{"id":18,"date":"2015-11-19T09:47:39","date_gmt":"2015-11-19T09:47:39","guid":{"rendered":"https:\/\/cybersecurity.bournemouth.ac.uk\/?page_id=18"},"modified":"2018-03-28T11:49:25","modified_gmt":"2018-03-28T10:49:25","slug":"people-2","status":"publish","type":"page","link":"https:\/\/cybersecurity.bournemouth.ac.uk\/?page_id=18","title":{"rendered":"People"},"content":{"rendered":"<h2>Faculty<\/h2>\n<div class=\"tmm tmm_faculty\"><div class=\"tmm_3_columns tmm_wrap tmm_theme_f\"><span class=\"tmm_two_containers_tablet\"><\/span><div class=\"tmm_container\"><div class=\"tmm_member\" style=\"border-top:#333333 solid 5px;\"><div class=\"tmm_photo tmm_pic_faculty_0\" style=\"background: url(https:\/\/cybersecurity.bournemouth.ac.uk\/wp-content\/uploads\/2017\/06\/vasilis.jpg); margin-left: auto; margin-right:auto; background-size:cover !important;\"><\/div><div class=\"tmm_textblock\"><div class=\"tmm_names\"><span class=\"tmm_fname\">Vasilis<\/span> <span class=\"tmm_lname\">Katos<\/span><\/div><div class=\"tmm_job\">Professor of Cybersecurity<\/div><div class=\"tmm_scblock\"><a target=\"_blank\" class=\"tmm_sociallink\" href=\"http:\/\/staffprofiles.bournemouth.ac.uk\/display\/vkatos\" title=\"\"><img decoding=\"async\" alt=\"\" src=\"https:\/\/cybersecurity.bournemouth.ac.uk\/wp-content\/plugins\/team-members\/inc\/img\/links\/website.png\"\/><\/a><\/div><\/div><\/div><div class=\"tmm_member\" style=\"border-top:#333333 solid 5px;\"><div class=\"tmm_photo tmm_pic_faculty_1\" style=\"background: url(https:\/\/cybersecurity.bournemouth.ac.uk\/wp-content\/uploads\/2017\/06\/edward.jpg); margin-left: auto; margin-right:auto; background-size:cover !important;\"><\/div><div class=\"tmm_textblock\"><div class=\"tmm_names\"><span class=\"tmm_fname\">Ed<\/span> <span class=\"tmm_lname\">Apeh<\/span><\/div><div class=\"tmm_job\">Principal Academic in Computing<\/div><div class=\"tmm_scblock\"><a target=\"_blank\" class=\"tmm_sociallink\" href=\"http:\/\/staffprofiles.bournemouth.ac.uk\/display\/eapeh\" title=\"\"><img decoding=\"async\" alt=\"\" src=\"https:\/\/cybersecurity.bournemouth.ac.uk\/wp-content\/plugins\/team-members\/inc\/img\/links\/website.png\"\/><\/a><\/div><\/div><\/div><span class=\"tmm_two_containers_tablet\"><\/span><div class=\"tmm_member\" style=\"border-top:#333333 solid 5px;\"><div class=\"tmm_photo tmm_pic_faculty_2\" style=\"background: url(https:\/\/cybersecurity.bournemouth.ac.uk\/wp-content\/uploads\/2017\/06\/24ef3c22-6f36-4787-b964-e84c0e184abc.jpeg); margin-left: auto; margin-right:auto; background-size:cover !important;\"><\/div><div class=\"tmm_textblock\"><div class=\"tmm_names\"><span class=\"tmm_fname\">Abir<\/span> <span class=\"tmm_lname\">Awad<\/span><\/div><div class=\"tmm_job\">Principal Academic in Cybersecurity<\/div><div class=\"tmm_scblock\"><a target=\"_blank\" class=\"tmm_sociallink\" href=\"https:\/\/staffprofiles.bournemouth.ac.uk\/display\/aawad\" title=\"\"><img decoding=\"async\" alt=\"\" src=\"https:\/\/cybersecurity.bournemouth.ac.uk\/wp-content\/plugins\/team-members\/inc\/img\/links\/website.png\"\/><\/a><\/div><\/div><\/div><\/div><span class=\"tmm_columns_containers_desktop\"><\/span><div class=\"tmm_container\"><div class=\"tmm_member\" style=\"border-top:#333333 solid 5px;\"><div class=\"tmm_photo tmm_pic_faculty_3\" style=\"background: url(https:\/\/cybersecurity.bournemouth.ac.uk\/wp-content\/uploads\/2017\/06\/photo.jpeg.png); margin-left: auto; margin-right:auto; background-size:cover !important;\"><\/div><div class=\"tmm_textblock\"><div class=\"tmm_names\"><span class=\"tmm_fname\">Jane<\/span> <span class=\"tmm_lname\">Henriksen-Bulmer<\/span><\/div><div class=\"tmm_job\">Principal Academic in Computer Science<\/div><div class=\"tmm_scblock\"><a target=\"_blank\" class=\"tmm_sociallink\" href=\"https:\/\/staffprofiles.bournemouth.ac.uk\/display\/jhenriksenbulmer\" title=\"\"><img decoding=\"async\" alt=\"\" src=\"https:\/\/cybersecurity.bournemouth.ac.uk\/wp-content\/plugins\/team-members\/inc\/img\/links\/website.png\"\/><\/a><\/div><\/div><\/div><span class=\"tmm_two_containers_tablet\"><\/span><div class=\"tmm_member\" style=\"border-top:#333333 solid 5px;\"><div class=\"tmm_photo tmm_pic_faculty_4\" style=\"background: url(https:\/\/cybersecurity.bournemouth.ac.uk\/wp-content\/uploads\/2017\/06\/photo-4.jpeg); margin-left: auto; margin-right:auto; background-size:cover !important;\"><\/div><div class=\"tmm_textblock\"><div class=\"tmm_names\"><span class=\"tmm_fname\">Duncan<\/span> <span class=\"tmm_lname\">Ki-Aries<\/span><\/div><div class=\"tmm_job\">Lecturer in Cybersecurity<\/div><div class=\"tmm_scblock\"><a target=\"_blank\" class=\"tmm_sociallink\" href=\"https:\/\/staffprofiles.bournemouth.ac.uk\/display\/dkiaries\" title=\"\"><img decoding=\"async\" alt=\"\" src=\"https:\/\/cybersecurity.bournemouth.ac.uk\/wp-content\/plugins\/team-members\/inc\/img\/links\/website.png\"\/><\/a><\/div><\/div><\/div><div class=\"tmm_member\" style=\"border-top:#333333 solid 5px;\"><div class=\"tmm_photo tmm_pic_faculty_5\" style=\"background: url(https:\/\/cybersecurity.bournemouth.ac.uk\/wp-content\/uploads\/2017\/06\/new.jpg); margin-left: auto; margin-right:auto; background-size:cover !important;\"><\/div><div class=\"tmm_textblock\"><div class=\"tmm_names\"><span class=\"tmm_fname\">Andrew<\/span> <span class=\"tmm_lname\">M&#039;manga<\/span><\/div><div class=\"tmm_job\">Senior Lecturer in Cybersecurity<\/div><div class=\"tmm_scblock\"><a target=\"_blank\" class=\"tmm_sociallink\" href=\"https:\/\/staffprofiles.bournemouth.ac.uk\/display\/ammanga\" title=\"\"><img decoding=\"async\" alt=\"\" src=\"https:\/\/cybersecurity.bournemouth.ac.uk\/wp-content\/plugins\/team-members\/inc\/img\/links\/website.png\"\/><\/a><\/div><\/div><\/div><span class=\"tmm_two_containers_tablet\"><\/span><\/div><span class=\"tmm_columns_containers_desktop\"><\/span><div class=\"tmm_container\"><div class=\"tmm_member\" style=\"border-top:#333333 solid 5px;\"><div class=\"tmm_photo tmm_pic_faculty_6\" style=\"background: url(https:\/\/cybersecurity.bournemouth.ac.uk\/wp-content\/uploads\/2017\/06\/photo-15.jpeg); margin-left: auto; margin-right:auto; background-size:cover !important;\"><\/div><div class=\"tmm_textblock\"><div class=\"tmm_names\"><span class=\"tmm_fname\">Muntadher<\/span> <span class=\"tmm_lname\">Sallal<\/span><\/div><div class=\"tmm_job\">Senior Lecturer in Cybersecurity<\/div><div class=\"tmm_scblock\"><a target=\"_blank\" class=\"tmm_sociallink\" href=\"https:\/\/staffprofiles.bournemouth.ac.uk\/display\/msallal\" title=\"\"><img decoding=\"async\" alt=\"\" src=\"https:\/\/cybersecurity.bournemouth.ac.uk\/wp-content\/plugins\/team-members\/inc\/img\/links\/website.png\"\/><\/a><\/div><\/div><\/div><div class=\"tmm_member\" style=\"border-top:#333333 solid 5px;\"><div class=\"tmm_photo tmm_pic_faculty_7\" style=\"background: url(https:\/\/cybersecurity.bournemouth.ac.uk\/wp-content\/uploads\/2017\/06\/faculty-headshot-scaled.jpeg); margin-left: auto; margin-right:auto; background-size:cover !important;\"><\/div><div class=\"tmm_textblock\"><div class=\"tmm_names\"><span class=\"tmm_fname\">Andy<\/span> <span class=\"tmm_lname\">Phippen<\/span><\/div><div class=\"tmm_job\">Professor of IT Ethics and Digital Rights<\/div><div class=\"tmm_scblock\"><a target=\"_blank\" class=\"tmm_sociallink\" href=\"https:\/\/staffprofiles.bournemouth.ac.uk\/display\/aphippen1\" title=\"\"><img decoding=\"async\" alt=\"\" src=\"https:\/\/cybersecurity.bournemouth.ac.uk\/wp-content\/plugins\/team-members\/inc\/img\/links\/website.png\"\/><\/a><\/div><\/div><\/div><span class=\"tmm_two_containers_tablet\"><\/span><div class=\"tmm_member\" style=\"border-top:#333333 solid 5px;\"><div class=\"tmm_photo tmm_pic_faculty_8\" style=\"background: url(https:\/\/cybersecurity.bournemouth.ac.uk\/wp-content\/uploads\/2017\/06\/26283840.jpeg); margin-left: auto; margin-right:auto; background-size:cover !important;\"><\/div><div class=\"tmm_textblock\"><div class=\"tmm_names\"><span class=\"tmm_fname\">Fudong<\/span> <span class=\"tmm_lname\">Li<\/span><\/div><div class=\"tmm_job\">Principal Lecturer In Cybersecurity<\/div><div class=\"tmm_scblock\"><a target=\"_blank\" class=\"tmm_sociallink\" href=\"https:\/\/staffprofiles.bournemouth.ac.uk\/display\/fli\" title=\"\"><img decoding=\"async\" alt=\"\" src=\"https:\/\/cybersecurity.bournemouth.ac.uk\/wp-content\/plugins\/team-members\/inc\/img\/links\/website.png\"\/><\/a><\/div><\/div><\/div><\/div><span class=\"tmm_columns_containers_desktop\"><\/span><div class=\"tmm_container\"><div class=\"tmm_member\" style=\"border-top:#333333 solid 5px;\"><div class=\"tmm_photo tmm_pic_faculty_9\" style=\"background: url(https:\/\/cybersecurity.bournemouth.ac.uk\/wp-content\/uploads\/2017\/06\/cyucel2.jpg); margin-left: auto; margin-right:auto; background-size:cover !important;\"><\/div><div class=\"tmm_textblock\"><div class=\"tmm_names\"><span class=\"tmm_fname\">Cagatay<\/span> <span class=\"tmm_lname\">Yucel<\/span><\/div><div class=\"tmm_job\">Lecturer in Computer Science<\/div><div class=\"tmm_scblock\"><a target=\"_blank\" class=\"tmm_sociallink\" href=\"https:\/\/staffprofiles.bournemouth.ac.uk\/display\/cyucel\" title=\"\"><img decoding=\"async\" alt=\"\" src=\"https:\/\/cybersecurity.bournemouth.ac.uk\/wp-content\/plugins\/team-members\/inc\/img\/links\/website.png\"\/><\/a><\/div><\/div><\/div><span class=\"tmm_two_containers_tablet\"><\/span><div class=\"tmm_member\" style=\"border-top:#333333 solid 5px;\"><div class=\"tmm_photo tmm_pic_faculty_10\" style=\"background: url(https:\/\/cybersecurity.bournemouth.ac.uk\/wp-content\/uploads\/2017\/06\/Nan-Jiang.png); margin-left: auto; margin-right:auto; background-size:cover !important;\"><\/div><div class=\"tmm_textblock\"><div class=\"tmm_names\"><span class=\"tmm_fname\">Nan<\/span> <span class=\"tmm_lname\">Jiang<\/span><\/div><div class=\"tmm_job\">Professor in Human Computer Interaction<\/div><div class=\"tmm_scblock\"><a target=\"_blank\" class=\"tmm_sociallink\" href=\"http:\/\/staffprofiles.bournemouth.ac.uk\/display\/njiang\" title=\"\"><img decoding=\"async\" alt=\"\" src=\"https:\/\/cybersecurity.bournemouth.ac.uk\/wp-content\/plugins\/team-members\/inc\/img\/links\/website.png\"\/><\/a><\/div><\/div><\/div><div class=\"tmm_member\" style=\"border-top:#333333 solid 5px;\"><div class=\"tmm_photo tmm_pic_faculty_11\" style=\"background: url(https:\/\/cybersecurity.bournemouth.ac.uk\/wp-content\/uploads\/2017\/06\/photo-13.jpeg); margin-left: auto; margin-right:auto; background-size:cover !important;\"><\/div><div class=\"tmm_textblock\"><div class=\"tmm_names\"><span class=\"tmm_fname\">Huseyin<\/span> <span class=\"tmm_lname\">Dogan<\/span><\/div><div class=\"tmm_job\">Professor In Human Computer Interaction<\/div><div class=\"tmm_scblock\"><a target=\"_blank\" class=\"tmm_sociallink\" href=\"\" title=\"https:\/\/staffprofiles.bournemouth.ac.uk\/display\/hdogan\"><img decoding=\"async\" alt=\"https:\/\/staffprofiles.bournemouth.ac.uk\/display\/hdogan\" src=\"https:\/\/cybersecurity.bournemouth.ac.uk\/wp-content\/plugins\/team-members\/inc\/img\/links\/website.png\"\/><\/a><\/div><\/div><\/div><span class=\"tmm_two_containers_tablet\"><\/span><\/div><span class=\"tmm_columns_containers_desktop\"><\/span><div class=\"tmm_container\"><div class=\"tmm_member\" style=\"border-top:#333333 solid 5px;\"><div class=\"tmm_photo tmm_pic_faculty_12\" style=\"background: url(https:\/\/cybersecurity.bournemouth.ac.uk\/wp-content\/uploads\/2017\/06\/tim.jpg); margin-left: auto; margin-right:auto; background-size:cover !important;\"><\/div><div class=\"tmm_textblock\"><div class=\"tmm_names\"><span class=\"tmm_fname\">Tim<\/span> <span class=\"tmm_lname\">Orman<\/span><\/div><div class=\"tmm_job\">Senior Academic in Creative Technology<\/div><div class=\"tmm_scblock\"><a target=\"_blank\" class=\"tmm_sociallink\" href=\"http:\/\/staffprofiles.bournemouth.ac.uk\/display\/torman\" title=\"\"><img decoding=\"async\" alt=\"\" src=\"https:\/\/cybersecurity.bournemouth.ac.uk\/wp-content\/plugins\/team-members\/inc\/img\/links\/website.png\"\/><\/a><\/div><\/div><\/div><div class=\"tmm_member\" style=\"border-top:#333333 solid 5px;\"><div class=\"tmm_photo tmm_pic_faculty_13\" style=\"background: url(https:\/\/cybersecurity.bournemouth.ac.uk\/wp-content\/uploads\/2017\/06\/yxu_photo.jpg); margin-left: auto; margin-right:auto; background-size:cover !important;\"><\/div><div class=\"tmm_textblock\"><div class=\"tmm_names\"><span class=\"tmm_fname\">Yuanchen<\/span> <span class=\"tmm_lname\">Xu<\/span><\/div><div class=\"tmm_job\">Lecturer in Computer Science<\/div><div class=\"tmm_scblock\"><a target=\"_blank\" class=\"tmm_sociallink\" href=\"https:\/\/staffprofiles.bournemouth.ac.uk\/display\/yxu1#publications\" title=\"\"><img decoding=\"async\" alt=\"\" src=\"https:\/\/cybersecurity.bournemouth.ac.uk\/wp-content\/plugins\/team-members\/inc\/img\/links\/website.png\"\/><\/a><\/div><\/div><\/div><span class=\"tmm_two_containers_tablet\"><\/span><div class=\"tmm_member\" style=\"border-top:#333333 solid 5px;\"><div class=\"tmm_photo tmm_pic_faculty_14\" style=\"background: url(https:\/\/cybersecurity.bournemouth.ac.uk\/wp-content\/uploads\/2017\/06\/Professor-John-McAlaney.png); margin-left: auto; margin-right:auto; background-size:cover !important;\"><\/div><div class=\"tmm_textblock\"><div class=\"tmm_names\"><span class=\"tmm_fname\">John<\/span> <span class=\"tmm_lname\">McAlaney<\/span><\/div><div class=\"tmm_job\">Professor in Psychology<\/div><div class=\"tmm_scblock\"><a target=\"_blank\" class=\"tmm_sociallink\" href=\"http:\/\/staffprofiles.bournemouth.ac.uk\/display\/jmcalaney\" title=\"\"><img decoding=\"async\" alt=\"\" src=\"https:\/\/cybersecurity.bournemouth.ac.uk\/wp-content\/plugins\/team-members\/inc\/img\/links\/website.png\"\/><\/a><\/div><\/div><\/div><div style=\"clear:both;\"><\/div><\/div><\/div><\/div>\n<p>&nbsp;<\/p>\n<h2>Students<\/h2>\n<div class=\"tmm tmm_students\"><div class=\"tmm_3_columns tmm_wrap tmm_theme_f\"><span class=\"tmm_two_containers_tablet\"><\/span><div class=\"tmm_container\"><div class=\"tmm_member\" style=\"border-top:#333333 solid 5px;\"><div class=\"tmm_photo tmm_pic_students_0\" style=\"background: url(https:\/\/cybersecurity.bournemouth.ac.uk\/wp-content\/uploads\/2017\/06\/Judo.jpg); margin-left: auto; margin-right:auto; background-size:cover !important;\"><\/div><div class=\"tmm_textblock\"><div class=\"tmm_names\"><span class=\"tmm_fname\">Joseph<\/span> <span class=\"tmm_lname\">Udo<\/span><\/div><div class=\"tmm_job\">PhD Student<\/div><div class=\"tmm_scblock\"><a target=\"_blank\" class=\"tmm_sociallink\" href=\"https:\/\/staffprofiles.bournemouth.ac.uk\/display\/judo\" title=\"\"><img decoding=\"async\" alt=\"\" src=\"https:\/\/cybersecurity.bournemouth.ac.uk\/wp-content\/plugins\/team-members\/inc\/img\/links\/website.png\"\/><\/a><\/div><\/div><\/div><div class=\"tmm_member\" style=\"border-top:#333333 solid 5px;\"><div class=\"tmm_photo tmm_pic_students_1\" style=\"background: url(https:\/\/cybersecurity.bournemouth.ac.uk\/wp-content\/uploads\/2017\/06\/Photo-of-me-for-BUCSR.jpg); margin-left: auto; margin-right:auto; background-size:cover !important;\"><\/div><div class=\"tmm_textblock\"><div class=\"tmm_names\"><span class=\"tmm_fname\">Jasmine <\/span> <span class=\"tmm_lname\">McCain<\/span><\/div><div class=\"tmm_job\">PhD Student<\/div><div class=\"tmm_scblock\"><\/div><\/div><\/div><span class=\"tmm_two_containers_tablet\"><\/span><div class=\"tmm_member\" style=\"border-top:#333333 solid 5px;\"><div class=\"tmm_photo tmm_pic_students_2\" style=\"background: url(https:\/\/cybersecurity.bournemouth.ac.uk\/wp-content\/uploads\/2017\/06\/Nigel1.jpg); margin-left: auto; margin-right:auto; background-size:cover !important;\"><\/div><div class=\"tmm_textblock\"><div class=\"tmm_names\"><span class=\"tmm_fname\">Nigel<\/span> <span class=\"tmm_lname\">Davies<\/span><\/div><div class=\"tmm_job\">PhD Student<\/div><div class=\"tmm_scblock\"><\/div><\/div><\/div><\/div><span class=\"tmm_columns_containers_desktop\"><\/span><div class=\"tmm_container\"><div class=\"tmm_member\" style=\"border-top:#333333 solid 5px;\"><div class=\"tmm_photo tmm_pic_students_3\" style=\"background: url(https:\/\/cybersecurity.bournemouth.ac.uk\/wp-content\/uploads\/2017\/06\/Serdar.jpg); margin-left: auto; margin-right:auto; background-size:cover !important;\"><\/div><div class=\"tmm_textblock\"><div class=\"tmm_names\"><span class=\"tmm_fname\">Serdar<\/span> <span class=\"tmm_lname\">Akar<\/span><\/div><div class=\"tmm_job\">PhD Student<\/div><div class=\"tmm_scblock\"><\/div><\/div><\/div><span class=\"tmm_two_containers_tablet\"><\/span><div class=\"tmm_member\" style=\"border-top:#333333 solid 5px;\"><div class=\"tmm_photo tmm_pic_students_4\" style=\"background: url(https:\/\/cybersecurity.bournemouth.ac.uk\/wp-content\/uploads\/2017\/06\/N.E.IONESCU.png); margin-left: auto; margin-right:auto; background-size:cover !important;\"><\/div><div class=\"tmm_textblock\"><div class=\"tmm_names\"><span class=\"tmm_fname\">Nicolae Eduard <\/span> <span class=\"tmm_lname\">Ionescu<\/span><\/div><div class=\"tmm_job\">MRes Student<\/div><div class=\"tmm_scblock\"><\/div><\/div><\/div><div style=\"clear:both;\"><\/div><\/div><\/div><\/div>\n<h2>Visitors<\/h2>\n<div class=\"tmm tmm_visitors\"><div class=\"tmm_3_columns tmm_wrap tmm_plugin_f\"><span class=\"tmm_two_containers_tablet\"><\/span><div class=\"tmm_container\"><div class=\"tmm_member\" style=\"border-top:#333333 solid 5px;\"><div class=\"tmm_photo tmm_pic_visitors_0\" style=\"background: url(https:\/\/cybersecurity.bournemouth.ac.uk\/wp-content\/uploads\/2017\/06\/IMG_0392.jpg); margin-left: auto; margin-right:auto; background-size:cover !important;\"><\/div><div class=\"tmm_textblock\"><div class=\"tmm_names\"><span class=\"tmm_fname\">Shamal<\/span> <span class=\"tmm_lname\">Faily<\/span><\/div><div class=\"tmm_job\">Defence Science and Technology Laboratory (Dstl)<\/div><div class=\"tmm_scblock\"><\/div><\/div><\/div><div class=\"tmm_member\" style=\"border-top:#333333 solid 5px;\"><div class=\"tmm_photo tmm_pic_visitors_1\" style=\"background: url(https:\/\/cybersecurity.bournemouth.ac.uk\/wp-content\/uploads\/2017\/06\/chris_w.jpg); margin-left: auto; margin-right:auto; background-size:cover !important;\"><\/div><div class=\"tmm_textblock\"><div class=\"tmm_names\"><span class=\"tmm_fname\">Chris<\/span> <span class=\"tmm_lname\">Williams<\/span><\/div><div class=\"tmm_job\">Roke<\/div><div class=\"tmm_scblock\"><\/div><\/div><\/div><span class=\"tmm_two_containers_tablet\"><\/span><div class=\"tmm_member\" style=\"border-top:#333333 solid 5px;\"><div class=\"tmm_photo tmm_pic_visitors_2\" style=\"background: url(https:\/\/cybersecurity.bournemouth.ac.uk\/wp-content\/uploads\/2017\/06\/uma.jpg); margin-left: auto; margin-right:auto; background-size:cover !important;\"><\/div><div class=\"tmm_textblock\"><div class=\"tmm_names\"><span class=\"tmm_fname\">Uma<\/span> <span class=\"tmm_lname\">Patel<\/span><\/div><div class=\"tmm_job\">Visiting Fellow<\/div><div class=\"tmm_scblock\"><\/div><\/div><\/div><\/div><span class=\"tmm_columns_containers_desktop\"><\/span><div class=\"tmm_container\"><div class=\"tmm_member\" style=\"border-top:#333333 solid 5px;\"><div class=\"tmm_photo tmm_pic_visitors_3\" style=\"background: url(https:\/\/cybersecurity.bournemouth.ac.uk\/wp-content\/uploads\/2017\/06\/Eylem-Profile.jpeg); margin-left: auto; margin-right:auto; background-size:cover !important;\"><\/div><div class=\"tmm_textblock\"><div class=\"tmm_names\"><span class=\"tmm_fname\">Eylem<\/span> <span class=\"tmm_lname\">Thron<\/span><\/div><div class=\"tmm_job\">Mima<\/div><div class=\"tmm_scblock\"><\/div><\/div><\/div><div style=\"clear:both;\"><\/div><\/div><\/div><\/div>\n<p>&nbsp;<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Faculty &nbsp; Students Visitors &nbsp;<\/p>\n","protected":false},"author":1,"featured_media":0,"parent":431,"menu_order":2,"comment_status":"closed","ping_status":"closed","template":"full-width-page.php","meta":{"inline_featured_image":false,"_exactmetrics_skip_tracking":false,"_exactmetrics_sitenote_active":false,"_exactmetrics_sitenote_note":"","_exactmetrics_sitenote_category":0,"footnotes":""},"_links":{"self":[{"href":"https:\/\/cybersecurity.bournemouth.ac.uk\/index.php?rest_route=\/wp\/v2\/pages\/18"}],"collection":[{"href":"https:\/\/cybersecurity.bournemouth.ac.uk\/index.php?rest_route=\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/cybersecurity.bournemouth.ac.uk\/index.php?rest_route=\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/cybersecurity.bournemouth.ac.uk\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/cybersecurity.bournemouth.ac.uk\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=18"}],"version-history":[{"count":56,"href":"https:\/\/cybersecurity.bournemouth.ac.uk\/index.php?rest_route=\/wp\/v2\/pages\/18\/revisions"}],"predecessor-version":[{"id":818,"href":"https:\/\/cybersecurity.bournemouth.ac.uk\/index.php?rest_route=\/wp\/v2\/pages\/18\/revisions\/818"}],"up":[{"embeddable":true,"href":"https:\/\/cybersecurity.bournemouth.ac.uk\/index.php?rest_route=\/wp\/v2\/pages\/431"}],"wp:attachment":[{"href":"https:\/\/cybersecurity.bournemouth.ac.uk\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=18"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}