{"id":1,"name":"Cyber Laws","url":"https:\/\/www.cyberlaws.org\/","description":"","link":"http:\/\/www.cyberlaws.org\/author\/admin\/","slug":"admin","avatar_urls":{"24":"http:\/\/0.gravatar.com\/avatar\/60ac0fe8114b3093ee97253c7c0162b1?s=24&d=mm&r=g","48":"http:\/\/0.gravatar.com\/avatar\/60ac0fe8114b3093ee97253c7c0162b1?s=48&d=mm&r=g","96":"http:\/\/0.gravatar.com\/avatar\/60ac0fe8114b3093ee97253c7c0162b1?s=96&d=mm&r=g"},"meta":[],"_links":{"self":[{"href":"http:\/\/www.cyberlaws.org\/wp-json\/wp\/v2\/users\/1"}],"collection":[{"href":"http:\/\/www.cyberlaws.org\/wp-json\/wp\/v2\/users"}]}}