{
"author": {
"name": "Linda Coven",
"webUrl": "/author/profile/linda-coven/",
"description": "",
"imageLarge": "https://secure.gravatar.com/avatar/f16d6fc2845f417ea0e93a3f2b6cd37d?s=136&d=mm&r=g",
"estimate": 2,
"social": [],
"articles": [
{
"uri": "/2013/06/18/a-primer-on-payment-fraud-in-2013/",
"title": "A Primer on Payment Fraud in 2013",
"byline": " Linda Coven ",
"kicker": "Best Practices",
"prettyDate": "June 18, 2013",
"timeToRead": "11 minute",
"image": {
"uri": "https://images.treasuryandrisk.com/contrib/content/uploads/sites/411/2013/06/2013-06-18_Cyber-crime_616x372.png",
"width": "616",
"height": "372"
},
"authors": [
{
"webUrl": "/author/profile/linda-coven/",
"name": "Linda Coven"
}
],
"kickerNode": [
{
"uri": "/best-practices/",
"sectionName": "Best Practices"
}
],
"summary": "Mitigating risk requires adoption of best practices, both in managing paper checks and in confronting digital threats.",
"body": null
},
{
"uri": "/2013/06/18/a-primer-on-payment-fraud-in-2013/",
"title": "A Primer on Payment Fraud in 2013",
"byline": "Linda Coven",
"kicker": "Best Practices",
"prettyDate": "June 18, 2013",
"timeToRead": "11 minute",
"image": {
"uri": "https://images.treasuryandrisk.com/contrib/content/uploads/sites/411/2013/06/2013-06-18_Cyber-crime_616x372.png",
"width": "616",
"height": "372"
},
"authors": [
{
"webUrl": "/author/profile/linda-coven/",
"name": "Linda Coven"
}
],
"kickerNode": [
{
"uri": "/best-practices/",
"sectionName": "Best Practices"
}
],
"summary": "Mitigating risk requires adoption of best practices, both in managing paper checks and in confronting digital threats.",
"body": null
}
]
}
}