[
    {
        "key": "S9E7KMD8",
        "version": 11,
        "library": {
            "type": "group",
            "id": 233474,
            "name": "Dyman & Associates Projects",
            "links": {
                "alternate": {
                    "href": "https://www.zotero.org/groups/dyman__associates_projects",
                    "type": "text/html"
                }
            }
        },
        "links": {
            "self": {
                "href": "https://api.zotero.org/groups/233474/items/S9E7KMD8",
                "type": "application/json"
            },
            "alternate": {
                "href": "https://www.zotero.org/groups/dyman__associates_projects/items/S9E7KMD8",
                "type": "text/html"
            },
            "up": {
                "href": "https://api.zotero.org/groups/233474/items/NR8DRX53",
                "type": "application/json"
            }
        },
        "meta": {
            "numChildren": 0
        },
        "data": {
            "key": "S9E7KMD8",
            "version": 11,
            "parentItem": "NR8DRX53",
            "itemType": "note",
            "note": "<p class=\"MsoNoSpacing\"><span style=\"font-size: 12.0pt; font-family: 'Times New Roman','serif';\">Hardly a day goes by without news of another <a href=\"http://www.cioinsight.com/security/employees-the-weakest-link-in-security.html/\">data breach</a>. It's safe to say that we live and work in risky times. But there's a growing recognition that cybercriminals aren't the only threat&mdash;or even the primary threat to an enterprise. \"There's a far greater need to educate and train employees about <a href=\"http://dymanassociatesprojects.com/\">security issues</a> and put controls and monitoring in place to increase the odds of compliance,\" says John Hunt, a principal in information security at consulting firm PwC.</span></p>\n<p class=\"MsoNoSpacing\"><span style=\"font-size: 12.0pt; font-family: 'Times New Roman','serif';\">&nbsp;</span></p>\n<p class=\"MsoNoSpacing\"><span style=\"font-size: 12.0pt; font-family: 'Times New Roman','serif';\">It's a task that's easier said than done, particularly in an era of BYOD, <a href=\"http://www.buzznet.com/groups/dymanassociatesprojects/\">consumer technology</a> and personal clouds. According to Jonathan Gossels, president and CEO of security firm SystemsExperts, it's critical to construct policies and security protections around two basic areas: malicious insiders and those who inadvertently breach security. \"The best security program in the world can be undermined by ill-advised behavior,\" Gossels explains.</span></p>\n<p class=\"MsoNoSpacing\"><span style=\"font-size: 12.0pt; font-family: 'Times New Roman','serif';\">&nbsp;</span></p>\n<p class=\"MsoNoSpacing\"><strong><span style=\"font-size: 12.0pt; font-family: 'Times New Roman','serif';\">Construct effective policies.</span></strong><span style=\"font-size: 12.0pt; font-family: 'Times New Roman','serif';\"> Surveys indicate that many workers are not adhering to existing policies. In some cases, they simply disregard them. \"The thing that you have to keep in mind,\" notes Hunt, \"is that policies must be clear, understandable and not interfere with the ability of people to get their work done.\" If an organization is struggling with non-compliance and shadow IT, then it may be time to reexamine policies, as well as the underlying systems and tools the enterprise has in place. \"Many organizations have older policies that don't take into account today's tech tools, such as iPads and other portable devices,\" says Hunt. The policies should also extend to contract workers and freelancers, he notes.</span></p>\n<p class=\"MsoNoSpacing\"><span style=\"font-size: 12.0pt; font-family: 'Times New Roman','serif';\">&nbsp;</span></p>\n<p class=\"MsoNoSpacing\"><strong><span style=\"font-size: 12.0pt; font-family: 'Times New Roman','serif';\">Educate and train employees.</span></strong><span style=\"font-size: 12.0pt; font-family: 'Times New Roman','serif';\"> One of the biggest problems, says Gossels, is weak passwords and workers sharing passwords. He recommends educating employees about the use of strong passwords. It's also essential to teach employees about increasingly <a href=\"http://dymanassociatesprojects.com/enter.html\">sophisticated phishing techniques</a>. And executives, including CEOs, make the mistake of clicking bad links. \"When you receive an e-mail from the Better Business Bureau or a fax that looks legitimate, it's very easy in the rush of the moment to click it,\" says Gossels. It's critical that employees learn to hover over links. Some organizations also use simulated phishing and spear phishing attacks to identify careless workers. Finally, employees must understand the risks of using personal clouds, USB drives, and other media to share and store sensitive data.</span></p>\n<p class=\"MsoNoSpacing\"><span style=\"font-size: 12.0pt; font-family: 'Times New Roman','serif';\">&nbsp;</span></p>\n<p class=\"MsoNoSpacing\"><strong><span style=\"font-size: 12.0pt; font-family: 'Times New Roman','serif';\">Develop controls that match policies.</span></strong><span style=\"font-size: 12.0pt; font-family: 'Times New Roman','serif';\"> It's one thing to introduce a collection of security policies, it's another to build controls that effectively enforce them. According to Gossels, any time an organization introduces a policy, it should also consider how to build in technical controls, preferably automated ones. \"The less you leave things to humans and chance, the better off you will be,\" he says. That means using mobile device management and media asset management tools, two-step verification, encryption, endpoint security, and other security measures. It also means looking for so-called low and slow approaches that frequently fly below the radar. But, more than anything else, it means mapping threats to policies and security systems&mdash;and ensuring that tools are in place to wipe lost or stolen smartphones and tablets, when necessary. Hunt adds that it's crucial to consider, when adopting policies, how long it will take to build the matching controls. He sees often companies lagging by nine to 12 months&mdash;or more.</span></p>\n<p class=\"MsoNoSpacing\"><span style=\"font-size: 12.0pt; font-family: 'Times New Roman','serif';\">&nbsp;</span></p>\n<p>&nbsp;</p>\n<p class=\"MsoNoSpacing\"><strong><span style=\"font-size: 12.0pt; font-family: 'Times New Roman','serif';\">Monitor activity and access from all endpoints.</span></strong><span style=\"font-size: 12.0pt; font-family: 'Times New Roman','serif';\"> There's a growing focus on monitoring the network and endpoints for unusual activity and odd behavior, Hunt explains. \"If you detect activity that doesn't fit the norm of a person's role, then it's a good idea to take a closer look at the situation,\" he points out. In fact, even if an organization embeds role-based policies and controls in its IT systems&mdash;something that's generally viewed as a best practice&mdash;it's wise to monitor activity and look for anomalies. Networks and systems are particularly vulnerable during mergers and acquisitions and during transitions to different or new systems.</span></p>",
            "tags": [],
            "relations": {},
            "dateAdded": "2014-03-22T01:22:24Z",
            "dateModified": "2014-03-22T01:22:24Z"
        }
    },
    {
        "key": "NR8DRX53",
        "version": 11,
        "library": {
            "type": "group",
            "id": 233474,
            "name": "Dyman & Associates Projects",
            "links": {
                "alternate": {
                    "href": "https://www.zotero.org/groups/dyman__associates_projects",
                    "type": "text/html"
                }
            }
        },
        "links": {
            "self": {
                "href": "https://api.zotero.org/groups/233474/items/NR8DRX53",
                "type": "application/json"
            },
            "alternate": {
                "href": "https://www.zotero.org/groups/dyman__associates_projects/items/NR8DRX53",
                "type": "text/html"
            }
        },
        "meta": {
            "createdByUser": {
                "id": 1694170,
                "username": "valerioanema11",
                "name": "",
                "links": {
                    "alternate": {
                        "href": "https://www.zotero.org/valerioanema11",
                        "type": "text/html"
                    }
                }
            },
            "numChildren": 1
        },
        "data": {
            "key": "NR8DRX53",
            "version": 11,
            "itemType": "journalArticle",
            "title": "Dyman & Associates Risk Management Projects: The Weakest Link in Security?",
            "creators": [],
            "abstractNote": "",
            "publicationTitle": "",
            "publisher": "",
            "place": "",
            "date": "",
            "volume": "",
            "issue": "",
            "section": "",
            "partNumber": "",
            "partTitle": "",
            "pages": "",
            "series": "",
            "seriesTitle": "",
            "seriesText": "",
            "journalAbbreviation": "",
            "DOI": "",
            "citationKey": "",
            "url": "http://www.cioinsight.com/security/employees-the-weakest-link-in-security.html/",
            "accessDate": "",
            "PMID": "",
            "PMCID": "",
            "ISSN": "",
            "archive": "",
            "archiveLocation": "",
            "shortTitle": "",
            "language": "",
            "libraryCatalog": "",
            "callNumber": "",
            "rights": "",
            "extra": "",
            "tags": [
                {
                    "tag": "Dyman & Associates Risk Management Projects"
                },
                {
                    "tag": "The Weakest Link in Security"
                }
            ],
            "collections": [],
            "relations": {},
            "dateAdded": "2014-03-22T01:22:24Z",
            "dateModified": "2014-03-22T01:22:24Z"
        }
    },
    {
        "key": "M3H22GVK",
        "version": 10,
        "library": {
            "type": "group",
            "id": 233474,
            "name": "Dyman & Associates Projects",
            "links": {
                "alternate": {
                    "href": "https://www.zotero.org/groups/dyman__associates_projects",
                    "type": "text/html"
                }
            }
        },
        "links": {
            "self": {
                "href": "https://api.zotero.org/groups/233474/items/M3H22GVK",
                "type": "application/json"
            },
            "alternate": {
                "href": "https://www.zotero.org/groups/dyman__associates_projects/items/M3H22GVK",
                "type": "text/html"
            }
        },
        "meta": {
            "createdByUser": {
                "id": 1694170,
                "username": "valerioanema11",
                "name": "",
                "links": {
                    "alternate": {
                        "href": "https://www.zotero.org/valerioanema11",
                        "type": "text/html"
                    }
                }
            },
            "numChildren": 1
        },
        "data": {
            "key": "M3H22GVK",
            "version": 10,
            "itemType": "journalArticle",
            "title": "Dyman & Associates Risk Management Projects: Information, Disinformation and the Credibility Crisis",
            "creators": [],
            "abstractNote": "",
            "publicationTitle": "",
            "publisher": "",
            "place": "",
            "date": "",
            "volume": "",
            "issue": "",
            "section": "",
            "partNumber": "",
            "partTitle": "",
            "pages": "",
            "series": "",
            "seriesTitle": "",
            "seriesText": "",
            "journalAbbreviation": "",
            "DOI": "",
            "citationKey": "",
            "url": "http://www.globalresearch.ca/information-disinformation-and-the-credibility-crisis-where-is-the-truth-in-todays-news-reporting/5373876",
            "accessDate": "",
            "PMID": "",
            "PMCID": "",
            "ISSN": "",
            "archive": "",
            "archiveLocation": "",
            "shortTitle": "",
            "language": "",
            "libraryCatalog": "",
            "callNumber": "",
            "rights": "",
            "extra": "",
            "tags": [
                {
                    "tag": "Dyman & Associates Risk Management Projects"
                },
                {
                    "tag": "Information, Disinformation and the Credibility Crisis"
                }
            ],
            "collections": [],
            "relations": {},
            "dateAdded": "2014-03-20T01:29:36Z",
            "dateModified": "2014-03-20T01:29:36Z"
        }
    },
    {
        "key": "DEC7J535",
        "version": 10,
        "library": {
            "type": "group",
            "id": 233474,
            "name": "Dyman & Associates Projects",
            "links": {
                "alternate": {
                    "href": "https://www.zotero.org/groups/dyman__associates_projects",
                    "type": "text/html"
                }
            }
        },
        "links": {
            "self": {
                "href": "https://api.zotero.org/groups/233474/items/DEC7J535",
                "type": "application/json"
            },
            "alternate": {
                "href": "https://www.zotero.org/groups/dyman__associates_projects/items/DEC7J535",
                "type": "text/html"
            },
            "up": {
                "href": "https://api.zotero.org/groups/233474/items/M3H22GVK",
                "type": "application/json"
            }
        },
        "meta": {
            "numChildren": 0
        },
        "data": {
            "key": "DEC7J535",
            "version": 10,
            "parentItem": "M3H22GVK",
            "itemType": "note",
            "note": "<p class=\"MsoNoSpacing\">A large percentage of the American population no longer trusts <a href=\"http://dymanassociatesprojects.com/\">mainstream news outlets</a> either on television or in print. A June 2013 Gallup poll indicates nearly 4 out of 5 Americans among younger generations from age 21-64 cannot trust the major news networks, not when the likes of NBC and MSNBC are owned by General Electric, Comcast and possibly Time Warner in this age of super-mergers. Both the circulation and very survival of America&rsquo;s news print organizations have shriveled or dried up completely.</p>\n<p class=\"MsoNoSpacing\">&nbsp;</p>\n<p class=\"MsoNoSpacing\">Amongst the nation&rsquo;s largest cities, few traditional newspapers are still left today. Even the perennial powerhouse dailies like the New York Times, Washington Post and LA Times have gravely suffered, and in an attempt to keep up with the changing times, years ago moved to the internet as their mainstay means of surviving the <a href=\"http://www.buzznet.com/groups/dymanassociatesprojects/\">computer age</a>. Time Magazine and Newsweek similarly have been forced to downsize with Newsweek permanently suspending its print circulation. In recent years&rsquo; Time Magazine in print has been reduced in size to a mere skimpy little shadow of what it once was.</p>\n<p class=\"MsoNoSpacing\">&nbsp;</p>\n<p class=\"MsoNoSpacing\">To a significant portion of Americans, all the mainstream news corporations have been rendered state propaganda and disinformation tools for the US government. Indeed their embedded (alias &ldquo;in-bed&rdquo;) news reporting has become a cynical joke amongst the populace. Entertainment fluff and filler space have come to obscure and replace real news and real issues that vitally affect the well being, safety and concerns of the American public. The controlling powers behind mainstream media outlets have made a concerted effort to keep American citizens the last to know especially when it comes to world events and developments.</p>\n<p class=\"MsoNoSpacing\">&nbsp;</p>\n<p class=\"MsoNoSpacing\">According that that same Gallup poll from last year, this growing distrust that Americans have towards mainstream news is only exceeded by their distrust towards big business, HMO&rsquo;s and US Congress. Even last month&rsquo;s Gallup poll shows President Obama&rsquo;s approval rating dipping to an all time low of just 39% with the majority of Americans now disapproving of his job performance. This negative, across-the-boards view reflects both a generalized discontent and disconnect with today&rsquo;s status quo power structure. And as a result, a mass exodus of US citizens have switched viewing their world through the known distorted lens of traditional news coverage to that of the world wide web, currently celebrating its quarter century anniversary this week.</p>\n<p class=\"MsoNoSpacing\">&nbsp;</p>\n<p class=\"MsoNoSpacing\">Hence, in recent years a growing number of people have been turning to <a href=\"http://dymanassociatesprojects.com/enter.html\">online sources</a> as their primary means for news information and current world events. Despite unlimited numbers to choose from of websites portending to depict accurate coverage of domestic and international events, in today&rsquo;s world the notion of objective, unbiased news coverage becomes highly suspect. Thus, an informed public must be extremely discerning when it comes to believing what is the truth and what are the lies based on propagandist manipulation. Ultimately individuals will naturally gravitate toward whatever sources of news best fit their particular biases and beliefs based on their world paradigm. So one&rsquo;s sense of reality and truth about the world becomes both highly elusive and subjective, if not impossible to tease out and grasp.</p>\n<p class=\"MsoNoSpacing\">&nbsp;</p>\n<p class=\"MsoNoSpacing\">To compound this already perplexing, complex problem, the systematic dumbing-down of America has produced a mounting population that all too frequently gullibly accepts either the spoon-fed deception and lies of mainstream media or often equally biased non-mainstream news outlets. For decades now Americans have been conditioned to no longer think critically and discriminately to sort out facts from fiction.</p>\n<p class=\"MsoNoSpacing\">&nbsp;</p>\n<p class=\"MsoNoSpacing\">Creative questioning, exploring curiosity or daring to challenge authority is entirely absent from the current US public education system bent on homogenized conformity and socialization toward robotic compliance. And as a consequence, too many Americans blindly accept as gospel truth anything they read, that is if they still read at all, naively assuming it would not be fit to print on the internet, in books, magazines or newspapers or seen on TV, if it were not all true.</p>\n<p class=\"MsoNoSpacing\">&nbsp;</p>\n<p>&nbsp;</p>\n<p class=\"MsoNoSpacing\"><a href=\"http://www.globalresearch.ca/information-disinformation-and-the-credibility-crisis-where-is-the-truth-in-todays-news-reporting/5373876\">Where is the truth in news reporting today?</a></p>",
            "tags": [],
            "relations": {},
            "dateAdded": "2014-03-20T01:29:36Z",
            "dateModified": "2014-03-20T01:29:36Z"
        }
    },
    {
        "key": "CTA9NJQC",
        "version": 9,
        "library": {
            "type": "group",
            "id": 233474,
            "name": "Dyman & Associates Projects",
            "links": {
                "alternate": {
                    "href": "https://www.zotero.org/groups/dyman__associates_projects",
                    "type": "text/html"
                }
            }
        },
        "links": {
            "self": {
                "href": "https://api.zotero.org/groups/233474/items/CTA9NJQC",
                "type": "application/json"
            },
            "alternate": {
                "href": "https://www.zotero.org/groups/dyman__associates_projects/items/CTA9NJQC",
                "type": "text/html"
            },
            "up": {
                "href": "https://api.zotero.org/groups/233474/items/KDC4VUQB",
                "type": "application/json"
            }
        },
        "meta": {
            "numChildren": 0
        },
        "data": {
            "key": "CTA9NJQC",
            "version": 9,
            "parentItem": "KDC4VUQB",
            "itemType": "note",
            "note": "<p class=\"MsoNoSpacing\">Executive Summary</p>\n<p class=\"MsoNoSpacing\">&nbsp;</p>\n<p class=\"MsoNoSpacing\">The modern enterprise presents numerous challenges to <a href=\"http://dymanassociatesprojects.com/\">IT security leaders</a>, as it requires a diverse array of applications, websites, protocols, and platforms. Mobile devices are changing the fundamental composition of network traffic and introducing new types of malware, while <a href=\"http://www.buzznet.com/groups/dymanassociatesprojects/\">consumerization trends</a> such as BYOD are introducing new devices over which IT has little control.</p>\n<p class=\"MsoNoSpacing\">&nbsp;</p>\n<p class=\"MsoNoSpacing\">To organize the chaos, IT must look beyond a network packet&rsquo;s site, port, or IP address and determine a security posture that relies on the complete context of data usage. A deep, thorough inspection of real-time network data can help provide the content awareness required for the <a href=\"http://dymanassociatesprojects.com/enter.html\">granular management</a> that a flexible, modern enterprise requires.</p>\n<p class=\"MsoNoSpacing\">&nbsp;</p>\n<p class=\"MsoNoSpacing\">This report examines the shortcomings of traditional security and management processes exposed by device proliferation, an increasingly mobile workforce, and a movement toward cloud applications. It also demonstrates how a deeper understanding of application data in transit can help IT build more-flexible, business-friendly management procedures that continue to provide security and efficiency without disrupting productivity. The report concludes with best practices for testing application-aware network-security devices to gain a greater understanding of the value they will provide when deployed onto the enterprise network.</p>\n<p class=\"MsoNoSpacing\">&nbsp;</p>\n<p class=\"MsoNoSpacing\">Consider the following:</p>\n<p class=\"MsoNoSpacing\">&nbsp;</p>\n<p class=\"MsoNoSpacing\" style=\"margin-left: .5in; text-indent: -.25in; mso-list: l0 level1 lfo1;\"><!--[if !supportLists]--><span style=\"font-family: Symbol; mso-fareast-font-family: Symbol; mso-bidi-font-family: Symbol;\">&middot;<span style=\"font-size: 7pt; font-family: 'Times New Roman';\">&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; </span></span><!--[endif]-->Traditional security and access controls are no longer capable of protecting enterprise networks yet continue to serve a purpose within a defense-in-depth strategy.</p>\n<p class=\"MsoNoSpacing\">&nbsp;</p>\n<p class=\"MsoNoSpacing\" style=\"margin-left: .5in; text-indent: -.25in; mso-list: l0 level1 lfo1;\"><!--[if !supportLists]--><span style=\"font-family: Symbol; mso-fareast-font-family: Symbol; mso-bidi-font-family: Symbol;\">&middot;<span style=\"font-size: 7pt; font-family: 'Times New Roman';\">&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; </span></span><!--[endif]-->BYOD and other consumerization trends bring new threats to the enterprise that must be addressed by innovating network-security and policy management.</p>\n<p class=\"MsoNoSpacing\">&nbsp;</p>\n<p class=\"MsoNoSpacing\" style=\"margin-left: .5in; text-indent: -.25in; mso-list: l0 level1 lfo1;\"><!--[if !supportLists]--><span style=\"font-family: Symbol; mso-fareast-font-family: Symbol; mso-bidi-font-family: Symbol;\">&middot;<span style=\"font-size: 7pt; font-family: 'Times New Roman';\">&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; </span></span><!--[endif]-->IT security leaders must validate and test these new application-aware network-security devices and identity-based policy-management systems.</p>\n<p class=\"MsoNoSpacing\">&nbsp;</p>\n<p>&nbsp;</p>\n<p class=\"MsoNoSpacing\"><a href=\"http://research.gigaom.com/report/application-awareness-using-data-inspection-to-create-context-sensitive-security-policies/\">Continue reading</a></p>",
            "tags": [],
            "relations": {},
            "dateAdded": "2014-03-18T01:41:40Z",
            "dateModified": "2014-03-18T01:41:40Z"
        }
    },
    {
        "key": "KDC4VUQB",
        "version": 9,
        "library": {
            "type": "group",
            "id": 233474,
            "name": "Dyman & Associates Projects",
            "links": {
                "alternate": {
                    "href": "https://www.zotero.org/groups/dyman__associates_projects",
                    "type": "text/html"
                }
            }
        },
        "links": {
            "self": {
                "href": "https://api.zotero.org/groups/233474/items/KDC4VUQB",
                "type": "application/json"
            },
            "alternate": {
                "href": "https://www.zotero.org/groups/dyman__associates_projects/items/KDC4VUQB",
                "type": "text/html"
            }
        },
        "meta": {
            "createdByUser": {
                "id": 1694170,
                "username": "valerioanema11",
                "name": "",
                "links": {
                    "alternate": {
                        "href": "https://www.zotero.org/valerioanema11",
                        "type": "text/html"
                    }
                }
            },
            "numChildren": 1
        },
        "data": {
            "key": "KDC4VUQB",
            "version": 9,
            "itemType": "journalArticle",
            "title": "Dyman & Associates Risk Management Projects: Application awareness using data inspection",
            "creators": [],
            "abstractNote": "",
            "publicationTitle": "",
            "publisher": "",
            "place": "",
            "date": "",
            "volume": "",
            "issue": "",
            "section": "",
            "partNumber": "",
            "partTitle": "",
            "pages": "",
            "series": "",
            "seriesTitle": "",
            "seriesText": "",
            "journalAbbreviation": "",
            "DOI": "",
            "citationKey": "",
            "url": "http://research.gigaom.com/report/application-awareness-using-data-inspection-to-create-context-sensitive-security-policies/",
            "accessDate": "",
            "PMID": "",
            "PMCID": "",
            "ISSN": "",
            "archive": "",
            "archiveLocation": "",
            "shortTitle": "",
            "language": "",
            "libraryCatalog": "",
            "callNumber": "",
            "rights": "",
            "extra": "",
            "tags": [
                {
                    "tag": "Application awareness using data inspection to create context-sensitive security policies"
                },
                {
                    "tag": "Dyman & Associates Risk Management Projects"
                }
            ],
            "collections": [],
            "relations": {},
            "dateAdded": "2014-03-18T01:41:40Z",
            "dateModified": "2014-03-18T01:41:40Z"
        }
    },
    {
        "key": "R58A838R",
        "version": 8,
        "library": {
            "type": "group",
            "id": 233474,
            "name": "Dyman & Associates Projects",
            "links": {
                "alternate": {
                    "href": "https://www.zotero.org/groups/dyman__associates_projects",
                    "type": "text/html"
                }
            }
        },
        "links": {
            "self": {
                "href": "https://api.zotero.org/groups/233474/items/R58A838R",
                "type": "application/json"
            },
            "alternate": {
                "href": "https://www.zotero.org/groups/dyman__associates_projects/items/R58A838R",
                "type": "text/html"
            }
        },
        "meta": {
            "createdByUser": {
                "id": 1694170,
                "username": "valerioanema11",
                "name": "",
                "links": {
                    "alternate": {
                        "href": "https://www.zotero.org/valerioanema11",
                        "type": "text/html"
                    }
                }
            },
            "numChildren": 0
        },
        "data": {
            "key": "R58A838R",
            "version": 8,
            "itemType": "journalArticle",
            "title": "Dyman & Associates Risk Management Projects: Facebook users being the targets by the scammers with PlayStation 4 offers",
            "creators": [],
            "abstractNote": "The unsuspecting and unwary Facebook users are being lured by cybercriminals with the promises of shiny gadgets. These scammers took advantage of the time when everyone is looking out for last minute deals ahead of Christmas. They are all over where they could defraud busy Christmas shoppers, they were jumping on the bandwagon and offering free gadgets and games on social networking sites in return for personal information.\n\nKaspersky Lab has seen scammers trying to interest Facebook users with pages on PlayStation 4 offers, and on new Apple iPhones and iPads during the lead up to this festive period and there were even pages about an iPhone 8, which doesn’t exist.\n\nAccording to Kaspersky, despite the unofficial-looking posts, many are falling for them and lending credence to the scam campaigns. One supposed Christmas competition offering PlayStation 4 consoles had received over 776 shares.\n\nKaspersky risk management projects Lab notifies public that liking these false Facebook offers could leave them at risk of hacking and malware.\n\n“Scammers use numerous techniques to get people to give away their Facebook logins. Clicking on an email link entitled ‘Facebook Christmas Specials’, for example, could open a fake Facebook portal in which users are required to enter their login details,” warned Kaspersky.\n\n“As the interface appears identical to the real social media platform, users don’t realise what’s happening. Once the victims have entered their details, the hacker has their passwords. As most people tend to use the same password for services such as eBay, Amazon and webmail, this can trigger a dangerous chain reaction.”\n\nKaspersky said that social media users should never click links that don’t come from trusted parties. Even if a link has been posted from a friend they should still be wary, as that friend may have been hacked.",
            "publicationTitle": "",
            "publisher": "",
            "place": "",
            "date": "",
            "volume": "",
            "issue": "",
            "section": "",
            "partNumber": "",
            "partTitle": "",
            "pages": "",
            "series": "",
            "seriesTitle": "",
            "seriesText": "",
            "journalAbbreviation": "",
            "DOI": "",
            "citationKey": "",
            "url": "http://dymanassociatesprojects.com/blog/facebook-users-being-the-targets-by-the-scammers-with-playstation-4-offers/",
            "accessDate": "",
            "PMID": "",
            "PMCID": "",
            "ISSN": "",
            "archive": "",
            "archiveLocation": "",
            "shortTitle": "",
            "language": "",
            "libraryCatalog": "",
            "callNumber": "",
            "rights": "",
            "extra": "",
            "tags": [
                {
                    "tag": "Dyman & Associates Risk Management Projects, Facebook users being the targets by the scammers with PlayStation 4 offers"
                }
            ],
            "collections": [],
            "relations": {},
            "dateAdded": "2014-01-08T07:54:08Z",
            "dateModified": "2014-01-08T07:54:08Z"
        }
    },
    {
        "key": "S92TAWAJ",
        "version": 7,
        "library": {
            "type": "group",
            "id": 233474,
            "name": "Dyman & Associates Projects",
            "links": {
                "alternate": {
                    "href": "https://www.zotero.org/groups/dyman__associates_projects",
                    "type": "text/html"
                }
            }
        },
        "links": {
            "self": {
                "href": "https://api.zotero.org/groups/233474/items/S92TAWAJ",
                "type": "application/json"
            },
            "alternate": {
                "href": "https://www.zotero.org/groups/dyman__associates_projects/items/S92TAWAJ",
                "type": "text/html"
            }
        },
        "meta": {
            "createdByUser": {
                "id": 1714670,
                "username": "sheinnejim",
                "name": "",
                "links": {
                    "alternate": {
                        "href": "https://www.zotero.org/sheinnejim",
                        "type": "text/html"
                    }
                }
            },
            "numChildren": 0
        },
        "data": {
            "key": "S92TAWAJ",
            "version": 7,
            "itemType": "journalArticle",
            "title": "Dyman Review:  Park Associates, Bluetooth Smart Technology Connects Wearables to any Smartphone or Tablet",
            "creators": [],
            "abstractNote": "Watches, bracelets, gloves and hats, are currently being updated with Bluetooth wireless technology which allows them to collect data and send it back to a smartphone or tablet application. Bluetooth Smart is fast becoming the connectivity solution or wearable technology by appealing to consumers with both wearable sports and fitness trackers.\n\nBluetooth Smart, an intelligent and power-friendly version of Bluetooth wireless technology, is making wearables accessible for the mass market. The power-efficiency technology was created for devices needing to run off a small battery for an extended period of time and its applications is compatible with any smartphone or tablet. Bluetooth Smart also makes it easy for developers and OEMs to create solutions that will work with the billions of Bluetooth enabled products already in the market.",
            "publicationTitle": "",
            "publisher": "",
            "place": "",
            "date": "",
            "volume": "",
            "issue": "",
            "section": "",
            "partNumber": "",
            "partTitle": "",
            "pages": "",
            "series": "",
            "seriesTitle": "",
            "seriesText": "",
            "journalAbbreviation": "",
            "DOI": "",
            "citationKey": "",
            "url": "http://www.parksassociates.com/blog/article/bluetooth-smart-technology-connects-wearables-to-any-smartphone-or-tablet",
            "accessDate": "",
            "PMID": "",
            "PMCID": "",
            "ISSN": "",
            "archive": "",
            "archiveLocation": "",
            "shortTitle": "",
            "language": "",
            "libraryCatalog": "",
            "callNumber": "",
            "rights": "",
            "extra": "",
            "tags": [
                {
                    "tag": "Dyman Review,  Park Associates, Bluetooth Smart Technology Connects Wearables to any Smartphone or Tablet"
                }
            ],
            "collections": [],
            "relations": {},
            "dateAdded": "2014-01-05T01:21:17Z",
            "dateModified": "2014-01-05T01:21:17Z"
        }
    },
    {
        "key": "CIAZEEE3",
        "version": 6,
        "library": {
            "type": "group",
            "id": 233474,
            "name": "Dyman & Associates Projects",
            "links": {
                "alternate": {
                    "href": "https://www.zotero.org/groups/dyman__associates_projects",
                    "type": "text/html"
                }
            }
        },
        "links": {
            "self": {
                "href": "https://api.zotero.org/groups/233474/items/CIAZEEE3",
                "type": "application/json"
            },
            "alternate": {
                "href": "https://www.zotero.org/groups/dyman__associates_projects/items/CIAZEEE3",
                "type": "text/html"
            }
        },
        "meta": {
            "createdByUser": {
                "id": 1732527,
                "username": "geriunabia",
                "name": "",
                "links": {
                    "alternate": {
                        "href": "https://www.zotero.org/geriunabia",
                        "type": "text/html"
                    }
                }
            },
            "numChildren": 0
        },
        "data": {
            "key": "CIAZEEE3",
            "version": 6,
            "itemType": "journalArticle",
            "title": "Dyman Review:  Park Associates, Networked Medical Devices to exceed 14 million unit sales in 2018",
            "creators": [],
            "abstractNote": "Firm sees Health Data Gateway as Strategic Investment Focus for device makers, care providers\n\nNew digital health research from Parks Associates predicts U.S. unit sales of networked medical devices will exceed 14 million units by 2018, more than five times the sales from 2012. In the report Networked Medical Devices: Innovations & Business Models, analysts attribute multiple factors in driving this market, including an aging population and reforms spearheaded by the Affordable Care Act (ACA).\n\n\"The addressable market for networked medical devices includes 68 million Americans with hypertension and 26 million with diabetes,\" said Harry Wang, Director, Health & Mobile Product Research, Parks Associates. \"Consumers are also demanding more autonomy in managing their care, which will drive the market in 2014 to improve patients' self-care experience. Network connectivity will enable new business models built on health software and services instead of hardware and consumable sales.\"\n \n\nParks Associates reports networked medical devices, including weight scales, glucometers, and ECGs, will use a variety of networking protocols, such as Wi-Fi, Bluetooth, and ANT+, to enable patient self-care and point-of-care diagnosis.The networking functions on these medical devices create the need to aggregate sensor, test, and behavioral data, so solutions such as Qualcomm Life’s 2Net platform, which aggregates device data and can transmit to the cloud, will become more important in 2014.\n\n\"The health data gateway market will garner substantial interest from both device makers and care providers,” Wang said. “Health data will be a hot commodity in this ACA era. Device makers and health data gateway providers, both incumbents and start-ups, will leverage these data to build new revenue opportunities and create new business partnerships.\"\n\nParks Associates analysts noted Alere’s acquisition of MedApps adds a cloud-based solution to the company's offerings. Omron Healthcare’s Bluetooth blood-pressure monitor is competing with smartphone-based WiThings’ solution, and Insulet’s OmniPod Insulin Pump will face challenges from San Diego-based Tandem Diabetes Care and U.K.-based CellNovo. In niche device categories such as pulse oximeter and sleep apnea test devices, innovations from incumbents such as Nonim, Masimo, and ResMed and start-ups such as iHealth Labs and NovaSom will broaden the use cases of these devices for both end users and care professionals.\n\nDevice categories analyzed in Networked Medical Devices: Innovations & Business Models include weight scale, blood-pressure monitor, glucometer, insulin pump, ECG, pulse oximeter, sleep apnea test, and home INR test.\n\nAbout Parks Associates: Parks Associates is an internationally recognized market research and consulting company specializing in emerging consumer technology products and services. Founded in 1986, Parks Associates creates research capital for companies ranging from Fortune 500 to small start-ups through market reports, primary studies, consumer research, custom research, workshops, executive conferences, and annual service subscriptions.\n\nThe company's expertise includes digital media and platforms, entertainment and gaming, home networks, Internet and television services, digital health, mobile applications and services, support services, consumer apps, advanced advertising, consumer electronics, energy management, and home control systems and security.\n\nEach year, Parks Associates hosts industry webcasts, the CONNECTIONS™ Conference Series, and Smart Energy Summit: Engaging the Consumer.",
            "publicationTitle": "",
            "publisher": "",
            "place": "",
            "date": "",
            "volume": "",
            "issue": "",
            "section": "",
            "partNumber": "",
            "partTitle": "",
            "pages": "",
            "series": "",
            "seriesTitle": "",
            "seriesText": "",
            "journalAbbreviation": "",
            "DOI": "",
            "citationKey": "",
            "url": "http://www.parksassociates.com/blog/article/dec2013-medical-devices",
            "accessDate": "",
            "PMID": "",
            "PMCID": "",
            "ISSN": "",
            "archive": "",
            "archiveLocation": "",
            "shortTitle": "",
            "language": "",
            "libraryCatalog": "",
            "callNumber": "",
            "rights": "",
            "extra": "",
            "tags": [
                {
                    "tag": "Dyman Review,  Park Associates, Networked Medical Devices to exceed 14 million unit sales in 2018"
                }
            ],
            "collections": [],
            "relations": {},
            "dateAdded": "2014-01-04T02:27:13Z",
            "dateModified": "2014-01-04T02:27:13Z"
        }
    },
    {
        "key": "Z876R9HQ",
        "version": 5,
        "library": {
            "type": "group",
            "id": 233474,
            "name": "Dyman & Associates Projects",
            "links": {
                "alternate": {
                    "href": "https://www.zotero.org/groups/dyman__associates_projects",
                    "type": "text/html"
                }
            }
        },
        "links": {
            "self": {
                "href": "https://api.zotero.org/groups/233474/items/Z876R9HQ",
                "type": "application/json"
            },
            "alternate": {
                "href": "https://www.zotero.org/groups/dyman__associates_projects/items/Z876R9HQ",
                "type": "text/html"
            }
        },
        "meta": {
            "createdByUser": {
                "id": 1727487,
                "username": "erwancurt",
                "name": "",
                "links": {
                    "alternate": {
                        "href": "https://www.zotero.org/erwancurt",
                        "type": "text/html"
                    }
                }
            },
            "numChildren": 0
        },
        "data": {
            "key": "Z876R9HQ",
            "version": 5,
            "itemType": "journalArticle",
            "title": "Dyman Review: Parks Associates CEO honored at 2014 Legacy Awards",
            "creators": [],
            "abstractNote": "Tricia Parks, Chairman, Founder, and CEO of Parks Associates, was recently recognized by Women in CE as a 2014 Legacy Awards honoree. Other honorees include: Sandra Benedetto, director of product management for THX; Deena Ghazarian, vice president of global sales and strategy for Monster Products; Kathleen Thomas, vice president of domestic sales for AudioQuest; Deb Kassoff of CEA; and Nicole Yelland, director of marketing and communications for Livio.\n\nThe organization described this year’s honorees as CE leaders who are committed to innovation, growth, and continuous improvement within the industry.\n\nThe 2014 Legacy Awards will take place on January 7, during International CES.",
            "publicationTitle": "",
            "publisher": "",
            "place": "",
            "date": "",
            "volume": "",
            "issue": "",
            "section": "",
            "partNumber": "",
            "partTitle": "",
            "pages": "",
            "series": "",
            "seriesTitle": "",
            "seriesText": "",
            "journalAbbreviation": "",
            "DOI": "",
            "citationKey": "",
            "url": "http://www.parksassociates.com/blog/article/parks-associates-ceo-honored-at-2014-legacy-awards",
            "accessDate": "",
            "PMID": "",
            "PMCID": "",
            "ISSN": "",
            "archive": "",
            "archiveLocation": "",
            "shortTitle": "",
            "language": "",
            "libraryCatalog": "",
            "callNumber": "",
            "rights": "",
            "extra": "",
            "tags": [
                {
                    "tag": "Dyman Review, Parks Associates CEO honored at 2014 Legacy Awards"
                }
            ],
            "collections": [],
            "relations": {},
            "dateAdded": "2014-01-03T01:13:34Z",
            "dateModified": "2014-01-03T01:13:34Z"
        }
    },
    {
        "key": "BZAKRPXZ",
        "version": 4,
        "library": {
            "type": "group",
            "id": 233474,
            "name": "Dyman & Associates Projects",
            "links": {
                "alternate": {
                    "href": "https://www.zotero.org/groups/dyman__associates_projects",
                    "type": "text/html"
                }
            }
        },
        "links": {
            "self": {
                "href": "https://api.zotero.org/groups/233474/items/BZAKRPXZ",
                "type": "application/json"
            },
            "alternate": {
                "href": "https://www.zotero.org/groups/dyman__associates_projects/items/BZAKRPXZ",
                "type": "text/html"
            }
        },
        "meta": {
            "createdByUser": {
                "id": 1736409,
                "username": "gerlkee",
                "name": "",
                "links": {
                    "alternate": {
                        "href": "https://www.zotero.org/gerlkee",
                        "type": "text/html"
                    }
                }
            },
            "numChildren": 0
        },
        "data": {
            "key": "BZAKRPXZ",
            "version": 4,
            "itemType": "journalArticle",
            "title": "Dyman Review:  Park Associates, Company",
            "creators": [],
            "abstractNote": "Parks Associates is an internationally recognized market research and consulting company specializing in emerging consumer technology products and services. Since 1986, we have provided research and analysis to companies ranging from Fortune 500 to small start-ups through market reports, primary studies, consumer research, custom research, consultation, workshops, executive conferences, and annual service subscriptions.\n\nScope of Research\n\n› Global markets\n› Features and differentiation\n› Innovations and disruptive technologies\n› Market participants and company profiles\n› SWOT analysis\n› Customer preferences and purchase intentions\n› Consumer behavior and usage habits\n› Adoption and price sensitivity\t \n› Consumer segmentation\n› Optimal bundles\n› Channel dynamics\n› Market trends\n› Market sizing & forecasts\n› Value chain analysis\n› Branding\nWith each category, Parks Associates provides:\n\n>Primary Consumer Research\n>Industry and Competitive Analysis\n>Focus Groups\n>Forecasting and Distribution Analysis\n>Strategic Seminars and Workshops\n>Executive Conferences\n>Custom Projects and Consulting\n\nEvents\n\nParks Associates produces multiple events for industry executives throughout the year.  Our core industry events – CONNECTIONS™: The Digital Home Conference and Showcase – hosts over 500 industry executives each year. CONNECTIONS™ Europe examines digital living issues specific to the European continent, and CONNECTIONS™ Summit at CES reviews the year in digital product and services each year and looks ahead to the major consumer and industry trends.\n\nParks Associates also hosts research Webcasts every month.\n\nJob Opportunities - We are hiring! \n\nParks Associates is currently hiring. If you are interested in an opportunity to work for a leading market research firm, please contact Elizabeth Parks today.  \n\n>Research Intern\n>Marketing Intern\n>Researcher\n>Research Analyst\n>Research Director\n>Marketing Associate\n>Business Development Associate",
            "publicationTitle": "",
            "publisher": "",
            "place": "",
            "date": "",
            "volume": "",
            "issue": "",
            "section": "",
            "partNumber": "",
            "partTitle": "",
            "pages": "",
            "series": "",
            "seriesTitle": "",
            "seriesText": "",
            "journalAbbreviation": "",
            "DOI": "",
            "citationKey": "",
            "url": "http://www.parksassociates.com/page/company",
            "accessDate": "",
            "PMID": "",
            "PMCID": "",
            "ISSN": "",
            "archive": "",
            "archiveLocation": "",
            "shortTitle": "",
            "language": "",
            "libraryCatalog": "",
            "callNumber": "",
            "rights": "",
            "extra": "",
            "tags": [
                {
                    "tag": "Dyman Review,  Park Associates, Company "
                }
            ],
            "collections": [],
            "relations": {},
            "dateAdded": "2014-01-02T00:41:17Z",
            "dateModified": "2014-01-02T00:41:17Z"
        }
    },
    {
        "key": "DH6TM5NH",
        "version": 3,
        "library": {
            "type": "group",
            "id": 233474,
            "name": "Dyman & Associates Projects",
            "links": {
                "alternate": {
                    "href": "https://www.zotero.org/groups/dyman__associates_projects",
                    "type": "text/html"
                }
            }
        },
        "links": {
            "self": {
                "href": "https://api.zotero.org/groups/233474/items/DH6TM5NH",
                "type": "application/json"
            },
            "alternate": {
                "href": "https://www.zotero.org/groups/dyman__associates_projects/items/DH6TM5NH",
                "type": "text/html"
            }
        },
        "meta": {
            "createdByUser": {
                "id": 1694170,
                "username": "valerioanema11",
                "name": "",
                "links": {
                    "alternate": {
                        "href": "https://www.zotero.org/valerioanema11",
                        "type": "text/html"
                    }
                }
            },
            "numChildren": 0
        },
        "data": {
            "key": "DH6TM5NH",
            "version": 3,
            "itemType": "journalArticle",
            "title": "Dyman Review: Panchal Associates, Contact",
            "creators": [],
            "abstractNote": "We would like to introduce ourselves as a Manufacturer of Duoblock type Industrial OIL / GAS Burners, their spares & accessories. The Proprietor, Mr. B. H. Panchal is having vide experience in Erection, Commissioning & Servicing of M/S OERTLI & KLOCKNER type OIL / GAS Burners with M/S. IAEC INDIA LTD; BHANDUP, MUMBAI. We manufacture Oil / Gas Burners, their Spares, Accessories & Controllers like Positioner controllers, Electronic Low Water probe relay etc.\n\nWe also manufacture replacement spares for the Boilers manufactured by M/S. IAEC INDIA LTD., MUMBAI and any other Make & Brands of The Boilers & Burners. We Design & Manufacture Impo+rt substitute for special purpose Burners & their accessories. We also Sale & Service LANDIS & GYR, SATRONIC, PETERCEM & other Make & Brands of Sequence controllers for Oil & Gas Burners. We also undertake Guaranteed repairs of all types of the Burners & Boilers components, Controllers & their accessories.\n\nAddress\t\t\t:\t#84-89, New Modella Industrial Estate, Wagle Estate,         Thane - 400604, Maharashtra, INDIA.\n\nTel. No.\t\t\t:\t(022) 25827433 / 25800651 / 9920190503\n\nFax No.\t\t\t:\t(022) 25800651\n\nEmail\t\t\t:\tresponse@panchalassociates.com\n\nADDRESS (Factory)\t:\tUnit No.7, Ferrodie Indl.Co-Op Society Ltd.\nRoad No.22, Wagle Estate, Thane - 400 604, Maharashtra, INDIA",
            "publicationTitle": "",
            "publisher": "",
            "place": "",
            "date": "",
            "volume": "",
            "issue": "",
            "section": "",
            "partNumber": "",
            "partTitle": "",
            "pages": "",
            "series": "",
            "seriesTitle": "",
            "seriesText": "",
            "journalAbbreviation": "",
            "DOI": "",
            "citationKey": "",
            "url": "http://www.panchalassociates.com/contact.htm",
            "accessDate": "",
            "PMID": "",
            "PMCID": "",
            "ISSN": "",
            "archive": "",
            "archiveLocation": "",
            "shortTitle": "",
            "language": "",
            "libraryCatalog": "",
            "callNumber": "",
            "rights": "",
            "extra": "",
            "tags": [
                {
                    "tag": "Dyman Review, Panchal Associates, Contact"
                }
            ],
            "collections": [],
            "relations": {},
            "dateAdded": "2013-12-29T00:15:46Z",
            "dateModified": "2013-12-29T00:15:46Z"
        }
    },
    {
        "key": "5RABWDD4",
        "version": 2,
        "library": {
            "type": "group",
            "id": 233474,
            "name": "Dyman & Associates Projects",
            "links": {
                "alternate": {
                    "href": "https://www.zotero.org/groups/dyman__associates_projects",
                    "type": "text/html"
                }
            }
        },
        "links": {
            "self": {
                "href": "https://api.zotero.org/groups/233474/items/5RABWDD4",
                "type": "application/json"
            },
            "alternate": {
                "href": "https://www.zotero.org/groups/dyman__associates_projects/items/5RABWDD4",
                "type": "text/html"
            }
        },
        "meta": {
            "createdByUser": {
                "id": 1694170,
                "username": "valerioanema11",
                "name": "",
                "links": {
                    "alternate": {
                        "href": "https://www.zotero.org/valerioanema11",
                        "type": "text/html"
                    }
                }
            },
            "numChildren": 0
        },
        "data": {
            "key": "5RABWDD4",
            "version": 2,
            "itemType": "journalArticle",
            "title": "Dyman & Associates Risk Management Projects",
            "creators": [],
            "abstractNote": "Source: http://dymanassociatesprojects.com/about.html\n\nDyman & Associates Risk Management Projects is a Risk Management firm whose main office is based in Boston, MA. We operate in the following fields: Cyber Security, Project Management, Emergency Management, Technology Governance, and Physical Security. Our company is a minority-owned enterprise with both MBE & DBE certifications.\n\nQuite often, organizations muddle through crises in isolation, undertaking prime decisions within a vacuum. Dyman & Associates Risk Management Projects has the collective know-how to minimize your exposure to risk and help make your business become more resilient. We will work diligently for your benefit. We believe that honesty, reliability, and excellent customer service serve as the foundation for lasting relationships. Moreover, we supply empathy, humility, and a promise to give back to our community.\n\nCyber Security\nThe increase of incidents of cyber-attacks against businesses and government agencies in the United States continues. FBI Director Robert Mueller revealed that, \"Terrorism is still FBI's top priority. But very soon, we expect that the cyber threat will replace terrorism as the number one threat to national security\".\n\nDyman & Associates Risk Management Projects utilizes its decades-old track record in cyber security to provide protection for your employees, intellectual property, and other precious assets. Our consultants not only have many years of experience, but are also dedicated to the regular honing of their skills and keeping current on the innovations in hacking techniques and security trends.\n\nOur services include:\n•\tCloud Security\n•\tMobile Security\n•\tIncident Response\n•\tComputer Forensics\n•\tElectronic Discovery\n•\tPenetration Testing\n\nPlease follow, like and join us on :\nTwitter: @ dymanassociates\nGooglePlus: https://plus.google.com/b/103237330230122996179/103237330230122996179/about\nBlogger:http://dymanassociates.blogspot.nl/\nPinterest: http://www.pinterest.com/valerioanema/dyman-associates-projects/\nTumblr: http://dymanassociatesprojects.tumblr.com/\nFacebook: https://www.facebook.com/dyamanassociatesproject\nLinkedin: http://www.linkedin.com/groups/Dyman-Associates-Risk-Management-Projects-7415482",
            "publicationTitle": "",
            "publisher": "",
            "place": "",
            "date": "",
            "volume": "",
            "issue": "",
            "section": "",
            "partNumber": "",
            "partTitle": "",
            "pages": "",
            "series": "",
            "seriesTitle": "",
            "seriesText": "",
            "journalAbbreviation": "",
            "DOI": "",
            "citationKey": "",
            "url": "http://dymanassociatesprojects.com/about.html",
            "accessDate": "",
            "PMID": "",
            "PMCID": "",
            "ISSN": "",
            "archive": "",
            "archiveLocation": "",
            "shortTitle": "",
            "language": "",
            "libraryCatalog": "",
            "callNumber": "",
            "rights": "",
            "extra": "",
            "tags": [
                {
                    "tag": "Dyman & Associates Risk Management Projects"
                }
            ],
            "collections": [],
            "relations": {},
            "dateAdded": "2013-12-04T23:53:21Z",
            "dateModified": "2013-12-04T23:53:21Z"
        }
    }
]