[
    {
        "key": "FK25FINE",
        "version": 8,
        "library": {
            "type": "group",
            "id": 138467,
            "name": "Abney and Associates",
            "links": {
                "alternate": {
                    "href": "https://www.zotero.org/groups/abney_and_associates",
                    "type": "text/html"
                }
            }
        },
        "links": {
            "self": {
                "href": "https://api.zotero.org/groups/138467/items/FK25FINE",
                "type": "application/json"
            },
            "alternate": {
                "href": "https://www.zotero.org/groups/abney_and_associates/items/FK25FINE",
                "type": "text/html"
            },
            "up": {
                "href": "https://api.zotero.org/groups/138467/items/E2WUXKMI",
                "type": "application/json"
            }
        },
        "meta": {
            "numChildren": 0
        },
        "data": {
            "key": "FK25FINE",
            "version": 8,
            "parentItem": "E2WUXKMI",
            "itemType": "note",
            "note": "<p class=\"MsoNormal\"><strong>latest abney and associates technology news Google's Eric Schmidt Invests in Obama's Big Data Brains</strong></p>\n<p class=\"MsoNormal\"><a href=\"http://www.allvoices.com/contributed-news/14685927-reviews-by-abney-and-associates-code-85258081704-blogfc2\">During the 2012 campaign</a>, Barack Obama&rsquo;s reelection team had an underappreciated asset: Google&rsquo;s (GOOG) executive chairman, Eric Schmidt. He helped recruit talent, choose technology, and coach the campaign manager, Jim Messina, on the finer points of leading a large organization. &ldquo;On election night he was in our boiler room in Chicago,&rdquo; says David Plouffe, then a senior White House adviser. Schmidt had a particular affinity for a group of engineers and statisticians tucked away beneath a disco ball in a darkened corner of the office known as &ldquo;the Cave.&rdquo;</p>\n<p class=\"MsoNormal\">The data analytics team, led by 30-year-old Dan Wagner, is credited with producing Obama&rsquo;s surprising 5 million-vote margin of victory.</p>\n<p class=\"MsoNormal\"><a href=\"http://www.myvideo.de/watch/9001514/International_Internet_and_Technology_Warning_Abney_Associates_Review\">For all its acclaim</a>, the analytics team&rsquo;s main achievement is often misunderstood as &ldquo;microtargeting&rdquo; or some variant on wooing voters. This reverses the relationship between campaign and voter at the heart of Wagner&rsquo;s method. Recent campaigns have employed a top-down approach to identify what they thought were vital demographic groups such as &ldquo;soccer moms.&rdquo; Wagner&rsquo;s team pursued a bottom-up strategy of unifying vast commercial and political databases to understand the proclivities of individual voters likely to support Obama or be open to his message, and then sought to persuade them through personalized contact via Facebook (FB), e-mail, or a knock on the door. &ldquo;I think of them as people scientists,&rsquo;&rsquo; says Schmidt. &ldquo;They apply scientific techniques to how people will behave when confronted with a choice or a question.&rdquo; Obama&rsquo;s rout of Mitt Romney was a lesson in how this insight can translate into political strength.</p>\n<p class=\"MsoNormal\"><a href=\"http://www.care2.com/c2c/share/detail/3590059\">Traditional marketing</a> has the same inherent limitation as traditional campaigning: It&rsquo;s impossible to appeal to everybody, even among the groups likeliest to favor a product. &ldquo;Budweiser might target football fans with an ad showing half-naked women jumping up and down with a bottle of beer,&rdquo; says M. Eric Johnson, director of the Center for Digital Strategies at Dartmouth College&rsquo;s Tuck School of Business. &ldquo;They&rsquo;re trying to build something that appeals to a huge segment of people. It may be the right segment. But they know they&rsquo;re losing a bunch of people, who either won&rsquo;t like the ad or won&rsquo;t be persuaded by it.&rdquo; Analytics offers the potential of capturing these people, too.</p>\n<p class=\"MsoNormal\">&ldquo;Big Data gives you the ability to personalize,&rdquo; says Johnson, &ldquo;to know me well enough to understand that, while I like beer, I don&rsquo;t want to see half-naked women jumping around with a can of Bud.&rdquo;</p>\n<p class=\"MsoNormal\"><a href=\"http://copytaste.com/t3480\">Wagner took an unlikely route to the Cave.</a> In 2007 he was volunteering at Obama&rsquo;s Chicago headquarters as an organizer of phone banks targeting Latino voters. As a hobby, he built a special calculator for caucuses that could determine how many voters a candidate would need to take from a rival to gain an additional delegate. &ldquo;It was essentially a game-theory application designed for use in the Iowa caucus,&rdquo; he says.</p>\n<p class=\"MsoNormal\">&nbsp;</p>\n<p class=\"MsoNormal\">Wagner showed his creation to some colleagues and shortly after was summoned to the office of the campaign&rsquo;s Illinois director, Jon Carson. &ldquo;This is very interesting,&rdquo; Carson recalls telling him. &ldquo;How soon can you move to Iowa?</p>\n<p class=\"MsoNormal\">Can you go in three days?&rdquo; Wagner spent the remainder of the primary season traveling from state to state and led the voter targeting effort in the Midwest during the 2008 general election. He later went to work for the Democratic National Committee, where his team accurately forecast the Democrats&rsquo; blowout loss in the 2010 midterm elections.</p>\n<p class=\"MsoNormal\">By the time Wagner signed on as chief analytics officer for Obama&rsquo;s 2012 campaign, it was clear Big Data would be central to the reelection strategy. Along with identifying potential supporters, Wagner&rsquo;s team built intricate mathematical models of swing states that provided an alternative to traditional polls. &ldquo;Those guys were our bible,&rdquo; says Plouffe. &ldquo;They consistently told us what was really going on.&rdquo; During the final month, the campaign&rsquo;s internal tracking polls of Ohio, a pivotal swing state, suddenly grew erratic; one night Obama would be up four, the next down by one. &ldquo;There were people in the campaign completely wigging out,&rdquo; Plouffe says. Wagner&rsquo;s model, by contrast, showed a steady three- to four-point lead for Obama that proved accurate.</p>\n<p class=\"MsoNormal\">Schmidt&rsquo;s introduction to Wagner didn&rsquo;t seem likely to lead to a business collaboration. Each day at 4:30 p.m., to let off steam, the Cave&rsquo;s inhabitants would flip off the lights, fire up the disco ball, and spend five minutes dancing to a mash-up of Psy&rsquo;s Gangnam Style and a campaign robocall voiced in a dulcet baritone by Wagner&rsquo;s deputy, Andrew Claster. Schmidt showed up to meet Wagner just as &ldquo;Club Claster&rdquo; was kicking off. No stranger to creative eccentricity, he was unfazed, and when the campaign ended, he agreed to keep the party going.</p>\n<p class=\"MsoNormal\"><strong>latest abney and associates technology news Google's Eric Schmidt Invests in Obama's Big Data Brains</strong></p>\n<p class=\"MsoNormal\">SEE MORE ARTICLES &amp; VIDEOS:</p>\n<p class=\"MsoNormal\"><a href=\"http://www.allvoices.com/contributed-news/14685927-reviews-by-abney-and-associates-code-85258081704-blogfc2\">http://www.allvoices.com/contributed-news/14685927-reviews-by-abney-and-associates-code-85258081704-blogfc2</a></p>\n<p><span style=\"font-size: 11.0pt; line-height: 115%; font-family: 'Calibri','sans-serif'; mso-ascii-theme-font: minor-latin; mso-fareast-font-family: Calibri; mso-fareast-theme-font: minor-latin; mso-hansi-theme-font: minor-latin; mso-bidi-font-family: 'Times New Roman'; mso-bidi-theme-font: minor-bidi; mso-ansi-language: EN-US; mso-fareast-language: EN-US; mso-bidi-language: AR-SA;\"><a href=\"http://www.myvideo.de/watch/9001514/International_Internet_and_Technology_Warning_Abney_Associates_Review\">http://www.myvideo.de/watch/9001514/International_Internet_and_Technology_Warning_Abney_Associates_Review</a></span></p>",
            "tags": [],
            "relations": {},
            "dateAdded": "2013-06-05T02:42:21Z",
            "dateModified": "2013-06-05T02:42:21Z"
        }
    },
    {
        "key": "E2WUXKMI",
        "version": 8,
        "library": {
            "type": "group",
            "id": 138467,
            "name": "Abney and Associates",
            "links": {
                "alternate": {
                    "href": "https://www.zotero.org/groups/abney_and_associates",
                    "type": "text/html"
                }
            }
        },
        "links": {
            "self": {
                "href": "https://api.zotero.org/groups/138467/items/E2WUXKMI",
                "type": "application/json"
            },
            "alternate": {
                "href": "https://www.zotero.org/groups/abney_and_associates/items/E2WUXKMI",
                "type": "text/html"
            }
        },
        "meta": {
            "createdByUser": {
                "id": 1259114,
                "username": "nicoleturpin",
                "name": "",
                "links": {
                    "alternate": {
                        "href": "https://www.zotero.org/nicoleturpin",
                        "type": "text/html"
                    }
                }
            },
            "numChildren": 1
        },
        "data": {
            "key": "E2WUXKMI",
            "version": 8,
            "itemType": "journalArticle",
            "title": "Google's Eric Schmidt Invests in Obama's Big Data Brains/Copytaste",
            "creators": [],
            "abstractNote": "",
            "publicationTitle": "",
            "publisher": "",
            "place": "",
            "date": "",
            "volume": "",
            "issue": "",
            "section": "",
            "partNumber": "",
            "partTitle": "",
            "pages": "",
            "series": "",
            "seriesTitle": "",
            "seriesText": "",
            "journalAbbreviation": "",
            "DOI": "",
            "citationKey": "",
            "url": "",
            "accessDate": "",
            "PMID": "",
            "PMCID": "",
            "ISSN": "",
            "archive": "",
            "archiveLocation": "",
            "shortTitle": "",
            "language": "",
            "libraryCatalog": "",
            "callNumber": "",
            "rights": "",
            "extra": "",
            "tags": [
                {
                    "tag": "latest abney and associates technology news Google's Eric Schmidt Invests in Obama's Big Data Brains"
                }
            ],
            "collections": [],
            "relations": {},
            "dateAdded": "2013-06-05T02:42:21Z",
            "dateModified": "2013-06-05T02:42:21Z"
        }
    },
    {
        "key": "P5F6K669",
        "version": 7,
        "library": {
            "type": "group",
            "id": 138467,
            "name": "Abney and Associates",
            "links": {
                "alternate": {
                    "href": "https://www.zotero.org/groups/abney_and_associates",
                    "type": "text/html"
                }
            }
        },
        "links": {
            "self": {
                "href": "https://api.zotero.org/groups/138467/items/P5F6K669",
                "type": "application/json"
            },
            "alternate": {
                "href": "https://www.zotero.org/groups/abney_and_associates/items/P5F6K669",
                "type": "text/html"
            },
            "up": {
                "href": "https://api.zotero.org/groups/138467/items/GMCGHGXQ",
                "type": "application/json"
            }
        },
        "meta": {
            "numChildren": 0
        },
        "data": {
            "key": "P5F6K669",
            "version": 7,
            "parentItem": "GMCGHGXQ",
            "itemType": "note",
            "note": "<p class=\"MsoNormal\"><strong>AN Abney Associates News Flash</strong></p>\n<p class=\"MsoNormal\">Phishing sites, which masquerade as genuine websites to steal users&rsquo; personal information, are on the rise in Hong Kong, Microsoft warned on Thursday.</p>\n<p class=\"MsoNormal\">Some 6.23 phishing sites were found per 1,000 hosts in the fourth quarter last year, up from 6.01 in the third quarter, according to Microsoft&rsquo;s latest Security Intelligence Report.</p>\n<p class=\"MsoNormal\">However, the number of malware infections remained low in the same period. Every 1,000 computers had 2.2 malware infections on average, the report found.</p>\n<p class=\"MsoNormal\">Tim Rains, director of product management in Microsoft&rsquo;s Trustworthy Computing group, said the rise could be because Hong Kong is a financial centre and phishing sites masquerade as banking websites to steal information.</p>\n<p class=\"MsoNormal\">&ldquo;The fact that we have a low malware infection rate in Hong Kong, but slightly elevated level of phishing is actually interesting,&rdquo; he said.</p>\n<p class=\"MsoNormal\">He said the reason could be that the attackers were using a smaller number of compromised systems in Hong Kong to do more phishing than other attacks.</p>\n<p class=\"MsoNormal\">Roy Ko Wai-tak, manager of Hong Kong Computer Emergency Response Team Coordination Centre, said websites of small and medium enterprises were often hijacked by attackers to build phishing sites &ndash; which pose as big corporations &ndash; because of poor cyber security.</p>\n<p class=\"MsoNormal\">Rains also said the most common malware is called keygen, which comes with key generators that produce serial numbers required to run piracy software. Ko said it showed that Hong Kong people still continue to use piracy software.</p>\n<p class=\"MsoNormal\">The report, which also found that 2.5 out of 10 computers on average did not have up-to-date antivirus software in the city, was based on data from over 600 million computers worldwide using Microsoft&rsquo;s products. The number of Hong Kong computers was unknown at the time of going to press.</p>\n<p class=\"MsoNormal\"><strong>AN Abney Associates News Flash</strong></p>\n<p class=\"MsoNormal\"><strong>READ MORE:</strong></p>\n<p class=\"MsoNormal\"><a href=\"http://mariahabney.weebly.com/\">http://mariahabney.weebly.com/</a></p>\n<p class=\"MsoNormal\"><a href=\"http://www.dailymotion.com/video/xz5ub4_online-attempts-to-steal-personal-information-on-the-rise-in-hong-kong_news\">http://www.dailymotion.com/video/xz5ub4_online-attempts-to-steal-personal-information-on-the-rise-in-hong-kong_news</a></p>",
            "tags": [],
            "relations": {},
            "dateAdded": "2013-04-20T06:33:29Z",
            "dateModified": "2013-04-20T06:33:29Z"
        }
    },
    {
        "key": "GMCGHGXQ",
        "version": 7,
        "library": {
            "type": "group",
            "id": 138467,
            "name": "Abney and Associates",
            "links": {
                "alternate": {
                    "href": "https://www.zotero.org/groups/abney_and_associates",
                    "type": "text/html"
                }
            }
        },
        "links": {
            "self": {
                "href": "https://api.zotero.org/groups/138467/items/GMCGHGXQ",
                "type": "application/json"
            },
            "alternate": {
                "href": "https://www.zotero.org/groups/abney_and_associates/items/GMCGHGXQ",
                "type": "text/html"
            }
        },
        "meta": {
            "createdByUser": {
                "id": 1259114,
                "username": "nicoleturpin",
                "name": "",
                "links": {
                    "alternate": {
                        "href": "https://www.zotero.org/nicoleturpin",
                        "type": "text/html"
                    }
                }
            },
            "numChildren": 1
        },
        "data": {
            "key": "GMCGHGXQ",
            "version": 7,
            "itemType": "journalArticle",
            "title": "Online attempts to steal personal information on the rise in Hong Kong/WEEBLY",
            "creators": [],
            "abstractNote": "",
            "publicationTitle": "",
            "publisher": "",
            "place": "",
            "date": "",
            "volume": "",
            "issue": "",
            "section": "",
            "partNumber": "",
            "partTitle": "",
            "pages": "",
            "series": "",
            "seriesTitle": "",
            "seriesText": "",
            "journalAbbreviation": "",
            "DOI": "",
            "citationKey": "",
            "url": "",
            "accessDate": "",
            "PMID": "",
            "PMCID": "",
            "ISSN": "",
            "archive": "",
            "archiveLocation": "",
            "shortTitle": "",
            "language": "",
            "libraryCatalog": "",
            "callNumber": "",
            "rights": "",
            "extra": "",
            "tags": [
                {
                    "tag": "an abney associates news flash  Online attempts to steal personal information on the rise in Hong Kong"
                }
            ],
            "collections": [],
            "relations": {},
            "dateAdded": "2013-04-20T06:33:29Z",
            "dateModified": "2013-04-20T06:33:29Z"
        }
    },
    {
        "key": "V6IHM3ZU",
        "version": 6,
        "library": {
            "type": "group",
            "id": 138467,
            "name": "Abney and Associates",
            "links": {
                "alternate": {
                    "href": "https://www.zotero.org/groups/abney_and_associates",
                    "type": "text/html"
                }
            }
        },
        "links": {
            "self": {
                "href": "https://api.zotero.org/groups/138467/items/V6IHM3ZU",
                "type": "application/json"
            },
            "alternate": {
                "href": "https://www.zotero.org/groups/abney_and_associates/items/V6IHM3ZU",
                "type": "text/html"
            }
        },
        "meta": {
            "createdByUser": {
                "id": 1259114,
                "username": "nicoleturpin",
                "name": "",
                "links": {
                    "alternate": {
                        "href": "https://www.zotero.org/nicoleturpin",
                        "type": "text/html"
                    }
                }
            },
            "numChildren": 1
        },
        "data": {
            "key": "V6IHM3ZU",
            "version": 6,
            "itemType": "journalArticle",
            "title": "Abney Associates The Cyber Front",
            "creators": [],
            "abstractNote": "",
            "publicationTitle": "",
            "publisher": "",
            "place": "",
            "date": "",
            "volume": "",
            "issue": "",
            "section": "",
            "partNumber": "",
            "partTitle": "",
            "pages": "",
            "series": "",
            "seriesTitle": "",
            "seriesText": "",
            "journalAbbreviation": "",
            "DOI": "",
            "citationKey": "",
            "url": "",
            "accessDate": "",
            "PMID": "",
            "PMCID": "",
            "ISSN": "",
            "archive": "",
            "archiveLocation": "",
            "shortTitle": "",
            "language": "",
            "libraryCatalog": "",
            "callNumber": "",
            "rights": "",
            "extra": "",
            "tags": [
                {
                    "tag": "The Cyber Front abney associates tips and warnings"
                }
            ],
            "collections": [],
            "relations": {},
            "dateAdded": "2013-03-27T01:18:16Z",
            "dateModified": "2013-03-27T01:18:16Z"
        }
    },
    {
        "key": "8EKZ22BD",
        "version": 6,
        "library": {
            "type": "group",
            "id": 138467,
            "name": "Abney and Associates",
            "links": {
                "alternate": {
                    "href": "https://www.zotero.org/groups/abney_and_associates",
                    "type": "text/html"
                }
            }
        },
        "links": {
            "self": {
                "href": "https://api.zotero.org/groups/138467/items/8EKZ22BD",
                "type": "application/json"
            },
            "alternate": {
                "href": "https://www.zotero.org/groups/abney_and_associates/items/8EKZ22BD",
                "type": "text/html"
            },
            "up": {
                "href": "https://api.zotero.org/groups/138467/items/V6IHM3ZU",
                "type": "application/json"
            }
        },
        "meta": {
            "numChildren": 0
        },
        "data": {
            "key": "8EKZ22BD",
            "version": 6,
            "parentItem": "V6IHM3ZU",
            "itemType": "note",
            "note": "<p class=\"MsoNormal\"><strong>Abney Associates</strong></p>\n<p class=\"MsoNormal\">Anonymous-linked groups hack Israeli websites, release personal data</p>\n<p class=\"MsoNormal\">An anti-Israel hacking collective affiliated with Anonymous says it has initiated a widespread cyber attack against the Jewish state, penetrating websites affiliated with the Mossad security service and a slew of related entities.</p>\n<p class=\"MsoNormal\">The hackers claimed late Friday that they have obtained and released personal information relating to 35,000 Israeli government officials, including politicians, military leaders, and police officers, according to a Twitter feed associated with the hackers.</p>\n<p class=\"MsoNormal\">A comprehensive spreadsheet purporting to include the information of all 35,000 Israeli officials was published by the website Cryptome, though it did not independently verify the information.</p>\n<p class=\"MsoNormal\">The coalition of hackers appears to have ties to the Iranian government, Pakistan, Syria, Egypt, and the terror group Hezbollah, according to a report published by Cryptome.</p>\n<p class=\"MsoNormal\">The hackers have united under the banner of online movement called &ldquo;OpIsrael.&rdquo;</p>\n<p class=\"MsoNormal\">Their stated goal is to &ldquo;remove the Israel from WWW (World Wide Web),&rdquo; according to The Hackers Post, which has been following the group&rsquo;s activities targeting Israel.</p>\n<p class=\"MsoNormal\">&ldquo;It looks like hacker target [sic] different Israeli servers and hacked the websites,&rdquo; Hackers Post reported.</p>\n<p class=\"MsoNormal\">The anti-Israel hackers say they perpetrated their attacks to protest treatment of the Palestinians.</p>\n<p class=\"MsoNormal\">&ldquo;The reason for hacking Israeli websites was to raise voice of Palestine&rsquo;s [sic] who are under hell created by Israel and left a deface page [on the hacked websites] displaying images of Palestinians affected by Israeli shelling,&rdquo; the Hackers Post wrote.</p>\n<p class=\"MsoNormal\">Hackers left vitriolic and offensive messages on the websites they accessed, according to the Hackers Post.</p>\n<p class=\"MsoNormal\">&ldquo;We Not Forgive [sic] What You Have Done To Our Family !!! Long Live Palestine!!&rdquo; stated one hacker&rsquo;s message.</p>\n<p class=\"MsoNormal\">A Turkish group may be responsible for publicly releasing the data associated with thousands of Israeli officials, according to the Kremlin-funded Russian propaganda outlet RT.</p>\n<p class=\"MsoNormal\">&ldquo;The data was released by a hacker team going by the name of &lsquo;The Red Hack,&rsquo; a Turkish group, while the direct denial-of-service attack targeted at Mossad was attributed to another group operating under the moniker &lsquo;Sektor 404,&rsquo; RT reported.</p>\n<p class=\"MsoNormal\">It is believed that the loosely tied together hackers are gearing up to launch a major cyber strike against Israel on April 7.</p>\n<p class=\"MsoNormal\">Internet users that claim to be affiliated with Anonymous have carried out attacks against Israel in the past. A similar hack occurred in November of last year.</p>\n<p class=\"MsoNormal\">&ldquo;The hacking teams have decided to unite against Israel as one entity and that Israel should be getting prepared to be &lsquo;erased&rsquo; from the Internet,&rdquo; an Anonymous member told the Hackers Post earlier this month.</p>\n<p class=\"MsoNormal\">Cryptome&rsquo;s analysis of the hacking collective found that they have loosely united based on their distaste for Israel.</p>\n<p class=\"MsoNormal\">&ldquo;Our analysis to the moment shows not much of coordination [sic] between these groups contrary to the popular belief and the sum of human resources all together to the best of our current analysis is not more than 50 individuals,&rdquo; Crytome&rsquo;s report stated.</p>\n<p class=\"MsoNormal\">&ldquo;The collectives with Arab leanings are not much advanced,&rdquo; the report said. &ldquo;The teams with Pakistani, Syrians and Lebanese members are more advanced and reported to have ties with governments. Iranian teams are just using the situation to harm Israel and U.S interests and reported to be directly funded by IRGC and MOIS, the Iranian Intelligence.&rdquo;</p>\n<p class=\"MsoNormal\"><strong>Abney Associates</strong></p>\n<p class=\"MsoNormal\"><strong>READ MORE ARTICLES:</strong></p>\n<p class=\"MsoNormal\"><a href=\"http://www.good.is/posts/abney-associates-public-schoolboy-hacker-who-masterminded-15m-fraud-is-put-in-jail-s-it-class-and-hacks-th\">http://www.good.is/posts/abney-associates-public-schoolboy-hacker-who-masterminded-15m-fraud-is-put-in-jail-s-it-class-and-hacks-th</a></p>\n<p class=\"MsoNormal\"><a href=\"http://www.shelfari.com/groups/101764/discussions/480920/ICE-problemer-datamaskinen-scam-advarsel---Internet-Technology-A\">http://www.shelfari.com/groups/101764/discussions/480920/ICE-problemer-datamaskinen-scam-advarsel---Internet-Technology-A</a></p>",
            "tags": [],
            "relations": {},
            "dateAdded": "2013-03-27T01:18:16Z",
            "dateModified": "2013-03-27T01:18:16Z"
        }
    },
    {
        "key": "7URIV7TF",
        "version": 5,
        "library": {
            "type": "group",
            "id": 138467,
            "name": "Abney and Associates",
            "links": {
                "alternate": {
                    "href": "https://www.zotero.org/groups/abney_and_associates",
                    "type": "text/html"
                }
            }
        },
        "links": {
            "self": {
                "href": "https://api.zotero.org/groups/138467/items/7URIV7TF",
                "type": "application/json"
            },
            "alternate": {
                "href": "https://www.zotero.org/groups/abney_and_associates/items/7URIV7TF",
                "type": "text/html"
            },
            "up": {
                "href": "https://api.zotero.org/groups/138467/items/C942M5RZ",
                "type": "application/json"
            }
        },
        "meta": {
            "numChildren": 0
        },
        "data": {
            "key": "7URIV7TF",
            "version": 5,
            "parentItem": "C942M5RZ",
            "itemType": "note",
            "note": "<p class=\"MsoNormal\"><strong><span style=\"font-size: 8.5pt; line-height: 115%; font-family: Verdana, sans-serif; background-position: initial initial; background-repeat: initial initial;\">Abney and Associates</span></strong></p>\n<p class=\"MsoNormal\"><span style=\"font-size: 8.5pt; line-height: 115%; font-family: Verdana, sans-serif; background-position: initial initial; background-repeat: initial initial;\">MONTREAL - Travellers should be wary of cyber threats on vacation as they access free wireless networks with their smartphones, tablets or laptops, says software security company Symantec Corp.</span><span style=\"font-size: 8.5pt; line-height: 115%; font-family: Verdana, sans-serif;\"><br /> <span style=\"background-position: initial initial; background-repeat: initial initial;\">Canadians travelling for March break and into the summer season shouldn't be doing things like pulling up their bank accounts on Wi-Fi networks, said Symantec Canada's Lynn Hargrove.</span><br /> <span style=\"background-position: initial initial; background-repeat: initial initial;\">\"What people don't realize is that there's no security on those Wi-Fi networks for the most part,\" she said.</span><br /> <span style=\"background-position: initial initial; background-repeat: initial initial;\">\"It's a great way to keep in touch while you're on vacation, but there are some inherent risks that come with it that people just aren't thinking about.\"</span><br /> <span style=\"background-position: initial initial; background-repeat: initial initial;\">Symantec has found that two in 10 Canadians pull up their bank accounts on free Wi-Fi networks in Canada.</span><br /> <span style=\"background-position: initial initial; background-repeat: initial initial;\">Young men are most at risk for cybercrime because they are \"fearless\" and access risky Internet sites, said Hargrove, director of consumer solutions, from Toronto.</span><br /> <span style=\"background-position: initial initial; background-repeat: initial initial;\">According to Symantec's 2012 Norton Cybercrime report, travellers are often victimized through their mobile devices while abroad, often by text messages.</span><br /> <span style=\"background-position: initial initial; background-repeat: initial initial;\">\"We're seeing a lot of fraudulent texts asking you to click on a link or go and dial a number to retrieve a voice mail,\" Hargrove said.</span><br /> <span style=\"background-position: initial initial; background-repeat: initial initial;\">And the wealth of information stored on a smartphone - pictures, texts, emails, contact lists, work documents, banking information - can be valuable to cyber criminals if stolen or lost, Hargrove said.</span><br /> <span style=\"background-position: initial initial; background-repeat: initial initial;\">\"What people aren't realizing is that in many cases they have more information on that device than they have on their home PC.\"</span><br /> <span style=\"background-position: initial initial; background-repeat: initial initial;\">Smartphone users should at a minimum have a password to access their device, Hargrove said, and there's also security software available for smartphones.</span><br /> <span style=\"background-position: initial initial; background-repeat: initial initial;\">The 2012 Norton Cybercrime report found that 92 per cent of survey respondents in Russia said they had been victims of cybercrime.</span><br /> <span style=\"background-position: initial initial; background-repeat: initial initial;\">For Canadians travelling to Mexico or Brazil, each country has a rate of 75 per cent of its online citizens being past victims of cybercrime, Hargrove said.</span><br /> <span style=\"background-position: initial initial; background-repeat: initial initial;\">In less developed countries with a lot of free Wi-Fi networks there also tends to be a lot of cybercrime, she added. The rate of cybercrime in France is 55 per cent and it's 70 per cent in Canada, according to the report, which surveyed 13,018 online adults last July in 24 countries including Canada, Australia, Brazil, China, Mexico, Poland Singapore, Turkey, United Kingdom and United States.</span></span></p>\n<p class=\"MsoNormal\"><strong><span style=\"font-size: 8.5pt; line-height: 115%; font-family: Verdana, sans-serif; background-position: initial initial; background-repeat: initial initial;\">Abney and Associates</span></strong><span style=\"font-size: 8.5pt; line-height: 115%; font-family: Verdana, sans-serif;\"><br /> <!--[if !supportLineBreakNewLine]--><br /> <!--[endif]--></span></p>\n<p class=\"MsoNormal\"><strong><span style=\"font-size: 8.5pt; line-height: 115%; font-family: Verdana, sans-serif;\">READ MORE:</span></strong></p>\n<p class=\"MsoNormal\"><a href=\"http://www.good.is/posts/hong-kong-technology-warning-blog-abney-associates-jude-law-on-phone-hacking-facebook\">http://www.good.is/posts/hong-kong-technology-warning-blog-abney-associates-jude-law-on-phone-hacking-facebook</a></p>\n<p class=\"MsoNormal\"><a href=\"http://www.good.is/posts/hong-kong-technology-warning-blog-abney-associates-jude-law-on-phone-hacking-facebook\">http://www.good.is/posts/hong-kong-technology-warning-blog-abney-associates-jude-law-on-phone-hacking-facebook</a></p>",
            "tags": [],
            "relations": {},
            "dateAdded": "2013-03-16T03:54:59Z",
            "dateModified": "2013-03-16T03:54:59Z"
        }
    },
    {
        "key": "C942M5RZ",
        "version": 5,
        "library": {
            "type": "group",
            "id": 138467,
            "name": "Abney and Associates",
            "links": {
                "alternate": {
                    "href": "https://www.zotero.org/groups/abney_and_associates",
                    "type": "text/html"
                }
            }
        },
        "links": {
            "self": {
                "href": "https://api.zotero.org/groups/138467/items/C942M5RZ",
                "type": "application/json"
            },
            "alternate": {
                "href": "https://www.zotero.org/groups/abney_and_associates/items/C942M5RZ",
                "type": "text/html"
            }
        },
        "meta": {
            "createdByUser": {
                "id": 1259114,
                "username": "nicoleturpin",
                "name": "",
                "links": {
                    "alternate": {
                        "href": "https://www.zotero.org/nicoleturpin",
                        "type": "text/html"
                    }
                }
            },
            "numChildren": 1
        },
        "data": {
            "key": "C942M5RZ",
            "version": 5,
            "itemType": "journalArticle",
            "title": "Abney and Associates Cybercrime: Be wary of public Wi-Fi while on vacation/FACEBOOK",
            "creators": [],
            "abstractNote": "",
            "publicationTitle": "",
            "publisher": "",
            "place": "",
            "date": "",
            "volume": "",
            "issue": "",
            "section": "",
            "partNumber": "",
            "partTitle": "",
            "pages": "",
            "series": "",
            "seriesTitle": "",
            "seriesText": "",
            "journalAbbreviation": "",
            "DOI": "",
            "citationKey": "",
            "url": "",
            "accessDate": "",
            "PMID": "",
            "PMCID": "",
            "ISSN": "",
            "archive": "",
            "archiveLocation": "",
            "shortTitle": "",
            "language": "",
            "libraryCatalog": "",
            "callNumber": "",
            "rights": "",
            "extra": "",
            "tags": [
                {
                    "tag": "Cybercrime: Be wary of public Wi-Fi while on vacation abney and associates online"
                }
            ],
            "collections": [],
            "relations": {},
            "dateAdded": "2013-03-16T03:54:59Z",
            "dateModified": "2013-03-16T03:54:59Z"
        }
    },
    {
        "key": "H25UT247",
        "version": 4,
        "library": {
            "type": "group",
            "id": 138467,
            "name": "Abney and Associates",
            "links": {
                "alternate": {
                    "href": "https://www.zotero.org/groups/abney_and_associates",
                    "type": "text/html"
                }
            }
        },
        "links": {
            "self": {
                "href": "https://api.zotero.org/groups/138467/items/H25UT247",
                "type": "application/json"
            },
            "alternate": {
                "href": "https://www.zotero.org/groups/abney_and_associates/items/H25UT247",
                "type": "text/html"
            },
            "up": {
                "href": "https://api.zotero.org/groups/138467/items/GQZR5KQ4",
                "type": "application/json"
            }
        },
        "meta": {
            "numChildren": 0
        },
        "data": {
            "key": "H25UT247",
            "version": 4,
            "parentItem": "GQZR5KQ4",
            "itemType": "note",
            "note": "<p class=\"MsoNormal\"><strong>Abney Associates</strong></p>\n<p class=\"MsoNormal\">Nicholas Webber, 21, was jailed for five years for running a criminal website He started his criminal career at &pound;24,000-a-year Bradfield College Prison IT Teacher Michael Fox was made redundant after the incident Fox protests he had no idea Webber was a hacker One of Britain&rsquo;s most notorious cyber criminals hacked into a prison computer system from inside jail &ndash; after he was allowed to join&nbsp; an IT class.</p>\n<p class=\"MsoNormal\">Nicholas Webber, 21, jailed for five years in 2011 for masterminding a multi-million-pound internet crime site, triggered the security scare during a lesson. It is understood his actions caused &lsquo;major panic&rsquo; but it is not clear what, if anything, he managed to access. The prison, HMP Isis in South London, blamed his teacher, Michael Fox, who was employed by Kensington and Chelsea&nbsp; College. He was banned from the prison but the college cleared him of committing any security breaches at a disciplinary hearing last March. However, he was made redundant when no alternative work could be found for him. More... Pictured with piles of cash: The public schoolboy jailed for five years for masterminding &pound;18m internet scam Computer hacker, 21, jailed for masterminding &pound;27 MILLION fraud in his bedroom taking credit card details from unsuspecting&nbsp; internet users On Friday, Mr Fox, from Bromley, Kent, began a claim for unfair dismissal, arguing that it wasn&rsquo;t his decision to put Webber, the son of a former member of Guernsey&rsquo;s parliament, in his class. He says he had no idea he was a hacker.</p>\n<p class=\"MsoNormal\">At a hearing at Croydon Employment Tribunal, Mr Fox accused the college of not doing enough&nbsp; to find him another job. &lsquo;The perceived problem was there was a tutor who had been excluded by the prison and charged with allowing a hacking expert to hack into the prison&rsquo;s mainframe,&rsquo; he said. In a statement, the college&rsquo;s business development director, Shanie Jamieson, said: &lsquo;He [Mr Fox] did not feel he had done anything wrong as the student concerned was in his view a convicted computer hacker and should not have been allowed in his classroom.&rsquo;Mr Fox&rsquo;s tribunal hearing was adjourned until April.</p>\n<p class=\"MsoNormal\">A Prison Service spokesman confirmed Webber was involved in the incident but declined to answer questions about it. He said: &lsquo;At the time of this incident in 2011 the educational computer system at HMP Isis was a closed network. No access to personal information or wider access to the internet or other prison systems would have been possible.&rsquo;The incident happened a year after the opening of the &pound;110&thinsp;million prison, which houses 18 to&nbsp; 24-year-olds. It has been beset by a series of technological problems caused by breakdowns in its cutting-edge biometric roll-call system where inmates have to leave an electronic thumbprint whenever they move from one part of the jail to another. Webber was only 17 when he created an internet forum for computer hackers with the potential to fleece up to &pound;15&thinsp;million from individuals and firms.</p>\n<p class=\"MsoNormal\">He was arrested for using fraudulent credit card details to pay for a penthouse suite at the Hilton Hotel in Park Lane, Central London. A court was told he set up GhostMarket after leaving &pound;24,000-a-year Bradfield College, Berkshire, where he got into trouble for deleting friends&rsquo; detention records from the school computer. GhostMarket &ndash; dubbed a global &lsquo;crimebook&rsquo; with 8,000 members worldwide &ndash; gave tips on how to create computer viruses, harvest credit card data and use it to pay for goods on eBay, as well as offering to sell details of 100,000 stolen credit cards. Police have documented &pound;473,000 losses from 3,500 of the cards, but estimate they could have been used to steal &pound;15&thinsp;million. Webber, of Southsea, Hampshire, who once boasted online that he was &lsquo;probably the most wanted cyber criminal just now&rsquo;, also used stolen details to buy computers, video games, iPhones and iPods worth &pound;40,000, and to pay for stays in luxury hotels.</p>\n<p class=\"MsoNormal\"><strong>Abney Associates</strong></p>\n<p class=\"MsoNormal\"><strong>READ MORE:</strong></p>\n<p class=\"MsoNormal\"><a href=\"http://www.luuux.com/technology/security-warning-hong-kong-abney-and-associates?front\">http://www.luuux.com/technology/security-warning-hong-kong-abney-and-associates?front</a></p>\n<p class=\"MsoNormal\"><a href=\"http://www.dailymotion.com/video/xxuh61_internet-warning-abney-associates-review-hong-kong_news#.UTUkEqJTB3A\">http://www.dailymotion.com/video/xxuh61_internet-warning-abney-associates-review-hong-kong_news#.UTUkEqJTB3A</a></p>\n<p class=\"MsoNormal\">&nbsp;</p>",
            "tags": [],
            "relations": {},
            "dateAdded": "2013-03-05T02:59:52Z",
            "dateModified": "2013-03-05T02:59:52Z"
        }
    },
    {
        "key": "GQZR5KQ4",
        "version": 4,
        "library": {
            "type": "group",
            "id": 138467,
            "name": "Abney and Associates",
            "links": {
                "alternate": {
                    "href": "https://www.zotero.org/groups/abney_and_associates",
                    "type": "text/html"
                }
            }
        },
        "links": {
            "self": {
                "href": "https://api.zotero.org/groups/138467/items/GQZR5KQ4",
                "type": "application/json"
            },
            "alternate": {
                "href": "https://www.zotero.org/groups/abney_and_associates/items/GQZR5KQ4",
                "type": "text/html"
            }
        },
        "meta": {
            "createdByUser": {
                "id": 1259114,
                "username": "nicoleturpin",
                "name": "",
                "links": {
                    "alternate": {
                        "href": "https://www.zotero.org/nicoleturpin",
                        "type": "text/html"
                    }
                }
            },
            "numChildren": 1
        },
        "data": {
            "key": "GQZR5KQ4",
            "version": 4,
            "itemType": "journalArticle",
            "title": "Abney Associates: Public schoolboy hacker who masterminded £15m fraud is put in jail's IT class...and hacks the prison's \ncomputer system",
            "creators": [],
            "abstractNote": "",
            "publicationTitle": "",
            "publisher": "",
            "place": "",
            "date": "",
            "volume": "",
            "issue": "",
            "section": "",
            "partNumber": "",
            "partTitle": "",
            "pages": "",
            "series": "",
            "seriesTitle": "",
            "seriesText": "",
            "journalAbbreviation": "",
            "DOI": "",
            "citationKey": "",
            "url": "",
            "accessDate": "",
            "PMID": "",
            "PMCID": "",
            "ISSN": "",
            "archive": "",
            "archiveLocation": "",
            "shortTitle": "",
            "language": "",
            "libraryCatalog": "",
            "callNumber": "",
            "rights": "",
            "extra": "",
            "tags": [
                {
                    "tag": "online security abney associates hong kong hacker warnings"
                }
            ],
            "collections": [],
            "relations": {},
            "dateAdded": "2013-03-05T02:59:52Z",
            "dateModified": "2013-03-05T02:59:52Z"
        }
    },
    {
        "key": "AHDBZS4Z",
        "version": 3,
        "library": {
            "type": "group",
            "id": 138467,
            "name": "Abney and Associates",
            "links": {
                "alternate": {
                    "href": "https://www.zotero.org/groups/abney_and_associates",
                    "type": "text/html"
                }
            }
        },
        "links": {
            "self": {
                "href": "https://api.zotero.org/groups/138467/items/AHDBZS4Z",
                "type": "application/json"
            },
            "alternate": {
                "href": "https://www.zotero.org/groups/abney_and_associates/items/AHDBZS4Z",
                "type": "text/html"
            },
            "up": {
                "href": "https://api.zotero.org/groups/138467/items/N26XKHV9",
                "type": "application/json"
            }
        },
        "meta": {
            "numChildren": 0
        },
        "data": {
            "key": "AHDBZS4Z",
            "version": 3,
            "parentItem": "N26XKHV9",
            "itemType": "note",
            "note": "<p class=\"MsoNormal\">\"Nattklubb d&ouml;rrvakt\" n&auml;tfiskebedr&auml;geri hittats av forskare/Abney and Associates</p>\n<p class=\"MsoNormal\"><a href=\"http://www.bbc.co.uk/news/technology-21058591\">http://www.bbc.co.uk/news/technology-21058591</a></p>\n<p class=\"MsoNormal\"><strong>Abney and Associates</strong></p>\n<p class=\"MsoNormal\">Cyberkriminella har uppfunnit en listig ny metod f&ouml;r att rikta offer genom att utveckla ett system som beter sig som en d&ouml;rrvakt p&aring; en exklusiv nattklubb. S&auml;kerhet fast RSA avsl&ouml;jade hur angriparna tilldelade m&aring;l med ett unikt ID, vilket inneb&auml;r bluff skulle kunna inriktas p&aring; specifika personer. Om en persons ID inte var p&aring; listan, skulle deras dator inte p&aring;verkas. RSA sade avancerade hotet utg&ouml;r en ny \"uppt&auml;ckt utmaning\" f&ouml;r s&auml;kerhetsbranschen. I ett blogginl&auml;gg skrev RSA cyberbrott specialist Limor Kessem: \"Som vi anpassa och f&ouml;rb&auml;ttra v&aring;ra system f&ouml;r uppt&auml;ckt, p&aring;minns vi att i det o&auml;ndliga och r&aring;tta spelet, endast den vig kommer att &ouml;verleva.\" De s&aring; kallade Bouncer Phishing Kit m&aring;l f&ouml;rinst&auml;llda listor med e-postadresser. F&ouml;r varje m&aring;l&nbsp; genereras ett unikt ID automatiskt, att skapa en unik webbadress f&ouml;r anv&auml;ndaren att klicka p&aring;. Om n&aring;gon har ett ID som inte matchar listan &ouml;ver avsedda m&aring;l, de helt enkelt kommer att presenteras med en 404 felsida och kommer att vara oskadda.</p>\n<p class=\"MsoNormal\">Forts&auml;tta l&auml;sande den viktigaste ber&auml;ttelsen Vad &auml;r n&auml;tfiske?</p>\n<p class=\"MsoNormal\">N&auml;tfiske &auml;r en taktik som anv&auml;nds av cyberbrottslingar knep anv&auml;ndare att dela personliga data. Detta &auml;r vanligtvis genom att l&aring;tsas vara en legitim webbplats - s&aring; som popul&auml;ra sociala n&auml;tverket,</p>\n<p class=\"MsoNormal\">eller internetbank. F&ouml;rutsatt att de &auml;r p&aring; den riktiga webbplatsen, kommer anv&auml;ndarna ange sitt</p>\n<p class=\"MsoNormal\">anv&auml;ndarnamn och l&ouml;senord, endast f&ouml;r dem d&aring; att stj&auml;las. Andra phishing attacker kan g&ouml;ra anv&auml;nda av e-post f&ouml;r att se ut som de kommer fr&aring;n en betrodd k&auml;lla. Internet-anv&auml;ndare kan ta flera f&ouml;rnuftiga &aring;tg&auml;rder f&ouml;r att f&ouml;rhindra att f&aring;ngas, s&aring;som dubbelkontroll webbadresser ser legitima, snarare &auml;n en felstavning som Facebok.com. Anv&auml;nder den senaste versionen av din webbl&auml;sare, samt aktuell s&auml;kerhetsprogram, ger dig extra</p>\n<p class=\"MsoNormal\">hj&auml;lp. UK betalning r&aring;det har satt upp en webbplats med r&aring;d om hur bo skyddade via phishing-bedr&auml;gerier. Om en person &auml;r dock en av olyckliga, kommer samma sida ist&auml;llet v&aring;ren till liv som en \"attack sida\" redo att stj&auml;la anv&auml;ndarens autentiseringsuppgifter. Med den h&auml;r metoden inneb&auml;r att angripare kan sk&ouml;rda data fr&aring;n vissa grupper av anv&auml;ndare, i st&auml;llet f&ouml;r att beh&ouml;va s&aring;lla bland stora m&auml;ngder data. Till exempel kan Bouncer Phishing Kit anv&auml;ndas f&ouml;r att samla in personuppgifter om personer i ett</p>\n<p class=\"MsoNormal\">visst land. \"Det rymmer denna [d&ouml;rrvakt] monikern eftersom mycket som m&aring;nga h&ouml;gprofilerade natten</p>\n<p class=\"MsoNormal\">hotspots - om ditt namn inte finns med p&aring; listan, du bor ut,\" sade herr Kessem. \"Traditionella phishers vilja kasta s&aring; bred av ett n&auml;t som m&ouml;jligt.\"Men med denna taktik de phisher laser-fokuserar kampanjen i ett f&ouml;rs&ouml;k att samla in endast de mest relevanta referenserna f&ouml;r sitt &auml;ndam&aring;l. \"H&aring;ller borta objudna g&auml;ster inneb&auml;r ocks&aring; att undvika s&auml;kerhetsf&ouml;retag och snabbt ta nedg&aring;ngar i s&aring;dana attacker.\"N&auml;tfiske &auml;r ett v&auml;xande problem f&ouml;r internet-anv&auml;ndare. Enligt RSAS uppgifter, attacker av denna typ under 2012 j&auml;mf&ouml;rt med f&ouml;reg&aring;ende &aring;r var 59% och kostar den globala ekonomin $1 miljarder (&pound; 940 m).</p>\n<p class=\"MsoNormal\"><strong>Abney and Associates</strong></p>\n<p class=\"MsoNormal\"><strong>Read more:</strong></p>\n<p class=\"MsoNormal\"><strong><a href=\"http://tdn.com/lifestyles/wake-up-and-watch-those-credit-cards-financial-officers-warn/article_ab91f168-7a23-11e2-aac2-001a4bcf887a.html\">http://tdn.com/lifestyles/wake-up-and-watch-those-credit-cards-financial-officers-warn/article_ab91f168-7a23-11e2-aac2-001a4bcf887a.html</a></strong></p>\n<p class=\"MsoNormal\"><strong><a href=\"http://www.qrcodepress.com/mobile-security-issues-grow-with-the-channels-popularity/8517206/\">http://www.qrcodepress.com/mobile-security-issues-grow-with-the-channels-popularity/8517206/</a></strong></p>",
            "tags": [],
            "relations": {},
            "dateAdded": "2013-02-20T11:58:40Z",
            "dateModified": "2013-02-20T11:58:40Z"
        }
    },
    {
        "key": "9JSSAXXW",
        "version": 3,
        "library": {
            "type": "group",
            "id": 138467,
            "name": "Abney and Associates",
            "links": {
                "alternate": {
                    "href": "https://www.zotero.org/groups/abney_and_associates",
                    "type": "text/html"
                }
            }
        },
        "links": {
            "self": {
                "href": "https://api.zotero.org/groups/138467/items/9JSSAXXW",
                "type": "application/json"
            },
            "alternate": {
                "href": "https://www.zotero.org/groups/abney_and_associates/items/9JSSAXXW",
                "type": "text/html"
            },
            "up": {
                "href": "https://api.zotero.org/groups/138467/items/N26XKHV9",
                "type": "application/json"
            }
        },
        "meta": {
            "numChildren": 0
        },
        "data": {
            "key": "9JSSAXXW",
            "version": 3,
            "parentItem": "N26XKHV9",
            "itemType": "note",
            "note": "",
            "tags": [],
            "relations": {},
            "dateAdded": "2013-02-20T11:58:40Z",
            "dateModified": "2013-02-20T11:58:40Z"
        }
    },
    {
        "key": "N26XKHV9",
        "version": 3,
        "library": {
            "type": "group",
            "id": 138467,
            "name": "Abney and Associates",
            "links": {
                "alternate": {
                    "href": "https://www.zotero.org/groups/abney_and_associates",
                    "type": "text/html"
                }
            }
        },
        "links": {
            "self": {
                "href": "https://api.zotero.org/groups/138467/items/N26XKHV9",
                "type": "application/json"
            },
            "alternate": {
                "href": "https://www.zotero.org/groups/abney_and_associates/items/N26XKHV9",
                "type": "text/html"
            }
        },
        "meta": {
            "createdByUser": {
                "id": 1259114,
                "username": "nicoleturpin",
                "name": "",
                "links": {
                    "alternate": {
                        "href": "https://www.zotero.org/nicoleturpin",
                        "type": "text/html"
                    }
                }
            },
            "numChildren": 2
        },
        "data": {
            "key": "N26XKHV9",
            "version": 3,
            "itemType": "journalArticle",
            "title": "\"Nattklubb dörrvakt\" nätfiskebedrägeri hittats av forskare/Abney and Associates",
            "creators": [],
            "abstractNote": "",
            "publicationTitle": "",
            "publisher": "",
            "place": "",
            "date": "",
            "volume": "",
            "issue": "",
            "section": "",
            "partNumber": "",
            "partTitle": "",
            "pages": "",
            "series": "",
            "seriesTitle": "",
            "seriesText": "",
            "journalAbbreviation": "",
            "DOI": "",
            "citationKey": "",
            "url": "",
            "accessDate": "",
            "PMID": "",
            "PMCID": "",
            "ISSN": "",
            "archive": "",
            "archiveLocation": "",
            "shortTitle": "",
            "language": "",
            "libraryCatalog": "",
            "callNumber": "",
            "rights": "",
            "extra": "",
            "tags": [
                {
                    "tag": "\"Nattklubb dörrvakt\" nätfiskebedrägeri hittats av forskare/abney and associates reviews on cyber war warning"
                }
            ],
            "collections": [],
            "relations": {},
            "dateAdded": "2013-02-20T11:58:40Z",
            "dateModified": "2013-02-20T11:58:40Z"
        }
    },
    {
        "key": "ZU2839GW",
        "version": 1,
        "library": {
            "type": "group",
            "id": 138467,
            "name": "Abney and Associates",
            "links": {
                "alternate": {
                    "href": "https://www.zotero.org/groups/abney_and_associates",
                    "type": "text/html"
                }
            }
        },
        "links": {
            "self": {
                "href": "https://api.zotero.org/groups/138467/items/ZU2839GW",
                "type": "application/json"
            },
            "alternate": {
                "href": "https://www.zotero.org/groups/abney_and_associates/items/ZU2839GW",
                "type": "text/html"
            },
            "up": {
                "href": "https://api.zotero.org/groups/138467/items/9PNAXJI8",
                "type": "application/json"
            }
        },
        "meta": {
            "numChildren": 0
        },
        "data": {
            "key": "ZU2839GW",
            "version": 1,
            "parentItem": "9PNAXJI8",
            "itemType": "note",
            "note": "<p>https://getsatisfaction.com/abneyassociates/topics/abney_associates_internet_technology_phishing_email_and_internet_scams</p>\n<p class=\"MsoNormal\" style=\"line-height: 12.0pt; mso-line-height-rule: exactly;\"><strong>Abney Associates internettechnologie</strong></p>\n<p class=\"MsoNormal\" style=\"line-height: 12.0pt; mso-line-height-rule: exactly;\">Phishing, e-mail en Internet oplichting zijn vaak op het Internet en kunnen omvatten:</p>\n<p class=\"MsoNormal\" style=\"line-height: 12.0pt; mso-line-height-rule: exactly;\">E-mails met bijlagen virus besmet. De twee veelgebruikte methoden voor distributie van de virussen en schadelijke code zijn via e-mailbijlagen en schadelijke code downloaden van het Internet. Veruit de meest voorkomende methode van distributie is door e-mailbijlagen zo oefening voorzichtigheid bij het openen van bijlagen. De algemene regel is: als u niet dat de bijlage verwacht en geen in de bron vertrouwen - open het niet!</p>\n<p class=\"MsoNormal\" style=\"line-height: 12.0pt; mso-line-height-rule: exactly;\">Voor informatie over de erkenning van een phishing e-mail, bezoek de website Microsoft Safety en Security Centre: hoe te erkennen van een Phishing E-mail.</p>\n<p class=\"MsoNormal\" style=\"line-height: 12.0pt; mso-line-height-rule: exactly;\">Meer informatie over spam en oplichterij zijn hieronder beschikbaar:Nigeria 419 zwendels</p>\n<p class=\"MsoNormal\" style=\"line-height: 12.0pt; mso-line-height-rule: exactly;\">Hoe te herkennen van vervalste websites</p>\n<p class=\"MsoNormal\" style=\"line-height: 12.0pt; mso-line-height-rule: exactly;\">Wat is Phishing?</p>\n<p class=\"MsoNormal\" style=\"line-height: 12.0pt; mso-line-height-rule: exactly;\">Phishing is een vorm van bedrog gericht identificeren diefstal. In een phishing-scam probeert een kwaadwillende persoon om persoonlijke en financi&euml;le informatie zoals bankrekeninggegevens, creditcardnummers, wachtwoorden of andere persoonlijke informatie uit je door te overtuigen u te geven aan hen onder valse voorwendselen.</p>\n<p class=\"MsoNormal\" style=\"line-height: 12.0pt; mso-line-height-rule: exactly;\">Phishing-praktijken komen meestal via spam e-mail die een koppeling naar een valse website zoals een banksite of e-bay site bevat.</p>\n<p class=\"MsoNormal\" style=\"line-height: 12.0pt; mso-line-height-rule: exactly;\">Een phishing-scam begint met een kwaadwillende gebruiker die miljoenen van frauduleuze e-mailberichten die lijken stuurt te komen uit populaire websites of websites die u, zoals uw bank of credit card bedrijf vertrouwt.</p>\n<p class=\"MsoNormal\" style=\"line-height: 12.0pt; mso-line-height-rule: exactly;\">De e-mailberichten, en de websites die zij vaak u sturen, kijken offici&euml;le dat zij veel mensen bedriegen te laten geloven dat ze legitiem. Te geloven dat deze e-mails legitiem zijn, reageren nietsvermoedende mensen vaak op de e-mail verzoeken om hun creditcardnummers, wachtwoorden, accountgegevens of andere persoonlijke gegevens.</p>\n<p class=\"MsoNormal\" style=\"line-height: 12.0pt; mso-line-height-rule: exactly;\">Een oplichting kunstenaar misschien zet een link in een valse e-mailberichten die naar de legitieme website lijkt, maar eigenlijk brengt u naar een zwendel site of zelfs een pop-upvenster dat precies lijkt op de offici&euml;le site. Deze kopie&euml;n worden vaak genoemd vervalste websites. Wanneer u op een van deze vervalste sites of pop-upvensters u misschien zelfs meer persoonlijke informatie die zal worden verstrekt onbewust invoert rechtstreeks aan de persoon die de vervalste site gemaakt. Die persoon kan vervolgens deze informatie gebruiken om te kopen goederen, aanvraag voor een nieuwe creditcard, of uw identiteit te stelen.</p>\n<p class=\"MsoNormal\" style=\"line-height: 12.0pt; mso-line-height-rule: exactly;\">Bescherm uzelf tegen phishing</p>\n<p class=\"MsoNormal\" style=\"line-height: 12.0pt; mso-line-height-rule: exactly;\">Net zoals ze in de fysieke wereld doen, zal oplichters blijven ontwikkelen van nieuwe en meer sinistere manieren om truc u online. Maar na deze vijf stappen kunt u uw persoonlijke gegevens beschermen.</p>\n<p class=\"MsoNormal\" style=\"line-height: 12.0pt; mso-line-height-rule: exactly;\">&nbsp;</p>\n<p class=\"MsoNormal\" style=\"line-height: 12.0pt; mso-line-height-rule: exactly;\">Nooit reageren op verzoeken om persoonlijke gegevens via e-mail of in een pop-up venster. In geval van twijfel, bel de instelling die beweert te zijn van de afzender van de e-mail of pop-up venster. Australische banken sturen nooit e-mails met weblinks naar login sites over bankrekeningen.</p>\n<p class=\"MsoNormal\" style=\"line-height: 12.0pt; mso-line-height-rule: exactly;\">Vermijd te klikken op links in verdachte e-mails opgenomen als u een virus of schadelijke code downloaden kan door het bezoeken van de site. Ga in plaats daarvan naar websites door de URL in de adresbalk te typen of door de URL al bladwijzer.</p>\n<p class=\"MsoNormal\" style=\"line-height: 12.0pt; mso-line-height-rule: exactly;\">Controleer of dat de website is met behulp van encryptie door op zoek is naar het gele hangslotje op de website (hoewel dit wordt steeds meer ook wordt vervalst).</p>\n<p class=\"MsoNormal\" style=\"line-height: 12.0pt; mso-line-height-rule: exactly;\">Controleer regelmatig uw creditcard- en bankafschriften.</p>\n<p class=\"MsoNormal\" style=\"line-height: 12.0pt; mso-line-height-rule: exactly;\">Verslag verdachte misbruik van uw persoonlijke gegevens aan de juiste autoriteiten.</p>\n<p class=\"MsoNormal\" style=\"line-height: 12.0pt; mso-line-height-rule: exactly;\"><strong>Abney Associates internettechnologie</strong></p>",
            "tags": [],
            "relations": {},
            "dateAdded": "2013-02-07T02:24:06Z",
            "dateModified": "2013-02-07T02:24:06Z"
        }
    },
    {
        "key": "9PNAXJI8",
        "version": 1,
        "library": {
            "type": "group",
            "id": 138467,
            "name": "Abney and Associates",
            "links": {
                "alternate": {
                    "href": "https://www.zotero.org/groups/abney_and_associates",
                    "type": "text/html"
                }
            }
        },
        "links": {
            "self": {
                "href": "https://api.zotero.org/groups/138467/items/9PNAXJI8",
                "type": "application/json"
            },
            "alternate": {
                "href": "https://www.zotero.org/groups/abney_and_associates/items/9PNAXJI8",
                "type": "text/html"
            }
        },
        "meta": {
            "createdByUser": {
                "id": 1259114,
                "username": "nicoleturpin",
                "name": "",
                "links": {
                    "alternate": {
                        "href": "https://www.zotero.org/nicoleturpin",
                        "type": "text/html"
                    }
                }
            },
            "numChildren": 1
        },
        "data": {
            "key": "9PNAXJI8",
            "version": 1,
            "itemType": "journalArticle",
            "title": "Abney Associates internettechnologie: Phishing, E-mail en Internet oplichting/GETSATISFACTION",
            "creators": [],
            "abstractNote": "",
            "publicationTitle": "",
            "publisher": "",
            "place": "",
            "date": "",
            "volume": "",
            "issue": "",
            "section": "",
            "partNumber": "",
            "partTitle": "",
            "pages": "",
            "series": "",
            "seriesTitle": "",
            "seriesText": "",
            "journalAbbreviation": "",
            "DOI": "",
            "citationKey": "",
            "url": "",
            "accessDate": "",
            "PMID": "",
            "PMCID": "",
            "ISSN": "",
            "archive": "",
            "archiveLocation": "",
            "shortTitle": "",
            "language": "",
            "libraryCatalog": "",
            "callNumber": "",
            "rights": "",
            "extra": "",
            "tags": [
                {
                    "tag": " abney associates technology news updates"
                }
            ],
            "collections": [],
            "relations": {},
            "dateAdded": "2013-02-07T02:24:06Z",
            "dateModified": "2013-02-07T02:24:06Z"
        }
    },
    {
        "key": "QD52SPDP",
        "version": 1,
        "library": {
            "type": "group",
            "id": 138467,
            "name": "Abney and Associates",
            "links": {
                "alternate": {
                    "href": "https://www.zotero.org/groups/abney_and_associates",
                    "type": "text/html"
                }
            }
        },
        "links": {
            "self": {
                "href": "https://api.zotero.org/groups/138467/items/QD52SPDP",
                "type": "application/json"
            },
            "alternate": {
                "href": "https://www.zotero.org/groups/abney_and_associates/items/QD52SPDP",
                "type": "text/html"
            }
        },
        "meta": {
            "createdByUser": {
                "id": 1259114,
                "username": "nicoleturpin",
                "name": "",
                "links": {
                    "alternate": {
                        "href": "https://www.zotero.org/nicoleturpin",
                        "type": "text/html"
                    }
                }
            },
            "numChildren": 1
        },
        "data": {
            "key": "QD52SPDP",
            "version": 1,
            "itemType": "journalArticle",
            "title": "Abney and Associates: Asia's emerging role theme of global financial forum",
            "creators": [],
            "abstractNote": "",
            "publicationTitle": "",
            "publisher": "",
            "place": "",
            "date": "",
            "volume": "",
            "issue": "",
            "section": "",
            "partNumber": "",
            "partTitle": "",
            "pages": "",
            "series": "",
            "seriesTitle": "",
            "seriesText": "",
            "journalAbbreviation": "",
            "DOI": "",
            "citationKey": "",
            "url": "",
            "accessDate": "",
            "PMID": "",
            "PMCID": "",
            "ISSN": "",
            "archive": "",
            "archiveLocation": "",
            "shortTitle": "",
            "language": "",
            "libraryCatalog": "",
            "callNumber": "",
            "rights": "",
            "extra": "",
            "tags": [
                {
                    "tag": "abney and associates hong kong news edition"
                }
            ],
            "collections": [],
            "relations": {},
            "dateAdded": "2013-01-14T03:16:47Z",
            "dateModified": "2013-01-14T03:16:47Z"
        }
    },
    {
        "key": "WGCC5PUK",
        "version": 1,
        "library": {
            "type": "group",
            "id": 138467,
            "name": "Abney and Associates",
            "links": {
                "alternate": {
                    "href": "https://www.zotero.org/groups/abney_and_associates",
                    "type": "text/html"
                }
            }
        },
        "links": {
            "self": {
                "href": "https://api.zotero.org/groups/138467/items/WGCC5PUK",
                "type": "application/json"
            },
            "alternate": {
                "href": "https://www.zotero.org/groups/abney_and_associates/items/WGCC5PUK",
                "type": "text/html"
            },
            "up": {
                "href": "https://api.zotero.org/groups/138467/items/QD52SPDP",
                "type": "application/json"
            }
        },
        "meta": {
            "numChildren": 0
        },
        "data": {
            "key": "WGCC5PUK",
            "version": 1,
            "parentItem": "QD52SPDP",
            "itemType": "note",
            "note": "<p class=\"MsoNormal\" style=\"margin: 11.25pt 0in 0.0001pt; background-position: initial initial; background-repeat: initial initial;\"><strong><span style=\"font-size: 14.0pt; font-family: 'Times New Roman','serif'; mso-fareast-font-family: 'Times New Roman'; color: #666666;\">Abney and Associates</span></strong></p>\n<p class=\"MsoNormal\" style=\"margin: 11.25pt 0in 0.0001pt; text-align: justify; background-position: initial initial; background-repeat: initial initial;\"><span style=\"font-family: 'Arial','sans-serif'; mso-fareast-font-family: 'Times New Roman'; color: #666666;\">More&nbsp;than&nbsp;90&nbsp;highprofile&nbsp;speakers&nbsp;from&nbsp;the&nbsp;government,&nbsp;business&nbsp;and&nbsp;financial&nbsp;sectors&nbsp;willshare&nbsp;their&nbsp;insights&nbsp;on&nbsp;major&nbsp;Asian&nbsp;economic&nbsp;issues&nbsp;at&nbsp;the&nbsp;6th&nbsp;Asian&nbsp;Financial&nbsp;Forum&nbsp;(AFF)&nbsp;tobe&nbsp;held&nbsp;in&nbsp;Hong&nbsp;Kong&nbsp;on&nbsp;Jan&nbsp;14&nbsp;and&nbsp;15.</span></p>\n<p class=\"MsoNormal\" style=\"margin: 11.25pt 0in 0.0001pt; text-align: justify; background-position: initial initial; background-repeat: initial initial;\"><span style=\"font-family: 'Arial','sans-serif'; mso-fareast-font-family: 'Times New Roman'; color: #666666;\">Themed&nbsp;\"Asia:&nbsp;Shaping&nbsp;the&nbsp;Next&nbsp;Global&nbsp;Landscape,\"&nbsp;this&nbsp;year's&nbsp;forum&nbsp;will&nbsp;focus&nbsp;on&nbsp;Asia's&nbsp;fast-expanding&nbsp;role&nbsp;in&nbsp;the&nbsp;global&nbsp;economy.</span></p>\n<p class=\"MsoNormal\" style=\"margin: 11.25pt 0in 0.0001pt; text-align: justify; background-position: initial initial; background-repeat: initial initial;\"><span style=\"font-family: 'Arial','sans-serif'; mso-fareast-font-family: 'Times New Roman'; color: #666666;\">Topics&nbsp;such&nbsp;as&nbsp;the&nbsp;Asia's&nbsp;role&nbsp;in&nbsp;global&nbsp;economic&nbsp;development,&nbsp;the&nbsp;need&nbsp;for&nbsp;a&nbsp;new&nbsp;financialinfrastructure,&nbsp;opportunities&nbsp;in&nbsp;China&nbsp;and&nbsp;yuan&nbsp;internationalization&nbsp;will&nbsp;be&nbsp;discussed&nbsp;during&nbsp;thetwo-day&nbsp;financial&nbsp;summit.</span></p>\n<p class=\"MsoNormal\" style=\"margin: 11.25pt 0in 0.0001pt; text-align: justify; background-position: initial initial; background-repeat: initial initial;\"><span style=\"font-family: 'Arial','sans-serif'; mso-fareast-font-family: 'Times New Roman'; color: #666666;\">The&nbsp;gathering,&nbsp;the&nbsp;sixth&nbsp;such&nbsp;event&nbsp;organized&nbsp;by&nbsp;the&nbsp;Hong&nbsp;Kong&nbsp;Special&nbsp;Administrative&nbsp;RegionGovernment&nbsp;and&nbsp;the&nbsp;Hong&nbsp;Kong&nbsp;Trade&nbsp;Development&nbsp;Council&nbsp;(HKTDC),&nbsp;will&nbsp;take&nbsp;place&nbsp;at&nbsp;theHong&nbsp;Kong&nbsp;Convention&nbsp;and&nbsp;Exhibition&nbsp;Centre.</span></p>\n<p class=\"MsoNormal\" style=\"margin: 11.25pt 0in 0.0001pt; text-align: justify; background-position: initial initial; background-repeat: initial initial;\"><span style=\"font-family: 'Arial','sans-serif'; mso-fareast-font-family: 'Times New Roman'; color: #666666;\">Some&nbsp;2,000&nbsp;business&nbsp;industry&nbsp;players&nbsp;and&nbsp;government&nbsp;leaders&nbsp;from&nbsp;32&nbsp;countries&nbsp;and&nbsp;regionsattended&nbsp;last&nbsp;year's&nbsp;forum.</span></p>\n<p class=\"MsoNormal\" style=\"margin: 11.25pt 0in 0.0001pt; text-align: justify; background-position: initial initial; background-repeat: initial initial;\"><span style=\"font-family: 'Arial','sans-serif'; mso-fareast-font-family: 'Times New Roman'; color: #666666;\">China&nbsp;Daily&nbsp;is&nbsp;a&nbsp;media&nbsp;sponsor&nbsp;of&nbsp;the&nbsp;AFF.</span></p>\n<p class=\"MsoNormal\" style=\"margin: 11.25pt 0in 0.0001pt; text-align: justify; background-position: initial initial; background-repeat: initial initial;\"><span style=\"font-family: 'Arial','sans-serif'; mso-fareast-font-family: 'Times New Roman'; color: #666666;\">Against&nbsp;the&nbsp;backdrop&nbsp;of&nbsp;the&nbsp;United&nbsp;States&nbsp;having&nbsp;averted&nbsp;a&nbsp;\"fiscal&nbsp;cliff\"&nbsp;while&nbsp;still&nbsp;struggling&nbsp;withits&nbsp;debt&nbsp;ceiling,&nbsp;and&nbsp;European&nbsp;countries&nbsp;remaining&nbsp;mired&nbsp;in&nbsp;their&nbsp;sovereign&nbsp;debt&nbsp;crisis,&nbsp;theemerging&nbsp;Asia&nbsp;has&nbsp;become&nbsp;the&nbsp;main&nbsp;force&nbsp;to&nbsp;drive&nbsp;global&nbsp;economic&nbsp;growth&nbsp;and&nbsp;the&nbsp;focus&nbsp;of&nbsp;theglobal&nbsp;market.</span></p>\n<p class=\"MsoNormal\" style=\"margin: 11.25pt 0in 0.0001pt; text-align: justify; background-position: initial initial; background-repeat: initial initial;\"><span style=\"font-family: 'Arial','sans-serif'; mso-fareast-font-family: 'Times New Roman'; color: #666666;\">\"Although&nbsp;there're&nbsp;still&nbsp;a&nbsp;lot&nbsp;of&nbsp;uncertainties&nbsp;in&nbsp;the&nbsp;global&nbsp;economy,&nbsp;I'm&nbsp;cautiously&nbsp;optimistictowards&nbsp;the&nbsp;overall&nbsp;economic&nbsp;growth&nbsp;in&nbsp;2013&nbsp;and&nbsp;recent&nbsp;economic&nbsp;data&nbsp;shows&nbsp;that&nbsp;Asia&nbsp;is&nbsp;on&nbsp;apositive&nbsp;uptrend,\"&nbsp;AFF&nbsp;2013&nbsp;Steering&nbsp;Committee&nbsp;Chairman&nbsp;Benjamin&nbsp;Hung,&nbsp;Executive&nbsp;Directorand&nbsp;Chief&nbsp;Executive&nbsp;Officer&nbsp;of&nbsp;Standard&nbsp;Chartered&nbsp;Bank&nbsp;(Hong&nbsp;Kong)&nbsp;Ltd,&nbsp;told&nbsp;a&nbsp;pressconference&nbsp;on&nbsp;Wednesday.</span></p>\n<p class=\"MsoNormal\" style=\"margin: 11.25pt 0in 0.0001pt; text-align: justify; background-position: initial initial; background-repeat: initial initial;\"><span style=\"font-family: 'Arial','sans-serif'; mso-fareast-font-family: 'Times New Roman'; color: #666666;\">The&nbsp;Chinese&nbsp;mainland's&nbsp;economic&nbsp;policies&nbsp;will&nbsp;remain&nbsp;a&nbsp;focal&nbsp;point&nbsp;for&nbsp;the&nbsp;world,&nbsp;said&nbsp;Hung,adding&nbsp;that&nbsp;this&nbsp;reality&nbsp;will&nbsp;be&nbsp;reflected&nbsp;at&nbsp;this&nbsp;year's&nbsp;forum.</span></p>\n<p class=\"MsoNormal\" style=\"margin: 11.25pt 0in 0.0001pt; text-align: justify; background-position: initial initial; background-repeat: initial initial;\"><span style=\"font-family: 'Arial','sans-serif'; mso-fareast-font-family: 'Times New Roman'; color: #666666;\">\"Along&nbsp;with&nbsp;a&nbsp;panel&nbsp;discussion&nbsp;on&nbsp;China&nbsp;opportunities,&nbsp;the&nbsp;forum&nbsp;will&nbsp;feature&nbsp;workshops&nbsp;onChina's&nbsp;agenda&nbsp;for&nbsp;reforming&nbsp;its&nbsp;financial&nbsp;system,&nbsp;trends&nbsp;and&nbsp;opportunities&nbsp;in&nbsp;the&nbsp;global&nbsp;use&nbsp;ofthe&nbsp;yuan&nbsp;and&nbsp;the&nbsp;China-ASEAN&nbsp;business&nbsp;partnership,\"&nbsp;he&nbsp;said.</span></p>\n<p class=\"MsoNormal\" style=\"margin: 11.25pt 0in 0.0001pt; text-align: justify; background-position: initial initial; background-repeat: initial initial;\"><span style=\"font-family: 'Arial','sans-serif'; mso-fareast-font-family: 'Times New Roman'; color: #666666;\">Beyond&nbsp;China,&nbsp;there&nbsp;is&nbsp;much&nbsp;on&nbsp;the&nbsp;AFF&nbsp;agenda&nbsp;to&nbsp;look&nbsp;forward&nbsp;to,&nbsp;said&nbsp;Raymond&nbsp;Yip,Assistant&nbsp;Executive&nbsp;Director&nbsp;at&nbsp;HKTDC.&nbsp;The&nbsp;forum&nbsp;has&nbsp;a&nbsp;panel&nbsp;discussion&nbsp;on&nbsp;global&nbsp;investmentopportunities&nbsp;and&nbsp;another&nbsp;on&nbsp;food&nbsp;and&nbsp;agriculture.</span></p>\n<p class=\"MsoNormal\" style=\"margin: 11.25pt 0in 0.0001pt; text-align: justify; background-position: initial initial; background-repeat: initial initial;\"><span style=\"font-family: 'Arial','sans-serif'; mso-fareast-font-family: 'Times New Roman'; color: #666666;\">This&nbsp;year's&nbsp;workshops&nbsp;range&nbsp;from&nbsp;Asian&nbsp;financial&nbsp;integration&nbsp;to&nbsp;investments&nbsp;in&nbsp;Myanmar&nbsp;andprivate&nbsp;wealth&nbsp;management,&nbsp;Yip&nbsp;said.</span></p>\n<p class=\"MsoNormal\" style=\"margin: 11.25pt 0in 0.0001pt; text-align: justify; background-position: initial initial; background-repeat: initial initial;\"><span style=\"font-family: 'Arial','sans-serif'; mso-fareast-font-family: 'Times New Roman'; color: #666666;\">Prominent&nbsp;speakers&nbsp;at&nbsp;this&nbsp;year's&nbsp;event&nbsp;will&nbsp;include&nbsp;Australian&nbsp;Deputy&nbsp;Prime&nbsp;Minister&nbsp;andTreasurer&nbsp;Wayne&nbsp;Swan;&nbsp;Federal&nbsp;Reserve&nbsp;Bank&nbsp;of&nbsp;Chicago&nbsp;President&nbsp;and&nbsp;CEO&nbsp;Charles&nbsp;Evans;Italy's&nbsp;Minister&nbsp;of&nbsp;Economy&nbsp;and&nbsp;Finance&nbsp;Vittorio&nbsp;Grilli;&nbsp;South&nbsp;Korea's&nbsp;Minister&nbsp;of&nbsp;Strategy&nbsp;andFinance&nbsp;Bahk&nbsp;Jaewan;&nbsp;and&nbsp;Luxembourg's&nbsp;Minister&nbsp;of&nbsp;Finance&nbsp;Luc&nbsp;Frieden.</span></p>\n<p class=\"MsoNormal\" style=\"margin: 11.25pt 0in 0.0001pt; text-align: justify; background-position: initial initial; background-repeat: initial initial;\"><span style=\"font-family: 'Arial','sans-serif'; mso-fareast-font-family: 'Times New Roman'; color: #666666;\">Top&nbsp;officials&nbsp;and&nbsp;business&nbsp;figures&nbsp;from&nbsp;the&nbsp;mainland&nbsp;will&nbsp;include&nbsp;Chairman&nbsp;of&nbsp;the&nbsp;ChinaSecurities&nbsp;Regulatory&nbsp;Commission&nbsp;Guo&nbsp;Shuqing;&nbsp;China&nbsp;Investment&nbsp;Corporation&nbsp;Chairman&nbsp;andCEO&nbsp;Lou&nbsp;Jiwei;&nbsp;President&nbsp;and&nbsp;CEO&nbsp;of&nbsp;China&nbsp;International&nbsp;Capital&nbsp;Corporation&nbsp;Ltd&nbsp;Levin&nbsp;Zhu;COFCO&nbsp;Corporation&nbsp;Chairman&nbsp;Frank&nbsp;Gaoning&nbsp;Ning;&nbsp;SOHO&nbsp;China&nbsp;Chairman&nbsp;Pan&nbsp;Shiyi;&nbsp;andVice-Chairman&nbsp;and&nbsp;CEO&nbsp;of&nbsp;Fosun&nbsp;Group&nbsp;Liang&nbsp;Xinjun.</span></p>\n<p class=\"MsoNormal\" style=\"margin: 11.25pt 0in 0.0001pt; text-align: justify; background-position: initial initial; background-repeat: initial initial;\"><span style=\"font-family: 'Arial','sans-serif'; mso-fareast-font-family: 'Times New Roman'; color: #666666;\">Other&nbsp;corporate&nbsp;leaders&nbsp;taking&nbsp;part&nbsp;include&nbsp;Prudential&nbsp;plc&nbsp;Chairman&nbsp;Paul&nbsp;Manduca;&nbsp;FarEastern&nbsp;Group&nbsp;Chairman&nbsp;Douglas&nbsp;Hsu;&nbsp;and&nbsp;CT&nbsp;Corp&nbsp;CEO&nbsp;Frits&nbsp;Seegers.</span></p>\n<p class=\"MsoNormal\" style=\"text-align: justify;\"><strong><span style=\"font-size: 14.0pt; font-family: 'Times New Roman','serif'; mso-fareast-font-family: 'Times New Roman'; color: #666666;\">Abney and Associates</span></strong></p>",
            "tags": [],
            "relations": {},
            "dateAdded": "2013-01-14T03:16:47Z",
            "dateModified": "2013-01-14T03:16:47Z"
        }
    }
]