[
    {
        "key": "ATQE95B8",
        "version": 23,
        "library": {
            "type": "group",
            "id": 133350,
            "name": "Abney Associates",
            "links": {
                "alternate": {
                    "href": "https://www.zotero.org/groups/abney_associates",
                    "type": "text/html"
                }
            }
        },
        "links": {
            "self": {
                "href": "https://api.zotero.org/groups/133350/items/ATQE95B8",
                "type": "application/json"
            },
            "alternate": {
                "href": "https://www.zotero.org/groups/abney_associates/items/ATQE95B8",
                "type": "text/html"
            }
        },
        "meta": {
            "createdByUser": {
                "id": 1368393,
                "username": "sheenwhite20",
                "name": "",
                "links": {
                    "alternate": {
                        "href": "https://www.zotero.org/sheenwhite20",
                        "type": "text/html"
                    }
                }
            },
            "numChildren": 0
        },
        "data": {
            "key": "ATQE95B8",
            "version": 23,
            "itemType": "journalArticle",
            "title": "Malware Warning by Abney Associates Review Blog: Why Malware Warnings Took Over the Internet Today",
            "creators": [],
            "abstractNote": "http://www.yelp.com/topic/irvine-malware-warning-by-abney-associates-review-blog-why-malware-warnings-took-over-the-internet-today\n\n\nFor Chrome users, a malware warning page popped up on Monday across many major websites -- The New York Times, IMDb, The Hollywood Reporter, Talking Points Memo, and MSN Money, to name a few -- due to so-called blacklisting bug inside Google's ad network. http://NetSeer.com, which describes itself as a \"concept-based contextual advertising\" outfit, was hacked Monday morning, according to ZDNet's Zack Whittacker. The breach got into NetSeer's corporate website, not its ad network, but both use the same domain name -- http://NetSeer.com-- which led Google to put that address on its warning list for all Chrome users. The domain-name addition pushed out warnings to all websites that use NetSeer to serve their ads, which apparently includes a lot of major websites on the Internet. Here's what the warning, which was still floating around intermittently as of midday, looks like:\n\nUnlike NetSeer, those that carry the temporary Google warning have no harmful content on them  -- and users who see the warning pages shouldn't worry about malware infections, according to NetSeer and The Guardian, one of the dozens of affected sites. It's unclear if Google meant to block both the domain that serves the ads, as well as the NetSeer company website.\n\nMeanwhile, NetSeer claims it has removed all the malware from its own website and is working with Google throughout the day to take its domain off the Chrome blacklist, as the company explained in a statement:\n\n\"Our operations team went into all-hands-on-deck mode and we have successfully cleaned the site of the malware issue. We are also working with Google to do an expedited review of the site and remove the site from the malware impacted site-list so that browsing behavior can be restored for all users.\nSo, whenever that happens, all of those foreboding messages popping up across the Internet should disappear, too.\"\n\nSource:\n\nhttp://www.theatlanticwire.com/technology/2013/02/google-chrome-malware-warnings/61774/\n\nRelated Articles:\n\nhttp://www.myvideo.de/watch/9001514/International_Internet_and_Technology_Warning_Abney_Associates_Review\n\nhttp://www.slideshare.net/hugghughes/malware-warning-by-abney-associates-review-blog-why-malware-warnings-took-over-the-internet-today",
            "publicationTitle": "",
            "publisher": "",
            "place": "",
            "date": "",
            "volume": "",
            "issue": "",
            "section": "",
            "partNumber": "",
            "partTitle": "",
            "pages": "",
            "series": "",
            "seriesTitle": "",
            "seriesText": "",
            "journalAbbreviation": "",
            "DOI": "",
            "citationKey": "",
            "url": "http://www.yelp.com/topic/irvine-malware-warning-by-abney-associates-review-blog-why-malware-warnings-took-over-the-internet-today",
            "accessDate": "",
            "PMID": "",
            "PMCID": "",
            "ISSN": "",
            "archive": "",
            "archiveLocation": "",
            "shortTitle": "",
            "language": "",
            "libraryCatalog": "",
            "callNumber": "",
            "rights": "",
            "extra": "",
            "tags": [
                {
                    "tag": "malware warning by abney associates review blog, Why Malware Warnings Took Over the Internet Today"
                }
            ],
            "collections": [],
            "relations": {},
            "dateAdded": "2013-05-08T06:54:24Z",
            "dateModified": "2013-05-08T06:54:24Z"
        }
    },
    {
        "key": "4QB4X4AF",
        "version": 22,
        "library": {
            "type": "group",
            "id": 133350,
            "name": "Abney Associates",
            "links": {
                "alternate": {
                    "href": "https://www.zotero.org/groups/abney_associates",
                    "type": "text/html"
                }
            }
        },
        "links": {
            "self": {
                "href": "https://api.zotero.org/groups/133350/items/4QB4X4AF",
                "type": "application/json"
            },
            "alternate": {
                "href": "https://www.zotero.org/groups/abney_associates/items/4QB4X4AF",
                "type": "text/html"
            }
        },
        "meta": {
            "createdByUser": {
                "id": 1368393,
                "username": "sheenwhite20",
                "name": "",
                "links": {
                    "alternate": {
                        "href": "https://www.zotero.org/sheenwhite20",
                        "type": "text/html"
                    }
                }
            },
            "numChildren": 0
        },
        "data": {
            "key": "4QB4X4AF",
            "version": 22,
            "itemType": "journalArticle",
            "title": "Abney and Associates Reviews on Scam: Falske Scanner E-mails inficere Office computer",
            "creators": [],
            "abstractNote": "http://www.bbb.org/blog/2013/04/fake-scanner-emails-infect-office-computers/\n\n\nSvindlere udnytter den standard e-mails sendt fra de fleste kontor scannere. De har replikeret meddelelser af berømte printer brands men vedhæfte malware til e-mails i stedet for dokumenter.\nHvordan fidus fungerer:\nDu er på arbejde, og du modtager en besked fra hvad du synes er dine office printer/scanner. Det ser ud til at nogen har sendt dig en kopi af et scannet dokument. Navnet ikke ringer en klokke, men du åbner den vedhæftede fil alligevel.\nNår du klikker på fil, finder du, at det ikke er en scannet kopi af den seneste rapport fra office. Det er virkelig et link til en tredjeparts websted, der vil hente en virus til din computer. Disse vira phish for personlige og bankoplysninger på din maskine.\nIndstillinger i e-mail-headeren er blevet forfalsket, så meddelelserne synes at komme fra en intern e-mail-adresse. Med så mange arbejdspladser ikke at indstille stærke adgangskoder, er det dog muligt, at scanneren blev hacket.\nSom altid, findes variationer af fidus. Senest har har svindlere skjult malware som e-mails fra Hewlett-pakker og Xerox scannere. Men svindlere vil kapre nogen berømte producentens navn at låne troværdighed til deres fidus.\nBemærk: Hewlett-Packard, IBM og Microsoft er BBB akkrediterede virksomheder. Hewlett-Packard er også en BBB nationale Partner.\nHvordan kan jeg beskytte mit arbejdscomputer mod virus:\nMens computeren arbejde ikke er din personlige ejendom, er downloade en virus fantastisk måde at ødelægge din arbejdsdag. Her er tips til at beskytte din computer på kontoret:\nOprettelse af stærke adgangskoder. Ikke forlade factory-presets eller brug let at knække passwords. Se Microsoft's tips til oprettelse af stærke adgangskoder.\nTro ikke på hvad du ser. Svindlere kan gøre e-mails synes at komme fra en konto på dit kontor. Bare fordi det er en \"@yourbusiness.com\" adresse betyder ikke, det er sikkert.\nVære forsigtig med uventede e-mails, der indeholder links eller vedhæftede filer. Klik på links eller ikke åbne filer.\nPas på pop op-vinduer. Nogle pop-ups er designet til at ligne de har stammer fra din computer. Hvis du ser en popup, der ligner en anti-virus software, men advarer om et problem, der skal fastsættes med en ekstrem grad af hastende karakter, kan det være et fupnummer.\nHolde anti-spyware, anti-virus og anti-spam software opdateret. Din office IT-afdelingen har sandsynligvis din computer programmeret til at foretage regelmæssige scanninger og opdateringer. Lad det køre som planlagt.",
            "publicationTitle": "",
            "publisher": "",
            "place": "",
            "date": "",
            "volume": "",
            "issue": "",
            "section": "",
            "partNumber": "",
            "partTitle": "",
            "pages": "",
            "series": "",
            "seriesTitle": "",
            "seriesText": "",
            "journalAbbreviation": "",
            "DOI": "",
            "citationKey": "",
            "url": "http://www.bbb.org/blog/2013/04/fake-scanner-emails-infect-office-computers/",
            "accessDate": "",
            "PMID": "",
            "PMCID": "",
            "ISSN": "",
            "archive": "",
            "archiveLocation": "",
            "shortTitle": "",
            "language": "",
            "libraryCatalog": "",
            "callNumber": "",
            "rights": "",
            "extra": "",
            "tags": [
                {
                    "tag": "abney and associates reviews on scam, Falske Scanner E-mails inficere Office computer"
                }
            ],
            "collections": [],
            "relations": {},
            "dateAdded": "2013-04-12T08:55:00Z",
            "dateModified": "2013-04-12T08:55:00Z"
        }
    },
    {
        "key": "AXWPWSRX",
        "version": 21,
        "library": {
            "type": "group",
            "id": 133350,
            "name": "Abney Associates",
            "links": {
                "alternate": {
                    "href": "https://www.zotero.org/groups/abney_associates",
                    "type": "text/html"
                }
            }
        },
        "links": {
            "self": {
                "href": "https://api.zotero.org/groups/133350/items/AXWPWSRX",
                "type": "application/json"
            },
            "alternate": {
                "href": "https://www.zotero.org/groups/abney_associates/items/AXWPWSRX",
                "type": "text/html"
            }
        },
        "meta": {
            "createdByUser": {
                "id": 1289886,
                "username": "cottoncandz01",
                "name": "Cotton Candy",
                "links": {
                    "alternate": {
                        "href": "https://www.zotero.org/cottoncandz01",
                        "type": "text/html"
                    }
                }
            },
            "numChildren": 0
        },
        "data": {
            "key": "AXWPWSRX",
            "version": 21,
            "itemType": "journalArticle",
            "title": "Abney and Associates Online: PublicRecords.us.org utgivelser Tip ark og varsler om steinbit Dating svindel på Internett",
            "creators": [],
            "abstractNote": "abney and associates online\nIkke vær som folk på MTVs nye Vis \"Steinbit.\" PublicRecords.us.org aksjer økningen i denne typen cyber relasjonsvirkemåte på nettet.\nCharlotte, NC (PRWEB) 13 mars 2013\nInternett dating kan være morsomt og spennende i møte en potensiell kjæreste eller venninne, men man vet aldri når denne personen kan være falsk. MTV'S \"steinbit\" har utforsket fenomenet hvordan folk i virtuelle relasjoner hevdet å være noen andre eller gjemmer seg til fulle sannhet.\nAvtalen skal Mashable, 83 millioner kontoer på Facebook er falske. Det betyr at folk på alle sosiale medier eller datingside kunne gjøre med en svindler. Mashable delte også at Facebook forbud minst 20.000 kontoer daglig og anslår at om lag 600.000 kontoer per dag er kompromittert.\nDet er viktig å unngå å bli \"catfished\" og PublicRecords.us.org forklarer til sine verdifulle forbrukere pakka dating katastrofe.\nMesteparten av tiden, kan snakker med en falsk person bare ende opp som bortkastet tid. I andre ekstreme tilfeller der cyber-relasjoner, har vart år, kan det være ødeleggende. Det er mulig å bli forelsket i en fiktiv person, og tro det eller ei, folk er lurt ofte.\nEn enkel bakgrunnssjekk, fra et nettsted som PublicRecords.us.org, kan aktivere daters å se hvem de egentlig snakker til. Et navn og plassering søk kan dukke opp kriminelle og sysselsetting poster for online daters å finne ut hvis de er i samspill med en steinbit.\nPublicRecords.us.org søker grave dypere enn bare online dating eller sosiale medianettsteder. Webområdets offentlige registre gir ekte bakgrunnsinformasjon sjekk å kaste lys over noen Internett-troll eller bedrager.\nOm PublicRecords.us.org:\nTusenvis av garanterer sjekker, offentlige registre og sysselsetting søk er gjennomført på offentlige registre daglig. For mer informasjon om disse bakgrunn sjekk tjenestene, besøke PublicRecords.us.org nettsted eller ta kontakt kunden Service Manager på manager (at) publicrecords (dot) (dot) org.\n\n\n\nFor den opprinnelige versjonen på PRWeb \nbesøk: http://www.prweb.com/releases/prwebpublicrecordsusorg/catfish-dating-scams/prweb10523441.htm\n\n\nabney and associates online\n\n\nREAD MORE/RELATED ARTICLES:\n\n\nhttp://abneyassoc.wordpress.com/\nhttp://www.good.is/posts/abney-and-associates-hongkong-reviews-avoiding-phone-phishing-scams",
            "publicationTitle": "",
            "publisher": "",
            "place": "",
            "date": "",
            "volume": "",
            "issue": "",
            "section": "",
            "partNumber": "",
            "partTitle": "",
            "pages": "",
            "series": "",
            "seriesTitle": "",
            "seriesText": "",
            "journalAbbreviation": "",
            "DOI": "",
            "citationKey": "",
            "url": "http://www.virtual-strategy.com/2013/03/13/publicrecordsusorg-releases-tip-sheet-and-warns-catfish-dating-scams-internet",
            "accessDate": "",
            "PMID": "",
            "PMCID": "",
            "ISSN": "",
            "archive": "",
            "archiveLocation": "",
            "shortTitle": "",
            "language": "",
            "libraryCatalog": "",
            "callNumber": "",
            "rights": "",
            "extra": "",
            "tags": [
                {
                    "tag": "PublicRecords.us.org utgivelser Tip ark og varsler om steinbit Dating svindel på Internett"
                },
                {
                    "tag": "abney and associates online"
                }
            ],
            "collections": [],
            "relations": {},
            "dateAdded": "2013-03-15T03:29:50Z",
            "dateModified": "2013-03-15T03:29:50Z"
        }
    },
    {
        "key": "QVBQVT3E",
        "version": 19,
        "library": {
            "type": "group",
            "id": 133350,
            "name": "Abney Associates",
            "links": {
                "alternate": {
                    "href": "https://www.zotero.org/groups/abney_associates",
                    "type": "text/html"
                }
            }
        },
        "links": {
            "self": {
                "href": "https://api.zotero.org/groups/133350/items/QVBQVT3E",
                "type": "application/json"
            },
            "alternate": {
                "href": "https://www.zotero.org/groups/abney_associates/items/QVBQVT3E",
                "type": "text/html"
            }
        },
        "meta": {
            "createdByUser": {
                "id": 1288197,
                "username": "hugghughes",
                "name": "Hugg Hughes",
                "links": {
                    "alternate": {
                        "href": "https://www.zotero.org/hugghughes",
                        "type": "text/html"
                    }
                }
            },
            "numChildren": 0
        },
        "data": {
            "key": "QVBQVT3E",
            "version": 19,
            "itemType": "journalArticle",
            "title": "Hong Kong Technology Warning Blog Abney Associates: Jude Law on phone hacking – Facebook",
            "creators": [],
            "abstractNote": "http://www.facebook.com/permalink.php?story_fbid=351216154997876&id=511621158883150\n\n\nThe actor has long had a fraught relationship with the media and their intrusions on his private life. As he promotes his new film with Steven Soderbergh, he talks about life post-Leveson and his love of theatre.\n'I'm 40! I'm an adult!\" shouts Jude Law. \"Aren't I?\" We hold these truths to be self-evident, I reply, as the actor, laughing, stares across the table with those adorable baby blues and more hair than's fair. \"But,\" he says more quietly, \"part of me thinks I can't play a doctor. Who would come to me?\"\nYou've got to be kidding. Who wouldn't come to Dr Jude? In Steven Soderbergh's film Side Effects, Law plays an Englishman in New York, a slimy limey of a pill-dispensing psychiatrist who becomes entangled in murder, drug switcheroos, a risible lesbian insider trading scam and lots more vaguely voguish, putatively Hitchkockian hokum before the credits. Astute critics have compared this performance with the one Law gave in the 2004 film I Heart Huckabees, where he played a shallow business exec in psychic meltdown. \"The de-smugging of Jude Law is yet again a dramatic motor to swear by,\" wrote the Daily Telegraph. Quite so: seeing Dr Jude losing his Brit cool when wrong-footed by faux-innocent Rooney Mara or handbagged by crackers shrink Catherine Zeta-Jones is worth the price of admission alone.\n\nView Video:\nhttp://www.dailymotion.com/video/xxu9uj_international-internet-and-technology-warning-abney-associates_news#.UTPbt6JTB3A\n\nRelated Article:\nhttps://www.zotero.org/groups/abney_associates\n\nhttp://www.guardian.co.uk/culture/2013/mar/03/jude-law-phone-hacking-40-side-effects",
            "publicationTitle": "",
            "publisher": "",
            "place": "",
            "date": "",
            "volume": "",
            "issue": "",
            "section": "",
            "partNumber": "",
            "partTitle": "",
            "pages": "",
            "series": "",
            "seriesTitle": "",
            "seriesText": "",
            "journalAbbreviation": "",
            "DOI": "",
            "citationKey": "",
            "url": "http://www.facebook.com/permalink.php?story_fbid=351216154997876&id=511621158883150",
            "accessDate": "",
            "PMID": "",
            "PMCID": "",
            "ISSN": "",
            "archive": "",
            "archiveLocation": "",
            "shortTitle": "",
            "language": "",
            "libraryCatalog": "",
            "callNumber": "",
            "rights": "",
            "extra": "",
            "tags": [
                {
                    "tag": "hong kong technology warning blog abney associates, Jude Law on phone hacking, being 40 and his new film Side Effects"
                }
            ],
            "collections": [],
            "relations": {},
            "dateAdded": "2013-03-09T06:20:46Z",
            "dateModified": "2013-03-09T06:20:46Z"
        }
    },
    {
        "key": "PG7C7DS8",
        "version": 18,
        "library": {
            "type": "group",
            "id": 133350,
            "name": "Abney Associates",
            "links": {
                "alternate": {
                    "href": "https://www.zotero.org/groups/abney_associates",
                    "type": "text/html"
                }
            }
        },
        "links": {
            "self": {
                "href": "https://api.zotero.org/groups/133350/items/PG7C7DS8",
                "type": "application/json"
            },
            "alternate": {
                "href": "https://www.zotero.org/groups/abney_associates/items/PG7C7DS8",
                "type": "text/html"
            }
        },
        "meta": {
            "createdByUser": {
                "id": 1246596,
                "username": "haideeloidie",
                "name": "",
                "links": {
                    "alternate": {
                        "href": "https://www.zotero.org/haideeloidie",
                        "type": "text/html"
                    }
                }
            },
            "creatorSummary": "haidee ",
            "numChildren": 0
        },
        "data": {
            "key": "PG7C7DS8",
            "version": 18,
            "itemType": "journalArticle",
            "title": "Abney Associates Cyber Warning | Identitet forbrytelser presse svindel til rekordhøye",
            "creators": [
                {
                    "creatorType": "author",
                    "firstName": "loidie",
                    "lastName": "haidee "
                }
            ],
            "abstractNote": "http://www.ft.com/intl/cms/s/116330bc-84e5-11e2-88bb-00144feabdc0,Authorised=false.html#axzz2MoCz7GHx\n\nAbney Associates Cyber Warning\nHvor mange svindel i Storbritannia treffer en rekordhøy i 2012, med identitet-relaterte forbrytelser langt de fleste vanlig type, ifølge en rapport.\nIdentitet svindel består av to tredjedeler av de totale 248,325 hendelsene registrert av Cifas, svindel forebygging tjenesten. Fire femtedeler av disse ble begått online, sin årsrapport med Fraudscape funnet, inkludert bruk av teknikker som phishing, malware og hacking.\n\n\"Data har blitt svindlers valgte ruten til økonomisk gevinst,\" sa Sandra Peaston, stedfortredende leder av økonomisk kriminalitet og strategisk intelligens på Cifas. Dreining mot gjør forretninger på Internett har skapt nye muligheter for svindlere, sa hun.\nFremveksten av Lønning långivere har drevet låne svindel, som nye og innovative finansielle produkter ofte tiltrekke svindlere, sa hun.\n\n\"De siste par årene har sett en eksplosjon i ulike typer lån som er nå tilgjengelig,\" sier hun. \"Noen av disse produktene er designet for å være lett tilgjengelig, men dette gjør dem mer utsatt for identitet forsøk på svindel.\"\nBank, kredittkort og postordre regnskapet var de mest hyppige mål, ifølge rapporten. Svindel på butikk-kort og kredittkort økt 44 prosent fra år til år.\nMest sannsynlig ofre for svindlere var menn i deres 40s.\n\nØkonomien var \"en sannsynlig driver\" for mange svindel, sa Cifas. Det identifisert \"økonomisk desperasjon, en presset arbeidsmarked... [og] desperasjon for økonomisk art\"som faktorer i stigende svindel nivåer.\nHvor mange mennesker prøver å betale sine egne kredittkort regninger ved å bruke noen andres konto økt med kvart år til år, og var det en 5 prosent økning i boliglån program svindel.\n\"Dette [data] understreker behovet for mer offentlige og private organisasjoner å opptre ansvarlig og dele data for å hindre svindel før måtte gjenopprette tap, sammen med større trekk av enkeltpersoner og politi,\" sa Ms Peaston.\n\nAbney Associates Cyber Warning\nRead more:\nhttp://www.topix.com/forum/city/fullerton-ca/T8GB2GM6R1RAEBP5Q\nhttp://abneyandassociates.multiply.com/",
            "publicationTitle": "",
            "publisher": "",
            "place": "",
            "date": "",
            "volume": "",
            "issue": "",
            "section": "",
            "partNumber": "",
            "partTitle": "",
            "pages": "",
            "series": "",
            "seriesTitle": "",
            "seriesText": "",
            "journalAbbreviation": "",
            "DOI": "",
            "citationKey": "",
            "url": "http://www.ft.com/intl/cms/s/116330bc-84e5-11e2-88bb-00144feabdc0,Authorised=false.html#axzz2MoCz7GHx",
            "accessDate": "",
            "PMID": "",
            "PMCID": "",
            "ISSN": "",
            "archive": "",
            "archiveLocation": "",
            "shortTitle": "",
            "language": "",
            "libraryCatalog": "",
            "callNumber": "",
            "rights": "",
            "extra": "",
            "tags": [
                {
                    "tag": " abney associates cyber warning, Identitet   forbrytelser presse svindel til rekordhøye"
                }
            ],
            "collections": [],
            "relations": {},
            "dateAdded": "2013-03-07T03:08:25Z",
            "dateModified": "2013-03-07T03:08:25Z"
        }
    },
    {
        "key": "E5EUS7JD",
        "version": 17,
        "library": {
            "type": "group",
            "id": 133350,
            "name": "Abney Associates",
            "links": {
                "alternate": {
                    "href": "https://www.zotero.org/groups/abney_associates",
                    "type": "text/html"
                }
            }
        },
        "links": {
            "self": {
                "href": "https://api.zotero.org/groups/133350/items/E5EUS7JD",
                "type": "application/json"
            },
            "alternate": {
                "href": "https://www.zotero.org/groups/abney_associates/items/E5EUS7JD",
                "type": "text/html"
            }
        },
        "meta": {
            "createdByUser": {
                "id": 1254717,
                "username": "clausenholmberg23",
                "name": "Clausen Holmberg",
                "links": {
                    "alternate": {
                        "href": "https://www.zotero.org/clausenholmberg23",
                        "type": "text/html"
                    }
                }
            },
            "creatorSummary": "Clausen Holmberg",
            "numChildren": 0
        },
        "data": {
            "key": "E5EUS7JD",
            "version": 17,
            "itemType": "journalArticle",
            "title": "Abney and Associates Hongkong Reviews: Avoiding Phone Phishing Scams",
            "creators": [
                {
                    "creatorType": "author",
                    "firstName": "",
                    "lastName": "Clausen Holmberg"
                }
            ],
            "abstractNote": "Consumers who receive incoming calls from their financial institutions are vulnerable to phone phishing scams, where dubious characters extract private data under the premise that they are the consumer's financial service provider.\nConsider the example of a mortgage borrower who receives a call where the caller ID is blocked. The caller could have researched public records to learn the identity of the property owner and the name of the mortgage lender. \nWith such information in hand, the caller pretends to be the lender and begins asking the consumer for personal data as part of security procedures. The caller winds up giving out personal information to an unknown party.\nJPMorgan Chase & Co. Spokeswoman Amy Bonitatibus acknowledged that Chase asks for customer verification so that information is not shared with other occupants at the home.\n\"But we always introduce ourselves, and we also state the reason for the call,\" she said.\nAnother scenario involves a call that is only identified as a toll-free telephone on caller ID. This is the case with calls from Bank of America Corp., which also asks for verifying personal data. BofA didn't comment in response to a request for clarification about its procedures.\nWhile a toll-free number in the caller ID display might seem reassuring to the borrower, it doesn't take much for a criminal operator to obtain a toll-free number and execute a phone phishing scheme.\nAlthough a specific Chase department will show up on caller ID, the New York-based company's name is not necessarily displayed, Bonitatibus said. But Chase never blocks its number from caller ID.\nAt Citigroup Inc., a toll-free number is displayed if the call originates from a dialer, while the direct extension is displayed when the call comes from an office group, a spokesman said in a statement. He noted that the company doesn't block phone numbers from displaying on caller ID.\nA third possibility would involve a call that is identified on caller ID as being from the consumer's financial institution. \nWhen an automated or outbound call is made by Wells Fargo & Co. to a mortgage customer, the caller ID display shows \"Wells Fargo Mort,\" \"Wells Fargo Home Mort\" or \"WF,\" according to Vickee J. Adams, vice president, external communications, for the San Francisco-based company. In addition, a Wells Fargo inbound number will be displayed.\nQuicken Loans Inc. spokesman Aaron Emerson said in a statement that the Detroit-based firm doesn't alter the listing of the company on caller ID, and all calls from the company will show the full company name and the main switchboard number (313.373.3000) -- though just the telephone number shows on some wireless devices.\n\nRelated Group: http://abneyandassociates.multiply.com/\nRelated Article: http://www.wellsphere.com/happiness-article/internet-technology-by-abney-and-associates-cyber-threat-trends-of-2013/1867167",
            "publicationTitle": "",
            "publisher": "",
            "place": "",
            "date": "",
            "volume": "",
            "issue": "",
            "section": "",
            "partNumber": "",
            "partTitle": "",
            "pages": "",
            "series": "",
            "seriesTitle": "",
            "seriesText": "",
            "journalAbbreviation": "",
            "DOI": "",
            "citationKey": "",
            "url": "http://www.mortgagedaily.com/Consumers/PhonePhishing030113.asp",
            "accessDate": "",
            "PMID": "",
            "PMCID": "",
            "ISSN": "",
            "archive": "",
            "archiveLocation": "",
            "shortTitle": "",
            "language": "",
            "libraryCatalog": "",
            "callNumber": "",
            "rights": "",
            "extra": "",
            "tags": [
                {
                    "tag": "Abney and Associates Hongkong Reviews, Avoiding Phone Phishing Scams"
                }
            ],
            "collections": [],
            "relations": {},
            "dateAdded": "2013-03-04T01:19:16Z",
            "dateModified": "2013-03-04T01:19:16Z"
        }
    },
    {
        "key": "JUFKR4T6",
        "version": 16,
        "library": {
            "type": "group",
            "id": 133350,
            "name": "Abney Associates",
            "links": {
                "alternate": {
                    "href": "https://www.zotero.org/groups/abney_associates",
                    "type": "text/html"
                }
            }
        },
        "links": {
            "self": {
                "href": "https://api.zotero.org/groups/133350/items/JUFKR4T6",
                "type": "application/json"
            },
            "alternate": {
                "href": "https://www.zotero.org/groups/abney_associates/items/JUFKR4T6",
                "type": "text/html"
            }
        },
        "meta": {
            "createdByUser": {
                "id": 1288197,
                "username": "hugghughes",
                "name": "Hugg Hughes",
                "links": {
                    "alternate": {
                        "href": "https://www.zotero.org/hugghughes",
                        "type": "text/html"
                    }
                }
            },
            "numChildren": 0
        },
        "data": {
            "key": "JUFKR4T6",
            "version": 16,
            "itemType": "journalArticle",
            "title": "Abney Associates Security Warning Hong Kong: Intego van nieuwe Mac-beveiligingspakket is belangrijk voor nieuwkomers",
            "creators": [],
            "abstractNote": "In het huidige klimaat van Internet bedreiging is een beveiligingspakket die naar binnenkomende malware zoekt essentieel. Echter als beveiligingssoftware ook technische of verwarrend, klanten is, met name die nieuw op de Mac, niet gebruiken. Intego heeft uiteengezet aan verandering dat alles.\n\nInleiding\n\nIntego heeft gevonden, door ervaring met klanten, met name Switchers komt naar een Mac, dat een nieuwe omgeving al een duizelingwekkende aangelegenheid is. Als de gebruiker worstelt om te winnen meesterschap over een nieuwe OS, wordt bij wijze van uitzondering eng, geeky, en technische software vaak voorkomen.\nOok, een klant kan zijn gekomen om de Mac, op zoek naar een meer veilige computeromgeving en kan voelen die toegevoegd beveiligingssoftware is niet een dringende zaak. Het probleem is dat er nog steeds agressieve exploits loer die moeten onmiddellijk worden geblokkeerd. De Mac is een solide, OS worden beveiligd, maar elk OS heeft een aantal tekortkomingen dat professionele slechteriken experts op vinden zijn. Inbraak kits zijn zelfs verkocht onder hen.\nNatuurlijk, is een van de dingen die een grote veiligheid producten ontwikkelaar kan doen functioneren van een datacenter en kijk voor malware en trends. Duwen bedreiging definitiebestanden aan elke abonnee dat de ondertekening van virussen niet alleen maar een groot aantal malware kan detecteren, kunt de klant profiteren van de enorme rijkdommen, snel, voor een bescheiden jaarabonnement.\nToch, als de beveiligingssoftware te geeky is, nieuwe en verwarrend voorwaarden introduceert, en moeilijk is te begrijpen en te benutten, het zal nog steeds worden vermeden. Dit is waar de Intego Mac Internet Security Premium (MISP) pakket 2013 in spel komt. Het is eigenlijk de Inego Virus barrière X 6 product met een vereenvoudigde gebruikersinterface, sommige van de geekier functies verwijderd en een extra veiligheidspakket toegevoegd. Het biedt hetzelfde niveau van bescherming als X 6, maar met een eenvoudiger user experience (UX).\nEn dat recht er, kenmerkt beveiligingssoftware. Er is een partitie tussen wat de software kan doen op zijn eigen en welke de software mag verwachten dat de klant om te doen in termen van 1) op te treden en 2) de software configureren. Als te veel last wordt geplaatst op de gebruiker, krijgen niet het deel van de software die perfect prima op eigen werken kan gebruikt.\nIntego vertelde me dat, in het verleden zeer technische mensen beveiligingssoftware gebruikt omdat ze ervaren gebruikers waren. Echter, met de groei van het bedrijf van Mac, met 50 procent van de nieuwe klanten komen uit PC's, Switchers, was het tijd voor een product voor niet-technische gebruikers. Dat is MISP 2013.\n\nProduct Profile\n\nMISP 2013 bestaat uit drie primaire OS X apps:\n\n•\tVirusBarrier.app\n•\tNetBarrier.app\n•\tIdentiteit Scrubber.app\n\nEr is ook een manager, NetUpdate.app, die voor updates zorgt, licentieverlening en de downladen van bedreiging filters, genaamd NetUpdate.\nVoor newbies, moet ik opmerken dat de VirusBarrier app niet alleen tegen virussen van Windows die u ontvangt in een e-mail beschermt, zodat u niet aan anderen doorgeven, maar ook beschermt tegen een gastheer van OS X exploits, malware, keyloggers, Trojaanse paarden en andere soorten malware die u zou kunnen van schadelijke websites of in uw e-mail halen.\nIdentiteit Scrubber, in tegenstelling tot de andere twee, scant de Mac voor bepaalde soorten gedefinieerde gegevens die de gebruiker kan niet beseffen is op dat Mac. Informatie, zoals sociale zekerheid nummers, credit card nummers, bankrekeningnummers, enzovoort, die zou kunnen worden de toekomstige doelstelling van malware of phishing e-mails.\n\nContinue Reading:\nhttp://www.macobserver.com/tmo/review/integos-new-security-package-is-important-for-newbies\n\n\nRead Related Articles:\nhttp://www.shelfari.com/groups/101766/discussions/478948/Abney-Associates-internettechnologie-Phishing-E-mail-en-Internet\n\nhttp://www.getjealous.com/Nataniamorgana",
            "publicationTitle": "",
            "publisher": "",
            "place": "",
            "date": "",
            "volume": "",
            "issue": "",
            "section": "",
            "partNumber": "",
            "partTitle": "",
            "pages": "",
            "series": "",
            "seriesTitle": "",
            "seriesText": "",
            "journalAbbreviation": "",
            "DOI": "",
            "citationKey": "",
            "url": "http://www.macobserver.com/tmo/review/integos-new-security-package-is-important-for-newbies",
            "accessDate": "",
            "PMID": "",
            "PMCID": "",
            "ISSN": "",
            "archive": "",
            "archiveLocation": "",
            "shortTitle": "",
            "language": "",
            "libraryCatalog": "",
            "callNumber": "",
            "rights": "",
            "extra": "",
            "tags": [
                {
                    "tag": "abney associates security warning hong kong, Intego van nieuwe Mac-beveiligingspakket is belangrijk voor nieuwkomers"
                }
            ],
            "collections": [],
            "relations": {},
            "dateAdded": "2013-03-01T02:53:40Z",
            "dateModified": "2013-03-01T02:53:40Z"
        }
    },
    {
        "key": "ES5KJS4U",
        "version": 15,
        "library": {
            "type": "group",
            "id": 133350,
            "name": "Abney Associates",
            "links": {
                "alternate": {
                    "href": "https://www.zotero.org/groups/abney_associates",
                    "type": "text/html"
                }
            }
        },
        "links": {
            "self": {
                "href": "https://api.zotero.org/groups/133350/items/ES5KJS4U",
                "type": "application/json"
            },
            "alternate": {
                "href": "https://www.zotero.org/groups/abney_associates/items/ES5KJS4U",
                "type": "text/html"
            }
        },
        "meta": {
            "createdByUser": {
                "id": 1246596,
                "username": "haideeloidie",
                "name": "",
                "links": {
                    "alternate": {
                        "href": "https://www.zotero.org/haideeloidie",
                        "type": "text/html"
                    }
                }
            },
            "creatorSummary": "haidee ",
            "numChildren": 0
        },
        "data": {
            "key": "ES5KJS4U",
            "version": 15,
            "itemType": "journalArticle",
            "title": "International Internet and Technology Warning, Abney Associates Review",
            "creators": [
                {
                    "creatorType": "author",
                    "firstName": "loidie",
                    "lastName": "haidee "
                }
            ],
            "abstractNote": "http://consumerist.com/2013/02/27/5-warning-signs-that-a-craigslist-rental-listing-is-probably-a-scam/\n5 Waarschuwing tekenen dat A Craigslist verhuur aanbieding Is waarschijnlijk een oplichting\nInternational Internet and Technology Warning, Abney Associates Review\nHoewel het is niets nieuws, begonnen we onlangs zien een opleving van de lezer e-mails vragen als je een echt geweldig klinkende verhuur overzicht op Craigslist mogelijk een scam, dus we dachten dat het tijd was voor een opfriscursus.\nDe scammy aanbiedingen zijn vaak voor volledig fictieve huizen en de enige bedoeling van de terbeschikkingstelling is om ofwel uw identiteit te stelen of oplichting u uit een \"fee\" voor een credit-check die nooit daadwerkelijk zal plaatsvinden.\nDus met dat in gedachten zijn hier de waarschuwingssignalen te zoeken bij het proberen om te bepalen of een aanbieding nep is:\n\n1.\tKLINKT GOED. WAAR IS HET, EN WAAR ZIJN DE FOTO 'S?\n\nMerendeel van de twijfelachtige aanbiedingen lezers aan ons hebt alarmbellen niet onmiddellijk veel wanneer u eenvoudig op de info op Craigslist zoekt.\nBijvoorbeeld, is hier de volledige tekst voor een recente lijst:\n\n$800 / 3br – 3 BR, 2,5 BA Home met vele voorzieningen\n\n-3 BR, 2.5 BA\n-Brand new hardhouten vloeren op eerste verdieping, vloerbedekking op de tweede verdieping.\n-Grote keuken met apparatuur en bar\n-Houten veel met een patio voor zitten en grillen\n-Master slaapkamer op de eerste verdieping met hoge dubbele ijdelheid wastafels, bad en aparte douche\n-Walk-in loft\n-Wasmachine/droger hookup in mudroom\n-Formele eetkamer\n-Uitstekende voor kamergenoten, paar of familie\n-Grote buren en uitstekende HOA\n-Alle functies bedekt met huur\n-Gigantisch zwembad met swirly dia, kinderen water Kinderspeelruimte, work-out faciliteit (alle aan de overkant)\n-Huisdieren OK\n-Niet roken in het huis\nDit klinkt als een goede deal. In veel steden is $800 per maand voor drie slaapkamers en 2,5 Baden een koopje. We hebben ook gezien deze dezelfde aanbieding gaan voor zo laag als $350 per maand in een bepaalde stad.\nHoe dan ook, heeft de eigenschap zo ongeveer alles wat die je nodig zou hebben. Dus waar zijn de foto's om te pronken met al deze functies? En waar is deze plaats in Tampa?\nNatuurlijk, gewoon omdat een aanbieding deze foto's en een adres mist betekent niet dat het is een scam, maar veel als mensen die weigeren om foto's op hun online dating profielen, het is een gegronde reden tot bezorgdheid.\n\nInternational Internet and Technology Warning, Abney Associates Review\n\nRead more:\nhttp://abneyassoc.wordpress.com/\nhttp://www.good.is/posts/abney-associates-hong-kong-technology-news-topp-gaming-foretag",
            "publicationTitle": "",
            "publisher": "",
            "place": "",
            "date": "",
            "volume": "",
            "issue": "",
            "section": "",
            "partNumber": "",
            "partTitle": "",
            "pages": "",
            "series": "",
            "seriesTitle": "",
            "seriesText": "",
            "journalAbbreviation": "",
            "DOI": "",
            "citationKey": "",
            "url": "http://consumerist.com/2013/02/27/5-warning-signs-that-a-craigslist-rental-listing-is-probably-a-scam/",
            "accessDate": "",
            "PMID": "",
            "PMCID": "",
            "ISSN": "",
            "archive": "",
            "archiveLocation": "",
            "shortTitle": "",
            "language": "",
            "libraryCatalog": "",
            "callNumber": "",
            "rights": "",
            "extra": "",
            "tags": [
                {
                    "tag": " international internet and technology warning, abney associates review"
                }
            ],
            "collections": [],
            "relations": {},
            "dateAdded": "2013-02-28T02:50:40Z",
            "dateModified": "2013-02-28T02:50:40Z"
        }
    },
    {
        "key": "8FCCMDD9",
        "version": 14,
        "library": {
            "type": "group",
            "id": 133350,
            "name": "Abney Associates",
            "links": {
                "alternate": {
                    "href": "https://www.zotero.org/groups/abney_associates",
                    "type": "text/html"
                }
            }
        },
        "links": {
            "self": {
                "href": "https://api.zotero.org/groups/133350/items/8FCCMDD9",
                "type": "application/json"
            },
            "alternate": {
                "href": "https://www.zotero.org/groups/abney_associates/items/8FCCMDD9",
                "type": "text/html"
            }
        },
        "meta": {
            "createdByUser": {
                "id": 1201990,
                "username": "franchescablit",
                "name": "franchesca blit",
                "links": {
                    "alternate": {
                        "href": "https://www.zotero.org/franchescablit",
                        "type": "text/html"
                    }
                }
            },
            "creatorSummary": "franchesca blit ",
            "numChildren": 0
        },
        "data": {
            "key": "8FCCMDD9",
            "version": 14,
            "itemType": "journalArticle",
            "title": "Internet International Warning, Abney Associates Review: Scam varning som tillhandahålls",
            "creators": [
                {
                    "creatorType": "author",
                    "firstName": "",
                    "lastName": "franchesca blit "
                }
            ],
            "abstractNote": "En välbekant bluff har återuppstått i Washington Parish, och en Bogalusa bosatt är varning människor inte att falla för den.\nJimmy Underwood sade han nyligen fick ett samtal från en person med utländsk brytning, som berättade för honom hade han vunnit $2,5 miljoner och att någon skulle komma från Lafayette på eftermiddagen att presentera honom med sina vinster.\nDock Underwood var misstänksam och \"typ av tänkte att det var en bluff rätt utanför bat,\" han låter anroparen fortsätta. Underwood gavs ett spårningsnummer, tillgång kodnummer och säkerhet kodnummer och tillsagd att gå till en butik för att få en grön Dot MoneyPack kort och lägga till $1.000 i den. Uppringaren sa utmärkelsen $2,5 miljoner var juridiska, hade godkänts av den federala regeringen, och att alla skatter hade tagits. Han försett Underwood med ett telefonnummer och berättade för honom att kalla det och be om Jimmy White efter han hade kortet.\nUnderwood var nära en Walgreens, så han gick in och ifyllt manager på telefonsamtalet. Chefen sa att det var en bluff, att den som ringt var sannolikt från Jamaica, och att någon annan hade kommit att rapportera samma sak.\nUngefär 10 minuter senare ringde ringer Underwood igen, frågar varför han inte hade kallas tillbaka. Underwood sa till honom att det var en bluff och att det inte var berättigat. Anroparen försäkrade honom var det inte ett skämt, men Underwood berättade för honom att ge pengar till någon annan.\nJag sa, \"Om jag vann pengar, hur kommer jag behöva betala $1,000?\" \"\nUnderwood fick veta att han inte skulle verkligen att lägga några pengar, eftersom han skulle få $1000 tillbaka i form av ett presentkort.\nNär han senare försökte telefonnumret hade han fått för \"Jimmy White,\" samma man svarade.\nEn annan blivande bedragare kallas Underwood måndag morgon. Anroparen var en kvinna, och hennes accent var tjockare och svårare att förstå. Hon berättade Underwood han hade godkänts för en $9,000 statligt bidrag, men han informerade henne om han inte hade ansökt om något bidrag. Han frågade henne att upprepa saker, och så småningom hon fick förvärras och hängde upp, sade han.\nDen gröna pricken hemsida, www.moneypak. com, ger varningar om vilka typer av bedrägerier som Underwood. Bland bedrägeri-förebyggande tips som tillhandahålls är, \"Avvisa ett erbjudande där du ombeds att köpa en MoneyPak och dela via e-post eller telefon nummer eller mottagande information.\"\n\"Använd inte MoneyPak betala skatter eller avgifter för att få\"vinster\"i ett utländskt lotteri eller pris främjande,\" tipsen fortsätter. \"Om det inte är en godkänd MoneyPak partner, Använd inte MoneyPak för ett erbjudande där du måste betala innan du får artikeln.\"\n\nRelated Article: http://abneyassociatesclausen.wordpress.com/2013/02/20/abney-and-associates-reviews-on-cyber-war-warning-microsoft-scheurt-e-mail-snooping-google/\n\nRelated Discussion: http://social.technet.microsoft.com/Forums/en-US/olmdiscussion/thread/3ff51444-251e-48c3-ad19-0b6872f1e3ba",
            "publicationTitle": "",
            "publisher": "",
            "place": "",
            "date": "",
            "volume": "",
            "issue": "",
            "section": "",
            "partNumber": "",
            "partTitle": "",
            "pages": "",
            "series": "",
            "seriesTitle": "",
            "seriesText": "",
            "journalAbbreviation": "",
            "DOI": "",
            "citationKey": "",
            "url": "http://www.gobogalusa.com/news/article_937e2ae8-80e9-11e2-84f8-001a4bcf887a.html",
            "accessDate": "",
            "PMID": "",
            "PMCID": "",
            "ISSN": "",
            "archive": "",
            "archiveLocation": "",
            "shortTitle": "",
            "language": "",
            "libraryCatalog": "",
            "callNumber": "",
            "rights": "",
            "extra": "",
            "tags": [
                {
                    "tag": "Internet International Warning, Abney Associates Review, Scam varning som tillhandahålls"
                }
            ],
            "collections": [],
            "relations": {},
            "dateAdded": "2013-02-28T01:20:32Z",
            "dateModified": "2013-02-28T01:20:32Z"
        }
    },
    {
        "key": "7ERMWRI6",
        "version": 13,
        "library": {
            "type": "group",
            "id": 133350,
            "name": "Abney Associates",
            "links": {
                "alternate": {
                    "href": "https://www.zotero.org/groups/abney_associates",
                    "type": "text/html"
                }
            }
        },
        "links": {
            "self": {
                "href": "https://api.zotero.org/groups/133350/items/7ERMWRI6",
                "type": "application/json"
            },
            "alternate": {
                "href": "https://www.zotero.org/groups/abney_associates/items/7ERMWRI6",
                "type": "text/html"
            }
        },
        "meta": {
            "createdByUser": {
                "id": 1310619,
                "username": "lhexisneal",
                "name": "",
                "links": {
                    "alternate": {
                        "href": "https://www.zotero.org/lhexisneal",
                        "type": "text/html"
                    }
                }
            },
            "numChildren": 0
        },
        "data": {
            "key": "7ERMWRI6",
            "version": 13,
            "itemType": "journalArticle",
            "title": "Hong Kong Articles by Abney Associates: Only time can tell what to make of this wicked lot",
            "creators": [],
            "abstractNote": "http://www.scmp.com/news/hong-kong/article/1152641/only-time-can-tell-what-make-wicked-lot\n\nDepending on your political inclinations, you might either be grief-stricken or chuckling over the unlucky message from the fortune stick drawn by rural patriarch Lau Wong-fat in a Taoist ritual last week.\nIn the annual ceremony at Sha Tin's Che Kung temple, the Heung Yee Kuk chairman drew a stick bearing the number 95.\nThe luck of the territory for the Year of the Snake is believed to be foretold by the deity Che Kung in a message corresponding to that stick, written in Chinese poetry laden with allusions to Chinese history and literature.\nThe message on the stick, loosely translated, read: \"In a splendid carriage you embarked on your journey. Today, you came home barefoot. Is it that you failed the imperial examination? Or did you lose all your gold in business?\"\nThe message also reminded Hongkongers to \"beware of wicked people\", and said \"nothing is going well\" in the Year of the Snake.\nYou don't need to be an expert in Chinese poetry to see that Lau had drawn a bad stick.\nBut if politics is known as the art of equivocation, perhaps the same applies to fortune telling.\nIf you stretch it far enough, as Lau, a veteran politician, did, you could transform the ominous warning into a platitudinous blessing.\nIn response to the message, Lau said: \"It means Hong Kong will continue to be prosperous and stable ... An unlucky stick can be good, too.\"\nTrying to foresee the fate of Hong Kong by the mere drawing of a fortune stick is sheer superstition, but the annual ritual has been a major political event in the city for decades.\nThe media takes it seriously too - reports on the prediction were splashed prominently across local newspapers the next day. Politicians were also quick to offer their own takes on Che Kung's message, often using the opportunity to launch an attack against their rivals.\nLegislator Tam Yiu-chung, chairman of the Beijing-friendly Democratic Alliance for the Betterment and Progress of Hong Kong, told reporters he believed that the \"wicked people\" referred to the opposition pan-democratic camp, while the pan-democrats thought it referred to Chief Executive Leung Chun-ying.\nLabour Party legislator Lee Cheuk-yan even suggested a vote on who Hongkongers think is the city's most wicked person.\nIronically, these politicians were among the fiercest critics of the Applied Science and Technology Research Institute in 2007, when it became known that the agency spent more than HK$180,000 on fung shui advice for its office layout.\nOnly time will tell who the \"wicked people\" are and whether Che Kung's predictions are in any way accurate.\nBut to the deity's followers, Che Kung has made some startlingly accurate predictions before. This year was the third time since 1997 that an unlucky stick was drawn in the ritual.\nThe first time was in 2003, when Hong Kong was hit by the severe acute respiratory syndrome (Sars) outbreak.\nThe second was in 2009, when the city was hit by global financial turmoil.\nThe annual ritual is supposed to be for rural patriarchs - mainly senior officials with the Heung Yee Kuk, which represents the interests of indigenous villagers in the New Territories - to thank the Che Kung deity for protecting locals in the year just past.\nBut the patriarchs also ask the deity to drop hints about what's in store for the coming year. There are 96 fortune sticks in the container used for the ritual, of which 35 are good ones, 44 neutral, and 17 bad.\nNo one has yet suggested that more good sticks be added to the container, or the bad ones be removed, to save face for the politician who is drawing the city's fortune for the year.\nSo when the ritual doesn't have a good outcome we can at least see that the temple management is upholding the core value of Hong Kong - to do things in a clean and fair manner. And that is perhaps why Che Kung continues to watch over and bless our city.\n\nRelated Articles: \nhttp://www.booksie.com/non-fiction/article/hugghughes19/malware-warning-by-abney-associates-review-blog:-why-malware-warnings-took-over-the-internet-today/chapter/1\n\nhttp://www.care2.com/news/member/181891075/3534591",
            "publicationTitle": "",
            "publisher": "",
            "place": "",
            "date": "",
            "volume": "",
            "issue": "",
            "section": "",
            "partNumber": "",
            "partTitle": "",
            "pages": "",
            "series": "",
            "seriesTitle": "",
            "seriesText": "",
            "journalAbbreviation": "",
            "DOI": "",
            "citationKey": "",
            "url": "http://www.scmp.com/news/hong-kong/article/1152641/only-time-can-tell-what-make-wicked-lot",
            "accessDate": "",
            "PMID": "",
            "PMCID": "",
            "ISSN": "",
            "archive": "",
            "archiveLocation": "",
            "shortTitle": "",
            "language": "",
            "libraryCatalog": "",
            "callNumber": "",
            "rights": "",
            "extra": "",
            "tags": [
                {
                    "tag": "Hong Kong Articles by Abney Associates: Only time can tell what to make of this wicked lot"
                }
            ],
            "collections": [],
            "relations": {},
            "dateAdded": "2013-02-22T06:35:59Z",
            "dateModified": "2013-02-22T06:35:59Z"
        }
    },
    {
        "key": "VN3CHANS",
        "version": 12,
        "library": {
            "type": "group",
            "id": 133350,
            "name": "Abney Associates",
            "links": {
                "alternate": {
                    "href": "https://www.zotero.org/groups/abney_associates",
                    "type": "text/html"
                }
            }
        },
        "links": {
            "self": {
                "href": "https://api.zotero.org/groups/133350/items/VN3CHANS",
                "type": "application/json"
            },
            "alternate": {
                "href": "https://www.zotero.org/groups/abney_associates/items/VN3CHANS",
                "type": "text/html"
            }
        },
        "meta": {
            "createdByUser": {
                "id": 1246596,
                "username": "haideeloidie",
                "name": "",
                "links": {
                    "alternate": {
                        "href": "https://www.zotero.org/haideeloidie",
                        "type": "text/html"
                    }
                }
            },
            "creatorSummary": "haidee ",
            "numChildren": 0
        },
        "data": {
            "key": "VN3CHANS",
            "version": 12,
            "itemType": "journalArticle",
            "title": "Hong Kong Cyber War Abney and Associates Internet Technology Review",
            "creators": [
                {
                    "creatorType": "author",
                    "firstName": "loidie",
                    "lastName": "haidee "
                }
            ],
            "abstractNote": "http://www.dailymotion.com/video/xxns1w_hong-kong-cyber-war-abney-and-associates-internet-technology-review#.USW6Nh1kT3Q\n\t\nHong Kong Cyber War Abney and Associates Internet Technology Review\nMit der Nachricht, dass das chinesische Militär mehr als 140 Cyber-Angriffe auf US-Regierungsbehörden und Unternehmen durchgeführt ist es jetzt klar, dass China, den USA und anderen Ländern auf der ganzen Welt in einer Schwarzarbeit und weitgehend unsichtbar Cyber-Krieg befinden.\nEin Bericht von Mandiant, ein Cyber-Security-Unternehmen mit Sitz in Alexandria, festgestellt, dass eine Gruppe von chinesischen Hackern, die Teil des chinesischen Militärs haben Angriffe auf die amerikanischen Interessen in den letzten sieben Jahren führt. Der Bericht behauptet, dass die wiederholten Dementis von hacking Aktivitäten von den chinesischen Behörden Lügen sind.\n\nDie Angriffe von Mandiant skizziert sind die jüngste in einer Reihe offenbarten global Cyber-Angriffe. Berichten zufolge verkrüppelt ein Angriff durch die USA und Israel eine Atomanlage im Iran. Die New York Times, Google und das Wall Street Journal wurden vor kurzem Ziele der Verdacht, dass chinesische Hacker. Langjährige Feinde Indien und Pakistan sind auch aktiv in der Cyber-Kriegsführung gegen einander, während Frankreich das tunesische Militär für den Angriff auf seinen Netzen vorgeworfen hat. Russland benutzt Cyber-Kriegsführung gegen Georgien während ihres Krieges im Jahr 2008. Aber es war der Angriff auf Estland 2007, die weltweit Aufmerksamkeit bekam.\n\nJaak Aavisksoo, Estlands Minister für Verteidigung, wusste, dass es Ärger wenn er Fehlermeldungen immer gehalten, jedes Mal, wenn er versucht, eine Zeitung eines Morgens zugreifen. Er sagte Wired Magazine: \"Angriffe zielten auf die wesentlichen elektronische Infrastruktur der Republik Estland. Alle großen Geschäftsbanken, Telekommunikationsunternehmen, Medien und Name-Server — die Telefonbücher des Internets —, spürte die Auswirkungen und die Mehrheit der estnischen Bevölkerung betroffen. Dies war das erste Mal, dass eine Botnet die nationale Sicherheit einer ganzen Nation bedroht.\" Verkabelte nannte es Web War One.\n\nEs ist nicht nur Rivalen, die in diesem Krieg beteiligt sind: Verbündete greifen Verbündete. Die Vereinigten Staaten hackte sich angeblich in ehemaligen des französischen Präsidenten Nicolas Sarkozys Computer während seiner letzten Monate im Amt, eine Gebühr die Vereinigten Staaten verweigert hat.\n\nUnd diese Instanzen sind nur diejenigen, die öffentlich geworden sind, wie die erfolgreichsten Cyber-Angriffe sind diejenigen, die unentdeckt bleiben. Laut Richard Bejtlich, chief Security Officer bei Mandiant, sind Firmen, die Opfer von Cyber-Attacken häufig zögerlich vortreten und zugeben Schwachstelle.\n\"Unternehmen würde nicht einzeln aufstehen so Mandiant beschlossen, etwas zu sagen\" über chinesische Hacker-Aktivitäten. \"Ich hoffe zu diesem Zeitpunkt [Bericht] die Konversation ändert.\"\n\nHong Kong Cyber War Abney and Associates Internet Technology Review\n\nRead more here:\nhttp://www.thefiscaltimes.com/Articles/2013/02/19/Chinese-Attacks-Reveals-an-Undeclared-Global-Cyber-War.aspx#page1\n http://www.authorstream.com/Presentation/ruxxemarfild-1697914-abney-associates-reviews-cyber-war-warning/\nhttp://abneyassociatesclausen.wordpress.com/2013/02/20/abney-and-associates-reviews-on-cyber-war-warning-microsoft-scheurt-e-mail-snooping-google/\nhttp://windsorite.ca/2013/02/rcmp-warn-of-a-new-computer-scam/",
            "publicationTitle": "",
            "publisher": "",
            "place": "",
            "date": "",
            "volume": "",
            "issue": "",
            "section": "",
            "partNumber": "",
            "partTitle": "",
            "pages": "",
            "series": "",
            "seriesTitle": "",
            "seriesText": "",
            "journalAbbreviation": "",
            "DOI": "",
            "citationKey": "",
            "url": "http://www.thefiscaltimes.com/Articles/2013/02/19/Chinese-Attacks-Reveals-an-Undeclared-Global-Cyber-War.aspx#page1",
            "accessDate": "",
            "PMID": "",
            "PMCID": "",
            "ISSN": "",
            "archive": "",
            "archiveLocation": "",
            "shortTitle": "",
            "language": "",
            "libraryCatalog": "",
            "callNumber": "",
            "rights": "",
            "extra": "",
            "tags": [
                {
                    "tag": "Hong Kong Cyber War Abney and Associates Internet   Technology Review"
                }
            ],
            "collections": [],
            "relations": {},
            "dateAdded": "2013-02-21T08:11:12Z",
            "dateModified": "2013-02-21T08:11:12Z"
        }
    },
    {
        "key": "EZ6TJJGN",
        "version": 11,
        "library": {
            "type": "group",
            "id": 133350,
            "name": "Abney Associates",
            "links": {
                "alternate": {
                    "href": "https://www.zotero.org/groups/abney_associates",
                    "type": "text/html"
                }
            }
        },
        "links": {
            "self": {
                "href": "https://api.zotero.org/groups/133350/items/EZ6TJJGN",
                "type": "application/json"
            },
            "alternate": {
                "href": "https://www.zotero.org/groups/abney_associates/items/EZ6TJJGN",
                "type": "text/html"
            },
            "up": {
                "href": "https://api.zotero.org/groups/133350/items/FQIHDHW7",
                "type": "application/json"
            }
        },
        "meta": {
            "createdByUser": {
                "id": 1288197,
                "username": "hugghughes",
                "name": "Hugg Hughes",
                "links": {
                    "alternate": {
                        "href": "https://www.zotero.org/hugghughes",
                        "type": "text/html"
                    }
                }
            }
        },
        "data": {
            "key": "EZ6TJJGN",
            "version": 11,
            "parentItem": "FQIHDHW7",
            "itemType": "attachment",
            "linkMode": "imported_file",
            "title": "large.jpg",
            "accessDate": "",
            "url": "",
            "note": "",
            "contentType": "",
            "charset": "",
            "filename": "",
            "md5": null,
            "mtime": null,
            "tags": [],
            "relations": {},
            "dateAdded": "2013-02-21T03:53:42Z",
            "dateModified": "2013-02-21T03:53:42Z"
        }
    },
    {
        "key": "FQIHDHW7",
        "version": 10,
        "library": {
            "type": "group",
            "id": 133350,
            "name": "Abney Associates",
            "links": {
                "alternate": {
                    "href": "https://www.zotero.org/groups/abney_associates",
                    "type": "text/html"
                }
            }
        },
        "links": {
            "self": {
                "href": "https://api.zotero.org/groups/133350/items/FQIHDHW7",
                "type": "application/json"
            },
            "alternate": {
                "href": "https://www.zotero.org/groups/abney_associates/items/FQIHDHW7",
                "type": "text/html"
            }
        },
        "meta": {
            "createdByUser": {
                "id": 1288197,
                "username": "hugghughes",
                "name": "Hugg Hughes",
                "links": {
                    "alternate": {
                        "href": "https://www.zotero.org/hugghughes",
                        "type": "text/html"
                    }
                }
            },
            "numChildren": 1
        },
        "data": {
            "key": "FQIHDHW7",
            "version": 10,
            "itemType": "journalArticle",
            "title": "Malware Warning by Abney Associates Review Blog: Why Malware Warnings Took Over the Internet Today",
            "creators": [],
            "abstractNote": "http://www.theatlanticwire.com/technology/2013/02/google-chrome-malware-warnings/61774/\n\n\nFor Chrome users, a malware warning page popped up on Monday across many major websites — The New York Times, IMDb, The Hollywood Reporter, Talking Points Memo, and MSN Money, to name a few — due to so-called blacklisting bug inside Google's ad network. NetSeer.com, which describes itself as a \"concept-based contextual advertising\" outfit, was hacked Monday morning, according to ZDNet's Zack Whittacker. The breach got into NetSeer's corporate website, not its ad network, but both use the same domain name — NetSeer.com — which led Google to put that address on its warning list for all Chrome users. The domain-name addition pushed out warnings to all websites that use NetSeer to serve their ads, which apparently includes a lot of major websites on the Internet. Here's what the warning, which was still floating around intermittently as of midday, looks like:\n\nUnlike NetSeer, those that carry the temporary Google warning have no harmful content on them  — and users who see the warning pages shouldn't worry about malware infections, according to NetSeer and The Guardian, one of the dozens of affected sites. It's unclear if Google meant to block both the domain that serves the ads, as well as the NetSeer company website.\n\nMeanwhile, NetSeer claims it has removed all the malware from its own website and is working with Google throughout the day to take its domain off the Chrome blacklist, as the company explained in a statement:\n\n“Our operations team went into all-hands-on-deck mode and we have successfully cleaned the site of the malware issue. We are also working with Google to do an expedited review of the site and remove the site from the malware impacted site-list so that browsing behavior can be restored for all users.\nSo, whenever that happens, all of those foreboding messages popping up across the Internet should disappear, too.”\n\nRead More: \n\nhttp://abneyassociatesclausen.wordpress.com/2013/02/20/abney-and-associates-reviews-on-cyber-war-warning-microsoft-scheurt-e-mail-snooping-google/\n\n\nhttp://www.authorstream.com/Presentation/ruxxemarfild-1697914-abney-associates-reviews-cyber-war-warning/\n\n\nhttp://www.care2.com/news/member/181891075/3534591",
            "publicationTitle": "",
            "publisher": "",
            "place": "",
            "date": "",
            "volume": "",
            "issue": "",
            "section": "",
            "partNumber": "",
            "partTitle": "",
            "pages": "",
            "series": "",
            "seriesTitle": "",
            "seriesText": "",
            "journalAbbreviation": "",
            "DOI": "",
            "citationKey": "",
            "url": "http://www.theatlanticwire.com/technology/2013/02/google-chrome-malware-warnings/61774/",
            "accessDate": "",
            "PMID": "",
            "PMCID": "",
            "ISSN": "",
            "archive": "",
            "archiveLocation": "",
            "shortTitle": "",
            "language": "",
            "libraryCatalog": "",
            "callNumber": "",
            "rights": "",
            "extra": "",
            "tags": [
                {
                    "tag": "malware warning by abney associates review blog"
                }
            ],
            "collections": [],
            "relations": {},
            "dateAdded": "2013-02-21T03:50:55Z",
            "dateModified": "2013-02-21T03:50:55Z"
        }
    },
    {
        "key": "T3PA5Q36",
        "version": 9,
        "library": {
            "type": "group",
            "id": 133350,
            "name": "Abney Associates",
            "links": {
                "alternate": {
                    "href": "https://www.zotero.org/groups/abney_associates",
                    "type": "text/html"
                }
            }
        },
        "links": {
            "self": {
                "href": "https://api.zotero.org/groups/133350/items/T3PA5Q36",
                "type": "application/json"
            },
            "alternate": {
                "href": "https://www.zotero.org/groups/abney_associates/items/T3PA5Q36",
                "type": "text/html"
            }
        },
        "meta": {
            "createdByUser": {
                "id": 1254717,
                "username": "clausenholmberg23",
                "name": "Clausen Holmberg",
                "links": {
                    "alternate": {
                        "href": "https://www.zotero.org/clausenholmberg23",
                        "type": "text/html"
                    }
                }
            },
            "creatorSummary": "Clausen Holmberg",
            "numChildren": 0
        },
        "data": {
            "key": "T3PA5Q36",
            "version": 9,
            "itemType": "journalArticle",
            "title": "Abney and Associates Reviews on Cyber War Warning: RCMP WAN-van een nieuwe Computer oplichting",
            "creators": [
                {
                    "creatorType": "author",
                    "firstName": "",
                    "lastName": "Clausen Holmberg"
                }
            ],
            "abstractNote": "De RCMP is van een nieuwe computer scam waarschuwing nadat ze hebben ontvangen rapporten van individuen die zeggen dat hun computers zijn worden bevroren of zij is \"vergrendeld\" van hun computer na ontvangst van pop-upberichten waarschuwing hen dat hun computer gekoppeld aan pornografie is geweest.\n\nDeze waarschuwingsberichten, die beweren te zijn van de RCMP, vertel de ontvanger om te betalen $100 via Ukash zodat hun computer worden kan \"ontgrendeld\". Ontvangers van dit pop-upberichten worden verder gewaarschuwd dat als zij niet betalen de $100 boete binnen 72 uur strafrechtelijke procedure tegen hen zal beginnen.\n\nDit soort berichten, beter bekend als scareware, zijn ontworpen om dergelijke schokken en angst dat slachtoffers reageren door het versturen van geld snel te maken.\n\nAls u een van deze berichten, ontvangt de RCMP gewaarschuwd dat is het een oplichterij, en niet te betalen van de $100. Als u zijn vergrendeld uit uw computer, is het een indicator die uw systeem kan zijn besmet met malware en u zult moeten stappen het probleem aan te pakken.\n\nAls u een scareware bericht hebt ontvangen, wordt u gevraagd om contact met politie en het Canadian Centre van het Bureau voor fraudebestrijding op 1-888-495-8501 om te melden.",
            "publicationTitle": "",
            "publisher": "",
            "place": "",
            "date": "",
            "volume": "",
            "issue": "",
            "section": "",
            "partNumber": "",
            "partTitle": "",
            "pages": "",
            "series": "",
            "seriesTitle": "",
            "seriesText": "",
            "journalAbbreviation": "",
            "DOI": "",
            "citationKey": "",
            "url": "http://windsorite.ca/2013/02/rcmp-warn-of-a-new-computer-scam/",
            "accessDate": "",
            "PMID": "",
            "PMCID": "",
            "ISSN": "",
            "archive": "",
            "archiveLocation": "",
            "shortTitle": "",
            "language": "",
            "libraryCatalog": "",
            "callNumber": "",
            "rights": "",
            "extra": "",
            "tags": [
                {
                    "tag": "Abney and Associates Reviews on Cyber War Warning, RCMP WAN-van een nieuwe Computer oplichting"
                }
            ],
            "collections": [],
            "relations": {},
            "dateAdded": "2013-02-20T10:57:30Z",
            "dateModified": "2013-02-20T10:57:30Z"
        }
    },
    {
        "key": "VETUDSQD",
        "version": 8,
        "library": {
            "type": "group",
            "id": 133350,
            "name": "Abney Associates",
            "links": {
                "alternate": {
                    "href": "https://www.zotero.org/groups/abney_associates",
                    "type": "text/html"
                }
            }
        },
        "links": {
            "self": {
                "href": "https://api.zotero.org/groups/133350/items/VETUDSQD",
                "type": "application/json"
            },
            "alternate": {
                "href": "https://www.zotero.org/groups/abney_associates/items/VETUDSQD",
                "type": "text/html"
            }
        },
        "meta": {
            "createdByUser": {
                "id": 1299494,
                "username": "beatrizlopez",
                "name": "",
                "links": {
                    "alternate": {
                        "href": "https://www.zotero.org/beatrizlopez",
                        "type": "text/html"
                    }
                }
            },
            "numChildren": 0
        },
        "data": {
            "key": "VETUDSQD",
            "version": 8,
            "itemType": "newspaperArticle",
            "title": "Abney and Associates – Informaticien cherche des moyens de lutte contre la fraude",
            "creators": [],
            "abstractNote": "Jeremy Wendt, chercheur en sciences informatiques Sandia National Laboratories, se concentre sur travaille sur un programme pour découvrir les proies probables des emails infâmes.\n\nLe maillon faible dans nombreux réseaux informatiques est un homme crédule. Dans cet esprit, chercheur en sciences informatiques Sandia National Laboratories Jeremy Wendt veut comprendre comment reconnaître des cibles potentielles d'e-mails infâmes et les mettre sur leurs gardes. – Phys. Org\n\nIl vise à réduire le chiffre de visiteurs que cyber analystes doivent vérifier comme possibles méchants parmi des milliers qui recherche Sandia sites chaque jour.\n\nSpear phishing, en envoyant un email à des milliers d'adresses ou d'une adresse spécifique dans le but de quelqu'un va tomber pour une arnaque et suivez le lien que disposaient, dans l'espoir d'attirer en donnant des détails, de bancaires, c'est ce qu'il voulait vraiment à repérer.\n\nWendt a développé des algorithmes qui séparent les robots d'indexation web robotisés de personnes qui utilisent des navigateurs. Comme cru par Wendt, cela permettra aux analystes d'examiner séparément des groupes et ainsi améliorera la sécurité et aidera comme montre de l'arnaque.\n\nWendt a dit, même si un étranger a pénétré dans une machine de Sandia qui n'a pas beaucoup d'informations, que l'accès rend plus facile d'entrer dans une autre machine qui peut avoir quelque chose.\n\n« Spear phishing est effrayant, parce qu'aussi longtemps que vous avez des gens qui utilisent des ordinateurs, ils pourraient être trompés en ouvrir quelque chose, qu'ils ne devraient pas, » dit-il.\n\nIdentifier l'intention malveillante\n\nLa capacité d'identifier l'intention possible d'envoyer le contenu malveillant pourrait permettre aux experts de la sécurité de sensibiliser une cible potentielle, a déclaré Roger Suppona de Sandia cyber security. « Plus important encore, nous pourrons fournir des détails qui seraient beaucoup plus utiles dans l'élévation de conscience que ne le ferait une exhortation générique pour se méfier des e-mails entrants ou d'autres messages, » dit-il.\n\nWendt a présenté son travail à une session d'affiches de Sandia dans la dernière ligne droite d'une subvention de deux ans début carrière laboratoire réalisé recherche et développement\n\nWendt a examiné le comportement des robots d'indexation web vs navigateurs, il l'a fait pour déterminer s'il correspond à comment les ordinateurs s'identifient lorsque vous demandez une page Web. Une version spécifique HTML ou HyperText Markup Language langage principal pour l'affichage des pages Web, peuvent généralement être interprété par les navigateurs et fournit souvent des informations système d'exploitation et navigateur. Chenilles en revanche s'identifient par le numéro de version et le nom de programme. « NULL », sous forme d'étiquettes de Wendt, un petit nombre qui n'offre aucune identification. Cependant, le motif est inconnu ; peut-être le programmeur ne comprenait pas que l'information sur le but, ou peut-être parce que quelqu'un veut se cacher.\nWendt a pour but de voir un ordinateur qui n'est pas s'identifier ou dit l'une chose, mais plutôt se comporte comme un autre qui tourne en truc de sites Web à quels pays visiteurs commune un peu attention ou pas du tout intéressés.\n\nlire la suite: http://abneyassociates.org/",
            "publicationTitle": "",
            "publisher": "",
            "place": "",
            "date": "",
            "volume": "",
            "issue": "",
            "edition": "",
            "section": "",
            "pages": "",
            "ISSN": "",
            "DOI": "",
            "citationKey": "",
            "url": "http://abneyassociates.org/2013/02/15/computer-scientist-looks-for-ways-of-fraud-prevention/",
            "accessDate": "",
            "archive": "",
            "archiveLocation": "",
            "shortTitle": "",
            "language": "",
            "libraryCatalog": "",
            "callNumber": "",
            "rights": "",
            "extra": "",
            "tags": [
                {
                    "tag": "An abney and associates internet threats review"
                }
            ],
            "collections": [],
            "relations": {},
            "dateAdded": "2013-02-16T06:07:01Z",
            "dateModified": "2013-02-16T06:07:01Z"
        }
    },
    {
        "key": "QDD73PQF",
        "version": 7,
        "library": {
            "type": "group",
            "id": 133350,
            "name": "Abney Associates",
            "links": {
                "alternate": {
                    "href": "https://www.zotero.org/groups/abney_associates",
                    "type": "text/html"
                }
            }
        },
        "links": {
            "self": {
                "href": "https://api.zotero.org/groups/133350/items/QDD73PQF",
                "type": "application/json"
            },
            "alternate": {
                "href": "https://www.zotero.org/groups/abney_associates/items/QDD73PQF",
                "type": "text/html"
            }
        },
        "meta": {
            "createdByUser": {
                "id": 1286186,
                "username": "mardie2013",
                "name": "",
                "links": {
                    "alternate": {
                        "href": "https://www.zotero.org/mardie2013",
                        "type": "text/html"
                    }
                }
            },
            "creatorSummary": "mardie ",
            "numChildren": 0
        },
        "data": {
            "key": "QDD73PQF",
            "version": 7,
            "itemType": "journalArticle",
            "title": "International Abney Associates Blog Review - NUMERIEKE SYSTEEM | wattpad",
            "creators": [
                {
                    "creatorType": "author",
                    "firstName": "lavender",
                    "lastName": "mardie "
                }
            ],
            "abstractNote": "http://www.wattpad.com/12261160-international-abney-associates-blog-review\n\n\nInternational Abney Associates Blog Review\n\nPC spreken: Een Abney en vennoten Internet en technologie onderzoekslab.\nNumeral in de informatica systemen zijn interne representaties van numerieke waarden om machines, software en hardware opgenomen om het te begrijpen. De gebruikelijke indeling waarin het is opgeslagen met staat bekend als bits.\n\n\nSource: http://abneyandassociates.blogspot.com/",
            "publicationTitle": "",
            "publisher": "",
            "place": "",
            "date": "",
            "volume": "",
            "issue": "",
            "section": "",
            "partNumber": "",
            "partTitle": "",
            "pages": "",
            "series": "",
            "seriesTitle": "",
            "seriesText": "",
            "journalAbbreviation": "",
            "DOI": "",
            "citationKey": "",
            "url": "http://www.wattpad.com/12261160-international-abney-associates-blog-review",
            "accessDate": "",
            "PMID": "",
            "PMCID": "",
            "ISSN": "",
            "archive": "",
            "archiveLocation": "",
            "shortTitle": "",
            "language": "",
            "libraryCatalog": "",
            "callNumber": "",
            "rights": "",
            "extra": "",
            "tags": [
                {
                    "tag": "international abney associates blog review"
                }
            ],
            "collections": [],
            "relations": {},
            "dateAdded": "2013-02-15T11:48:45Z",
            "dateModified": "2013-02-15T11:48:45Z"
        }
    },
    {
        "key": "8CGES7JM",
        "version": 6,
        "library": {
            "type": "group",
            "id": 133350,
            "name": "Abney Associates",
            "links": {
                "alternate": {
                    "href": "https://www.zotero.org/groups/abney_associates",
                    "type": "text/html"
                }
            }
        },
        "links": {
            "self": {
                "href": "https://api.zotero.org/groups/133350/items/8CGES7JM",
                "type": "application/json"
            },
            "alternate": {
                "href": "https://www.zotero.org/groups/abney_associates/items/8CGES7JM",
                "type": "text/html"
            }
        },
        "meta": {
            "createdByUser": {
                "id": 1201990,
                "username": "franchescablit",
                "name": "franchesca blit",
                "links": {
                    "alternate": {
                        "href": "https://www.zotero.org/franchescablit",
                        "type": "text/html"
                    }
                }
            },
            "creatorSummary": "franchesca blit ",
            "numChildren": 0
        },
        "data": {
            "key": "8CGES7JM",
            "version": 6,
            "itemType": "journalArticle",
            "title": "Abney Associates Internet Technology Spain: Obama’s Cybersecurity Executive Order Falls Short",
            "creators": [
                {
                    "creatorType": "author",
                    "firstName": "",
                    "lastName": "franchesca blit "
                }
            ],
            "abstractNote": "In his State of the Union address, President Obama announced that he had signed an executive order (EO) on cybersecurity. The order uses a standard-setting approach to improve cybersecurity. However, such a model will only impose costs, encourage compliance over security, keep the U.S. tied to past threats, and threaten innovation.\nWhile the EO does take some positive steps in the area of information sharing, these steps are hamstrung by the EO’s inability to provide critical incentives such as liability protection. As a result, this order could result in few modest changes, or it could result in substantial negative effects.\n\nThe Scope of the Order\nThe EO uses a very broad definition of critical infrastructure, defining it as “systems and assets, whether physical or virtual, so vital to the United States that the incapacity or destruction of such systems and assets would have a debilitating impact on security, national economic security, national public health or safety, or any combination of those matters.”\nSuch a broad definition could be understood to include systems normally considered outside the cybersecurity conversation, such as agriculture. While there is no way of knowing how far implementation will actually go, this broad definition is certainly concerning.\nInhibited Information Sharing\nIn Section 4, the EO attempts to expand information sharing in several noteworthy ways. It calls for the federal government to quickly move unclassified information to the private sector and increase the number of security clearances given to appropriate owners of covered infrastructure. Additionally, the EO expands already existing information-sharing systems such as the Defense Industrial Base (DIB) Enhanced Cyber Services and Cyber Security/Information Assurance Program. These objectives are worthwhile, and the President should be applauded for including them.\nHowever, these worthwhile pursuits will not be very effective because the EO must rely completely on existing authorities. Essentially, it directs government agencies to do a better job of sharing information than they already are. And where it does expand programs, such as with the DIB, these efforts will not be effective without additional incentives and protections to get more businesses involved. These include liability, Freedom of Information Act (FOIA), and regulatory-use protections.\nThe problem is that the EO cannot provide these important protections—they can be created only by Congress. As a result, many businesses will be reluctant to share their information for fear that their proprietary information could be endangered by a FOIA request or that an honest mistake might lead to a lawsuit being filed against them. Regarding other private-to-private or private-to-government solutions, the EO is silent.\nAlthough the information-sharing provisions are limited, the privacy protections for this limited sharing are actually where they should be. The EO calls for consultation with privacy officers and oversight reports on the order’s implementation. While some may find this provision weak, effective oversight is the best way to respect privacy concerns while not limiting information sharing that enhances the nation’s security.",
            "publicationTitle": "",
            "publisher": "",
            "place": "",
            "date": "",
            "volume": "",
            "issue": "",
            "section": "",
            "partNumber": "",
            "partTitle": "",
            "pages": "",
            "series": "",
            "seriesTitle": "",
            "seriesText": "",
            "journalAbbreviation": "",
            "DOI": "",
            "citationKey": "",
            "url": "http://www.heritage.org/research/reports/2013/02/obama-s-cybersecurity-executive-order-falls-short",
            "accessDate": "",
            "PMID": "",
            "PMCID": "",
            "ISSN": "",
            "archive": "",
            "archiveLocation": "",
            "shortTitle": "",
            "language": "",
            "libraryCatalog": "",
            "callNumber": "",
            "rights": "",
            "extra": "",
            "tags": [
                {
                    "tag": "Abney Associates Internet Technology Spain"
                }
            ],
            "collections": [],
            "relations": {},
            "dateAdded": "2013-02-15T08:56:36Z",
            "dateModified": "2013-02-15T08:56:36Z"
        }
    },
    {
        "key": "QTK2F67B",
        "version": 5,
        "library": {
            "type": "group",
            "id": 133350,
            "name": "Abney Associates",
            "links": {
                "alternate": {
                    "href": "https://www.zotero.org/groups/abney_associates",
                    "type": "text/html"
                }
            }
        },
        "links": {
            "self": {
                "href": "https://api.zotero.org/groups/133350/items/QTK2F67B",
                "type": "application/json"
            },
            "alternate": {
                "href": "https://www.zotero.org/groups/abney_associates/items/QTK2F67B",
                "type": "text/html"
            }
        },
        "meta": {
            "createdByUser": {
                "id": 1246596,
                "username": "haideeloidie",
                "name": "",
                "links": {
                    "alternate": {
                        "href": "https://www.zotero.org/haideeloidie",
                        "type": "text/html"
                    }
                }
            },
            "creatorSummary": "haidee ",
            "numChildren": 0
        },
        "data": {
            "key": "QTK2F67B",
            "version": 5,
            "itemType": "journalArticle",
            "title": "International Abney Associates Blog Review | NUMERIEKE SYSTEEM",
            "creators": [
                {
                    "creatorType": "author",
                    "firstName": "loidie",
                    "lastName": "haidee "
                }
            ],
            "abstractNote": "http://abneyassociates.org/numeral-system/\n\n\nPC spreken: Een Abney en vennoten Internet en technologie onderzoekslab.\n\nNumeral in de informatica systemen zijn interne representaties van numerieke waarden om machines, software en hardware opgenomen om het te begrijpen. De gebruikelijke indeling waarin het is opgeslagen met staat bekend als bits.\n\nSource: http://abneyandassociates.blogspot.com/",
            "publicationTitle": "",
            "publisher": "",
            "place": "",
            "date": "",
            "volume": "",
            "issue": "",
            "section": "",
            "partNumber": "",
            "partTitle": "",
            "pages": "",
            "series": "",
            "seriesTitle": "",
            "seriesText": "",
            "journalAbbreviation": "",
            "DOI": "",
            "citationKey": "",
            "url": "http://abneyandassociates.blogspot.com",
            "accessDate": "",
            "PMID": "",
            "PMCID": "",
            "ISSN": "",
            "archive": "",
            "archiveLocation": "",
            "shortTitle": "",
            "language": "",
            "libraryCatalog": "",
            "callNumber": "",
            "rights": "",
            "extra": "",
            "tags": [
                {
                    "tag": " international abney associates blog review"
                }
            ],
            "collections": [],
            "relations": {},
            "dateAdded": "2013-02-14T13:42:33Z",
            "dateModified": "2013-02-14T13:42:33Z"
        }
    },
    {
        "key": "VJF63FKK",
        "version": 4,
        "library": {
            "type": "group",
            "id": 133350,
            "name": "Abney Associates",
            "links": {
                "alternate": {
                    "href": "https://www.zotero.org/groups/abney_associates",
                    "type": "text/html"
                }
            }
        },
        "links": {
            "self": {
                "href": "https://api.zotero.org/groups/133350/items/VJF63FKK",
                "type": "application/json"
            },
            "alternate": {
                "href": "https://www.zotero.org/groups/abney_associates/items/VJF63FKK",
                "type": "text/html"
            }
        },
        "meta": {
            "createdByUser": {
                "id": 1299494,
                "username": "beatrizlopez",
                "name": "",
                "links": {
                    "alternate": {
                        "href": "https://www.zotero.org/beatrizlopez",
                        "type": "text/html"
                    }
                }
            },
            "numChildren": 0
        },
        "data": {
            "key": "VJF63FKK",
            "version": 4,
            "itemType": "blogPost",
            "title": "Abney Associates - Mise en garde sur la technologie « espionnage » réseautage sociale",
            "creators": [],
            "abstractNote": "Nouveau logiciel de traque capable de mouvements populaires de suivi et de prédire le comportement futur à l'aide de données provenant de sites de réseaux sociaux a été développé, il est apparu aujourd'hui.\n\nLa technologie sophistiquée s'appuie sur des sites comme Facebook et Twitter pour dresser un tableau détaillé de la vie des gens dans un geste qui pourrait soulever des préoccupations sur la violation de la vie privée et des libertés civiles.\nLe système a été créé par Raytheon, l'entrepreneur américain de la défense géant.\nIl a été allégué que la technologie pourrait être transformée en un « Google pour espions » et utilisée par les gouvernements comme un moyen de surveillance et de contrôle des personnes en ligne.\nLa compagnie a insisté pour que le logiciel – surnommé « Émeute » ou rapide de superposition informatique – n'avait pas été vendu à des clients, mais a été partagé avec le gouvernement des États-Unis en 2010.\nMouvement suit la controverse sur le projet de loi de Communications en Grande-Bretagne qui autoriserait la surveillance des appels téléphoniques, courriels et utilisation d'internet.\n\nMinistres insistent les réformes sont indispensables pour lutter contre les pédophiles, les extrémistes et les fraudeurs, mais des libertés civiles ont attaqué le champ d'application de la Loi et il marque une « Charte des fureteurs ».\nUne vidéo obtenue par le gardien journal révèle comment le système de logiciel peut recueillir des renseignements personnels sur les personnes-y compris leurs amis, les intérêts et les lieux qu'ils visitent – depuis les sites de réseautage social y compris Foursquare, un téléphone mobile app permettant d'avertir les amis de leurs allées et venues.\nDans la vidéo, le logiciel analyse le comportement d'un employé de Raytheon – Nick – pour montrer les endroits qu'il a utilisé son smartphone, le jour ou le moment de la majorité de l'activité internet et de l'emplacement des photos postées en ligne.\n\"Nous savons où va Nick, nous savons ce que Nick on dirait que, maintenant, nous voulons essayer de prédire où il peut être à l'avenir, » dit la vidéo.\nGinger McCall, de l'américain Electronic Privacy Information Centre, a dit le Raytheon, la technologie surélevées préoccupations au sujet des données personnelles pourraient être recueillies secrètement sans autorisation du peuple.\n« Sites de réseautage social ne sont souvent pas transparents au sujet de ce que l'information est partagée et comment elle est partagée, » dit-elle.\n« Les utilisateurs peuvent être affichant des informations qu'ils jugent sera considéré uniquement par leurs amis, mais au lieu de cela, c'est d'être lus par des responsables gouvernementaux ou tiré par les services de collecte des données comme la recherche de l'émeute. »\nPorte-parole de la compagnie américaine n'a pas pu être contacté, quand s'est approché par le Telegraph dimanche.\nMais un porte-parole avait auparavant confirmé que la vidéo était un produit « proof of concept » qui n'a pas été vendu à tous les clients.\n« Riot est une conception de système de Google analytics de données volumineuses que nous travaillons avec l'industrie, les laboratoires nationaux et les partenaires commerciaux pour aider à transformer des quantités massives de données en information utilisable pour répondre aux besoins de sécurité évolue rapidement de notre nation », dit-il.\n« Ses caractéristiques innovantes de la vie privée sont plus fortes que nous sommes au courant, ce qui permet le partage et l'analyse des données sans les informations personnellement identifiables [tels que les numéros de sécurité sociale, Banque ou autres informations de compte financier] étant révélée. »",
            "blogTitle": "Abney Associates - Mise en garde sur la technologie « espionnage » réseautage sociale",
            "websiteType": "",
            "date": "",
            "DOI": "",
            "citationKey": "",
            "url": "http://www.telegraph.co.uk/technology/news/9861155/Warning-over-social-networking-snooping-technology.html",
            "accessDate": "",
            "ISSN": "",
            "shortTitle": "",
            "language": "",
            "rights": "",
            "extra": "",
            "tags": [
                {
                    "tag": "abney associates technology review"
                }
            ],
            "collections": [],
            "relations": {},
            "dateAdded": "2013-02-14T05:49:11Z",
            "dateModified": "2013-02-14T05:49:11Z"
        }
    },
    {
        "key": "I9B73PFS",
        "version": 1,
        "library": {
            "type": "group",
            "id": 133350,
            "name": "Abney Associates",
            "links": {
                "alternate": {
                    "href": "https://www.zotero.org/groups/abney_associates",
                    "type": "text/html"
                }
            }
        },
        "links": {
            "self": {
                "href": "https://api.zotero.org/groups/133350/items/I9B73PFS",
                "type": "application/json"
            },
            "alternate": {
                "href": "https://www.zotero.org/groups/abney_associates/items/I9B73PFS",
                "type": "text/html"
            }
        },
        "meta": {
            "createdByUser": {
                "id": 1252153,
                "username": "demiboeke23",
                "name": "",
                "links": {
                    "alternate": {
                        "href": "https://www.zotero.org/demiboeke23",
                        "type": "text/html"
                    }
                }
            },
            "numChildren": 0
        },
        "data": {
            "key": "I9B73PFS",
            "version": 1,
            "itemType": "journalArticle",
            "title": "Abney Associates Internet Technology: Phishing, Email and Internet Scams",
            "creators": [],
            "abstractNote": "Phishing, email and Internet scams are common on the Internet and can include:\nEmails containing virus infected attachments. The two common methods for distribution of viruses and malicious code are via email attachments and downloading malicious code from the Internet. By far the most common method of distribution is by email attachments so exercise caution when opening attachments. The general rule is: If you are not expecting the attachment and don't trust the source - don't open it!\n\nFor information on recognising a phishing email, visit the Microsoft Safety and Security Centre website: How To Recognise a Phishing Email.\n\nFurther information on spam and scams are available below:\nNigeria 419 scams\nHow to recognise spoofed websites\n\n\nWhat is Phishing?\nPhishing is a type of deception aimed at identify theft. In a phishing scam, a malicious person tries to get personal and financial information such as bank account details, credit card numbers, passwords, or other personal information from you by convincing you to give it to them under false pretences.\nPhishing schemes usually come via spam email that contains a link to a fake website such as a banksite or e-bay site.\nA phishing scam begins with a malicious user who sends out millions of fraudulent e-mail messages that appear to come from popular Web sites or from sites that you trust, like your bank or credit card company.\nThe e-mail messages, and the Web sites they often send you to, look official enough that they deceive many people into believing that they're legitimate. Believing that these emails are legitimate, unsuspecting people too often respond to the email's requests for their credit card numbers, passwords, account information, or other personal information.\n\nA scam artist might put a link in a fake e-mail that appears to go to the legitimate Web site, but actually takes you to a scam site or even a pop-up window that looks exactly like the official site. These copies are often called spoofed Web sites. Once you're at one of these spoofed sites or pop-up windows you might unwittingly enter even more personal information that will be transmitted directly to the person who created the spoofed site. That person can then use this information to purchase goods, apply for a new credit card, or steal your identity.\n\nProtect yourself against phishing\nJust as they do in the physical world, scam artists will continue to develop new and more sinister ways to trick you online. But following these five steps can help you protect your personal information.\n\nNever respond to requests for personal information via e-mail or in a pop-up window. If in doubt, call the institution that claims to be the sender of the e-mail or pop-up window. Australian Banks never send emails containing weblinks to login sites for bank accounts.\nAvoid clicking on weblinks included in suspicious emails as you may download a virus or malicious code by visiting the site. Instead visit web sites by typing the URL into your address bar or by having the URL already bookmarked.\nCheck to make sure the Web site is using encryption by looking for the yellow padlock on the website (although this is increasingly being faked as well).\nRoutinely review your credit card and bank statements.\nReport suspected abuses of your personal information to the proper authorities.",
            "publicationTitle": "",
            "publisher": "",
            "place": "",
            "date": "",
            "volume": "",
            "issue": "",
            "section": "",
            "partNumber": "",
            "partTitle": "",
            "pages": "",
            "series": "",
            "seriesTitle": "",
            "seriesText": "",
            "journalAbbreviation": "",
            "DOI": "",
            "citationKey": "",
            "url": "http://www.scu.edu.au/it/index.php/20",
            "accessDate": "",
            "PMID": "",
            "PMCID": "",
            "ISSN": "",
            "archive": "",
            "archiveLocation": "",
            "shortTitle": "",
            "language": "",
            "libraryCatalog": "",
            "callNumber": "",
            "rights": "",
            "extra": "",
            "tags": [
                {
                    "tag": "Abney Associates Internet Technology"
                }
            ],
            "collections": [],
            "relations": {},
            "dateAdded": "2013-02-06T01:24:08Z",
            "dateModified": "2013-02-06T01:24:08Z"
        }
    },
    {
        "key": "NJHZCP24",
        "version": 1,
        "library": {
            "type": "group",
            "id": 133350,
            "name": "Abney Associates",
            "links": {
                "alternate": {
                    "href": "https://www.zotero.org/groups/abney_associates",
                    "type": "text/html"
                }
            }
        },
        "links": {
            "self": {
                "href": "https://api.zotero.org/groups/133350/items/NJHZCP24",
                "type": "application/json"
            },
            "alternate": {
                "href": "https://www.zotero.org/groups/abney_associates/items/NJHZCP24",
                "type": "text/html"
            }
        },
        "meta": {
            "createdByUser": {
                "id": 1201990,
                "username": "franchescablit",
                "name": "franchesca blit",
                "links": {
                    "alternate": {
                        "href": "https://www.zotero.org/franchescablit",
                        "type": "text/html"
                    }
                }
            },
            "creatorSummary": "An Abney and Associates International Blog: As the Dow Soars, How High Can Tech Stocks Go?",
            "numChildren": 0
        },
        "data": {
            "key": "NJHZCP24",
            "version": 1,
            "itemType": "journalArticle",
            "title": "An Abney and Associates International Blog: As the Dow Soars, How High Can Tech Stocks Go?",
            "creators": [
                {
                    "creatorType": "author",
                    "firstName": "",
                    "lastName": "An Abney and Associates International Blog: As the Dow Soars, How High Can Tech Stocks Go?"
                }
            ],
            "abstractNote": "Last Friday, the Dow Jones Industrial Average — the benchmark stock index of America’s blue chip companies – closed above 14,000 for the first time since the financial meltdown sent the U.S. economy into the worst crisis in decades. The continued resurgence of the U.S. auto industry and growing optimism about the overall economy helped propel the Dow above the psychologically important 14,000 point level. The surging Dow is an indication of the increasing financial health of the largest American companies, a bright spot in an otherwise shaky U.S. economic recovery, particularly with respect to unemployment.\nAmerica’s blue chip firms — including industrial giants, banks, and auto companies — are healthier than they’ve been in years. But what about the largest U.S. tech companies? Like the other major stock indices, the tech-heavy Nasdaq index is at or near multi-year highs. On Friday alone, the Nasdaq rose 1%, nearly touching the index’s five-year high, which it hit last September, driven in part by tech juggernaut Apple, which had just released the iPhone 5. But Wall Street sentiment has soured on Apple in recent months, somewhat tempering the Nasdaq’s continued ascent.\nHow high can tech stocks go? Given Apple’s size — it’s the largest tech company in the world — it makes sense to begin any forward-looking evaluation of the Nasdaq with the Cupertino, Calif.-based cash machine. Apple constitutes about 12% of the Nasdaq’s valuation, and there’s no question the company’s recent stock swoon has placed a drag on the tech-heavy index. Let’s take a look at Apple and three other important Nasdaq companies.\nTwo weeks ago, for the third consecutive quarter, Apple fell short of analyst estimates, sending the company’s stock down 10% in after-hours trading, wiping out nearly $50 billion in shareholder value. Although it reported record financial results, Apple’s slowing growth rate has spooked investors, who are growing increasingly concerned about the next stage in the company’s epic story.\nCan Apple maintain its heretofore astonishing growth-rate on the back of existing products like the iPhone and the iPad or does the company need new, breakthrough products? Investors seem to think the latter, which explains why its stock has declined 26% over the last six months. As the largest single component of the Nasdaq index, Apple’s continued growth is crucial for the tech-heavy stock tracker.\nIf there’s a true standout among big tech stocks, it’s clearly Internet titan Google, which hit a record high on Friday, closing up 2.6% to $775.60, the highest value since the company went public in August 2004, according to Bloomberg. As rival Apple has stumbled, Google shares have increased 30% over the last year. Google now has a market capitalization of $250 billion, with $50 billion cash on hand. Not bad for a 15-year-old academic project.\nLast month, Google reported strong revenue growth, as the online advertising market keeps shifting away from traditional ad platforms — including print — and toward Internet-based marketing. This trend will continue indefinitely, and as the world’s largest Internet advertising company, Google is perfectly poised to capitalize here.\nAnother bright spot for the Nasdaq is social media colossus Facebook. After a rough few months following the company’s controversial initial public offering, Facebook shares have soared over 30% in the last three months. Last month, Facebook delivered a strong earnings report, with mobile revenue surging from 0% to 23% of total revenue in just one year. That’s another figure that will only increase.\n“Today there is no argument,” Facebook CEO Mark Zuckerberg told Wall Street analysts. “Facebook is a mobile company.” The company’s overall ad sales growth is booming, increasing in the fourth quarter by 41% to $1.3 billion. As the largest of the new class of Nasdaq’s stocks, Facebook’s continued success is crucial for the tech-heavy index, which endured withering criticism of its handling of the IPO.\nIf the Nasdaq has a compelling underdog story right now, it’s a company called Blackberry, formerly known as Research in Motion. (Why it took so many years for the company to make this obvious branding change is beyond me.) Practically left for dead just six months ago, Blackberry is up a whopping 49.6% over the last three months. Last week, Blackberry unveiled its long-awaited Blackberry 10 operating system, and unveiled two slick-looking new Blackberry phones.\nTaking several pages from the Apple/Google playbook, Blackberry announced a marketplace for music and movies, and an app catalog that will include more than 70,000 apps at launch, as TIME’s Techland reported. Blackberry shares are still down over 80% since their 2008 peak, but if the company can launch a product that genuinely competes with Apple and Google, that will be good for the tech sector, because competition spurs innovation, and innovation drives the Nasdaq.\nIt’s important to remember that the health of stock market indices does not necessarily correspond with the overall health of the U.S. economy. In fact, there’s frequently little connection at all. Stock markets are driven by corporate profits, which seem increasingly disconnected from the health of the U.S. consumer, a key driver of the economy. Still, rising corporate revenues, profits, and stock prices are an unambiguously good sign for the U.S. economy. And tech companies are a key element of overall U.S. corporate health.\nWhat drives tech revenues and profits? Consumer and corporate spending. There’s no doubt that investors have grown skittish about Apple, which is weighing on the Nasdaq. But overall, U.S. stock market indices and other key economic measures appear to be contributing to a virtuous cycle — however halting — that will ultimately benefit investors.",
            "publicationTitle": "",
            "publisher": "",
            "place": "",
            "date": "",
            "volume": "",
            "issue": "",
            "section": "",
            "partNumber": "",
            "partTitle": "",
            "pages": "",
            "series": "",
            "seriesTitle": "",
            "seriesText": "",
            "journalAbbreviation": "",
            "DOI": "",
            "citationKey": "",
            "url": "http://business.time.com/2013/02/04/as-the-dow-soars-how-high-can-tech-stocks-go/",
            "accessDate": "",
            "PMID": "",
            "PMCID": "",
            "ISSN": "",
            "archive": "",
            "archiveLocation": "",
            "shortTitle": "",
            "language": "",
            "libraryCatalog": "",
            "callNumber": "",
            "rights": "",
            "extra": "",
            "tags": [
                {
                    "tag": "An Abney and Associates International Blog"
                }
            ],
            "collections": [],
            "relations": {},
            "dateAdded": "2013-02-05T02:19:44Z",
            "dateModified": "2013-02-05T02:19:44Z"
        }
    },
    {
        "key": "NNUJSUUF",
        "version": 1,
        "library": {
            "type": "group",
            "id": 133350,
            "name": "Abney Associates",
            "links": {
                "alternate": {
                    "href": "https://www.zotero.org/groups/abney_associates",
                    "type": "text/html"
                }
            }
        },
        "links": {
            "self": {
                "href": "https://api.zotero.org/groups/133350/items/NNUJSUUF",
                "type": "application/json"
            },
            "alternate": {
                "href": "https://www.zotero.org/groups/abney_associates/items/NNUJSUUF",
                "type": "text/html"
            }
        },
        "meta": {
            "createdByUser": {
                "id": 1106789,
                "username": "agavenwi",
                "name": "winema gaven",
                "links": {
                    "alternate": {
                        "href": "https://www.zotero.org/agavenwi",
                        "type": "text/html"
                    }
                }
            },
            "creatorSummary": "Winema Gaven",
            "numChildren": 0
        },
        "data": {
            "key": "NNUJSUUF",
            "version": 1,
            "itemType": "journalArticle",
            "title": "OSHA Instructors, bill abney and associates, abney associates",
            "creators": [
                {
                    "creatorType": "author",
                    "firstName": "",
                    "lastName": "Winema Gaven"
                }
            ],
            "abstractNote": "bill abney and associates, abney associates\n\nBill Abney is a retired Assistant Professor in the Fire and Safety Engineering Technology Program at Eastern Kentucky University. He has a B.S. in Industrial Technology and an M.S. in Industrial Technology, both from Eastern Kentucky University. With over 30 years in safety education, Mr. Abney specializes in safety management and research; fire, arson, and explosives investigation; OSHA compliance; ergonomics; and hazardous materials.\n\nJim Beck has thirty-six years of experience in the industrial and residential construction industry, with primary emphasis on safety and training. Mr. Beck has been teaching adult safety education since 1983. During his career, he has been employed by various companies with duties ranging from laborer to project superintendent. Mr. Beck has developed and presented adult education program with heavy emphasis on safety training for the construction industry as well as contract training for representatives of DOD, DOE and the EPA. As the Director of Safety and Health for a group of construction companies, Mr. Beck was responsible for OSHA, DOT and EPA compliance.\n\nGary Brown is an Associate Professor in the Department of Environmental Health at Eastern Kentucky University. He has a B.A. in Liberal Science from the State University of New York, an M.S. in Environmental and Occupational Health from Hunter College, and a Dr.P.H. in Occupational Safety and Health from the University of Alabama. Dr. Brown is a Certified Industrial Hygienist and has many professional affiliations, including being past president of the Association of environmental health Academic Programs (AEHAP) and current Undergraduate Mentor for AEHAP. He has over 20 years consulting experience in the environmental, industrial hygiene, and safety arenas.\n\nTom Edwards has over thirty-two years safety and health experience and is the owner of Edwards & Associates, LLC, a safety and industrial hygiene consulting and training firm, which he started in 2003. Prior to that, Mr. Edwards practiced industrial hygiene for the Kentucky Occupational Safety and Health Program for over 26 years, serving as an Industrial Hygiene Compliance Officer, a Safety and Health Specialist, and ultimately as the Industrial Hygiene Program Manager for the Division of Education and Training. He previously served as a part-time Assistant Professor in the Department of Environmental Health Science at Eastern Kentucky University teaching industrial toxicology and industrial hygiene. Mr. Edwards holds a B.S. degree in chemistry from Eastern Kentucky University and a M.S. degree in industrial hygiene from the University of Central Missouri. He is certified in Comprehensive Practice by the American Board of Industrial Hygiene. Read more at this site: http://osha.eku.edu/osha-instructors\n\nbill abney and associates, abney associates",
            "publicationTitle": "",
            "publisher": "",
            "place": "",
            "date": "",
            "volume": "",
            "issue": "",
            "section": "",
            "partNumber": "",
            "partTitle": "",
            "pages": "",
            "series": "",
            "seriesTitle": "",
            "seriesText": "",
            "journalAbbreviation": "",
            "DOI": "",
            "citationKey": "",
            "url": "http://osha.eku.edu/osha-instructors",
            "accessDate": "",
            "PMID": "",
            "PMCID": "",
            "ISSN": "",
            "archive": "",
            "archiveLocation": "",
            "shortTitle": "",
            "language": "",
            "libraryCatalog": "",
            "callNumber": "",
            "rights": "",
            "extra": "",
            "tags": [
                {
                    "tag": "bill abney and associates, abney associates"
                }
            ],
            "collections": [],
            "relations": {},
            "dateAdded": "2012-12-20T05:48:10Z",
            "dateModified": "2012-12-20T05:48:10Z"
        }
    }
]