[
    {
        "key": "EA9MSPT9",
        "version": 1,
        "library": {
            "type": "group",
            "id": 25467,
            "name": "Computer Hacking Essay",
            "links": {
                "alternate": {
                    "href": "https://www.zotero.org/groups/computer_hacking_essay",
                    "type": "text/html"
                }
            }
        },
        "links": {
            "self": {
                "href": "https://api.zotero.org/groups/25467/items/EA9MSPT9",
                "type": "application/json"
            },
            "alternate": {
                "href": "https://www.zotero.org/groups/computer_hacking_essay/items/EA9MSPT9",
                "type": "text/html"
            },
            "up": {
                "href": "https://api.zotero.org/groups/25467/items/8EZW3MJU",
                "type": "application/json"
            }
        },
        "meta": {
            "createdByUser": {
                "id": 341358,
                "username": "Samual Geggus",
                "name": "",
                "links": {
                    "alternate": {
                        "href": "https://www.zotero.org/samual_geggus",
                        "type": "text/html"
                    }
                }
            },
            "numChildren": 0
        },
        "data": {
            "key": "EA9MSPT9",
            "version": 1,
            "parentItem": "8EZW3MJU",
            "itemType": "note",
            "note": "<p>Accession Number: 52112102; Villasenor, John 1; Affiliations: 1: Electrical engineering department, University of California, Los Angeles; Issue Info: Aug2010, Vol. 303 Issue 2, p82; Subject Term: COMPUTER manufacturing; Subject Term: COMPUTER input-output equipment -- Security measures; Subject Term: HACKING (Computer security); Subject Term: ELECTRONIC digital computer manufacturing; Subject Term: COMPUTERS -- Circuits -- Design &amp; construction; Subject Term: COMPUTER security; Subject Term: COMPUTER viruses -- Prevention; Subject Term: MICROCHIP microprocessors; Subject Term: INTEGRATED circuits -- Design &amp; construction -- Equipment &amp; supplies; NAICS/Industry Codes: 334111 Electronic Computer Manufacturing; Number of Pages: 6p; Illustrations: 2 Color Photographs; Document Type: Article; Full Text Word Count: 3148</p>",
            "tags": [],
            "relations": {},
            "dateAdded": "2010-09-13T22:30:42Z",
            "dateModified": "2010-09-13T22:30:42Z"
        }
    },
    {
        "key": "UJFAXP5Z",
        "version": 1,
        "library": {
            "type": "group",
            "id": 25467,
            "name": "Computer Hacking Essay",
            "links": {
                "alternate": {
                    "href": "https://www.zotero.org/groups/computer_hacking_essay",
                    "type": "text/html"
                }
            }
        },
        "links": {
            "self": {
                "href": "https://api.zotero.org/groups/25467/items/UJFAXP5Z",
                "type": "application/json"
            },
            "alternate": {
                "href": "https://www.zotero.org/groups/computer_hacking_essay/items/UJFAXP5Z",
                "type": "text/html"
            }
        },
        "meta": {
            "createdByUser": {
                "id": 341358,
                "username": "Samual Geggus",
                "name": "",
                "links": {
                    "alternate": {
                        "href": "https://www.zotero.org/samual_geggus",
                        "type": "text/html"
                    }
                }
            },
            "creatorSummary": "Anonymous",
            "parsedDate": "2009-06-01",
            "numChildren": 0
        },
        "data": {
            "key": "UJFAXP5Z",
            "version": 1,
            "itemType": "journalArticle",
            "title": "The Spies Inside Your Computer",
            "creators": [
                {
                    "creatorType": "author",
                    "name": "Anonymous"
                }
            ],
            "abstractNote": "(Syndicated News) A Russian gang of criminals has been rumbled for infiltrating thousands of corporate and government computers to steal passwords and other valuable information. The cyber thieves adapted a program called Coreflood to help themselves to online bank accounts. Security expert Joe Stewart from S ecure Works, a computer security firm in Atlanta has been following the progress of Coreflood as it wormed its way into PC's belonging to hospitals, companies and government agencies. At a recent security conference in Las Vegas he explained its modus operandi \"It's spying on you, capturing your logons, user names, passwords, bank balances, contents of your e-mail.\" Enormously adept at getting onto your system, there are numerous ways to unwittingly pick up a Spyware program. By visiting a dodgy website, downloading from a file sharing network, or just by opening an email. Also be wary of dialogue boxes on some websites. This is a classic way for a piece of Spyware software to infiltrate your computer. You click to close the box, but what you don't realize is that you're actually giving the green light for the program to rummage around your hard drive.",
            "publicationTitle": "Asian Pages",
            "publisher": "",
            "place": "",
            "date": "Jun 1-Jun 14, 2009",
            "volume": "19",
            "issue": "19",
            "section": "",
            "partNumber": "",
            "partTitle": "",
            "pages": "16",
            "series": "",
            "seriesTitle": "",
            "seriesText": "",
            "journalAbbreviation": "",
            "DOI": "",
            "citationKey": "",
            "url": "",
            "accessDate": "",
            "PMID": "",
            "PMCID": "",
            "ISSN": "15268675",
            "archive": "",
            "archiveLocation": "",
            "shortTitle": "",
            "language": "",
            "libraryCatalog": "ProQuest",
            "callNumber": "",
            "rights": "",
            "extra": "",
            "tags": [
                {
                    "tag": "COMPUTER security",
                    "type": 1
                },
                {
                    "tag": "Computer crime",
                    "type": 1
                },
                {
                    "tag": "Computer programming",
                    "type": 1
                },
                {
                    "tag": "Hackers",
                    "type": 1
                },
                {
                    "tag": "Spyware",
                    "type": 1
                }
            ],
            "collections": [],
            "relations": {},
            "dateAdded": "2010-09-13T22:30:42Z",
            "dateModified": "2010-09-13T22:30:42Z"
        }
    },
    {
        "key": "S2684TFC",
        "version": 1,
        "library": {
            "type": "group",
            "id": 25467,
            "name": "Computer Hacking Essay",
            "links": {
                "alternate": {
                    "href": "https://www.zotero.org/groups/computer_hacking_essay",
                    "type": "text/html"
                }
            }
        },
        "links": {
            "self": {
                "href": "https://api.zotero.org/groups/25467/items/S2684TFC",
                "type": "application/json"
            },
            "alternate": {
                "href": "https://www.zotero.org/groups/computer_hacking_essay/items/S2684TFC",
                "type": "text/html"
            }
        },
        "meta": {
            "createdByUser": {
                "id": 341358,
                "username": "Samual Geggus",
                "name": "",
                "links": {
                    "alternate": {
                        "href": "https://www.zotero.org/samual_geggus",
                        "type": "text/html"
                    }
                }
            },
            "creatorSummary": "Bernard",
            "parsedDate": "2010-05",
            "numChildren": 0
        },
        "data": {
            "key": "S2684TFC",
            "version": 1,
            "itemType": "journalArticle",
            "title": "The Security Industry World Has Changed",
            "creators": [
                {
                    "creatorType": "author",
                    "firstName": "R.",
                    "lastName": "Bernard"
                }
            ],
            "abstractNote": "A sophisticated version of this attack would involve injecting captured video data of the object removal several hours later in time from when it actually occurred. The system's time-stamped video would then provide \"evidence\" of the object's removal at a time when the attackers were several hours away, establishing a solid alibi.",
            "publicationTitle": "Security Technology Executive",
            "publisher": "",
            "place": "",
            "date": "May 2010",
            "volume": "20",
            "issue": "4",
            "section": "",
            "partNumber": "",
            "partTitle": "",
            "pages": "15",
            "series": "",
            "seriesTitle": "",
            "seriesText": "",
            "journalAbbreviation": "",
            "DOI": "",
            "citationKey": "",
            "url": "",
            "accessDate": "",
            "PMID": "",
            "PMCID": "",
            "ISSN": "19468474",
            "archive": "",
            "archiveLocation": "",
            "shortTitle": "",
            "language": "",
            "libraryCatalog": "ProQuest",
            "callNumber": "",
            "rights": "",
            "extra": "",
            "tags": [
                {
                    "tag": "COMPUTER security",
                    "type": 1
                },
                {
                    "tag": "Changes",
                    "type": 1
                },
                {
                    "tag": "Disclosure",
                    "type": 1
                },
                {
                    "tag": "Hackers",
                    "type": 1
                }
            ],
            "collections": [],
            "relations": {},
            "dateAdded": "2010-09-13T22:30:42Z",
            "dateModified": "2010-09-13T22:30:42Z"
        }
    },
    {
        "key": "8EZW3MJU",
        "version": 1,
        "library": {
            "type": "group",
            "id": 25467,
            "name": "Computer Hacking Essay",
            "links": {
                "alternate": {
                    "href": "https://www.zotero.org/groups/computer_hacking_essay",
                    "type": "text/html"
                }
            }
        },
        "links": {
            "self": {
                "href": "https://api.zotero.org/groups/25467/items/8EZW3MJU",
                "type": "application/json"
            },
            "alternate": {
                "href": "https://www.zotero.org/groups/computer_hacking_essay/items/8EZW3MJU",
                "type": "text/html"
            }
        },
        "meta": {
            "createdByUser": {
                "id": 341358,
                "username": "Samual Geggus",
                "name": "",
                "links": {
                    "alternate": {
                        "href": "https://www.zotero.org/samual_geggus",
                        "type": "text/html"
                    }
                }
            },
            "creatorSummary": "Villasenor",
            "parsedDate": "2010",
            "numChildren": 1
        },
        "data": {
            "key": "8EZW3MJU",
            "version": 1,
            "itemType": "journalArticle",
            "title": "The Hacker in Your Hardware.",
            "creators": [
                {
                    "creatorType": "author",
                    "firstName": "John",
                    "lastName": "Villasenor"
                }
            ],
            "abstractNote": "The article discusses tampering with or hacking of computer hardware including integrated circuits and microchips used as components in computer manufacturing. The article explains that contemporary circuits are vulnerable to viruses because of the many sources of complex component design used in their manufacture. If such a virus is implanted in a microchip program code, it can be activated by a time or date trigger after it is assembled into the hardware of an overall computer or cell phone system. Security measures that can be used to guard against such attacks are discussed. INSET: HOW TO STOP HARDWARE HACKERS.",
            "publicationTitle": "Scientific American",
            "publisher": "",
            "place": "",
            "date": "2010",
            "volume": "303",
            "issue": "2",
            "section": "",
            "partNumber": "",
            "partTitle": "",
            "pages": "82-87",
            "series": "",
            "seriesTitle": "",
            "seriesText": "",
            "journalAbbreviation": "",
            "DOI": "Article",
            "citationKey": "",
            "url": "",
            "accessDate": "",
            "PMID": "",
            "PMCID": "",
            "ISSN": "00368733",
            "archive": "",
            "archiveLocation": "",
            "shortTitle": "",
            "language": "",
            "libraryCatalog": "EBSCOhost",
            "callNumber": "",
            "rights": "",
            "extra": "",
            "tags": [
                {
                    "tag": "COMPUTER input-output equipment -- Security measures",
                    "type": 1
                },
                {
                    "tag": "COMPUTER manufacturing",
                    "type": 1
                },
                {
                    "tag": "COMPUTER security",
                    "type": 1
                },
                {
                    "tag": "COMPUTER viruses -- Prevention",
                    "type": 1
                },
                {
                    "tag": "COMPUTERS -- Circuits -- Design & construction",
                    "type": 1
                },
                {
                    "tag": "ELECTRONIC digital computer manufacturing",
                    "type": 1
                },
                {
                    "tag": "HACKING (Computer security)",
                    "type": 1
                },
                {
                    "tag": "INTEGRATED circuits -- Design & construction -- Equipment & supplies",
                    "type": 1
                },
                {
                    "tag": "MICROCHIP microprocessors",
                    "type": 1
                }
            ],
            "collections": [],
            "relations": {},
            "dateAdded": "2010-09-13T22:30:42Z",
            "dateModified": "2010-09-13T22:30:42Z"
        }
    },
    {
        "key": "8KZJIPA5",
        "version": 1,
        "library": {
            "type": "group",
            "id": 25467,
            "name": "Computer Hacking Essay",
            "links": {
                "alternate": {
                    "href": "https://www.zotero.org/groups/computer_hacking_essay",
                    "type": "text/html"
                }
            }
        },
        "links": {
            "self": {
                "href": "https://api.zotero.org/groups/25467/items/8KZJIPA5",
                "type": "application/json"
            },
            "alternate": {
                "href": "https://www.zotero.org/groups/computer_hacking_essay/items/8KZJIPA5",
                "type": "text/html"
            }
        },
        "meta": {
            "createdByUser": {
                "id": 341358,
                "username": "Samual Geggus",
                "name": "",
                "links": {
                    "alternate": {
                        "href": "https://www.zotero.org/samual_geggus",
                        "type": "text/html"
                    }
                }
            },
            "creatorSummary": "Villasenor",
            "parsedDate": "2010-08",
            "numChildren": 0
        },
        "data": {
            "key": "8KZJIPA5",
            "version": 1,
            "itemType": "webpage",
            "title": "The Hacker in Your Hardware",
            "creators": [
                {
                    "creatorType": "author",
                    "firstName": "John",
                    "lastName": "Villasenor"
                }
            ],
            "abstractNote": "The article discusses tampering with or hacking of computer hardware including integrated circuits and microchips used as components in computer manufacturing. The article explains that contemporary circuits are vulnerable to viruses because of the many sources of complex component design used in their manufacture. If such a virus is implanted in a microchip program code, it can be activated by a time or date trigger after it is assembled into the hardware of an overall computer or cell phone system. Security measures that can be used to guard against such attacks are discussed. INSET: HOW TO STOP HARDWARE HACKERS.",
            "websiteTitle": "EBSCO HOST",
            "websiteType": "Database",
            "date": "August 2010",
            "publisher": "",
            "place": "",
            "DOI": "",
            "citationKey": "",
            "url": "http://pc6bf4sj5m.search.serialssolutions.com/directLink?&atitle=The%20Hacker%20in%20Your%20Hardware&author=John%20Villasenor&issn=00368733&title=Scientific%20American&volume=303&issue=2&date=20100801&spage=82&id=doi:&sid=ProQ_ss&genre=article&lang=en",
            "accessDate": "2010-09-13T22:02:59Z",
            "shortTitle": "",
            "language": "",
            "rights": "",
            "extra": "",
            "tags": [],
            "collections": [],
            "relations": {},
            "dateAdded": "2010-09-13T22:30:42Z",
            "dateModified": "2010-09-13T22:30:42Z"
        }
    },
    {
        "key": "AVTVVTRQ",
        "version": 1,
        "library": {
            "type": "group",
            "id": 25467,
            "name": "Computer Hacking Essay",
            "links": {
                "alternate": {
                    "href": "https://www.zotero.org/groups/computer_hacking_essay",
                    "type": "text/html"
                }
            }
        },
        "links": {
            "self": {
                "href": "https://api.zotero.org/groups/25467/items/AVTVVTRQ",
                "type": "application/json"
            },
            "alternate": {
                "href": "https://www.zotero.org/groups/computer_hacking_essay/items/AVTVVTRQ",
                "type": "text/html"
            }
        },
        "meta": {
            "createdByUser": {
                "id": 341358,
                "username": "Samual Geggus",
                "name": "",
                "links": {
                    "alternate": {
                        "href": "https://www.zotero.org/samual_geggus",
                        "type": "text/html"
                    }
                }
            },
            "creatorSummary": "Radcliff",
            "parsedDate": "2008-10",
            "numChildren": 0
        },
        "data": {
            "key": "AVTVVTRQ",
            "version": 1,
            "itemType": "journalArticle",
            "title": "PORTRAIT OF A HACKER",
            "creators": [
                {
                    "creatorType": "author",
                    "firstName": "D.",
                    "lastName": "Radcliff"
                }
            ],
            "abstractNote": "",
            "publicationTitle": "SC Magazine",
            "publisher": "",
            "place": "",
            "date": "Oct 2008",
            "volume": "19",
            "issue": "10",
            "section": "",
            "partNumber": "",
            "partTitle": "",
            "pages": "40",
            "series": "",
            "seriesTitle": "",
            "seriesText": "",
            "journalAbbreviation": "",
            "DOI": "",
            "citationKey": "",
            "url": "",
            "accessDate": "",
            "PMID": "",
            "PMCID": "",
            "ISSN": "15476693",
            "archive": "",
            "archiveLocation": "",
            "shortTitle": "",
            "language": "",
            "libraryCatalog": "ProQuest",
            "callNumber": "",
            "rights": "",
            "extra": "",
            "tags": [
                {
                    "tag": "COMPUTER security",
                    "type": 1
                },
                {
                    "tag": "Computer viruses",
                    "type": 1
                },
                {
                    "tag": "Denial of service attacks",
                    "type": 1
                },
                {
                    "tag": "Hackers",
                    "type": 1
                },
                {
                    "tag": "Internet crime",
                    "type": 1
                },
                {
                    "tag": "Spamming",
                    "type": 1
                }
            ],
            "collections": [],
            "relations": {},
            "dateAdded": "2010-09-13T22:30:42Z",
            "dateModified": "2010-09-13T22:30:42Z"
        }
    },
    {
        "key": "E9KFTG3F",
        "version": 1,
        "library": {
            "type": "group",
            "id": 25467,
            "name": "Computer Hacking Essay",
            "links": {
                "alternate": {
                    "href": "https://www.zotero.org/groups/computer_hacking_essay",
                    "type": "text/html"
                }
            }
        },
        "links": {
            "self": {
                "href": "https://api.zotero.org/groups/25467/items/E9KFTG3F",
                "type": "application/json"
            },
            "alternate": {
                "href": "https://www.zotero.org/groups/computer_hacking_essay/items/E9KFTG3F",
                "type": "text/html"
            }
        },
        "meta": {
            "createdByUser": {
                "id": 341358,
                "username": "Samual Geggus",
                "name": "",
                "links": {
                    "alternate": {
                        "href": "https://www.zotero.org/samual_geggus",
                        "type": "text/html"
                    }
                }
            },
            "numChildren": 0
        },
        "data": {
            "key": "E9KFTG3F",
            "version": 1,
            "itemType": "webpage",
            "title": "Document View - ProQuest",
            "creators": [],
            "abstractNote": "",
            "websiteTitle": "",
            "websiteType": "",
            "date": "",
            "publisher": "",
            "place": "",
            "DOI": "",
            "citationKey": "",
            "url": "http://proquest.umi.com.mutex.gmu.edu/pqdweb?index=17&did=466675871&SrchMode=1&sid=4&Fmt=4&VInst=PROD&VType=PQD&RQT=309&VName=PQD&TS=1284416468&clientId=13",
            "accessDate": "2010-09-13T22:24:27Z",
            "shortTitle": "",
            "language": "",
            "rights": "",
            "extra": "",
            "tags": [],
            "collections": [],
            "relations": {},
            "dateAdded": "2010-09-13T22:30:42Z",
            "dateModified": "2010-09-13T22:30:42Z"
        }
    },
    {
        "key": "T5ME3T58",
        "version": 1,
        "library": {
            "type": "group",
            "id": 25467,
            "name": "Computer Hacking Essay",
            "links": {
                "alternate": {
                    "href": "https://www.zotero.org/groups/computer_hacking_essay",
                    "type": "text/html"
                }
            }
        },
        "links": {
            "self": {
                "href": "https://api.zotero.org/groups/25467/items/T5ME3T58",
                "type": "application/json"
            },
            "alternate": {
                "href": "https://www.zotero.org/groups/computer_hacking_essay/items/T5ME3T58",
                "type": "text/html"
            }
        },
        "meta": {
            "createdByUser": {
                "id": 341358,
                "username": "Samual Geggus",
                "name": "",
                "links": {
                    "alternate": {
                        "href": "https://www.zotero.org/samual_geggus",
                        "type": "text/html"
                    }
                }
            },
            "numChildren": 0
        },
        "data": {
            "key": "T5ME3T58",
            "version": 1,
            "itemType": "webpage",
            "title": "Document View - ProQuest",
            "creators": [],
            "abstractNote": "",
            "websiteTitle": "",
            "websiteType": "",
            "date": "",
            "publisher": "",
            "place": "",
            "DOI": "",
            "citationKey": "",
            "url": "http://proquest.umi.com.mutex.gmu.edu/pqdweb?index=4&did=1742076091&SrchMode=1&sid=4&Fmt=3&VInst=PROD&VType=PQD&RQT=309&VName=PQD&TS=1284416468&clientId=13",
            "accessDate": "2010-09-13T22:20:30Z",
            "shortTitle": "",
            "language": "",
            "rights": "",
            "extra": "",
            "tags": [],
            "collections": [],
            "relations": {},
            "dateAdded": "2010-09-13T22:30:42Z",
            "dateModified": "2010-09-13T22:30:42Z"
        }
    },
    {
        "key": "G2RWN5M6",
        "version": 1,
        "library": {
            "type": "group",
            "id": 25467,
            "name": "Computer Hacking Essay",
            "links": {
                "alternate": {
                    "href": "https://www.zotero.org/groups/computer_hacking_essay",
                    "type": "text/html"
                }
            }
        },
        "links": {
            "self": {
                "href": "https://api.zotero.org/groups/25467/items/G2RWN5M6",
                "type": "application/json"
            },
            "alternate": {
                "href": "https://www.zotero.org/groups/computer_hacking_essay/items/G2RWN5M6",
                "type": "text/html"
            }
        },
        "meta": {
            "createdByUser": {
                "id": 341358,
                "username": "Samual Geggus",
                "name": "",
                "links": {
                    "alternate": {
                        "href": "https://www.zotero.org/samual_geggus",
                        "type": "text/html"
                    }
                }
            },
            "numChildren": 0
        },
        "data": {
            "key": "G2RWN5M6",
            "version": 1,
            "itemType": "webpage",
            "title": "Document View - ProQuest",
            "creators": [],
            "abstractNote": "",
            "websiteTitle": "",
            "websiteType": "",
            "date": "",
            "publisher": "",
            "place": "",
            "DOI": "",
            "citationKey": "",
            "url": "http://proquest.umi.com.mutex.gmu.edu/pqdweb?index=25&did=1744793011&SrchMode=1&sid=3&Fmt=3&VInst=PROD&VType=PQD&RQT=309&VName=PQD&TS=1284416233&clientId=13",
            "accessDate": "2010-09-13T22:17:00Z",
            "shortTitle": "",
            "language": "",
            "rights": "",
            "extra": "",
            "tags": [],
            "collections": [],
            "relations": {},
            "dateAdded": "2010-09-13T22:30:42Z",
            "dateModified": "2010-09-13T22:30:42Z"
        }
    },
    {
        "key": "56VJKR66",
        "version": 1,
        "library": {
            "type": "group",
            "id": 25467,
            "name": "Computer Hacking Essay",
            "links": {
                "alternate": {
                    "href": "https://www.zotero.org/groups/computer_hacking_essay",
                    "type": "text/html"
                }
            }
        },
        "links": {
            "self": {
                "href": "https://api.zotero.org/groups/25467/items/56VJKR66",
                "type": "application/json"
            },
            "alternate": {
                "href": "https://www.zotero.org/groups/computer_hacking_essay/items/56VJKR66",
                "type": "text/html"
            }
        },
        "meta": {
            "createdByUser": {
                "id": 341358,
                "username": "Samual Geggus",
                "name": "",
                "links": {
                    "alternate": {
                        "href": "https://www.zotero.org/samual_geggus",
                        "type": "text/html"
                    }
                }
            },
            "numChildren": 0
        },
        "data": {
            "key": "56VJKR66",
            "version": 1,
            "itemType": "webpage",
            "title": "Document View - ProQuest",
            "creators": [],
            "abstractNote": "",
            "websiteTitle": "",
            "websiteType": "",
            "date": "",
            "publisher": "",
            "place": "",
            "DOI": "",
            "citationKey": "",
            "url": "http://proquest.umi.com.mutex.gmu.edu/pqdweb?index=5&did=2049973301&SrchMode=1&sid=3&Fmt=3&VInst=PROD&VType=PQD&RQT=309&VName=PQD&TS=1284415384&clientId=13",
            "accessDate": "2010-09-13T22:11:07Z",
            "shortTitle": "",
            "language": "",
            "rights": "",
            "extra": "",
            "tags": [],
            "collections": [],
            "relations": {},
            "dateAdded": "2010-09-13T22:30:42Z",
            "dateModified": "2010-09-13T22:30:42Z"
        }
    },
    {
        "key": "XRKDR483",
        "version": 1,
        "library": {
            "type": "group",
            "id": 25467,
            "name": "Computer Hacking Essay",
            "links": {
                "alternate": {
                    "href": "https://www.zotero.org/groups/computer_hacking_essay",
                    "type": "text/html"
                }
            }
        },
        "links": {
            "self": {
                "href": "https://api.zotero.org/groups/25467/items/XRKDR483",
                "type": "application/json"
            },
            "alternate": {
                "href": "https://www.zotero.org/groups/computer_hacking_essay/items/XRKDR483",
                "type": "text/html"
            }
        },
        "meta": {
            "createdByUser": {
                "id": 341358,
                "username": "Samual Geggus",
                "name": "",
                "links": {
                    "alternate": {
                        "href": "https://www.zotero.org/samual_geggus",
                        "type": "text/html"
                    }
                }
            },
            "creatorSummary": "Reid Goldsborough",
            "parsedDate": "2003-10-23",
            "numChildren": 0
        },
        "data": {
            "key": "XRKDR483",
            "version": 1,
            "itemType": "journalArticle",
            "title": "Arming yourself in the virus war",
            "creators": [
                {
                    "creatorType": "author",
                    "name": "Reid Goldsborough"
                }
            ],
            "abstractNote": "Computer viruses, worms and other forms of malicious code have become so prevalent that the government, which typically acts only in response to disasters, has begun to act on them. Goldsborough discusses the impact of computer viruses and the initiatives taken to counteract these attacks.",
            "publicationTitle": "Black Issues in Higher Education",
            "publisher": "",
            "place": "",
            "date": "Oct 23, 2003",
            "volume": "20",
            "issue": "18",
            "section": "",
            "partNumber": "",
            "partTitle": "",
            "pages": "44",
            "series": "",
            "seriesTitle": "",
            "seriesText": "",
            "journalAbbreviation": "",
            "DOI": "",
            "citationKey": "",
            "url": "",
            "accessDate": "",
            "PMID": "",
            "PMCID": "",
            "ISSN": "07420277",
            "archive": "",
            "archiveLocation": "",
            "shortTitle": "",
            "language": "",
            "libraryCatalog": "ProQuest",
            "callNumber": "",
            "rights": "",
            "extra": "",
            "tags": [
                {
                    "tag": "COMPUTER security",
                    "type": 1
                },
                {
                    "tag": "Computer viruses",
                    "type": 1
                },
                {
                    "tag": "Electronic mail systems",
                    "type": 1
                },
                {
                    "tag": "Hackers",
                    "type": 1
                }
            ],
            "collections": [],
            "relations": {},
            "dateAdded": "2010-09-13T22:30:42Z",
            "dateModified": "2010-09-13T22:30:42Z"
        }
    }
]