[
    {
        "key": "H3JHB445",
        "version": 1,
        "library": {
            "type": "group",
            "id": 26177,
            "name": "JouranlArticles",
            "links": {
                "alternate": {
                    "href": "https://www.zotero.org/groups/jouranlarticles",
                    "type": "text/html"
                }
            }
        },
        "links": {
            "self": {
                "href": "https://api.zotero.org/groups/26177/items/H3JHB445",
                "type": "application/json"
            },
            "alternate": {
                "href": "https://www.zotero.org/groups/jouranlarticles/items/H3JHB445",
                "type": "text/html"
            },
            "up": {
                "href": "https://api.zotero.org/groups/26177/items/36QTF2TP",
                "type": "application/json"
            }
        },
        "meta": {
            "createdByUser": {
                "id": 342947,
                "username": "akha6",
                "name": "",
                "links": {
                    "alternate": {
                        "href": "https://www.zotero.org/akha6",
                        "type": "text/html"
                    }
                }
            }
        },
        "data": {
            "key": "H3JHB445",
            "version": 1,
            "parentItem": "36QTF2TP",
            "itemType": "attachment",
            "linkMode": "imported_url",
            "title": "What is spam?",
            "accessDate": "2010-09-18T17:29:26Z",
            "url": "http://spam.abuse.net/overview/whatisspam.shtml",
            "note": "",
            "contentType": "text/html",
            "charset": "windows-1252",
            "filename": "whatisspam.html",
            "md5": null,
            "mtime": 2147483647,
            "tags": [],
            "relations": {},
            "dateAdded": "2010-09-18T17:29:26Z",
            "dateModified": "2010-09-18T17:29:26Z"
        }
    },
    {
        "key": "36QTF2TP",
        "version": 1,
        "library": {
            "type": "group",
            "id": 26177,
            "name": "JouranlArticles",
            "links": {
                "alternate": {
                    "href": "https://www.zotero.org/groups/jouranlarticles",
                    "type": "text/html"
                }
            }
        },
        "links": {
            "self": {
                "href": "https://api.zotero.org/groups/26177/items/36QTF2TP",
                "type": "application/json"
            },
            "alternate": {
                "href": "https://www.zotero.org/groups/jouranlarticles/items/36QTF2TP",
                "type": "text/html"
            }
        },
        "meta": {
            "createdByUser": {
                "id": 342947,
                "username": "akha6",
                "name": "",
                "links": {
                    "alternate": {
                        "href": "https://www.zotero.org/akha6",
                        "type": "text/html"
                    }
                }
            },
            "numChildren": 1
        },
        "data": {
            "key": "36QTF2TP",
            "version": 1,
            "itemType": "webpage",
            "title": "What is spam?",
            "creators": [],
            "abstractNote": "",
            "websiteTitle": "",
            "websiteType": "",
            "date": "",
            "publisher": "",
            "place": "",
            "DOI": "",
            "citationKey": "",
            "url": "http://spam.abuse.net/overview/whatisspam.shtml",
            "accessDate": "2010-09-18T17:29:24Z",
            "shortTitle": "",
            "language": "",
            "rights": "",
            "extra": "",
            "tags": [],
            "collections": [
                "F4JUP63D"
            ],
            "relations": {},
            "dateAdded": "2010-09-18T17:29:24Z",
            "dateModified": "2010-09-18T17:29:24Z"
        }
    },
    {
        "key": "HFKT7URT",
        "version": 1,
        "library": {
            "type": "group",
            "id": 26177,
            "name": "JouranlArticles",
            "links": {
                "alternate": {
                    "href": "https://www.zotero.org/groups/jouranlarticles",
                    "type": "text/html"
                }
            }
        },
        "links": {
            "self": {
                "href": "https://api.zotero.org/groups/26177/items/HFKT7URT",
                "type": "application/json"
            },
            "alternate": {
                "href": "https://www.zotero.org/groups/jouranlarticles/items/HFKT7URT",
                "type": "text/html"
            },
            "up": {
                "href": "https://api.zotero.org/groups/26177/items/KR6PG4QN",
                "type": "application/json"
            }
        },
        "meta": {
            "createdByUser": {
                "id": 342947,
                "username": "akha6",
                "name": "",
                "links": {
                    "alternate": {
                        "href": "https://www.zotero.org/akha6",
                        "type": "text/html"
                    }
                }
            }
        },
        "data": {
            "key": "HFKT7URT",
            "version": 1,
            "parentItem": "KR6PG4QN",
            "itemType": "attachment",
            "linkMode": "imported_url",
            "title": "Computer Viruses / Virus Guide",
            "accessDate": "2010-09-18T14:49:32Z",
            "url": "http://www.internet-guide.co.uk/viruses.html",
            "note": "",
            "contentType": "text/html",
            "charset": "windows-1252",
            "filename": "viruses.html",
            "md5": null,
            "mtime": 2147483647,
            "tags": [],
            "relations": {},
            "dateAdded": "2010-09-18T14:49:32Z",
            "dateModified": "2010-09-18T14:49:32Z"
        }
    },
    {
        "key": "KR6PG4QN",
        "version": 1,
        "library": {
            "type": "group",
            "id": 26177,
            "name": "JouranlArticles",
            "links": {
                "alternate": {
                    "href": "https://www.zotero.org/groups/jouranlarticles",
                    "type": "text/html"
                }
            }
        },
        "links": {
            "self": {
                "href": "https://api.zotero.org/groups/26177/items/KR6PG4QN",
                "type": "application/json"
            },
            "alternate": {
                "href": "https://www.zotero.org/groups/jouranlarticles/items/KR6PG4QN",
                "type": "text/html"
            }
        },
        "meta": {
            "createdByUser": {
                "id": 342947,
                "username": "akha6",
                "name": "",
                "links": {
                    "alternate": {
                        "href": "https://www.zotero.org/akha6",
                        "type": "text/html"
                    }
                }
            },
            "numChildren": 1
        },
        "data": {
            "key": "KR6PG4QN",
            "version": 1,
            "itemType": "webpage",
            "title": "Computer Viruses / Virus Guide",
            "creators": [],
            "abstractNote": "",
            "websiteTitle": "",
            "websiteType": "",
            "date": "",
            "publisher": "",
            "place": "",
            "DOI": "",
            "citationKey": "",
            "url": "http://www.internet-guide.co.uk/viruses.html",
            "accessDate": "2010-09-18T14:49:30Z",
            "shortTitle": "",
            "language": "",
            "rights": "",
            "extra": "",
            "tags": [],
            "collections": [
                "F4JUP63D"
            ],
            "relations": {},
            "dateAdded": "2010-09-18T14:49:30Z",
            "dateModified": "2010-09-18T14:49:30Z"
        }
    },
    {
        "key": "66J7C9IN",
        "version": 1,
        "library": {
            "type": "group",
            "id": 26177,
            "name": "JouranlArticles",
            "links": {
                "alternate": {
                    "href": "https://www.zotero.org/groups/jouranlarticles",
                    "type": "text/html"
                }
            }
        },
        "links": {
            "self": {
                "href": "https://api.zotero.org/groups/26177/items/66J7C9IN",
                "type": "application/json"
            },
            "alternate": {
                "href": "https://www.zotero.org/groups/jouranlarticles/items/66J7C9IN",
                "type": "text/html"
            }
        },
        "meta": {
            "createdByUser": {
                "id": 342947,
                "username": "akha6",
                "name": "",
                "links": {
                    "alternate": {
                        "href": "https://www.zotero.org/akha6",
                        "type": "text/html"
                    }
                }
            },
            "numChildren": 0
        },
        "data": {
            "key": "66J7C9IN",
            "version": 1,
            "itemType": "attachment",
            "linkMode": "imported_url",
            "title": "maliciouscode.pdf",
            "accessDate": "2010-09-17T16:19:33Z",
            "url": "http://www.cs.cornell.edu/home/jgm/lang-based-security/maliciouscode.pdf",
            "note": "",
            "contentType": "application/pdf",
            "charset": "windows-1252",
            "filename": "maliciouscode.pdf",
            "md5": "5db6db1ed6521b0ecd2b39007702314e",
            "mtime": 2147483647,
            "tags": [],
            "collections": [
                "F4JUP63D"
            ],
            "relations": {},
            "dateAdded": "2010-09-17T16:19:33Z",
            "dateModified": "2010-09-17T16:19:34Z"
        }
    },
    {
        "key": "JJMD6T62",
        "version": 1,
        "library": {
            "type": "group",
            "id": 26177,
            "name": "JouranlArticles",
            "links": {
                "alternate": {
                    "href": "https://www.zotero.org/groups/jouranlarticles",
                    "type": "text/html"
                }
            }
        },
        "links": {
            "self": {
                "href": "https://api.zotero.org/groups/26177/items/JJMD6T62",
                "type": "application/json"
            },
            "alternate": {
                "href": "https://www.zotero.org/groups/jouranlarticles/items/JJMD6T62",
                "type": "text/html"
            },
            "up": {
                "href": "https://api.zotero.org/groups/26177/items/KTNPJZJN",
                "type": "application/json"
            }
        },
        "meta": {
            "createdByUser": {
                "id": 342947,
                "username": "akha6",
                "name": "",
                "links": {
                    "alternate": {
                        "href": "https://www.zotero.org/akha6",
                        "type": "text/html"
                    }
                }
            }
        },
        "data": {
            "key": "JJMD6T62",
            "version": 1,
            "parentItem": "KTNPJZJN",
            "itemType": "attachment",
            "linkMode": "imported_url",
            "title": "Computer Virus: The Types of Viruses Out There",
            "accessDate": "2010-09-17T16:17:21Z",
            "url": "http://www.spamlaws.com/virus-types.html",
            "note": "",
            "contentType": "text/html",
            "charset": "utf-8",
            "filename": "virus-types.html",
            "md5": null,
            "mtime": 2147483647,
            "tags": [],
            "relations": {},
            "dateAdded": "2010-09-17T16:17:21Z",
            "dateModified": "2010-09-17T16:17:21Z"
        }
    },
    {
        "key": "KTNPJZJN",
        "version": 1,
        "library": {
            "type": "group",
            "id": 26177,
            "name": "JouranlArticles",
            "links": {
                "alternate": {
                    "href": "https://www.zotero.org/groups/jouranlarticles",
                    "type": "text/html"
                }
            }
        },
        "links": {
            "self": {
                "href": "https://api.zotero.org/groups/26177/items/KTNPJZJN",
                "type": "application/json"
            },
            "alternate": {
                "href": "https://www.zotero.org/groups/jouranlarticles/items/KTNPJZJN",
                "type": "text/html"
            }
        },
        "meta": {
            "createdByUser": {
                "id": 342947,
                "username": "akha6",
                "name": "",
                "links": {
                    "alternate": {
                        "href": "https://www.zotero.org/akha6",
                        "type": "text/html"
                    }
                }
            },
            "numChildren": 1
        },
        "data": {
            "key": "KTNPJZJN",
            "version": 1,
            "itemType": "webpage",
            "title": "Computer Virus: The Types of Viruses Out There",
            "creators": [],
            "abstractNote": "",
            "websiteTitle": "",
            "websiteType": "",
            "date": "",
            "publisher": "",
            "place": "",
            "DOI": "",
            "citationKey": "",
            "url": "http://www.spamlaws.com/virus-types.html",
            "accessDate": "2010-09-17T16:17:19Z",
            "shortTitle": "",
            "language": "",
            "rights": "",
            "extra": "",
            "tags": [],
            "collections": [
                "F4JUP63D"
            ],
            "relations": {},
            "dateAdded": "2010-09-17T16:17:19Z",
            "dateModified": "2010-09-17T16:17:19Z"
        }
    },
    {
        "key": "U4UFJNGA",
        "version": 1,
        "library": {
            "type": "group",
            "id": 26177,
            "name": "JouranlArticles",
            "links": {
                "alternate": {
                    "href": "https://www.zotero.org/groups/jouranlarticles",
                    "type": "text/html"
                }
            }
        },
        "links": {
            "self": {
                "href": "https://api.zotero.org/groups/26177/items/U4UFJNGA",
                "type": "application/json"
            },
            "alternate": {
                "href": "https://www.zotero.org/groups/jouranlarticles/items/U4UFJNGA",
                "type": "text/html"
            },
            "up": {
                "href": "https://api.zotero.org/groups/26177/items/TTRTPQ6K",
                "type": "application/json"
            }
        },
        "meta": {
            "createdByUser": {
                "id": 342947,
                "username": "akha6",
                "name": "",
                "links": {
                    "alternate": {
                        "href": "https://www.zotero.org/akha6",
                        "type": "text/html"
                    }
                }
            }
        },
        "data": {
            "key": "U4UFJNGA",
            "version": 1,
            "parentItem": "TTRTPQ6K",
            "itemType": "attachment",
            "linkMode": "imported_url",
            "title": "Online Threats | STAYSAFEONLINE.org",
            "accessDate": "2010-09-17T14:55:34Z",
            "url": "http://www.staysafeonline.org/content/online-threats",
            "note": "",
            "contentType": "text/html",
            "charset": "utf-8",
            "filename": "online-threats.html",
            "md5": null,
            "mtime": 2147483647,
            "tags": [],
            "relations": {},
            "dateAdded": "2010-09-17T14:55:34Z",
            "dateModified": "2010-09-17T14:55:34Z"
        }
    },
    {
        "key": "TTRTPQ6K",
        "version": 1,
        "library": {
            "type": "group",
            "id": 26177,
            "name": "JouranlArticles",
            "links": {
                "alternate": {
                    "href": "https://www.zotero.org/groups/jouranlarticles",
                    "type": "text/html"
                }
            }
        },
        "links": {
            "self": {
                "href": "https://api.zotero.org/groups/26177/items/TTRTPQ6K",
                "type": "application/json"
            },
            "alternate": {
                "href": "https://www.zotero.org/groups/jouranlarticles/items/TTRTPQ6K",
                "type": "text/html"
            }
        },
        "meta": {
            "createdByUser": {
                "id": 342947,
                "username": "akha6",
                "name": "",
                "links": {
                    "alternate": {
                        "href": "https://www.zotero.org/akha6",
                        "type": "text/html"
                    }
                }
            },
            "numChildren": 1
        },
        "data": {
            "key": "TTRTPQ6K",
            "version": 1,
            "itemType": "webpage",
            "title": "Online Threats | STAYSAFEONLINE.org",
            "creators": [],
            "abstractNote": "",
            "websiteTitle": "",
            "websiteType": "",
            "date": "",
            "publisher": "",
            "place": "",
            "DOI": "",
            "citationKey": "",
            "url": "http://www.staysafeonline.org/content/online-threats",
            "accessDate": "2010-09-17T14:55:32Z",
            "shortTitle": "",
            "language": "",
            "rights": "",
            "extra": "",
            "tags": [],
            "collections": [
                "F4JUP63D"
            ],
            "relations": {},
            "dateAdded": "2010-09-17T14:55:32Z",
            "dateModified": "2010-09-17T14:55:32Z"
        }
    },
    {
        "key": "9KP4XZTS",
        "version": 1,
        "library": {
            "type": "group",
            "id": 26177,
            "name": "JouranlArticles",
            "links": {
                "alternate": {
                    "href": "https://www.zotero.org/groups/jouranlarticles",
                    "type": "text/html"
                }
            }
        },
        "links": {
            "self": {
                "href": "https://api.zotero.org/groups/26177/items/9KP4XZTS",
                "type": "application/json"
            },
            "alternate": {
                "href": "https://www.zotero.org/groups/jouranlarticles/items/9KP4XZTS",
                "type": "text/html"
            },
            "up": {
                "href": "https://api.zotero.org/groups/26177/items/4VN3J7I4",
                "type": "application/json"
            }
        },
        "meta": {
            "createdByUser": {
                "id": 342947,
                "username": "akha6",
                "name": "",
                "links": {
                    "alternate": {
                        "href": "https://www.zotero.org/akha6",
                        "type": "text/html"
                    }
                }
            }
        },
        "data": {
            "key": "9KP4XZTS",
            "version": 1,
            "parentItem": "4VN3J7I4",
            "itemType": "attachment",
            "linkMode": "imported_url",
            "title": "The Common Threats to IT Security",
            "accessDate": "2010-09-17T14:53:56Z",
            "url": "http://www.articlesbase.com/software-articles/the-common-threats-to-it-security-1171518.html",
            "note": "",
            "contentType": "text/html",
            "charset": "utf-8",
            "filename": "the-common-threats-to-it-security-1171518.html",
            "md5": null,
            "mtime": 2147483647,
            "tags": [],
            "relations": {},
            "dateAdded": "2010-09-17T14:53:56Z",
            "dateModified": "2010-09-17T14:53:56Z"
        }
    },
    {
        "key": "4VN3J7I4",
        "version": 1,
        "library": {
            "type": "group",
            "id": 26177,
            "name": "JouranlArticles",
            "links": {
                "alternate": {
                    "href": "https://www.zotero.org/groups/jouranlarticles",
                    "type": "text/html"
                }
            }
        },
        "links": {
            "self": {
                "href": "https://api.zotero.org/groups/26177/items/4VN3J7I4",
                "type": "application/json"
            },
            "alternate": {
                "href": "https://www.zotero.org/groups/jouranlarticles/items/4VN3J7I4",
                "type": "text/html"
            }
        },
        "meta": {
            "createdByUser": {
                "id": 342947,
                "username": "akha6",
                "name": "",
                "links": {
                    "alternate": {
                        "href": "https://www.zotero.org/akha6",
                        "type": "text/html"
                    }
                }
            },
            "numChildren": 1
        },
        "data": {
            "key": "4VN3J7I4",
            "version": 1,
            "itemType": "webpage",
            "title": "The Common Threats to IT Security",
            "creators": [],
            "abstractNote": "",
            "websiteTitle": "",
            "websiteType": "",
            "date": "",
            "publisher": "",
            "place": "",
            "DOI": "",
            "citationKey": "",
            "url": "http://www.articlesbase.com/software-articles/the-common-threats-to-it-security-1171518.html",
            "accessDate": "2010-09-17T14:53:54Z",
            "shortTitle": "",
            "language": "",
            "rights": "",
            "extra": "",
            "tags": [],
            "collections": [
                "F4JUP63D"
            ],
            "relations": {},
            "dateAdded": "2010-09-17T14:53:54Z",
            "dateModified": "2010-09-17T14:53:54Z"
        }
    },
    {
        "key": "H48T34PU",
        "version": 1,
        "library": {
            "type": "group",
            "id": 26177,
            "name": "JouranlArticles",
            "links": {
                "alternate": {
                    "href": "https://www.zotero.org/groups/jouranlarticles",
                    "type": "text/html"
                }
            }
        },
        "links": {
            "self": {
                "href": "https://api.zotero.org/groups/26177/items/H48T34PU",
                "type": "application/json"
            },
            "alternate": {
                "href": "https://www.zotero.org/groups/jouranlarticles/items/H48T34PU",
                "type": "text/html"
            },
            "up": {
                "href": "https://api.zotero.org/groups/26177/items/6SC5UCW9",
                "type": "application/json"
            }
        },
        "meta": {
            "createdByUser": {
                "id": 342947,
                "username": "akha6",
                "name": "",
                "links": {
                    "alternate": {
                        "href": "https://www.zotero.org/akha6",
                        "type": "text/html"
                    }
                }
            }
        },
        "data": {
            "key": "H48T34PU",
            "version": 1,
            "parentItem": "6SC5UCW9",
            "itemType": "attachment",
            "linkMode": "imported_url",
            "title": "Cyber attacks growing in number and sophistication - V3.co.uk - formerly vnunet.com",
            "accessDate": "2010-09-17T14:25:22Z",
            "url": "http://www.v3.co.uk/v3/news/2269980/firms-open-range-security?page=2",
            "note": "",
            "contentType": "text/html",
            "charset": "utf-8",
            "filename": "firms-open-range-security.html",
            "md5": null,
            "mtime": 2147483647,
            "tags": [],
            "relations": {},
            "dateAdded": "2010-09-17T14:25:22Z",
            "dateModified": "2010-09-17T14:25:22Z"
        }
    },
    {
        "key": "6SC5UCW9",
        "version": 1,
        "library": {
            "type": "group",
            "id": 26177,
            "name": "JouranlArticles",
            "links": {
                "alternate": {
                    "href": "https://www.zotero.org/groups/jouranlarticles",
                    "type": "text/html"
                }
            }
        },
        "links": {
            "self": {
                "href": "https://api.zotero.org/groups/26177/items/6SC5UCW9",
                "type": "application/json"
            },
            "alternate": {
                "href": "https://www.zotero.org/groups/jouranlarticles/items/6SC5UCW9",
                "type": "text/html"
            }
        },
        "meta": {
            "createdByUser": {
                "id": 342947,
                "username": "akha6",
                "name": "",
                "links": {
                    "alternate": {
                        "href": "https://www.zotero.org/akha6",
                        "type": "text/html"
                    }
                }
            },
            "numChildren": 1
        },
        "data": {
            "key": "6SC5UCW9",
            "version": 1,
            "itemType": "webpage",
            "title": "Cyber attacks growing in number and sophistication - V3.co.uk - formerly vnunet.com",
            "creators": [],
            "abstractNote": "",
            "websiteTitle": "",
            "websiteType": "",
            "date": "",
            "publisher": "",
            "place": "",
            "DOI": "",
            "citationKey": "",
            "url": "http://www.v3.co.uk/v3/news/2269980/firms-open-range-security?page=2",
            "accessDate": "2010-09-17T14:25:20Z",
            "shortTitle": "",
            "language": "",
            "rights": "",
            "extra": "",
            "tags": [],
            "collections": [
                "F4JUP63D"
            ],
            "relations": {},
            "dateAdded": "2010-09-17T14:25:20Z",
            "dateModified": "2010-09-17T14:25:20Z"
        }
    },
    {
        "key": "9ZRD68A5",
        "version": 1,
        "library": {
            "type": "group",
            "id": 26177,
            "name": "JouranlArticles",
            "links": {
                "alternate": {
                    "href": "https://www.zotero.org/groups/jouranlarticles",
                    "type": "text/html"
                }
            }
        },
        "links": {
            "self": {
                "href": "https://api.zotero.org/groups/26177/items/9ZRD68A5",
                "type": "application/json"
            },
            "alternate": {
                "href": "https://www.zotero.org/groups/jouranlarticles/items/9ZRD68A5",
                "type": "text/html"
            }
        },
        "meta": {
            "createdByUser": {
                "id": 342947,
                "username": "akha6",
                "name": "",
                "links": {
                    "alternate": {
                        "href": "https://www.zotero.org/akha6",
                        "type": "text/html"
                    }
                }
            },
            "numChildren": 0
        },
        "data": {
            "key": "9ZRD68A5",
            "version": 1,
            "itemType": "attachment",
            "linkMode": "imported_url",
            "title": "information-security-todays-economy_916",
            "accessDate": "2010-09-17T13:58:01Z",
            "url": "http://www.sans.org/reading_room/whitepapers/awareness/information-security-todays-economy_916",
            "note": "",
            "contentType": "application/pdf",
            "charset": "windows-1252",
            "filename": "information-security-todays-economy_916.pdf",
            "md5": "5c0a3231e449ae641f177ce13f7ec972",
            "mtime": 2147483647,
            "tags": [],
            "collections": [
                "F4JUP63D"
            ],
            "relations": {},
            "dateAdded": "2010-09-17T13:58:01Z",
            "dateModified": "2010-09-17T13:58:02Z"
        }
    },
    {
        "key": "DUDCSETD",
        "version": 1,
        "library": {
            "type": "group",
            "id": 26177,
            "name": "JouranlArticles",
            "links": {
                "alternate": {
                    "href": "https://www.zotero.org/groups/jouranlarticles",
                    "type": "text/html"
                }
            }
        },
        "links": {
            "self": {
                "href": "https://api.zotero.org/groups/26177/items/DUDCSETD",
                "type": "application/json"
            },
            "alternate": {
                "href": "https://www.zotero.org/groups/jouranlarticles/items/DUDCSETD",
                "type": "text/html"
            },
            "up": {
                "href": "https://api.zotero.org/groups/26177/items/VFRCMTDJ",
                "type": "application/json"
            }
        },
        "meta": {
            "createdByUser": {
                "id": 342947,
                "username": "akha6",
                "name": "",
                "links": {
                    "alternate": {
                        "href": "https://www.zotero.org/akha6",
                        "type": "text/html"
                    }
                }
            }
        },
        "data": {
            "key": "DUDCSETD",
            "version": 1,
            "parentItem": "VFRCMTDJ",
            "itemType": "attachment",
            "linkMode": "imported_url",
            "title": "Symantec Finds 65% Have Been Hit By Cybercrime -- Cybercrime -- InformationWeek",
            "accessDate": "2010-09-17T13:38:11Z",
            "url": "http://www.informationweek.com/news/security/attacks/showArticle.jhtml?articleID=227300362&subSection=Attacks/breaches",
            "note": "",
            "contentType": "text/html",
            "charset": "windows-1252",
            "filename": "showArticle.html",
            "md5": null,
            "mtime": 2147483647,
            "tags": [],
            "relations": {},
            "dateAdded": "2010-09-17T13:38:11Z",
            "dateModified": "2010-09-17T13:38:11Z"
        }
    },
    {
        "key": "VFRCMTDJ",
        "version": 1,
        "library": {
            "type": "group",
            "id": 26177,
            "name": "JouranlArticles",
            "links": {
                "alternate": {
                    "href": "https://www.zotero.org/groups/jouranlarticles",
                    "type": "text/html"
                }
            }
        },
        "links": {
            "self": {
                "href": "https://api.zotero.org/groups/26177/items/VFRCMTDJ",
                "type": "application/json"
            },
            "alternate": {
                "href": "https://www.zotero.org/groups/jouranlarticles/items/VFRCMTDJ",
                "type": "text/html"
            }
        },
        "meta": {
            "createdByUser": {
                "id": 342947,
                "username": "akha6",
                "name": "",
                "links": {
                    "alternate": {
                        "href": "https://www.zotero.org/akha6",
                        "type": "text/html"
                    }
                }
            },
            "numChildren": 1
        },
        "data": {
            "key": "VFRCMTDJ",
            "version": 1,
            "itemType": "webpage",
            "title": "Symantec Finds 65% Have Been Hit By Cybercrime -- Cybercrime -- InformationWeek",
            "creators": [],
            "abstractNote": "",
            "websiteTitle": "",
            "websiteType": "",
            "date": "",
            "publisher": "",
            "place": "",
            "DOI": "",
            "citationKey": "",
            "url": "http://www.informationweek.com/news/security/attacks/showArticle.jhtml?articleID=227300362&subSection=Attacks/breaches",
            "accessDate": "2010-09-17T13:38:09Z",
            "shortTitle": "",
            "language": "",
            "rights": "",
            "extra": "",
            "tags": [],
            "collections": [
                "F4JUP63D"
            ],
            "relations": {},
            "dateAdded": "2010-09-17T13:38:09Z",
            "dateModified": "2010-09-17T13:38:09Z"
        }
    },
    {
        "key": "G7A75KTR",
        "version": 1,
        "library": {
            "type": "group",
            "id": 26177,
            "name": "JouranlArticles",
            "links": {
                "alternate": {
                    "href": "https://www.zotero.org/groups/jouranlarticles",
                    "type": "text/html"
                }
            }
        },
        "links": {
            "self": {
                "href": "https://api.zotero.org/groups/26177/items/G7A75KTR",
                "type": "application/json"
            },
            "alternate": {
                "href": "https://www.zotero.org/groups/jouranlarticles/items/G7A75KTR",
                "type": "text/html"
            },
            "up": {
                "href": "https://api.zotero.org/groups/26177/items/EE6E6D87",
                "type": "application/json"
            }
        },
        "meta": {
            "createdByUser": {
                "id": 342947,
                "username": "akha6",
                "name": "",
                "links": {
                    "alternate": {
                        "href": "https://www.zotero.org/akha6",
                        "type": "text/html"
                    }
                }
            }
        },
        "data": {
            "key": "G7A75KTR",
            "version": 1,
            "parentItem": "EE6E6D87",
            "itemType": "attachment",
            "linkMode": "imported_url",
            "title": "Cellphone Sales Boost Best Buy Profit - WSJ.com",
            "accessDate": "2010-09-16T18:59:12Z",
            "url": "http://online.wsj.com/article/SB10001424052748703376504575491533125103528.html?mod=WSJ_Tech_LEFTTopNews",
            "note": "",
            "contentType": "text/html",
            "charset": "utf-8",
            "filename": "SB10001424052748703376504575491533125103528.html",
            "md5": null,
            "mtime": 2147483647,
            "tags": [],
            "relations": {},
            "dateAdded": "2010-09-16T21:40:14Z",
            "dateModified": "2010-09-16T21:40:14Z"
        }
    },
    {
        "key": "DARMX8NK",
        "version": 1,
        "library": {
            "type": "group",
            "id": 26177,
            "name": "JouranlArticles",
            "links": {
                "alternate": {
                    "href": "https://www.zotero.org/groups/jouranlarticles",
                    "type": "text/html"
                }
            }
        },
        "links": {
            "self": {
                "href": "https://api.zotero.org/groups/26177/items/DARMX8NK",
                "type": "application/json"
            },
            "alternate": {
                "href": "https://www.zotero.org/groups/jouranlarticles/items/DARMX8NK",
                "type": "text/html"
            },
            "up": {
                "href": "https://api.zotero.org/groups/26177/items/PIBA77IB",
                "type": "application/json"
            }
        },
        "meta": {
            "createdByUser": {
                "id": 342947,
                "username": "akha6",
                "name": "",
                "links": {
                    "alternate": {
                        "href": "https://www.zotero.org/akha6",
                        "type": "text/html"
                    }
                }
            }
        },
        "data": {
            "key": "DARMX8NK",
            "version": 1,
            "parentItem": "PIBA77IB",
            "itemType": "attachment",
            "linkMode": "imported_url",
            "title": "GoDaddy Is on the Block - WSJ.com",
            "accessDate": "2010-09-15T14:59:42Z",
            "url": "http://online.wsj.com/article/SB10001424052748703597204575484153733196856.html?mod=WSJ_Tech_LEFTTopNews",
            "note": "",
            "contentType": "text/html",
            "charset": "utf-8",
            "filename": "SB10001424052748703597204575484153733196856.html",
            "md5": null,
            "mtime": 2147483647,
            "tags": [],
            "relations": {},
            "dateAdded": "2010-09-16T21:40:14Z",
            "dateModified": "2010-09-16T21:40:14Z"
        }
    },
    {
        "key": "NW264I9I",
        "version": 1,
        "library": {
            "type": "group",
            "id": 26177,
            "name": "JouranlArticles",
            "links": {
                "alternate": {
                    "href": "https://www.zotero.org/groups/jouranlarticles",
                    "type": "text/html"
                }
            }
        },
        "links": {
            "self": {
                "href": "https://api.zotero.org/groups/26177/items/NW264I9I",
                "type": "application/json"
            },
            "alternate": {
                "href": "https://www.zotero.org/groups/jouranlarticles/items/NW264I9I",
                "type": "text/html"
            },
            "up": {
                "href": "https://api.zotero.org/groups/26177/items/E9KBETAA",
                "type": "application/json"
            }
        },
        "meta": {
            "createdByUser": {
                "id": 342947,
                "username": "akha6",
                "name": "",
                "links": {
                    "alternate": {
                        "href": "https://www.zotero.org/akha6",
                        "type": "text/html"
                    }
                }
            }
        },
        "data": {
            "key": "NW264I9I",
            "version": 1,
            "parentItem": "E9KBETAA",
            "itemType": "attachment",
            "linkMode": "imported_url",
            "title": "Google Fires Engineer For Spying On Users -- Access Control -- InformationWeek",
            "accessDate": "2010-09-16T17:47:52Z",
            "url": "http://www.informationweek.com/news/software/web_services/showArticle.jhtml?articleID=227400442",
            "note": "",
            "contentType": "text/html",
            "charset": "windows-1252",
            "filename": "showArticle.html",
            "md5": null,
            "mtime": 2147483647,
            "tags": [],
            "relations": {},
            "dateAdded": "2010-09-16T21:40:14Z",
            "dateModified": "2010-09-16T21:40:14Z"
        }
    },
    {
        "key": "WRMI58ZF",
        "version": 1,
        "library": {
            "type": "group",
            "id": 26177,
            "name": "JouranlArticles",
            "links": {
                "alternate": {
                    "href": "https://www.zotero.org/groups/jouranlarticles",
                    "type": "text/html"
                }
            }
        },
        "links": {
            "self": {
                "href": "https://api.zotero.org/groups/26177/items/WRMI58ZF",
                "type": "application/json"
            },
            "alternate": {
                "href": "https://www.zotero.org/groups/jouranlarticles/items/WRMI58ZF",
                "type": "text/html"
            },
            "up": {
                "href": "https://api.zotero.org/groups/26177/items/SGNBUSCJ",
                "type": "application/json"
            }
        },
        "meta": {
            "createdByUser": {
                "id": 342947,
                "username": "akha6",
                "name": "",
                "links": {
                    "alternate": {
                        "href": "https://www.zotero.org/akha6",
                        "type": "text/html"
                    }
                }
            }
        },
        "data": {
            "key": "WRMI58ZF",
            "version": 1,
            "parentItem": "SGNBUSCJ",
            "itemType": "attachment",
            "linkMode": "imported_url",
            "title": "Google Instant to Speed Web Search - WSJ.com",
            "accessDate": "2010-09-15T15:01:36Z",
            "url": "http://online.wsj.com/article/SB10001424052748703453804575479821579919484.html?mod=WSJ_Tech_LEFTTopNews",
            "note": "",
            "contentType": "text/html",
            "charset": "utf-8",
            "filename": "SB10001424052748703453804575479821579919484.html",
            "md5": null,
            "mtime": 2147483647,
            "tags": [],
            "relations": {},
            "dateAdded": "2010-09-16T21:40:14Z",
            "dateModified": "2010-09-16T21:40:14Z"
        }
    },
    {
        "key": "7D6RH7XW",
        "version": 1,
        "library": {
            "type": "group",
            "id": 26177,
            "name": "JouranlArticles",
            "links": {
                "alternate": {
                    "href": "https://www.zotero.org/groups/jouranlarticles",
                    "type": "text/html"
                }
            }
        },
        "links": {
            "self": {
                "href": "https://api.zotero.org/groups/26177/items/7D6RH7XW",
                "type": "application/json"
            },
            "alternate": {
                "href": "https://www.zotero.org/groups/jouranlarticles/items/7D6RH7XW",
                "type": "text/html"
            },
            "up": {
                "href": "https://api.zotero.org/groups/26177/items/J5V9M22K",
                "type": "application/json"
            }
        },
        "meta": {
            "createdByUser": {
                "id": 342947,
                "username": "akha6",
                "name": "",
                "links": {
                    "alternate": {
                        "href": "https://www.zotero.org/akha6",
                        "type": "text/html"
                    }
                }
            }
        },
        "data": {
            "key": "7D6RH7XW",
            "version": 1,
            "parentItem": "J5V9M22K",
            "itemType": "attachment",
            "linkMode": "imported_url",
            "title": "RIM Duels With Droid - WSJ.com",
            "accessDate": "2010-09-16T17:58:50Z",
            "url": "http://online.wsj.com/article/SB10001424052748704652104575494102654241766.html?mod=WSJ_Tech_LEFTTopNews",
            "note": "",
            "contentType": "text/html",
            "charset": "utf-8",
            "filename": "SB10001424052748704652104575494102654241766.html",
            "md5": null,
            "mtime": 2147483647,
            "tags": [],
            "relations": {},
            "dateAdded": "2010-09-16T21:40:14Z",
            "dateModified": "2010-09-16T21:40:14Z"
        }
    },
    {
        "key": "EE6E6D87",
        "version": 1,
        "library": {
            "type": "group",
            "id": 26177,
            "name": "JouranlArticles",
            "links": {
                "alternate": {
                    "href": "https://www.zotero.org/groups/jouranlarticles",
                    "type": "text/html"
                }
            }
        },
        "links": {
            "self": {
                "href": "https://api.zotero.org/groups/26177/items/EE6E6D87",
                "type": "application/json"
            },
            "alternate": {
                "href": "https://www.zotero.org/groups/jouranlarticles/items/EE6E6D87",
                "type": "text/html"
            }
        },
        "meta": {
            "createdByUser": {
                "id": 342947,
                "username": "akha6",
                "name": "",
                "links": {
                    "alternate": {
                        "href": "https://www.zotero.org/akha6",
                        "type": "text/html"
                    }
                }
            },
            "numChildren": 1
        },
        "data": {
            "key": "EE6E6D87",
            "version": 1,
            "itemType": "webpage",
            "title": "Cellphone Sales Boost Best Buy Profit - WSJ.com",
            "creators": [],
            "abstractNote": "",
            "websiteTitle": "",
            "websiteType": "",
            "date": "",
            "publisher": "",
            "place": "",
            "DOI": "",
            "citationKey": "",
            "url": "http://online.wsj.com/article/SB10001424052748703376504575491533125103528.html?mod=WSJ_Tech_LEFTTopNews",
            "accessDate": "2010-09-16T18:59:10Z",
            "shortTitle": "",
            "language": "",
            "rights": "",
            "extra": "",
            "tags": [],
            "collections": [],
            "relations": {},
            "dateAdded": "2010-09-16T21:40:14Z",
            "dateModified": "2010-09-16T21:40:14Z"
        }
    },
    {
        "key": "PIBA77IB",
        "version": 1,
        "library": {
            "type": "group",
            "id": 26177,
            "name": "JouranlArticles",
            "links": {
                "alternate": {
                    "href": "https://www.zotero.org/groups/jouranlarticles",
                    "type": "text/html"
                }
            }
        },
        "links": {
            "self": {
                "href": "https://api.zotero.org/groups/26177/items/PIBA77IB",
                "type": "application/json"
            },
            "alternate": {
                "href": "https://www.zotero.org/groups/jouranlarticles/items/PIBA77IB",
                "type": "text/html"
            }
        },
        "meta": {
            "createdByUser": {
                "id": 342947,
                "username": "akha6",
                "name": "",
                "links": {
                    "alternate": {
                        "href": "https://www.zotero.org/akha6",
                        "type": "text/html"
                    }
                }
            },
            "numChildren": 1
        },
        "data": {
            "key": "PIBA77IB",
            "version": 1,
            "itemType": "webpage",
            "title": "GoDaddy Is on the Block - WSJ.com",
            "creators": [],
            "abstractNote": "",
            "websiteTitle": "",
            "websiteType": "",
            "date": "",
            "publisher": "",
            "place": "",
            "DOI": "",
            "citationKey": "",
            "url": "http://online.wsj.com/article/SB10001424052748703597204575484153733196856.html?mod=WSJ_Tech_LEFTTopNews",
            "accessDate": "2010-09-15T14:59:40Z",
            "shortTitle": "",
            "language": "",
            "rights": "",
            "extra": "",
            "tags": [],
            "collections": [],
            "relations": {},
            "dateAdded": "2010-09-16T21:40:14Z",
            "dateModified": "2010-09-16T21:40:14Z"
        }
    },
    {
        "key": "E9KBETAA",
        "version": 1,
        "library": {
            "type": "group",
            "id": 26177,
            "name": "JouranlArticles",
            "links": {
                "alternate": {
                    "href": "https://www.zotero.org/groups/jouranlarticles",
                    "type": "text/html"
                }
            }
        },
        "links": {
            "self": {
                "href": "https://api.zotero.org/groups/26177/items/E9KBETAA",
                "type": "application/json"
            },
            "alternate": {
                "href": "https://www.zotero.org/groups/jouranlarticles/items/E9KBETAA",
                "type": "text/html"
            }
        },
        "meta": {
            "createdByUser": {
                "id": 342947,
                "username": "akha6",
                "name": "",
                "links": {
                    "alternate": {
                        "href": "https://www.zotero.org/akha6",
                        "type": "text/html"
                    }
                }
            },
            "numChildren": 1
        },
        "data": {
            "key": "E9KBETAA",
            "version": 1,
            "itemType": "webpage",
            "title": "Google Fires Engineer For Spying On Users -- Access Control -- InformationWeek",
            "creators": [],
            "abstractNote": "",
            "websiteTitle": "",
            "websiteType": "",
            "date": "",
            "publisher": "",
            "place": "",
            "DOI": "",
            "citationKey": "",
            "url": "http://www.informationweek.com/news/software/web_services/showArticle.jhtml?articleID=227400442",
            "accessDate": "2010-09-16T17:47:50Z",
            "shortTitle": "",
            "language": "",
            "rights": "",
            "extra": "",
            "tags": [],
            "collections": [],
            "relations": {},
            "dateAdded": "2010-09-16T21:40:14Z",
            "dateModified": "2010-09-16T21:40:14Z"
        }
    },
    {
        "key": "SGNBUSCJ",
        "version": 1,
        "library": {
            "type": "group",
            "id": 26177,
            "name": "JouranlArticles",
            "links": {
                "alternate": {
                    "href": "https://www.zotero.org/groups/jouranlarticles",
                    "type": "text/html"
                }
            }
        },
        "links": {
            "self": {
                "href": "https://api.zotero.org/groups/26177/items/SGNBUSCJ",
                "type": "application/json"
            },
            "alternate": {
                "href": "https://www.zotero.org/groups/jouranlarticles/items/SGNBUSCJ",
                "type": "text/html"
            }
        },
        "meta": {
            "createdByUser": {
                "id": 342947,
                "username": "akha6",
                "name": "",
                "links": {
                    "alternate": {
                        "href": "https://www.zotero.org/akha6",
                        "type": "text/html"
                    }
                }
            },
            "numChildren": 1
        },
        "data": {
            "key": "SGNBUSCJ",
            "version": 1,
            "itemType": "webpage",
            "title": "Google Instant to Speed Web Search - WSJ.com",
            "creators": [],
            "abstractNote": "",
            "websiteTitle": "",
            "websiteType": "",
            "date": "",
            "publisher": "",
            "place": "",
            "DOI": "",
            "citationKey": "",
            "url": "http://online.wsj.com/article/SB10001424052748703453804575479821579919484.html?mod=WSJ_Tech_LEFTTopNews",
            "accessDate": "2010-09-15T15:01:34Z",
            "shortTitle": "",
            "language": "",
            "rights": "",
            "extra": "",
            "tags": [],
            "collections": [],
            "relations": {},
            "dateAdded": "2010-09-16T21:40:14Z",
            "dateModified": "2010-09-16T21:40:14Z"
        }
    }
]