{"id":5012,"date":"2025-06-19T22:42:37","date_gmt":"2025-06-19T22:42:37","guid":{"rendered":"https:\/\/ijssass.com\/journal\/evaluation-of-managerial-tools-for-preventing-and-controlling-cyber-loafing-among-administrative-staff-a-case-study-of-a-selected-municipality-in-kwazulu-natal-south-africa\/"},"modified":"2025-06-20T03:20:43","modified_gmt":"2025-06-20T03:20:43","slug":"evaluation-of-managerial-tools-for-preventing-and-controlling-cyber-loafing-among-administrative-staff-a-case-study-of-a-selected-municipality-in-kwazulu-natal-south-africa","status":"publish","type":"post","link":"https:\/\/ijssass.com\/journal\/evaluation-of-managerial-tools-for-preventing-and-controlling-cyber-loafing-among-administrative-staff-a-case-study-of-a-selected-municipality-in-kwazulu-natal-south-africa\/","title":{"rendered":"Evaluation of Managerial Tools for Preventing and Controlling Cyber-Loafing Among Administrative Staff: A Case Study of a Selected Municipality in KwaZulu-Natal, South Africa"},"content":{"rendered":"<p>This article was originally published as: <strong>Evaluation of Managerial Tools for Preventing and Controlling Cyber-Loafing Among Administrative Staff: A Case Study of a Selected Municipality in KwaZulu-Natal, South Africa<\/strong><\/p>\n<p>Original Article Link: <a href='https:\/\/journals.dut.ac.za\/index.php\/ajims\/article\/view\/1374' target='_blank' rel='noopener'>Read Original Article<\/a><\/p>\n<p>Download PDF: <a href='https:\/\/journals.dut.ac.za\/index.php\/ajims\/article\/view\/1374\/996' target='_blank' rel='noopener'>Click Here to Download PDF<\/a><\/p>\n<h2>Abstract<\/h2>\n<p>Organizations have implemented systems to address cyber-loafing, but these measures are often insufficient to completely prevent employees from engaging in such activities. Consequently, the role of managers in mitigating cyber-loafing becomes crucial. However, the specific strategies employed by managers to reduce and control cyber-loafing remain unclear. This paper aims to evaluate the tools used by managers to prevent and control cyber-loafing among administrative staff in the workplace. The paper proposes effective measures to mitigate this phenomenon. The study employed a mixed-method approach, combining qualitative and quantitative research methodologies. Purposive sampling was utilized, with a sample size of 156 administrative staff for the quantitative study and 11 managers and supervisors for the qualitative segment. The quantitative data revealed that administrative staff use company internet and computers to perform cyber-loafing activities. Managers and supervisors can apply various tools, including software monitoring systems, internet policies, and employee monitoring, to control cyber-loafing activities. The General Deterrence Theory (GDT) framework was used to explain the tools used to curb cyber-loafing in the study under investigation. Additionally, other deterrent mechanisms and organisational control measures are identified and discussed in specific instances. This research contributes to a comprehensive understanding of the role of managers in addressing cyber-loafing and proposes practical tools and strategies that can be implemented by organisations to effectively mitigate this phenomenon. By enhancing managerial approaches to cyber-loafing, organisations can improve productivity and ensure a secure work environment.<\/p>\n<h2>Authors<\/h2>\n<ul>\n<li>Nonhlanhla Beata Mkhize (Durban University of Technology, South Africa)<\/li>\n<li>Celani John Nyide (Durban University of Technology, South Africa)<\/li>\n<li>Peggy Pinky Mthalane (Durban University of Technology, South Africa)<\/li>\n<\/ul>\n<h2>Keywords<\/h2>\n<p>administrative staff, cyber-loafing, deterrent mechanisms, general deterrence theory, management tools<\/p>\n<h2>References<\/h2>\n<p>References not available for this article.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>This article was originally published as: Evaluation of Managerial Tools for Preventing and Controlling Cyber-Loafing Among Administrative Staff: A Case&#8230;<\/p>\n","protected":false},"author":21,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[124],"tags":[1480,2153,1481,1482,1483,1484],"class_list":["post-5012","post","type-post","status-publish","format-standard","hentry","category-articles","tag-administrative-staff","tag-ajims","tag-cyber-loafing","tag-deterrent-mechanisms","tag-general-deterrence-theory","tag-management-tools","wpcat-124-id"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v25.8 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Evaluation of Managerial Tools for Preventing and Controlling Cyber-Loafing Among Administrative Staff: A Case Study of a Selected Municipality in KwaZulu-Natal, South Africa - IJSSASS Repository<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/ijssass.com\/journal\/evaluation-of-managerial-tools-for-preventing-and-controlling-cyber-loafing-among-administrative-staff-a-case-study-of-a-selected-municipality-in-kwazulu-natal-south-africa\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Evaluation of Managerial Tools for Preventing and Controlling Cyber-Loafing Among Administrative Staff: A Case Study of a Selected Municipality in KwaZulu-Natal, South Africa - IJSSASS Repository\" \/>\n<meta property=\"og:description\" content=\"This article was originally published as: Evaluation of Managerial Tools for Preventing and Controlling Cyber-Loafing Among Administrative Staff: A Case...\" \/>\n<meta property=\"og:url\" content=\"https:\/\/ijssass.com\/journal\/evaluation-of-managerial-tools-for-preventing-and-controlling-cyber-loafing-among-administrative-staff-a-case-study-of-a-selected-municipality-in-kwazulu-natal-south-africa\/\" \/>\n<meta property=\"og:site_name\" content=\"IJSSASS Repository\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/ijssass\" \/>\n<meta property=\"article:published_time\" content=\"2025-06-19T22:42:37+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-06-20T03:20:43+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/ijssass.com\/journal\/wp-content\/uploads\/2023\/07\/c-users-user-desktop-logo-pnglogo-2.png\" \/>\n\t<meta property=\"og:image:width\" content=\"300\" \/>\n\t<meta property=\"og:image:height\" content=\"195\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"admin\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"admin\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/ijssass.com\/journal\/evaluation-of-managerial-tools-for-preventing-and-controlling-cyber-loafing-among-administrative-staff-a-case-study-of-a-selected-municipality-in-kwazulu-natal-south-africa\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/ijssass.com\/journal\/evaluation-of-managerial-tools-for-preventing-and-controlling-cyber-loafing-among-administrative-staff-a-case-study-of-a-selected-municipality-in-kwazulu-natal-south-africa\/\"},\"author\":{\"name\":\"admin\",\"@id\":\"https:\/\/ijssass.com\/journal\/#\/schema\/person\/adf9bae5731958270e2140cfc1af3771\"},\"headline\":\"Evaluation of Managerial Tools for Preventing and Controlling Cyber-Loafing Among Administrative Staff: A Case Study of a Selected Municipality in KwaZulu-Natal, South Africa\",\"datePublished\":\"2025-06-19T22:42:37+00:00\",\"dateModified\":\"2025-06-20T03:20:43+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/ijssass.com\/journal\/evaluation-of-managerial-tools-for-preventing-and-controlling-cyber-loafing-among-administrative-staff-a-case-study-of-a-selected-municipality-in-kwazulu-natal-south-africa\/\"},\"wordCount\":343,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/ijssass.com\/journal\/#organization\"},\"keywords\":[\"administrative staff\",\"ajims\",\"cyber-loafing\",\"deterrent mechanisms\",\"general deterrence theory\",\"management tools\"],\"articleSection\":[\"Articles\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/ijssass.com\/journal\/evaluation-of-managerial-tools-for-preventing-and-controlling-cyber-loafing-among-administrative-staff-a-case-study-of-a-selected-municipality-in-kwazulu-natal-south-africa\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/ijssass.com\/journal\/evaluation-of-managerial-tools-for-preventing-and-controlling-cyber-loafing-among-administrative-staff-a-case-study-of-a-selected-municipality-in-kwazulu-natal-south-africa\/\",\"url\":\"https:\/\/ijssass.com\/journal\/evaluation-of-managerial-tools-for-preventing-and-controlling-cyber-loafing-among-administrative-staff-a-case-study-of-a-selected-municipality-in-kwazulu-natal-south-africa\/\",\"name\":\"Evaluation of Managerial Tools for Preventing and Controlling Cyber-Loafing Among Administrative Staff: A Case Study of a Selected Municipality in KwaZulu-Natal, South Africa - IJSSASS Repository\",\"isPartOf\":{\"@id\":\"https:\/\/ijssass.com\/journal\/#website\"},\"datePublished\":\"2025-06-19T22:42:37+00:00\",\"dateModified\":\"2025-06-20T03:20:43+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/ijssass.com\/journal\/evaluation-of-managerial-tools-for-preventing-and-controlling-cyber-loafing-among-administrative-staff-a-case-study-of-a-selected-municipality-in-kwazulu-natal-south-africa\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/ijssass.com\/journal\/evaluation-of-managerial-tools-for-preventing-and-controlling-cyber-loafing-among-administrative-staff-a-case-study-of-a-selected-municipality-in-kwazulu-natal-south-africa\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/ijssass.com\/journal\/evaluation-of-managerial-tools-for-preventing-and-controlling-cyber-loafing-among-administrative-staff-a-case-study-of-a-selected-municipality-in-kwazulu-natal-south-africa\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/ijssass.com\/journal\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Evaluation of Managerial Tools for Preventing and Controlling Cyber-Loafing Among Administrative Staff: A Case Study of a Selected Municipality in KwaZulu-Natal, South Africa\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/ijssass.com\/journal\/#website\",\"url\":\"https:\/\/ijssass.com\/journal\/\",\"name\":\"INTERNATIONAL JOURNAL OF SOCIAL SCIENCES AND SCIENTIFIC STUDIES\",\"description\":\"Open Access Library\",\"publisher\":{\"@id\":\"https:\/\/ijssass.com\/journal\/#organization\"},\"alternateName\":\"IJSSASS\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/ijssass.com\/journal\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/ijssass.com\/journal\/#organization\",\"name\":\"INTERNATIONAL JOURNAL OF SOCIAL SCIENCES AND SCIENTIFIC STUDIES\",\"alternateName\":\"IJSSASS\",\"url\":\"https:\/\/ijssass.com\/journal\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/ijssass.com\/journal\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/ijssass.com\/journal\/wp-content\/uploads\/2023\/07\/c-users-user-desktop-logo-pnglogo-3.png\",\"contentUrl\":\"https:\/\/ijssass.com\/journal\/wp-content\/uploads\/2023\/07\/c-users-user-desktop-logo-pnglogo-3.png\",\"width\":300,\"height\":195,\"caption\":\"INTERNATIONAL JOURNAL OF SOCIAL SCIENCES AND SCIENTIFIC STUDIES\"},\"image\":{\"@id\":\"https:\/\/ijssass.com\/journal\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/ijssass\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/ijssass.com\/journal\/#\/schema\/person\/adf9bae5731958270e2140cfc1af3771\",\"name\":\"admin\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/ijssass.com\/journal\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/e2404e10f252fd74bce698fdfc0296b3cfb701b99d14951364bf9586aaa0c4a8?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/e2404e10f252fd74bce698fdfc0296b3cfb701b99d14951364bf9586aaa0c4a8?s=96&d=mm&r=g\",\"caption\":\"admin\"},\"sameAs\":[\"https:\/\/ijssass.com\/journal\"],\"url\":\"https:\/\/ijssass.com\/journal\/author\/admin\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Evaluation of Managerial Tools for Preventing and Controlling Cyber-Loafing Among Administrative Staff: A Case Study of a Selected Municipality in KwaZulu-Natal, South Africa - IJSSASS Repository","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/ijssass.com\/journal\/evaluation-of-managerial-tools-for-preventing-and-controlling-cyber-loafing-among-administrative-staff-a-case-study-of-a-selected-municipality-in-kwazulu-natal-south-africa\/","og_locale":"en_US","og_type":"article","og_title":"Evaluation of Managerial Tools for Preventing and Controlling Cyber-Loafing Among Administrative Staff: A Case Study of a Selected Municipality in KwaZulu-Natal, South Africa - IJSSASS Repository","og_description":"This article was originally published as: Evaluation of Managerial Tools for Preventing and Controlling Cyber-Loafing Among Administrative Staff: A Case...","og_url":"https:\/\/ijssass.com\/journal\/evaluation-of-managerial-tools-for-preventing-and-controlling-cyber-loafing-among-administrative-staff-a-case-study-of-a-selected-municipality-in-kwazulu-natal-south-africa\/","og_site_name":"IJSSASS Repository","article_publisher":"https:\/\/www.facebook.com\/ijssass","article_published_time":"2025-06-19T22:42:37+00:00","article_modified_time":"2025-06-20T03:20:43+00:00","og_image":[{"width":300,"height":195,"url":"https:\/\/ijssass.com\/journal\/wp-content\/uploads\/2023\/07\/c-users-user-desktop-logo-pnglogo-2.png","type":"image\/png"}],"author":"admin","twitter_card":"summary_large_image","twitter_misc":{"Written by":"admin","Est. reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/ijssass.com\/journal\/evaluation-of-managerial-tools-for-preventing-and-controlling-cyber-loafing-among-administrative-staff-a-case-study-of-a-selected-municipality-in-kwazulu-natal-south-africa\/#article","isPartOf":{"@id":"https:\/\/ijssass.com\/journal\/evaluation-of-managerial-tools-for-preventing-and-controlling-cyber-loafing-among-administrative-staff-a-case-study-of-a-selected-municipality-in-kwazulu-natal-south-africa\/"},"author":{"name":"admin","@id":"https:\/\/ijssass.com\/journal\/#\/schema\/person\/adf9bae5731958270e2140cfc1af3771"},"headline":"Evaluation of Managerial Tools for Preventing and Controlling Cyber-Loafing Among Administrative Staff: A Case Study of a Selected Municipality in KwaZulu-Natal, South Africa","datePublished":"2025-06-19T22:42:37+00:00","dateModified":"2025-06-20T03:20:43+00:00","mainEntityOfPage":{"@id":"https:\/\/ijssass.com\/journal\/evaluation-of-managerial-tools-for-preventing-and-controlling-cyber-loafing-among-administrative-staff-a-case-study-of-a-selected-municipality-in-kwazulu-natal-south-africa\/"},"wordCount":343,"commentCount":0,"publisher":{"@id":"https:\/\/ijssass.com\/journal\/#organization"},"keywords":["administrative staff","ajims","cyber-loafing","deterrent mechanisms","general deterrence theory","management tools"],"articleSection":["Articles"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/ijssass.com\/journal\/evaluation-of-managerial-tools-for-preventing-and-controlling-cyber-loafing-among-administrative-staff-a-case-study-of-a-selected-municipality-in-kwazulu-natal-south-africa\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/ijssass.com\/journal\/evaluation-of-managerial-tools-for-preventing-and-controlling-cyber-loafing-among-administrative-staff-a-case-study-of-a-selected-municipality-in-kwazulu-natal-south-africa\/","url":"https:\/\/ijssass.com\/journal\/evaluation-of-managerial-tools-for-preventing-and-controlling-cyber-loafing-among-administrative-staff-a-case-study-of-a-selected-municipality-in-kwazulu-natal-south-africa\/","name":"Evaluation of Managerial Tools for Preventing and Controlling Cyber-Loafing Among Administrative Staff: A Case Study of a Selected Municipality in KwaZulu-Natal, South Africa - IJSSASS Repository","isPartOf":{"@id":"https:\/\/ijssass.com\/journal\/#website"},"datePublished":"2025-06-19T22:42:37+00:00","dateModified":"2025-06-20T03:20:43+00:00","breadcrumb":{"@id":"https:\/\/ijssass.com\/journal\/evaluation-of-managerial-tools-for-preventing-and-controlling-cyber-loafing-among-administrative-staff-a-case-study-of-a-selected-municipality-in-kwazulu-natal-south-africa\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/ijssass.com\/journal\/evaluation-of-managerial-tools-for-preventing-and-controlling-cyber-loafing-among-administrative-staff-a-case-study-of-a-selected-municipality-in-kwazulu-natal-south-africa\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/ijssass.com\/journal\/evaluation-of-managerial-tools-for-preventing-and-controlling-cyber-loafing-among-administrative-staff-a-case-study-of-a-selected-municipality-in-kwazulu-natal-south-africa\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/ijssass.com\/journal\/"},{"@type":"ListItem","position":2,"name":"Evaluation of Managerial Tools for Preventing and Controlling Cyber-Loafing Among Administrative Staff: A Case Study of a Selected Municipality in KwaZulu-Natal, South Africa"}]},{"@type":"WebSite","@id":"https:\/\/ijssass.com\/journal\/#website","url":"https:\/\/ijssass.com\/journal\/","name":"INTERNATIONAL JOURNAL OF SOCIAL SCIENCES AND SCIENTIFIC STUDIES","description":"Open Access Library","publisher":{"@id":"https:\/\/ijssass.com\/journal\/#organization"},"alternateName":"IJSSASS","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/ijssass.com\/journal\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/ijssass.com\/journal\/#organization","name":"INTERNATIONAL JOURNAL OF SOCIAL SCIENCES AND SCIENTIFIC STUDIES","alternateName":"IJSSASS","url":"https:\/\/ijssass.com\/journal\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/ijssass.com\/journal\/#\/schema\/logo\/image\/","url":"https:\/\/ijssass.com\/journal\/wp-content\/uploads\/2023\/07\/c-users-user-desktop-logo-pnglogo-3.png","contentUrl":"https:\/\/ijssass.com\/journal\/wp-content\/uploads\/2023\/07\/c-users-user-desktop-logo-pnglogo-3.png","width":300,"height":195,"caption":"INTERNATIONAL JOURNAL OF SOCIAL SCIENCES AND SCIENTIFIC STUDIES"},"image":{"@id":"https:\/\/ijssass.com\/journal\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/ijssass"]},{"@type":"Person","@id":"https:\/\/ijssass.com\/journal\/#\/schema\/person\/adf9bae5731958270e2140cfc1af3771","name":"admin","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/ijssass.com\/journal\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/e2404e10f252fd74bce698fdfc0296b3cfb701b99d14951364bf9586aaa0c4a8?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/e2404e10f252fd74bce698fdfc0296b3cfb701b99d14951364bf9586aaa0c4a8?s=96&d=mm&r=g","caption":"admin"},"sameAs":["https:\/\/ijssass.com\/journal"],"url":"https:\/\/ijssass.com\/journal\/author\/admin\/"}]}},"_links":{"self":[{"href":"https:\/\/ijssass.com\/journal\/wp-json\/wp\/v2\/posts\/5012","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/ijssass.com\/journal\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/ijssass.com\/journal\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/ijssass.com\/journal\/wp-json\/wp\/v2\/users\/21"}],"replies":[{"embeddable":true,"href":"https:\/\/ijssass.com\/journal\/wp-json\/wp\/v2\/comments?post=5012"}],"version-history":[{"count":1,"href":"https:\/\/ijssass.com\/journal\/wp-json\/wp\/v2\/posts\/5012\/revisions"}],"predecessor-version":[{"id":5449,"href":"https:\/\/ijssass.com\/journal\/wp-json\/wp\/v2\/posts\/5012\/revisions\/5449"}],"wp:attachment":[{"href":"https:\/\/ijssass.com\/journal\/wp-json\/wp\/v2\/media?parent=5012"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/ijssass.com\/journal\/wp-json\/wp\/v2\/categories?post=5012"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/ijssass.com\/journal\/wp-json\/wp\/v2\/tags?post=5012"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}