{"id":301,"date":"2021-06-09T15:17:11","date_gmt":"2021-06-09T15:17:11","guid":{"rendered":"https:\/\/sites.wp.odu.edu\/torrance\/?page_id=301"},"modified":"2021-06-09T15:17:11","modified_gmt":"2021-06-09T15:17:11","slug":"journal-2","status":"publish","type":"page","link":"https:\/\/sites.wp.odu.edu\/torrance\/journal\/journal-2\/","title":{"rendered":"Journal #2"},"content":{"rendered":"\n<p>1.<strong>\u00a0Describe four ethical issues that arise when storing electronic information about individuals<\/strong><\/p>\n\n\n\n<p>2.<strong>\u00a0Compare cybersecurity risks in the U.S. and another country.<\/strong><\/p>\n","protected":false},"excerpt":{"rendered":"<p>1.\u00a0Describe four ethical issues that arise when storing electronic information about individuals 2.\u00a0Compare cybersecurity risks in the U.S. and another country.<\/p>\n","protected":false},"author":18855,"featured_media":0,"parent":144,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"_links":{"self":[{"href":"https:\/\/sites.wp.odu.edu\/torrance\/wp-json\/wp\/v2\/pages\/301"}],"collection":[{"href":"https:\/\/sites.wp.odu.edu\/torrance\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/sites.wp.odu.edu\/torrance\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/torrance\/wp-json\/wp\/v2\/users\/18855"}],"replies":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/torrance\/wp-json\/wp\/v2\/comments?post=301"}],"version-history":[{"count":1,"href":"https:\/\/sites.wp.odu.edu\/torrance\/wp-json\/wp\/v2\/pages\/301\/revisions"}],"predecessor-version":[{"id":302,"href":"https:\/\/sites.wp.odu.edu\/torrance\/wp-json\/wp\/v2\/pages\/301\/revisions\/302"}],"up":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/torrance\/wp-json\/wp\/v2\/pages\/144"}],"wp:attachment":[{"href":"https:\/\/sites.wp.odu.edu\/torrance\/wp-json\/wp\/v2\/media?parent=301"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}