{"@context":{"owl":"http://www.w3.org/2002/07/owl#","bibo":"http://purl.org/ontology/bibo/","foaf":"http://xmlns.com/foaf/0.1/","rdfs":"http://www.w3.org/2000/01/rdf-schema#","prism":"http://prismstandard.org/namespaces/basic/2.0/","cinii":"http://ci.nii.ac.jp/ns/1.0/","dc":"http://purl.org/dc/elements/1.1/","dcterms":"http://purl.org/dc/terms/"},"@id":"https://ci.nii.ac.jp/ncid/BD1055112X.json","@graph":[{"@id":"https://ci.nii.ac.jp/ncid/BD1055112X#entity","@type":"bibo:Book","foaf:isPrimaryTopicOf":{"@id":"https://ci.nii.ac.jp/ncid/BD1055112X.json"},"dc:title":[{"@value":"The language of cyber attacks : a rhetoric of deception"}],"dc:creator":"Aaron Mauro","dc:publisher":[{"@value":"Bloomsbury Academic"},{"cinii:publisherRole":"copyright_notice_date"}],"dcterms:extent":"x, 224 pages","cinii:size":"22 cm","dc:language":"eng","dc:date":"2024","cinii:ncid":"BD1055112X","cinii:ownerCount":"0","foaf:maker":[{"@type":"foaf:Person","foaf:name":[{"@value":"Mauro, Aaron"}]}],"prism:publicationDate":["2024","c2024"],"cinii:note":["Content Type: text (ncrcontent), Media Type: unmediated (ncrmedia), Carrier Type: volume (ncrcarrier)","Includes bibliographical references and index"],"dc:subject":["DC23:005.87014"],"foaf:topic":[{"@id":"https://ci.nii.ac.jp/books/search?q=Computer+crimes","dc:title":"Computer crimes"},{"@id":"https://ci.nii.ac.jp/books/search?q=Cyber+intelligence+%28Computer+security%29","dc:title":"Cyber intelligence (Computer security)"},{"@id":"https://ci.nii.ac.jp/books/search?q=Online+manipulation","dc:title":"Online manipulation"},{"@id":"https://ci.nii.ac.jp/books/search?q=Rhetoric+and+psychology","dc:title":"Rhetoric and psychology"},{"@id":"https://ci.nii.ac.jp/books/search?q=Disinformation","dc:title":"Disinformation"}],"dcterms:isPartOf":[{"@id":"https://ci.nii.ac.jp/ncid/BC1659295X#entity","dc:title":"Bloomsbury studies in digital cultures / series editors, Anthony Mandal, Jenny Kidd","@type":"bibo:Book"}],"dcterms:hasPart":[{"@id":"urn:isbn:9781350354678","dc:title":"PB:"}]}]}