{"id":343,"date":"2023-11-17T07:04:27","date_gmt":"2023-11-17T07:04:27","guid":{"rendered":"https:\/\/sites.wp.odu.edu\/anyiahp\/?p=343"},"modified":"2023-11-17T07:04:27","modified_gmt":"2023-11-17T07:04:27","slug":"journal-entry-fourteen","status":"publish","type":"post","link":"https:\/\/sites.wp.odu.edu\/anyiahp\/2023\/11\/17\/journal-entry-fourteen\/","title":{"rendered":"Journal Entry Fourteen"},"content":{"rendered":"\n<p>The article titled 11 Illegal Things You Knowingly Do On The Internet discusses a list of illegal things society does on the internet and goes into specific details about the components of this list. I think the five most serious violations are bullying and trolling, collecting information about children, using torrent services, sharing passwords, addresses, or photos of others, illegal searches on the internet, and using other people\u2019s internet networks. Bullying and trolling are serious violations because bullying affects a person\u2019s mental health. Collecting information about children is a serious violation because the world likes to brainwash innocent minds, and I think it&#8217;s weird for a complete stranger to have a collection of children&#8217;s photos on their desktop. Using torrent services is a serious violation because torrents can make a person&#8217;s or organization\u2019s data vulnerable to experiencing network breaches. Illegal searches on the internet are a serious violation because they violate a person\u2019s or organization&#8217;s valuable information. Using other people\u2019s internet networks is a serious violation because you are invading a person\u2019s or organization&#8217;s network. Also, using someone else\u2019s network can cause their network bill to increase.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>The article titled 11 Illegal Things You Knowingly Do On The Internet discusses a list of illegal things society does on the internet and goes into specific details about the components of this list. I think the five most serious violations are bullying and trolling, collecting information about children, using torrent services, sharing passwords, addresses,&#8230; <\/p>\n<div class=\"link-more\"><a href=\"https:\/\/sites.wp.odu.edu\/anyiahp\/2023\/11\/17\/journal-entry-fourteen\/\">Read More<\/a><\/div>\n","protected":false},"author":26271,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":"","wds_primary_category":0},"categories":[1],"tags":[],"_links":{"self":[{"href":"https:\/\/sites.wp.odu.edu\/anyiahp\/wp-json\/wp\/v2\/posts\/343"}],"collection":[{"href":"https:\/\/sites.wp.odu.edu\/anyiahp\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/sites.wp.odu.edu\/anyiahp\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/anyiahp\/wp-json\/wp\/v2\/users\/26271"}],"replies":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/anyiahp\/wp-json\/wp\/v2\/comments?post=343"}],"version-history":[{"count":1,"href":"https:\/\/sites.wp.odu.edu\/anyiahp\/wp-json\/wp\/v2\/posts\/343\/revisions"}],"predecessor-version":[{"id":344,"href":"https:\/\/sites.wp.odu.edu\/anyiahp\/wp-json\/wp\/v2\/posts\/343\/revisions\/344"}],"wp:attachment":[{"href":"https:\/\/sites.wp.odu.edu\/anyiahp\/wp-json\/wp\/v2\/media?parent=343"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/anyiahp\/wp-json\/wp\/v2\/categories?post=343"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/anyiahp\/wp-json\/wp\/v2\/tags?post=343"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}