• Smart Citizen Cyber Resilience Ontology (SC2RO)
  • Entities A-Z
  • Classes
  • Properties
  • Statistics
  • Classes (349)
  • sc2r:AbsorbMeasure
  • sc2r:Abuse
  • sc2r:Abused
  • sc2r:AccessControl
  • sc2r:AccountHijacking
  • sc2r:AccountRecovery
  • sc2r:ActiveMediation
  • sc2r:ActivityData
  • sc2r:AdaptMeasure
  • sc2r:Addiction
  • sc2r:Agency
  • sc2r:AlternativeResource
  • sc2r:AnglerPhishing
  • sc2r:AnonymityThreat
  • sc2r:AnonymousRouting
  • sc2r:AnticipateMeasure
  • sc2r:Assembly
  • sc2r:AssetInventory
  • sc2r:AttitudinalMeasure
  • sc2r:AuthenticationThreat
  • sc2r:AvailabilityThreat
  • sc2r:Awareness
  • sc2r:Baiting
  • sc2r:BandwagonEffect
  • sc2r:BeCritical
  • sc2r:BeSuspicious
  • sc2r:BeVigilant
  • sc2r:BehaviouralData
  • sc2r:BiometricToken
  • sc2r:BlackPropaganda
  • sc2r:Blacklisted
  • sc2r:BodilyInjury
  • sc2r:BoyfriendingGirlfriending
  • sc2r:CapacityBuilding
  • sc2r:Catphishing
  • sc2r:Censorship
  • sc2r:Cheerleading
  • sc2r:Coercion
  • sc2r:CognitiveImpairement
  • sc2r:CognitiveThreat
  • sc2r:CompensationPayment
  • sc2r:Compromised
  • sc2r:Computer
  • sc2r:ComputingAsset
  • sc2r:ConfidentialityThreat
  • sc2r:Conflict
  • sc2r:ConfrontThreat
  • sc2r:Confusion
  • sc2r:Conscientiousness
  • sc2r:ContractBreach
  • sc2r:Corrupted
  • sc2r:Credential
  • sc2r:Curiosity
  • sc2r:CyberPredator
  • sc2r:CyberStalking
  • sc2r:Cyberbullying
  • sc2r:CyptoCurrency
  • sc2r:Damage
  • sc2r:DamagedRelationship
  • sc2r:DamagedSocialPerception
  • sc2r:DarkAdvertising
  • sc2r:Data
  • sc2r:DataBreach
  • sc2r:DataCorruption
  • sc2r:DataError
  • sc2r:DataLeak
  • sc2r:DataRecovery
  • sc2r:DataRedundancy
  • sc2r:DataToken
  • sc2r:DataVulnerability
  • sc2r:Deceit
  • sc2r:DemographicInformation
  • sc2r:DenialOfService
  • sc2r:Depressed
  • sc2r:Destroyed
  • sc2r:DeviceIdentification
  • sc2r:DiffusionOfResponsibility
  • sc2r:Digital
  • sc2r:DigitalFootprint
  • sc2r:DigitalHoarding
  • sc2r:DigitalResource
  • sc2r:Discomfort
  • sc2r:DisconnectMeasure
  • sc2r:Disempowerment
  • sc2r:Disinformation
  • sc2r:DisruptedIncome
  • sc2r:DisruptedWork
  • sc2r:Disruption
  • sc2r:Distraction
  • sc2r:Doxing
  • sc2r:Eavesdropping
  • sc2r:EconomicHarm
  • sc2r:Electricity
  • sc2r:EmailHygiene
  • sc2r:Embarrassed
  • sc2r:EngageMeasure
  • sc2r:EngineeredContent
  • sc2r:EnvironmentalThreat
  • sc2r:Evolve
  • sc2r:Exposed
  • sc2r:Expression
  • sc2r:ExternalHardDrive
  • sc2r:ExternalSupport
  • sc2r:ExtorsionPayment
  • sc2r:Extortion
  • sc2r:Fabrication
  • sc2r:Fact-checking
  • sc2r:FailureDetection
  • sc2r:FakeGiveways
  • sc2r:FakeNews
  • sc2r:Fear
  • sc2r:FeelingUpset
  • sc2r:File
  • sc2r:FinancialData
  • sc2r:Fine
  • sc2r:Firehosing
  • sc2r:Firewall
  • sc2r:Flaming
  • sc2r:Flooding
  • sc2r:Forging
  • sc2r:Fraud
  • sc2r:Frustration
  • sc2r:GishGalloping
  • sc2r:Gluttony
  • sc2r:Greed
  • sc2r:Grooming
  • sc2r:Guilt
  • sc2r:Guilty
  • sc2r:HardwareVulnerability
  • sc2r:Harm
  • sc2r:Helpfulness
  • sc2r:HumorAndMeme
  • sc2r:Identification
  • sc2r:IdentifyingData
  • sc2r:Identity
  • sc2r:IdentityTheft
  • sc2r:IdentityTheftLoss
  • sc2r:ImpairedPrivateSocialBoundary
  • sc2r:Impulsiveness
  • sc2r:InadvertentDisclosure
  • sc2r:InappropriateContent
  • sc2r:IncidentReporting
  • sc2r:IncreaseResources
  • sc2r:Individual
  • sc2r:IndividualResource
  • sc2r:Infected
  • sc2r:InfluenceOperation
  • sc2r:InfluenceThreat
  • sc2r:Information
  • sc2r:InformationFlooding
  • sc2r:InformationOverload
  • sc2r:InformationalPrivacy
  • sc2r:InfrastructureResource
  • sc2r:InstitutionalThreat
  • sc2r:IntegrityThreat
  • sc2r:Interception
  • sc2r:InternetConnectivity
  • sc2r:IntimacyThreat
  • sc2r:IntrusionDetection
  • sc2r:IsolateMeasure
  • sc2r:Isolation
  • sc2r:Knowledge
  • sc2r:Laptop
  • sc2r:Laundering
  • sc2r:LeastPrivilege
  • sc2r:LocationData
  • sc2r:LoggingAndAudit
  • sc2r:LossOfConfidence
  • sc2r:LossOfLife
  • sc2r:LossOfWork
  • sc2r:LostCredentials
  • sc2r:LostDevices
  • sc2r:LoveBombing
  • sc2r:LowMorale
  • sc2r:LowSatisfaction
  • sc2r:Luring
  • sc2r:Malfunction
  • sc2r:MaliciousContactRemoval
  • sc2r:MaliciousContentRemoval
  • sc2r:MaliciousSoftwareDetection
  • sc2r:MaliciousSoftwareRemoval
  • sc2r:MalignRhetoric
  • sc2r:Malinformation
  • sc2r:Malware
  • sc2r:Masquerading
  • sc2r:MediationMeasures
  • sc2r:MentalFaculties
  • sc2r:Microtargeting
  • sc2r:Misconfiguration
  • sc2r:Misinformation
  • sc2r:MisleadingAdvertising
  • sc2r:MisleadingInformation
  • sc2r:Misled
  • sc2r:Mistreatment
  • sc2r:MitigationCost
  • sc2r:MobileDevice
  • sc2r:MonitoringMeasure
  • sc2r:Motivation
  • sc2r:MultiFactorAuthentication
  • sc2r:MutualAuthentication
  • sc2r:NaturalDisaster
  • sc2r:NegativePerception
  • sc2r:NetworkEquipment
  • sc2r:NetworkIntrusion
  • sc2r:NetworkRedundancy
  • sc2r:NetworkVulnerability
  • sc2r:NonRepudiationThreat
  • sc2r:OffensiveLanguage
  • sc2r:OnlineServices
  • sc2r:Opinion
  • sc2r:OpposingInformation
  • sc2r:Overwhelmed
  • sc2r:Pain
  • sc2r:ParasocialHacking
  • sc2r:Parody
  • sc2r:PasswordManagement
  • sc2r:Persistence
  • sc2r:PersonalData
  • sc2r:PersonalThreat
  • sc2r:Phishing
  • sc2r:Physical
  • sc2r:PhysicalHarm
  • sc2r:PhysicalPrivacy
  • sc2r:PhysicalResource
  • sc2r:PhysicalRestriction
  • sc2r:PhysicalToken
  • sc2r:Piggybacking
  • sc2r:PointAndShriek
  • sc2r:Polarization
  • sc2r:Pornography
  • sc2r:PotemkinVillageEvidence
  • sc2r:PrepareMeasure
  • sc2r:Pretexting
  • sc2r:PreventionMeasure
  • sc2r:Privacy
  • sc2r:PrivacyThreat
  • sc2r:Profanity
  • sc2r:ProfessionalSupport
  • sc2r:Propaganda
  • sc2r:Prosecution
  • sc2r:PsychographicHacking
  • sc2r:PsychologicalHarm
  • sc2r:PsychologicalPrivacy
  • sc2r:QuidProQuo
  • sc2r:Radicalisation
  • sc2r:Raiding
  • sc2r:Ransomware
  • sc2r:Reconnaissance
  • sc2r:RecoverMeasure
  • sc2r:RecoveryPlan
  • sc2r:ReducedOpportunities
  • sc2r:ReducedPerformance
  • sc2r:RedundancyMeasure
  • sc2r:RemoteExecution
  • sc2r:RemovalMeasure
  • sc2r:Replay
  • sc2r:Reporting
  • sc2r:Reputation
  • sc2r:ReputationalHarm
  • sc2r:ReserveThreat
  • sc2r:Resource
  • sc2r:Response
  • sc2r:RestrictiveMediation
  • sc2r:Right
  • sc2r:SDCard
  • sc2r:Sandboxing
  • sc2r:Satire
  • sc2r:Scam
  • sc2r:ScamCost
  • sc2r:Scareware
  • sc2r:Sealioning
  • sc2r:SelfCensorship
  • sc2r:SelfHarm
  • sc2r:Server
  • sc2r:Sextortion
  • sc2r:SexualAbuse
  • sc2r:SexualAssault
  • sc2r:Shameful
  • sc2r:Shilling
  • sc2r:Skills
  • sc2r:Skimming
  • sc2r:Smishing
  • sc2r:SocialCapital
  • sc2r:SocialContact
  • sc2r:SocialEngineering
  • sc2r:SocialHacking
  • sc2r:SocialHarm
  • sc2r:SocialMediaHygiene
  • sc2r:SocialMediaMonitoring
  • sc2r:SocialNetwork
  • sc2r:SocialPrivacy
  • sc2r:SocialSupport
  • sc2r:SocialThreat
  • sc2r:SocialWithdrawal
  • sc2r:SociocognitiveHacking
  • sc2r:SockPuppetry
  • sc2r:Software
  • sc2r:SoftwareRedundancy
  • sc2r:SoftwareVulnerability
  • sc2r:SolitudeThreat
  • sc2r:SourceRedundancy
  • sc2r:SpamEmail
  • sc2r:SpearPhishing
  • sc2r:Spoofing
  • sc2r:StorageAsset
  • sc2r:Strawman
  • sc2r:Surveillance
  • sc2r:SweepstakesScam
  • sc2r:Sympathy
  • sc2r:SystemRecovery
  • sc2r:Tailgating
  • sc2r:TechnicalMediation
  • sc2r:TechnologicalThreat
  • sc2r:TerritorialPrivacy
  • sc2r:Theft
  • sc2r:TheftOfFinances
  • sc2r:TheftThreat
  • sc2r:Threat
  • sc2r:ThreatMonitoringMeasure
  • sc2r:TimeWasted
  • sc2r:Training
  • sc2r:Transfer
  • sc2r:Trolling
  • sc2r:TrustedData
  • sc2r:TrustedInformation
  • sc2r:TrustedInfrastructure
  • sc2r:TrustedNetworking
  • sc2r:TrustedSoftware
  • sc2r:USBDrive
  • sc2r:UnauthorizedAccess
  • sc2r:Unavailable
  • sc2r:UnderScrutiny
  • sc2r:UnsolicitedCommunication
  • sc2r:UnsolicitedSocialRequest
  • sc2r:Urgency
  • sc2r:UserGeneratedContent
  • sc2r:UserIdentification
  • sc2r:Vandalism
  • sc2r:Violation
  • sc2r:Violence
  • sc2r:VirtualPrivateNetwork
  • sc2r:Vishing
  • sc2r:Vulnerability
  • sc2r:WebHygiene
  • sc2r:Whaling
  • sc2r:WhatAboutism
  • sc2r:WithstandMeasure
  • sc2r:Worried
  • sc2r:YouAreNotImmune
  • Properties (23)
  • dc1:creator
  • dc1:description
  • dc1:rights
  • dc:creator
  • dc:description
  • dc:rights
  • sc2r:canBeResultOf
  • sc2r:canResultIn
  • sc2r:damages
  • sc2r:exploits
  • sc2r:hasDescription
  • sc2r:hasID
  • sc2r:hasVulnerability
  • sc2r:isAVulnerabilityOf
  • sc2r:isDamagedBy
  • sc2r:isExploitedBy
  • sc2r:isMitigatedBy
  • sc2r:isReducedBy
  • sc2r:isResultOf
  • sc2r:mitigates
  • sc2r:reduces
  • sc2r:relatesTo
  • sc2r:resultsIn







  1. Home
  2. Entities
  3. Properties

Properties Tree

Tree

dc1:creator
dc1:description
dc1:rights
dc:creator
dc:description
dc:rights
sc2r:canBeResultOf
sc2r:isResultOf
sc2r:canResultIn
sc2r:resultsIn
sc2r:damages
sc2r:exploits
sc2r:hasDescription
sc2r:hasID
sc2r:hasVulnerability
sc2r:isAVulnerabilityOf
sc2r:isDamagedBy
sc2r:isExploitedBy
sc2r:isMitigatedBy
sc2r:isReducedBy
sc2r:mitigates
sc2r:reduces
sc2r:relatesTo

Documentation automatically generated on 25th August 2020 with Ontospy (v1.9.8.3)