{"id":763,"date":"2024-03-10T00:28:38","date_gmt":"2024-03-10T05:28:38","guid":{"rendered":"https:\/\/sites.wp.odu.edu\/jasmyn-wilhelm\/?p=763"},"modified":"2024-04-25T11:13:00","modified_gmt":"2024-04-25T15:13:00","slug":"journal-10-read-this-article-and-write-a-journal-entry-summarizing-your-response-to-the-article-on-social-cybersecurity","status":"publish","type":"post","link":"https:\/\/sites.wp.odu.edu\/jasmyn-wilhelm\/2024\/03\/10\/journal-10-read-this-article-and-write-a-journal-entry-summarizing-your-response-to-the-article-on-social-cybersecurity\/","title":{"rendered":"Journal #10: Read this article and write a journal entry summarizing your response to the article on social cybersecurity"},"content":{"rendered":"<a href=\"https:\/\/sites.wp.odu.edu\/jasmyn-wilhelm\/wp-content\/uploads\/sites\/33811\/2024\/04\/Beskow-Carley-Social-Cyber-compressed.pdf\" class=\"pdfemb-viewer\" style=\"\" data-width=\"max\" data-height=\"max\"  data-toolbar=\"bottom\" data-toolbar-fixed=\"off\">Beskow-Carley-Social-Cyber-compressed<br\/><\/a>\n<p class=\"wp-block-pdfemb-pdf-embedder-viewer\"><\/p>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\" \/>\n\n\n\n<p>To defend the security and sustain American influence abroad, leaders have to understand the upcoming discipline of social cybersecurity and how it impacts their force, nation, and values.\u00a0Changes in communication and information flows have enabled the social cyberthreat: technology has waived the requirement for physical presences in order to influence someone, and the distribution of information has become easier. This has organized external actors with minimal attribution, and control of information flow is spreading, with fact checking conducted by the user. I found the discussion on machine learning algorithms&#8217; role in detecting disinformation campaigns insightful. It shows the critical role of technological advancements in safeguarding information integrity and countering emerging threats.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>To defend the security and sustain American influence abroad, leaders have to understand the upcoming discipline of social cybersecurity and how it impacts their force, nation, and values.\u00a0Changes in communication and information flows have enabled the social cyberthreat: technology has&#8230; <a class=\"more-link\" href=\"https:\/\/sites.wp.odu.edu\/jasmyn-wilhelm\/2024\/03\/10\/journal-10-read-this-article-and-write-a-journal-entry-summarizing-your-response-to-the-article-on-social-cybersecurity\/\">Continue Reading &rarr;<\/a><\/p>\n","protected":false},"author":27258,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":"","wds_primary_category":0},"categories":[14],"tags":[],"_links":{"self":[{"href":"https:\/\/sites.wp.odu.edu\/jasmyn-wilhelm\/wp-json\/wp\/v2\/posts\/763"}],"collection":[{"href":"https:\/\/sites.wp.odu.edu\/jasmyn-wilhelm\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/sites.wp.odu.edu\/jasmyn-wilhelm\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/jasmyn-wilhelm\/wp-json\/wp\/v2\/users\/27258"}],"replies":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/jasmyn-wilhelm\/wp-json\/wp\/v2\/comments?post=763"}],"version-history":[{"count":3,"href":"https:\/\/sites.wp.odu.edu\/jasmyn-wilhelm\/wp-json\/wp\/v2\/posts\/763\/revisions"}],"predecessor-version":[{"id":804,"href":"https:\/\/sites.wp.odu.edu\/jasmyn-wilhelm\/wp-json\/wp\/v2\/posts\/763\/revisions\/804"}],"wp:attachment":[{"href":"https:\/\/sites.wp.odu.edu\/jasmyn-wilhelm\/wp-json\/wp\/v2\/media?parent=763"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/jasmyn-wilhelm\/wp-json\/wp\/v2\/categories?post=763"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/jasmyn-wilhelm\/wp-json\/wp\/v2\/tags?post=763"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}