PropertyValue
http://www.w3.org/1999/02/22-rdf-syntax-ns#type
http://www.w3.org/ns/prov#value
  • om suspects or fingerprint files to identify perpetrators, using computers.14) Investigate organized crime, public corruption, financial crime, copyright infringement, civil rights violations, bank robbery, extortion, kidnapping, and other violations of federal or state statutes.15) Manage security programs designed to protect personnel, facilities, and information.16) Record evidence and document
http://www.w3.org/ns/prov#wasQuotedFrom
  • careerplanner.com