{"version":"1.0","width":620,"height":178,"type":"rich","provider_name":"LISTEN","provider_url":"https:\/\/listen.style","url":"https:\/\/listen.style\/p\/uyirmpgv\/skab7mt0\/player","title":"AIMS-15. A.5.3 Human Oversight\u3068\u306f\uff1f","author_name":"Yossy's Security &amp; AI Lab","author_url":"https:\/\/listen.style\/p\/uyirmpgv","html":"<iframe src=\"https:\/\/listen.style\/p\/uyirmpgv\/skab7mt0\/player\" title=\"AIMS-15. A.5.3 Human Oversight\u3068\u306f\uff1f\" scrolling=\"no\" frameborder=\"0\" style=\"width: 100%; height: 178px;\"><a href=\"https:\/\/listen.style\/p\/uyirmpgv\/skab7mt0\/player\">AIMS-15. A.5.3 Human Oversight\u3068\u306f\uff1f<\/a><\/iframe>"}