<?xml version="1.0"?>
<oembed><version>1.0</version><provider_name>Wydzia&#x142; Prawa, Administracji i Ekonomii</provider_name><provider_url>https://prawo.uwr.edu.pl/en/</provider_url><author_name>mmatlinski</author_name><author_url>https://prawo.uwr.edu.pl/en/author/mmatlinski/</author_url><title>Cybercrimes - Wydzia&#x142; Prawa, Administracji i Ekonomii</title><type>rich</type><width>600</width><height>338</height><html>&lt;blockquote class="wp-embedded-content" data-secret="0coaY41r8f"&gt;&lt;a href="https://prawo.uwr.edu.pl/en/criminal-justice/cybercrimes/"&gt;Cybercrimes&lt;/a&gt;&lt;/blockquote&gt;&lt;iframe sandbox="allow-scripts" security="restricted" src="https://prawo.uwr.edu.pl/en/criminal-justice/cybercrimes/embed/#?secret=0coaY41r8f" width="600" height="338" title="&#x201C;Cybercrimes&#x201D; &#x2014; Wydzia&#x142; Prawa, Administracji i Ekonomii" data-secret="0coaY41r8f" frameborder="0" marginwidth="0" marginheight="0" scrolling="no" class="wp-embedded-content"&gt;&lt;/iframe&gt;&lt;script&gt;
/*! This file is auto-generated */
!function(d,l){"use strict";l.querySelector&amp;&amp;d.addEventListener&amp;&amp;"undefined"!=typeof URL&amp;&amp;(d.wp=d.wp||{},d.wp.receiveEmbedMessage||(d.wp.receiveEmbedMessage=function(e){var t=e.data;if((t||t.secret||t.message||t.value)&amp;&amp;!/[^a-zA-Z0-9]/.test(t.secret)){for(var s,r,n,a=l.querySelectorAll('iframe[data-secret="'+t.secret+'"]'),o=l.querySelectorAll('blockquote[data-secret="'+t.secret+'"]'),c=new RegExp("^https?:$","i"),i=0;i&lt;o.length;i++)o[i].style.display="none";for(i=0;i&lt;a.length;i++)s=a[i],e.source===s.contentWindow&amp;&amp;(s.removeAttribute("style"),"height"===t.message?(1e3&lt;(r=parseInt(t.value,10))?r=1e3:~~r&lt;200&amp;&amp;(r=200),s.height=r):"link"===t.message&amp;&amp;(r=new URL(s.getAttribute("src")),n=new URL(t.value),c.test(n.protocol))&amp;&amp;n.host===r.host&amp;&amp;l.activeElement===s&amp;&amp;(d.top.location.href=t.value))}},d.addEventListener("message",d.wp.receiveEmbedMessage,!1),l.addEventListener("DOMContentLoaded",function(){for(var e,t,s=l.querySelectorAll("iframe.wp-embedded-content"),r=0;r&lt;s.length;r++)(t=(e=s[r]).getAttribute("data-secret"))||(t=Math.random().toString(36).substring(2,12),e.src+="#?secret="+t,e.setAttribute("data-secret",t)),e.contentWindow.postMessage({message:"ready",secret:t},"*")},!1)))}(window,document);
//# sourceURL=https://prawo.uwr.edu.pl/wp-includes/js/wp-embed.min.js
&lt;/script&gt;
</html><thumbnail_url/><thumbnail_width/><thumbnail_height/><description>Program:&#xA0;&#xA0;Criminal Justice Legal aspects of information technology. The role of public databases and information systems in private and public sectors. Types of computer crimes (identity theft, hacking, sniffing, spamming, information destruction, cyberstalking, cracking and phishing).</description></oembed>
