{"@context":{"owl":"http://www.w3.org/2002/07/owl#","bibo":"http://purl.org/ontology/bibo/","foaf":"http://xmlns.com/foaf/0.1/","rdfs":"http://www.w3.org/2000/01/rdf-schema#","prism":"http://prismstandard.org/namespaces/basic/2.0/","cinii":"http://ci.nii.ac.jp/ns/1.0/","dc":"http://purl.org/dc/elements/1.1/","dcterms":"http://purl.org/dc/terms/"},"@id":"https://ci.nii.ac.jp/ncid/BB11237396.json","@graph":[{"@id":"https://ci.nii.ac.jp/ncid/BB11237396#entity","@type":"bibo:Book","foaf:isPrimaryTopicOf":{"@id":"https://ci.nii.ac.jp/ncid/BB11237396.json"},"dc:title":[{"@value":"Cybercrime and the law : challenges, issues, and outcomes"}],"dc:creator":"Susan W. Brenner","dc:publisher":[{"@value":"Northeastern University Press"}],"dcterms:extent":"263 p.","cinii:size":"23 cm","dc:language":"eng","dc:date":"2012","cinii:ncid":"BB11237396","cinii:ownerCount":"3","foaf:maker":[{"@id":"https://ci.nii.ac.jp/author/DA17687678#entity","@type":"foaf:Person","foaf:name":[{"@value":"Brenner, Susan W."}]}],"bibo:owner":[{"@id":"https://ci.nii.ac.jp/library/FA002382","@type":"foaf:Organization","foaf:name":"静岡大学 附属図書館 浜松分館","rdfs:seeAlso":{"@id":"https://uni.lib.shizuoka.ac.jp/sul/resolver/svc_dat=suopac/rfr_id=https%3A%2F%2Fnii.ac.jp/?pid=ncid%3ABB11237396"}},{"@id":"https://ci.nii.ac.jp/library/FA002655","@type":"foaf:Organization","foaf:name":"京都大学 法学部 図書室","rdfs:seeAlso":{"@id":"https://kuline.kulib.kyoto-u.ac.jp/opac/opac_openurl/?ncid=BB11237396"}},{"@id":"https://ci.nii.ac.jp/library/FA003760","@type":"foaf:Organization","foaf:name":"東京都立大学 図書館","rdfs:seeAlso":{"@id":"https://opactmu.lib.tmu.ac.jp/iwjs0013opc/ufirdi.do?ufi_target=ctlsrh&ncid=BB11237396"}}],"bibo:lccn":["2012014928"],"rdfs:seeAlso":[{"@id":"https://lccn.loc.gov/2012014928"}],"prism:publicationDate":["c2012"],"cinii:note":["Includes bibliographical references and index"],"dc:subject":["LCC:KF9350","DC23:345.73/0268"],"cinii:contentOfWorks":["Hacking","Malware and DDoS attacks","Cybercrimes against property","Cybercrimes against persons","Cyber CSI : the evidentiary challenges of digital crime scenes","Cybercrime investigations and privacy","Transnational investigation of cybercrime","Mutating cyberthreats : crime, terrorism, and war"],"foaf:topic":[{"@id":"https://ci.nii.ac.jp/books/search?q=Computer+crimes+--+United+States","dc:title":"Computer crimes -- United States"},{"@id":"https://ci.nii.ac.jp/books/search?q=Computer+networks+--+Law+and+legislation+--+United+States+--+Criminal+provisions","dc:title":"Computer networks -- Law and legislation -- United States -- Criminal provisions"},{"@id":"https://ci.nii.ac.jp/books/search?q=Computer+viruses+--+United+States","dc:title":"Computer viruses -- United States"},{"@id":"https://ci.nii.ac.jp/books/search?q=Computer+hackers+--+United+States","dc:title":"Computer hackers -- United States"},{"@id":"https://ci.nii.ac.jp/books/search?q=Criminal+jurisdiction+--+United+States","dc:title":"Criminal jurisdiction -- United States"}],"dcterms:hasPart":[{"@id":"urn:isbn:9781555537982","dc:title":": hbk"},{"@id":"urn:isbn:9781555537999","dc:title":": pbk"}]}]}