{"version":"1.0","width":620,"height":178,"type":"rich","provider_name":"LISTEN","provider_url":"https:\/\/listen.style","url":"https:\/\/listen.style\/p\/uyirmpgv\/zbc6sx17\/player","title":"AIMS-16. A.6.3 Risk Assessment\uff1aAI\u7279\u6709\u306e\u30ea\u30b9\u30af\u3068\u306f\uff1f","author_name":"Yossy's Security &amp; AI Lab","author_url":"https:\/\/listen.style\/p\/uyirmpgv","html":"<iframe src=\"https:\/\/listen.style\/p\/uyirmpgv\/zbc6sx17\/player\" title=\"AIMS-16. A.6.3 Risk Assessment\uff1aAI\u7279\u6709\u306e\u30ea\u30b9\u30af\u3068\u306f\uff1f\" scrolling=\"no\" frameborder=\"0\" style=\"width: 100%; height: 178px;\"><a href=\"https:\/\/listen.style\/p\/uyirmpgv\/zbc6sx17\/player\">AIMS-16. A.6.3 Risk Assessment\uff1aAI\u7279\u6709\u306e\u30ea\u30b9\u30af\u3068\u306f\uff1f<\/a><\/iframe>"}