{"id":11193,"date":"2014-01-22T22:21:02","date_gmt":"2014-01-22T22:21:02","guid":{"rendered":"http:\/\/utel.mx\/blog\/?p=11193"},"modified":"2023-03-10T16:56:05","modified_gmt":"2023-03-10T16:56:05","slug":"consejos-para-solucionar-el-ciberbullying","status":"publish","type":"post","link":"https:\/\/utel.mx\/blog\/rol-personal\/consejos-para-solucionar-el-ciberbullying\/","title":{"rendered":"Consejos para solucionar el ciberbullying"},"content":{"rendered":"<p dir=\"ltr\">A ra\u00edz del desarrollo tecnol\u00f3gico y el progreso de las Tecnolog\u00edas de la Informaci\u00f3n y Comunicaci\u00f3n (TIC), han emergido problem\u00e1ticas de \u00edndole social, una de ellas el \u201c<strong>Ciberbullying<\/strong>\u201d que ha dado de qu\u00e9 hablar por las m\u00faltiples maneras que el acosador tiene para vulnerar a su v\u00edctima, adem\u00e1s de que no hay una legislaci\u00f3n consistente que haga frente a esta situaci\u00f3n.<\/p>\n<p>El <strong>ciberacoso<\/strong> es el empleo de las herramientas de la inform\u00e1tica tales como: redes sociales, mensajer\u00eda instant\u00e1nea, blogs y p\u00e1ginas hechas expeditamente para calumniar a una o varias personas.<\/p>\n<p>Se necesitan cuatro elementos para completar el t\u00edpico cuadro del ciberbullying: un acosador, una v\u00edctima, un medio de difusi\u00f3n de informaci\u00f3n y un p\u00fablico receptor que retroalimente.<\/p>\n<p>Lo que el acosador pretende es el hostigamiento de la v\u00edctima mediante el env\u00edo continuo de mensajes hostiles, normalmente basados en infundios y ridiculizaci\u00f3n; sus t\u00e1cticas est\u00e1n encaminadas a causar estr\u00e9s, angustia e irritaci\u00f3n, suelen infundir miedo mediante amenazas y comentarios de \u00edndole sexual.<\/p>\n<p>El <strong>acoso cibern\u00e9tico<\/strong> normalmente proviene de personas de la misma edad, por lo regular se trata de menores enemistados por cualquier raz\u00f3n dentro de la escuela o lugar de residencia. Otro caso de <strong>ciberbullying<\/strong> se puede dar de adultos contra j\u00f3venes, quienes psicol\u00f3gicamente no suelen estar preparados para hacer frente al hostigamiento de un mayor.<\/p>\n<p>El modus operandi del acosador es predecible, contacta a su v\u00edctima a trav\u00e9s de una red social o sistema de mensajer\u00eda, compila todos los datos posibles de \u00e9l: fotos, contactos, publicaciones etc., en ocasiones usurpa las contrase\u00f1as mediante programas \u201cesp\u00eda\u201d, indaga sobre sus relaciones sociales y busca informaci\u00f3n comprometedora o \u201cpuntos d\u00e9biles\u201d, posteriormente lo asedia incesantemente hasta conseguir su prop\u00f3sito; estos\u00a0var\u00edan de acuerdo a la edad.<\/p>\n<p>Al tratarse de j\u00f3venes lo que se pretende es mostrar superioridad y someter al acosado a la humillaci\u00f3n p\u00fablica al difamarlo.\u00a0Cuando se da de un adulto a un menor, suele tener intereses de tintes sexuales o buscar un beneficio econ\u00f3mico (este es el modo m\u00e1s grave de acoso ya que la v\u00edctima corre un riesgo f\u00edsico). Por \u00faltimo el acoso entre mayores, aqu\u00ed la intenci\u00f3n es injuriar, puede ser por celos irracionales, obsesi\u00f3n amorosa o simple resentimiento.<\/p>\n<p><strong>Para evitar el ciberbullying es conveniente:<\/strong><\/p>\n<p><strong>&#8211; Utilizar diferentes contrase\u00f1as.<\/strong> Solemos utilizar una misma contrase\u00f1a para servicios como mensajer\u00eda, redes sociales, foros y PC. Es importante tener diferentes passwords para evitar el hackeo, as\u00ed como combinar n\u00fameros, letras y signos.<\/p>\n<p><strong>&#8211; Cambiar peri\u00f3dicamente contrase\u00f1as.<\/strong> Es necesario establecer sustituir las claves peri\u00f3dicamente, as\u00ed se evitar\u00e1 ser blanco f\u00e1cil para los acosadores.<\/p>\n<p><strong>&#8211; Programas de rastreo o antivirus.<\/strong>\u00a0Contar un software adecuado ayudar\u00e1 a saber qui\u00e9n est\u00e1 revisando nuestra PC o tiene enlazada nuestra IP, se recomienda ponerlo en marcha un par de veces al mes.<\/p>\n<p><strong>&#8211; Contarle a amigos y familiares.<\/strong> Pedir el auxilio de conocidos y parientes contribuye a no sentirse solo, el apoyo de estas personas puede mostrar alternativas de c\u00f3mo actuar en consecuencia. Dar parte a las autoridades es un paso necesario.<\/p>\n<p>Hacer consciencia sobre el manejo de nuestra informaci\u00f3n en la web es muy importante, hay que ser cuidadoso con lo que publicamos y subimos a la red, muchas veces el entusiasmo o emoci\u00f3n nos conduce a notificar nuestras acciones en las redes sociales, sin embargo antes de proceder habr\u00eda que preguntarse a uno mismo \u00bfrealmente la gente se tiene que enterar de mis actividades diarias?<\/p>\n<p><strong>Adair Rodr\u00edguez<\/strong><br \/>\n<strong>UTEL Editorial<\/strong><\/p>\n<div id=\"advads-1180347670\" class=\"advads-cta-lp-banner-form advads-entity-placement\"><a href=\"https:\/\/utel.mx\/blog\/admisiones-universidad-online\/?utm_source=blog&#038;utm_medium=CTAlink&#038;utm_campaign=MKTseo\" aria-label=\"Universidad en linea\"><img src=\"https:\/\/utel.mx\/blog\/wp-content\/uploads\/2025\/04\/universidad-en-linea-1.png\" alt=\"Universidad en linea\"  srcset=\"https:\/\/utel.mx\/blog\/wp-content\/uploads\/2025\/04\/universidad-en-linea-1.png 626w, https:\/\/utel.mx\/blog\/wp-content\/uploads\/2025\/04\/universidad-en-linea-1-420x168.png 420w\" sizes=\"(max-width: 626px) 100vw, 626px\" width=\"626\" height=\"250\"   \/><\/a><\/div>","protected":false},"excerpt":{"rendered":"<p> [&hellip;]<\/p>\n","protected":false},"author":9,"featured_media":11212,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"site-sidebar-layout":"default","site-content-layout":"","ast-site-content-layout":"","site-content-style":"default","site-sidebar-style":"default","ast-global-header-display":"","ast-banner-title-visibility":"","ast-main-header-display":"","ast-hfb-above-header-display":"","ast-hfb-below-header-display":"","ast-hfb-mobile-header-display":"","site-post-title":"","ast-breadcrumbs-content":"","ast-featured-img":"","footer-sml-layout":"","theme-transparent-header-meta":"","adv-header-id-meta":"","stick-header-meta":"","header-above-stick-meta":"","header-main-stick-meta":"","header-below-stick-meta":"","astra-migrate-meta-layouts":"default","ast-page-background-enabled":"default","ast-page-background-meta":{"desktop":{"background-color":"var(--ast-global-color-4)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-gradient":""},"tablet":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-gradient":""},"mobile":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-gradient":""}},"ast-content-background-meta":{"desktop":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-gradient":""},"tablet":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-gradient":""},"mobile":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-gradient":""}},"footnotes":""},"categories":[33],"tags":[],"class_list":["post-11193","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-rol-personal"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v26.8 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Consejos para solucionar el ciberbullying - BLOG | Utel<\/title>\n<meta name=\"description\" content=\"Conoce c\u00f3mo la evoluci\u00f3n de la tecnolog\u00eda abri\u00f3 paso al ciberbullying, qu\u00e9 elementos lo componen y algunos consejos para evitarlo.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/utel.mx\/blog\/rol-personal\/consejos-para-solucionar-el-ciberbullying\/\" \/>\n<meta property=\"og:locale\" content=\"es_ES\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Consejos para solucionar el ciberbullying - BLOG | Utel\" \/>\n<meta property=\"og:description\" content=\"Conoce c\u00f3mo la evoluci\u00f3n de la tecnolog\u00eda abri\u00f3 paso al ciberbullying, qu\u00e9 elementos lo componen y algunos consejos para evitarlo.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/utel.mx\/blog\/rol-personal\/consejos-para-solucionar-el-ciberbullying\/\" \/>\n<meta property=\"og:site_name\" content=\"BLOG | Utel\" \/>\n<meta property=\"article:published_time\" content=\"2014-01-22T22:21:02+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2023-03-10T16:56:05+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/utel.mx\/blog\/wp-content\/uploads\/2014\/01\/shutterstock_151848722.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1000\" \/>\n\t<meta property=\"og:image:height\" content=\"667\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Hayde\u00e9 (Editor)\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Hayde\u00e9 (Editor)\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutos\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/utel.mx\/blog\/rol-personal\/consejos-para-solucionar-el-ciberbullying\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/utel.mx\/blog\/rol-personal\/consejos-para-solucionar-el-ciberbullying\/\"},\"author\":{\"name\":\"Hayde\u00e9 (Editor)\",\"@id\":\"https:\/\/utel.mx\/blog\/#\/schema\/person\/9a4c3940beef2724facfef4f2ccec7da\"},\"headline\":\"Consejos para solucionar el ciberbullying\",\"datePublished\":\"2014-01-22T22:21:02+00:00\",\"dateModified\":\"2023-03-10T16:56:05+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/utel.mx\/blog\/rol-personal\/consejos-para-solucionar-el-ciberbullying\/\"},\"wordCount\":632,\"publisher\":{\"@id\":\"https:\/\/utel.mx\/blog\/#organization\"},\"image\":{\"@id\":\"https:\/\/utel.mx\/blog\/rol-personal\/consejos-para-solucionar-el-ciberbullying\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/utel.mx\/blog\/wp-content\/uploads\/2014\/01\/shutterstock_151848722.jpg\",\"articleSection\":[\"Rol personal\"],\"inLanguage\":\"es\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/utel.mx\/blog\/rol-personal\/consejos-para-solucionar-el-ciberbullying\/\",\"url\":\"https:\/\/utel.mx\/blog\/rol-personal\/consejos-para-solucionar-el-ciberbullying\/\",\"name\":\"Consejos para solucionar el ciberbullying - BLOG | Utel\",\"isPartOf\":{\"@id\":\"https:\/\/utel.mx\/blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/utel.mx\/blog\/rol-personal\/consejos-para-solucionar-el-ciberbullying\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/utel.mx\/blog\/rol-personal\/consejos-para-solucionar-el-ciberbullying\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/utel.mx\/blog\/wp-content\/uploads\/2014\/01\/shutterstock_151848722.jpg\",\"datePublished\":\"2014-01-22T22:21:02+00:00\",\"dateModified\":\"2023-03-10T16:56:05+00:00\",\"description\":\"Conoce c\u00f3mo la evoluci\u00f3n de la tecnolog\u00eda abri\u00f3 paso al ciberbullying, qu\u00e9 elementos lo componen y algunos consejos para evitarlo.\",\"breadcrumb\":{\"@id\":\"https:\/\/utel.mx\/blog\/rol-personal\/consejos-para-solucionar-el-ciberbullying\/#breadcrumb\"},\"inLanguage\":\"es\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/utel.mx\/blog\/rol-personal\/consejos-para-solucionar-el-ciberbullying\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"es\",\"@id\":\"https:\/\/utel.mx\/blog\/rol-personal\/consejos-para-solucionar-el-ciberbullying\/#primaryimage\",\"url\":\"https:\/\/utel.mx\/blog\/wp-content\/uploads\/2014\/01\/shutterstock_151848722.jpg\",\"contentUrl\":\"https:\/\/utel.mx\/blog\/wp-content\/uploads\/2014\/01\/shutterstock_151848722.jpg\",\"width\":1000,\"height\":667,\"caption\":\"Consejos para solucionar el ciberbullying | Blog - UTEL\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/utel.mx\/blog\/rol-personal\/consejos-para-solucionar-el-ciberbullying\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/utel.mx\/blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Consejos para solucionar el ciberbullying\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/utel.mx\/blog\/#website\",\"url\":\"https:\/\/utel.mx\/blog\/\",\"name\":\"BLOG | Utel\",\"description\":\"Blog UTEL Universidad en L\u00ednea\",\"publisher\":{\"@id\":\"https:\/\/utel.mx\/blog\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/utel.mx\/blog\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"es\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/utel.mx\/blog\/#organization\",\"name\":\"BLOG | Utel\",\"url\":\"https:\/\/utel.mx\/blog\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"es\",\"@id\":\"https:\/\/utel.mx\/blog\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/utel.mx\/blog\/wp-content\/uploads\/2023\/03\/cropped-logo-blog.png\",\"contentUrl\":\"https:\/\/utel.mx\/blog\/wp-content\/uploads\/2023\/03\/cropped-logo-blog.png\",\"width\":237,\"height\":64,\"caption\":\"BLOG | Utel\"},\"image\":{\"@id\":\"https:\/\/utel.mx\/blog\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/utel.mx\/blog\/#\/schema\/person\/9a4c3940beef2724facfef4f2ccec7da\",\"name\":\"Hayde\u00e9 (Editor)\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"es\",\"@id\":\"https:\/\/utel.mx\/blog\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/ba63bb7f074f0dfa874cba0ef5d985a5?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/ba63bb7f074f0dfa874cba0ef5d985a5?s=96&d=mm&r=g\",\"caption\":\"Hayde\u00e9 (Editor)\"},\"description\":\"Licenciada en Ciencias de la Comunicaci\u00f3n\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Consejos para solucionar el ciberbullying - BLOG | Utel","description":"Conoce c\u00f3mo la evoluci\u00f3n de la tecnolog\u00eda abri\u00f3 paso al ciberbullying, qu\u00e9 elementos lo componen y algunos consejos para evitarlo.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/utel.mx\/blog\/rol-personal\/consejos-para-solucionar-el-ciberbullying\/","og_locale":"es_ES","og_type":"article","og_title":"Consejos para solucionar el ciberbullying - BLOG | Utel","og_description":"Conoce c\u00f3mo la evoluci\u00f3n de la tecnolog\u00eda abri\u00f3 paso al ciberbullying, qu\u00e9 elementos lo componen y algunos consejos para evitarlo.","og_url":"https:\/\/utel.mx\/blog\/rol-personal\/consejos-para-solucionar-el-ciberbullying\/","og_site_name":"BLOG | Utel","article_published_time":"2014-01-22T22:21:02+00:00","article_modified_time":"2023-03-10T16:56:05+00:00","og_image":[{"width":1000,"height":667,"url":"https:\/\/utel.mx\/blog\/wp-content\/uploads\/2014\/01\/shutterstock_151848722.jpg","type":"image\/jpeg"}],"author":"Hayde\u00e9 (Editor)","twitter_misc":{"Written by":"Hayde\u00e9 (Editor)","Est. reading time":"3 minutos"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/utel.mx\/blog\/rol-personal\/consejos-para-solucionar-el-ciberbullying\/#article","isPartOf":{"@id":"https:\/\/utel.mx\/blog\/rol-personal\/consejos-para-solucionar-el-ciberbullying\/"},"author":{"name":"Hayde\u00e9 (Editor)","@id":"https:\/\/utel.mx\/blog\/#\/schema\/person\/9a4c3940beef2724facfef4f2ccec7da"},"headline":"Consejos para solucionar el ciberbullying","datePublished":"2014-01-22T22:21:02+00:00","dateModified":"2023-03-10T16:56:05+00:00","mainEntityOfPage":{"@id":"https:\/\/utel.mx\/blog\/rol-personal\/consejos-para-solucionar-el-ciberbullying\/"},"wordCount":632,"publisher":{"@id":"https:\/\/utel.mx\/blog\/#organization"},"image":{"@id":"https:\/\/utel.mx\/blog\/rol-personal\/consejos-para-solucionar-el-ciberbullying\/#primaryimage"},"thumbnailUrl":"https:\/\/utel.mx\/blog\/wp-content\/uploads\/2014\/01\/shutterstock_151848722.jpg","articleSection":["Rol personal"],"inLanguage":"es"},{"@type":"WebPage","@id":"https:\/\/utel.mx\/blog\/rol-personal\/consejos-para-solucionar-el-ciberbullying\/","url":"https:\/\/utel.mx\/blog\/rol-personal\/consejos-para-solucionar-el-ciberbullying\/","name":"Consejos para solucionar el ciberbullying - BLOG | Utel","isPartOf":{"@id":"https:\/\/utel.mx\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/utel.mx\/blog\/rol-personal\/consejos-para-solucionar-el-ciberbullying\/#primaryimage"},"image":{"@id":"https:\/\/utel.mx\/blog\/rol-personal\/consejos-para-solucionar-el-ciberbullying\/#primaryimage"},"thumbnailUrl":"https:\/\/utel.mx\/blog\/wp-content\/uploads\/2014\/01\/shutterstock_151848722.jpg","datePublished":"2014-01-22T22:21:02+00:00","dateModified":"2023-03-10T16:56:05+00:00","description":"Conoce c\u00f3mo la evoluci\u00f3n de la tecnolog\u00eda abri\u00f3 paso al ciberbullying, qu\u00e9 elementos lo componen y algunos consejos para evitarlo.","breadcrumb":{"@id":"https:\/\/utel.mx\/blog\/rol-personal\/consejos-para-solucionar-el-ciberbullying\/#breadcrumb"},"inLanguage":"es","potentialAction":[{"@type":"ReadAction","target":["https:\/\/utel.mx\/blog\/rol-personal\/consejos-para-solucionar-el-ciberbullying\/"]}]},{"@type":"ImageObject","inLanguage":"es","@id":"https:\/\/utel.mx\/blog\/rol-personal\/consejos-para-solucionar-el-ciberbullying\/#primaryimage","url":"https:\/\/utel.mx\/blog\/wp-content\/uploads\/2014\/01\/shutterstock_151848722.jpg","contentUrl":"https:\/\/utel.mx\/blog\/wp-content\/uploads\/2014\/01\/shutterstock_151848722.jpg","width":1000,"height":667,"caption":"Consejos para solucionar el ciberbullying | Blog - UTEL"},{"@type":"BreadcrumbList","@id":"https:\/\/utel.mx\/blog\/rol-personal\/consejos-para-solucionar-el-ciberbullying\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/utel.mx\/blog\/"},{"@type":"ListItem","position":2,"name":"Consejos para solucionar el ciberbullying"}]},{"@type":"WebSite","@id":"https:\/\/utel.mx\/blog\/#website","url":"https:\/\/utel.mx\/blog\/","name":"BLOG | Utel","description":"Blog UTEL Universidad en L\u00ednea","publisher":{"@id":"https:\/\/utel.mx\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/utel.mx\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"es"},{"@type":"Organization","@id":"https:\/\/utel.mx\/blog\/#organization","name":"BLOG | Utel","url":"https:\/\/utel.mx\/blog\/","logo":{"@type":"ImageObject","inLanguage":"es","@id":"https:\/\/utel.mx\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/utel.mx\/blog\/wp-content\/uploads\/2023\/03\/cropped-logo-blog.png","contentUrl":"https:\/\/utel.mx\/blog\/wp-content\/uploads\/2023\/03\/cropped-logo-blog.png","width":237,"height":64,"caption":"BLOG | Utel"},"image":{"@id":"https:\/\/utel.mx\/blog\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/utel.mx\/blog\/#\/schema\/person\/9a4c3940beef2724facfef4f2ccec7da","name":"Hayde\u00e9 (Editor)","image":{"@type":"ImageObject","inLanguage":"es","@id":"https:\/\/utel.mx\/blog\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/ba63bb7f074f0dfa874cba0ef5d985a5?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/ba63bb7f074f0dfa874cba0ef5d985a5?s=96&d=mm&r=g","caption":"Hayde\u00e9 (Editor)"},"description":"Licenciada en Ciencias de la Comunicaci\u00f3n"}]}},"_links":{"self":[{"href":"https:\/\/utel.mx\/blog\/wp-json\/wp\/v2\/posts\/11193","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/utel.mx\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/utel.mx\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/utel.mx\/blog\/wp-json\/wp\/v2\/users\/9"}],"replies":[{"embeddable":true,"href":"https:\/\/utel.mx\/blog\/wp-json\/wp\/v2\/comments?post=11193"}],"version-history":[{"count":1,"href":"https:\/\/utel.mx\/blog\/wp-json\/wp\/v2\/posts\/11193\/revisions"}],"predecessor-version":[{"id":45089,"href":"https:\/\/utel.mx\/blog\/wp-json\/wp\/v2\/posts\/11193\/revisions\/45089"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/utel.mx\/blog\/wp-json\/wp\/v2\/media\/11212"}],"wp:attachment":[{"href":"https:\/\/utel.mx\/blog\/wp-json\/wp\/v2\/media?parent=11193"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/utel.mx\/blog\/wp-json\/wp\/v2\/categories?post=11193"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/utel.mx\/blog\/wp-json\/wp\/v2\/tags?post=11193"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}