{ "@context": { "dc": "http://purl.org/dc/elements/1.1/", "dcterms": "http://purl.org/dc/terms/", "iso-thes": "http://purl.org/iso25964/skos-thes#", "nsogi": "http://prefix.cc/nsogi", "rdf": "http://www.w3.org/1999/02/22-rdf-syntax-ns#", "rdfs": "http://www.w3.org/2000/01/rdf-schema#", "skos": "http://www.w3.org/2004/02/skos/core#", "skosxl": "http://www.w3.org/2008/05/skos-xl#", "xsd": "http://www.w3.org/2001/XMLSchema#" }, "@id": "http://purl.org/bncf/tid/53276", "@type": "skos:Concept", "skos:prefLabel": { "@language": "it","@value": "Sicurezza informatica"}, "dc:date": "2014-04-17", "skos:inScheme": [ { "@id": "http://purl.org/bncf/tid/Thes"}, { "@id": "http://purl.org/bncf/tid/ThesCF2" } ], "skos:broader": { "@id": "http://purl.org/bncf/tid/1576" }, "skos:altLabel": ["Cybersicurezza", "Protezione dei dati", "Sicurezza dei dati"], "skosxl:altLabel": [ {"@id": "http://purl.org/bncf/tid/71591"}, {"@id": "http://purl.org/bncf/tid/53339"}, {"@id": "http://purl.org/bncf/tid/53275"} ], "skos:related": [ { "@id": "http://purl.org/bncf/tid/3181" }, { "@id": "http://purl.org/bncf/tid/1575" }, { "@id": "http://purl.org/bncf/tid/62562" }, { "@id": "http://purl.org/bncf/tid/53272" }, { "@id": "http://purl.org/bncf/tid/61064" }, { "@id": "http://purl.org/bncf/tid/52363" }, { "@id": "http://purl.org/bncf/tid/65847" }], "skos:closeMatch": [ { "@id": "http://d-nb.info/gnd/4274324-2"} ], "skos:closeMatch": [ {"@id": "http://id.loc.gov/authorities/sh90001862"}, {"@id": "http://data.bnf.fr/ark:/12148/cb13318381w"}, {"@id": "http://www.wikidata.org/wiki/Q3510521"} ], "skos:scopeNote": "Ramo dell'informatica che si occupa di tutelare i sistemi di elaborazione (reti complesse o singoli computer), dalla possibile violazione di dati riservati in essi contenuti", "skos:historyNote": "Precedentemente espresso con la costruzione sintattica: Archivi di dati - Protezione ", "skos:editorialNote": "Treccani.it; DEIZ; IATE; InfT; Wikipedia(IT)", "skos:notation": { "@type": "http://dewey.info", "@value": "005.8" } }