{"id":432,"date":"2024-04-15T18:21:57","date_gmt":"2024-04-15T18:21:57","guid":{"rendered":"https:\/\/sites.wp.odu.edu\/cyse-cameron\/?p=432"},"modified":"2024-04-15T18:21:57","modified_gmt":"2024-04-15T18:21:57","slug":"journal-14","status":"publish","type":"post","link":"https:\/\/sites.wp.odu.edu\/cyse-cameron\/2024\/04\/15\/journal-14\/","title":{"rendered":"Journal #14"},"content":{"rendered":"\n<p>The five violations people do without knowing they are illegal that I believe are the most serious<br>are collecting information about children, sharing passwords, addresses, and photos of others,<br>bullying and trolling, using other people&#8217;s internet networks, and lastly Using unofficial streaming<br>services. I chose these five because they have the most potential for serious financial, personal,<br>and professional damage.<br><\/p>\n\n\n\n<p>Gathering information on children is creepy there is no information you need to know about<br>children if you do not know them. If you need the information for any reason their parents should<br>be the ones giving you that information. People do not need to ask or illegally collect information<br>about children. For children under 13, it violates the \u201cChildren\u2019s Online Protection Act\u201d which<br>bares heavy legal action if you violate it.<br><\/p>\n\n\n\n<p>Sharing passwords, addresses, and photos of others can be another risky illegal act. Sharing<br>people&#8217;s addresses, especially with the intent to harm is illegal, as well as posting a photo of<br>someone that was taken on privet property without their consent. In addition, sharing people&#8217;s<br>passwords without their consent is also illegal, but it can also get the person hacked and they<br>could lose all their personal information and this could cause various bad things for them. For<br>example, they could have their bank hacked, have their information leaked out to even more<br>people, and many other things could happen to them.<br><\/p>\n\n\n\n<p>Applications that people communicate on and individual people have the authority to take action<br>against cyberbullying. Now that more and more people have access to the internet people are at<br>a greater risk of being cyberbullied so it is becoming more of a problem. With the increasing<br>problem of cyberbullying people have been more physically and mentally hurt by this problem,<br>so the amount of legal action you can take has been increasing with it.<br><\/p>\n\n\n\n<p>Stealing people&#8217;s WIFI that they solely pay for without their permission is illegal. However, it is<br>also dangerous too. If you do not know whose internet you are on your data could be at risk. If<br>you were able to access their WIFI it is possible someone else could be too, and this could lead<br>to you getting hacked because you are sharing the same network connection which makes it so<br>much easier for the hacker. The hacker could even be the one hosting the WIFI connection.<br><\/p>\n\n\n\n<p>Using unofficial streaming services is illegal because it is stealing content made by someone<br>else and streaming it most of the time for free. Connecting to these services could be dangerous<br>for you as well. These services are stealing content or data from other services, so they most<br>likely are stealing yours as well. These services taking your data could cause many problems<br>that take a long time to fix.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>The five violations people do without knowing they are illegal that I believe are the most seriousare collecting information about children, sharing passwords, addresses, and photos of others,bullying and trolling, using other people&#8217;s internet networks, and lastly Using unofficial streamingservices. I chose these five because they have the most potential for serious financial, personal,and professional&#8230; <\/p>\n<div class=\"link-more\"><a href=\"https:\/\/sites.wp.odu.edu\/cyse-cameron\/2024\/04\/15\/journal-14\/\">Read More<\/a><\/div>\n","protected":false},"author":28195,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":"","wds_primary_category":0},"categories":[6],"tags":[],"_links":{"self":[{"href":"https:\/\/sites.wp.odu.edu\/cyse-cameron\/wp-json\/wp\/v2\/posts\/432"}],"collection":[{"href":"https:\/\/sites.wp.odu.edu\/cyse-cameron\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/sites.wp.odu.edu\/cyse-cameron\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/cyse-cameron\/wp-json\/wp\/v2\/users\/28195"}],"replies":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/cyse-cameron\/wp-json\/wp\/v2\/comments?post=432"}],"version-history":[{"count":1,"href":"https:\/\/sites.wp.odu.edu\/cyse-cameron\/wp-json\/wp\/v2\/posts\/432\/revisions"}],"predecessor-version":[{"id":433,"href":"https:\/\/sites.wp.odu.edu\/cyse-cameron\/wp-json\/wp\/v2\/posts\/432\/revisions\/433"}],"wp:attachment":[{"href":"https:\/\/sites.wp.odu.edu\/cyse-cameron\/wp-json\/wp\/v2\/media?parent=432"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/cyse-cameron\/wp-json\/wp\/v2\/categories?post=432"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/cyse-cameron\/wp-json\/wp\/v2\/tags?post=432"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}