{"id":57012,"date":"2025-11-28T13:44:19","date_gmt":"2025-11-28T07:44:19","guid":{"rendered":"https:\/\/www.enago.com\/academy\/?p=57012"},"modified":"2026-03-31T14:51:10","modified_gmt":"2026-03-31T08:51:10","slug":"when-peer-review-fails-the-challenges-of-detecting-fraudulent-science-and-its-aftermath","status":"publish","type":"post","link":"https:\/\/www.enago.com\/academy\/when-peer-review-fails-the-challenges-of-detecting-fraudulent-science-and-its-aftermath\/","title":{"rendered":"When Peer Review Fails: The Challenges of Detecting Fraudulent Science and Its Aftermath"},"content":{"rendered":"<p><!-- Introduction Section --><\/p>\n<p>A growing number of high-profile corrections and mass retractions has put <a href=\"https:\/\/www.enago.com\/publication-support-services\/peer-review-process\" data-internallinksmanager029f6b8e52c=\"115\" title=\"Peer Review\" target=\"_blank\" rel=\"noopener\">peer review<\/a> squarely in the spotlight: when the gatekeeping system fails, the consequences extend beyond a single retraction to public trust in science, policy, and researcher careers. A <a href=\"https:\/\/pmc.ncbi.nlm.nih.gov\/articles\/PMC8216989\/\">review<\/a> of retraction causes found that <em>fake or manipulated peer review<\/em> became a major reason for withdrawal of articles since the 2010s, and recent publisher investigations continue to uncover large-scale manipulation in special issues and submission streams.<\/p>\n<p><!-- What peer review is and why it matters Section --><\/p>\n<div id=\"ez-toc-container\" class=\"ez-toc-v2_0_74 counter-hierarchy ez-toc-counter ez-toc-grey ez-toc-container-direction\">\n<div class=\"ez-toc-title-container\">\n<p class=\"ez-toc-title\" style=\"cursor:inherit\">Table of Contents<\/p>\n<span class=\"ez-toc-title-toggle\"><a href=\"#\" class=\"ez-toc-pull-right ez-toc-btn ez-toc-btn-xs ez-toc-btn-default ez-toc-toggle\" aria-label=\"Toggle Table of Content\"><span class=\"ez-toc-js-icon-con\"><span class=\"\"><span class=\"eztoc-hide\" style=\"display:none;\">Toggle<\/span><span class=\"ez-toc-icon-toggle-span\"><svg style=\"fill: #999;color:#999\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" class=\"list-377408\" width=\"20px\" height=\"20px\" viewBox=\"0 0 24 24\" fill=\"none\"><path d=\"M6 6H4v2h2V6zm14 0H8v2h12V6zM4 11h2v2H4v-2zm16 0H8v2h12v-2zM4 16h2v2H4v-2zm16 0H8v2h12v-2z\" fill=\"currentColor\"><\/path><\/svg><svg style=\"fill: #999;color:#999\" class=\"arrow-unsorted-368013\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"10px\" height=\"10px\" viewBox=\"0 0 24 24\" version=\"1.2\" baseProfile=\"tiny\"><path d=\"M18.2 9.3l-6.2-6.3-6.2 6.3c-.2.2-.3.4-.3.7s.1.5.3.7c.2.2.4.3.7.3h11c.3 0 .5-.1.7-.3.2-.2.3-.5.3-.7s-.1-.5-.3-.7zM5.8 14.7l6.2 6.3 6.2-6.3c.2-.2.3-.5.3-.7s-.1-.5-.3-.7c-.2-.2-.4-.3-.7-.3h-11c-.3 0-.5.1-.7.3-.2.2-.3.5-.3.7s.1.5.3.7z\"\/><\/svg><\/span><\/span><\/span><\/a><\/span><\/div>\n<nav><ul class='ez-toc-list ez-toc-list-level-1 ' ><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-1\" href=\"https:\/\/www.enago.com\/academy\/when-peer-review-fails-the-challenges-of-detecting-fraudulent-science-and-its-aftermath\/#What_peer_review_is_and_why_it_matters\" >What peer review is and why it matters<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-2\" href=\"https:\/\/www.enago.com\/academy\/when-peer-review-fails-the-challenges-of-detecting-fraudulent-science-and-its-aftermath\/#When_and_how_peer_review_fails\" >When and how peer review fails<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-3\" href=\"https:\/\/www.enago.com\/academy\/when-peer-review-fails-the-challenges-of-detecting-fraudulent-science-and-its-aftermath\/#What_happens_when_peer_review_fails_immediate_and_downstream_consequences\" >What happens when peer review fails: immediate and downstream consequences<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-4\" href=\"https:\/\/www.enago.com\/academy\/when-peer-review-fails-the-challenges-of-detecting-fraudulent-science-and-its-aftermath\/#Real-world_examples_that_illustrate_differing_failure_mechanisms\" >Real-world examples that illustrate differing failure mechanisms<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-5\" href=\"https:\/\/www.enago.com\/academy\/when-peer-review-fails-the-challenges-of-detecting-fraudulent-science-and-its-aftermath\/#How_failures_are_detected_and_how_the_record_is_corrected\" >How failures are detected and how the record is corrected<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-6\" href=\"https:\/\/www.enago.com\/academy\/when-peer-review-fails-the-challenges-of-detecting-fraudulent-science-and-its-aftermath\/#What_is_changing_publisher_and_system-level_responses\" >What is changing: publisher and system-level responses<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-7\" href=\"https:\/\/www.enago.com\/academy\/when-peer-review-fails-the-challenges-of-detecting-fraudulent-science-and-its-aftermath\/#Practical_guidance_what_researchers_reviewers_and_editors_can_do_now\" >Practical guidance: what researchers, reviewers and editors can do now<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-8\" href=\"https:\/\/www.enago.com\/academy\/when-peer-review-fails-the-challenges-of-detecting-fraudulent-science-and-its-aftermath\/#A_short_checklist_for_immediate_action_for_researchers_and_journal_offices\" >A short checklist for immediate action (for researchers and journal offices)<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-9\" href=\"https:\/\/www.enago.com\/academy\/when-peer-review-fails-the-challenges-of-detecting-fraudulent-science-and-its-aftermath\/#Points_to_note_and_common_mistakes\" >Points to note and common mistakes<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-10\" href=\"https:\/\/www.enago.com\/academy\/when-peer-review-fails-the-challenges-of-detecting-fraudulent-science-and-its-aftermath\/#Conclusion_restoring_trust_through_layered_defenses_and_good_practice\" >Conclusion: restoring trust through layered defenses and good practice<\/a><\/li><\/ul><\/nav><\/div>\n<h2><span class=\"ez-toc-section\" id=\"What_peer_review_is_and_why_it_matters\"><\/span><strong>What peer review is and why it matters<\/strong><span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p>Scholarly <em>peer review<\/em> is the process by which manuscripts are evaluated by experts before publication to assess validity, originality, and fit for a journal. It serves as a quality-control filter and a community endorsement mechanism that supports reproducibility, guides editorial decisions, and signals credibility to readers. Peer review is not infallible: it relies on volunteer expertise, editorial oversight, and systems that can be exploited.<\/p>\n<p>Traditional pre-publication peer review remains central, but the landscape now includes stronger preprint discussion, automated screening tools, cross-publisher intelligence and more active post-publication scrutiny. These layers aim to distribute responsibility across the research lifecycle rather than concentrating it solely at editorial triage.<\/p>\n<p><!-- When and how peer review fails Section --><\/p>\n<h2><span class=\"ez-toc-section\" id=\"When_and_how_peer_review_fails\"><\/span><strong>When and how peer review fails<\/strong><span class=\"ez-toc-section-end\"><\/span><\/h2>\n<ul>\n<li><strong>Fake or manipulated peer review<\/strong>: Authors or third parties supply fabricated reviewer identities or hijack editorial workflows so that bogus, favorable reviews reach editors. This tactic has been repeatedly linked to mass retractions.<\/li>\n<li><strong>Paper mills and generated content<\/strong>: Organized entities produce manuscripts or data that mimic legitimate research; these submissions can pass cursory checks and reach publication if reviewer scrutiny or screening tools are insufficient.<\/li>\n<li><strong>Conflicted or inappropriate reviewers<\/strong>: Reviewers with undisclosed conflicts, competing interests, or insufficient subject expertise can miss flaws or skew assessments. Editors sometimes struggle to verify reviewers\u2019 independence.<\/li>\n<li><strong>Editorial process failures<\/strong>: Guest-edited special issues, rushed handling during surges of submissions, or poor verification of suggested reviewers create vulnerabilities. There have been <a href=\"https:\/\/retractionwatch.com\/2023\/06\/20\/deplorable-imaging-journal-to-retract-nearly-80-papers-for-compromised-peer-review\/\">documented cases<\/a> where special issues produced dozens or hundreds of problematic papers.<\/li>\n<li>Limitations in Detecting Fraud: Peer review rarely uncovers fabricated raw data or covert manipulation; it is designed to evaluate plausibility, methodology, and interpretation not always to detect deliberate fraud.<\/li>\n<\/ul>\n<p><!-- What happens when peer review fails: immediate and downstream consequences Section --><\/p>\n<h2><span class=\"ez-toc-section\" id=\"What_happens_when_peer_review_fails_immediate_and_downstream_consequences\"><\/span><strong>What happens when peer review fails: immediate and downstream consequences<\/strong><span class=\"ez-toc-section-end\"><\/span><\/h2>\n<ul>\n<li><strong>Corrections, expressions of concern, and retractions<\/strong>: Journals may issue an expression of concern while investigating, and retract papers when evidence shows the findings are unreliable or the review process was compromised. COPE guidance outlines when and how these actions should be taken to protect the record.<\/li>\n<li><strong>Waste of resources and reproducibility harms<\/strong>: Time and funding are squandered by teams trying to build on unreliable results; follow-on work can propagate error into meta-analyses and policy. <a href=\"https:\/\/link.springer.com\/article\/10.1186\/s41073-022-00125-x\">Efforts to limit inadvertent citation of retracted work<\/a> are now a community priority.<\/li>\n<li><strong>Reputational damage and career consequences<\/strong>: Individuals and institutions connected to retracted work face scrutiny; some cases have led to dismissals, revoked degrees, and lasting reputational harm (for example, <a href=\"https:\/\/www.aps.org\/apsnews\/2022\/08\/september-2002-schon-scandal-report\" class=\"broken_link\">the Sch\u00f6n scandal<\/a> illustrated how fraud that passed peer review caused broad fallout in disciplines).<\/li>\n<li><strong>Erosion of public trust<\/strong>: High-visibility failures especially in health or policy-relevant fields can undermine public confidence in science and slow uptake of legitimate findings.<\/li>\n<\/ul>\n<p><!-- Real-world examples that illustrate differing failure mechanisms Section --><\/p>\n<h2><span class=\"ez-toc-section\" id=\"Real-world_examples_that_illustrate_differing_failure_mechanisms\"><\/span><strong>Real-world examples that illustrate differing failure mechanisms<\/strong><span class=\"ez-toc-section-end\"><\/span><\/h2>\n<ul>\n<li><strong>Fake-review mass retractions<\/strong>: Several publishers have retracted dozens or hundreds of papers after investigations found coordinated reviewer fraud and manipulated submissions; special-issue workflows were particularly vulnerable.<\/li>\n<li><strong>Scientific fraud detected post-publication<\/strong>: The Jan Hendrik Sch\u00f6n affair (physics) and the <a href=\"https:\/\/www.science.org\/content\/article\/dutch-university-sacks-social-psychologist-over-faked-data\" class=\"broken_link\">Diederik Stapel case<\/a> (social psychology) show how fabricated or manipulated data can survive peer review until replication attempts, whistleblowing, or formal inquiries reveal the truth leading to multiple retractions and institutional investigations.<\/li>\n<\/ul>\n<p><!-- How failures are detected and how the record is corrected Section --><\/p>\n<h2><span class=\"ez-toc-section\" id=\"How_failures_are_detected_and_how_the_record_is_corrected\"><\/span><strong>How failures are detected and how the record is corrected<\/strong><span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p>Detection occurs through multiple channels: editorial audits, cross-publisher screening tools, whistleblowers, post-publication peer review platforms (e.g., PubPeer), and independent sleuthing by researchers. Once concerns are credible, journals follow COPE flowcharts and <a href=\"https:\/\/pmc.ncbi.nlm.nih.gov\/articles\/PMC2802086\">retraction guidelines<\/a> to issue expressions of concern, corrections, or retractions, and to notify indexing services so the scholarly record reflects the change. Recent industry collaborations and tools seek to catch problems earlier.<\/p>\n<p><!-- What is changing: publisher and system-level responses Section --><\/p>\n<h2><span class=\"ez-toc-section\" id=\"What_is_changing_publisher_and_system-level_responses\"><\/span><strong>What is changing: publisher and system-level responses<\/strong><span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p>Publishers and industry consortia are building shared defenses. <a href=\"https:\/\/stm-assoc.org\/what-we-do\/strategic-areas\/research-integrity\/integrity-hub\/\">The STM Integrity Hub<\/a> and related screening tools are designed to spot indicators of paper-mill output, duplicate submissions, or reused reviewers across multiple journals and platforms creating an early-warning system that can block suspicious manuscripts before peer review progresses. These ecosystem-level responses complement COPE policies and editorial best practice.<\/p>\n<p><!-- Practical guidance: what researchers, reviewers and editors can do now Section --><\/p>\n<h2><span class=\"ez-toc-section\" id=\"Practical_guidance_what_researchers_reviewers_and_editors_can_do_now\"><\/span><strong>Practical guidance: what researchers, reviewers and editors can do now<\/strong><span class=\"ez-toc-section-end\"><\/span><\/h2>\n<h3>Researchers<\/h3>\n<ul>\n<li><strong>Use transparent reporting and data sharing<\/strong>: Make raw data, code, and protocols available where appropriate (links, repositories). This strengthens reproducibility and reduces the chance that honest errors are mistaken for misconduct.<\/li>\n<li><strong>Avoid third-party submission services of uncertain provenance<\/strong>; if using external support, document what was outsourced and ensure full author oversight.<\/li>\n<li><strong>Treat suggested reviewers with caution<\/strong>: provide independent reviewers when asked, and avoid recommending close collaborators without declaring the relationship.<\/li>\n<\/ul>\n<h3>Peer reviewers and editors<\/h3>\n<ul>\n<li><strong>Verify reviewer identity<\/strong>: Use institutional email addresses, ORCID IDs, and editorial-system checks rather than relying solely on author-supplied contact information.<\/li>\n<li><strong>Screen submissions early<\/strong>: Use plagiarism-detection, image-forensics, and paper-mill screening tools where available; flag suspicious clustering of submissions around guest editors or within narrow topic windows.<\/li>\n<li><strong>Apply COPE flowcharts when concerns arise and publish clear, detailed notices to correct the literature promptly.<\/strong><\/li>\n<\/ul>\n<p><!-- A short checklist for immediate action (for researchers and journal offices) Section --><\/p>\n<h2><span class=\"ez-toc-section\" id=\"A_short_checklist_for_immediate_action_for_researchers_and_journal_offices\"><\/span><strong>A short checklist for immediate action (for researchers and journal offices)<\/strong><span class=\"ez-toc-section-end\"><\/span><\/h2>\n<ul>\n<li><strong>Verify reviewer emails and ORCID records<\/strong> before inviting or accepting reviews.<\/li>\n<li><strong>Run plagiarism and image-analysis checks<\/strong> at submission triage.<\/li>\n<li><strong>Maintain transparent data and method availability<\/strong> (repositories, supplementary files).<\/li>\n<li><strong>Publish expressions of concern<\/strong> when investigations are ongoing and retract promptly when findings are unreliable.<\/li>\n<li><strong>Join or consult cross-publisher integrity tools<\/strong> (where possible) to detect patterns indicative of paper mills or duplicate submissions.<\/li>\n<\/ul>\n<p><!-- Points to note and common mistakes Section --><\/p>\n<h2><span class=\"ez-toc-section\" id=\"Points_to_note_and_common_mistakes\"><\/span><strong>Points to note and common mistakes<\/strong><span class=\"ez-toc-section-end\"><\/span><\/h2>\n<ul>\n<li><strong>Peer review is necessary but not sufficient<\/strong>: it mitigates many errors but does not guarantee detection of deliberate fabrication. Treat peer review as one layer in a broader integrity system.<\/li>\n<li><strong>Over-reliance on author-suggested reviewers increases risk<\/strong>: editor-managed selection and verification reduce exposure to fraudulent reviewer identities.<\/li>\n<li><strong>Bulk corrections are painful but sometimes necessary<\/strong>: correcting the record even via large-scale retractions is part of maintaining integrity; transparency about reasons helps the community learn.<\/li>\n<\/ul>\n<p><!-- Conclusion: restoring trust through layered defenses and good practice Section --><\/p>\n<h2><span class=\"ez-toc-section\" id=\"Conclusion_restoring_trust_through_layered_defenses_and_good_practice\"><\/span><strong>Conclusion: restoring trust through layered defenses and good practice<\/strong><span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p>Peer review continues to be a vital mechanism for quality assurance, but it is not a panacea. When peer review fails, the remedies expressions of concern, corrections, and retractions restore the literature but cannot always undo the lost time, diverted resources, or reputational harm. Researchers should therefore adopt transparent reporting, careful selection of collaborators and services, and proactive data sharing. Editors and publishers should verify reviewer identities, use screening tools and industry collaboration, and follow COPE guidance for clear, timely corrections. Together these steps make peer review more resilient and protect the credibility of scholarly communication.<\/p>\n<div style=\"display:flex; gap:10px;justify-content:\" class=\"wps-pgfw-pdf-generate-icon__wrapper-frontend\">\n\t\t<a  href=\"https:\/\/www.enago.com\/academy\/wp-json\/wp\/v2\/posts\/57012?action=genpdf&amp;id=57012\" class=\"pgfw-single-pdf-download-button\" ><img data-src=\"https:\/\/www.enago.com\/academy\/wp-content\/plugins\/pdf-generator-for-wp\/admin\/src\/images\/PDF_Tray.svg\" title=\"Generate PDF\" style=\"width:auto; height:45px;\" src=\"data:image\/svg+xml;base64,PHN2ZyB3aWR0aD0iMSIgaGVpZ2h0PSIxIiB4bWxucz0iaHR0cDovL3d3dy53My5vcmcvMjAwMC9zdmciPjwvc3ZnPg==\" class=\"lazyload\"><\/a>\n\t\t<\/div>","protected":false},"excerpt":{"rendered":"<p>A growing number of high-profile corrections and mass retractions has put peer review squarely in&hellip;<\/p>\n","protected":false},"author":4,"featured_media":57013,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"om_disable_all_campaigns":false,"footnotes":""},"categories":[1988,2],"tags":[],"ppma_author":[1895],"class_list":["post-57012","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-articles","category-academic-writing"],"better_featured_image":{"id":57013,"alt_text":"When Peer Review Fails: Causes, Consequences & How to Protect Research","caption":"","description":"Discover how fake peer review, paper mills, and editorial failures compromise research integrity. Learn detection methods, correction processes, and practical steps to safeguard scholarly publishing.","media_type":"image","media_details":{"width":910,"height":340,"file":"2025\/11\/Sami-EA-Blogs-Banner-910-x-340-px-15.jpg","filesize":168707,"sizes":{},"image_meta":{"aperture":"0","credit":"","camera":"","caption":"","created_timestamp":"0","copyright":"","focal_length":"0","iso":"0","shutter_speed":"0","title":"","orientation":"1","keywords":[]}},"post":57012,"source_url":"https:\/\/www.enago.com\/academy\/wp-content\/uploads\/2025\/11\/Sami-EA-Blogs-Banner-910-x-340-px-15.jpg"},"acf":{"faq_main_heading":"","faq_heading_one":"What is fake peer review and how does it happen?","faq_heading_two":"What happens when a paper's peer review is found to be compromised?","faq_heading_three":"Can peer review detect fabricated research data?","faq_heading_four":"How are peer review failures detected after publication?","faq_heading_five":"What are paper mills and how do they bypass peer review?","faq_heading_six":"How can researchers protect themselves from peer review fraud?","faq_description_one":"Fake peer review occurs when authors or third parties supply fabricated reviewer identities or hijack editorial workflows so bogus favorable reviews reach editors. This manipulation has been linked to mass retractions involving dozens or hundreds of papers, particularly in special issues.","faq_description_two":"The journal may issue an expression of concern during investigation, then retract the paper if evidence shows unreliable findings or compromised review. Authors face reputational damage, potential career consequences, and institutions may revoke degrees or terminate employment for serious misconduct.","faq_description_three":"No, peer review is designed to evaluate plausibility, methodology, and interpretation not to detect deliberate fabrication of raw data or covert manipulation. Detection usually requires replication attempts, whistleblowing, post-publication scrutiny, or formal investigations rather than standard peer review.","faq_description_four":"Detection occurs through editorial audits, cross-publisher screening tools, whistleblowers, post-publication peer review platforms like PubPeer, and independent researcher investigation. Publishers then follow COPE guidelines to issue corrections, expressions of concern, or retractions and notify indexing services.","faq_description_five":"Paper mills are organized entities producing manuscripts or data that mimic legitimate research. They bypass peer review by exploiting cursory editorial checks, manipulating reviewer selection, and creating convincing but fraudulent content that passes initial screening if reviewer scrutiny is insufficient.","faq_description_six":"Use transparent reporting with data and code sharing, avoid third-party submission services of uncertain provenance, document any outsourced assistance, suggest only independent reviewers without conflicts, and maintain institutional email verification for all communications with journals."},"views":165,"single_webinar_page_date":null,"single_webinar_page_time":null,"session_agenda":null,"who_should_attend_this_session":null,"about_the_speaker_field":null,"co-webinar-sec":null,"co_webinar_sec_one":null,"speaker-name":null,"webinar-date":null,"webinar-time":null,"webinar-s-image":null,"custum_webinar_category":null,"authors":[{"term_id":1895,"user_id":4,"is_guest":0,"slug":"editor","display_name":"Enago Academy","avatar_url":"https:\/\/secure.gravatar.com\/avatar\/2ef4bc47f3ceaa56f5eb3b26f9520fad298ba36ede4f86315997ffb45db37a1f?s=96&d=identicon&r=g","author_category":"","user_url":"","last_name":"Academy","first_name":"Editor","job_title":"","description":"Enago Academy, the knowledge arm of Enago, offers comprehensive and up-to-date resources on academic research and scholarly publishing to all levels of scholarly professionals: students, researchers, editors, publishers, and academic societies. It is also a popular platform for networking, allowing researchers to learn, share, and discuss their experiences within their network and community. The team, which comprises subject matter experts, academicians, trainers, and technical project managers, are passionate about helping researchers at all levels establish a successful career, both within and outside academia."}],"_links":{"self":[{"href":"https:\/\/www.enago.com\/academy\/wp-json\/wp\/v2\/posts\/57012","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.enago.com\/academy\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.enago.com\/academy\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.enago.com\/academy\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"https:\/\/www.enago.com\/academy\/wp-json\/wp\/v2\/comments?post=57012"}],"version-history":[{"count":3,"href":"https:\/\/www.enago.com\/academy\/wp-json\/wp\/v2\/posts\/57012\/revisions"}],"predecessor-version":[{"id":57018,"href":"https:\/\/www.enago.com\/academy\/wp-json\/wp\/v2\/posts\/57012\/revisions\/57018"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.enago.com\/academy\/wp-json\/wp\/v2\/media\/57013"}],"wp:attachment":[{"href":"https:\/\/www.enago.com\/academy\/wp-json\/wp\/v2\/media?parent=57012"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.enago.com\/academy\/wp-json\/wp\/v2\/categories?post=57012"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.enago.com\/academy\/wp-json\/wp\/v2\/tags?post=57012"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/www.enago.com\/academy\/wp-json\/wp\/v2\/ppma_author?post=57012"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}