{"@context":{"owl":"http://www.w3.org/2002/07/owl#","bibo":"http://purl.org/ontology/bibo/","foaf":"http://xmlns.com/foaf/0.1/","rdfs":"http://www.w3.org/2000/01/rdf-schema#","prism":"http://prismstandard.org/namespaces/basic/2.0/","cinii":"http://ci.nii.ac.jp/ns/1.0/","dc":"http://purl.org/dc/elements/1.1/","dcterms":"http://purl.org/dc/terms/"},"@id":"https://ci.nii.ac.jp/ncid/BC02747945.json","@graph":[{"@id":"https://ci.nii.ac.jp/ncid/BC02747945#entity","@type":"bibo:Book","foaf:isPrimaryTopicOf":{"@id":"https://ci.nii.ac.jp/ncid/BC02747945.json"},"dc:title":[{"@value":"Routledge handbook of international cybersecurity"}],"dc:creator":"edited by Eneken Tikk and Mika Kerttunen","dc:publisher":[{"@value":"Routledge"}],"dcterms:extent":"xix, 402 p.","cinii:size":"26 cm","dc:language":"eng","dc:date":"2020","cinii:ncid":"BC02747945","cinii:ownerCount":"2","foaf:maker":[{"@id":"https://ci.nii.ac.jp/author/DA19547986#entity","@type":"foaf:Person","foaf:name":[{"@value":"Tikk, Eneken"}]},{"@id":"https://ci.nii.ac.jp/author/DA19548005#entity","@type":"foaf:Person","foaf:name":[{"@value":"Kerttunen, Mika"}]}],"bibo:owner":[{"@id":"https://ci.nii.ac.jp/library/FA011747","@type":"foaf:Organization","foaf:name":"東京大学 法学部","rdfs:seeAlso":{"@id":"https://opac.dl.itc.u-tokyo.ac.jp/opac/opac_openurl/?ncid=BC02747945"}},{"@id":"https://ci.nii.ac.jp/library/FA006678","@type":"foaf:Organization","foaf:name":"明治大学 図書館","rdfs:seeAlso":{"@id":"https://opac2018.lib.meiji.ac.jp/webopac/ufirdi.do?ufi_target=ctlsrh&ncid=BC02747945"}}],"bibo:lccn":["2019043153"],"rdfs:seeAlso":[{"@id":"https://lccn.loc.gov/2019043153"}],"prism:publicationDate":["2020"],"cinii:note":["Includes bibliographical references and index"],"dc:subject":["LCC:JZ1254","DC23:303.48/34"],"foaf:topic":[{"@id":"https://ci.nii.ac.jp/books/search?q=Internet+and+international+relations","dc:title":"Internet and international relations"},{"@id":"https://ci.nii.ac.jp/books/search?q=Computer+security+--+International+cooperation","dc:title":"Computer security -- International cooperation"},{"@id":"https://ci.nii.ac.jp/books/search?q=Cyberspace+--+Security+measures+--+International+cooperation","dc:title":"Cyberspace -- Security measures -- International cooperation"},{"@id":"https://ci.nii.ac.jp/books/search?q=Computer+networks+--+Security+measures+--+Government+policy","dc:title":"Computer networks -- Security measures -- Government policy"},{"@id":"https://ci.nii.ac.jp/books/search?q=Cyberspace+operations+%28Military+science%29+--+Government+policy","dc:title":"Cyberspace operations (Military science) -- Government policy"}],"dcterms:isPartOf":[{"@id":"https://ci.nii.ac.jp/ncid/BB00515431#entity","dc:title":"Routledge handbooks","@type":"bibo:Book"}],"dcterms:hasPart":[{"@id":"urn:isbn:9781138489011","dc:title":": hbk"}]}]}