This HTML5 document contains 7 embedded RDF statements represented using HTML+Microdata notation.

The embedded RDF content will be recognized by any processor of HTML5 Microdata.

PrefixNamespace IRI
n8http://dbkwik.webdatacommons.org/ontology/
dctermshttp://purl.org/dc/terms/
n4http://dbkwik.webdatacommons.org/resource/uVa5kTlM6Dpkd-1VjbRstg==
rdfshttp://www.w3.org/2000/01/rdf-schema#
n5http://dbkwik.webdatacommons.org/resource/lqAJD5CoJiH4QkuGOupOvg==
n9http://dbkwik.webdatacommons.org/resource/260jUnTieowLb2Mg274iUQ==
rdfhttp://www.w3.org/1999/02/22-rdf-syntax-ns#
n6http://dbkwik.webdatacommons.org/resource/T5EthFaWXI6Syw5c2wWL-g==
xsdhhttp://www.w3.org/2001/XMLSchema#
n2http://dbkwik.webdatacommons.org/resource/8o4DAbVIljXNCV7GLaKO5w==
Subject Item
n2:
rdfs:label
Hacking motives
rdfs:comment
Australian Institute of Criminology, Hacking Motives (High Tech Crime Brief No. 6) (Jan. 2005) (full-text).
dcterms:subject
n4: n5: n6: n9:
n8:abstract
Australian Institute of Criminology, Hacking Motives (High Tech Crime Brief No. 6) (Jan. 2005) (full-text).