{"id":259,"date":"2024-12-02T23:47:10","date_gmt":"2024-12-02T23:47:10","guid":{"rendered":"https:\/\/sites.wp.odu.edu\/natemcmillan\/?page_id=259"},"modified":"2024-12-03T00:09:04","modified_gmt":"2024-12-03T00:09:04","slug":"cybersecurity-ethics","status":"publish","type":"page","link":"https:\/\/sites.wp.odu.edu\/natemcmillan\/academics\/cybersecurity-ethics\/","title":{"rendered":"Cybersecurity Ethics"},"content":{"rendered":"\n<p>Case Analysis on Privacy<\/p>\n\n\n\n<div class=\"wp-block-file\"><a id=\"wp-block-file--media-5147a6d3-ffc0-4afd-ac11-f9dfa06e3c4f\" href=\"https:\/\/sites.wp.odu.edu\/natemcmillan\/wp-content\/uploads\/sites\/36777\/2024\/12\/Case-Analysis-on-Privacy.docx\">Case-Analysis-on-Privacy<\/a><a href=\"https:\/\/sites.wp.odu.edu\/natemcmillan\/wp-content\/uploads\/sites\/36777\/2024\/12\/Case-Analysis-on-Privacy.docx\" class=\"wp-block-file__button wp-element-button\" download aria-describedby=\"wp-block-file--media-5147a6d3-ffc0-4afd-ac11-f9dfa06e3c4f\">Download<\/a><\/div>\n\n\n\n<p>Case Analysis on Professional Ethics<\/p>\n\n\n\n<div class=\"wp-block-file\"><a id=\"wp-block-file--media-5fb9d57e-1705-4e83-a821-bf249d12fc3c\" href=\"https:\/\/sites.wp.odu.edu\/natemcmillan\/wp-content\/uploads\/sites\/36777\/2024\/12\/Case-Analysis-on-Professional-Ethics.docx\">Case-Analysis-on-Professional-Ethics<\/a><a href=\"https:\/\/sites.wp.odu.edu\/natemcmillan\/wp-content\/uploads\/sites\/36777\/2024\/12\/Case-Analysis-on-Professional-Ethics.docx\" class=\"wp-block-file__button wp-element-button\" download aria-describedby=\"wp-block-file--media-5fb9d57e-1705-4e83-a821-bf249d12fc3c\">Download<\/a><\/div>\n\n\n\n<p>Case Analysis on User Data<\/p>\n\n\n\n<div class=\"wp-block-file\"><a id=\"wp-block-file--media-e81cf1d4-b038-4b85-bc95-18201475543f\" href=\"https:\/\/sites.wp.odu.edu\/natemcmillan\/wp-content\/uploads\/sites\/36777\/2024\/12\/Case-Analysis-on-User-Data.docx\">Case-Analysis-on-User-Data<\/a><a href=\"https:\/\/sites.wp.odu.edu\/natemcmillan\/wp-content\/uploads\/sites\/36777\/2024\/12\/Case-Analysis-on-User-Data.docx\" class=\"wp-block-file__button wp-element-button\" download aria-describedby=\"wp-block-file--media-e81cf1d4-b038-4b85-bc95-18201475543f\">Download<\/a><\/div>\n\n\n\n<p>Case Analysis on Information Warfare<\/p>\n\n\n\n<div class=\"wp-block-file\"><a id=\"wp-block-file--media-6d7b765a-eb45-4153-917d-5fa3210fd7c7\" href=\"https:\/\/sites.wp.odu.edu\/natemcmillan\/wp-content\/uploads\/sites\/36777\/2024\/12\/Case-Analysis-on-Information-Warfare.docx\">Case-Analysis-on-Information-Warfare<\/a><a href=\"https:\/\/sites.wp.odu.edu\/natemcmillan\/wp-content\/uploads\/sites\/36777\/2024\/12\/Case-Analysis-on-Information-Warfare.docx\" class=\"wp-block-file__button wp-element-button\" download aria-describedby=\"wp-block-file--media-6d7b765a-eb45-4153-917d-5fa3210fd7c7\">Download<\/a><\/div>\n\n\n\n<p>Case Analysis on Cyberconflict<\/p>\n\n\n\n<div class=\"wp-block-file\"><a id=\"wp-block-file--media-2d8ec6fe-0282-40c6-a6bc-4045af04812f\" href=\"https:\/\/sites.wp.odu.edu\/natemcmillan\/wp-content\/uploads\/sites\/36777\/2024\/12\/Case-Analysis-on-Cyberconflict.docx\">Case-Analysis-on-Cyberconflict<\/a><a href=\"https:\/\/sites.wp.odu.edu\/natemcmillan\/wp-content\/uploads\/sites\/36777\/2024\/12\/Case-Analysis-on-Cyberconflict.docx\" class=\"wp-block-file__button wp-element-button\" download aria-describedby=\"wp-block-file--media-2d8ec6fe-0282-40c6-a6bc-4045af04812f\">Download<\/a><\/div>\n\n\n","protected":false},"excerpt":{"rendered":"<p>Case Analysis on Privacy Case Analysis on Professional Ethics Case Analysis on User Data Case Analysis on Information Warfare Case Analysis on Cyberconflict<\/p>\n","protected":false},"author":29191,"featured_media":0,"parent":33,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"_links":{"self":[{"href":"https:\/\/sites.wp.odu.edu\/natemcmillan\/wp-json\/wp\/v2\/pages\/259"}],"collection":[{"href":"https:\/\/sites.wp.odu.edu\/natemcmillan\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/sites.wp.odu.edu\/natemcmillan\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/natemcmillan\/wp-json\/wp\/v2\/users\/29191"}],"replies":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/natemcmillan\/wp-json\/wp\/v2\/comments?post=259"}],"version-history":[{"count":2,"href":"https:\/\/sites.wp.odu.edu\/natemcmillan\/wp-json\/wp\/v2\/pages\/259\/revisions"}],"predecessor-version":[{"id":280,"href":"https:\/\/sites.wp.odu.edu\/natemcmillan\/wp-json\/wp\/v2\/pages\/259\/revisions\/280"}],"up":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/natemcmillan\/wp-json\/wp\/v2\/pages\/33"}],"wp:attachment":[{"href":"https:\/\/sites.wp.odu.edu\/natemcmillan\/wp-json\/wp\/v2\/media?parent=259"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}