{"id":120,"date":"2024-09-26T14:33:25","date_gmt":"2024-09-26T14:33:25","guid":{"rendered":"https:\/\/wp.odu.edu\/odupresentationtemplate\/?page_id=2"},"modified":"2025-02-03T00:38:41","modified_gmt":"2025-02-03T00:38:41","slug":"sample-page-2","status":"publish","type":"page","link":"https:\/\/sites.wp.odu.edu\/jjohn287\/","title":{"rendered":"About me"},"content":{"rendered":"\n<p>Currently&nbsp;eighteen&nbsp;years&nbsp;old,&nbsp;I&nbsp;am&nbsp;a&nbsp;freshman&nbsp;at&nbsp;Old&nbsp;Dominion&nbsp;University,&nbsp;originally&nbsp;from&nbsp;Brambleton,&nbsp;Virginia. This&nbsp;is&nbsp;how&nbsp;I&nbsp;appear!<\/p>\n\n\n\n<figure class=\"wp-block-gallery has-nested-images columns-default is-cropped wp-block-gallery-1 is-layout-flex wp-block-gallery-is-layout-flex\"><div class=\"wp-block-image\">\n<figure class=\"aligncenter size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1601\" height=\"2560\" data-id=\"289\" src=\"https:\/\/sites.wp.odu.edu\/jjohn287\/wp-content\/uploads\/sites\/37397\/2024\/09\/97220010_x6bffv9g1l-1-edited-scaled.jpg\" alt=\"\" class=\"wp-image-289\" srcset=\"https:\/\/sites.wp.odu.edu\/jjohn287\/wp-content\/uploads\/sites\/37397\/2024\/09\/97220010_x6bffv9g1l-1-edited-scaled.jpg 1601w, https:\/\/sites.wp.odu.edu\/jjohn287\/wp-content\/uploads\/sites\/37397\/2024\/09\/97220010_x6bffv9g1l-1-edited-188x300.jpg 188w, https:\/\/sites.wp.odu.edu\/jjohn287\/wp-content\/uploads\/sites\/37397\/2024\/09\/97220010_x6bffv9g1l-1-edited-640x1024.jpg 640w, https:\/\/sites.wp.odu.edu\/jjohn287\/wp-content\/uploads\/sites\/37397\/2024\/09\/97220010_x6bffv9g1l-1-edited-768x1228.jpg 768w, https:\/\/sites.wp.odu.edu\/jjohn287\/wp-content\/uploads\/sites\/37397\/2024\/09\/97220010_x6bffv9g1l-1-edited-961x1536.jpg 961w, https:\/\/sites.wp.odu.edu\/jjohn287\/wp-content\/uploads\/sites\/37397\/2024\/09\/97220010_x6bffv9g1l-1-edited-1281x2048.jpg 1281w\" sizes=\"(max-width: 1601px) 100vw, 1601px\" \/><\/figure><\/div><\/figure>\n\n\n\n<p>My major is cybersecurity, and I&#8217;m looking to get a job in the future. I have a mom, dad, sister, and a dog named Prince. My favorite hobbies to do in my free time are play video games, play basketball, ride my scooter, roller skate, fish, and more. I am really social when talking to people and have a lot of friends that I have great relationships with. This year at Old Dominion University, so far I love going to the web, going to the recreational center to lift and play basketball, and hanging out with friends. I am currently enrolled in the honors college at Old Dominion University.<\/p>\n\n\n\n<p><strong>Thoughts about Cybersecurity and Social sciences<\/strong><\/p>\n\n\n\n<p><strong>Human Behavior is the Weakest Link in Cybersecurity<\/strong><\/p>\n\n\n\n<ul>\n<li>Social engineering attacks, like phishing, exploit human psychology rather than technical vulnerabilities. Understanding decision-making and cognitive biases can help build better security measures. <\/li>\n\n\n\n<li> <img loading=\"lazy\" decoding=\"async\" width=\"304\" height=\"166\" class=\"wp-image-339\" style=\"width: 300px\" src=\"http:\/\/sites.wp.odu.edu\/jjohn287\/wp-content\/uploads\/sites\/37397\/2025\/02\/hackerm.png\" alt=\"\" srcset=\"https:\/\/sites.wp.odu.edu\/jjohn287\/wp-content\/uploads\/sites\/37397\/2025\/02\/hackerm.png 304w, https:\/\/sites.wp.odu.edu\/jjohn287\/wp-content\/uploads\/sites\/37397\/2025\/02\/hackerm-300x164.png 300w\" sizes=\"(max-width: 304px) 100vw, 304px\" \/><\/li>\n<\/ul>\n\n\n\n<p><strong>Privacy vs. Security: The Ethical Dilemma<\/strong><\/p>\n\n\n\n<ul>\n<li>Governments and companies collect vast amounts of data for security purposes, but where do we draw the line between protection and surveillance? Social scientists analyze how people perceive and react to these trade-offs.  <\/li>\n\n\n\n<li><img loading=\"lazy\" decoding=\"async\" width=\"999\" height=\"1000\" class=\"wp-image-340\" style=\"width: 300px\" src=\"http:\/\/sites.wp.odu.edu\/jjohn287\/wp-content\/uploads\/sites\/37397\/2025\/02\/sa.jpg\" alt=\"\" srcset=\"https:\/\/sites.wp.odu.edu\/jjohn287\/wp-content\/uploads\/sites\/37397\/2025\/02\/sa.jpg 999w, https:\/\/sites.wp.odu.edu\/jjohn287\/wp-content\/uploads\/sites\/37397\/2025\/02\/sa-300x300.jpg 300w, https:\/\/sites.wp.odu.edu\/jjohn287\/wp-content\/uploads\/sites\/37397\/2025\/02\/sa-150x150.jpg 150w, https:\/\/sites.wp.odu.edu\/jjohn287\/wp-content\/uploads\/sites\/37397\/2025\/02\/sa-768x769.jpg 768w\" sizes=\"(max-width: 999px) 100vw, 999px\" \/><\/li>\n<\/ul>\n\n\n\n<p><strong>Cybersecurity Education Needs a Social Approach<\/strong><\/p>\n\n\n\n<ul>\n<li>Teaching people about cybersecurity isn\u2019t just about tech skills; it requires understanding social behaviors and motivations. Social scientists can help design better training programs. <img loading=\"lazy\" decoding=\"async\" width=\"1200\" height=\"630\" class=\"wp-image-341\" style=\"width: 300px\" src=\"http:\/\/sites.wp.odu.edu\/jjohn287\/wp-content\/uploads\/sites\/37397\/2025\/02\/EngageStudentsCybersecurity_social-share.png\" alt=\"\" srcset=\"https:\/\/sites.wp.odu.edu\/jjohn287\/wp-content\/uploads\/sites\/37397\/2025\/02\/EngageStudentsCybersecurity_social-share.png 1200w, https:\/\/sites.wp.odu.edu\/jjohn287\/wp-content\/uploads\/sites\/37397\/2025\/02\/EngageStudentsCybersecurity_social-share-300x158.png 300w, https:\/\/sites.wp.odu.edu\/jjohn287\/wp-content\/uploads\/sites\/37397\/2025\/02\/EngageStudentsCybersecurity_social-share-1024x538.png 1024w, https:\/\/sites.wp.odu.edu\/jjohn287\/wp-content\/uploads\/sites\/37397\/2025\/02\/EngageStudentsCybersecurity_social-share-768x403.png 768w, https:\/\/sites.wp.odu.edu\/jjohn287\/wp-content\/uploads\/sites\/37397\/2025\/02\/EngageStudentsCybersecurity_social-share-571x300.png 571w\" sizes=\"(max-width: 1200px) 100vw, 1200px\" \/><\/li>\n<\/ul>\n\n\n\n<p><strong>Misinformation and Psychological Warfare<\/strong><\/p>\n\n\n\n<ul>\n<li>Cybersecurity isn&#8217;t just about hacking\u2014it&#8217;s also about controlling narratives. Disinformation campaigns exploit social trust and spread rapidly online, impacting elections, public opinion, and security. <\/li>\n<\/ul>\n\n\n\n<p><img loading=\"lazy\" decoding=\"async\" width=\"1500\" height=\"1101\" class=\"wp-image-338\" style=\"width: 300px\" src=\"http:\/\/sites.wp.odu.edu\/jjohn287\/wp-content\/uploads\/sites\/37397\/2025\/02\/fnws.jpg\" alt=\"\" srcset=\"https:\/\/sites.wp.odu.edu\/jjohn287\/wp-content\/uploads\/sites\/37397\/2025\/02\/fnws.jpg 1500w, https:\/\/sites.wp.odu.edu\/jjohn287\/wp-content\/uploads\/sites\/37397\/2025\/02\/fnws-300x220.jpg 300w, https:\/\/sites.wp.odu.edu\/jjohn287\/wp-content\/uploads\/sites\/37397\/2025\/02\/fnws-1024x752.jpg 1024w, https:\/\/sites.wp.odu.edu\/jjohn287\/wp-content\/uploads\/sites\/37397\/2025\/02\/fnws-768x564.jpg 768w, https:\/\/sites.wp.odu.edu\/jjohn287\/wp-content\/uploads\/sites\/37397\/2025\/02\/fnws-409x300.jpg 409w\" sizes=\"(max-width: 1500px) 100vw, 1500px\" \/><\/p>\n\n\n\n<p><strong>The Digital Divide Creates Cybersecurity Gaps<\/strong><\/p>\n\n\n\n<ul>\n<li>Not everyone has equal access to cybersecurity knowledge or tools. Socioeconomic factors influence who is most vulnerable to cyber threats, making it a social justice issue as much as a technical one.<br> <img loading=\"lazy\" decoding=\"async\" width=\"681\" height=\"510\" class=\"wp-image-342\" style=\"width: 300px\" src=\"http:\/\/sites.wp.odu.edu\/jjohn287\/wp-content\/uploads\/sites\/37397\/2025\/02\/number-cyber-attacks-globally.png\" alt=\"\" srcset=\"https:\/\/sites.wp.odu.edu\/jjohn287\/wp-content\/uploads\/sites\/37397\/2025\/02\/number-cyber-attacks-globally.png 681w, https:\/\/sites.wp.odu.edu\/jjohn287\/wp-content\/uploads\/sites\/37397\/2025\/02\/number-cyber-attacks-globally-300x225.png 300w, https:\/\/sites.wp.odu.edu\/jjohn287\/wp-content\/uploads\/sites\/37397\/2025\/02\/number-cyber-attacks-globally-401x300.png 401w\" sizes=\"(max-width: 681px) 100vw, 681px\" \/><\/li>\n<\/ul>\n\n\n\n<p class=\"has-text-align-center\"><strong>Citations &amp; references <\/strong><\/p>\n\n\n\n<ul>\n<li>John W. Jones, P. (2024, January 10). <em>Employee cybercrime and deviance: A loss prevention psychology perspective<\/em>. Loss Prevention Media. https:\/\/losspreventionmedia.com\/employee-cybercrime-and-deviance-a-loss-prevention psychology perspective\/#:~:text=Employee%20Deviance%20in%20Cyberspace&amp;text=Examples%20of%20cyber%20deviance%20include,of%20company%20systems%20or%20data. <\/li>\n\n\n\n<li><em>Security alert surveillance cameras are recording you theft will be prosecuted sign, 12&#215;12 inches, Rust Free .040 aluminum, fade resistant, made in USA by sigo signs: Amazon.com: Industrial &amp; Scientific<\/em>. Amazon. (n.d.). https:\/\/www.amazon.com\/Security-Surveillance-Cameras-Recording-Prosecuted\/dp\/B0CFM9V97Y<\/li>\n\n\n\n<li>Pocket Prep. (2024, September 4). <em>5 ways to make cybersecurity education engaging and effective<\/em>. https:\/\/www.pocketprep.com\/posts\/5-ways-to-make-cybersecurity-education-engaging-and-effective\/ <\/li>\n\n\n\n<li><em>Fake news screen stock photos &#8211; 5250 images<\/em>. Fake News Screen royalty-free images. (n.d.). https:\/\/www.shutterstock.com\/search\/fake-news-screen  <\/li>\n\n\n\n<li><em>Global view of cyber security<\/em>. Intersog. (2024, July 16). http:\/\/intersog.com\/blog\/strategy\/global-view-of-cyber-security\/ <\/li>\n<\/ul>\n","protected":false},"excerpt":{"rendered":"<p>Currently&nbsp;eighteen&nbsp;years&nbsp;old,&nbsp;I&nbsp;am&nbsp;a&nbsp;freshman&nbsp;at&nbsp;Old&nbsp;Dominion&nbsp;University,&nbsp;originally&nbsp;from&nbsp;Brambleton,&nbsp;Virginia. This&nbsp;is&nbsp;how&nbsp;I&nbsp;appear! My major is cybersecurity, and I&#8217;m looking to get a job in the future. I have a mom, dad, sister, and a dog named Prince. My favorite hobbies to do in my free time are play video games, play basketball, ride my scooter, roller skate, fish, and more. I am really social when&#8230; <\/p>\n<div class=\"link-more\"><a href=\"https:\/\/sites.wp.odu.edu\/jjohn287\/\">Read More<\/a><\/div>\n","protected":false},"author":29235,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"open","template":"","meta":{"footnotes":""},"_links":{"self":[{"href":"https:\/\/sites.wp.odu.edu\/jjohn287\/wp-json\/wp\/v2\/pages\/120"}],"collection":[{"href":"https:\/\/sites.wp.odu.edu\/jjohn287\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/sites.wp.odu.edu\/jjohn287\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/jjohn287\/wp-json\/wp\/v2\/users\/29235"}],"replies":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/jjohn287\/wp-json\/wp\/v2\/comments?post=120"}],"version-history":[{"count":4,"href":"https:\/\/sites.wp.odu.edu\/jjohn287\/wp-json\/wp\/v2\/pages\/120\/revisions"}],"predecessor-version":[{"id":343,"href":"https:\/\/sites.wp.odu.edu\/jjohn287\/wp-json\/wp\/v2\/pages\/120\/revisions\/343"}],"wp:attachment":[{"href":"https:\/\/sites.wp.odu.edu\/jjohn287\/wp-json\/wp\/v2\/media?parent=120"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}