{"id":186,"date":"2024-04-16T09:50:13","date_gmt":"2024-04-16T07:50:13","guid":{"rendered":"https:\/\/cyber.ddev.site\/wp\/focal-points\/secure-society\/"},"modified":"2026-01-29T12:10:22","modified_gmt":"2026-01-29T11:10:22","slug":"secure-society","status":"publish","type":"page","link":"https:\/\/www.cyberagentur.de\/en\/focal-points\/secure-society\/","title":{"rendered":"Secure society"},"content":{"rendered":"\n<p class=\"has-text-align-center is-style-subtitle-hight-space\">The Secure Society thematic area specifically addresses the interface between technology, cyber security and society. Due to the increasing interlinking of technologies with social processes, it is not enough to take a purely technical view of systems. To ensure the future viability of our institutions and democracy, we need to focus on both individual factors and societal impacts. To this end, our research is dedicated to new socio-technical challenges of the future. To master these, we want to complement cyber resilience with cyber vigilance. Our focus is on the ethical debate and responsible development of a cybervigilant society, the interaction between humans and machines and the cyber-enabling of the state.     <\/p>\n<div class=\"ce-frame is-layout-constrained alignfull ce-frame--bg-default ce-frame--style-default ce-frame-iconstyle-default ce-frame-top-default ce-frame--with-icon has-background has-white-background-color align wp-block-cyberagentur-frame has-background has-white-background-color\">\n    \n    <div class=\"ce-frame__content\">\n            <div class=\"ce-frame__content__wrapper\">\n          <div class=\"ce-frame__icon ce-frame__icon--mobile\">\n        \n    <\/div>\n      \n      <div class=\"ce-frame__content__row\">\n              <div class=\"ce-frame__icon\">\n        \n    <\/div>\n          <div class=\"acf-innerblocks-container\">\n\n<h2 class=\"wp-block-heading has-text-align-left\">Our topics in this focus area<\/h2>\n\n\n  <div class=\"ce-faqaccordions wp-block-cyberagentur-faqaccordions accordion\" id=\"69df0564a4cd6\">\n  <div class=\"accordion-item\" id=\"mensch-maschine-interaktion-2\">\n  <h3 class=\"accordion-header\">\n    <button class=\"accordion-button collapsed\" arial-label=\"Expand entry\" type=\"button\" data-bs-toggle=\"collapse\" data-bs-target=\"#69df0564a4cd6_5796\" aria-expanded=\"false\" aria-controls=\"69df0564a4cd6_5796\">\n      <span>Human-machine interaction<\/span>\n    <\/button>\n  <\/h3>\n  <div id=\"69df0564a4cd6_5796\" class=\"accordion-collapse collapse \" data-bs-parent=\"\">\n    <div class=\"accordion-body\">\n    <p>How can human-centered technology development be realized in the future?<\/p>\n<p>How will we interact with machines in the future?<\/p>\n<p>The interface between humans and artificial systems is becoming increasingly complex due to the introduction of new technologies. We are moving away from a world in which communication with technology is a one-way street for humans. Keyboard and mouse are being replaced by a two-way exchange of information between humans and systems. We are increasingly becoming one unit, which is why the focus in the field of human-machine interaction is on new types of trust and dependency relationships, as well as the use and acceptance of technology.   <\/p>\n\n    <\/div>\n  <\/div>\n<\/div><div class=\"accordion-item\" id=\"cyberbefaehigter-staat-2\">\n  <h3 class=\"accordion-header\">\n    <button class=\"accordion-button collapsed\" arial-label=\"Expand entry\" type=\"button\" data-bs-toggle=\"collapse\" data-bs-target=\"#69df0564a4cd6_5799\" aria-expanded=\"false\" aria-controls=\"69df0564a4cd6_5799\">\n      <span>Cyber-enabled state<\/span>\n    <\/button>\n  <\/h3>\n  <div id=\"69df0564a4cd6_5799\" class=\"accordion-collapse collapse \" data-bs-parent=\"\">\n    <div class=\"accordion-body\">\n    <p>How can society and its legal system be prepared and protected now for the cyber threats of the day after tomorrow?<\/p>\n<p>How can cyberattacks be clearly attributed in a court of law?<\/p>\n<p>In order to detect and prevent cybercrime and cyberattacks at an early stage, authorities and organizations in the field of security will continue to rely on modern tools and (forensic) methods in the future. The thematic field of cyber-enabled state aims to support our authorities and institutions of the day after tomorrow. In order to meet the associated challenges, comprehensive cyber skills, capabilities to protect against digital and hybrid attacks and adapted institutional processes for an increasingly digital world are required.  <\/p>\n\n    <\/div>\n  <\/div>\n<\/div><div class=\"accordion-item\" id=\"cybervigilante-gesellschaft\">\n  <h3 class=\"accordion-header\">\n    <button class=\"accordion-button collapsed\" arial-label=\"Expand entry\" type=\"button\" data-bs-toggle=\"collapse\" data-bs-target=\"#69df0564a4cd6_5801\" aria-expanded=\"false\" aria-controls=\"69df0564a4cd6_5801\">\n      <span>Cybervigilante society<\/span>\n    <\/button>\n  <\/h3>\n  <div id=\"69df0564a4cd6_5801\" class=\"accordion-collapse collapse \" data-bs-parent=\"\">\n    <div class=\"accordion-body\">\n    <p>How can we be alert and resilient in cyberspace?<\/p>\n<p>How can we counter cyber threats with foresight?<\/p>\n<p>Digital spaces are changing the threat landscape for society, authorities and the economy. In addition to institutions, social dynamics and the free democratic basic order are increasingly becoming the aim. In the field of cybervigilant society, we focus on interdisciplinary research, socio-technical issues and the human factor. Our research programs aim to sustainably strengthen cybervigilance and cyber resilience at all levels.   <\/p>\n\n    <\/div>\n  <\/div>\n<\/div>\n  <\/div>\n<\/div>\n      <\/div>\n    <\/div>\n    <\/div>\n    \n<\/div><div class=\"ce-panel-buttons is-layout-constrained alignfull ce-panel-buttons__columns-3 ce-panel-buttons--default has-background has-white-background-color align align is-style-less-space wp-block-cyberagentur-panelbuttons has-background has-white-background-color\">\n  <div class=\"ce-panel-buttons__content\">\n    <div class=\"acf-innerblocks-container\">\n<div class=\"ce-panel-button ce--dark-mode ce-panel-button--default align align wp-block-cyberagentur-panelbutton\">\n      <div class=\"ce-panel-button__background\">\n        <img loading=\"lazy\" decoding=\"async\" width=\"2560\" height=\"1919\" src=\"\/wp-content\/uploads\/2024\/04\/MESH_RGB_purple-1-scaled.jpg\" class=\"attachment-full size-full\" alt=\"\" srcset=\"\/wp-content\/uploads\/2024\/04\/MESH_RGB_purple-1-scaled.jpg 2560w, \/wp-content\/uploads\/2024\/04\/MESH_RGB_purple-1-300x225.jpg 300w, \/wp-content\/uploads\/2024\/04\/MESH_RGB_purple-1-1024x768.jpg 1024w, \/wp-content\/uploads\/2024\/04\/MESH_RGB_purple-1-768x576.jpg 768w, \/wp-content\/uploads\/2024\/04\/MESH_RGB_purple-1-1536x1151.jpg 1536w, \/wp-content\/uploads\/2024\/04\/MESH_RGB_purple-1-2048x1535.jpg 2048w\" sizes=\"auto, (max-width: 2560px) 100vw, 2560px\" \/>\n    <\/div>\n  <a class='ce-panel-button__content-link' href='https:\/\/www.cyberagentur.de\/en\/programs\/' target='_self' aria-label='go to  Programs'>  <h2 class=\"title\">Programs<\/h2>\n  <p>in this focus<\/p>\n   \n  <div class=\"wp-block-buttons is-content-justification-left is-layout-flex wp-block-buttons-is-layout-flex \">\n    <div class=\"wp-block-button is-style-simple\">\n      <span class='wp-block-button__link wp-element-button' >Learn more<\/span>\n     \n    <\/div>\n  <\/div> <\/a>\n\n<\/div>\n\n<div class=\"ce-panel-button ce--dark-mode ce-panel-button--default align align wp-block-cyberagentur-panelbutton\">\n      <div class=\"ce-panel-button__background\">\n        <img loading=\"lazy\" decoding=\"async\" width=\"2560\" height=\"1919\" src=\"\/wp-content\/uploads\/2024\/04\/MESH_RGB_purple-1-scaled.jpg\" class=\"attachment-full size-full\" alt=\"\" srcset=\"\/wp-content\/uploads\/2024\/04\/MESH_RGB_purple-1-scaled.jpg 2560w, \/wp-content\/uploads\/2024\/04\/MESH_RGB_purple-1-300x225.jpg 300w, \/wp-content\/uploads\/2024\/04\/MESH_RGB_purple-1-1024x768.jpg 1024w, \/wp-content\/uploads\/2024\/04\/MESH_RGB_purple-1-768x576.jpg 768w, \/wp-content\/uploads\/2024\/04\/MESH_RGB_purple-1-1536x1151.jpg 1536w, \/wp-content\/uploads\/2024\/04\/MESH_RGB_purple-1-2048x1535.jpg 2048w\" sizes=\"auto, (max-width: 2560px) 100vw, 2560px\" \/>\n    <\/div>\n  <a class='ce-panel-button__content-link' href='https:\/\/www.cyberagentur.de\/en\/awarded\/' target='_self' aria-label='go to  Awards'>  <h2 class=\"title\">Awards<\/h2>\n  <p>in this focus<\/p>\n   \n  <div class=\"wp-block-buttons is-content-justification-left is-layout-flex wp-block-buttons-is-layout-flex \">\n    <div class=\"wp-block-button is-style-simple\">\n      <span class='wp-block-button__link wp-element-button' >Learn more<\/span>\n     \n    <\/div>\n  <\/div> <\/a>\n\n<\/div>\n\n<div class=\"ce-panel-button ce--dark-mode ce-panel-button--default align align wp-block-cyberagentur-panelbutton\">\n      <div class=\"ce-panel-button__background\">\n        <img loading=\"lazy\" decoding=\"async\" width=\"2560\" height=\"1919\" src=\"\/wp-content\/uploads\/2024\/04\/MESH_RGB_purple-1-scaled.jpg\" class=\"attachment-full size-full\" alt=\"\" srcset=\"\/wp-content\/uploads\/2024\/04\/MESH_RGB_purple-1-scaled.jpg 2560w, \/wp-content\/uploads\/2024\/04\/MESH_RGB_purple-1-300x225.jpg 300w, \/wp-content\/uploads\/2024\/04\/MESH_RGB_purple-1-1024x768.jpg 1024w, \/wp-content\/uploads\/2024\/04\/MESH_RGB_purple-1-768x576.jpg 768w, \/wp-content\/uploads\/2024\/04\/MESH_RGB_purple-1-1536x1151.jpg 1536w, \/wp-content\/uploads\/2024\/04\/MESH_RGB_purple-1-2048x1535.jpg 2048w\" sizes=\"auto, (max-width: 2560px) 100vw, 2560px\" \/>\n    <\/div>\n  <a class='ce-panel-button__content-link' href='https:\/\/www.cyberagentur.de\/en\/karriere\/' target='_self' aria-label='go to  Vacancies'>  <h2 class=\"title\">Vacancies<\/h2>\n  <p><\/p>\n   \n  <div class=\"wp-block-buttons is-content-justification-left is-layout-flex wp-block-buttons-is-layout-flex \">\n    <div class=\"wp-block-button is-style-simple\">\n      <span class='wp-block-button__link wp-element-button' >Learn more<\/span>\n     \n    <\/div>\n  <\/div> <\/a>\n\n<\/div>\n<\/div>\n  <\/div>\n<\/div><div class=\"ce-frame is-layout-constrained alignfull ce-frame--bg-right ce-frame--style-default ce-frame-iconstyle-default ce-frame-top-default has-background has-purple-misty-background-color align is-style-default wp-block-cyberagentur-frame has-background has-purple-misty-background-color\">\n    \n    <div class=\"ce-frame__content\">\n            <div class=\"ce-frame__background\">\n        <img decoding=\"async\" src=\"\/wp-content\/uploads\/2024\/07\/Fragezeichen_space_white.svg\" class=\"attachment-full size-full\" alt=\"\" \/>\n    <\/div>    \n    <div class=\"acf-innerblocks-container\">\n\n<h2 class=\"wp-block-heading has-text-align-left\">Questions about this focus?<\/h2>\n\n\n\n<p>Send us an e-mail: <br\/><a href=\"mailto:&#115;&#105;&#99;h&#101;&#114;&#101;&#45;gese&#108;&#108;&#115;&#99;ha&#102;&#116;&#64;cyberag&#101;ntur&#46;de\">s&#105;&#99;h&#101;re-&#103;&#101;&#115;el&#108;&#115;c&#104;af&#116;&#64;&#99;y&#98;&#101;&#114;a&#103;&#101;nt&#117;&#114;.d&#101;<\/a><\/p>\n\n<\/div>\n    <\/div>\n    \n<\/div><div class=\"ce-frame is-layout-constrained alignfull ce-frame--bg-default ce-frame--style-default ce-frame-iconstyle-default ce-frame-top-default has-background has-white-background-color align wp-block-cyberagentur-frame has-background has-white-background-color\">\n    \n    <div class=\"ce-frame__content\">\n            \n    <div class=\"acf-innerblocks-container\">\n\n<h2 class=\"wp-block-heading has-text-align-left is-style-subtitle is-style-subheadline\">Also interesting<\/h2>\n\n\n<div class=\"ce-focusmenu ce-focusmenu--2columns has-background has-white-background-color align wp-block-cyberagentur-focusmenu has-background has-white-background-color\">\n    <ul class=\"ce-panelmenu\">\n        <li class=\"card-item\">\n  <a href=\"https:\/\/www.cyberagentur.de\/en\/focal-points\/cybersicherheit-komplexer-systeme\/\" aria-label=\"go to  Cybersecurity of complex systems\" >\n    <div class=\"card-item__image\">\n      <img loading=\"lazy\" decoding=\"async\" width=\"1\" height=\"1\" src=\"\/wp-content\/uploads\/2024\/04\/CA_Icon_Sichere-Systeme.svg\" class=\"attachment-medium size-medium\" alt=\"\" \/>\n    <\/div>\n    <div class=\"card-item__body\">\n      <h3 class=\"card-item__headline\">Cybersecurity of complex systems<\/h3>\n      <p>For the functioning of the state, administration and economy.<\/p>\n      <div class=\"wp-block-buttons is-content-justification-left is-layout-flex wp-block-buttons-is-layout-flex \">\n        <div class=\"wp-block-button is-style-simple\">\n          <span class=\"wp-block-button__link wp-element-button\">Learn more<\/span>\n        <\/div>\n      <\/div>\n    <\/div>\n  <\/a>\n<\/li><li class=\"card-item\">\n  <a href=\"https:\/\/www.cyberagentur.de\/en\/focal-points\/schluesseltechnologien\/\" aria-label=\"go to  Key technologies\" >\n    <div class=\"card-item__image\">\n      <img loading=\"lazy\" decoding=\"async\" width=\"1\" height=\"1\" src=\"\/wp-content\/uploads\/2024\/04\/CA_Icon_Schluesseltechnologien-2.svg\" class=\"attachment-medium size-medium\" alt=\"\" \/>\n    <\/div>\n    <div class=\"card-item__body\">\n      <h3 class=\"card-item__headline\">Key technologies<\/h3>\n      <p>The impact is coming. Let&#8217;s make use of it. <\/p>\n      <div class=\"wp-block-buttons is-content-justification-left is-layout-flex wp-block-buttons-is-layout-flex \">\n        <div class=\"wp-block-button is-style-simple\">\n          <span class=\"wp-block-button__link wp-element-button\">Learn more<\/span>\n        <\/div>\n      <\/div>\n    <\/div>\n  <\/a>\n<\/li><li class=\"card-item\">\n  <a href=\"https:\/\/www.cyberagentur.de\/en\/focal-points\/vertrauenswuerdige-technische-wertschoepfungsketten\/\" aria-label=\"go to  Trustworthy technical value chains\" >\n    <div class=\"card-item__image\">\n      <img loading=\"lazy\" decoding=\"async\" width=\"1\" height=\"1\" src=\"\/wp-content\/uploads\/2026\/01\/CA-Icon-Schwerpunkt-VerTechWK-DD.svg\" class=\"attachment-medium size-medium\" alt=\"\" \/>\n    <\/div>\n    <div class=\"card-item__body\">\n      <h3 class=\"card-item__headline\">Trustworthy technical value chains<\/h3>\n      <p>So that citizens in Germany can have confidence in digital solutions.<\/p>\n      <div class=\"wp-block-buttons is-content-justification-left is-layout-flex wp-block-buttons-is-layout-flex \">\n        <div class=\"wp-block-button is-style-simple\">\n          <span class=\"wp-block-button__link wp-element-button\">Learn more<\/span>\n        <\/div>\n      <\/div>\n    <\/div>\n  <\/a>\n<\/li>\n    <\/ul>\n<\/div>\n<\/div>\n    <\/div>\n    \n<\/div>","protected":false},"excerpt":{"rendered":"<p>The Secure Society thematic area specifically addresses the interface between technology, cyber security and society. Due to the increasing interlinking of technologies with social processes, it is not enough to take a purely technical view of systems. To ensure the future viability of our institutions and democracy, we need to focus on both individual factors [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"parent":3321,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_acf_changed":false,"footnotes":""},"class_list":["post-186","page","type-page","status-publish","hentry"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.3 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Secure society - Cyberagentur<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.cyberagentur.de\/en\/focal-points\/secure-society\/\" \/>\n<meta property=\"og:locale\" content=\"en_GB\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Secure society - Cyberagentur\" \/>\n<meta property=\"og:description\" content=\"The Secure Society thematic area specifically addresses the interface between technology, cyber security and society. Due to the increasing interlinking of technologies with social processes, it is not enough to take a purely technical view of systems. To ensure the future viability of our institutions and democracy, we need to focus on both individual factors [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.cyberagentur.de\/en\/focal-points\/secure-society\/\" \/>\n<meta property=\"og:site_name\" content=\"Cyberagentur\" \/>\n<meta property=\"article:modified_time\" content=\"2026-01-29T11:10:22+00:00\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Estimated reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.cyberagentur.de\\\/en\\\/focal-points\\\/secure-society\\\/\",\"url\":\"https:\\\/\\\/www.cyberagentur.de\\\/en\\\/focal-points\\\/secure-society\\\/\",\"name\":\"Secure society - Cyberagentur\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.cyberagentur.de\\\/en\\\/#website\"},\"datePublished\":\"2024-04-16T07:50:13+00:00\",\"dateModified\":\"2026-01-29T11:10:22+00:00\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.cyberagentur.de\\\/en\\\/focal-points\\\/secure-society\\\/#breadcrumb\"},\"inLanguage\":\"en-GB\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.cyberagentur.de\\\/en\\\/focal-points\\\/secure-society\\\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.cyberagentur.de\\\/en\\\/focal-points\\\/secure-society\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.cyberagentur.de\\\/en\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Focal points\",\"item\":\"https:\\\/\\\/www.cyberagentur.de\\\/en\\\/focal-points\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Secure society\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.cyberagentur.de\\\/en\\\/#website\",\"url\":\"https:\\\/\\\/www.cyberagentur.de\\\/en\\\/\",\"name\":\"Cyberagentur\",\"description\":\"\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.cyberagentur.de\\\/en\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-GB\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Secure society - Cyberagentur","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.cyberagentur.de\/en\/focal-points\/secure-society\/","og_locale":"en_GB","og_type":"article","og_title":"Secure society - Cyberagentur","og_description":"The Secure Society thematic area specifically addresses the interface between technology, cyber security and society. Due to the increasing interlinking of technologies with social processes, it is not enough to take a purely technical view of systems. To ensure the future viability of our institutions and democracy, we need to focus on both individual factors [&hellip;]","og_url":"https:\/\/www.cyberagentur.de\/en\/focal-points\/secure-society\/","og_site_name":"Cyberagentur","article_modified_time":"2026-01-29T11:10:22+00:00","twitter_card":"summary_large_image","twitter_misc":{"Estimated reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/www.cyberagentur.de\/en\/focal-points\/secure-society\/","url":"https:\/\/www.cyberagentur.de\/en\/focal-points\/secure-society\/","name":"Secure society - Cyberagentur","isPartOf":{"@id":"https:\/\/www.cyberagentur.de\/en\/#website"},"datePublished":"2024-04-16T07:50:13+00:00","dateModified":"2026-01-29T11:10:22+00:00","breadcrumb":{"@id":"https:\/\/www.cyberagentur.de\/en\/focal-points\/secure-society\/#breadcrumb"},"inLanguage":"en-GB","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.cyberagentur.de\/en\/focal-points\/secure-society\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.cyberagentur.de\/en\/focal-points\/secure-society\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.cyberagentur.de\/en\/"},{"@type":"ListItem","position":2,"name":"Focal points","item":"https:\/\/www.cyberagentur.de\/en\/focal-points\/"},{"@type":"ListItem","position":3,"name":"Secure society"}]},{"@type":"WebSite","@id":"https:\/\/www.cyberagentur.de\/en\/#website","url":"https:\/\/www.cyberagentur.de\/en\/","name":"Cyberagentur","description":"","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.cyberagentur.de\/en\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-GB"}]}},"_links":{"self":[{"href":"https:\/\/www.cyberagentur.de\/en\/wp-json\/wp\/v2\/pages\/186","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.cyberagentur.de\/en\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/www.cyberagentur.de\/en\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/www.cyberagentur.de\/en\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.cyberagentur.de\/en\/wp-json\/wp\/v2\/comments?post=186"}],"version-history":[{"count":11,"href":"https:\/\/www.cyberagentur.de\/en\/wp-json\/wp\/v2\/pages\/186\/revisions"}],"predecessor-version":[{"id":6211,"href":"https:\/\/www.cyberagentur.de\/en\/wp-json\/wp\/v2\/pages\/186\/revisions\/6211"}],"up":[{"embeddable":true,"href":"https:\/\/www.cyberagentur.de\/en\/wp-json\/wp\/v2\/pages\/3321"}],"wp:attachment":[{"href":"https:\/\/www.cyberagentur.de\/en\/wp-json\/wp\/v2\/media?parent=186"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}