{"id":22487,"date":"2025-03-11T23:14:27","date_gmt":"2025-03-11T17:44:27","guid":{"rendered":"https:\/\/www.sachdevajk.in\/?p=22487"},"modified":"2025-03-11T23:14:27","modified_gmt":"2025-03-11T17:44:27","slug":"social-media-privacy-issue","status":"publish","type":"post","link":"http:\/\/www.sachdevajk.in\/?p=22487","title":{"rendered":"SOCIAL MEDIA PRIVACY ISSUE"},"content":{"rendered":"<p class=\"MsoNormal\" style=\"text-align: justify\"><b><span lang=\"EN-US\" style=\"font-size: 12.0pt;line-height: 107%\">SOCIAL MEDIA PRIVACY ISSUE<\/span><\/b><\/p>\n<p class=\"MsoNormal\" style=\"text-align: justify\"><span lang=\"EN-US\">Sushant Sakharam Jadhav<\/span><\/p>\n<p class=\"MsoNormal\" style=\"text-align: justify\"><b><span lang=\"EN-US\">1.User Privacy Concerns <\/span><\/b><\/p>\n<p class=\"MsoNormal\" style=\"text-align: justify\"><span lang=\"EN-US\">(Omowumi Hafsat Aliu, 2024) <\/span><span>The study comes to the talk about\u00a0that users&#8217; participation with privacy policies, security concerns, and platform usage patterns all affect how they perceive data privacy on social media. The results show that younger users mostly students spend a lot of time on social media, with Facebook and WhatsApp being the most popular sites. The research highlights that the possibility of unintentional data exposure and excessive data access permissions are the main causes of privacy concerns. Furthermore, an adaptive K-means algorithm performed better when it came to user perception classification. In order to strengthen data protection, the findings emphasize the necessity of increased privacy awareness, more robust security mechanisms, and ongoing user perception monitoring.<\/span><\/p>\n<p class=\"MsoNormal\" style=\"text-align: justify\"><b><span lang=\"EN-US\">2.Generation diversity <\/span><\/b><b><\/b><\/p>\n<p class=\"MsoNormal\" style=\"text-align: justify\"><span lang=\"EN-US\">(Goksel Simsek, 2016) <\/span><span>The research investigates the ways in which social media has altered privacy norms across generations, increasing the visibility of private facets of life. According to an analysis of Baby Boomers, Generation X, and Generation Y, younger people particularly those in Generation are more willing to share personal experiences online, even if privacy changes affect all generations. The demand for social interaction and approval frequently results in a growing public presence on social media, despite persistent privacy concerns.<\/span><\/p>\n<p class=\"MsoNormal\" style=\"text-align: justify\"><b><span>3.Cultural Differences <\/span><\/b><\/p>\n<p class=\"MsoNormal\" style=\"text-align: justify\"><span lang=\"EN-US\">(Sangmi Chai, 2020) <\/span><span style=\"font-size: 12.0pt;line-height: 107%;font-family: 'Times New Roman',serif\">Taking into account cultural differences between South Korean and American users, the study examines how ethical culture and information privacy concerns affect social media users&#8217; information-sharing behaviors. Results show that while privacy concerns have a detrimental impact on information sharing, a strong ethical culture has a favorable impact. The degree of these effects, however, differs depending on the culture; American users are more impacted by privacy concerns, while South Korean users are more influenced by ethical culture. The study emphasizes how appropriate information sharing in online settings requires ethical awareness and strong privacy safeguards.<\/span><\/p>\n<p class=\"MsoNormal\" style=\"text-align: justify\"><span style=\"font-size: 12.0pt;line-height: 107%;font-family: 'Times New Roman',serif\">\u00a0<\/span><\/p>\n<p class=\"MsoNormal\" style=\"text-align: justify\"><b><span style=\"font-size: 12.0pt;line-height: 107%;font-family: 'Times New Roman',serif\">4.Trust And Privacy Concerns Over Social Media Websites<\/span><\/b><\/p>\n<p class=\"MsoNormal\" style=\"text-align: justify\"><span style=\"font-size: 12.0pt;line-height: 107%;font-family: 'Times New Roman',serif\">(Orzan, M,2012) The study investigates the relationship between trust, privacy concerns, and users&#8217; willingness to disclose personal information on social media platforms. As online social networks continue to grow exponentially, users are increasingly concerned about how their data is collected and used. The research presents a model validated through empirical analysis, showing that trust in social media websites significantly influences users&#8217; decisions to share personal data, while privacy concerns and perceived risks discourage information disclosure. The study also explores the impact of perceived benefits, highlighting that users may be more willing to share personal information if they believe it will be used to their advantage. Additionally, the moderating effect of risk aversion on the relationship between trust and disclosure behavior is discussed. The findings confirm that privacy and trust are the strongest predictors of social media users\u2019 behavior, with those who perceive greater risks being more reluctant to disclose personal information. These insights emphasize the need for stronger privacy protections and transparency in data handling to foster user trust in online social networks.<\/span><\/p>\n<p class=\"MsoNormal\" style=\"text-align: justify\"><b><span style=\"font-size: 12.0pt;line-height: 107%;font-family: 'Times New Roman',serif\">5.Miss-use of personal information<\/span><\/b><\/p>\n<p class=\"MsoNormal\" style=\"text-align: justify\"><span lang=\"EN-US\">(Musa Ahmed Zayyad, 2023) <\/span><span style=\"font-size: 12.0pt;line-height: 107%;font-family: 'Times New Roman',serif\">The study focuses on the rising privacy and security issues related to social media use, which are fueled by the expanding amount of private information posted online. It draws attention to a number of online dangers that take use of user weaknesses, such as phishing, virus assaults, identity theft, and social engineering techniques. The study examines how social media platforms put users at risk for issues including data breaches, illegal spying, and digital profiling even while they let people communicate and share information. It also highlights the need of social media companies in maintaining data security and highlights important privacy issues pertaining to the improper use of private data for business objectives. According to the report, users should take proactive steps including modifying their privacy settings, utilizing robust authentication techniques, and exercising caution when disclosing important information.<\/span><\/p>\n<p class=\"MsoNormal\" style=\"text-align: justify\"><b><span style=\"font-size: 12.0pt;line-height: 107%;font-family: 'Times New Roman',serif\"><span>\u00a0<\/span>6.Factors influence cyber crime <\/span><\/b><\/p>\n<p class=\"MsoNormal\" style=\"text-align: justify\"><span lang=\"EN-US\">(Wingyan Chung, 2016) <\/span><span lang=\"EN-US\" style=\"font-size: 12.0pt;line-height: 107%;font-family: 'Times New Roman',serif\">The research investigates the escalating importance of social media (SM) within both the public and private sectors, emphasizing its varied uses in political dialogue, corporate branding, and the dissemination of propaganda. Nevertheless, the swift expansion of SM brings forth significant security and privacy issues, as cybercriminals, hackers, and even governmental entities take advantage of existing vulnerabilities for nefarious ends. The study highlights the dangers associated with data breaches, unauthorized monitoring, and identity theft, which arise from the extensive accumulation of user data via social networking platforms. Social media analytics (SMA) is presented as an essential resource for tackling these issues, providing techniques to gather, oversee, and interpret SM data to enhance security and protect privacy. The research also delves into predictive modeling to comprehend community behavior on SM, along with the effects of tailored services and user autonomy on privacy apprehensions in mobile applications. These findings underscore the pressing necessity for sophisticated cybersecurity informatics to protect users from the increasing threats present in the digital environment.<\/span><\/p>\n<p class=\"MsoNormal\" style=\"text-align: justify\"><b><span style=\"font-size: 12.0pt;line-height: 107%;font-family: 'Times New Roman',serif\">7.Using social media used in recruitment <\/span><\/b><\/p>\n<p class=\"MsoNormal\" style=\"text-align: justify\"><span lang=\"EN-US\" style=\"font-size: 12.0pt;line-height: 107%;font-family: 'Times New Roman',serif\">(Debora Jeske, 2016) The article examines the justifications put forth in support of social media screening, alongside the challenges that may undermine the reliability and usefulness of such data for employers. Initially, the authors analyze the existing legal frameworks and guidelines in the UK and the USA, as well as the ethical dilemmas that emerge when employers utilize social media content for hiring decisions. Subsequently, various arguments advocating for the use of social media content are presented, each evaluated from multiple perspectives, including issues related to impression management, bias and discrimination, as well as data protection and security. Ultimately, the current body of knowledge does not yield a conclusive determination regarding the efficacy of social network information in the recruitment and selection process.<\/span><\/p>\n<p class=\"MsoNormal\" style=\"text-align: justify\"><b><span style=\"font-size: 12.0pt;line-height: 107%;font-family: 'Times New Roman',serif\">\u00a0<\/span><\/b><\/p>\n<p class=\"MsoNormal\" style=\"text-align: justify\"><b><span style=\"font-size: 12.0pt;line-height: 107%;font-family: 'Times New Roman',serif\">8.Case-Study Regarding Social Media Security<\/span><\/b><\/p>\n<p class=\"MsoNormal\"><span lang=\"EN-US\" style=\"font-size: 12.0pt;line-height: 107%;font-family: 'Times New Roman',serif\">(Venetis Kanakaris, 2019) <\/span><span style=\"font-size: 12.0pt;line-height: 107%;font-family: 'Times New Roman',serif\">The article examines the justifications put forth in support of social media screening, alongside the challenges that may undermine the reliability and usefulness of such data for employers. Initially, the authors analyze the existing legal frameworks and guidelines in the UK and the USA, as well as the ethical dilemmas that emerge when employers utilize social media content for hiring decisions. Subsequently, various arguments advocating for the use of social media content are presented, each evaluated from multiple perspectives, including issues related to impression management, bias and discrimination, as well as data protection and security. Ultimately, the current body of knowledge does not yield a conclusive determination regarding the efficacy of social network information in the recruitment and selection process.<\/span><\/p>\n<p class=\"MsoNormal\"><b><span style=\"font-size: 12.0pt;line-height: 107%;font-family: 'Times New Roman',serif\">9.<\/span><\/b><b><span lang=\"EN-US\" style=\"font-size: 12.0pt;line-height: 107%;font-family: 'Times New Roman',serif\">governance issues and heightened responsibility<\/span><\/b><\/p>\n<p class=\"MsoNormal\"><span>(W. Nwankwo, 2020) <\/span><span lang=\"EN-US\" style=\"font-size: 12.0pt;line-height: 107%;font-family: 'Times New Roman',serif\">Digitalization introduces a range of new social and governance challenges, along with an increased level of accountability, especially for corporations. In recent years, there has been a growing societal demand for greater transparency from companies regarding their practices, oversight, and the effects of digital technologies. The information and communication technology (ICT) sector particularly highlights these dynamics. This study presents a novel examination of corporate social responsibility (CSR) discourse related to digital issues among major ICT companies, employing signaling theory to analyze a comprehensive array of media, including sustainability, ESG, CSR, integrated, impact, purpose, consolidated management, and annual reports, as well as issue briefs and websites. It elucidates how ICT companies convey materiality\u2014a reporting concept linked to the fair representation and relevance of information\u2014in their CSR disclosures concerning digital matters. <\/span><\/p>\n<p class=\"MsoNormal\"><b><span style=\"font-size: 12.0pt;line-height: 107%;font-family: 'Times New Roman',serif\">\u00a0<\/span><\/b><\/p>\n<p class=\"MsoNormal\"><b><span style=\"font-size: 12.0pt;line-height: 107%;font-family: 'Times New Roman',serif\">10. and the Politics of Social Media<\/span><\/b><\/p>\n<p class=\"MsoNormal\"><span lang=\"EN-US\" style=\"font-size: 12.0pt;line-height: 107%;font-family: 'Times New Roman',serif\">(Martin Almqvist, 2016)<\/span><span style=\"font-size: 12.0pt;line-height: 107%;font-family: 'Times New Roman',serif\">The article &#8220;Piracy and the Politics of Social Media&#8221; by Martin Fredriksson Almqvist explores the evolution of political activism beyond traditional party structures, emphasizing how digital activism and social media have reshaped political engagement. It examines the Pirate Party, initially formed in Sweden in 2006 as a single-issue movement focused on copyright and digital privacy, which later broadened its agenda to include democracy and governance issues. Through interviews with Pirate Party members worldwide, the study highlights the party\u2019s connections to global social movements like the Arab Spring and Occupy Wall Street. It also discusses the role of digital platforms in fostering political participation and the broader implications of information politics, particularly in Iceland, where the Pirate Party gained significant political traction. Ultimately, the article challenges the notion that digital activism is limited to single-issue politics, showing how it can drive broader democratic change.<br \/><!-- [if !supportLineBreakNewLine]--><br \/><!--[endif]--><\/span><\/p>\n<p class=\"MsoNormal\" style=\"text-align: justify\"><b><span style=\"font-size: 12.0pt;line-height: 107%\">CONCLUSION<span>\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 <\/span><\/span><\/b><\/p>\n<p class=\"MsoNormal\" style=\"text-align: justify\"><span lang=\"EN-US\" style=\"font-size: 12.0pt;line-height: 107%\">Above we have discussed about different perspectives of protection concerns related with social media stages. It looks at client, student and any individuals. security concerns, highlighting that more youthful clients, particularly understudies, spend noteworthy time on social media, driving to inadvertent information introduction and security dangers. The consider moreover examines generational contrasts, appearing that more youthful eras are more willing to share individual encounters online in spite of security concerns. Social varieties in protection recognitions are analyzed, comparing American and South Korean clients. Believe and protection concerns are key components affecting client behavior, where believe in stages empowers sharing, but security dangers hinder it. The record too addresses the abuse of individual data, cybercrime dangers, and the moral problems in utilizing social media for enrollment screening. Moreover, administration issues related to digitalization and corporate duty in securing client information are investigated. The think about emphasizes the require for more grounded security securities, expanded client mindfulness, and capable corporate approaches to relieve dangers related with social media security.<\/span><\/p>\n<p class=\"MsoNormal\" style=\"text-align: justify\"><span lang=\"EN-US\" style=\"font-size: 12.0pt;line-height: 107%;font-family: 'Times New Roman',serif\">\u00a0<\/span><\/p>\n<p class=\"MsoNormal\" style=\"text-align: justify\"><strong><span lang=\"EN-US\" style=\"font-size: 12.0pt;line-height: 107%;font-family: 'Times New Roman',serif\">REFERENCES:-<\/span><\/strong><\/p>\n<p class=\"MsoNormal\"><span lang=\"EN-US\">\u00a0<\/span><span lang=\"EN-US\" style=\"font-size: 12.0pt;line-height: 107%;font-family: 'Times New Roman',serif\">Debora Jeske &amp; Kenneth S Shultz, 2016. &#8220;<\/span><span lang=\"EN-US\"><a href=\"https:\/\/ideas.repec.org\/a\/sae\/woemps\/v30y2016i3p535-546.html\"><b><span style=\"font-size: 12.0pt;line-height: 107%;font-family: 'Times New Roman',serif\">Using social media content for screening in recruitment and selection: pros and cons<\/span><\/b><\/a><\/span><span lang=\"EN-US\" style=\"font-size: 12.0pt;line-height: 107%;font-family: 'Times New Roman',serif\">,&#8221;\u00a0<\/span><span lang=\"EN-US\"><a href=\"https:\/\/ideas.repec.org\/s\/sae\/woemps.html\"><span style=\"font-size: 12.0pt;line-height: 107%;font-family: 'Times New Roman',serif\">Work, Employment &amp; Society<\/span><\/a><\/span><span lang=\"EN-US\" style=\"font-size: 12.0pt;line-height: 107%;font-family: 'Times New Roman',serif\">, British Sociological Association, vol. 30(3), pages 535-546, June.<\/span><\/p>\n<p class=\"MsoNormal\" style=\"text-align: justify\"><span lang=\"EN-US\" style=\"font-size: 12.0pt;line-height: 107%;font-family: 'Times New Roman',serif\">Jordan Famularo, 2023. &#8220;<\/span><span lang=\"EN-US\"><a href=\"https:\/\/ideas.repec.org\/a\/spr\/ijocsr\/v8y2023i1d10.1186_s40991-023-00082-8.html\"><b><span style=\"font-size: 12.0pt;line-height: 107%;font-family: 'Times New Roman',serif\">Corporate social responsibility communication in the ICT sector: digital issues, greenwashing, and materiality<\/span><\/b><\/a><\/span><span lang=\"EN-US\" style=\"font-size: 12.0pt;line-height: 107%;font-family: 'Times New Roman',serif\">,&#8221;\u00a0<\/span><span lang=\"EN-US\"><a href=\"https:\/\/ideas.repec.org\/s\/spr\/ijocsr.html\"><span style=\"font-size: 12.0pt;line-height: 107%;font-family: 'Times New Roman',serif\">International Journal of Corporate Social Responsibility<\/span><\/a><\/span><span lang=\"EN-US\" style=\"font-size: 12.0pt;line-height: 107%;font-family: 'Times New Roman',serif\">, Springer, vol. 8(1), pages 1-25, December.<\/span><\/p>\n<p class=\"MsoNormal\" style=\"text-align: justify\"><span lang=\"EN-US\" style=\"font-size: 12.0pt;line-height: 107%;font-family: 'Times New Roman',serif\">Martin Fredriksson Almqvist, 2016. &#8220;<b><a href=\"https:\/\/ideas.repec.org\/a\/gam\/jscscx\/v5y2016i3p41-d75418.html\">Piracy and the Politics of Social Media<\/a><\/b>,&#8221;\u00a0<a href=\"https:\/\/ideas.repec.org\/s\/gam\/jscscx.html\">Social Sciences<\/a>, MDPI, vol. 5(3), pages 1-12, August.<\/span><\/p>\n<p class=\"MsoNormal\"><span lang=\"EN-US\">Musa Ahmed Zayyad, 2023. &#8220;<a href=\"https:\/\/ideas.repec.org\/a\/bcp\/journl\/v7y2023i6p19-27.html\"><b>An Analysis of the Privacy and Security Issues Affecting the Usage of Social Media<\/b><\/a>,&#8221;\u00a0<a href=\"https:\/\/ideas.repec.org\/s\/bcp\/journl.html\">International Journal of Research and Innovation in Social Science<\/a>, International Journal of Research and Innovation in Social Science (IJRISS), vol. 7(6), pages 19-27, June.<\/span><\/p>\n<p class=\"MsoNormal\"><span lang=\"EN-US\">Omowumi Hafsat Aliu &amp; Samuel Omaji &amp; Kingsley Eghonghon Ukhurebor &amp; Adeyinka Oluwabusayo Abiodun &amp; Olatunji Oluwatosin Onaseso, 2024. &#8220;<a href=\"https:\/\/ideas.repec.org\/a\/aac\/ijirss\/v7y2024i3p878-887id2959.html\"><b>Analysis of users\u2019 perceptions of data privacy on social media networks in Nigeria<\/b><\/a>,&#8221;\u00a0<a href=\"https:\/\/ideas.repec.org\/s\/aac\/ijirss.html\">International Journal of Innovative Research and Scientific Studies<\/a>, Innovative Research Publishing, vol. 7(3), pages 878-887.<\/span><\/p>\n<p class=\"MsoNormal\"><span style=\"font-size: 12.0pt;line-height: 107%;font-family: 'Times New Roman',serif\">Orzan, 2012. <i>Drawbacks of Online Relationships: Trust and Privacy Concerns over Social Media Websites<\/i>. <b>Working Papers Series on Social Responsibility, Ethics, &amp; Sustainable Business<\/b>, Volume 1. Bucharest, Romania, October pages 22-23.<\/span><\/p>\n<p class=\"MsoNormal\"><span lang=\"EN-US\">Sangmi Chai, 2020. &#8220;<a href=\"https:\/\/ideas.repec.org\/a\/gam\/jsusta\/v12y2020i19p8286-d425056.html\"><b>Does Cultural Difference Matter on Social Media? An Examination of the Ethical Culture and Information Privacy Concerns<\/b><\/a>,&#8221;\u00a0<a href=\"https:\/\/ideas.repec.org\/s\/gam\/jsusta.html\">Sustainability<\/a>, MDPI, vol. 12(19), pages 1-12, October.<\/span><\/p>\n<p class=\"MsoNormal\" style=\"text-align: justify\"><span lang=\"EN-US\" style=\"font-size: 12.0pt;line-height: 107%;font-family: 'Times New Roman',serif\">Venetis Kanakaris &amp; Georgios Lampropoulos &amp; Kerstin Siakas, 2019. &#8220;<\/span><span lang=\"EN-US\"><a href=\"https:\/\/ideas.repec.org\/a\/igg\/jhcitp\/v10y2019i1p22-37.html\"><b><span style=\"font-size: 12.0pt;line-height: 107%;font-family: 'Times New Roman',serif\">A Survey and a Case-Study Regarding Social Media Security and Privacy on Greek Future IT Professionals<\/span><\/b><\/a><\/span><span lang=\"EN-US\" style=\"font-size: 12.0pt;line-height: 107%;font-family: 'Times New Roman',serif\">,&#8221;\u00a0<\/span><span lang=\"EN-US\"><a href=\"https:\/\/ideas.repec.org\/s\/igg\/jhcitp.html\"><span style=\"font-size: 12.0pt;line-height: 107%;font-family: 'Times New Roman',serif\">International Journal of Human Capital and Information Technology Professionals (IJHCITP)<\/span><\/a><\/span><span lang=\"EN-US\" style=\"font-size: 12.0pt;line-height: 107%;font-family: 'Times New Roman',serif\">, IGI Global, vol. 10(1), pages 22-37, January.<\/span><\/p>\n<p class=\"MsoNormal\"><span>W. Nwankwo and K. E. Ukhurebor,2020. &#8220;Web forum and social media: A model for automatic removal of fake media using multilayered neural networks,&#8221; <i>International Journal of Scientific &amp; Technology Research, <\/i>vol. 9, no. 1, pp. 4371-4377.<\/span><\/p>\n<p class=\"MsoNormal\"><span lang=\"EN-US\">Wingyan Chung, 2016. &#8220;<a href=\"https:\/\/ideas.repec.org\/a\/taf\/uipsxx\/v12y2016i3p105-106.html\"><b>Social media analytics: Security and privacy issues<\/b><\/a>,&#8221;\u00a0<a href=\"https:\/\/ideas.repec.org\/s\/taf\/uipsxx.html\">Journal of Information Privacy and Security<\/a>, Taylor &amp; Francis Journals, vol. 12(3), pages 105-106, July.<\/span><\/p>\n","protected":false},"excerpt":{"rendered":"<p>SOCIAL MEDIA PRIVACY ISSUE Sushant Sakharam Jadhav 1.User Privacy Concerns (Omowumi Hafsat Aliu, 2024) The study comes to the talk about\u00a0that users&#8217; participation with privacy policies, security concerns, and platform usage patterns all affect how they perceive data privacy on social media. The results show that younger users mostly students spend a lot of time&hellip; <a class=\"more-link\" href=\"http:\/\/www.sachdevajk.in\/?p=22487\">Continue reading <span class=\"screen-reader-text\">SOCIAL MEDIA PRIVACY ISSUE<\/span><\/a><\/p>\n","protected":false},"author":139749,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[1],"tags":[],"class_list":["post-22487","post","type-post","status-publish","format-standard","hentry","category-uncategorized","entry"],"_links":{"self":[{"href":"http:\/\/www.sachdevajk.in\/index.php?rest_route=\/wp\/v2\/posts\/22487","targetHints":{"allow":["GET"]}}],"collection":[{"href":"http:\/\/www.sachdevajk.in\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"http:\/\/www.sachdevajk.in\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"http:\/\/www.sachdevajk.in\/index.php?rest_route=\/wp\/v2\/users\/139749"}],"replies":[{"embeddable":true,"href":"http:\/\/www.sachdevajk.in\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=22487"}],"version-history":[{"count":1,"href":"http:\/\/www.sachdevajk.in\/index.php?rest_route=\/wp\/v2\/posts\/22487\/revisions"}],"predecessor-version":[{"id":22488,"href":"http:\/\/www.sachdevajk.in\/index.php?rest_route=\/wp\/v2\/posts\/22487\/revisions\/22488"}],"wp:attachment":[{"href":"http:\/\/www.sachdevajk.in\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=22487"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"http:\/\/www.sachdevajk.in\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=22487"},{"taxonomy":"post_tag","embeddable":true,"href":"http:\/\/www.sachdevajk.in\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=22487"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}