{"id":4892,"date":"2021-09-10T13:21:39","date_gmt":"2021-09-10T05:21:39","guid":{"rendered":"http:\/\/www.cila.org.tw\/?p=4892"},"modified":"2021-09-16T18:22:30","modified_gmt":"2021-09-16T10:22:30","slug":"2021-educause-horizon-report-information-security-edition","status":"publish","type":"post","link":"http:\/\/www.cila.org.tw\/?p=4892","title":{"rendered":"2021 EDUCAUSE Horizon Report\u00ae | Information Security Edition"},"content":{"rendered":"\n<p> 2021 EDUCAUSE Horizon Report \u96c6\u7d50\u4f86\u81ea\u9ad8\u7b49\u6559\u80b2\u9818\u57df\u7684\u5c08\u5bb6\u5b78\u8005\u89c0\u9ede\u8207\u5176\u5c08\u696d\u77e5\u8b58\uff0cInformation Security Edition \u5831\u544a\u6982\u8ff0\u8cc7\u8a0a\u5b89\u5168\u672a\u4f86\u7684\u91cd\u8981\u8da8\u52e2\u3001\u95dc\u9375\u6280\u8853\u548c\u5be6\u8e10\uff0c\u4e26\u9810\u8a2d\u8a31\u591a\u60c5\u5883\u548c\u5c0d\u672a\u4f86\u7684\u5f71\u97ff\u3002 <\/p>\n\n\n\n<p>\u66f4\u591a\u8cc7\u8a0a\uff1a<a href=\"https:\/\/library.educause.edu\/resources\/2021\/2\/2021-educause-horizon-report-information-security-edition\">https:\/\/library.educause.edu\/resources\/2021\/2\/2021-educause-horizon-report-information-security-edition<\/a><\/p>\n\n\n\n<p> \u95b1\u8b80\u5b8c\u6574\u5831\u544a\uff1a <a href=\"https:\/\/library.educause.edu\/-\/media\/files\/library\/2021\/2\/2021_horizon_report_infosec.pdf?la=en&amp;hash=6F5254070245E2F4234C3FDE6AA1AA00ED7960FB\">PDF<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>2021 EDUCAUSE Horizon Report\u00ae<br \/>\nInformation Security Edition<br \/>\n\u66f4\u591a\u8cc7\u8a0a\uff1a<a href=\"https:\/\/library.educause.edu\/resources\/2021\/2\/2021-educause-horizon-report-information-security-edition\">https:\/\/reurl.cc\/zWbDRp<\/a><\/p>\n","protected":false},"author":1,"featured_media":4895,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"ngg_post_thumbnail":0,"footnotes":""},"categories":[8,5,87],"tags":[256,258],"class_list":["post-4892","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-8","category-5","category-87","tag-2021-educause-horizon","tag-information-security"],"_links":{"self":[{"href":"http:\/\/www.cila.org.tw\/index.php?rest_route=\/wp\/v2\/posts\/4892","targetHints":{"allow":["GET"]}}],"collection":[{"href":"http:\/\/www.cila.org.tw\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"http:\/\/www.cila.org.tw\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"http:\/\/www.cila.org.tw\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"http:\/\/www.cila.org.tw\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=4892"}],"version-history":[{"count":1,"href":"http:\/\/www.cila.org.tw\/index.php?rest_route=\/wp\/v2\/posts\/4892\/revisions"}],"predecessor-version":[{"id":4896,"href":"http:\/\/www.cila.org.tw\/index.php?rest_route=\/wp\/v2\/posts\/4892\/revisions\/4896"}],"wp:featuredmedia":[{"embeddable":true,"href":"http:\/\/www.cila.org.tw\/index.php?rest_route=\/wp\/v2\/media\/4895"}],"wp:attachment":[{"href":"http:\/\/www.cila.org.tw\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=4892"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"http:\/\/www.cila.org.tw\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=4892"},{"taxonomy":"post_tag","embeddable":true,"href":"http:\/\/www.cila.org.tw\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=4892"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}