{"id":297,"date":"2024-04-22T00:38:45","date_gmt":"2024-04-22T00:38:45","guid":{"rendered":"https:\/\/sites.wp.odu.edu\/jmuns002\/?p=297"},"modified":"2024-04-22T00:38:45","modified_gmt":"2024-04-22T00:38:45","slug":"eportfolio-entry-6","status":"publish","type":"post","link":"https:\/\/sites.wp.odu.edu\/jmuns002\/2024\/04\/22\/eportfolio-entry-6\/","title":{"rendered":"ePortfolio entry 6"},"content":{"rendered":"\n<ol>\n<li><strong>Unauthorized Access and Data Theft:<\/strong> Employees may exploit cyber technology to gain unauthorized access to sensitive data or systems, leading to data theft or intellectual property breaches.<\/li>\n\n\n\n<li><strong>Cyberbullying and Harassment:<\/strong> Digital communication channels allow for cyberbullying and harassment, including sending harassing emails, messages, or posting offensive content online.<\/li>\n\n\n\n<li><strong>Cyber Sabotage:<\/strong> Employees can misuse cyber technology to intentionally sabotage company operations or systems, such as deleting files, introducing malware, or disrupting network connectivity.<\/li>\n\n\n\n<li><strong>Time Theft and Non-Work Related Activities:<\/strong> Employees may misuse work hours for personal activities like social media browsing or online shopping, reducing productivity and diverting resources.<\/li>\n\n\n\n<li><strong>Misuse of Company Resources:<\/strong> Cyber technology enables employees to misuse company resources, such as computers or internet bandwidth, for personal gain or activities unrelated to work responsibilities, leading to misuse and potential security risks.<\/li>\n<\/ol>\n","protected":false},"excerpt":{"rendered":"","protected":false},"author":28197,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":"","wds_primary_category":0},"categories":[1],"tags":[],"_links":{"self":[{"href":"https:\/\/sites.wp.odu.edu\/jmuns002\/wp-json\/wp\/v2\/posts\/297"}],"collection":[{"href":"https:\/\/sites.wp.odu.edu\/jmuns002\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/sites.wp.odu.edu\/jmuns002\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/jmuns002\/wp-json\/wp\/v2\/users\/28197"}],"replies":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/jmuns002\/wp-json\/wp\/v2\/comments?post=297"}],"version-history":[{"count":1,"href":"https:\/\/sites.wp.odu.edu\/jmuns002\/wp-json\/wp\/v2\/posts\/297\/revisions"}],"predecessor-version":[{"id":298,"href":"https:\/\/sites.wp.odu.edu\/jmuns002\/wp-json\/wp\/v2\/posts\/297\/revisions\/298"}],"wp:attachment":[{"href":"https:\/\/sites.wp.odu.edu\/jmuns002\/wp-json\/wp\/v2\/media?parent=297"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/jmuns002\/wp-json\/wp\/v2\/categories?post=297"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/jmuns002\/wp-json\/wp\/v2\/tags?post=297"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}