{"id":120,"date":"2023-05-19T20:04:41","date_gmt":"2023-05-19T20:04:41","guid":{"rendered":"https:\/\/wp.odu.edu\/odupresentationtemplate\/?page_id=2"},"modified":"2025-02-17T02:53:43","modified_gmt":"2025-02-17T02:53:43","slug":"sample-page-2","status":"publish","type":"page","link":"https:\/\/sites.wp.odu.edu\/mcpcyber\/","title":{"rendered":"Home"},"content":{"rendered":"\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"810\" height=\"477\" src=\"https:\/\/sites.wp.odu.edu\/mcpcyber\/wp-content\/uploads\/sites\/33421\/2025\/02\/photo2.jpg\" alt=\"\" class=\"wp-image-398\" srcset=\"https:\/\/sites.wp.odu.edu\/mcpcyber\/wp-content\/uploads\/sites\/33421\/2025\/02\/photo2.jpg 810w, https:\/\/sites.wp.odu.edu\/mcpcyber\/wp-content\/uploads\/sites\/33421\/2025\/02\/photo2-300x177.jpg 300w, https:\/\/sites.wp.odu.edu\/mcpcyber\/wp-content\/uploads\/sites\/33421\/2025\/02\/photo2-768x452.jpg 768w, https:\/\/sites.wp.odu.edu\/mcpcyber\/wp-content\/uploads\/sites\/33421\/2025\/02\/photo2-509x300.jpg 509w\" sizes=\"(max-width: 810px) 100vw, 810px\" \/><figcaption class=\"wp-element-caption\">Photo from Kevin Faigle, from &#8220;Cyber, social sciences faculty collaborate to study social media attacks with $500K grant,&#8221; Jagwire, Augusta University, published June 30, 2022. [<a href=\"https:\/\/jagwire.augusta.edu\/cyber-social-sciences-faculty-collaborate-to-study-social-media-attacks-with-500k-grant\/\">Link to Article<\/a>]<\/figcaption><\/figure>\n\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"900\" height=\"600\" src=\"https:\/\/sites.wp.odu.edu\/mcpcyber\/wp-content\/uploads\/sites\/33421\/2025\/02\/photo1.jpg\" alt=\"\" class=\"wp-image-401\" srcset=\"https:\/\/sites.wp.odu.edu\/mcpcyber\/wp-content\/uploads\/sites\/33421\/2025\/02\/photo1.jpg 900w, https:\/\/sites.wp.odu.edu\/mcpcyber\/wp-content\/uploads\/sites\/33421\/2025\/02\/photo1-300x200.jpg 300w, https:\/\/sites.wp.odu.edu\/mcpcyber\/wp-content\/uploads\/sites\/33421\/2025\/02\/photo1-768x512.jpg 768w, https:\/\/sites.wp.odu.edu\/mcpcyber\/wp-content\/uploads\/sites\/33421\/2025\/02\/photo1-450x300.jpg 450w\" sizes=\"(max-width: 900px) 100vw, 900px\" \/><figcaption class=\"wp-element-caption\"><code>Photo from \"Improving Security Science: Dietrich College, Cylab Research Collaboration,\" Carnegie Mellon University, Dietrich College of Humanities and Social Sciences, published August 1, 2017. [<a href=\"https:\/\/www.cmu.edu\/dietrich\/news\/news-stories\/2017\/august\/improving-security-science.html\">Link<\/a>]<\/code><\/figcaption><\/figure>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"724\" src=\"https:\/\/sites.wp.odu.edu\/mcpcyber\/wp-content\/uploads\/sites\/33421\/2025\/02\/photo6-1024x724.png\" alt=\"\" class=\"wp-image-402\" srcset=\"https:\/\/sites.wp.odu.edu\/mcpcyber\/wp-content\/uploads\/sites\/33421\/2025\/02\/photo6-1024x724.png 1024w, https:\/\/sites.wp.odu.edu\/mcpcyber\/wp-content\/uploads\/sites\/33421\/2025\/02\/photo6-300x212.png 300w, https:\/\/sites.wp.odu.edu\/mcpcyber\/wp-content\/uploads\/sites\/33421\/2025\/02\/photo6-768x543.png 768w, https:\/\/sites.wp.odu.edu\/mcpcyber\/wp-content\/uploads\/sites\/33421\/2025\/02\/photo6-424x300.png 424w, https:\/\/sites.wp.odu.edu\/mcpcyber\/wp-content\/uploads\/sites\/33421\/2025\/02\/photo6.png 1400w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><figcaption class=\"wp-element-caption\"><code>Photo from \"Digital Divide \u2014 A critical analysis\" by Shweta Barupal, published on, August 3, 2018. [<a href=\"https:\/\/medium.com\/@ShwetaBarupal\/digital-divide-a-critical-analysis-7156333237f7\">Link<\/a>]<\/code><\/figcaption><\/figure>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"536\" src=\"https:\/\/sites.wp.odu.edu\/mcpcyber\/wp-content\/uploads\/sites\/33421\/2025\/02\/photo4-1024x536.png\" alt=\"\" class=\"wp-image-403\" srcset=\"https:\/\/sites.wp.odu.edu\/mcpcyber\/wp-content\/uploads\/sites\/33421\/2025\/02\/photo4-1024x536.png 1024w, https:\/\/sites.wp.odu.edu\/mcpcyber\/wp-content\/uploads\/sites\/33421\/2025\/02\/photo4-300x157.png 300w, https:\/\/sites.wp.odu.edu\/mcpcyber\/wp-content\/uploads\/sites\/33421\/2025\/02\/photo4-768x402.png 768w, https:\/\/sites.wp.odu.edu\/mcpcyber\/wp-content\/uploads\/sites\/33421\/2025\/02\/photo4-573x300.png 573w, https:\/\/sites.wp.odu.edu\/mcpcyber\/wp-content\/uploads\/sites\/33421\/2025\/02\/photo4.png 1200w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><figcaption class=\"wp-element-caption\">Photo from &#8220;What are Data Subject Rights according to the GDPR?&#8221; by Data Privacy Manager, published October 16, 2022. [<a href=\"https:\/\/dataprivacymanager.net\/what-are-data-subject-rights-according-to-the-gdpr\/\">Link<\/a>]<\/figcaption><\/figure>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"788\" src=\"https:\/\/sites.wp.odu.edu\/mcpcyber\/wp-content\/uploads\/sites\/33421\/2025\/02\/photo7-1024x788.jpg\" alt=\"\" class=\"wp-image-415\" srcset=\"https:\/\/sites.wp.odu.edu\/mcpcyber\/wp-content\/uploads\/sites\/33421\/2025\/02\/photo7-1024x788.jpg 1024w, https:\/\/sites.wp.odu.edu\/mcpcyber\/wp-content\/uploads\/sites\/33421\/2025\/02\/photo7-300x231.jpg 300w, https:\/\/sites.wp.odu.edu\/mcpcyber\/wp-content\/uploads\/sites\/33421\/2025\/02\/photo7-768x591.jpg 768w, https:\/\/sites.wp.odu.edu\/mcpcyber\/wp-content\/uploads\/sites\/33421\/2025\/02\/photo7-1536x1182.jpg 1536w, https:\/\/sites.wp.odu.edu\/mcpcyber\/wp-content\/uploads\/sites\/33421\/2025\/02\/photo7-390x300.jpg 390w, https:\/\/sites.wp.odu.edu\/mcpcyber\/wp-content\/uploads\/sites\/33421\/2025\/02\/photo7.jpg 1920w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><figcaption class=\"wp-element-caption\">Photo from \u201cWhat are the Major Types of Cybercrime\u201d published by B_A from Pixabay on May, 20, 2019 [<a href=\"https:\/\/coolidgelawfirmaz.com\/what-are-the-major-types-of-cybercrime\/\">link<\/a>]<\/figcaption><\/figure>\n\n\n\n<p><\/p>\n\n\n\n<p><\/p>\n\n\n\n<p><\/p>\n\n\n\n<p><\/p>\n","protected":false},"excerpt":{"rendered":"","protected":false},"author":26741,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"open","template":"","meta":{"footnotes":""},"_links":{"self":[{"href":"https:\/\/sites.wp.odu.edu\/mcpcyber\/wp-json\/wp\/v2\/pages\/120"}],"collection":[{"href":"https:\/\/sites.wp.odu.edu\/mcpcyber\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/sites.wp.odu.edu\/mcpcyber\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/mcpcyber\/wp-json\/wp\/v2\/users\/26741"}],"replies":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/mcpcyber\/wp-json\/wp\/v2\/comments?post=120"}],"version-history":[{"count":5,"href":"https:\/\/sites.wp.odu.edu\/mcpcyber\/wp-json\/wp\/v2\/pages\/120\/revisions"}],"predecessor-version":[{"id":417,"href":"https:\/\/sites.wp.odu.edu\/mcpcyber\/wp-json\/wp\/v2\/pages\/120\/revisions\/417"}],"wp:attachment":[{"href":"https:\/\/sites.wp.odu.edu\/mcpcyber\/wp-json\/wp\/v2\/media?parent=120"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}