{"id":374,"date":"2024-04-08T01:02:11","date_gmt":"2024-04-08T01:02:11","guid":{"rendered":"https:\/\/sites.wp.odu.edu\/pearl-newton\/?p=374"},"modified":"2024-04-08T01:02:11","modified_gmt":"2024-04-08T01:02:11","slug":"journal-14-eleven-things-internet-users-do-that-may-be-illegal-review-what-the-author-says-and-write-a-paragraph-describing-the-five-most-serious-violations-and-why-you-think-those-offenses","status":"publish","type":"post","link":"https:\/\/sites.wp.odu.edu\/pearl-newton\/2024\/04\/08\/journal-14-eleven-things-internet-users-do-that-may-be-illegal-review-what-the-author-says-and-write-a-paragraph-describing-the-five-most-serious-violations-and-why-you-think-those-offenses\/","title":{"rendered":"Journal 14: \u00a0Eleven Things Internet Users do That may be Illegal. ( Review what the author says and write a paragraph describing the five most serious violations and why you think those offenses are serious.)"},"content":{"rendered":"\n<p>In reading the required article for today\u2019s journal entry, I believe the 5 most serious points are:<\/p>\n\n\n\n<ol>\n<li><strong><\/strong><strong>Faking your identity or stealing someone\u2019s identity online<\/strong><\/li>\n\n\n\n<li><strong><\/strong><strong>Recording a call or video of someone without consent.<\/strong><\/li>\n\n\n\n<li><strong><\/strong><strong>Sharing other people\u2019s passwords, pictures and or information online without permission.<\/strong><\/li>\n\n\n\n<li><strong><\/strong><strong>Bullying and or trolling anyone, but most especially kids online.<\/strong><\/li>\n\n\n\n<li><strong>The use of someone else\u2019s internet network without permission<\/strong>.<\/li>\n<\/ol>\n\n\n\n<p>All of the points on the list are threats, but these 5 are the worst in my opinion. I think the use of all of these could lead to illegal activity, or could cause harm. In reading cybersecurity articles, these five reasons are all mentioned and occurring every day.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>In reading the required article for today\u2019s journal entry, I believe the 5 most serious points are: All of the points on the list are threats, but these 5 are the worst in my opinion. I think the use of all of these could lead to illegal activity, or could cause harm. In reading cybersecurity&#8230; <\/p>\n<div class=\"link-more\"><a href=\"https:\/\/sites.wp.odu.edu\/pearl-newton\/2024\/04\/08\/journal-14-eleven-things-internet-users-do-that-may-be-illegal-review-what-the-author-says-and-write-a-paragraph-describing-the-five-most-serious-violations-and-why-you-think-those-offenses\/\">Read More<\/a><\/div>\n","protected":false},"author":28194,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":"","wds_primary_category":0},"categories":[3,5],"tags":[6],"_links":{"self":[{"href":"https:\/\/sites.wp.odu.edu\/pearl-newton\/wp-json\/wp\/v2\/posts\/374"}],"collection":[{"href":"https:\/\/sites.wp.odu.edu\/pearl-newton\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/sites.wp.odu.edu\/pearl-newton\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/pearl-newton\/wp-json\/wp\/v2\/users\/28194"}],"replies":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/pearl-newton\/wp-json\/wp\/v2\/comments?post=374"}],"version-history":[{"count":1,"href":"https:\/\/sites.wp.odu.edu\/pearl-newton\/wp-json\/wp\/v2\/posts\/374\/revisions"}],"predecessor-version":[{"id":375,"href":"https:\/\/sites.wp.odu.edu\/pearl-newton\/wp-json\/wp\/v2\/posts\/374\/revisions\/375"}],"wp:attachment":[{"href":"https:\/\/sites.wp.odu.edu\/pearl-newton\/wp-json\/wp\/v2\/media?parent=374"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/pearl-newton\/wp-json\/wp\/v2\/categories?post=374"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/pearl-newton\/wp-json\/wp\/v2\/tags?post=374"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}