
{"id":721,"date":"2017-10-25T11:16:10","date_gmt":"2017-10-25T11:16:10","guid":{"rendered":"https:\/\/www.editage.com\/insights\/how-to-identify-predatory-conferences-the-think-check-attend-checklist\/"},"modified":"2025-01-15T06:38:42","modified_gmt":"2025-01-15T06:38:42","slug":"how-to-identify-predatory-conferences-the-thinkcheckattend-checklist","status":"publish","type":"post","link":"https:\/\/www.editage.com\/insights\/how-to-identify-predatory-conferences-the-thinkcheckattend-checklist","title":{"rendered":"How to identify predatory conferences: The Think.Check.Attend checklist"},"content":{"rendered":"<p style=\"text-align: justify;\">Members of the scholarly community are well-acquainted with the increasing menace of predatory publishers and journals. The more recent entry in the league of predators in academic publishing are predatory conferences. In recent times, many academics from various fields have been receiving an increasing number of invitations to present at or attend conferences. Most of these appear to be scholarly conferences, but are in reality an exploitative means used by predatory publishers and conference organizers to make money in the form of registration fees. These fake conferences mostly target unsuspecting early-career researchers. Sometimes, the speakers or attendees are subsequently informed that the conference had been cancelled due to some reason, but the registration fees were never returned.\u00a0 At other times, the meetings do happen, but they are far from the high profile international events they were expected to be: sparsely attended and without any of the prominent speakers displayed on the conference website.\u00a0 Stories about these dubious meetings and events have been reported in <a href=\"http:\/\/www.sciencemag.org\/careers\/2016\/11\/dubious-conferences-put-pose-symposium\">Science Magazine<\/a>, <a href=\"https:\/\/www.nytimes.com\/2016\/12\/29\/upshot\/fake-academe-looking-much-like-the-real-thing.html\">NYTimes<\/a>, and <a href=\"http:\/\/www.huffingtonpost.ca\/dr-madhukar-pai\/predatory-conferences-academia_b_12467834.html\">HUFFPOST<\/a>.<\/p>\n<p style=\"text-align: justify;\">Thus, in addition to predatory journals and publishers, researchers now need to be wary of predatory conferences as well. But how can one judge whether a conference is legitimate or a fake one?\u00a0 <a href=\"https:\/\/thinkcheckattend.org\/\">Think. Check. Attend.<\/a> is an initiative by <a href=\"https:\/\/knowledgee.com\/\">Knowledge E<\/a> &#8211; an organization that supports innovation and development in research and publishing &#8211; that aims to guide and assist researchers and scholars to judge the legitimacy and academic credentials of conferences in order to help them decide whether to attend.<\/p>\n<p style=\"text-align: justify;\">Following a methodology related to <a href=\"http:\/\/thinkchecksubmit.org\/\">Think. Check. Submit.<\/a>, \u00a0a campaign to help researchers identify trusted journals for their research, Think. Check. Attend. provides guidelines that help researchers differentiate between an authentic conference and one they should avoid. It is based on a simple checklist that researchers can follow to choose the right conference to attend and\/or present their research.<\/p>\n<p style=\"text-align: justify;\">Here are the questions in the <a href=\"https:\/\/thinkcheckattend.org\/check\">checklist<\/a> that a researcher must answer to check the reliability of a conference:<\/p>\n<p style=\"text-align: justify;\"><strong><em>Organizers &amp; Sponsors<\/em><\/strong><\/p>\n<ul>\n<li style=\"text-align: justify;\">Are you aware of the society or the association organizing this conference?<\/li>\n<li style=\"text-align: justify;\">Can you easily identify the venue of the conference?<\/li>\n<li style=\"text-align: justify;\">Is it the first time this conference has been held?<\/li>\n<li style=\"text-align: justify;\">Have you or your colleagues attended this conference before?<\/li>\n<li style=\"text-align: justify;\">Is it clear what fees will be charged (conference fee, registration fees, etc.) and if these will be waived if you are accepted as a speaker?<\/li>\n<li style=\"text-align: justify;\">Are any sponsors involved in the conference?<\/li>\n<li style=\"text-align: justify;\">Are you aware of any of them, especially with industry-related fields such as Engineering &amp; Biomedical research?<\/li>\n<li style=\"text-align: justify;\">Did you check the conference website? Can you find all the information presented in a proper way such as the (attendance fees, submission date, conference date, editorial committee, program details, venue)?<\/li>\n<li style=\"text-align: justify;\">Have you read any papers from this conference proceedings before?<\/li>\n<\/ul>\n<p style=\"text-align: justify;\"><strong><em>Agenda &amp; Editorial Committee<\/em><\/strong><\/p>\n<ul>\n<li style=\"text-align: justify;\">Is there clear information about the timeline and the agenda for the conference?<\/li>\n<li style=\"text-align: justify;\">Do the scope and objectives of the conference fit your field and core interest or not?<\/li>\n<li style=\"text-align: justify;\">Have you heard of the Keynote speakers?<\/li>\n<li style=\"text-align: justify;\">Is the Editorial Committee listed on the website?<\/li>\n<li style=\"text-align: justify;\">Have you heard of the Editorial Committee members before?<\/li>\n<li style=\"text-align: justify;\">Is the Committee clear about the editorial control over presentations and the type of peer-review it uses?<\/li>\n<\/ul>\n<p style=\"text-align: justify;\"><strong><em>Conference Proceedings<\/em><\/strong><\/p>\n<ul>\n<li style=\"text-align: justify;\">Is the Organizing Committee clear about where the proceedings will be published?<\/li>\n<li style=\"text-align: justify;\">Does the conference make it clear which indexing services it can guarantee published proceedings and to which indexers it will submit the proceedings for evaluation?<\/li>\n<li style=\"text-align: justify;\">Is the publisher of the proceedings a member of a recognized industry initiative such as COPE, DOAJ, OASPA?<\/li>\n<\/ul>\n<p style=\"text-align: justify;\">Researchers should answer the above questions and attend\u00a0the conference or\u00a0submit\u00a0their abstract only if they are satisfied and can answer \u2018yes\u2019 to most of the questions. We hope researchers make use of this checklist and avoid falling prey to bogus conference organizers.<\/p>\n<p style=\"text-align: justify;\">\u00a0<\/p>\n<p style=\"text-align: justify;\"><strong>Related post:<\/strong><\/p>\n<p style=\"text-align: justify;\"><a href=\"https:\/\/www.editage.com\/insights\/think-check-submit-the-checklist-that-helps-you-choose-a-reliable-journal\">Think Check Submit &#8211; The checklist that helps you choose a reliable journal<\/a><\/p>\n<p>\u00a0<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Members of the scholarly community are well-acquainted with the increasing menace of predatory publishers and journals. The more recent entry in the league of predators in academic publishing are predatory conferences. In recent times, many academics from various fields have been receiving an increasing number of invitations to present at or attend conferences. Most of [&hellip;]<\/p>\n","protected":false},"author":286,"featured_media":33313,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"inline_featured_image":false,"footnotes":""},"categories":[2407,2441],"tags":[1626,136],"new_categories":[],"new_tags":[],"series":[],"class_list":["post-721","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-avoiding-predatory-publishers","category-collaboration-and-networking","tag-conference","tag-predatory-publishing"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v25.0 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>How to identify predatory conferences: The Think.Check.Attend checklist | Editage Insights<\/title>\n<meta name=\"description\" content=\"The Think Check Attend checklist helps researchers identify legitimate conferences and avoid predatory conferences.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.editage.com\/insights\/how-to-identify-predatory-conferences-the-thinkcheckattend-checklist\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"How to identify predatory conferences: The Think.Check.Attend checklist | Editage Insights\" \/>\n<meta property=\"og:description\" content=\"The Think Check Attend checklist helps researchers identify legitimate conferences and avoid predatory conferences.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.editage.com\/insights\/how-to-identify-predatory-conferences-the-thinkcheckattend-checklist\" \/>\n<meta property=\"og:site_name\" content=\"Editage Insights\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/Editage\" \/>\n<meta property=\"article:published_time\" content=\"2017-10-25T11:16:10+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-01-15T06:38:42+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.editage.com\/insights\/wp-content\/uploads\/2018\/09\/How-to-identify-predatory-conferences-The-Think.Check_.Attend-checklist-original_0.jpeg\" \/>\n\t<meta property=\"og:image:width\" content=\"656\" \/>\n\t<meta property=\"og:image:height\" content=\"437\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Mohamad Mostafa\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@Editage\" \/>\n<meta name=\"twitter:site\" content=\"@Editage\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Mohamad Mostafa\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.editage.com\/insights\/how-to-identify-predatory-conferences-the-thinkcheckattend-checklist#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.editage.com\/insights\/how-to-identify-predatory-conferences-the-thinkcheckattend-checklist\"},\"author\":{\"name\":\"Mohamad Mostafa\",\"@id\":\"https:\/\/www.editage.com\/insights\/#\/schema\/person\/eb04309c7c702da4ce766d40291fe70e\"},\"headline\":\"How to identify predatory conferences: The Think.Check.Attend checklist\",\"datePublished\":\"2017-10-25T11:16:10+00:00\",\"dateModified\":\"2025-01-15T06:38:42+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.editage.com\/insights\/how-to-identify-predatory-conferences-the-thinkcheckattend-checklist\"},\"wordCount\":664,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/www.editage.com\/insights\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.editage.com\/insights\/how-to-identify-predatory-conferences-the-thinkcheckattend-checklist#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.editage.com\/insights\/wp-content\/uploads\/2025\/02\/editage-insights-generic-banner_298.webp\",\"keywords\":[\"conference\",\"predatory publishing\"],\"articleSection\":[\"Avoiding Predatory Publishers\",\"Collaboration and networking\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/www.editage.com\/insights\/how-to-identify-predatory-conferences-the-thinkcheckattend-checklist#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.editage.com\/insights\/how-to-identify-predatory-conferences-the-thinkcheckattend-checklist\",\"url\":\"https:\/\/www.editage.com\/insights\/how-to-identify-predatory-conferences-the-thinkcheckattend-checklist\",\"name\":\"How to identify predatory conferences: The Think.Check.Attend checklist | Editage Insights\",\"isPartOf\":{\"@id\":\"https:\/\/www.editage.com\/insights\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.editage.com\/insights\/how-to-identify-predatory-conferences-the-thinkcheckattend-checklist#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.editage.com\/insights\/how-to-identify-predatory-conferences-the-thinkcheckattend-checklist#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.editage.com\/insights\/wp-content\/uploads\/2025\/02\/editage-insights-generic-banner_298.webp\",\"datePublished\":\"2017-10-25T11:16:10+00:00\",\"dateModified\":\"2025-01-15T06:38:42+00:00\",\"description\":\"The Think Check Attend checklist helps researchers identify legitimate conferences and avoid predatory conferences.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.editage.com\/insights\/how-to-identify-predatory-conferences-the-thinkcheckattend-checklist#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.editage.com\/insights\/how-to-identify-predatory-conferences-the-thinkcheckattend-checklist\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.editage.com\/insights\/how-to-identify-predatory-conferences-the-thinkcheckattend-checklist#primaryimage\",\"url\":\"https:\/\/www.editage.com\/insights\/wp-content\/uploads\/2025\/02\/editage-insights-generic-banner_298.webp\",\"contentUrl\":\"https:\/\/www.editage.com\/insights\/wp-content\/uploads\/2025\/02\/editage-insights-generic-banner_298.webp\",\"width\":656,\"height\":336},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.editage.com\/insights\/how-to-identify-predatory-conferences-the-thinkcheckattend-checklist#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.editage.com\/insights\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"How to identify predatory conferences: The Think.Check.Attend checklist\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.editage.com\/insights\/#website\",\"url\":\"https:\/\/www.editage.com\/insights\/\",\"name\":\"Editage Insights\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\/\/www.editage.com\/insights\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.editage.com\/insights\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.editage.com\/insights\/#organization\",\"name\":\"Editage Insights\",\"url\":\"https:\/\/www.editage.com\/insights\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.editage.com\/insights\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.editage.com\/insights\/wp-content\/uploads\/2024\/09\/editage-insights-logo-1-scaled.webp\",\"contentUrl\":\"https:\/\/www.editage.com\/insights\/wp-content\/uploads\/2024\/09\/editage-insights-logo-1-scaled.webp\",\"width\":2560,\"height\":324,\"caption\":\"Editage Insights\"},\"image\":{\"@id\":\"https:\/\/www.editage.com\/insights\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/Editage\",\"https:\/\/x.com\/Editage\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.editage.com\/insights\/#\/schema\/person\/eb04309c7c702da4ce766d40291fe70e\",\"name\":\"Mohamad Mostafa\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.editage.com\/insights\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/ae9241f7e8d8fa60d82e1b2067a6dbd56d99c28a389536d1c6a36b550771e960?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/ae9241f7e8d8fa60d82e1b2067a6dbd56d99c28a389536d1c6a36b550771e960?s=96&d=mm&r=g\",\"caption\":\"Mohamad Mostafa\"},\"url\":\"https:\/\/www.editage.com\/insights\/mohamad-mostafa\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"How to identify predatory conferences: The Think.Check.Attend checklist | Editage Insights","description":"The Think Check Attend checklist helps researchers identify legitimate conferences and avoid predatory conferences.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.editage.com\/insights\/how-to-identify-predatory-conferences-the-thinkcheckattend-checklist","og_locale":"en_US","og_type":"article","og_title":"How to identify predatory conferences: The Think.Check.Attend checklist | Editage Insights","og_description":"The Think Check Attend checklist helps researchers identify legitimate conferences and avoid predatory conferences.","og_url":"https:\/\/www.editage.com\/insights\/how-to-identify-predatory-conferences-the-thinkcheckattend-checklist","og_site_name":"Editage Insights","article_publisher":"https:\/\/www.facebook.com\/Editage","article_published_time":"2017-10-25T11:16:10+00:00","article_modified_time":"2025-01-15T06:38:42+00:00","og_image":[{"width":656,"height":437,"url":"https:\/\/www.editage.com\/insights\/wp-content\/uploads\/2018\/09\/How-to-identify-predatory-conferences-The-Think.Check_.Attend-checklist-original_0.jpeg","type":"image\/jpeg"}],"author":"Mohamad Mostafa","twitter_card":"summary_large_image","twitter_creator":"@Editage","twitter_site":"@Editage","twitter_misc":{"Written by":"Mohamad Mostafa","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.editage.com\/insights\/how-to-identify-predatory-conferences-the-thinkcheckattend-checklist#article","isPartOf":{"@id":"https:\/\/www.editage.com\/insights\/how-to-identify-predatory-conferences-the-thinkcheckattend-checklist"},"author":{"name":"Mohamad Mostafa","@id":"https:\/\/www.editage.com\/insights\/#\/schema\/person\/eb04309c7c702da4ce766d40291fe70e"},"headline":"How to identify predatory conferences: The Think.Check.Attend checklist","datePublished":"2017-10-25T11:16:10+00:00","dateModified":"2025-01-15T06:38:42+00:00","mainEntityOfPage":{"@id":"https:\/\/www.editage.com\/insights\/how-to-identify-predatory-conferences-the-thinkcheckattend-checklist"},"wordCount":664,"commentCount":0,"publisher":{"@id":"https:\/\/www.editage.com\/insights\/#organization"},"image":{"@id":"https:\/\/www.editage.com\/insights\/how-to-identify-predatory-conferences-the-thinkcheckattend-checklist#primaryimage"},"thumbnailUrl":"https:\/\/www.editage.com\/insights\/wp-content\/uploads\/2025\/02\/editage-insights-generic-banner_298.webp","keywords":["conference","predatory publishing"],"articleSection":["Avoiding Predatory Publishers","Collaboration and networking"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.editage.com\/insights\/how-to-identify-predatory-conferences-the-thinkcheckattend-checklist#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.editage.com\/insights\/how-to-identify-predatory-conferences-the-thinkcheckattend-checklist","url":"https:\/\/www.editage.com\/insights\/how-to-identify-predatory-conferences-the-thinkcheckattend-checklist","name":"How to identify predatory conferences: The Think.Check.Attend checklist | Editage Insights","isPartOf":{"@id":"https:\/\/www.editage.com\/insights\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.editage.com\/insights\/how-to-identify-predatory-conferences-the-thinkcheckattend-checklist#primaryimage"},"image":{"@id":"https:\/\/www.editage.com\/insights\/how-to-identify-predatory-conferences-the-thinkcheckattend-checklist#primaryimage"},"thumbnailUrl":"https:\/\/www.editage.com\/insights\/wp-content\/uploads\/2025\/02\/editage-insights-generic-banner_298.webp","datePublished":"2017-10-25T11:16:10+00:00","dateModified":"2025-01-15T06:38:42+00:00","description":"The Think Check Attend checklist helps researchers identify legitimate conferences and avoid predatory conferences.","breadcrumb":{"@id":"https:\/\/www.editage.com\/insights\/how-to-identify-predatory-conferences-the-thinkcheckattend-checklist#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.editage.com\/insights\/how-to-identify-predatory-conferences-the-thinkcheckattend-checklist"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.editage.com\/insights\/how-to-identify-predatory-conferences-the-thinkcheckattend-checklist#primaryimage","url":"https:\/\/www.editage.com\/insights\/wp-content\/uploads\/2025\/02\/editage-insights-generic-banner_298.webp","contentUrl":"https:\/\/www.editage.com\/insights\/wp-content\/uploads\/2025\/02\/editage-insights-generic-banner_298.webp","width":656,"height":336},{"@type":"BreadcrumbList","@id":"https:\/\/www.editage.com\/insights\/how-to-identify-predatory-conferences-the-thinkcheckattend-checklist#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.editage.com\/insights\/"},{"@type":"ListItem","position":2,"name":"How to identify predatory conferences: The Think.Check.Attend checklist"}]},{"@type":"WebSite","@id":"https:\/\/www.editage.com\/insights\/#website","url":"https:\/\/www.editage.com\/insights\/","name":"Editage Insights","description":"","publisher":{"@id":"https:\/\/www.editage.com\/insights\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.editage.com\/insights\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.editage.com\/insights\/#organization","name":"Editage Insights","url":"https:\/\/www.editage.com\/insights\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.editage.com\/insights\/#\/schema\/logo\/image\/","url":"https:\/\/www.editage.com\/insights\/wp-content\/uploads\/2024\/09\/editage-insights-logo-1-scaled.webp","contentUrl":"https:\/\/www.editage.com\/insights\/wp-content\/uploads\/2024\/09\/editage-insights-logo-1-scaled.webp","width":2560,"height":324,"caption":"Editage Insights"},"image":{"@id":"https:\/\/www.editage.com\/insights\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/Editage","https:\/\/x.com\/Editage"]},{"@type":"Person","@id":"https:\/\/www.editage.com\/insights\/#\/schema\/person\/eb04309c7c702da4ce766d40291fe70e","name":"Mohamad Mostafa","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.editage.com\/insights\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/ae9241f7e8d8fa60d82e1b2067a6dbd56d99c28a389536d1c6a36b550771e960?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/ae9241f7e8d8fa60d82e1b2067a6dbd56d99c28a389536d1c6a36b550771e960?s=96&d=mm&r=g","caption":"Mohamad Mostafa"},"url":"https:\/\/www.editage.com\/insights\/mohamad-mostafa"}]}},"_links":{"self":[{"href":"https:\/\/www.editage.com\/insights\/wp-json\/wp\/v2\/posts\/721","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.editage.com\/insights\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.editage.com\/insights\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.editage.com\/insights\/wp-json\/wp\/v2\/users\/286"}],"replies":[{"embeddable":true,"href":"https:\/\/www.editage.com\/insights\/wp-json\/wp\/v2\/comments?post=721"}],"version-history":[{"count":0,"href":"https:\/\/www.editage.com\/insights\/wp-json\/wp\/v2\/posts\/721\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.editage.com\/insights\/wp-json\/wp\/v2\/media\/33313"}],"wp:attachment":[{"href":"https:\/\/www.editage.com\/insights\/wp-json\/wp\/v2\/media?parent=721"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.editage.com\/insights\/wp-json\/wp\/v2\/categories?post=721"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.editage.com\/insights\/wp-json\/wp\/v2\/tags?post=721"},{"taxonomy":"new_categories","embeddable":true,"href":"https:\/\/www.editage.com\/insights\/wp-json\/wp\/v2\/new_categories?post=721"},{"taxonomy":"new_tags","embeddable":true,"href":"https:\/\/www.editage.com\/insights\/wp-json\/wp\/v2\/new_tags?post=721"},{"taxonomy":"series","embeddable":true,"href":"https:\/\/www.editage.com\/insights\/wp-json\/wp\/v2\/series?post=721"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}