{"id":296,"date":"2022-01-27T19:02:17","date_gmt":"2022-01-27T19:02:17","guid":{"rendered":"https:\/\/sites.wp.odu.edu\/aboutjeremiahprice\/?page_id=296"},"modified":"2022-03-31T17:33:36","modified_gmt":"2022-03-31T17:33:36","slug":"cyse-201s","status":"publish","type":"page","link":"https:\/\/sites.wp.odu.edu\/aboutjeremiahprice\/cyse-201s\/","title":{"rendered":"CYSE 201S"},"content":{"rendered":"\n<h2 class=\"wp-block-heading\">Cybersecurity and the Social Sciences <\/h2>\n\n\n\n<div data-wp-interactive=\"\" class=\"wp-block-file\"><a href=\"https:\/\/sites.wp.odu.edu\/aboutjeremiahprice\/wp-content\/uploads\/sites\/25908\/2022\/01\/NICE-Career-Framework-Analysis-2.pdf\">NICE-Career-Framework-Analysis-2<\/a><a href=\"https:\/\/sites.wp.odu.edu\/aboutjeremiahprice\/wp-content\/uploads\/sites\/25908\/2022\/01\/NICE-Career-Framework-Analysis-2.pdf\" class=\"wp-block-file__button\" download>Download<\/a><\/div>\n\n\n\n<div data-wp-interactive=\"\" class=\"wp-block-file\"><a href=\"https:\/\/sites.wp.odu.edu\/aboutjeremiahprice\/wp-content\/uploads\/sites\/25908\/2022\/01\/Principles-of-Science-Cybersecurity-2.pdf\">Principles-of-Science-Cybersecurity-2<\/a><a href=\"https:\/\/sites.wp.odu.edu\/aboutjeremiahprice\/wp-content\/uploads\/sites\/25908\/2022\/01\/Principles-of-Science-Cybersecurity-2.pdf\" class=\"wp-block-file__button\" download>Download<\/a><\/div>\n\n\n\n<div data-wp-interactive=\"\" class=\"wp-block-file\"><a href=\"https:\/\/sites.wp.odu.edu\/aboutjeremiahprice\/wp-content\/uploads\/sites\/25908\/2022\/03\/RealandFakeWebsites-1.pdf\">RealandFakeWebsites-1<\/a><a href=\"https:\/\/sites.wp.odu.edu\/aboutjeremiahprice\/wp-content\/uploads\/sites\/25908\/2022\/03\/RealandFakeWebsites-1.pdf\" class=\"wp-block-file__button\" download>Download<\/a><\/div>\n\n\n\n<div data-wp-interactive=\"\" class=\"wp-block-file\"><a href=\"https:\/\/sites.wp.odu.edu\/aboutjeremiahprice\/wp-content\/uploads\/sites\/25908\/2022\/03\/ArticleReview1-1.pdf\">ArticleReview1-1<\/a><a href=\"https:\/\/sites.wp.odu.edu\/aboutjeremiahprice\/wp-content\/uploads\/sites\/25908\/2022\/03\/ArticleReview1-1.pdf\" class=\"wp-block-file__button\" download>Download<\/a><\/div>\n\n\n\n<div data-wp-interactive=\"\" class=\"wp-block-file\"><a href=\"https:\/\/sites.wp.odu.edu\/aboutjeremiahprice\/wp-content\/uploads\/sites\/25908\/2022\/03\/Article-Review-2.pdf\">Article-Review-2<\/a><a href=\"https:\/\/sites.wp.odu.edu\/aboutjeremiahprice\/wp-content\/uploads\/sites\/25908\/2022\/03\/Article-Review-2.pdf\" class=\"wp-block-file__button\" download>Download<\/a><\/div>\n","protected":false},"excerpt":{"rendered":"<p>Cybersecurity and the Social Sciences<\/p>\n","protected":false},"author":21789,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"_links":{"self":[{"href":"https:\/\/sites.wp.odu.edu\/aboutjeremiahprice\/wp-json\/wp\/v2\/pages\/296"}],"collection":[{"href":"https:\/\/sites.wp.odu.edu\/aboutjeremiahprice\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/sites.wp.odu.edu\/aboutjeremiahprice\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/aboutjeremiahprice\/wp-json\/wp\/v2\/users\/21789"}],"replies":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/aboutjeremiahprice\/wp-json\/wp\/v2\/comments?post=296"}],"version-history":[{"count":3,"href":"https:\/\/sites.wp.odu.edu\/aboutjeremiahprice\/wp-json\/wp\/v2\/pages\/296\/revisions"}],"predecessor-version":[{"id":310,"href":"https:\/\/sites.wp.odu.edu\/aboutjeremiahprice\/wp-json\/wp\/v2\/pages\/296\/revisions\/310"}],"wp:attachment":[{"href":"https:\/\/sites.wp.odu.edu\/aboutjeremiahprice\/wp-json\/wp\/v2\/media?parent=296"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}