{"id":1811,"date":"2021-11-01T11:24:28","date_gmt":"2021-11-01T11:24:28","guid":{"rendered":"https:\/\/cybersecurity.fsu.edu\/club\/?p=1811"},"modified":"2021-11-01T11:33:25","modified_gmt":"2021-11-01T11:33:25","slug":"ph-d-in-information-school-of-information-florida-state-university","status":"publish","type":"post","link":"https:\/\/cybersecurity.fsu.edu\/club\/2021\/11\/1811\/","title":{"rendered":"Ph.D. in Information, School of Information, Florida State University"},"content":{"rendered":"<p class=\"has-text-align-left\">Interested in philosophizing cybersecurity phenomenon? Come and join the Ph.D. studies.<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><a href=\"https:\/\/cybersecurity.fsu.edu\/club\/wp-content\/uploads\/2021\/11\/2021.11.01-FSU_iSchool_PhDFlyer_2022_gold_TOP.jpg\"><img loading=\"lazy\" decoding=\"async\" width=\"791\" height=\"1024\" src=\"https:\/\/cybersecurity.fsu.edu\/club\/wp-content\/uploads\/2021\/11\/2021.11.01-FSU_iSchool_PhDFlyer_2022_gold_TOP-791x1024.jpg\" alt=\"\" class=\"wp-image-1810\" srcset=\"https:\/\/cybersecurity.fsu.edu\/club\/wp-content\/uploads\/2021\/11\/2021.11.01-FSU_iSchool_PhDFlyer_2022_gold_TOP-791x1024.jpg 791w, https:\/\/cybersecurity.fsu.edu\/club\/wp-content\/uploads\/2021\/11\/2021.11.01-FSU_iSchool_PhDFlyer_2022_gold_TOP-232x300.jpg 232w, https:\/\/cybersecurity.fsu.edu\/club\/wp-content\/uploads\/2021\/11\/2021.11.01-FSU_iSchool_PhDFlyer_2022_gold_TOP-768x994.jpg 768w, https:\/\/cybersecurity.fsu.edu\/club\/wp-content\/uploads\/2021\/11\/2021.11.01-FSU_iSchool_PhDFlyer_2022_gold_TOP-1187x1536.jpg 1187w, https:\/\/cybersecurity.fsu.edu\/club\/wp-content\/uploads\/2021\/11\/2021.11.01-FSU_iSchool_PhDFlyer_2022_gold_TOP.jpg 1275w\" sizes=\"auto, (max-width: 791px) 100vw, 791px\" \/><\/a><\/figure>","protected":false},"excerpt":{"rendered":"<p>Interested in philosophizing cybersecurity phenomenon? Come and join the Ph.D. studies.<\/p>","protected":false},"author":5,"featured_media":1813,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[5],"tags":[],"class_list":{"0":"post-1811","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-events","8":"czr-hentry"},"_links":{"self":[{"href":"https:\/\/cybersecurity.fsu.edu\/club\/wp-json\/wp\/v2\/posts\/1811","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/cybersecurity.fsu.edu\/club\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/cybersecurity.fsu.edu\/club\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/cybersecurity.fsu.edu\/club\/wp-json\/wp\/v2\/users\/5"}],"replies":[{"embeddable":true,"href":"https:\/\/cybersecurity.fsu.edu\/club\/wp-json\/wp\/v2\/comments?post=1811"}],"version-history":[{"count":1,"href":"https:\/\/cybersecurity.fsu.edu\/club\/wp-json\/wp\/v2\/posts\/1811\/revisions"}],"predecessor-version":[{"id":1812,"href":"https:\/\/cybersecurity.fsu.edu\/club\/wp-json\/wp\/v2\/posts\/1811\/revisions\/1812"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/cybersecurity.fsu.edu\/club\/wp-json\/wp\/v2\/media\/1813"}],"wp:attachment":[{"href":"https:\/\/cybersecurity.fsu.edu\/club\/wp-json\/wp\/v2\/media?parent=1811"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/cybersecurity.fsu.edu\/club\/wp-json\/wp\/v2\/categories?post=1811"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/cybersecurity.fsu.edu\/club\/wp-json\/wp\/v2\/tags?post=1811"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}