{"id":283135,"count":1,"description":"","link":"https:\/\/blogs.kent.ac.uk\/cyber-institute-news\/tag\/real-world-practices\/","name":"real-world practices","slug":"real-world-practices","taxonomy":"post_tag","meta":[],"_links":{"self":[{"href":"https:\/\/blogs.kent.ac.uk\/cyber-institute-news\/wp-json\/wp\/v2\/tags\/283135"}],"collection":[{"href":"https:\/\/blogs.kent.ac.uk\/cyber-institute-news\/wp-json\/wp\/v2\/tags"}],"about":[{"href":"https:\/\/blogs.kent.ac.uk\/cyber-institute-news\/wp-json\/wp\/v2\/taxonomies\/post_tag"}],"wp:post_type":[{"href":"https:\/\/blogs.kent.ac.uk\/cyber-institute-news\/wp-json\/wp\/v2\/posts?tags=283135"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}