{"id":55,"date":"2025-12-06T02:54:40","date_gmt":"2025-12-06T02:54:40","guid":{"rendered":"https:\/\/sites.wp.odu.edu\/danielcyse200t\/?page_id=55"},"modified":"2025-12-06T02:54:40","modified_gmt":"2025-12-06T02:54:40","slug":"artifacts","status":"publish","type":"page","link":"https:\/\/sites.wp.odu.edu\/danielcyse200t\/artifacts\/","title":{"rendered":"Artifacts"},"content":{"rendered":"<p><strong>CIA<\/strong><\/p>\n<p><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">In cybersecurity, one of the first ideas we learn about is the CIA Triad, which stands for<\/span><br class=\"textLayer--absolute\" role=\"presentation\" \/><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">Confidentiality, Integrity, and Availability. Even though it sounds simple, this model is the<\/span><br class=\"textLayer--absolute\" role=\"presentation\" \/><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">foundation for protecting data or information. Confidentiality is comes down to keeping data<\/span><br class=\"textLayer--absolute\" role=\"presentation\" \/><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">private and making sure only the right people have access to it. Tools like encryption, strong<\/span><br class=\"textLayer--absolute\" role=\"presentation\" \/><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">passwords, and multi factor authentication work together to block out anyone who should not<\/span><br class=\"textLayer--absolute\" role=\"presentation\" \/><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">have access (Chai, 2022). Integrity focuses on the accuracy of information. Data needs to stay<\/span><br class=\"textLayer--absolute\" role=\"presentation\" \/><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">reliable from the moment it is created to the moment it is used, and that means protecting it from<\/span><br class=\"textLayer--absolute\" role=\"presentation\" \/><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">having inaccuracies. Tampering also affects data integrity, which is why strong access control<\/span><br class=\"textLayer--absolute\" role=\"presentation\" \/><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">plays such a big role in its protection. Version control, file permissions, and checksums are also<\/span><br class=\"textLayer--absolute\" role=\"presentation\" \/><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">common ways to guard data integrity (Chai, 2022). Lastly, availability makes sure that systems<\/span><br class=\"textLayer--absolute\" role=\"presentation\" \/><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">and data are there when people need them. Backups, redundant servers, and disaster recovery<\/span><br class=\"textLayer--absolute\" role=\"presentation\" \/><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">plans all exist so organizations can keep running in the event something might go wrong (Chai,<\/span><br class=\"textLayer--absolute\" role=\"presentation\" \/><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">2022).<\/span><br class=\"textLayer--absolute\" role=\"presentation\" \/><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">The CIA Triad helps set the standard, but authentication and authorization are the processes that<\/span><br class=\"textLayer--absolute\" role=\"presentation\" \/><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">enforce these standards. Authentication is how a system checks who you are, whether it is with a<\/span><br class=\"textLayer--absolute\" role=\"presentation\" \/><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">password, a multi factor token, or a fingerprint. Authorization comes next and will decide what<\/span><br class=\"textLayer--absolute\" role=\"presentation\" \/><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">you are allowed to do. Logging into a bank account is a good example. Authentication proves<\/span><br class=\"textLayer--absolute\" role=\"presentation\" \/><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">your identity, while authorization sets the rules for what actions you can take, like viewing your<\/span><br class=\"textLayer--absolute\" role=\"presentation\" \/><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">balances or transferring money.<\/span><br class=\"textLayer--absolute\" role=\"presentation\" \/><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">Authentication and authorization work together to create a balance of trust and control. They<\/span><br class=\"textLayer--absolute\" role=\"presentation\" \/><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">help ensure that our information stays protected while still allowing access to users. Without<\/span><br class=\"textLayer--absolute\" role=\"presentation\" \/><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">them, it will be extremely difficult to know who or what is accessing information and if they<\/span><br class=\"textLayer--absolute\" role=\"presentation\" \/><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">have the right to access it.<\/span><br class=\"textLayer--absolute\" role=\"presentation\" \/><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">Reference<\/span><br class=\"textLayer--absolute\" role=\"presentation\" \/><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">Chai, W. (2022, June 28).<\/span> <span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">What is the CIA Triad? Definition, Explanation, Examples<\/span><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">.<\/span><br class=\"textLayer--absolute\" role=\"presentation\" \/><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">TechTarget. https:\/\/www.techtarget.com\/whatis\/definition\/Confidentiality-integrity-and-<\/span><br class=\"textLayer--absolute\" role=\"presentation\" \/><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">availability-CIA<\/span><\/p>\n<p><strong>SCADA<\/strong><\/p>\n<div class=\"TextLayer-container\">\n<div class=\"textLayer\"><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">Supervisory Control and Data Acquisition systems, also known as SCADA, are the backbone of<\/span><br class=\"textLayer--absolute\" role=\"presentation\" \/><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">many industries that help keep society to function. They control and monitor things like power<\/span><br class=\"textLayer--absolute\" role=\"presentation\" \/><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">plants, water treatment facilities, and manufacturing lines. Throughout the years, these systems<\/span><br class=\"textLayer--absolute\" role=\"presentation\" \/><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">have went from being air gapped to being connected to the internet. While these changes made<\/span><br class=\"textLayer--absolute\" role=\"presentation\" \/><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">operations faster and easier to manage, it also opens the door to potential cyber threats. A hacker<\/span><br class=\"textLayer--absolute\" role=\"presentation\" \/><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">that gains access to these systems could cause power outages, interrupt water flow, or damage<\/span><br class=\"textLayer--absolute\" role=\"presentation\" \/><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">equipment that entire communities rely on. They can do a lot of harm to infrastructure and can<\/span><br class=\"textLayer--absolute\" role=\"presentation\" \/><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">ultimately have a big impact on day to day society functions.<\/span><br class=\"textLayer--absolute\" role=\"presentation\" \/><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">The Cybersecurity and Infrastructure Security Agency or CISA explains that many<\/span><br class=\"textLayer--absolute\" role=\"presentation\" \/><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">vulnerabilities come from old software, poor password management, and a lack of network<\/span><br class=\"textLayer--absolute\" role=\"presentation\" \/><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">separation between secure and public systems (CISA, 2024). Many times, attackers use phishing<\/span><br class=\"textLayer--absolute\" role=\"presentation\" \/><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">emails or malware to reach control devices that were never meant to be exposed online.<\/span><br class=\"textLayer--absolute\" role=\"presentation\" \/><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">To reduce these vulnerabilities, modern SCADA applications use multiple layers of protection.<\/span><br class=\"textLayer--absolute\" role=\"presentation\" \/><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">Firewalls, access controls, and VPNs help limit who and what can connect to these systems.<\/span><br class=\"textLayer--absolute\" role=\"presentation\" \/><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">Redundant servers and constant monitoring also make sure that operations continue running in<\/span><br class=\"textLayer--absolute\" role=\"presentation\" \/><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">the event that something goes wrong. To summarize, SCADA not only keeps machines running<\/span><br class=\"textLayer--absolute\" role=\"presentation\" \/><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">but also plays a major role in keeping critical cyber infrastructure safe and reliable.<\/span><br class=\"textLayer--absolute\" role=\"presentation\" \/><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">References<\/span><br class=\"textLayer--absolute\" role=\"presentation\" \/><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">SCADA Systems. (n.d.). Supervisory Control and Data Acquisition. Retrieved from<\/span><br class=\"textLayer--absolute\" role=\"presentation\" \/><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">http:\/\/www.scadasystems.net<\/span><br class=\"textLayer--absolute\" role=\"presentation\" \/><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">Cybersecurity and Infrastructure Security Agency (CISA). (2024). Defending Industrial Control<\/span><br class=\"textLayer--absolute\" role=\"presentation\" \/><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">Systems. Retrieved from https:\/\/www.cisa.gov<\/span><\/div>\n<\/div>\n<div><\/div>\n<div>\n<div class=\"Page-container\">\n<div id=\"page-0\" class=\"Page PageComponent\">\n<div class=\"Draw Draw--not-drawing Draw--is-pointer-down Draw--selection\">\n<div class=\"TextLayer-container\">\n<div class=\"textLayer\"><strong><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">Feeding the Machine: How Our Digital Behavior <\/span><\/strong><strong><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">Trains the Technology That Shapes Us<\/span><\/strong><\/div>\n<div class=\"textLayer\"><br class=\"textLayer--absolute\" role=\"presentation\" \/><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">1. Attention as Currency<\/span><br class=\"textLayer--absolute\" role=\"presentation\" \/><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">I used to think I was just scrolling through social media to kill time. I would check<\/span><br class=\"textLayer--absolute\" role=\"presentation\" \/><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">YouTube Shorts before bed, watch a few clips, maybe laugh at something dumb, and then close<\/span><br class=\"textLayer--absolute\" role=\"presentation\" \/><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">the app. It felt like nothing. Just me using my phone like everybody else. But when I started<\/span><br class=\"textLayer--absolute\" role=\"presentation\" \/><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">paying attention I realized these small habits are basically lessons I am teaching the platform.<\/span><br class=\"textLayer--absolute\" role=\"presentation\" \/><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">Every time I like something, pause on a video, or open an app when I am bored, I am telling the<\/span><br class=\"textLayer--absolute\" role=\"presentation\" \/><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">system what I respond to. I am not just looking at content. I am helping it understand who I am,<\/span><br class=\"textLayer--absolute\" role=\"presentation\" \/><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">or at least who I look like based on what I click. Researchers have shown that platforms do not<\/span><br class=\"textLayer--absolute\" role=\"presentation\" \/><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">simply show content, they continuously test and improve their recommendations based on user<\/span><br class=\"textLayer--absolute\" role=\"presentation\" \/><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">interactions and social feedback loops (Metzler &amp; Garcia, 2023).<\/span><br class=\"textLayer--absolute\" role=\"presentation\" \/><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">2. How Our Habits Become Data<\/span><br class=\"textLayer--absolute\" role=\"presentation\" \/><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">The weird part is that none of this feels like giving up data. Nobody is stealing it from<\/span><br class=\"textLayer--absolute\" role=\"presentation\" \/><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">me. I post pictures and react to other posts without thinking about how all those actions are<\/span><br class=\"textLayer--absolute\" role=\"presentation\" \/><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">tracked. The system does not care what I claim to like. It cares how long I stare at something. If I<\/span><br class=\"textLayer--absolute\" role=\"presentation\" \/><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">scroll past a hundred posts but stop on one, that is the one that matters. If I click fitness stuff a<\/span><br class=\"textLayer--absolute\" role=\"presentation\" \/><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">couple of times, the app will start throwing gym content at me like I subscribed to it. I do not<\/span><br class=\"textLayer--absolute\" role=\"presentation\" \/><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">need to fill out a personality quiz. My habits are the quiz. Research on social media addiction<\/span><br class=\"textLayer--absolute\" role=\"presentation\" \/><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">and \u201cproblematic use\u201d shows that it is the repeated engagement, patterns of use, and time spent<\/span><\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<div class=\"Page-container\">\n<div id=\"page-1\" class=\"Page PageComponent\">\n<div class=\"Draw Draw--not-drawing Draw--selection\">\n<div class=\"TextLayer-container\">\n<div class=\"textLayer\"><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">that shape how platforms respond to us and how our online behavior evolves over time<\/span><br class=\"textLayer--absolute\" role=\"presentation\" \/><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">(Pellegrino et al., 2022).<\/span><br class=\"textLayer--absolute\" role=\"presentation\" \/><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">3. When the Machine Starts Responding to Us<\/span><br class=\"textLayer--absolute\" role=\"presentation\" \/><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">Eventually the platform starts shaping me back. I do not just get content I like. I get<\/span><br class=\"textLayer--absolute\" role=\"presentation\" \/><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">content that keeps me engaged. If I stop on a basketball highlight, I get more. And then more.<\/span><br class=\"textLayer--absolute\" role=\"presentation\" \/><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">Soon the feed believes I only care about sports or training or hustle clips. The app does not say<\/span><br class=\"textLayer--absolute\" role=\"presentation\" \/><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">\u201chere is a balanced look at the world.\u201d It says \u201cthis kept your eyes peeled for 12 seconds, so here<\/span><br class=\"textLayer--absolute\" role=\"presentation\" \/><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">are 40 more things just like it.\u201d That is how it becomes a loop. I feed the machine, the machine<\/span><br class=\"textLayer--absolute\" role=\"presentation\" \/><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">feeds me, and I keep clicking because it feels familiar and safe. I start to think the internet is built<\/span><br class=\"textLayer--absolute\" role=\"presentation\" \/><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">around the things I react to the most. The more emotional the reaction, the harder it is to break<\/span><br class=\"textLayer--absolute\" role=\"presentation\" \/><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">the cycle, which is why researchers have compared heavy social media use and algorithm driven<\/span><br class=\"textLayer--absolute\" role=\"presentation\" \/><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">engagement to addictive behavior with real effects on the brain and mental health (De et al.,<\/span><br class=\"textLayer--absolute\" role=\"presentation\" \/><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">2025).<\/span><br class=\"textLayer--absolute\" role=\"presentation\" \/><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">4. Where Cyber Security Falls Short<\/span><br class=\"textLayer--absolute\" role=\"presentation\" \/><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">This is where cyber security feels incomplete. Cyber security usually protects passwords,<\/span><br class=\"textLayer--absolute\" role=\"presentation\" \/><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">blocks hackers, or prevents identity theft. All of that matters. But none of those defenses stop<\/span><br class=\"textLayer--absolute\" role=\"presentation\" \/><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">platforms from studying us. There is no firewall against my own curiosity. There is no antivirus<\/span><br class=\"textLayer--absolute\" role=\"presentation\" \/><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">for habits. The threat is not someone breaking into my account. The threat is me willingly giving<\/span><br class=\"textLayer--absolute\" role=\"presentation\" \/><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">away the information that trains the system. It learns when I am bored, when I am lonely, when I<\/span><br class=\"textLayer--absolute\" role=\"presentation\" \/><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">am upset, and when I am most likely to scroll. It does not need malware to get all that. It only<\/span><br class=\"textLayer--absolute\" role=\"presentation\" \/><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">needs me to keep using it.<\/span><\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<div class=\"Page-container\">\n<div id=\"page-2\" class=\"Page PageComponent\">\n<div class=\"Page-canvas-container\"><\/div>\n<div class=\"Draw Draw--not-drawing Draw--selection\">\n<div class=\"TextLayer-container\">\n<div class=\"textLayer\"><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">5. Performing for the Algorithm<\/span><br class=\"textLayer--absolute\" role=\"presentation\" \/><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">I also see how this affects people socially. We think we are expressing ourselves. We<\/span><br class=\"textLayer--absolute\" role=\"presentation\" \/><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">post opinions, jokes, gym updates, political takes, random thoughts, and some of it is harmless.<\/span><br class=\"textLayer--absolute\" role=\"presentation\" \/><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">But some of it becomes identity. We start chasing reactions because likes and views feel like<\/span><br class=\"textLayer--absolute\" role=\"presentation\" \/><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">proof we matter. Online, attention becomes validation. The machine rewards us for feeding it, so<\/span><br class=\"textLayer--absolute\" role=\"presentation\" \/><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">we keep feeding it. It does not feel forced. It feels like being honest, even when the version of<\/span><br class=\"textLayer--absolute\" role=\"presentation\" \/><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">\u201chonest\u201d we are projecting is shaped by what gets engagement.<\/span><br class=\"textLayer--absolute\" role=\"presentation\" \/><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">6. Invisible Experiments<\/span><br class=\"textLayer--absolute\" role=\"presentation\" \/><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">The scariest part to me is how invisible it is. Most people have no idea the app is testing<\/span><br class=\"textLayer--absolute\" role=\"presentation\" \/><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">them constantly. It shows you something extreme just to see if you pause. If you do, the system<\/span><br class=\"textLayer--absolute\" role=\"presentation\" \/><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">logs it and now it knows what triggers you. You never see the experiment. You only see the<\/span><br class=\"textLayer--absolute\" role=\"presentation\" \/><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">menu of recommendations afterward. I used to think I was choosing what I wanted, but now I<\/span><br class=\"textLayer--absolute\" role=\"presentation\" \/><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">realize I am usually choosing from what the system already decided to show me. And yeah,<\/span><br class=\"textLayer--absolute\" role=\"presentation\" \/><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">sometimes I still fall for it. Sometimes I watch nonsense I do not even care about, just because it<\/span><br class=\"textLayer--absolute\" role=\"presentation\" \/><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">showed up at the right moment when I was tired.<\/span><br class=\"textLayer--absolute\" role=\"presentation\" \/><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">7. Awareness Is Our Only Defense<\/span><br class=\"textLayer--absolute\" role=\"presentation\" \/><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">I still use some social media. I enjoy seeing new ideas and staying in contact with people.<\/span><br class=\"textLayer--absolute\" role=\"presentation\" \/><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">I do not think quitting is realistic for most people. But I try to be more aware of what I am giving<\/span><br class=\"textLayer--absolute\" role=\"presentation\" \/><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">the system. If I click something, I ask myself if I really care or if I am just reacting. Sometimes I<\/span><br class=\"textLayer--absolute\" role=\"presentation\" \/><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">close the app instead of letting it decide what I want next. I am not perfect at this. I probably<\/span><br class=\"textLayer--absolute\" role=\"presentation\" \/><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">never will be. But the more I feed the machine, the better it becomes at shaping me. It is always<\/span><br class=\"textLayer--absolute\" role=\"presentation\" \/><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">listening. The only real choice I have is how much I want to keep teaching it.<\/span><\/div>\n<\/div>\n<div class=\"PageAnnotations\"><\/div>\n<\/div>\n<\/div>\n<\/div>\n<div class=\"Page-container\">\n<div id=\"page-3\" class=\"Page PageComponent\">\n<div class=\"Page-canvas-container\"><\/div>\n<div class=\"Draw Draw--not-drawing Draw--selection\">\n<div class=\"TextLayer-container\">\n<div class=\"textLayer\"><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">References<\/span><br class=\"textLayer--absolute\" role=\"presentation\" \/><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">De, D., El Jamal, M., Aydemir, E., &amp; Khera, A. (2025). Social media algorithms and teen<\/span><br class=\"textLayer--absolute\" role=\"presentation\" \/><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">addiction: Neurophysiological impact and ethical considerations. Cureus, 17(1), e77145.<\/span><br class=\"textLayer--absolute\" role=\"presentation\" \/><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">https:\/\/pmc.ncbi.nlm.nih.gov\/articles\/PMC11804976\/<\/span><br class=\"textLayer--absolute\" role=\"presentation\" \/><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">Metzler, H., &amp; Garcia, D. (2023). Social drivers and algorithmic mechanisms on digital media.<\/span><br class=\"textLayer--absolute\" role=\"presentation\" \/><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">Perspectives on Psychological Science, 19(5), 735\u2013748.<\/span><br class=\"textLayer--absolute\" role=\"presentation\" \/><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">https:\/\/pmc.ncbi.nlm.nih.gov\/articles\/PMC11373151\/<\/span><br class=\"textLayer--absolute\" role=\"presentation\" \/><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">Pellegrino, A., Stasi, A., &amp; Bhatiasevi, V. (2022). Research trends in social media addiction and<\/span><br class=\"textLayer--absolute\" role=\"presentation\" \/><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">problematic social media use: A bibliometric analysis. Frontiers in Psychiatry, 13, 1017506.<\/span><br class=\"textLayer--absolute\" role=\"presentation\" \/><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">https:\/\/pmc.ncbi.nlm.nih.gov\/articles\/PMC9707397<\/span><\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<div class=\"PDFAnnotationLayer-container\"><\/div>\n","protected":false},"excerpt":{"rendered":"<p>CIA In cybersecurity, one of the first ideas we learn about is the CIA Triad, which stands forConfidentiality, Integrity, and Availability. Even though it sounds simple, this model is thefoundation for protecting data or information. Confidentiality is comes down to&#8230; <a class=\"more-link\" href=\"https:\/\/sites.wp.odu.edu\/danielcyse200t\/artifacts\/\">Continue Reading &rarr;<\/a><\/p>\n","protected":false},"author":31351,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"_links":{"self":[{"href":"https:\/\/sites.wp.odu.edu\/danielcyse200t\/wp-json\/wp\/v2\/pages\/55"}],"collection":[{"href":"https:\/\/sites.wp.odu.edu\/danielcyse200t\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/sites.wp.odu.edu\/danielcyse200t\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/danielcyse200t\/wp-json\/wp\/v2\/users\/31351"}],"replies":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/danielcyse200t\/wp-json\/wp\/v2\/comments?post=55"}],"version-history":[{"count":1,"href":"https:\/\/sites.wp.odu.edu\/danielcyse200t\/wp-json\/wp\/v2\/pages\/55\/revisions"}],"predecessor-version":[{"id":56,"href":"https:\/\/sites.wp.odu.edu\/danielcyse200t\/wp-json\/wp\/v2\/pages\/55\/revisions\/56"}],"wp:attachment":[{"href":"https:\/\/sites.wp.odu.edu\/danielcyse200t\/wp-json\/wp\/v2\/media?parent=55"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}