{"id":389,"date":"2025-11-05T22:40:25","date_gmt":"2025-11-05T22:40:25","guid":{"rendered":"https:\/\/biodesign.asu.edu\/biocomputing-security-and-society\/?page_id=389"},"modified":"2025-11-05T22:40:27","modified_gmt":"2025-11-05T22:40:27","slug":"389-2","status":"publish","type":"page","link":"https:\/\/biodesign.asu.edu\/biocomputing-security-and-society\/389-2\/","title":{"rendered":""},"content":{"rendered":"<div class=\"wp-bootstrap-blocks-container container mb-0\">\n\t\n<div class=\"wp-bootstrap-blocks-row row mt-4 mb-5\">\n\t\n\n<div class=\"col-12\">\n\t\t\t\n<div class=\"yoast-breadcrumbs\"><span><span><a href=\"https:\/\/biodesign.asu.edu\/our-centers\/\">Our Centers<\/a><\/span> \/ <span><a href=\"https:\/\/biodesign.asu.edu\/biocomputing-security-and-society\">Biocomputing, Security and Society<\/a><\/span><\/span><\/div>\n\t<\/div>\n\n<\/div>\n\n\n<div class=\"wp-bootstrap-blocks-row row justify-content-between\">\n\t\n\n<div class=\"col-12 col-md-3 mb-6 mb-lg-0\">\n\t\t\t\n<div aria-controls=\"sidebar-biocomputing-security-society\" aria-expanded=\"false\" class=\"sidebar-toggler\" data-target=\"#sidebar-biocomputing-security-society\" data-toggle=\"collapse\"><p>Select Section <\/p><span class=\"fas fa-chevron-up\" \/><\/div><nav class=\"sidebar collapse\" id=\"sidebar-biocomputing-security-society\" aria-label=\"Secondary\"> <div class=\"nav-link-container\"><a id=\"menu-item-77\" href=\"https:\/\/biodesign.asu.edu\/biocomputing-security-and-society\/\" class=\"menu-item menu-item-type-post_type menu-item-object-page menu-item-home nav-link\">Overview<\/a><\/div><\/li>\n <div class=\"nav-link-container\"><a id=\"menu-item-38\" href=\"https:\/\/biodesign.asu.edu\/biocomputing-security-and-society\/research\/\" class=\"menu-item menu-item-type-post_type menu-item-object-page nav-link\">Research<\/a><\/div><\/li>\n <div class=\"nav-link-container\"><a id=\"menu-item-37\" href=\"https:\/\/biodesign.asu.edu\/biocomputing-security-and-society\/team\/\" class=\"menu-item menu-item-type-post_type menu-item-object-page nav-link\">Team<\/a><\/div><\/li>\n <div class=\"nav-link-container\"><a id=\"menu-item-36\" href=\"https:\/\/biodesign.asu.edu\/biocomputing-security-and-society\/software-and-datasets\/\" class=\"menu-item menu-item-type-post_type menu-item-object-page nav-link\">Software and Datasets<\/a><\/div><\/li>\n <div class=\"nav-link-container\"><a id=\"menu-item-106\" href=\"https:\/\/biodesign.asu.edu\/biocomputing-security-and-society\/news\/\" class=\"menu-item menu-item-type-post_type menu-item-object-page nav-link\">News<\/a><\/div><\/li>\n <div class=\"nav-link-container\"><a id=\"menu-item-34\" href=\"https:\/\/biodesign.asu.edu\/biocomputing-security-and-society\/opportunities\/\" class=\"menu-item menu-item-type-post_type menu-item-object-page nav-link\">Opportunities<\/a><\/div><\/li>\n<\/nav>\n\n\t<\/div>\n\n\n\n<div class=\"col-12 col-md-8 three-col\">\n\t\t\t\n\n<h2 class=\"wp-block-heading mt-0\">Team<\/h2>\n\n\n\n<p class=\"mb-6\">Our interdisciplinary center delves deeply to find new connections between fields to discover surprising synergies and insights. The center\u2019s researchers tackle compelling problems and conduct fundamental research to find significant breakthroughs rather than incremental advances.<\/p>\n\n\n\n<h3 class=\"wp-block-heading mt-6 mb-4\" id=\"faculty\">Affiliates<\/h3>\n\n\n\n<p><\/p>\n\n\n<div class=\"wp-bootstrap-blocks-container container mb-0\">\n\t\n<div id=\"affiliates\" class=\"pfpeople-web-directory\" style=\"\" data-searchType=\"departments\" data-pagination=\"20\" data-depts=\"338663\" data-depts=\"338663\" data-exclude=\"\u200b\u200baabhilas, adoupe1, achampa4, avoronin, aplatt13, aricha, afortun2, amanjes2, amespi22, adprabh1, apdimaro, Amaddox6, aarrashe, bskane, bpasztor, bkujath, bmixonba, byavari, cmart186, cmaley1, cmcastl1, chaeyoon, crbisson, cmathis6, dlabram4, dechave4, dvpatel5, dparkar1, dnegi4, dmalload, dbertsek, dparikh8, ddnguy20, epahl, emmanue9, ejfawkes, ejoerz, epitzer, fyguan, gparzych, gpeirce1, gvmarqu1, ggrama, tnguy263, himran1 ,hmei7, hrichker, htripat2, hlee314, hillaryl, hgarner, imars, ideshpa2, jamesle2, jemenji1, jrcranda, jjone127, jliou4, jcheng64, jjosep31, jvrenzul, jdaymude, jlbrunk1, jarria20, jlhart16, jjbehera, kgaitan, kshah84, ksaha2, kpate291, kkemp8, khoronen, kbuetow, kleyba, klee263, kbheemav, lseebold, lpiske, lhcisner ,mahsan5, miyer2, mbhanus1, mgarza20, mhuffor4, mrhendr2, mtopiwal, neblanc1, namyot, ntrieu1, nsiddali, omsmith8, pdreiter, pzhang84, phuang37, pduan7, rbaweja1, rfaerbe1, ryousefi, rpate129, rwang133, svirigin, srshah25, shabib3, ssrs1, sbergen2, smousa13, sghule, srallabh, schoulwa, skapseta, sforres3, shofmeyr, tpavlic, snguye63, wmellon, wweimer, wtolley, xiaoyih1, xguan27, yansho1, yhuan467\r\n\" data-alphaFilter=\"true\" data-grid=\"false\"><\/div>\n<\/div>\n\n\t<\/div>\n\n<\/div>\n\n<\/div>\n","protected":false},"excerpt":{"rendered":"","protected":false},"author":5,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_acf_changed":false,"footnotes":""},"uds_featured_image":null,"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v24.5 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>- Biocomputing, Security and Society<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/biodesign.asu.edu\/biocomputing-security-and-society\/389-2\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"- Biocomputing, Security and Society\" \/>\n<meta property=\"og:url\" content=\"https:\/\/biodesign.asu.edu\/biocomputing-security-and-society\/389-2\/\" \/>\n<meta property=\"og:site_name\" content=\"Biocomputing, Security and Society\" \/>\n<meta property=\"article:modified_time\" content=\"2025-11-05T22:40:27+00:00\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"1 minute\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/biodesign.asu.edu\/biocomputing-security-and-society\/389-2\/\",\"url\":\"https:\/\/biodesign.asu.edu\/biocomputing-security-and-society\/389-2\/\",\"name\":\"- Biocomputing, Security and Society\",\"isPartOf\":{\"@id\":\"https:\/\/biodesign.asu.edu\/biocomputing-security-and-society\/#website\"},\"datePublished\":\"2025-11-05T22:40:25+00:00\",\"dateModified\":\"2025-11-05T22:40:27+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/biodesign.asu.edu\/biocomputing-security-and-society\/389-2\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/biodesign.asu.edu\/biocomputing-security-and-society\/389-2\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/biodesign.asu.edu\/biocomputing-security-and-society\/389-2\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Our Centers\",\"item\":\"https:\/\/biodesign.asu.edu\/our-centers\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Biocomputing, Security and Society\",\"item\":\"https:\/\/biodesign.asu.edu\/biocomputing-security-and-society\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/biodesign.asu.edu\/biocomputing-security-and-society\/#website\",\"url\":\"https:\/\/biodesign.asu.edu\/biocomputing-security-and-society\/\",\"name\":\"Biocomputing, Security and Society\",\"description\":\"Just another Biodesign Sites site\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/biodesign.asu.edu\/biocomputing-security-and-society\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"- Biocomputing, Security and Society","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/biodesign.asu.edu\/biocomputing-security-and-society\/389-2\/","og_locale":"en_US","og_type":"article","og_title":"- Biocomputing, Security and Society","og_url":"https:\/\/biodesign.asu.edu\/biocomputing-security-and-society\/389-2\/","og_site_name":"Biocomputing, Security and Society","article_modified_time":"2025-11-05T22:40:27+00:00","twitter_card":"summary_large_image","twitter_misc":{"Est. reading time":"1 minute"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/biodesign.asu.edu\/biocomputing-security-and-society\/389-2\/","url":"https:\/\/biodesign.asu.edu\/biocomputing-security-and-society\/389-2\/","name":"- Biocomputing, Security and Society","isPartOf":{"@id":"https:\/\/biodesign.asu.edu\/biocomputing-security-and-society\/#website"},"datePublished":"2025-11-05T22:40:25+00:00","dateModified":"2025-11-05T22:40:27+00:00","breadcrumb":{"@id":"https:\/\/biodesign.asu.edu\/biocomputing-security-and-society\/389-2\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/biodesign.asu.edu\/biocomputing-security-and-society\/389-2\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/biodesign.asu.edu\/biocomputing-security-and-society\/389-2\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Our Centers","item":"https:\/\/biodesign.asu.edu\/our-centers\/"},{"@type":"ListItem","position":2,"name":"Biocomputing, Security and Society","item":"https:\/\/biodesign.asu.edu\/biocomputing-security-and-society"}]},{"@type":"WebSite","@id":"https:\/\/biodesign.asu.edu\/biocomputing-security-and-society\/#website","url":"https:\/\/biodesign.asu.edu\/biocomputing-security-and-society\/","name":"Biocomputing, Security and Society","description":"Just another Biodesign Sites site","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/biodesign.asu.edu\/biocomputing-security-and-society\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"}]}},"_links":{"self":[{"href":"https:\/\/biodesign.asu.edu\/biocomputing-security-and-society\/wp-json\/wp\/v2\/pages\/389"}],"collection":[{"href":"https:\/\/biodesign.asu.edu\/biocomputing-security-and-society\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/biodesign.asu.edu\/biocomputing-security-and-society\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/biodesign.asu.edu\/biocomputing-security-and-society\/wp-json\/wp\/v2\/users\/5"}],"replies":[{"embeddable":true,"href":"https:\/\/biodesign.asu.edu\/biocomputing-security-and-society\/wp-json\/wp\/v2\/comments?post=389"}],"version-history":[{"count":0,"href":"https:\/\/biodesign.asu.edu\/biocomputing-security-and-society\/wp-json\/wp\/v2\/pages\/389\/revisions"}],"wp:attachment":[{"href":"https:\/\/biodesign.asu.edu\/biocomputing-security-and-society\/wp-json\/wp\/v2\/media?parent=389"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}