[
    {
        "key": "WPU2RXCJ",
        "version": 898,
        "library": {
            "type": "group",
            "id": 461739,
            "name": "Cyber Security Task Force",
            "links": {
                "alternate": {
                    "href": "https://www.zotero.org/groups/cyber_security_task_force",
                    "type": "text/html"
                }
            }
        },
        "links": {
            "self": {
                "href": "https://api.zotero.org/groups/461739/items/WPU2RXCJ",
                "type": "application/json"
            },
            "alternate": {
                "href": "https://www.zotero.org/groups/cyber_security_task_force/items/WPU2RXCJ",
                "type": "text/html"
            }
        },
        "meta": {
            "createdByUser": {
                "id": 2832397,
                "username": "hyeong.g.oh",
                "name": "",
                "links": {
                    "alternate": {
                        "href": "https://www.zotero.org/hyeong.g.oh",
                        "type": "text/html"
                    }
                }
            },
            "numChildren": 0
        },
        "data": {
            "key": "WPU2RXCJ",
            "version": 898,
            "itemType": "webpage",
            "title": "The FBI Is at War With Apple Because It Couldn’t Change Wiretap Law",
            "creators": [],
            "abstractNote": "When politicians talk about legislating encryption, what they’re really talking about is lawful surveillance.",
            "websiteTitle": "Motherboard",
            "websiteType": "",
            "date": "",
            "publisher": "",
            "place": "",
            "DOI": "",
            "citationKey": "",
            "url": "http://motherboard.vice.com/read/calea-my-old-friend",
            "accessDate": "2016-05-27T00:08:00Z",
            "shortTitle": "",
            "language": "",
            "rights": "",
            "extra": "",
            "tags": [],
            "collections": [
                "5NHTXH5T"
            ],
            "relations": {
                "owl:sameAs": "http://zotero.org/groups/514240/items/66SGGA59"
            },
            "dateAdded": "2016-05-31T06:03:17Z",
            "dateModified": "2016-05-31T06:03:17Z"
        }
    },
    {
        "key": "J8492HWE",
        "version": 891,
        "library": {
            "type": "group",
            "id": 461739,
            "name": "Cyber Security Task Force",
            "links": {
                "alternate": {
                    "href": "https://www.zotero.org/groups/cyber_security_task_force",
                    "type": "text/html"
                }
            }
        },
        "links": {
            "self": {
                "href": "https://api.zotero.org/groups/461739/items/J8492HWE",
                "type": "application/json"
            },
            "alternate": {
                "href": "https://www.zotero.org/groups/cyber_security_task_force/items/J8492HWE",
                "type": "text/html"
            }
        },
        "meta": {
            "createdByUser": {
                "id": 2844634,
                "username": "Smawgy",
                "name": "",
                "links": {
                    "alternate": {
                        "href": "https://www.zotero.org/smawgy",
                        "type": "text/html"
                    }
                }
            },
            "creatorSummary": "U.S. Congress, House of Representatives Commitee on Foreign Affairs",
            "parsedDate": "2015-09-30",
            "numChildren": 0
        },
        "data": {
            "key": "J8492HWE",
            "version": 891,
            "itemType": "document",
            "title": "CYBER WAR: DEFINITIONS, DETERRENCE, AND FOREIGN POLICY: HEARING BEFORE THE COMMITTEE ON FOREIGN AFFAIRS HOUSE OF REPRESENTATIVES ONE HUNDRED FOURTEENTH CONGRESS FIRST SESSION",
            "creators": [
                {
                    "creatorType": "author",
                    "name": "U.S. Congress, House of Representatives Commitee on Foreign Affairs"
                }
            ],
            "abstractNote": "",
            "type": "",
            "date": "September 30, 2015",
            "publisher": "U.S. Government Publishing Office",
            "place": "",
            "DOI": "",
            "citationKey": "",
            "url": "http://docs.house.gov/meetings/FA/FA00/20150930/104003/HHRG-114-FA00-Transcript-20150930.pdf.",
            "accessDate": "2016-02-28",
            "archive": "",
            "archiveLocation": "",
            "shortTitle": "CYBER WAR COMMITTEE HEARING",
            "language": "",
            "libraryCatalog": "",
            "callNumber": "",
            "rights": "",
            "extra": "Serial No. 114-106",
            "tags": [],
            "collections": [
                "RSHFZ4TK"
            ],
            "relations": {},
            "dateAdded": "2016-02-28T10:43:10Z",
            "dateModified": "2016-03-03T11:04:22Z"
        }
    },
    {
        "key": "MJD6GDQF",
        "version": 890,
        "library": {
            "type": "group",
            "id": 461739,
            "name": "Cyber Security Task Force",
            "links": {
                "alternate": {
                    "href": "https://www.zotero.org/groups/cyber_security_task_force",
                    "type": "text/html"
                }
            }
        },
        "links": {
            "self": {
                "href": "https://api.zotero.org/groups/461739/items/MJD6GDQF",
                "type": "application/json"
            },
            "alternate": {
                "href": "https://www.zotero.org/groups/cyber_security_task_force/items/MJD6GDQF",
                "type": "text/html"
            }
        },
        "meta": {
            "createdByUser": {
                "id": 2833216,
                "username": "penguinkai",
                "name": "",
                "links": {
                    "alternate": {
                        "href": "https://www.zotero.org/penguinkai",
                        "type": "text/html"
                    }
                }
            },
            "lastModifiedByUser": {
                "id": 2844634,
                "username": "Smawgy",
                "name": "",
                "links": {
                    "alternate": {
                        "href": "https://www.zotero.org/smawgy",
                        "type": "text/html"
                    }
                }
            },
            "creatorSummary": "Office of the Press Secretary",
            "parsedDate": "2013-06-17",
            "numChildren": 1
        },
        "data": {
            "key": "MJD6GDQF",
            "version": 890,
            "itemType": "report",
            "title": "FACT SHEET: U.S.-Russian Cooperation on Information and Communications Technology Security",
            "creators": [
                {
                    "creatorType": "author",
                    "firstName": "",
                    "lastName": "Office of the Press Secretary"
                }
            ],
            "abstractNote": "Overview of the agreements between the US and Russia on Cybersecurity",
            "reportNumber": "",
            "reportType": "Press Release",
            "institution": "Office of the Press Secretary",
            "place": "The White House",
            "date": "06/17/2013",
            "seriesTitle": "",
            "seriesNumber": "",
            "pages": "",
            "DOI": "",
            "ISBN": "",
            "citationKey": "",
            "url": "https://www.whitehouse.gov/the-press-office/2013/06/17/fact-sheet-us-russian-cooperation-information-and-communications-technol",
            "accessDate": "2016-01-20",
            "ISSN": "",
            "archive": "",
            "archiveLocation": "",
            "shortTitle": "Russian Cooperation on Tech Security",
            "language": "",
            "libraryCatalog": "",
            "callNumber": "",
            "rights": "",
            "extra": "",
            "tags": [],
            "collections": [
                "RSHFZ4TK",
                "T2HF2TMG"
            ],
            "relations": {},
            "dateAdded": "2016-01-20T22:33:30Z",
            "dateModified": "2016-03-03T10:50:12Z"
        }
    },
    {
        "key": "9STCD4RZ",
        "version": 888,
        "library": {
            "type": "group",
            "id": 461739,
            "name": "Cyber Security Task Force",
            "links": {
                "alternate": {
                    "href": "https://www.zotero.org/groups/cyber_security_task_force",
                    "type": "text/html"
                }
            }
        },
        "links": {
            "self": {
                "href": "https://api.zotero.org/groups/461739/items/9STCD4RZ",
                "type": "application/json"
            },
            "alternate": {
                "href": "https://www.zotero.org/groups/cyber_security_task_force/items/9STCD4RZ",
                "type": "text/html"
            }
        },
        "meta": {
            "createdByUser": {
                "id": 2844634,
                "username": "Smawgy",
                "name": "",
                "links": {
                    "alternate": {
                        "href": "https://www.zotero.org/smawgy",
                        "type": "text/html"
                    }
                }
            },
            "creatorSummary": "Glenn Greenwald",
            "parsedDate": "2013-06-06",
            "numChildren": 0
        },
        "data": {
            "key": "9STCD4RZ",
            "version": 888,
            "itemType": "newspaperArticle",
            "title": "NSA collecting phone records of millions of Verizon customers daily",
            "creators": [
                {
                    "creatorType": "author",
                    "name": "Glenn Greenwald"
                }
            ],
            "abstractNote": "",
            "publicationTitle": "THE GUARDIAN",
            "publisher": "",
            "place": "London",
            "date": "June 6, 2013",
            "volume": "",
            "issue": "",
            "edition": "US",
            "section": "",
            "pages": "",
            "ISSN": "0261-3077",
            "DOI": "",
            "citationKey": "",
            "url": "http://www.theguardian.com/world/2013/jun/06/nsa-phone-records-verizon-court-order",
            "accessDate": "2016-03-03",
            "archive": "",
            "archiveLocation": "",
            "shortTitle": "",
            "language": "",
            "libraryCatalog": "",
            "callNumber": "",
            "rights": "",
            "extra": "",
            "tags": [],
            "collections": [
                "RSHFZ4TK"
            ],
            "relations": {},
            "dateAdded": "2016-03-03T10:29:36Z",
            "dateModified": "2016-03-03T10:31:42Z"
        }
    },
    {
        "key": "P5NV6RKQ",
        "version": 883,
        "library": {
            "type": "group",
            "id": 461739,
            "name": "Cyber Security Task Force",
            "links": {
                "alternate": {
                    "href": "https://www.zotero.org/groups/cyber_security_task_force",
                    "type": "text/html"
                }
            }
        },
        "links": {
            "self": {
                "href": "https://api.zotero.org/groups/461739/items/P5NV6RKQ",
                "type": "application/json"
            },
            "alternate": {
                "href": "https://www.zotero.org/groups/cyber_security_task_force/items/P5NV6RKQ",
                "type": "text/html"
            }
        },
        "meta": {
            "createdByUser": {
                "id": 2848663,
                "username": "seohyunb",
                "name": "",
                "links": {
                    "alternate": {
                        "href": "https://www.zotero.org/seohyunb",
                        "type": "text/html"
                    }
                }
            },
            "lastModifiedByUser": {
                "id": 2844634,
                "username": "Smawgy",
                "name": "",
                "links": {
                    "alternate": {
                        "href": "https://www.zotero.org/smawgy",
                        "type": "text/html"
                    }
                }
            },
            "creatorSummary": "Schjølberg",
            "parsedDate": "2008",
            "numChildren": 0
        },
        "data": {
            "key": "P5NV6RKQ",
            "version": 883,
            "itemType": "document",
            "title": "ITU Global Cybersecurity Agenda (GCA) High-Level Experts Group (HLEG): Report of the Chairman of HLEG",
            "creators": [
                {
                    "creatorType": "author",
                    "firstName": "Stein",
                    "lastName": "Schjølberg"
                }
            ],
            "abstractNote": "",
            "type": "",
            "date": "2008",
            "publisher": "International Telecommunications Union",
            "place": "",
            "DOI": "",
            "citationKey": "",
            "url": "http://www.itu.int/en/action/cybersecurity/Documents/gca-chairman-report.pdf",
            "accessDate": "2016-02-19",
            "archive": "",
            "archiveLocation": "",
            "shortTitle": "ITU GCA Report of the Chairman of HLEG",
            "language": "English",
            "libraryCatalog": "",
            "callNumber": "",
            "rights": "",
            "extra": "",
            "tags": [],
            "collections": [],
            "relations": {},
            "dateAdded": "2016-02-20T01:39:09Z",
            "dateModified": "2016-03-03T10:22:41Z"
        }
    },
    {
        "key": "IRP3CRTP",
        "version": 882,
        "library": {
            "type": "group",
            "id": 461739,
            "name": "Cyber Security Task Force",
            "links": {
                "alternate": {
                    "href": "https://www.zotero.org/groups/cyber_security_task_force",
                    "type": "text/html"
                }
            }
        },
        "links": {
            "self": {
                "href": "https://api.zotero.org/groups/461739/items/IRP3CRTP",
                "type": "application/json"
            },
            "alternate": {
                "href": "https://www.zotero.org/groups/cyber_security_task_force/items/IRP3CRTP",
                "type": "text/html"
            }
        },
        "meta": {
            "createdByUser": {
                "id": 2848663,
                "username": "seohyunb",
                "name": "",
                "links": {
                    "alternate": {
                        "href": "https://www.zotero.org/seohyunb",
                        "type": "text/html"
                    }
                }
            },
            "lastModifiedByUser": {
                "id": 2844634,
                "username": "Smawgy",
                "name": "",
                "links": {
                    "alternate": {
                        "href": "https://www.zotero.org/smawgy",
                        "type": "text/html"
                    }
                }
            },
            "creatorSummary": "Wamala",
            "parsedDate": "2011-09",
            "numChildren": 0
        },
        "data": {
            "key": "IRP3CRTP",
            "version": 882,
            "itemType": "document",
            "title": "ITU National Cybersecurity Strategy Guide",
            "creators": [
                {
                    "creatorType": "author",
                    "firstName": "Frederick",
                    "lastName": "Wamala"
                }
            ],
            "abstractNote": "",
            "type": "",
            "date": "September 2011",
            "publisher": "ITU",
            "place": "",
            "DOI": "",
            "citationKey": "",
            "url": "http://www.itu.int/ITU-D/cyb/cybersecurity/docs/ITUNationalCybersecurityStrategyGuide.pdf",
            "accessDate": "",
            "archive": "",
            "archiveLocation": "",
            "shortTitle": "",
            "language": "",
            "libraryCatalog": "",
            "callNumber": "",
            "rights": "",
            "extra": "",
            "tags": [],
            "collections": [
                "RSHFZ4TK"
            ],
            "relations": {},
            "dateAdded": "2016-02-20T01:39:09Z",
            "dateModified": "2016-03-03T10:17:56Z"
        }
    },
    {
        "key": "V26KSJ9S",
        "version": 879,
        "library": {
            "type": "group",
            "id": 461739,
            "name": "Cyber Security Task Force",
            "links": {
                "alternate": {
                    "href": "https://www.zotero.org/groups/cyber_security_task_force",
                    "type": "text/html"
                }
            }
        },
        "links": {
            "self": {
                "href": "https://api.zotero.org/groups/461739/items/V26KSJ9S",
                "type": "application/json"
            },
            "alternate": {
                "href": "https://www.zotero.org/groups/cyber_security_task_force/items/V26KSJ9S",
                "type": "text/html"
            }
        },
        "meta": {
            "createdByUser": {
                "id": 2844634,
                "username": "Smawgy",
                "name": "",
                "links": {
                    "alternate": {
                        "href": "https://www.zotero.org/smawgy",
                        "type": "text/html"
                    }
                }
            },
            "creatorSummary": "Dan Goodin",
            "numChildren": 0
        },
        "data": {
            "key": "V26KSJ9S",
            "version": 879,
            "itemType": "newspaperArticle",
            "title": "Hackers did indeed cause Ukrainian power outage, US report concludes",
            "creators": [
                {
                    "creatorType": "author",
                    "name": "Dan Goodin"
                }
            ],
            "abstractNote": "",
            "publicationTitle": "Ars Technica",
            "publisher": "",
            "place": "",
            "date": "",
            "volume": "",
            "issue": "",
            "edition": "",
            "section": "Risk Assesment/Security & Hacktivism",
            "pages": "",
            "ISSN": "",
            "DOI": "",
            "citationKey": "",
            "url": "http://arstechnica.com/security/2016/02/hackers-did-indeed-cause-ukrainian-power-outage-us-report-concludes/",
            "accessDate": "",
            "archive": "",
            "archiveLocation": "",
            "shortTitle": "",
            "language": "en",
            "libraryCatalog": "",
            "callNumber": "",
            "rights": "",
            "extra": "",
            "tags": [],
            "collections": [],
            "relations": {},
            "dateAdded": "2016-03-03T10:12:46Z",
            "dateModified": "2016-03-03T10:14:37Z"
        }
    },
    {
        "key": "6UP7N2A6",
        "version": 873,
        "library": {
            "type": "group",
            "id": 461739,
            "name": "Cyber Security Task Force",
            "links": {
                "alternate": {
                    "href": "https://www.zotero.org/groups/cyber_security_task_force",
                    "type": "text/html"
                }
            }
        },
        "links": {
            "self": {
                "href": "https://api.zotero.org/groups/461739/items/6UP7N2A6",
                "type": "application/json"
            },
            "alternate": {
                "href": "https://www.zotero.org/groups/cyber_security_task_force/items/6UP7N2A6",
                "type": "text/html"
            }
        },
        "meta": {
            "createdByUser": {
                "id": 2833216,
                "username": "penguinkai",
                "name": "",
                "links": {
                    "alternate": {
                        "href": "https://www.zotero.org/penguinkai",
                        "type": "text/html"
                    }
                }
            },
            "lastModifiedByUser": {
                "id": 2844634,
                "username": "Smawgy",
                "name": "",
                "links": {
                    "alternate": {
                        "href": "https://www.zotero.org/smawgy",
                        "type": "text/html"
                    }
                }
            },
            "creatorSummary": "Marg",
            "numChildren": 0
        },
        "data": {
            "key": "6UP7N2A6",
            "version": 873,
            "itemType": "webpage",
            "title": "The Future of the Internet: Who Should Govern It and What is at Stake for You? A Multistakeholder Dialogue",
            "creators": [
                {
                    "creatorType": "author",
                    "firstName": "Max",
                    "lastName": "Marg"
                }
            ],
            "abstractNote": "Discusses how internet governance should work.",
            "websiteTitle": "Internet Democracy Project",
            "websiteType": "Thinktank",
            "date": "",
            "publisher": "",
            "place": "",
            "DOI": "",
            "citationKey": "",
            "url": "https://internetdemocracy.in/events/the-future-of-the-internet-who-should-govern-it-and-what-is-at-stake-for-you-a-multistakeholder-dialogue/",
            "accessDate": "",
            "shortTitle": "",
            "language": "",
            "rights": "",
            "extra": "",
            "tags": [],
            "collections": [
                "AH8FDK4H",
                "RSHFZ4TK"
            ],
            "relations": {},
            "dateAdded": "2016-02-24T22:26:16Z",
            "dateModified": "2016-03-03T09:57:36Z"
        }
    },
    {
        "key": "CI2ZX289",
        "version": 871,
        "library": {
            "type": "group",
            "id": 461739,
            "name": "Cyber Security Task Force",
            "links": {
                "alternate": {
                    "href": "https://www.zotero.org/groups/cyber_security_task_force",
                    "type": "text/html"
                }
            }
        },
        "links": {
            "self": {
                "href": "https://api.zotero.org/groups/461739/items/CI2ZX289",
                "type": "application/json"
            },
            "alternate": {
                "href": "https://www.zotero.org/groups/cyber_security_task_force/items/CI2ZX289",
                "type": "text/html"
            }
        },
        "meta": {
            "createdByUser": {
                "id": 2844634,
                "username": "Smawgy",
                "name": "",
                "links": {
                    "alternate": {
                        "href": "https://www.zotero.org/smawgy",
                        "type": "text/html"
                    }
                }
            },
            "creatorSummary": "Heads of State and Government",
            "parsedDate": "2014",
            "numChildren": 0
        },
        "data": {
            "key": "CI2ZX289",
            "version": 871,
            "itemType": "document",
            "title": "Article 72 of the Wales Summit Declaration",
            "creators": [
                {
                    "creatorType": "author",
                    "name": "Heads of State and Government"
                }
            ],
            "abstractNote": "",
            "type": "",
            "date": "2014",
            "publisher": "Government of the United Kingdom",
            "place": "",
            "DOI": "",
            "citationKey": "",
            "url": "https://www.gov.uk/government/uploads/system/uploads/attachment_data/file/351406/Wales_Summit_Declaration.pdf",
            "accessDate": "2016-03-03",
            "archive": "",
            "archiveLocation": "",
            "shortTitle": "",
            "language": "",
            "libraryCatalog": "",
            "callNumber": "",
            "rights": "",
            "extra": "",
            "tags": [],
            "collections": [],
            "relations": {},
            "dateAdded": "2016-03-03T09:39:21Z",
            "dateModified": "2016-03-03T09:39:21Z"
        }
    },
    {
        "key": "32E2CJN2",
        "version": 870,
        "library": {
            "type": "group",
            "id": 461739,
            "name": "Cyber Security Task Force",
            "links": {
                "alternate": {
                    "href": "https://www.zotero.org/groups/cyber_security_task_force",
                    "type": "text/html"
                }
            }
        },
        "links": {
            "self": {
                "href": "https://api.zotero.org/groups/461739/items/32E2CJN2",
                "type": "application/json"
            },
            "alternate": {
                "href": "https://www.zotero.org/groups/cyber_security_task_force/items/32E2CJN2",
                "type": "text/html"
            }
        },
        "meta": {
            "createdByUser": {
                "id": 2826664,
                "username": "akegel",
                "name": "",
                "links": {
                    "alternate": {
                        "href": "https://www.zotero.org/akegel",
                        "type": "text/html"
                    }
                }
            },
            "lastModifiedByUser": {
                "id": 2844634,
                "username": "Smawgy",
                "name": "",
                "links": {
                    "alternate": {
                        "href": "https://www.zotero.org/smawgy",
                        "type": "text/html"
                    }
                }
            },
            "creatorSummary": "Associated Press",
            "parsedDate": "2016-01-02",
            "numChildren": 0
        },
        "data": {
            "key": "32E2CJN2",
            "version": 870,
            "itemType": "journalArticle",
            "title": "When Back Doors Backfire",
            "creators": [
                {
                    "creatorType": "author",
                    "name": "Associated Press"
                }
            ],
            "abstractNote": "Some spy agencies favour \"back doors\" in ecryption software, but who will use them?",
            "publicationTitle": "The Economist",
            "publisher": "",
            "place": "",
            "date": "January 2, 2016",
            "volume": "",
            "issue": "Online",
            "section": "",
            "partNumber": "",
            "partTitle": "",
            "pages": "10",
            "series": "",
            "seriesTitle": "",
            "seriesText": "",
            "journalAbbreviation": "",
            "DOI": "",
            "citationKey": "",
            "url": "http://www.economist.com/news/leaders/21684783-some-spy-agencies-favour-back-doors-encryption-software-who-will-use-them-when-back",
            "accessDate": "",
            "PMID": "",
            "PMCID": "",
            "ISSN": "0013-0613",
            "archive": "",
            "archiveLocation": "",
            "shortTitle": "",
            "language": "",
            "libraryCatalog": "",
            "callNumber": "",
            "rights": "",
            "extra": "",
            "tags": [],
            "collections": [
                "QWMQ3JCU"
            ],
            "relations": {},
            "dateAdded": "2016-02-23T21:05:49Z",
            "dateModified": "2016-03-03T04:31:37Z"
        }
    },
    {
        "key": "68WWDKSU",
        "version": 869,
        "library": {
            "type": "group",
            "id": 461739,
            "name": "Cyber Security Task Force",
            "links": {
                "alternate": {
                    "href": "https://www.zotero.org/groups/cyber_security_task_force",
                    "type": "text/html"
                }
            }
        },
        "links": {
            "self": {
                "href": "https://api.zotero.org/groups/461739/items/68WWDKSU",
                "type": "application/json"
            },
            "alternate": {
                "href": "https://www.zotero.org/groups/cyber_security_task_force/items/68WWDKSU",
                "type": "text/html"
            }
        },
        "meta": {
            "createdByUser": {
                "id": 2848663,
                "username": "seohyunb",
                "name": "",
                "links": {
                    "alternate": {
                        "href": "https://www.zotero.org/seohyunb",
                        "type": "text/html"
                    }
                }
            },
            "lastModifiedByUser": {
                "id": 2844634,
                "username": "Smawgy",
                "name": "",
                "links": {
                    "alternate": {
                        "href": "https://www.zotero.org/smawgy",
                        "type": "text/html"
                    }
                }
            },
            "creatorSummary": "Comninos and Seneque",
            "numChildren": 0
        },
        "data": {
            "key": "68WWDKSU",
            "version": 869,
            "itemType": "report",
            "title": "Cyber security, civil society and vulnerability in an age of communications surveillance",
            "creators": [
                {
                    "creatorType": "author",
                    "firstName": "Alex",
                    "lastName": "Comninos"
                },
                {
                    "creatorType": "author",
                    "firstName": "Gareth",
                    "lastName": "Seneque"
                }
            ],
            "abstractNote": "",
            "reportNumber": "",
            "reportType": "",
            "institution": "Global Information Society Watch",
            "place": "",
            "date": "",
            "seriesTitle": "",
            "seriesNumber": "",
            "pages": "32-40",
            "DOI": "",
            "ISBN": "",
            "citationKey": "",
            "url": "https://www.giswatch.org/sites/default/files/cyber_security_civil_society_and_vulnerability.pdf",
            "accessDate": "",
            "ISSN": "",
            "archive": "",
            "archiveLocation": "",
            "shortTitle": "",
            "language": "",
            "libraryCatalog": "",
            "callNumber": "",
            "rights": "",
            "extra": "",
            "tags": [],
            "collections": [],
            "relations": {},
            "dateAdded": "2016-02-20T01:39:27Z",
            "dateModified": "2016-03-03T04:19:23Z"
        }
    },
    {
        "key": "RJX7N3TN",
        "version": 868,
        "library": {
            "type": "group",
            "id": 461739,
            "name": "Cyber Security Task Force",
            "links": {
                "alternate": {
                    "href": "https://www.zotero.org/groups/cyber_security_task_force",
                    "type": "text/html"
                }
            }
        },
        "links": {
            "self": {
                "href": "https://api.zotero.org/groups/461739/items/RJX7N3TN",
                "type": "application/json"
            },
            "alternate": {
                "href": "https://www.zotero.org/groups/cyber_security_task_force/items/RJX7N3TN",
                "type": "text/html"
            }
        },
        "meta": {
            "createdByUser": {
                "id": 2826674,
                "username": "syun1",
                "name": "",
                "links": {
                    "alternate": {
                        "href": "https://www.zotero.org/syun1",
                        "type": "text/html"
                    }
                }
            },
            "lastModifiedByUser": {
                "id": 2844634,
                "username": "Smawgy",
                "name": "",
                "links": {
                    "alternate": {
                        "href": "https://www.zotero.org/smawgy",
                        "type": "text/html"
                    }
                }
            },
            "creatorSummary": "US Constitution",
            "numChildren": 0
        },
        "data": {
            "key": "RJX7N3TN",
            "version": 868,
            "itemType": "webpage",
            "title": "Fourth Amendment",
            "creators": [
                {
                    "creatorType": "author",
                    "firstName": "",
                    "lastName": "US Constitution"
                }
            ],
            "abstractNote": "Fourth Amendment - Search and SeizureAmendment Text | AnnotationsThe right of the people to be secure in their persons, houses, papers, and effects, against",
            "websiteTitle": "Findlaw",
            "websiteType": "",
            "date": "",
            "publisher": "",
            "place": "",
            "DOI": "",
            "citationKey": "",
            "url": "http://constitution.findlaw.com/amendment4.html",
            "accessDate": "2016-01-21T00:22:07Z",
            "shortTitle": "",
            "language": "",
            "rights": "",
            "extra": "",
            "tags": [],
            "collections": [
                "QWMQ3JCU"
            ],
            "relations": {},
            "dateAdded": "2016-02-22T20:36:05Z",
            "dateModified": "2016-03-03T04:01:08Z"
        }
    },
    {
        "key": "54QXQA9G",
        "version": 867,
        "library": {
            "type": "group",
            "id": 461739,
            "name": "Cyber Security Task Force",
            "links": {
                "alternate": {
                    "href": "https://www.zotero.org/groups/cyber_security_task_force",
                    "type": "text/html"
                }
            }
        },
        "links": {
            "self": {
                "href": "https://api.zotero.org/groups/461739/items/54QXQA9G",
                "type": "application/json"
            },
            "alternate": {
                "href": "https://www.zotero.org/groups/cyber_security_task_force/items/54QXQA9G",
                "type": "text/html"
            }
        },
        "meta": {
            "createdByUser": {
                "id": 2826340,
                "username": "o marg",
                "name": "",
                "links": {
                    "alternate": {
                        "href": "https://www.zotero.org/o_marg",
                        "type": "text/html"
                    }
                }
            },
            "lastModifiedByUser": {
                "id": 2844634,
                "username": "Smawgy",
                "name": "",
                "links": {
                    "alternate": {
                        "href": "https://www.zotero.org/smawgy",
                        "type": "text/html"
                    }
                }
            },
            "creatorSummary": "Rachel Nyswander Thomas",
            "parsedDate": "2013-08",
            "numChildren": 1
        },
        "data": {
            "key": "54QXQA9G",
            "version": 867,
            "itemType": "thesis",
            "title": "Securing Cyberspace Through Public-Private Partnership: A Comparative Analysis of Partnership Models",
            "creators": [
                {
                    "creatorType": "author",
                    "name": "Rachel Nyswander Thomas"
                }
            ],
            "abstractNote": "",
            "thesisType": "",
            "university": "Georgetown University",
            "place": "",
            "date": "August 2013",
            "series": "",
            "seriesNumber": "",
            "numPages": "63",
            "DOI": "",
            "ISBN": "",
            "citationKey": "",
            "url": "http://csis.org/files/publication/130819_tech_summary.pdf",
            "accessDate": "2016-02-10",
            "ISSN": "",
            "archive": "",
            "archiveLocation": "",
            "shortTitle": "Securing Cyberspace: A Comparitive Analysis",
            "language": "",
            "libraryCatalog": "",
            "callNumber": "",
            "rights": "",
            "extra": "",
            "tags": [],
            "collections": [],
            "relations": {},
            "dateAdded": "2016-02-10T19:25:12Z",
            "dateModified": "2016-03-03T03:34:30Z"
        }
    },
    {
        "key": "3HTCSZUZ",
        "version": 865,
        "library": {
            "type": "group",
            "id": 461739,
            "name": "Cyber Security Task Force",
            "links": {
                "alternate": {
                    "href": "https://www.zotero.org/groups/cyber_security_task_force",
                    "type": "text/html"
                }
            }
        },
        "links": {
            "self": {
                "href": "https://api.zotero.org/groups/461739/items/3HTCSZUZ",
                "type": "application/json"
            },
            "alternate": {
                "href": "https://www.zotero.org/groups/cyber_security_task_force/items/3HTCSZUZ",
                "type": "text/html"
            },
            "up": {
                "href": "https://api.zotero.org/groups/461739/items/54QXQA9G",
                "type": "application/json"
            }
        },
        "meta": {
            "createdByUser": {
                "id": 2826340,
                "username": "o marg",
                "name": "",
                "links": {
                    "alternate": {
                        "href": "https://www.zotero.org/o_marg",
                        "type": "text/html"
                    }
                }
            },
            "lastModifiedByUser": {
                "id": 2844634,
                "username": "Smawgy",
                "name": "",
                "links": {
                    "alternate": {
                        "href": "https://www.zotero.org/smawgy",
                        "type": "text/html"
                    }
                }
            },
            "numChildren": 0
        },
        "data": {
            "key": "3HTCSZUZ",
            "version": 865,
            "parentItem": "54QXQA9G",
            "itemType": "note",
            "note": "",
            "tags": [],
            "relations": {},
            "dateAdded": "2016-02-25T05:55:18Z",
            "dateModified": "2016-03-03T03:33:40Z"
        }
    },
    {
        "key": "5MAU247W",
        "version": 864,
        "library": {
            "type": "group",
            "id": 461739,
            "name": "Cyber Security Task Force",
            "links": {
                "alternate": {
                    "href": "https://www.zotero.org/groups/cyber_security_task_force",
                    "type": "text/html"
                }
            }
        },
        "links": {
            "self": {
                "href": "https://api.zotero.org/groups/461739/items/5MAU247W",
                "type": "application/json"
            },
            "alternate": {
                "href": "https://www.zotero.org/groups/cyber_security_task_force/items/5MAU247W",
                "type": "text/html"
            }
        },
        "meta": {
            "createdByUser": {
                "id": 2844634,
                "username": "Smawgy",
                "name": "",
                "links": {
                    "alternate": {
                        "href": "https://www.zotero.org/smawgy",
                        "type": "text/html"
                    }
                }
            },
            "creatorSummary": "DHS Press Office",
            "parsedDate": "2016-02-16",
            "numChildren": 0
        },
        "data": {
            "key": "5MAU247W",
            "version": 864,
            "itemType": "report",
            "title": "Statement by Secretary Jeh C. Johnson on Implementation of the Cybersecurity Act of 2015",
            "creators": [
                {
                    "creatorType": "author",
                    "name": "DHS Press Office"
                }
            ],
            "abstractNote": "",
            "reportNumber": "",
            "reportType": "Press Release",
            "institution": "Department of Homeland Security",
            "place": "",
            "date": "February 16, 2016",
            "seriesTitle": "",
            "seriesNumber": "",
            "pages": "",
            "DOI": "",
            "ISBN": "",
            "citationKey": "",
            "url": "https://www.dhs.gov/news/2016/02/16/statement-secretary-jeh-c-johnson-implementation-cybersecurity-act-2015",
            "accessDate": "2016-02-29",
            "ISSN": "",
            "archive": "",
            "archiveLocation": "",
            "shortTitle": "Statement by Jeh C. Johnson",
            "language": "en",
            "libraryCatalog": "",
            "callNumber": "",
            "rights": "",
            "extra": "",
            "tags": [],
            "collections": [
                "QWMQ3JCU"
            ],
            "relations": {},
            "dateAdded": "2016-02-29T17:38:49Z",
            "dateModified": "2016-03-03T02:21:00Z"
        }
    },
    {
        "key": "A2HCXGWG",
        "version": 861,
        "library": {
            "type": "group",
            "id": 461739,
            "name": "Cyber Security Task Force",
            "links": {
                "alternate": {
                    "href": "https://www.zotero.org/groups/cyber_security_task_force",
                    "type": "text/html"
                }
            }
        },
        "links": {
            "self": {
                "href": "https://api.zotero.org/groups/461739/items/A2HCXGWG",
                "type": "application/json"
            },
            "alternate": {
                "href": "https://www.zotero.org/groups/cyber_security_task_force/items/A2HCXGWG",
                "type": "text/html"
            }
        },
        "meta": {
            "createdByUser": {
                "id": 2844634,
                "username": "Smawgy",
                "name": "",
                "links": {
                    "alternate": {
                        "href": "https://www.zotero.org/smawgy",
                        "type": "text/html"
                    }
                }
            },
            "creatorSummary": "International Telecommunications Union",
            "parsedDate": "2016",
            "numChildren": 0
        },
        "data": {
            "key": "A2HCXGWG",
            "version": 861,
            "itemType": "webpage",
            "title": "ITU-T in brief",
            "creators": [
                {
                    "creatorType": "author",
                    "name": "International Telecommunications Union"
                }
            ],
            "abstractNote": "",
            "websiteTitle": "ITU",
            "websiteType": "Telecommunications Union",
            "date": "2016",
            "publisher": "",
            "place": "",
            "DOI": "",
            "citationKey": "",
            "url": "http://www.itu.int/en/ITU-T/about/Pages/default.aspx",
            "accessDate": "2016-02-26",
            "shortTitle": "",
            "language": "en-US",
            "rights": "ITU 2016",
            "extra": "",
            "tags": [],
            "collections": [
                "RSHFZ4TK"
            ],
            "relations": {},
            "dateAdded": "2016-02-28T10:43:10Z",
            "dateModified": "2016-03-03T00:45:27Z"
        }
    },
    {
        "key": "XDQARGQ7",
        "version": 861,
        "library": {
            "type": "group",
            "id": 461739,
            "name": "Cyber Security Task Force",
            "links": {
                "alternate": {
                    "href": "https://www.zotero.org/groups/cyber_security_task_force",
                    "type": "text/html"
                }
            }
        },
        "links": {
            "self": {
                "href": "https://api.zotero.org/groups/461739/items/XDQARGQ7",
                "type": "application/json"
            },
            "alternate": {
                "href": "https://www.zotero.org/groups/cyber_security_task_force/items/XDQARGQ7",
                "type": "text/html"
            }
        },
        "meta": {
            "createdByUser": {
                "id": 2844634,
                "username": "Smawgy",
                "name": "",
                "links": {
                    "alternate": {
                        "href": "https://www.zotero.org/smawgy",
                        "type": "text/html"
                    }
                }
            },
            "creatorSummary": "Kerri Heitner",
            "parsedDate": "2014-06-10",
            "numChildren": 1
        },
        "data": {
            "key": "XDQARGQ7",
            "version": 861,
            "itemType": "magazineArticle",
            "title": "Civil Aviation and Cyber Terrorism: vulnerabilities set to be exploited",
            "creators": [
                {
                    "creatorType": "author",
                    "name": "Kerri Heitner"
                }
            ],
            "abstractNote": "",
            "publicationTitle": "Aviation Security International Magazine",
            "publisher": "",
            "place": "",
            "date": "June 10, 2014",
            "volume": "",
            "issue": "",
            "pages": "Online",
            "ISSN": "",
            "DOI": "",
            "citationKey": "",
            "url": "https://www.asi-mag.com/civil-aviation-cyber-terrorism-vulnerabilities-set-exploited/",
            "accessDate": "2016-02-27",
            "archive": "",
            "archiveLocation": "",
            "shortTitle": "Civil Aviation and Cyber Terrorism",
            "language": "",
            "libraryCatalog": "",
            "callNumber": "",
            "rights": "",
            "extra": "",
            "tags": [],
            "collections": [
                "RSHFZ4TK"
            ],
            "relations": {},
            "dateAdded": "2016-02-28T10:43:10Z",
            "dateModified": "2016-03-03T00:45:27Z"
        }
    },
    {
        "key": "567JHF93",
        "version": 861,
        "library": {
            "type": "group",
            "id": 461739,
            "name": "Cyber Security Task Force",
            "links": {
                "alternate": {
                    "href": "https://www.zotero.org/groups/cyber_security_task_force",
                    "type": "text/html"
                }
            }
        },
        "links": {
            "self": {
                "href": "https://api.zotero.org/groups/461739/items/567JHF93",
                "type": "application/json"
            },
            "alternate": {
                "href": "https://www.zotero.org/groups/cyber_security_task_force/items/567JHF93",
                "type": "text/html"
            }
        },
        "meta": {
            "createdByUser": {
                "id": 2844634,
                "username": "Smawgy",
                "name": "",
                "links": {
                    "alternate": {
                        "href": "https://www.zotero.org/smawgy",
                        "type": "text/html"
                    }
                }
            },
            "creatorSummary": "North Atlantic Treaty Organzation",
            "parsedDate": "2006-10-04",
            "numChildren": 1
        },
        "data": {
            "key": "567JHF93",
            "version": 861,
            "itemType": "webpage",
            "title": "NATO Summit Meetings",
            "creators": [
                {
                    "creatorType": "author",
                    "name": "North Atlantic Treaty Organzation"
                }
            ],
            "abstractNote": "",
            "websiteTitle": "Web.Archive.org",
            "websiteType": "Archive",
            "date": "October 4, 2006",
            "publisher": "",
            "place": "",
            "DOI": "",
            "citationKey": "",
            "url": "https://web.archive.org/web/20061004140412/http://www.nato.int/issues/summits/index.html",
            "accessDate": "2016-02-27",
            "shortTitle": "Nato Topics",
            "language": "",
            "rights": "",
            "extra": "",
            "tags": [],
            "collections": [
                "RSHFZ4TK"
            ],
            "relations": {},
            "dateAdded": "2016-02-28T10:43:10Z",
            "dateModified": "2016-03-03T00:45:27Z"
        }
    },
    {
        "key": "FQUI5PXB",
        "version": 861,
        "library": {
            "type": "group",
            "id": 461739,
            "name": "Cyber Security Task Force",
            "links": {
                "alternate": {
                    "href": "https://www.zotero.org/groups/cyber_security_task_force",
                    "type": "text/html"
                }
            }
        },
        "links": {
            "self": {
                "href": "https://api.zotero.org/groups/461739/items/FQUI5PXB",
                "type": "application/json"
            },
            "alternate": {
                "href": "https://www.zotero.org/groups/cyber_security_task_force/items/FQUI5PXB",
                "type": "text/html"
            }
        },
        "meta": {
            "createdByUser": {
                "id": 2844634,
                "username": "Smawgy",
                "name": "",
                "links": {
                    "alternate": {
                        "href": "https://www.zotero.org/smawgy",
                        "type": "text/html"
                    }
                }
            },
            "creatorSummary": "The American Institute of Aeronautics and Astronautics",
            "parsedDate": "2013",
            "numChildren": 1
        },
        "data": {
            "key": "FQUI5PXB",
            "version": 861,
            "itemType": "document",
            "title": "AIAA Annual Report",
            "creators": [
                {
                    "creatorType": "author",
                    "name": "The American Institute of Aeronautics and Astronautics"
                }
            ],
            "abstractNote": "",
            "type": "",
            "date": "2013-2014",
            "publisher": "AIAA",
            "place": "",
            "DOI": "",
            "citationKey": "",
            "url": "https://www.aiaa.org/uploadedFiles/About_AIAA/Goveranance/AIAA_2013-14_Annual_Report_FINAL(1).pdf",
            "accessDate": "2016-02-28",
            "archive": "",
            "archiveLocation": "",
            "shortTitle": "",
            "language": "",
            "libraryCatalog": "",
            "callNumber": "",
            "rights": "",
            "extra": "",
            "tags": [],
            "collections": [
                "RSHFZ4TK"
            ],
            "relations": {},
            "dateAdded": "2016-02-28T10:43:10Z",
            "dateModified": "2016-03-03T00:45:27Z"
        }
    },
    {
        "key": "6DZKMT4U",
        "version": 861,
        "library": {
            "type": "group",
            "id": 461739,
            "name": "Cyber Security Task Force",
            "links": {
                "alternate": {
                    "href": "https://www.zotero.org/groups/cyber_security_task_force",
                    "type": "text/html"
                }
            }
        },
        "links": {
            "self": {
                "href": "https://api.zotero.org/groups/461739/items/6DZKMT4U",
                "type": "application/json"
            },
            "alternate": {
                "href": "https://www.zotero.org/groups/cyber_security_task_force/items/6DZKMT4U",
                "type": "text/html"
            }
        },
        "meta": {
            "createdByUser": {
                "id": 2844634,
                "username": "Smawgy",
                "name": "",
                "links": {
                    "alternate": {
                        "href": "https://www.zotero.org/smawgy",
                        "type": "text/html"
                    }
                }
            },
            "creatorSummary": "The American Institute of Aeronautics and Astronautics",
            "parsedDate": "2013-08",
            "numChildren": 1
        },
        "data": {
            "key": "6DZKMT4U",
            "version": 861,
            "itemType": "document",
            "title": "The Connectivity Challenge: Protecting Critical Assets in a Networked World, A Framework for Aviation Cybersecurity",
            "creators": [
                {
                    "creatorType": "author",
                    "name": "The American Institute of Aeronautics and Astronautics"
                }
            ],
            "abstractNote": "",
            "type": "",
            "date": "August 2013",
            "publisher": "AIAA",
            "place": "",
            "DOI": "",
            "citationKey": "",
            "url": "https://www.aiaa.org/uploadedFiles/Issues_and_Advocacy/AIAA-Cyber-Framework-Final.pdf",
            "accessDate": "2016-02-28",
            "archive": "",
            "archiveLocation": "",
            "shortTitle": "The Connectivity Challenge",
            "language": "",
            "libraryCatalog": "",
            "callNumber": "",
            "rights": "",
            "extra": "",
            "tags": [],
            "collections": [
                "RSHFZ4TK"
            ],
            "relations": {},
            "dateAdded": "2016-02-28T10:43:10Z",
            "dateModified": "2016-03-03T00:45:27Z"
        }
    },
    {
        "key": "UNQW4VWV",
        "version": 861,
        "library": {
            "type": "group",
            "id": 461739,
            "name": "Cyber Security Task Force",
            "links": {
                "alternate": {
                    "href": "https://www.zotero.org/groups/cyber_security_task_force",
                    "type": "text/html"
                }
            }
        },
        "links": {
            "self": {
                "href": "https://api.zotero.org/groups/461739/items/UNQW4VWV",
                "type": "application/json"
            },
            "alternate": {
                "href": "https://www.zotero.org/groups/cyber_security_task_force/items/UNQW4VWV",
                "type": "text/html"
            }
        },
        "meta": {
            "createdByUser": {
                "id": 2844634,
                "username": "Smawgy",
                "name": "",
                "links": {
                    "alternate": {
                        "href": "https://www.zotero.org/smawgy",
                        "type": "text/html"
                    }
                }
            },
            "creatorSummary": "The American Institute of Aeronautics and Astronautics",
            "parsedDate": "2016",
            "numChildren": 1
        },
        "data": {
            "key": "UNQW4VWV",
            "version": 861,
            "itemType": "webpage",
            "title": "International Community",
            "creators": [
                {
                    "creatorType": "author",
                    "name": "The American Institute of Aeronautics and Astronautics"
                }
            ],
            "abstractNote": "",
            "websiteTitle": "AIAA.org",
            "websiteType": "Technical Society",
            "date": "2016",
            "publisher": "",
            "place": "",
            "DOI": "",
            "citationKey": "",
            "url": "https://www.aiaa.org/International/?terms=international.",
            "accessDate": "2016-02-20",
            "shortTitle": "AIAA",
            "language": "",
            "rights": "",
            "extra": "",
            "tags": [],
            "collections": [
                "RSHFZ4TK"
            ],
            "relations": {},
            "dateAdded": "2016-02-28T10:43:10Z",
            "dateModified": "2016-03-03T00:45:27Z"
        }
    },
    {
        "key": "9VPCF9J6",
        "version": 861,
        "library": {
            "type": "group",
            "id": 461739,
            "name": "Cyber Security Task Force",
            "links": {
                "alternate": {
                    "href": "https://www.zotero.org/groups/cyber_security_task_force",
                    "type": "text/html"
                }
            }
        },
        "links": {
            "self": {
                "href": "https://api.zotero.org/groups/461739/items/9VPCF9J6",
                "type": "application/json"
            },
            "alternate": {
                "href": "https://www.zotero.org/groups/cyber_security_task_force/items/9VPCF9J6",
                "type": "text/html"
            }
        },
        "meta": {
            "createdByUser": {
                "id": 2844634,
                "username": "Smawgy",
                "name": "",
                "links": {
                    "alternate": {
                        "href": "https://www.zotero.org/smawgy",
                        "type": "text/html"
                    }
                }
            },
            "creatorSummary": "The Prime Minister's Office and The Rt Hon David Cameron MP",
            "parsedDate": "2014-09-01",
            "numChildren": 1
        },
        "data": {
            "key": "9VPCF9J6",
            "version": 861,
            "itemType": "report",
            "title": "Our 5 Priorities for the NATO Summit Wales 2014",
            "creators": [
                {
                    "creatorType": "author",
                    "name": "The Prime Minister's Office"
                },
                {
                    "creatorType": "author",
                    "name": "The Rt Hon David Cameron MP"
                }
            ],
            "abstractNote": "",
            "reportNumber": "",
            "reportType": "Policy Paper",
            "institution": "United Kingdom Government",
            "place": "10 Downing Street",
            "date": "September 1, 2014",
            "seriesTitle": "",
            "seriesNumber": "",
            "pages": "",
            "DOI": "",
            "ISBN": "",
            "citationKey": "",
            "url": "https://www.gov.uk/government/publications/our-5-priorities-for-the-nato-summit-wales-2014/our-5-priorities-for-the-nato-summit-wales-2014",
            "accessDate": "2016-02-27",
            "ISSN": "",
            "archive": "",
            "archiveLocation": "",
            "shortTitle": "NATO Wales Summit Priorites",
            "language": "",
            "libraryCatalog": "",
            "callNumber": "",
            "rights": "Crown Copyright",
            "extra": "",
            "tags": [],
            "collections": [
                "RSHFZ4TK"
            ],
            "relations": {},
            "dateAdded": "2016-02-28T10:43:10Z",
            "dateModified": "2016-03-03T00:45:27Z"
        }
    },
    {
        "key": "QSZUTE92",
        "version": 861,
        "library": {
            "type": "group",
            "id": 461739,
            "name": "Cyber Security Task Force",
            "links": {
                "alternate": {
                    "href": "https://www.zotero.org/groups/cyber_security_task_force",
                    "type": "text/html"
                }
            }
        },
        "links": {
            "self": {
                "href": "https://api.zotero.org/groups/461739/items/QSZUTE92",
                "type": "application/json"
            },
            "alternate": {
                "href": "https://www.zotero.org/groups/cyber_security_task_force/items/QSZUTE92",
                "type": "text/html"
            }
        },
        "meta": {
            "createdByUser": {
                "id": 2844634,
                "username": "Smawgy",
                "name": "",
                "links": {
                    "alternate": {
                        "href": "https://www.zotero.org/smawgy",
                        "type": "text/html"
                    }
                }
            },
            "creatorSummary": "Council of Europe",
            "parsedDate": "2016-02-29",
            "numChildren": 0
        },
        "data": {
            "key": "QSZUTE92",
            "version": 861,
            "itemType": "webpage",
            "title": "Chart of Signatures and Ratifications of Treaty 185",
            "creators": [
                {
                    "creatorType": "author",
                    "name": "Council of Europe"
                }
            ],
            "abstractNote": "",
            "websiteTitle": "Council of Europe",
            "websiteType": "Intergovernmental Organization",
            "date": "As of February 29, 2016",
            "publisher": "",
            "place": "",
            "DOI": "",
            "citationKey": "",
            "url": "http://www.coe.int/en/web/conventions/full-list/-/conventions/treaty/185/signatures",
            "accessDate": "2016-02-29",
            "shortTitle": "",
            "language": "English",
            "rights": "",
            "extra": "",
            "tags": [],
            "collections": [
                "RSHFZ4TK"
            ],
            "relations": {},
            "dateAdded": "2016-02-29T00:10:06Z",
            "dateModified": "2016-03-03T00:45:27Z"
        }
    },
    {
        "key": "SW5UNGTD",
        "version": 861,
        "library": {
            "type": "group",
            "id": 461739,
            "name": "Cyber Security Task Force",
            "links": {
                "alternate": {
                    "href": "https://www.zotero.org/groups/cyber_security_task_force",
                    "type": "text/html"
                }
            }
        },
        "links": {
            "self": {
                "href": "https://api.zotero.org/groups/461739/items/SW5UNGTD",
                "type": "application/json"
            },
            "alternate": {
                "href": "https://www.zotero.org/groups/cyber_security_task_force/items/SW5UNGTD",
                "type": "text/html"
            }
        },
        "meta": {
            "createdByUser": {
                "id": 2844634,
                "username": "Smawgy",
                "name": "",
                "links": {
                    "alternate": {
                        "href": "https://www.zotero.org/smawgy",
                        "type": "text/html"
                    }
                }
            },
            "creatorSummary": "Council of Europe",
            "parsedDate": "2001-11-23",
            "numChildren": 0
        },
        "data": {
            "key": "SW5UNGTD",
            "version": 861,
            "itemType": "document",
            "title": "Convention on Cybercrime Budapest, 23.XI.2001",
            "creators": [
                {
                    "creatorType": "author",
                    "name": "Council of Europe"
                }
            ],
            "abstractNote": "",
            "type": "",
            "date": "November 23, 2001",
            "publisher": "",
            "place": "",
            "DOI": "",
            "citationKey": "",
            "url": "http://www.coe.int/en/web/conventions/full-list/-/conventions/rms/0900001680081561",
            "accessDate": "2016-02-28",
            "archive": "European Treaty Series Archives",
            "archiveLocation": "CETS No.185",
            "shortTitle": "",
            "language": "English",
            "libraryCatalog": "",
            "callNumber": "",
            "rights": "",
            "extra": "",
            "tags": [],
            "collections": [
                "RSHFZ4TK"
            ],
            "relations": {},
            "dateAdded": "2016-02-28T22:05:51Z",
            "dateModified": "2016-03-03T00:45:27Z"
        }
    },
    {
        "key": "X3ISEV8X",
        "version": 861,
        "library": {
            "type": "group",
            "id": 461739,
            "name": "Cyber Security Task Force",
            "links": {
                "alternate": {
                    "href": "https://www.zotero.org/groups/cyber_security_task_force",
                    "type": "text/html"
                }
            }
        },
        "links": {
            "self": {
                "href": "https://api.zotero.org/groups/461739/items/X3ISEV8X",
                "type": "application/json"
            },
            "alternate": {
                "href": "https://www.zotero.org/groups/cyber_security_task_force/items/X3ISEV8X",
                "type": "text/html"
            }
        },
        "meta": {
            "createdByUser": {
                "id": 2844634,
                "username": "Smawgy",
                "name": "",
                "links": {
                    "alternate": {
                        "href": "https://www.zotero.org/smawgy",
                        "type": "text/html"
                    }
                }
            },
            "creatorSummary": "Executive Office of the President",
            "parsedDate": "2011-05",
            "numChildren": 1
        },
        "data": {
            "key": "X3ISEV8X",
            "version": 861,
            "itemType": "report",
            "title": "International Strategy for Cyberspace: Prosperity, Security, and Openness in a Networked World",
            "creators": [
                {
                    "creatorType": "author",
                    "name": "Executive Office of the President"
                }
            ],
            "abstractNote": "",
            "reportNumber": "",
            "reportType": "Policy Plan",
            "institution": "The White House",
            "place": "",
            "date": "May 2011",
            "seriesTitle": "",
            "seriesNumber": "",
            "pages": "17",
            "DOI": "",
            "ISBN": "",
            "citationKey": "",
            "url": "https://www.whitehouse.gov/sites/default/files/rss_viewer/international_strategy_for_cyberspace.pdf",
            "accessDate": "2016-02-27",
            "ISSN": "",
            "archive": "",
            "archiveLocation": "",
            "shortTitle": "Int. Strategy for Cyberspace",
            "language": "",
            "libraryCatalog": "",
            "callNumber": "",
            "rights": "",
            "extra": "",
            "tags": [],
            "collections": [
                "RSHFZ4TK"
            ],
            "relations": {},
            "dateAdded": "2016-02-28T10:43:10Z",
            "dateModified": "2016-03-03T00:45:27Z"
        }
    }
]