PropertyValue
http://www.w3.org/1999/02/22-rdf-syntax-ns#type
http://www.w3.org/ns/prov#value
  • Criminals may attempt to execute the following steps: the user (criminal) performs a transaction using the online system; the transaction is logged; and the anti-phishing server periodically scans the logs and looks for anomalous patterns that may indicate phishing and/or other forms of fraud.
http://www.w3.org/ns/prov#wasQuotedFrom
  • google.com