{"51146":{"#nid":"51146","#data":{"type":"news","title":"Smart Phones Among Top 5 Cyber Threats","body":[{"value":"\u003Cp\u003E\u003C\/p\u003E","summary":null,"format":"limited_html"}],"field_subtitle":"","field_summary":[{"value":"\u003Cp\u003E\u201cAs these devices have richer functionality, you\u2019re going to be able to install applications, and we\u2019re going to run into the same kind of problems\u201d that laptops and desktops have, said Mustaque Ahamad, director of the Georgia Tech Information Security Center. Source: Chronicle of Higher Education\u003C\/p\u003E","format":"limited_html"}],"field_summary_sentence":"","uid":"27154","created_gmt":"2010-02-09 21:40:45","changed_gmt":"2016-10-08 03:04:30","author":"Louise Russo","boilerplate_text":"","field_publication":"","field_article_url":"","dateline":{"date":"2008-11-11T00:00:00-05:00","iso_date":"2008-11-11T00:00:00-05:00","tz":"America\/New_York"},"extras":[],"related_links":[{"url":"http:\/\/chronicle.com\/wiredcampus\/index.php?id=3445","title":"http:\/\/chronicle.com\/wiredcampus\/index.php?id=3445"}],"groups":[{"id":"47223","name":"College of Computing"}],"categories":[],"keywords":[],"core_research_areas":[],"news_room_topics":[],"event_categories":[],"invited_audience":[],"affiliations":[],"classification":[],"areas_of_expertise":[],"news_and_recent_appearances":[],"phone":[],"contact":[],"email":[],"slides":[],"orientation":[],"userdata":""}}}