{"id":350,"date":"2023-07-18T14:22:22","date_gmt":"2023-07-18T14:22:22","guid":{"rendered":"https:\/\/sites.wp.odu.edu\/donte-cybersecurity\/?p=350"},"modified":"2023-07-18T14:22:22","modified_gmt":"2023-07-18T14:22:22","slug":"journal-entry-4","status":"publish","type":"post","link":"https:\/\/sites.wp.odu.edu\/donte-cybersecurity\/2023\/07\/18\/journal-entry-4\/","title":{"rendered":"Journal Entry 4"},"content":{"rendered":"\n<p>Review Maslow\u2019s Hierarchy of Needs and explain how each level<br>relates to your experiences with technology. Give specific examples of<br>how your digital experiences relate to each level of need<\/p>\n\n\n\n<p>My psychological need for technology would be the ability to go on the internet to watch videos, do schoolwork, and buy being able to buy things online. My safety need for technology would be antivirus on my computer. My belongingness and love need for technology would be making friends on online games. My esteem needs would becoming good at online games and feeling good about it. My self-actualization would be getting recognition for being good at an online game and possibly getting paid to play them.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Review Maslow\u2019s Hierarchy of Needs and explain how each levelrelates to your experiences with technology. Give specific examples ofhow your digital experiences relate to each level of need My psychological need for technology would be the ability to go on the internet to watch videos, do schoolwork, and buy being able to buy things online&#8230;. <\/p>\n<div class=\"link-more\"><a href=\"https:\/\/sites.wp.odu.edu\/donte-cybersecurity\/2023\/07\/18\/journal-entry-4\/\">Read More<\/a><\/div>\n","protected":false},"author":25260,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":"","wds_primary_category":0},"categories":[1],"tags":[],"_links":{"self":[{"href":"https:\/\/sites.wp.odu.edu\/donte-cybersecurity\/wp-json\/wp\/v2\/posts\/350"}],"collection":[{"href":"https:\/\/sites.wp.odu.edu\/donte-cybersecurity\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/sites.wp.odu.edu\/donte-cybersecurity\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/donte-cybersecurity\/wp-json\/wp\/v2\/users\/25260"}],"replies":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/donte-cybersecurity\/wp-json\/wp\/v2\/comments?post=350"}],"version-history":[{"count":1,"href":"https:\/\/sites.wp.odu.edu\/donte-cybersecurity\/wp-json\/wp\/v2\/posts\/350\/revisions"}],"predecessor-version":[{"id":351,"href":"https:\/\/sites.wp.odu.edu\/donte-cybersecurity\/wp-json\/wp\/v2\/posts\/350\/revisions\/351"}],"wp:attachment":[{"href":"https:\/\/sites.wp.odu.edu\/donte-cybersecurity\/wp-json\/wp\/v2\/media?parent=350"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/donte-cybersecurity\/wp-json\/wp\/v2\/categories?post=350"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/donte-cybersecurity\/wp-json\/wp\/v2\/tags?post=350"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}