  {"id":36481,"date":"2018-11-13T20:00:33","date_gmt":"2018-11-14T01:00:33","guid":{"rendered":"https:\/\/digital.hbs.edu\/platform-rctom\/submission\/ibm-watson-for-cybersecurity-takes-center-court-at-wimbledon\/"},"modified":"2018-11-13T20:00:33","modified_gmt":"2018-11-14T01:00:33","slug":"ibm-watson-for-cybersecurity-takes-center-court-at-wimbledon","status":"publish","type":"hck-submission","link":"https:\/\/d3.harvard.edu\/platform-rctom\/submission\/ibm-watson-for-cybersecurity-takes-center-court-at-wimbledon\/","title":{"rendered":"IBM Watson for Cybersecurity Takes Center Court at Wimbledon!"},"content":{"rendered":"<p>The world is getting intertwined with billions of internet-connected devices fueled by artificial intelligence and machine learning. The number of such connected devices in every realm of today\u2019s world will soon outgrow the world population by many folds. As we strive to advance in this digital age, the dangers arising specifically from the lack of security aspects of digital revolution are overlooked by most and thus the absence of good governance, policies, standards, adequate controls and availability of funding to effectively address vulnerabilities is creating serious challenges.<\/p>\n<p>One of the organizations facing these challenges, in today\u2019s digital realm, is the 141-year-old tennis tournament \u2013 The Championships, Wimbledon (or simply called Wimbledon) [1].<\/p>\n<p>&nbsp;<\/p>\n<p><strong>Magnitude of the Issue<\/strong><\/p>\n<p>In today\u2019s digital realm, most fans experience Wimbledon off the field. Hence, Wimbledon must leverage its digital platform to deliver that great experience through its website, mobile app, TV, social media, etc. [2]. The Wimbledon website had <strong>436 million page-views<\/strong> in 2017, a 10% increase from 2016 [3]. (Figure 1). With this massive \u201cdigital\u201d fan base, comes the increases risk of cybercrime as well and hence, a cyber-attack during the game, disrupting Wimbledon\u2019s digital platform, would really hurt Wimbledon\u2019s 141-year-old reputation. As a result, the need of a cyber resilience tool which utilizes machine learning and artificial intelligence to stay a step ahead of these cyber-attacks is heightened.<\/p>\n<p>&nbsp;<\/p>\n<figure id=\"attachment_36235\" aria-describedby=\"caption-attachment-36235\" style=\"width: 821px\" class=\"wp-caption aligncenter\"><a href=\"https:\/\/d3.harvard.edu\/platform-rctom\/wp-content\/uploads\/sites\/4\/2018\/11\/Viewership-Stats.png\"><img loading=\"lazy\" decoding=\"async\" class=\" wp-image-36235\" src=\"https:\/\/d3.harvard.edu\/platform-rctom\/wp-content\/uploads\/sites\/4\/2018\/11\/Viewership-Stats-1024x137.png\" alt=\"\" width=\"821\" height=\"117\" \/><\/a><figcaption id=\"caption-attachment-36235\" class=\"wp-caption-text\">Figure 1: Viewership statistics collected by IBM during Wimbledon 2017. [4]<\/figcaption><\/figure>\n<p>It\u2019s not just the volume of attacks that is mind boggling, it is the deceptive nature of attacks that is more concerning. Usually most of the attacks would be released to trick the security operations analyst (and automated tools) into focusing their energy on a part of the system, while at the same instant, unknown to the analyst, some completely other part of the Wimbledon digital backbone is being targeted. This is what is defined as \u201clow and slow\u201d coordinated attack [5]. A security analyst would not be able to able to correlate these data points manually without the help of a SIEM tool.<\/p>\n<p>&nbsp;<\/p>\n<p><strong>IBM Watson to the rescue<\/strong><\/p>\n<p>IBM has been the official Information Technology partner to the Wimbledon for 29 years [6]. In 2017, IBM brought in Watson (integrated with QRadar \u2013 IBM\u2019s Security Information and Event Management tool), a supercomputer that uses machine learning and artificial intelligence to analyze data points, to assist the security operations at Wimbledon to investigate <strong>200 million events<\/strong> and help identify, detect and protect against the potential threats during the tournament, with speed and accuracy [7].<\/p>\n<p>The entire infrastructure (QRadar + Watson) brought together and correlated data, in real-time, from over thousands of connected endpoint devices and peripherals on the platform and populated the QRadar threat matrix and dashboard. This dashboard provided the security analyst the complete picture of the attack and a set of steps and recommendations that should be initiated to mitigate the cyber threat. In some instances, Watson was able automatically invoke other connected components on the network to derail the attack [8].<\/p>\n<p>&nbsp;<\/p>\n<figure id=\"attachment_36317\" aria-describedby=\"caption-attachment-36317\" style=\"width: 640px\" class=\"wp-caption aligncenter\"><a href=\"https:\/\/d3.harvard.edu\/platform-rctom\/wp-content\/uploads\/sites\/4\/2018\/11\/Sample-Dash-2.png\"><img loading=\"lazy\" decoding=\"async\" class=\"size-large wp-image-36317\" src=\"https:\/\/d3.harvard.edu\/platform-rctom\/wp-content\/uploads\/sites\/4\/2018\/11\/Sample-Dash-2-1024x582.png\" alt=\"\" width=\"640\" height=\"364\" srcset=\"https:\/\/d3.harvard.edu\/platform-rctom\/wp-content\/uploads\/sites\/4\/2018\/11\/Sample-Dash-2-1024x582.png 1024w, https:\/\/d3.harvard.edu\/platform-rctom\/wp-content\/uploads\/sites\/4\/2018\/11\/Sample-Dash-2-300x170.png 300w, https:\/\/d3.harvard.edu\/platform-rctom\/wp-content\/uploads\/sites\/4\/2018\/11\/Sample-Dash-2-768x436.png 768w, https:\/\/d3.harvard.edu\/platform-rctom\/wp-content\/uploads\/sites\/4\/2018\/11\/Sample-Dash-2-600x341.png 600w\" sizes=\"auto, (max-width: 640px) 100vw, 640px\" \/><\/a><figcaption id=\"caption-attachment-36317\" class=\"wp-caption-text\">Figure 2: Sample Dashboard showing number of attacks and event analyzed and their geographic source locations [9]<\/figcaption><\/figure>\n<p>The results were fantastic. IBM QRadar with Watson was able to correlate huge volume of events <strong>60 times faster than an average human security analyst<\/strong>. This translated into <strong>5 times more number of events being analyzed<\/strong>. More importantly, this resulted in <strong>ZERO successful breaches<\/strong> impacting the Wimbledon website [10].<\/p>\n<p>&nbsp;<\/p>\n<p><strong>Going Forward at Wimbledon<\/strong><\/p>\n<p>Cyber-criminals are looking for different and creative ways to evade technology \u2013 either by developing new malware that can detect correlation activities and stay in a \u201chibernation\u201d mode awaiting the right moment to execute, or by targeting the less skilled humans in the organization [11]. The attackers only have to be successful once while the power-combo of a security analyst with IBM Watson, at Wimbledon, has to stay on top of every attack each time. Going forward, the executive management at Wimbledon should start increasing the overall awareness about cybersecurity and its potential threat, not only internally, but also to its fan base, while continuing their ongoing investment in the technology to protect their brand from a bad cyber day. It\u2019s a continuous improvement process and not just something that could be easily accomplished within the two-week period when the tournament is on.<\/p>\n<p>&nbsp;<\/p>\n<p><strong>The Future?<\/strong><\/p>\n<p>With the exponential advancement in, and the ease of access of machine learning and artificial intelligence capabilities, cybersecurity is not just a problem related to the IT department anymore. Today, cybersecurity touches every single business unit within an organization \u2013 including an organization\u2019s C-Suite and the Board. But are the Boardrooms sufficiently prepared to address the rapidly growing cyber risk and integrate cybersecurity into the organization\u2019s overall business strategy and make sure the organization is not left operationally paralyzed when a cyber event knocks on their door?<\/p>\n<p>&nbsp;<\/p>\n<p>(Word Count: 769)<\/p>\n<p>&nbsp;<\/p>\n<p><strong>Sources:<\/strong><\/p>\n<p>[1] Wimbledon History \u2013 1870s, <a href=\"http:\/\/www.wimbledon.com\/en_GB\/aboutwimbledon\/history_1870s.html\">http:\/\/www.wimbledon.com\/en_GB\/aboutwimbledon\/history_1870s.html<\/a><\/p>\n<p>[2] Wimbledon serves more AI in 2018, Elizabeth O&#8217;Brien, June 2018, <a href=\"https:\/\/www.ibm.com\/blogs\/game-changers\/wimbledon-serves-ai-2018\/\">https:\/\/www.ibm.com\/blogs\/game-changers\/wimbledon-serves-ai-2018\/<\/a><\/p>\n<p>[3] IBM at Wimbledon 2018, June 2018, <a href=\"https:\/\/www.ibm.com\/thought-leadership\/wimbledon\/uk-en\/\">https:\/\/www.ibm.com\/thought-leadership\/wimbledon\/uk-en\/<\/a><\/p>\n<p>[4] IBM at Wimbledon 2018, June 2018, <a href=\"https:\/\/www.ibm.com\/thought-leadership\/wimbledon\/uk-en\/\">https:\/\/www.ibm.com\/thought-leadership\/wimbledon\/uk-en\/<\/a><\/p>\n<p>[5] Wimbledon 2017: Manicured Lawns, Ivy-Covered Buildings, Tennis Whites and Cyberattacks, \u00a0Johnathan Van Houten, July 2017, <a href=\"https:\/\/securityintelligence.com\/news\/wimbledon-2017-manicured-lawns-ivy-covered-buildings-tennis-whites-and-cyberattacks\/\">https:\/\/securityintelligence.com\/news\/wimbledon-2017-manicured-lawns-ivy-covered-buildings-tennis-whites-and-cyberattacks\/<\/a><\/p>\n<p>[6] IBM at Wimbledon 2018, June 2018, <a href=\"https:\/\/www.ibm.com\/thought-leadership\/wimbledon\/uk-en\/\">https:\/\/www.ibm.com\/thought-leadership\/wimbledon\/uk-en\/<\/a><\/p>\n<p>[7] Wimbledon 2017: Protecting the oldest brand in tennis with the latest in cognitive security, 2017, <a href=\"https:\/\/www.ibm.com\/case-studies\/wimbledon-2017\">https:\/\/www.ibm.com\/case-studies\/wimbledon-2017<\/a><\/p>\n<p>[8] Cybersecurity Behind the Scenes at Wimbledon, Eleanor Dallaway, August 2017, <a href=\"https:\/\/www.infosecurity-magazine.com\/news-features\/cybersecurity-behind-the-scenes-at\/\">https:\/\/www.infosecurity-magazine.com\/news-features\/cybersecurity-behind-the-scenes-at\/<\/a><\/p>\n<p>[9] IBM Security helps Wimbledon focus on the court, not the cloud, IBM Security (YouTube Channel), October 2017, <a href=\"https:\/\/www.youtube.com\/watch?v=m-hq2aOMeuE\">https:\/\/www.youtube.com\/watch?v=m-hq2aOMeuE<\/a><\/p>\n<p>[10] Wimbledon 2017: Protecting the oldest brand in tennis with the latest in cognitive security, 2017, <a href=\"https:\/\/www.ibm.com\/case-studies\/wimbledon-2017\">https:\/\/www.ibm.com\/case-studies\/wimbledon-2017<\/a><\/p>\n<p>[11] Challenges Facing Using AI in Cybersecurity, Ahmed Banafa, March 2018, <a href=\"https:\/\/www.bbvaopenmind.com\/en\/challenges-facing-using-ai-in-cybersecurity\/\">https:\/\/www.bbvaopenmind.com\/en\/challenges-facing-using-ai-in-cybersecurity\/<\/a><\/p>\n<p>[12] Featured Image: American Men Long Shots (Again) to Win Wimbledon, June 2018, <a href=\"https:\/\/www.outkickthecoverage.com\/american-men-long-shots-win-wimbledon\/\">https:\/\/www.outkickthecoverage.com\/american-men-long-shots-win-wimbledon\/<\/a><\/p>\n<p>&nbsp;<\/p>\n","protected":false},"excerpt":{"rendered":"<p>141-year-old tennis tournament \u2013 The Championships, Wimbledon utilizes IBM Watson to protect their brand against increasing risk of cybercrime. <\/p>\n","protected":false},"author":11186,"featured_media":36482,"comment_status":"open","ping_status":"closed","template":"","categories":[4365,3600,2044,2455,845,4242,346,167,5142],"class_list":["post-36481","hck-submission","type-hck-submission","status-publish","has-post-thumbnail","hentry","category-artifical-intelligence","category-cyber","category-cyber_security","category-cybercime","category-cybersecurity","category-ibm-watson","category-machine-learning","category-sports","category-wimbledon","hck-taxonomy-organization-wimbledon","hck-taxonomy-industry-sports","hck-taxonomy-country-united-kingdom"],"connected_submission_link":"https:\/\/d3.harvard.edu\/platform-rctom\/assignment\/rc-tom-challenge-2018\/","yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.3 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>IBM Watson for Cybersecurity Takes Center Court at Wimbledon! - Technology and Operations Management<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/d3.harvard.edu\/platform-rctom\/submission\/ibm-watson-for-cybersecurity-takes-center-court-at-wimbledon\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"IBM Watson for Cybersecurity Takes Center Court at Wimbledon! - Technology and Operations Management\" \/>\n<meta property=\"og:description\" content=\"141-year-old tennis tournament \u2013 The Championships, Wimbledon utilizes IBM Watson to protect their brand against increasing risk of cybercrime.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/d3.harvard.edu\/platform-rctom\/submission\/ibm-watson-for-cybersecurity-takes-center-court-at-wimbledon\/\" \/>\n<meta property=\"og:site_name\" content=\"Technology and Operations Management\" \/>\n<meta property=\"og:image\" content=\"https:\/\/d3.harvard.edu\/platform-rctom\/wp-content\/uploads\/sites\/4\/2018\/11\/How-to-Watch-Wimbledon-2017-Free-Live-Stream-Online1.jpeg\" \/>\n\t<meta property=\"og:image:width\" content=\"720\" \/>\n\t<meta property=\"og:image:height\" content=\"405\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"5 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/d3.harvard.edu\\\/platform-rctom\\\/submission\\\/ibm-watson-for-cybersecurity-takes-center-court-at-wimbledon\\\/\",\"url\":\"https:\\\/\\\/d3.harvard.edu\\\/platform-rctom\\\/submission\\\/ibm-watson-for-cybersecurity-takes-center-court-at-wimbledon\\\/\",\"name\":\"IBM Watson for Cybersecurity Takes Center Court at Wimbledon! - Technology and Operations Management\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/d3.harvard.edu\\\/platform-rctom\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/d3.harvard.edu\\\/platform-rctom\\\/submission\\\/ibm-watson-for-cybersecurity-takes-center-court-at-wimbledon\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/d3.harvard.edu\\\/platform-rctom\\\/submission\\\/ibm-watson-for-cybersecurity-takes-center-court-at-wimbledon\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/d3.harvard.edu\\\/platform-rctom\\\/wp-content\\\/uploads\\\/sites\\\/4\\\/2018\\\/11\\\/How-to-Watch-Wimbledon-2017-Free-Live-Stream-Online1.jpeg\",\"datePublished\":\"2018-11-14T01:00:33+00:00\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/d3.harvard.edu\\\/platform-rctom\\\/submission\\\/ibm-watson-for-cybersecurity-takes-center-court-at-wimbledon\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/d3.harvard.edu\\\/platform-rctom\\\/submission\\\/ibm-watson-for-cybersecurity-takes-center-court-at-wimbledon\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/d3.harvard.edu\\\/platform-rctom\\\/submission\\\/ibm-watson-for-cybersecurity-takes-center-court-at-wimbledon\\\/#primaryimage\",\"url\":\"https:\\\/\\\/d3.harvard.edu\\\/platform-rctom\\\/wp-content\\\/uploads\\\/sites\\\/4\\\/2018\\\/11\\\/How-to-Watch-Wimbledon-2017-Free-Live-Stream-Online1.jpeg\",\"contentUrl\":\"https:\\\/\\\/d3.harvard.edu\\\/platform-rctom\\\/wp-content\\\/uploads\\\/sites\\\/4\\\/2018\\\/11\\\/How-to-Watch-Wimbledon-2017-Free-Live-Stream-Online1.jpeg\",\"width\":720,\"height\":405},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/d3.harvard.edu\\\/platform-rctom\\\/submission\\\/ibm-watson-for-cybersecurity-takes-center-court-at-wimbledon\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/d3.harvard.edu\\\/platform-rctom\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Submissions\",\"item\":\"https:\\\/\\\/d3.harvard.edu\\\/platform-rctom\\\/submission\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"IBM Watson for Cybersecurity Takes Center Court at Wimbledon!\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/d3.harvard.edu\\\/platform-rctom\\\/#website\",\"url\":\"https:\\\/\\\/d3.harvard.edu\\\/platform-rctom\\\/\",\"name\":\"Technology and Operations Management\",\"description\":\"MBA Student Perspectives\",\"potentialAction\":[{\"@type\":\"性视界Action\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/d3.harvard.edu\\\/platform-rctom\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"IBM Watson for Cybersecurity Takes Center Court at Wimbledon! - Technology and Operations Management","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/d3.harvard.edu\/platform-rctom\/submission\/ibm-watson-for-cybersecurity-takes-center-court-at-wimbledon\/","og_locale":"en_US","og_type":"article","og_title":"IBM Watson for Cybersecurity Takes Center Court at Wimbledon! - Technology and Operations Management","og_description":"141-year-old tennis tournament \u2013 The Championships, Wimbledon utilizes IBM Watson to protect their brand against increasing risk of cybercrime.","og_url":"https:\/\/d3.harvard.edu\/platform-rctom\/submission\/ibm-watson-for-cybersecurity-takes-center-court-at-wimbledon\/","og_site_name":"Technology and Operations Management","og_image":[{"width":720,"height":405,"url":"https:\/\/d3.harvard.edu\/platform-rctom\/wp-content\/uploads\/sites\/4\/2018\/11\/How-to-Watch-Wimbledon-2017-Free-Live-Stream-Online1.jpeg","type":"image\/jpeg"}],"twitter_card":"summary_large_image","twitter_misc":{"Est. reading time":"5 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/d3.harvard.edu\/platform-rctom\/submission\/ibm-watson-for-cybersecurity-takes-center-court-at-wimbledon\/","url":"https:\/\/d3.harvard.edu\/platform-rctom\/submission\/ibm-watson-for-cybersecurity-takes-center-court-at-wimbledon\/","name":"IBM Watson for Cybersecurity Takes Center Court at Wimbledon! - Technology and Operations Management","isPartOf":{"@id":"https:\/\/d3.harvard.edu\/platform-rctom\/#website"},"primaryImageOfPage":{"@id":"https:\/\/d3.harvard.edu\/platform-rctom\/submission\/ibm-watson-for-cybersecurity-takes-center-court-at-wimbledon\/#primaryimage"},"image":{"@id":"https:\/\/d3.harvard.edu\/platform-rctom\/submission\/ibm-watson-for-cybersecurity-takes-center-court-at-wimbledon\/#primaryimage"},"thumbnailUrl":"https:\/\/d3.harvard.edu\/platform-rctom\/wp-content\/uploads\/sites\/4\/2018\/11\/How-to-Watch-Wimbledon-2017-Free-Live-Stream-Online1.jpeg","datePublished":"2018-11-14T01:00:33+00:00","breadcrumb":{"@id":"https:\/\/d3.harvard.edu\/platform-rctom\/submission\/ibm-watson-for-cybersecurity-takes-center-court-at-wimbledon\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/d3.harvard.edu\/platform-rctom\/submission\/ibm-watson-for-cybersecurity-takes-center-court-at-wimbledon\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/d3.harvard.edu\/platform-rctom\/submission\/ibm-watson-for-cybersecurity-takes-center-court-at-wimbledon\/#primaryimage","url":"https:\/\/d3.harvard.edu\/platform-rctom\/wp-content\/uploads\/sites\/4\/2018\/11\/How-to-Watch-Wimbledon-2017-Free-Live-Stream-Online1.jpeg","contentUrl":"https:\/\/d3.harvard.edu\/platform-rctom\/wp-content\/uploads\/sites\/4\/2018\/11\/How-to-Watch-Wimbledon-2017-Free-Live-Stream-Online1.jpeg","width":720,"height":405},{"@type":"BreadcrumbList","@id":"https:\/\/d3.harvard.edu\/platform-rctom\/submission\/ibm-watson-for-cybersecurity-takes-center-court-at-wimbledon\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/d3.harvard.edu\/platform-rctom\/"},{"@type":"ListItem","position":2,"name":"Submissions","item":"https:\/\/d3.harvard.edu\/platform-rctom\/submission\/"},{"@type":"ListItem","position":3,"name":"IBM Watson for Cybersecurity Takes Center Court at Wimbledon!"}]},{"@type":"WebSite","@id":"https:\/\/d3.harvard.edu\/platform-rctom\/#website","url":"https:\/\/d3.harvard.edu\/platform-rctom\/","name":"Technology and Operations Management","description":"MBA Student Perspectives","potentialAction":[{"@type":"性视界Action","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/d3.harvard.edu\/platform-rctom\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"}]}},"_links":{"self":[{"href":"https:\/\/d3.harvard.edu\/platform-rctom\/wp-json\/wp\/v2\/hck-submission\/36481","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/d3.harvard.edu\/platform-rctom\/wp-json\/wp\/v2\/hck-submission"}],"about":[{"href":"https:\/\/d3.harvard.edu\/platform-rctom\/wp-json\/wp\/v2\/types\/hck-submission"}],"author":[{"embeddable":true,"href":"https:\/\/d3.harvard.edu\/platform-rctom\/wp-json\/wp\/v2\/users\/11186"}],"replies":[{"embeddable":true,"href":"https:\/\/d3.harvard.edu\/platform-rctom\/wp-json\/wp\/v2\/comments?post=36481"}],"version-history":[{"count":0,"href":"https:\/\/d3.harvard.edu\/platform-rctom\/wp-json\/wp\/v2\/hck-submission\/36481\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/d3.harvard.edu\/platform-rctom\/wp-json\/wp\/v2\/media\/36482"}],"wp:attachment":[{"href":"https:\/\/d3.harvard.edu\/platform-rctom\/wp-json\/wp\/v2\/media?parent=36481"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/d3.harvard.edu\/platform-rctom\/wp-json\/wp\/v2\/categories?post=36481"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}