{"id":308,"name":"Arif Ahmed","url":"","description":"","link":"https:\/\/blog.bham.ac.uk\/itsecurity\/author\/ahmedax\/","slug":"ahmedax","avatar_urls":{"24":"https:\/\/secure.gravatar.com\/avatar\/4cf3870c23f6f114e3b4411f1d55bacd06085a505ed218bdc9bdc3f8100502af?s=24&d=mm&r=g","48":"https:\/\/secure.gravatar.com\/avatar\/4cf3870c23f6f114e3b4411f1d55bacd06085a505ed218bdc9bdc3f8100502af?s=48&d=mm&r=g","96":"https:\/\/secure.gravatar.com\/avatar\/4cf3870c23f6f114e3b4411f1d55bacd06085a505ed218bdc9bdc3f8100502af?s=96&d=mm&r=g"},"meta":[],"_links":{"self":[{"href":"https:\/\/blog.bham.ac.uk\/itsecurity\/wp-json\/wp\/v2\/users\/308","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/blog.bham.ac.uk\/itsecurity\/wp-json\/wp\/v2\/users"}]}}