{"id":235,"date":"2025-09-18T19:36:51","date_gmt":"2025-09-18T19:36:51","guid":{"rendered":"https:\/\/sites.wp.odu.edu\/njime\/?p=235"},"modified":"2025-12-02T17:31:21","modified_gmt":"2025-12-02T17:31:21","slug":"journal-3","status":"publish","type":"post","link":"https:\/\/sites.wp.odu.edu\/njime\/2025\/09\/18\/journal-3\/","title":{"rendered":"Journal 3"},"content":{"rendered":"\n<p><strong>Visit\u00a0<a href=\"https:\/\/privacyrights.org\/\" target=\"_blank\" rel=\"noreferrer noopener\">PrivacyRights.org<\/a>\u00a0to\u00a0see the types of publicly available information\u00a0about data breaches. How might researchers use this information to\u00a0study breaches and forecast future data breach trends ? Enter a paragraph in your journal.<\/strong><\/p>\n\n\n\n<p>Researchers will use this information to study patterns in how the breaches occur and can prevent future trends of attacks. They can analyze the trends throughout history to see what similarities each had and plan to go after those similarities so they can prevent it better. They analyzed what sectors were targeted, the number of people affected, and the cause of the breaches. This allowed multiple way study how these were attacked and create practice plan so people can we way more prepared. It basically means they can forecast how many breaches or attacks could happen and when they could happen.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Visit\u00a0PrivacyRights.org\u00a0to\u00a0see the types of publicly available information\u00a0about data breaches. How might researchers use this information to\u00a0study breaches and forecast future data breach trends ? Enter a paragraph in your journal. Researchers will use this information to study patterns in how&#8230; <a class=\"more-link\" href=\"https:\/\/sites.wp.odu.edu\/njime\/2025\/09\/18\/journal-3\/\">Continue Reading &rarr;<\/a><\/p>\n","protected":false},"author":28415,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":"","wds_primary_category":3},"categories":[3],"tags":[],"_links":{"self":[{"href":"https:\/\/sites.wp.odu.edu\/njime\/wp-json\/wp\/v2\/posts\/235"}],"collection":[{"href":"https:\/\/sites.wp.odu.edu\/njime\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/sites.wp.odu.edu\/njime\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/njime\/wp-json\/wp\/v2\/users\/28415"}],"replies":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/njime\/wp-json\/wp\/v2\/comments?post=235"}],"version-history":[{"count":3,"href":"https:\/\/sites.wp.odu.edu\/njime\/wp-json\/wp\/v2\/posts\/235\/revisions"}],"predecessor-version":[{"id":260,"href":"https:\/\/sites.wp.odu.edu\/njime\/wp-json\/wp\/v2\/posts\/235\/revisions\/260"}],"wp:attachment":[{"href":"https:\/\/sites.wp.odu.edu\/njime\/wp-json\/wp\/v2\/media?parent=235"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/njime\/wp-json\/wp\/v2\/categories?post=235"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/njime\/wp-json\/wp\/v2\/tags?post=235"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}