{"id":389,"date":"2025-04-28T00:46:09","date_gmt":"2025-04-28T00:46:09","guid":{"rendered":"https:\/\/sites.wp.odu.edu\/tharamorgan-eportfolio\/?p=389"},"modified":"2025-04-28T00:46:09","modified_gmt":"2025-04-28T00:46:09","slug":"journal-7","status":"publish","type":"post","link":"https:\/\/sites.wp.odu.edu\/tharamorgan-eportfolio\/2025\/04\/28\/journal-7\/","title":{"rendered":"Journal 7"},"content":{"rendered":"\n<hr class=\"wp-block-separator has-alpha-channel-opacity\" \/>\n\n\n\n<p><strong>Instructions:<\/strong><\/p>\n\n\n\n<p>Review the following photos through a human-centered cybersecurity framework.\u00a0Create a meme for your favorite three<strong>,<\/strong>\u00a0explaining what is going on in the individual\u2019s or individuals\u2019 mind(s).<\/p>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\" \/>\n\n\n\n<p><strong>A. Family and Cybersecurity<\/strong><\/p>\n\n\n\n<p>How my grandma sees me after I fixed her phone with a pop-up virus:<\/p>\n\n\n\n<figure class=\"wp-block-image size-full is-resized\"><img loading=\"lazy\" decoding=\"async\" width=\"616\" height=\"411\" src=\"https:\/\/sites.wp.odu.edu\/tharamorgan-eportfolio\/wp-content\/uploads\/sites\/38907\/2025\/04\/image.png\" alt=\"\" class=\"wp-image-392\" style=\"width:375px;height:auto\" srcset=\"https:\/\/sites.wp.odu.edu\/tharamorgan-eportfolio\/wp-content\/uploads\/sites\/38907\/2025\/04\/image.png 616w, https:\/\/sites.wp.odu.edu\/tharamorgan-eportfolio\/wp-content\/uploads\/sites\/38907\/2025\/04\/image-300x200.png 300w, https:\/\/sites.wp.odu.edu\/tharamorgan-eportfolio\/wp-content\/uploads\/sites\/38907\/2025\/04\/image-450x300.png 450w\" sizes=\"(max-width: 616px) 100vw, 616px\" \/><figcaption class=\"wp-element-caption\">(Images, 2023)<\/figcaption><\/figure>\n\n\n\n<p>This meme falls under the Families and Cybersecurity section in the Human-centered<br>cybersecurity framework. It depicts how older people are more vulnerable to virus\u2019 vs the<br>capabilities of those who are technologically adept.<\/p>\n\n\n\n<p><strong>B. Colleges and Cybersecurity<\/strong><\/p>\n\n\n\n<p>The face you make when your school paper gets a high \u201cturn-it-in\u201d score despite it tagging all the citations, you made to \u2018not\u2019 plagiarize:<\/p>\n\n\n\n<figure class=\"wp-block-image size-full is-resized\"><img loading=\"lazy\" decoding=\"async\" width=\"555\" height=\"370\" src=\"https:\/\/sites.wp.odu.edu\/tharamorgan-eportfolio\/wp-content\/uploads\/sites\/38907\/2025\/04\/image-1.png\" alt=\"\" class=\"wp-image-393\" style=\"width:402px;height:auto\" srcset=\"https:\/\/sites.wp.odu.edu\/tharamorgan-eportfolio\/wp-content\/uploads\/sites\/38907\/2025\/04\/image-1.png 555w, https:\/\/sites.wp.odu.edu\/tharamorgan-eportfolio\/wp-content\/uploads\/sites\/38907\/2025\/04\/image-1-300x200.png 300w, https:\/\/sites.wp.odu.edu\/tharamorgan-eportfolio\/wp-content\/uploads\/sites\/38907\/2025\/04\/image-1-450x300.png 450w\" sizes=\"(max-width: 555px) 100vw, 555px\" \/><figcaption class=\"wp-element-caption\">(Images, 2022)<\/figcaption><\/figure>\n\n\n\n<p>This meme describes the current struggles of university students and their use of technology especially since the adaptation, criticism and policing of AI. This shows the irony of telling students to not use artificial intelligence for their school assignments but using artificial intelligence to check for that use. This approach by schools has been criticized for being very flawed, inaccurate and ironic.<\/p>\n\n\n\n<p><strong>C. Peer Networks and Cybersecurity<\/strong><\/p>\n\n\n\n<p>The face you make after trying to bake a cake for the first time and posting it on Instagram:<\/p>\n\n\n\n<figure class=\"wp-block-image size-full is-resized\"><img loading=\"lazy\" decoding=\"async\" width=\"473\" height=\"506\" src=\"https:\/\/sites.wp.odu.edu\/tharamorgan-eportfolio\/wp-content\/uploads\/sites\/38907\/2025\/04\/image-2.png\" alt=\"\" class=\"wp-image-394\" style=\"width:309px;height:auto\" srcset=\"https:\/\/sites.wp.odu.edu\/tharamorgan-eportfolio\/wp-content\/uploads\/sites\/38907\/2025\/04\/image-2.png 473w, https:\/\/sites.wp.odu.edu\/tharamorgan-eportfolio\/wp-content\/uploads\/sites\/38907\/2025\/04\/image-2-280x300.png 280w\" sizes=\"(max-width: 473px) 100vw, 473px\" \/><figcaption class=\"wp-element-caption\">(Charlesdeluvio, 2018)<\/figcaption><\/figure>\n\n\n\n<p>This meme highlights the feelings some people receive after going viral for something they did or liked and getting negative comments and malicious jokes. The use of \u2018Instagram\u2019 brings light to the growing issues of poorly moderated comments on its platform in comparison to other social media giants like \u201cYouTube\u201d and \u201cTikTok\u201d.<br><\/p>\n\n\n\n<p><strong>Sources:<\/strong><\/p>\n\n\n\n<p>Charlesdeluvio. (2018, February 7). <em>Photo by Charlesdeluvio on unsplash<\/em>. Black dog wearing blue denim collar photo \u2013 Free Animal Image on Unsplash. https:\/\/unsplash.com\/photos\/black-dog-wearing-blue-denim-collar-K4mSJ7kc0As<\/p>\n\n\n\n<p>Images, G. (2023, May 3). <em>Photo by Getty Images on unsplash<\/em>. photo \u2013 Computer Image on Unsplash. https:\/\/unsplash.com\/photos\/concentrated-mature-caucasian-network-engineer-in-shirt-standing-at-open-server-cabinet-and-performing-security-check-using-laptop-7jSTwRoVD2s<\/p>\n\n\n\n<p>Images, G. (2022, August 24). <em>Photo by Getty Images on unsplash<\/em>. photo \u2013 Laptop Image on Unsplash. https:\/\/unsplash.com\/photos\/male-programmer-working-on-desktop-computer-with-many-monitors-at-office-in-software-develop-company-website-design-programming-and-coding-technologies-fxtpTGech0M<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Instructions: Review the following photos through a human-centered cybersecurity framework.\u00a0Create a meme for your favorite three,\u00a0explaining what is going on in the individual\u2019s or individuals\u2019 mind(s). A. Family and Cybersecurity How my grandma sees me after I fixed her phone with a pop-up virus: This meme falls under the Families and Cybersecurity section in the&#8230; <\/p>\n<div class=\"link-more\"><a href=\"https:\/\/sites.wp.odu.edu\/tharamorgan-eportfolio\/2025\/04\/28\/journal-7\/\">Read More<\/a><\/div>\n","protected":false},"author":27010,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":"","wds_primary_category":0},"categories":[1],"tags":[],"_links":{"self":[{"href":"https:\/\/sites.wp.odu.edu\/tharamorgan-eportfolio\/wp-json\/wp\/v2\/posts\/389"}],"collection":[{"href":"https:\/\/sites.wp.odu.edu\/tharamorgan-eportfolio\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/sites.wp.odu.edu\/tharamorgan-eportfolio\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/tharamorgan-eportfolio\/wp-json\/wp\/v2\/users\/27010"}],"replies":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/tharamorgan-eportfolio\/wp-json\/wp\/v2\/comments?post=389"}],"version-history":[{"count":2,"href":"https:\/\/sites.wp.odu.edu\/tharamorgan-eportfolio\/wp-json\/wp\/v2\/posts\/389\/revisions"}],"predecessor-version":[{"id":395,"href":"https:\/\/sites.wp.odu.edu\/tharamorgan-eportfolio\/wp-json\/wp\/v2\/posts\/389\/revisions\/395"}],"wp:attachment":[{"href":"https:\/\/sites.wp.odu.edu\/tharamorgan-eportfolio\/wp-json\/wp\/v2\/media?parent=389"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/tharamorgan-eportfolio\/wp-json\/wp\/v2\/categories?post=389"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/tharamorgan-eportfolio\/wp-json\/wp\/v2\/tags?post=389"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}