{"id":335,"date":"2023-12-07T01:36:51","date_gmt":"2023-12-07T01:36:51","guid":{"rendered":"https:\/\/sites.wp.odu.edu\/kathmchang\/?p=335"},"modified":"2023-12-07T02:45:21","modified_gmt":"2023-12-07T02:45:21","slug":"summary-of-article-on-social-cybersecurity-journal-entry-10","status":"publish","type":"post","link":"https:\/\/sites.wp.odu.edu\/kathmchang\/2023\/12\/07\/summary-of-article-on-social-cybersecurity-journal-entry-10\/","title":{"rendered":"Summary of Article on Social Cybersecurity &#8211; Journal Entry 10"},"content":{"rendered":"\n<p>Read this and write a journal entry summarizing your response to the article on social cybersecurity<\/p>\n\n\n\n<p>\u00a0<a rel=\"noreferrer noopener\" href=\"https:\/\/www.armyupress.army.mil\/Journals\/Military-Review\/English-Edition-Archives\/Mar-Apr-2019\/117-Cybersecurity\/b\/\" target=\"_blank\">https:\/\/www.armyupress.army.mil\/Journals\/Military-Review\/English-Edition-Archives\/Mar-Apr-2019\/117-Cybersecurity\/b\/Links to an external site.<\/a><\/p>\n\n\n\n<p>The rise of social cybersecurity reveals a shift in warfare, where information manipulation becomes a primary battleground. Dmitry Kiselev&#8217;s assertion that &#8220;information wars&#8221; are the main type of conflict emphasizes the strategic power of shaping narratives and eroding trust. This &#8220;information blitzkrieg&#8221; is reshaping the battlefield, demanding a reevaluation of traditional conflict frameworks.<\/p>\n\n\n\n<p>The distinction between traditional and social cybersecurity, characterized as &#8220;cognitive hacking,&#8221; highlights the unsettling reality of humans manipulating humans. The multidisciplinary nature of social cybersecurity, incorporating computational social science, emphasizes the complexity of addressing cyber threats. As I contemplate these insights, it&#8217;s clear that this goes beyond national security\u2014it challenges the ethical basics of a digitally interconnected society, especially in a militant perspective.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Read this and write a journal entry summarizing your response to the article on social cybersecurity \u00a0https:\/\/www.armyupress.army.mil\/Journals\/Military-Review\/English-Edition-Archives\/Mar-Apr-2019\/117-Cybersecurity\/b\/Links to an external site. The rise of social cybersecurity reveals a shift in warfare, where information manipulation becomes a primary battleground. Dmitry Kiselev&#8217;s assertion that &#8220;information wars&#8221; are the main type of conflict emphasizes the strategic power of [&hellip;]<\/p>\n","protected":false},"author":25748,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":"","wds_primary_category":0},"categories":[9,4],"tags":[],"_links":{"self":[{"href":"https:\/\/sites.wp.odu.edu\/kathmchang\/wp-json\/wp\/v2\/posts\/335"}],"collection":[{"href":"https:\/\/sites.wp.odu.edu\/kathmchang\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/sites.wp.odu.edu\/kathmchang\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/kathmchang\/wp-json\/wp\/v2\/users\/25748"}],"replies":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/kathmchang\/wp-json\/wp\/v2\/comments?post=335"}],"version-history":[{"count":2,"href":"https:\/\/sites.wp.odu.edu\/kathmchang\/wp-json\/wp\/v2\/posts\/335\/revisions"}],"predecessor-version":[{"id":359,"href":"https:\/\/sites.wp.odu.edu\/kathmchang\/wp-json\/wp\/v2\/posts\/335\/revisions\/359"}],"wp:attachment":[{"href":"https:\/\/sites.wp.odu.edu\/kathmchang\/wp-json\/wp\/v2\/media?parent=335"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/kathmchang\/wp-json\/wp\/v2\/categories?post=335"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/kathmchang\/wp-json\/wp\/v2\/tags?post=335"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}