{"id":350,"date":"2024-12-08T19:36:15","date_gmt":"2024-12-08T19:36:15","guid":{"rendered":"https:\/\/sites.wp.odu.edu\/moore-moses\/?page_id=350"},"modified":"2024-12-08T19:36:15","modified_gmt":"2024-12-08T19:36:15","slug":"journal-10","status":"publish","type":"page","link":"https:\/\/sites.wp.odu.edu\/moore-moses\/journal-10\/","title":{"rendered":"journal 10"},"content":{"rendered":"\n<p>Read this and write a journal entry summarizing your response to the article on social cybersecurity<\/p>\n\n\n\n<p>\u00a0<a href=\"https:\/\/www.armyupress.army.mil\/Journals\/Military-Review\/English-Edition-Archives\/Mar-Apr-2019\/117-Cybersecurity\/b\/\" target=\"_blank\" rel=\"noreferrer noopener\">https:\/\/www.armyupress.army.mil\/Journals\/Military-Review\/English-Edition-Archives\/Mar-Apr-2019\/117-Cybersecurity\/b\/Links to an external site.<\/a><\/p>\n\n\n\n<p>First, we need to define social cybersecurity, &#8220;is an emerging scientific area focused on the science to characterize, understand, and forecast cyber-mediated changes in human behavior, social, cultural, and political outcomes, and to build the cyber-infrastructure needed for society to persist in its essential character in a cyber-mediated information environment under changing conditions, actual or imminent social cyber-threats&#8221;. This definition is used to relate to technology today which is changing the battlefield. Technology is used to gain information; in war, information is the strengthening aspect of the front of war. this is an example of how social cybersecurity works which is where humans use technology to &#8220;hack&#8221; other humans.\u00a0<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Read this and write a journal entry summarizing your response to the article on social cybersecurity \u00a0https:\/\/www.armyupress.army.mil\/Journals\/Military-Review\/English-Edition-Archives\/Mar-Apr-2019\/117-Cybersecurity\/b\/Links to an external site. First, we need to define social cybersecurity, &#8220;is an emerging scientific area focused on the science to characterize, understand, and forecast cyber-mediated changes in human behavior, social, cultural, and political outcomes, and to build&#8230; <\/p>\n<div class=\"link-more\"><a href=\"https:\/\/sites.wp.odu.edu\/moore-moses\/journal-10\/\">Read More<\/a><\/div>\n","protected":false},"author":28600,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"_links":{"self":[{"href":"https:\/\/sites.wp.odu.edu\/moore-moses\/wp-json\/wp\/v2\/pages\/350"}],"collection":[{"href":"https:\/\/sites.wp.odu.edu\/moore-moses\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/sites.wp.odu.edu\/moore-moses\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/moore-moses\/wp-json\/wp\/v2\/users\/28600"}],"replies":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/moore-moses\/wp-json\/wp\/v2\/comments?post=350"}],"version-history":[{"count":1,"href":"https:\/\/sites.wp.odu.edu\/moore-moses\/wp-json\/wp\/v2\/pages\/350\/revisions"}],"predecessor-version":[{"id":351,"href":"https:\/\/sites.wp.odu.edu\/moore-moses\/wp-json\/wp\/v2\/pages\/350\/revisions\/351"}],"wp:attachment":[{"href":"https:\/\/sites.wp.odu.edu\/moore-moses\/wp-json\/wp\/v2\/media?parent=350"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}