{"version":"1.0","width":620,"height":178,"type":"rich","provider_name":"LISTEN","provider_url":"https:\/\/listen.style","url":"https:\/\/listen.style\/p\/uyirmpgv\/plccd52y\/player","title":"AIMS-14. A.5.2 Transparency\u3068\u306f\uff1f","author_name":"Yossy's Security &amp; AI Lab","author_url":"https:\/\/listen.style\/p\/uyirmpgv","html":"<iframe src=\"https:\/\/listen.style\/p\/uyirmpgv\/plccd52y\/player\" title=\"AIMS-14. A.5.2 Transparency\u3068\u306f\uff1f\" scrolling=\"no\" frameborder=\"0\" style=\"width: 100%; height: 178px;\"><a href=\"https:\/\/listen.style\/p\/uyirmpgv\/plccd52y\/player\">AIMS-14. A.5.2 Transparency\u3068\u306f\uff1f<\/a><\/iframe>"}