  {"id":21213,"date":"2017-11-12T11:10:03","date_gmt":"2017-11-12T16:10:03","guid":{"rendered":"https:\/\/digital.hbs.edu\/platform-rctom\/submission\/how-an-air-conditioning-firm-compromised-operations-of-one-of-the-us-biggest-retail-companies\/"},"modified":"2017-11-12T11:21:32","modified_gmt":"2017-11-12T16:21:32","slug":"target-under-attack","status":"publish","type":"hck-submission","link":"https:\/\/d3.harvard.edu\/platform-rctom\/submission\/target-under-attack\/","title":{"rendered":"Target under attack"},"content":{"rendered":"<p>Supply chain digitalization is a key component of many companies\u2019 strategy to improve operational efficiency and competitiveness. Gains from digitalization are undeniable and go from basic inventory and logistics optimization to fully integrated digital networks that can predict and adjust the whole supply chain to changes on customer behavior. The more deeply integrated those networks are, the greater the company&#8217;s ability to build a supply chain that represents a true competitive advantage with potential to yield not only superior efficiency, but also enable new business models and revenue streams [1]. However, as a chain is only as strong as its weakest link, such integration can bring major risks and ultimately jeopardize a company&#8217;s ability to guarantee the safety of its own customers.<\/p>\n<p><span style=\"font-weight: 400\">In December 2013, credit and debit card data of 40 million US customers and personal information of about 70 million breached from Target\u2019s computers after hackers infiltrate into their databases through a corrupted system of a third-party air-conditioning firm [2,3,4]. Since then, data security and IT incidents have escalated to become a top concern of Chief Supply Chain Officers overcoming raw material shortages, and logistics disruptions [Figure 1].<\/span><\/p>\n<p style=\"text-align: center\"><span style=\"font-weight: 400\">Supply Chain Risks<br \/>\n<\/span><span style=\"font-weight: 400\"><em>% of respondents that are \u201cvery concerned\u201d about each risk year-on-year<\/em><\/span><span style=\"font-weight: 400\"><br \/>\n<\/span><\/p>\n<p><a href=\"https:\/\/d3.harvard.edu\/platform-rctom\/wp-content\/uploads\/sites\/4\/2017\/11\/Figure-1-1.png\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-21345\" src=\"https:\/\/d3.harvard.edu\/platform-rctom\/wp-content\/uploads\/sites\/4\/2017\/11\/Figure-1-1.png\" alt=\"\" width=\"541\" height=\"310\" srcset=\"https:\/\/d3.harvard.edu\/platform-rctom\/wp-content\/uploads\/sites\/4\/2017\/11\/Figure-1-1.png 1555w, https:\/\/d3.harvard.edu\/platform-rctom\/wp-content\/uploads\/sites\/4\/2017\/11\/Figure-1-1-300x172.png 300w, https:\/\/d3.harvard.edu\/platform-rctom\/wp-content\/uploads\/sites\/4\/2017\/11\/Figure-1-1-768x440.png 768w, https:\/\/d3.harvard.edu\/platform-rctom\/wp-content\/uploads\/sites\/4\/2017\/11\/Figure-1-1-1024x586.png 1024w, https:\/\/d3.harvard.edu\/platform-rctom\/wp-content\/uploads\/sites\/4\/2017\/11\/Figure-1-1-600x343.png 600w\" sizes=\"auto, (max-width: 541px) 100vw, 541px\" \/><\/a><\/p>\n<p style=\"text-align: center\"><span style=\"font-weight: 400\">Figure 1 [5,6]<\/span><\/p>\n<p><span style=\"font-weight: 400\">Soon after the incident, Target pledged to spend $100 million upgrading its security systems [3] and, as part of a more recent settlement [7], the company agreed to further enforce its compliance with Consumer Protection Statutes and deploy a comprehensive Information Security Program to protect personal information it collects from customers. Albeit huge investments on data security, protecting its systems from hacking continues to pose a great challenge to the company. So much so that 4 years after the major data breach, Target acknowledged that it continues to experience data security incidents [8]. As a result of the inability of companies to prevent such leaks, the number of US customers who experienced identity fraud increased 16% in 2016 to a historical record of 15.4M people [Figure 2] resulting on an estimated loss of $16Bi [9]. To minimize financial losses, many companies, including Target, have heavily relied on cyber-insurances that, although effective on compensating the economic aspect of the hacking, is a palliative solution that do not address the root cause of the problem.<\/span><\/p>\n<p style=\"text-align: center\">US Customers Who Experienced Identity Fraud<br \/>\n<i>In Millions<\/i><\/p>\n<p><span style=\"font-weight: 400\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-21350\" style=\"color: #0000ee\" src=\"https:\/\/d3.harvard.edu\/platform-rctom\/wp-content\/uploads\/sites\/4\/2017\/11\/Figure-2-1-1024x611.png\" alt=\"\" width=\"474\" height=\"283\" srcset=\"https:\/\/d3.harvard.edu\/platform-rctom\/wp-content\/uploads\/sites\/4\/2017\/11\/Figure-2-1-1024x611.png 1024w, https:\/\/d3.harvard.edu\/platform-rctom\/wp-content\/uploads\/sites\/4\/2017\/11\/Figure-2-1-300x179.png 300w, https:\/\/d3.harvard.edu\/platform-rctom\/wp-content\/uploads\/sites\/4\/2017\/11\/Figure-2-1-768x458.png 768w, https:\/\/d3.harvard.edu\/platform-rctom\/wp-content\/uploads\/sites\/4\/2017\/11\/Figure-2-1-600x358.png 600w, https:\/\/d3.harvard.edu\/platform-rctom\/wp-content\/uploads\/sites\/4\/2017\/11\/Figure-2-1.png 1653w\" sizes=\"auto, (max-width: 474px) 100vw, 474px\" \/> <\/span><\/p>\n<p style=\"text-align: center\"><span style=\"font-weight: 400\">Figure 2 [9]<\/span><\/p>\n<p><span style=\"font-weight: 400\">To\u00a0<\/span>deliver a higher level of security to its customers, Target\u2019s management should focus on 3 key areas that are highlighted by many specialists [10] as foundations for a robust and reliable supply chain network.<\/p>\n<p><span style=\"font-weight: 400\">First, Target\u2019s supply chain needs to be thoroughly mapped and well understood so that all links of the network can have its weaknesses identified and adequately protected [Figure 3]. In addition to that, security systems and protocols must be established and tested to guarantee its efficacy once real threats are identified. A good example comes from the tech industry in which companies like Google run annual simulations of service disruption to evaluate how well teams go through response procedures and manage to keep the systems working and the data safe [11].<\/span><span style=\"font-weight: 400\"><br \/>\n<\/span> <span style=\"font-weight: 400\"> \u00a0<a href=\"https:\/\/d3.harvard.edu\/platform-rctom\/wp-content\/uploads\/sites\/4\/2017\/11\/Figure-3-1.png\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-large wp-image-21352\" src=\"https:\/\/d3.harvard.edu\/platform-rctom\/wp-content\/uploads\/sites\/4\/2017\/11\/Figure-3-1-1024x503.png\" alt=\"\" width=\"640\" height=\"314\" srcset=\"https:\/\/d3.harvard.edu\/platform-rctom\/wp-content\/uploads\/sites\/4\/2017\/11\/Figure-3-1-1024x503.png 1024w, https:\/\/d3.harvard.edu\/platform-rctom\/wp-content\/uploads\/sites\/4\/2017\/11\/Figure-3-1-300x147.png 300w, https:\/\/d3.harvard.edu\/platform-rctom\/wp-content\/uploads\/sites\/4\/2017\/11\/Figure-3-1-768x377.png 768w, https:\/\/d3.harvard.edu\/platform-rctom\/wp-content\/uploads\/sites\/4\/2017\/11\/Figure-3-1-600x295.png 600w, https:\/\/d3.harvard.edu\/platform-rctom\/wp-content\/uploads\/sites\/4\/2017\/11\/Figure-3-1.png 1740w\" sizes=\"auto, (max-width: 640px) 100vw, 640px\" \/><\/a><\/span><\/p>\n<p style=\"text-align: center\"><span style=\"font-weight: 400\">Figure 3: Anatomy of a Supply Chain Breach [12]<\/span><span style=\"font-weight: 400\">\u00a0\u00a0<\/span><\/p>\n<p>Second, the human factor needs to be addressed. Weeks before the 2013 breach, multiple malware alerts were ignored and prevention functionalities that could have mitigated the extension of the leak were turned off by administrators who were not familiar with the systems [4]. Therefore, a comprehensive training agenda needs to be put in place to educate all employees on basic security measures and also restrict access to sensitive data to a small and well qualified portion of the organization.<\/p>\n<p>Finally, strong cryptography and multi-layer protection should be used to store and transmit sensitive data. Those measures add an extra layer of protection and avoid that, in case of a leak, any of the leaked information be ultimately used.<\/p>\n<p><span style=\"font-weight: 400\">It is far from trivial, especially for retail companies, to put together such a complex system and many of them have relied on third-party cyber security and insurance firms to mitigate the risks. It is still open to debate, though, to which extend the responsibility for managing customer\u2019s personal information should be transferred to third parties and how much retailers should rely on insurance companies to mitigate the implications related to data breaches.<\/span>\u00a0(727 words)<\/p>\n<p>[1] strategy&amp;, \u201cIndustry 4.0 &#8211; How digitization makes the supply chain more efficient, agile, and customer-focused,\u201d PwC, 2016<br \/>\n[2] B. Krebs, \u201cThe Target breach, by the numbers,\u201d May 2014, at <a href=\"https:\/\/krebsonsecurity.com\/2014\/05\/the-target-breach-by-the-numbers\/\">https:\/\/krebsonsecurity.com\/2014\/05\/the-target-breach-by-the-numbers\/<\/a>, accessed November 10, 2017<br \/>\n[3] E. Kvochko, R. Pant, \u201cWhy Data Breaches Don\u2019t Hurt Stock Prices,\u201d 性视界 Business Review, March 2015<br \/>\n[4] X. Shu, \u00a0K. Tian, A. Ciambrone, D. Yao, \u201cBreaking the Target: An Analysis of Target Data Breach and Lessons Learned,\u201d January 18, 2017, arXiv:1701.04940<br \/>\n[5] SCM World, &#8220;Future of Supply Chain surveys,&#8221; 2016<br \/>\n[6] SCM World, &#8220;Chief Supply Chain Officer Surveys,&#8221; 2012-14<br \/>\n[7] Attorney General of the State of New York, Bureau of Internet and Technology, Assurance no. 17-094, \u201cTarget Corporation Settlement,\u201d May 8, 2017 at\u00a0<a href=\"https:\/\/ag.ny.gov\/sites\/default\/files\/nyag_target_settlement.pdf\">https:\/\/ag.ny.gov\/sites\/default\/files\/nyag_target_settlement.pdf<br \/>\n<\/a>[8] Target Corporation, Form 10K &#8211; Annual Statement, January 2017<br \/>\n[9] Javelyn Strategy &amp; Research, \u201c2017 Identity Fraud Study,\u201d February 1, 2017<br \/>\n[10] N. Lord, \u201cSupply Chain Cybersecurity: Experts on how to mitigate third party risk,\u201d July 27, 2017 at\u00a0<a href=\"https:\/\/digitalguardian.com\/blog\/supply-chain-cybersecurity\">https:\/\/digitalguardian.com\/blog\/supply-chain-cybersecurity<\/a>, accessed\u00a0November 10, 2017<br \/>\n[11] Wired, \u201cGoogle Throws Open Doors To Its Top-Secret Data Center\u201d, October 17, 2012, at\u00a0<a href=\"http:\/\/www.wired.com\/2012\/10\/ff-inside-google-data-center\/\">www.wired.com\/2012\/10\/ff-inside-google-data-center<\/a>, accessed November 12, 2017<br \/>\n[12] Combatting Cyber Risks in the Supply Chain &#8211; SANS Institute InfoSec Reading Room &#8211; September 2015 &#8211; page 2<br \/>\n[13] M. Riley, B. Elgin, D. Lawrence, C.Matlack, Bloomberg, \u201cMissed Alarms and 40 Million Stolen Credit Card Numbers: How Target Blew It\u201d, March 17, 2014, at\u00a0<a href=\"https:\/\/www.bloomberg.com\/news\/articles\/2014-03-13\/target-missed-warnings-in-epic-hack-of-credit-card-data\">https:\/\/www.bloomberg.com\/news\/articles\/2014-03-13\/target-missed-warnings-in-epic-hack-of-credit-card-data<\/a>, accessed November 11, 2017<\/p>\n","protected":false},"excerpt":{"rendered":"<p>How supply chain digitalization helped hackers to exploit an air-conditioning firm and compromise operations of one of the US biggest retail companies.<\/p>\n","protected":false},"author":10294,"featured_media":21214,"comment_status":"open","ping_status":"closed","template":"","categories":[845,3235,2309,316],"class_list":["post-21213","hck-submission","type-hck-submission","status-publish","has-post-thumbnail","hentry","category-cybersecurity","category-digital-supply-chain","category-hacking","category-target","hck-taxonomy-organization-target","hck-taxonomy-industry-retail","hck-taxonomy-country-united-states"],"connected_submission_link":"https:\/\/d3.harvard.edu\/platform-rctom\/assignment\/rc-tom-challenge-2017\/","yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.3 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Target under attack - Technology and Operations Management<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/d3.harvard.edu\/platform-rctom\/submission\/target-under-attack\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Target under attack - Technology and Operations Management\" \/>\n<meta property=\"og:description\" content=\"How supply chain digitalization helped hackers to exploit an air-conditioning firm and compromise operations of one of the US biggest retail companies.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/d3.harvard.edu\/platform-rctom\/submission\/target-under-attack\/\" \/>\n<meta property=\"og:site_name\" content=\"Technology and Operations Management\" \/>\n<meta property=\"article:modified_time\" content=\"2017-11-12T16:21:32+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/d3.harvard.edu\/platform-rctom\/wp-content\/uploads\/sites\/4\/2017\/11\/Target.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"644\" \/>\n\t<meta property=\"og:image:height\" content=\"345\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"5 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/d3.harvard.edu\\\/platform-rctom\\\/submission\\\/target-under-attack\\\/\",\"url\":\"https:\\\/\\\/d3.harvard.edu\\\/platform-rctom\\\/submission\\\/target-under-attack\\\/\",\"name\":\"Target under attack - Technology and Operations Management\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/d3.harvard.edu\\\/platform-rctom\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/d3.harvard.edu\\\/platform-rctom\\\/submission\\\/target-under-attack\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/d3.harvard.edu\\\/platform-rctom\\\/submission\\\/target-under-attack\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/d3.harvard.edu\\\/platform-rctom\\\/wp-content\\\/uploads\\\/sites\\\/4\\\/2017\\\/11\\\/Target.jpg\",\"datePublished\":\"2017-11-12T16:10:03+00:00\",\"dateModified\":\"2017-11-12T16:21:32+00:00\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/d3.harvard.edu\\\/platform-rctom\\\/submission\\\/target-under-attack\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/d3.harvard.edu\\\/platform-rctom\\\/submission\\\/target-under-attack\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/d3.harvard.edu\\\/platform-rctom\\\/submission\\\/target-under-attack\\\/#primaryimage\",\"url\":\"https:\\\/\\\/d3.harvard.edu\\\/platform-rctom\\\/wp-content\\\/uploads\\\/sites\\\/4\\\/2017\\\/11\\\/Target.jpg\",\"contentUrl\":\"https:\\\/\\\/d3.harvard.edu\\\/platform-rctom\\\/wp-content\\\/uploads\\\/sites\\\/4\\\/2017\\\/11\\\/Target.jpg\",\"width\":644,\"height\":345},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/d3.harvard.edu\\\/platform-rctom\\\/submission\\\/target-under-attack\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/d3.harvard.edu\\\/platform-rctom\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Submissions\",\"item\":\"https:\\\/\\\/d3.harvard.edu\\\/platform-rctom\\\/submission\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Target under attack\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/d3.harvard.edu\\\/platform-rctom\\\/#website\",\"url\":\"https:\\\/\\\/d3.harvard.edu\\\/platform-rctom\\\/\",\"name\":\"Technology and Operations Management\",\"description\":\"MBA Student Perspectives\",\"potentialAction\":[{\"@type\":\"性视界Action\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/d3.harvard.edu\\\/platform-rctom\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Target under attack - Technology and Operations Management","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/d3.harvard.edu\/platform-rctom\/submission\/target-under-attack\/","og_locale":"en_US","og_type":"article","og_title":"Target under attack - Technology and Operations Management","og_description":"How supply chain digitalization helped hackers to exploit an air-conditioning firm and compromise operations of one of the US biggest retail companies.","og_url":"https:\/\/d3.harvard.edu\/platform-rctom\/submission\/target-under-attack\/","og_site_name":"Technology and Operations Management","article_modified_time":"2017-11-12T16:21:32+00:00","og_image":[{"width":644,"height":345,"url":"https:\/\/d3.harvard.edu\/platform-rctom\/wp-content\/uploads\/sites\/4\/2017\/11\/Target.jpg","type":"image\/jpeg"}],"twitter_card":"summary_large_image","twitter_misc":{"Est. reading time":"5 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/d3.harvard.edu\/platform-rctom\/submission\/target-under-attack\/","url":"https:\/\/d3.harvard.edu\/platform-rctom\/submission\/target-under-attack\/","name":"Target under attack - Technology and Operations Management","isPartOf":{"@id":"https:\/\/d3.harvard.edu\/platform-rctom\/#website"},"primaryImageOfPage":{"@id":"https:\/\/d3.harvard.edu\/platform-rctom\/submission\/target-under-attack\/#primaryimage"},"image":{"@id":"https:\/\/d3.harvard.edu\/platform-rctom\/submission\/target-under-attack\/#primaryimage"},"thumbnailUrl":"https:\/\/d3.harvard.edu\/platform-rctom\/wp-content\/uploads\/sites\/4\/2017\/11\/Target.jpg","datePublished":"2017-11-12T16:10:03+00:00","dateModified":"2017-11-12T16:21:32+00:00","breadcrumb":{"@id":"https:\/\/d3.harvard.edu\/platform-rctom\/submission\/target-under-attack\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/d3.harvard.edu\/platform-rctom\/submission\/target-under-attack\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/d3.harvard.edu\/platform-rctom\/submission\/target-under-attack\/#primaryimage","url":"https:\/\/d3.harvard.edu\/platform-rctom\/wp-content\/uploads\/sites\/4\/2017\/11\/Target.jpg","contentUrl":"https:\/\/d3.harvard.edu\/platform-rctom\/wp-content\/uploads\/sites\/4\/2017\/11\/Target.jpg","width":644,"height":345},{"@type":"BreadcrumbList","@id":"https:\/\/d3.harvard.edu\/platform-rctom\/submission\/target-under-attack\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/d3.harvard.edu\/platform-rctom\/"},{"@type":"ListItem","position":2,"name":"Submissions","item":"https:\/\/d3.harvard.edu\/platform-rctom\/submission\/"},{"@type":"ListItem","position":3,"name":"Target under attack"}]},{"@type":"WebSite","@id":"https:\/\/d3.harvard.edu\/platform-rctom\/#website","url":"https:\/\/d3.harvard.edu\/platform-rctom\/","name":"Technology and Operations Management","description":"MBA Student Perspectives","potentialAction":[{"@type":"性视界Action","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/d3.harvard.edu\/platform-rctom\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"}]}},"_links":{"self":[{"href":"https:\/\/d3.harvard.edu\/platform-rctom\/wp-json\/wp\/v2\/hck-submission\/21213","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/d3.harvard.edu\/platform-rctom\/wp-json\/wp\/v2\/hck-submission"}],"about":[{"href":"https:\/\/d3.harvard.edu\/platform-rctom\/wp-json\/wp\/v2\/types\/hck-submission"}],"author":[{"embeddable":true,"href":"https:\/\/d3.harvard.edu\/platform-rctom\/wp-json\/wp\/v2\/users\/10294"}],"replies":[{"embeddable":true,"href":"https:\/\/d3.harvard.edu\/platform-rctom\/wp-json\/wp\/v2\/comments?post=21213"}],"version-history":[{"count":0,"href":"https:\/\/d3.harvard.edu\/platform-rctom\/wp-json\/wp\/v2\/hck-submission\/21213\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/d3.harvard.edu\/platform-rctom\/wp-json\/wp\/v2\/media\/21214"}],"wp:attachment":[{"href":"https:\/\/d3.harvard.edu\/platform-rctom\/wp-json\/wp\/v2\/media?parent=21213"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/d3.harvard.edu\/platform-rctom\/wp-json\/wp\/v2\/categories?post=21213"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}