{"id":343,"date":"2024-04-19T01:36:28","date_gmt":"2024-04-19T01:36:28","guid":{"rendered":"https:\/\/sites.wp.odu.edu\/cybersecurityjustingaither\/?p=343"},"modified":"2024-04-19T01:36:28","modified_gmt":"2024-04-19T01:36:28","slug":"discussion-board-ethical-considerations-of-crispr-gene-editing","status":"publish","type":"post","link":"https:\/\/sites.wp.odu.edu\/cybersecurityjustingaither\/2024\/04\/19\/discussion-board-ethical-considerations-of-crispr-gene-editing\/","title":{"rendered":"Discussion Board: Ethical Considerations of CRISPR Gene Editing"},"content":{"rendered":"\n<p>Bio cybersecurity involves protecting the integrity and security of systems. It helps with privacy and confidentiality. Understanding the ethical considerations is crucial for professionals to balance security needs.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Bio cybersecurity involves protecting the integrity and security of systems. It helps with privacy and confidentiality. Understanding the ethical considerations is crucial for professionals to balance security needs.<\/p>\n","protected":false},"author":27462,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":"","wds_primary_category":0},"categories":[1],"tags":[],"_links":{"self":[{"href":"https:\/\/sites.wp.odu.edu\/cybersecurityjustingaither\/wp-json\/wp\/v2\/posts\/343"}],"collection":[{"href":"https:\/\/sites.wp.odu.edu\/cybersecurityjustingaither\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/sites.wp.odu.edu\/cybersecurityjustingaither\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/cybersecurityjustingaither\/wp-json\/wp\/v2\/users\/27462"}],"replies":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/cybersecurityjustingaither\/wp-json\/wp\/v2\/comments?post=343"}],"version-history":[{"count":1,"href":"https:\/\/sites.wp.odu.edu\/cybersecurityjustingaither\/wp-json\/wp\/v2\/posts\/343\/revisions"}],"predecessor-version":[{"id":344,"href":"https:\/\/sites.wp.odu.edu\/cybersecurityjustingaither\/wp-json\/wp\/v2\/posts\/343\/revisions\/344"}],"wp:attachment":[{"href":"https:\/\/sites.wp.odu.edu\/cybersecurityjustingaither\/wp-json\/wp\/v2\/media?parent=343"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/cybersecurityjustingaither\/wp-json\/wp\/v2\/categories?post=343"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/cybersecurityjustingaither\/wp-json\/wp\/v2\/tags?post=343"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}