{
"head" : {
"vars" : [ "subject", "predicate", "object", "context" ]
},
"results" : {
"bindings" : [ {
"subject" : {
"type" : "uri",
"value" : "http://data.open.ac.uk/openlearn/science-maths-technology/three-ways-your-personal-photos-are-vulnerable-hackers"
},
"predicate" : {
"type" : "uri",
"value" : "http://data.open.ac.uk/openlearn/ontology/imageLarge"
},
"object" : {
"type" : "uri",
"value" : "http://www.open.edu/openlearn/sites/www.open.edu.openlearn/files/styles/share_img/public/ole_images/startup-594127_1280.jpg?itok=9-D1gpd1"
}
}, {
"subject" : {
"type" : "uri",
"value" : "http://data.open.ac.uk/openlearn/science-maths-technology/three-ways-your-personal-photos-are-vulnerable-hackers"
},
"predicate" : {
"type" : "uri",
"value" : "http://data.open.ac.uk/openlearn/ontology/imageSmall"
},
"object" : {
"type" : "uri",
"value" : "http://www.open.edu/openlearn/sites/www.open.edu.openlearn/files/ole_images/ats-jennifer-lawrence.jpg"
}
}, {
"subject" : {
"type" : "uri",
"value" : "http://data.open.ac.uk/openlearn/science-maths-technology/three-ways-your-personal-photos-are-vulnerable-hackers"
},
"predicate" : {
"type" : "uri",
"value" : "http://data.open.ac.uk/openlearn/ontology/internalID"
},
"object" : {
"type" : "literal",
"value" : "201111"
}
}, {
"subject" : {
"type" : "uri",
"value" : "http://data.open.ac.uk/openlearn/science-maths-technology/three-ways-your-personal-photos-are-vulnerable-hackers"
},
"predicate" : {
"type" : "uri",
"value" : "http://data.open.ac.uk/openlearn/ontology/lastUpdateFrom"
},
"object" : {
"type" : "uri",
"value" : "http://www.open.edu/openlearn/data-open-feed/201607?type=ole_article&page=6"
}
}, {
"subject" : {
"type" : "uri",
"value" : "http://data.open.ac.uk/openlearn/science-maths-technology/three-ways-your-personal-photos-are-vulnerable-hackers"
},
"predicate" : {
"type" : "uri",
"value" : "http://data.open.ac.uk/openlearn/ontology/primaryTerm"
},
"object" : {
"type" : "literal",
"value" : "Science, Maths & Technology"
}
}, {
"subject" : {
"type" : "uri",
"value" : "http://data.open.ac.uk/openlearn/science-maths-technology/three-ways-your-personal-photos-are-vulnerable-hackers"
},
"predicate" : {
"type" : "uri",
"value" : "http://data.open.ac.uk/openlearn/ontology/secondaryTerm"
},
"object" : {
"type" : "literal",
"value" : "Computing"
}
}, {
"subject" : {
"type" : "uri",
"value" : "http://data.open.ac.uk/openlearn/science-maths-technology/three-ways-your-personal-photos-are-vulnerable-hackers"
},
"predicate" : {
"type" : "uri",
"value" : "http://data.open.ac.uk/openlearn/ontology/secondaryTerm"
},
"object" : {
"type" : "literal",
"value" : "Information and Communication Technologies"
}
}, {
"subject" : {
"type" : "uri",
"value" : "http://data.open.ac.uk/openlearn/science-maths-technology/three-ways-your-personal-photos-are-vulnerable-hackers"
},
"predicate" : {
"type" : "uri",
"value" : "http://data.open.ac.uk/openlearn/ontology/secondaryTerm"
},
"object" : {
"type" : "literal",
"value" : "Computing and ICT"
}
}, {
"subject" : {
"type" : "uri",
"value" : "http://data.open.ac.uk/openlearn/science-maths-technology/three-ways-your-personal-photos-are-vulnerable-hackers"
},
"predicate" : {
"type" : "uri",
"value" : "http://data.open.ac.uk/openlearn/ontology/secondaryTerm"
},
"object" : {
"type" : "literal",
"value" : "Systems (Computer)"
}
}, {
"subject" : {
"type" : "uri",
"value" : "http://data.open.ac.uk/openlearn/science-maths-technology/three-ways-your-personal-photos-are-vulnerable-hackers"
},
"predicate" : {
"type" : "uri",
"value" : "http://data.open.ac.uk/openlearn/ontology/tag"
},
"object" : {
"type" : "literal",
"value" : "cyber security"
}
}, {
"subject" : {
"type" : "uri",
"value" : "http://data.open.ac.uk/openlearn/science-maths-technology/three-ways-your-personal-photos-are-vulnerable-hackers"
},
"predicate" : {
"type" : "uri",
"value" : "http://data.open.ac.uk/openlearn/ontology/tag"
},
"object" : {
"type" : "literal",
"value" : "hacking"
}
}, {
"subject" : {
"type" : "uri",
"value" : "http://data.open.ac.uk/openlearn/science-maths-technology/three-ways-your-personal-photos-are-vulnerable-hackers"
},
"predicate" : {
"type" : "uri",
"value" : "http://data.open.ac.uk/openlearn/ontology/tag"
},
"object" : {
"type" : "literal",
"value" : "iCloud hacking"
}
}, {
"subject" : {
"type" : "uri",
"value" : "http://data.open.ac.uk/openlearn/science-maths-technology/three-ways-your-personal-photos-are-vulnerable-hackers"
},
"predicate" : {
"type" : "uri",
"value" : "http://data.open.ac.uk/openlearn/ontology/tag"
},
"object" : {
"type" : "literal",
"value" : "Jennifer Lawrence leaked photos"
}
}, {
"subject" : {
"type" : "uri",
"value" : "http://data.open.ac.uk/openlearn/science-maths-technology/three-ways-your-personal-photos-are-vulnerable-hackers"
},
"predicate" : {
"type" : "uri",
"value" : "http://data.open.ac.uk/openlearn/ontology/tag"
},
"object" : {
"type" : "literal",
"value" : "photo sharing"
}
}, {
"subject" : {
"type" : "uri",
"value" : "http://data.open.ac.uk/openlearn/science-maths-technology/three-ways-your-personal-photos-are-vulnerable-hackers"
},
"predicate" : {
"type" : "uri",
"value" : "http://data.open.ac.uk/openlearn/ontology/tag"
},
"object" : {
"type" : "literal",
"value" : "public hotspots"
}
}, {
"subject" : {
"type" : "uri",
"value" : "http://data.open.ac.uk/openlearn/science-maths-technology/three-ways-your-personal-photos-are-vulnerable-hackers"
},
"predicate" : {
"type" : "uri",
"value" : "http://dbpedia.org/property/url"
},
"object" : {
"datatype" : "http://www.w3.org/2001/XMLSchema#anyURI",
"type" : "literal",
"value" : "http://www.open.edu/openlearn/science-maths-technology/three-ways-your-personal-photos-are-vulnerable-hackers"
}
}, {
"subject" : {
"type" : "uri",
"value" : "http://data.open.ac.uk/openlearn/science-maths-technology/three-ways-your-personal-photos-are-vulnerable-hackers"
},
"predicate" : {
"type" : "uri",
"value" : "http://dbpedia.org/property/url"
},
"object" : {
"type" : "uri",
"value" : "http://www.open.edu/openlearn/science-maths-technology/three-ways-your-personal-photos-are-vulnerable-hackers"
}
}, {
"subject" : {
"type" : "uri",
"value" : "http://data.open.ac.uk/openlearn/science-maths-technology/three-ways-your-personal-photos-are-vulnerable-hackers"
},
"predicate" : {
"type" : "uri",
"value" : "http://purl.org/dc/terms/created"
},
"object" : {
"datatype" : "http://www.w3.org/2001/XMLSchema#dateTime",
"type" : "literal",
"value" : "Mon, 01 Sep 2014 14:18:00 +0100"
}
}, {
"subject" : {
"type" : "uri",
"value" : "http://data.open.ac.uk/openlearn/science-maths-technology/three-ways-your-personal-photos-are-vulnerable-hackers"
},
"predicate" : {
"type" : "uri",
"value" : "http://purl.org/dc/terms/creator"
},
"object" : {
"type" : "uri",
"value" : "http://data.open.ac.uk/organization/the_open_university"
}
}, {
"subject" : {
"type" : "uri",
"value" : "http://data.open.ac.uk/openlearn/science-maths-technology/three-ways-your-personal-photos-are-vulnerable-hackers"
},
"predicate" : {
"type" : "uri",
"value" : "http://purl.org/dc/terms/creator"
},
"object" : {
"type" : "uri",
"value" : "http://data.open.ac.uk/person/6951259a5becb3e1cb766b1037bd6079"
}
}, {
"subject" : {
"type" : "uri",
"value" : "http://data.open.ac.uk/openlearn/science-maths-technology/three-ways-your-personal-photos-are-vulnerable-hackers"
},
"predicate" : {
"type" : "uri",
"value" : "http://purl.org/dc/terms/language"
},
"object" : {
"type" : "literal",
"value" : "en-GB"
}
}, {
"subject" : {
"type" : "uri",
"value" : "http://data.open.ac.uk/openlearn/science-maths-technology/three-ways-your-personal-photos-are-vulnerable-hackers"
},
"predicate" : {
"type" : "uri",
"value" : "http://purl.org/dc/terms/published"
},
"object" : {
"datatype" : "http://www.w3.org/2001/XMLSchema#dateTime",
"type" : "literal",
"value" : "Mon, 01 Sep 2014 14:18:00 +0100"
}
}, {
"subject" : {
"type" : "uri",
"value" : "http://data.open.ac.uk/openlearn/science-maths-technology/three-ways-your-personal-photos-are-vulnerable-hackers"
},
"predicate" : {
"type" : "uri",
"value" : "http://purl.org/dc/terms/subject"
},
"object" : {
"type" : "uri",
"value" : "http://data.open.ac.uk/topic/computing"
}
}, {
"subject" : {
"type" : "uri",
"value" : "http://data.open.ac.uk/openlearn/science-maths-technology/three-ways-your-personal-photos-are-vulnerable-hackers"
},
"predicate" : {
"type" : "uri",
"value" : "http://purl.org/dc/terms/subject"
},
"object" : {
"type" : "uri",
"value" : "http://data.open.ac.uk/topic/computing_and_ict"
}
}, {
"subject" : {
"type" : "uri",
"value" : "http://data.open.ac.uk/openlearn/science-maths-technology/three-ways-your-personal-photos-are-vulnerable-hackers"
},
"predicate" : {
"type" : "uri",
"value" : "http://purl.org/dc/terms/subject"
},
"object" : {
"type" : "uri",
"value" : "http://data.open.ac.uk/topic/information_and_communication_technologies"
}
}, {
"subject" : {
"type" : "uri",
"value" : "http://data.open.ac.uk/openlearn/science-maths-technology/three-ways-your-personal-photos-are-vulnerable-hackers"
},
"predicate" : {
"type" : "uri",
"value" : "http://purl.org/dc/terms/subject"
},
"object" : {
"type" : "uri",
"value" : "http://data.open.ac.uk/topic/cyber_security"
}
}, {
"subject" : {
"type" : "uri",
"value" : "http://data.open.ac.uk/openlearn/science-maths-technology/three-ways-your-personal-photos-are-vulnerable-hackers"
},
"predicate" : {
"type" : "uri",
"value" : "http://purl.org/dc/terms/subject"
},
"object" : {
"type" : "uri",
"value" : "http://data.open.ac.uk/topic/systems_%28computer%29"
}
}, {
"subject" : {
"type" : "uri",
"value" : "http://data.open.ac.uk/openlearn/science-maths-technology/three-ways-your-personal-photos-are-vulnerable-hackers"
},
"predicate" : {
"type" : "uri",
"value" : "http://purl.org/dc/terms/subject"
},
"object" : {
"type" : "uri",
"value" : "http://data.open.ac.uk/topic/hacking"
}
}, {
"subject" : {
"type" : "uri",
"value" : "http://data.open.ac.uk/openlearn/science-maths-technology/three-ways-your-personal-photos-are-vulnerable-hackers"
},
"predicate" : {
"type" : "uri",
"value" : "http://purl.org/dc/terms/subject"
},
"object" : {
"type" : "uri",
"value" : "http://data.open.ac.uk/topic/photo_sharing"
}
}, {
"subject" : {
"type" : "uri",
"value" : "http://data.open.ac.uk/openlearn/science-maths-technology/three-ways-your-personal-photos-are-vulnerable-hackers"
},
"predicate" : {
"type" : "uri",
"value" : "http://purl.org/dc/terms/subject"
},
"object" : {
"type" : "uri",
"value" : "http://data.open.ac.uk/topic/icloud_hacking"
}
}, {
"subject" : {
"type" : "uri",
"value" : "http://data.open.ac.uk/openlearn/science-maths-technology/three-ways-your-personal-photos-are-vulnerable-hackers"
},
"predicate" : {
"type" : "uri",
"value" : "http://purl.org/dc/terms/subject"
},
"object" : {
"type" : "uri",
"value" : "http://data.open.ac.uk/topic/jennifer_lawrence_leaked_photos"
}
}, {
"subject" : {
"type" : "uri",
"value" : "http://data.open.ac.uk/openlearn/science-maths-technology/three-ways-your-personal-photos-are-vulnerable-hackers"
},
"predicate" : {
"type" : "uri",
"value" : "http://purl.org/dc/terms/subject"
},
"object" : {
"type" : "uri",
"value" : "http://data.open.ac.uk/topic/personal_photos"
}
}, {
"subject" : {
"type" : "uri",
"value" : "http://data.open.ac.uk/openlearn/science-maths-technology/three-ways-your-personal-photos-are-vulnerable-hackers"
},
"predicate" : {
"type" : "uri",
"value" : "http://purl.org/dc/terms/subject"
},
"object" : {
"type" : "uri",
"value" : "http://data.open.ac.uk/topic/public_hotspots"
}
}, {
"subject" : {
"type" : "uri",
"value" : "http://data.open.ac.uk/openlearn/science-maths-technology/three-ways-your-personal-photos-are-vulnerable-hackers"
},
"predicate" : {
"type" : "uri",
"value" : "http://purl.org/dc/terms/subject"
},
"object" : {
"type" : "uri",
"value" : "http://data.open.ac.uk/topic/science%2C_maths_%26_technology"
}
}, {
"subject" : {
"type" : "uri",
"value" : "http://data.open.ac.uk/openlearn/science-maths-technology/three-ways-your-personal-photos-are-vulnerable-hackers"
},
"predicate" : {
"type" : "uri",
"value" : "http://web.resource.org/cc/license"
},
"object" : {
"xml:lang" : "en",
"type" : "literal",
"value" : "Licensed under a Creative Commons Attribution - NonCommercial-ShareAlike 2.0 Licence - see http://creativecommons.org/licenses/by-nc-sa/2.0/uk/ - Original copyright The Open University"
}
}, {
"subject" : {
"type" : "uri",
"value" : "http://data.open.ac.uk/openlearn/science-maths-technology/three-ways-your-personal-photos-are-vulnerable-hackers"
},
"predicate" : {
"type" : "uri",
"value" : "http://www.w3.org/TR/2010/WD-mediaont-10-20100608/locator"
},
"object" : {
"datatype" : "http://www.w3.org/2001/XMLSchema#anyURI",
"type" : "literal",
"value" : "http://www.open.edu/openlearn/science-maths-technology/three-ways-your-personal-photos-are-vulnerable-hackers"
}
}, {
"subject" : {
"type" : "uri",
"value" : "http://data.open.ac.uk/openlearn/science-maths-technology/three-ways-your-personal-photos-are-vulnerable-hackers"
},
"predicate" : {
"type" : "uri",
"value" : "http://www.w3.org/TR/2010/WD-mediaont-10-20100608/locator"
},
"object" : {
"type" : "uri",
"value" : "http://www.open.edu/openlearn/science-maths-technology/three-ways-your-personal-photos-are-vulnerable-hackers"
}
}, {
"subject" : {
"type" : "uri",
"value" : "http://data.open.ac.uk/openlearn/science-maths-technology/three-ways-your-personal-photos-are-vulnerable-hackers"
},
"predicate" : {
"type" : "uri",
"value" : "http://www.w3.org/1999/02/22-rdf-syntax-ns#type"
},
"object" : {
"type" : "uri",
"value" : "http://data.open.ac.uk/openlearn/ontology/OpenLearnArticle"
}
}, {
"subject" : {
"type" : "uri",
"value" : "http://data.open.ac.uk/openlearn/science-maths-technology/three-ways-your-personal-photos-are-vulnerable-hackers"
},
"predicate" : {
"type" : "uri",
"value" : "http://www.w3.org/1999/02/22-rdf-syntax-ns#type"
},
"object" : {
"type" : "uri",
"value" : "http://data.open.ac.uk/openlearn/ontology/OpenLearnExploreArticle"
}
}, {
"subject" : {
"type" : "uri",
"value" : "http://data.open.ac.uk/openlearn/science-maths-technology/three-ways-your-personal-photos-are-vulnerable-hackers"
},
"predicate" : {
"type" : "uri",
"value" : "http://www.w3.org/1999/02/22-rdf-syntax-ns#type"
},
"object" : {
"type" : "uri",
"value" : "http://xmlns.com/foaf/0.1/Document"
}
}, {
"subject" : {
"type" : "uri",
"value" : "http://data.open.ac.uk/openlearn/science-maths-technology/three-ways-your-personal-photos-are-vulnerable-hackers"
},
"predicate" : {
"type" : "uri",
"value" : "http://www.w3.org/2000/01/rdf-schema#label"
},
"object" : {
"type" : "literal",
"value" : "Three ways your personal photos are vulnerable to hackers"
}
}, {
"subject" : {
"type" : "uri",
"value" : "http://data.open.ac.uk/openlearn/science-maths-technology/three-ways-your-personal-photos-are-vulnerable-hackers"
},
"predicate" : {
"type" : "uri",
"value" : "http://www.w3.org/2000/01/rdf-schema#seeAlso"
},
"object" : {
"type" : "uri",
"value" : "http://www.open.edu/openlearn/science-maths-technology/computing-and-ict"
}
}, {
"subject" : {
"type" : "uri",
"value" : "http://data.open.ac.uk/openlearn/science-maths-technology/three-ways-your-personal-photos-are-vulnerable-hackers"
},
"predicate" : {
"type" : "uri",
"value" : "http://www.w3.org/2000/01/rdf-schema#seeAlso"
},
"object" : {
"type" : "uri",
"value" : "http://www.open.edu/openlearn/science-maths-technology/computing-and-ict/computing"
}
}, {
"subject" : {
"type" : "uri",
"value" : "http://data.open.ac.uk/openlearn/science-maths-technology/three-ways-your-personal-photos-are-vulnerable-hackers"
},
"predicate" : {
"type" : "uri",
"value" : "http://www.w3.org/2000/01/rdf-schema#seeAlso"
},
"object" : {
"type" : "uri",
"value" : "http://www.open.edu/openlearn/science-maths-technology/computing-and-ict/information-and-communication-technologies"
}
}, {
"subject" : {
"type" : "uri",
"value" : "http://data.open.ac.uk/openlearn/science-maths-technology/three-ways-your-personal-photos-are-vulnerable-hackers"
},
"predicate" : {
"type" : "uri",
"value" : "http://www.w3.org/2000/01/rdf-schema#seeAlso"
},
"object" : {
"type" : "uri",
"value" : "http://www.open.edu/openlearn/science-maths-technology/computing-and-ict/systems-computer"
}
}, {
"subject" : {
"type" : "uri",
"value" : "http://data.open.ac.uk/openlearn/science-maths-technology/three-ways-your-personal-photos-are-vulnerable-hackers"
},
"predicate" : {
"type" : "uri",
"value" : "http://www.w3.org/2000/01/rdf-schema#seeAlso"
},
"object" : {
"type" : "uri",
"value" : "http://www.open.edu/openlearn/science-maths-technology/three-ways-your-personal-photos-are-vulnerable-hackers"
}
}, {
"subject" : {
"type" : "uri",
"value" : "http://data.open.ac.uk/openlearn/science-maths-technology/three-ways-your-personal-photos-are-vulnerable-hackers"
},
"predicate" : {
"type" : "uri",
"value" : "http://xmlns.com/foaf/0.1/depiction"
},
"object" : {
"type" : "uri",
"value" : "http://www.open.edu/openlearn/sites/www.open.edu.openlearn/files/ole_images/ats-jennifer-lawrence.jpg"
}
}, {
"subject" : {
"type" : "uri",
"value" : "http://data.open.ac.uk/openlearn/science-maths-technology/three-ways-your-personal-photos-are-vulnerable-hackers"
},
"predicate" : {
"type" : "uri",
"value" : "http://purl.org/dc/terms/description"
},
"object" : {
"type" : "literal",
"value" : "Leaked nude snaps from the likes of Jennifer Lawrence's iCloud stresses how vulnerable our personal photos are to hacking. In light of this, how can we up our cloud's security?"
}
}, {
"subject" : {
"type" : "uri",
"value" : "http://data.open.ac.uk/openlearn/science-maths-technology/three-ways-your-personal-photos-are-vulnerable-hackers"
},
"predicate" : {
"type" : "uri",
"value" : "http://purl.org/dc/terms/description"
},
"object" : {
"type" : "literal",
"value" : "Leaked nude snaps from the likes of Jennifer Lawrence's iCloud stresses how vulnerable our personal photos are to hacking. In light of this, how can we up our cloud's security? \n Andrew Smith. Andrew Smith grew up in Somerset, where he embarked on a path which would see him join The Open University in 2008 as a lecturer in networking, running the Cisco Academy for T216, T824/6/7/8.\n
First published on Mon, 01 Sep 2014 as Three ways your personal photos are vulnerable to hackers. To find out more visit The Open University's Openlearn website. Creative-Commons 2014"
}
}, {
"subject" : {
"type" : "uri",
"value" : "http://data.open.ac.uk/openlearn/science-maths-technology/three-ways-your-personal-photos-are-vulnerable-hackers"
},
"predicate" : {
"type" : "uri",
"value" : "http://purl.org/dc/terms/modified"
},
"object" : {
"datatype" : "http://www.w3.org/2001/XMLSchema#dateTime",
"type" : "literal",
"value" : "Mon, 01 Sep 2014 14:18:00 +0100"
}
}, {
"subject" : {
"type" : "uri",
"value" : "http://data.open.ac.uk/openlearn/science-maths-technology/three-ways-your-personal-photos-are-vulnerable-hackers"
},
"predicate" : {
"type" : "uri",
"value" : "http://purl.org/dc/terms/publisher"
},
"object" : {
"type" : "uri",
"value" : "http://data.open.ac.uk/organization/the_open_university"
}
}, {
"subject" : {
"type" : "uri",
"value" : "http://data.open.ac.uk/openlearn/science-maths-technology/three-ways-your-personal-photos-are-vulnerable-hackers"
},
"predicate" : {
"type" : "uri",
"value" : "http://purl.org/dc/terms/title"
},
"object" : {
"type" : "literal",
"value" : "Three ways your personal photos are vulnerable to hackers"
}
}, {
"subject" : {
"type" : "uri",
"value" : "http://data.open.ac.uk/openlearn/science-maths-technology/three-ways-your-personal-photos-are-vulnerable-hackers"
},
"predicate" : {
"type" : "uri",
"value" : "http://rdfs.org/ns/void#inDataset"
},
"object" : {
"type" : "uri",
"value" : "http://data.open.ac.uk/context/openlearn"
}
}, {
"subject" : {
"type" : "uri",
"value" : "http://data.open.ac.uk/openlearn/science-maths-technology/three-ways-your-personal-photos-are-vulnerable-hackers"
},
"predicate" : {
"type" : "uri",
"value" : "http://rdfs.org/ns/void#inDataset"
},
"object" : {
"type" : "uri",
"value" : "http://data.open.ac.uk/context/openlearnexplore"
}
} ]
}
}