{"id":185,"date":"2025-02-02T19:06:40","date_gmt":"2025-02-02T19:06:40","guid":{"rendered":"https:\/\/sites.wp.odu.edu\/jackson-cyse201s\/?page_id=185"},"modified":"2025-04-27T17:50:46","modified_gmt":"2025-04-27T17:50:46","slug":"cyse-201s","status":"publish","type":"page","link":"https:\/\/sites.wp.odu.edu\/jackson-cyse201s\/cyse-201s\/","title":{"rendered":"CYSE 201S"},"content":{"rendered":"\n<p>Below are links to all the coursework I have completed this semester. <\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Journals<\/h2>\n\n\n\n<ul>\n<li><a href=\"https:\/\/docs.google.com\/document\/d\/17kRQawMtW_wda_EP_YY3HogG-rEJW31M_kBOHsmy7O8\/edit?usp=sharing\" data-type=\"link\" data-id=\"https:\/\/docs.google.com\/document\/d\/17kRQawMtW_wda_EP_YY3HogG-rEJW31M_kBOHsmy7O8\/edit?usp=sharing\">Journal 1: NICE Workforce Framework<\/a><\/li>\n\n\n\n<li><a href=\"https:\/\/docs.google.com\/document\/d\/1IGCT-z9E0zt-_ZFsdcSC7foDggCi2_1BhE0ev9ZourI\/edit?usp=sharing\" data-type=\"link\" data-id=\"https:\/\/docs.google.com\/document\/d\/1IGCT-z9E0zt-_ZFsdcSC7foDggCi2_1BhE0ev9ZourI\/edit?usp=sharing\">Journal 2: Principles of Science and Cybersecurity<\/a><\/li>\n\n\n\n<li><a href=\"https:\/\/docs.google.com\/document\/d\/1kJYxaDmijVGZJMA9dWoziUWl7kn2uteWO1vikf82rM8\/edit?usp=sharing\">Journal 3: Data breaches <\/a><\/li>\n\n\n\n<li><a href=\"https:\/\/docs.google.com\/document\/d\/1XOb4JazH7sJbIP-zI6TtiEFEeZHNbnelGSb2aKh9m2Q\/edit?usp=sharing\">Journal 4: Maslow&#8217;s Hierarchy of Needs<\/a><\/li>\n\n\n\n<li><a href=\"https:\/\/docs.google.com\/document\/d\/1IWeAw8BpCyL9hPcIsuruPb6GZQX5lH5afqIp8Npi5VI\/edit?usp=sharing\" data-type=\"link\" data-id=\"https:\/\/docs.google.com\/document\/d\/1IWeAw8BpCyL9hPcIsuruPb6GZQX5lH5afqIp8Npi5VI\/edit?usp=sharing\">Journal 5: Motives for Cybercrimes<\/a><\/li>\n\n\n\n<li>Journal 6: <\/li>\n\n\n\n<li>Journal 7:<\/li>\n\n\n\n<li><a href=\"https:\/\/docs.google.com\/document\/d\/1gosEPQ9aiC9rZnuHVDXj933bBIXcU5G0EEkIPwcw-Gs\/edit?usp=sharing\" data-type=\"link\" data-id=\"https:\/\/docs.google.com\/document\/d\/1gosEPQ9aiC9rZnuHVDXj933bBIXcU5G0EEkIPwcw-Gs\/edit?usp=sharing\">Journal 8: Hackers<\/a><\/li>\n\n\n\n<li><a href=\"https:\/\/docs.google.com\/document\/d\/1mtWDULGAJ_ixiML0SMEaLd7z70mlWiFZ35759zy3GBY\/edit?usp=sharing\" data-type=\"link\" data-id=\"https:\/\/docs.google.com\/document\/d\/1mtWDULGAJ_ixiML0SMEaLd7z70mlWiFZ35759zy3GBY\/edit?usp=sharing\">Journal 9: SMD Scale<\/a><\/li>\n\n\n\n<li><a href=\"https:\/\/docs.google.com\/document\/d\/1W_6kD1Bvf4jsx8bHlBufU6N7WQ2wWgXh6ew_08xGOHg\/edit?usp=sharing\">Journal 10: National Cyber Security Requirements<\/a><\/li>\n\n\n\n<li>Journal 11:<\/li>\n\n\n\n<li>Journal 12:<\/li>\n\n\n\n<li>Journal 13:<\/li>\n\n\n\n<li><a href=\"https:\/\/docs.google.com\/document\/d\/1Vx0eYvDuz_sgN1PLT4zFHktVEIWSUQaex4Dn7Imbymk\/edit?usp=sharing\">Journal 14: Internet violations<\/a><\/li>\n\n\n\n<li>Journal 15:<\/li>\n<\/ul>\n\n\n\n<h2 class=\"wp-block-heading\">Article Reviews<\/h2>\n\n\n\n<ul>\n<li><a href=\"https:\/\/docs.google.com\/document\/d\/1lIi4DiBWfDvUwlS-YMASOwnM89luHmZVvpOYJgDX_sQ\/edit?usp=sharing\">Article review #1: Cyber-victimization<\/a><\/li>\n\n\n\n<li><a href=\"https:\/\/docs.google.com\/document\/d\/1hhIAhz6_u_G5kcKdkl5j0ROWNXnV0lKMd2PXdOt3nCo\/edit?usp=sharing\">Article review #2: Software developers and Security<\/a><\/li>\n<\/ul>\n\n\n\n<h2 class=\"wp-block-heading\">Career Paper<\/h2>\n\n\n\n<ul>\n<li><a href=\"https:\/\/docs.google.com\/document\/d\/16O3SVb2MFEw4iQMjAOvHLqNrKgdO7NV1n8vO5WgWGB4\/edit?usp=sharing\">Career Paper<\/a><\/li>\n<\/ul>\n","protected":false},"excerpt":{"rendered":"<p>Below are links to all the coursework I have completed this semester. Journals Article Reviews Career Paper<\/p>\n","protected":false},"author":28758,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"_links":{"self":[{"href":"https:\/\/sites.wp.odu.edu\/jackson-cyse201s\/wp-json\/wp\/v2\/pages\/185"}],"collection":[{"href":"https:\/\/sites.wp.odu.edu\/jackson-cyse201s\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/sites.wp.odu.edu\/jackson-cyse201s\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/jackson-cyse201s\/wp-json\/wp\/v2\/users\/28758"}],"replies":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/jackson-cyse201s\/wp-json\/wp\/v2\/comments?post=185"}],"version-history":[{"count":4,"href":"https:\/\/sites.wp.odu.edu\/jackson-cyse201s\/wp-json\/wp\/v2\/pages\/185\/revisions"}],"predecessor-version":[{"id":229,"href":"https:\/\/sites.wp.odu.edu\/jackson-cyse201s\/wp-json\/wp\/v2\/pages\/185\/revisions\/229"}],"wp:attachment":[{"href":"https:\/\/sites.wp.odu.edu\/jackson-cyse201s\/wp-json\/wp\/v2\/media?parent=185"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}