{"id":321,"date":"2023-01-22T22:48:16","date_gmt":"2023-01-22T22:48:16","guid":{"rendered":"https:\/\/sites.wp.odu.edu\/ldunk001\/?p=321"},"modified":"2023-01-23T03:42:57","modified_gmt":"2023-01-23T03:42:57","slug":"journal-entry-2-2","status":"publish","type":"post","link":"https:\/\/sites.wp.odu.edu\/ldunk001\/2023\/01\/22\/journal-entry-2-2\/","title":{"rendered":"Journal Entry #2"},"content":{"rendered":"\n<ol>\n<li><strong><em>Explain how the principles of science relate to cybersecurity.<\/em><\/strong><\/li>\n<\/ol>\n\n\n\n<p>Science is respected and uses knowledgeable facts to help create, maintain, and improve useful human endeavors inside many industries. Cybersecurity is an applied science that uses a social science framework, that directly relates to natural scientific processes, to discuss human behaviors involving cybersecurity. Some of these social science principles are listed:<\/p>\n\n\n\n<ul>\n<li>Relativism \u2013 All things in their respective areas are related<\/li>\n\n\n\n<li>Objectivity \u2013 Scientists study topics that doesn\u2019t promote an opinion or bias within issues.<\/li>\n\n\n\n<li>Parsimony \u2013 Scientists are simplifying their explanation as much as possible.<\/li>\n\n\n\n<li>Empiricism \u2013 Scientists only study human behavior based on the five human senses<\/li>\n\n\n\n<li>Ethical Neutrality \u2013 Scientists must obey to standards ethical guidelines.<\/li>\n\n\n\n<li>Determinism \u2013 Behavior is caused, determined, or influenced by preceding events.<\/li>\n<\/ul>\n\n\n\n<p>While some of these principles focus on guidelines cybersecurity researches or scientists must abide to push hypothesis and theories relating in the field, other principles focuses on user interactions. An example, why do individuals (choose to) engage in risky online activities?<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Science is respected and uses knowledgeable facts to help create, maintain, and improve useful human endeavors inside many industries. Cybersecurity is an applied science that uses a social science framework, that directly relates to natural scientific processes, to discuss human behaviors involving cybersecurity. Some of these social science principles are listed: While some of these&#8230; <\/p>\n<div class=\"link-more\"><a href=\"https:\/\/sites.wp.odu.edu\/ldunk001\/2023\/01\/22\/journal-entry-2-2\/\">Read More<\/a><\/div>\n","protected":false},"author":21557,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":"","wds_primary_category":0},"categories":[3],"tags":[],"_links":{"self":[{"href":"https:\/\/sites.wp.odu.edu\/ldunk001\/wp-json\/wp\/v2\/posts\/321"}],"collection":[{"href":"https:\/\/sites.wp.odu.edu\/ldunk001\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/sites.wp.odu.edu\/ldunk001\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/ldunk001\/wp-json\/wp\/v2\/users\/21557"}],"replies":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/ldunk001\/wp-json\/wp\/v2\/comments?post=321"}],"version-history":[{"count":2,"href":"https:\/\/sites.wp.odu.edu\/ldunk001\/wp-json\/wp\/v2\/posts\/321\/revisions"}],"predecessor-version":[{"id":342,"href":"https:\/\/sites.wp.odu.edu\/ldunk001\/wp-json\/wp\/v2\/posts\/321\/revisions\/342"}],"wp:attachment":[{"href":"https:\/\/sites.wp.odu.edu\/ldunk001\/wp-json\/wp\/v2\/media?parent=321"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/ldunk001\/wp-json\/wp\/v2\/categories?post=321"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/ldunk001\/wp-json\/wp\/v2\/tags?post=321"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}