{"version":"1.0","provider_name":"ISTE Group","provider_url":"https:\/\/www.istegroup.com\/en","author_name":"Vincent Cordonnier","author_url":"https:\/\/www.istegroup.com\/en\/profile\/v-cordonnier\/","title":"La cybers\u00e9curit\u00e9 en sciences humaines et sociales - ISTE Group","type":"rich","width":600,"height":338,"html":"<blockquote class=\"wp-embedded-content\" data-secret=\"mSDovcXrR3\"><a href=\"https:\/\/www.istegroup.com\/en\/produit\/la-cybersecurite-en-sciences-humaines-et-sociales\/\">La cybers\u00e9curit\u00e9 en sciences humaines et sociales<\/a><\/blockquote><iframe sandbox=\"allow-scripts\" security=\"restricted\" src=\"https:\/\/www.istegroup.com\/en\/produit\/la-cybersecurite-en-sciences-humaines-et-sociales\/embed\/#?secret=mSDovcXrR3\" width=\"600\" height=\"338\" title=\"&#8220;La cybers\u00e9curit\u00e9 en sciences humaines et sociales&#8221; &#8212; ISTE Group\" data-secret=\"mSDovcXrR3\" frameborder=\"0\" marginwidth=\"0\" marginheight=\"0\" scrolling=\"no\" class=\"wp-embedded-content\"><\/iframe><script type=\"text\/javascript\">\n\/* <![CDATA[ *\/\n\/*! This file is auto-generated *\/\n!function(d,l){\"use strict\";l.querySelector&&d.addEventListener&&\"undefined\"!=typeof URL&&(d.wp=d.wp||{},d.wp.receiveEmbedMessage||(d.wp.receiveEmbedMessage=function(e){var t=e.data;if((t||t.secret||t.message||t.value)&&!\/[^a-zA-Z0-9]\/.test(t.secret)){for(var s,r,n,a=l.querySelectorAll('iframe[data-secret=\"'+t.secret+'\"]'),o=l.querySelectorAll('blockquote[data-secret=\"'+t.secret+'\"]'),c=new RegExp(\"^https?:$\",\"i\"),i=0;i<o.length;i++)o[i].style.display=\"none\";for(i=0;i<a.length;i++)s=a[i],e.source===s.contentWindow&&(s.removeAttribute(\"style\"),\"height\"===t.message?(1e3<(r=parseInt(t.value,10))?r=1e3:~~r<200&&(r=200),s.height=r):\"link\"===t.message&&(r=new URL(s.getAttribute(\"src\")),n=new URL(t.value),c.test(n.protocol))&&n.host===r.host&&l.activeElement===s&&(d.top.location.href=t.value))}},d.addEventListener(\"message\",d.wp.receiveEmbedMessage,!1),l.addEventListener(\"DOMContentLoaded\",function(){for(var e,t,s=l.querySelectorAll(\"iframe.wp-embedded-content\"),r=0;r<s.length;r++)(t=(e=s[r]).getAttribute(\"data-secret\"))||(t=Math.random().toString(36).substring(2,12),e.src+=\"#?secret=\"+t,e.setAttribute(\"data-secret\",t)),e.contentWindow.postMessage({message:\"ready\",secret:t},\"*\")},!1)))}(window,document);\n\/\/# sourceURL=https:\/\/www.istegroup.com\/wp-includes\/js\/wp-embed.min.js\n\/* ]]> *\/\n<\/script>\n","thumbnail_url":"https:\/\/www.istegroup.com\/wp-content\/uploads\/2021\/02\/La-cybersecurite-en-sciences-humaines-et-sociales.jpg","thumbnail_width":300,"thumbnail_height":451,"description":"Cet ouvrage d\u00e9termine si les m\u00e9thodes traditionnelles de recherche en SHS sont adapt\u00e9es \u00e0 la r\u00e9alit\u00e9 du cyberespace puis, \u00e0 l\u2019appui de ce constat, propose des m\u00e9thodes plus pertinentes qui pourraient \u00eatre mobilis\u00e9es pour l\u2019\u00e9tude de la cybers\u00e9curit\u00e9."}