{"id":299,"date":"2025-09-08T09:57:19","date_gmt":"2025-09-08T17:27:19","guid":{"rendered":"https:\/\/sites.wp.odu.edu\/melissadbaddie\/?p=299"},"modified":"2025-10-11T12:47:11","modified_gmt":"2025-10-11T20:17:11","slug":"journal-entry-3","status":"publish","type":"post","link":"https:\/\/sites.wp.odu.edu\/melissadbaddie\/2025\/09\/08\/journal-entry-3\/","title":{"rendered":"Journal Entry # 3"},"content":{"rendered":"\n<p>Visit&nbsp;<a href=\"https:\/\/privacyrights.org\/\" target=\"_blank\" rel=\"noreferrer noopener\">PrivacyRights.orgLinks to an external site.<\/a>&nbsp;to&nbsp;see the types of publicly available information&nbsp;about data breaches. How might researchers use this information to&nbsp;study breaches and forecast future data breach trends ? Enter a paragraph in your journal.<\/p>\n\n\n\n<p>I think with all the information that is on the website and the amount of data to analyze and attempt to predict that they have a lot of work ahead. It will take a while to figure out what exactly they want to do. I understand research methods have some steps that are in different order but when the data is already provided, then you must develop your theory or argument. The researchers should predict future data breaches by using a radical structuralism paradigm. The current times have allowed for a combination of empirical observation and logical reasoning. The website allows this to be a field study, and the demographic doesn\u2019t have to be limited to small groups, but to unsuspecting users. &nbsp;There are multiple case studies that could be conducted. That is just a suggestion as well of course.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Visit&nbsp;PrivacyRights.orgLinks to an external site.&nbsp;to&nbsp;see the types of publicly available information&nbsp;about data breaches. How might researchers use this information to&nbsp;study breaches and forecast future data breach trends ? Enter a paragraph in your journal. I think with all the information that is on the website and the amount of data to analyze and attempt to&#8230; <\/p>\n<div class=\"link-more\"><a href=\"https:\/\/sites.wp.odu.edu\/melissadbaddie\/2025\/09\/08\/journal-entry-3\/\">Read More<\/a><\/div>\n","protected":false},"author":31268,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":"","wds_primary_category":1},"categories":[1],"tags":[],"_links":{"self":[{"href":"https:\/\/sites.wp.odu.edu\/melissadbaddie\/wp-json\/wp\/v2\/posts\/299"}],"collection":[{"href":"https:\/\/sites.wp.odu.edu\/melissadbaddie\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/sites.wp.odu.edu\/melissadbaddie\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/melissadbaddie\/wp-json\/wp\/v2\/users\/31268"}],"replies":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/melissadbaddie\/wp-json\/wp\/v2\/comments?post=299"}],"version-history":[{"count":2,"href":"https:\/\/sites.wp.odu.edu\/melissadbaddie\/wp-json\/wp\/v2\/posts\/299\/revisions"}],"predecessor-version":[{"id":350,"href":"https:\/\/sites.wp.odu.edu\/melissadbaddie\/wp-json\/wp\/v2\/posts\/299\/revisions\/350"}],"wp:attachment":[{"href":"https:\/\/sites.wp.odu.edu\/melissadbaddie\/wp-json\/wp\/v2\/media?parent=299"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/melissadbaddie\/wp-json\/wp\/v2\/categories?post=299"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/melissadbaddie\/wp-json\/wp\/v2\/tags?post=299"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}