{"id":31,"date":"2025-09-09T20:03:19","date_gmt":"2025-09-09T20:03:19","guid":{"rendered":"http:\/\/totesa.website\/student\/?page_id=31"},"modified":"2025-11-20T16:29:34","modified_gmt":"2025-11-20T16:29:34","slug":"about-me","status":"publish","type":"page","link":"https:\/\/sites.wp.odu.edu\/cyse201swaller\/","title":{"rendered":"About Me"},"content":{"rendered":"<p>My name is Jacob Waller, I&#8217;m a cyber security major at Old Dominion University. Ive recently started my sophomore year. This year my mind is a lot different looking into cyber security instead of thinking of assignment as a con or a stick in the mud, Im going to look at them as an opportunity to grow and really immerse with the problem at hand. I want to become so good at my job that I can recreate a solution in every way fit needed. I want to be able to help my companions as well as help myself. Im a very team oriented individual and I&#8217;m very sensible or extroverted some would say. I believe this a skill some may lack in my field which I use as an advantage, what solution can be found if you can&#8217;t speak to a person to hear the problem?<\/p>\n\n\n<figure class=\"wp-block-image size-large\"><a href=\"http:\/\/sites.wp.odu.edu\/cyse201swaller\/wp-content\/uploads\/sites\/39576\/2025\/09\/IMG_0666-scaled.jpeg\"><img loading=\"lazy\" decoding=\"async\" width=\"768\" height=\"1024\" src=\"http:\/\/sites.wp.odu.edu\/cyse201swaller\/wp-content\/uploads\/sites\/39576\/2025\/09\/IMG_0666-768x1024.jpeg\" alt=\"\" class=\"wp-image-233\" srcset=\"https:\/\/sites.wp.odu.edu\/cyse201swaller\/wp-content\/uploads\/sites\/39576\/2025\/09\/IMG_0666-768x1024.jpeg 768w, https:\/\/sites.wp.odu.edu\/cyse201swaller\/wp-content\/uploads\/sites\/39576\/2025\/09\/IMG_0666-225x300.jpeg 225w, https:\/\/sites.wp.odu.edu\/cyse201swaller\/wp-content\/uploads\/sites\/39576\/2025\/09\/IMG_0666-1152x1536.jpeg 1152w, https:\/\/sites.wp.odu.edu\/cyse201swaller\/wp-content\/uploads\/sites\/39576\/2025\/09\/IMG_0666-1536x2048.jpeg 1536w, https:\/\/sites.wp.odu.edu\/cyse201swaller\/wp-content\/uploads\/sites\/39576\/2025\/09\/IMG_0666-630x840.jpeg 630w, https:\/\/sites.wp.odu.edu\/cyse201swaller\/wp-content\/uploads\/sites\/39576\/2025\/09\/IMG_0666-960x1280.jpeg 960w, https:\/\/sites.wp.odu.edu\/cyse201swaller\/wp-content\/uploads\/sites\/39576\/2025\/09\/IMG_0666-scaled.jpeg 1920w\" sizes=\"(max-width: 768px) 100vw, 768px\" \/><\/a><\/figure>\n\n\n\n<h2 class=\"wp-block-heading\">Week 1 &#8211; Journal Entry<\/h2>\n\n\n\n<p>After reviewing the NICE framework and the work role categories in a cyber security setting I now know, work role categories include Oversight and governance(OG), Design and development(DD), Implementation and Operation (IO), Protection and Defense(PD), Investigation(IN). Class Journal entry includes: After reviewing the NICE workforce framework. My preference would be to oversight and govern the whole operation. I believe the leader should be someone who is outgoing and can speak to<br>his team aiding them on the operation. Another role that strikes my interest is the protection and<br>defense. They are responsible for looking at different cyber security tools and using them to find<br>how to mitigate attacks. I&#8217;m not a big fan of the design and development, I feel its a very strict<br>rule that can go south very easily with a lack of information and policies. The NICE framework is<br>very interesting as a whole. I hope to learn more.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Week 2 &#8211; Journal Entry 2<\/h2>\n\n\n\n<p>How does the principle of empiricism enhance the effectiveness of cybersecurity practices? Reflect on how empirical data collection and analysis can help identify emerging threats, assess the effectiveness of current security measures, and guide the development of new strategies to protect information systems. <\/p>\n\n\n\n<p>Empiricism is the philosophical approach that involves looking at previous outcomes or<br>sensory observations and use them as a primary source or knowledge. In cyber security<br>we do the same thing using real world data to predict or prevent threats such as logs<br>and incident reports rather than waiting for theoretical assumptions. This can be used to<br>develop an entirely new defense protocol if used the right way. Threat detection,<br>vulnerability assessment, incident response and a malware analysis all of these are<br>uses of empirical data using background knowledge to seize a threat. The world is<br>already becoming more dangerous behind closed doors, using technology and other<br>methods with the technology we are more prepared than even to stop a threat.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Week 3 &#8211; Journal Entry 3-Visit&nbsp;<a href=\"https:\/\/privacyrights.org\/\" target=\"_blank\" rel=\"noreferrer noopener\">PrivacyRights.orgLinks to an external site.<\/a>&nbsp;to&nbsp;see the types of publicly available information&nbsp;about data breaches. How might researchers use this information to&nbsp;study breaches and forecast future data breach trends ? Enter a paragraph in your journal.<\/h2>\n\n\n\n<p>A researcher may use the following publicly displayed information for numerous<br>methods. They use key points such as the privacy rights of the company hacked, the<br>company size and what was attacked. They then will look for trends using the following<br>data. Following a trend is often a common solution when trying to find information.<br>Along with these trends, researchers find patterns within the phishing method which<br>often leads to the antagonist making a mistake or leaving a footprint as to what software<br>was used for the attack. Another way researchers may use this information to study<br>breaches is looking at the humanity side and seeing if anyone had a victim role into<br>attacking the software.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Week 4 &#8211; Journal Entry 4-Review Maslow\u2019s Hierarchy of Needs and explain how each level relates to your experiences with technology.<\/h2>\n\n\n\n<p>After reviewing Maslow&#8217;s hierarchy of needs I believe the way you perceive it depends on the<br>person\u2019s perspective. Using it in a technological sense a person only needs a source of power,<br>a screen and whatever information they are trying to display. Those are the actual needs, no<br>special modifications. That goes at the bottom but someone else may not even think of a basic<br>need, they may even say they need the most expensive monitor out for all the bells and<br>whistles. That&#8217;s not a need. As for me I believe I would need a good monitor for a basic need for<br>the games I play because I play high fps shooter. As for the next safety needs, instead of a<br>basic power strip, I invested in a surge protector.<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><a href=\"https:\/\/sites.wp.odu.edu\/cyse201swaller\/wp-content\/uploads\/sites\/39576\/2025\/10\/hierarchy-of-needs-maslow.jpg\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"762\" src=\"https:\/\/sites.wp.odu.edu\/cyse201swaller\/wp-content\/uploads\/sites\/39576\/2025\/10\/hierarchy-of-needs-maslow-1024x762.jpg\" alt=\"\" class=\"wp-image-254\" srcset=\"https:\/\/sites.wp.odu.edu\/cyse201swaller\/wp-content\/uploads\/sites\/39576\/2025\/10\/hierarchy-of-needs-maslow-1024x762.jpg 1024w, https:\/\/sites.wp.odu.edu\/cyse201swaller\/wp-content\/uploads\/sites\/39576\/2025\/10\/hierarchy-of-needs-maslow-300x223.jpg 300w, https:\/\/sites.wp.odu.edu\/cyse201swaller\/wp-content\/uploads\/sites\/39576\/2025\/10\/hierarchy-of-needs-maslow-768x571.jpg 768w, https:\/\/sites.wp.odu.edu\/cyse201swaller\/wp-content\/uploads\/sites\/39576\/2025\/10\/hierarchy-of-needs-maslow-403x300.jpg 403w, https:\/\/sites.wp.odu.edu\/cyse201swaller\/wp-content\/uploads\/sites\/39576\/2025\/10\/hierarchy-of-needs-maslow.jpg 1344w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><\/a><\/figure>\n\n\n\n<h2 class=\"wp-block-heading\">Week 5 &#8211; Journal Entry 5- &nbsp; Rank the motives from 1 to 8 as the motives that you think make the most sense (being 1) to the least sense (being 8).<\/h2>\n\n\n\n<p>I rank the following motives from making the most sense to least sense in the order of.<br><strong>1. Money<\/strong>&#8211; I believe putting money has the motive that makes the most sense because that the default for<br>any criminal in today\u2019s world.<br><strong>2. Revenge<\/strong>&#8211; I believe revenge is a close second to money because we as humans are very selfish people<br>naturally. When other people make us upset we tend to let our emotions get the best of us except usually when people are in person and more in their right mind knowing not to do something.<br><strong>3. Political<\/strong>&#8211; Political being a motive I believe should be in any criminal background check reviewing a<br>criminal case. The way the world is, policitics have a lot of power this can be a motive for anyone whos not in the same political party. Even a person who just wants to get back at the \u201chigher ups\u201d of the world.<br><strong>4. Multiple reasons<\/strong>&#8211; I believe this piggy backs off of those who want to \u201cstick it to the man\u201d(Kacy Zurkus.)<br>5. Recognition- Recognition falls similar to multiple reasons, why commit a crime and then want people to know you did it. Legacy? Fame? What legacy is behind bars, this is why it is so low on the list.<br>6. Curiosity &#8211; Curiosity may be one of the worst reasons to commit a cyber crime but I can see how the Curiosity of the human mind may can play a part in this.<br><strong>7. Entertainment<\/strong>&#8211; Multipl groups who have this motive are often larger, they have become to powerful in a<br>Hacker world they believe the realworld cant touch them so they begin playing games with their crimes. I would<br>Infer that a larger hacker group would go for the biggest targets in the world but they dont.<br><strong>8. Boredom<\/strong>&#8211; Boredom is excactly how it sounds, why would you risk you life committing crime out of<br>boredom. Thats like a millionaire trying out bank robbing for the first time because he wants to know how he can become one. The millionair felt boredom then curiosity because boredom makes no sense. So you must put another label or reason.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Article review #1-social science cybersecurity studies from two different journals in this semester.&nbsp; &nbsp;<\/h2>\n\n\n\n<div data-wp-interactive=\"\" class=\"wp-block-file\"><object data-wp-bind--hidden=\"!selectors.core.file.hasPdfPreview\" hidden class=\"wp-block-file__embed\" data=\"https:\/\/sites.wp.odu.edu\/cyse201swaller\/wp-content\/uploads\/sites\/39576\/2025\/10\/Article-review-1.pdf\" type=\"application\/pdf\" style=\"width:100%;height:600px\" aria-label=\"Embed of Article-review-1.\"><\/object><a id=\"wp-block-file--media-a8b41a91-9d89-426c-9a7a-22f4ac824b29\" href=\"https:\/\/sites.wp.odu.edu\/cyse201swaller\/wp-content\/uploads\/sites\/39576\/2025\/10\/Article-review-1.pdf\">Article-review-1<\/a><a href=\"https:\/\/sites.wp.odu.edu\/cyse201swaller\/wp-content\/uploads\/sites\/39576\/2025\/10\/Article-review-1.pdf\" class=\"wp-block-file__button wp-element-button\" download aria-describedby=\"wp-block-file--media-a8b41a91-9d89-426c-9a7a-22f4ac824b29\">Download<\/a><\/div>\n\n\n\n<h2 class=\"wp-block-heading\">Week 6 &#8211; Journal Entry 6<\/h2>\n\n\n\n<p>For week 6 we watched a YouTube video and wrote about what we thought about the &#8220;human firewall.&#8221; A security that revolved around social cybersecurity being the first line of defense. Below is my entry about the data we received.<\/p>\n\n\n\n<p>A big risk is being able to run cyber crimes through an AI algorithm. The internet is<br>global, most hackers are hiked by nation states, they are attacking\/defending. Lots of money<br>involved. After watching the video I believe a Human Fire wall is critical in a cyber security<br>setting. AI is developing faster than we can imagine. They adapt very quickly to software but<br>against a human who is trained correctly to see any incorrect information it is no match.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Week 7 &#8211; Journal Entry 7<\/h2>\n\n\n\n<p>For Journal entry 7 we were instructed to create memes about a human-centered cybersecurity frame work picture.<\/p>\n\n\n\n<p>Explanation relates to Human-centered Cybersecurity: They are all mutually<br>hacking on their computers, sometimes hacking may require an extra set of eyes from a<br>coworker.<br>Photo #13-MEME-\u201dwhen my friend\u2019s parlay is about to hit so he invites me to watch his<br>succession\u201d<br>Explanation relates to Human-centered Cybersecurity: This is another example of<br>multiple users being on one screen, perhaps to back the other\u2019s technique solving the<br>conflict.<br>Photo#12-MEME- \u201d Me looking at my 3 screen setup after christmas morning(this is<br>amazing)\u201d<br>Explanation relates to Human-centered Cybersecurity: This is an example of a<br>hacker or cyber security worker using 3 screens to review a very large code.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Week 8 &#8211; Journal Entry 8- write a journal entry about how you think the media influences our understanding about cybersecurity<\/h2>\n\n\n\n<p>I believe social media has revolutionized cyber security forever. With the effect that the media<br>has influenced simple things in our daily lives that involve cyber security. Instagram, snap chat,<br>face book and other social media platforms now force the user to make a 2factor security pass<br>code or method. Hacking is such a common use of social media now, a person can wake up<br>with their account hacked and now that hacker has all the data of their friends, messages and<br>pictures. We also see an influence in Artificial intelligence, social media has become so realistic<br>that Ai is now being used to catfish as important leaders of the world doing illegal things, there<br>has to be a line that needs to be drawn.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Article Review #2<\/h2>\n\n\n\n<div data-wp-interactive=\"\" class=\"wp-block-file\"><object data-wp-bind--hidden=\"!selectors.core.file.hasPdfPreview\" hidden class=\"wp-block-file__embed\" data=\"https:\/\/sites.wp.odu.edu\/cyse201swaller\/wp-content\/uploads\/sites\/39576\/2025\/11\/Article-review-2.pdf\" type=\"application\/pdf\" style=\"width:100%;height:600px\" aria-label=\"Embed of Article-review-2.\"><\/object><a id=\"wp-block-file--media-43a1d6f8-34de-456f-8df3-e9922b01815e\" href=\"https:\/\/sites.wp.odu.edu\/cyse201swaller\/wp-content\/uploads\/sites\/39576\/2025\/11\/Article-review-2.pdf\">Article-review-2<\/a><a href=\"https:\/\/sites.wp.odu.edu\/cyse201swaller\/wp-content\/uploads\/sites\/39576\/2025\/11\/Article-review-2.pdf\" class=\"wp-block-file__button wp-element-button\" download aria-describedby=\"wp-block-file--media-43a1d6f8-34de-456f-8df3-e9922b01815e\">Download<\/a><\/div>\n\n\n\n<h2 class=\"wp-block-heading\">Cybersecurity Professional Career Paper<\/h2>\n\n\n\n<div data-wp-interactive=\"\" class=\"wp-block-file\"><object data-wp-bind--hidden=\"!selectors.core.file.hasPdfPreview\" hidden class=\"wp-block-file__embed\" data=\"https:\/\/sites.wp.odu.edu\/cyse201swaller\/wp-content\/uploads\/sites\/39576\/2025\/11\/Cybersecurity-Professional-Career-Paper.pdf\" type=\"application\/pdf\" style=\"width:100%;height:600px\" aria-label=\"Embed of Cybersecurity-Professional-Career-Paper.\"><\/object><a id=\"wp-block-file--media-53c4b447-5e2e-4197-b43f-bbca9008fe6f\" href=\"https:\/\/sites.wp.odu.edu\/cyse201swaller\/wp-content\/uploads\/sites\/39576\/2025\/11\/Cybersecurity-Professional-Career-Paper.pdf\">Cybersecurity-Professional-Career-Paper<\/a><a href=\"https:\/\/sites.wp.odu.edu\/cyse201swaller\/wp-content\/uploads\/sites\/39576\/2025\/11\/Cybersecurity-Professional-Career-Paper.pdf\" class=\"wp-block-file__button wp-element-button\" download aria-describedby=\"wp-block-file--media-53c4b447-5e2e-4197-b43f-bbca9008fe6f\">Download<\/a><\/div>\n\n\n\n<h2 class=\"wp-block-heading\">Week 9 &#8211; Journal Entry 9<\/h2>\n\n\n\n<p>For week 9 we were to take a social media usage quiz and analyze our answers based off of the test below.<\/p>\n\n\n\n<div data-wp-interactive=\"\" class=\"wp-block-file\"><object data-wp-bind--hidden=\"!selectors.core.file.hasPdfPreview\" hidden class=\"wp-block-file__embed\" data=\"https:\/\/sites.wp.odu.edu\/cyse201swaller\/wp-content\/uploads\/sites\/39576\/2025\/10\/Social-Media-Disorder-Scale.pdf\" type=\"application\/pdf\" style=\"width:100%;height:600px\" aria-label=\"Embed of Social-Media-Disorder-Scale.\"><\/object><a id=\"wp-block-file--media-85635c10-ae41-48d9-8323-da280202ff7b\" href=\"https:\/\/sites.wp.odu.edu\/cyse201swaller\/wp-content\/uploads\/sites\/39576\/2025\/10\/Social-Media-Disorder-Scale.pdf\">Social-Media-Disorder-Scale<\/a><a href=\"https:\/\/sites.wp.odu.edu\/cyse201swaller\/wp-content\/uploads\/sites\/39576\/2025\/10\/Social-Media-Disorder-Scale.pdf\" class=\"wp-block-file__button wp-element-button\" download aria-describedby=\"wp-block-file--media-85635c10-ae41-48d9-8323-da280202ff7b\">Download<\/a><\/div>\n\n\n\n<p><mark class=\"has-inline-color has-vivid-red-color\">How did you score?<\/mark> I scored a 1 on the social media disorder scale.<br><mark class=\"has-inline-color has-vivid-red-color\">What do you think about the items in the scale? <\/mark><\/p>\n\n\n\n<p>I don&#8217;t think the options are extreme at all. People generally do use social media too much and for the wrong reasons. They think social media is a need. As far as needing to lie to their parents or friends about how much they use it.<br><mark class=\"has-inline-color has-vivid-red-color\">Why do you think that different patterns are found across the world?<\/mark><br>I think places with less technology will naturally be on social media less. Larger<br>technological advanced countries will naturally have a large social media usage pattern.<br>When we think of smaller places with less social media usage we may think of the<br>middle east countries, versus a larger country like America the usage will be spiked.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Week 10 &#8211; Journal Entry 10-<\/h2>\n\n\n\n<p>Read this and write a journal entry summarizing your response to the article on social cybersecurity<\/p>\n\n\n\n<p>&nbsp;<a href=\"https:\/\/www.sciencedirect.com\/science\/article\/pii\/S2451958825000831\" target=\"_blank\" rel=\"noreferrer noopener\">https:\/\/www.sciencedirect.com\/science\/article\/pii\/S2451958825000831Links to an external site.<\/a>&nbsp;<\/p>\n\n\n\n<p>Social cybersecurity is a field centered around human factors. They strive to<br>protect individuals and organizations from threats emanating from social manipulation<br>and malicious digital activities. Below are 6 reasons humans are often identified as the<br>weakest link in cybersecurity.<br>1.The inherent human struggle with effective risk perception and analysis.<br>2.The inadequacy of human intuition for processing infrequent events.<br>3.The perilous overreliance and unwarranted trust people place in computers.<br>4.The impractical expectation for consistent, intelligent security decisions by<br>everyone.<br>5.The frequent origination of security breaches from malicious insiders.<br>6.The commonplace and seemingly effortless occurrences of security lapses due<br>to social engineering.<br>Social cybersecurity merges applied research in computational science with<br>computational social science techniques to discern, counter, and understand threats<br>associated with social communication.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Week 10 &#8211; Journal Entry 11-Write a paragraph describing social themes that arise in the presentation.<\/h2>\n\n\n\n<p>The role of a cybersecurity analyst intersects deeply with social behaviors, revealing<br>themes of trust, vigilance, and collective responsibility. Cyber security analysts must anticipate<br>and respond to human tendencies\u2014such as susceptibility to phishing, oversharing on social<br>media, or neglecting security protocols\u2014that often become entry points for cyber threats. An<br>example of this would be when you receive an unknown call. Apple\u2019s security will give the option<br>to turn it to voice mail because calls like this are dangerous. Cybersecurity is not just a technical<br>challenge but a social one, requiring empathy, communication, and an understanding of human<br>nature. Human centered cyber security is a very undermined task. A computer cannot defend a<br>malicious act styled specifically for that computer. We need human analyst to work along side<br>the computer security, a \u201chuman firewall\u201d.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Week 11 &#8211; Journal Entry 12-Read this\u00a0<a href=\"https:\/\/dojmt.gov\/wp-content\/uploads\/Glasswasherparts.com_.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">https:\/\/dojmt.gov\/wp-content\/uploads\/Glasswasherparts.com_.pdfLinks to an external site.<\/a>\u00a0sample breach letter \u201cSAMPLE DATA BREACH NOTIFICATION\u201d and describe how two different economics theories and two different psychological social sciences theories relate to the letter.<\/h2>\n\n\n\n<p>The breach letter illustrates how economic theories like Information Asymmetry and<br>Externalities, and psychological theories like Protection Motivation Theory and Cognitive<br>Dissonance, help explain consumer and organizational behavior in response to cybersecurity<br>incidents. PMT explains how individuals respond to threats based on perceived severity,<br>vulnerability, and efficacy of coping strategies.In the breach letter, the company outlines the<br>severity of the intrusion (malware accessing payment card data), vulnerability (customers<br>affected during transactions), and coping strategies (monitoring accounts, replacing<br>cards). Cognitive Dissonance Theory on the other hand, This theory suggests that<br>people suggests that people experience discomfort experience discomfort when their<br>beliefs when their beliefs conflict with new conflict with new information. The economic<br>theories change the framework completely. Information AsymInformation Asymmetry,<br>This occurs when one party has when one party has more or better information more or<br>better information than the other. than the other.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Week 11 &#8211; Journal Entry 13<\/h2>\n\n\n\n<p>Policy vs. Practice Gap: Many organizations have policies on paper but fail to<br>enforce them consistently. This disconnect can leave systems vulnerable despite<br>having a framework in place.<br>\u25cf Adaptability Issues: Cyber threats evolve rapidly, and static policies may become<br>obsolete. Effective policies must be dynamic and regularly updated.<br>\u25cf Human Factors: Policies often overlook the role of user behavior. Without proper<br>training and awareness, even the best policies can be undermined by human error.<br>\u25cf Regulatory Pressure: Compliance-driven policies may prioritize checkbox<br>adherence over actual security outcomes, which can dilute their effectiveness.<br>Cybersecurity policies are a foundational tool, but their success depends on<br>implementation, organizational culture, and continuous improvement. The article<br>likely advocates for a more integrated, proactive approach that aligns<br>technical controls with human and organizational factors.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Week 12 &#8211; Journal Entry 14-<a href=\"https:\/\/clario.co\/blog\/illegal-things-you-do-online\/\" target=\"_blank\" rel=\"noreferrer noopener\">Andriy\u00a0site.Slynchuk.<\/a>has described eleven things Internet users do that may be illegal. Review what the author says and write a paragraph describing the five most serious violations and why you think those offenses are serious.<\/h2>\n\n\n\n<figure class=\"wp-block-image size-full\"><a href=\"https:\/\/sites.wp.odu.edu\/cyse201swaller\/wp-content\/uploads\/sites\/39576\/2025\/11\/image-bc89f271-b70d-4354-8f97-15c189c4f138.png\"><img loading=\"lazy\" decoding=\"async\" width=\"637\" height=\"365\" src=\"https:\/\/sites.wp.odu.edu\/cyse201swaller\/wp-content\/uploads\/sites\/39576\/2025\/11\/image-bc89f271-b70d-4354-8f97-15c189c4f138.png\" alt=\"\" class=\"wp-image-271\" srcset=\"https:\/\/sites.wp.odu.edu\/cyse201swaller\/wp-content\/uploads\/sites\/39576\/2025\/11\/image-bc89f271-b70d-4354-8f97-15c189c4f138.png 637w, https:\/\/sites.wp.odu.edu\/cyse201swaller\/wp-content\/uploads\/sites\/39576\/2025\/11\/image-bc89f271-b70d-4354-8f97-15c189c4f138-300x172.png 300w, https:\/\/sites.wp.odu.edu\/cyse201swaller\/wp-content\/uploads\/sites\/39576\/2025\/11\/image-bc89f271-b70d-4354-8f97-15c189c4f138-524x300.png 524w\" sizes=\"(max-width: 637px) 100vw, 637px\" \/><\/a><\/figure>\n\n\n\n<p>Collecting information about people younger than 13 is wrong because it violates child<br>protection laws like COPPA and exploits the vulnerability of minors who cannot give informed<br>consent. Similarly, faking your identity online undermines trust, spreads misinformation, and can<br>lead to fraud or harassment, showing how deception corrodes digital communities. Recording a<\/p>\n\n\n\n<p>VoIP call without consent is also unethical and often illegal, since it disregards privacy rights<br>and exposes individuals to surveillance without their knowledge. Bullying and trolling, whether<br>online or offline, cause emotional harm, silence voices, and foster toxic environments that<br>discourage healthy dialogue. Finally, conducting illegal searches on the internet disregards both<br>legal boundaries and ethical norms, often leading to exposure of private or restricted information<br>that was never meant to be accessed. Together, these practices demonstrate how dishonesty,<br>exploitation, and disregard for privacy erode the safety and integrity of digital life<\/p>\n","protected":false},"excerpt":{"rendered":"<p>My name is Jacob Waller, I&#8217;m a cyber security major at Old Dominion University. Ive recently started my sophomore year. This year my mind is a lot different looking into cyber security instead of thinking of assignment as a con or a stick in the mud, Im going to look at them as an opportunity&#8230; <\/p>\n<div class=\"link-more\"><a href=\"https:\/\/sites.wp.odu.edu\/cyse201swaller\/\">Read More<\/a><\/div>\n","protected":false},"author":31224,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"_links":{"self":[{"href":"https:\/\/sites.wp.odu.edu\/cyse201swaller\/wp-json\/wp\/v2\/pages\/31"}],"collection":[{"href":"https:\/\/sites.wp.odu.edu\/cyse201swaller\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/sites.wp.odu.edu\/cyse201swaller\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/cyse201swaller\/wp-json\/wp\/v2\/users\/31224"}],"replies":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/cyse201swaller\/wp-json\/wp\/v2\/comments?post=31"}],"version-history":[{"count":5,"href":"https:\/\/sites.wp.odu.edu\/cyse201swaller\/wp-json\/wp\/v2\/pages\/31\/revisions"}],"predecessor-version":[{"id":272,"href":"https:\/\/sites.wp.odu.edu\/cyse201swaller\/wp-json\/wp\/v2\/pages\/31\/revisions\/272"}],"wp:attachment":[{"href":"https:\/\/sites.wp.odu.edu\/cyse201swaller\/wp-json\/wp\/v2\/media?parent=31"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}