{"id":299,"date":"2023-12-01T17:01:47","date_gmt":"2023-12-01T17:01:47","guid":{"rendered":"https:\/\/sites.wp.odu.edu\/tmott003\/?p=299"},"modified":"2023-12-01T17:01:47","modified_gmt":"2023-12-01T17:01:47","slug":"journal-entry-9","status":"publish","type":"post","link":"https:\/\/sites.wp.odu.edu\/tmott003\/2023\/12\/01\/journal-entry-9\/","title":{"rendered":"Journal Entry #9"},"content":{"rendered":"\n<p>With the introduction of computers, there is now a conflicting sense of global safety, which may both protect and put humans in danger. Yes, computers are now trusted partners in the medical field, helping to optimize patient care with advanced imaging technology and electronic health records. These developments reduce medical mistakes, improve provider-to-provider communication, and eventually improve patient safety. Computers have also strengthened our emergency response systems, guaranteeing fast and effective responses to emergencies. Emergency services are empowered by digital dispatch systems and location-based technology, and community resilience is strengthened by social media platforms that expedite the rapid broadcast of vital information during catastrophes. Using advanced antivirus software, firewalls, and encryption technologies to actively fight against cyberattacks, identity theft, and other online dangers, cybersecurity has developed as a way to fight against threats like identity theft and fraud. But the widespread use of computers has also resulted in a less secure environment, characterized by privacy issues and cyber threats. Because cyberspace is so connected, there is always a risk of cybercrime for people as well as businesses. Hackers threaten the digital security we depend on by using weaknesses to carry out identity theft, ransomware assaults, and data thefts. Because cyberwarfare assaults vital infrastructure and military systems, it represents a threat to national security, marking the start of a new chapter in the militarization of technology. Since governments and businesses are gathering and profiting from massive databases of personal information, personal privacy is becoming more and more fragile in modern times. Technologies used for surveillance, such as data mining and face recognition, create ethical issues by erasing the boundaries between personal freedom and security. Furthermore, the ease at which computers can locate individuals increases worries about misuse of private information and unlawful monitoring. This complex interaction between computer technology&#8217;s advantages and disadvantages emphasizes how important it is to navigate this digital frontier aware of its dual nature, working to minimize the dangers and maximize the benefits.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>With the introduction of computers, there is now a conflicting sense of global safety, which may both protect and put humans in danger. Yes, computers are now trusted partners in the medical field, helping to optimize patient care with advanced imaging technology and electronic health records. These developments reduce medical mistakes, improve provider-to-provider communication, and [&hellip;]<\/p>\n","protected":false},"author":27402,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":"","wds_primary_category":0},"categories":[1],"tags":[],"_links":{"self":[{"href":"https:\/\/sites.wp.odu.edu\/tmott003\/wp-json\/wp\/v2\/posts\/299"}],"collection":[{"href":"https:\/\/sites.wp.odu.edu\/tmott003\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/sites.wp.odu.edu\/tmott003\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/tmott003\/wp-json\/wp\/v2\/users\/27402"}],"replies":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/tmott003\/wp-json\/wp\/v2\/comments?post=299"}],"version-history":[{"count":1,"href":"https:\/\/sites.wp.odu.edu\/tmott003\/wp-json\/wp\/v2\/posts\/299\/revisions"}],"predecessor-version":[{"id":300,"href":"https:\/\/sites.wp.odu.edu\/tmott003\/wp-json\/wp\/v2\/posts\/299\/revisions\/300"}],"wp:attachment":[{"href":"https:\/\/sites.wp.odu.edu\/tmott003\/wp-json\/wp\/v2\/media?parent=299"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/tmott003\/wp-json\/wp\/v2\/categories?post=299"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/tmott003\/wp-json\/wp\/v2\/tags?post=299"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}