{"id":328,"date":"2023-11-19T18:50:53","date_gmt":"2023-11-19T18:50:53","guid":{"rendered":"https:\/\/sites.wp.odu.edu\/nguma001\/?p=328"},"modified":"2023-12-08T23:05:54","modified_gmt":"2023-12-08T23:05:54","slug":"journal-entry-14","status":"publish","type":"post","link":"https:\/\/sites.wp.odu.edu\/nguma001\/2023\/11\/19\/journal-entry-14\/","title":{"rendered":"Journal Entry 14"},"content":{"rendered":"\n<p>Nathan Guman<\/p>\n\n\n\n<p>CYSE 201S Cyber Security and Social Science<\/p>\n\n\n\n<p>Journal Entry 14<\/p>\n\n\n\n<p><strong>Andriy Slynchuk has described eleven things Internet users do that may be illegal. Review what the author says and write a paragraph describing the five most serious violations and why you think those offenses are serious.<\/strong><\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"828\" height=\"466\" src=\"https:\/\/sites.wp.odu.edu\/nguma001\/wp-content\/uploads\/sites\/34228\/2023\/11\/image.png\" alt=\"\" class=\"wp-image-329\" srcset=\"https:\/\/sites.wp.odu.edu\/nguma001\/wp-content\/uploads\/sites\/34228\/2023\/11\/image.png 828w, https:\/\/sites.wp.odu.edu\/nguma001\/wp-content\/uploads\/sites\/34228\/2023\/11\/image-300x169.png 300w, https:\/\/sites.wp.odu.edu\/nguma001\/wp-content\/uploads\/sites\/34228\/2023\/11\/image-768x432.png 768w, https:\/\/sites.wp.odu.edu\/nguma001\/wp-content\/uploads\/sites\/34228\/2023\/11\/image-533x300.png 533w\" sizes=\"(max-width: 828px) 100vw, 828px\" \/><\/figure>\n\n\n\n<p>Of the 11 items listened in the article this is my top 5 ranking.<\/p>\n\n\n\n<ol type=\"1\">\n<li>Using other people\u2019s internet<\/li>\n\n\n\n<li>Collecting Information about children<\/li>\n\n\n\n<li>Illegal searches<\/li>\n\n\n\n<li>Faking identity<\/li>\n\n\n\n<li>Bullying and trolling<\/li>\n<\/ol>\n\n\n\n<p>Too often, online crimes are not compared to their real-world equivalent. First on the list is using someone\u2019s internet. Theft is always a big deal, including theft of services. Additionally, using someone\u2019s internet attributes your activity to the owner and if conducting illegal activity, would be like planting drugs in another person\u2019s car. Second on the list is collecting information about children. This is outlawed by federal law and state laws and is something which should be taken very seriously. This generation of children are spending more time online then any in history and their privacy and safety must be paramount. Third on the list is illegal searches. Using the internet to learn, plan, coordinate, or share information on how to conduct illegal and violent activity is a very serious issue. Weather drugs, people, or weapons, smuggling and planning operations taking place online warrant higher levels of oversight and monitoring. Fourth, faking your identity online. This depends on context; however, identity theft and phishing attacks are a real concern. Imitating a trusted individual, weather online or in person is a serious offense, depending on intent. For example, impersonating a police officer or lawyer in real life is a serious crime. It should be online as well. Lastly, we have bullying and trolling. This activity can cause psychological harm to very vulnerable people. The anonymity and distance of being online often leads people to be far harsher than they would be in person.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Nathan Guman CYSE 201S Cyber Security and Social Science Journal Entry 14 Andriy Slynchuk has described eleven things Internet users do that may be illegal. Review what the author says and write a paragraph describing the five most serious violations and why you think those offenses are serious. Of the 11 items listened in the&#8230; <\/p>\n<div class=\"link-more\"><a href=\"https:\/\/sites.wp.odu.edu\/nguma001\/2023\/11\/19\/journal-entry-14\/\">Read More<\/a><\/div>\n","protected":false},"author":27517,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":"","wds_primary_category":0},"categories":[1],"tags":[3],"_links":{"self":[{"href":"https:\/\/sites.wp.odu.edu\/nguma001\/wp-json\/wp\/v2\/posts\/328"}],"collection":[{"href":"https:\/\/sites.wp.odu.edu\/nguma001\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/sites.wp.odu.edu\/nguma001\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/nguma001\/wp-json\/wp\/v2\/users\/27517"}],"replies":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/nguma001\/wp-json\/wp\/v2\/comments?post=328"}],"version-history":[{"count":1,"href":"https:\/\/sites.wp.odu.edu\/nguma001\/wp-json\/wp\/v2\/posts\/328\/revisions"}],"predecessor-version":[{"id":330,"href":"https:\/\/sites.wp.odu.edu\/nguma001\/wp-json\/wp\/v2\/posts\/328\/revisions\/330"}],"wp:attachment":[{"href":"https:\/\/sites.wp.odu.edu\/nguma001\/wp-json\/wp\/v2\/media?parent=328"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/nguma001\/wp-json\/wp\/v2\/categories?post=328"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/nguma001\/wp-json\/wp\/v2\/tags?post=328"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}