{"id":7484,"date":"2025-02-26T05:08:43","date_gmt":"2025-02-26T05:08:43","guid":{"rendered":"https:\/\/scai.kibu.ac.ke\/?p=7484"},"modified":"2025-12-24T01:23:08","modified_gmt":"2025-12-24T01:23:08","slug":"social-attackability-metrics-for-software-systems","status":"publish","type":"post","link":"https:\/\/kibu.ac.ke\/scai\/social-attackability-metrics-for-software-systems\/","title":{"rendered":"Social Attackability Metrics for Software Systems"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-post\" data-elementor-id=\"7484\" class=\"elementor elementor-7484\" data-elementor-post-type=\"post\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-5abef411 elementor-section-full_width elementor-section-height-min-height elementor-section-items-stretch elementor-section-height-default\" data-id=\"5abef411\" data-element_type=\"section\" id=\"ourgoal\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-4dfcd2c9\" data-id=\"4dfcd2c9\" data-element_type=\"column\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-6e9bb6c2 elementor-widget elementor-widget-theme-post-title elementor-page-title elementor-widget-heading\" data-id=\"6e9bb6c2\" data-element_type=\"widget\" data-widget_type=\"theme-post-title.default\">\n\t\t\t\t\t<h1 class=\"elementor-heading-title elementor-size-default\">Social Attackability Metrics for Software Systems<\/h1>\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-24dd0b85 elementor-section-height-min-height elementor-section-boxed elementor-section-height-default elementor-section-items-middle\" data-id=\"24dd0b85\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-no\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-33faec86\" data-id=\"33faec86\" data-element_type=\"column\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-inner-section elementor-element elementor-element-6dc7f9a6 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"6dc7f9a6\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-33 elementor-inner-column elementor-element elementor-element-5216c1a7 elementor-invisible\" data-id=\"5216c1a7\" data-element_type=\"column\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;,&quot;animation&quot;:&quot;fadeIn&quot;,&quot;animation_mobile&quot;:&quot;none&quot;}\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-2092c1ab elementor-widget__width-auto elementor-widget elementor-widget-heading\" data-id=\"2092c1ab\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">2013<\/h2>\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-33 elementor-inner-column elementor-element elementor-element-777476bf elementor-invisible\" data-id=\"777476bf\" data-element_type=\"column\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;,&quot;animation&quot;:&quot;fadeIn&quot;,&quot;animation_mobile&quot;:&quot;none&quot;}\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-7da0716b elementor-widget elementor-widget-heading\" data-id=\"7da0716b\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">KIBU Authors<\/h3>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-4945b668 elementor-invisible elementor-widget elementor-widget-text-editor\" data-id=\"4945b668\" data-element_type=\"widget\" data-settings=\"{&quot;_animation&quot;:&quot;fadeIn&quot;}\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<p>Samuel Mungai Mbuguah<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-33 elementor-inner-column elementor-element elementor-element-6914c812 elementor-invisible\" data-id=\"6914c812\" data-element_type=\"column\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;,&quot;animation&quot;:&quot;fadeIn&quot;,&quot;animation_mobile&quot;:&quot;none&quot;}\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-6aa7f47f elementor-tablet-align-left elementor-invisible elementor-widget elementor-widget-button\" data-id=\"6aa7f47f\" data-element_type=\"widget\" data-settings=\"{&quot;_animation&quot;:&quot;fadeInLeft&quot;}\" data-widget_type=\"button.default\">\n\t\t\t\t\t\t\t\t\t\t<a class=\"elementor-button elementor-button-link elementor-size-sm elementor-animation-shrink\" href=\"http:\/\/repository.mut.ac.ke:8080\/xmlui\/bitstream\/handle\/123456789\/275\/Social%20Attackability%20Metrics%20for%20Software%20Systems.pdf?sequence=1&#038;isAllowed=y\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">VIEW ON PUBLISHER SITE<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-inner-section elementor-element elementor-element-60efc78a elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"60efc78a\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-inner-column elementor-element elementor-element-6c65ec77 elementor-invisible\" data-id=\"6c65ec77\" data-element_type=\"column\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;,&quot;animation&quot;:&quot;fadeIn&quot;,&quot;animation_mobile&quot;:&quot;none&quot;}\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-66a6b81b elementor-widget elementor-widget-heading\" data-id=\"66a6b81b\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Abstract<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-13bd462 elementor-invisible elementor-widget elementor-widget-text-editor\" data-id=\"13bd462\" data-element_type=\"widget\" data-settings=\"{&quot;_animation&quot;:&quot;fadeIn&quot;}\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<p>Software based system have become ubiquitous in modern day activities. Software system based system are being increasing attacked, leading to the need for software system administrators, and managers to have some metrics at predicting the social engineering attackability of a such system. Researchers have identified seven human traits\/attributes that make human susceptible to social engineering attacks. Yet they did not model nor come up metrics. The author has published a conceptual a holistic predictive attackability metric model and corresponding metrics to assist the system designers. The model considers the technical metrics based on cohesion, coupling and complexity as used to predict attackability. It also consider the social metrics based on human traits that make the human operators become susceptible to social engineering attacks. The identified human traits are dishonesty, social compliance, Kindness,Time pressure, Herd mentality, greed\/need and distraction. This paper considers only the social metrics part of the model.To measure human traits the authors relies on the HEXACO model and Big Five personality trait models. In these model the personality trait are measured using a ranking scale based on Lickert scale. Hence each trait is measured as a percentile. However, for purpose of this paper, to postulate the metric the author considered the discrete case. Why the value of trait take either a value of \u201c1\u201d or \u201c0\u201d. To determine the relationship between traits between and attackability experts were asked to assess the trait versus attackability from which after aggregating for all traits a social attackability metrics was determined. To determine the predictive social attackability metrics each trait was considered to be equally likely to occur and hence a probability of 1\/7 and this acts as factor to transform the social attackability metric into predictive attackability metrics.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>2013 KIBU Authors Samuel Mungai Mbuguah VIEW ON PUBLISHER SITE Abstract Software based system have become ubiquitous in modern day activities. Software system based system are being increasing attacked, leading to the need for software system administrators, and managers to have some metrics at predicting the social engineering attackability of a such system. Researchers have [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"elementor_header_footer","format":"standard","meta":{"footnotes":""},"categories":[10],"tags":[],"class_list":["post-7484","post","type-post","status-publish","format-standard","hentry","category-research-list"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v26.4 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Social Attackability Metrics for Software Systems - School of Computing &amp; Informatics<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/kibu.ac.ke\/scai\/social-attackability-metrics-for-software-systems\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Social Attackability Metrics for Software Systems - School of Computing &amp; Informatics\" \/>\n<meta property=\"og:description\" content=\"2013 KIBU Authors Samuel Mungai Mbuguah VIEW ON PUBLISHER SITE Abstract Software based system have become ubiquitous in modern day activities. Software system based system are being increasing attacked, leading to the need for software system administrators, and managers to have some metrics at predicting the social engineering attackability of a such system. Researchers have [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/kibu.ac.ke\/scai\/social-attackability-metrics-for-software-systems\/\" \/>\n<meta property=\"og:site_name\" content=\"School of Computing &amp; Informatics\" \/>\n<meta property=\"article:published_time\" content=\"2025-02-26T05:08:43+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-12-24T01:23:08+00:00\" \/>\n<meta name=\"author\" content=\"kibabii\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"kibabii\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/kibu.ac.ke\/scai\/social-attackability-metrics-for-software-systems\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/kibu.ac.ke\/scai\/social-attackability-metrics-for-software-systems\/\"},\"author\":{\"name\":\"kibabii\",\"@id\":\"https:\/\/kibu.ac.ke\/scai\/#\/schema\/person\/f24ef483cba6d32518303e5d7f89741d\"},\"headline\":\"Social Attackability Metrics for Software Systems\",\"datePublished\":\"2025-02-26T05:08:43+00:00\",\"dateModified\":\"2025-12-24T01:23:08+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/kibu.ac.ke\/scai\/social-attackability-metrics-for-software-systems\/\"},\"wordCount\":304,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/kibu.ac.ke\/scai\/#organization\"},\"articleSection\":[\"Research List\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/kibu.ac.ke\/scai\/social-attackability-metrics-for-software-systems\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/kibu.ac.ke\/scai\/social-attackability-metrics-for-software-systems\/\",\"url\":\"https:\/\/kibu.ac.ke\/scai\/social-attackability-metrics-for-software-systems\/\",\"name\":\"Social Attackability Metrics for Software Systems - School of Computing &amp; Informatics\",\"isPartOf\":{\"@id\":\"https:\/\/kibu.ac.ke\/scai\/#website\"},\"datePublished\":\"2025-02-26T05:08:43+00:00\",\"dateModified\":\"2025-12-24T01:23:08+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/kibu.ac.ke\/scai\/social-attackability-metrics-for-software-systems\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/kibu.ac.ke\/scai\/social-attackability-metrics-for-software-systems\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/kibu.ac.ke\/scai\/social-attackability-metrics-for-software-systems\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/kibu.ac.ke\/scai\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"School Publications\",\"item\":\"https:\/\/kibu.ac.ke\/scai\/school-publications\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Social Attackability Metrics for Software Systems\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/kibu.ac.ke\/scai\/#website\",\"url\":\"https:\/\/kibu.ac.ke\/scai\/\",\"name\":\"School of Computing &amp; Informatics\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\/\/kibu.ac.ke\/scai\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/kibu.ac.ke\/scai\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/kibu.ac.ke\/scai\/#organization\",\"name\":\"School of Computing &amp; Informatics\",\"url\":\"https:\/\/kibu.ac.ke\/scai\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/kibu.ac.ke\/scai\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/kibu.ac.ke\/scai\/wp-content\/uploads\/2025\/12\/KIbabii-Logo-1024x923-1.png\",\"contentUrl\":\"https:\/\/kibu.ac.ke\/scai\/wp-content\/uploads\/2025\/12\/KIbabii-Logo-1024x923-1.png\",\"width\":1024,\"height\":923,\"caption\":\"School of Computing &amp; Informatics\"},\"image\":{\"@id\":\"https:\/\/kibu.ac.ke\/scai\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/kibu.ac.ke\/scai\/#\/schema\/person\/f24ef483cba6d32518303e5d7f89741d\",\"name\":\"kibabii\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/kibu.ac.ke\/scai\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/d1290ba6f5d0e2707a88baa0e2f5a00b8214d0c1dce43336da834b265d51f88f?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/d1290ba6f5d0e2707a88baa0e2f5a00b8214d0c1dce43336da834b265d51f88f?s=96&d=mm&r=g\",\"caption\":\"kibabii\"},\"sameAs\":[\"https:\/\/kibu.ac.ke\/scai\"],\"url\":\"https:\/\/kibu.ac.ke\/scai\/author\/kibabii\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Social Attackability Metrics for Software Systems - School of Computing &amp; Informatics","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/kibu.ac.ke\/scai\/social-attackability-metrics-for-software-systems\/","og_locale":"en_US","og_type":"article","og_title":"Social Attackability Metrics for Software Systems - School of Computing &amp; Informatics","og_description":"2013 KIBU Authors Samuel Mungai Mbuguah VIEW ON PUBLISHER SITE Abstract Software based system have become ubiquitous in modern day activities. Software system based system are being increasing attacked, leading to the need for software system administrators, and managers to have some metrics at predicting the social engineering attackability of a such system. Researchers have [&hellip;]","og_url":"https:\/\/kibu.ac.ke\/scai\/social-attackability-metrics-for-software-systems\/","og_site_name":"School of Computing &amp; Informatics","article_published_time":"2025-02-26T05:08:43+00:00","article_modified_time":"2025-12-24T01:23:08+00:00","author":"kibabii","twitter_card":"summary_large_image","twitter_misc":{"Written by":"kibabii","Est. reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/kibu.ac.ke\/scai\/social-attackability-metrics-for-software-systems\/#article","isPartOf":{"@id":"https:\/\/kibu.ac.ke\/scai\/social-attackability-metrics-for-software-systems\/"},"author":{"name":"kibabii","@id":"https:\/\/kibu.ac.ke\/scai\/#\/schema\/person\/f24ef483cba6d32518303e5d7f89741d"},"headline":"Social Attackability Metrics for Software Systems","datePublished":"2025-02-26T05:08:43+00:00","dateModified":"2025-12-24T01:23:08+00:00","mainEntityOfPage":{"@id":"https:\/\/kibu.ac.ke\/scai\/social-attackability-metrics-for-software-systems\/"},"wordCount":304,"commentCount":0,"publisher":{"@id":"https:\/\/kibu.ac.ke\/scai\/#organization"},"articleSection":["Research List"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/kibu.ac.ke\/scai\/social-attackability-metrics-for-software-systems\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/kibu.ac.ke\/scai\/social-attackability-metrics-for-software-systems\/","url":"https:\/\/kibu.ac.ke\/scai\/social-attackability-metrics-for-software-systems\/","name":"Social Attackability Metrics for Software Systems - School of Computing &amp; Informatics","isPartOf":{"@id":"https:\/\/kibu.ac.ke\/scai\/#website"},"datePublished":"2025-02-26T05:08:43+00:00","dateModified":"2025-12-24T01:23:08+00:00","breadcrumb":{"@id":"https:\/\/kibu.ac.ke\/scai\/social-attackability-metrics-for-software-systems\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/kibu.ac.ke\/scai\/social-attackability-metrics-for-software-systems\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/kibu.ac.ke\/scai\/social-attackability-metrics-for-software-systems\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/kibu.ac.ke\/scai\/"},{"@type":"ListItem","position":2,"name":"School Publications","item":"https:\/\/kibu.ac.ke\/scai\/school-publications\/"},{"@type":"ListItem","position":3,"name":"Social Attackability Metrics for Software Systems"}]},{"@type":"WebSite","@id":"https:\/\/kibu.ac.ke\/scai\/#website","url":"https:\/\/kibu.ac.ke\/scai\/","name":"School of Computing &amp; Informatics","description":"","publisher":{"@id":"https:\/\/kibu.ac.ke\/scai\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/kibu.ac.ke\/scai\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/kibu.ac.ke\/scai\/#organization","name":"School of Computing &amp; Informatics","url":"https:\/\/kibu.ac.ke\/scai\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/kibu.ac.ke\/scai\/#\/schema\/logo\/image\/","url":"https:\/\/kibu.ac.ke\/scai\/wp-content\/uploads\/2025\/12\/KIbabii-Logo-1024x923-1.png","contentUrl":"https:\/\/kibu.ac.ke\/scai\/wp-content\/uploads\/2025\/12\/KIbabii-Logo-1024x923-1.png","width":1024,"height":923,"caption":"School of Computing &amp; Informatics"},"image":{"@id":"https:\/\/kibu.ac.ke\/scai\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/kibu.ac.ke\/scai\/#\/schema\/person\/f24ef483cba6d32518303e5d7f89741d","name":"kibabii","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/kibu.ac.ke\/scai\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/d1290ba6f5d0e2707a88baa0e2f5a00b8214d0c1dce43336da834b265d51f88f?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/d1290ba6f5d0e2707a88baa0e2f5a00b8214d0c1dce43336da834b265d51f88f?s=96&d=mm&r=g","caption":"kibabii"},"sameAs":["https:\/\/kibu.ac.ke\/scai"],"url":"https:\/\/kibu.ac.ke\/scai\/author\/kibabii\/"}]}},"_links":{"self":[{"href":"https:\/\/kibu.ac.ke\/scai\/wp-json\/wp\/v2\/posts\/7484","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/kibu.ac.ke\/scai\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/kibu.ac.ke\/scai\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/kibu.ac.ke\/scai\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/kibu.ac.ke\/scai\/wp-json\/wp\/v2\/comments?post=7484"}],"version-history":[{"count":3,"href":"https:\/\/kibu.ac.ke\/scai\/wp-json\/wp\/v2\/posts\/7484\/revisions"}],"predecessor-version":[{"id":11217,"href":"https:\/\/kibu.ac.ke\/scai\/wp-json\/wp\/v2\/posts\/7484\/revisions\/11217"}],"wp:attachment":[{"href":"https:\/\/kibu.ac.ke\/scai\/wp-json\/wp\/v2\/media?parent=7484"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/kibu.ac.ke\/scai\/wp-json\/wp\/v2\/categories?post=7484"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/kibu.ac.ke\/scai\/wp-json\/wp\/v2\/tags?post=7484"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}