{"id":123,"date":"2025-09-24T16:17:57","date_gmt":"2025-09-24T16:17:57","guid":{"rendered":"https:\/\/sites.wp.odu.edu\/cyberimpact1\/?page_id=123"},"modified":"2026-02-12T03:13:02","modified_gmt":"2026-02-12T03:13:02","slug":"cyse-301","status":"publish","type":"page","link":"https:\/\/sites.wp.odu.edu\/bstap007\/cyse-301\/","title":{"rendered":"CYSE 301"},"content":{"rendered":"<h1 style=\"text-align: center\">Cybersecurity &amp; Social Sciences<\/h1>\n<p>&nbsp;<\/p>\n\n\n<figure class=\"wp-block-image size-large\"><img decoding=\"async\" src=\"https:\/\/tse3.mm.bing.net\/th\/id\/OIP.VOSm-j4Rr1S3OWpP9mwwdwHaHa?pid=ImgDet&amp;w=187&amp;h=187&amp;c=7&amp;dpr=1.3&amp;o=7&amp;rm=3\" alt=\"\" \/><\/figure>\n\n\n\n<figure class=\"wp-block-image size-large\"><img decoding=\"async\" src=\"https:\/\/www.crimpsy.com\/wp-content\/uploads\/2025\/03\/futuristic-digital-crime-scene-depicting-cybercrimes-in-action.-A-hacker-in-a-dark-hoodie-typing-on-a-laptop-with-glowing-binary-code-in-the-backgro-2.webp\" alt=\"\" \/><\/figure>\n\n\n\n<figure class=\"wp-block-image size-large\"><img decoding=\"async\" src=\"https:\/\/miro.medium.com\/v2\/resize:fit:1358\/1*q-DV3gw6C-RWUInGreOkIA.png\" alt=\"\" \/><\/figure>\n\n\n\n<p>Sources<\/p>\n\n\n\n<p>CrimPsy. (2025, April 3). <em>Cybercrimes in criminology: An in-depth analysis of digital offenses and their impact<\/em>. Retrieved February 11, 2026, from <a href=\"https:\/\/www.crimpsy.com\/cybercrimes-in-criminology\/?utm_source=chatgpt.com\">https:\/\/www.crimpsy.com\/cybercrimes-in-criminology\/<\/a><\/p>\n\n\n\n<p><strong>APA style<\/strong><br>Image from Medium. (n.d.). <em>Asymmetric cryptography visualization with padlock and key<\/em> [PNG]. Retrieved February 12, 2026, from <a href=\"https:\/\/miro.medium.com\/v2\/resize:fit:1358\/1*q-DV3gw6C-RWUInGreOkIA.png\">https:\/\/miro.medium.com\/v2\/resize:fit:1358\/1*q-DV3gw6C-RWUInGreOkIA.png<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Cybersecurity &amp; Social Sciences &nbsp; Sources CrimPsy. (2025, April 3). Cybercrimes in criminology: An in-depth analysis of digital offenses and their impact. Retrieved February 11, 2026, from https:\/\/www.crimpsy.com\/cybercrimes-in-criminology\/ APA styleImage from Medium. (n.d.). Asymmetric cryptography visualization with padlock and key [PNG]. Retrieved February 12, 2026, from https:\/\/miro.medium.com\/v2\/resize:fit:1358\/1*q-DV3gw6C-RWUInGreOkIA.png<\/p>\n","protected":false},"author":31554,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"_links":{"self":[{"href":"https:\/\/sites.wp.odu.edu\/bstap007\/wp-json\/wp\/v2\/pages\/123"}],"collection":[{"href":"https:\/\/sites.wp.odu.edu\/bstap007\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/sites.wp.odu.edu\/bstap007\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/bstap007\/wp-json\/wp\/v2\/users\/31554"}],"replies":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/bstap007\/wp-json\/wp\/v2\/comments?post=123"}],"version-history":[{"count":5,"href":"https:\/\/sites.wp.odu.edu\/bstap007\/wp-json\/wp\/v2\/pages\/123\/revisions"}],"predecessor-version":[{"id":337,"href":"https:\/\/sites.wp.odu.edu\/bstap007\/wp-json\/wp\/v2\/pages\/123\/revisions\/337"}],"wp:attachment":[{"href":"https:\/\/sites.wp.odu.edu\/bstap007\/wp-json\/wp\/v2\/media?parent=123"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}