{"id":36499,"date":"2017-10-13T10:50:01","date_gmt":"2017-10-13T08:50:01","guid":{"rendered":"https:\/\/www.hiig.de\/?p=36499\/"},"modified":"2023-03-28T15:31:20","modified_gmt":"2023-03-28T13:31:20","slug":"serious-games-as-a-tool-for-privacy-by-design","status":"publish","type":"post","link":"https:\/\/www.hiig.de\/en\/serious-games-as-a-tool-for-privacy-by-design\/","title":{"rendered":"Serious Games as a Tool for Privacy-by-Design"},"content":{"rendered":"<p><i><span style=\"font-weight: 400;\">In a digitised society, where individual communication is increasingly based on the processing of personal data, explaining the complexity of privacy is hardly feasible. That\u2019s why we at the Alexander von Humboldt Institute for Internet and Society (HIIG) decided to organise the \u201c<a href=\"https:\/\/www.hiig.de\/events\/game-jam-unveil-the-privacy-threat\/\">Game Jam: Unveil the Privacy Threat<\/a>\u201d in order to develop games that could exactly achieve that! <a href=\"https:\/\/www.hiig.de\/staff\/maximilian-von-grafenstein\/\">Maximilian von Grafenstein<\/a>, head of the research program \u201cGovernance of Data-Driven Innovation\u201d, presents which serious game ideas were developed for which specific educational goal. <\/span><\/i><\/p>\n<h3>Privacy in a digitised society<\/h3>\n<p>How can we explain the complexity of privacy to citizens? How can data-driven companies sensitise their employees to the privacy threats that may be caused by their behaviour? Addressing these questions is a highly difficult task because privacy does not mean not disclosing any personal information at all. A strict non-disclosure of personal information could be an effective solution. However, in a digitised society, where individual communication is increasingly based on the processing of personal data, it is hardly feasible. Privacy thus means controlling the potential risks for individuals caused by a disclosure of personal information. But these risks depend on the context in which the information will be used, and on the implementation of legal, technical and organisational measures that control such use (i.e. privacy and security by design). This is the inherent reason why attempts to explain the meaning of privacy often fail: the task seems to be too complex (and also counter-intuitive in light of our everyday behavior in a digitized world).<\/p>\n<h3>The Game Jam Idea<\/h3>\n<p>That\u2019s why we at the Alexander von Humboldt Institute for Internet and Society decided to develop games! Games can make very complex matters understandable in a playful and highly intuitive way. However, many games developed for educational purposes in privacy are rather boring. The game mechanics are often so simplistic that most people would only play them if &nbsp;they are forced to do so: Play the game or you\u2019re fired! Games like this don\u2019t achieve their actual learning goals (explaining privacy in a really playful and intuitive manner).<\/p>\n<p>In order to create games that intuitively explain the complexity of privacy to its players, we organized, as part of the research project <a href=\"https:\/\/www.hiig.de\/en\/project\/gameathon\/\">Privacy by Design in Smart Cities<\/a>, the <a href=\"https:\/\/www.hiig.de\/en\/game-jam-implementing-privacy-and-security-by-design-through-serious-games\/\">Game Jam: Unveil the Privacy Threat<\/a>, which took place last weekend in Berlin. 26 game designers, developers, privacy experts, and artists, who came from all over Europe, the Middle East and even South America, worked on six different game concepts during a two-day development marathon. All game concepts were based on three use cases, each of which were presented by a keynote speaker who is active in this field. The first speaker, Jillian York, Director of International Freedom of Expression at the Electronic Frontier Foundation gave five reasons for why this statement is wrong in her keynote \u201cI\u2019ve nothing to hide!\u201d. In her keynote \u201cOops&#8230; wrong recipient <b>?<\/b>\u201d, the second speaker, Michelle Dennedy, Vice President and Chief Privacy Officer at Cisco, illustrated how challenging it is, in globally operating data-driven companies, to sensitize employees to privacy when setting up a properly working privacy-by-design methodology. In his keynote \u201cUnravel the anonymization paradox!\u201d, the third speaker, Jonathan Fox, Director Strategy and Planning, Chief Privacy Office, Security &amp; Trust Organization at Cisco ( \u201cthe Fox\u201d for short), demonstrated the challenges of data anonymisation. All three use cases were intended to give the game jam participants an initial understanding of the many facets of privacy before they started to develop game concepts that addressed one or even all of them. Some of the game jam participants even worked through the night, supported and guided by several privacy mentors (such as by Michelle Dennedy herself)!<\/p>\n<div class=\"lyte-wrapper\" style=\"width:420px;max-width:100%;margin:5px auto;\"><div class=\"lyMe\" id=\"WYL_cHcCfuyoO8k\"><div id=\"lyte_cHcCfuyoO8k\" data-src=\"https:\/\/www.hiig.de\/wp-content\/plugins\/wp-youtube-lyte\/lyteCache.php?origThumbUrl=%2F%2Fi.ytimg.com%2Fvi%2FcHcCfuyoO8k%2Fhqdefault.jpg\" class=\"pL\"><div class=\"tC\"><div class=\"tT\"><\/div><\/div><div class=\"play\"><\/div><div class=\"ctrl\"><div class=\"Lctrl\"><\/div><div class=\"Rctrl\"><\/div><\/div><\/div><noscript><a href=\"https:\/\/youtu.be\/cHcCfuyoO8k\" rel=\"nofollow\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/www.hiig.de\/wp-content\/plugins\/wp-youtube-lyte\/lyteCache.php?origThumbUrl=https%3A%2F%2Fi.ytimg.com%2Fvi%2FcHcCfuyoO8k%2F0.jpg\" alt=\"YouTube video thumbnail\" width=\"420\" height=\"216\" \/><br \/>Watch this video on YouTube<\/a><\/noscript><\/div><\/div><div class=\"lL\" style=\"max-width:100%;width:420px;margin:5px auto;\"><\/div><\/p>\n<h3>Who&#8217;s Sherlock<\/h3>\n<p>The showdown took place on <a href=\"https:\/\/www.hiig.de\/events\/praesentation-und-preisverleihung-game-jam-unveil-the-privacy-threat\/\">Sunday evening, at 6pm<\/a>: The participants had to pitch their game concepts to a 7-person interdisciplinary expert jury: Lars Vormann from Gamescom, Nico Nowarra from Experimental Game, Meike Kamp from the Berlin Data Protection Authority, Lies van Roessel from the Hans Bredow Institute, Thomas Schildhauer from our institute, Michelle Dennedy, Jillian York, and Eva Schulz-Kamm from Siemens, who sponsored &nbsp;the prize. The winner got a weekend trip to London for the whole winning team including a visit to <a href=\"https:\/\/www.thecrystal.org\/\">The Crystal<\/a>, the world\u2019s largest exhibition on the future of (smart) cities. So, which game concepts did participants develop to explain the complexity of privacy? And who was the winner?<\/p>\n<p>The first presented game concept \u201cWho\u2019s Sherlock\u201d was a questions-and-answers game that lets its players experience how easy it is to find information about oneself and others in the internet, and how sensitive this kind of information can be in different contexts. The second game concept, \u201cPrivacy Rush\u201d, focused on the moment when an individual wants to connect with a public wifi system. Before an individual connects with the system, this browser game is loaded and appears on the screen, aiming to inform the player (i.e., the wifi user) about the privacy risks caused by an insecure connection (as well as how to better protect him or herself). The third game concept \u201cData Trade\u201d addressed the complexity of today\u2019s data economy. Taking the perspective of a data trader, this card game demonstrates how different data sets can be combined, leading to a higher price on data markets because they generate more &nbsp;information about individuals. However, this additionally generated information also leads to higher privacy risks and, therefore, the players have to constantly implement and adapt its protection in order to mitigate these risks (because a risky data is set is worth less than a safer one). The fourth game concept \u201cNothing to hide\u201d lets the game players experience that the \u201cnothing to hide\u201d argument is wrong. The fifth game concept \u201cSmart City\u201d was a simulation game targeting political decision makers who are responsible for urban development decisions. Taking the perspective of a city mayor, the game players can make their cities smarter and smarter by digitizing different public areas (the health sector becomes an ehealth sector, policing becomes predictive etc.). At the end of his or her legislative term, the player\u2019s political decisions will be measured pursuant to the future scenarios simulated in the game. The sixth game concept \u201cPieces of Data\u201d seeks to teach its players how to manage third-party access rights, i.e. by app providers, to their smartphones. Taking the perspective of an activist in a state that is becoming more and more repressive, the players learn how data collected by their smartphones can harm them, and even other parties \u2013 and how to protect themselves against such threats. Because this game was so advanced in its development, it won!<\/p>\n<p>However, all game concepts impressively demonstrated that games can serve as a highly effective tool. In a privacy-by-design framework: They\u2019re not just useful for explaining the complexity of privacy to citizens. In fact, games can even help companies to meet data protection requirements. This might be the case in the context of educating employees in data-driven companies. But it is even possible that games will ultimately support, or even substitute for, the lengthy legal texts that individuals purport to agree with by clicking on a box as part of the informed consent. Based on these experiences, we are eager to get working on making these scenarios a reality! Because this truly is effective privacy by design.<\/p>\n<div class=\"shariff shariff-align-flex-start shariff-widget-align-flex-start\"><ul class=\"shariff-buttons theme-round orientation-horizontal buttonsize-medium\"><li class=\"shariff-button linkedin shariff-nocustomcolor\" style=\"background-color:#1488bf\"><a href=\"https:\/\/www.linkedin.com\/sharing\/share-offsite\/?url=https%3A%2F%2Fwww.hiig.de%2Fen%2Fserious-games-as-a-tool-for-privacy-by-design%2F\" title=\"Share on LinkedIn\" aria-label=\"Share on LinkedIn\" role=\"button\" rel=\"noopener nofollow\" class=\"shariff-link\" style=\"; background-color:#0077b5; color:#fff\" target=\"_blank\"><span class=\"shariff-icon\" style=\"\"><svg width=\"32px\" height=\"20px\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" viewBox=\"0 0 27 32\"><path fill=\"#0077b5\" d=\"M6.2 11.2v17.7h-5.9v-17.7h5.9zM6.6 5.7q0 1.3-0.9 2.2t-2.4 0.9h0q-1.5 0-2.4-0.9t-0.9-2.2 0.9-2.2 2.4-0.9 2.4 0.9 0.9 2.2zM27.4 18.7v10.1h-5.9v-9.5q0-1.9-0.7-2.9t-2.3-1.1q-1.1 0-1.9 0.6t-1.2 1.5q-0.2 0.5-0.2 1.4v9.9h-5.9q0-7.1 0-11.6t0-5.3l0-0.9h5.9v2.6h0q0.4-0.6 0.7-1t1-0.9 1.6-0.8 2-0.3q3 0 4.9 2t1.9 6z\"\/><\/svg><\/span><\/a><\/li><li class=\"shariff-button bluesky shariff-nocustomcolor\" style=\"background-color:#84c4ff\"><a href=\"https:\/\/bsky.app\/intent\/compose?text=Serious%20Games%20as%20a%20Tool%20for%20Privacy-by-Design https%3A%2F%2Fwww.hiig.de%2Fen%2Fserious-games-as-a-tool-for-privacy-by-design%2F  via @hiigberlin.bsky.social\" title=\"Share on Bluesky\" aria-label=\"Share on Bluesky\" role=\"button\" rel=\"noopener nofollow\" class=\"shariff-link\" style=\"; background-color:#0085ff; color:#fff\" target=\"_blank\"><span class=\"shariff-icon\" style=\"\"><svg width=\"20\" height=\"20\" version=\"1.1\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" viewBox=\"0 0 20 20\"><path class=\"st0\" d=\"M4.89,3.12c2.07,1.55,4.3,4.71,5.11,6.4.82-1.69,3.04-4.84,5.11-6.4,1.49-1.12,3.91-1.99,3.91.77,0,.55-.32,4.63-.5,5.3-.64,2.3-2.99,2.89-5.08,2.54,3.65.62,4.58,2.68,2.57,4.74-3.81,3.91-5.48-.98-5.9-2.23-.08-.23-.11-.34-.12-.25,0-.09-.04.02-.12.25-.43,1.25-2.09,6.14-5.9,2.23-2.01-2.06-1.08-4.12,2.57-4.74-2.09.36-4.44-.23-5.08-2.54-.19-.66-.5-4.74-.5-5.3,0-2.76,2.42-1.89,3.91-.77h0Z\"\/><\/svg><\/span><\/a><\/li><li class=\"shariff-button mailto shariff-nocustomcolor\" style=\"background-color:#a8a8a8\"><a href=\"mailto:?body=https%3A%2F%2Fwww.hiig.de%2Fen%2Fserious-games-as-a-tool-for-privacy-by-design%2F&subject=Serious%20Games%20as%20a%20Tool%20for%20Privacy-by-Design\" title=\"Send by email\" aria-label=\"Send by email\" role=\"button\" rel=\"noopener nofollow\" class=\"shariff-link\" style=\"; background-color:#999; color:#fff\"><span class=\"shariff-icon\" style=\"\"><svg width=\"32px\" height=\"20px\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" viewBox=\"0 0 32 32\"><path fill=\"#999\" d=\"M32 12.7v14.2q0 1.2-0.8 2t-2 0.9h-26.3q-1.2 0-2-0.9t-0.8-2v-14.2q0.8 0.9 1.8 1.6 6.5 4.4 8.9 6.1 1 0.8 1.6 1.2t1.7 0.9 2 0.4h0.1q0.9 0 2-0.4t1.7-0.9 1.6-1.2q3-2.2 8.9-6.1 1-0.7 1.8-1.6zM32 7.4q0 1.4-0.9 2.7t-2.2 2.2q-6.7 4.7-8.4 5.8-0.2 0.1-0.7 0.5t-1 0.7-0.9 0.6-1.1 0.5-0.9 0.2h-0.1q-0.4 0-0.9-0.2t-1.1-0.5-0.9-0.6-1-0.7-0.7-0.5q-1.6-1.1-4.7-3.2t-3.6-2.6q-1.1-0.7-2.1-2t-1-2.5q0-1.4 0.7-2.3t2.1-0.9h26.3q1.2 0 2 0.8t0.9 2z\"\/><\/svg><\/span><\/a><\/li><\/ul><\/div>","protected":false},"excerpt":{"rendered":"<p>In a digitised society, where individual communication is increasingly based on the processing of personal data, explaining the complexity of privacy is hardly feasible. That\u2019s why we at the Alexander von Humboldt Institute for Internet and Society (HIIG) decided to organise the \u201cGame Jam: Unveil the Privacy Threat\u201d in order to develop games that could&hellip;<\/p>\n","protected":false},"author":39,"featured_media":36171,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[1581,223],"tags":[],"class_list":["post-36499","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-ftif-digital-future-work","category-innovation-and-work"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v26.6 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Serious Games as a Tool for Privacy-by-Design &#8211; Digital Society Blog<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.hiig.de\/en\/serious-games-as-a-tool-for-privacy-by-design\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Serious Games as a Tool for Privacy-by-Design &#8211; Digital Society Blog\" \/>\n<meta property=\"og:description\" content=\"In a digitised society, where individual communication is increasingly based on the processing of personal data, explaining the complexity of privacy is hardly feasible. That\u2019s why we at the Alexander von Humboldt Institute for Internet and Society (HIIG) decided to organise the \u201cGame Jam: Unveil the Privacy Threat\u201d in order to develop games that could&hellip;\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.hiig.de\/en\/serious-games-as-a-tool-for-privacy-by-design\/\" \/>\n<meta property=\"og:site_name\" content=\"HIIG\" \/>\n<meta property=\"article:published_time\" content=\"2017-10-13T08:50:01+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2023-03-28T13:31:20+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.hiig.de\/wp-content\/uploads\/2017\/09\/GameJam_16-9-Verkehr.png\" \/>\n\t<meta property=\"og:image:width\" content=\"1600\" \/>\n\t<meta property=\"og:image:height\" content=\"900\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Max von Grafenstein\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Max von Grafenstein\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"6 minutes\" \/>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Serious Games as a Tool for Privacy-by-Design &#8211; Digital Society Blog","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.hiig.de\/en\/serious-games-as-a-tool-for-privacy-by-design\/","og_locale":"en_US","og_type":"article","og_title":"Serious Games as a Tool for Privacy-by-Design &#8211; Digital Society Blog","og_description":"In a digitised society, where individual communication is increasingly based on the processing of personal data, explaining the complexity of privacy is hardly feasible. That\u2019s why we at the Alexander von Humboldt Institute for Internet and Society (HIIG) decided to organise the \u201cGame Jam: Unveil the Privacy Threat\u201d in order to develop games that could&hellip;","og_url":"https:\/\/www.hiig.de\/en\/serious-games-as-a-tool-for-privacy-by-design\/","og_site_name":"HIIG","article_published_time":"2017-10-13T08:50:01+00:00","article_modified_time":"2023-03-28T13:31:20+00:00","og_image":[{"width":1600,"height":900,"url":"https:\/\/www.hiig.de\/wp-content\/uploads\/2017\/09\/GameJam_16-9-Verkehr.png","type":"image\/png"}],"author":"Max von Grafenstein","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Max von Grafenstein","Est. reading time":"6 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.hiig.de\/en\/serious-games-as-a-tool-for-privacy-by-design\/#article","isPartOf":{"@id":"https:\/\/www.hiig.de\/en\/serious-games-as-a-tool-for-privacy-by-design\/"},"author":{"name":"Max von Grafenstein","@id":"https:\/\/www.hiig.de\/#\/schema\/person\/149b9fb7ac77e370bbac8689b7110527"},"headline":"Serious Games as a Tool for Privacy-by-Design","datePublished":"2017-10-13T08:50:01+00:00","dateModified":"2023-03-28T13:31:20+00:00","mainEntityOfPage":{"@id":"https:\/\/www.hiig.de\/en\/serious-games-as-a-tool-for-privacy-by-design\/"},"wordCount":1237,"publisher":{"@id":"https:\/\/www.hiig.de\/#organization"},"image":{"@id":"https:\/\/www.hiig.de\/en\/serious-games-as-a-tool-for-privacy-by-design\/#primaryimage"},"thumbnailUrl":"https:\/\/www.hiig.de\/wp-content\/uploads\/2023\/12\/post_generic.png","articleSection":["ftif Digital Future of Work","Innovation and Work"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.hiig.de\/en\/serious-games-as-a-tool-for-privacy-by-design\/","url":"https:\/\/www.hiig.de\/en\/serious-games-as-a-tool-for-privacy-by-design\/","name":"Serious Games as a Tool for Privacy-by-Design &#8211; Digital Society Blog","isPartOf":{"@id":"https:\/\/www.hiig.de\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.hiig.de\/en\/serious-games-as-a-tool-for-privacy-by-design\/#primaryimage"},"image":{"@id":"https:\/\/www.hiig.de\/en\/serious-games-as-a-tool-for-privacy-by-design\/#primaryimage"},"thumbnailUrl":"https:\/\/www.hiig.de\/wp-content\/uploads\/2023\/12\/post_generic.png","datePublished":"2017-10-13T08:50:01+00:00","dateModified":"2023-03-28T13:31:20+00:00","breadcrumb":{"@id":"https:\/\/www.hiig.de\/en\/serious-games-as-a-tool-for-privacy-by-design\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.hiig.de\/en\/serious-games-as-a-tool-for-privacy-by-design\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.hiig.de\/en\/serious-games-as-a-tool-for-privacy-by-design\/#primaryimage","url":"https:\/\/www.hiig.de\/wp-content\/uploads\/2023\/12\/post_generic.png","contentUrl":"https:\/\/www.hiig.de\/wp-content\/uploads\/2023\/12\/post_generic.png","width":1600,"height":900},{"@type":"BreadcrumbList","@id":"https:\/\/www.hiig.de\/en\/serious-games-as-a-tool-for-privacy-by-design\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.hiig.de\/en\/"},{"@type":"ListItem","position":2,"name":"Serious Games as a Tool for Privacy-by-Design"}]},{"@type":"WebSite","@id":"https:\/\/www.hiig.de\/#website","url":"https:\/\/www.hiig.de\/","name":"HIIG","description":"Alexander von Humboldt Institute for Internet and Society","publisher":{"@id":"https:\/\/www.hiig.de\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.hiig.de\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.hiig.de\/#organization","name":"HIIG","url":"https:\/\/www.hiig.de\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.hiig.de\/#\/schema\/logo\/image\/","url":"https:\/\/www.hiig.de\/wp-content\/uploads\/2019\/06\/hiig.png","contentUrl":"https:\/\/www.hiig.de\/wp-content\/uploads\/2019\/06\/hiig.png","width":320,"height":80,"caption":"HIIG"},"image":{"@id":"https:\/\/www.hiig.de\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.hiig.de\/#\/schema\/person\/149b9fb7ac77e370bbac8689b7110527","name":"Max von Grafenstein"}]}},"_links":{"self":[{"href":"https:\/\/www.hiig.de\/en\/wp-json\/wp\/v2\/posts\/36499","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.hiig.de\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.hiig.de\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.hiig.de\/en\/wp-json\/wp\/v2\/users\/39"}],"replies":[{"embeddable":true,"href":"https:\/\/www.hiig.de\/en\/wp-json\/wp\/v2\/comments?post=36499"}],"version-history":[{"count":6,"href":"https:\/\/www.hiig.de\/en\/wp-json\/wp\/v2\/posts\/36499\/revisions"}],"predecessor-version":[{"id":74469,"href":"https:\/\/www.hiig.de\/en\/wp-json\/wp\/v2\/posts\/36499\/revisions\/74469"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.hiig.de\/en\/wp-json\/wp\/v2\/media\/36171"}],"wp:attachment":[{"href":"https:\/\/www.hiig.de\/en\/wp-json\/wp\/v2\/media?parent=36499"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.hiig.de\/en\/wp-json\/wp\/v2\/categories?post=36499"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.hiig.de\/en\/wp-json\/wp\/v2\/tags?post=36499"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}