{"id":182,"date":"2025-01-29T16:16:51","date_gmt":"2025-01-29T16:16:51","guid":{"rendered":"https:\/\/sites.wp.odu.edu\/kdent006\/?p=182"},"modified":"2025-01-29T16:16:51","modified_gmt":"2025-01-29T16:16:51","slug":"journal-entry-2","status":"publish","type":"post","link":"https:\/\/sites.wp.odu.edu\/kdent006\/2025\/01\/29\/journal-entry-2\/","title":{"rendered":"Journal Entry 2"},"content":{"rendered":"\n<p>How the principles of science relate to cybersecurity is that they both serve as guidelines<br>for further progression in the respective fields. At each principle although they are for more<br>natural sciences as opposed to social science that encompasses cybersecurity, we see that the<br>principles are also applicable to help guide researchers in the work. A clear example of this is in<br>the principle, \u201cRelativism\u201d in that we can observe that one change in a system leads to further<br>development in the corresponding cybersecurity field, progressing parts like technological<br>improvements due to the advancement in daily life appliances and technology for an average<br>citizen. But while the advancement can be known to the people in the field doing the research<br>and progression will have to follow another principle that is \u201cParsimony\u201d which would be<br>explaining what is\/has happened in a simpler way so that others can observe the behavior and<br>test themselves. To conclude the principles of science relate to cybersecurity in that scientists in<br>this field are using these principles to help understand, and mitigate why some individuals might<br>partake in cyber related criminal activity, and with the advancement of technology in peoples<br>personal life, work, and health on how to further push technological advancement and observe<br>and mitigate consequences that might be know or unknown.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>How the principles of science relate to cybersecurity is that they both serve as guidelinesfor further progression in the respective fields. At each principle although they are for morenatural sciences as opposed to social science that encompasses cybersecurity, we see that theprinciples are also applicable to help guide researchers in the work. A clear example&#8230; <\/p>\n<div class=\"link-more\"><a href=\"https:\/\/sites.wp.odu.edu\/kdent006\/2025\/01\/29\/journal-entry-2\/\">Read More<\/a><\/div>\n","protected":false},"author":30384,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":"","wds_primary_category":0},"categories":[3],"tags":[],"_links":{"self":[{"href":"https:\/\/sites.wp.odu.edu\/kdent006\/wp-json\/wp\/v2\/posts\/182"}],"collection":[{"href":"https:\/\/sites.wp.odu.edu\/kdent006\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/sites.wp.odu.edu\/kdent006\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/kdent006\/wp-json\/wp\/v2\/users\/30384"}],"replies":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/kdent006\/wp-json\/wp\/v2\/comments?post=182"}],"version-history":[{"count":1,"href":"https:\/\/sites.wp.odu.edu\/kdent006\/wp-json\/wp\/v2\/posts\/182\/revisions"}],"predecessor-version":[{"id":183,"href":"https:\/\/sites.wp.odu.edu\/kdent006\/wp-json\/wp\/v2\/posts\/182\/revisions\/183"}],"wp:attachment":[{"href":"https:\/\/sites.wp.odu.edu\/kdent006\/wp-json\/wp\/v2\/media?parent=182"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/kdent006\/wp-json\/wp\/v2\/categories?post=182"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/kdent006\/wp-json\/wp\/v2\/tags?post=182"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}