{"ad_unit_id":"App_Resource_Sidebar_Upper","resource":{"id":3633246,"author_id":1829267,"title":"María Salomé Prieto Roa","created_at":"2015-10-01T20:31:20Z","updated_at":"2016-10-26T00:31:20Z","sample":false,"description":"Podrá observar algunas de las alternativas que puede tener para que sus hijos y usted protejan su información personal y las cosas que sus hijos vean.","alerts_enabled":true,"cached_tag_list":"seguridad internet, mal uso, precauciones","deleted_at":null,"hidden":false,"average_rating":null,"demote":false,"private":false,"copyable":true,"score":16,"artificial_base_score":0,"recalculate_score":true,"profane":false,"hide_summary":false,"tag_list":["seguridad internet","mal uso","precauciones"],"admin_tag_list":[],"study_aid_type":"MindMap","show_path":"/mind_maps/3633246","folder_id":2702374,"public_author":{"id":1829267,"profile":{"name":"Salome Prieto Ro","about":null,"avatar_service":"google","locale":"es-ES","google_author_link":"https://plus.google.com/109441199987597872536","user_type_id":247,"escaped_name":"Salome Prieto Ro","full_name":"Salome Prieto Ro","badge_classes":""}}},"width":300,"height":250,"rtype":"MindMap","rmode":"canonical","sizes":"[[[0, 0], [[300, 250]]]]","custom":[{"key":"rsubject","value":"Herramientas Informaticas"},{"key":"rlevel","value":"Conexion a internet"},{"key":"env","value":"production"},{"key":"rtype","value":"MindMap"},{"key":"rmode","value":"canonical"},{"key":"uauth","value":"f"},{"key":"uadmin","value":"f"},{"key":"ulang","value":"en_us"},{"key":"ucurrency","value":"usd"}]}
{"ad_unit_id":"App_Resource_Sidebar_Lower","resource":{"id":3633246,"author_id":1829267,"title":"María Salomé Prieto Roa","created_at":"2015-10-01T20:31:20Z","updated_at":"2016-10-26T00:31:20Z","sample":false,"description":"Podrá observar algunas de las alternativas que puede tener para que sus hijos y usted protejan su información personal y las cosas que sus hijos vean.","alerts_enabled":true,"cached_tag_list":"seguridad internet, mal uso, precauciones","deleted_at":null,"hidden":false,"average_rating":null,"demote":false,"private":false,"copyable":true,"score":16,"artificial_base_score":0,"recalculate_score":true,"profane":false,"hide_summary":false,"tag_list":["seguridad internet","mal uso","precauciones"],"admin_tag_list":[],"study_aid_type":"MindMap","show_path":"/mind_maps/3633246","folder_id":2702374,"public_author":{"id":1829267,"profile":{"name":"Salome Prieto Ro","about":null,"avatar_service":"google","locale":"es-ES","google_author_link":"https://plus.google.com/109441199987597872536","user_type_id":247,"escaped_name":"Salome Prieto Ro","full_name":"Salome Prieto Ro","badge_classes":""}}},"width":300,"height":250,"rtype":"MindMap","rmode":"canonical","sizes":"[[[0, 0], [[300, 250]]]]","custom":[{"key":"rsubject","value":"Herramientas Informaticas"},{"key":"rlevel","value":"Conexion a internet"},{"key":"env","value":"production"},{"key":"rtype","value":"MindMap"},{"key":"rmode","value":"canonical"},{"key":"uauth","value":"f"},{"key":"uadmin","value":"f"},{"key":"ulang","value":"en_us"},{"key":"ucurrency","value":"usd"}]}