{"id":279,"date":"2022-09-24T01:34:06","date_gmt":"2022-09-24T01:34:06","guid":{"rendered":"https:\/\/sites.wp.odu.edu\/cyberc201cyse\/?p=279"},"modified":"2022-09-24T01:34:09","modified_gmt":"2022-09-24T01:34:09","slug":"module-1-second-discussion-reposting","status":"publish","type":"post","link":"https:\/\/sites.wp.odu.edu\/cyberc201cyse\/2022\/09\/24\/module-1-second-discussion-reposting\/","title":{"rendered":"Module 1 Second Discussion \u2013 Reposting"},"content":{"rendered":"\n<p>I would think about working as an intelligence analyst, a political scientist, or a financial analyst if I wanted to pursue a career in social science. As an intelligence analyst, I would collect and examine information to generate intelligence that was pertinent to the government agency or business I could be working for. Their decision-making would be improved by this intelligence. To better society, I would collect and evaluate social data as a political scientist and develop political ideas. In my role as a financial analyst, I would examine financial data through a social lens to identify methods to enhance societal economic circumstances. These three professions pique my curiosity the most since they would provide me with the opportunity to make a major contribution to society. With the aid of modern technology, I can examine more data and disseminate information in ways that were not possible before the advent of contemporary hardware.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>I would think about working as an intelligence analyst, a political scientist, or a financial analyst if I wanted to pursue a career in social science. As an intelligence analyst, I would collect and examine information to generate intelligence that was pertinent to the government agency or business I could be working for. Their decision-making&#8230; <\/p>\n<div class=\"link-more\"><a href=\"https:\/\/sites.wp.odu.edu\/cyberc201cyse\/2022\/09\/24\/module-1-second-discussion-reposting\/\">Read More<\/a><\/div>\n","protected":false},"author":21987,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":"","wds_primary_category":0},"categories":[1],"tags":[],"_links":{"self":[{"href":"https:\/\/sites.wp.odu.edu\/cyberc201cyse\/wp-json\/wp\/v2\/posts\/279"}],"collection":[{"href":"https:\/\/sites.wp.odu.edu\/cyberc201cyse\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/sites.wp.odu.edu\/cyberc201cyse\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/cyberc201cyse\/wp-json\/wp\/v2\/users\/21987"}],"replies":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/cyberc201cyse\/wp-json\/wp\/v2\/comments?post=279"}],"version-history":[{"count":2,"href":"https:\/\/sites.wp.odu.edu\/cyberc201cyse\/wp-json\/wp\/v2\/posts\/279\/revisions"}],"predecessor-version":[{"id":288,"href":"https:\/\/sites.wp.odu.edu\/cyberc201cyse\/wp-json\/wp\/v2\/posts\/279\/revisions\/288"}],"wp:attachment":[{"href":"https:\/\/sites.wp.odu.edu\/cyberc201cyse\/wp-json\/wp\/v2\/media?parent=279"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/cyberc201cyse\/wp-json\/wp\/v2\/categories?post=279"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/cyberc201cyse\/wp-json\/wp\/v2\/tags?post=279"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}