{"id":120,"date":"2025-09-18T22:33:13","date_gmt":"2025-09-18T22:33:13","guid":{"rendered":"https:\/\/wp.odu.edu\/odupresentationtemplate\/?page_id=2"},"modified":"2025-09-18T23:08:54","modified_gmt":"2025-09-18T23:08:54","slug":"sample-page-2","status":"publish","type":"page","link":"https:\/\/sites.wp.odu.edu\/sincerehinescyse201s\/","title":{"rendered":"Home"},"content":{"rendered":"\n<figure class=\"wp-block-image size-full\"><a href=\"https:\/\/www.apc.org\/en\/blog\/inside-information-society-cybersecurity\"><img loading=\"lazy\" decoding=\"async\" width=\"862\" height=\"485\" src=\"https:\/\/sites.wp.odu.edu\/sincerehinescyse201s\/wp-content\/uploads\/sites\/39716\/2025\/09\/23922032368_14f828ab0f_z.jpg\" alt=\"\" class=\"wp-image-290\" srcset=\"https:\/\/sites.wp.odu.edu\/sincerehinescyse201s\/wp-content\/uploads\/sites\/39716\/2025\/09\/23922032368_14f828ab0f_z.jpg 862w, https:\/\/sites.wp.odu.edu\/sincerehinescyse201s\/wp-content\/uploads\/sites\/39716\/2025\/09\/23922032368_14f828ab0f_z-300x169.jpg 300w, https:\/\/sites.wp.odu.edu\/sincerehinescyse201s\/wp-content\/uploads\/sites\/39716\/2025\/09\/23922032368_14f828ab0f_z-768x432.jpg 768w, https:\/\/sites.wp.odu.edu\/sincerehinescyse201s\/wp-content\/uploads\/sites\/39716\/2025\/09\/23922032368_14f828ab0f_z-533x300.jpg 533w\" sizes=\"(max-width: 862px) 100vw, 862px\" \/><\/a><figcaption class=\"wp-element-caption\">How I depict Cyber Security In Society<br><a href=\"https:\/\/www.apc.org\/en\/blog\/inside-information-society-cybersecurity\" target=\"_blank\" rel=\"noreferrer noopener\"> https:\/\/www.apc.org\/en\/blog\/inside-information-society-cybersecurity<\/a><\/figcaption><\/figure>\n\n\n\n<figure class=\"wp-block-image size-full is-resized\"><img loading=\"lazy\" decoding=\"async\" width=\"479\" height=\"243\" src=\"https:\/\/sites.wp.odu.edu\/sincerehinescyse201s\/wp-content\/uploads\/sites\/39716\/2025\/09\/data-prot.jpg\" alt=\"\" class=\"wp-image-291\" style=\"width:840px;height:auto\" srcset=\"https:\/\/sites.wp.odu.edu\/sincerehinescyse201s\/wp-content\/uploads\/sites\/39716\/2025\/09\/data-prot.jpg 479w, https:\/\/sites.wp.odu.edu\/sincerehinescyse201s\/wp-content\/uploads\/sites\/39716\/2025\/09\/data-prot-300x152.jpg 300w\" sizes=\"(max-width: 479px) 100vw, 479px\" \/><figcaption class=\"wp-element-caption\">How I depict Data Protection in cyber security<br><a href=\"https:\/\/www.project-sherpa.eu\/sis-and-privacy-and-data-protection\/\" target=\"_blank\" rel=\"noreferrer noopener\">https:\/\/www.project-sherpa.eu\/sis-and-privacy-and-data-protection\/<\/a><\/figcaption><\/figure>\n\n\n\n<figure class=\"wp-block-image size-full is-resized\"><img loading=\"lazy\" decoding=\"async\" width=\"512\" height=\"288\" src=\"https:\/\/sites.wp.odu.edu\/sincerehinescyse201s\/wp-content\/uploads\/sites\/39716\/2025\/09\/ethuics.jpg\" alt=\"\" class=\"wp-image-292\" style=\"width:840px;height:auto\" srcset=\"https:\/\/sites.wp.odu.edu\/sincerehinescyse201s\/wp-content\/uploads\/sites\/39716\/2025\/09\/ethuics.jpg 512w, https:\/\/sites.wp.odu.edu\/sincerehinescyse201s\/wp-content\/uploads\/sites\/39716\/2025\/09\/ethuics-300x169.jpg 300w\" sizes=\"(max-width: 512px) 100vw, 512px\" \/><figcaption class=\"wp-element-caption\">How I depict Ethics &amp; Privacy in cyber security <br><a href=\"https:\/\/www.linkedin.com\/learning\/applied-cybersecurity-ethics-privacy-ai-and-emerging-threats\" target=\"_blank\" rel=\"noreferrer noopener\">https:\/\/www.linkedin.com\/learning\/applied-cybersecurity-ethics-privacy-ai-and-emerging-threats<\/a><\/figcaption><\/figure>\n\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"744\" height=\"400\" src=\"https:\/\/sites.wp.odu.edu\/sincerehinescyse201s\/wp-content\/uploads\/sites\/39716\/2025\/09\/law.jpg\" alt=\"\" class=\"wp-image-293\" srcset=\"https:\/\/sites.wp.odu.edu\/sincerehinescyse201s\/wp-content\/uploads\/sites\/39716\/2025\/09\/law.jpg 744w, https:\/\/sites.wp.odu.edu\/sincerehinescyse201s\/wp-content\/uploads\/sites\/39716\/2025\/09\/law-300x161.jpg 300w, https:\/\/sites.wp.odu.edu\/sincerehinescyse201s\/wp-content\/uploads\/sites\/39716\/2025\/09\/law-558x300.jpg 558w\" sizes=\"(max-width: 744px) 100vw, 744px\" \/><figcaption class=\"wp-element-caption\">How I depict Law in cyber security <br><a href=\"https:\/\/www.linkedin.com\/pulse\/intersection-law-technology-future-legal-landscape-alok-kumar-pandey\" target=\"_blank\" rel=\"noreferrer noopener\">https:\/\/www.linkedin.com\/pulse\/intersection-law-technology-future-legal-landscape-alok-kumar-pandey<\/a><\/figcaption><\/figure>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"767\" src=\"https:\/\/sites.wp.odu.edu\/sincerehinescyse201s\/wp-content\/uploads\/sites\/39716\/2025\/09\/Cyber_Resources_Diversity-1024x767.jpg\" alt=\"\" class=\"wp-image-294\" srcset=\"https:\/\/sites.wp.odu.edu\/sincerehinescyse201s\/wp-content\/uploads\/sites\/39716\/2025\/09\/Cyber_Resources_Diversity-1024x767.jpg 1024w, https:\/\/sites.wp.odu.edu\/sincerehinescyse201s\/wp-content\/uploads\/sites\/39716\/2025\/09\/Cyber_Resources_Diversity-300x225.jpg 300w, https:\/\/sites.wp.odu.edu\/sincerehinescyse201s\/wp-content\/uploads\/sites\/39716\/2025\/09\/Cyber_Resources_Diversity-768x576.jpg 768w, https:\/\/sites.wp.odu.edu\/sincerehinescyse201s\/wp-content\/uploads\/sites\/39716\/2025\/09\/Cyber_Resources_Diversity-1536x1151.jpg 1536w, https:\/\/sites.wp.odu.edu\/sincerehinescyse201s\/wp-content\/uploads\/sites\/39716\/2025\/09\/Cyber_Resources_Diversity-400x300.jpg 400w, https:\/\/sites.wp.odu.edu\/sincerehinescyse201s\/wp-content\/uploads\/sites\/39716\/2025\/09\/Cyber_Resources_Diversity.jpg 2000w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><figcaption class=\"wp-element-caption\">How I depict the Social Impact of cyber security<br><a href=\"https:\/\/www.cyberdegrees.org\/resources\/diversity-in-cybersecurity\/\" target=\"_blank\" rel=\"noreferrer noopener\">https:\/\/www.cyberdegrees.org\/resources\/diversity-in-cybersecurity\/<\/a><\/figcaption><\/figure>\n","protected":false},"excerpt":{"rendered":"","protected":false},"author":31232,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"open","template":"","meta":{"footnotes":""},"_links":{"self":[{"href":"https:\/\/sites.wp.odu.edu\/sincerehinescyse201s\/wp-json\/wp\/v2\/pages\/120"}],"collection":[{"href":"https:\/\/sites.wp.odu.edu\/sincerehinescyse201s\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/sites.wp.odu.edu\/sincerehinescyse201s\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/sincerehinescyse201s\/wp-json\/wp\/v2\/users\/31232"}],"replies":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/sincerehinescyse201s\/wp-json\/wp\/v2\/comments?post=120"}],"version-history":[{"count":4,"href":"https:\/\/sites.wp.odu.edu\/sincerehinescyse201s\/wp-json\/wp\/v2\/pages\/120\/revisions"}],"predecessor-version":[{"id":295,"href":"https:\/\/sites.wp.odu.edu\/sincerehinescyse201s\/wp-json\/wp\/v2\/pages\/120\/revisions\/295"}],"wp:attachment":[{"href":"https:\/\/sites.wp.odu.edu\/sincerehinescyse201s\/wp-json\/wp\/v2\/media?parent=120"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}