{"id":431,"date":"2025-11-19T21:26:14","date_gmt":"2025-11-20T04:56:14","guid":{"rendered":"https:\/\/sites.wp.odu.edu\/melissadbaddie\/?page_id=431"},"modified":"2025-12-02T21:17:37","modified_gmt":"2025-12-03T04:47:37","slug":"journal-entry-10","status":"publish","type":"page","link":"https:\/\/sites.wp.odu.edu\/melissadbaddie\/journal-entry-10\/","title":{"rendered":"Journal Entry # 10"},"content":{"rendered":"\n<p>Read this and write a journal entry summarizing your response to the article on social cybersecurity<\/p>\n\n\n\n<p><a href=\"https:\/\/www.sciencedirect.com\/science\/article\/pii\/S2451958825000831\" target=\"_blank\" rel=\"noreferrer noopener\">https:\/\/www.sciencedirect.com\/science\/article\/pii\/S2451958825000831Links to an external site.<\/a><\/p>\n\n\n\n<p>After reviewing the article and the current module, I feel more confident in the field that I have chosen to study. I believe I was aware of the vulnerability that most people had when it came to using computers, in particular social media and oversharing. But now I am weary and to the point that I don\u2019t want to be on the internet and know that it is too late. Which leads me back to my original statement of how this reaffirmed my interest in cybersecurity and how important awareness is for everyone. I will be sharing the six principal factors that attribute to human vulnerability regarding social cybersecurity. A term that is constant in this discipline which is motivation to protect oneself is the human is the weakest link. If the human factor can avoid social manipulation and malicious digital activities, they will be just a little bit safer.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Read this and write a journal entry summarizing your response to the article on social cybersecurity https:\/\/www.sciencedirect.com\/science\/article\/pii\/S2451958825000831Links to an external site. After reviewing the article and the current module, I feel more confident in the field that I have chosen to study. I believe I was aware of the vulnerability that most people had when&#8230; <\/p>\n<div class=\"link-more\"><a href=\"https:\/\/sites.wp.odu.edu\/melissadbaddie\/journal-entry-10\/\">Read More<\/a><\/div>\n","protected":false},"author":31268,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"_links":{"self":[{"href":"https:\/\/sites.wp.odu.edu\/melissadbaddie\/wp-json\/wp\/v2\/pages\/431"}],"collection":[{"href":"https:\/\/sites.wp.odu.edu\/melissadbaddie\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/sites.wp.odu.edu\/melissadbaddie\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/melissadbaddie\/wp-json\/wp\/v2\/users\/31268"}],"replies":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/melissadbaddie\/wp-json\/wp\/v2\/comments?post=431"}],"version-history":[{"count":2,"href":"https:\/\/sites.wp.odu.edu\/melissadbaddie\/wp-json\/wp\/v2\/pages\/431\/revisions"}],"predecessor-version":[{"id":488,"href":"https:\/\/sites.wp.odu.edu\/melissadbaddie\/wp-json\/wp\/v2\/pages\/431\/revisions\/488"}],"wp:attachment":[{"href":"https:\/\/sites.wp.odu.edu\/melissadbaddie\/wp-json\/wp\/v2\/media?parent=431"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}