{"@context":{"owl":"http://www.w3.org/2002/07/owl#","bibo":"http://purl.org/ontology/bibo/","foaf":"http://xmlns.com/foaf/0.1/","rdfs":"http://www.w3.org/2000/01/rdf-schema#","prism":"http://prismstandard.org/namespaces/basic/2.0/","cinii":"http://ci.nii.ac.jp/ns/1.0/","dc":"http://purl.org/dc/elements/1.1/","dcterms":"http://purl.org/dc/terms/"},"@id":"https://ci.nii.ac.jp/ncid/BB21925329.json","@graph":[{"@id":"https://ci.nii.ac.jp/ncid/BB21925329#entity","@type":"bibo:Book","foaf:isPrimaryTopicOf":{"@id":"https://ci.nii.ac.jp/ncid/BB21925329.json"},"dc:title":[{"@value":"Managing cyber attacks in international law, business, and relations : in search of cyber peace"}],"dc:creator":"Scott J. Shackelford","dc:publisher":[{"@value":"Cambridge University Press"}],"dcterms:extent":"xxxix, 393 p.","cinii:size":"23 cm","dc:language":"eng","dc:date":"2015","cinii:ncid":"BB21925329","cinii:ownerCount":"3","foaf:maker":[{"@id":"https://ci.nii.ac.jp/author/DA19577954#entity","@type":"foaf:Person","foaf:name":[{"@value":"Shackelford, Scott J."}]}],"bibo:owner":[{"@id":"https://ci.nii.ac.jp/library/FA001007","@type":"foaf:Organization","foaf:name":"北海道大学 附属図書館","rdfs:seeAlso":{"@id":"https://opac.lib.hokudai.ac.jp/opac/opac_openurl/?ncid=BB21925329"}},{"@id":"https://ci.nii.ac.jp/library/FA005019","@type":"foaf:Organization","foaf:name":"学習院大学 図書館","rdfs:seeAlso":{"@id":"https://glim-op.glim.gakushuin.ac.jp/webopac/cattab.do?sp_srh_flg=true&ncid=BB21925329"}},{"@id":"https://ci.nii.ac.jp/library/FA009166","@type":"foaf:Organization","foaf:name":"放送大学 附属図書館","rdfs:seeAlso":{"@id":"https://libinfo.ouj.ac.jp/webopac/ufirdi.do?ufi_target=ctlsrh&ncid=BB21925329"}}],"prism:publicationDate":["2015"],"cinii:note":["\"First published 2014\"--T.p. verso","\"First paperback edition 2015\"--T.p. verso","Includes bibliographical references and index"],"dc:subject":["LCC:KZ6718","DC23:343.09/99"],"foaf:topic":[{"@id":"https://ci.nii.ac.jp/books/search?q=Information+warfare+%28International+law%29","dc:title":"Information warfare (International law)"},{"@id":"https://ci.nii.ac.jp/books/search?q=Cyberspace+--+Security+measures","dc:title":"Cyberspace -- Security measures"},{"@id":"https://ci.nii.ac.jp/books/search?q=Cyberterrorism","dc:title":"Cyberterrorism"},{"@id":"https://ci.nii.ac.jp/books/search?q=Computer+crimes","dc:title":"Computer crimes"},{"@id":"https://ci.nii.ac.jp/books/search?q=Computer+networks+--+Security+measures","dc:title":"Computer networks -- Security measures"}],"dcterms:hasPart":[{"@id":"urn:isbn:9781316600122","dc:title":": pbk"}]}]}