{"id":54456,"date":"2026-04-06T13:49:03","date_gmt":"2026-04-06T17:49:03","guid":{"rendered":"https:\/\/wvstateu.edu\/college-of-natural-sciences-and-mathematics\/?post_type=docs&#038;p=54456"},"modified":"2026-04-06T17:45:21","modified_gmt":"2026-04-06T21:45:21","password":"","slug":"how-to-spot-phishing","status":"publish","type":"docs","link":"https:\/\/wvstateu.edu\/college-of-natural-sciences-and-mathematics\/docs\/cic-kb\/cybersecurity\/how-to-spot-phishing\/","title":{"rendered":"How to Spot Phishing"},"content":{"rendered":"\n<p>Look for mismatched senders, pressure tactics, suspicious links, and messages asking you to verify credentials or payment information.<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Hover over links before clicking<\/li>\n\n\n\n<li>Check for spelling and sender mismatches<\/li>\n\n\n\n<li>Treat login-reset messages with caution<\/li>\n<\/ul>\n\n\n\n<div class=\"wp-block-uagb-buttons uagb-buttons__outer-wrap uagb-btn__default-btn uagb-btn-tablet__default-btn uagb-btn-mobile__default-btn uagb-block-fedb88f0\"><div class=\"uagb-buttons__wrap uagb-buttons-layout-wrap \">\n<div class=\"wp-block-uagb-buttons-child uagb-buttons__outer-wrap uagb-block-011b511b wp-block-button\"><div class=\"uagb-button__wrapper\"><a class=\"uagb-buttons-repeater wp-block-button__link\" aria-label=\"\" href=\"https:\/\/phishingquiz.withgoogle.com\/\" rel=\"nofollow noopener\" target=\"_blank\" role=\"button\"><div class=\"uagb-button__link\"><a href=\"https:\/\/phishingquiz.withgoogle.com\" target=\"_blank\" rel=\"noreferrer noopener\">Take Google&#8217;s phishing quiz<\/a><\/div><span class=\"uagb-button__icon uagb-button__icon-position-after\"><svg xmlns=\"https:\/\/www.w3.org\/2000\/svg\" viewBox=\"0 0 448 512\" aria-hidden=\"true\" focussable=\"false\"><path d=\"M438.6 278.6l-160 160C272.4 444.9 264.2 448 256 448s-16.38-3.125-22.62-9.375c-12.5-12.5-12.5-32.75 0-45.25L338.8 288H32C14.33 288 .0016 273.7 .0016 256S14.33 224 32 224h306.8l-105.4-105.4c-12.5-12.5-12.5-32.75 0-45.25s32.75-12.5 45.25 0l160 160C451.1 245.9 451.1 266.1 438.6 278.6z\"><\/path><\/svg><\/span><\/a><\/div><\/div>\n<\/div><\/div>\n","protected":false},"excerpt":{"rendered":"<p>Look for mismatched senders, pressure tactics, suspicious links, and messages asking you to verify credentials or payment information.<\/p>\n","protected":false},"author":42,"featured_media":0,"comment_status":"open","ping_status":"closed","template":"","meta":{"_acf_changed":false,"_relevanssi_hide_post":"","_relevanssi_hide_content":"","_relevanssi_pin_for_all":"","_relevanssi_pin_keywords":"","_relevanssi_unpin_keywords":"","_relevanssi_related_keywords":"","_relevanssi_related_include_ids":"","_relevanssi_related_exclude_ids":"","_relevanssi_related_no_append":"","_relevanssi_related_not_related":"","_relevanssi_related_posts":"2195,2210,1281,2169,2200,2204","_relevanssi_noindex_reason":"","_uag_custom_page_level_css":"","_monsterinsights_skip_tracking":false,"_monsterinsights_sitenote_active":false,"_monsterinsights_sitenote_note":"","_monsterinsights_sitenote_category":0,"site-sidebar-layout":"default","site-content-layout":"","ast-site-content-layout":"default","site-content-style":"default","site-sidebar-style":"default","ast-global-header-display":"","ast-banner-title-visibility":"","ast-main-header-display":"","ast-hfb-above-header-display":"","ast-hfb-below-header-display":"","ast-hfb-mobile-header-display":"","site-post-title":"","ast-breadcrumbs-content":"","ast-featured-img":"","footer-sml-layout":"","ast-disable-related-posts":"","theme-transparent-header-meta":"","adv-header-id-meta":"","stick-header-meta":"","header-above-stick-meta":"","header-main-stick-meta":"","header-below-stick-meta":"","astra-migrate-meta-layouts":"set","ast-page-background-enabled":"default","ast-page-background-meta":{"desktop":{"background-color":"var(--ast-global-color-4)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"ast-content-background-meta":{"desktop":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"footnotes":""},"doc_category":[81],"doc_tag":[86,88,87,89],"knowledge_base":[80],"class_list":["post-54456","docs","type-docs","status-publish","hentry","doc_category-cybersecurity","doc_tag-best-practices","doc_tag-cyberhealth-basics","doc_tag-cybersecurity-basics","doc_tag-cybersecurity-best-practices","knowledge_base-cic-kb"],"pp_statuses_selecting_workflow":false,"pp_workflow_action":"current","pp_status_selection":"publish","pp_force_visibility":null,"pp_subpost_visibility":null,"pp_inherited_force_visibility":null,"pp_inherited_subpost_visibility":null,"pp_post_mime_type":"","acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.3 (Yoast SEO v27.3) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>How to Spot Phishing - College of Natural Sciences and Mathematics<\/title>\n<meta name=\"robots\" content=\"noindex, follow\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"How to Spot Phishing\" \/>\n<meta property=\"og:description\" content=\"Look for mismatched senders, pressure tactics, suspicious links, and messages asking you to verify credentials or payment information.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/wvstateu.edu\/college-of-natural-sciences-and-mathematics\/docs\/cic-kb\/cybersecurity\/how-to-spot-phishing\/\" \/>\n<meta property=\"og:site_name\" content=\"College of Natural Sciences and Mathematics\" \/>\n<meta property=\"article:modified_time\" content=\"2026-04-06T21:45:21+00:00\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"1 minute\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/wvstateu.edu\\\/college-of-natural-sciences-and-mathematics\\\/docs\\\/cic-kb\\\/cybersecurity\\\/how-to-spot-phishing\\\/\",\"url\":\"https:\\\/\\\/wvstateu.edu\\\/college-of-natural-sciences-and-mathematics\\\/docs\\\/cic-kb\\\/cybersecurity\\\/how-to-spot-phishing\\\/\",\"name\":\"How to Spot Phishing - College of Natural Sciences and Mathematics\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/wvstateu.edu\\\/college-of-natural-sciences-and-mathematics\\\/#website\"},\"datePublished\":\"2026-04-06T17:49:03+00:00\",\"dateModified\":\"2026-04-06T21:45:21+00:00\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/wvstateu.edu\\\/college-of-natural-sciences-and-mathematics\\\/docs\\\/cic-kb\\\/cybersecurity\\\/how-to-spot-phishing\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/wvstateu.edu\\\/college-of-natural-sciences-and-mathematics\\\/docs\\\/cic-kb\\\/cybersecurity\\\/how-to-spot-phishing\\\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/wvstateu.edu\\\/college-of-natural-sciences-and-mathematics\\\/docs\\\/cic-kb\\\/cybersecurity\\\/how-to-spot-phishing\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/wvstateu.edu\\\/college-of-natural-sciences-and-mathematics\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Docs\",\"item\":\"https:\\\/\\\/wvstateu.edu\\\/college-of-natural-sciences-and-mathematics\\\/docs\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"How to Spot Phishing\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/wvstateu.edu\\\/college-of-natural-sciences-and-mathematics\\\/#website\",\"url\":\"https:\\\/\\\/wvstateu.edu\\\/college-of-natural-sciences-and-mathematics\\\/\",\"name\":\"College of Natural Sciences and Mathematics\",\"description\":\"\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/wvstateu.edu\\\/college-of-natural-sciences-and-mathematics\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"How to Spot Phishing - College of Natural Sciences and Mathematics","robots":{"index":"noindex","follow":"follow"},"og_locale":"en_US","og_type":"article","og_title":"How to Spot Phishing","og_description":"Look for mismatched senders, pressure tactics, suspicious links, and messages asking you to verify credentials or payment information.","og_url":"https:\/\/wvstateu.edu\/college-of-natural-sciences-and-mathematics\/docs\/cic-kb\/cybersecurity\/how-to-spot-phishing\/","og_site_name":"College of Natural Sciences and Mathematics","article_modified_time":"2026-04-06T21:45:21+00:00","twitter_card":"summary_large_image","twitter_misc":{"Est. reading time":"1 minute"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/wvstateu.edu\/college-of-natural-sciences-and-mathematics\/docs\/cic-kb\/cybersecurity\/how-to-spot-phishing\/","url":"https:\/\/wvstateu.edu\/college-of-natural-sciences-and-mathematics\/docs\/cic-kb\/cybersecurity\/how-to-spot-phishing\/","name":"How to Spot Phishing - College of Natural Sciences and Mathematics","isPartOf":{"@id":"https:\/\/wvstateu.edu\/college-of-natural-sciences-and-mathematics\/#website"},"datePublished":"2026-04-06T17:49:03+00:00","dateModified":"2026-04-06T21:45:21+00:00","breadcrumb":{"@id":"https:\/\/wvstateu.edu\/college-of-natural-sciences-and-mathematics\/docs\/cic-kb\/cybersecurity\/how-to-spot-phishing\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/wvstateu.edu\/college-of-natural-sciences-and-mathematics\/docs\/cic-kb\/cybersecurity\/how-to-spot-phishing\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/wvstateu.edu\/college-of-natural-sciences-and-mathematics\/docs\/cic-kb\/cybersecurity\/how-to-spot-phishing\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/wvstateu.edu\/college-of-natural-sciences-and-mathematics\/"},{"@type":"ListItem","position":2,"name":"Docs","item":"https:\/\/wvstateu.edu\/college-of-natural-sciences-and-mathematics\/docs\/"},{"@type":"ListItem","position":3,"name":"How to Spot Phishing"}]},{"@type":"WebSite","@id":"https:\/\/wvstateu.edu\/college-of-natural-sciences-and-mathematics\/#website","url":"https:\/\/wvstateu.edu\/college-of-natural-sciences-and-mathematics\/","name":"College of Natural Sciences and Mathematics","description":"","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/wvstateu.edu\/college-of-natural-sciences-and-mathematics\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"}]}},"year_month":"2026-04","word_count":38,"total_views":0,"reactions":{"happy":0,"normal":0,"sad":0},"author_info":{"name":"Ali Alsinayyid","author_nicename":"ali-alsinayyid","author_url":"https:\/\/wvstateu.edu\/college-of-natural-sciences-and-mathematics\/author\/ali-alsinayyid\/"},"doc_category_info":[{"term_name":"Cybersecurity","term_url":"https:\/\/wvstateu.edu\/college-of-natural-sciences-and-mathematics\/docs\/cybersecurity-innovation-center\/cybersecurity\/"}],"doc_tag_info":[{"term_name":"Best Practices","term_url":"https:\/\/wvstateu.edu\/college-of-natural-sciences-and-mathematics\/docs-tag\/best-practices\/"},{"term_name":"CyberHealth Basics","term_url":"https:\/\/wvstateu.edu\/college-of-natural-sciences-and-mathematics\/docs-tag\/cyberhealth-basics\/"},{"term_name":"Cybersecurity basics","term_url":"https:\/\/wvstateu.edu\/college-of-natural-sciences-and-mathematics\/docs-tag\/cybersecurity-basics\/"},{"term_name":"Cybersecurity best practices","term_url":"https:\/\/wvstateu.edu\/college-of-natural-sciences-and-mathematics\/docs-tag\/cybersecurity-best-practices\/"}],"spectra_custom_meta":{"_betterdocs_est_reading_text":[""],"_betterdocs_attachments":["a:0:{}"],"_betterdocs_related_articles":["a:0:{}"],"_edit_lock":["1775511923:2"],"_relevanssi_related_posts":["2195,2210,1281,2169,2200,2204"],"_pp_is_autodraft":["1"],"_betterdocs_reusable_block_ids":["a:0:{}"],"_relevanssi_hide_post":[""],"_relevanssi_hide_content":[""],"_relevanssi_pin_for_all":[""],"_relevanssi_pin_keywords":[""],"_relevanssi_unpin_keywords":[""],"_relevanssi_related_keywords":[""],"_relevanssi_related_include_ids":[""],"_relevanssi_related_exclude_ids":[""],"_relevanssi_related_no_append":[""],"_relevanssi_related_not_related":[""],"_relevanssi_noindex_reason":[""],"_uag_custom_page_level_css":[""],"_monsterinsights_skip_tracking":[""],"_monsterinsights_sitenote_active":[""],"site-sidebar-layout":["default"],"site-content-layout":[""],"ast-site-content-layout":["default"],"site-content-style":["default"],"site-sidebar-style":["default"],"ast-global-header-display":[""],"ast-banner-title-visibility":[""],"ast-main-header-display":[""],"ast-hfb-above-header-display":[""],"ast-hfb-below-header-display":[""],"ast-hfb-mobile-header-display":[""],"site-post-title":[""],"ast-breadcrumbs-content":[""],"ast-featured-img":[""],"footer-sml-layout":[""],"ast-disable-related-posts":[""],"theme-transparent-header-meta":[""],"adv-header-id-meta":[""],"stick-header-meta":[""],"header-above-stick-meta":[""],"header-main-stick-meta":[""],"header-below-stick-meta":[""],"astra-migrate-meta-layouts":["set"],"ast-page-background-enabled":["default"],"ast-page-background-meta":["a:3:{s:7:\"desktop\";a:12:{s:16:\"background-color\";s:25:\"var(--ast-global-color-4)\";s:16:\"background-image\";s:0:\"\";s:17:\"background-repeat\";s:6:\"repeat\";s:19:\"background-position\";s:13:\"center center\";s:15:\"background-size\";s:4:\"auto\";s:21:\"background-attachment\";s:6:\"scroll\";s:15:\"background-type\";s:0:\"\";s:16:\"background-media\";s:0:\"\";s:12:\"overlay-type\";s:0:\"\";s:13:\"overlay-color\";s:0:\"\";s:15:\"overlay-opacity\";s:0:\"\";s:16:\"overlay-gradient\";s:0:\"\";}s:6:\"tablet\";a:12:{s:16:\"background-color\";s:0:\"\";s:16:\"background-image\";s:0:\"\";s:17:\"background-repeat\";s:6:\"repeat\";s:19:\"background-position\";s:13:\"center center\";s:15:\"background-size\";s:4:\"auto\";s:21:\"background-attachment\";s:6:\"scroll\";s:15:\"background-type\";s:0:\"\";s:16:\"background-media\";s:0:\"\";s:12:\"overlay-type\";s:0:\"\";s:13:\"overlay-color\";s:0:\"\";s:15:\"overlay-opacity\";s:0:\"\";s:16:\"overlay-gradient\";s:0:\"\";}s:6:\"mobile\";a:12:{s:16:\"background-color\";s:0:\"\";s:16:\"background-image\";s:0:\"\";s:17:\"background-repeat\";s:6:\"repeat\";s:19:\"background-position\";s:13:\"center center\";s:15:\"background-size\";s:4:\"auto\";s:21:\"background-attachment\";s:6:\"scroll\";s:15:\"background-type\";s:0:\"\";s:16:\"background-media\";s:0:\"\";s:12:\"overlay-type\";s:0:\"\";s:13:\"overlay-color\";s:0:\"\";s:15:\"overlay-opacity\";s:0:\"\";s:16:\"overlay-gradient\";s:0:\"\";}}"],"ast-content-background-meta":["a:3:{s:7:\"desktop\";a:12:{s:16:\"background-color\";s:25:\"var(--ast-global-color-5)\";s:16:\"background-image\";s:0:\"\";s:17:\"background-repeat\";s:6:\"repeat\";s:19:\"background-position\";s:13:\"center center\";s:15:\"background-size\";s:4:\"auto\";s:21:\"background-attachment\";s:6:\"scroll\";s:15:\"background-type\";s:0:\"\";s:16:\"background-media\";s:0:\"\";s:12:\"overlay-type\";s:0:\"\";s:13:\"overlay-color\";s:0:\"\";s:15:\"overlay-opacity\";s:0:\"\";s:16:\"overlay-gradient\";s:0:\"\";}s:6:\"tablet\";a:12:{s:16:\"background-color\";s:25:\"var(--ast-global-color-5)\";s:16:\"background-image\";s:0:\"\";s:17:\"background-repeat\";s:6:\"repeat\";s:19:\"background-position\";s:13:\"center center\";s:15:\"background-size\";s:4:\"auto\";s:21:\"background-attachment\";s:6:\"scroll\";s:15:\"background-type\";s:0:\"\";s:16:\"background-media\";s:0:\"\";s:12:\"overlay-type\";s:0:\"\";s:13:\"overlay-color\";s:0:\"\";s:15:\"overlay-opacity\";s:0:\"\";s:16:\"overlay-gradient\";s:0:\"\";}s:6:\"mobile\";a:12:{s:16:\"background-color\";s:25:\"var(--ast-global-color-5)\";s:16:\"background-image\";s:0:\"\";s:17:\"background-repeat\";s:6:\"repeat\";s:19:\"background-position\";s:13:\"center center\";s:15:\"background-size\";s:4:\"auto\";s:21:\"background-attachment\";s:6:\"scroll\";s:15:\"background-type\";s:0:\"\";s:16:\"background-media\";s:0:\"\";s:12:\"overlay-type\";s:0:\"\";s:13:\"overlay-color\";s:0:\"\";s:15:\"overlay-opacity\";s:0:\"\";s:16:\"overlay-gradient\";s:0:\"\";}}"],"footnotes":[""],"_edit_last":["2"],"_yoast_wpseo_primary_doc_category":["81"],"_yoast_wpseo_primary_doc_tag":["88"],"_yoast_wpseo_primary_knowledge_base":["80"],"_yoast_wpseo_content_score":["90"],"_yoast_wpseo_focuskeywords":[""],"_yoast_wpseo_keywordsynonyms":[""],"_yoast_wpseo_estimated-reading-time-minutes":["1"],"_betterdocs_meta_views":["46"],"_uag_css_file_name":["uag-css-54456.css"],"_uag_js_file_name":["uag-js-54456.js"]},"uagb_featured_image_src":{"full":false,"thumbnail":false,"medium":false,"medium_large":false,"large":false,"1536x1536":false,"2048x2048":false,"spotlight-thumbnail":false,"archive-thumbnail":false,"staff-thumbnail":false,"betterdocs-category-thumb":false,"gform-image-choice-sm":false,"gform-image-choice-md":false,"gform-image-choice-lg":false},"uagb_author_info":{"display_name":"Ali Alsinayyid","author_link":"https:\/\/wvstateu.edu\/college-of-natural-sciences-and-mathematics\/author\/ali-alsinayyid\/"},"uagb_comment_info":0,"uagb_excerpt":"Look for mismatched senders, pressure tactics, suspicious links, and messages asking you to verify credentials or payment information.","knowledge_base_info":[{"term_name":"CIC Knowledge Base","term_url":"https:\/\/wvstateu.edu\/college-of-natural-sciences-and-mathematics\/docs\/cic-kb\/","term_slug":"cic-kb"}],"knowledge_base_slug":["cic-kb"],"_links":{"self":[{"href":"https:\/\/wvstateu.edu\/college-of-natural-sciences-and-mathematics\/wp-json\/wp\/v2\/docs\/54456","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/wvstateu.edu\/college-of-natural-sciences-and-mathematics\/wp-json\/wp\/v2\/docs"}],"about":[{"href":"https:\/\/wvstateu.edu\/college-of-natural-sciences-and-mathematics\/wp-json\/wp\/v2\/types\/docs"}],"author":[{"embeddable":true,"href":"https:\/\/wvstateu.edu\/college-of-natural-sciences-and-mathematics\/wp-json\/wp\/v2\/users\/42"}],"replies":[{"embeddable":true,"href":"https:\/\/wvstateu.edu\/college-of-natural-sciences-and-mathematics\/wp-json\/wp\/v2\/comments?post=54456"}],"version-history":[{"count":3,"href":"https:\/\/wvstateu.edu\/college-of-natural-sciences-and-mathematics\/wp-json\/wp\/v2\/docs\/54456\/revisions"}],"predecessor-version":[{"id":54550,"href":"https:\/\/wvstateu.edu\/college-of-natural-sciences-and-mathematics\/wp-json\/wp\/v2\/docs\/54456\/revisions\/54550"}],"wp:attachment":[{"href":"https:\/\/wvstateu.edu\/college-of-natural-sciences-and-mathematics\/wp-json\/wp\/v2\/media?parent=54456"}],"wp:term":[{"taxonomy":"doc_category","embeddable":true,"href":"https:\/\/wvstateu.edu\/college-of-natural-sciences-and-mathematics\/wp-json\/wp\/v2\/doc_category?post=54456"},{"taxonomy":"doc_tag","embeddable":true,"href":"https:\/\/wvstateu.edu\/college-of-natural-sciences-and-mathematics\/wp-json\/wp\/v2\/doc_tag?post=54456"},{"taxonomy":"knowledge_base","embeddable":true,"href":"https:\/\/wvstateu.edu\/college-of-natural-sciences-and-mathematics\/wp-json\/wp\/v2\/knowledge_base?post=54456"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}