{"@context":{"owl":"http://www.w3.org/2002/07/owl#","bibo":"http://purl.org/ontology/bibo/","foaf":"http://xmlns.com/foaf/0.1/","rdfs":"http://www.w3.org/2000/01/rdf-schema#","prism":"http://prismstandard.org/namespaces/basic/2.0/","cinii":"http://ci.nii.ac.jp/ns/1.0/","dc":"http://purl.org/dc/elements/1.1/","dcterms":"http://purl.org/dc/terms/"},"@id":"https://ci.nii.ac.jp/ncid/BB20354470.json","@graph":[{"@id":"https://ci.nii.ac.jp/ncid/BB20354470#entity","@type":"bibo:Book","foaf:isPrimaryTopicOf":{"@id":"https://ci.nii.ac.jp/ncid/BB20354470.json"},"dc:title":[{"@value":"Cybercrime in progress : theory and prevention of technology-enabled offenses"}],"dc:creator":"Thomas J. Holt and Adam M. Bossler","dc:publisher":[{"@value":"Routledge"}],"dcterms:extent":"225 p.","cinii:size":"24 cm","dc:language":"eng","dc:date":"2016","cinii:ncid":"BB20354470","cinii:ownerCount":"4","foaf:maker":[{"@id":"https://ci.nii.ac.jp/author/DA1872361X#entity","@type":"foaf:Person","foaf:name":[{"@value":"Holt, Thomas J."}]},{"@type":"foaf:Person","foaf:name":[{"@value":"Bossler, Adam M."}]}],"bibo:owner":[{"@id":"https://ci.nii.ac.jp/library/FA002145","@type":"foaf:Organization","foaf:name":"金沢大学 附属図書館","rdfs:seeAlso":{"@id":"https://www1.lib.kanazawa-u.ac.jp/recordID/catalog.bib/BB20354470"}},{"@id":"https://ci.nii.ac.jp/library/FA003760","@type":"foaf:Organization","foaf:name":"東京都立大学 図書館","rdfs:seeAlso":{"@id":"https://opactmu.lib.tmu.ac.jp/iwjs0013opc/ufirdi.do?ufi_target=ctlsrh&ncid=BB20354470"}},{"@id":"https://ci.nii.ac.jp/library/FA005631","@type":"foaf:Organization","foaf:name":"拓殖大学 図書館","rdfs:seeAlso":{"@id":"https://opac.lib.takushoku-u.ac.jp/opac/search?target=local&searchmode=complex&autoDetail=true&s_ncid=BB20354470"}},{"@id":"https://ci.nii.ac.jp/library/FA006088","@type":"foaf:Organization","foaf:name":"東京農業大学 図書館","rdfs:seeAlso":{"@id":"https://webopac.nodai.ac.jp/webopac/ufirdi.do?ufi_target=ctlsrh&ncid=BB20354470"}}],"bibo:lccn":["2015025494"],"rdfs:seeAlso":[{"@id":"https://lccn.loc.gov/2015025494"}],"prism:publicationDate":["2016"],"cinii:note":["Includes bibliographical references and index"],"dc:subject":["LCC:HV6773","DC23:364.16/8"],"foaf:topic":[{"@id":"https://ci.nii.ac.jp/books/search?q=Computer+crimes","dc:title":"Computer crimes"},{"@id":"https://ci.nii.ac.jp/books/search?q=Computer+crimes+--+Prevention","dc:title":"Computer crimes -- Prevention"},{"@id":"https://ci.nii.ac.jp/books/search?q=Criminal+investigation+--+Technological+innovations","dc:title":"Criminal investigation -- Technological innovations"}],"dcterms:isPartOf":[{"@id":"https://ci.nii.ac.jp/ncid/BB05948130#entity","dc:title":"Crime science series / edited by Richard Wortley, 17","@type":"bibo:Book"}],"dcterms:hasPart":[{"@id":"urn:isbn:9781138024168","dc:title":": hbk"},{"@id":"urn:isbn:9781138066144","dc:title":": pbk"}]}]}