{"id":49,"date":"2022-11-13T12:57:19","date_gmt":"2022-11-13T17:57:19","guid":{"rendered":"https:\/\/blogs.shu.edu\/policy-government-security\/?page_id=49"},"modified":"2022-11-17T13:57:49","modified_gmt":"2022-11-17T18:57:49","slug":"welcome-to-policy-government-security","status":"publish","type":"page","link":"https:\/\/blogs.shu.edu\/policy-government-security\/","title":{"rendered":"Welcome to Policy, Government &amp; Security"},"content":{"rendered":"<p><img decoding=\"async\" class=\"aligncenter\" src=\"https:\/\/upload.wikimedia.org\/wikipedia\/commons\/4\/4f\/US_Capitol_west_side.JPG\" alt=\"United States Capitol - Wikipedia\" \/><\/p>\n<p style=\"text-align: center\">Hello Everyone. This is the home page for our project on the disruptions of Policy, Government &amp; Security. Above you will see the different aspects of our research on this topic!<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Hello Everyone. This is the home page for our project on the disruptions of Policy, Government &amp; Security. Above you will see the different aspects&#8230;<\/p>\n<div class=\"more-link-wrapper\"><a class=\"more-link\" href=\"https:\/\/blogs.shu.edu\/policy-government-security\/\">Continue Reading<span class=\"screen-reader-text\">Welcome to Policy, Government &amp; Security<\/span><\/a><\/div>\n","protected":false},"author":5455,"featured_media":0,"parent":0,"menu_order":-1,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_monsterinsights_skip_tracking":false,"_monsterinsights_sitenote_active":false,"_monsterinsights_sitenote_note":"","_monsterinsights_sitenote_category":0,"footnotes":""},"categories":[],"tags":[],"class_list":["post-49","page","type-page","status-publish","hentry","entry"],"_links":{"self":[{"href":"https:\/\/blogs.shu.edu\/policy-government-security\/wp-json\/wp\/v2\/pages\/49","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/blogs.shu.edu\/policy-government-security\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/blogs.shu.edu\/policy-government-security\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/blogs.shu.edu\/policy-government-security\/wp-json\/wp\/v2\/users\/5455"}],"replies":[{"embeddable":true,"href":"https:\/\/blogs.shu.edu\/policy-government-security\/wp-json\/wp\/v2\/comments?post=49"}],"version-history":[{"count":9,"href":"https:\/\/blogs.shu.edu\/policy-government-security\/wp-json\/wp\/v2\/pages\/49\/revisions"}],"predecessor-version":[{"id":199,"href":"https:\/\/blogs.shu.edu\/policy-government-security\/wp-json\/wp\/v2\/pages\/49\/revisions\/199"}],"wp:attachment":[{"href":"https:\/\/blogs.shu.edu\/policy-government-security\/wp-json\/wp\/v2\/media?parent=49"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/blogs.shu.edu\/policy-government-security\/wp-json\/wp\/v2\/categories?post=49"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/blogs.shu.edu\/policy-government-security\/wp-json\/wp\/v2\/tags?post=49"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}