{"id":850,"date":"2022-08-09T13:26:41","date_gmt":"2022-08-09T13:26:41","guid":{"rendered":"http:\/\/65.109.236.43\/?p=850"},"modified":"2024-05-30T06:02:05","modified_gmt":"2024-05-30T06:02:05","slug":"between-the-layers-of-technophoria-and-technophobia","status":"publish","type":"post","link":"https:\/\/appsco.com\/public\/between-the-layers-of-technophoria-and-technophobia\/","title":{"rendered":"Between the layers of technophoria and technophobia"},"content":{"rendered":"<div class=\"fusion-fullwidth fullwidth-box fusion-builder-row-1 fusion-flex-container nonhundred-percent-fullwidth non-hundred-percent-height-scrolling\" style=\"--awb-border-radius-top-left:0px;--awb-border-radius-top-right:0px;--awb-border-radius-bottom-right:0px;--awb-border-radius-bottom-left:0px;--awb-flex-wrap:wrap;\" ><div class=\"fusion-builder-row fusion-row fusion-flex-align-items-flex-start fusion-flex-justify-content-center fusion-flex-content-wrap\" style=\"max-width:1248px;margin-left: calc(-4% \/ 2 );margin-right: calc(-4% \/ 2 );\"><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-0 fusion_builder_column_1_1 1_1 fusion-flex-column\" style=\"--awb-bg-size:cover;--awb-width-large:100%;--awb-margin-top-large:0px;--awb-spacing-right-large:1.92%;--awb-margin-bottom-large:0px;--awb-spacing-left-large:1.92%;--awb-width-medium:100%;--awb-order-medium:0;--awb-spacing-right-medium:1.92%;--awb-spacing-left-medium:1.92%;--awb-width-small:100%;--awb-order-small:0;--awb-spacing-right-small:1.92%;--awb-spacing-left-small:1.92%;\"><div class=\"fusion-column-wrapper fusion-column-has-shadow fusion-flex-justify-content-flex-start fusion-content-layout-column\"><div class=\"fusion-text fusion-text-1\"><p id=\"92b0\" class=\"pw-post-body-paragraph lt lu fo lv b lw lx ly lz ma mb mc md me mf mg mh mi mj mk ml mm mn mo mp mq fh bj nh\" data-selectable-paragraph=\"\">ven if you are not living in Copenhagen, Tokyo, Singapore, or any other smart city leading in the adoption of IoT solutions, you have probably become well aware of the new, everpresent buzz phrase \u2014\u00a0<em class=\"nq\">digital transformation<\/em>. The exciting opportunities in the growingly interconnected world are the locus of digital enthusiasts, public bodies, corporations and startups, which all rush to transform and take their position in the technology race. Automatization tools, artificial intelligence, IoT, smart solutions, robotics, and bioengineering come with a promise of a better tomorrow and a seamless and more efficient environment.<\/p>\n<p id=\"0e61\" class=\"pw-post-body-paragraph lt lu fo lv b lw lx ly lz ma mb mc md me mf mg mh mi mj mk ml mm mn mo mp mq fh bj\" data-selectable-paragraph=\"\">However, on the wave of technophoria, all these ambitious technological visions and initiatives come hand in hand with\u00a0<a class=\"af nr\" href=\"https:\/\/www.forbes.com\/sites\/forbestechcouncil\/2018\/10\/24\/the-internet-of-things-is-becoming-the-internet-of-threats\/#5468052f38d0\" target=\"_blank\" rel=\"noopener ugc nofollow\">intimidating threats<\/a>. The digital systems designed to control and coordinate our power supply, traffic, personal and health data etc. will definitely be the future most vulnerable points, open to misusage and alarming hacker attacks.<\/p>\n<figure class=\"mu mv mw mx my mz mr ms paragraph-image\"><\/figure>\n<\/div><div class=\"fusion-text fusion-text-2\"><blockquote>\n<p>There is a looming feeling that progressive pace of technology adoption is not adequately preceded by needed security measures and standardization of processes on a larger scale.<\/p>\n<\/blockquote>\n<\/div><div class=\"fusion-image-element awb-imageframe-style awb-imageframe-style-below awb-imageframe-style-1\" style=\"text-align:center;--awb-margin-top:50px;--awb-margin-bottom:30px;--awb-caption-text-size:var(--awb-typography5-font-size);--awb-caption-text-transform:var(--awb-typography5-text-transform);--awb-caption-text-line-height:var(--awb-typography5-line-height);--awb-caption-text-letter-spacing:var(--awb-typography5-letter-spacing);--awb-caption-margin-top:20px;--awb-caption-margin-bottom:40px;--awb-caption-title-font-family:var(--awb-typography5-font-family);--awb-caption-title-font-weight:var(--awb-typography5-font-weight);--awb-caption-title-font-style:var(--awb-typography5-font-style);--awb-caption-title-size:var(--awb-typography5-font-size);--awb-caption-title-transform:var(--awb-typography5-text-transform);--awb-caption-title-line-height:var(--awb-typography5-line-height);--awb-caption-title-letter-spacing:var(--awb-typography5-letter-spacing);--awb-caption-text-font-family:var(--awb-typography5-font-family);--awb-caption-text-font-weight:var(--awb-typography5-font-weight);--awb-caption-text-font-style:var(--awb-typography5-font-style);\"><span class=\" fusion-imageframe imageframe-none imageframe-1 hover-type-none\"><img decoding=\"async\" width=\"1920\" height=\"1005\" alt=\"banner-15\" title=\"Group working\" src=\"data:image\/svg+xml,%3Csvg%20xmlns%3D%27http%3A%2F%2Fwww.w3.org%2F2000%2Fsvg%27%20width%3D%271920%27%20height%3D%271005%27%20viewBox%3D%270%200%201920%201005%27%3E%3Crect%20width%3D%271920%27%20height%3D%271005%27%20fill-opacity%3D%220%22%2F%3E%3C%2Fsvg%3E\" data-orig-src=\"https:\/\/appsco.com\/public\/wp-content\/uploads\/2022\/08\/banner-15.jpg\" class=\"lazyload img-responsive wp-image-478\"\/><\/span><div class=\"awb-imageframe-caption-container\"><div class=\"awb-imageframe-caption\"><h2 class=\"awb-imageframe-caption-title\">Our amazing team is always hard at work<\/h2><\/div><\/div><\/div><div class=\"fusion-text fusion-text-3 fusion-text-no-margin\" style=\"--awb-margin-bottom:80px;\"><p id=\"1086\" class=\"pw-post-body-paragraph lt lu fo lv b lw lx ly lz ma mb mc md me mf mg mh mi mj mk ml mm mn mo mp mq fh bj\" data-selectable-paragraph=\"\">On one hand, what the recently launched General Data Protection Regulation showed us is that large systems will face huge problems with the transformation of their business processes if they want to provide users with maximum safety in digital space. On the other hand, what Cambridge Analytica scandal reminded us of is that because of the everlasting desire for profit, unscrupulous corporations will not hesitate to perform serious law violations and abuse the users\u2019 personal data. Powerful software programmes can and will be made to target users based on information available through various digital platforms. What this case also showed us is that the current justice system, even in the highly developed countries, can\u2019t meet these challenges due to the low level of understanding of the technologies in question and the way they actually work.<\/p>\n<p id=\"21f2\" class=\"pw-post-body-paragraph lt lu fo lv b lw lx ly lz ma mb mc md me mf mg mh mi mj mk ml mm mn mo mp mq fh bj\" data-selectable-paragraph=\"\">As predicted in some dystopian novels of the past, we are living the reality of alternative facts,\u00a0<a class=\"af nr\" href=\"http:\/\/fortune.com\/2018\/10\/28\/in-china-facial-recognition-tech-is-watching-you\/\" target=\"_blank\" rel=\"noopener ugc nofollow\">face recognition<\/a>, video manipulation, and privacy invasion. Thus, the flipside of progressive tech adoption comes in the form of fears and phobias from the same technologies that were designed to serve the higher purposes.<\/p>\n<\/div><div class=\"fusion-text fusion-text-4\"><blockquote>\n<p>The problem is not how and why digital tools and platforms were created, the problem is what they have since become.<\/p>\n<\/blockquote>\n<\/div><div class=\"fusion-text fusion-text-5 fusion-text-no-margin\" style=\"--awb-margin-bottom:80px;\"><p id=\"1086\" class=\"pw-post-body-paragraph lt lu fo lv b lw lx ly lz ma mb mc md me mf mg mh mi mj mk ml mm mn mo mp mq fh bj\" data-selectable-paragraph=\"\">Moreover, these two conflicting sides of technological progress also point out to the huge gap between those who are digitally savvy and those who are digitally illiterate and unaware of the threats hiding in the digital space. And putting the burden of IT-responsible behavior and protection on the individual would not only be unfair but also downright unsustainable. We do want to live in the world where people have more control of what is happening around them in digital space, but the resources needed to reach this goal have to come from all stakeholders in the process.<\/p>\n<\/div><div class=\"fusion-title title fusion-title-1 fusion-sep-none fusion-title-text fusion-title-size-four\" style=\"--awb-margin-bottom:30px;\"><h4 class=\"fusion-title-heading title-heading-left\" style=\"margin:0;\">Taming the technology beasts<\/h4><\/div><div class=\"fusion-text fusion-text-6 fusion-text-no-margin\" style=\"--awb-margin-bottom:80px;\"><p id=\"478a\" class=\"pw-post-body-paragraph lt lu fo lv b lw ow ly lz ma ox mc md me oy mg mh mi oz mk ml mm pa mo mp mq fh bj\" data-selectable-paragraph=\"\">As we have witnessed, GDPR initiative was a heavenly idea for user protection, but in practice, its implementation pointed out to complex problems facing companies and institutions. Exactly these problems underline the need to open more debates, to define more regulations and to reverse the whole process in general.<\/p>\n<blockquote class=\"ns nt nu\">\n<p id=\"4af6\" class=\"lt lu nq lv b lw lx ly lz ma mb mc md nv mf mg mh nw mj mk ml nx mn mo mp mq fh bj\" data-selectable-paragraph=\"\">Security issues should not be faced when the problems occur, security issues have to be predicted and prevented well in advance.<\/p>\n<\/blockquote>\n<p id=\"be07\" class=\"pw-post-body-paragraph lt lu fo lv b lw lx ly lz ma mb mc md me mf mg mh mi mj mk ml mm mn mo mp mq fh bj\" data-selectable-paragraph=\"\">Even the high-level leaders recognize these problems. Elon Musk constantly points out to the potential threats of Artificial Intelligence, comparing their power to a nuclear weapon. The creator of the World Wide Web, Tim Berners-Lee, openly expresses his disappointment with current tech giants: \u201c<em class=\"nq\">I am disappointed with the current state of the web. We have lost the feeling of individual empowerment and to a certain extent also I think the optimism has cracked.\u201d<\/em><\/p>\n<p id=\"370a\" class=\"pw-post-body-paragraph lt lu fo lv b lw lx ly lz ma mb mc md me mf mg mh mi mj mk ml mm mn mo mp mq fh bj\" data-selectable-paragraph=\"\"><em class=\"nq\">Read:\u00a0<\/em><a class=\"af nr\" href=\"https:\/\/www.investopedia.com\/news\/world-wide-web-inventor-thinks-tech-giants-need-be-broken\/\" target=\"_blank\" rel=\"noopener ugc nofollow\"><em class=\"nq\">The World Wide Web Inventor Thinks Tech Giants Need to Be Broken Up<\/em><\/a><\/p>\n<p id=\"9431\" class=\"pw-post-body-paragraph lt lu fo lv b lw lx ly lz ma mb mc md me mf mg mh mi mj mk ml mm mn mo mp mq fh bj\" data-selectable-paragraph=\"\">Mr. Berners-Lee is now trying to offer an alternative for the current form of social media platforms, which would provide users with more access and identification control and the way their data is being manipulated with.<\/p>\n<p id=\"3fbe\" class=\"pw-post-body-paragraph lt lu fo lv b lw lx ly lz ma mb mc md me mf mg mh mi mj mk ml mm mn mo mp mq fh bj\" data-selectable-paragraph=\"\">Whatever stance we may take on all these issues, the optimistic or the pessimistic one, we all hold the responsibility to address these topics before it\u2019s too late. Taming the tech beasts needs to come in a form of collective efforts.<\/p>\n<blockquote class=\"ns nt nu\">\n<p id=\"5839\" class=\"lt lu nq lv b lw lx ly lz ma mb mc md nv mf mg mh nw mj mk ml nx mn mo mp mq fh bj\" data-selectable-paragraph=\"\">We all need conversation, education, regulation, and standardization of the technologies implemented. We individuals, we small and medium companies, we corporations and, most importantly, we governments. All stakeholders need to join this ride.<\/p>\n<\/blockquote>\n<p id=\"562d\" class=\"pw-post-body-paragraph lt lu fo lv b lw lx ly lz ma mb mc md me mf mg mh mi mj mk ml mm mn mo mp mq fh bj\" data-selectable-paragraph=\"\">The process has to be reversed and all necessary security layers need to be placed in the very foundation of digital tools and platforms before they are launched. To be able to allow all individuals to be in power of their own data, we have to turn to access control solutions, tools for decentralization, blockchain systems, and AI security layers, both from privacy and security standpoint.<\/p>\n<p id=\"5ae1\" class=\"pw-post-body-paragraph lt lu fo lv b lw lx ly lz ma mb mc md me mf mg mh mi mj mk ml mm mn mo mp mq fh bj\" data-selectable-paragraph=\"\">In these efforts, huge players need to lead by example. Governments and corporations hold an enormous responsibility to put a strong focus on security and data protection to prevent consequences that would affect the individual but also the society in general. Their readiness to learn and implement necessary security tools and regulations will be of crucial importance in the future.<\/p>\n<p id=\"71fe\" class=\"pw-post-body-paragraph lt lu fo lv b lw lx ly lz ma mb mc md me mf mg mh mi mj mk ml mm mn mo mp mq fh bj\" data-selectable-paragraph=\"\">However, all stakeholders need to do the same, at least by opening these discussions and putting the pressure of public bodies to do the same. Just to make sure that we don\u2019t get outsmarted by the very smart technologies we are so willingly embracing.<\/p>\n<\/div><\/div><\/div><\/div><\/div>\n","protected":false},"excerpt":{"rendered":"<p>Sed porttitor lectus nibh. Nulla quis lorem ut libero malesuada feugiat.<\/p>\n","protected":false},"author":2,"featured_media":4502,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[2],"tags":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v21.1 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Between the layers of technophoria and technophobia - AppsCo<\/title>\n<meta name=\"description\" content=\"Uncover the double-edged nature of technology, from its potential for transformation to the risks of cyber threats and privacy invasion. Explore the need for proactive security, regulations, and collective action in the digital realm. Join the conversation on securing a safer, empowered tech future.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/appsco.com\/public\/between-the-layers-of-technophoria-and-technophobia\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Between the layers of technophoria and technophobia - AppsCo\" \/>\n<meta property=\"og:description\" content=\"Uncover the double-edged nature of technology, from its potential for transformation to the risks of cyber threats and privacy invasion. Explore the need for proactive security, regulations, and collective action in the digital realm. Join the conversation on securing a safer, empowered tech future.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/appsco.com\/public\/between-the-layers-of-technophoria-and-technophobia\/\" \/>\n<meta property=\"og:site_name\" content=\"AppsCo\" \/>\n<meta property=\"article:published_time\" content=\"2022-08-09T13:26:41+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2024-05-30T06:02:05+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/appsco.com\/public\/wp-content\/uploads\/2022\/08\/1__AtncGX8_6TsjfIDOkDpGw.webp\" \/>\n\t<meta property=\"og:image:width\" content=\"643\" \/>\n\t<meta property=\"og:image:height\" content=\"346\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/webp\" \/>\n<meta name=\"author\" content=\"Katarina Dimitrijevic\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Katarina Dimitrijevic\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"6 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/appsco.com\/public\/between-the-layers-of-technophoria-and-technophobia\/\",\"url\":\"https:\/\/appsco.com\/public\/between-the-layers-of-technophoria-and-technophobia\/\",\"name\":\"Between the layers of technophoria and technophobia - AppsCo\",\"isPartOf\":{\"@id\":\"https:\/\/appsco.com\/public\/#website\"},\"datePublished\":\"2022-08-09T13:26:41+00:00\",\"dateModified\":\"2024-05-30T06:02:05+00:00\",\"author\":{\"@id\":\"https:\/\/appsco.com\/public\/#\/schema\/person\/7b9a4b050469720e415e3aa33d4fc03d\"},\"description\":\"Uncover the double-edged nature of technology, from its potential for transformation to the risks of cyber threats and privacy invasion. Explore the need for proactive security, regulations, and collective action in the digital realm. Join the conversation on securing a safer, empowered tech future.\",\"breadcrumb\":{\"@id\":\"https:\/\/appsco.com\/public\/between-the-layers-of-technophoria-and-technophobia\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/appsco.com\/public\/between-the-layers-of-technophoria-and-technophobia\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/appsco.com\/public\/between-the-layers-of-technophoria-and-technophobia\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/appsco.com\/public\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Between the layers of technophoria and technophobia\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/appsco.com\/public\/#website\",\"url\":\"https:\/\/appsco.com\/public\/\",\"name\":\"Appsco\",\"description\":\"Reduce the Manual Work\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/appsco.com\/public\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\/\/appsco.com\/public\/#\/schema\/person\/7b9a4b050469720e415e3aa33d4fc03d\",\"name\":\"Katarina Dimitrijevic\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/appsco.com\/public\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/41139c4d24b3db26644d977b0a8595b8?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/41139c4d24b3db26644d977b0a8595b8?s=96&d=mm&r=g\",\"caption\":\"Katarina Dimitrijevic\"},\"url\":\"https:\/\/appsco.com\/public\/author\/katarina-dimitrijevic\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Between the layers of technophoria and technophobia - AppsCo","description":"Uncover the double-edged nature of technology, from its potential for transformation to the risks of cyber threats and privacy invasion. Explore the need for proactive security, regulations, and collective action in the digital realm. Join the conversation on securing a safer, empowered tech future.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/appsco.com\/public\/between-the-layers-of-technophoria-and-technophobia\/","og_locale":"en_US","og_type":"article","og_title":"Between the layers of technophoria and technophobia - AppsCo","og_description":"Uncover the double-edged nature of technology, from its potential for transformation to the risks of cyber threats and privacy invasion. Explore the need for proactive security, regulations, and collective action in the digital realm. Join the conversation on securing a safer, empowered tech future.","og_url":"https:\/\/appsco.com\/public\/between-the-layers-of-technophoria-and-technophobia\/","og_site_name":"AppsCo","article_published_time":"2022-08-09T13:26:41+00:00","article_modified_time":"2024-05-30T06:02:05+00:00","og_image":[{"width":643,"height":346,"url":"https:\/\/appsco.com\/public\/wp-content\/uploads\/2022\/08\/1__AtncGX8_6TsjfIDOkDpGw.webp","type":"image\/webp"}],"author":"Katarina Dimitrijevic","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Katarina Dimitrijevic","Est. reading time":"6 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/appsco.com\/public\/between-the-layers-of-technophoria-and-technophobia\/","url":"https:\/\/appsco.com\/public\/between-the-layers-of-technophoria-and-technophobia\/","name":"Between the layers of technophoria and technophobia - AppsCo","isPartOf":{"@id":"https:\/\/appsco.com\/public\/#website"},"datePublished":"2022-08-09T13:26:41+00:00","dateModified":"2024-05-30T06:02:05+00:00","author":{"@id":"https:\/\/appsco.com\/public\/#\/schema\/person\/7b9a4b050469720e415e3aa33d4fc03d"},"description":"Uncover the double-edged nature of technology, from its potential for transformation to the risks of cyber threats and privacy invasion. Explore the need for proactive security, regulations, and collective action in the digital realm. Join the conversation on securing a safer, empowered tech future.","breadcrumb":{"@id":"https:\/\/appsco.com\/public\/between-the-layers-of-technophoria-and-technophobia\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/appsco.com\/public\/between-the-layers-of-technophoria-and-technophobia\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/appsco.com\/public\/between-the-layers-of-technophoria-and-technophobia\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/appsco.com\/public\/"},{"@type":"ListItem","position":2,"name":"Between the layers of technophoria and technophobia"}]},{"@type":"WebSite","@id":"https:\/\/appsco.com\/public\/#website","url":"https:\/\/appsco.com\/public\/","name":"Appsco","description":"Reduce the Manual Work","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/appsco.com\/public\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/appsco.com\/public\/#\/schema\/person\/7b9a4b050469720e415e3aa33d4fc03d","name":"Katarina Dimitrijevic","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/appsco.com\/public\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/41139c4d24b3db26644d977b0a8595b8?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/41139c4d24b3db26644d977b0a8595b8?s=96&d=mm&r=g","caption":"Katarina Dimitrijevic"},"url":"https:\/\/appsco.com\/public\/author\/katarina-dimitrijevic\/"}]}},"_links":{"self":[{"href":"https:\/\/appsco.com\/public\/wp-json\/wp\/v2\/posts\/850"}],"collection":[{"href":"https:\/\/appsco.com\/public\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/appsco.com\/public\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/appsco.com\/public\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/appsco.com\/public\/wp-json\/wp\/v2\/comments?post=850"}],"version-history":[{"count":2,"href":"https:\/\/appsco.com\/public\/wp-json\/wp\/v2\/posts\/850\/revisions"}],"predecessor-version":[{"id":4501,"href":"https:\/\/appsco.com\/public\/wp-json\/wp\/v2\/posts\/850\/revisions\/4501"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/appsco.com\/public\/wp-json\/wp\/v2\/media\/4502"}],"wp:attachment":[{"href":"https:\/\/appsco.com\/public\/wp-json\/wp\/v2\/media?parent=850"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/appsco.com\/public\/wp-json\/wp\/v2\/categories?post=850"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/appsco.com\/public\/wp-json\/wp\/v2\/tags?post=850"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}