PropertyValue
http://www.w3.org/1999/02/22-rdf-syntax-ns#type
http://www.w3.org/ns/prov#value
  • Criminals have exploited software vulnerabilities and human psychology to spawn a broad range of malware and threats including spyware, phishing, botnets (a robot network is a network of hijacked zombie computers controlled remotely by a hacker), adware, rootkits (a group of programs designed to take control of a PC), spam, and unsafe websites.
http://www.w3.org/ns/prov#wasQuotedFrom
  • mcafee.com