{"id":465,"date":"2026-04-23T22:38:34","date_gmt":"2026-04-23T22:38:34","guid":{"rendered":"https:\/\/sites.wp.odu.edu\/cyber-201s\/?page_id=465"},"modified":"2026-04-25T17:55:40","modified_gmt":"2026-04-25T17:55:40","slug":"work-samples","status":"publish","type":"page","link":"https:\/\/sites.wp.odu.edu\/cyber-201s\/work-samples\/","title":{"rendered":"Work Samples"},"content":{"rendered":"\n<figure class=\"wp-block-embed is-type-wp-embed is-provider-liana-davis wp-block-embed-liana-davis\"><div class=\"wp-block-embed__wrapper\">\n<blockquote class=\"wp-embedded-content\" data-secret=\"lreEr2RhJA\"><a href=\"https:\/\/sites.wp.odu.edu\/cyber-201s\/2026\/04\/25\/reflected-best-self-assessment-leadership-reflection\/\">Leadership Ethics Reflection: Book Review and Self-Assessment<\/a><\/blockquote><iframe class=\"wp-embedded-content\" sandbox=\"allow-scripts\" security=\"restricted\" style=\"position: absolute; clip: rect(1px, 1px, 1px, 1px);\" title=\"&#8220;Leadership Ethics Reflection: Book Review and Self-Assessment&#8221; &#8212; Liana Davis\" src=\"https:\/\/sites.wp.odu.edu\/cyber-201s\/2026\/04\/25\/reflected-best-self-assessment-leadership-reflection\/embed\/#?secret=fpB3Q1Bx5q#?secret=lreEr2RhJA\" data-secret=\"lreEr2RhJA\" width=\"600\" height=\"338\" frameborder=\"0\" marginwidth=\"0\" marginheight=\"0\" scrolling=\"no\"><\/iframe>\n<\/div><\/figure>\n\n\n\n<figure class=\"wp-block-embed is-type-wp-embed is-provider-liana-davis wp-block-embed-liana-davis\"><div class=\"wp-block-embed__wrapper\">\n<blockquote class=\"wp-embedded-content\" data-secret=\"ZV0PdULZ7o\"><a href=\"https:\/\/sites.wp.odu.edu\/cyber-201s\/2026\/04\/25\/cybersecurity-entrepreneurship-venture-development-project\/\">Cybersecurity Entrepreneurship: Venture Development Project<\/a><\/blockquote><iframe class=\"wp-embedded-content\" sandbox=\"allow-scripts\" security=\"restricted\" style=\"position: absolute; clip: rect(1px, 1px, 1px, 1px);\" title=\"&#8220;Cybersecurity Entrepreneurship: Venture Development Project&#8221; &#8212; Liana Davis\" src=\"https:\/\/sites.wp.odu.edu\/cyber-201s\/2026\/04\/25\/cybersecurity-entrepreneurship-venture-development-project\/embed\/#?secret=HdcNw7pfKR#?secret=ZV0PdULZ7o\" data-secret=\"ZV0PdULZ7o\" width=\"600\" height=\"338\" frameborder=\"0\" marginwidth=\"0\" marginheight=\"0\" scrolling=\"no\"><\/iframe>\n<\/div><\/figure>\n\n\n\n<figure class=\"wp-block-embed is-type-wp-embed is-provider-liana-davis wp-block-embed-liana-davis\"><div class=\"wp-block-embed__wrapper\">\n<blockquote class=\"wp-embedded-content\" data-secret=\"SQmazAp1sH\"><a href=\"https:\/\/sites.wp.odu.edu\/cyber-201s\/2026\/04\/25\/interdisciplinary-health-research-paper-medical-marijuana-effects\/\">Interdisciplinary Health Research Paper: Medical Marijuana Effects<\/a><\/blockquote><iframe class=\"wp-embedded-content\" sandbox=\"allow-scripts\" security=\"restricted\" style=\"position: absolute; clip: rect(1px, 1px, 1px, 1px);\" title=\"&#8220;Interdisciplinary Health Research Paper: Medical Marijuana Effects&#8221; &#8212; Liana Davis\" src=\"https:\/\/sites.wp.odu.edu\/cyber-201s\/2026\/04\/25\/interdisciplinary-health-research-paper-medical-marijuana-effects\/embed\/#?secret=uvrLjMsmo4#?secret=SQmazAp1sH\" data-secret=\"SQmazAp1sH\" width=\"600\" height=\"338\" frameborder=\"0\" marginwidth=\"0\" marginheight=\"0\" scrolling=\"no\"><\/iframe>\n<\/div><\/figure>\n\n\n\n<figure class=\"wp-block-embed is-type-wp-embed is-provider-liana-davis wp-block-embed-liana-davis\"><div class=\"wp-block-embed__wrapper\">\n<blockquote class=\"wp-embedded-content\" data-secret=\"SdkiBiCjli\"><a href=\"https:\/\/sites.wp.odu.edu\/cyber-201s\/2026\/04\/25\/cybersecurity-policy-analysis-evaluating-the-nist-cybersecurity-framework\/\">Cybersecurity Policy Analysis: Evaluating the NIST Cybersecurity Framework<\/a><\/blockquote><iframe class=\"wp-embedded-content\" sandbox=\"allow-scripts\" security=\"restricted\" style=\"position: absolute; clip: rect(1px, 1px, 1px, 1px);\" title=\"&#8220;Cybersecurity Policy Analysis: Evaluating the NIST Cybersecurity Framework&#8221; &#8212; Liana Davis\" src=\"https:\/\/sites.wp.odu.edu\/cyber-201s\/2026\/04\/25\/cybersecurity-policy-analysis-evaluating-the-nist-cybersecurity-framework\/embed\/#?secret=C4BqHcVtTO#?secret=SdkiBiCjli\" data-secret=\"SdkiBiCjli\" width=\"600\" height=\"338\" frameborder=\"0\" marginwidth=\"0\" marginheight=\"0\" scrolling=\"no\"><\/iframe>\n<\/div><\/figure>\n","protected":false},"excerpt":{"rendered":"","protected":false},"author":25880,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"_links":{"self":[{"href":"https:\/\/sites.wp.odu.edu\/cyber-201s\/wp-json\/wp\/v2\/pages\/465"}],"collection":[{"href":"https:\/\/sites.wp.odu.edu\/cyber-201s\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/sites.wp.odu.edu\/cyber-201s\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/cyber-201s\/wp-json\/wp\/v2\/users\/25880"}],"replies":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/cyber-201s\/wp-json\/wp\/v2\/comments?post=465"}],"version-history":[{"count":5,"href":"https:\/\/sites.wp.odu.edu\/cyber-201s\/wp-json\/wp\/v2\/pages\/465\/revisions"}],"predecessor-version":[{"id":544,"href":"https:\/\/sites.wp.odu.edu\/cyber-201s\/wp-json\/wp\/v2\/pages\/465\/revisions\/544"}],"wp:attachment":[{"href":"https:\/\/sites.wp.odu.edu\/cyber-201s\/wp-json\/wp\/v2\/media?parent=465"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}