{"id":11259,"date":"2018-05-29T23:31:50","date_gmt":"2018-05-29T23:31:50","guid":{"rendered":"https:\/\/courses.lumenlearning.com\/wmintrobusiness\/?post_type=chapter&#038;p=11259"},"modified":"2024-05-07T16:22:49","modified_gmt":"2024-05-07T16:22:49","slug":"ethical-and-social-issues","status":"publish","type":"chapter","link":"https:\/\/courses.lumenlearning.com\/wm-introductiontobusiness\/chapter\/ethical-and-social-issues\/","title":{"raw":"Ethical and Social Issues in Information Technology","rendered":"Ethical and Social Issues in Information Technology"},"content":{"raw":"<div class=\"textbox learning-objectives\">\r\n<h3>Learning Outcomes<\/h3>\r\n<ul>\r\n \t<li>Identify privacy issues associated with information technology<\/li>\r\n \t<li>Identify ethical issues associated with information technology<\/li>\r\n<\/ul>\r\n<\/div>\r\nAs you'll recall,\u00a0the industrial revolution of the nineteenth century gave rise to a number of unforeseen\u00a0ethical and social issues\u2014for instance, concerns about workplace safety, wages, discrimination, and child labor\u2014which led\u00a0to\u00a0real changes in worker protections, labor practices, and law. Similarly, the technology revolution of the twentieth century\u2014starting with the\u00a0widespread use of the Internet and home computers\u2014has spawned a new set of ethical and social\u00a0concerns that people a hundred years ago couldn't have imagined: for example, how should personal information and online privacy be protected? Who gets to own the information about our habits and \"likes\"? Before the advent\u00a0of the Internet, people thought about and controlled their personal information in very different ways. Today, many of us lead complex online lives, and we may not even realize how\u00a0our personal information is being collected and used. Companies like Caesars can collect data on the\u00a0purchasing patterns, personal preferences, and professional\/social affiliations of their customers without their\u00a0even knowing about it. In this section we'll explore some of the ethical and social issues related to network security, privacy, and data collection that businesses must address.\r\n<h2>Technoethics<\/h2>\r\nEthical and social issues arising from the use of technology in all areas of our lives\u2014and in business, in particular\u2014have led to\u00a0the creation of a new branch of ethics: technoethics.\r\n\r\nTechnoethics (TE) is an interdisciplinary research area concerned with all moral and ethical aspects of technology in society. It draws on theories and methods from multiple knowledge domains (such as communications, social sciences information studies, technology studies, applied ethics, and philosophy) to provide insights on ethical dimensions of technological systems and practices for advancing a technological society.[footnote]Luppicini, R. (2010). Technoethics and the evolving knowledge society. Hershey: Idea Group Publishing.[\/footnote]\r\n\r\nTechnoethics views technology and ethics as socially embedded enterprises and focuses on discovering the ethical use of technology, protecting against the misuse of technology, and devising common principles to guide new advances in technological development and application to benefit society. Typically, scholars in technoethics have a tendency to conceptualize technology and ethics as interconnected and embedded in life and society. Technoethics denotes a broad range of ethical issues revolving around technology- from specific areas of focus affecting professionals working with technology to broader social, ethical, and legal issues concerning the role of technology in society and everyday life.[footnote]Luppicini, R. (2010). Technoethics and the evolving knowledge society. Hershey: Idea Group Publishing.[\/footnote]\r\n\r\nRecent advances in technology and their ability to transmit vast amounts of information in a short amount of time has changed the way information is being shared amongst co-workers and managers throughout organizations across the globe. Starting in the 1980s with information and communications technologies (ICTs), organizations have seen an increase in the amount of technology that they rely on to communicate within and outside of the workplace. However, these implementations of technology in the workplace create various ethical concerns and in turn a need for further analysis of technology in organizations. As a result of this growing trend, a subsection of technoethics known as organizational technoethics has emerged to address these issues.\r\n\r\nTechnoethical perspectives are constantly changing\u00a0as technology advances into areas unseen by creators and users engage with technology in new ways.\r\n<h2>Technology, Business, and Your Data<\/h2>\r\nTechnology makes businesses more efficient, makes tasks faster and easier to complete, and ultimately creates value from raw data. However, as much as technology impacts the <em>way<\/em> that companies do business, it also raises important new issues\u00a0about the employer-employee relationship. If you send personal emails from your office computer, do you have the right to expect that they're private? Does your employer have a legal and ethical right to \"cyber-peek\" at what you are doing with company assets? Twenty years ago this was not an issue; today it's a case before the Supreme Court.\r\n\r\nhttps:\/\/youtu.be\/LVTvbpo8oH0\r\n\r\nYou can <a href=\"https:\/\/course-building.s3-us-west-2.amazonaws.com\/Intro+to+Business\/Transcriptions\/CellPhonePrivacy_transcript.txt\" target=\"_blank\" rel=\"noopener\">view the transcript for \"Cell Phone Privacy\" (opens in new window).<\/a>\r\n<h3>Social Media<\/h3>\r\nEmployers want to use technology to help them screen applicants and verify information about their workforce, which is understandable. In the module on Human Resource Management you learned about the cost of recruiting, hiring, and training employees. However, what if the company believes that one of the quickest ways to gather information about an employee is to access their social media accounts? A company would never ask for your login credentials for Facebook, Twitter, Instagram, LinkedIn . . . or would they? And if they did, is it legally and ethically justified? What would you do if you found yourself in the situation presented in the following video?\r\n\r\nhttps:\/\/youtu.be\/vsjHABfgaLc\r\n\r\nYou can <a href=\"https:\/\/course-building.s3-us-west-2.amazonaws.com\/Intro+to+Business\/Transcriptions\/USEmployersBannedFromAskingforSocialMediaLogins_transcript.txt\" target=\"_blank\" rel=\"noopener\">view transcript for \"US Employers Banned from Asking for Social Media Logins\" (opens in new window).<\/a>\r\n<h3>Information As a Business<\/h3>\r\nThe fact is that technology has put our information at the fingertips of businesses\u2014there for the taking and, in some cases, the selling. Is it ethical for a business to collect data about a person and then sell that information to another business? \u00a0Many organizations collect data for their own purposes, but they also realize that your data has value to others. As a result, selling data has become an income stream for many organizations. If you didn't realize that your data was collected by Company A, it's even less likely you knew that it was sold to Company B.\r\n\r\nhttps:\/\/youtu.be\/nOyvHHWHYSo\r\n\r\nYou can <a href=\"https:\/\/course-building.s3-us-west-2.amazonaws.com\/Intro+to+Business\/Transcriptions\/SellingYouAsData_transcript.txt\" target=\"_blank\" rel=\"noopener\">view the transcript for \"Selling You As Data\" (opens in new window)<\/a>\u00a0or the <a href=\"https:\/\/course-building.s3-us-west-2.amazonaws.com\/Intro+to+Business\/Transcriptions\/SellingYouAsData_alternative.txt\" target=\"_blank\" rel=\"noopener\">text alternative for \"Selling You As Data (opens in new window)<\/a>.\r\n\r\nWe have discussed just\u00a0a few of the emerging ethical issues surrounding business, technology, and personal data. We have yet to touch on security issues and the responsibility business has to protect your data once it has been collected.\r\n<div class=\"textbox tryit\">\r\n<h3>Practice Questions<\/h3>\r\nhttps:\/\/assess.lumenlearning.com\/practice\/4cbcaf0c-4762-49e4-a80a-f34e80bc0b84\r\n\r\nhttps:\/\/assess.lumenlearning.com\/practice\/28c235de-5e3f-4365-aac4-98ea8f8df0c3\r\n\r\n<\/div>","rendered":"<div class=\"textbox learning-objectives\">\n<h3>Learning Outcomes<\/h3>\n<ul>\n<li>Identify privacy issues associated with information technology<\/li>\n<li>Identify ethical issues associated with information technology<\/li>\n<\/ul>\n<\/div>\n<p>As you&#8217;ll recall,\u00a0the industrial revolution of the nineteenth century gave rise to a number of unforeseen\u00a0ethical and social issues\u2014for instance, concerns about workplace safety, wages, discrimination, and child labor\u2014which led\u00a0to\u00a0real changes in worker protections, labor practices, and law. Similarly, the technology revolution of the twentieth century\u2014starting with the\u00a0widespread use of the Internet and home computers\u2014has spawned a new set of ethical and social\u00a0concerns that people a hundred years ago couldn&#8217;t have imagined: for example, how should personal information and online privacy be protected? Who gets to own the information about our habits and &#8220;likes&#8221;? Before the advent\u00a0of the Internet, people thought about and controlled their personal information in very different ways. Today, many of us lead complex online lives, and we may not even realize how\u00a0our personal information is being collected and used. Companies like Caesars can collect data on the\u00a0purchasing patterns, personal preferences, and professional\/social affiliations of their customers without their\u00a0even knowing about it. In this section we&#8217;ll explore some of the ethical and social issues related to network security, privacy, and data collection that businesses must address.<\/p>\n<h2>Technoethics<\/h2>\n<p>Ethical and social issues arising from the use of technology in all areas of our lives\u2014and in business, in particular\u2014have led to\u00a0the creation of a new branch of ethics: technoethics.<\/p>\n<p>Technoethics (TE) is an interdisciplinary research area concerned with all moral and ethical aspects of technology in society. It draws on theories and methods from multiple knowledge domains (such as communications, social sciences information studies, technology studies, applied ethics, and philosophy) to provide insights on ethical dimensions of technological systems and practices for advancing a technological society.<a class=\"footnote\" title=\"Luppicini, R. (2010). Technoethics and the evolving knowledge society. Hershey: Idea Group Publishing.\" id=\"return-footnote-11259-1\" href=\"#footnote-11259-1\" aria-label=\"Footnote 1\"><sup class=\"footnote\">[1]<\/sup><\/a><\/p>\n<p>Technoethics views technology and ethics as socially embedded enterprises and focuses on discovering the ethical use of technology, protecting against the misuse of technology, and devising common principles to guide new advances in technological development and application to benefit society. Typically, scholars in technoethics have a tendency to conceptualize technology and ethics as interconnected and embedded in life and society. Technoethics denotes a broad range of ethical issues revolving around technology- from specific areas of focus affecting professionals working with technology to broader social, ethical, and legal issues concerning the role of technology in society and everyday life.<a class=\"footnote\" title=\"Luppicini, R. (2010). Technoethics and the evolving knowledge society. Hershey: Idea Group Publishing.\" id=\"return-footnote-11259-2\" href=\"#footnote-11259-2\" aria-label=\"Footnote 2\"><sup class=\"footnote\">[2]<\/sup><\/a><\/p>\n<p>Recent advances in technology and their ability to transmit vast amounts of information in a short amount of time has changed the way information is being shared amongst co-workers and managers throughout organizations across the globe. Starting in the 1980s with information and communications technologies (ICTs), organizations have seen an increase in the amount of technology that they rely on to communicate within and outside of the workplace. However, these implementations of technology in the workplace create various ethical concerns and in turn a need for further analysis of technology in organizations. As a result of this growing trend, a subsection of technoethics known as organizational technoethics has emerged to address these issues.<\/p>\n<p>Technoethical perspectives are constantly changing\u00a0as technology advances into areas unseen by creators and users engage with technology in new ways.<\/p>\n<h2>Technology, Business, and Your Data<\/h2>\n<p>Technology makes businesses more efficient, makes tasks faster and easier to complete, and ultimately creates value from raw data. However, as much as technology impacts the <em>way<\/em> that companies do business, it also raises important new issues\u00a0about the employer-employee relationship. If you send personal emails from your office computer, do you have the right to expect that they&#8217;re private? Does your employer have a legal and ethical right to &#8220;cyber-peek&#8221; at what you are doing with company assets? Twenty years ago this was not an issue; today it&#8217;s a case before the Supreme Court.<\/p>\n<p><iframe loading=\"lazy\" id=\"oembed-1\" title=\"Cell Phone Privacy\" width=\"500\" height=\"281\" src=\"https:\/\/www.youtube.com\/embed\/LVTvbpo8oH0?feature=oembed&#38;rel=0\" frameborder=\"0\" allowfullscreen=\"allowfullscreen\"><\/iframe><\/p>\n<p>You can <a href=\"https:\/\/course-building.s3-us-west-2.amazonaws.com\/Intro+to+Business\/Transcriptions\/CellPhonePrivacy_transcript.txt\" target=\"_blank\" rel=\"noopener\">view the transcript for &#8220;Cell Phone Privacy&#8221; (opens in new window).<\/a><\/p>\n<h3>Social Media<\/h3>\n<p>Employers want to use technology to help them screen applicants and verify information about their workforce, which is understandable. In the module on Human Resource Management you learned about the cost of recruiting, hiring, and training employees. However, what if the company believes that one of the quickest ways to gather information about an employee is to access their social media accounts? A company would never ask for your login credentials for Facebook, Twitter, Instagram, LinkedIn . . . or would they? And if they did, is it legally and ethically justified? What would you do if you found yourself in the situation presented in the following video?<\/p>\n<p><iframe loading=\"lazy\" id=\"oembed-2\" title=\"US Employers Banned from Asking for Social Media Logins\" width=\"500\" height=\"281\" src=\"https:\/\/www.youtube.com\/embed\/vsjHABfgaLc?feature=oembed&#38;rel=0\" frameborder=\"0\" allowfullscreen=\"allowfullscreen\"><\/iframe><\/p>\n<p>You can <a href=\"https:\/\/course-building.s3-us-west-2.amazonaws.com\/Intro+to+Business\/Transcriptions\/USEmployersBannedFromAskingforSocialMediaLogins_transcript.txt\" target=\"_blank\" rel=\"noopener\">view transcript for &#8220;US Employers Banned from Asking for Social Media Logins&#8221; (opens in new window).<\/a><\/p>\n<h3>Information As a Business<\/h3>\n<p>The fact is that technology has put our information at the fingertips of businesses\u2014there for the taking and, in some cases, the selling. Is it ethical for a business to collect data about a person and then sell that information to another business? \u00a0Many organizations collect data for their own purposes, but they also realize that your data has value to others. As a result, selling data has become an income stream for many organizations. If you didn&#8217;t realize that your data was collected by Company A, it&#8217;s even less likely you knew that it was sold to Company B.<\/p>\n<p><iframe loading=\"lazy\" id=\"oembed-3\" title=\"Selling You As Data\" width=\"500\" height=\"281\" src=\"https:\/\/www.youtube.com\/embed\/nOyvHHWHYSo?feature=oembed&#38;rel=0\" frameborder=\"0\" allowfullscreen=\"allowfullscreen\"><\/iframe><\/p>\n<p>You can <a href=\"https:\/\/course-building.s3-us-west-2.amazonaws.com\/Intro+to+Business\/Transcriptions\/SellingYouAsData_transcript.txt\" target=\"_blank\" rel=\"noopener\">view the transcript for &#8220;Selling You As Data&#8221; (opens in new window)<\/a>\u00a0or the <a href=\"https:\/\/course-building.s3-us-west-2.amazonaws.com\/Intro+to+Business\/Transcriptions\/SellingYouAsData_alternative.txt\" target=\"_blank\" rel=\"noopener\">text alternative for &#8220;Selling You As Data (opens in new window)<\/a>.<\/p>\n<p>We have discussed just\u00a0a few of the emerging ethical issues surrounding business, technology, and personal data. We have yet to touch on security issues and the responsibility business has to protect your data once it has been collected.<\/p>\n<div class=\"textbox tryit\">\n<h3>Practice Questions<\/h3>\n<p>\t<iframe id=\"assessment_practice_4cbcaf0c-4762-49e4-a80a-f34e80bc0b84\" class=\"resizable\" src=\"https:\/\/assess.lumenlearning.com\/practice\/4cbcaf0c-4762-49e4-a80a-f34e80bc0b84?iframe_resize_id=assessment_practice_id_4cbcaf0c-4762-49e4-a80a-f34e80bc0b84\" frameborder=\"0\" style=\"border:none;width:100%;height:100%;min-height:300px;\"><br \/>\n\t<\/iframe><\/p>\n<p>\t<iframe id=\"assessment_practice_28c235de-5e3f-4365-aac4-98ea8f8df0c3\" class=\"resizable\" src=\"https:\/\/assess.lumenlearning.com\/practice\/28c235de-5e3f-4365-aac4-98ea8f8df0c3?iframe_resize_id=assessment_practice_id_28c235de-5e3f-4365-aac4-98ea8f8df0c3\" frameborder=\"0\" style=\"border:none;width:100%;height:100%;min-height:300px;\"><br \/>\n\t<\/iframe><\/p>\n<\/div>\n\n\t\t\t <section class=\"citations-section\" role=\"contentinfo\">\n\t\t\t <h3>Candela Citations<\/h3>\n\t\t\t\t\t <div>\n\t\t\t\t\t\t <div id=\"citation-list-11259\">\n\t\t\t\t\t\t\t <div class=\"licensing\"><div class=\"license-attribution-dropdown-subheading\">CC licensed content, Original<\/div><ul class=\"citation-list\"><li>Technology, Business, and Your Data. <strong>Authored by<\/strong>: Linda Williams. <strong>Provided by<\/strong>: Lumen Learning. <strong>License<\/strong>: <em><a target=\"_blank\" rel=\"license\" href=\"https:\/\/creativecommons.org\/licenses\/by\/4.0\/\">CC BY: Attribution<\/a><\/em><\/li><\/ul><div class=\"license-attribution-dropdown-subheading\">CC licensed content, Shared previously<\/div><ul class=\"citation-list\"><li>Technoethics. <strong>Provided by<\/strong>: Wikipedia. <strong>Located at<\/strong>: <a target=\"_blank\" href=\"https:\/\/en.wikipedia.org\/wiki\/Technoethics#Ethical_challenges\">https:\/\/en.wikipedia.org\/wiki\/Technoethics#Ethical_challenges<\/a>. <strong>License<\/strong>: <em><a target=\"_blank\" rel=\"license\" href=\"https:\/\/creativecommons.org\/licenses\/by-sa\/4.0\/\">CC BY-SA: Attribution-ShareAlike<\/a><\/em><\/li><li>Selling You As Data. <strong>Provided by<\/strong>: BBC. <strong>Located at<\/strong>: <a target=\"_blank\" href=\"https:\/\/youtu.be\/nOyvHHWHYSo\">https:\/\/youtu.be\/nOyvHHWHYSo<\/a>. <strong>License<\/strong>: <em><a target=\"_blank\" rel=\"license\" href=\"https:\/\/creativecommons.org\/licenses\/by-nc-nd\/4.0\/\">CC BY-NC-ND: Attribution-NonCommercial-NoDerivatives <\/a><\/em><\/li><li>U.S. Employers Banned from Asking for Social Media Logins. <strong>Provided by<\/strong>: BBC. <strong>Located at<\/strong>: <a target=\"_blank\" href=\"https:\/\/youtu.be\/vsjHABfgaLc\">https:\/\/youtu.be\/vsjHABfgaLc<\/a>. <strong>License<\/strong>: <em><a target=\"_blank\" rel=\"license\" href=\"https:\/\/creativecommons.org\/licenses\/by-nc-nd\/4.0\/\">CC BY-NC-ND: Attribution-NonCommercial-NoDerivatives <\/a><\/em><\/li><li>Cell Phone Privacy. <strong>Provided by<\/strong>: BBC. <strong>Located at<\/strong>: <a target=\"_blank\" href=\"https:\/\/youtu.be\/LVTvbpo8oH0\">https:\/\/youtu.be\/LVTvbpo8oH0<\/a>. <strong>License<\/strong>: <em><a target=\"_blank\" rel=\"license\" href=\"https:\/\/creativecommons.org\/licenses\/by-nc-nd\/4.0\/\">CC BY-NC-ND: Attribution-NonCommercial-NoDerivatives <\/a><\/em><\/li><\/ul><\/div>\n\t\t\t\t\t\t <\/div>\n\t\t\t\t\t <\/div>\n\t\t\t <\/section><hr class=\"before-footnotes clear\" \/><div class=\"footnotes\"><ol><li id=\"footnote-11259-1\">Luppicini, R. (2010). Technoethics and the evolving knowledge society. Hershey: Idea Group Publishing. <a href=\"#return-footnote-11259-1\" class=\"return-footnote\" aria-label=\"Return to footnote 1\">&crarr;<\/a><\/li><li id=\"footnote-11259-2\">Luppicini, R. (2010). Technoethics and the evolving knowledge society. Hershey: Idea Group Publishing. <a href=\"#return-footnote-11259-2\" class=\"return-footnote\" aria-label=\"Return to footnote 2\">&crarr;<\/a><\/li><\/ol><\/div>","protected":false},"author":163,"menu_order":17,"template":"","meta":{"_candela_citation":"[{\"type\":\"cc\",\"description\":\"Technoethics\",\"author\":\"\",\"organization\":\"Wikipedia\",\"url\":\"https:\/\/en.wikipedia.org\/wiki\/Technoethics#Ethical_challenges\",\"project\":\"\",\"license\":\"cc-by-sa\",\"license_terms\":\"\"},{\"type\":\"original\",\"description\":\"Technology, Business, and Your Data\",\"author\":\"Linda Williams\",\"organization\":\"Lumen Learning\",\"url\":\"\",\"project\":\"\",\"license\":\"cc-by\",\"license_terms\":\"\"},{\"type\":\"cc\",\"description\":\"Selling You As Data\",\"author\":\"\",\"organization\":\"BBC\",\"url\":\"https:\/\/youtu.be\/nOyvHHWHYSo\",\"project\":\"\",\"license\":\"cc-by-nc-nd\",\"license_terms\":\"\"},{\"type\":\"cc\",\"description\":\"U.S. Employers Banned from Asking for Social Media Logins\",\"author\":\"\",\"organization\":\"BBC\",\"url\":\"https:\/\/youtu.be\/vsjHABfgaLc\",\"project\":\"\",\"license\":\"cc-by-nc-nd\",\"license_terms\":\"\"},{\"type\":\"cc\",\"description\":\"Cell Phone Privacy\",\"author\":\"\",\"organization\":\"BBC\",\"url\":\"https:\/\/youtu.be\/LVTvbpo8oH0\",\"project\":\"\",\"license\":\"cc-by-nc-nd\",\"license_terms\":\"\"}]","CANDELA_OUTCOMES_GUID":"96b7bd66-1836-4e06-85f4-a1ce5851abc7, 4df02907-624d-4bf6-accd-2ba5e2958649, af0b8943-6e90-48db-b090-81566b8ff73d","pb_show_title":"on","pb_short_title":"","pb_subtitle":"","pb_authors":[],"pb_section_license":""},"chapter-type":[],"contributor":[],"license":[],"class_list":["post-11259","chapter","type-chapter","status-publish","hentry"],"part":11240,"_links":{"self":[{"href":"https:\/\/courses.lumenlearning.com\/wm-introductiontobusiness\/wp-json\/pressbooks\/v2\/chapters\/11259","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/courses.lumenlearning.com\/wm-introductiontobusiness\/wp-json\/pressbooks\/v2\/chapters"}],"about":[{"href":"https:\/\/courses.lumenlearning.com\/wm-introductiontobusiness\/wp-json\/wp\/v2\/types\/chapter"}],"author":[{"embeddable":true,"href":"https:\/\/courses.lumenlearning.com\/wm-introductiontobusiness\/wp-json\/wp\/v2\/users\/163"}],"version-history":[{"count":19,"href":"https:\/\/courses.lumenlearning.com\/wm-introductiontobusiness\/wp-json\/pressbooks\/v2\/chapters\/11259\/revisions"}],"predecessor-version":[{"id":15454,"href":"https:\/\/courses.lumenlearning.com\/wm-introductiontobusiness\/wp-json\/pressbooks\/v2\/chapters\/11259\/revisions\/15454"}],"part":[{"href":"https:\/\/courses.lumenlearning.com\/wm-introductiontobusiness\/wp-json\/pressbooks\/v2\/parts\/11240"}],"metadata":[{"href":"https:\/\/courses.lumenlearning.com\/wm-introductiontobusiness\/wp-json\/pressbooks\/v2\/chapters\/11259\/metadata\/"}],"wp:attachment":[{"href":"https:\/\/courses.lumenlearning.com\/wm-introductiontobusiness\/wp-json\/wp\/v2\/media?parent=11259"}],"wp:term":[{"taxonomy":"chapter-type","embeddable":true,"href":"https:\/\/courses.lumenlearning.com\/wm-introductiontobusiness\/wp-json\/pressbooks\/v2\/chapter-type?post=11259"},{"taxonomy":"contributor","embeddable":true,"href":"https:\/\/courses.lumenlearning.com\/wm-introductiontobusiness\/wp-json\/wp\/v2\/contributor?post=11259"},{"taxonomy":"license","embeddable":true,"href":"https:\/\/courses.lumenlearning.com\/wm-introductiontobusiness\/wp-json\/wp\/v2\/license?post=11259"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}