{"id":250,"date":"2024-11-24T08:25:55","date_gmt":"2024-11-24T08:25:55","guid":{"rendered":"https:\/\/sites.wp.odu.edu\/nietocyse201s\/?p=250"},"modified":"2024-11-24T08:25:55","modified_gmt":"2024-11-24T08:25:55","slug":"week-10-write-a-journal-entry-summarizing-your-response-to-the-article-on-social-cybersecurity","status":"publish","type":"post","link":"https:\/\/sites.wp.odu.edu\/nietocyse201s\/2024\/11\/24\/week-10-write-a-journal-entry-summarizing-your-response-to-the-article-on-social-cybersecurity\/","title":{"rendered":"WEEK 10: Write a journal entry summarizing your response to the article on social cybersecurity."},"content":{"rendered":"\n<p>After reading about social cybersecurity, I realized cybersecurity is not just about<br>protecting computers anymore, it\u2019s also about how technology can influence what people think<br>and do. This type of cognitive hacking uses information to change opinions, cause confusion,<br>and divide people.<br>The article explains that information itself has become a weapon. Countries and groups<br>can create serious problems without even using physical force, simply by spreading false<br>information that breaks down trust and unity in a society. This kind of informational warfare can<br>happen quietly and be just as powerful as traditional warfare.<br>What stood out to me is how experts from different fields like psychology and marketing<br>are now working together to understand how information affects people. They use tools like<br>machine learning to see how ideas spread online. This shows how powerful information is and<br>why we need to be careful with what we read, believe, and share.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>After reading about social cybersecurity, I realized cybersecurity is not just aboutprotecting computers anymore, it\u2019s also about how technology can influence what people thinkand do. This type of cognitive hacking uses information to change opinions, cause confusion,and divide people.The article explains that information itself has become a weapon. Countries and groupscan create serious problems without&#8230; <\/p>\n<div class=\"link-more\"><a href=\"https:\/\/sites.wp.odu.edu\/nietocyse201s\/2024\/11\/24\/week-10-write-a-journal-entry-summarizing-your-response-to-the-article-on-social-cybersecurity\/\">Read More<\/a><\/div>\n","protected":false},"author":25891,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":"","wds_primary_category":0},"categories":[1],"tags":[],"_links":{"self":[{"href":"https:\/\/sites.wp.odu.edu\/nietocyse201s\/wp-json\/wp\/v2\/posts\/250"}],"collection":[{"href":"https:\/\/sites.wp.odu.edu\/nietocyse201s\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/sites.wp.odu.edu\/nietocyse201s\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/nietocyse201s\/wp-json\/wp\/v2\/users\/25891"}],"replies":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/nietocyse201s\/wp-json\/wp\/v2\/comments?post=250"}],"version-history":[{"count":1,"href":"https:\/\/sites.wp.odu.edu\/nietocyse201s\/wp-json\/wp\/v2\/posts\/250\/revisions"}],"predecessor-version":[{"id":251,"href":"https:\/\/sites.wp.odu.edu\/nietocyse201s\/wp-json\/wp\/v2\/posts\/250\/revisions\/251"}],"wp:attachment":[{"href":"https:\/\/sites.wp.odu.edu\/nietocyse201s\/wp-json\/wp\/v2\/media?parent=250"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/nietocyse201s\/wp-json\/wp\/v2\/categories?post=250"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/nietocyse201s\/wp-json\/wp\/v2\/tags?post=250"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}