PropertyValue
http://www.w3.org/1999/02/22-rdf-syntax-ns#type
http://www.w3.org/ns/prov#value
  • This technique was used to hack Twitterand break into Sarah Palin's e-mail.Friending: In this scenario, a hacker gains the trust of an individual or group and then gets them to click on links or attachments that contain malware that introduces a threat, such as the ability to exploit a weakness in a corporate system.
http://www.w3.org/ns/prov#wasQuotedFrom
  • arnnet.com.au