{"id":375,"date":"2024-12-09T00:57:12","date_gmt":"2024-12-09T00:57:12","guid":{"rendered":"https:\/\/sites.wp.odu.edu\/sofiareyesvillanuevaa\/?page_id=375"},"modified":"2024-12-09T01:48:27","modified_gmt":"2024-12-09T01:48:27","slug":"entry-14","status":"publish","type":"page","link":"https:\/\/sites.wp.odu.edu\/sofiareyesvillanuevaa\/entry-14\/","title":{"rendered":"Entry #14"},"content":{"rendered":"\n<h2 class=\"wp-block-heading\"><strong>A<\/strong>ndriy Slunchuk has described eleven things internet users do that may be illegal. Review what the author says and write a paragraph describing the five most violations and why you think those offenses are serious.<\/h2>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\" \/>\n\n\n\n<p>Starting out with number one, the offense thatI find the most serious is sharing passwords, addresses, or photos of others. By sharing someone\u2019s address, you can put them in physical danger, especially if you hand over the address to someone who is looking forward to doing something with ill-intent to them. By sharing their passwords, people can easily access multiple of their accounts, and it can be as harmless as a gaming account to their bank account, or any accounts that hold government information.&nbsp;<\/p>\n\n\n\n<p>Number 2, I would say, is collecting information about children. A lot of children sometimes have unrestricted access to the internet and may not know any rules or what they come upon, which is easy for people to take advantage of. Some children may not know about phishing scams, ad scams, or adult websites and will easily put in information that can get stolen, no matter if it&#8217;s their information or their parents.<\/p>\n\n\n\n<p>For number 3, it would be faking your identity online. There could be two ways of faking your identity, one being by stealing someone else&#8217;s information and impersonating, while the other could be a completely made up personality. Both are still very harmful since impersonating someone means that all their data and information has been stolen and can put many things in their life at risk. The made up personality could just lead to cyberbullying or even lead a person to steal someone else&#8217;s identity and use it for their fake persona.<\/p>\n\n\n\n<p>Number 4, using torrent services. Torrenting is a way to share files quickly and easily, including copyrighted material. Torrenting can lead to possibly sharing someone else\u2019s information, spreading rumors, or make it harder for someone to take something down from social media that wasn\u2019t supposed to be there.<\/p>\n\n\n\n<p>Lastly 5, bullying and trolling. Cyberbullying can be more than just being mean to someone online, it can also include tormenting someone in all their social media, spreading rumors about them, or even stealing their personal information. Cyberbullying can lead certain people to fall into depression and has lead to suicide before.&nbsp;<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Andriy Slunchuk has described eleven things internet users do that may be illegal. Review what the author says and write a paragraph describing the five most violations and why you think those offenses are serious. Starting out with number one, the offense thatI find the most serious is sharing passwords, addresses, or photos of others&#8230;. <\/p>\n<div class=\"link-more\"><a href=\"https:\/\/sites.wp.odu.edu\/sofiareyesvillanuevaa\/entry-14\/\">Read More<\/a><\/div>\n","protected":false},"author":29446,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"_links":{"self":[{"href":"https:\/\/sites.wp.odu.edu\/sofiareyesvillanuevaa\/wp-json\/wp\/v2\/pages\/375"}],"collection":[{"href":"https:\/\/sites.wp.odu.edu\/sofiareyesvillanuevaa\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/sites.wp.odu.edu\/sofiareyesvillanuevaa\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/sofiareyesvillanuevaa\/wp-json\/wp\/v2\/users\/29446"}],"replies":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/sofiareyesvillanuevaa\/wp-json\/wp\/v2\/comments?post=375"}],"version-history":[{"count":3,"href":"https:\/\/sites.wp.odu.edu\/sofiareyesvillanuevaa\/wp-json\/wp\/v2\/pages\/375\/revisions"}],"predecessor-version":[{"id":407,"href":"https:\/\/sites.wp.odu.edu\/sofiareyesvillanuevaa\/wp-json\/wp\/v2\/pages\/375\/revisions\/407"}],"wp:attachment":[{"href":"https:\/\/sites.wp.odu.edu\/sofiareyesvillanuevaa\/wp-json\/wp\/v2\/media?parent=375"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}