{"id":159,"date":"2024-04-13T15:16:04","date_gmt":"2024-04-13T15:16:04","guid":{"rendered":"https:\/\/sites.wp.odu.edu\/ryanwoodard\/?page_id=159"},"modified":"2024-04-13T16:39:18","modified_gmt":"2024-04-13T16:39:18","slug":"crjs310","status":"publish","type":"page","link":"https:\/\/sites.wp.odu.edu\/ryanwoodard\/crjs310\/","title":{"rendered":"CRJS310"},"content":{"rendered":"\n<p><strong>CYBERCRIMINOLOGY: FOUNDATIONS<\/strong><\/p>\n\n\n\n<p>This course introduced me to learning about computer-related crimes. I learned about the most common crimes that occur across the world wide web and how law enforcement officials investigate them. The course started off describing the environment that has been created through information and communication technologies, and how this new environment facilitates different types of behavior. The course then moves into describing the different techniques law enforcement officials use in an effort to subdue criminals who commit computer-related crimes and the legal consequences for those individuals.<\/p>\n\n\n\n<p>Below, you will find a couple of my papers I wrote in this course:<\/p>\n\n\n\n<div data-wp-interactive=\"\" class=\"wp-block-file\"><object data-wp-bind--hidden=\"!selectors.core.file.hasPdfPreview\" hidden class=\"wp-block-file__embed\" data=\"https:\/\/sites.wp.odu.edu\/ryanwoodard\/wp-content\/uploads\/sites\/36168\/2024\/04\/Targeting-Traffickers-Response-Paper-1.pdf\" type=\"application\/pdf\" style=\"width:100%;height:600px\" aria-label=\"Embed of Targeting-Traffickers-Response-Paper-1.\"><\/object><a id=\"wp-block-file--media-cef87225-6429-44db-9d2e-661b37a32ffd\" href=\"https:\/\/sites.wp.odu.edu\/ryanwoodard\/wp-content\/uploads\/sites\/36168\/2024\/04\/Targeting-Traffickers-Response-Paper-1.pdf\">Targeting-Traffickers-Response-Paper-1<\/a><a href=\"https:\/\/sites.wp.odu.edu\/ryanwoodard\/wp-content\/uploads\/sites\/36168\/2024\/04\/Targeting-Traffickers-Response-Paper-1.pdf\" class=\"wp-block-file__button wp-element-button\" download aria-describedby=\"wp-block-file--media-cef87225-6429-44db-9d2e-661b37a32ffd\">Download<\/a><\/div>\n\n\n\n<div data-wp-interactive=\"\" class=\"wp-block-file\"><object data-wp-bind--hidden=\"!selectors.core.file.hasPdfPreview\" hidden class=\"wp-block-file__embed\" data=\"https:\/\/sites.wp.odu.edu\/ryanwoodard\/wp-content\/uploads\/sites\/36168\/2024\/04\/Cyberviolence-Lecture-4-Response-Paper.pdf\" type=\"application\/pdf\" style=\"width:100%;height:600px\" aria-label=\"Embed of Cyberviolence-Lecture-4-Response-Paper.\"><\/object><a id=\"wp-block-file--media-df817ebb-9a9f-4aaa-b41c-fca11cc1a312\" href=\"https:\/\/sites.wp.odu.edu\/ryanwoodard\/wp-content\/uploads\/sites\/36168\/2024\/04\/Cyberviolence-Lecture-4-Response-Paper.pdf\">Cyberviolence-Lecture-4-Response-Paper<\/a><a href=\"https:\/\/sites.wp.odu.edu\/ryanwoodard\/wp-content\/uploads\/sites\/36168\/2024\/04\/Cyberviolence-Lecture-4-Response-Paper.pdf\" class=\"wp-block-file__button wp-element-button\" download aria-describedby=\"wp-block-file--media-df817ebb-9a9f-4aaa-b41c-fca11cc1a312\">Download<\/a><\/div>\n","protected":false},"excerpt":{"rendered":"<p>CYBERCRIMINOLOGY: FOUNDATIONS This course introduced me to learning about computer-related crimes. I learned about the most common crimes that occur across the world wide web and how law enforcement officials investigate them. The course started off describing the environment that has been created through information and communication technologies, and how this new environment facilitates different&#8230; <\/p>\n<div class=\"link-more\"><a href=\"https:\/\/sites.wp.odu.edu\/ryanwoodard\/crjs310\/\">Read More<\/a><\/div>\n","protected":false},"author":25848,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"_links":{"self":[{"href":"https:\/\/sites.wp.odu.edu\/ryanwoodard\/wp-json\/wp\/v2\/pages\/159"}],"collection":[{"href":"https:\/\/sites.wp.odu.edu\/ryanwoodard\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/sites.wp.odu.edu\/ryanwoodard\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/ryanwoodard\/wp-json\/wp\/v2\/users\/25848"}],"replies":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/ryanwoodard\/wp-json\/wp\/v2\/comments?post=159"}],"version-history":[{"count":4,"href":"https:\/\/sites.wp.odu.edu\/ryanwoodard\/wp-json\/wp\/v2\/pages\/159\/revisions"}],"predecessor-version":[{"id":228,"href":"https:\/\/sites.wp.odu.edu\/ryanwoodard\/wp-json\/wp\/v2\/pages\/159\/revisions\/228"}],"wp:attachment":[{"href":"https:\/\/sites.wp.odu.edu\/ryanwoodard\/wp-json\/wp\/v2\/media?parent=159"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}