{"id":51,"date":"2025-02-02T20:20:40","date_gmt":"2025-02-02T20:20:40","guid":{"rendered":"https:\/\/student.wp.odu.edu\/cvanc003\/?p=51"},"modified":"2025-02-10T05:00:09","modified_gmt":"2025-02-10T05:00:09","slug":"cybersecurity-and-the-social-sciences-cyse-201s-3","status":"publish","type":"post","link":"https:\/\/student.wp.odu.edu\/cvanc003\/2025\/02\/02\/cybersecurity-and-the-social-sciences-cyse-201s-3\/","title":{"rendered":"CYSE 201S \/ Week 3 &#8211; Journal Entry"},"content":{"rendered":"\n<p><strong>Cybersecurity and the Social Sciences (CYSE 201S)<\/strong><\/p>\n\n\n\n<p><em>Visit&nbsp;PrivacyRights.org to&nbsp;see the types of publicly available information&nbsp;about data breaches. How might researchers use this information to&nbsp;study breaches? Enter a paragraph in your journal.<\/em><\/p>\n\n\n\n<p>Per <a href=\"http:\/\/PrivacyRights.org\">PrivacyRights.org<\/a>, there are many different types of information available about data breaches. In their database for Data Breach Notifications, you can find info about the Organization Name, Breach Type, Total People Affected, Residents Affected, Breach Location, and the Source of the breach. This information can be used in many ways. Data could be used to see if a specific \u201csource\u201d tends to use specific \u201cbreach types\u201d or targets specific types of organizations more than others. This could also be used to see if specific breach types affect more or less people than other types. Additionally, this data could be used to see to see if breaches happen more or less during specific times of year. This data could be used in a variety of ways, even nefarious ways as you could see if specific organizations have more breaches, which would let you assume that their security is not a robust as others.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Cybersecurity and the Social Sciences (CYSE 201S) Visit&nbsp;PrivacyRights.org to&nbsp;see the types of publicly available information&nbsp;about data breaches. How might researchers use this information to&nbsp;study breaches? Enter a paragraph in your journal. Per PrivacyRights.org, there are many different types of information available about data breaches. In their database for Data Breach Notifications, you can find info &hellip; <a href=\"https:\/\/student.wp.odu.edu\/cvanc003\/2025\/02\/02\/cybersecurity-and-the-social-sciences-cyse-201s-3\/\" class=\"more-link\">Continue reading <span class=\"screen-reader-text\">CYSE 201S \/ Week 3 &#8211; Journal Entry<\/span><\/a><\/p>\n","protected":false},"author":30367,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":"","wds_primary_category":1},"categories":[1],"tags":[],"_links":{"self":[{"href":"https:\/\/student.wp.odu.edu\/cvanc003\/wp-json\/wp\/v2\/posts\/51"}],"collection":[{"href":"https:\/\/student.wp.odu.edu\/cvanc003\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/student.wp.odu.edu\/cvanc003\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/student.wp.odu.edu\/cvanc003\/wp-json\/wp\/v2\/users\/30367"}],"replies":[{"embeddable":true,"href":"https:\/\/student.wp.odu.edu\/cvanc003\/wp-json\/wp\/v2\/comments?post=51"}],"version-history":[{"count":5,"href":"https:\/\/student.wp.odu.edu\/cvanc003\/wp-json\/wp\/v2\/posts\/51\/revisions"}],"predecessor-version":[{"id":65,"href":"https:\/\/student.wp.odu.edu\/cvanc003\/wp-json\/wp\/v2\/posts\/51\/revisions\/65"}],"wp:attachment":[{"href":"https:\/\/student.wp.odu.edu\/cvanc003\/wp-json\/wp\/v2\/media?parent=51"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/student.wp.odu.edu\/cvanc003\/wp-json\/wp\/v2\/categories?post=51"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/student.wp.odu.edu\/cvanc003\/wp-json\/wp\/v2\/tags?post=51"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}