{"id":943,"date":"2024-01-11T14:16:06","date_gmt":"2024-01-11T11:16:06","guid":{"rendered":"http:\/\/cyberpoliticsconference.org\/?p=943"},"modified":"2024-01-11T14:16:07","modified_gmt":"2024-01-11T11:16:07","slug":"2023-conference-program-and-proceedings","status":"publish","type":"post","link":"https:\/\/cyberpoliticsconference.org\/index.php\/2024\/01\/11\/2023-conference-program-and-proceedings\/","title":{"rendered":"2023 Conference Program and Proceedings"},"content":{"rendered":"\n<p><a href=\"https:\/\/drive.google.com\/drive\/folders\/1uK9qrDBs_VmPsWAnxiBHfU3-nII5GY_3\">Conference <\/a><a href=\"https:\/\/drive.google.com\/file\/d\/1-IjL8WaG_VV3Kd_wEk7KxGLrFLk__Bja\/view?usp=sharing\">Program<\/a><\/p>\n\n\n\n<p><a href=\"https:\/\/drive.google.com\/file\/d\/1xc-YhImjARXIo8UNBaBwdP6a6OYtII9Q\/view?usp=sharing\">Conference Proceeding<\/a><a href=\"https:\/\/drive.google.com\/drive\/u\/0\/folders\/1uK9qrDBs_VmPsWAnxiBHfU3-nII5GY_3\">s<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Conference Program Conference Proceedings<\/p>\n","protected":false},"author":3,"featured_media":937,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[1],"tags":[],"class_list":["post-943","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-article"],"_links":{"self":[{"href":"https:\/\/cyberpoliticsconference.org\/index.php\/wp-json\/wp\/v2\/posts\/943","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/cyberpoliticsconference.org\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/cyberpoliticsconference.org\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/cyberpoliticsconference.org\/index.php\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/cyberpoliticsconference.org\/index.php\/wp-json\/wp\/v2\/comments?post=943"}],"version-history":[{"count":2,"href":"https:\/\/cyberpoliticsconference.org\/index.php\/wp-json\/wp\/v2\/posts\/943\/revisions"}],"predecessor-version":[{"id":952,"href":"https:\/\/cyberpoliticsconference.org\/index.php\/wp-json\/wp\/v2\/posts\/943\/revisions\/952"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/cyberpoliticsconference.org\/index.php\/wp-json\/wp\/v2\/media\/937"}],"wp:attachment":[{"href":"https:\/\/cyberpoliticsconference.org\/index.php\/wp-json\/wp\/v2\/media?parent=943"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/cyberpoliticsconference.org\/index.php\/wp-json\/wp\/v2\/categories?post=943"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/cyberpoliticsconference.org\/index.php\/wp-json\/wp\/v2\/tags?post=943"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}