{"id":375,"date":"2025-12-05T01:57:17","date_gmt":"2025-12-05T01:57:17","guid":{"rendered":"https:\/\/sites.wp.odu.edu\/cyse201teportfolio\/?p=375"},"modified":"2025-12-05T01:57:17","modified_gmt":"2025-12-05T01:57:17","slug":"journal-entry-10","status":"publish","type":"post","link":"https:\/\/sites.wp.odu.edu\/cyse201teportfolio\/2025\/12\/05\/journal-entry-10\/","title":{"rendered":"Journal Entry #10"},"content":{"rendered":"\n<p>The article *\u201cA Survey of Social Cybersecurity: Techniques for Attack Detection, Evaluations, Challenges, and Future Prospects\u201d* explores how cybersecurity now extends beyond technology to include human and social behavior. It highlights how social platforms are used for cyberbullying, misinformation, and manipulation through bots and deepfakes. I found it insightful that the authors emphasize using machine learning, network analysis, and natural language processing to detect these threats while also noting the challenges of human trust and data access. The article made me realize that protecting society online requires both technical defenses and social awareness to build safer, more resilient digital communities.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>The article *\u201cA Survey of Social Cybersecurity: Techniques for Attack Detection, Evaluations, Challenges, and Future Prospects\u201d* explores how cybersecurity now extends beyond technology to include human and social behavior. It highlights how social platforms are used for cyberbullying, misinformation, and manipulation through bots and deepfakes. I found it insightful that the authors emphasize using machine&#8230; <\/p>\n<div class=\"link-more\"><a href=\"https:\/\/sites.wp.odu.edu\/cyse201teportfolio\/2025\/12\/05\/journal-entry-10\/\">Read More<\/a><\/div>\n","protected":false},"author":31460,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":"","wds_primary_category":0},"categories":[1],"tags":[],"_links":{"self":[{"href":"https:\/\/sites.wp.odu.edu\/cyse201teportfolio\/wp-json\/wp\/v2\/posts\/375"}],"collection":[{"href":"https:\/\/sites.wp.odu.edu\/cyse201teportfolio\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/sites.wp.odu.edu\/cyse201teportfolio\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/cyse201teportfolio\/wp-json\/wp\/v2\/users\/31460"}],"replies":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/cyse201teportfolio\/wp-json\/wp\/v2\/comments?post=375"}],"version-history":[{"count":1,"href":"https:\/\/sites.wp.odu.edu\/cyse201teportfolio\/wp-json\/wp\/v2\/posts\/375\/revisions"}],"predecessor-version":[{"id":378,"href":"https:\/\/sites.wp.odu.edu\/cyse201teportfolio\/wp-json\/wp\/v2\/posts\/375\/revisions\/378"}],"wp:attachment":[{"href":"https:\/\/sites.wp.odu.edu\/cyse201teportfolio\/wp-json\/wp\/v2\/media?parent=375"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/cyse201teportfolio\/wp-json\/wp\/v2\/categories?post=375"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/cyse201teportfolio\/wp-json\/wp\/v2\/tags?post=375"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}