{"id":9,"date":"2025-02-02T00:53:38","date_gmt":"2025-02-02T00:53:38","guid":{"rendered":"https:\/\/student.wp.odu.edu\/jwill297\/?page_id=9"},"modified":"2025-04-28T04:48:12","modified_gmt":"2025-04-28T04:48:12","slug":"cyse-201s","status":"publish","type":"page","link":"https:\/\/student.wp.odu.edu\/jwill297\/cyse-201s\/","title":{"rendered":"CYSE 201S"},"content":{"rendered":"\n<h2 class=\"wp-block-heading\"><br><strong>Journal Entry&#8217;s<\/strong><br><\/h2>\n\n\n\n<p><strong>Journal entry 1:<\/strong><br><strong>Review the NICE Workforce Framework. Are there certain areas that you would want to<br>focus your career on? Explain which areas would appeal the most to you and which<br>would appeal the least.<\/strong><br><br>After reviewing the frameworks page and the different Cybersecurity categories. It was nice<br>to have come across this information as I struggled to picture what to do exactly after I got<br>my degree in Cybersecurity. Out of the seven I found Protection and Defense (PD),<br>Investigation (IN), and Cyber intelligence (Ci) to be the main three I would be interested in.<br>PD the classic Cybersecurity job I think most people would associate this line of work too,<br>is just about defending an organization for cyber threats. IN might be my top pic as I love<br>watching criminal investigation YouTube video of police investigator interrogating a<br>potential suspect. CI seems something that I might really enjoy gather intelligence makes<br>me feel like a spy or something on the lines of that. The rest of the work roles all seem<br>interesting and one of the ones I did not pick might be the one I love overall as I feel you<br>truly don\u2019t know until you work for all categories but that seems unattainable, but I am<br>confident with the three I picked.<br><\/p>\n\n\n\n<p><strong>Journal entry 2:<\/strong><br><strong>Explain how the principles of science [Empiricism, Determinism, Parsimony, Objectivity<br>etc.,] relate to cybersecurity?<\/strong><br><br>Empiricism is about the gathering of information through our senses. Empiricism in<br>Cybersecurity can be used to determine threats and help for better defenses using security<br>incidents and other data to draw conclusions and make decisions. Determinism is about<br>identifying and understanding patterns from events and behaviors from that event.<br>Determinism in cybersecurity helps understand attackers&#8217; behaviors by analyzing patterns<br>from cyber-attacks. This knowledge aids in predicting future attacks and developing<br>effective defense strategies. Parsimony is where if you\u2019re confronted by complex options,<br>choose the most efficient options if often the best approach. In cybersecurity, parsimony is<br>about not overcomplicating solutions. When faced with complex security options, it&#8217;s often<br>better to choose the simplest and most efficient approach.<br><\/p>\n\n\n\n<p><strong>Journal entry 3:<\/strong><br><strong>Visit\u00a0<a href=\"https:\/\/privacyrights.org\/\" target=\"_blank\" rel=\"noreferrer noopener\">PrivacyRights.orgLinks to an external site.<\/a>\u00a0to\u00a0see the types of publicly available information\u00a0about data breaches. How might researchers use this information to\u00a0study breaches? Enter a paragraph in your journal.<\/strong><br><br>When you access the website Privacyrights.org, you will find publicly available information regarding data breaches. The website includes details about law changes that have been enacted or updated around data. The Reports section allows the viewer to find valuable information about data breaches. You can also find analytics information about data breaching and breach trends. There is a grand library of reports from 2005 to the present time regarding companies and organizations experiencing data breaches. Additionally, the website offers educational resources, best practices for data protection, and tips for individuals and businesses on how to safeguard their personal information in this evolving digital landscape.<br><\/p>\n\n\n\n<p><strong>Journal entry 4:<\/strong><br><strong>Review Maslow\u2019s Hierarchy of Needs and explain how each level relates to your<br>experiences with technology. Give specific examples of how your digital experiences relate to each level of need.<\/strong><br><br><br>Physiological Needs is the first layer in the five-level pyramid of Maslow&#8217;s Hierarchy of<br>Needs, which focuses on basic human requirements for survival. For me, examples include<br>using kitchen appliances like a rice cooker and an air fryer to prepare meals. Additionally, I<br>rely on smart devices like my smartphone to set alarms and keep track of time, helping me<br>manage my daily routine effectively. For the second level of Maslow&#8217;s Hierarchy of Needs, I<br>use a doorbell camera for home security and rely on my phone for weather updates and<br>alerts. The third level, \u201cLove and Belonging,\u201d is about finding love and a place in life where<br>you feel wanted. Devices that access social media, messaging apps, and other<br>communication tools allow people to stay connected with friends and family. The fourth<br>level, \u201cEsteem Needs,\u201d is about recognition and respect. One device that comes to mind is<br>my race sim rig. I drive very competitively in racing sim games, and this device helps me<br>receive recognition and respect from other drivers. The fifth and final level, \u201cSelf-<br>Actualization,\u201d is about realizing one&#8217;s full potential and personal growth. For me, online<br>software like Canvas helps me enhance my knowledge and skills, contributing to my sense<br>of fulfillment and growth.<\/p>\n\n\n\n<p><br><strong>Journal entry 6:<\/strong><br><strong>Can you spot three fake websites? [Refer Online Security Blogs, Public Awareness Sites,<br>Academic Resources etc., and cite the source].<br>Compare the three fake websites to three real websites and highlight the features that<br>identify them as fraudulent.<\/strong><br><br><br>According to an article titled &#8220;5 Recent Examples of Fake Websites&#8221; on Memcyco, PayPal<br>dealt with a series of fake websites in late 2023. Attackers used phishing methods to trick<br>users into clicking on sites like \u201cpaypaysecurity.com\u201d or \u201cpaypa1.com,\u201d which used similar<br>domain names to the real PayPal site. Additionally, there was a fake DMV website that<br>displayed an SSL certificate (padlock icon next to the search bar). While an SSL certificate<br>is usually a sign of security, it does not guarantee that the site is legitimate anymore. The<br>website &#8220;Save The Pacific Northwest Tree Octopus&#8221; is another example of a fake site. It<br>claims to advocate for a fictional species, using absurd claims and a humorous tone to<br>deceive users. This site is a legitimate page with false information about the octopus.<br><br><strong>work cited:<br><\/strong>Lakovics, Z. (2024, September 11). 5 recent examples of fake websites. Memcyco.<br><a href=\"https:\/\/www.memcyco.com\/5-recent-examples-of-fake-websites\/\">https:\/\/www.memcyco.com\/5-recent-examples-of-fake-websites\/<\/a><br><br>Toohil, R. (2025, January 15). How to identify fake websites: 11 warning signs. Aura.<br><a href=\"https:\/\/www.aura.com\/learn\/how-to-identify-fake-websites\">https:\/\/www.aura.com\/learn\/how-to-identify-fake-websites<\/a><br><br>Zapato, L. (1998). Save The Pacific Northwest Tree Octopus. Retrieved from<br><a href=\"https:\/\/zapatopi.net\/treeoctopus\/\" target=\"_blank\" rel=\"noreferrer noopener\">https:\/\/zapatopi.net\/treeoctopus\/<\/a><br><strong><br><\/strong><\/p>\n\n\n\n<p><strong>Journal entry 10:<\/strong><br><strong>Read this and write a journal entry summarizing your response to the article on social cybersecurity<\/strong><\/p>\n\n\n\n<p><a href=\"https:\/\/www.armyupress.army.mil\/Journals\/Military-Review\/English-Edition-Archives\/Mar-Apr-2019\/117-Cybersecurity\/b\">https:\/\/www.armyupress.army.mil\/Journals\/Military-Review\/English-Edition-Archives\/Mar-Apr-2019\/117-Cybersecurity\/b<\/a><\/p>\n\n\n\n<p><br>The overall main point of the article is that there are new emerging threats that cybersecurity analysts need to prepare for. The article emphasizes the importance of understanding human behavior and social interactions in the context of cyber threats. It discusses how Russian cyber aggression is focusing on cyber-attacks to influence human behavior changes. These attacks might target rival political parties or aim to disrupt relations between friendly countries. Additionally, the article explores how technological advancements like artificial intelligence and machine learning enhance cybersecurity measures and threat detection. It highlights the importance of collaboration between government agencies, the private sector, and international partners to address cybersecurity challenges.<\/p>\n\n\n\n<p><br><strong>Journy entry 15:<\/strong><br><strong>Watch this video and think about how the career of digital forensics investigators relate to<br>the social sciences. Write a journal entry describing what you think about the speaker\u2019s<br>pathway to his career.<\/strong><br><br><br>Listening to Davin Teo was very interesting to me, as digital forensics is something I want to<br>pursue in the long run. Davin&#8217;s start in the field was intriguing; he mentioned that he initially<br>went to school for accounting and later jumped into an IT-related job out of increasing<br>interest in the field, which he ended up loving. He shared how he took a leap of faith by<br>joining a new team in Australia that focused on digital forensics. He also described how,<br>back then, his team would store information on floppy disks, securing them in evidence<br>bags for safekeeping. He explained a real-world example where a customer called, wanting<br>to identify the &#8220;bad apple&#8221; in their network that was costing the company money. His<br>investigation revealed that the IT department was involved. Davin Teo does a great job<br>explaining the basics to Digital Forensics allowing more people to take an interest in this<br>line of work.<br><\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>Article Review 1 and 2<\/strong>:<br><br><\/h2>\n\n\n\n<p><strong>Article Review #1: Investigating the Intersection of AI and Cybercrime: Risks,<br>Trends, and Countermeasures<\/strong><br><strong><br>Describe how the topic relates to the principles of the social<br>sciences?<\/strong><br>The article uses sociology to discuss how the behaviors of children and seniors<br>relate to cyber threats, addressing age-related vulnerabilities and the need for<br>tailored educational approaches (Shetty, Choi, &amp; Park, 2024). It incorporates<br>criminology through Choi&#8217;s Cyber Routine Activities Theory, a theoretical framework<br>that examines the differences between offenders, targets, and guardians in the AI<br>world (Shetty, Choi, &amp; Park, 2024). This theory helps explain how AI-driven<br>cybercrimes occur and what measures can be taken to prevent them.<br><br><br><strong>Describe the study&#8217;s research questions or hypotheses?<\/strong><\/p>\n\n\n\n<ol>\n<li>Do people overlook important aspects regarding online safety and daily life<br>impacts when the media discusses AI? (Shetty, Choi, &amp; Park, 2024)<\/li>\n\n\n\n<li>What are the interviewees&#8217; attitudes towards AI, and should there be stricter<br>regulations or a halt in AI development to address concerns about ethics, privacy,<br>and safety? (Shetty, Choi, &amp; Park, 2024)<\/li>\n\n\n\n<li>How are perspectives and attitudes towards AI changing, and is there a need for<br>stricter regulations or a gradual reduction in AI deployment for safety and ethical<br>concerns? (Shetty, Choi, &amp; Park, 2024)<\/li>\n\n\n\n<li>How can the impact of malicious AI from the dark web on the clear web be<br>reduced, and what practical steps can governments, organizations, and individuals<br>take to mitigate these risks and protect against victimization? (Shetty, Choi, &amp; Park,<br>2024)<br>These questions, gathered from written statements and recordings of virtual<br>interviews, were analyzed to identify recurring themes across expert responses.<br><br><br><strong>Describe the types of research methods used?<\/strong><br>The article utilizes both quantitative and qualitative methods. The quantitative<br>research focuses on AI-generated prompts from online forums, examining<br>discussions about their malicious use. The qualitative research, through expert<br>interviews, provides insights into legal, technical, and policy solutions needed to<br>address the findings from the quantitative analysis. (Shetty, Choi, &amp; Park, 2024)<br><br><br><strong>Describe the types of data and analysis done?<\/strong><br>The data presented in this article is categorized into two types: quantitative and<br>qualitative. The quantitative data comprises 102 AI-generated prompts collected<br>from both the clear web and the dark web, specifically used for malicious purposes.<br>To analyze this data, thematic analysis and descriptive statistics were applied to<br>categorize the prompts into different types of malicious activities and identify the AI<br>tools used. The qualitative data consists of semi-structured interviews with six<br>experts in the fields of cybercrime, cybersecurity, and criminal justice. Thematic<br>analysis of these interviews helped identify recurring themes and insights related to<br>AI\u2019s role in cybercrime, focusing on online lifestyle, media discourse, and digital<br>capable guardianship (Shetty, Choi, &amp; Park, 2024). This comprehensive approach<br>provided both statistical trends and contextual explanations of AI-driven<br>cybercrime.<br><br><br><strong>Describe how the topic relates to the challenges, concerns and<br>contributions of marginalized groups?<\/strong><br>The article addresses age marginalization by highlighting that different age groups<br>have specific needs and vulnerabilities. It emphasizes that senior citizens should be<br>targeted through television advertising to raise awareness about better protecting<br>themselves online. It also mentions that seniors might be reluctant to report<br>incidents due to a lack of understanding or feelings of embarrassment. For younger<br>age groups, the article suggests creating interactive educational games for schools<br>and using the Homeland Security Investigations\u2019 iGuardians program to educate<br>children about online safety and reporting abuse (Shetty, Choi, &amp; Park, 2024).<br><br><br><strong>Describe the overall contributions of the studies to society?<\/strong><br>The studies contribute to society by emphasizing the importance of cyber hygiene,<br>urging individuals to be cautious about their online activities. Additionally, they<br>highlight the need for stronger communication and collaboration among educators,<br>policymakers, and cybersecurity experts to enhance cybersecurity measures. By<br>raising awareness and providing a comprehensive understanding of the intersection<br>between AI and cybercrime, the studies help in developing innovative approaches to<br>mitigate emerging threats in cyberspace (Shetty, Choi, &amp; Park, 2024).<br><br><br><strong>Conclusion:<\/strong><br>From the article &#8220;Investigating the Intersection of AI and Cybercrime: Risks, Trends,<br>and Countermeasures,&#8221; we gain insights into AI-powered cybercrimes. It highlights<br>the importance of recognizing age-specific vulnerabilities, fostering cybersecurity<br>transparency, and promoting collaboration among experts. The study stresses<br>better cyber hygiene and innovative educational approaches to enhance<br>cybersecurity efforts against emerging threats.<br><br><br><strong>Work Cited:<\/strong><br><br>Shetty, S., Choi, K., &amp; Park, I. (2024). Investigating the intersection of AI and<br>cybercrime: Risks, trends, and countermeasures. International Journal of<br>Cybersecurity Intelligence &amp; Cybercrime, 7(2), 28-53. <a href=\"https:\/\/vc.bridgew.edu\/cgi\/viewcontent.cgi?article=1187&amp;context=ijcic\" target=\"_blank\" rel=\"noreferrer noopener\">https:\/\/vc.bridgew.edu\/cgi\/viewcontent.cgi?article=1187&amp;context=ijcic<\/a><\/li>\n<\/ol>\n\n\n\n<p><br><br><strong>Article Review #2:<\/strong><br><br><strong>Describe how the topic relates to the principles of the social<br>sciences<\/strong>?<br>This article about cyber victimization in the healthcare industry highlights several<br>principles of social science. It applies the Cyber-Routine Activities Theory (Cyber-<br>RAT) to analyze the interactions between motivated offenders, attractive targets,<br>and the absence of capable guardianship in digital environments. This framework<br>sheds light on the conditions that make healthcare institutions particularly<br>vulnerable to cyberattacks. The data presented in the article offers valuable insights<br>into the vulnerabilities and weaknesses within healthcare organizations. These<br>findings could drive changes in cybersecurity policies and practices, improving<br>defenses against future threats. Additionally, the article explores economic and<br>behavioral incentives, emphasizing that financial gain is one of the primary<br>motivations for these attacks. The allure of vast amounts of sensitive personal data<br>stored in healthcare systems make healthcare organizations attractive targets for<br>cybercriminals.<br><br><br><strong>Describe the study&#8217;s research questions or hypotheses<\/strong>?<br>The main goal of this research, grounded in the Routine Activities Theory (RAT)<br>framework, is to explore the driving forces behind cyber attackers and pinpoint<br>weaknesses in healthcare cybersecurity systems. More specifically, the study aims<br>to answer crucial research questions:<br>(1) What are the primary motivations driving Advanced Persistent Threats (APTs) to<br>target the healthcare industry?<br>(2) What are the common characteristics and behaviors of APT groups (whether<br>state-sponsored or cybercriminal) that target healthcare institutions?<br><br><br><strong>Describe the types of research methods used?<br><\/strong>The primary method used in this study was secondary data analysis, with<br>information collected from multiple credible websites. The researchers utilized both<br>a dependent variable and independent variables to structure their analysis.<br>Descriptive statistics were applied to identify patterns and summarize the data,<br>while Chi-square tests were employed to examine relationships between variables<br>and measure the strength of their associations.<br><br><br><strong>Describe the types of data and analysis done<\/strong>?<br>The study drew its dataset from secondary sources, with Hackmageddon serving as<br>the primary platform. This website\u2019s database is well-regarded for organizing<br>detailed information on cyber incidents, including classifications by industry,<br>motives behind attacks, and their outcomes. To further enrich the data, additional<br>sources such as Databreaches.net, CSIDB.org, and HIPAA Journal were utilized,<br>ensuring a thorough exploration of cybercrime trends across various contexts.<br>These data selections focus specifically on healthcare-related cyberattacks that<br>occurred between 2018 and 2023. This time frame allowed the researchers to<br>capture evolving trends over a five-year period, including shifts in attacker behavior,<br>motivations, and targeted vulnerabilities.<br><br><br><strong>Describe how the topic relates to the challenges, concerns and<br>contributions of marginalized groups?<\/strong><br>Marginalized groups face greater risks from healthcare cyberattacks due<br>to their reliance on under-resourced services. Data breaches can<br>worsen discrimination and deepen social inequities. The study<br>emphasizes equitable cybersecurity practices and the importance of<br>including marginalized perspectives in shaping protective policies.<br><br><br><strong>Describe the overall contributions of the studies to society?<\/strong><br>The primary contribution of the article is to raise awareness about cybersecurity<br>threats facing the healthcare industry. It highlights that attackers are primarily<br>motivated by financial gain due to the vast amounts of sensitive personal data<br>stored in healthcare systems. This data is highly valuable and vulnerable to<br>exploitation. The study provides insights that can guide policymakers, healthcare<br>administrators, and cybersecurity professionals to develop stronger protective<br>measures and policies. By doing so, it contributes to the overall goal of fortifying<br>healthcare cybersecurity and ensuring the safety of sensitive patient information.<br><br><strong>Conclusion:<\/strong><br>The article highlights the urgent need to address healthcare cybersecurity vulnerabilities using the Cyber-Routine Activities Theory (Cyber-RAT). It examines cyber attackers&#8217; motives and behaviors, revealing systemic weaknesses and economic incentives. The research offers practical steps to strengthen security policies while emphasizing equitable practices to protect marginalized groups. These insights are vital for safeguarding patient data in the digital age.<br><br><br><strong>Worked Cited:<\/strong><br><br>Praveen, Y., Kim, M., &amp; Choi, K. (2024). Cyber victimization in the healthcare industry:<br>Analyzing offender motivations and target characteristics through Routine Activities Theory<br>(RAT) and Cyber-Routine Activities Theory (Cyber-RAT). International Journal of<br>Cybersecurity Intelligence &amp; Cybercrime, 7(2), 4\u201327. <a href=\"https:\/\/doi.org\/10.52306\/2578-\n3289.1186\" target=\"_blank\" rel=\"noreferrer noopener\">https:\/\/doi.org\/10.52306\/2578-<br>3289.1186<\/a><br><\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>Career Paper:<\/strong><br><\/h2>\n\n\n\n<p>Name: John Chandler Williams<br>Professor: Diwakar Yalpi<br>Topic: Social Cybersecurity<br>Date: 04\/13\/2025<br><br><strong>Social Science and Cybersecurity Forensic<\/strong><br><br><strong>Introduction<\/strong><br>The field of cybersecurity forensic investigation has always intrigued me, and it is a career<br>path I may want to pursue in the future. A cybersecurity forensic investigator plays a critical<br>role in uncovering evidence of cybercrimes such as hacking, identity theft, fraud, and other<br>malicious online activities. Their ultimate goal is to gather sufficient evidence to ensure<br>perpetrators are held accountable in a court of law. Social science, which is fundamentally<br>about understanding human behavior, provides invaluable tools and principles that aid<br>investigators in analyzing motives, trends, and patterns behind cybercriminal activities. By<br>applying social science frameworks, investigators can gain deeper insights into the<br>underlying drivers of cybercrimes, enabling them to effectively track down offenders and<br>strengthen their cases.<br><strong>What is Social Cybersecurity<\/strong><br>Cybersecurity analysts are professionals tasked with defending against cybercrimes using<br>technical measures, but their roles increasingly require a strong reliance on social science<br>principles. Social cybersecurity, as an emerging field, emphasizes understanding human<br>behavior as a critical factor in cybercrime prevention. By leveraging insights from<br>behavioral psychology, cybersecurity experts can anticipate how users might react to<br>manipulative content, such as phishing attempts or disinformation campaigns. This<br>knowledge allows them to create targeted countermeasures that effectively address these<br>threats. Their work represents a fusion of technical expertise and social science, which is<br>essential in combating modern cybercrimes and ensuring a safer digital environment.<br><strong>Identifying At-Risk Groups<\/strong><br>Recent research shows that vulnerability to disinformation is not limited to those who are<br>economically or socially disadvantaged but also includes factors like higher media<br>consumption and older age. While educated people are found to be more aware of false<br>news, many people are still highly susceptible to misinformation because personalized<br>algorithms, echo chambers, and cognitive biases reinforce their preexisting beliefs. This<br>vulnerability is further amplified by social media platforms that design feeds to display<br>content aligning with past interactions, thereby deepening users&#8217; immersion in narrow<br>informational bubbles. Even when people are confronted with factual evidence they still<br>hold on to initial false beliefs. This complicates public understanding and challenges<br>forensic investigators decoding digital manipulation. Ultimately, these dynamics call for<br>strategies that merge social science insights with technological solutions to combat<br>disinformation.<br><strong>Social Science and Forensic Science<\/strong><br>Katharine Browning published an article titled Social Science Research on Forensic<br>Science: The Story Behind One of NIJ&#8217;s Newest Research Portfolios, where she illustrates<br>how integrating social science research with forensic science can significantly enhance<br>investigative practices. Browning explains that as new forensic technologies such as DNA<br>analysis and other advanced tools emerged, it became evident that understanding human<br>behavior and organizational dynamics is equally crucial. While the article primarily<br>addresses traditional forensic science, many of its underlying principles directly connect to<br>cybersecurity forensic investigation. In the digital realm, forensic investigators must<br>consider the human element\u2014from uncovering the motivations driving cybercriminal<br>activities to analyzing how human errors or biases might influence the interpretation of<br>digital evidence. By blending technical expertise with social science insights, this<br>interdisciplinary approach equips cybersecurity forensic investigators with a<br>comprehensive skill set, strengthening their ability to construct compelling cases that<br>withstand rigorous legal scrutiny.<br><strong>Conclusion<\/strong><br>Integrating social science with cybersecurity forensics is essential for tackling modern<br>cybercrimes. Cognitive biases, echo chambers, and personalized algorithms reveal that<br>technical evidence alone is not enough. Combining behavioral psychology with forensic<br>methods helps investigators uncover the human motives behind attacks and build stronger<br>cases. This interdisciplinary approach not only improves legal outcomes but also protects<br>at-risk groups in our evolving digital landscape.<br><br><strong>Worked Cited:<\/strong><br>Carley, Kathleen M. &#8220;Social cybersecurity: an emerging science.&#8221; Computational and<br>Mathematical Organization Theory, vol. 26, no. 3, 2020, pp. 365\u2013381. Springer,<br><a href=\"https:\/\/doi.org\/10.1007\/s10588-020-09322-9\">https:\/\/doi.org\/10.1007\/s10588-020-09322-9<\/a><br><br>Browning, Katharine. \u201cSocial Science Research on Forensic Science: The Story Behind One<br>of NIJ\u2019s Newest Research Portfolios.\u201d National Institute of Justice, 1 July 2015,<br><a href=\"https:\/\/nij.ojp.gov\/topics\/articles\/social-science-research-forensic-science-story-behind-\none-nijs-newest-research\n\">https:\/\/nij.ojp.gov\/topics\/articles\/social-science-research-forensic-science-story-behind-<br>one-nijs-newest-research<br><\/a><br>National Academies of Sciences, Engineering, and Medicine. \u201c6 Integrating Social and<br>Behavioral Sciences (SBS) Research to Enhance Security in Cyberspace.\u201d A Decadal Survey<br>of the Social and Behavioral Sciences: A Research Agenda for Advancing Intelligence<br>Analysis, The National Academies Press, 2019,<br><a href=\"https:\/\/nap.nationalacademies.org\/read\/25335\/chapter\/10\">https:\/\/nap.nationalacademies.org\/read\/25335\/chapter\/10<\/a>. Accessed 13 Apr. 2025.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Journal Entry&#8217;s Journal entry 1:Review the NICE Workforce Framework. Are there certain areas that you would want tofocus your career on? Explain which areas would appeal the most to you <a class=\"more-link\" href=\"https:\/\/student.wp.odu.edu\/jwill297\/cyse-201s\/\">Continue Reading &rarr;<\/a><\/p>\n","protected":false},"author":30488,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"_links":{"self":[{"href":"https:\/\/student.wp.odu.edu\/jwill297\/wp-json\/wp\/v2\/pages\/9"}],"collection":[{"href":"https:\/\/student.wp.odu.edu\/jwill297\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/student.wp.odu.edu\/jwill297\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/student.wp.odu.edu\/jwill297\/wp-json\/wp\/v2\/users\/30488"}],"replies":[{"embeddable":true,"href":"https:\/\/student.wp.odu.edu\/jwill297\/wp-json\/wp\/v2\/comments?post=9"}],"version-history":[{"count":4,"href":"https:\/\/student.wp.odu.edu\/jwill297\/wp-json\/wp\/v2\/pages\/9\/revisions"}],"predecessor-version":[{"id":41,"href":"https:\/\/student.wp.odu.edu\/jwill297\/wp-json\/wp\/v2\/pages\/9\/revisions\/41"}],"wp:attachment":[{"href":"https:\/\/student.wp.odu.edu\/jwill297\/wp-json\/wp\/v2\/media?parent=9"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}