{"@context":{"owl":"http://www.w3.org/2002/07/owl#","bibo":"http://purl.org/ontology/bibo/","foaf":"http://xmlns.com/foaf/0.1/","rdfs":"http://www.w3.org/2000/01/rdf-schema#","prism":"http://prismstandard.org/namespaces/basic/2.0/","cinii":"http://ci.nii.ac.jp/ns/1.0/","dc":"http://purl.org/dc/elements/1.1/","dcterms":"http://purl.org/dc/terms/"},"@id":"https://ci.nii.ac.jp/ncid/BA3890142X.json","@graph":[{"@id":"https://ci.nii.ac.jp/ncid/BA3890142X#entity","@type":"bibo:Book","foaf:isPrimaryTopicOf":{"@id":"https://ci.nii.ac.jp/ncid/BA3890142X.json"},"dc:title":[{"@value":"Risky business : protect your business from being stalked, conned, or blackmailed on the Web"}],"dc:creator":"Daniel S. Janal","dc:publisher":[{"@value":"Wiley"}],"dcterms:extent":"xvi, 336 p.","cinii:size":"24 cm","dc:language":"eng","dc:date":"1998","cinii:ncid":"BA3890142X","cinii:ownerCount":"5","foaf:maker":[{"@id":"https://ci.nii.ac.jp/author/DA10751779#entity","@type":"foaf:Person","foaf:name":[{"@value":"Janal, Daniel S."}]}],"bibo:owner":[{"@id":"https://ci.nii.ac.jp/library/FA002994","@type":"foaf:Organization","foaf:name":"神戸大学 附属図書館 社会科学系図書館","rdfs:seeAlso":{"@id":"https://op.lib.kobe-u.ac.jp/opac/opac_openurl/?rfe_dat=ncid/BA3890142X"}},{"@id":"https://ci.nii.ac.jp/library/FA006995","@type":"foaf:Organization","foaf:name":"横浜商科大学 図書館","rdfs:seeAlso":{"@id":"https://opac.shodai.ac.jp/opac/search?target=local&searchmode=complex&autoDetail=true&s_ncid=BA3890142X"}},{"@id":"https://ci.nii.ac.jp/library/FA008899","@type":"foaf:Organization","foaf:name":"中村学園大学 図書館"},{"@id":"https://ci.nii.ac.jp/library/FA015828","@type":"foaf:Organization","foaf:name":"東洋学園大学 図書館"},{"@id":"https://ci.nii.ac.jp/library/FA017958","@type":"foaf:Organization","foaf:name":"岩手県立大学 メディアセンター","rdfs:seeAlso":{"@id":"http://libipu.iwate-pu.ac.jp/mylimedio/search/search.do?target=local&mode=comp&category-mgz=1&category-book=1&annex=all&ncid=BA3890142X"}}],"bibo:lccn":["97044832"],"rdfs:seeAlso":[{"@id":"https://lccn.loc.gov/97044832"}],"prism:publicationDate":["c1998"],"cinii:note":["Includes index"],"dc:subject":["LCC:HV6773","DC21:364.16/8"],"foaf:topic":[{"@id":"https://ci.nii.ac.jp/books/search?q=Computer+crimes","dc:title":"Computer crimes"},{"@id":"https://ci.nii.ac.jp/books/search?q=Internet+%28Computer+network%29+--+Security+measures","dc:title":"Internet (Computer network) -- Security measures"},{"@id":"https://ci.nii.ac.jp/books/search?q=Computer+security","dc:title":"Computer security"},{"@id":"https://ci.nii.ac.jp/books/search?q=Fraud","dc:title":"Fraud"},{"@id":"https://ci.nii.ac.jp/books/search?q=Extortion","dc:title":"Extortion"}],"dcterms:isPartOf":[{"@id":"https://ci.nii.ac.jp/ncid/BA38903822#entity","dc:title":"Upside : people, technology, capital","@type":"bibo:Book"}],"dcterms:hasPart":[{"@id":"urn:isbn:0471197068","dc:title":": cloth"}]}]}