{"id":1230,"date":"2026-03-07T23:33:23","date_gmt":"2026-03-07T14:33:23","guid":{"rendered":"https:\/\/jicss.org\/?post_type=event&#038;p=1230"},"modified":"2026-03-11T18:37:44","modified_gmt":"2026-03-11T09:37:44","slug":"ai-sovereignty-discussion","status":"publish","type":"event","link":"https:\/\/jicss.org\/ja\/event\/ai-sovereignty-discussion\/","title":{"rendered":"AI Sovereignty Discussion"},"content":{"rendered":"","protected":false},"featured_media":1231,"parent":0,"template":"","meta":{"_acf_changed":true,"pmpro_default_level":""},"event-type":[61],"topic":[41,60],"class_list":["post-1230","event","type-event","status-publish","has-post-thumbnail","hentry","event-type-seminar","topic-ai","topic-cybersecurity-regulation","pmpro-has-access"],"acf":[],"_links":{"self":[{"href":"https:\/\/jicss.org\/ja\/wp-json\/wp\/v2\/event\/1230","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/jicss.org\/ja\/wp-json\/wp\/v2\/event"}],"about":[{"href":"https:\/\/jicss.org\/ja\/wp-json\/wp\/v2\/types\/event"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/jicss.org\/ja\/wp-json\/wp\/v2\/media\/1231"}],"wp:attachment":[{"href":"https:\/\/jicss.org\/ja\/wp-json\/wp\/v2\/media?parent=1230"}],"wp:term":[{"taxonomy":"event-type","embeddable":true,"href":"https:\/\/jicss.org\/ja\/wp-json\/wp\/v2\/event-type?post=1230"},{"taxonomy":"topic","embeddable":true,"href":"https:\/\/jicss.org\/ja\/wp-json\/wp\/v2\/topic?post=1230"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}