{"id":200,"date":"2024-01-25T01:21:40","date_gmt":"2024-01-25T01:21:40","guid":{"rendered":"https:\/\/sites.wp.odu.edu\/cyber-201s\/?p=200"},"modified":"2025-11-12T20:53:57","modified_gmt":"2025-11-12T20:53:57","slug":"journal-entry-3","status":"publish","type":"post","link":"https:\/\/sites.wp.odu.edu\/cyber-201s\/2024\/01\/25\/journal-entry-3\/","title":{"rendered":"Journal Entry #3"},"content":{"rendered":"\n<p>Visit\u00a0PrivacyRights.org to\u00a0see the types of publicly available information\u00a0about data breaches. How might researchers use this information to\u00a0study breaches?<\/p>\n\n\n\n<p>This site offers an extensive range of privacy resources including law overviews, reports, and advocacy. With the use of this site you&#8217;re able to advance search information by state as well as view statistics and data on breaches that have occurred in the past. The information recorded can be utilized as a guide for preventing further breaches. Our ability to stay one step ahead can be enhanced by understanding how these breaches occurred and by looking for any patterns or similarities that may exist. Overall, this site provides important information that can aid researchers in educating others and learning more about data breaches and how we can prevent them.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Visit\u00a0PrivacyRights.org to\u00a0see the types of publicly available information\u00a0about data breaches. How might researchers use this information to\u00a0study breaches? This site offers an extensive range of privacy resources including law overviews, reports, and advocacy. With the use of this site you&#8217;re&#8230; <a class=\"more-link\" href=\"https:\/\/sites.wp.odu.edu\/cyber-201s\/2024\/01\/25\/journal-entry-3\/\">Continue Reading &rarr;<\/a><\/p>\n","protected":false},"author":25880,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":"","wds_primary_category":0},"categories":[5],"tags":[],"_links":{"self":[{"href":"https:\/\/sites.wp.odu.edu\/cyber-201s\/wp-json\/wp\/v2\/posts\/200"}],"collection":[{"href":"https:\/\/sites.wp.odu.edu\/cyber-201s\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/sites.wp.odu.edu\/cyber-201s\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/cyber-201s\/wp-json\/wp\/v2\/users\/25880"}],"replies":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/cyber-201s\/wp-json\/wp\/v2\/comments?post=200"}],"version-history":[{"count":1,"href":"https:\/\/sites.wp.odu.edu\/cyber-201s\/wp-json\/wp\/v2\/posts\/200\/revisions"}],"predecessor-version":[{"id":201,"href":"https:\/\/sites.wp.odu.edu\/cyber-201s\/wp-json\/wp\/v2\/posts\/200\/revisions\/201"}],"wp:attachment":[{"href":"https:\/\/sites.wp.odu.edu\/cyber-201s\/wp-json\/wp\/v2\/media?parent=200"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/cyber-201s\/wp-json\/wp\/v2\/categories?post=200"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/cyber-201s\/wp-json\/wp\/v2\/tags?post=200"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}