{"id":1819,"date":"2022-08-11T06:34:42","date_gmt":"2022-08-11T06:34:42","guid":{"rendered":"https:\/\/www.crric.org\/idea\/?p=1819"},"modified":"2022-08-11T06:36:29","modified_gmt":"2022-08-11T06:36:29","slug":"cybersecurity-in-the-era-of-disinformation","status":"publish","type":"post","link":"https:\/\/idea.crric.org\/?p=1819","title":{"rendered":"Cybersecurity in the era of disinformation"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-post\" data-elementor-id=\"1819\" class=\"elementor elementor-1819\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-690a7774 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"690a7774\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-7e6aca87\" data-id=\"7e6aca87\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-56504017 elementor-widget elementor-widget-text-editor\" data-id=\"56504017\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><img fetchpriority=\"high\" decoding=\"async\" class=\"alignnone wp-image-1762 size-full\" src=\"https:\/\/www.crric.org\/idea\/wp-content\/uploads\/2022\/07\/Making-Music-Visible-for-Conflict-Resolution1.jpg\" alt=\"\" width=\"940\" height=\"788\" srcset=\"https:\/\/idea.crric.org\/wp-content\/uploads\/2022\/07\/Making-Music-Visible-for-Conflict-Resolution1.jpg 940w, https:\/\/idea.crric.org\/wp-content\/uploads\/2022\/07\/Making-Music-Visible-for-Conflict-Resolution1-300x251.jpg 300w, https:\/\/idea.crric.org\/wp-content\/uploads\/2022\/07\/Making-Music-Visible-for-Conflict-Resolution1-768x644.jpg 768w\" sizes=\"(max-width: 940px) 100vw, 940px\" \/><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"","protected":false},"author":1,"featured_media":1821,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[12,14],"tags":[35],"class_list":["post-1819","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-events","category-past-events","tag-ukraine-disinformation-cybersecurity"],"_links":{"self":[{"href":"https:\/\/idea.crric.org\/index.php?rest_route=\/wp\/v2\/posts\/1819","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/idea.crric.org\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/idea.crric.org\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/idea.crric.org\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/idea.crric.org\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=1819"}],"version-history":[{"count":2,"href":"https:\/\/idea.crric.org\/index.php?rest_route=\/wp\/v2\/posts\/1819\/revisions"}],"predecessor-version":[{"id":1822,"href":"https:\/\/idea.crric.org\/index.php?rest_route=\/wp\/v2\/posts\/1819\/revisions\/1822"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/idea.crric.org\/index.php?rest_route=\/wp\/v2\/media\/1821"}],"wp:attachment":[{"href":"https:\/\/idea.crric.org\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=1819"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/idea.crric.org\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=1819"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/idea.crric.org\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=1819"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}