{"id":11255,"date":"2020-02-10T11:01:00","date_gmt":"2020-02-10T05:31:00","guid":{"rendered":"https:\/\/www.mygreatlearning.com\/blog\/how-machine-learning-is-changing-identity-theft-detection\/"},"modified":"2024-09-12T16:09:41","modified_gmt":"2024-09-12T10:39:41","slug":"how-machine-learning-is-changing-identity-theft-detection","status":"publish","type":"post","link":"https:\/\/www.mygreatlearning.com\/blog\/how-machine-learning-is-changing-identity-theft-detection\/","title":{"rendered":"How Machine Learning is Changing Identity Theft Detection"},"content":{"rendered":"\n<p>Several high-profile firms across the world have been crumbling in the wake of data breaches and large-scale identity theft. In the number of fraud reports recorded, identity theft accounts form an alarmingly high number, even without all organisations and financial institutions in picture. Identity theft can take place at any time and to anyone, which makes it one of the most crippling forms of cybercrime today. The increase in big data and millions of information points collected by organisations around the world makes it much harder for human intervention and fraud detection. This is where <a rel=\"noreferrer noopener\" aria-label=\"Machine Learning (opens in a new tab)\" href=\"https:\/\/www.mygreatlearning.com\/blog\/what-is-machine-learning\/\" target=\"_blank\">Machine Learning<\/a> slots in.\u00a0<gwmw style=\"display:none;\"><\/p>\n\n\n\n<p>But first, it is critical to understand what identity theft is, what forms it can take, and how it was traditionally detected.\u00a0<gwmw style=\"display:none;\"><\/p>\n\n\n\n<h2 id=\"what-is-identity-theft\"><strong>What is Identity Theft?<\/strong><gwmw style=\"display:none;\"><\/h2>\n\n\n\n<p>Identity theft is so much more than a phrase that is floating around the internet\u2013 it is a critical form of cybercrime that hordes of individuals and organisations are struggling to fend off. In essence, identity theft is when your personal information is somehow obtained by a third party and used to impersonate you and perpetrate fraudulent activities for financial gain.<gwmw style=\"display:none;\"><\/p>\n\n\n\n<p><strong>The term \u2018personal <strong>information<\/strong>\u2019 <strong>could <\/strong>refer to any information. The list includes:<gwmw style=\"display:none;\"><gwmw style=\"display:none;\"><\/strong><\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Name<\/li>\n\n\n\n<li>Bank Details<\/li>\n\n\n\n<li>Email and Passwords<\/li>\n\n\n\n<li>Passport or Identification details<\/li>\n\n\n\n<li>Other online login passwords<\/li>\n<\/ul>\n\n\n\n<p>Identity theft is broadly divided into the following types: true name theft, synthetic theft and account takeover theft.<gwmw style=\"display:none;\"><\/p>\n\n\n\n<p><strong>True name theft<\/strong>: The stolen information is used to open new accounts. These could be bank accounts, credit card accounts or even cell phone network provider accounts. <gwmw style=\"display:none;\"><\/p>\n\n\n\n<p><strong>Account takeover theft:<\/strong> This is when the stolen information is used to gain access to existing accounts and funds. In certain situations, the perpetrator might also change mailing addresses or other existing details without the real account owner\u2019s knowledge.<\/p>\n\n\n\n<p><strong>Synthetic theft<\/strong>: In this type of fraud, the perpetrator merges real information and fake details to create a new identity. This is typically used to conduct fraudulent purchases or open counterfeit accounts.<\/p>\n\n\n\n    <div class=\"courses-cta-container\">\n        <div class=\"courses-cta-card\">\n            <div class=\"courses-cta-header\">\n                <div class=\"courses-learn-icon\"><\/div>\n                <span class=\"courses-learn-text\">Texas McCombs, UT Austin<\/span>\n            <\/div>\n            <p class=\"courses-cta-title\">\n                <a href=\"https:\/\/onlineexeced.mccombs.utexas.edu\/online-data-science-business-analytics-course\" class=\"courses-cta-title-link\">Post Graduate Program in Data Science with Generative AI: Applications to Business<\/a>\n            <\/p>\n            <p class=\"courses-cta-description\">Learn how to turn data into strategy in this UT Data Science and Business Analytics Course \u2014 now with a focus on Generative AI. Gain practical experience through 7 hands-on projects over a 7-month duration.<\/p>\n            <div class=\"courses-cta-stats\">\n                <div class=\"courses-stat-item\">\n                    <div class=\"courses-stat-icon courses-user-icon\"><\/div>\n                    <span>7 Hands-on Projects<\/span>\n                <\/div>\n                <div class=\"courses-stat-item\">\n                    <div class=\"courses-stat-icon courses-star-icon\"><\/div>\n                    <span>Duration: 7 months<\/span>\n                <\/div>\n            <\/div>\n            <a href=\"https:\/\/onlineexeced.mccombs.utexas.edu\/online-data-science-business-analytics-course\" class=\"courses-cta-button\">\n                Discover the Program\n                <div class=\"courses-arrow-icon\"><\/div>\n            <\/a>\n        <\/div>\n    <\/div>\n\n\n\n<h2 class=\"wp-block-heading\" class=\"wp-block-heading\" id=\"why-is-identity-theft-dangerous\"><strong>Why is Identity Theft Dangerous?<\/strong><gwmw style=\"display:none;\"><\/h2>\n\n\n\n<p>Picture this\u2013 you\u2019re having a regular day until you receive a call from your bank stating that your account balance is below the limit, even if you haven\u2019t touched the money in it. Or, in another scenario, you get medical bills for services that you haven\u2019t availed. These are a few common examples of identity theft, and an indication of how devastating the crime can be for victims.<\/p>\n\n\n\n<p>Identity theft can happen to <gwmw class=\"ginger-module-highlighter-mistake-type-3\" id=\"gwmw-15813187736404375670046\">anyone regardless<\/gwmw> of who they are. It is one of the biggest consumer crimes in the world and can have debilitating effects on the victim.<gwmw style=\"display:none;\"><\/p>\n\n\n\n<p>Some of the ways through which victims can <gwmw class=\"ginger-module-highlighter-mistake-type-2\" id=\"gwmw-15813190703092312436310\">be affected in<\/gwmw> Thef<gwmw class=\"ginger-module-highlighter-mistake-type-3\" id=\"gwmw-15813187961109505502597\">t<\/gwmw><\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Lacs of rupees worth debt accrued in their name<\/li>\n\n\n\n<li>A plunging credit score<\/li>\n\n\n\n<li>Stalled income tax returns<\/li>\n\n\n\n<li>Rejected loan applications<\/li>\n\n\n\n<li>Mounting bills to services unasked for<\/li>\n\n\n\n<li>Locked bank or other accounts<\/li>\n\n\n\n<li>Higher interest rates as a result of a ruined credit history<\/li>\n\n\n\n<li>Financial errors that could take years to set right<\/li>\n<\/ul>\n\n\n\n<p>It goes without saying that every individual must be extra careful with their sensitive personal information, especially those that are linked to critical structures such as banks and social security. Some common ways through which identity theft occurs are:<gwmw style=\"display:none;\"><\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Phishing<\/strong>: Fake emails or texts sent by criminals which, when opened, use malware to mine personal information from devices without the owner\u2019s knowledge.<\/li>\n\n\n\n<li><strong>Shoulder-surfing<\/strong>: The perpetrator may watch you punch in ATM PINs or enter sensitive data into your computer or phone.<\/li>\n\n\n\n<li><strong>Dumpster-diving<\/strong>: Thieves may rummage through papers or mails left unattended to patch together critical information such as name, official address, bank details and health insurance details.&nbsp;<\/li>\n\n\n\n<li><strong>Credit card-cloning<\/strong>: Your credit or debit card may be cloned when given to process a payment at a restaurant or a shop. Copying of magnetic strip information can also occur in ATMs that were compromised by thieves.<\/li>\n<\/ul>\n\n\n\n<p>Cyber-criminals and identity thieves are growing increasingly savvy with digital or technology-based scams, which is why individuals also need to be extra careful when conducting online transactions or using internet banking facilities.\u00a0<gwmw style=\"display:none;\"><\/p>\n\n\n\n<p>Read also: <a href=\"https:\/\/www.mygreatlearning.com\/blog\/cybersecurity-interview-questions\/\" target=\"_blank\" rel=\"noreferrer noopener\" aria-label=\" (opens in a new tab)\">Most Important Cybersecurity Interview Questions<\/a><\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"traditional-methods-of-id-theft-detection\"><strong>Traditional Methods of ID Theft Detection<\/strong><\/h2>\n\n\n\n<p>Quite unlike robbery or burglary, this type of theft often occurs without victim\u2019s knowledge\u2013 and when it does come to their notice, they usually face a heavy loss. Even well-prepared individuals risk having their identity stolen. There are a few red flags that traditionally double up as signs of identity theft, they are-<gwmw style=\"display:none;\"><\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Unauthorised transactions<\/strong>: Victims often see their monthly statements being displayed publicly, transactions or withdrawals they haven\u2019t authorised taking place in a vicinity they did not visit.&nbsp;<\/li>\n\n\n\n<li><strong>Mounting debts<\/strong>: Targets get calls about mounting debts or charges they\u2019re expected to pay but cannot explain or haven\u2019t authorised.&nbsp;<\/li>\n\n\n\n<li><strong>Credit score check<\/strong>: Victims found their credit score plummeting for no apparent reason.<\/li>\n\n\n\n<li><strong>Odd credit reports<\/strong>: If there are discrepancies outside of banking statements, credit reports are likely to reveal them. They provide a bird\u2019s eye view of all credit maintained in an individual\u2019s name.<\/li>\n\n\n\n<li><strong>Missing mail<\/strong>: If a target\u2019s mailing address was changed, mail and bills will inevitably go missing. This is a surefire indicator of fraudulent activities if it has not been authorised by the victim.&nbsp;<\/li>\n<\/ul>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"theoretical-applications-of-ml-in-id-theft-detection\"><strong>Theoretical Applications of ML in ID Theft Detection<\/strong> <\/h2>\n\n\n\n<p>By definition, Machine Learning is the general term for analytical algorithms and systems that \u2018learn\u2019 patterns from samples and datasets to an extent where one can be largely free of human interference. The best tech team on the planet could analyse and attempt to detect fraud day in and day out, and they may let certain indicators slip.<\/p>\n\n\n\n<p>Machine Learning in ID theft detection is crucial because it is a much faster process than manual analysis and is much more practical to scale when larger organisations and hordes of data are at stake.&nbsp;<\/p>\n\n\n\n<p>It has already become a large part of our daily lives, from streaming sites delivering movie recommendations to self-driving cars that have taken to the streets. ML has so much potential when it comes to identity theft detection\u2013especially as there are bigger players and higher factors at stake.<\/p>\n\n\n\n<p>Here are some of the ways through which ML is being leveraged to detect identity theft and even offset its debilitating effects:<\/p>\n\n\n\n<h4 class=\"wp-block-heading\" class=\"wp-block-heading\" id=\"performing-authentication-tests\"><strong><em>Performing authentication tests<\/em><\/strong><gwmw style=\"display:none;\"><\/h4>\n\n\n\n<p>Through ML algorithms, crucial identity documents can be scanned and cross-verified against secure databases in real-time. This ensures identity theft and consequent frauds do not go undetected.<\/p>\n\n\n\n<p>Documents that could be used for these tests include driving license, PAN card and passports. In some cases, biometric information, pen-and-paper validation and facial recognition could also be employed for an additional level of authentication and cross-verification.<\/p>\n\n\n\n<p>All of these methods require individuals to be present to authenticate the transaction, this hinders fraudsters from exploiting identity theft.<\/p>\n\n\n\n    <div class=\"courses-cta-container\">\n        <div class=\"courses-cta-card\">\n            <div class=\"courses-cta-header\">\n                <div class=\"courses-learn-icon\"><\/div>\n                <span class=\"courses-learn-text\">Transform Healthcare with AI<\/span>\n            <\/div>\n            <p class=\"courses-cta-title\">\n                <a href=\"https:\/\/online.lifelonglearning.jhu.edu\/jhu-ai-in-healthcare-certificate-program\" class=\"courses-cta-title-link\">AI in Healthcare Program<\/a>\n            <\/p>\n            <p class=\"courses-cta-description\">Transform healthcare with AI. Apply now for Johns Hopkins AI in Healthcare Program and enhance patient outcomes with cutting-edge skills<\/p>\n            <div class=\"courses-cta-stats\">\n                <div class=\"courses-stat-item\">\n                    <div class=\"courses-stat-icon courses-user-icon\"><\/div>\n                    <span>Duration: 10 weeks<\/span>\n                <\/div>\n                <div class=\"courses-stat-item\">\n                    <div class=\"courses-stat-icon courses-star-icon\"><\/div>\n                    <span>8+ Case Studies<\/span>\n                <\/div>\n            <\/div>\n            <a href=\"https:\/\/online.lifelonglearning.jhu.edu\/jhu-ai-in-healthcare-certificate-program\" class=\"courses-cta-button\">\n                Discover the Program\n                <div class=\"courses-arrow-icon\"><\/div>\n            <\/a>\n        <\/div>\n    <\/div>\n\n\n\n<h4 class=\"wp-block-heading\" id=\"identifying-patterns\"><strong><em>Identifying patterns<\/em><\/strong><\/h4>\n\n\n\n<p><a href=\"https:\/\/www.mygreatlearning.com\/blog\/pattern-recognition-machine-learning\/\" target=\"_blank\" rel=\"noreferrer noopener\" aria-label=\" (opens in a new tab)\">Pattern recognition<\/a> is an added advantage of using ML to revolutionise identity theft detection. Machine Learning algorithms are almost always connected to a database. Using this as a reference, these algorithms can scan through records and transaction details that are maintained over the years against individuals\u2019 names. In turn, this exercise can help spot anomalies and suspicious patterns that could indicate identity theft.<\/p>\n\n\n\n<p>The benefit of this theoretical use is the speed at which data can be compared and patterns identified, ensuring that time (and precious data) is not lost during the process.&nbsp;<\/p>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"monitoring-behavioural-analytics\"><strong>Monitoring <gwmw class=\"ginger-module-highlighter-mistake-type-1\" id=\"monitoring-behavioural-analytics\">B<\/gwmw>ehavioural Analytics<\/strong><\/h3>\n\n\n\n<p>In behaviour analytics, ML is used to understand and predict an individual\u2019s behaviour at a granular level for different transactions. With each transaction, an individual\u2019s profile is updated. Algorithms can then proceed to monitor individual profiles and flag suspicious activity that doesn\u2019t quite match the pattern tracked through every transaction.<gwmw style=\"display:none;\"><\/p>\n\n\n\n<p>Naturally, the key to the success of this model is up-to-date information that dates back over considerable time to form a workable dataset.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" class=\"wp-block-heading\" id=\"examples-of-machine-learning-in-id-theft-detection\"><strong>Examples of Machine Learning in ID Theft Detection<\/strong><gwmw style=\"display:none;\"><\/h2>\n\n\n\n<p>In 2019, IBM published a paper on homomorphic encryption being used in a banking facility to safely run algorithms without risking a breach of privacy. The basis of homomorphic encryption is that it allows Machine Learning algorithms to perform its functions as usual on a dataset of customer information without decrypting a single file. In effect, this means that data is kept secure and confidential and even if ML algorithms are given access to it,&nbsp; they effectively perform their job.<\/p>\n\n\n\n<p>Firms rooted in Machine Learning are quickly grasping the impact that emerging technologies can have on identity theft detection and prevention. This knowledge led Amazon to introduce the Fraud Detector, a managed service that enables non-ML firms to build detection algorithms faster, using templates to detect fake accounts. Aside from preventing fraud, it also predicts it, allowing users to take preventive measures in advance.<\/p>\n\n\n\n<p>Thus, we can say that Machine Learning plays an increasingly critical role in safeguarding personal and confidential data from theft and misuse. As big data continues to grow in volume, human intervention is largely being outshone by criminals using sophisticated methods to steal personal information. The use of Machine Learning in ID theft detection is a step forward in ensuring the security and confidentiality of data, and a method to ensure that perpetrators are both outmaneuvered and held to task.<\/p>\n\n\n\n<p>If you wish to learn more about Machine Learning and its uses, upskill with Great Learning\u2019s <a aria-label=\" (opens in a new tab)\" href=\"https:\/\/www.mygreatlearning.com\/pg-program-artificial-intelligence-course\" target=\"_blank\" rel=\"noreferrer noopener\">PGP - Artificial Intelligence and Machine Learning<\/a> and unlock your dream career today!<\/p>\n\n\n\n<div style=\"background-color: #efefef; border: 1px solid #000; padding: 8px;\"><p><b>Find  Machine Learning Course in Top Indian Cities<\/b><\/p> \n    <a href=\"https:\/\/www.mygreatlearning.com\/pg-program-machine-learning-course-in-chennai\" title=\" Machine Learning Course in Chennai\">Chennai<\/a> | \n    <a href=\"https:\/\/www.mygreatlearning.com\/pg-program-machine-learning-course-in-bangalore\" title=\" Machine Learning Course in Bangalore\">Bangalore<\/a> | \n    <a href=\"https:\/\/www.mygreatlearning.com\/pg-program-machine-learning-course-in-hyderabad\" title=\" Machine Learning Course in Hyderabad\">Hyderabad<\/a> | \n    <a href=\"https:\/\/www.mygreatlearning.com\/pg-program-machine-learning-course-in-pune\" title=\" Machine Learning Course in Pune\">Pune<\/a> | \n    <a href=\"https:\/\/www.mygreatlearning.com\/pg-program-machine-learning-course-in-mumbai\" title=\" Machine Learninge Course in Mumbai\">Mumbai<\/a> | \n    <a href=\"https:\/\/www.mygreatlearning.com\/pg-program-machine-learning-course-in-delhi-ncr\" title=\" Machine Learning Course in Delhi NCR\">Delhi NCR<\/a><\/div>\n\n\n\n<p><br><\/p>\n\n\n\n<h2 class=\"wp-block-heading\" class=\"wp-block-heading\" id=\"our-machine-learning-courses\">Our Machine Learning Courses<\/h2>\n\n\n\n<p>Explore our Machine Learning and AI courses, designed for comprehensive learning and skill development.<\/p>\n\n\n\n<figure class=\"wp-block-table\"><table class=\"has-fixed-layout\"><thead><tr><th><strong>Program Name<\/strong><\/th><th><strong>Duration<\/strong><\/th><\/tr><tr><th><a href=\"https:\/\/professionalonline2.mit.edu\/no-code-artificial-intelligence-machine-learning-program\">MIT No code AI and Machine Learning Course<\/a><\/th><th>12 Weeks<\/th><\/tr><tr><th><a href=\"https:\/\/idss-gl.mit.edu\/mit-idss-data-science-machine-learning-online-program\">MIT Data Science and Machine Learning Course<\/a><\/th><th>12 Weeks<\/th><\/tr><tr><th><a href=\"https:\/\/www.mygreatlearning.com\/mit-data-science-and-machine-learning-program\">Data Science and Machine Learning Course<\/a><\/th><th>12 Weeks<\/th><\/tr><\/thead><\/table><\/figure>\n","protected":false},"excerpt":{"rendered":"<p>Several high-profile firms across the world have been crumbling in the wake of data breaches and large-scale identity theft. In the number of fraud reports recorded, identity theft accounts form an alarmingly high number, even without all organisations and financial institutions in picture. Identity theft can take place at any time and to anyone, which [&hellip;]<\/p>\n","protected":false},"author":41,"featured_media":11265,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_uag_custom_page_level_css":"","site-sidebar-layout":"default","site-content-layout":"","ast-site-content-layout":"default","site-content-style":"default","site-sidebar-style":"default","ast-global-header-display":"","ast-banner-title-visibility":"","ast-main-header-display":"","ast-hfb-above-header-display":"","ast-hfb-below-header-display":"","ast-hfb-mobile-header-display":"","site-post-title":"","ast-breadcrumbs-content":"","ast-featured-img":"","footer-sml-layout":"","ast-disable-related-posts":"","theme-transparent-header-meta":"","adv-header-id-meta":"","stick-header-meta":"","header-above-stick-meta":"","header-main-stick-meta":"","header-below-stick-meta":"","astra-migrate-meta-layouts":"set","ast-page-background-enabled":"default","ast-page-background-meta":{"desktop":{"background-color":"var(--ast-global-color-4)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"ast-content-background-meta":{"desktop":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"footnotes":""},"categories":[2],"tags":[],"content_type":[],"class_list":["post-11255","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-artificial-intelligence"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.3 (Yoast SEO v27.3) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>How Machine Learning is Changing Identity Theft Detection<\/title>\n<meta name=\"description\" content=\"Machine Learning changing identity theft detection: there were several fraud reports recorded, identity theft accounts form an alarmingly high number, in this case machine learning can help!\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.mygreatlearning.com\/blog\/how-machine-learning-is-changing-identity-theft-detection\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"How Machine Learning is Changing Identity Theft Detection\" \/>\n<meta property=\"og:description\" content=\"Machine Learning changing identity theft detection: there were several fraud reports recorded, identity theft accounts form an alarmingly high number, in this case machine learning can help!\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.mygreatlearning.com\/blog\/how-machine-learning-is-changing-identity-theft-detection\/\" \/>\n<meta property=\"og:site_name\" content=\"Great Learning Blog: Free Resources what Matters to shape your Career!\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/GreatLearningOfficial\/\" \/>\n<meta property=\"article:published_time\" content=\"2020-02-10T05:31:00+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2024-09-12T10:39:41+00:00\" \/>\n<meta property=\"og:image\" content=\"http:\/\/www.mygreatlearning.com\/blog\/wp-content\/uploads\/2020\/01\/hacker-1944688_1280.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1280\" \/>\n\t<meta property=\"og:image:height\" content=\"853\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Great Learning Editorial Team\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@https:\/\/twitter.com\/Great_Learning\" \/>\n<meta name=\"twitter:site\" content=\"@Great_Learning\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Great Learning Editorial Team\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"8 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.mygreatlearning.com\\\/blog\\\/how-machine-learning-is-changing-identity-theft-detection\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.mygreatlearning.com\\\/blog\\\/how-machine-learning-is-changing-identity-theft-detection\\\/\"},\"author\":{\"name\":\"Great Learning Editorial Team\",\"@id\":\"https:\\\/\\\/www.mygreatlearning.com\\\/blog\\\/#\\\/schema\\\/person\\\/6f993d1be4c584a335951e836f2656ad\"},\"headline\":\"How Machine Learning is Changing Identity Theft Detection\",\"datePublished\":\"2020-02-10T05:31:00+00:00\",\"dateModified\":\"2024-09-12T10:39:41+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.mygreatlearning.com\\\/blog\\\/how-machine-learning-is-changing-identity-theft-detection\\\/\"},\"wordCount\":1649,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\\\/\\\/www.mygreatlearning.com\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.mygreatlearning.com\\\/blog\\\/how-machine-learning-is-changing-identity-theft-detection\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.mygreatlearning.com\\\/blog\\\/wp-content\\\/uploads\\\/2020\\\/01\\\/hacker-1944688_1280.jpg\",\"articleSection\":[\"AI and Machine Learning\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/www.mygreatlearning.com\\\/blog\\\/how-machine-learning-is-changing-identity-theft-detection\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.mygreatlearning.com\\\/blog\\\/how-machine-learning-is-changing-identity-theft-detection\\\/\",\"url\":\"https:\\\/\\\/www.mygreatlearning.com\\\/blog\\\/how-machine-learning-is-changing-identity-theft-detection\\\/\",\"name\":\"How Machine Learning is Changing Identity Theft Detection\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.mygreatlearning.com\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.mygreatlearning.com\\\/blog\\\/how-machine-learning-is-changing-identity-theft-detection\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.mygreatlearning.com\\\/blog\\\/how-machine-learning-is-changing-identity-theft-detection\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.mygreatlearning.com\\\/blog\\\/wp-content\\\/uploads\\\/2020\\\/01\\\/hacker-1944688_1280.jpg\",\"datePublished\":\"2020-02-10T05:31:00+00:00\",\"dateModified\":\"2024-09-12T10:39:41+00:00\",\"description\":\"Machine Learning changing identity theft detection: there were several fraud reports recorded, identity theft accounts form an alarmingly high number, in this case machine learning can help!\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.mygreatlearning.com\\\/blog\\\/how-machine-learning-is-changing-identity-theft-detection\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.mygreatlearning.com\\\/blog\\\/how-machine-learning-is-changing-identity-theft-detection\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.mygreatlearning.com\\\/blog\\\/how-machine-learning-is-changing-identity-theft-detection\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.mygreatlearning.com\\\/blog\\\/wp-content\\\/uploads\\\/2020\\\/01\\\/hacker-1944688_1280.jpg\",\"contentUrl\":\"https:\\\/\\\/www.mygreatlearning.com\\\/blog\\\/wp-content\\\/uploads\\\/2020\\\/01\\\/hacker-1944688_1280.jpg\",\"width\":1280,\"height\":853,\"caption\":\"identity theft\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.mygreatlearning.com\\\/blog\\\/how-machine-learning-is-changing-identity-theft-detection\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Blog\",\"item\":\"https:\\\/\\\/www.mygreatlearning.com\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"AI and Machine Learning\",\"item\":\"https:\\\/\\\/www.mygreatlearning.com\\\/blog\\\/artificial-intelligence\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"How Machine Learning is Changing Identity Theft Detection\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.mygreatlearning.com\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.mygreatlearning.com\\\/blog\\\/\",\"name\":\"Great Learning Blog\",\"description\":\"Learn, Upskill &amp; Career Development Guide and Resources\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.mygreatlearning.com\\\/blog\\\/#organization\"},\"alternateName\":\"Great Learning\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.mygreatlearning.com\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.mygreatlearning.com\\\/blog\\\/#organization\",\"name\":\"Great Learning\",\"url\":\"https:\\\/\\\/www.mygreatlearning.com\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.mygreatlearning.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.mygreatlearning.com\\\/blog\\\/wp-content\\\/uploads\\\/2022\\\/06\\\/GL-Logo.jpg\",\"contentUrl\":\"https:\\\/\\\/www.mygreatlearning.com\\\/blog\\\/wp-content\\\/uploads\\\/2022\\\/06\\\/GL-Logo.jpg\",\"width\":900,\"height\":900,\"caption\":\"Great Learning\"},\"image\":{\"@id\":\"https:\\\/\\\/www.mygreatlearning.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/GreatLearningOfficial\\\/\",\"https:\\\/\\\/x.com\\\/Great_Learning\",\"https:\\\/\\\/www.instagram.com\\\/greatlearningofficial\\\/\",\"https:\\\/\\\/www.linkedin.com\\\/school\\\/great-learning\\\/\",\"https:\\\/\\\/in.pinterest.com\\\/greatlearning12\\\/\",\"https:\\\/\\\/www.youtube.com\\\/user\\\/beaconelearning\\\/\"],\"description\":\"Great Learning is a leading global ed-tech company for professional training and higher education. It offers comprehensive, industry-relevant, hands-on learning programs across various business, technology, and interdisciplinary domains driving the digital economy. These programs are developed and offered in collaboration with the world's foremost academic institutions.\",\"email\":\"info@mygreatlearning.com\",\"legalName\":\"Great Learning Education Services Pvt. Ltd\",\"foundingDate\":\"2013-11-29\",\"numberOfEmployees\":{\"@type\":\"QuantitativeValue\",\"minValue\":\"1001\",\"maxValue\":\"5000\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.mygreatlearning.com\\\/blog\\\/#\\\/schema\\\/person\\\/6f993d1be4c584a335951e836f2656ad\",\"name\":\"Great Learning Editorial Team\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.mygreatlearning.com\\\/blog\\\/wp-content\\\/uploads\\\/2022\\\/02\\\/unnamed.webp\",\"url\":\"https:\\\/\\\/www.mygreatlearning.com\\\/blog\\\/wp-content\\\/uploads\\\/2022\\\/02\\\/unnamed.webp\",\"contentUrl\":\"https:\\\/\\\/www.mygreatlearning.com\\\/blog\\\/wp-content\\\/uploads\\\/2022\\\/02\\\/unnamed.webp\",\"caption\":\"Great Learning Editorial Team\"},\"description\":\"The Great Learning Editorial Staff includes a dynamic team of subject matter experts, instructors, and education professionals who combine their deep industry knowledge with innovative teaching methods. Their mission is to provide learners with the skills and insights needed to excel in their careers, whether through upskilling, reskilling, or transitioning into new fields.\",\"sameAs\":[\"https:\\\/\\\/www.mygreatlearning.com\\\/\",\"https:\\\/\\\/in.linkedin.com\\\/school\\\/great-learning\\\/\",\"https:\\\/\\\/x.com\\\/https:\\\/\\\/twitter.com\\\/Great_Learning\",\"https:\\\/\\\/www.youtube.com\\\/channel\\\/UCObs0kLIrDjX2LLSybqNaEA\"],\"award\":[\"Best EdTech Company of the Year 2024\",\"Education Economictimes Outstanding Education\\\/Edtech Solution Provider of the Year 2024\",\"Leading E-learning Platform 2024\"],\"url\":\"https:\\\/\\\/www.mygreatlearning.com\\\/blog\\\/author\\\/greatlearning\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"How Machine Learning is Changing Identity Theft Detection","description":"Machine Learning changing identity theft detection: there were several fraud reports recorded, identity theft accounts form an alarmingly high number, in this case machine learning can help!","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.mygreatlearning.com\/blog\/how-machine-learning-is-changing-identity-theft-detection\/","og_locale":"en_US","og_type":"article","og_title":"How Machine Learning is Changing Identity Theft Detection","og_description":"Machine Learning changing identity theft detection: there were several fraud reports recorded, identity theft accounts form an alarmingly high number, in this case machine learning can help!","og_url":"https:\/\/www.mygreatlearning.com\/blog\/how-machine-learning-is-changing-identity-theft-detection\/","og_site_name":"Great Learning Blog: Free Resources what Matters to shape your Career!","article_publisher":"https:\/\/www.facebook.com\/GreatLearningOfficial\/","article_published_time":"2020-02-10T05:31:00+00:00","article_modified_time":"2024-09-12T10:39:41+00:00","og_image":[{"width":1280,"height":853,"url":"http:\/\/www.mygreatlearning.com\/blog\/wp-content\/uploads\/2020\/01\/hacker-1944688_1280.jpg","type":"image\/jpeg"}],"author":"Great Learning Editorial Team","twitter_card":"summary_large_image","twitter_creator":"@https:\/\/twitter.com\/Great_Learning","twitter_site":"@Great_Learning","twitter_misc":{"Written by":"Great Learning Editorial Team","Est. reading time":"8 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.mygreatlearning.com\/blog\/how-machine-learning-is-changing-identity-theft-detection\/#article","isPartOf":{"@id":"https:\/\/www.mygreatlearning.com\/blog\/how-machine-learning-is-changing-identity-theft-detection\/"},"author":{"name":"Great Learning Editorial Team","@id":"https:\/\/www.mygreatlearning.com\/blog\/#\/schema\/person\/6f993d1be4c584a335951e836f2656ad"},"headline":"How Machine Learning is Changing Identity Theft Detection","datePublished":"2020-02-10T05:31:00+00:00","dateModified":"2024-09-12T10:39:41+00:00","mainEntityOfPage":{"@id":"https:\/\/www.mygreatlearning.com\/blog\/how-machine-learning-is-changing-identity-theft-detection\/"},"wordCount":1649,"commentCount":0,"publisher":{"@id":"https:\/\/www.mygreatlearning.com\/blog\/#organization"},"image":{"@id":"https:\/\/www.mygreatlearning.com\/blog\/how-machine-learning-is-changing-identity-theft-detection\/#primaryimage"},"thumbnailUrl":"https:\/\/www.mygreatlearning.com\/blog\/wp-content\/uploads\/2020\/01\/hacker-1944688_1280.jpg","articleSection":["AI and Machine Learning"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.mygreatlearning.com\/blog\/how-machine-learning-is-changing-identity-theft-detection\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.mygreatlearning.com\/blog\/how-machine-learning-is-changing-identity-theft-detection\/","url":"https:\/\/www.mygreatlearning.com\/blog\/how-machine-learning-is-changing-identity-theft-detection\/","name":"How Machine Learning is Changing Identity Theft Detection","isPartOf":{"@id":"https:\/\/www.mygreatlearning.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.mygreatlearning.com\/blog\/how-machine-learning-is-changing-identity-theft-detection\/#primaryimage"},"image":{"@id":"https:\/\/www.mygreatlearning.com\/blog\/how-machine-learning-is-changing-identity-theft-detection\/#primaryimage"},"thumbnailUrl":"https:\/\/www.mygreatlearning.com\/blog\/wp-content\/uploads\/2020\/01\/hacker-1944688_1280.jpg","datePublished":"2020-02-10T05:31:00+00:00","dateModified":"2024-09-12T10:39:41+00:00","description":"Machine Learning changing identity theft detection: there were several fraud reports recorded, identity theft accounts form an alarmingly high number, in this case machine learning can help!","breadcrumb":{"@id":"https:\/\/www.mygreatlearning.com\/blog\/how-machine-learning-is-changing-identity-theft-detection\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.mygreatlearning.com\/blog\/how-machine-learning-is-changing-identity-theft-detection\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.mygreatlearning.com\/blog\/how-machine-learning-is-changing-identity-theft-detection\/#primaryimage","url":"https:\/\/www.mygreatlearning.com\/blog\/wp-content\/uploads\/2020\/01\/hacker-1944688_1280.jpg","contentUrl":"https:\/\/www.mygreatlearning.com\/blog\/wp-content\/uploads\/2020\/01\/hacker-1944688_1280.jpg","width":1280,"height":853,"caption":"identity theft"},{"@type":"BreadcrumbList","@id":"https:\/\/www.mygreatlearning.com\/blog\/how-machine-learning-is-changing-identity-theft-detection\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Blog","item":"https:\/\/www.mygreatlearning.com\/blog\/"},{"@type":"ListItem","position":2,"name":"AI and Machine Learning","item":"https:\/\/www.mygreatlearning.com\/blog\/artificial-intelligence\/"},{"@type":"ListItem","position":3,"name":"How Machine Learning is Changing Identity Theft Detection"}]},{"@type":"WebSite","@id":"https:\/\/www.mygreatlearning.com\/blog\/#website","url":"https:\/\/www.mygreatlearning.com\/blog\/","name":"Great Learning Blog","description":"Learn, Upskill &amp; Career Development Guide and Resources","publisher":{"@id":"https:\/\/www.mygreatlearning.com\/blog\/#organization"},"alternateName":"Great Learning","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.mygreatlearning.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.mygreatlearning.com\/blog\/#organization","name":"Great Learning","url":"https:\/\/www.mygreatlearning.com\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.mygreatlearning.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.mygreatlearning.com\/blog\/wp-content\/uploads\/2022\/06\/GL-Logo.jpg","contentUrl":"https:\/\/www.mygreatlearning.com\/blog\/wp-content\/uploads\/2022\/06\/GL-Logo.jpg","width":900,"height":900,"caption":"Great Learning"},"image":{"@id":"https:\/\/www.mygreatlearning.com\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/GreatLearningOfficial\/","https:\/\/x.com\/Great_Learning","https:\/\/www.instagram.com\/greatlearningofficial\/","https:\/\/www.linkedin.com\/school\/great-learning\/","https:\/\/in.pinterest.com\/greatlearning12\/","https:\/\/www.youtube.com\/user\/beaconelearning\/"],"description":"Great Learning is a leading global ed-tech company for professional training and higher education. It offers comprehensive, industry-relevant, hands-on learning programs across various business, technology, and interdisciplinary domains driving the digital economy. These programs are developed and offered in collaboration with the world's foremost academic institutions.","email":"info@mygreatlearning.com","legalName":"Great Learning Education Services Pvt. Ltd","foundingDate":"2013-11-29","numberOfEmployees":{"@type":"QuantitativeValue","minValue":"1001","maxValue":"5000"}},{"@type":"Person","@id":"https:\/\/www.mygreatlearning.com\/blog\/#\/schema\/person\/6f993d1be4c584a335951e836f2656ad","name":"Great Learning Editorial Team","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.mygreatlearning.com\/blog\/wp-content\/uploads\/2022\/02\/unnamed.webp","url":"https:\/\/www.mygreatlearning.com\/blog\/wp-content\/uploads\/2022\/02\/unnamed.webp","contentUrl":"https:\/\/www.mygreatlearning.com\/blog\/wp-content\/uploads\/2022\/02\/unnamed.webp","caption":"Great Learning Editorial Team"},"description":"The Great Learning Editorial Staff includes a dynamic team of subject matter experts, instructors, and education professionals who combine their deep industry knowledge with innovative teaching methods. Their mission is to provide learners with the skills and insights needed to excel in their careers, whether through upskilling, reskilling, or transitioning into new fields.","sameAs":["https:\/\/www.mygreatlearning.com\/","https:\/\/in.linkedin.com\/school\/great-learning\/","https:\/\/x.com\/https:\/\/twitter.com\/Great_Learning","https:\/\/www.youtube.com\/channel\/UCObs0kLIrDjX2LLSybqNaEA"],"award":["Best EdTech Company of the Year 2024","Education Economictimes Outstanding Education\/Edtech Solution Provider of the Year 2024","Leading E-learning Platform 2024"],"url":"https:\/\/www.mygreatlearning.com\/blog\/author\/greatlearning\/"}]}},"uagb_featured_image_src":{"full":["https:\/\/www.mygreatlearning.com\/blog\/wp-content\/uploads\/2020\/01\/hacker-1944688_1280.jpg",1280,853,false],"thumbnail":["https:\/\/www.mygreatlearning.com\/blog\/wp-content\/uploads\/2020\/01\/hacker-1944688_1280-150x150.jpg",150,150,true],"medium":["https:\/\/www.mygreatlearning.com\/blog\/wp-content\/uploads\/2020\/01\/hacker-1944688_1280-300x200.jpg",300,200,true],"medium_large":["https:\/\/www.mygreatlearning.com\/blog\/wp-content\/uploads\/2020\/01\/hacker-1944688_1280-768x512.jpg",768,512,true],"large":["https:\/\/www.mygreatlearning.com\/blog\/wp-content\/uploads\/2020\/01\/hacker-1944688_1280-1024x682.jpg",1024,682,true],"1536x1536":["https:\/\/www.mygreatlearning.com\/blog\/wp-content\/uploads\/2020\/01\/hacker-1944688_1280.jpg",1280,853,false],"2048x2048":["https:\/\/www.mygreatlearning.com\/blog\/wp-content\/uploads\/2020\/01\/hacker-1944688_1280.jpg",1280,853,false],"web-stories-poster-portrait":["https:\/\/www.mygreatlearning.com\/blog\/wp-content\/uploads\/2020\/01\/hacker-1944688_1280.jpg",640,427,false],"web-stories-publisher-logo":["https:\/\/www.mygreatlearning.com\/blog\/wp-content\/uploads\/2020\/01\/hacker-1944688_1280.jpg",96,64,false],"web-stories-thumbnail":["https:\/\/www.mygreatlearning.com\/blog\/wp-content\/uploads\/2020\/01\/hacker-1944688_1280.jpg",150,100,false]},"uagb_author_info":{"display_name":"Great Learning Editorial Team","author_link":"https:\/\/www.mygreatlearning.com\/blog\/author\/greatlearning\/"},"uagb_comment_info":0,"uagb_excerpt":"Several high-profile firms across the world have been crumbling in the wake of data breaches and large-scale identity theft. In the number of fraud reports recorded, identity theft accounts form an alarmingly high number, even without all organisations and financial institutions in picture. Identity theft can take place at any time and to anyone, which&hellip;","_links":{"self":[{"href":"https:\/\/www.mygreatlearning.com\/blog\/wp-json\/wp\/v2\/posts\/11255","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.mygreatlearning.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.mygreatlearning.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.mygreatlearning.com\/blog\/wp-json\/wp\/v2\/users\/41"}],"replies":[{"embeddable":true,"href":"https:\/\/www.mygreatlearning.com\/blog\/wp-json\/wp\/v2\/comments?post=11255"}],"version-history":[{"count":14,"href":"https:\/\/www.mygreatlearning.com\/blog\/wp-json\/wp\/v2\/posts\/11255\/revisions"}],"predecessor-version":[{"id":110613,"href":"https:\/\/www.mygreatlearning.com\/blog\/wp-json\/wp\/v2\/posts\/11255\/revisions\/110613"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.mygreatlearning.com\/blog\/wp-json\/wp\/v2\/media\/11265"}],"wp:attachment":[{"href":"https:\/\/www.mygreatlearning.com\/blog\/wp-json\/wp\/v2\/media?parent=11255"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.mygreatlearning.com\/blog\/wp-json\/wp\/v2\/categories?post=11255"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.mygreatlearning.com\/blog\/wp-json\/wp\/v2\/tags?post=11255"},{"taxonomy":"content_type","embeddable":true,"href":"https:\/\/www.mygreatlearning.com\/blog\/wp-json\/wp\/v2\/content_type?post=11255"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}