{"id":426,"date":"2025-11-08T15:10:35","date_gmt":"2025-11-08T15:10:35","guid":{"rendered":"https:\/\/sites.wp.odu.edu\/jmint006\/?p=426"},"modified":"2025-11-08T15:10:35","modified_gmt":"2025-11-08T15:10:35","slug":"protecting-people-not-just-systems-a-new-approach-to-cyber-defense-journal-13","status":"publish","type":"post","link":"https:\/\/sites.wp.odu.edu\/jmint006\/2025\/11\/08\/protecting-people-not-just-systems-a-new-approach-to-cyber-defense-journal-13\/","title":{"rendered":"\u201cProtecting People, Not Just Systems: A New Approach to Cyber Defense\u201d Journal 13"},"content":{"rendered":"\n<p>After reading the article \u201cHacking for good: Leveraging HackerOne data to develop an economic model of Bug Bounties,\u201d I learned that social cybersecurity is not just about focusing on technical threats; it also involves how people are targeted through false information and fake content. Therefore, more is needed to protect the way people think and interact online. The article indicated the need for collaboration among network analysis, psychology, and data science to prepare better and stop attacks. Using these tools can quickly help recognize and prevent the spread of attacks. \u00a0The article goes into detail about how online campaigns can shape individuals\u2019 opinions and cause real-world damage. Furthermore, the article goes into details that current policies are not enough, and there should be more hands on strategies that incorporate social science tools to protect people and online communities. I agree; any plan that provides greater protection and stronger strategies to prevent attacks is great.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>After reading the article \u201cHacking for good: Leveraging HackerOne data to develop an economic model of Bug Bounties,\u201d I learned that social cybersecurity is not just about focusing on technical threats; it also involves how people are targeted through false information and fake content. Therefore, more is needed to protect the way people think and&#8230; <\/p>\n<div class=\"link-more\"><a href=\"https:\/\/sites.wp.odu.edu\/jmint006\/2025\/11\/08\/protecting-people-not-just-systems-a-new-approach-to-cyber-defense-journal-13\/\">Read More<\/a><\/div>\n","protected":false},"author":31155,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":"","wds_primary_category":0},"categories":[1],"tags":[],"_links":{"self":[{"href":"https:\/\/sites.wp.odu.edu\/jmint006\/wp-json\/wp\/v2\/posts\/426"}],"collection":[{"href":"https:\/\/sites.wp.odu.edu\/jmint006\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/sites.wp.odu.edu\/jmint006\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/jmint006\/wp-json\/wp\/v2\/users\/31155"}],"replies":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/jmint006\/wp-json\/wp\/v2\/comments?post=426"}],"version-history":[{"count":1,"href":"https:\/\/sites.wp.odu.edu\/jmint006\/wp-json\/wp\/v2\/posts\/426\/revisions"}],"predecessor-version":[{"id":427,"href":"https:\/\/sites.wp.odu.edu\/jmint006\/wp-json\/wp\/v2\/posts\/426\/revisions\/427"}],"wp:attachment":[{"href":"https:\/\/sites.wp.odu.edu\/jmint006\/wp-json\/wp\/v2\/media?parent=426"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/jmint006\/wp-json\/wp\/v2\/categories?post=426"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/jmint006\/wp-json\/wp\/v2\/tags?post=426"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}