[
    {
        "key": "BHSH9WJJ",
        "version": 48,
        "library": {
            "type": "group",
            "id": 391985,
            "name": "Hackers Social Media",
            "links": {
                "alternate": {
                    "href": "https://www.zotero.org/groups/hackers_social_media",
                    "type": "text/html"
                }
            }
        },
        "links": {
            "self": {
                "href": "https://api.zotero.org/groups/391985/items/BHSH9WJJ",
                "type": "application/json"
            },
            "alternate": {
                "href": "https://www.zotero.org/groups/hackers_social_media/items/BHSH9WJJ",
                "type": "text/html"
            }
        },
        "meta": {
            "createdByUser": {
                "id": 2129644,
                "username": "psykohack",
                "name": "",
                "links": {
                    "alternate": {
                        "href": "https://www.zotero.org/psykohack",
                        "type": "text/html"
                    }
                }
            },
            "numChildren": 0
        },
        "data": {
            "key": "BHSH9WJJ",
            "version": 48,
            "itemType": "document",
            "title": "Anonymous: serious threat or mere annoyance?",
            "creators": [],
            "abstractNote": "",
            "type": "",
            "date": "",
            "publisher": "",
            "place": "",
            "DOI": "",
            "citationKey": "",
            "url": "http://www.sciencedirect.com/science/article/pii/S1353485811700046",
            "accessDate": "",
            "archive": "",
            "archiveLocation": "",
            "shortTitle": "",
            "language": "",
            "libraryCatalog": "",
            "callNumber": "",
            "rights": "",
            "extra": "",
            "tags": [],
            "collections": [
                "UIA6SNHG"
            ],
            "relations": {},
            "dateAdded": "2015-09-14T12:43:26Z",
            "dateModified": "2015-09-14T12:43:38Z"
        }
    },
    {
        "key": "Z6WMENSE",
        "version": 46,
        "library": {
            "type": "group",
            "id": 391985,
            "name": "Hackers Social Media",
            "links": {
                "alternate": {
                    "href": "https://www.zotero.org/groups/hackers_social_media",
                    "type": "text/html"
                }
            }
        },
        "links": {
            "self": {
                "href": "https://api.zotero.org/groups/391985/items/Z6WMENSE",
                "type": "application/json"
            },
            "alternate": {
                "href": "https://www.zotero.org/groups/hackers_social_media/items/Z6WMENSE",
                "type": "text/html"
            }
        },
        "meta": {
            "createdByUser": {
                "id": 2129644,
                "username": "psykohack",
                "name": "",
                "links": {
                    "alternate": {
                        "href": "https://www.zotero.org/psykohack",
                        "type": "text/html"
                    }
                }
            },
            "numChildren": 0
        },
        "data": {
            "key": "Z6WMENSE",
            "version": 46,
            "itemType": "document",
            "title": "Evaluating Attack Amplification in Online Social Networks",
            "creators": [],
            "abstractNote": "",
            "type": "",
            "date": "",
            "publisher": "",
            "place": "",
            "DOI": "",
            "citationKey": "",
            "url": "http://citeseerx.ist.psu.edu/viewdoc/download?doi=10.1.1.296.7105&rep=rep1&type=pdf",
            "accessDate": "",
            "archive": "",
            "archiveLocation": "",
            "shortTitle": "",
            "language": "",
            "libraryCatalog": "",
            "callNumber": "",
            "rights": "",
            "extra": "",
            "tags": [],
            "collections": [
                "UIA6SNHG"
            ],
            "relations": {},
            "dateAdded": "2015-09-14T12:36:08Z",
            "dateModified": "2015-09-14T12:36:17Z"
        }
    },
    {
        "key": "TCHUW5WE",
        "version": 46,
        "library": {
            "type": "group",
            "id": 391985,
            "name": "Hackers Social Media",
            "links": {
                "alternate": {
                    "href": "https://www.zotero.org/groups/hackers_social_media",
                    "type": "text/html"
                }
            }
        },
        "links": {
            "self": {
                "href": "https://api.zotero.org/groups/391985/items/TCHUW5WE",
                "type": "application/json"
            },
            "alternate": {
                "href": "https://www.zotero.org/groups/hackers_social_media/items/TCHUW5WE",
                "type": "text/html"
            }
        },
        "meta": {
            "createdByUser": {
                "id": 2129644,
                "username": "psykohack",
                "name": "",
                "links": {
                    "alternate": {
                        "href": "https://www.zotero.org/psykohack",
                        "type": "text/html"
                    }
                }
            },
            "numChildren": 0
        },
        "data": {
            "key": "TCHUW5WE",
            "version": 46,
            "itemType": "document",
            "title": "Security Analysis of Information Systems Taking into Account Social Engineering Attacks",
            "creators": [],
            "abstractNote": "",
            "type": "",
            "date": "",
            "publisher": "",
            "place": "",
            "DOI": "",
            "citationKey": "",
            "url": "http://ieeexplore.ieee.org/xpls/abs_all.jsp?arnumber=5739056",
            "accessDate": "",
            "archive": "",
            "archiveLocation": "",
            "shortTitle": "",
            "language": "",
            "libraryCatalog": "",
            "callNumber": "",
            "rights": "",
            "extra": "",
            "tags": [],
            "collections": [
                "UIA6SNHG"
            ],
            "relations": {},
            "dateAdded": "2015-09-14T12:35:49Z",
            "dateModified": "2015-09-14T12:35:59Z"
        }
    },
    {
        "key": "AZWP8UA4",
        "version": 46,
        "library": {
            "type": "group",
            "id": 391985,
            "name": "Hackers Social Media",
            "links": {
                "alternate": {
                    "href": "https://www.zotero.org/groups/hackers_social_media",
                    "type": "text/html"
                }
            }
        },
        "links": {
            "self": {
                "href": "https://api.zotero.org/groups/391985/items/AZWP8UA4",
                "type": "application/json"
            },
            "alternate": {
                "href": "https://www.zotero.org/groups/hackers_social_media/items/AZWP8UA4",
                "type": "text/html"
            }
        },
        "meta": {
            "createdByUser": {
                "id": 2129644,
                "username": "psykohack",
                "name": "",
                "links": {
                    "alternate": {
                        "href": "https://www.zotero.org/psykohack",
                        "type": "text/html"
                    }
                }
            },
            "numChildren": 0
        },
        "data": {
            "key": "AZWP8UA4",
            "version": 46,
            "itemType": "document",
            "title": "Friend-in-the-Middle Attacks: Exploiting Social Networking Sites for Spam",
            "creators": [],
            "abstractNote": "",
            "type": "",
            "date": "",
            "publisher": "",
            "place": "",
            "DOI": "",
            "citationKey": "",
            "url": "http://ieeexplore.ieee.org/xpls/abs_all.jsp?arnumber=5696718&tag=1",
            "accessDate": "",
            "archive": "",
            "archiveLocation": "",
            "shortTitle": "",
            "language": "",
            "libraryCatalog": "",
            "callNumber": "",
            "rights": "",
            "extra": "",
            "tags": [],
            "collections": [
                "UIA6SNHG"
            ],
            "relations": {},
            "dateAdded": "2015-09-14T12:35:30Z",
            "dateModified": "2015-09-14T12:35:38Z"
        }
    },
    {
        "key": "IV7MU2KV",
        "version": 46,
        "library": {
            "type": "group",
            "id": 391985,
            "name": "Hackers Social Media",
            "links": {
                "alternate": {
                    "href": "https://www.zotero.org/groups/hackers_social_media",
                    "type": "text/html"
                }
            }
        },
        "links": {
            "self": {
                "href": "https://api.zotero.org/groups/391985/items/IV7MU2KV",
                "type": "application/json"
            },
            "alternate": {
                "href": "https://www.zotero.org/groups/hackers_social_media/items/IV7MU2KV",
                "type": "text/html"
            }
        },
        "meta": {
            "createdByUser": {
                "id": 2129644,
                "username": "psykohack",
                "name": "",
                "links": {
                    "alternate": {
                        "href": "https://www.zotero.org/psykohack",
                        "type": "text/html"
                    }
                }
            },
            "numChildren": 0
        },
        "data": {
            "key": "IV7MU2KV",
            "version": 46,
            "itemType": "document",
            "title": "All your contacts are belong to us: automated identity theft attacks on social networks",
            "creators": [],
            "abstractNote": "",
            "type": "",
            "date": "",
            "publisher": "",
            "place": "",
            "DOI": "",
            "citationKey": "",
            "url": "http://dl.acm.org/citation.cfm?id=1526784",
            "accessDate": "",
            "archive": "",
            "archiveLocation": "",
            "shortTitle": "",
            "language": "",
            "libraryCatalog": "",
            "callNumber": "",
            "rights": "",
            "extra": "",
            "tags": [],
            "collections": [
                "UIA6SNHG"
            ],
            "relations": {},
            "dateAdded": "2015-09-14T12:35:11Z",
            "dateModified": "2015-09-14T12:35:22Z"
        }
    },
    {
        "key": "CF8G3J7P",
        "version": 46,
        "library": {
            "type": "group",
            "id": 391985,
            "name": "Hackers Social Media",
            "links": {
                "alternate": {
                    "href": "https://www.zotero.org/groups/hackers_social_media",
                    "type": "text/html"
                }
            }
        },
        "links": {
            "self": {
                "href": "https://api.zotero.org/groups/391985/items/CF8G3J7P",
                "type": "application/json"
            },
            "alternate": {
                "href": "https://www.zotero.org/groups/hackers_social_media/items/CF8G3J7P",
                "type": "text/html"
            }
        },
        "meta": {
            "createdByUser": {
                "id": 2129644,
                "username": "psykohack",
                "name": "",
                "links": {
                    "alternate": {
                        "href": "https://www.zotero.org/psykohack",
                        "type": "text/html"
                    }
                }
            },
            "numChildren": 0
        },
        "data": {
            "key": "CF8G3J7P",
            "version": 46,
            "itemType": "document",
            "title": "A test of interventions for security threats from social engineering",
            "creators": [],
            "abstractNote": "",
            "type": "",
            "date": "",
            "publisher": "",
            "place": "",
            "DOI": "",
            "citationKey": "",
            "url": "http://www.emeraldinsight.com/doi/abs/10.1108/09685220810920549",
            "accessDate": "",
            "archive": "",
            "archiveLocation": "",
            "shortTitle": "",
            "language": "",
            "libraryCatalog": "",
            "callNumber": "",
            "rights": "",
            "extra": "",
            "tags": [],
            "collections": [
                "UIA6SNHG"
            ],
            "relations": {},
            "dateAdded": "2015-09-14T12:34:52Z",
            "dateModified": "2015-09-14T12:35:02Z"
        }
    },
    {
        "key": "SPEAGQH7",
        "version": 46,
        "library": {
            "type": "group",
            "id": 391985,
            "name": "Hackers Social Media",
            "links": {
                "alternate": {
                    "href": "https://www.zotero.org/groups/hackers_social_media",
                    "type": "text/html"
                }
            }
        },
        "links": {
            "self": {
                "href": "https://api.zotero.org/groups/391985/items/SPEAGQH7",
                "type": "application/json"
            },
            "alternate": {
                "href": "https://www.zotero.org/groups/hackers_social_media/items/SPEAGQH7",
                "type": "text/html"
            }
        },
        "meta": {
            "createdByUser": {
                "id": 2129644,
                "username": "psykohack",
                "name": "",
                "links": {
                    "alternate": {
                        "href": "https://www.zotero.org/psykohack",
                        "type": "text/html"
                    }
                }
            },
            "numChildren": 0
        },
        "data": {
            "key": "SPEAGQH7",
            "version": 46,
            "itemType": "document",
            "title": "Abusing Social Networks for Automated User Profiling",
            "creators": [],
            "abstractNote": "",
            "type": "",
            "date": "",
            "publisher": "",
            "place": "",
            "DOI": "",
            "citationKey": "",
            "url": "http://link.springer.com/chapter/10.1007/978-3-642-15512-3_22",
            "accessDate": "",
            "archive": "",
            "archiveLocation": "",
            "shortTitle": "",
            "language": "",
            "libraryCatalog": "",
            "callNumber": "",
            "rights": "",
            "extra": "",
            "tags": [],
            "collections": [
                "UIA6SNHG"
            ],
            "relations": {},
            "dateAdded": "2015-09-14T12:34:34Z",
            "dateModified": "2015-09-14T12:34:43Z"
        }
    },
    {
        "key": "SSXF75JE",
        "version": 46,
        "library": {
            "type": "group",
            "id": 391985,
            "name": "Hackers Social Media",
            "links": {
                "alternate": {
                    "href": "https://www.zotero.org/groups/hackers_social_media",
                    "type": "text/html"
                }
            }
        },
        "links": {
            "self": {
                "href": "https://api.zotero.org/groups/391985/items/SSXF75JE",
                "type": "application/json"
            },
            "alternate": {
                "href": "https://www.zotero.org/groups/hackers_social_media/items/SSXF75JE",
                "type": "text/html"
            }
        },
        "meta": {
            "createdByUser": {
                "id": 2129644,
                "username": "psykohack",
                "name": "",
                "links": {
                    "alternate": {
                        "href": "https://www.zotero.org/psykohack",
                        "type": "text/html"
                    }
                }
            },
            "numChildren": 0
        },
        "data": {
            "key": "SSXF75JE",
            "version": 46,
            "itemType": "document",
            "title": "Social phishing",
            "creators": [],
            "abstractNote": "",
            "type": "",
            "date": "",
            "publisher": "",
            "place": "",
            "DOI": "",
            "citationKey": "",
            "url": "http://dl.acm.org/citation.cfm?id=1290968",
            "accessDate": "",
            "archive": "",
            "archiveLocation": "",
            "shortTitle": "",
            "language": "",
            "libraryCatalog": "",
            "callNumber": "",
            "rights": "",
            "extra": "",
            "tags": [],
            "collections": [
                "UIA6SNHG"
            ],
            "relations": {},
            "dateAdded": "2015-09-14T12:34:15Z",
            "dateModified": "2015-09-14T12:34:25Z"
        }
    },
    {
        "key": "4VREUUPH",
        "version": 46,
        "library": {
            "type": "group",
            "id": 391985,
            "name": "Hackers Social Media",
            "links": {
                "alternate": {
                    "href": "https://www.zotero.org/groups/hackers_social_media",
                    "type": "text/html"
                }
            }
        },
        "links": {
            "self": {
                "href": "https://api.zotero.org/groups/391985/items/4VREUUPH",
                "type": "application/json"
            },
            "alternate": {
                "href": "https://www.zotero.org/groups/hackers_social_media/items/4VREUUPH",
                "type": "text/html"
            }
        },
        "meta": {
            "createdByUser": {
                "id": 2129644,
                "username": "psykohack",
                "name": "",
                "links": {
                    "alternate": {
                        "href": "https://www.zotero.org/psykohack",
                        "type": "text/html"
                    }
                }
            },
            "numChildren": 0
        },
        "data": {
            "key": "4VREUUPH",
            "version": 46,
            "itemType": "document",
            "title": "Analysis of a social engineering threat to information security exacerbated by vulnerabilities exposed through the inherent nature of social networking websites",
            "creators": [],
            "abstractNote": "",
            "type": "",
            "date": "",
            "publisher": "",
            "place": "",
            "DOI": "",
            "citationKey": "",
            "url": "http://dl.acm.org/citation.cfm?id=1941003",
            "accessDate": "",
            "archive": "",
            "archiveLocation": "",
            "shortTitle": "",
            "language": "",
            "libraryCatalog": "",
            "callNumber": "",
            "rights": "",
            "extra": "",
            "tags": [],
            "collections": [
                "UIA6SNHG"
            ],
            "relations": {},
            "dateAdded": "2015-09-14T12:33:58Z",
            "dateModified": "2015-09-14T12:34:08Z"
        }
    },
    {
        "key": "8DISAWKI",
        "version": 46,
        "library": {
            "type": "group",
            "id": 391985,
            "name": "Hackers Social Media",
            "links": {
                "alternate": {
                    "href": "https://www.zotero.org/groups/hackers_social_media",
                    "type": "text/html"
                }
            }
        },
        "links": {
            "self": {
                "href": "https://api.zotero.org/groups/391985/items/8DISAWKI",
                "type": "application/json"
            },
            "alternate": {
                "href": "https://www.zotero.org/groups/hackers_social_media/items/8DISAWKI",
                "type": "text/html"
            }
        },
        "meta": {
            "createdByUser": {
                "id": 2129644,
                "username": "psykohack",
                "name": "",
                "links": {
                    "alternate": {
                        "href": "https://www.zotero.org/psykohack",
                        "type": "text/html"
                    }
                }
            },
            "numChildren": 0
        },
        "data": {
            "key": "8DISAWKI",
            "version": 46,
            "itemType": "document",
            "title": "Social engineering attacks on the knowledge worker",
            "creators": [],
            "abstractNote": "",
            "type": "",
            "date": "",
            "publisher": "",
            "place": "",
            "DOI": "",
            "citationKey": "",
            "url": "http://dl.acm.org/citation.cfm?id=2523596",
            "accessDate": "",
            "archive": "",
            "archiveLocation": "",
            "shortTitle": "",
            "language": "",
            "libraryCatalog": "",
            "callNumber": "",
            "rights": "",
            "extra": "",
            "tags": [],
            "collections": [
                "UIA6SNHG"
            ],
            "relations": {},
            "dateAdded": "2015-09-14T12:33:42Z",
            "dateModified": "2015-09-14T12:33:50Z"
        }
    },
    {
        "key": "PPMZIJHC",
        "version": 46,
        "library": {
            "type": "group",
            "id": 391985,
            "name": "Hackers Social Media",
            "links": {
                "alternate": {
                    "href": "https://www.zotero.org/groups/hackers_social_media",
                    "type": "text/html"
                }
            }
        },
        "links": {
            "self": {
                "href": "https://api.zotero.org/groups/391985/items/PPMZIJHC",
                "type": "application/json"
            },
            "alternate": {
                "href": "https://www.zotero.org/groups/hackers_social_media/items/PPMZIJHC",
                "type": "text/html"
            }
        },
        "meta": {
            "createdByUser": {
                "id": 2129644,
                "username": "psykohack",
                "name": "",
                "links": {
                    "alternate": {
                        "href": "https://www.zotero.org/psykohack",
                        "type": "text/html"
                    }
                }
            },
            "numChildren": 0
        },
        "data": {
            "key": "PPMZIJHC",
            "version": 46,
            "itemType": "document",
            "title": "Towards understanding twitter use in software engineering: preliminary findings, ongoing challenges and future questions",
            "creators": [],
            "abstractNote": "",
            "type": "",
            "date": "",
            "publisher": "",
            "place": "",
            "DOI": "",
            "citationKey": "",
            "url": "http://dl.acm.org/citation.cfm?id=1984707",
            "accessDate": "",
            "archive": "",
            "archiveLocation": "",
            "shortTitle": "",
            "language": "",
            "libraryCatalog": "",
            "callNumber": "",
            "rights": "",
            "extra": "",
            "tags": [],
            "collections": [
                "UIA6SNHG"
            ],
            "relations": {},
            "dateAdded": "2015-09-14T12:33:21Z",
            "dateModified": "2015-09-14T12:33:32Z"
        }
    },
    {
        "key": "TGHEE9WX",
        "version": 46,
        "library": {
            "type": "group",
            "id": 391985,
            "name": "Hackers Social Media",
            "links": {
                "alternate": {
                    "href": "https://www.zotero.org/groups/hackers_social_media",
                    "type": "text/html"
                }
            }
        },
        "links": {
            "self": {
                "href": "https://api.zotero.org/groups/391985/items/TGHEE9WX",
                "type": "application/json"
            },
            "alternate": {
                "href": "https://www.zotero.org/groups/hackers_social_media/items/TGHEE9WX",
                "type": "text/html"
            }
        },
        "meta": {
            "createdByUser": {
                "id": 2129644,
                "username": "psykohack",
                "name": "",
                "links": {
                    "alternate": {
                        "href": "https://www.zotero.org/psykohack",
                        "type": "text/html"
                    }
                }
            },
            "numChildren": 0
        },
        "data": {
            "key": "TGHEE9WX",
            "version": 46,
            "itemType": "document",
            "title": "Information Leakage through Online Social Networking: Opening the Doorway for Advanced Persistence Threats",
            "creators": [],
            "abstractNote": "",
            "type": "",
            "date": "",
            "publisher": "",
            "place": "",
            "DOI": "",
            "citationKey": "",
            "url": "http://ro.ecu.edu.au/ism/93/",
            "accessDate": "",
            "archive": "",
            "archiveLocation": "",
            "shortTitle": "",
            "language": "",
            "libraryCatalog": "",
            "callNumber": "",
            "rights": "",
            "extra": "",
            "tags": [],
            "collections": [
                "UIA6SNHG"
            ],
            "relations": {},
            "dateAdded": "2015-09-14T12:33:03Z",
            "dateModified": "2015-09-14T12:33:13Z"
        }
    },
    {
        "key": "HT26TKXG",
        "version": 46,
        "library": {
            "type": "group",
            "id": 391985,
            "name": "Hackers Social Media",
            "links": {
                "alternate": {
                    "href": "https://www.zotero.org/groups/hackers_social_media",
                    "type": "text/html"
                }
            }
        },
        "links": {
            "self": {
                "href": "https://api.zotero.org/groups/391985/items/HT26TKXG",
                "type": "application/json"
            },
            "alternate": {
                "href": "https://www.zotero.org/groups/hackers_social_media/items/HT26TKXG",
                "type": "text/html"
            }
        },
        "meta": {
            "createdByUser": {
                "id": 2129644,
                "username": "psykohack",
                "name": "",
                "links": {
                    "alternate": {
                        "href": "https://www.zotero.org/psykohack",
                        "type": "text/html"
                    }
                }
            },
            "numChildren": 0
        },
        "data": {
            "key": "HT26TKXG",
            "version": 46,
            "itemType": "document",
            "title": "The threats of social networking: Old wine in new bottles?",
            "creators": [],
            "abstractNote": "",
            "type": "",
            "date": "",
            "publisher": "",
            "place": "",
            "DOI": "",
            "citationKey": "",
            "url": "http://www.sciencedirect.com/science/article/pii/S1363412711000598",
            "accessDate": "",
            "archive": "",
            "archiveLocation": "",
            "shortTitle": "",
            "language": "",
            "libraryCatalog": "",
            "callNumber": "",
            "rights": "",
            "extra": "",
            "tags": [],
            "collections": [
                "UIA6SNHG"
            ],
            "relations": {},
            "dateAdded": "2015-09-14T12:32:43Z",
            "dateModified": "2015-09-14T12:32:53Z"
        }
    },
    {
        "key": "WAPMVH5V",
        "version": 46,
        "library": {
            "type": "group",
            "id": 391985,
            "name": "Hackers Social Media",
            "links": {
                "alternate": {
                    "href": "https://www.zotero.org/groups/hackers_social_media",
                    "type": "text/html"
                }
            }
        },
        "links": {
            "self": {
                "href": "https://api.zotero.org/groups/391985/items/WAPMVH5V",
                "type": "application/json"
            },
            "alternate": {
                "href": "https://www.zotero.org/groups/hackers_social_media/items/WAPMVH5V",
                "type": "text/html"
            }
        },
        "meta": {
            "createdByUser": {
                "id": 2129644,
                "username": "psykohack",
                "name": "",
                "links": {
                    "alternate": {
                        "href": "https://www.zotero.org/psykohack",
                        "type": "text/html"
                    }
                }
            },
            "numChildren": 0
        },
        "data": {
            "key": "WAPMVH5V",
            "version": 46,
            "itemType": "document",
            "title": "Measuring Resistance to Social Engineering",
            "creators": [],
            "abstractNote": "",
            "type": "",
            "date": "",
            "publisher": "",
            "place": "",
            "DOI": "",
            "citationKey": "",
            "url": "http://link.springer.com/chapter/10.1007/978-3-540-31979-5_12#page-1",
            "accessDate": "",
            "archive": "",
            "archiveLocation": "",
            "shortTitle": "",
            "language": "",
            "libraryCatalog": "",
            "callNumber": "",
            "rights": "",
            "extra": "",
            "tags": [],
            "collections": [
                "UIA6SNHG"
            ],
            "relations": {},
            "dateAdded": "2015-09-14T12:32:24Z",
            "dateModified": "2015-09-14T12:32:34Z"
        }
    },
    {
        "key": "DSTC5WN8",
        "version": 46,
        "library": {
            "type": "group",
            "id": 391985,
            "name": "Hackers Social Media",
            "links": {
                "alternate": {
                    "href": "https://www.zotero.org/groups/hackers_social_media",
                    "type": "text/html"
                }
            }
        },
        "links": {
            "self": {
                "href": "https://api.zotero.org/groups/391985/items/DSTC5WN8",
                "type": "application/json"
            },
            "alternate": {
                "href": "https://www.zotero.org/groups/hackers_social_media/items/DSTC5WN8",
                "type": "text/html"
            }
        },
        "meta": {
            "createdByUser": {
                "id": 2129644,
                "username": "psykohack",
                "name": "",
                "links": {
                    "alternate": {
                        "href": "https://www.zotero.org/psykohack",
                        "type": "text/html"
                    }
                }
            },
            "numChildren": 0
        },
        "data": {
            "key": "DSTC5WN8",
            "version": 46,
            "itemType": "document",
            "title": "Two methodologies for physical penetration testing using social engineering",
            "creators": [],
            "abstractNote": "",
            "type": "",
            "date": "",
            "publisher": "",
            "place": "",
            "DOI": "",
            "citationKey": "",
            "url": "http://dl.acm.org/citation.cfm?id=1920319",
            "accessDate": "",
            "archive": "",
            "archiveLocation": "",
            "shortTitle": "",
            "language": "",
            "libraryCatalog": "",
            "callNumber": "",
            "rights": "",
            "extra": "",
            "tags": [],
            "collections": [
                "UIA6SNHG"
            ],
            "relations": {},
            "dateAdded": "2015-09-14T12:32:00Z",
            "dateModified": "2015-09-14T12:32:10Z"
        }
    },
    {
        "key": "44AZXGFE",
        "version": 46,
        "library": {
            "type": "group",
            "id": 391985,
            "name": "Hackers Social Media",
            "links": {
                "alternate": {
                    "href": "https://www.zotero.org/groups/hackers_social_media",
                    "type": "text/html"
                }
            }
        },
        "links": {
            "self": {
                "href": "https://api.zotero.org/groups/391985/items/44AZXGFE",
                "type": "application/json"
            },
            "alternate": {
                "href": "https://www.zotero.org/groups/hackers_social_media/items/44AZXGFE",
                "type": "text/html"
            }
        },
        "meta": {
            "createdByUser": {
                "id": 2129644,
                "username": "psykohack",
                "name": "",
                "links": {
                    "alternate": {
                        "href": "https://www.zotero.org/psykohack",
                        "type": "text/html"
                    }
                }
            },
            "numChildren": 0
        },
        "data": {
            "key": "44AZXGFE",
            "version": 46,
            "itemType": "document",
            "title": "Penetration Testing Through Social Engineering",
            "creators": [],
            "abstractNote": "",
            "type": "",
            "date": "",
            "publisher": "",
            "place": "",
            "DOI": "",
            "citationKey": "",
            "url": "http://www.tandfonline.com/doi/abs/10.1080/10658989609342519?journalCode=uiss19",
            "accessDate": "",
            "archive": "",
            "archiveLocation": "",
            "shortTitle": "",
            "language": "",
            "libraryCatalog": "",
            "callNumber": "",
            "rights": "",
            "extra": "",
            "tags": [],
            "collections": [
                "UIA6SNHG"
            ],
            "relations": {},
            "dateAdded": "2015-09-14T12:31:41Z",
            "dateModified": "2015-09-14T12:31:52Z"
        }
    },
    {
        "key": "643HJJ9P",
        "version": 46,
        "library": {
            "type": "group",
            "id": 391985,
            "name": "Hackers Social Media",
            "links": {
                "alternate": {
                    "href": "https://www.zotero.org/groups/hackers_social_media",
                    "type": "text/html"
                }
            }
        },
        "links": {
            "self": {
                "href": "https://api.zotero.org/groups/391985/items/643HJJ9P",
                "type": "application/json"
            },
            "alternate": {
                "href": "https://www.zotero.org/groups/hackers_social_media/items/643HJJ9P",
                "type": "text/html"
            }
        },
        "meta": {
            "createdByUser": {
                "id": 2129644,
                "username": "psykohack",
                "name": "",
                "links": {
                    "alternate": {
                        "href": "https://www.zotero.org/psykohack",
                        "type": "text/html"
                    }
                }
            },
            "numChildren": 0
        },
        "data": {
            "key": "643HJJ9P",
            "version": 46,
            "itemType": "document",
            "title": "A Framework for Conceptualizing Social Engineering Attacks",
            "creators": [],
            "abstractNote": "",
            "type": "",
            "date": "",
            "publisher": "",
            "place": "",
            "DOI": "",
            "citationKey": "",
            "url": "http://link.springer.com/chapter/10.1007/11962977_7",
            "accessDate": "",
            "archive": "",
            "archiveLocation": "",
            "shortTitle": "",
            "language": "",
            "libraryCatalog": "",
            "callNumber": "",
            "rights": "",
            "extra": "",
            "tags": [],
            "collections": [
                "UIA6SNHG"
            ],
            "relations": {},
            "dateAdded": "2015-09-14T12:31:20Z",
            "dateModified": "2015-09-14T12:31:28Z"
        }
    },
    {
        "key": "22WRMUR6",
        "version": 46,
        "library": {
            "type": "group",
            "id": 391985,
            "name": "Hackers Social Media",
            "links": {
                "alternate": {
                    "href": "https://www.zotero.org/groups/hackers_social_media",
                    "type": "text/html"
                }
            }
        },
        "links": {
            "self": {
                "href": "https://api.zotero.org/groups/391985/items/22WRMUR6",
                "type": "application/json"
            },
            "alternate": {
                "href": "https://www.zotero.org/groups/hackers_social_media/items/22WRMUR6",
                "type": "text/html"
            }
        },
        "meta": {
            "createdByUser": {
                "id": 2129644,
                "username": "psykohack",
                "name": "",
                "links": {
                    "alternate": {
                        "href": "https://www.zotero.org/psykohack",
                        "type": "text/html"
                    }
                }
            },
            "numChildren": 0
        },
        "data": {
            "key": "22WRMUR6",
            "version": 46,
            "itemType": "document",
            "title": "Securing Information Assets: Understanding, Measuring and Protecting against Social Engineering Attacks",
            "creators": [],
            "abstractNote": "",
            "type": "",
            "date": "",
            "publisher": "",
            "place": "",
            "DOI": "",
            "citationKey": "",
            "url": "http://www.diva-portal.org/smash/record.jsf?pid=diva2%3A200190&dswid=-3753",
            "accessDate": "",
            "archive": "",
            "archiveLocation": "",
            "shortTitle": "",
            "language": "",
            "libraryCatalog": "",
            "callNumber": "",
            "rights": "",
            "extra": "",
            "tags": [],
            "collections": [
                "UIA6SNHG"
            ],
            "relations": {},
            "dateAdded": "2015-09-14T12:31:03Z",
            "dateModified": "2015-09-14T12:31:13Z"
        }
    },
    {
        "key": "PZT5F63K",
        "version": 46,
        "library": {
            "type": "group",
            "id": 391985,
            "name": "Hackers Social Media",
            "links": {
                "alternate": {
                    "href": "https://www.zotero.org/groups/hackers_social_media",
                    "type": "text/html"
                }
            }
        },
        "links": {
            "self": {
                "href": "https://api.zotero.org/groups/391985/items/PZT5F63K",
                "type": "application/json"
            },
            "alternate": {
                "href": "https://www.zotero.org/groups/hackers_social_media/items/PZT5F63K",
                "type": "text/html"
            }
        },
        "meta": {
            "createdByUser": {
                "id": 2129644,
                "username": "psykohack",
                "name": "",
                "links": {
                    "alternate": {
                        "href": "https://www.zotero.org/psykohack",
                        "type": "text/html"
                    }
                }
            },
            "numChildren": 0
        },
        "data": {
            "key": "PZT5F63K",
            "version": 46,
            "itemType": "document",
            "title": "Detecting Social Engineering",
            "creators": [],
            "abstractNote": "",
            "type": "",
            "date": "",
            "publisher": "",
            "place": "",
            "DOI": "",
            "citationKey": "",
            "url": "http://link.springer.com/chapter/10.1007/0-387-31163-7_6",
            "accessDate": "",
            "archive": "",
            "archiveLocation": "",
            "shortTitle": "",
            "language": "",
            "libraryCatalog": "",
            "callNumber": "",
            "rights": "",
            "extra": "",
            "tags": [],
            "collections": [
                "UIA6SNHG"
            ],
            "relations": {},
            "dateAdded": "2015-09-14T12:30:43Z",
            "dateModified": "2015-09-14T12:30:54Z"
        }
    },
    {
        "key": "7G4ZRUFK",
        "version": 46,
        "library": {
            "type": "group",
            "id": 391985,
            "name": "Hackers Social Media",
            "links": {
                "alternate": {
                    "href": "https://www.zotero.org/groups/hackers_social_media",
                    "type": "text/html"
                }
            }
        },
        "links": {
            "self": {
                "href": "https://api.zotero.org/groups/391985/items/7G4ZRUFK",
                "type": "application/json"
            },
            "alternate": {
                "href": "https://www.zotero.org/groups/hackers_social_media/items/7G4ZRUFK",
                "type": "text/html"
            }
        },
        "meta": {
            "createdByUser": {
                "id": 2129644,
                "username": "psykohack",
                "name": "",
                "links": {
                    "alternate": {
                        "href": "https://www.zotero.org/psykohack",
                        "type": "text/html"
                    }
                }
            },
            "numChildren": 0
        },
        "data": {
            "key": "7G4ZRUFK",
            "version": 46,
            "itemType": "document",
            "title": "Case Study On Social Engineering Techniques for Persuasion",
            "creators": [],
            "abstractNote": "",
            "type": "",
            "date": "",
            "publisher": "",
            "place": "",
            "DOI": "",
            "citationKey": "",
            "url": "http://arxiv.org/abs/1006.3848",
            "accessDate": "",
            "archive": "",
            "archiveLocation": "",
            "shortTitle": "",
            "language": "",
            "libraryCatalog": "",
            "callNumber": "",
            "rights": "",
            "extra": "",
            "tags": [],
            "collections": [
                "UIA6SNHG"
            ],
            "relations": {},
            "dateAdded": "2015-09-14T12:30:26Z",
            "dateModified": "2015-09-14T12:30:35Z"
        }
    },
    {
        "key": "459Q2DCT",
        "version": 46,
        "library": {
            "type": "group",
            "id": 391985,
            "name": "Hackers Social Media",
            "links": {
                "alternate": {
                    "href": "https://www.zotero.org/groups/hackers_social_media",
                    "type": "text/html"
                }
            }
        },
        "links": {
            "self": {
                "href": "https://api.zotero.org/groups/391985/items/459Q2DCT",
                "type": "application/json"
            },
            "alternate": {
                "href": "https://www.zotero.org/groups/hackers_social_media/items/459Q2DCT",
                "type": "text/html"
            }
        },
        "meta": {
            "createdByUser": {
                "id": 2129644,
                "username": "psykohack",
                "name": "",
                "links": {
                    "alternate": {
                        "href": "https://www.zotero.org/psykohack",
                        "type": "text/html"
                    }
                }
            },
            "numChildren": 0
        },
        "data": {
            "key": "459Q2DCT",
            "version": 46,
            "itemType": "document",
            "title": "The Threat of Social Engineering and Your Defense Against It",
            "creators": [],
            "abstractNote": "",
            "type": "",
            "date": "",
            "publisher": "",
            "place": "",
            "DOI": "",
            "citationKey": "",
            "url": "http://cdn.preterhuman.net/texts/underground/info/The%20Threat%20of%20Social%20Engineering%20and%20Your%20Defense%20Against%20It.pdf",
            "accessDate": "",
            "archive": "",
            "archiveLocation": "",
            "shortTitle": "",
            "language": "",
            "libraryCatalog": "",
            "callNumber": "",
            "rights": "",
            "extra": "",
            "tags": [],
            "collections": [
                "UIA6SNHG"
            ],
            "relations": {},
            "dateAdded": "2015-09-14T12:30:09Z",
            "dateModified": "2015-09-14T12:30:19Z"
        }
    },
    {
        "key": "9R64TXUV",
        "version": 46,
        "library": {
            "type": "group",
            "id": 391985,
            "name": "Hackers Social Media",
            "links": {
                "alternate": {
                    "href": "https://www.zotero.org/groups/hackers_social_media",
                    "type": "text/html"
                }
            }
        },
        "links": {
            "self": {
                "href": "https://api.zotero.org/groups/391985/items/9R64TXUV",
                "type": "application/json"
            },
            "alternate": {
                "href": "https://www.zotero.org/groups/hackers_social_media/items/9R64TXUV",
                "type": "text/html"
            }
        },
        "meta": {
            "createdByUser": {
                "id": 2129644,
                "username": "psykohack",
                "name": "",
                "links": {
                    "alternate": {
                        "href": "https://www.zotero.org/psykohack",
                        "type": "text/html"
                    }
                }
            },
            "numChildren": 0
        },
        "data": {
            "key": "9R64TXUV",
            "version": 46,
            "itemType": "document",
            "title": "The urgency for effective user privacy-education to counter social engineering attacks on secure computer systems",
            "creators": [],
            "abstractNote": "",
            "type": "",
            "date": "",
            "publisher": "",
            "place": "",
            "DOI": "",
            "citationKey": "",
            "url": "http://dl.acm.org/citation.cfm?id=1029577",
            "accessDate": "",
            "archive": "",
            "archiveLocation": "",
            "shortTitle": "",
            "language": "",
            "libraryCatalog": "",
            "callNumber": "",
            "rights": "",
            "extra": "",
            "tags": [],
            "collections": [
                "UIA6SNHG"
            ],
            "relations": {},
            "dateAdded": "2015-09-14T12:29:50Z",
            "dateModified": "2015-09-14T12:29:59Z"
        }
    },
    {
        "key": "GZS5AG2N",
        "version": 46,
        "library": {
            "type": "group",
            "id": 391985,
            "name": "Hackers Social Media",
            "links": {
                "alternate": {
                    "href": "https://www.zotero.org/groups/hackers_social_media",
                    "type": "text/html"
                }
            }
        },
        "links": {
            "self": {
                "href": "https://api.zotero.org/groups/391985/items/GZS5AG2N",
                "type": "application/json"
            },
            "alternate": {
                "href": "https://www.zotero.org/groups/hackers_social_media/items/GZS5AG2N",
                "type": "text/html"
            }
        },
        "meta": {
            "createdByUser": {
                "id": 2129644,
                "username": "psykohack",
                "name": "",
                "links": {
                    "alternate": {
                        "href": "https://www.zotero.org/psykohack",
                        "type": "text/html"
                    }
                }
            },
            "numChildren": 0
        },
        "data": {
            "key": "GZS5AG2N",
            "version": 46,
            "itemType": "document",
            "title": "An overview of social engineering malware: Trends, tactics, and implications",
            "creators": [],
            "abstractNote": "",
            "type": "",
            "date": "",
            "publisher": "",
            "place": "",
            "DOI": "",
            "citationKey": "",
            "url": "http://www.sciencedirect.com/science/article/pii/S0160791X10000497",
            "accessDate": "",
            "archive": "",
            "archiveLocation": "",
            "shortTitle": "",
            "language": "",
            "libraryCatalog": "",
            "callNumber": "",
            "rights": "",
            "extra": "",
            "tags": [],
            "collections": [
                "UIA6SNHG"
            ],
            "relations": {},
            "dateAdded": "2015-09-14T12:29:34Z",
            "dateModified": "2015-09-14T12:29:43Z"
        }
    },
    {
        "key": "7IUFSMFT",
        "version": 46,
        "library": {
            "type": "group",
            "id": 391985,
            "name": "Hackers Social Media",
            "links": {
                "alternate": {
                    "href": "https://www.zotero.org/groups/hackers_social_media",
                    "type": "text/html"
                }
            }
        },
        "links": {
            "self": {
                "href": "https://api.zotero.org/groups/391985/items/7IUFSMFT",
                "type": "application/json"
            },
            "alternate": {
                "href": "https://www.zotero.org/groups/hackers_social_media/items/7IUFSMFT",
                "type": "text/html"
            }
        },
        "meta": {
            "createdByUser": {
                "id": 2129644,
                "username": "psykohack",
                "name": "",
                "links": {
                    "alternate": {
                        "href": "https://www.zotero.org/psykohack",
                        "type": "text/html"
                    }
                }
            },
            "numChildren": 0
        },
        "data": {
            "key": "7IUFSMFT",
            "version": 46,
            "itemType": "document",
            "title": "A multi-level defense against social engineering",
            "creators": [],
            "abstractNote": "",
            "type": "",
            "date": "",
            "publisher": "",
            "place": "",
            "DOI": "",
            "citationKey": "",
            "url": "http://taupe.free.fr/book/psycho/social%20engineering/Social%20Engineering%20-%20Sans%20Institute%20-%20Multi%20Level%20Defense%20Against%20Social%20Engineering.pdf",
            "accessDate": "",
            "archive": "",
            "archiveLocation": "",
            "shortTitle": "",
            "language": "",
            "libraryCatalog": "",
            "callNumber": "",
            "rights": "",
            "extra": "",
            "tags": [],
            "collections": [
                "UIA6SNHG"
            ],
            "relations": {},
            "dateAdded": "2015-09-14T12:29:14Z",
            "dateModified": "2015-09-14T12:29:25Z"
        }
    },
    {
        "key": "DW2X4EKU",
        "version": 46,
        "library": {
            "type": "group",
            "id": 391985,
            "name": "Hackers Social Media",
            "links": {
                "alternate": {
                    "href": "https://www.zotero.org/groups/hackers_social_media",
                    "type": "text/html"
                }
            }
        },
        "links": {
            "self": {
                "href": "https://api.zotero.org/groups/391985/items/DW2X4EKU",
                "type": "application/json"
            },
            "alternate": {
                "href": "https://www.zotero.org/groups/hackers_social_media/items/DW2X4EKU",
                "type": "text/html"
            }
        },
        "meta": {
            "createdByUser": {
                "id": 2129644,
                "username": "psykohack",
                "name": "",
                "links": {
                    "alternate": {
                        "href": "https://www.zotero.org/psykohack",
                        "type": "text/html"
                    }
                }
            },
            "numChildren": 0
        },
        "data": {
            "key": "DW2X4EKU",
            "version": 46,
            "itemType": "document",
            "title": "Analysis and Defensive Tools for Social-Engineering Attacks on Computer Systems",
            "creators": [],
            "abstractNote": "",
            "type": "",
            "date": "",
            "publisher": "",
            "place": "",
            "DOI": "",
            "citationKey": "",
            "url": "http://ieeexplore.ieee.org/xpls/abs_all.jsp?arnumber=1652125",
            "accessDate": "",
            "archive": "",
            "archiveLocation": "",
            "shortTitle": "",
            "language": "",
            "libraryCatalog": "",
            "callNumber": "",
            "rights": "",
            "extra": "",
            "tags": [],
            "collections": [
                "UIA6SNHG"
            ],
            "relations": {},
            "dateAdded": "2015-09-14T12:28:56Z",
            "dateModified": "2015-09-14T12:29:05Z"
        }
    }
]