{"id":386,"date":"2026-01-04T14:11:51","date_gmt":"2026-01-04T18:11:51","guid":{"rendered":"https:\/\/sites.wp.odu.edu\/ashleyharper\/?page_id=386"},"modified":"2026-01-04T14:11:51","modified_gmt":"2026-01-04T18:11:51","slug":"crjs-310-cyber-criminology-foundations","status":"publish","type":"page","link":"https:\/\/sites.wp.odu.edu\/ashleyharper\/criminal-justice\/crjs-310-cyber-criminology-foundations\/","title":{"rendered":"CRJS 310: CYBER CRIMINOLOGY: FOUNDATIONS"},"content":{"rendered":"","protected":false},"excerpt":{"rendered":"","protected":false},"author":30937,"featured_media":0,"parent":379,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"_links":{"self":[{"href":"https:\/\/sites.wp.odu.edu\/ashleyharper\/wp-json\/wp\/v2\/pages\/386"}],"collection":[{"href":"https:\/\/sites.wp.odu.edu\/ashleyharper\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/sites.wp.odu.edu\/ashleyharper\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/ashleyharper\/wp-json\/wp\/v2\/users\/30937"}],"replies":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/ashleyharper\/wp-json\/wp\/v2\/comments?post=386"}],"version-history":[{"count":1,"href":"https:\/\/sites.wp.odu.edu\/ashleyharper\/wp-json\/wp\/v2\/pages\/386\/revisions"}],"predecessor-version":[{"id":387,"href":"https:\/\/sites.wp.odu.edu\/ashleyharper\/wp-json\/wp\/v2\/pages\/386\/revisions\/387"}],"up":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/ashleyharper\/wp-json\/wp\/v2\/pages\/379"}],"wp:attachment":[{"href":"https:\/\/sites.wp.odu.edu\/ashleyharper\/wp-json\/wp\/v2\/media?parent=386"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}