{"has_more":true,"total_items":96,"items":[{"reference_info":"Journal of Law, Technology and Policy, Vol. 2015, 341 (2015)","posted_date":"13 Jan 2015","authors":[{"author_name":"Lawrence J. Trautman","author_url":"https://papers.ssrn.com/sol3/cf_dev/AbsByAuth.cfm?per_id=1603406"}],"fullTextUrl":"https://papers.ssrn.com/sol3/Delivery.cfm/SSRN_ID2705057_code1603406.pdf?abstractid=2548561","revised_date":"18 Dec 2015","ssrn_abstract_id":2548561,"vg_id":847410,"abstract_url":"https://papers.ssrn.com/sol3/papers.cfm?abstract_id=2548561","title":"Cybersecurity: What About U.S. Policy?","in_myLibrary":0,"downloads":1137,"pdf_pages":51,"is_fee":false,"doi":"https://doi.org/10.2139/ssrn.2548561"},{"vg_id":0,"published_date":2017,"journal":"Following the Money: Lessons from the \"Panama Papers","volume":807,"authors":[{"author_name":"Lawrence J Trautman"}]},{"vg_id":0,"published_date":"2017-05","journal":"First Quarter 2017 Vulnerability Trends","authors":[{"author_name":"See Vulnerability Quickview"}]},{"vg_id":0,"authors":[{"author_name":" Id"}]}]}