURITY

A primary target audience of the program are people with low privacy and security knowledge and skills

Provide guides, articles, posts of software that protects privacy, security and communications

SELECT AND PUBLISH VALUABLE GUIDES TO THE TOOLS

Provide guides, articles, posts of software that protects privacy, security and communications

Expand the network for fruitful cooperation. Engage with us and develop an innovative training path

ENGAGE SPORSORSHIP AND INSTRUCTORS OF PRIVACY AND SECURITY

Expand the network for fruitful cooperation. Engage with us and develop an innovative training path

How it works

Cyber Welfare uses an innovative program based on a model known as a hierarchy of effects model or hierarchical model.

The model implies that a student moves through a series of steps or stages during his learning path. The model is linear, built on the assumption that students progress through a series of cognitive (thinking) and affective (feeling) stages culminating in a behavioural (studying) scene.


The steps used by the Cyber Welfare Model are as follows:


  1. Awareness: the user becomes aware of an issue (usually through social networks)
  2. Interest: the user becomes interested in learning about program benefits & how the program fits with its lifestyle
  3. Desire: the user develops a favourable disposition towards the Privacy, Security and Anonymity digital domains
  4. Action: the user forms an intention to become a student and engages in a class further to develop the concepts of Privacy, Security and Anonymity


The hierarchical model operates as a stimulus (S) to the user with the social network's content, and the decision to become a student is a response (R). In other words, the model is an applied stimulus-response model.

Learning funnel

As users move through the hierarchy of effects, they pass through both a cognitive processing stage and an affective processing stage before any action occurs:


  1. Cognition (Awareness/Attention)
  2. Affect (Feeling/ interest/ desire)
  3. Behavior (Action e.g. become student / consumption/ usage/ sharing information etc.)


The basic model is one of the longest-serving hierarchical models, having been in use for more than a century.

Tailored to students needs

Using a hierarchical model, such as Cyber Welfare Program does, provides the student with all knowledge and training tools, the instructor with a detailed understanding of how target audiences change over time.

The program evolves providing insights as to which types of learning messages are likely to be more effective at different stages.

Student funnel

Moving from step to step, the total number of users diminishes. This phenomenon is sometimes described as a "funnel".

A relatively large number of potential users become aware of Privacy, Security and Anonymity issues.

A smaller subset becomes interested, with only a relatively small proportion moving through to the actual stage of becoming a student. This effect is also known as a "student funnel".