  {"id":26079,"date":"2017-11-15T21:46:11","date_gmt":"2017-11-16T02:46:11","guid":{"rendered":"https:\/\/digital.hbs.edu\/platform-rctom\/submission\/gaming-twitter-the-supplier-of-news\/"},"modified":"2017-11-25T13:58:21","modified_gmt":"2017-11-25T18:58:21","slug":"hacked-the-proliferation-of-fake-news-bots-on-twitter","status":"publish","type":"hck-submission","link":"https:\/\/d3.harvard.edu\/platform-rctom\/submission\/hacked-the-proliferation-of-fake-news-bots-on-twitter\/","title":{"rendered":"#hacked: the proliferation of fake news bots on Twitter"},"content":{"rendered":"<p>Twitter, a microblogging and social media platform, enables users\u00a0to read and post short messages. But in actuality, Twitter has become a digital, real-time, public broadcast.<\/p>\n<p><a href=\"https:\/\/d3.harvard.edu\/platform-rctom\/wp-content\/uploads\/sites\/4\/2017\/11\/Twitter-2.jpg\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-medium wp-image-25835\" src=\"https:\/\/d3.harvard.edu\/platform-rctom\/wp-content\/uploads\/sites\/4\/2017\/11\/Twitter-2-300x169.jpg\" alt=\"\" width=\"300\" height=\"169\" srcset=\"https:\/\/d3.harvard.edu\/platform-rctom\/wp-content\/uploads\/sites\/4\/2017\/11\/Twitter-2-300x169.jpg 300w, https:\/\/d3.harvard.edu\/platform-rctom\/wp-content\/uploads\/sites\/4\/2017\/11\/Twitter-2-768x432.jpg 768w, https:\/\/d3.harvard.edu\/platform-rctom\/wp-content\/uploads\/sites\/4\/2017\/11\/Twitter-2-600x338.jpg 600w, https:\/\/d3.harvard.edu\/platform-rctom\/wp-content\/uploads\/sites\/4\/2017\/11\/Twitter-2.jpg 890w\" sizes=\"auto, (max-width: 300px) 100vw, 300px\" \/><\/a><\/p>\n<p>Today, Twitter is one of the main suppliers of 24\/7 news updates. Because of digitization, user preferences have changed to\u00a0active rather than passive and the news process flow has shrunk drastically. Consumers require information instantaneously, and they often don&#8217;t have time to read an entire article or watch a lengthy TV broadcast.<\/p>\n<p>Through digitization, Twitter has allowed consumers to be more connected and more informed than ever before. But Twitter must pay close attention to cyber-security threats. Bots and hackers have learned how to outsmart Twitter\u2019s systems, exposing weaknesses in their supply chain. On October 30<sup>th<\/sup> 2017, Twitter executives testified before Congress on the bots and misinformation that influenced the 2016 U.S. Presidential election.<\/p>\n<p>Furthermore, the President of the United States uses Twitter as his preferred means of communication. This matters because Twitter\u2019s user base is growing: from 310 monthly average users in January 2016 to 330 million monthly\u00a0active users in October 2017 [1].<\/p>\n<p>Twitter\u2019s mission statement is \u201cto give everyone the power to create and share ideas and information instantly, without barriers.\u201d But at what cost?<\/p>\n<p><strong>Tweet, Sleep, Repeat &#8211; Twitter&#8217;s Supply Chain<\/strong><\/p>\n<p>From the end-user perspective, Twitter pushes content to users based on who they follow, their location, and what is \u201ctrending.\u201d Users select which accounts to follow and can elect to turn on their location services, then Twitter\u2019s algorithm pushes \u201ctrending\u201d content to their Twitter newsfeeds. The algorithm identifies topics that are popular in real-time. For instance, if there is a 10-car pile up on a highway nearby, users can go onto Twitter and see an update on the crash via the Trending tweets. Or in cases of severe weather power outages, users can go on to Twitter to find the nearest shelter.<\/p>\n<p>From the journalist perspective, Twitter provides 24\/7 monitoring of the worldwide news [2]. Since users now want to consume news immediately, rather than the next day, journalists can use Twitter to stay on top of the news cycle and be the first to break a news story. Journalists can also provide raw materials into the funnel. Twitter then provides worldwide news coverage of journalistic stories. If a journalist tweets about a story that ends up trending, it can attract thousands of new readers or followers.<\/p>\n<p>The looming threat to Twitter lies in the legitimacy of their site content. How does digitalization exacerbate this issue? Hackers continue to outsmart the Twitter systems with new technologies. Twitter users can have full anonymity through their elected username, so hackers can theoretically make thousands of Twitter bot accounts, have them all spew out the same fake news or hate speech, and cause a topic to become \u201ctrending.\u201d Samuel Wooley, the director for research at Oxford University\u2019s Computational Propaganda Project calls this \u201cmanufacturing consensus.\u201d [3]<\/p>\n<p><strong>#QualityControl<\/strong><\/p>\n<p>Twitter\u2019s mission statement appears to be in direct opposition to fact-checking, but their reputation depends on a certain level of quality control. Twitter has been actively updating their policies around reported content and abusive users <strong>(Exhibit 1)<\/strong>.<\/p>\n<p>They have several systems in place that work to identify suspicious users, but often these systems are implemented retroactively.<\/p>\n<ul>\n<li>They have dedicated teams who work on protecting the quality of the tweeted information by reviewing flagged content, deleting malicious content, and suspending suspicious users\u00a0[4]. <strong>(Exhibit 2)<\/strong><\/li>\n<li>They are utilizing machine learning and automated processes to identify propaganda bots and automated log-ins.\u00a0\u201cThese techniques now help us catch about 450,000 suspicious logins per day.\u201d [4]<\/li>\n<li>They have a system to identify suspicious bots on mobile phones that exploit innocent Twitter accounts\u00a0[4].`<\/li>\n<\/ul>\n<p>Still, the cyber-security problems persist.<\/p>\n<p><strong>@TwitterSafety, here are my recommendations:<\/strong><\/p>\n<p>In the short term, Twitter should act fast and make quality content their number 1 priority. They should update their mission statement to include their commitment to the quality of the content they feature.<\/p>\n<p>Additionally, they should focus on perfecting the filters in their process flow by utilizing machine learning and AI to supplement the dedicated compliance teams. In the long term, they should strive to have machines handle the entire process of filtering out malicious bots and content.<\/p>\n<p>Lastly, they can work on implementing a system that incentivizes users to flag and report content \u2013 at the moment users are not empowered to do so.<\/p>\n<p><strong>Open Questions for discussion:<\/strong><\/p>\n<ol>\n<li>Should Twitter be held responsible for the impact of the content on their platform?<\/li>\n<li>How should Twitter weigh the risks of alienating their most active and followed users with the reputational risks of inaction?<\/li>\n<li>How many controls are too many in the name of freedom of speech?<\/li>\n<\/ol>\n<p>&nbsp;<\/p>\n<p><strong>760 words<\/strong><\/p>\n<p>&nbsp;<\/p>\n<p><strong>Exhibit 1<\/strong><\/p>\n<p><a href=\"https:\/\/d3.harvard.edu\/platform-rctom\/wp-content\/uploads\/sites\/4\/2017\/11\/Twitter-policy-updates.png\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-medium wp-image-27046\" src=\"https:\/\/d3.harvard.edu\/platform-rctom\/wp-content\/uploads\/sites\/4\/2017\/11\/Twitter-policy-updates-300x203.png\" alt=\"\" width=\"300\" height=\"203\" srcset=\"https:\/\/d3.harvard.edu\/platform-rctom\/wp-content\/uploads\/sites\/4\/2017\/11\/Twitter-policy-updates-300x203.png 300w, https:\/\/d3.harvard.edu\/platform-rctom\/wp-content\/uploads\/sites\/4\/2017\/11\/Twitter-policy-updates-768x521.png 768w, https:\/\/d3.harvard.edu\/platform-rctom\/wp-content\/uploads\/sites\/4\/2017\/11\/Twitter-policy-updates-1024x694.png 1024w, https:\/\/d3.harvard.edu\/platform-rctom\/wp-content\/uploads\/sites\/4\/2017\/11\/Twitter-policy-updates-600x407.png 600w, https:\/\/d3.harvard.edu\/platform-rctom\/wp-content\/uploads\/sites\/4\/2017\/11\/Twitter-policy-updates.png 1198w\" sizes=\"auto, (max-width: 300px) 100vw, 300px\" \/><\/a><\/p>\n<p><strong>Exhibit 2<\/strong><\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-medium wp-image-25864\" src=\"https:\/\/d3.harvard.edu\/platform-rctom\/wp-content\/uploads\/sites\/4\/2017\/11\/Twitter-4-244x300.jpg\" alt=\"\" width=\"244\" height=\"300\" srcset=\"https:\/\/d3.harvard.edu\/platform-rctom\/wp-content\/uploads\/sites\/4\/2017\/11\/Twitter-4-244x300.jpg 244w, https:\/\/d3.harvard.edu\/platform-rctom\/wp-content\/uploads\/sites\/4\/2017\/11\/Twitter-4-768x945.jpg 768w, https:\/\/d3.harvard.edu\/platform-rctom\/wp-content\/uploads\/sites\/4\/2017\/11\/Twitter-4-832x1024.jpg 832w, https:\/\/d3.harvard.edu\/platform-rctom\/wp-content\/uploads\/sites\/4\/2017\/11\/Twitter-4-488x600.jpg 488w, https:\/\/d3.harvard.edu\/platform-rctom\/wp-content\/uploads\/sites\/4\/2017\/11\/Twitter-4.jpg 975w\" sizes=\"auto, (max-width: 244px) 100vw, 244px\" \/><\/p>\n<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>\n<p>[1] Statista, &#8220;Twitter: number of monthly active users 2010-2017&#8221;, 2017.\u00a0https:\/\/www.statista.com\/statistics\/282087\/number-of-monthly-active-twitter-users\/. Accessed November 2017<\/p>\n<p>[2] Poynter, &#8220;I studied how journalists used Twitter for two years. Here&#8217;s what I learned.&#8221; March 22, 2017.\u00a0https:\/\/www.poynter.org\/news\/i-studied-how-journalists-used-twitter-two-years-heres-what-i-learned. Accessed November 2017<\/p>\n<p>[3] Wooley, Samuel. &#8220;Computational Propaganda in the United States of America: Manufacturing Consensus Online,&#8221; Computational Propaganda Research Project Working Paper No. 2017.5, 2017,\u00a0http:\/\/comprop.oii.ox.ac.uk\/wp-content\/uploads\/sites\/89\/2017\/06\/Comprop-USA.pdf, accessed November 2017.<\/p>\n<p>[4] \u00a0Twitter PublicPolicy, \u201cUpdate: Russian Interference in 2016 US Election, Bots, &amp; Misinformation,\u00a0\u201d Twitter Blog(blog)), New York Times , September 28, 2017, https:\/\/blog.twitter.com\/official\/en_us\/topics\/company\/2017\/Update-Russian-Interference-in-2016&#8211;Election-Bots-and-Misinformation.html , accessed November 2017.<\/p>\n<p>&nbsp;<\/p>\n<h1 class=\"page-title\"><\/h1>\n","protected":false},"excerpt":{"rendered":"<p>Twitter supplies content to the news cycle through their highly influential social platform. But they are increasingly victimized by the dark side of technology: malicious bots. What should they do to protect their supply chain, their reputation, and the sanctity of news?<\/p>\n","protected":false},"author":10214,"featured_media":26080,"comment_status":"open","ping_status":"closed","template":"","categories":[],"class_list":["post-26079","hck-submission","type-hck-submission","status-publish","has-post-thumbnail","hentry","hck-taxonomy-organization-twitter","hck-taxonomy-industry-technology","hck-taxonomy-country-united-states"],"connected_submission_link":"https:\/\/d3.harvard.edu\/platform-rctom\/assignment\/rc-tom-challenge-2017\/","yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.3 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>#hacked: the proliferation of fake news bots on Twitter - Technology and Operations Management<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/d3.harvard.edu\/platform-rctom\/submission\/hacked-the-proliferation-of-fake-news-bots-on-twitter\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"#hacked: the proliferation of fake news bots on Twitter - Technology and Operations Management\" \/>\n<meta property=\"og:description\" content=\"Twitter supplies content to the news cycle through their highly influential social platform. But they are increasingly victimized by the dark side of technology: malicious bots. What should they do to protect their supply chain, their reputation, and the sanctity of news?\" \/>\n<meta property=\"og:url\" content=\"https:\/\/d3.harvard.edu\/platform-rctom\/submission\/hacked-the-proliferation-of-fake-news-bots-on-twitter\/\" \/>\n<meta property=\"og:site_name\" content=\"Technology and Operations Management\" \/>\n<meta property=\"article:modified_time\" content=\"2017-11-25T18:58:21+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/d3.harvard.edu\/platform-rctom\/wp-content\/uploads\/sites\/4\/2017\/11\/TWITTER.png\" \/>\n\t<meta property=\"og:image:width\" content=\"497\" \/>\n\t<meta property=\"og:image:height\" content=\"678\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/d3.harvard.edu\\\/platform-rctom\\\/submission\\\/hacked-the-proliferation-of-fake-news-bots-on-twitter\\\/\",\"url\":\"https:\\\/\\\/d3.harvard.edu\\\/platform-rctom\\\/submission\\\/hacked-the-proliferation-of-fake-news-bots-on-twitter\\\/\",\"name\":\"#hacked: the proliferation of fake news bots on Twitter - Technology and Operations Management\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/d3.harvard.edu\\\/platform-rctom\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/d3.harvard.edu\\\/platform-rctom\\\/submission\\\/hacked-the-proliferation-of-fake-news-bots-on-twitter\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/d3.harvard.edu\\\/platform-rctom\\\/submission\\\/hacked-the-proliferation-of-fake-news-bots-on-twitter\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/d3.harvard.edu\\\/platform-rctom\\\/wp-content\\\/uploads\\\/sites\\\/4\\\/2017\\\/11\\\/TWITTER.png\",\"datePublished\":\"2017-11-16T02:46:11+00:00\",\"dateModified\":\"2017-11-25T18:58:21+00:00\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/d3.harvard.edu\\\/platform-rctom\\\/submission\\\/hacked-the-proliferation-of-fake-news-bots-on-twitter\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/d3.harvard.edu\\\/platform-rctom\\\/submission\\\/hacked-the-proliferation-of-fake-news-bots-on-twitter\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/d3.harvard.edu\\\/platform-rctom\\\/submission\\\/hacked-the-proliferation-of-fake-news-bots-on-twitter\\\/#primaryimage\",\"url\":\"https:\\\/\\\/d3.harvard.edu\\\/platform-rctom\\\/wp-content\\\/uploads\\\/sites\\\/4\\\/2017\\\/11\\\/TWITTER.png\",\"contentUrl\":\"https:\\\/\\\/d3.harvard.edu\\\/platform-rctom\\\/wp-content\\\/uploads\\\/sites\\\/4\\\/2017\\\/11\\\/TWITTER.png\",\"width\":497,\"height\":678},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/d3.harvard.edu\\\/platform-rctom\\\/submission\\\/hacked-the-proliferation-of-fake-news-bots-on-twitter\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/d3.harvard.edu\\\/platform-rctom\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Submissions\",\"item\":\"https:\\\/\\\/d3.harvard.edu\\\/platform-rctom\\\/submission\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"#hacked: the proliferation of fake news bots on Twitter\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/d3.harvard.edu\\\/platform-rctom\\\/#website\",\"url\":\"https:\\\/\\\/d3.harvard.edu\\\/platform-rctom\\\/\",\"name\":\"Technology and Operations Management\",\"description\":\"MBA Student Perspectives\",\"potentialAction\":[{\"@type\":\"性视界Action\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/d3.harvard.edu\\\/platform-rctom\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"#hacked: the proliferation of fake news bots on Twitter - Technology and Operations Management","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/d3.harvard.edu\/platform-rctom\/submission\/hacked-the-proliferation-of-fake-news-bots-on-twitter\/","og_locale":"en_US","og_type":"article","og_title":"#hacked: the proliferation of fake news bots on Twitter - Technology and Operations Management","og_description":"Twitter supplies content to the news cycle through their highly influential social platform. But they are increasingly victimized by the dark side of technology: malicious bots. What should they do to protect their supply chain, their reputation, and the sanctity of news?","og_url":"https:\/\/d3.harvard.edu\/platform-rctom\/submission\/hacked-the-proliferation-of-fake-news-bots-on-twitter\/","og_site_name":"Technology and Operations Management","article_modified_time":"2017-11-25T18:58:21+00:00","og_image":[{"width":497,"height":678,"url":"https:\/\/d3.harvard.edu\/platform-rctom\/wp-content\/uploads\/sites\/4\/2017\/11\/TWITTER.png","type":"image\/png"}],"twitter_card":"summary_large_image","twitter_misc":{"Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/d3.harvard.edu\/platform-rctom\/submission\/hacked-the-proliferation-of-fake-news-bots-on-twitter\/","url":"https:\/\/d3.harvard.edu\/platform-rctom\/submission\/hacked-the-proliferation-of-fake-news-bots-on-twitter\/","name":"#hacked: the proliferation of fake news bots on Twitter - Technology and Operations Management","isPartOf":{"@id":"https:\/\/d3.harvard.edu\/platform-rctom\/#website"},"primaryImageOfPage":{"@id":"https:\/\/d3.harvard.edu\/platform-rctom\/submission\/hacked-the-proliferation-of-fake-news-bots-on-twitter\/#primaryimage"},"image":{"@id":"https:\/\/d3.harvard.edu\/platform-rctom\/submission\/hacked-the-proliferation-of-fake-news-bots-on-twitter\/#primaryimage"},"thumbnailUrl":"https:\/\/d3.harvard.edu\/platform-rctom\/wp-content\/uploads\/sites\/4\/2017\/11\/TWITTER.png","datePublished":"2017-11-16T02:46:11+00:00","dateModified":"2017-11-25T18:58:21+00:00","breadcrumb":{"@id":"https:\/\/d3.harvard.edu\/platform-rctom\/submission\/hacked-the-proliferation-of-fake-news-bots-on-twitter\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/d3.harvard.edu\/platform-rctom\/submission\/hacked-the-proliferation-of-fake-news-bots-on-twitter\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/d3.harvard.edu\/platform-rctom\/submission\/hacked-the-proliferation-of-fake-news-bots-on-twitter\/#primaryimage","url":"https:\/\/d3.harvard.edu\/platform-rctom\/wp-content\/uploads\/sites\/4\/2017\/11\/TWITTER.png","contentUrl":"https:\/\/d3.harvard.edu\/platform-rctom\/wp-content\/uploads\/sites\/4\/2017\/11\/TWITTER.png","width":497,"height":678},{"@type":"BreadcrumbList","@id":"https:\/\/d3.harvard.edu\/platform-rctom\/submission\/hacked-the-proliferation-of-fake-news-bots-on-twitter\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/d3.harvard.edu\/platform-rctom\/"},{"@type":"ListItem","position":2,"name":"Submissions","item":"https:\/\/d3.harvard.edu\/platform-rctom\/submission\/"},{"@type":"ListItem","position":3,"name":"#hacked: the proliferation of fake news bots on Twitter"}]},{"@type":"WebSite","@id":"https:\/\/d3.harvard.edu\/platform-rctom\/#website","url":"https:\/\/d3.harvard.edu\/platform-rctom\/","name":"Technology and Operations Management","description":"MBA Student Perspectives","potentialAction":[{"@type":"性视界Action","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/d3.harvard.edu\/platform-rctom\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"}]}},"_links":{"self":[{"href":"https:\/\/d3.harvard.edu\/platform-rctom\/wp-json\/wp\/v2\/hck-submission\/26079","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/d3.harvard.edu\/platform-rctom\/wp-json\/wp\/v2\/hck-submission"}],"about":[{"href":"https:\/\/d3.harvard.edu\/platform-rctom\/wp-json\/wp\/v2\/types\/hck-submission"}],"author":[{"embeddable":true,"href":"https:\/\/d3.harvard.edu\/platform-rctom\/wp-json\/wp\/v2\/users\/10214"}],"replies":[{"embeddable":true,"href":"https:\/\/d3.harvard.edu\/platform-rctom\/wp-json\/wp\/v2\/comments?post=26079"}],"version-history":[{"count":0,"href":"https:\/\/d3.harvard.edu\/platform-rctom\/wp-json\/wp\/v2\/hck-submission\/26079\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/d3.harvard.edu\/platform-rctom\/wp-json\/wp\/v2\/media\/26080"}],"wp:attachment":[{"href":"https:\/\/d3.harvard.edu\/platform-rctom\/wp-json\/wp\/v2\/media?parent=26079"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/d3.harvard.edu\/platform-rctom\/wp-json\/wp\/v2\/categories?post=26079"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}