{"id":646,"date":"2024-12-04T17:31:41","date_gmt":"2024-12-04T22:31:41","guid":{"rendered":"https:\/\/sites.wp.odu.edu\/aaroncominio\/?page_id=646"},"modified":"2024-12-04T17:33:13","modified_gmt":"2024-12-04T22:33:13","slug":"journal-entries","status":"publish","type":"page","link":"https:\/\/sites.wp.odu.edu\/aaroncominio\/journal-entries\/","title":{"rendered":"Journal Entries"},"content":{"rendered":"\n<ol>\n<li><a href=\"https:\/\/sites.wp.odu.edu\/aaroncominio\/2024\/12\/04\/week-1-journal-entry-1\/\" data-type=\"link\" data-id=\"https:\/\/sites.wp.odu.edu\/aaroncominio\/2024\/12\/04\/week-1-journal-entry-1\/\">Exploring Cybersecurity Career Paths: Aligning Interests with the NICE Framework<\/a><\/li>\n\n\n\n<li><a href=\"https:\/\/sites.wp.odu.edu\/aaroncominio\/2024\/12\/04\/week-2-journal-entry-2\/\" data-type=\"link\" data-id=\"https:\/\/sites.wp.odu.edu\/aaroncominio\/2024\/12\/04\/week-2-journal-entry-2\/\">Applying Scientific Principles to Strengthen Cybersecurity Strategies<\/a><\/li>\n\n\n\n<li><a href=\"https:\/\/sites.wp.odu.edu\/aaroncominio\/2024\/09\/16\/journal-entry-week-3\/\" data-type=\"link\" data-id=\"https:\/\/sites.wp.odu.edu\/aaroncominio\/2024\/09\/16\/journal-entry-week-3\/\">Analyzing Data Breach Trends and Insights: Exploring the PRC&#8217;s Role in Cybersecurity Research<\/a><\/li>\n\n\n\n<li><a href=\"https:\/\/sites.wp.odu.edu\/aaroncominio\/2024\/09\/20\/journal-entry-week-4\/\" data-type=\"link\" data-id=\"https:\/\/sites.wp.odu.edu\/aaroncominio\/2024\/09\/20\/journal-entry-week-4\/\">Maslow&#8217;s Hierarchy of Needs Through the Lens of Technology: Connecting Human Experience to Digital Growth<\/a><\/li>\n\n\n\n<li><a href=\"https:\/\/sites.wp.odu.edu\/aaroncominio\/2024\/09\/27\/journal-entry-week-5\/\" data-type=\"link\" data-id=\"https:\/\/sites.wp.odu.edu\/aaroncominio\/2024\/09\/27\/journal-entry-week-5\/\">Ranking Motivations for Cybercrime: Exploring the Complex Drivers Behind Cybercriminal Behavior<\/a><\/li>\n\n\n\n<li><a href=\"https:\/\/sites.wp.odu.edu\/aaroncominio\/2024\/10\/04\/journal-entry-week-6\/\" data-type=\"link\" data-id=\"https:\/\/sites.wp.odu.edu\/aaroncominio\/2024\/10\/04\/journal-entry-week-6\/\">Spotting the Red Flags: How to Identify Fake Websites and Avoid Cyber Scams<\/a><\/li>\n\n\n\n<li><a href=\"https:\/\/sites.wp.odu.edu\/aaroncominio\/2024\/10\/11\/week-7-journal-entry\/\" data-type=\"link\" data-id=\"https:\/\/sites.wp.odu.edu\/aaroncominio\/2024\/10\/11\/week-7-journal-entry\/\">Strengthening the Weakest Link: The Importance of a Human-Centered Cybersecurity Model<\/a><\/li>\n\n\n\n<li><a href=\"https:\/\/sites.wp.odu.edu\/aaroncominio\/2024\/10\/18\/journal-entry-week-8\/\" data-type=\"link\" data-id=\"https:\/\/sites.wp.odu.edu\/aaroncominio\/2024\/10\/18\/journal-entry-week-8\/\">Media Influence: How Distorted Narratives Impact Public Cybersecurity Awareness<\/a><\/li>\n\n\n\n<li><a href=\"https:\/\/sites.wp.odu.edu\/aaroncominio\/2024\/10\/26\/journal-entry-week-9\/\" data-type=\"link\" data-id=\"https:\/\/sites.wp.odu.edu\/aaroncominio\/2024\/10\/26\/journal-entry-week-9\/\">The Risk of Social Media<\/a><\/li>\n\n\n\n<li><a href=\"https:\/\/sites.wp.odu.edu\/aaroncominio\/2024\/11\/03\/journal-entry-week-10\/\" data-type=\"link\" data-id=\"https:\/\/sites.wp.odu.edu\/aaroncominio\/2024\/11\/03\/journal-entry-week-10\/\">Social Cybersecurity: Guarding Against Modern Information Warfare<\/a><\/li>\n\n\n\n<li><a href=\"https:\/\/sites.wp.odu.edu\/aaroncominio\/2024\/11\/05\/week-10-journal-entry-11\/\" data-type=\"link\" data-id=\"https:\/\/sites.wp.odu.edu\/aaroncominio\/2024\/11\/05\/week-10-journal-entry-11\/\">Beyond the Code: Social Behavior in Cybersecurity<\/a><\/li>\n\n\n\n<li><a href=\"https:\/\/sites.wp.odu.edu\/aaroncominio\/2024\/11\/10\/week-11-journal-entry-12\/\" data-type=\"link\" data-id=\"https:\/\/sites.wp.odu.edu\/aaroncominio\/2024\/11\/10\/week-11-journal-entry-12\/\">Exploring Social Science Theories in Cybersecurity: The Glasswasherparts.com Data Breach<\/a><\/li>\n\n\n\n<li><a href=\"https:\/\/sites.wp.odu.edu\/aaroncominio\/2024\/11\/10\/week-11-journal-entry-13\/\" data-type=\"link\" data-id=\"https:\/\/sites.wp.odu.edu\/aaroncominio\/2024\/11\/10\/week-11-journal-entry-13\/\">The Power of Bug Bounty Policies: Economic Solutions for Cybersecurity<\/a><\/li>\n\n\n\n<li><a href=\"https:\/\/sites.wp.odu.edu\/aaroncominio\/2024\/11\/18\/week-12-journal-entry-14\/\" data-type=\"link\" data-id=\"https:\/\/sites.wp.odu.edu\/aaroncominio\/2024\/11\/18\/week-12-journal-entry-14\/\">Online Actions, Real-World Consequences: Avoiding Serious Legal Pitfalls on the Internet<\/a><\/li>\n\n\n\n<li><a href=\"https:\/\/sites.wp.odu.edu\/aaroncominio\/2024\/12\/04\/week-15-journal-entry-15\/\" data-type=\"link\" data-id=\"https:\/\/sites.wp.odu.edu\/aaroncominio\/2024\/12\/04\/week-15-journal-entry-15\/\">From Accounting to Digital Forensics: David Teo\u2019s Journey Bridging Financial Expertise with Cyber Investigations<\/a><\/li>\n<\/ol>\n","protected":false},"excerpt":{"rendered":"","protected":false},"author":29612,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"_links":{"self":[{"href":"https:\/\/sites.wp.odu.edu\/aaroncominio\/wp-json\/wp\/v2\/pages\/646"}],"collection":[{"href":"https:\/\/sites.wp.odu.edu\/aaroncominio\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/sites.wp.odu.edu\/aaroncominio\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/aaroncominio\/wp-json\/wp\/v2\/users\/29612"}],"replies":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/aaroncominio\/wp-json\/wp\/v2\/comments?post=646"}],"version-history":[{"count":2,"href":"https:\/\/sites.wp.odu.edu\/aaroncominio\/wp-json\/wp\/v2\/pages\/646\/revisions"}],"predecessor-version":[{"id":648,"href":"https:\/\/sites.wp.odu.edu\/aaroncominio\/wp-json\/wp\/v2\/pages\/646\/revisions\/648"}],"wp:attachment":[{"href":"https:\/\/sites.wp.odu.edu\/aaroncominio\/wp-json\/wp\/v2\/media?parent=646"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}