PropertyValue
http://www.w3.org/1999/02/22-rdf-syntax-ns#type
http://www.w3.org/ns/prov#value
  • Using the hacked phone, hacker can then infect other phones on the same network and attack connected computers and devices such as printers.
http://www.w3.org/ns/prov#wasQuotedFrom
  • geeknizer.com