{"id":25260,"name":"dstav002","url":"","description":"","link":"https:\/\/sites.wp.odu.edu\/donte-cybersecurity\/author\/dstav002\/","slug":"dstav002","avatar_urls":{"24":"https:\/\/secure.gravatar.com\/avatar\/5ffb31d42c9cbcef32100e9fbdc9e12b?s=24&d=mm&r=g","48":"https:\/\/secure.gravatar.com\/avatar\/5ffb31d42c9cbcef32100e9fbdc9e12b?s=48&d=mm&r=g","96":"https:\/\/secure.gravatar.com\/avatar\/5ffb31d42c9cbcef32100e9fbdc9e12b?s=96&d=mm&r=g"},"meta":[],"_links":{"self":[{"href":"https:\/\/sites.wp.odu.edu\/donte-cybersecurity\/wp-json\/wp\/v2\/users\/25260"}],"collection":[{"href":"https:\/\/sites.wp.odu.edu\/donte-cybersecurity\/wp-json\/wp\/v2\/users"}]}}