{"id":11439,"date":"2017-01-04T13:00:00","date_gmt":"2017-01-04T13:00:00","guid":{"rendered":"https:\/\/zapliance.com\/?p=11439"},"modified":"2022-08-26T14:15:53","modified_gmt":"2022-08-26T14:15:53","slug":"what-no-one-tells-you-about-automatic-analytics-of-sap-access-protection","status":"publish","type":"post","link":"https:\/\/zapliance.com\/en\/blog\/what-no-one-tells-you-about-automatic-analytics-of-sap-access-protection\/","title":{"rendered":"What no one tells you about automatic analytics of SAP access protection"},"content":{"rendered":"\n<p>This blog post is about three interesting data indicators, that are analyzing your SAP access protection. Of course, this often involves the authorization system in SAP.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Part 4 of the series: \u201cThe digital Audit for Cross Process Weaknesses\u201d<\/h2>\n\n\n\n<p>1.&nbsp;<a href=\"https:\/\/zapliance.com\/blog\/automated-audit-of-purchase-to-pay-in-sap?lang=en\">How the digital audit for cross process weaknesses works<\/a><br>2.&nbsp;<a href=\"https:\/\/zapliance.com\/blog\/smart-strategies-to-automatically-audit-master-data-and-payments?lang=en\">Smart strategies to automatically audit master data and payments<\/a><br>3.&nbsp;<a href=\"https:\/\/zapliance.com\/blog\/quick-guide-auditing-principles-of-orderly-bookkeeping?lang=en\">Quick Guide: Auditing principles of orderly bookkeeping<\/a><br><strong>4. What no one tells you about automatic analytics of SAP access protection<\/strong><br>5.&nbsp;<a href=\"https:\/\/zapliance.com\/blog\/3-top-indicators-for-auditing-process-plausibility?lang=en\">3 top indicators for auditing process plausibility<\/a><br>6.&nbsp;<a href=\"https:\/\/zapliance.com\/blog\/a-complete-guide-to-professional-judgement?lang=en\">A complete guide to Professional Judgement\u2026<\/a><\/p>\n\n\n\n<p>Before you proceed reading on the details of the indicators, I would recommend you read&nbsp;<a href=\"https:\/\/zapliance.com\/com\/zapliance\/www\/en\/blog\/how-to-audit-master-data-in-order-to-cash-processes.html\">the conc<\/a><a href=\"https:\/\/zapliance.com\/blog\/automated-audit-of-purchase-to-pay-in-sap?lang=en\">e<\/a><a href=\"https:\/\/zapliance.com\/com\/zapliance\/www\/en\/blog\/how-to-audit-master-data-in-order-to-cash-processes.html\">pt of indicators<\/a>&nbsp;first.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Three Top Indicators for&nbsp;SAP access protection<\/h2>\n\n\n\n<p>Every indicator is associated with a process, a process area, an audit objective and a risk respectively. In the following, three selected indicators in the area of SAP access protection&nbsp;are presented.&nbsp;<\/p>\n\n\n\n<p>In total, I have developed and implemented 20 indicators for the area of cross processes. You can download the details about all cross process indicators here.<\/p>\n\n\n\n<figure class=\"wp-block-image\"><a href=\"https:\/\/cta-redirect.hubspot.com\/cta\/redirect\/2492072\/98ba8346-f7e5-41a1-8917-a7f743c0444f\" target=\"_blank\" rel=\"noreferrer noopener\"><img decoding=\"async\" src=\"https:\/\/no-cache.hubspot.com\/cta\/default\/2492072\/98ba8346-f7e5-41a1-8917-a7f743c0444f.png\" alt=\"Download pdf\"\/><\/a><\/figure>\n\n\n\n<h3 class=\"wp-block-heading\">Operations done by super users<\/h3>\n\n\n\n<p>This indicator aims at identifying&nbsp;restricted access.<\/p>\n\n\n\n<p>There is the&nbsp;risk of fraudulent activities, because one user could perform two critical transactions due to comprehensive access rights.<\/p>\n\n\n\n<p>The criteria for this indicator is:<\/p>\n\n\n\n<p>The document was marked because it was performed by a user possessing standard SAP privileged access rights.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">A single user did the complete business process<\/h3>\n\n\n\n<p>This indicator aims at identifying&nbsp;restricted access.<\/p>\n\n\n\n<p>There is a high fraud risk if the entire sequence is done by one individual.<\/p>\n\n\n\n<p>The criteria for this indicator is:<\/p>\n\n\n\n<p>All documents of a sequence that have been done completely by the same user are&nbsp;marked.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">Documents without users<\/h3>\n\n\n\n<p>This indicator aims at identifying compliance and correctness.<\/p>\n\n\n\n<p>There is the&nbsp;risk that a transaction cannot be traced back to a user.<\/p>\n\n\n\n<p>The criteria for this indicator is:<\/p>\n\n\n\n<p>The document was marked because the user field is empty.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>This blog post is about three interesting data indicators, that are analyzing your SAP access protection. Of course, this often involves the authorization system in SAP. Part 4 of the series: \u201cThe digital Audit for Cross Process Weaknesses\u201d 1.&nbsp;How the digital audit for cross process weaknesses works2.&nbsp;Smart strategies to automatically audit master data and payments3.&nbsp;Quick [&hellip;]<\/p>\n","protected":false},"author":4,"featured_media":10699,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"content-type":"","inline_featured_image":false,"footnotes":""},"categories":[38,37,40],"tags":[],"class_list":["post-11439","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-en-audit","category-en-compliance","category-en-finance"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v26.4 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>What no one tells you about automatic analytics of SAP access protection - zapliance<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/zapliance.com\/en\/blog\/what-no-one-tells-you-about-automatic-analytics-of-sap-access-protection\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"What no one tells you about automatic analytics of SAP access protection - zapliance\" \/>\n<meta property=\"og:description\" content=\"This blog post is about three interesting data indicators, that are analyzing your SAP access protection. Of course, this often involves the authorization system in SAP. Part 4 of the series: \u201cThe digital Audit for Cross Process Weaknesses\u201d 1.&nbsp;How the digital audit for cross process weaknesses works2.&nbsp;Smart strategies to automatically audit master data and payments3.&nbsp;Quick [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/zapliance.com\/en\/blog\/what-no-one-tells-you-about-automatic-analytics-of-sap-access-protection\/\" \/>\n<meta property=\"og:site_name\" content=\"zapliance\" \/>\n<meta property=\"article:published_time\" content=\"2017-01-04T13:00:00+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2022-08-26T14:15:53+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/zapliance.com\/wp-content\/uploads\/2022\/08\/Blog-Dummy.png\" \/>\n\t<meta property=\"og:image:width\" content=\"2400\" \/>\n\t<meta property=\"og:image:height\" content=\"962\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Nick Gehrke\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Nick Gehrke\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/zapliance.com\/en\/blog\/what-no-one-tells-you-about-automatic-analytics-of-sap-access-protection\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/zapliance.com\/en\/blog\/what-no-one-tells-you-about-automatic-analytics-of-sap-access-protection\/\"},\"author\":{\"name\":\"Nick Gehrke\",\"@id\":\"https:\/\/zapliance.com\/en\/#\/schema\/person\/ef4d227360d4b66b84aa95cb72c12f5a\"},\"headline\":\"What no one tells you about automatic analytics of SAP access protection\",\"datePublished\":\"2017-01-04T13:00:00+00:00\",\"dateModified\":\"2022-08-26T14:15:53+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/zapliance.com\/en\/blog\/what-no-one-tells-you-about-automatic-analytics-of-sap-access-protection\/\"},\"wordCount\":347,\"publisher\":{\"@id\":\"https:\/\/zapliance.com\/en\/#organization\"},\"image\":{\"@id\":\"https:\/\/zapliance.com\/en\/blog\/what-no-one-tells-you-about-automatic-analytics-of-sap-access-protection\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/zapliance.com\/wp-content\/uploads\/2022\/08\/Blog-Dummy.png\",\"articleSection\":[\"Audit\",\"Compliance\",\"Finance\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/zapliance.com\/en\/blog\/what-no-one-tells-you-about-automatic-analytics-of-sap-access-protection\/\",\"url\":\"https:\/\/zapliance.com\/en\/blog\/what-no-one-tells-you-about-automatic-analytics-of-sap-access-protection\/\",\"name\":\"What no one tells you about automatic analytics of SAP access protection - zapliance\",\"isPartOf\":{\"@id\":\"https:\/\/zapliance.com\/en\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/zapliance.com\/en\/blog\/what-no-one-tells-you-about-automatic-analytics-of-sap-access-protection\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/zapliance.com\/en\/blog\/what-no-one-tells-you-about-automatic-analytics-of-sap-access-protection\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/zapliance.com\/wp-content\/uploads\/2022\/08\/Blog-Dummy.png\",\"datePublished\":\"2017-01-04T13:00:00+00:00\",\"dateModified\":\"2022-08-26T14:15:53+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/zapliance.com\/en\/blog\/what-no-one-tells-you-about-automatic-analytics-of-sap-access-protection\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/zapliance.com\/en\/blog\/what-no-one-tells-you-about-automatic-analytics-of-sap-access-protection\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/zapliance.com\/en\/blog\/what-no-one-tells-you-about-automatic-analytics-of-sap-access-protection\/#primaryimage\",\"url\":\"https:\/\/zapliance.com\/wp-content\/uploads\/2022\/08\/Blog-Dummy.png\",\"contentUrl\":\"https:\/\/zapliance.com\/wp-content\/uploads\/2022\/08\/Blog-Dummy.png\",\"width\":2400,\"height\":962},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/zapliance.com\/en\/blog\/what-no-one-tells-you-about-automatic-analytics-of-sap-access-protection\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Startseite\",\"item\":\"https:\/\/zapliance.com\/en\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"What no one tells you about automatic analytics of SAP access protection\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/zapliance.com\/en\/#website\",\"url\":\"https:\/\/zapliance.com\/en\/\",\"name\":\"zapliance\",\"description\":\"Be the agent of change\",\"publisher\":{\"@id\":\"https:\/\/zapliance.com\/en\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/zapliance.com\/en\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/zapliance.com\/en\/#organization\",\"name\":\"zapliance\",\"url\":\"https:\/\/zapliance.com\/en\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/zapliance.com\/en\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/zapliance.com\/wp-content\/uploads\/2022\/06\/zap_logo.svg\",\"contentUrl\":\"https:\/\/zapliance.com\/wp-content\/uploads\/2022\/06\/zap_logo.svg\",\"width\":200,\"height\":45,\"caption\":\"zapliance\"},\"image\":{\"@id\":\"https:\/\/zapliance.com\/en\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/zapliance.com\/en\/#\/schema\/person\/ef4d227360d4b66b84aa95cb72c12f5a\",\"name\":\"Nick Gehrke\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/zapliance.com\/en\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/zapliance.com\/wp-content\/uploads\/2022\/07\/avatar_user_4_1657803044-96x96.jpg\",\"contentUrl\":\"https:\/\/zapliance.com\/wp-content\/uploads\/2022\/07\/avatar_user_4_1657803044-96x96.jpg\",\"caption\":\"Nick Gehrke\"},\"description\":\"is Chief of Data &amp; Knowledge and Co-Founder at zapliance as well as Professor of Information Systems with a Big 4 background. He prefers to work as a business information scientist and tax consultant at the converging points of finance, accounting, taxation, audit and ERP systems, data science and information technology.\",\"url\":\"https:\/\/zapliance.com\/en\/blog\/author\/nick-gehrke\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"What no one tells you about automatic analytics of SAP access protection - zapliance","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/zapliance.com\/en\/blog\/what-no-one-tells-you-about-automatic-analytics-of-sap-access-protection\/","og_locale":"en_US","og_type":"article","og_title":"What no one tells you about automatic analytics of SAP access protection - zapliance","og_description":"This blog post is about three interesting data indicators, that are analyzing your SAP access protection. Of course, this often involves the authorization system in SAP. Part 4 of the series: \u201cThe digital Audit for Cross Process Weaknesses\u201d 1.&nbsp;How the digital audit for cross process weaknesses works2.&nbsp;Smart strategies to automatically audit master data and payments3.&nbsp;Quick [&hellip;]","og_url":"https:\/\/zapliance.com\/en\/blog\/what-no-one-tells-you-about-automatic-analytics-of-sap-access-protection\/","og_site_name":"zapliance","article_published_time":"2017-01-04T13:00:00+00:00","article_modified_time":"2022-08-26T14:15:53+00:00","og_image":[{"width":2400,"height":962,"url":"https:\/\/zapliance.com\/wp-content\/uploads\/2022\/08\/Blog-Dummy.png","type":"image\/png"}],"author":"Nick Gehrke","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Nick Gehrke","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/zapliance.com\/en\/blog\/what-no-one-tells-you-about-automatic-analytics-of-sap-access-protection\/#article","isPartOf":{"@id":"https:\/\/zapliance.com\/en\/blog\/what-no-one-tells-you-about-automatic-analytics-of-sap-access-protection\/"},"author":{"name":"Nick Gehrke","@id":"https:\/\/zapliance.com\/en\/#\/schema\/person\/ef4d227360d4b66b84aa95cb72c12f5a"},"headline":"What no one tells you about automatic analytics of SAP access protection","datePublished":"2017-01-04T13:00:00+00:00","dateModified":"2022-08-26T14:15:53+00:00","mainEntityOfPage":{"@id":"https:\/\/zapliance.com\/en\/blog\/what-no-one-tells-you-about-automatic-analytics-of-sap-access-protection\/"},"wordCount":347,"publisher":{"@id":"https:\/\/zapliance.com\/en\/#organization"},"image":{"@id":"https:\/\/zapliance.com\/en\/blog\/what-no-one-tells-you-about-automatic-analytics-of-sap-access-protection\/#primaryimage"},"thumbnailUrl":"https:\/\/zapliance.com\/wp-content\/uploads\/2022\/08\/Blog-Dummy.png","articleSection":["Audit","Compliance","Finance"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/zapliance.com\/en\/blog\/what-no-one-tells-you-about-automatic-analytics-of-sap-access-protection\/","url":"https:\/\/zapliance.com\/en\/blog\/what-no-one-tells-you-about-automatic-analytics-of-sap-access-protection\/","name":"What no one tells you about automatic analytics of SAP access protection - zapliance","isPartOf":{"@id":"https:\/\/zapliance.com\/en\/#website"},"primaryImageOfPage":{"@id":"https:\/\/zapliance.com\/en\/blog\/what-no-one-tells-you-about-automatic-analytics-of-sap-access-protection\/#primaryimage"},"image":{"@id":"https:\/\/zapliance.com\/en\/blog\/what-no-one-tells-you-about-automatic-analytics-of-sap-access-protection\/#primaryimage"},"thumbnailUrl":"https:\/\/zapliance.com\/wp-content\/uploads\/2022\/08\/Blog-Dummy.png","datePublished":"2017-01-04T13:00:00+00:00","dateModified":"2022-08-26T14:15:53+00:00","breadcrumb":{"@id":"https:\/\/zapliance.com\/en\/blog\/what-no-one-tells-you-about-automatic-analytics-of-sap-access-protection\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/zapliance.com\/en\/blog\/what-no-one-tells-you-about-automatic-analytics-of-sap-access-protection\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/zapliance.com\/en\/blog\/what-no-one-tells-you-about-automatic-analytics-of-sap-access-protection\/#primaryimage","url":"https:\/\/zapliance.com\/wp-content\/uploads\/2022\/08\/Blog-Dummy.png","contentUrl":"https:\/\/zapliance.com\/wp-content\/uploads\/2022\/08\/Blog-Dummy.png","width":2400,"height":962},{"@type":"BreadcrumbList","@id":"https:\/\/zapliance.com\/en\/blog\/what-no-one-tells-you-about-automatic-analytics-of-sap-access-protection\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Startseite","item":"https:\/\/zapliance.com\/en\/"},{"@type":"ListItem","position":2,"name":"What no one tells you about automatic analytics of SAP access protection"}]},{"@type":"WebSite","@id":"https:\/\/zapliance.com\/en\/#website","url":"https:\/\/zapliance.com\/en\/","name":"zapliance","description":"Be the agent of change","publisher":{"@id":"https:\/\/zapliance.com\/en\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/zapliance.com\/en\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/zapliance.com\/en\/#organization","name":"zapliance","url":"https:\/\/zapliance.com\/en\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/zapliance.com\/en\/#\/schema\/logo\/image\/","url":"https:\/\/zapliance.com\/wp-content\/uploads\/2022\/06\/zap_logo.svg","contentUrl":"https:\/\/zapliance.com\/wp-content\/uploads\/2022\/06\/zap_logo.svg","width":200,"height":45,"caption":"zapliance"},"image":{"@id":"https:\/\/zapliance.com\/en\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/zapliance.com\/en\/#\/schema\/person\/ef4d227360d4b66b84aa95cb72c12f5a","name":"Nick Gehrke","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/zapliance.com\/en\/#\/schema\/person\/image\/","url":"https:\/\/zapliance.com\/wp-content\/uploads\/2022\/07\/avatar_user_4_1657803044-96x96.jpg","contentUrl":"https:\/\/zapliance.com\/wp-content\/uploads\/2022\/07\/avatar_user_4_1657803044-96x96.jpg","caption":"Nick Gehrke"},"description":"is Chief of Data &amp; Knowledge and Co-Founder at zapliance as well as Professor of Information Systems with a Big 4 background. He prefers to work as a business information scientist and tax consultant at the converging points of finance, accounting, taxation, audit and ERP systems, data science and information technology.","url":"https:\/\/zapliance.com\/en\/blog\/author\/nick-gehrke\/"}]}},"views":1046,"_links":{"self":[{"href":"https:\/\/zapliance.com\/en\/wp-json\/wp\/v2\/posts\/11439","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/zapliance.com\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/zapliance.com\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/zapliance.com\/en\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"https:\/\/zapliance.com\/en\/wp-json\/wp\/v2\/comments?post=11439"}],"version-history":[{"count":1,"href":"https:\/\/zapliance.com\/en\/wp-json\/wp\/v2\/posts\/11439\/revisions"}],"predecessor-version":[{"id":11440,"href":"https:\/\/zapliance.com\/en\/wp-json\/wp\/v2\/posts\/11439\/revisions\/11440"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/zapliance.com\/en\/wp-json\/wp\/v2\/media\/10699"}],"wp:attachment":[{"href":"https:\/\/zapliance.com\/en\/wp-json\/wp\/v2\/media?parent=11439"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/zapliance.com\/en\/wp-json\/wp\/v2\/categories?post=11439"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/zapliance.com\/en\/wp-json\/wp\/v2\/tags?post=11439"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}