PropertyValue
http://www.w3.org/1999/02/22-rdf-syntax-ns#type
http://www.w3.org/ns/prov#value
  • Key-logging malware captures user keystrokes during login; a phishing site is designed to look like a legitimate login page; cyber criminals hack into e-commerce websites and social networks to extract the user database, including user credentials.
http://www.w3.org/ns/prov#wasQuotedFrom
  • scmagazine.com