{"id":265,"date":"2023-09-27T03:36:03","date_gmt":"2023-09-27T03:36:03","guid":{"rendered":"https:\/\/sites.wp.odu.edu\/dhopk002cyse201s\/?page_id=265"},"modified":"2023-11-11T23:34:30","modified_gmt":"2023-11-11T23:34:30","slug":"journal-entry-3","status":"publish","type":"page","link":"https:\/\/sites.wp.odu.edu\/dhopk002cyse201s\/journal-entries\/journal-entry-3\/","title":{"rendered":"Journal Entry #3"},"content":{"rendered":"\n<p>Visit PrivacyRights.org to see the types of publicly available information<br>about data breaches. How might researchers use this information to<br>study breaches? Enter a paragraph in your journal.<\/p>\n\n\n\n<p>They can undertake comprehensive longitudinal studies to discern temporal trends and patterns, deciphering the ebb and flow of breach frequency and severity across disparate industries and geographical domains. Such insights are invaluable for identifying recurrent vulnerabilities and security frailties, thereby facilitating the formulation of strategies aimed at breach prevention and amelioration. Additionally, the aftermath of data breaches, with its multifarious repercussions on affected individuals and organizations, can be dissected and scrutinized. This exploration can provide crucial input for the development and refinement of data protection policies and regulations.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Visit PrivacyRights.org to see the types of publicly available informationabout data breaches. How might researchers use this information tostudy breaches? Enter a paragraph in your journal. They can undertake comprehensive longitudinal studies to discern temporal trends and patterns, deciphering the ebb and flow of breach frequency and severity across disparate industries and geographical domains. Such&#8230; <\/p>\n<div class=\"link-more\"><a href=\"https:\/\/sites.wp.odu.edu\/dhopk002cyse201s\/journal-entries\/journal-entry-3\/\">Read More<\/a><\/div>\n","protected":false},"author":25833,"featured_media":0,"parent":35,"menu_order":3,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"_links":{"self":[{"href":"https:\/\/sites.wp.odu.edu\/dhopk002cyse201s\/wp-json\/wp\/v2\/pages\/265"}],"collection":[{"href":"https:\/\/sites.wp.odu.edu\/dhopk002cyse201s\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/sites.wp.odu.edu\/dhopk002cyse201s\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/dhopk002cyse201s\/wp-json\/wp\/v2\/users\/25833"}],"replies":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/dhopk002cyse201s\/wp-json\/wp\/v2\/comments?post=265"}],"version-history":[{"count":1,"href":"https:\/\/sites.wp.odu.edu\/dhopk002cyse201s\/wp-json\/wp\/v2\/pages\/265\/revisions"}],"predecessor-version":[{"id":266,"href":"https:\/\/sites.wp.odu.edu\/dhopk002cyse201s\/wp-json\/wp\/v2\/pages\/265\/revisions\/266"}],"up":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/dhopk002cyse201s\/wp-json\/wp\/v2\/pages\/35"}],"wp:attachment":[{"href":"https:\/\/sites.wp.odu.edu\/dhopk002cyse201s\/wp-json\/wp\/v2\/media?parent=265"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}