{"id":339,"date":"2024-12-08T19:43:38","date_gmt":"2024-12-08T19:43:38","guid":{"rendered":"https:\/\/sites.wp.odu.edu\/mohammadsaleh\/?page_id=339"},"modified":"2024-12-08T19:52:37","modified_gmt":"2024-12-08T19:52:37","slug":"journal-10","status":"publish","type":"page","link":"https:\/\/sites.wp.odu.edu\/mohammadsaleh\/journal-10\/","title":{"rendered":"Journal 10"},"content":{"rendered":"\n<p>Question: Read this and write a journal entry summarizing your response to the article on social cybersecurity<a href=\"https:\/\/www.armyupress.army.mil\/Journals\/Military-Review\/English-Edition-Archives\/Mar-Apr-2019\/117-Cybersecurity\/b\/\" target=\"_blank\" rel=\"noreferrer noopener\">https:\/\/www.armyupress.army.mil\/Journals\/Military-Review\/English-Edition-Archives\/Mar-Apr-2019\/117-Cybersecurity\/b\/Links to an external site.<\/a><\/p>\n\n\n\n<p>This article has many connections to social cybersecurity. One of the main points discussed is<br>how cyber information can be used to change and influence human behavior especially in the<br>cybersecurity atmosphere. They use examples like Russia to explain how information is used to<br>exploit societal divisions and weaken public opinion. Social cybersecurity addresses these<br>threats by focusing on the human aspect, showing that technology is not just used to \u201chack\u201d but<br>to change political and social norms. The Russian example clearly shows the consequences of<br>such actions, highlighting the need for a form of defense against these tactics.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Question: Read this and write a journal entry summarizing your response to the article on social cybersecurityhttps:\/\/www.armyupress.army.mil\/Journals\/Military-Review\/English-Edition-Archives\/Mar-Apr-2019\/117-Cybersecurity\/b\/Links to an external site. This article has many connections to social cybersecurity. One of the main points discussed ishow cyber information can be used to change and influence human behavior especially in thecybersecurity atmosphere. They use examples like&#8230; <\/p>\n<div class=\"link-more\"><a href=\"https:\/\/sites.wp.odu.edu\/mohammadsaleh\/journal-10\/\">Read More<\/a><\/div>\n","protected":false},"author":29366,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"_links":{"self":[{"href":"https:\/\/sites.wp.odu.edu\/mohammadsaleh\/wp-json\/wp\/v2\/pages\/339"}],"collection":[{"href":"https:\/\/sites.wp.odu.edu\/mohammadsaleh\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/sites.wp.odu.edu\/mohammadsaleh\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/mohammadsaleh\/wp-json\/wp\/v2\/users\/29366"}],"replies":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/mohammadsaleh\/wp-json\/wp\/v2\/comments?post=339"}],"version-history":[{"count":2,"href":"https:\/\/sites.wp.odu.edu\/mohammadsaleh\/wp-json\/wp\/v2\/pages\/339\/revisions"}],"predecessor-version":[{"id":388,"href":"https:\/\/sites.wp.odu.edu\/mohammadsaleh\/wp-json\/wp\/v2\/pages\/339\/revisions\/388"}],"wp:attachment":[{"href":"https:\/\/sites.wp.odu.edu\/mohammadsaleh\/wp-json\/wp\/v2\/media?parent=339"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}