[
    {
        "key": "GBZR5A3X",
        "version": 1,
        "library": {
            "type": "group",
            "id": 43831,
            "name": "History of Information Security",
            "links": {
                "alternate": {
                    "href": "https://www.zotero.org/groups/history_of_information_security",
                    "type": "text/html"
                }
            }
        },
        "links": {
            "self": {
                "href": "https://api.zotero.org/groups/43831/items/GBZR5A3X",
                "type": "application/json"
            },
            "alternate": {
                "href": "https://www.zotero.org/groups/history_of_information_security/items/GBZR5A3X",
                "type": "text/html"
            }
        },
        "meta": {
            "createdByUser": {
                "id": 571941,
                "username": "tanyarep",
                "name": "Tanya Replogle",
                "links": {
                    "alternate": {
                        "href": "https://www.zotero.org/tanyarep",
                        "type": "text/html"
                    }
                }
            },
            "creatorSummary": "Allen",
            "parsedDate": "2005-06",
            "numChildren": 0
        },
        "data": {
            "key": "GBZR5A3X",
            "version": 1,
            "itemType": "report",
            "title": "Governing for Enterprise Security",
            "creators": [
                {
                    "creatorType": "author",
                    "firstName": "Julia",
                    "lastName": "Allen"
                }
            ],
            "abstractNote": "",
            "reportNumber": "CMU/SEI-2005-TN-023",
            "reportType": "",
            "institution": "CMU/SEI",
            "place": "",
            "date": "June 2005",
            "seriesTitle": "",
            "seriesNumber": "",
            "pages": "81",
            "DOI": "",
            "ISBN": "",
            "citationKey": "",
            "url": "http://www.cert.org/governance/",
            "accessDate": "2011-04-22T14:05:58Z",
            "ISSN": "",
            "archive": "",
            "archiveLocation": "",
            "shortTitle": "",
            "language": "",
            "libraryCatalog": "",
            "callNumber": "0029",
            "rights": "",
            "extra": "",
            "tags": [],
            "collections": [],
            "relations": {},
            "dateAdded": "2011-04-22T14:05:58Z",
            "dateModified": "2012-08-15T22:47:32Z"
        }
    },
    {
        "key": "FXDE6X7E",
        "version": 1,
        "library": {
            "type": "group",
            "id": 43831,
            "name": "History of Information Security",
            "links": {
                "alternate": {
                    "href": "https://www.zotero.org/groups/history_of_information_security",
                    "type": "text/html"
                }
            }
        },
        "links": {
            "self": {
                "href": "https://api.zotero.org/groups/43831/items/FXDE6X7E",
                "type": "application/json"
            },
            "alternate": {
                "href": "https://www.zotero.org/groups/history_of_information_security/items/FXDE6X7E",
                "type": "text/html"
            }
        },
        "meta": {
            "createdByUser": {
                "id": 571941,
                "username": "tanyarep",
                "name": "Tanya Replogle",
                "links": {
                    "alternate": {
                        "href": "https://www.zotero.org/tanyarep",
                        "type": "text/html"
                    }
                }
            },
            "creatorSummary": "Holder",
            "numChildren": 0
        },
        "data": {
            "key": "FXDE6X7E",
            "version": 1,
            "itemType": "journalArticle",
            "title": "",
            "creators": [
                {
                    "creatorType": "author",
                    "firstName": "Eric",
                    "lastName": "Holder"
                }
            ],
            "abstractNote": "Senator Layhe. Protect IP.  Preventing real online threats to Economic Creativity and theft of Intellectional Property.  Allows Govt power to shut down websites and allow anyone the power to sue websites. \nOn the basis that it is promoting copywrited material.\nWhen the suit is filed, they complainer can get an injunction to shutdown the site.  Shift power from artists.  \nMake it a felony.",
            "publicationTitle": "",
            "publisher": "",
            "place": "",
            "date": "",
            "volume": "",
            "issue": "",
            "section": "",
            "partNumber": "",
            "partTitle": "",
            "pages": "",
            "series": "",
            "seriesTitle": "",
            "seriesText": "",
            "journalAbbreviation": "",
            "DOI": "",
            "citationKey": "",
            "url": "",
            "accessDate": "",
            "PMID": "",
            "PMCID": "",
            "ISSN": "",
            "archive": "",
            "archiveLocation": "",
            "shortTitle": "",
            "language": "",
            "libraryCatalog": "",
            "callNumber": "1605",
            "rights": "",
            "extra": "",
            "tags": [],
            "collections": [],
            "relations": {},
            "dateAdded": "2011-05-20T04:21:59Z",
            "dateModified": "2012-08-15T22:47:31Z"
        }
    },
    {
        "key": "E3FBDN2K",
        "version": 1,
        "library": {
            "type": "group",
            "id": 43831,
            "name": "History of Information Security",
            "links": {
                "alternate": {
                    "href": "https://www.zotero.org/groups/history_of_information_security",
                    "type": "text/html"
                }
            }
        },
        "links": {
            "self": {
                "href": "https://api.zotero.org/groups/43831/items/E3FBDN2K",
                "type": "application/json"
            },
            "alternate": {
                "href": "https://www.zotero.org/groups/history_of_information_security/items/E3FBDN2K",
                "type": "text/html"
            }
        },
        "meta": {
            "createdByUser": {
                "id": 571941,
                "username": "tanyarep",
                "name": "Tanya Replogle",
                "links": {
                    "alternate": {
                        "href": "https://www.zotero.org/tanyarep",
                        "type": "text/html"
                    }
                }
            },
            "creatorSummary": "Hernan",
            "parsedDate": "2006-11",
            "numChildren": 0
        },
        "data": {
            "key": "E3FBDN2K",
            "version": 1,
            "itemType": "magazineArticle",
            "title": "Uncover Security Design Flaws Using The STRIDE Approach",
            "creators": [
                {
                    "creatorType": "author",
                    "firstName": "Scott",
                    "lastName": "Hernan"
                }
            ],
            "abstractNote": "",
            "publicationTitle": "MSDN Magazine",
            "publisher": "",
            "place": "",
            "date": "November 2006",
            "volume": "",
            "issue": "",
            "pages": "",
            "ISSN": "",
            "DOI": "",
            "citationKey": "",
            "url": "http://msdn.microsoft.com/en-us/magazine/cc163519.aspx#S2",
            "accessDate": "2011-05-20T07:42:35Z",
            "archive": "",
            "archiveLocation": "",
            "shortTitle": "",
            "language": "",
            "libraryCatalog": "",
            "callNumber": "0039",
            "rights": "",
            "extra": "",
            "tags": [],
            "collections": [],
            "relations": {},
            "dateAdded": "2011-05-20T07:42:35Z",
            "dateModified": "2012-08-15T22:47:30Z"
        }
    },
    {
        "key": "DUHXS7CT",
        "version": 1,
        "library": {
            "type": "group",
            "id": 43831,
            "name": "History of Information Security",
            "links": {
                "alternate": {
                    "href": "https://www.zotero.org/groups/history_of_information_security",
                    "type": "text/html"
                }
            }
        },
        "links": {
            "self": {
                "href": "https://api.zotero.org/groups/43831/items/DUHXS7CT",
                "type": "application/json"
            },
            "alternate": {
                "href": "https://www.zotero.org/groups/history_of_information_security/items/DUHXS7CT",
                "type": "text/html"
            }
        },
        "meta": {
            "createdByUser": {
                "id": 571941,
                "username": "tanyarep",
                "name": "Tanya Replogle",
                "links": {
                    "alternate": {
                        "href": "https://www.zotero.org/tanyarep",
                        "type": "text/html"
                    }
                }
            },
            "creatorSummary": "Merrell",
            "numChildren": 0
        },
        "data": {
            "key": "DUHXS7CT",
            "version": 1,
            "itemType": "audioRecording",
            "title": "Communication, Trust, and Information Sharing",
            "creators": [
                {
                    "creatorType": "performer",
                    "firstName": "Sam",
                    "lastName": "Merrell"
                }
            ],
            "abstractNote": "",
            "audioRecordingFormat": "",
            "seriesTitle": "CERT's Podcast Series - Public-Private Partnerships: Essential for National Cyber Security",
            "volume": "Communication, Trust, and Information Sharing",
            "numberOfVolumes": "",
            "label": "",
            "place": "",
            "date": "",
            "runningTime": "",
            "ISBN": "",
            "DOI": "",
            "citationKey": "",
            "url": "http://www.cert.org/podcast/show/20101130merrell.html",
            "accessDate": "2011-04-22T23:32:05Z",
            "archive": "",
            "archiveLocation": "",
            "shortTitle": "",
            "language": "",
            "libraryCatalog": "",
            "callNumber": "0000",
            "rights": "",
            "extra": "",
            "tags": [],
            "collections": [],
            "relations": {},
            "dateAdded": "2011-04-22T23:32:05Z",
            "dateModified": "2012-08-15T22:47:29Z"
        }
    },
    {
        "key": "BMUINVIA",
        "version": 1,
        "library": {
            "type": "group",
            "id": 43831,
            "name": "History of Information Security",
            "links": {
                "alternate": {
                    "href": "https://www.zotero.org/groups/history_of_information_security",
                    "type": "text/html"
                }
            }
        },
        "links": {
            "self": {
                "href": "https://api.zotero.org/groups/43831/items/BMUINVIA",
                "type": "application/json"
            },
            "alternate": {
                "href": "https://www.zotero.org/groups/history_of_information_security/items/BMUINVIA",
                "type": "text/html"
            }
        },
        "meta": {
            "createdByUser": {
                "id": 571941,
                "username": "tanyarep",
                "name": "Tanya Replogle",
                "links": {
                    "alternate": {
                        "href": "https://www.zotero.org/tanyarep",
                        "type": "text/html"
                    }
                }
            },
            "creatorSummary": "Gaspar",
            "parsedDate": "2006",
            "numChildren": 0
        },
        "data": {
            "key": "BMUINVIA",
            "version": 1,
            "itemType": "journalArticle",
            "title": "Root-kits & loadable kernel modules: exploiting the Linux kernel for fun and (educational) profit",
            "creators": [
                {
                    "creatorType": "author",
                    "firstName": "Alessio",
                    "lastName": "Gaspar"
                }
            ],
            "abstractNote": "This paper discusses how Loadable Kernel Modules (LKM) can be used in Operating Systems (OS) Laboratories to pedagogically enhance an undergraduate student's hands-on experience. We draw inspiration from this technology as it has been applied in the computer security field as a means to compromise running kernels after successfully breaking into an unsecured host. We propose and discuss in detail a new pedagogical approach to introduce students to Linux kernel programming techniques which are relevant to the contents of classic undergraduate operating systems course concepts. This new approach breaks down the complexity and initial overwhelming feeling experienced by students when first confronted to the intimidating source code base of a modern OS. Students are led to develop loadable kernel modules meant to \"hack\" into a running kernel so that critical system calls and data structures can be unveiled progressively by the instructor. This approach allows for well-delimited forays into \"kernel land\" that can be tailored to fit any lecture style and students' capabilities specifics.",
            "publicationTitle": "Bibliometrics",
            "publisher": "",
            "place": "",
            "date": "2006 12",
            "volume": "22",
            "issue": "2",
            "section": "",
            "partNumber": "",
            "partTitle": "",
            "pages": "244-250",
            "series": "",
            "seriesTitle": "",
            "seriesText": "",
            "journalAbbreviation": "",
            "DOI": "",
            "citationKey": "",
            "url": "",
            "accessDate": "2011-04-23T10:15:42Z",
            "PMID": "",
            "PMCID": "",
            "ISSN": "1937-4771",
            "archive": "",
            "archiveLocation": "",
            "shortTitle": "",
            "language": "",
            "libraryCatalog": "",
            "callNumber": "0009",
            "rights": "",
            "extra": "",
            "tags": [
                {
                    "tag": "Cell Differentiation",
                    "type": 1
                },
                {
                    "tag": "Cell Line",
                    "type": 1
                },
                {
                    "tag": "Cell Proliferation",
                    "type": 1
                },
                {
                    "tag": "Chromatin",
                    "type": 1
                },
                {
                    "tag": "Chromatin Assembly and Disassembly",
                    "type": 1
                },
                {
                    "tag": "Computer Simulation",
                    "type": 1
                },
                {
                    "tag": "Gene Expression",
                    "type": 1
                },
                {
                    "tag": "Gene Library",
                    "type": 1
                },
                {
                    "tag": "Homeodomain Proteins",
                    "type": 1
                },
                {
                    "tag": "Humans",
                    "type": 1
                },
                {
                    "tag": "Models, Biological",
                    "type": 1
                },
                {
                    "tag": "Oligonucleotide Array Sequence Analysis",
                    "type": 1
                },
                {
                    "tag": "Reverse Transcriptase Polymerase Chain Reaction",
                    "type": 1
                },
                {
                    "tag": "Software",
                    "type": 1
                },
                {
                    "tag": "Tetradecanoylphorbol Acetate",
                    "type": 1
                }
            ],
            "collections": [],
            "relations": {},
            "dateAdded": "2011-04-23T10:15:42Z",
            "dateModified": "2012-08-15T22:47:28Z"
        }
    },
    {
        "key": "BCEMUSZ3",
        "version": 1,
        "library": {
            "type": "group",
            "id": 43831,
            "name": "History of Information Security",
            "links": {
                "alternate": {
                    "href": "https://www.zotero.org/groups/history_of_information_security",
                    "type": "text/html"
                }
            }
        },
        "links": {
            "self": {
                "href": "https://api.zotero.org/groups/43831/items/BCEMUSZ3",
                "type": "application/json"
            },
            "alternate": {
                "href": "https://www.zotero.org/groups/history_of_information_security/items/BCEMUSZ3",
                "type": "text/html"
            }
        },
        "meta": {
            "createdByUser": {
                "id": 571941,
                "username": "tanyarep",
                "name": "Tanya Replogle",
                "links": {
                    "alternate": {
                        "href": "https://www.zotero.org/tanyarep",
                        "type": "text/html"
                    }
                }
            },
            "creatorSummary": "NIST",
            "parsedDate": "2010-02",
            "numChildren": 0
        },
        "data": {
            "key": "BCEMUSZ3",
            "version": 1,
            "itemType": "journalArticle",
            "title": "Guide for Applying the Risk Management Framework to Federal Information Systems A Security Life Cycle Approach",
            "creators": [
                {
                    "creatorType": "author",
                    "firstName": "",
                    "lastName": "NIST"
                }
            ],
            "abstractNote": "",
            "publicationTitle": "Special Publication 800-37",
            "publisher": "",
            "place": "",
            "date": "February 2010",
            "volume": "",
            "issue": "",
            "section": "",
            "partNumber": "",
            "partTitle": "",
            "pages": "",
            "series": "",
            "seriesTitle": "",
            "seriesText": "Special Publication 800-37",
            "journalAbbreviation": "",
            "DOI": "",
            "citationKey": "",
            "url": "",
            "accessDate": "",
            "PMID": "",
            "PMCID": "",
            "ISSN": "",
            "archive": "",
            "archiveLocation": "",
            "shortTitle": "",
            "language": "",
            "libraryCatalog": "",
            "callNumber": "0000",
            "rights": "",
            "extra": "",
            "tags": [],
            "collections": [],
            "relations": {},
            "dateAdded": "2011-05-20T03:00:14Z",
            "dateModified": "2012-08-15T22:47:27Z"
        }
    },
    {
        "key": "99G3UZDA",
        "version": 1,
        "library": {
            "type": "group",
            "id": 43831,
            "name": "History of Information Security",
            "links": {
                "alternate": {
                    "href": "https://www.zotero.org/groups/history_of_information_security",
                    "type": "text/html"
                }
            }
        },
        "links": {
            "self": {
                "href": "https://api.zotero.org/groups/43831/items/99G3UZDA",
                "type": "application/json"
            },
            "alternate": {
                "href": "https://www.zotero.org/groups/history_of_information_security/items/99G3UZDA",
                "type": "text/html"
            }
        },
        "meta": {
            "createdByUser": {
                "id": 571941,
                "username": "tanyarep",
                "name": "Tanya Replogle",
                "links": {
                    "alternate": {
                        "href": "https://www.zotero.org/tanyarep",
                        "type": "text/html"
                    }
                }
            },
            "creatorSummary": "Tilborg",
            "parsedDate": "2005",
            "numChildren": 0
        },
        "data": {
            "key": "99G3UZDA",
            "version": 1,
            "itemType": "book",
            "title": "Encyclopedia of cryptography and security",
            "creators": [
                {
                    "creatorType": "author",
                    "firstName": "Henk",
                    "lastName": "Tilborg"
                }
            ],
            "abstractNote": "",
            "series": "",
            "seriesNumber": "",
            "volume": "",
            "numberOfVolumes": "",
            "edition": "",
            "date": "2005",
            "publisher": "Springer",
            "place": "New York",
            "originalDate": "",
            "originalPublisher": "",
            "originalPlace": "",
            "format": "",
            "numPages": "",
            "ISBN": "9780387234731",
            "DOI": "",
            "citationKey": "",
            "url": "",
            "accessDate": "",
            "ISSN": "",
            "archive": "",
            "archiveLocation": "",
            "shortTitle": "",
            "language": "",
            "libraryCatalog": "Open WorldCat",
            "callNumber": "0000",
            "rights": "",
            "extra": "",
            "tags": [],
            "collections": [],
            "relations": {},
            "dateAdded": "2011-04-23T03:25:22Z",
            "dateModified": "2012-08-15T22:47:26Z"
        }
    },
    {
        "key": "6TZZXXKT",
        "version": 1,
        "library": {
            "type": "group",
            "id": 43831,
            "name": "History of Information Security",
            "links": {
                "alternate": {
                    "href": "https://www.zotero.org/groups/history_of_information_security",
                    "type": "text/html"
                }
            }
        },
        "links": {
            "self": {
                "href": "https://api.zotero.org/groups/43831/items/6TZZXXKT",
                "type": "application/json"
            },
            "alternate": {
                "href": "https://www.zotero.org/groups/history_of_information_security/items/6TZZXXKT",
                "type": "text/html"
            }
        },
        "meta": {
            "createdByUser": {
                "id": 571941,
                "username": "tanyarep",
                "name": "Tanya Replogle",
                "links": {
                    "alternate": {
                        "href": "https://www.zotero.org/tanyarep",
                        "type": "text/html"
                    }
                }
            },
            "creatorSummary": "Geoffrey Sampson",
            "parsedDate": "1990",
            "numChildren": 0
        },
        "data": {
            "key": "6TZZXXKT",
            "version": 1,
            "itemType": "journalArticle",
            "title": "Writing Systems: A Linguistic Introduction",
            "creators": [
                {
                    "creatorType": "author",
                    "name": "Geoffrey Sampson"
                }
            ],
            "abstractNote": "",
            "publicationTitle": "Stanford University Press",
            "publisher": "",
            "place": "",
            "date": "1990, p. 78.",
            "volume": "",
            "issue": "",
            "section": "",
            "partNumber": "",
            "partTitle": "",
            "pages": "",
            "series": "",
            "seriesTitle": "",
            "seriesText": "",
            "journalAbbreviation": "",
            "DOI": "",
            "citationKey": "",
            "url": "http://www.google.com/search?q=Geoffrey+Sampson%2C+Writing+Systems%3A+a+Linguistic+Introduction%2C+Stanford+University+Press%2C+1990%2C+p.+78.&ie=utf-8&oe=utf-8&aq=t&rls=org.mozilla:en-US:official&client=firefox-a",
            "accessDate": "2011-04-23T03:47:49Z",
            "PMID": "",
            "PMCID": "",
            "ISSN": "",
            "archive": "",
            "archiveLocation": "",
            "shortTitle": "",
            "language": "",
            "libraryCatalog": "",
            "callNumber": "0514",
            "rights": "",
            "extra": "",
            "tags": [],
            "collections": [],
            "relations": {},
            "dateAdded": "2011-04-23T03:47:49Z",
            "dateModified": "2012-08-15T22:47:25Z"
        }
    },
    {
        "key": "6QKEI4UJ",
        "version": 1,
        "library": {
            "type": "group",
            "id": 43831,
            "name": "History of Information Security",
            "links": {
                "alternate": {
                    "href": "https://www.zotero.org/groups/history_of_information_security",
                    "type": "text/html"
                }
            }
        },
        "links": {
            "self": {
                "href": "https://api.zotero.org/groups/43831/items/6QKEI4UJ",
                "type": "application/json"
            },
            "alternate": {
                "href": "https://www.zotero.org/groups/history_of_information_security/items/6QKEI4UJ",
                "type": "text/html"
            }
        },
        "meta": {
            "createdByUser": {
                "id": 571941,
                "username": "tanyarep",
                "name": "Tanya Replogle",
                "links": {
                    "alternate": {
                        "href": "https://www.zotero.org/tanyarep",
                        "type": "text/html"
                    }
                }
            },
            "creatorSummary": "Charette",
            "numChildren": 0
        },
        "data": {
            "key": "6QKEI4UJ",
            "version": 1,
            "itemType": "journalArticle",
            "title": "Why Software Fails",
            "creators": [
                {
                    "creatorType": "author",
                    "firstName": "Robert N.",
                    "lastName": "Charette"
                }
            ],
            "abstractNote": "",
            "publicationTitle": "",
            "publisher": "",
            "place": "",
            "date": "",
            "volume": "",
            "issue": "",
            "section": "",
            "partNumber": "",
            "partTitle": "",
            "pages": "1/20/2010",
            "series": "",
            "seriesTitle": "",
            "seriesText": "",
            "journalAbbreviation": "",
            "DOI": "",
            "citationKey": "",
            "url": "",
            "accessDate": "",
            "PMID": "",
            "PMCID": "",
            "ISSN": "",
            "archive": "",
            "archiveLocation": "",
            "shortTitle": "",
            "language": "",
            "libraryCatalog": "",
            "callNumber": "0175",
            "rights": "",
            "extra": "",
            "tags": [],
            "collections": [],
            "relations": {},
            "dateAdded": "2011-05-20T14:24:28Z",
            "dateModified": "2012-08-15T22:47:24Z"
        }
    },
    {
        "key": "6IB855P8",
        "version": 1,
        "library": {
            "type": "group",
            "id": 43831,
            "name": "History of Information Security",
            "links": {
                "alternate": {
                    "href": "https://www.zotero.org/groups/history_of_information_security",
                    "type": "text/html"
                }
            }
        },
        "links": {
            "self": {
                "href": "https://api.zotero.org/groups/43831/items/6IB855P8",
                "type": "application/json"
            },
            "alternate": {
                "href": "https://www.zotero.org/groups/history_of_information_security/items/6IB855P8",
                "type": "text/html"
            }
        },
        "meta": {
            "createdByUser": {
                "id": 571941,
                "username": "tanyarep",
                "name": "Tanya Replogle",
                "links": {
                    "alternate": {
                        "href": "https://www.zotero.org/tanyarep",
                        "type": "text/html"
                    }
                }
            },
            "creatorSummary": "Swiderski",
            "parsedDate": "2004",
            "numChildren": 0
        },
        "data": {
            "key": "6IB855P8",
            "version": 1,
            "itemType": "book",
            "title": "Threat modeling",
            "creators": [
                {
                    "creatorType": "author",
                    "firstName": "Frank",
                    "lastName": "Swiderski"
                }
            ],
            "abstractNote": "",
            "series": "",
            "seriesNumber": "",
            "volume": "",
            "numberOfVolumes": "",
            "edition": "",
            "date": "2004",
            "publisher": "Microsoft Press",
            "place": "Redmond  Wash.",
            "originalDate": "",
            "originalPublisher": "",
            "originalPlace": "",
            "format": "",
            "numPages": "",
            "ISBN": "9780735619913",
            "DOI": "",
            "citationKey": "",
            "url": "",
            "accessDate": "",
            "ISSN": "",
            "archive": "",
            "archiveLocation": "",
            "shortTitle": "",
            "language": "",
            "libraryCatalog": "Open WorldCat",
            "callNumber": "0287",
            "rights": "",
            "extra": "",
            "tags": [],
            "collections": [],
            "relations": {},
            "dateAdded": "2011-05-20T07:35:27Z",
            "dateModified": "2012-08-15T22:47:23Z"
        }
    },
    {
        "key": "6BPHPA5T",
        "version": 1,
        "library": {
            "type": "group",
            "id": 43831,
            "name": "History of Information Security",
            "links": {
                "alternate": {
                    "href": "https://www.zotero.org/groups/history_of_information_security",
                    "type": "text/html"
                }
            }
        },
        "links": {
            "self": {
                "href": "https://api.zotero.org/groups/43831/items/6BPHPA5T",
                "type": "application/json"
            },
            "alternate": {
                "href": "https://www.zotero.org/groups/history_of_information_security/items/6BPHPA5T",
                "type": "text/html"
            }
        },
        "meta": {
            "createdByUser": {
                "id": 571941,
                "username": "tanyarep",
                "name": "Tanya Replogle",
                "links": {
                    "alternate": {
                        "href": "https://www.zotero.org/tanyarep",
                        "type": "text/html"
                    }
                }
            },
            "creatorSummary": "Dean",
            "parsedDate": "2001-02",
            "numChildren": 0
        },
        "data": {
            "key": "6BPHPA5T",
            "version": 1,
            "itemType": "document",
            "title": "An Analysis of Technical Observations in Insider Theft of Intellectual Property Cases",
            "creators": [
                {
                    "creatorType": "author",
                    "firstName": "Tylor",
                    "lastName": "Dean"
                }
            ],
            "abstractNote": "",
            "type": "",
            "date": "February 2001",
            "publisher": "",
            "place": "",
            "DOI": "",
            "citationKey": "",
            "url": "",
            "accessDate": "",
            "archive": "CMU/SEI-2011-TN-008",
            "archiveLocation": "CMU/SEI-2011-TN-008",
            "shortTitle": "",
            "language": "",
            "libraryCatalog": "CMU/SEI",
            "callNumber": "0000",
            "rights": "",
            "extra": "",
            "tags": [],
            "collections": [],
            "relations": {},
            "dateAdded": "2011-04-22T16:47:41Z",
            "dateModified": "2012-08-15T22:47:22Z"
        }
    },
    {
        "key": "4RWRX9N3",
        "version": 1,
        "library": {
            "type": "group",
            "id": 43831,
            "name": "History of Information Security",
            "links": {
                "alternate": {
                    "href": "https://www.zotero.org/groups/history_of_information_security",
                    "type": "text/html"
                }
            }
        },
        "links": {
            "self": {
                "href": "https://api.zotero.org/groups/43831/items/4RWRX9N3",
                "type": "application/json"
            },
            "alternate": {
                "href": "https://www.zotero.org/groups/history_of_information_security/items/4RWRX9N3",
                "type": "text/html"
            }
        },
        "meta": {
            "createdByUser": {
                "id": 571941,
                "username": "tanyarep",
                "name": "Tanya Replogle",
                "links": {
                    "alternate": {
                        "href": "https://www.zotero.org/tanyarep",
                        "type": "text/html"
                    }
                }
            },
            "creatorSummary": "Smith",
            "parsedDate": "2002",
            "numChildren": 0
        },
        "data": {
            "key": "4RWRX9N3",
            "version": 1,
            "itemType": "book",
            "title": "Authentication : from passwords to public keys",
            "creators": [
                {
                    "creatorType": "author",
                    "firstName": "Richard",
                    "lastName": "Smith"
                }
            ],
            "abstractNote": "",
            "series": "",
            "seriesNumber": "",
            "volume": "",
            "numberOfVolumes": "",
            "edition": "",
            "date": "2002",
            "publisher": "Addison-Wesley",
            "place": "Boston",
            "originalDate": "",
            "originalPublisher": "",
            "originalPlace": "",
            "format": "",
            "numPages": "",
            "ISBN": "9780201615999",
            "DOI": "",
            "citationKey": "",
            "url": "",
            "accessDate": "",
            "ISSN": "",
            "archive": "",
            "archiveLocation": "",
            "shortTitle": "Authentication",
            "language": "",
            "libraryCatalog": "Open WorldCat",
            "callNumber": "0167",
            "rights": "",
            "extra": "",
            "tags": [],
            "collections": [],
            "relations": {},
            "dateAdded": "2011-04-22T03:18:41Z",
            "dateModified": "2012-08-15T22:47:21Z"
        }
    },
    {
        "key": "4B4FC5T7",
        "version": 1,
        "library": {
            "type": "group",
            "id": 43831,
            "name": "History of Information Security",
            "links": {
                "alternate": {
                    "href": "https://www.zotero.org/groups/history_of_information_security",
                    "type": "text/html"
                }
            }
        },
        "links": {
            "self": {
                "href": "https://api.zotero.org/groups/43831/items/4B4FC5T7",
                "type": "application/json"
            },
            "alternate": {
                "href": "https://www.zotero.org/groups/history_of_information_security/items/4B4FC5T7",
                "type": "text/html"
            }
        },
        "meta": {
            "createdByUser": {
                "id": 571941,
                "username": "tanyarep",
                "name": "Tanya Replogle",
                "links": {
                    "alternate": {
                        "href": "https://www.zotero.org/tanyarep",
                        "type": "text/html"
                    }
                }
            },
            "creatorSummary": "Microsoft",
            "parsedDate": "2009-12",
            "numChildren": 0
        },
        "data": {
            "key": "4B4FC5T7",
            "version": 1,
            "itemType": "journalArticle",
            "title": "Microsoft Security Intelligence Report",
            "creators": [
                {
                    "creatorType": "author",
                    "firstName": "",
                    "lastName": "Microsoft"
                }
            ],
            "abstractNote": "DataLossDB has been maintained by the Open Security Foundation (OSF) (http://www.opensecurityFoundation.org)",
            "publicationTitle": "",
            "publisher": "",
            "place": "",
            "date": "December 2009",
            "volume": "Vol. 8",
            "issue": "",
            "section": "",
            "partNumber": "",
            "partTitle": "",
            "pages": "",
            "series": "",
            "seriesTitle": "",
            "seriesText": "",
            "journalAbbreviation": "",
            "DOI": "",
            "citationKey": "",
            "url": "http://www.scribd.com/doc/54642571/17/Security-Breach-Trends",
            "accessDate": "2011-05-20T09:06:30Z",
            "PMID": "",
            "PMCID": "",
            "ISSN": "",
            "archive": "",
            "archiveLocation": "",
            "shortTitle": "",
            "language": "",
            "libraryCatalog": "",
            "callNumber": "0000",
            "rights": "",
            "extra": "",
            "tags": [],
            "collections": [],
            "relations": {},
            "dateAdded": "2011-05-20T09:06:30Z",
            "dateModified": "2012-08-15T22:47:20Z"
        }
    },
    {
        "key": "2IGW47S3",
        "version": 1,
        "library": {
            "type": "group",
            "id": 43831,
            "name": "History of Information Security",
            "links": {
                "alternate": {
                    "href": "https://www.zotero.org/groups/history_of_information_security",
                    "type": "text/html"
                }
            }
        },
        "links": {
            "self": {
                "href": "https://api.zotero.org/groups/43831/items/2IGW47S3",
                "type": "application/json"
            },
            "alternate": {
                "href": "https://www.zotero.org/groups/history_of_information_security/items/2IGW47S3",
                "type": "text/html"
            }
        },
        "meta": {
            "createdByUser": {
                "id": 571941,
                "username": "tanyarep",
                "name": "Tanya Replogle",
                "links": {
                    "alternate": {
                        "href": "https://www.zotero.org/tanyarep",
                        "type": "text/html"
                    }
                }
            },
            "creatorSummary": "Fagan",
            "parsedDate": "1976-04-06",
            "numChildren": 0
        },
        "data": {
            "key": "2IGW47S3",
            "version": 1,
            "itemType": "journalArticle",
            "title": "Design and code inspections to reduce errors in program development",
            "creators": [
                {
                    "creatorType": "author",
                    "firstName": "M. E.",
                    "lastName": "Fagan"
                }
            ],
            "abstractNote": "",
            "publicationTitle": "IBM Systems Journal",
            "publisher": "",
            "place": "",
            "date": "1976 & date of current version 6 april 2010",
            "volume": "15",
            "issue": "3",
            "section": "",
            "partNumber": "",
            "partTitle": "",
            "pages": "182-211",
            "series": "",
            "seriesTitle": "",
            "seriesText": "",
            "journalAbbreviation": "IBM Syst. J.",
            "DOI": "10.1147/sj.153.0182",
            "citationKey": "",
            "url": "http://ieeexplore.ieee.org/lpdocs/epic03/wrapper.htm?arnumber=5388086",
            "accessDate": "2011-05-20T13:56:21Z",
            "PMID": "",
            "PMCID": "",
            "ISSN": "0018-8670",
            "archive": "",
            "archiveLocation": "",
            "shortTitle": "",
            "language": "",
            "libraryCatalog": "CrossRef",
            "callNumber": "1525",
            "rights": "",
            "extra": "",
            "tags": [],
            "collections": [],
            "relations": {},
            "dateAdded": "2011-05-20T13:56:21Z",
            "dateModified": "2012-08-15T22:47:19Z"
        }
    },
    {
        "key": "2ECIQTMZ",
        "version": 1,
        "library": {
            "type": "group",
            "id": 43831,
            "name": "History of Information Security",
            "links": {
                "alternate": {
                    "href": "https://www.zotero.org/groups/history_of_information_security",
                    "type": "text/html"
                }
            }
        },
        "links": {
            "self": {
                "href": "https://api.zotero.org/groups/43831/items/2ECIQTMZ",
                "type": "application/json"
            },
            "alternate": {
                "href": "https://www.zotero.org/groups/history_of_information_security/items/2ECIQTMZ",
                "type": "text/html"
            }
        },
        "meta": {
            "createdByUser": {
                "id": 571941,
                "username": "tanyarep",
                "name": "Tanya Replogle",
                "links": {
                    "alternate": {
                        "href": "https://www.zotero.org/tanyarep",
                        "type": "text/html"
                    }
                }
            },
            "creatorSummary": "Mineta",
            "parsedDate": "2000-10",
            "numChildren": 0
        },
        "data": {
            "key": "2ECIQTMZ",
            "version": 1,
            "itemType": "magazineArticle",
            "title": "Falling Through the Net:  Toward Digital Inclusion.",
            "creators": [
                {
                    "creatorType": "author",
                    "firstName": "Norman",
                    "lastName": "Mineta"
                }
            ],
            "abstractNote": "Economic and Statistics Administration\nNational Telecommunications and Information Administration",
            "publicationTitle": "U.S. Department of Commerce, Economic and Statistics Administration National Telecommunications and Information Administration",
            "publisher": "",
            "place": "",
            "date": "October, 2000",
            "volume": "",
            "issue": "",
            "pages": "",
            "ISSN": "",
            "DOI": "",
            "citationKey": "",
            "url": "",
            "accessDate": "",
            "archive": "",
            "archiveLocation": "",
            "shortTitle": "",
            "language": "",
            "libraryCatalog": "",
            "callNumber": "0008",
            "rights": "",
            "extra": "",
            "tags": [],
            "collections": [],
            "relations": {},
            "dateAdded": "2011-05-20T01:48:49Z",
            "dateModified": "2012-08-15T22:47:18Z"
        }
    },
    {
        "key": "ATTDFFED",
        "version": 1,
        "library": {
            "type": "group",
            "id": 43831,
            "name": "History of Information Security",
            "links": {
                "alternate": {
                    "href": "https://www.zotero.org/groups/history_of_information_security",
                    "type": "text/html"
                }
            }
        },
        "links": {
            "self": {
                "href": "https://api.zotero.org/groups/43831/items/ATTDFFED",
                "type": "application/json"
            },
            "alternate": {
                "href": "https://www.zotero.org/groups/history_of_information_security/items/ATTDFFED",
                "type": "text/html"
            }
        },
        "meta": {
            "createdByUser": {
                "id": 571941,
                "username": "tanyarep",
                "name": "Tanya Replogle",
                "links": {
                    "alternate": {
                        "href": "https://www.zotero.org/tanyarep",
                        "type": "text/html"
                    }
                }
            },
            "creatorSummary": "Hitachi",
            "numChildren": 0
        },
        "data": {
            "key": "ATTDFFED",
            "version": 1,
            "itemType": "webpage",
            "title": "Technical Security vs. Usability - Hitachi ID Systems",
            "creators": [
                {
                    "creatorType": "author",
                    "firstName": "",
                    "lastName": "Hitachi"
                }
            ],
            "abstractNote": "",
            "websiteTitle": "",
            "websiteType": "",
            "date": "",
            "publisher": "",
            "place": "",
            "DOI": "",
            "citationKey": "",
            "url": "http://hitachi-id.com/password-manager/security/security-vs-usability.html",
            "accessDate": "2011-05-20T02:34:29Z",
            "shortTitle": "",
            "language": "",
            "rights": "",
            "extra": "",
            "tags": [],
            "collections": [],
            "relations": {},
            "dateAdded": "2011-05-20T02:34:29Z",
            "dateModified": "2012-01-21T04:40:13Z"
        }
    },
    {
        "key": "M9X4FBIP",
        "version": 1,
        "library": {
            "type": "group",
            "id": 43831,
            "name": "History of Information Security",
            "links": {
                "alternate": {
                    "href": "https://www.zotero.org/groups/history_of_information_security",
                    "type": "text/html"
                }
            }
        },
        "links": {
            "self": {
                "href": "https://api.zotero.org/groups/43831/items/M9X4FBIP",
                "type": "application/json"
            },
            "alternate": {
                "href": "https://www.zotero.org/groups/history_of_information_security/items/M9X4FBIP",
                "type": "text/html"
            }
        },
        "meta": {
            "createdByUser": {
                "id": 571941,
                "username": "tanyarep",
                "name": "Tanya Replogle",
                "links": {
                    "alternate": {
                        "href": "https://www.zotero.org/tanyarep",
                        "type": "text/html"
                    }
                }
            },
            "creatorSummary": "Saitta",
            "parsedDate": "2005-07-13",
            "numChildren": 0
        },
        "data": {
            "key": "M9X4FBIP",
            "version": 1,
            "itemType": "magazineArticle",
            "title": "Trike v.1 Methodology Document",
            "creators": [
                {
                    "creatorType": "author",
                    "firstName": "Paul",
                    "lastName": "Saitta"
                }
            ],
            "abstractNote": "Trike is a unified conceptual framework for security auditing\nfrom a risk management perspective through the generation\nof threat models in a reliable, repeatable manner. A secu-\nrity auditing team can use it to completely and accurately\ndescribe the security characteristics of a system from its high-\nlevel architecture to its low-level implementation details. Trike\nalso enables communication among security team members and\nbetween security teams and other stakeholders by providing a\nconsistent conceptual framework. This document describes the\ncurrent version of the methodology (currently under heavy de-\nvelopment) in sufficient detail to allow its use. In addition to\ndetail on the threat model itself (including automatic threat\ngeneration and attack graphs), we cover the two models used\nin its generation, namely the requirements model and the im-\nplementation model, along with notes on risk analysis and\nwork flows. The final version of this paper will include a fully\nworked example for the entire process. Trike is distinguished\nfrom other threat modeling methodologies by the high levels\nof automation possible within the system, the defensive per-\nspective of the system, and the degree of formalism present in\nthe methodology. Portions of this methodology are currently\nexperimental; as they have not been fully tested against real\nsystems, care should be exercised when using them.\nThe methodology described in this document is copy-\nright 2003-2005 Paul Saitta, Brenda Larcom, and Michael\nEddington, excluding those covered under other copy-\nrights, and the whole may be used under the MIT li-\ncense (http://www.opensource.org/licenses/mit-license.\nphp), “software” being replaced with “methodology” through-\nout. This document is published under the Creative Commons\nattribution-noncommercial-sharealike 2.0 license (http://\ncreativecommons.org/licenses/by-nc-sa/2.0/legalcode).",
            "publicationTitle": "",
            "publisher": "",
            "place": "",
            "date": "July 13, 2005",
            "volume": "",
            "issue": "",
            "pages": "",
            "ISSN": "",
            "DOI": "",
            "citationKey": "",
            "url": "",
            "accessDate": "",
            "archive": "",
            "archiveLocation": "",
            "shortTitle": "",
            "language": "",
            "libraryCatalog": "",
            "callNumber": "",
            "rights": "",
            "extra": "",
            "tags": [],
            "collections": [],
            "relations": {},
            "dateAdded": "2011-05-20T11:19:47Z",
            "dateModified": "2011-05-20T11:20:34Z"
        }
    },
    {
        "key": "H4IPSDPD",
        "version": 1,
        "library": {
            "type": "group",
            "id": 43831,
            "name": "History of Information Security",
            "links": {
                "alternate": {
                    "href": "https://www.zotero.org/groups/history_of_information_security",
                    "type": "text/html"
                }
            }
        },
        "links": {
            "self": {
                "href": "https://api.zotero.org/groups/43831/items/H4IPSDPD",
                "type": "application/json"
            },
            "alternate": {
                "href": "https://www.zotero.org/groups/history_of_information_security/items/H4IPSDPD",
                "type": "text/html"
            }
        },
        "meta": {
            "createdByUser": {
                "id": 571941,
                "username": "tanyarep",
                "name": "Tanya Replogle",
                "links": {
                    "alternate": {
                        "href": "https://www.zotero.org/tanyarep",
                        "type": "text/html"
                    }
                }
            },
            "creatorSummary": "Microsoft Corporation.",
            "parsedDate": "2010-06",
            "numChildren": 0
        },
        "data": {
            "key": "H4IPSDPD",
            "version": 1,
            "itemType": "webpage",
            "title": "Download details: Essential Software Security Training for the Microsoft SDL",
            "creators": [
                {
                    "creatorType": "author",
                    "firstName": "",
                    "lastName": "Microsoft Corporation."
                }
            ],
            "abstractNote": "",
            "websiteTitle": "",
            "websiteType": "",
            "date": "June 2010",
            "publisher": "",
            "place": "",
            "DOI": "",
            "citationKey": "",
            "url": "http://www.microsoft.com/downloads/en/details.aspx?FamilyID=BE75EFEC-07BB-4F48-893A-63C306D3E8D8",
            "accessDate": "2011-05-20T07:48:16Z",
            "shortTitle": "",
            "language": "",
            "rights": "",
            "extra": "",
            "tags": [],
            "collections": [],
            "relations": {},
            "dateAdded": "2011-05-20T07:48:16Z",
            "dateModified": "2011-05-20T07:48:57Z"
        }
    },
    {
        "key": "7KS9U97A",
        "version": 1,
        "library": {
            "type": "group",
            "id": 43831,
            "name": "History of Information Security",
            "links": {
                "alternate": {
                    "href": "https://www.zotero.org/groups/history_of_information_security",
                    "type": "text/html"
                }
            }
        },
        "links": {
            "self": {
                "href": "https://api.zotero.org/groups/43831/items/7KS9U97A",
                "type": "application/json"
            },
            "alternate": {
                "href": "https://www.zotero.org/groups/history_of_information_security/items/7KS9U97A",
                "type": "text/html"
            }
        },
        "meta": {
            "createdByUser": {
                "id": 571941,
                "username": "tanyarep",
                "name": "Tanya Replogle",
                "links": {
                    "alternate": {
                        "href": "https://www.zotero.org/tanyarep",
                        "type": "text/html"
                    }
                }
            },
            "creatorSummary": "Mitre",
            "parsedDate": "2011",
            "numChildren": 0
        },
        "data": {
            "key": "7KS9U97A",
            "version": 1,
            "itemType": "webpage",
            "title": "CVE - Common Vulnerabilities and Exposures (CVE)",
            "creators": [
                {
                    "creatorType": "author",
                    "firstName": "",
                    "lastName": "Mitre"
                }
            ],
            "abstractNote": "",
            "websiteTitle": "",
            "websiteType": "",
            "date": "2011",
            "publisher": "",
            "place": "",
            "DOI": "",
            "citationKey": "",
            "url": "http://cve.mitre.org/",
            "accessDate": "2011-05-20T07:45:05Z",
            "shortTitle": "",
            "language": "",
            "rights": "",
            "extra": "",
            "tags": [],
            "collections": [],
            "relations": {},
            "dateAdded": "2011-05-20T07:45:05Z",
            "dateModified": "2011-05-20T07:45:23Z"
        }
    },
    {
        "key": "X9QGZA73",
        "version": 1,
        "library": {
            "type": "group",
            "id": 43831,
            "name": "History of Information Security",
            "links": {
                "alternate": {
                    "href": "https://www.zotero.org/groups/history_of_information_security",
                    "type": "text/html"
                }
            }
        },
        "links": {
            "self": {
                "href": "https://api.zotero.org/groups/43831/items/X9QGZA73",
                "type": "application/json"
            },
            "alternate": {
                "href": "https://www.zotero.org/groups/history_of_information_security/items/X9QGZA73",
                "type": "text/html"
            }
        },
        "meta": {
            "createdByUser": {
                "id": 571941,
                "username": "tanyarep",
                "name": "Tanya Replogle",
                "links": {
                    "alternate": {
                        "href": "https://www.zotero.org/tanyarep",
                        "type": "text/html"
                    }
                }
            },
            "creatorSummary": "Robertson",
            "parsedDate": "2011-04",
            "numChildren": 0
        },
        "data": {
            "key": "X9QGZA73",
            "version": 1,
            "itemType": "magazineArticle",
            "title": "Banks, Credit-Card Issuers Warn of Security Breach",
            "creators": [
                {
                    "creatorType": "author",
                    "firstName": "Jordan",
                    "lastName": "Robertson"
                }
            ],
            "abstractNote": "",
            "publicationTitle": "",
            "publisher": "",
            "place": "",
            "date": "April 2011",
            "volume": "",
            "issue": "",
            "pages": "",
            "ISSN": "",
            "DOI": "",
            "citationKey": "",
            "url": "",
            "accessDate": "",
            "archive": "",
            "archiveLocation": "",
            "shortTitle": "",
            "language": "",
            "libraryCatalog": "",
            "callNumber": "",
            "rights": "",
            "extra": "",
            "tags": [],
            "collections": [],
            "relations": {},
            "dateAdded": "2011-05-20T05:17:04Z",
            "dateModified": "2011-05-20T05:18:14Z"
        }
    },
    {
        "key": "J7AZIE24",
        "version": 1,
        "library": {
            "type": "group",
            "id": 43831,
            "name": "History of Information Security",
            "links": {
                "alternate": {
                    "href": "https://www.zotero.org/groups/history_of_information_security",
                    "type": "text/html"
                }
            }
        },
        "links": {
            "self": {
                "href": "https://api.zotero.org/groups/43831/items/J7AZIE24",
                "type": "application/json"
            },
            "alternate": {
                "href": "https://www.zotero.org/groups/history_of_information_security/items/J7AZIE24",
                "type": "text/html"
            }
        },
        "meta": {
            "createdByUser": {
                "id": 571941,
                "username": "tanyarep",
                "name": "Tanya Replogle",
                "links": {
                    "alternate": {
                        "href": "https://www.zotero.org/tanyarep",
                        "type": "text/html"
                    }
                }
            },
            "creatorSummary": "Cluley",
            "parsedDate": "2011-05-19",
            "numChildren": 0
        },
        "data": {
            "key": "J7AZIE24",
            "version": 1,
            "itemType": "webpage",
            "title": "TinKode hacks into NASA servers, posts evidence of breach online | Naked Security",
            "creators": [
                {
                    "creatorType": "author",
                    "firstName": "Graham",
                    "lastName": "Cluley"
                }
            ],
            "abstractNote": "",
            "websiteTitle": "",
            "websiteType": "",
            "date": "May 19, 2011",
            "publisher": "",
            "place": "",
            "DOI": "",
            "citationKey": "",
            "url": "http://nakedsecurity.sophos.com/2011/05/19/tinkode-hacks-into-nasa-servers-posts-evidence-of-breach-online/",
            "accessDate": "2011-05-20T04:08:12Z",
            "shortTitle": "",
            "language": "",
            "rights": "",
            "extra": "",
            "tags": [],
            "collections": [],
            "relations": {},
            "dateAdded": "2011-05-20T04:08:12Z",
            "dateModified": "2011-05-20T04:08:47Z"
        }
    },
    {
        "key": "VCDTMNX6",
        "version": 1,
        "library": {
            "type": "group",
            "id": 43831,
            "name": "History of Information Security",
            "links": {
                "alternate": {
                    "href": "https://www.zotero.org/groups/history_of_information_security",
                    "type": "text/html"
                }
            }
        },
        "links": {
            "self": {
                "href": "https://api.zotero.org/groups/43831/items/VCDTMNX6",
                "type": "application/json"
            },
            "alternate": {
                "href": "https://www.zotero.org/groups/history_of_information_security/items/VCDTMNX6",
                "type": "text/html"
            }
        },
        "meta": {
            "createdByUser": {
                "id": 571941,
                "username": "tanyarep",
                "name": "Tanya Replogle",
                "links": {
                    "alternate": {
                        "href": "https://www.zotero.org/tanyarep",
                        "type": "text/html"
                    }
                }
            },
            "creatorSummary": "Murphy",
            "parsedDate": "2003-05",
            "numChildren": 0
        },
        "data": {
            "key": "VCDTMNX6",
            "version": 1,
            "itemType": "journalArticle",
            "title": "Bridging the Valley of Death:\nTransitioning from Public to\nPrivate Sector Financing",
            "creators": [
                {
                    "creatorType": "author",
                    "firstName": "L.M.",
                    "lastName": "Murphy"
                }
            ],
            "abstractNote": "Technology innovation has been strongly stimulated by federal financing for more than 50\nyears. In fact, public investment often guides or directs private sector investment to areas of the\npublic good – such as clean energy technologies. The U.S. Department of Energy (DOE), along\nwith its National Renewable Energy Laboratory (NREL), have made remarkable technological\nadvancements, efficiency improvements and cost reductions in a spectrum of clean energy\ntechnologies, with the expectation that industry would move emerging technologies into the\nmarketplace. Thus the public good benefits resulting from the advancement of science and\ntechnology in terms of energy diversity, security and environmental protection would also\naccrue. These achievements notwithstanding, nothing near a revolution in how we use energy\nhas occurred.\nInstead what we see is a new generation of clean energy entrepreneurial firms finding it very\ndifficult to make the leap from public sector financing to private sector funding for their\ninnovations. Without new capital, many of our nation’s most promising energy entrepreneurs\nwill fail. According to a recent study by Gompers and Lerner (2001, pp 21, 28), “…. ninety\npercent of new entrepreneurial ventures that don’t attract venture capital will fail within the first\nthree years.” It is often assumed that when a company fails to commercialize a world-class\ntechnology the investment community is to blame for lack of vision or greed. In reality, ventures\nfail to obtain funding because there are significant gaps between what the ventures are offering\nto investors and what the potential investors are seeking.\nThis paper focuses on the difficulties in the hand-off to private sector investors of publicly\nfunded, early stage technology investment opportunities in entrepreneurial ventures. In\nparticular it explores the financing disconnects between public sector and private sector\ninvestors using three perspectives:\n1. Divergence of public and private sector values, requirements, and goals\n2. The cash flow “valley of death,” and\n3. Private sector perspectives on risk\nEach of these perspectives illuminates the nature of the problem in a slightly different manner;\nhowever, from these different lenses several common themes emerge that point to a set of\nremedies that are both straightforward and powerful. These remedies are:\n1. Reduce information gaps or asymmetries between the two sectors\n2. Foster an accelerated shift from a technology to a market focus\n3. Explore and develop novel co-investment partnerships with the private sector\nAs this paper indicates, DOE and NREL have begun to apply these remedies through NREL’s\nEnterprise Development Programs by building linkages between public and private sector\ninvestors. Many other opportunities further expand and apply these remedies exist.",
            "publicationTitle": "National Renewable Energy Laboratory",
            "publisher": "",
            "place": "",
            "date": "May 2003",
            "volume": "",
            "issue": "",
            "section": "",
            "partNumber": "",
            "partTitle": "",
            "pages": "",
            "series": "",
            "seriesTitle": "",
            "seriesText": "",
            "journalAbbreviation": "",
            "DOI": "",
            "citationKey": "",
            "url": "",
            "accessDate": "",
            "PMID": "",
            "PMCID": "",
            "ISSN": "",
            "archive": "",
            "archiveLocation": "",
            "shortTitle": "",
            "language": "",
            "libraryCatalog": "",
            "callNumber": "",
            "rights": "",
            "extra": "",
            "tags": [],
            "collections": [],
            "relations": {},
            "dateAdded": "2011-05-20T03:53:17Z",
            "dateModified": "2011-05-20T03:55:36Z"
        }
    },
    {
        "key": "NW6496WD",
        "version": 1,
        "library": {
            "type": "group",
            "id": 43831,
            "name": "History of Information Security",
            "links": {
                "alternate": {
                    "href": "https://www.zotero.org/groups/history_of_information_security",
                    "type": "text/html"
                }
            }
        },
        "links": {
            "self": {
                "href": "https://api.zotero.org/groups/43831/items/NW6496WD",
                "type": "application/json"
            },
            "alternate": {
                "href": "https://www.zotero.org/groups/history_of_information_security/items/NW6496WD",
                "type": "text/html"
            }
        },
        "meta": {
            "createdByUser": {
                "id": 571941,
                "username": "tanyarep",
                "name": "Tanya Replogle",
                "links": {
                    "alternate": {
                        "href": "https://www.zotero.org/tanyarep",
                        "type": "text/html"
                    }
                }
            },
            "creatorSummary": "Srivastava",
            "numChildren": 0
        },
        "data": {
            "key": "NW6496WD",
            "version": 1,
            "itemType": "journalArticle",
            "title": "Internaltional Journal of Technology Transfer and Commercialisation IJTTC:  Technology Transfer from Public to Private Sector",
            "creators": [
                {
                    "creatorType": "author",
                    "firstName": "Rajesh",
                    "lastName": "Srivastava"
                }
            ],
            "abstractNote": "In recent decades, research and development of technology in the public sector has led to several new and innovative technology applications in the private sector. The transfer of technology from the space programme and military research and development into the private sector has yielded many technological innovations in industries such as healthcare, transportation, safety, and athletic equipment. This technology transfer has also fostered job growth and the creation and growth of companies.\n\nHowever, how this transfer occurs is not always well understood or documented. Technological innovations that might have promising applications in the private sector often fail to get transferred. There could be several reasons for this failure. Often, knowledge about the technology is not disseminated well, so there is a lack of awareness regarding the technology. In other instances, the failure occurs at the incubation stage, because of lack of support. Yet again, in some instances, there are no effective channels for the technology transfer.\n\nThe goal of this special issue is to focus on the transfer of technology from the public sector (e.g., government) to the private sector. The existence of effective channels and models of technology transfer in this environment would greatly accelerate the application of several leading edge technologies.\n\n Go Top  Subject Coverage\n\nWe seek contributions which include, but are not limited to, the following topics:\n\n    * Models for public to private sector technology transfer\n    * Best practices for public to private sector technology transfer\n    * Licensing issues\n    * Incubation issues and startup formation\n    * Partnership between government and private sector\n    * Marketing of public sector technology\n    * Cooperative research and development\n    * Dual-use technology\n    * Legislation and technology transfer\n    * Support for small business and entrepreneurial ventures\n    * Case studies in government to private sector technology transfer\n    * Patents and royalties\n    * Confidentiality agreements\n    * Limits on transfer of specific technologies\n    * Benefits to the government from technology transfer",
            "publicationTitle": "",
            "publisher": "",
            "place": "",
            "date": "",
            "volume": "",
            "issue": "",
            "section": "",
            "partNumber": "",
            "partTitle": "",
            "pages": "",
            "series": "",
            "seriesTitle": "",
            "seriesText": "",
            "journalAbbreviation": "",
            "DOI": "",
            "citationKey": "",
            "url": "",
            "accessDate": "",
            "PMID": "",
            "PMCID": "",
            "ISSN": "",
            "archive": "",
            "archiveLocation": "",
            "shortTitle": "",
            "language": "",
            "libraryCatalog": "",
            "callNumber": "",
            "rights": "",
            "extra": "",
            "tags": [],
            "collections": [],
            "relations": {},
            "dateAdded": "2011-05-20T03:50:53Z",
            "dateModified": "2011-05-20T03:52:07Z"
        }
    },
    {
        "key": "U6D2IACN",
        "version": 1,
        "library": {
            "type": "group",
            "id": 43831,
            "name": "History of Information Security",
            "links": {
                "alternate": {
                    "href": "https://www.zotero.org/groups/history_of_information_security",
                    "type": "text/html"
                }
            }
        },
        "links": {
            "self": {
                "href": "https://api.zotero.org/groups/43831/items/U6D2IACN",
                "type": "application/json"
            },
            "alternate": {
                "href": "https://www.zotero.org/groups/history_of_information_security/items/U6D2IACN",
                "type": "text/html"
            }
        },
        "meta": {
            "createdByUser": {
                "id": 571941,
                "username": "tanyarep",
                "name": "Tanya Replogle",
                "links": {
                    "alternate": {
                        "href": "https://www.zotero.org/tanyarep",
                        "type": "text/html"
                    }
                }
            },
            "creatorSummary": "Enloe",
            "parsedDate": "2002-12",
            "numChildren": 0
        },
        "data": {
            "key": "U6D2IACN",
            "version": 1,
            "itemType": "document",
            "title": "Government System Certification; A guide to Government Security Mandates.",
            "creators": [
                {
                    "creatorType": "author",
                    "firstName": "Christian",
                    "lastName": "Enloe"
                }
            ],
            "abstractNote": "",
            "type": "",
            "date": "December 2002",
            "publisher": "",
            "place": "",
            "DOI": "",
            "citationKey": "",
            "url": "",
            "accessDate": "",
            "archive": "",
            "archiveLocation": "",
            "shortTitle": "",
            "language": "",
            "libraryCatalog": "",
            "callNumber": "",
            "rights": "",
            "extra": "",
            "tags": [],
            "collections": [],
            "relations": {},
            "dateAdded": "2011-05-20T02:45:17Z",
            "dateModified": "2011-05-20T02:46:59Z"
        }
    },
    {
        "key": "UMTAQPUF",
        "version": 1,
        "library": {
            "type": "group",
            "id": 43831,
            "name": "History of Information Security",
            "links": {
                "alternate": {
                    "href": "https://www.zotero.org/groups/history_of_information_security",
                    "type": "text/html"
                }
            }
        },
        "links": {
            "self": {
                "href": "https://api.zotero.org/groups/43831/items/UMTAQPUF",
                "type": "application/json"
            },
            "alternate": {
                "href": "https://www.zotero.org/groups/history_of_information_security/items/UMTAQPUF",
                "type": "text/html"
            }
        },
        "meta": {
            "createdByUser": {
                "id": 571941,
                "username": "tanyarep",
                "name": "Tanya Replogle",
                "links": {
                    "alternate": {
                        "href": "https://www.zotero.org/tanyarep",
                        "type": "text/html"
                    }
                }
            },
            "creatorSummary": "Lee",
            "parsedDate": "2010",
            "numChildren": 0
        },
        "data": {
            "key": "UMTAQPUF",
            "version": 1,
            "itemType": "journalArticle",
            "title": "Calculating the Costs: Email Threats and Financial Risks",
            "creators": [
                {
                    "creatorType": "author",
                    "firstName": "Martin",
                    "lastName": "Lee"
                }
            ],
            "abstractNote": "Executive Summary\nIt’s easy to fall victim to an email-borne security threat. On average, one email carrying an infected attachment or\ncontaining a link to an infected website hits every unprotected inbox every two days. Moreover, given the scale and\nsophistication of the threat posed by viruses, worms and Trojans, for example, vigilance alone can’t guarantee that an\nunprotected or poorly protected business will keep its PCs, networks and systems free from infection.\nWhen an incident occurs, it may be relatively minor with just a single machine affected. Or it may be much more serious,\nputting multiple systems out of use and involving the loss of confidential, high-value data. Whatever the precise nature\nand scale of the incident, the affected business will pick up an unwanted bill as a result of clean-up costs, lost productivity\nand, potentially, lost revenue, damaged reputation and reduced market capitalization.\nOverall, the cost of each minor incident will amount to around $140.1 But as they can occur many times a day, this could\nadd up to around $300,000 per business over the course of a typical year. Major incidents will cost considerably more –\nperhaps between $20,000 and $300,000 depending on the size of the business – and may occur once a year.2 Although\nrarer, the most severe incidents could end up delivering a bill that literally runs into millions.\nWhen deciding whether to invest in an email security solution – and which solution",
            "publicationTitle": "",
            "publisher": "",
            "place": "",
            "date": "2010",
            "volume": "",
            "issue": "",
            "section": "",
            "partNumber": "",
            "partTitle": "",
            "pages": "",
            "series": "",
            "seriesTitle": "",
            "seriesText": "",
            "journalAbbreviation": "",
            "DOI": "",
            "citationKey": "",
            "url": "",
            "accessDate": "",
            "PMID": "",
            "PMCID": "",
            "ISSN": "",
            "archive": "",
            "archiveLocation": "",
            "shortTitle": "",
            "language": "",
            "libraryCatalog": "",
            "callNumber": "",
            "rights": "",
            "extra": "",
            "tags": [],
            "collections": [],
            "relations": {},
            "dateAdded": "2011-05-20T02:40:43Z",
            "dateModified": "2011-05-20T02:42:55Z"
        }
    }
]