{"id":292,"date":"2025-04-25T18:01:48","date_gmt":"2025-04-25T18:01:48","guid":{"rendered":"https:\/\/sites.wp.odu.edu\/202420cyse201s29580-cybersecurity-social-science\/?page_id=292"},"modified":"2025-04-25T18:01:48","modified_gmt":"2025-04-25T18:01:48","slug":"201s-journal-entries","status":"publish","type":"page","link":"https:\/\/sites.wp.odu.edu\/202420cyse201s29580-cybersecurity-social-science\/201s-journal-entries\/","title":{"rendered":"201S Journal Entries"},"content":{"rendered":"\n<figure class=\"wp-block-embed is-type-wp-embed is-provider-cyse-eportfolio wp-block-embed-cyse-eportfolio\"><div class=\"wp-block-embed__wrapper\">\n<blockquote class=\"wp-embedded-content\" data-secret=\"lIiQKQSU5h\"><a href=\"https:\/\/sites.wp.odu.edu\/202420cyse201s29580-cybersecurity-social-science\/2025\/04\/25\/cyse-201s-week-one-journal-entry\/\">CYSE 201S Week One Journal Entry<\/a><\/blockquote><iframe class=\"wp-embedded-content\" sandbox=\"allow-scripts\" security=\"restricted\" style=\"position: absolute; clip: rect(1px, 1px, 1px, 1px);\" title=\"&#8220;CYSE 201S Week One Journal Entry&#8221; &#8212; CYSE EPORTFOLIO\" src=\"https:\/\/sites.wp.odu.edu\/202420cyse201s29580-cybersecurity-social-science\/2025\/04\/25\/cyse-201s-week-one-journal-entry\/embed\/#?secret=Cuma9ePpKU#?secret=lIiQKQSU5h\" data-secret=\"lIiQKQSU5h\" width=\"600\" height=\"338\" frameborder=\"0\" marginwidth=\"0\" marginheight=\"0\" scrolling=\"no\"><\/iframe>\n<\/div><\/figure>\n\n\n\n<figure class=\"wp-block-embed is-type-wp-embed is-provider-cyse-eportfolio wp-block-embed-cyse-eportfolio\"><div class=\"wp-block-embed__wrapper\">\n<blockquote class=\"wp-embedded-content\" data-secret=\"Y99wiKHSUT\"><a href=\"https:\/\/sites.wp.odu.edu\/202420cyse201s29580-cybersecurity-social-science\/2025\/04\/25\/cyse-201s-week-2-journal-entry\/\">CYSE 201S Week 2 Journal Entry<\/a><\/blockquote><iframe class=\"wp-embedded-content\" sandbox=\"allow-scripts\" security=\"restricted\" style=\"position: absolute; clip: rect(1px, 1px, 1px, 1px);\" title=\"&#8220;CYSE 201S Week 2 Journal Entry&#8221; &#8212; CYSE EPORTFOLIO\" src=\"https:\/\/sites.wp.odu.edu\/202420cyse201s29580-cybersecurity-social-science\/2025\/04\/25\/cyse-201s-week-2-journal-entry\/embed\/#?secret=fAwJ041TBX#?secret=Y99wiKHSUT\" data-secret=\"Y99wiKHSUT\" width=\"600\" height=\"338\" frameborder=\"0\" marginwidth=\"0\" marginheight=\"0\" scrolling=\"no\"><\/iframe>\n<\/div><\/figure>\n\n\n\n<figure class=\"wp-block-embed is-type-wp-embed is-provider-cyse-eportfolio wp-block-embed-cyse-eportfolio\"><div class=\"wp-block-embed__wrapper\">\n<blockquote class=\"wp-embedded-content\" data-secret=\"wn6QrRqYrd\"><a href=\"https:\/\/sites.wp.odu.edu\/202420cyse201s29580-cybersecurity-social-science\/2025\/04\/25\/cyse-201s-week-3-journal-entry\/\">CYSE 201S Week 3 Journal Entry<\/a><\/blockquote><iframe class=\"wp-embedded-content\" sandbox=\"allow-scripts\" security=\"restricted\" style=\"position: absolute; clip: rect(1px, 1px, 1px, 1px);\" title=\"&#8220;CYSE 201S Week 3 Journal Entry&#8221; &#8212; CYSE EPORTFOLIO\" src=\"https:\/\/sites.wp.odu.edu\/202420cyse201s29580-cybersecurity-social-science\/2025\/04\/25\/cyse-201s-week-3-journal-entry\/embed\/#?secret=kJmo7ic4av#?secret=wn6QrRqYrd\" data-secret=\"wn6QrRqYrd\" width=\"600\" height=\"338\" frameborder=\"0\" marginwidth=\"0\" marginheight=\"0\" scrolling=\"no\"><\/iframe>\n<\/div><\/figure>\n\n\n\n<figure class=\"wp-block-embed is-type-wp-embed is-provider-cyse-eportfolio wp-block-embed-cyse-eportfolio\"><div class=\"wp-block-embed__wrapper\">\n<blockquote class=\"wp-embedded-content\" data-secret=\"zNNiMMsqBu\"><a href=\"https:\/\/sites.wp.odu.edu\/202420cyse201s29580-cybersecurity-social-science\/2025\/02\/06\/week-4-journal-entry-cyse-201s\/\">Week 4 Journal Entry CYSE 201S<\/a><\/blockquote><iframe class=\"wp-embedded-content\" sandbox=\"allow-scripts\" security=\"restricted\" style=\"position: absolute; clip: rect(1px, 1px, 1px, 1px);\" title=\"&#8220;Week 4 Journal Entry CYSE 201S&#8221; &#8212; CYSE EPORTFOLIO\" src=\"https:\/\/sites.wp.odu.edu\/202420cyse201s29580-cybersecurity-social-science\/2025\/02\/06\/week-4-journal-entry-cyse-201s\/embed\/#?secret=G4cT0JxPRb#?secret=zNNiMMsqBu\" data-secret=\"zNNiMMsqBu\" width=\"600\" height=\"338\" frameborder=\"0\" marginwidth=\"0\" marginheight=\"0\" scrolling=\"no\"><\/iframe>\n<\/div><\/figure>\n\n\n\n<figure class=\"wp-block-embed is-type-wp-embed is-provider-cyse-eportfolio wp-block-embed-cyse-eportfolio\"><div class=\"wp-block-embed__wrapper\">\n<blockquote class=\"wp-embedded-content\" data-secret=\"0wFrCKq5HH\"><a href=\"https:\/\/sites.wp.odu.edu\/202420cyse201s29580-cybersecurity-social-science\/2025\/02\/24\/week-5-journal-entry-cyse201s\/\">Week 5 Journal entry CYSE201S<\/a><\/blockquote><iframe class=\"wp-embedded-content\" sandbox=\"allow-scripts\" security=\"restricted\" style=\"position: absolute; clip: rect(1px, 1px, 1px, 1px);\" title=\"&#8220;Week 5 Journal entry CYSE201S&#8221; &#8212; CYSE EPORTFOLIO\" src=\"https:\/\/sites.wp.odu.edu\/202420cyse201s29580-cybersecurity-social-science\/2025\/02\/24\/week-5-journal-entry-cyse201s\/embed\/#?secret=OUEuEXLHqG#?secret=0wFrCKq5HH\" data-secret=\"0wFrCKq5HH\" width=\"600\" height=\"338\" frameborder=\"0\" marginwidth=\"0\" marginheight=\"0\" scrolling=\"no\"><\/iframe>\n<\/div><\/figure>\n\n\n\n<figure class=\"wp-block-embed is-type-wp-embed is-provider-cyse-eportfolio wp-block-embed-cyse-eportfolio\"><div class=\"wp-block-embed__wrapper\">\n<blockquote class=\"wp-embedded-content\" data-secret=\"8gLuAk0ZVZ\"><a href=\"https:\/\/sites.wp.odu.edu\/202420cyse201s29580-cybersecurity-social-science\/2025\/02\/24\/week-6-journal-entry-cyse201s\/\">Week 6 Journal Entry CYSE201S<\/a><\/blockquote><iframe class=\"wp-embedded-content\" sandbox=\"allow-scripts\" security=\"restricted\" style=\"position: absolute; clip: rect(1px, 1px, 1px, 1px);\" title=\"&#8220;Week 6 Journal Entry CYSE201S&#8221; &#8212; CYSE EPORTFOLIO\" src=\"https:\/\/sites.wp.odu.edu\/202420cyse201s29580-cybersecurity-social-science\/2025\/02\/24\/week-6-journal-entry-cyse201s\/embed\/#?secret=Iz3jkWUpMG#?secret=8gLuAk0ZVZ\" data-secret=\"8gLuAk0ZVZ\" width=\"600\" height=\"338\" frameborder=\"0\" marginwidth=\"0\" marginheight=\"0\" scrolling=\"no\"><\/iframe>\n<\/div><\/figure>\n\n\n\n<figure class=\"wp-block-embed is-type-wp-embed is-provider-cyse-eportfolio wp-block-embed-cyse-eportfolio\"><div class=\"wp-block-embed__wrapper\">\n<blockquote class=\"wp-embedded-content\" data-secret=\"CrVtCE9GIt\"><a href=\"https:\/\/sites.wp.odu.edu\/202420cyse201s29580-cybersecurity-social-science\/2025\/03\/02\/week-7-journal-entry-201s\/\">Week 7 Journal Entry 201s<\/a><\/blockquote><iframe class=\"wp-embedded-content\" sandbox=\"allow-scripts\" security=\"restricted\" style=\"position: absolute; clip: rect(1px, 1px, 1px, 1px);\" title=\"&#8220;Week 7 Journal Entry 201s&#8221; &#8212; CYSE EPORTFOLIO\" src=\"https:\/\/sites.wp.odu.edu\/202420cyse201s29580-cybersecurity-social-science\/2025\/03\/02\/week-7-journal-entry-201s\/embed\/#?secret=lmxI0z5bnJ#?secret=CrVtCE9GIt\" data-secret=\"CrVtCE9GIt\" width=\"600\" height=\"338\" frameborder=\"0\" marginwidth=\"0\" marginheight=\"0\" scrolling=\"no\"><\/iframe>\n<\/div><\/figure>\n\n\n\n<figure class=\"wp-block-embed is-type-wp-embed is-provider-cyse-eportfolio wp-block-embed-cyse-eportfolio\"><div class=\"wp-block-embed__wrapper\">\n<blockquote class=\"wp-embedded-content\" data-secret=\"hsm5Fnx5kZ\"><a href=\"https:\/\/sites.wp.odu.edu\/202420cyse201s29580-cybersecurity-social-science\/2025\/03\/06\/week-8-journal-entry-cyse-201s\/\">Week 8 Journal Entry CYSE 201S<\/a><\/blockquote><iframe class=\"wp-embedded-content\" sandbox=\"allow-scripts\" security=\"restricted\" style=\"position: absolute; clip: rect(1px, 1px, 1px, 1px);\" title=\"&#8220;Week 8 Journal Entry CYSE 201S&#8221; &#8212; CYSE EPORTFOLIO\" src=\"https:\/\/sites.wp.odu.edu\/202420cyse201s29580-cybersecurity-social-science\/2025\/03\/06\/week-8-journal-entry-cyse-201s\/embed\/#?secret=IQJAuMXxl3#?secret=hsm5Fnx5kZ\" data-secret=\"hsm5Fnx5kZ\" width=\"600\" height=\"338\" frameborder=\"0\" marginwidth=\"0\" marginheight=\"0\" scrolling=\"no\"><\/iframe>\n<\/div><\/figure>\n\n\n\n<figure class=\"wp-block-embed is-type-wp-embed is-provider-cyse-eportfolio wp-block-embed-cyse-eportfolio\"><div class=\"wp-block-embed__wrapper\">\n<blockquote class=\"wp-embedded-content\" data-secret=\"iHwVCeSVCK\"><a href=\"https:\/\/sites.wp.odu.edu\/202420cyse201s29580-cybersecurity-social-science\/2025\/03\/23\/csye201s-week-10-journal-entry\/\">CSYE201S Week 10 Journal Entry<\/a><\/blockquote><iframe class=\"wp-embedded-content\" sandbox=\"allow-scripts\" security=\"restricted\" style=\"position: absolute; clip: rect(1px, 1px, 1px, 1px);\" title=\"&#8220;CSYE201S Week 10 Journal Entry&#8221; &#8212; CYSE EPORTFOLIO\" src=\"https:\/\/sites.wp.odu.edu\/202420cyse201s29580-cybersecurity-social-science\/2025\/03\/23\/csye201s-week-10-journal-entry\/embed\/#?secret=eELRtPgh7Q#?secret=iHwVCeSVCK\" data-secret=\"iHwVCeSVCK\" width=\"600\" height=\"338\" frameborder=\"0\" marginwidth=\"0\" marginheight=\"0\" scrolling=\"no\"><\/iframe>\n<\/div><\/figure>\n\n\n\n<figure class=\"wp-block-embed is-type-wp-embed is-provider-cyse-eportfolio wp-block-embed-cyse-eportfolio\"><div class=\"wp-block-embed__wrapper\">\n<blockquote class=\"wp-embedded-content\" data-secret=\"iz6IHrL9ve\"><a href=\"https:\/\/sites.wp.odu.edu\/202420cyse201s29580-cybersecurity-social-science\/2025\/03\/25\/week-11-journal-entry-10\/\">CYSE 201S Week 11 Journal Entry 10<\/a><\/blockquote><iframe class=\"wp-embedded-content\" sandbox=\"allow-scripts\" security=\"restricted\" style=\"position: absolute; clip: rect(1px, 1px, 1px, 1px);\" title=\"&#8220;CYSE 201S Week 11 Journal Entry 10&#8221; &#8212; CYSE EPORTFOLIO\" src=\"https:\/\/sites.wp.odu.edu\/202420cyse201s29580-cybersecurity-social-science\/2025\/03\/25\/week-11-journal-entry-10\/embed\/#?secret=lIT5PVbYUV#?secret=iz6IHrL9ve\" data-secret=\"iz6IHrL9ve\" width=\"600\" height=\"338\" frameborder=\"0\" marginwidth=\"0\" marginheight=\"0\" scrolling=\"no\"><\/iframe>\n<\/div><\/figure>\n\n\n\n<figure class=\"wp-block-embed is-type-wp-embed is-provider-cyse-eportfolio wp-block-embed-cyse-eportfolio\"><div class=\"wp-block-embed__wrapper\">\n<blockquote class=\"wp-embedded-content\" data-secret=\"M59TSS9ESm\"><a href=\"https:\/\/sites.wp.odu.edu\/202420cyse201s29580-cybersecurity-social-science\/2025\/03\/25\/cyse-201s-week-11-journal-entry-11\/\">CYSE 201S Week 11 Journal Entry 11<\/a><\/blockquote><iframe class=\"wp-embedded-content\" sandbox=\"allow-scripts\" security=\"restricted\" style=\"position: absolute; clip: rect(1px, 1px, 1px, 1px);\" title=\"&#8220;CYSE 201S Week 11 Journal Entry 11&#8221; &#8212; CYSE EPORTFOLIO\" src=\"https:\/\/sites.wp.odu.edu\/202420cyse201s29580-cybersecurity-social-science\/2025\/03\/25\/cyse-201s-week-11-journal-entry-11\/embed\/#?secret=tShCcgWNmK#?secret=M59TSS9ESm\" data-secret=\"M59TSS9ESm\" width=\"600\" height=\"338\" frameborder=\"0\" marginwidth=\"0\" marginheight=\"0\" scrolling=\"no\"><\/iframe>\n<\/div><\/figure>\n\n\n\n<figure class=\"wp-block-embed is-type-wp-embed is-provider-cyse-eportfolio wp-block-embed-cyse-eportfolio\"><div class=\"wp-block-embed__wrapper\">\n<blockquote class=\"wp-embedded-content\" data-secret=\"sFyLNgcPes\"><a href=\"https:\/\/sites.wp.odu.edu\/202420cyse201s29580-cybersecurity-social-science\/2025\/04\/04\/week-12-journal-entry-12\/\">CYSE 200S Week 12 Journal Entry, 12<\/a><\/blockquote><iframe class=\"wp-embedded-content\" sandbox=\"allow-scripts\" security=\"restricted\" style=\"position: absolute; clip: rect(1px, 1px, 1px, 1px);\" title=\"&#8220;CYSE 200S Week 12 Journal Entry, 12&#8221; &#8212; CYSE EPORTFOLIO\" src=\"https:\/\/sites.wp.odu.edu\/202420cyse201s29580-cybersecurity-social-science\/2025\/04\/04\/week-12-journal-entry-12\/embed\/#?secret=nUjzynejy8#?secret=sFyLNgcPes\" data-secret=\"sFyLNgcPes\" width=\"600\" height=\"338\" frameborder=\"0\" marginwidth=\"0\" marginheight=\"0\" scrolling=\"no\"><\/iframe>\n<\/div><\/figure>\n\n\n\n<figure class=\"wp-block-embed is-type-wp-embed is-provider-cyse-eportfolio wp-block-embed-cyse-eportfolio\"><div class=\"wp-block-embed__wrapper\">\n<blockquote class=\"wp-embedded-content\" data-secret=\"egfZWLlOLI\"><a href=\"https:\/\/sites.wp.odu.edu\/202420cyse201s29580-cybersecurity-social-science\/2025\/04\/05\/cyse-200s-journal-entry-13\/\">CYSE 200S Journal Entry, 13<\/a><\/blockquote><iframe class=\"wp-embedded-content\" sandbox=\"allow-scripts\" security=\"restricted\" style=\"position: absolute; clip: rect(1px, 1px, 1px, 1px);\" title=\"&#8220;CYSE 200S Journal Entry, 13&#8221; &#8212; CYSE EPORTFOLIO\" src=\"https:\/\/sites.wp.odu.edu\/202420cyse201s29580-cybersecurity-social-science\/2025\/04\/05\/cyse-200s-journal-entry-13\/embed\/#?secret=MDPfyAAwJs#?secret=egfZWLlOLI\" data-secret=\"egfZWLlOLI\" width=\"600\" height=\"338\" frameborder=\"0\" marginwidth=\"0\" marginheight=\"0\" scrolling=\"no\"><\/iframe>\n<\/div><\/figure>\n\n\n\n<figure class=\"wp-block-embed is-type-wp-embed is-provider-cyse-eportfolio wp-block-embed-cyse-eportfolio\"><div class=\"wp-block-embed__wrapper\">\n<blockquote class=\"wp-embedded-content\" data-secret=\"GFjlt1SHdT\"><a href=\"https:\/\/sites.wp.odu.edu\/202420cyse201s29580-cybersecurity-social-science\/2025\/04\/10\/cyse-200s-week-13-journal-entry-14\/\">CYSE 200S Week 13 Journal Entry 14<\/a><\/blockquote><iframe class=\"wp-embedded-content\" sandbox=\"allow-scripts\" security=\"restricted\" style=\"position: absolute; clip: rect(1px, 1px, 1px, 1px);\" title=\"&#8220;CYSE 200S Week 13 Journal Entry 14&#8221; &#8212; CYSE EPORTFOLIO\" src=\"https:\/\/sites.wp.odu.edu\/202420cyse201s29580-cybersecurity-social-science\/2025\/04\/10\/cyse-200s-week-13-journal-entry-14\/embed\/#?secret=oC29723rc7#?secret=GFjlt1SHdT\" data-secret=\"GFjlt1SHdT\" width=\"600\" height=\"338\" frameborder=\"0\" marginwidth=\"0\" marginheight=\"0\" scrolling=\"no\"><\/iframe>\n<\/div><\/figure>\n\n\n\n<figure class=\"wp-block-embed is-type-wp-embed is-provider-cyse-eportfolio wp-block-embed-cyse-eportfolio\"><div class=\"wp-block-embed__wrapper\">\n<blockquote class=\"wp-embedded-content\" data-secret=\"CMUb7vJz6w\"><a href=\"https:\/\/sites.wp.odu.edu\/202420cyse201s29580-cybersecurity-social-science\/2025\/04\/25\/cyse-200s-journal-entry-15\/\">CYSE 200S Journal Entry 15<\/a><\/blockquote><iframe class=\"wp-embedded-content\" sandbox=\"allow-scripts\" security=\"restricted\" style=\"position: absolute; clip: rect(1px, 1px, 1px, 1px);\" title=\"&#8220;CYSE 200S Journal Entry 15&#8221; &#8212; CYSE EPORTFOLIO\" src=\"https:\/\/sites.wp.odu.edu\/202420cyse201s29580-cybersecurity-social-science\/2025\/04\/25\/cyse-200s-journal-entry-15\/embed\/#?secret=q1pWcQsR94#?secret=CMUb7vJz6w\" data-secret=\"CMUb7vJz6w\" width=\"600\" height=\"338\" frameborder=\"0\" marginwidth=\"0\" marginheight=\"0\" scrolling=\"no\"><\/iframe>\n<\/div><\/figure>\n","protected":false},"excerpt":{"rendered":"","protected":false},"author":30330,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"_links":{"self":[{"href":"https:\/\/sites.wp.odu.edu\/202420cyse201s29580-cybersecurity-social-science\/wp-json\/wp\/v2\/pages\/292"}],"collection":[{"href":"https:\/\/sites.wp.odu.edu\/202420cyse201s29580-cybersecurity-social-science\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/sites.wp.odu.edu\/202420cyse201s29580-cybersecurity-social-science\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/202420cyse201s29580-cybersecurity-social-science\/wp-json\/wp\/v2\/users\/30330"}],"replies":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/202420cyse201s29580-cybersecurity-social-science\/wp-json\/wp\/v2\/comments?post=292"}],"version-history":[{"count":1,"href":"https:\/\/sites.wp.odu.edu\/202420cyse201s29580-cybersecurity-social-science\/wp-json\/wp\/v2\/pages\/292\/revisions"}],"predecessor-version":[{"id":300,"href":"https:\/\/sites.wp.odu.edu\/202420cyse201s29580-cybersecurity-social-science\/wp-json\/wp\/v2\/pages\/292\/revisions\/300"}],"wp:attachment":[{"href":"https:\/\/sites.wp.odu.edu\/202420cyse201s29580-cybersecurity-social-science\/wp-json\/wp\/v2\/media?parent=292"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}