{"id":333,"date":"2024-04-17T17:18:11","date_gmt":"2024-04-17T17:18:11","guid":{"rendered":"https:\/\/sites.wp.odu.edu\/carevc201cyse\/?page_id=333"},"modified":"2024-04-17T17:43:05","modified_gmt":"2024-04-17T17:43:05","slug":"journal-entry-14","status":"publish","type":"page","link":"https:\/\/sites.wp.odu.edu\/carevc201cyse\/journal-entry-14\/","title":{"rendered":"Journal Entry 14"},"content":{"rendered":"\n<p>Christian Arevalo<\/p>\n\n\n\n<p>Professor Yalpi<\/p>\n\n\n\n<p>CYSE201s<\/p>\n\n\n\n<p>10 April 2024<\/p>\n\n\n\n<p>Journal Entry Fourteen<\/p>\n\n\n\n<p>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; According to Andriy Slynchuk the eleven most illegal things we do online are using unofficial streaming services, using torrent services, using copyrighted images, sharing passwords, addresses, or photos of others, bullying, recording VoIP calls without permission, faking your identity, using other people\u2019s networks, collecting information about children, extracting audio from YouTube, illegal searches on the internet.<\/p>\n\n\n\n<p>\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 I think that the five most serious violations are faking your identity online, bullying, using other people&#8217;s networks, sharing addresses and photos of others, and collecting information about children. I think these are serious because faking your identity could mean lying about your age to get into age-restricted websites. Bullying is serious no matter if it\u2019s online or real life. Using another person\u2019s network could lead to the possibility of information leaks. Sharing other\u2019s information without their permission could put that person in danger. Finally Collecting information about children is very predatory and creepy.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Christian Arevalo Professor Yalpi CYSE201s 10 April 2024 Journal Entry Fourteen &nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; According to Andriy Slynchuk the eleven most illegal things we do online are using unofficial streaming services, using torrent services, using copyrighted images, sharing passwords, addresses, or photos of others, bullying, recording VoIP calls without permission, faking your identity, using other people\u2019s networks,&#8230; <\/p>\n<div class=\"link-more\"><a href=\"https:\/\/sites.wp.odu.edu\/carevc201cyse\/journal-entry-14\/\">Read More<\/a><\/div>\n","protected":false},"author":28453,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"_links":{"self":[{"href":"https:\/\/sites.wp.odu.edu\/carevc201cyse\/wp-json\/wp\/v2\/pages\/333"}],"collection":[{"href":"https:\/\/sites.wp.odu.edu\/carevc201cyse\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/sites.wp.odu.edu\/carevc201cyse\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/carevc201cyse\/wp-json\/wp\/v2\/users\/28453"}],"replies":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/carevc201cyse\/wp-json\/wp\/v2\/comments?post=333"}],"version-history":[{"count":3,"href":"https:\/\/sites.wp.odu.edu\/carevc201cyse\/wp-json\/wp\/v2\/pages\/333\/revisions"}],"predecessor-version":[{"id":399,"href":"https:\/\/sites.wp.odu.edu\/carevc201cyse\/wp-json\/wp\/v2\/pages\/333\/revisions\/399"}],"wp:attachment":[{"href":"https:\/\/sites.wp.odu.edu\/carevc201cyse\/wp-json\/wp\/v2\/media?parent=333"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}