{"id":331,"date":"2024-02-08T18:24:56","date_gmt":"2024-02-08T18:24:56","guid":{"rendered":"https:\/\/sites.wp.odu.edu\/isaaccybersecuritysocialsciences\/?p=331"},"modified":"2024-02-08T18:24:56","modified_gmt":"2024-02-08T18:24:56","slug":"article-review-1-inheritance-laws-and-artificial-intelligence-in-relation-to-cybercrime","status":"publish","type":"post","link":"https:\/\/sites.wp.odu.edu\/isaaccybersecuritysocialsciences\/2024\/02\/08\/article-review-1-inheritance-laws-and-artificial-intelligence-in-relation-to-cybercrime\/","title":{"rendered":"Article Review #1 Inheritance Laws and Artificial Intelligence in Relation to Cybercrime"},"content":{"rendered":"<a href=\"https:\/\/sites.wp.odu.edu\/isaaccybersecuritysocialsciences\/wp-content\/uploads\/sites\/35244\/2024\/02\/Article-Review-1-Inheritance-Laws-and-Artificial-Intelligence-in-Relation-to-Cybercrime-CYSE201S-pdf.pdf\" class=\"pdfemb-viewer\" style=\"\" data-width=\"max\" data-height=\"max\"  data-toolbar=\"bottom\" data-toolbar-fixed=\"off\">Article-Review-1-Inheritance-Laws-and-Artificial-Intelligence-in-Relation-to-Cybercrime-CYSE201S-pdf<br\/><\/a>\n<p class=\"wp-block-pdfemb-pdf-embedder-viewer\"><\/p>\n","protected":false},"excerpt":{"rendered":"","protected":false},"author":28323,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":"","wds_primary_category":0},"categories":[1],"tags":[],"_links":{"self":[{"href":"https:\/\/sites.wp.odu.edu\/isaaccybersecuritysocialsciences\/wp-json\/wp\/v2\/posts\/331"}],"collection":[{"href":"https:\/\/sites.wp.odu.edu\/isaaccybersecuritysocialsciences\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/sites.wp.odu.edu\/isaaccybersecuritysocialsciences\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/isaaccybersecuritysocialsciences\/wp-json\/wp\/v2\/users\/28323"}],"replies":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/isaaccybersecuritysocialsciences\/wp-json\/wp\/v2\/comments?post=331"}],"version-history":[{"count":1,"href":"https:\/\/sites.wp.odu.edu\/isaaccybersecuritysocialsciences\/wp-json\/wp\/v2\/posts\/331\/revisions"}],"predecessor-version":[{"id":333,"href":"https:\/\/sites.wp.odu.edu\/isaaccybersecuritysocialsciences\/wp-json\/wp\/v2\/posts\/331\/revisions\/333"}],"wp:attachment":[{"href":"https:\/\/sites.wp.odu.edu\/isaaccybersecuritysocialsciences\/wp-json\/wp\/v2\/media?parent=331"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/isaaccybersecuritysocialsciences\/wp-json\/wp\/v2\/categories?post=331"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/isaaccybersecuritysocialsciences\/wp-json\/wp\/v2\/tags?post=331"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}