{"id":13680,"date":"2017-08-25T05:13:28","date_gmt":"2017-08-25T09:13:28","guid":{"rendered":"https:\/\/www.m2sys.com\/blog\/?p=13680"},"modified":"2023-07-22T06:00:17","modified_gmt":"2023-07-22T10:00:17","slug":"the-highs-lows-of-using-the-biometric-data-in-education","status":"publish","type":"post","link":"https:\/\/www.m2sys.com\/blog\/guest-blog-posts\/the-highs-lows-of-using-the-biometric-data-in-education\/","title":{"rendered":"The Highs &#038; Lows of Using the Biometric Data in Education"},"content":{"rendered":"<p><img loading=\"lazy\" decoding=\"async\" class=\"i-amphtml-fill-content i-amphtml-replaced-content alignleft\" src=\"https:\/\/www.m2sys.com\/blog\/wp-content\/uploads\/2020\/03\/finger-2081169_640-600x338.jpg\" sizes=\"(min-width: 485px) 485px, 100vw\" alt=\"\" width=\"485\" height=\"273\" \/><\/p>\n<p class=\"amp-wp-inline-f62a86b1328cd4134bec55ddf6de989a\"><span class=\"amp-wp-inline-f62a86b1328cd4134bec55ddf6de989a\">From using fingerprints as verification tokens on mobile phones to facial recognition software as a part of CCTVs, biometric authentication has become a ubiquitous attribute of the modern world.<\/span><\/p>\n<p class=\"amp-wp-inline-f62a86b1328cd4134bec55ddf6de989a\"><span class=\"amp-wp-inline-f62a86b1328cd4134bec55ddf6de989a\">The recent introduction of this identification technology in the education sector is extensive. These methods vary from finger or hand geometry, behavioral, and other visual biometrics. When done right, all these all have ideal uses in the educational sector.\u00a0 Schools are identifying this potential to add another layer of protection for students.<\/span><\/p>\n<p class=\"amp-wp-inline-f62a86b1328cd4134bec55ddf6de989a\"><span class=\"amp-wp-inline-f62a86b1328cd4134bec55ddf6de989a\">For many educational institutions, as well as parents, privacy is a significant concern. When students go online to access educational services, only a few platforms\u00a0offer complete data protection. They also offer anonymity as well as confidentiality that students trust. With the looming risk of online confidentiality violations, it is reasonable to necessitate schools to address these misgivings.<\/span><\/p>\n<p class=\"amp-wp-inline-f62a86b1328cd4134bec55ddf6de989a\"><span class=\"amp-wp-inline-f62a86b1328cd4134bec55ddf6de989a\">However, the right biometric solutions can assure parents of their kids\u2019 safety and data privacy.<\/span><\/p>\n<p class=\"amp-wp-inline-f62a86b1328cd4134bec55ddf6de989a\"><span class=\"amp-wp-inline-f62a86b1328cd4134bec55ddf6de989a\">Below are some considerations for implementing biometrics in education. Let\u2019s see how schools are approaching the process.<\/span><\/p>\n<p class=\"amp-wp-inline-f62a86b1328cd4134bec55ddf6de989a\"><span class=\"amp-wp-inline-f62a86b1328cd4134bec55ddf6de989a\">How can Biometric Enhance the School Environment<\/span><\/p>\n<h2><span class=\"amp-wp-inline-f62a86b1328cd4134bec55ddf6de989a\">1. Efficient Time Management<\/span><\/h2>\n<p class=\"amp-wp-inline-f62a86b1328cd4134bec55ddf6de989a\"><span class=\"amp-wp-inline-f62a86b1328cd4134bec55ddf6de989a\">The Cold Springs School<\/span><span class=\"amp-wp-inline-f62a86b1328cd4134bec55ddf6de989a\"> in NJ is to begin their finger-scanning program later this year. The program is meant to keep the lunch buyer\u2019s account accurate. All students in the school are in grade 3 or younger, and they tend to forget their PIN for lunch accounts. The school has found a solution. They decided to put in place biometrics so students can lunch even if they do not remember their numbers.<\/span><\/p>\n<p class=\"amp-wp-inline-f62a86b1328cd4134bec55ddf6de989a\"><span class=\"amp-wp-inline-f62a86b1328cd4134bec55ddf6de989a\">This is an excellent case of how schools can use biometrics to monitor students. The best part is not requiring staff to verify every student personally. The applications could be extended to academic activities as well. Biometrics have the potential to save up to 15 hours to time in an entire school year taking attendance.<\/span><\/p>\n<p class=\"amp-wp-inline-f62a86b1328cd4134bec55ddf6de989a\"><span class=\"amp-wp-inline-f62a86b1328cd4134bec55ddf6de989a\">As opposed to storing fingerprints, these systems scan an individual\u2019s finger every time. It then matches points from template to template. The school assures that the biometric identification is a secure, accurate, non-intrusive, and cost-effective approach. The program currently runs for the third graders only. If successful, it will extend to other grades and district schools.<\/span><\/p>\n<h2><span class=\"amp-wp-inline-f62a86b1328cd4134bec55ddf6de989a\">2. Improved Monitoring and Security Measures<\/span><\/h2>\n<p class=\"amp-wp-inline-f62a86b1328cd4134bec55ddf6de989a\"><span class=\"amp-wp-inline-f62a86b1328cd4134bec55ddf6de989a\">Perhaps the most obvious application of biometrics in education is for security. With biometrics, schools can monitor the students\u2019 location the time they leave. Installing biometrics not only in entrances but also in common areas such as cafeterias or libraries is an excellent way to keep track.<\/span><\/p>\n<p class=\"amp-wp-inline-f62a86b1328cd4134bec55ddf6de989a\"><span class=\"amp-wp-inline-f62a86b1328cd4134bec55ddf6de989a\">However, students are not the only ones for whom biometrics are applicable. Fingerprint checks have been a standard tool for decades in screening new employees. <\/span>The New York State Education Department <span class=\"amp-wp-inline-f62a86b1328cd4134bec55ddf6de989a\"> conducts strict biometrics-supported criminal background checks. They review applicants and prospective employees of the school district.<\/span><\/p>\n<p class=\"amp-wp-inline-f62a86b1328cd4134bec55ddf6de989a\"><span class=\"amp-wp-inline-f62a86b1328cd4134bec55ddf6de989a\">Educational institutions can and should take advantage of these measures. It further ensures that the faculty cannot get into schools until adequately vetted.<\/span><\/p>\n<h2><span class=\"amp-wp-inline-f62a86b1328cd4134bec55ddf6de989a\">3. Tracking Integrity and Engagement<\/span><\/h2>\n<p class=\"amp-wp-inline-f62a86b1328cd4134bec55ddf6de989a\"><span class=\"amp-wp-inline-f62a86b1328cd4134bec55ddf6de989a\">Biometric tools can also be used to track the engagement of students and their behavioral problems. Biosensors such as surveillance and cameras are vital in a modern school environment. They are beneficial in identifying whether the school premises are welcoming for the students or not.<\/span><\/p>\n<p class=\"amp-wp-inline-f62a86b1328cd4134bec55ddf6de989a\"><span class=\"amp-wp-inline-f62a86b1328cd4134bec55ddf6de989a\">This improved accuracy can help in creating personalized learning strategies for all students. The information gives access to teachers on how students are performing. It can also encourage integrity among students as well as teachers.<\/span><\/p>\n<h2><span class=\"amp-wp-inline-f62a86b1328cd4134bec55ddf6de989a\">How Biometrics Pose Privacy Concerns<\/span><\/h2>\n<p class=\"amp-wp-inline-f62a86b1328cd4134bec55ddf6de989a\"><span class=\"amp-wp-inline-f62a86b1328cd4134bec55ddf6de989a\">The potential of biometrics might be substantial. However, that has not wiped out the <\/span><span class=\"amp-wp-inline-f62a86b1328cd4134bec55ddf6de989a\">parents\u2019 apprehension<\/span><span class=\"amp-wp-inline-f62a86b1328cd4134bec55ddf6de989a\"> about their children\u2019s privacy. The majority of the identification techniques in the education system are commoditized, with biometrics at the forefront. The need to adopt new technologies in learning and the privacy issues only add to the challenges.<\/span><\/p>\n<p class=\"amp-wp-inline-f62a86b1328cd4134bec55ddf6de989a\"><span class=\"amp-wp-inline-f62a86b1328cd4134bec55ddf6de989a\">According to those promoting the technology, biometrics reduce the potential for identity theft. At the same time, they assure complete protection of the information collected. The threat of hacking is not slim under the current circumstances.<\/span><\/p>\n<p class=\"amp-wp-inline-f62a86b1328cd4134bec55ddf6de989a\"><span class=\"amp-wp-inline-f62a86b1328cd4134bec55ddf6de989a\">There are also concerns that with the data recording. Every discretion will result in controlling children in every way. This might involve faculty domination at different levels. The role of disciplinary politics and the influence of biometrics over these practices is another matter to investigate.<\/span><\/p>\n<h2><span class=\"amp-wp-inline-f62a86b1328cd4134bec55ddf6de989a\">How to Use Biometrics Responsibly<\/span><\/h2>\n<p class=\"amp-wp-inline-f62a86b1328cd4134bec55ddf6de989a\"><span class=\"amp-wp-inline-f62a86b1328cd4134bec55ddf6de989a\">It is certain that the issue of biometric technology in schools is not going to fade soon. What we need are policy changes that enforce the right set of practices. They need to be associated with implementing a biometric system.<\/span><\/p>\n<p class=\"amp-wp-inline-f62a86b1328cd4134bec55ddf6de989a\"><span class=\"amp-wp-inline-f62a86b1328cd4134bec55ddf6de989a\">Despite all the efforts, the balance between data privacy rights and provider responsibilities is not stricken yet. Parents and students need to be convinced that their personal data are secure. They should also have the right to decide who has access to this information and why.<\/span><\/p>\n<p class=\"amp-wp-inline-f62a86b1328cd4134bec55ddf6de989a\"><span class=\"amp-wp-inline-f62a86b1328cd4134bec55ddf6de989a\">For parents, these concerns are not unwarranted. With careful and articulate explanations and assurances, schools can focus on using biometrics as a comprehensive solution to keep students safe.<\/span><\/p>\n","protected":false},"excerpt":{"rendered":"<p>From using fingerprints as verification tokens on mobile phones to facial recognition software as a part of CCTVs, biometric authentication<\/p>\n","protected":false},"author":398,"featured_media":12746,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_yoast_wpseo_focuskw":"","_yoast_wpseo_title":"","_yoast_wpseo_metadesc":"","_lmt_disableupdate":"no","_lmt_disable":"no","twitterCardType":"","cardImageID":0,"cardImage":"","cardTitle":"","cardDesc":"","cardImageAlt":"","cardPlayer":"","cardPlayerWidth":0,"cardPlayerHeight":0,"cardPlayerStream":"","cardPlayerCodec":"","footnotes":""},"categories":[90],"tags":[],"class_list":["post-13680","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-guest-blog-posts"],"acf":{"_how_to_content":null,"_faq_content":null,"_structured_meta_data":null,"_tl_dr_content":null},"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v19.6.1 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>The Highs &amp; Lows of Using the Biometric Data in Education - Digital Transformation of Government Services<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.m2sys.com\/blog\/guest-blog-posts\/the-highs-lows-of-using-the-biometric-data-in-education\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"The Highs &amp; Lows of Using the Biometric Data in Education - Digital Transformation of Government Services\" \/>\n<meta property=\"og:description\" content=\"From using fingerprints as verification tokens on mobile phones to facial recognition software as a part of CCTVs, biometric authentication\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.m2sys.com\/blog\/guest-blog-posts\/the-highs-lows-of-using-the-biometric-data-in-education\/\" \/>\n<meta property=\"og:site_name\" content=\"Digital Transformation of Government Services\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/m2sys\" \/>\n<meta property=\"article:published_time\" content=\"2017-08-25T09:13:28+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2023-07-22T10:00:17+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.m2sys.com\/blog\/wp-content\/uploads\/2020\/05\/Biometric.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1000\" \/>\n\t<meta property=\"og:image:height\" content=\"575\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Guest\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@m2sys\" \/>\n<meta name=\"twitter:site\" content=\"@m2sys\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Guest\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.m2sys.com\/blog\/guest-blog-posts\/the-highs-lows-of-using-the-biometric-data-in-education\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.m2sys.com\/blog\/guest-blog-posts\/the-highs-lows-of-using-the-biometric-data-in-education\/\"},\"author\":{\"name\":\"Guest\",\"@id\":\"https:\/\/www.m2sys.com\/blog\/#\/schema\/person\/ccd2044dbd488486c30d37d437d0320c\"},\"headline\":\"The Highs &#038; Lows of Using the Biometric Data in Education\",\"datePublished\":\"2017-08-25T09:13:28+00:00\",\"dateModified\":\"2023-07-22T10:00:17+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.m2sys.com\/blog\/guest-blog-posts\/the-highs-lows-of-using-the-biometric-data-in-education\/\"},\"wordCount\":841,\"commentCount\":1,\"publisher\":{\"@id\":\"https:\/\/www.m2sys.com\/blog\/#organization\"},\"articleSection\":[\"Guest Blog Posts\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/www.m2sys.com\/blog\/guest-blog-posts\/the-highs-lows-of-using-the-biometric-data-in-education\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.m2sys.com\/blog\/guest-blog-posts\/the-highs-lows-of-using-the-biometric-data-in-education\/\",\"url\":\"https:\/\/www.m2sys.com\/blog\/guest-blog-posts\/the-highs-lows-of-using-the-biometric-data-in-education\/\",\"name\":\"The Highs & Lows of Using the Biometric Data in Education - Digital Transformation of Government Services\",\"isPartOf\":{\"@id\":\"https:\/\/www.m2sys.com\/blog\/#website\"},\"datePublished\":\"2017-08-25T09:13:28+00:00\",\"dateModified\":\"2023-07-22T10:00:17+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/www.m2sys.com\/blog\/guest-blog-posts\/the-highs-lows-of-using-the-biometric-data-in-education\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.m2sys.com\/blog\/guest-blog-posts\/the-highs-lows-of-using-the-biometric-data-in-education\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.m2sys.com\/blog\/guest-blog-posts\/the-highs-lows-of-using-the-biometric-data-in-education\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"The Highs &#038; Lows of Using the Biometric Data in Education\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.m2sys.com\/blog\/#website\",\"url\":\"https:\/\/www.m2sys.com\/blog\/\",\"name\":\"Digital Transformation of Government Services\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\/\/www.m2sys.com\/blog\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.m2sys.com\/blog\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.m2sys.com\/blog\/#organization\",\"name\":\"Digital Transformation of Government Services\",\"url\":\"https:\/\/www.m2sys.com\/blog\/\",\"sameAs\":[\"https:\/\/instagram.com\/m2sys\",\"https:\/\/www.linkedin.com\/company\/m2sys-technology\",\"https:\/\/www.pinterest.com\/m2sys\/\",\"https:\/\/www.youtube.com\/user\/M2SYS\",\"https:\/\/www.facebook.com\/m2sys\",\"https:\/\/twitter.com\/m2sys\"],\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.m2sys.com\/blog\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.m2sys.com\/blog\/wp-content\/uploads\/2017\/12\/m2sys-blog.png\",\"contentUrl\":\"https:\/\/www.m2sys.com\/blog\/wp-content\/uploads\/2017\/12\/m2sys-blog.png\",\"width\":287,\"height\":48,\"caption\":\"Digital Transformation of Government Services\"},\"image\":{\"@id\":\"https:\/\/www.m2sys.com\/blog\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.m2sys.com\/blog\/#\/schema\/person\/ccd2044dbd488486c30d37d437d0320c\",\"name\":\"Guest\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.m2sys.com\/blog\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/d201879437f2ccf21b1bd715f3d90d0f?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/d201879437f2ccf21b1bd715f3d90d0f?s=96&d=mm&r=g\",\"caption\":\"Guest\"},\"url\":\"https:\/\/www.m2sys.com\/blog\/author\/guest\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"The Highs & Lows of Using the Biometric Data in Education - Digital Transformation of Government Services","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.m2sys.com\/blog\/guest-blog-posts\/the-highs-lows-of-using-the-biometric-data-in-education\/","og_locale":"en_US","og_type":"article","og_title":"The Highs & Lows of Using the Biometric Data in Education - Digital Transformation of Government Services","og_description":"From using fingerprints as verification tokens on mobile phones to facial recognition software as a part of CCTVs, biometric authentication","og_url":"https:\/\/www.m2sys.com\/blog\/guest-blog-posts\/the-highs-lows-of-using-the-biometric-data-in-education\/","og_site_name":"Digital Transformation of Government Services","article_publisher":"https:\/\/www.facebook.com\/m2sys","article_published_time":"2017-08-25T09:13:28+00:00","article_modified_time":"2023-07-22T10:00:17+00:00","og_image":[{"width":1000,"height":575,"url":"https:\/\/www.m2sys.com\/blog\/wp-content\/uploads\/2020\/05\/Biometric.jpg","type":"image\/jpeg"}],"author":"Guest","twitter_card":"summary_large_image","twitter_creator":"@m2sys","twitter_site":"@m2sys","twitter_misc":{"Written by":"Guest","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.m2sys.com\/blog\/guest-blog-posts\/the-highs-lows-of-using-the-biometric-data-in-education\/#article","isPartOf":{"@id":"https:\/\/www.m2sys.com\/blog\/guest-blog-posts\/the-highs-lows-of-using-the-biometric-data-in-education\/"},"author":{"name":"Guest","@id":"https:\/\/www.m2sys.com\/blog\/#\/schema\/person\/ccd2044dbd488486c30d37d437d0320c"},"headline":"The Highs &#038; Lows of Using the Biometric Data in Education","datePublished":"2017-08-25T09:13:28+00:00","dateModified":"2023-07-22T10:00:17+00:00","mainEntityOfPage":{"@id":"https:\/\/www.m2sys.com\/blog\/guest-blog-posts\/the-highs-lows-of-using-the-biometric-data-in-education\/"},"wordCount":841,"commentCount":1,"publisher":{"@id":"https:\/\/www.m2sys.com\/blog\/#organization"},"articleSection":["Guest Blog Posts"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.m2sys.com\/blog\/guest-blog-posts\/the-highs-lows-of-using-the-biometric-data-in-education\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.m2sys.com\/blog\/guest-blog-posts\/the-highs-lows-of-using-the-biometric-data-in-education\/","url":"https:\/\/www.m2sys.com\/blog\/guest-blog-posts\/the-highs-lows-of-using-the-biometric-data-in-education\/","name":"The Highs & Lows of Using the Biometric Data in Education - Digital Transformation of Government Services","isPartOf":{"@id":"https:\/\/www.m2sys.com\/blog\/#website"},"datePublished":"2017-08-25T09:13:28+00:00","dateModified":"2023-07-22T10:00:17+00:00","breadcrumb":{"@id":"https:\/\/www.m2sys.com\/blog\/guest-blog-posts\/the-highs-lows-of-using-the-biometric-data-in-education\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.m2sys.com\/blog\/guest-blog-posts\/the-highs-lows-of-using-the-biometric-data-in-education\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.m2sys.com\/blog\/guest-blog-posts\/the-highs-lows-of-using-the-biometric-data-in-education\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"The Highs &#038; Lows of Using the Biometric Data in Education"}]},{"@type":"WebSite","@id":"https:\/\/www.m2sys.com\/blog\/#website","url":"https:\/\/www.m2sys.com\/blog\/","name":"Digital Transformation of Government Services","description":"","publisher":{"@id":"https:\/\/www.m2sys.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.m2sys.com\/blog\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.m2sys.com\/blog\/#organization","name":"Digital Transformation of Government Services","url":"https:\/\/www.m2sys.com\/blog\/","sameAs":["https:\/\/instagram.com\/m2sys","https:\/\/www.linkedin.com\/company\/m2sys-technology","https:\/\/www.pinterest.com\/m2sys\/","https:\/\/www.youtube.com\/user\/M2SYS","https:\/\/www.facebook.com\/m2sys","https:\/\/twitter.com\/m2sys"],"logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.m2sys.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.m2sys.com\/blog\/wp-content\/uploads\/2017\/12\/m2sys-blog.png","contentUrl":"https:\/\/www.m2sys.com\/blog\/wp-content\/uploads\/2017\/12\/m2sys-blog.png","width":287,"height":48,"caption":"Digital Transformation of Government Services"},"image":{"@id":"https:\/\/www.m2sys.com\/blog\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.m2sys.com\/blog\/#\/schema\/person\/ccd2044dbd488486c30d37d437d0320c","name":"Guest","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.m2sys.com\/blog\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/d201879437f2ccf21b1bd715f3d90d0f?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/d201879437f2ccf21b1bd715f3d90d0f?s=96&d=mm&r=g","caption":"Guest"},"url":"https:\/\/www.m2sys.com\/blog\/author\/guest\/"}]}},"modified_by":"Guest","post_mailing_queue_ids":[],"_links":{"self":[{"href":"https:\/\/www.m2sys.com\/blog\/wp-json\/wp\/v2\/posts\/13680"}],"collection":[{"href":"https:\/\/www.m2sys.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.m2sys.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.m2sys.com\/blog\/wp-json\/wp\/v2\/users\/398"}],"replies":[{"embeddable":true,"href":"https:\/\/www.m2sys.com\/blog\/wp-json\/wp\/v2\/comments?post=13680"}],"version-history":[{"count":3,"href":"https:\/\/www.m2sys.com\/blog\/wp-json\/wp\/v2\/posts\/13680\/revisions"}],"predecessor-version":[{"id":20037,"href":"https:\/\/www.m2sys.com\/blog\/wp-json\/wp\/v2\/posts\/13680\/revisions\/20037"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.m2sys.com\/blog\/wp-json\/wp\/v2\/media\/12746"}],"wp:attachment":[{"href":"https:\/\/www.m2sys.com\/blog\/wp-json\/wp\/v2\/media?parent=13680"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.m2sys.com\/blog\/wp-json\/wp\/v2\/categories?post=13680"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.m2sys.com\/blog\/wp-json\/wp\/v2\/tags?post=13680"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}