{"id":241,"date":"2025-03-02T14:33:58","date_gmt":"2025-03-02T14:33:58","guid":{"rendered":"https:\/\/sites.wp.odu.edu\/202420cyse201s29580-cybersecurity-social-science\/?p=241"},"modified":"2025-03-02T14:33:58","modified_gmt":"2025-03-02T14:33:58","slug":"week-7-journal-entry-201s","status":"publish","type":"post","link":"https:\/\/sites.wp.odu.edu\/202420cyse201s29580-cybersecurity-social-science\/2025\/03\/02\/week-7-journal-entry-201s\/","title":{"rendered":"Week 7 Journal Entry 201s"},"content":{"rendered":"\n<figure class=\"wp-block-image size-full\"><a href=\"https:\/\/sites.wp.odu.edu\/202420cyse201s29580-cybersecurity-social-science\/wp-content\/uploads\/sites\/38249\/2025\/03\/IMG_6885.jpg\"><img loading=\"lazy\" decoding=\"async\" width=\"1010\" height=\"871\" src=\"https:\/\/sites.wp.odu.edu\/202420cyse201s29580-cybersecurity-social-science\/wp-content\/uploads\/sites\/38249\/2025\/03\/IMG_6885.jpg\" alt=\"\" class=\"wp-image-242\" srcset=\"https:\/\/sites.wp.odu.edu\/202420cyse201s29580-cybersecurity-social-science\/wp-content\/uploads\/sites\/38249\/2025\/03\/IMG_6885.jpg 1010w, https:\/\/sites.wp.odu.edu\/202420cyse201s29580-cybersecurity-social-science\/wp-content\/uploads\/sites\/38249\/2025\/03\/IMG_6885-300x259.jpg 300w, https:\/\/sites.wp.odu.edu\/202420cyse201s29580-cybersecurity-social-science\/wp-content\/uploads\/sites\/38249\/2025\/03\/IMG_6885-768x662.jpg 768w, https:\/\/sites.wp.odu.edu\/202420cyse201s29580-cybersecurity-social-science\/wp-content\/uploads\/sites\/38249\/2025\/03\/IMG_6885-600x517.jpg 600w, https:\/\/sites.wp.odu.edu\/202420cyse201s29580-cybersecurity-social-science\/wp-content\/uploads\/sites\/38249\/2025\/03\/IMG_6885-945x815.jpg 945w\" sizes=\"(max-width: 1010px) 100vw, 1010px\" \/><\/a><\/figure>\n\n\n\n<p>Using a weak password like &#8220;qwerty&#8221; is comparable to leaving your front door unlocked. Human systems integration seeks to align technology with human behavior and needs, requiring collaboration from both ends. Even if a system is designed to be highly secure, its effectiveness ultimately relies on users adhering to sound security practices. I used picture 3, <a href=\"https:\/\/unsplash.com\/photos\/ICTKcvnXx_8\">https:\/\/unsplash.com\/photos\/ICTKcvnXx_8<\/a><\/p>\n\n\n\n<p><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Using a weak password like &#8220;qwerty&#8221; is comparable to leaving your front door unlocked. Human systems integration seeks to align technology with human behavior and needs, requiring collaboration from both ends. Even if a system is designed to be highly&#8230; <a class=\"more-link\" href=\"https:\/\/sites.wp.odu.edu\/202420cyse201s29580-cybersecurity-social-science\/2025\/03\/02\/week-7-journal-entry-201s\/\">Continue Reading &rarr;<\/a><\/p>\n","protected":false},"author":30330,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":"","wds_primary_category":0},"categories":[1],"tags":[],"_links":{"self":[{"href":"https:\/\/sites.wp.odu.edu\/202420cyse201s29580-cybersecurity-social-science\/wp-json\/wp\/v2\/posts\/241"}],"collection":[{"href":"https:\/\/sites.wp.odu.edu\/202420cyse201s29580-cybersecurity-social-science\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/sites.wp.odu.edu\/202420cyse201s29580-cybersecurity-social-science\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/202420cyse201s29580-cybersecurity-social-science\/wp-json\/wp\/v2\/users\/30330"}],"replies":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/202420cyse201s29580-cybersecurity-social-science\/wp-json\/wp\/v2\/comments?post=241"}],"version-history":[{"count":1,"href":"https:\/\/sites.wp.odu.edu\/202420cyse201s29580-cybersecurity-social-science\/wp-json\/wp\/v2\/posts\/241\/revisions"}],"predecessor-version":[{"id":243,"href":"https:\/\/sites.wp.odu.edu\/202420cyse201s29580-cybersecurity-social-science\/wp-json\/wp\/v2\/posts\/241\/revisions\/243"}],"wp:attachment":[{"href":"https:\/\/sites.wp.odu.edu\/202420cyse201s29580-cybersecurity-social-science\/wp-json\/wp\/v2\/media?parent=241"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/202420cyse201s29580-cybersecurity-social-science\/wp-json\/wp\/v2\/categories?post=241"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/202420cyse201s29580-cybersecurity-social-science\/wp-json\/wp\/v2\/tags?post=241"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}