{"id":251,"date":"2016-08-11T07:24:12","date_gmt":"2016-08-11T06:24:12","guid":{"rendered":"https:\/\/cybersecurity.bournemouth.ac.uk\/?p=251"},"modified":"2017-06-10T09:55:07","modified_gmt":"2017-06-10T08:55:07","slug":"introducing-the-cairis-web-app","status":"publish","type":"post","link":"https:\/\/cybersecurity.bournemouth.ac.uk\/?p=251","title":{"rendered":"Introducing the CAIRIS web app"},"content":{"rendered":"<p><a href=\"https:\/\/cybersecurity.bournemouth.ac.uk\/wp-content\/uploads\/2016\/08\/cairis_persona.jpg\"><img loading=\"lazy\" decoding=\"async\" class=\"size-medium wp-image-428 alignright\" src=\"https:\/\/cybersecurity.bournemouth.ac.uk\/wp-content\/uploads\/2016\/08\/cairis_persona-300x212.jpg\" alt=\"\" width=\"300\" height=\"212\" srcset=\"https:\/\/cybersecurity.bournemouth.ac.uk\/wp-content\/uploads\/2016\/08\/cairis_persona-300x212.jpg 300w, https:\/\/cybersecurity.bournemouth.ac.uk\/wp-content\/uploads\/2016\/08\/cairis_persona-768x543.jpg 768w, https:\/\/cybersecurity.bournemouth.ac.uk\/wp-content\/uploads\/2016\/08\/cairis_persona-1024x723.jpg 1024w\" sizes=\"(max-width: 300px) 100vw, 300px\" \/><\/a><\/p>\n<p>BUCSR researchers have just released an alpha version of a web app based on the CAIRIS tool.<\/p>\n<p>You can read more about this release and the on-going evolution of CAIRIS <a href=\"http:\/\/cairis.org\/cairis\/cairisweb\/\">here<\/a>.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>BUCSR researchers have just released an alpha version of a web app based on the CAIRIS tool. You can read more about this release and the on-going evolution of CAIRIS here.<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"inline_featured_image":false,"_exactmetrics_skip_tracking":false,"_exactmetrics_sitenote_active":false,"_exactmetrics_sitenote_note":"","_exactmetrics_sitenote_category":0,"footnotes":""},"categories":[8],"tags":[],"_links":{"self":[{"href":"https:\/\/cybersecurity.bournemouth.ac.uk\/index.php?rest_route=\/wp\/v2\/posts\/251"}],"collection":[{"href":"https:\/\/cybersecurity.bournemouth.ac.uk\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/cybersecurity.bournemouth.ac.uk\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/cybersecurity.bournemouth.ac.uk\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/cybersecurity.bournemouth.ac.uk\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=251"}],"version-history":[{"count":3,"href":"https:\/\/cybersecurity.bournemouth.ac.uk\/index.php?rest_route=\/wp\/v2\/posts\/251\/revisions"}],"predecessor-version":[{"id":429,"href":"https:\/\/cybersecurity.bournemouth.ac.uk\/index.php?rest_route=\/wp\/v2\/posts\/251\/revisions\/429"}],"wp:attachment":[{"href":"https:\/\/cybersecurity.bournemouth.ac.uk\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=251"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/cybersecurity.bournemouth.ac.uk\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=251"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/cybersecurity.bournemouth.ac.uk\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=251"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}