{"id":96317,"date":"2023-08-16T14:21:54","date_gmt":"2023-08-16T12:21:54","guid":{"rendered":"https:\/\/www.hiig.de\/?p=96317"},"modified":"2024-07-12T13:42:34","modified_gmt":"2024-07-12T11:42:34","slug":"the-consent-fallacy","status":"publish","type":"post","link":"https:\/\/www.hiig.de\/en\/the-consent-fallacy\/","title":{"rendered":"The Consent Fallacy"},"content":{"rendered":"\n<p><strong>Humans are not the rational cost-benefit analysis machines that law and economy often wants them to be. Still, when fundamental rights like self-determination are at stake, it is up to you to make the right choices. Our brains are fallible and there is no legal safety net. Do we need better protection? Are legislators asking too much by relying on our consent?<\/strong><\/p>\n\n\n\n<h3 class=\"wp-block-heading\"><strong>Introduction<\/strong><\/h3>\n\n\n\n<p>The often cited <a href=\"https:\/\/www.hiig.de\/en\/privacy-paradox\/\" target=\"_blank\" rel=\"noreferrer noopener\">Privacy Paradox<\/a> describes how people happily share \u2013 even sensitive \u2013 data despite great concerns for their privacy. But how paradoxical is this behaviour really? Existing European legislation on the processing of personal data builds its steadfast barrier against exploitation and harm on the consent of the individual. However, depending on the level of potential risk involved, letting citizens decide for their own good is not necessarily the norm in other areas of life. Drugs are subject to prohibitions and age restrictions, poisonous food ingredients and pesticides are banned, and it is not up to your mood whether you would like to wear a seat belt. Can consumers carry the burden of choice? Or did we in the protection of human rights fall prey to a consent fallacy?<\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>Attention, economy!<\/strong><\/h2>\n\n\n\n<p>Meet the ad-based business model. The attention economy offers &#8216;free&#8217; digital services in exchange for cognitive real estate. Only when we pay attention to ads \u2013 or better even click on them \u2013 advertisers get a return on their investment. For that reason, platforms are incentivised to optimise their platforms for user engagement \u2013 and to collect and provide detailed metrics on user behaviour to their customers. These clusters of data range from people living in a certain area, over having a certain hobby, to even having similar, deeply rooted fears. It is no secret, and users consent to these conditions \u2013 usually, without fully grasping the trade-off.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>The ultimate euphemism<\/strong><\/h2>\n\n\n\n<p>Engagement orientation sounds great at first glance. It implies relevant and entertaining content, personalised to your taste. But what makes us engage? Essentially, it boils down to what <em>attention<\/em> actually is and why we pay it to what. Attention as a capacity for selective information processing as well as \u201apresence of mind\u2018 (Franck, 2019) in its core is an evolution-driven mechanism to preserve our precious energy levels. Besides and because of that, it is a deeply rooted survival feature to make us focus on threats (Davenport &amp; Beck, 2001): those who unswervingly admired the flower in front of them while a lion approached its easy dinner ultimately did not pass on their genes. So, what grabs our attention the most is likely fear-inducing, extreme, new, threatening, or loud. Carefully think through how this may influence online content.&nbsp;<\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>Feel free to inform yourself<\/strong><\/h2>\n\n\n\n<p>You might ask yourself: Why aren&#8217;t we legally protected against such practices? We as users choose not to be \u2013 some of us every single day anew. Consent, in the sense of EU data protection laws, shall be informed and voluntary. Presumably, we are being informed by multiple page long privacy statements before we use a digital service. But this systematic information overload does not inform us in the true meaning of the norm, providing a <a href=\"https:\/\/arxiv.org\/abs\/1802.07810\" target=\"_blank\" rel=\"noreferrer noopener\">false sense of justification<\/a> (Poursabzi-Sangdeh et al., 2021). The term &#8216;cookie&#8217; presents a wonderful metaphor for an action you cannot resist despite being somewhat aware of its potentially negative consequences. How voluntary do we consent to the processing of our data in light of our brain&#8217;s &#8216;energy-efficient&#8217; state when we mindlessly scroll through engagement-driven feeds? Digital service providers ubiquitously utilise dark design patterns (Weinzierl, 2020) like colour contrasts and persuasive language (Martini, 2022; Ruschemeier, 2020), making an effort to trick our lazy brains into choosing the easy <a href=\"https:\/\/www.datagrail.io\/blog\/data-privacy\/opt-out-and-opt-in-consent-explained\/\" target=\"_blank\" rel=\"noreferrer noopener\">opt-i(o)n<\/a>.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>Consent without consensus<\/strong><\/h2>\n\n\n\n<p>Despite all of this, being able to freely and independently arrange one\u2019s private legal relationships sounds fair \u2013 and is essentially what German law means with its constitutionally protected \u201ainformational self-determination\u2018 (R\u00fcthers &amp; Stadler, 2014). Is it fair though? For proper consent-giving, the GDPR demands the absence of clear imbalances in the parties\u2019 power relationship (Stemmer, 2022). In a society that is socially and professionally to a large extent dependent on social networks, doubts might be raised. No law states that you have to have a bank account, but to participate in modern society, you are forced to have one. Social factors like the fear of missing out (Wildt, 2015), rooted in a deep desire for belonging to social groups, leading to conformity, do not seem to be part of the legislators\u2019 consideration. Also, social media addiction is no recent discovery (Alter, 2017; Fogg, 2003). Just search for \u201a<a href=\"https:\/\/helpfulprofessor.com\/intermittent-reinforcement-examples\/\" target=\"_blank\" rel=\"noreferrer noopener\">intermittent variable reinforcement<\/a>\u2018 and reflect whether this effect feels eerily resounding to you in the context of your daily platform usage. The crux of an addiction \u2013 no matter how severe \u2013 lies in <em>involuntary<\/em> behaviours, regardless of being <em>informed<\/em> on risks.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>The burden of choice<\/strong><\/h2>\n\n\n\n<p>No decision is free from external influences. However, certainly not many decisions are as highly influenced by not only profit-oriented actors but just as well our very own fallible nature as the decision to use or not use platforms and accept or decline cookies. Legislators&nbsp;should ask themselves whether an almost conditioned click-response to service-interrupting pop-ups really represents the bulletproof protection of fundamental rights they claim it to be. Art. 8 II 1 of the Charter of Fundamental Rights through the GDPR \u2013 which is unable to counter the incentive structure of the ad-based business model \u2013 manifested in a behavioural market failure. To end this &#8220;<a href=\"https:\/\/www.commerce.senate.gov\/services\/files\/96E3A739-DC8D-45F1-87D7-EC70A368371D#%3A~%3Atext%3DIt's%20a%20race%20to%20the%20bottom%20of%20the%20brainstem%20that's%20downgrading%20humanity.%26text%3Dto%20overwhelm%20their%20weaknesses.%2CIt's%20already%20happened.\" target=\"_blank\" rel=\"noreferrer noopener\">race to the bottom of the brain stem<\/a>&#8220;, it requires a paradigm shift in EU legislation (Weinzierl, 2020), turning away from the homo oeconomicus towards a more humane \u2013 and realistic \u2013 homo empathicus.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>References<\/strong><\/h2>\n\n\n\n<p>Alter, A. (2017). <em>Irresistible &#8211; The Rise of Addictive Technology and the Business of Keeping Us Hooked<\/em>. Penguin Press, New York.<\/p>\n\n\n\n<p>Davenport, T. H., and Beck, J. C. (2001). <em>The Attention Economy<\/em>. Harvard School Press, Boston.<\/p>\n\n\n\n<p>Fogg, B. J. (2003). <em>Persuasive Technology &#8211; Using Computers to Change What We Think and Do<\/em>. Morgan Kaufmann Publishers, San Francisco.<\/p>\n\n\n\n<p>Frank, G. (2019). <em>\u00d6konomie der Aufmerksamkeit<\/em>. 12th ed., Carl Hanser Verlag, Munich.<\/p>\n\n\n\n<p>Martini, M. (2022). Art. 25 GDPR, Rn. 46a in Eds. Wolff, A., and Brink, S., BeckOK Datenschutzrecht, 40th ed., C. H. Beck Verlag, Munich.<\/p>\n\n\n\n<p>Poursabzi-Sangdeh, F. et al. (2021). <em>Manipulating and Measuring Model Interpretability<\/em>. Cornell University, arXiv:1802.07810v5 [cs:ai].<\/p>\n\n\n\n<p>Ruschemeier, H. (2020). <em>9. Speyerer Forum zur digitalen Lebenswelt: Regulierung K\u00fcnstlicher Intelligenz in der Europ\u00e4ischen Union zwischen Recht und Ethik<\/em>. NVwZ 2020, p. 447.<\/p>\n\n\n\n<p>R\u00fcthers, B., and Stadler, A. (2014). <em>Allgemeiner Teil des BGB<\/em>. 18th ed., C. H. Beck Verlag, Munich.<\/p>\n\n\n\n<p>Stemmer, B. (2022). Art. 7 GDPR in Eds. Wolff, A., and Brink, S., BeckOK Datenschutzrecht, 40th ed., C. H. Beck Verlag, Munich.<\/p>\n\n\n\n<p>Weinzierl, Q. (2020). <em>Dark Patterns als Herausforderung des Rechts<\/em>. NVwZ 2020, p. 1087.<\/p>\n\n\n\n<p>Wildt, B. T. (2015). <em>Digital Junkies &#8211; Internetabh\u00e4ngigkeit und ihre Folgen f\u00fcr uns und unsere Kinder<\/em>. Droemer Verlag, Munich.<\/p>\n<div class=\"shariff shariff-align-flex-start shariff-widget-align-flex-start\"><ul class=\"shariff-buttons theme-round orientation-horizontal buttonsize-medium\"><li class=\"shariff-button linkedin shariff-nocustomcolor\" style=\"background-color:#1488bf\"><a href=\"https:\/\/www.linkedin.com\/sharing\/share-offsite\/?url=https%3A%2F%2Fwww.hiig.de%2Fen%2Fthe-consent-fallacy%2F\" title=\"Share on LinkedIn\" aria-label=\"Share on LinkedIn\" role=\"button\" rel=\"noopener nofollow\" class=\"shariff-link\" style=\"; background-color:#0077b5; color:#fff\" target=\"_blank\"><span class=\"shariff-icon\" style=\"\"><svg width=\"32px\" height=\"20px\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" viewBox=\"0 0 27 32\"><path fill=\"#0077b5\" d=\"M6.2 11.2v17.7h-5.9v-17.7h5.9zM6.6 5.7q0 1.3-0.9 2.2t-2.4 0.9h0q-1.5 0-2.4-0.9t-0.9-2.2 0.9-2.2 2.4-0.9 2.4 0.9 0.9 2.2zM27.4 18.7v10.1h-5.9v-9.5q0-1.9-0.7-2.9t-2.3-1.1q-1.1 0-1.9 0.6t-1.2 1.5q-0.2 0.5-0.2 1.4v9.9h-5.9q0-7.1 0-11.6t0-5.3l0-0.9h5.9v2.6h0q0.4-0.6 0.7-1t1-0.9 1.6-0.8 2-0.3q3 0 4.9 2t1.9 6z\"\/><\/svg><\/span><\/a><\/li><li class=\"shariff-button bluesky shariff-nocustomcolor\" style=\"background-color:#84c4ff\"><a href=\"https:\/\/bsky.app\/intent\/compose?text=The%20Consent%20Fallacy https%3A%2F%2Fwww.hiig.de%2Fen%2Fthe-consent-fallacy%2F  via @hiigberlin.bsky.social\" title=\"Share on Bluesky\" aria-label=\"Share on Bluesky\" role=\"button\" rel=\"noopener nofollow\" class=\"shariff-link\" style=\"; background-color:#0085ff; color:#fff\" target=\"_blank\"><span class=\"shariff-icon\" style=\"\"><svg width=\"20\" height=\"20\" version=\"1.1\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" viewBox=\"0 0 20 20\"><path class=\"st0\" d=\"M4.89,3.12c2.07,1.55,4.3,4.71,5.11,6.4.82-1.69,3.04-4.84,5.11-6.4,1.49-1.12,3.91-1.99,3.91.77,0,.55-.32,4.63-.5,5.3-.64,2.3-2.99,2.89-5.08,2.54,3.65.62,4.58,2.68,2.57,4.74-3.81,3.91-5.48-.98-5.9-2.23-.08-.23-.11-.34-.12-.25,0-.09-.04.02-.12.25-.43,1.25-2.09,6.14-5.9,2.23-2.01-2.06-1.08-4.12,2.57-4.74-2.09.36-4.44-.23-5.08-2.54-.19-.66-.5-4.74-.5-5.3,0-2.76,2.42-1.89,3.91-.77h0Z\"\/><\/svg><\/span><\/a><\/li><li class=\"shariff-button mailto shariff-nocustomcolor\" style=\"background-color:#a8a8a8\"><a href=\"mailto:?body=https%3A%2F%2Fwww.hiig.de%2Fen%2Fthe-consent-fallacy%2F&subject=The%20Consent%20Fallacy\" title=\"Send by email\" aria-label=\"Send by email\" role=\"button\" rel=\"noopener nofollow\" class=\"shariff-link\" style=\"; background-color:#999; color:#fff\"><span class=\"shariff-icon\" style=\"\"><svg width=\"32px\" height=\"20px\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" viewBox=\"0 0 32 32\"><path fill=\"#999\" d=\"M32 12.7v14.2q0 1.2-0.8 2t-2 0.9h-26.3q-1.2 0-2-0.9t-0.8-2v-14.2q0.8 0.9 1.8 1.6 6.5 4.4 8.9 6.1 1 0.8 1.6 1.2t1.7 0.9 2 0.4h0.1q0.9 0 2-0.4t1.7-0.9 1.6-1.2q3-2.2 8.9-6.1 1-0.7 1.8-1.6zM32 7.4q0 1.4-0.9 2.7t-2.2 2.2q-6.7 4.7-8.4 5.8-0.2 0.1-0.7 0.5t-1 0.7-0.9 0.6-1.1 0.5-0.9 0.2h-0.1q-0.4 0-0.9-0.2t-1.1-0.5-0.9-0.6-1-0.7-0.7-0.5q-1.6-1.1-4.7-3.2t-3.6-2.6q-1.1-0.7-2.1-2t-1-2.5q0-1.4 0.7-2.3t2.1-0.9h26.3q1.2 0 2 0.8t0.9 2z\"\/><\/svg><\/span><\/a><\/li><\/ul><\/div>","protected":false},"excerpt":{"rendered":"<p>Are European data protection laws compatible with our rational capacity or lack thereof? Should the protection of fundamental rights rely on individual consent?<\/p>\n","protected":false},"author":9999998,"featured_media":96323,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[1658],"tags":[1045,1111],"class_list":["post-96317","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-ftif-data-governance-en","tag-datenschutz-2","tag-uberwachung"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v26.6 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>The Consent Fallacy &#8211; Digital Society Blog<\/title>\n<meta name=\"description\" content=\"Are EU data protection laws compatible with our rational capacity or lack thereof? Should ensuring fundamental rights rely on one&#039;s consent?\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.hiig.de\/en\/the-consent-fallacy\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"The Consent Fallacy &#8211; Digital Society Blog\" \/>\n<meta property=\"og:description\" content=\"Are EU data protection laws compatible with our rational capacity or lack thereof? Should ensuring fundamental rights rely on one&#039;s consent?\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.hiig.de\/en\/the-consent-fallacy\/\" \/>\n<meta property=\"og:site_name\" content=\"HIIG\" \/>\n<meta property=\"article:published_time\" content=\"2023-08-16T12:21:54+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2024-07-12T11:42:34+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.hiig.de\/wp-content\/uploads\/2023\/08\/Consent-Fallacy-Header-DSB.png\" \/>\n\t<meta property=\"og:image:width\" content=\"800\" \/>\n\t<meta property=\"og:image:height\" content=\"450\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Stefanie Barth\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Stefanie Barth\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"5 minutes\" \/>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"The Consent Fallacy &#8211; Digital Society Blog","description":"Are EU data protection laws compatible with our rational capacity or lack thereof? Should ensuring fundamental rights rely on one's consent?","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.hiig.de\/en\/the-consent-fallacy\/","og_locale":"en_US","og_type":"article","og_title":"The Consent Fallacy &#8211; Digital Society Blog","og_description":"Are EU data protection laws compatible with our rational capacity or lack thereof? Should ensuring fundamental rights rely on one's consent?","og_url":"https:\/\/www.hiig.de\/en\/the-consent-fallacy\/","og_site_name":"HIIG","article_published_time":"2023-08-16T12:21:54+00:00","article_modified_time":"2024-07-12T11:42:34+00:00","og_image":[{"width":800,"height":450,"url":"https:\/\/www.hiig.de\/wp-content\/uploads\/2023\/08\/Consent-Fallacy-Header-DSB.png","type":"image\/png"}],"author":"Stefanie Barth","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Stefanie Barth","Est. reading time":"5 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.hiig.de\/en\/the-consent-fallacy\/#article","isPartOf":{"@id":"https:\/\/www.hiig.de\/en\/the-consent-fallacy\/"},"author":{"name":"Stefanie Barth","@id":"https:\/\/www.hiig.de\/#\/schema\/person\/a07aa81c80d1dbd4ef1ab5c1cd9c10fd"},"headline":"The Consent Fallacy","datePublished":"2023-08-16T12:21:54+00:00","dateModified":"2024-07-12T11:42:34+00:00","mainEntityOfPage":{"@id":"https:\/\/www.hiig.de\/en\/the-consent-fallacy\/"},"wordCount":1125,"publisher":{"@id":"https:\/\/www.hiig.de\/#organization"},"image":{"@id":"https:\/\/www.hiig.de\/en\/the-consent-fallacy\/#primaryimage"},"thumbnailUrl":"https:\/\/www.hiig.de\/wp-content\/uploads\/2023\/08\/Consent-Fallacy-Header-DSB.png","keywords":["datenschutz","\u00fcberwachung"],"articleSection":["ftif Data Governance"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.hiig.de\/en\/the-consent-fallacy\/","url":"https:\/\/www.hiig.de\/en\/the-consent-fallacy\/","name":"The Consent Fallacy &#8211; Digital Society Blog","isPartOf":{"@id":"https:\/\/www.hiig.de\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.hiig.de\/en\/the-consent-fallacy\/#primaryimage"},"image":{"@id":"https:\/\/www.hiig.de\/en\/the-consent-fallacy\/#primaryimage"},"thumbnailUrl":"https:\/\/www.hiig.de\/wp-content\/uploads\/2023\/08\/Consent-Fallacy-Header-DSB.png","datePublished":"2023-08-16T12:21:54+00:00","dateModified":"2024-07-12T11:42:34+00:00","description":"Are EU data protection laws compatible with our rational capacity or lack thereof? Should ensuring fundamental rights rely on one's consent?","breadcrumb":{"@id":"https:\/\/www.hiig.de\/en\/the-consent-fallacy\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.hiig.de\/en\/the-consent-fallacy\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.hiig.de\/en\/the-consent-fallacy\/#primaryimage","url":"https:\/\/www.hiig.de\/wp-content\/uploads\/2023\/08\/Consent-Fallacy-Header-DSB.png","contentUrl":"https:\/\/www.hiig.de\/wp-content\/uploads\/2023\/08\/Consent-Fallacy-Header-DSB.png","width":800,"height":450,"caption":"The Consent Fallacy"},{"@type":"BreadcrumbList","@id":"https:\/\/www.hiig.de\/en\/the-consent-fallacy\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.hiig.de\/en\/"},{"@type":"ListItem","position":2,"name":"The Consent Fallacy"}]},{"@type":"WebSite","@id":"https:\/\/www.hiig.de\/#website","url":"https:\/\/www.hiig.de\/","name":"HIIG","description":"Alexander von Humboldt Institute for Internet and Society","publisher":{"@id":"https:\/\/www.hiig.de\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.hiig.de\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.hiig.de\/#organization","name":"HIIG","url":"https:\/\/www.hiig.de\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.hiig.de\/#\/schema\/logo\/image\/","url":"https:\/\/www.hiig.de\/wp-content\/uploads\/2019\/06\/hiig.png","contentUrl":"https:\/\/www.hiig.de\/wp-content\/uploads\/2019\/06\/hiig.png","width":320,"height":80,"caption":"HIIG"},"image":{"@id":"https:\/\/www.hiig.de\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.hiig.de\/#\/schema\/person\/a07aa81c80d1dbd4ef1ab5c1cd9c10fd","name":"Stefanie Barth"}]}},"_links":{"self":[{"href":"https:\/\/www.hiig.de\/en\/wp-json\/wp\/v2\/posts\/96317","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.hiig.de\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.hiig.de\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.hiig.de\/en\/wp-json\/wp\/v2\/users\/9999998"}],"replies":[{"embeddable":true,"href":"https:\/\/www.hiig.de\/en\/wp-json\/wp\/v2\/comments?post=96317"}],"version-history":[{"count":5,"href":"https:\/\/www.hiig.de\/en\/wp-json\/wp\/v2\/posts\/96317\/revisions"}],"predecessor-version":[{"id":102535,"href":"https:\/\/www.hiig.de\/en\/wp-json\/wp\/v2\/posts\/96317\/revisions\/102535"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.hiig.de\/en\/wp-json\/wp\/v2\/media\/96323"}],"wp:attachment":[{"href":"https:\/\/www.hiig.de\/en\/wp-json\/wp\/v2\/media?parent=96317"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.hiig.de\/en\/wp-json\/wp\/v2\/categories?post=96317"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.hiig.de\/en\/wp-json\/wp\/v2\/tags?post=96317"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}