{"id":4322,"date":"2021-01-07T20:30:16","date_gmt":"2021-01-07T20:30:16","guid":{"rendered":"https:\/\/www.peeriosity.com\/shared-services\/articles\/?p=4322"},"modified":"2022-08-23T18:10:14","modified_gmt":"2022-08-23T18:10:14","slug":"fraud-control-using-oversights-risk-mitigation-solutions","status":"publish","type":"post","link":"https:\/\/www.peeriosity.com\/shared-services\/articles\/2021\/01\/fraud-control-using-oversights-risk-mitigation-solutions\/","title":{"rendered":"Fraud Control using Oversight\u2019s Risk Mitigation Solutions"},"content":{"rendered":"\r\n<p style=\"font-size: 14px;\"><strong>Introduction<\/strong><\/p>\r\n\r\n\r\n\r\n<p style=\"font-size: 14px;\">The risk of fraudulent transactions continues to impact the ability of companies to expand the distribution and allowable usage of both the Purchasing Card and the Travel Card.\u00a0 While the appropriate use of <a href=\"https:\/\/www.investopedia.com\/terms\/m\/merchant-category-codes-mcc.asp#:~:text=Key%20Takeaways-,Merchant%20category%20codes%20(MCCs)%20are%20four%2Ddigit%20numbers%20that,card%20points%20for%20qualified%20purchases.\" target=\"_blank\" rel=\"noopener\">merchant category codes (MCCs)<\/a> and monetary limits are cornerstones of any card fraud prevention structure, in recent years new tactics and technologies have been developed that can help to mitigate these risks when implemented and administered properly.\u00a0 Some of these solutions have been developed by software solution providers, while others are being developed within companies to address their own specific requirements.<\/p>\r\n\r\n\r\n\r\n<p style=\"font-size: 14px;\"><strong>Company Experience<\/strong><\/p>\r\n\r\n\r\n\r\n<p style=\"font-size: 14px;\">A recent Peeriosity Peercast<sup>TM<\/sup> featured a large global company with over $50B in annual revenue discussing their experience with using Oversight Systems software\u2019s risk mitigation solutions to reduce the risk of Corporate Card fraud. With a project that was implemented in 2020, the project\u2019s mission was to transform the travel and expense and purchasing card process by leveraging technology to focus on high-risk areas and transactions without sacrificing accuracy, internal controls, or compliance with corporate policies. Implemented for their North American Finance Shared Services Center, the project scope included 30+ business units in the US and Canada with over 5,000 active <a href=\"https:\/\/www.peeriosity.com\/shared-services\/articles\/category\/corporate-card\/\">Corporate Card accounts<\/a> with roughly 100,000 expense reports and over USD $100 million in credit card spending.\u00a0 The company uses a One Card program for Travel and Entertainment and for Purchasing Card transactions, using Concur as the expense reporting platform.<\/p>\r\n\r\n\r\n\r\n<p style=\"font-size: 14px;\">The company\u2019s history includes the implementation of Concur in 2010, the implementation of Concur Paperless Pay and transition to a <a href=\"https:\/\/www.peeriosity.com\/shared-services\/articles\/2019\/01\/implementing-a-one-card-program-for-pcard-and-te\/\">One-Card program<\/a> in 2017, the implementation of reason codes for exceptions in SAP Concur in 2018, and most recently the launch of a project to utilize software and Artificial Intelligence technology in 2019, with the project completed and implemented using new processes and technology in 2020.\u00a0<\/p>\r\n\r\n\r\n\r\n<p style=\"font-size: 14px;\">Some of the benefits of implementing Oversight Systems software discussed by our feature company included:<\/p>\r\n\r\n\r\n\r\n<ul class=\"font-14\">\r\n<li>Quick identification of high-risk transactions<\/li>\r\n<li>Pre-built analytics based on best practices and industry data<\/li>\r\n<li>Visibility to repeat offenders<\/li>\r\n<li>Case management enabled workflow to support root-cause tracking<\/li>\r\n<li>Reduction of overall operating cost by more than $250,000 per year<\/li>\r\n<\/ul>\r\n\r\n\r\n\r\n<p style=\"font-size: 14px;\">For details, Peeriosity members are encouraged to sign into the member\u2019s area to view the complete presentation and listen to the recorded Peercast.<\/p>\r\n\r\n\r\n\r\n<p style=\"font-size: 14px;\"><strong>iPolling<sup>TM<\/sup> Results Review<\/strong><\/p>\r\n\r\n\r\n\r\n<p style=\"font-size: 14px;\">The results from a recent Peeriosity poll created using the iPolling<sup>TM<\/sup> technology provide additional insight into this topic. \u00a0The first question in the poll asked Peeriosity member companies about the primary solution\/approach they were using to identify fraud related to the use of their Corporate Card.\u00a0 The results indicate that 31% are using Oversight Systems software, with an additional 31% at the other end of the spectrum and relying on supervisor review.\u00a0 An additional 22% indicate that review by Internal Auditors is the primary solution\/approach, with 8% relying on Concur Detect and 8% relying on Forensic Auditors.\u00a0<\/p>\r\n\r\n\r\n\r\n<figure class=\"wp-block-image\"><img loading=\"lazy\" class=\"alignnone wp-image-4324\" src=\"https:\/\/www.peeriosity.com\/shared-services\/articles\/wp-content\/uploads\/2021\/01\/image.png\" alt=\"company's primary solution to identify fraud\" width=\"663\" height=\"402\" srcset=\"https:\/\/www.peeriosity.com\/shared-services\/articles\/wp-content\/uploads\/2021\/01\/image.png 663w, https:\/\/www.peeriosity.com\/shared-services\/articles\/wp-content\/uploads\/2021\/01\/image-300x182.png 300w, https:\/\/www.peeriosity.com\/shared-services\/articles\/wp-content\/uploads\/2021\/01\/image-495x300.png 495w\" sizes=\"(max-width: 663px) 100vw, 663px\" \/><\/figure>\r\n\r\n\r\n\r\n<p style=\"font-size: 14px;\">The second poll question asked about the use of technology to reduce exposure to <a href=\"https:\/\/www.peeriosity.com\/shared-services\/articles\/2015\/02\/utilizing-technology-to-reduce-exposure-to-corporate-card-fraud\/\">corporate card fraud<\/a>.\u00a0 While only 8% indicated that they rely on technology almost exclusively, 46% report that technology is important to reducing exposure, and is used along with other approaches, with 31% indicating that technology is helpful but that they mostly rely on other approaches.\u00a0 The remaining 15% indicated that their use of technology is limited as a means to help reduce exposure to corporate card fraud.\u00a0<\/p>\r\n\r\n\r\n\r\n<figure class=\"wp-block-image\"><img loading=\"lazy\" class=\"alignnone wp-image-4325\" src=\"https:\/\/www.peeriosity.com\/shared-services\/articles\/wp-content\/uploads\/2021\/01\/image-1.png\" alt=\"fraud control- Reducing exposure to corporate card fund\" width=\"663\" height=\"403\" srcset=\"https:\/\/www.peeriosity.com\/shared-services\/articles\/wp-content\/uploads\/2021\/01\/image-1.png 663w, https:\/\/www.peeriosity.com\/shared-services\/articles\/wp-content\/uploads\/2021\/01\/image-1-300x182.png 300w, https:\/\/www.peeriosity.com\/shared-services\/articles\/wp-content\/uploads\/2021\/01\/image-1-494x300.png 494w\" sizes=\"(max-width: 663px) 100vw, 663px\" \/><\/figure>\r\n\r\n\r\n\r\n<p style=\"font-size: 14px;\">A few of the comments from members include:<\/p>\r\n\r\n\r\n\r\n<ul class=\"font-14\">\r\n<li><em>We utilize Concur alerts, manual audit with specified criteria for audit, and the fact transaction review. Corporate card provider also assesses and declines fraudulent transactions and disable credit card.<\/em><\/li>\r\n<\/ul>\r\n\r\n\r\n\r\n<ul class=\"font-14\">\r\n<li><em>We use an Oversight analytics tool to help us focus on potential issues as part of an after-the-fact review.<\/em><\/li>\r\n<\/ul>\r\n\r\n\r\n\r\n<ul class=\"font-14\">\r\n<li><em>Our primary solution is Concur Detect but our process also incorporates additional system checks within Concur along with supervisor review and approval prior to reports being approved for payment.<\/em><\/li>\r\n<\/ul>\r\n\r\n\r\n\r\n<ul class=\"font-14\">\r\n<li><em>We use Oversight and we have monthly updates with Steering Committee.<\/em><\/li>\r\n<\/ul>\r\n\r\n\r\n\r\n<ul class=\"font-14\">\r\n<li><em>Manager Review is our primary detection; however, we also have other tools we leverage, including Concur Detect. However, since the manager is closest to the spending and knows the details of the employees&#8217; travel, spending, etc., they are the primary control.<\/em><\/li>\r\n<\/ul>\r\n\r\n\r\n\r\n<p style=\"font-size: 14px;\"><strong>Closing Summary<\/strong><\/p>\r\n\r\n\r\n\r\n<p style=\"font-size: 14px;\">The concern with card fraud is that companies can develop a false sense of security that their existing systems and controls are more than adequate, while, in actuality, there could be a significant control breach that they are not even aware of.\u00a0 With a large number of cardholders and high monetary amounts of transactions flowing through the typical Travel Expense and Purchasing Card program, comes the need to continually upgrade the capabilities of the fraud detection systems and controls to mitigate the exposure that the company faces.\u00a0 A nominal investment in new tools might save many companies a significant amount of money by allowing them to better detect and control fraud.<\/p>\r\n\r\n\r\n\r\n<p style=\"font-size: 14px;\">Is your company leveraging the latest technology to keep Corporate Card fraud to a minimum?\u00a0 How confident are you regarding the integrity of your card program?<\/p>\r\n\r\n\r\n\r\n<p style=\"font-size: 14px;\">Who are <em>your<\/em> peers and how are you collaborating with them?<\/p>\r\n\r\n\r\n\r\n<p>______________________________________________________________________________<\/p>\r\n\r\n\r\n\r\n<p style=\"font-size: 14px;\">\u201cPeercasts<sup>TM<\/sup>\u201d are private, professionally facilitated webcasts that feature leading member company experiences on specific topics as a catalyst for broader discussion.\u00a0 Access is available exclusively to Peeriosity member company employees, with consultants or vendors prohibited from attending or accessing discussion content.\u00a0 Members can see who is registered to attend in advance, with discussion recordings, supporting polls, and presentation materials online and available whenever convenient for the member.\u00a0 Using Peeriosity\u2019s integrated email system, Peer Mail<sup>TM<\/sup>, attendees can easily communicate at any time with other attending peers by selecting them from the list of registered attendees.\u00a0<\/p>\r\n\r\n\r\n\r\n<p style=\"font-size: 14px;\"><sup>\u00a0<\/sup>\u201ciPolling<sup>TM<\/sup>\u201d is available exclusively to Peeriosity member company employees, with consultants or vendors prohibited from participating or accessing content. Members have full visibility to all respondents and their comments. Using Peeriosity\u2019s integrated email system, Peer Mail<sup>TM<\/sup>, members can easily communicate at any time with others who participated in iPolling<sup>TM<\/sup>.<\/p>\r\n\r\n\r\n\r\n<p style=\"font-size: 14px;\">Peeriosity members are invited to log into <a href=\"http:\/\/www.peeriosity.com\/shared-services\/\">www.peeriosity.com<\/a> to join the discussion and connect with Peers.\u00a0\u00a0 Membership is for practitioners only, with no consultants or vendors permitted.\u00a0 To learn more about Peeriosity, <a href=\"https:\/\/www.peeriosity.com\/shared-services\/\">click here<\/a>.<\/p>\r\n<p><span class='st_linkedin_large' st_title='Fraud Control using Oversight\u2019s Risk Mitigation Solutions' st_url='https%3A%2F%2Fwww.peeriosity.com%2Fshared-services%2Farticles%2F2021%2F01%2Ffraud-control-using-oversights-risk-mitigation-solutions%2F' displayText='linkedin'><\/span><span class='st_twitter_large' st_title='Fraud Control using Oversight\u2019s Risk Mitigation Solutions' st_url='https%3A%2F%2Fwww.peeriosity.com%2Fshared-services%2Farticles%2F2021%2F01%2Ffraud-control-using-oversights-risk-mitigation-solutions%2F' displayText='twitter'><\/span><span class='st_email_large' st_title='Fraud Control using Oversight\u2019s Risk Mitigation Solutions' st_url='https%3A%2F%2Fwww.peeriosity.com%2Fshared-services%2Farticles%2F2021%2F01%2Ffraud-control-using-oversights-risk-mitigation-solutions%2F' displayText='email'><\/span><\/p>","protected":false},"excerpt":{"rendered":"<p>Introduction The risk of fraudulent transactions continues to impact the ability of companies to expand the distribution and allowable usage of both the Purchasing Card and the Travel Card.\u00a0 While the appropriate use of merchant category codes (MCCs) and monetary limits are cornerstones of any card fraud prevention structure, in recent years new tactics and [&hellip;]<\/p>\n<p><span class='st_linkedin_large' st_title='Fraud Control using Oversight\u2019s Risk Mitigation Solutions' st_url='https%3A%2F%2Fwww.peeriosity.com%2Fshared-services%2Farticles%2F2021%2F01%2Ffraud-control-using-oversights-risk-mitigation-solutions%2F' displayText='linkedin'><\/span><span class='st_twitter_large' st_title='Fraud Control using Oversight\u2019s Risk Mitigation Solutions' st_url='https%3A%2F%2Fwww.peeriosity.com%2Fshared-services%2Farticles%2F2021%2F01%2Ffraud-control-using-oversights-risk-mitigation-solutions%2F' displayText='twitter'><\/span><span class='st_email_large' st_title='Fraud Control using Oversight\u2019s Risk Mitigation Solutions' st_url='https%3A%2F%2Fwww.peeriosity.com%2Fshared-services%2Farticles%2F2021%2F01%2Ffraud-control-using-oversights-risk-mitigation-solutions%2F' displayText='email'><\/span><\/p>","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":[],"categories":[5],"tags":[],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v19.2 (Yoast SEO v19.13) - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Fraud Control: Risk Mitigation Solutions | Peeriosity, LLC<\/title>\n<meta name=\"description\" content=\"In recent years new tactics and technologies have been developed for fraud control. Read more at Peeriosity to learn more about card frauds\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.peeriosity.com\/shared-services\/articles\/2021\/01\/fraud-control-using-oversights-risk-mitigation-solutions\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Fraud Control using Oversight\u2019s Risk Mitigation Solutions\" \/>\n<meta property=\"og:description\" content=\"In recent years new tactics and technologies have been developed for fraud control. Read more at Peeriosity to learn more about card frauds\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.peeriosity.com\/shared-services\/articles\/2021\/01\/fraud-control-using-oversights-risk-mitigation-solutions\/\" \/>\n<meta property=\"og:site_name\" content=\"Peeriosity\" \/>\n<meta property=\"article:published_time\" content=\"2021-01-07T20:30:16+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2022-08-23T18:10:14+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.peeriosity.com\/shared-services\/articles\/wp-content\/uploads\/2021\/01\/image.png\" \/>\n<meta name=\"author\" content=\"admin\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"admin\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"5 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.peeriosity.com\/shared-services\/articles\/2021\/01\/fraud-control-using-oversights-risk-mitigation-solutions\/\",\"url\":\"https:\/\/www.peeriosity.com\/shared-services\/articles\/2021\/01\/fraud-control-using-oversights-risk-mitigation-solutions\/\",\"name\":\"Fraud Control: Risk Mitigation Solutions | Peeriosity, LLC\",\"isPartOf\":{\"@id\":\"https:\/\/www.peeriosity.com\/shared-services\/articles\/#website\"},\"datePublished\":\"2021-01-07T20:30:16+00:00\",\"dateModified\":\"2022-08-23T18:10:14+00:00\",\"author\":{\"@id\":\"https:\/\/www.peeriosity.com\/shared-services\/articles\/#\/schema\/person\/06131ee5ca35862440ab2ed1ade7cc4a\"},\"description\":\"In recent years new tactics and technologies have been developed for fraud control. Read more at Peeriosity to learn more about card frauds\",\"breadcrumb\":{\"@id\":\"https:\/\/www.peeriosity.com\/shared-services\/articles\/2021\/01\/fraud-control-using-oversights-risk-mitigation-solutions\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.peeriosity.com\/shared-services\/articles\/2021\/01\/fraud-control-using-oversights-risk-mitigation-solutions\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.peeriosity.com\/shared-services\/articles\/2021\/01\/fraud-control-using-oversights-risk-mitigation-solutions\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.peeriosity.com\/shared-services\/articles\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Fraud Control using Oversight\u2019s Risk Mitigation Solutions\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.peeriosity.com\/shared-services\/articles\/#website\",\"url\":\"https:\/\/www.peeriosity.com\/shared-services\/articles\/\",\"name\":\"Peeriosity\",\"description\":\"Peeriosity Research\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.peeriosity.com\/shared-services\/articles\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.peeriosity.com\/shared-services\/articles\/#\/schema\/person\/06131ee5ca35862440ab2ed1ade7cc4a\",\"name\":\"admin\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.peeriosity.com\/shared-services\/articles\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/f40a0d8493f8ff51d8560c30b5fa9933?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/f40a0d8493f8ff51d8560c30b5fa9933?s=96&d=mm&r=g\",\"caption\":\"admin\"}}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Fraud Control: Risk Mitigation Solutions | Peeriosity, LLC","description":"In recent years new tactics and technologies have been developed for fraud control. Read more at Peeriosity to learn more about card frauds","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.peeriosity.com\/shared-services\/articles\/2021\/01\/fraud-control-using-oversights-risk-mitigation-solutions\/","og_locale":"en_US","og_type":"article","og_title":"Fraud Control using Oversight\u2019s Risk Mitigation Solutions","og_description":"In recent years new tactics and technologies have been developed for fraud control. Read more at Peeriosity to learn more about card frauds","og_url":"https:\/\/www.peeriosity.com\/shared-services\/articles\/2021\/01\/fraud-control-using-oversights-risk-mitigation-solutions\/","og_site_name":"Peeriosity","article_published_time":"2021-01-07T20:30:16+00:00","article_modified_time":"2022-08-23T18:10:14+00:00","og_image":[{"url":"https:\/\/www.peeriosity.com\/shared-services\/articles\/wp-content\/uploads\/2021\/01\/image.png"}],"author":"admin","twitter_card":"summary_large_image","twitter_misc":{"Written by":"admin","Est. reading time":"5 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/www.peeriosity.com\/shared-services\/articles\/2021\/01\/fraud-control-using-oversights-risk-mitigation-solutions\/","url":"https:\/\/www.peeriosity.com\/shared-services\/articles\/2021\/01\/fraud-control-using-oversights-risk-mitigation-solutions\/","name":"Fraud Control: Risk Mitigation Solutions | Peeriosity, LLC","isPartOf":{"@id":"https:\/\/www.peeriosity.com\/shared-services\/articles\/#website"},"datePublished":"2021-01-07T20:30:16+00:00","dateModified":"2022-08-23T18:10:14+00:00","author":{"@id":"https:\/\/www.peeriosity.com\/shared-services\/articles\/#\/schema\/person\/06131ee5ca35862440ab2ed1ade7cc4a"},"description":"In recent years new tactics and technologies have been developed for fraud control. Read more at Peeriosity to learn more about card frauds","breadcrumb":{"@id":"https:\/\/www.peeriosity.com\/shared-services\/articles\/2021\/01\/fraud-control-using-oversights-risk-mitigation-solutions\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.peeriosity.com\/shared-services\/articles\/2021\/01\/fraud-control-using-oversights-risk-mitigation-solutions\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.peeriosity.com\/shared-services\/articles\/2021\/01\/fraud-control-using-oversights-risk-mitigation-solutions\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.peeriosity.com\/shared-services\/articles\/"},{"@type":"ListItem","position":2,"name":"Fraud Control using Oversight\u2019s Risk Mitigation Solutions"}]},{"@type":"WebSite","@id":"https:\/\/www.peeriosity.com\/shared-services\/articles\/#website","url":"https:\/\/www.peeriosity.com\/shared-services\/articles\/","name":"Peeriosity","description":"Peeriosity Research","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.peeriosity.com\/shared-services\/articles\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/www.peeriosity.com\/shared-services\/articles\/#\/schema\/person\/06131ee5ca35862440ab2ed1ade7cc4a","name":"admin","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.peeriosity.com\/shared-services\/articles\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/f40a0d8493f8ff51d8560c30b5fa9933?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/f40a0d8493f8ff51d8560c30b5fa9933?s=96&d=mm&r=g","caption":"admin"}}]}},"_links":{"self":[{"href":"https:\/\/www.peeriosity.com\/shared-services\/articles\/wp-json\/wp\/v2\/posts\/4322"}],"collection":[{"href":"https:\/\/www.peeriosity.com\/shared-services\/articles\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.peeriosity.com\/shared-services\/articles\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.peeriosity.com\/shared-services\/articles\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.peeriosity.com\/shared-services\/articles\/wp-json\/wp\/v2\/comments?post=4322"}],"version-history":[{"count":7,"href":"https:\/\/www.peeriosity.com\/shared-services\/articles\/wp-json\/wp\/v2\/posts\/4322\/revisions"}],"predecessor-version":[{"id":5814,"href":"https:\/\/www.peeriosity.com\/shared-services\/articles\/wp-json\/wp\/v2\/posts\/4322\/revisions\/5814"}],"wp:attachment":[{"href":"https:\/\/www.peeriosity.com\/shared-services\/articles\/wp-json\/wp\/v2\/media?parent=4322"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.peeriosity.com\/shared-services\/articles\/wp-json\/wp\/v2\/categories?post=4322"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.peeriosity.com\/shared-services\/articles\/wp-json\/wp\/v2\/tags?post=4322"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}