{"id":245,"date":"2025-12-07T04:25:03","date_gmt":"2025-12-07T04:25:03","guid":{"rendered":"https:\/\/sites.wp.odu.edu\/khamari-cyse201s-eportfolio\/?p=245"},"modified":"2025-12-07T05:04:03","modified_gmt":"2025-12-07T05:04:03","slug":"week-12-journal-entry","status":"publish","type":"post","link":"https:\/\/sites.wp.odu.edu\/khamari-cyse201s-eportfolio\/2025\/12\/07\/week-12-journal-entry\/","title":{"rendered":"Week 14 &amp; 15 &#8211; Journal Entry"},"content":{"rendered":"\n<p><strong><em>Week 14 Details: <\/em><\/strong><\/p>\n\n\n\n<p><a href=\"https:\/\/clario.co\/blog\/illegal-things-you-do-online\/\" target=\"_blank\" rel=\"noreferrer noopener\">Andriy\u00a0Links to an external site.SlynchukLinks to an external site.\u00a0Links to an external site.<\/a>has described eleven things Internet users do that may be illegal. Review what the author says and write a paragraph describing the five most serious violations and why you think those offenses are serious.<\/p>\n\n\n\n<p><strong><em>My Response: <\/em><\/strong><\/p>\n\n\n\n<p>Here are five of the most serious potential violations from Andriy Slynchuk&#8217;s list, that I think are the most serious violations along with why they matter:<\/p>\n\n\n\n<p>1. &nbsp;Copyright Infringement (Downloading\/Sharing Copyrighted Material): Illegally downloading movies, music, software, or e-books. This undermines creators&#8217; rights to profit from their work, potentially stifling creativity and innovation.<\/p>\n\n\n\n<p>2. &nbsp;Unauthorized Streaming or Broadcasting: Streaming or broadcasting copyrighted content without permission. Similar to downloading, this deprives copyright holders of revenue and control over their work&#8217;s distribution.<\/p>\n\n\n\n<p>3. &nbsp;Hacking and Unauthorized Access: Gaining access to computer systems, networks, or data without authorization. This can lead to data breaches, identity theft, and significant financial or operational damage to individuals and organizations.<\/p>\n\n\n\n<p>4. &nbsp;Online Fraud and Scams: Engaging in activities like phishing, Ponzi schemes, or selling counterfeit goods online. These actions can cause substantial financial harm to victims and erode trust in online commerce.<\/p>\n\n\n\n<p>5. \u00a0Cyberbullying and Harassment: Engaging in targeted, malicious, and repeated harassment of individuals online. This can cause severe emotional distress, psychological harm, and even lead to real-world consequences for victims.<\/p>\n\n\n\n<p><strong><em>Week 15 Details: <\/em><\/strong><\/p>\n\n\n\n<ul>\n<li><strong><a href=\"https:\/\/www.youtube.com\/watch?v=YWGZ12ohMJU\" target=\"_blank\" rel=\"noreferrer noopener\">Dark Side of AI &#8211; How Hackers use AI &amp; Deepfakes | Mark T. Hofmann |Links to an external site.<\/a>&nbsp;<\/strong><strong>TEDxAristide<\/strong><strong>&nbsp;<\/strong><strong>Demetriade<\/strong><strong>&nbsp;Street<\/strong>\n<ul>\n<li>Watch this video and describe, What ethical questions did the presentation raise for you? How do you think society should address these ethical concerns?<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n\n\n\n<p><strong><em>My Response: <\/em><\/strong><\/p>\n\n\n\n<p>Questions:<\/p>\n\n\n\n<p>When the victims might be ordinary people, how do we protect the vulnerable \u2014 children, marginalized groups, people lacking resources to defend themselves?<br>How do we ensure accountability when bad actors may be hidden, anonymous, or operate across borders?<\/p>\n\n\n\n<p>How do you think society should address these ethical concerns?<\/p>\n\n\n\n<p>How should society protect vulnerable people (children, marginalized groups, low-resource individuals)?<br>Stronger legal protections against non-consensual deepfakes, impersonation, and AI-enabled harassment, with penalties that deter misuse.<br>Accessible reporting and rapid removal systems so victims can quickly get harmful content taken down.<\/p>\n\n\n\n<p>Education and digital literacy, especially for youth and vulnerable communities, to help them recognize and avoid AI-driven manipulation or scams.<\/p>\n\n\n\n<p>Support services (legal, psychological, financial) for victims who may not have the resources to defend themselves.<\/p>\n\n\n\n<p>How do we ensure accountability when bad actors may be anonymous or overseas?<br>International cooperation and treaties that treat AI-enabled crimes like cybercrime, allowing cross-border investigation and prosecution.<\/p>\n\n\n\n<p>Mandatory transparency and traceability features in AI tools (i.e., watermarking, audit logs) that help identify the origin of malicious content.<\/p>\n\n\n\n<p>Platform responsibility\u2014companies hosting or enabling AI-generated content should detect, flag, and remove harmful deepfakes and cooperate with law enforcement.<\/p>\n\n\n\n<p>Strengthening cybersecurity and digital forensics to better track attackers even when they attempt to hide their identity.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Week 14 Details: Andriy\u00a0Links to an external site.SlynchukLinks to an external site.\u00a0Links to an external site.has described eleven things Internet users do that may be illegal. Review&hellip; <span class=\"read-more\"><a class=\"more-link\" href=\"https:\/\/sites.wp.odu.edu\/khamari-cyse201s-eportfolio\/2025\/12\/07\/week-12-journal-entry\/\" rel=\"bookmark\">Read more <span class=\"screen-reader-text\">&#8220;Week 14 &amp; 15 &#8211; Journal Entry&#8221;<\/span><\/a><\/span><\/p>\n","protected":false},"author":26908,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":"","wds_primary_category":0},"categories":[1],"tags":[],"_links":{"self":[{"href":"https:\/\/sites.wp.odu.edu\/khamari-cyse201s-eportfolio\/wp-json\/wp\/v2\/posts\/245"}],"collection":[{"href":"https:\/\/sites.wp.odu.edu\/khamari-cyse201s-eportfolio\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/sites.wp.odu.edu\/khamari-cyse201s-eportfolio\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/khamari-cyse201s-eportfolio\/wp-json\/wp\/v2\/users\/26908"}],"replies":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/khamari-cyse201s-eportfolio\/wp-json\/wp\/v2\/comments?post=245"}],"version-history":[{"count":3,"href":"https:\/\/sites.wp.odu.edu\/khamari-cyse201s-eportfolio\/wp-json\/wp\/v2\/posts\/245\/revisions"}],"predecessor-version":[{"id":292,"href":"https:\/\/sites.wp.odu.edu\/khamari-cyse201s-eportfolio\/wp-json\/wp\/v2\/posts\/245\/revisions\/292"}],"wp:attachment":[{"href":"https:\/\/sites.wp.odu.edu\/khamari-cyse201s-eportfolio\/wp-json\/wp\/v2\/media?parent=245"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/khamari-cyse201s-eportfolio\/wp-json\/wp\/v2\/categories?post=245"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/khamari-cyse201s-eportfolio\/wp-json\/wp\/v2\/tags?post=245"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}