{"id":327,"date":"2025-11-12T21:08:28","date_gmt":"2025-11-12T21:08:28","guid":{"rendered":"https:\/\/sites.wp.odu.edu\/cyber-201s\/?page_id=327"},"modified":"2025-11-12T21:47:11","modified_gmt":"2025-11-12T21:47:11","slug":"journal-entries","status":"publish","type":"page","link":"https:\/\/sites.wp.odu.edu\/cyber-201s\/journal-entries\/","title":{"rendered":"Journal Entries"},"content":{"rendered":"\n<div class=\"wp-block-columns is-layout-flex wp-container-core-columns-layout-1 wp-block-columns-is-layout-flex\">\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:100%\">\n<div class=\"wp-block-group alignwide is-vertical is-layout-flex wp-container-core-group-layout-1 wp-block-group-is-layout-flex\"><ul class=\"wp-block-latest-posts__list has-author alignwide wp-block-latest-posts\"><li><a class=\"wp-block-latest-posts__post-title\" href=\"https:\/\/sites.wp.odu.edu\/cyber-201s\/2024\/01\/14\/journal-entry-1\/\">Journal Entry #1<\/a><div class=\"wp-block-latest-posts__post-author\">by ldavi029<\/div><div class=\"wp-block-latest-posts__post-excerpt\">Review the NICE Workforce Framework. Are there certain areas that you\u00a0would want to focus your career on? Explain which areas would appeal\u00a0the most to you and which would appeal the least. When reviewing the NICE Workforce Framework, an area I&#8217;d&#8230; <a class=\"more-link\" href=\"https:\/\/sites.wp.odu.edu\/cyber-201s\/2024\/01\/14\/journal-entry-1\/\">Continue Reading &rarr;<\/a><\/div><\/li>\n<li><a class=\"wp-block-latest-posts__post-title\" href=\"https:\/\/sites.wp.odu.edu\/cyber-201s\/2024\/01\/19\/journal-entry-2\/\">Journal Entry #2<\/a><div class=\"wp-block-latest-posts__post-author\">by ldavi029<\/div><div class=\"wp-block-latest-posts__post-excerpt\">Explain how the principles of science relate to cybersecurity. Relativism, in short, defines as all things to be related. Technology and our current social system go together hand in hand. Objectivity is needed to promote value-free explanations or results. In&#8230; <a class=\"more-link\" href=\"https:\/\/sites.wp.odu.edu\/cyber-201s\/2024\/01\/19\/journal-entry-2\/\">Continue Reading &rarr;<\/a><\/div><\/li>\n<li><a class=\"wp-block-latest-posts__post-title\" href=\"https:\/\/sites.wp.odu.edu\/cyber-201s\/2024\/01\/25\/journal-entry-3\/\">Journal Entry #3<\/a><div class=\"wp-block-latest-posts__post-author\">by ldavi029<\/div><div class=\"wp-block-latest-posts__post-excerpt\">Visit\u00a0PrivacyRights.org to\u00a0see the types of publicly available information\u00a0about data breaches. How might researchers use this information to\u00a0study breaches? This site offers an extensive range of privacy resources including law overviews, reports, and advocacy. With the use of this site you&#8217;re&#8230; <a class=\"more-link\" href=\"https:\/\/sites.wp.odu.edu\/cyber-201s\/2024\/01\/25\/journal-entry-3\/\">Continue Reading &rarr;<\/a><\/div><\/li>\n<li><a class=\"wp-block-latest-posts__post-title\" href=\"https:\/\/sites.wp.odu.edu\/cyber-201s\/2024\/01\/30\/journal-entry-4\/\">Journal Entry #4<\/a><div class=\"wp-block-latest-posts__post-author\">by ldavi029<\/div><div class=\"wp-block-latest-posts__post-excerpt\">Review Maslow\u2019s Hierarchy of Needs and explain how each level relates to your experiences with technology. Give specific examples of how your digital experiences relate to each level of need. (Elizabeth Hopper, 2020) Physiological Needs &#8211; This consists of our&#8230; <a class=\"more-link\" href=\"https:\/\/sites.wp.odu.edu\/cyber-201s\/2024\/01\/30\/journal-entry-4\/\">Continue Reading &rarr;<\/a><\/div><\/li>\n<li><a class=\"wp-block-latest-posts__post-title\" href=\"https:\/\/sites.wp.odu.edu\/cyber-201s\/2024\/02\/05\/journal-entry-5\/\">Journal Entry #5<\/a><div class=\"wp-block-latest-posts__post-author\">by ldavi029<\/div><div class=\"wp-block-latest-posts__post-excerpt\">Review the articles linked with each individual motive in the presentation page or Slide #4.\u00a0 Rank the motives from 1 to 7 as the motives that you think make the most sense (being 1) to the least sense (being 7).\u00a0&#8230; <a class=\"more-link\" href=\"https:\/\/sites.wp.odu.edu\/cyber-201s\/2024\/02\/05\/journal-entry-5\/\">Continue Reading &rarr;<\/a><\/div><\/li>\n<li><a class=\"wp-block-latest-posts__post-title\" href=\"https:\/\/sites.wp.odu.edu\/cyber-201s\/2024\/02\/18\/journal-entry-6\/\">Journal Entry #6<\/a><div class=\"wp-block-latest-posts__post-author\">by ldavi029<\/div><div class=\"wp-block-latest-posts__post-excerpt\">Can you spot three fake websites and compare the three fake websites to three real websites, plus showcase what makes the fake websites fake? Examples of fake websites include 70News, World News Report, and The Boston Tribune. While majority of&#8230; <a class=\"more-link\" href=\"https:\/\/sites.wp.odu.edu\/cyber-201s\/2024\/02\/18\/journal-entry-6\/\">Continue Reading &rarr;<\/a><\/div><\/li>\n<li><a class=\"wp-block-latest-posts__post-title\" href=\"https:\/\/sites.wp.odu.edu\/cyber-201s\/2024\/02\/20\/journal-entry-7\/\">Journal Entry #7<\/a><div class=\"wp-block-latest-posts__post-author\">by ldavi029<\/div><div class=\"wp-block-latest-posts__post-excerpt\">Review the following ten photos through a human-centered cybersecurity framework. Create a meme for your favorite three, explaining what is going on in the individual\u2019s or individuals\u2019 mind(s). https:\/\/unsplash.com\/photos\/brown-and-white-long-coated-small-dog-wearing-eyeglasses-on-black-laptop-computer-gySMaocSdqs &#8220;You can&#8217;t teach an old dog new tricks, right?&#8221; This relates&#8230; <a class=\"more-link\" href=\"https:\/\/sites.wp.odu.edu\/cyber-201s\/2024\/02\/20\/journal-entry-7\/\">Continue Reading &rarr;<\/a><\/div><\/li>\n<li><a class=\"wp-block-latest-posts__post-title\" href=\"https:\/\/sites.wp.odu.edu\/cyber-201s\/2024\/02\/28\/journal-entry-8\/\">Journal Entry #8<\/a><div class=\"wp-block-latest-posts__post-author\">by ldavi029<\/div><div class=\"wp-block-latest-posts__post-excerpt\">Watch this video and pay attention to the way that movies distort hackers. Hacker Rates 12 Hacking Scenes In Movies And TV | How Real Is It? &#8211; YouTubeLinks to an external site. After watching the video, write a journal&#8230; <a class=\"more-link\" href=\"https:\/\/sites.wp.odu.edu\/cyber-201s\/2024\/02\/28\/journal-entry-8\/\">Continue Reading &rarr;<\/a><\/div><\/li>\n<li><a class=\"wp-block-latest-posts__post-title\" href=\"https:\/\/sites.wp.odu.edu\/cyber-201s\/2024\/03\/13\/journal-entry-9\/\">Journal Entry #9<\/a><div class=\"wp-block-latest-posts__post-author\">by ldavi029<\/div><div class=\"wp-block-latest-posts__post-excerpt\">Complete the\u00a0Social Media Disorder Scale.\u00a0 How did you score?\u00a0 What do you think about the items in the scale?\u00a0 Why do you think that different patterns are found across the world? I achieved a score of 3\/9 for this assignment&#8230;. <a class=\"more-link\" href=\"https:\/\/sites.wp.odu.edu\/cyber-201s\/2024\/03\/13\/journal-entry-9\/\">Continue Reading &rarr;<\/a><\/div><\/li>\n<li><a class=\"wp-block-latest-posts__post-title\" href=\"https:\/\/sites.wp.odu.edu\/cyber-201s\/2024\/03\/22\/journal-entry-10\/\">Journal Entry #10<\/a><div class=\"wp-block-latest-posts__post-author\">by ldavi029<\/div><div class=\"wp-block-latest-posts__post-excerpt\">Read this and write a journal entry summarizing your response to the article on social cybersecurity https:\/\/www.armyupress.army.mil\/Journals\/Military-Review\/English-Edition-Archives\/Mar-Apr-2019\/117-Cybersecurity\/b\/Links to an external site. The importance of social cybersecurity has grown exponentially in the past decade. The development of technology has transformed traditional&#8230; <a class=\"more-link\" href=\"https:\/\/sites.wp.odu.edu\/cyber-201s\/2024\/03\/22\/journal-entry-10\/\">Continue Reading &rarr;<\/a><\/div><\/li>\n<li><a class=\"wp-block-latest-posts__post-title\" href=\"https:\/\/sites.wp.odu.edu\/cyber-201s\/2024\/03\/22\/journal-entry-11\/\">Journal Entry #11<\/a><div class=\"wp-block-latest-posts__post-author\">by ldavi029<\/div><div class=\"wp-block-latest-posts__post-excerpt\">Watch this\u00a0video. As you watch the video, think about how the description of the cybersecurity analyst job relates to social behaviors.\u00a0 Write a paragraph describing social themes that arise in the presentation. A cyber security analyst has a wide range&#8230; <a class=\"more-link\" href=\"https:\/\/sites.wp.odu.edu\/cyber-201s\/2024\/03\/22\/journal-entry-11\/\">Continue Reading &rarr;<\/a><\/div><\/li>\n<li><a class=\"wp-block-latest-posts__post-title\" href=\"https:\/\/sites.wp.odu.edu\/cyber-201s\/2024\/03\/28\/journal-entry-12\/\">Journal Entry #12<\/a><div class=\"wp-block-latest-posts__post-author\">by ldavi029<\/div><div class=\"wp-block-latest-posts__post-excerpt\">Read this\u00a0https:\/\/dojmt.gov\/wp-content\/uploads\/Glasswasherparts.com_.pdfLinks to an external site.\u00a0sample breach letter \u201cSAMPLE DATA BREACH NOTIFICATION\u201d and describe how two different economics theories and two different social sciences theories relate to the letter. Laissez-faire economics is an economic theory relevant to this letter. According&#8230; <a class=\"more-link\" href=\"https:\/\/sites.wp.odu.edu\/cyber-201s\/2024\/03\/28\/journal-entry-12\/\">Continue Reading &rarr;<\/a><\/div><\/li>\n<li><a class=\"wp-block-latest-posts__post-title\" href=\"https:\/\/sites.wp.odu.edu\/cyber-201s\/2024\/03\/30\/journal-entry-13\/\">Journal Entry #13<\/a><div class=\"wp-block-latest-posts__post-author\">by ldavi029<\/div><div class=\"wp-block-latest-posts__post-excerpt\">A later module addresses cybersecurity policy through a social science framework. At this point, attention can be drawn to one type of policy, known as bug bounty policies. These policies pay individuals for identifying vulnerabilities in a company\u2019s cyber infrastructure.\u00a0&#8230; <a class=\"more-link\" href=\"https:\/\/sites.wp.odu.edu\/cyber-201s\/2024\/03\/30\/journal-entry-13\/\">Continue Reading &rarr;<\/a><\/div><\/li>\n<li><a class=\"wp-block-latest-posts__post-title\" href=\"https:\/\/sites.wp.odu.edu\/cyber-201s\/2024\/04\/04\/journal-entry-14\/\">Journal Entry #14<\/a><div class=\"wp-block-latest-posts__post-author\">by ldavi029<\/div><div class=\"wp-block-latest-posts__post-excerpt\">Andriy Slynchuk has described eleven things Internet users do that may be illegal. Review what the author says and write a paragraph describing the five most serious violations and why you think those offenses are serious. The five most serious&#8230; <a class=\"more-link\" href=\"https:\/\/sites.wp.odu.edu\/cyber-201s\/2024\/04\/04\/journal-entry-14\/\">Continue Reading &rarr;<\/a><\/div><\/li>\n<li><a class=\"wp-block-latest-posts__post-title\" href=\"https:\/\/sites.wp.odu.edu\/cyber-201s\/2024\/04\/17\/journal-entry-15\/\">Journal Entry #15<\/a><div class=\"wp-block-latest-posts__post-author\">by ldavi029<\/div><div class=\"wp-block-latest-posts__post-excerpt\">Watch this video and think about how the career of digital forensics investigators relate to the social sciences. Write a journal entry describing what you think about the speaker\u2019s pathway to his career. \u2013 YouTubeLinks to an external site. After&#8230; <a class=\"more-link\" href=\"https:\/\/sites.wp.odu.edu\/cyber-201s\/2024\/04\/17\/journal-entry-15\/\">Continue Reading &rarr;<\/a><\/div><\/li>\n<\/ul><\/div>\n<\/div>\n<\/div>\n","protected":false},"excerpt":{"rendered":"","protected":false},"author":25880,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"_links":{"self":[{"href":"https:\/\/sites.wp.odu.edu\/cyber-201s\/wp-json\/wp\/v2\/pages\/327"}],"collection":[{"href":"https:\/\/sites.wp.odu.edu\/cyber-201s\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/sites.wp.odu.edu\/cyber-201s\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/cyber-201s\/wp-json\/wp\/v2\/users\/25880"}],"replies":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/cyber-201s\/wp-json\/wp\/v2\/comments?post=327"}],"version-history":[{"count":5,"href":"https:\/\/sites.wp.odu.edu\/cyber-201s\/wp-json\/wp\/v2\/pages\/327\/revisions"}],"predecessor-version":[{"id":344,"href":"https:\/\/sites.wp.odu.edu\/cyber-201s\/wp-json\/wp\/v2\/pages\/327\/revisions\/344"}],"wp:attachment":[{"href":"https:\/\/sites.wp.odu.edu\/cyber-201s\/wp-json\/wp\/v2\/media?parent=327"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}