{"id":371,"date":"2024-04-22T18:34:07","date_gmt":"2024-04-22T18:34:07","guid":{"rendered":"https:\/\/sites.wp.odu.edu\/shadowyseth\/?page_id=371"},"modified":"2024-04-22T18:35:17","modified_gmt":"2024-04-22T18:35:17","slug":"journal-entry-14","status":"publish","type":"page","link":"https:\/\/sites.wp.odu.edu\/shadowyseth\/journal-entry-14\/","title":{"rendered":"Journal entry 14"},"content":{"rendered":"\n<p>Andriy talks about how they outline the eleven potentially illegal activities when it comes to the people<br>who use the internet. But mainly the five that are used are hacking, harassment, cyberbullying, identity<br>theft, copyright infringement, and child pornography. When people hack they gain access to computers<br>they shouldn\u2019t be in and with this they can take information, cause disruption, and cause financial loss.<br>Then we have cyberbullying which can cause emotional harm but it can have real-life consequences<br>which can be self-harming or suicide. Then there is copyright infringement which mainly people take<br>things and they do claim as theirs but it is not.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Andriy talks about how they outline the eleven potentially illegal activities when it comes to the peoplewho use the internet. But mainly the five that are used are hacking, harassment, cyberbullying, identitytheft, copyright infringement, and child pornography. When people hack they gain access to computersthey shouldn\u2019t be in and with this they can take information,&#8230; <\/p>\n<div class=\"link-more\"><a href=\"https:\/\/sites.wp.odu.edu\/shadowyseth\/journal-entry-14\/\">Read More<\/a><\/div>\n","protected":false},"author":28348,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"_links":{"self":[{"href":"https:\/\/sites.wp.odu.edu\/shadowyseth\/wp-json\/wp\/v2\/pages\/371"}],"collection":[{"href":"https:\/\/sites.wp.odu.edu\/shadowyseth\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/sites.wp.odu.edu\/shadowyseth\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/shadowyseth\/wp-json\/wp\/v2\/users\/28348"}],"replies":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/shadowyseth\/wp-json\/wp\/v2\/comments?post=371"}],"version-history":[{"count":2,"href":"https:\/\/sites.wp.odu.edu\/shadowyseth\/wp-json\/wp\/v2\/pages\/371\/revisions"}],"predecessor-version":[{"id":381,"href":"https:\/\/sites.wp.odu.edu\/shadowyseth\/wp-json\/wp\/v2\/pages\/371\/revisions\/381"}],"wp:attachment":[{"href":"https:\/\/sites.wp.odu.edu\/shadowyseth\/wp-json\/wp\/v2\/media?parent=371"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}