{"version":"1.0","provider_name":"Wydzia\u0142 Prawa, Administracji i Ekonomii","provider_url":"https:\/\/prawo.uwr.edu.pl\/en\/","author_name":"mmatlinski","author_url":"https:\/\/prawo.uwr.edu.pl\/en\/author\/mmatlinski\/","title":"Cybercrimes - Wydzia\u0142 Prawa, Administracji i Ekonomii","type":"rich","width":600,"height":338,"html":"<blockquote class=\"wp-embedded-content\" data-secret=\"gd6cAOqBXn\"><a href=\"https:\/\/prawo.uwr.edu.pl\/en\/criminal-justice\/cybercrimes\/\">Cybercrimes<\/a><\/blockquote><iframe sandbox=\"allow-scripts\" security=\"restricted\" src=\"https:\/\/prawo.uwr.edu.pl\/en\/criminal-justice\/cybercrimes\/embed\/#?secret=gd6cAOqBXn\" width=\"600\" height=\"338\" title=\"&#8220;Cybercrimes&#8221; &#8212; Wydzia\u0142 Prawa, Administracji i Ekonomii\" data-secret=\"gd6cAOqBXn\" frameborder=\"0\" marginwidth=\"0\" marginheight=\"0\" scrolling=\"no\" class=\"wp-embedded-content\"><\/iframe><script>\n\/*! This file is auto-generated *\/\n!function(d,l){\"use strict\";l.querySelector&&d.addEventListener&&\"undefined\"!=typeof URL&&(d.wp=d.wp||{},d.wp.receiveEmbedMessage||(d.wp.receiveEmbedMessage=function(e){var t=e.data;if((t||t.secret||t.message||t.value)&&!\/[^a-zA-Z0-9]\/.test(t.secret)){for(var s,r,n,a=l.querySelectorAll('iframe[data-secret=\"'+t.secret+'\"]'),o=l.querySelectorAll('blockquote[data-secret=\"'+t.secret+'\"]'),c=new RegExp(\"^https?:$\",\"i\"),i=0;i<o.length;i++)o[i].style.display=\"none\";for(i=0;i<a.length;i++)s=a[i],e.source===s.contentWindow&&(s.removeAttribute(\"style\"),\"height\"===t.message?(1e3<(r=parseInt(t.value,10))?r=1e3:~~r<200&&(r=200),s.height=r):\"link\"===t.message&&(r=new URL(s.getAttribute(\"src\")),n=new URL(t.value),c.test(n.protocol))&&n.host===r.host&&l.activeElement===s&&(d.top.location.href=t.value))}},d.addEventListener(\"message\",d.wp.receiveEmbedMessage,!1),l.addEventListener(\"DOMContentLoaded\",function(){for(var e,t,s=l.querySelectorAll(\"iframe.wp-embedded-content\"),r=0;r<s.length;r++)(t=(e=s[r]).getAttribute(\"data-secret\"))||(t=Math.random().toString(36).substring(2,12),e.src+=\"#?secret=\"+t,e.setAttribute(\"data-secret\",t)),e.contentWindow.postMessage({message:\"ready\",secret:t},\"*\")},!1)))}(window,document);\n\/\/# sourceURL=https:\/\/prawo.uwr.edu.pl\/wp-includes\/js\/wp-embed.min.js\n<\/script>\n","thumbnail_url":null,"thumbnail_width":null,"thumbnail_height":null,"description":"Program:\u00a0\u00a0Criminal Justice Legal aspects of information technology. The role of public databases and information systems in private and public sectors. Types of computer crimes (identity theft, hacking, sniffing, spamming, information destruction, cyberstalking, cracking and phishing)."}