Photo by cottonbro studio / Pexels

AI Transforms Classic Poems for Computer Security Day Awareness

With Computer Security Day approaching on the 30th of November, now is a timely opportunity to consider fast, effective techniques of raising public awareness of the digital world. 

Experts at Scams.info harnessed AI technology to create scam-aware adaptations of classic poems. They partnered with James Roy, the Technical Director at Brainworks Neurotherapy, to delve into the significance of rhyming for learning.

xxx

Ode to Fraud Awareness (Inspired by “Ode to a Nightingale” by John Keats)

Objective of the poem: To teach basic practices of strong passwords, two factor authentication, and some methods scammers might take.

“Oh, vigilant firewall, our trusted shield,

Guarding our secrets in the digital field.

Amid threats that lurk, and hackers sly,

You shield our data, but here’s a tip to apply.

With strong passwords, your defence fortify,

Change them often, and don’t be shy.

Two-factor authentication, your armour near,

To keep intruders and fraudsters clear.

Update your software, don’t delay,

Patches and fixes to keep scams at bay.

Beware of phishing, emails so sly,

Double-check links before you comply.

Educate and share, spread the word,

Fraud awareness, let it be heard.

With these tips and tricks, we adhere,

To protect our digital realm, and hold it dear.”

According to James Roy, Technical Director at Brainworks Neurotherapy: Rhyming serves as a cognitive tool with a remarkable impact on memory, engaging the brain’s intricate processes.”

I Surfed Cautious as a Cloud (inspired by William Wordsworth’s “I Wandered Lonely as a Cloud”)

Objective of the poem: The poem urges vigilance in the digital space, highlighting the need to recognize and dodge phishing threats while promoting awareness for secure online navigation. 

“I surfed cautious as a cloud,

Amid the web, with cyber dangers shroud.

When all at once, a phishing email I found,

With fraudsters’ tricks, their schemes unbound.

Beside the email, lies and deceit,

I spotted red flags, in my inbox’s heat.

They tried to lure me, with tempting gain,

But I knew better, I felt no pain.

For I had learned the ways to stay secure,

In the digital world, where dangers occur.

With vigilance sharp and wisdom’s grace,

I won’t be caught in a fraudster’s embrace.

So, surf wisely through the virtual crowd,

Aware of scams that speak too loud.

With fraud-awareness as my guide,

I’ll navigate the web with stride.

James Roy states: “When we employ rhymes, our brain processes information by structuring it into manageable ‘segments’ or ‘chunks.’ This not only streamlines information storage but also enhances retrieval from long-term memory when needed.”

The Scam Untraveled (inspired by Robert Frost’s A Road Not Taken)

Objective of the poem: The poem advocates for cautious decision-making in the digital landscape, emphasizing the critical choice between falling victim to scams or navigating with vigilance to safeguard personal data and privacy.

“Two paths diverged in the digital haze,

A choice to make in the fraud-filled maze.

To click or not, with caution I tread,

Aware of the scams that silently spread.

It made all the difference, this cyber road,

My data and privacy, against fraud, I strode.”

James emphasizes: “rhyming acts as a mental scaffold that aids in organizing and making data accessible in our brain’s memory storage.” The repetitive aspect of rhymes is another pivotal factor significantly benefiting memory. Repetition plays a crucial role in memory consolidation, reinforcing neural connections.”

The Fraudulent OdysseyNavigating the Digital Realm (Inspired by Homer’s “The Odyssey”)

Objective of the poem: The poem celebrates the prowess of a vigilant hero in the digital realm, navigating cunning schemes, phishing threats, and Trojan Horse deceptions to safeguard his kingdom and protect valuable data.

“Tell me, O Hacker, of that cunning scheme,

Which caused havoc in the digital dream.

From phishing snares to Trojan Horse’s guise,

The hero of security, ever-wise.

Through the perilous land of cyber threats he’d roam,

To safeguard his kingdom and shield his data home.”

According to the insight from  James: “Melodies formed through rhyming often feature rhythmic patterns naturally promoting repetition, thereby strengthening memory traces in the brain. This strengthens the connection between rhymed words and the information they represent, making recall easier when required.”

As noted by James: “rhymes employ a combination of structural cues, including rhythm, stress, and breaks. These cues establish a ‘mnemonic framework,’ a learning technique supporting information retention and retrieval in human memory.”

The Firewall (Inspired by “The Tyger” by William Blake)

Objective of the poemThe poem explores the formidable and elusive nature of a “Cyber Tyger,” posing questions about the strength of defences and the ability of vigilant users to thwart its fraudulence in the digital domain.

“Cyber Tyger, blazing bright,

In the servers of the night;

What firewall strong or what defence,

Could thwart your fraudulence?

In what phishing link or deceitful scheme,

What vigilant user could intervene?”

James outlines how “rhyming stands as a potent memory-enhancing technique that harnesses the brain’s inherent organizational and repetition mechanisms. It optimizes information storage and retrieval by breaking down data into ‘chunks,’ reinforcing memory traces through repetition, and constructing mnemonic structures. Understanding the neurological impact of rhyming provides valuable insights into how it bolsters memory and cognitive development.”