{"id":412,"date":"2025-11-05T01:18:26","date_gmt":"2025-11-05T01:18:26","guid":{"rendered":"https:\/\/sites.wp.odu.edu\/jmint006\/?p=412"},"modified":"2025-11-05T01:18:26","modified_gmt":"2025-11-05T01:18:26","slug":"the-impact-of-social-cybersecurity","status":"publish","type":"post","link":"https:\/\/sites.wp.odu.edu\/jmint006\/2025\/11\/05\/the-impact-of-social-cybersecurity\/","title":{"rendered":"\u201cThe impact of Social Cybersecurity\u201d"},"content":{"rendered":"\n<p>I really enjoyed reading the article \u201cA survey of Social Cybersecurity: Techniques for attack detection, evaluations, challenges, and the future prospects.\u201d This article raised some good points about why social cybersecurity needs to be a focus today. For example, the article discussed human vulnerability, social media influencers, emerging threats, and the spread of misinformation. I would agree that human error and decision-making are major issues today, which create opportunities for attacks. As the article delves deeper into the breakdown of threats, it gives readers a clear understanding of the real-life situations we face today. Given the advances in technology and the growth of social media influencers, cybersecurity professionals will have to work twice as hard to develop an effective defense system.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>I really enjoyed reading the article \u201cA survey of Social Cybersecurity: Techniques for attack detection, evaluations, challenges, and the future prospects.\u201d This article raised some good points about why social cybersecurity needs to be a focus today. For example, the article discussed human vulnerability, social media influencers, emerging threats, and the spread of misinformation. I&#8230; <\/p>\n<div class=\"link-more\"><a href=\"https:\/\/sites.wp.odu.edu\/jmint006\/2025\/11\/05\/the-impact-of-social-cybersecurity\/\">Read More<\/a><\/div>\n","protected":false},"author":31155,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":"","wds_primary_category":0},"categories":[1],"tags":[],"_links":{"self":[{"href":"https:\/\/sites.wp.odu.edu\/jmint006\/wp-json\/wp\/v2\/posts\/412"}],"collection":[{"href":"https:\/\/sites.wp.odu.edu\/jmint006\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/sites.wp.odu.edu\/jmint006\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/jmint006\/wp-json\/wp\/v2\/users\/31155"}],"replies":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/jmint006\/wp-json\/wp\/v2\/comments?post=412"}],"version-history":[{"count":1,"href":"https:\/\/sites.wp.odu.edu\/jmint006\/wp-json\/wp\/v2\/posts\/412\/revisions"}],"predecessor-version":[{"id":413,"href":"https:\/\/sites.wp.odu.edu\/jmint006\/wp-json\/wp\/v2\/posts\/412\/revisions\/413"}],"wp:attachment":[{"href":"https:\/\/sites.wp.odu.edu\/jmint006\/wp-json\/wp\/v2\/media?parent=412"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/jmint006\/wp-json\/wp\/v2\/categories?post=412"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/jmint006\/wp-json\/wp\/v2\/tags?post=412"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}