{"id":429,"date":"2026-04-28T02:38:53","date_gmt":"2026-04-28T02:38:53","guid":{"rendered":"https:\/\/sites.wp.odu.edu\/cybodu\/?page_id=429"},"modified":"2026-04-30T03:49:12","modified_gmt":"2026-04-30T03:49:12","slug":"phil-355e-cybersecurity-ethics","status":"publish","type":"page","link":"https:\/\/sites.wp.odu.edu\/cybodu\/phil-355e-cybersecurity-ethics\/","title":{"rendered":"PHIL 355E &#8211; Cybersecurity Ethics"},"content":{"rendered":"\n<p>This Page is Under Development. <\/p>\n\n\n\n<p>Content will be added as coursework is completed.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>This Page is Under Development. Content will be added as coursework is completed.<\/p>\n","protected":false},"author":30066,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"_links":{"self":[{"href":"https:\/\/sites.wp.odu.edu\/cybodu\/wp-json\/wp\/v2\/pages\/429"}],"collection":[{"href":"https:\/\/sites.wp.odu.edu\/cybodu\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/sites.wp.odu.edu\/cybodu\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/cybodu\/wp-json\/wp\/v2\/users\/30066"}],"replies":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/cybodu\/wp-json\/wp\/v2\/comments?post=429"}],"version-history":[{"count":2,"href":"https:\/\/sites.wp.odu.edu\/cybodu\/wp-json\/wp\/v2\/pages\/429\/revisions"}],"predecessor-version":[{"id":528,"href":"https:\/\/sites.wp.odu.edu\/cybodu\/wp-json\/wp\/v2\/pages\/429\/revisions\/528"}],"wp:attachment":[{"href":"https:\/\/sites.wp.odu.edu\/cybodu\/wp-json\/wp\/v2\/media?parent=429"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}