{"id":344,"date":"2023-11-12T19:09:37","date_gmt":"2023-11-12T19:09:37","guid":{"rendered":"https:\/\/sites.wp.odu.edu\/celli022\/?p=344"},"modified":"2023-11-12T19:09:37","modified_gmt":"2023-11-12T19:09:37","slug":"read-this-article-https-academic-oup-com-cybersecurity-article-7-1-tyab007-6168453logintruelinks-to-an-external-site-and-write-a-summary-reaction-to-the-use-of-the-policies-in-your-jou","status":"publish","type":"post","link":"https:\/\/sites.wp.odu.edu\/celli022\/2023\/11\/12\/read-this-article-https-academic-oup-com-cybersecurity-article-7-1-tyab007-6168453logintruelinks-to-an-external-site-and-write-a-summary-reaction-to-the-use-of-the-policies-in-your-jou\/","title":{"rendered":"Read this article\u00a0https:\/\/academic.oup.com\/cybersecurity\/article\/7\/1\/tyab007\/6168453?login=trueLinks to an external site.\u00a0 and write a summary reaction to the use of the policies in your journal.\u00a0 Focus primarily on the literature review and the discussion of the findings.\u00a0"},"content":{"rendered":"\n<p>Bug bounties are a step in the right direction for software developers. Odds are a company will have a breach or be the focus of an intended breach, bug bounties allow for companies to incentivize hackers to report the bugs rather than exploit them. Bug bounties and publicizing findings give hackers a chance for publicity and financial compensation. As discussed in previous modules, these factors tend to be two of the largest motivators for hackers. This allows for a potential winning solution for both parties and can help keep user data safer.\u00a0<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Bug bounties are a step in the right direction for software developers. Odds are a company will have a breach or be the focus of an intended breach, bug bounties allow for companies to incentivize hackers to report the bugs rather than exploit them. Bug bounties and publicizing findings give hackers a chance for publicity&#8230; <\/p>\n<div class=\"link-more\"><a href=\"https:\/\/sites.wp.odu.edu\/celli022\/2023\/11\/12\/read-this-article-https-academic-oup-com-cybersecurity-article-7-1-tyab007-6168453logintruelinks-to-an-external-site-and-write-a-summary-reaction-to-the-use-of-the-policies-in-your-jou\/\">Read More<\/a><\/div>\n","protected":false},"author":27242,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":"","wds_primary_category":0},"categories":[4],"tags":[],"_links":{"self":[{"href":"https:\/\/sites.wp.odu.edu\/celli022\/wp-json\/wp\/v2\/posts\/344"}],"collection":[{"href":"https:\/\/sites.wp.odu.edu\/celli022\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/sites.wp.odu.edu\/celli022\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/celli022\/wp-json\/wp\/v2\/users\/27242"}],"replies":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/celli022\/wp-json\/wp\/v2\/comments?post=344"}],"version-history":[{"count":1,"href":"https:\/\/sites.wp.odu.edu\/celli022\/wp-json\/wp\/v2\/posts\/344\/revisions"}],"predecessor-version":[{"id":345,"href":"https:\/\/sites.wp.odu.edu\/celli022\/wp-json\/wp\/v2\/posts\/344\/revisions\/345"}],"wp:attachment":[{"href":"https:\/\/sites.wp.odu.edu\/celli022\/wp-json\/wp\/v2\/media?parent=344"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/celli022\/wp-json\/wp\/v2\/categories?post=344"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/celli022\/wp-json\/wp\/v2\/tags?post=344"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}