Graph: Smart Citizen Cyber Resilience Ontology (SC2RO)

The Smart Citizen Cyber Resilience Ontology (SC2RO) maps the cyber resilience landscape for individuals. It identifies cyber resources, vulnerabilities, threats, responses and harms associated with and specific to individual citizen's cyber functionings.

Ontology documentation automatically generated by Ontospy on 25th August 2020 12:18


 Table of Content


 A-Z of terms

This is a complete alphabetical A-Z index of all terms, by main logical type.
Classes (349) sc2r:AbsorbMeasure | sc2r:Abuse | sc2r:Abused | sc2r:AccessControl | sc2r:AccountHijacking | sc2r:AccountRecovery | sc2r:ActiveMediation | sc2r:ActivityData | sc2r:AdaptMeasure | sc2r:Addiction | sc2r:Agency | sc2r:AlternativeResource | sc2r:AnglerPhishing | sc2r:AnonymityThreat | sc2r:AnonymousRouting | sc2r:AnticipateMeasure | sc2r:Assembly | sc2r:AssetInventory | sc2r:AttitudinalMeasure | sc2r:AuthenticationThreat | sc2r:AvailabilityThreat | sc2r:Awareness | sc2r:Baiting | sc2r:BandwagonEffect | sc2r:BeCritical | sc2r:BeSuspicious | sc2r:BeVigilant | sc2r:BehaviouralData | sc2r:BiometricToken | sc2r:BlackPropaganda | sc2r:Blacklisted | sc2r:BodilyInjury | sc2r:BoyfriendingGirlfriending | sc2r:CapacityBuilding | sc2r:Catphishing | sc2r:Censorship | sc2r:Cheerleading | sc2r:Coercion | sc2r:CognitiveImpairement | sc2r:CognitiveThreat | sc2r:CompensationPayment | sc2r:Compromised | sc2r:Computer | sc2r:ComputingAsset | sc2r:ConfidentialityThreat | sc2r:Conflict | sc2r:ConfrontThreat | sc2r:Confusion | sc2r:Conscientiousness | sc2r:ContractBreach | sc2r:Corrupted | sc2r:Credential | sc2r:Curiosity | sc2r:CyberPredator | sc2r:CyberStalking | sc2r:Cyberbullying | sc2r:CyptoCurrency | sc2r:Damage | sc2r:DamagedRelationship | sc2r:DamagedSocialPerception | sc2r:DarkAdvertising | sc2r:Data | sc2r:DataBreach | sc2r:DataCorruption | sc2r:DataError | sc2r:DataLeak | sc2r:DataRecovery | sc2r:DataRedundancy | sc2r:DataToken | sc2r:DataVulnerability | sc2r:Deceit | sc2r:DemographicInformation | sc2r:DenialOfService | sc2r:Depressed | sc2r:Destroyed | sc2r:DeviceIdentification | sc2r:DiffusionOfResponsibility | sc2r:Digital | sc2r:DigitalFootprint | sc2r:DigitalHoarding | sc2r:DigitalResource | sc2r:Discomfort | sc2r:DisconnectMeasure | sc2r:Disempowerment | sc2r:Disinformation | sc2r:DisruptedIncome | sc2r:DisruptedWork | sc2r:Disruption | sc2r:Distraction | sc2r:Doxing | sc2r:Eavesdropping | sc2r:EconomicHarm | sc2r:Electricity | sc2r:EmailHygiene | sc2r:Embarrassed | sc2r:EngageMeasure | sc2r:EngineeredContent | sc2r:EnvironmentalThreat | sc2r:Evolve | sc2r:Exposed | sc2r:Expression | sc2r:ExternalHardDrive | sc2r:ExternalSupport | sc2r:ExtorsionPayment | sc2r:Extortion | sc2r:Fabrication | sc2r:Fact-checking | sc2r:FailureDetection | sc2r:FakeGiveways | sc2r:FakeNews | sc2r:Fear | sc2r:FeelingUpset | sc2r:File | sc2r:FinancialData | sc2r:Fine | sc2r:Firehosing | sc2r:Firewall | sc2r:Flaming | sc2r:Flooding | sc2r:Forging | sc2r:Fraud | sc2r:Frustration | sc2r:GishGalloping | sc2r:Gluttony | sc2r:Greed | sc2r:Grooming | sc2r:Guilt | sc2r:Guilty | sc2r:HardwareVulnerability | sc2r:Harm | sc2r:Helpfulness | sc2r:HumorAndMeme | sc2r:Identification | sc2r:IdentifyingData | sc2r:Identity | sc2r:IdentityTheft | sc2r:IdentityTheftLoss | sc2r:ImpairedPrivateSocialBoundary | sc2r:Impulsiveness | sc2r:InadvertentDisclosure | sc2r:InappropriateContent | sc2r:IncidentReporting | sc2r:IncreaseResources | sc2r:Individual | sc2r:IndividualResource | sc2r:Infected | sc2r:InfluenceOperation | sc2r:InfluenceThreat | sc2r:Information | sc2r:InformationFlooding | sc2r:InformationOverload | sc2r:InformationalPrivacy | sc2r:InfrastructureResource | sc2r:InstitutionalThreat | sc2r:IntegrityThreat | sc2r:Interception | sc2r:InternetConnectivity | sc2r:IntimacyThreat | sc2r:IntrusionDetection | sc2r:IsolateMeasure | sc2r:Isolation | sc2r:Knowledge | sc2r:Laptop | sc2r:Laundering | sc2r:LeastPrivilege | sc2r:LocationData | sc2r:LoggingAndAudit | sc2r:LossOfConfidence | sc2r:LossOfLife | sc2r:LossOfWork | sc2r:LostCredentials | sc2r:LostDevices | sc2r:LoveBombing | sc2r:LowMorale | sc2r:LowSatisfaction | sc2r:Luring | sc2r:Malfunction | sc2r:MaliciousContactRemoval | sc2r:MaliciousContentRemoval | sc2r:MaliciousSoftwareDetection | sc2r:MaliciousSoftwareRemoval | sc2r:MalignRhetoric | sc2r:Malinformation | sc2r:Malware | sc2r:Masquerading | sc2r:MediationMeasures | sc2r:MentalFaculties | sc2r:Microtargeting | sc2r:Misconfiguration | sc2r:Misinformation | sc2r:MisleadingAdvertising | sc2r:MisleadingInformation | sc2r:Misled | sc2r:Mistreatment | sc2r:MitigationCost | sc2r:MobileDevice | sc2r:MonitoringMeasure | sc2r:Motivation | sc2r:MultiFactorAuthentication | sc2r:MutualAuthentication | sc2r:NaturalDisaster | sc2r:NegativePerception | sc2r:NetworkEquipment | sc2r:NetworkIntrusion | sc2r:NetworkRedundancy | sc2r:NetworkVulnerability | sc2r:NonRepudiationThreat | sc2r:OffensiveLanguage | sc2r:OnlineServices | sc2r:Opinion | sc2r:OpposingInformation | sc2r:Overwhelmed | sc2r:Pain | sc2r:ParasocialHacking | sc2r:Parody | sc2r:PasswordManagement | sc2r:Persistence | sc2r:PersonalData | sc2r:PersonalThreat | sc2r:Phishing | sc2r:Physical | sc2r:PhysicalHarm | sc2r:PhysicalPrivacy | sc2r:PhysicalResource | sc2r:PhysicalRestriction | sc2r:PhysicalToken | sc2r:Piggybacking | sc2r:PointAndShriek | sc2r:Polarization | sc2r:Pornography | sc2r:PotemkinVillageEvidence | sc2r:PrepareMeasure | sc2r:Pretexting | sc2r:PreventionMeasure | sc2r:Privacy | sc2r:PrivacyThreat | sc2r:Profanity | sc2r:ProfessionalSupport | sc2r:Propaganda | sc2r:Prosecution | sc2r:PsychographicHacking | sc2r:PsychologicalHarm | sc2r:PsychologicalPrivacy | sc2r:QuidProQuo | sc2r:Radicalisation | sc2r:Raiding | sc2r:Ransomware | sc2r:Reconnaissance | sc2r:RecoverMeasure | sc2r:RecoveryPlan | sc2r:ReducedOpportunities | sc2r:ReducedPerformance | sc2r:RedundancyMeasure | sc2r:RemoteExecution | sc2r:RemovalMeasure | sc2r:Replay | sc2r:Reporting | sc2r:Reputation | sc2r:ReputationalHarm | sc2r:ReserveThreat | sc2r:Resource | sc2r:Response | sc2r:RestrictiveMediation | sc2r:Right | sc2r:SDCard | sc2r:Sandboxing | sc2r:Satire | sc2r:Scam | sc2r:ScamCost | sc2r:Scareware | sc2r:Sealioning | sc2r:SelfCensorship | sc2r:SelfHarm | sc2r:Server | sc2r:Sextortion | sc2r:SexualAbuse | sc2r:SexualAssault | sc2r:Shameful | sc2r:Shilling | sc2r:Skills | sc2r:Skimming | sc2r:Smishing | sc2r:SocialCapital | sc2r:SocialContact | sc2r:SocialEngineering | sc2r:SocialHacking | sc2r:SocialHarm | sc2r:SocialMediaHygiene | sc2r:SocialMediaMonitoring | sc2r:SocialNetwork | sc2r:SocialPrivacy | sc2r:SocialSupport | sc2r:SocialThreat | sc2r:SocialWithdrawal | sc2r:SociocognitiveHacking | sc2r:SockPuppetry | sc2r:Software | sc2r:SoftwareRedundancy | sc2r:SoftwareVulnerability | sc2r:SolitudeThreat | sc2r:SourceRedundancy | sc2r:SpamEmail | sc2r:SpearPhishing | sc2r:Spoofing | sc2r:StorageAsset | sc2r:Strawman | sc2r:Surveillance | sc2r:SweepstakesScam | sc2r:Sympathy | sc2r:SystemRecovery | sc2r:Tailgating | sc2r:TechnicalMediation | sc2r:TechnologicalThreat | sc2r:TerritorialPrivacy | sc2r:Theft | sc2r:TheftOfFinances | sc2r:TheftThreat | sc2r:Threat | sc2r:ThreatMonitoringMeasure | sc2r:TimeWasted | sc2r:Training | sc2r:Transfer | sc2r:Trolling | sc2r:TrustedData | sc2r:TrustedInformation | sc2r:TrustedInfrastructure | sc2r:TrustedNetworking | sc2r:TrustedSoftware | sc2r:USBDrive | sc2r:UnauthorizedAccess | sc2r:Unavailable | sc2r:UnderScrutiny | sc2r:UnsolicitedCommunication | sc2r:UnsolicitedSocialRequest | sc2r:Urgency | sc2r:UserGeneratedContent | sc2r:UserIdentification | sc2r:Vandalism | sc2r:Violation | sc2r:Violence | sc2r:VirtualPrivateNetwork | sc2r:Vishing | sc2r:Vulnerability | sc2r:WebHygiene | sc2r:Whaling | sc2r:WhatAboutism | sc2r:WithstandMeasure | sc2r:Worried | sc2r:YouAreNotImmune
Object Properties (15)  sc2r:canBeResultOf | sc2r:canResultIn | sc2r:damages | sc2r:exploits | sc2r:hasVulnerability | sc2r:isAVulnerabilityOf | sc2r:isDamagedBy | sc2r:isExploitedBy | sc2r:isMitigatedBy | sc2r:isReducedBy | sc2r:isResultOf | sc2r:mitigates | sc2r:reduces | sc2r:relatesTo | sc2r:resultsIn
Datatype Properties (2)  sc2r:hasDescription | sc2r:hasID
Annotation Properties (6)  dc:creator | dc:description | dc:rights | dc1:creator | dc1:description | dc1:rights

 Classes

Class: sc2r:AbsorbMeasure   back to top


Description
Responses are framed around four resilience phases of Prepare, Absorb, Recover, and Adapt. The Absorb phase is triggered by the occurrence of an adverse cyber event, which diminishes and degrades individuals’ overall core cyber functioning (i.e., harmful impact). The effectiveness of the Absorb measures adopted in this phase determines the extent of the impact of the adverse incident.

Inherits from (1):
sc2r:Response

Implementation:

@prefix owl: <http://www.w3.org/2002/07/owl#> .
@prefix rdfs: <http://www.w3.org/2000/01/rdf-schema#> .
@prefix sc2r: <http://cs.unu.edu/sc2r#> .

sc2r:AbsorbMeasure a owl:Class ;
rdfs:label "Absorb Measure" ;
rdfs:comment """Responses are framed around four resilience phases of Prepare, Absorb, Recover, and Adapt.

The Absorb phase is triggered by the occurrence of an adverse cyber event, which diminishes and degrades individuals’ overall core cyber functioning (i.e., harmful impact). The effectiveness of the Absorb measures adopted in this phase determines the extent of the impact of the adverse incident.""" ;
rdfs:subClassOf sc2r:Response .

Class: sc2r:Abuse   back to top


Description
Abuse threats emanate from the harmful treatment of individuals online.

Inherits from (2):
sc2r:PersonalThreat | sc2r:Threat

Implementation:

@prefix owl: <http://www.w3.org/2002/07/owl#> .
@prefix rdfs: <http://www.w3.org/2000/01/rdf-schema#> .
@prefix sc2r: <http://cs.unu.edu/sc2r#> .

sc2r:Abuse a owl:Class ;
rdfs:label "Abuse Threat"@en ;
rdfs:comment "Abuse threats emanate from the harmful treatment of individuals online." ;
rdfs:subClassOf sc2r:PersonalThreat .

Class: sc2r:Abused   back to top


NOTE sc2r:Abused is a leaf node.

Description
Abused Harm refers to misuse of physical or digital assets.

Inherits from (2):
sc2r:PhysicalHarm | sc2r:Harm

Implementation:

@prefix owl: <http://www.w3.org/2002/07/owl#> .
@prefix rdfs: <http://www.w3.org/2000/01/rdf-schema#> .
@prefix sc2r: <http://cs.unu.edu/sc2r#> .

sc2r:Abused a owl:Class ;
rdfs:label "Abused Harm" ;
rdfs:comment "Abused Harm refers to misuse of physical or digital assets." ;
rdfs:subClassOf sc2r:PhysicalHarm .

Class: sc2r:AccessControl   back to top


Description
Access control is the prevention measure that involves controlling and authorizing access to cyber resources.

Inherits from (3):
sc2r:PreventionMeasure | sc2r:PrepareMeasure | sc2r:Response

Implementation:

@prefix owl: <http://www.w3.org/2002/07/owl#> .
@prefix rdfs: <http://www.w3.org/2000/01/rdf-schema#> .
@prefix sc2r: <http://cs.unu.edu/sc2r#> .

sc2r:AccessControl a owl:Class ;
rdfs:label "Access Control" ;
rdfs:comment "Access control is the prevention measure that involves controlling and authorizing access to cyber resources." ;
rdfs:subClassOf sc2r:PreventionMeasure .

Class: sc2r:AccountHijacking   back to top


NOTE sc2r:AccountHijacking is a leaf node.

Description
This is the process where an individuals account is hijacked or stolen by someone else.

Inherits from (3):
sc2r:AuthenticationThreat | sc2r:TechnologicalThreat | sc2r:Threat

Implementation:

@prefix owl: <http://www.w3.org/2002/07/owl#> .
@prefix rdfs: <http://www.w3.org/2000/01/rdf-schema#> .
@prefix sc2r: <http://cs.unu.edu/sc2r#> .

sc2r:AccountHijacking a owl:Class ;
rdfs:label "Account Hijacking"@en ;
rdfs:comment "This is the process where an individuals account is hijacked or stolen by someone else."@en ;
rdfs:subClassOf sc2r:AuthenticationThreat .

Class: sc2r:AccountRecovery   back to top


NOTE sc2r:AccountRecovery is a leaf node.

Description
Account recovery measures involve restoring access and control of an account after an adverse cyber incident.

Inherits from (2):
sc2r:RecoverMeasure | sc2r:Response

Implementation:

@prefix owl: <http://www.w3.org/2002/07/owl#> .
@prefix rdfs: <http://www.w3.org/2000/01/rdf-schema#> .
@prefix sc2r: <http://cs.unu.edu/sc2r#> .

sc2r:AccountRecovery a owl:Class ;
rdfs:label "Account Recovery" ;
rdfs:comment "Account recovery measures involve restoring access and control of an account after an adverse cyber incident." ;
rdfs:subClassOf sc2r:RecoverMeasure .

Class: sc2r:ActiveMediation   back to top


NOTE sc2r:ActiveMediation is a leaf node.

Description
Active Mediation involves awareness-raising and discussion with potential victims of adverse cyber incidents.

Inherits from (3):
sc2r:MediationMeasures | sc2r:PrepareMeasure | sc2r:Response

Implementation:

@prefix owl: <http://www.w3.org/2002/07/owl#> .
@prefix rdfs: <http://www.w3.org/2000/01/rdf-schema#> .
@prefix sc2r: <http://cs.unu.edu/sc2r#> .

sc2r:ActiveMediation a owl:Class ;
rdfs:label "Active Mediation" ;
rdfs:comment "Active Mediation involves awareness-raising and discussion with potential victims of adverse cyber incidents." ;
rdfs:subClassOf sc2r:MediationMeasures .

Class: sc2r:ActivityData   back to top


NOTE sc2r:ActivityData is a leaf node.

Description
Activity Data is the record of any user action (online or in the physical world) that can be logged on a computer.

Inherits from (4):
sc2r:PersonalData | sc2r:Data | sc2r:DigitalResource | sc2r:Resource

Implementation:

@prefix owl: <http://www.w3.org/2002/07/owl#> .
@prefix rdfs: <http://www.w3.org/2000/01/rdf-schema#> .
@prefix sc2r: <http://cs.unu.edu/sc2r#> .

sc2r:ActivityData a owl:Class ;
rdfs:label "Activity Data" ;
rdfs:comment "Activity Data is the record of any user action (online or in the physical world) that can be logged on a computer." ;
rdfs:subClassOf sc2r:PersonalData .

Class: sc2r:AdaptMeasure   back to top


Description
Responses are framed around four resilience phases of Prepare, Absorb, Recover, and Adapt. Once baseline cyber functioning has been restored, the Adapt phase can commence and Adapt measures can be put in the place, using the learnings and experience from the adverse event to inform the evolution and increase in cyber functioning and to “bounce forward better”

Inherits from (1):
sc2r:Response

Implementation:

@prefix owl: <http://www.w3.org/2002/07/owl#> .
@prefix rdfs: <http://www.w3.org/2000/01/rdf-schema#> .
@prefix sc2r: <http://cs.unu.edu/sc2r#> .

sc2r:AdaptMeasure a owl:Class ;
rdfs:label "Adapt Measure" ;
rdfs:comment """Responses are framed around four resilience phases of Prepare, Absorb, Recover, and Adapt.

Once baseline cyber functioning has been restored, the Adapt phase can commence and Adapt measures can be put in the place, using the learnings and experience from the adverse event to inform the evolution and increase in cyber functioning and to “bounce forward better”""" ;
rdfs:subClassOf sc2r:Response .

Class: sc2r:Addiction   back to top


NOTE sc2r:Addiction is a leaf node.

Description
Addiction refers to the excessive, compulsive, non-productive use of the Internet by an individual desperately relying on it to occupy free time for recreation or social purposes.

Inherits from (2):
sc2r:PsychologicalHarm | sc2r:Harm

Implementation:

@prefix owl: <http://www.w3.org/2002/07/owl#> .
@prefix rdfs: <http://www.w3.org/2000/01/rdf-schema#> .
@prefix sc2r: <http://cs.unu.edu/sc2r#> .

sc2r:Addiction a owl:Class ;
rdfs:label "Addiction" ;
rdfs:comment "Addiction refers to the excessive, compulsive, non-productive use of the Internet by an individual desperately relying on it to occupy free time for recreation or social purposes." ;
rdfs:subClassOf sc2r:PsychologicalHarm .

Class: sc2r:Agency   back to top


Description
Agency is the ability to define one’s goals and act upon them.

Inherits from (2):
sc2r:IndividualResource | sc2r:Resource

Implementation:

@prefix owl: <http://www.w3.org/2002/07/owl#> .
@prefix rdfs: <http://www.w3.org/2000/01/rdf-schema#> .
@prefix sc2r: <http://cs.unu.edu/sc2r#> .

sc2r:Agency a owl:Class ;
rdfs:label "Agency" ;
rdfs:comment "Agency is the ability to define one’s goals and act upon them." ;
rdfs:subClassOf sc2r:IndividualResource .

Class: sc2r:AlternativeResource   back to top


NOTE sc2r:AlternativeResource is a leaf node.

Description
This measure involves engaging alternative complementary cyber resources to deal with incidents that have deminished cyber functioning of primary resources. For example, in cases of data corruption, the redundant backups of the data would be utilized. In cases where a computing device is damaged, an alternative device would be utilized.

Inherits from (3):
sc2r:WithstandMeasure | sc2r:AbsorbMeasure | sc2r:Response

Implementation:

@prefix owl: <http://www.w3.org/2002/07/owl#> .
@prefix rdfs: <http://www.w3.org/2000/01/rdf-schema#> .
@prefix sc2r: <http://cs.unu.edu/sc2r#> .

sc2r:AlternativeResource a owl:Class ;
rdfs:label "Alternative Resource Measure" ;
rdfs:comment """This measure involves engaging alternative complementary cyber resources to deal with incidents that have deminished cyber functioning of primary resources.

For example, in cases of data corruption, the redundant backups of the data would be utilized. In cases where a computing device is damaged, an alternative device would be utilized.""" ;
rdfs:subClassOf sc2r:WithstandMeasure .

Class: sc2r:AnglerPhishing   back to top


NOTE sc2r:AnglerPhishing is a leaf node.

Description
Angler Phishing occurs when individuals receive a message from a social media account masquerading as a corporate's customer support account that tricks them into handing over their sensitive information.

Inherits from (6):
sc2r:Phishing | sc2r:SocialEngineering | sc2r:InfluenceThreat | sc2r:CognitiveThreat | sc2r:PersonalThreat | sc2r:Threat

Implementation:

@prefix owl: <http://www.w3.org/2002/07/owl#> .
@prefix rdfs: <http://www.w3.org/2000/01/rdf-schema#> .
@prefix sc2r: <http://cs.unu.edu/sc2r#> .

sc2r:AnglerPhishing a owl:Class ;
rdfs:label "Angler Phishing"@en ;
rdfs:comment "Angler Phishing occurs when individuals receive a message from a social media account masquerading as a corporate's customer support account that tricks them into handing over their sensitive information." ;
rdfs:subClassOf sc2r:Phishing .

Class: sc2r:AnonymityThreat   back to top


NOTE sc2r:AnonymityThreat is a leaf node.

Description
Anonimity Threat occurs when individuals' preference to remain anonymous or unnoticed online is threatened.

Inherits from (3):
sc2r:PrivacyThreat | sc2r:PersonalThreat | sc2r:Threat

Implementation:

@prefix owl: <http://www.w3.org/2002/07/owl#> .
@prefix rdfs: <http://www.w3.org/2000/01/rdf-schema#> .
@prefix sc2r: <http://cs.unu.edu/sc2r#> .

sc2r:AnonymityThreat a owl:Class ;
rdfs:label "Anonymity Threat"@en ;
rdfs:comment "Anonimity Threat occurs when individuals' preference to remain anonymous or unnoticed online is threatened." ;
rdfs:subClassOf sc2r:PrivacyThreat .

Class: sc2r:AnonymousRouting   back to top


NOTE sc2r:AnonymousRouting is a leaf node.

Description
Anonymous routing is the use of computing networks in a way that protects communication from identification by third-party observers.

Inherits from (5):
sc2r:TrustedNetworking | sc2r:TrustedInfrastructure | sc2r:PreventionMeasure | sc2r:PrepareMeasure | sc2r:Response

Implementation:

@prefix owl: <http://www.w3.org/2002/07/owl#> .
@prefix rdfs: <http://www.w3.org/2000/01/rdf-schema#> .
@prefix sc2r: <http://cs.unu.edu/sc2r#> .

sc2r:AnonymousRouting a owl:Class ;
rdfs:label "Anonymous Routing" ;
rdfs:comment "Anonymous routing is the use of computing networks in a way that protects communication from identification by third-party observers." ;
rdfs:subClassOf sc2r:TrustedNetworking .

Class: sc2r:AnticipateMeasure   back to top


Description
Anticipate Measures are put in place by an individual to prepare for and anticipate the inevitability of adverse cyber incidents.

Inherits from (2):
sc2r:PrepareMeasure | sc2r:Response

Implementation:

@prefix owl: <http://www.w3.org/2002/07/owl#> .
@prefix rdfs: <http://www.w3.org/2000/01/rdf-schema#> .
@prefix sc2r: <http://cs.unu.edu/sc2r#> .

sc2r:AnticipateMeasure a owl:Class ;
rdfs:label "Anticipate Measure" ;
rdfs:comment "Anticipate Measures are put in place by an individual to prepare for and anticipate the inevitability of adverse cyber incidents." ;
rdfs:subClassOf sc2r:PrepareMeasure .

Class: sc2r:Assembly   back to top


NOTE sc2r:Assembly is a leaf node.

Description
The Rght to Assemble (freedom of association) is individual's right to gather and meet, both publicly and privately.

Inherits from (3):
sc2r:Right | sc2r:IndividualResource | sc2r:Resource

Implementation:

@prefix owl: <http://www.w3.org/2002/07/owl#> .
@prefix rdfs: <http://www.w3.org/2000/01/rdf-schema#> .
@prefix sc2r: <http://cs.unu.edu/sc2r#> .

sc2r:Assembly a owl:Class ;
rdfs:label "Right to Assembly" ;
rdfs:comment "The Rght to Assemble (freedom of association) is individual's right to gather and meet, both publicly and privately." ;
rdfs:subClassOf sc2r:Right .

Class: sc2r:AssetInventory   back to top


NOTE sc2r:AssetInventory is a leaf node.

Description
Asset Inventory Management involves maintaining a list of cyber resources and assets that individuals have access to.

Inherits from (4):
sc2r:Awareness | sc2r:AnticipateMeasure | sc2r:PrepareMeasure | sc2r:Response

Implementation:

@prefix owl: <http://www.w3.org/2002/07/owl#> .
@prefix rdfs: <http://www.w3.org/2000/01/rdf-schema#> .
@prefix sc2r: <http://cs.unu.edu/sc2r#> .

sc2r:AssetInventory a owl:Class ;
rdfs:label "Asset Inventory Management" ;
rdfs:comment "Asset Inventory Management involves maintaining a list of cyber resources and assets that individuals have access to." ;
rdfs:subClassOf sc2r:Awareness ;
owl:equivalentClass sc2r:DigitalFootprint .

Class: sc2r:AttitudinalMeasure   back to top


Description
Attitudinal Measures are attitudes that individuals can adopt in the context of preparing and planning for adverse cyber incidents.

Inherits from (3):
sc2r:AnticipateMeasure | sc2r:PrepareMeasure | sc2r:Response

Implementation:

@prefix owl: <http://www.w3.org/2002/07/owl#> .
@prefix rdfs: <http://www.w3.org/2000/01/rdf-schema#> .
@prefix sc2r: <http://cs.unu.edu/sc2r#> .

sc2r:AttitudinalMeasure a owl:Class ;
rdfs:label "Attitudinal Measure" ;
rdfs:comment "Attitudinal Measures are attitudes that individuals can adopt in the context of preparing and planning for adverse cyber incidents." ;
rdfs:subClassOf sc2r:AnticipateMeasure .

Class: sc2r:AuthenticationThreat   back to top


Description
Authentication threats compromise the Authentication cyber security goal.

Inherits from (2):
sc2r:TechnologicalThreat | sc2r:Threat

Implementation:

@prefix owl: <http://www.w3.org/2002/07/owl#> .
@prefix rdfs: <http://www.w3.org/2000/01/rdf-schema#> .
@prefix sc2r: <http://cs.unu.edu/sc2r#> .

sc2r:AuthenticationThreat a owl:Class ;
rdfs:label "Authentication Threat"@en ;
rdfs:comment "Authentication threats compromise the Authentication cyber security goal."@en ;
rdfs:subClassOf sc2r:TechnologicalThreat .

Class: sc2r:AvailabilityThreat   back to top


Description
Availability Threats compromise the Availability cyber security goal.

Inherits from (2):
sc2r:TechnologicalThreat | sc2r:Threat

Implementation:

@prefix owl: <http://www.w3.org/2002/07/owl#> .
@prefix rdfs: <http://www.w3.org/2000/01/rdf-schema#> .
@prefix sc2r: <http://cs.unu.edu/sc2r#> .

sc2r:AvailabilityThreat a owl:Class ;
rdfs:label "Availability Threat"@en ;
rdfs:comment "Availability Threats compromise the Availability cyber security goal."@en ;
rdfs:subClassOf sc2r:TechnologicalThreat .

Class: sc2r:Awareness   back to top


Description
Awareness measures enhance the ability of individuals to comprehend their cybersecurity landscape.

Inherits from (3):
sc2r:AnticipateMeasure | sc2r:PrepareMeasure | sc2r:Response

Implementation:

@prefix owl: <http://www.w3.org/2002/07/owl#> .
@prefix rdfs: <http://www.w3.org/2000/01/rdf-schema#> .
@prefix sc2r: <http://cs.unu.edu/sc2r#> .

sc2r:Awareness a owl:Class ;
rdfs:label "Awareness" ;
rdfs:comment "Awareness measures enhance the ability of individuals to comprehend their cybersecurity landscape." ;
rdfs:subClassOf sc2r:AnticipateMeasure .

Class: sc2r:Baiting   back to top


NOTE sc2r:Baiting is a leaf node.

Description
Baiting occurs when individuals are tricked into handing their login credentials to the perpetrator who leverages the offer of free items or goods.

Inherits from (5):
sc2r:SocialEngineering | sc2r:InfluenceThreat | sc2r:CognitiveThreat | sc2r:PersonalThreat | sc2r:Threat

Implementation:

@prefix owl: <http://www.w3.org/2002/07/owl#> .
@prefix rdfs: <http://www.w3.org/2000/01/rdf-schema#> .
@prefix sc2r: <http://cs.unu.edu/sc2r#> .

sc2r:Baiting a owl:Class ;
rdfs:label "Baiting"@en ;
rdfs:comment "Baiting occurs when individuals are tricked into handing their login credentials to the perpetrator who leverages the offer of free items or goods." ;
rdfs:subClassOf sc2r:SocialEngineering .

Class: sc2r:BandwagonEffect   back to top


NOTE sc2r:BandwagonEffect is a leaf node.

Description
Bandwagon Effect (contagion effect) refers to the creation of the illusion of group consensus to cause people to think or act in the same way as the group does.

Inherits from (5):
sc2r:PsychographicHacking | sc2r:InfluenceThreat | sc2r:CognitiveThreat | sc2r:PersonalThreat | sc2r:Threat

Implementation:

@prefix owl: <http://www.w3.org/2002/07/owl#> .
@prefix rdfs: <http://www.w3.org/2000/01/rdf-schema#> .
@prefix sc2r: <http://cs.unu.edu/sc2r#> .

sc2r:BandwagonEffect a owl:Class ;
rdfs:label "Bandwagon Effect" ;
rdfs:comment "Bandwagon Effect (contagion effect) refers to the creation of the illusion of group consensus to cause people to think or act in the same way as the group does." ;
rdfs:subClassOf sc2r:PsychographicHacking .

Class: sc2r:BeCritical   back to top


NOTE sc2r:BeCritical is a leaf node.

Description
This attitude emphasizes the need to be critical in online engagements. For example being critical with regard to news and content consumed online.

Inherits from (4):
sc2r:AttitudinalMeasure | sc2r:AnticipateMeasure | sc2r:PrepareMeasure | sc2r:Response

Implementation:

@prefix owl: <http://www.w3.org/2002/07/owl#> .
@prefix rdfs: <http://www.w3.org/2000/01/rdf-schema#> .
@prefix sc2r: <http://cs.unu.edu/sc2r#> .

sc2r:BeCritical a owl:Class ;
rdfs:label "Be Critical" ;
rdfs:comment """This attitude emphasizes the need to be critical in online engagements.

For example being critical with regard to news and content consumed online.""" ;
rdfs:subClassOf sc2r:AttitudinalMeasure .

Class: sc2r:BeSuspicious   back to top


NOTE sc2r:BeSuspicious is a leaf node.

Description
This attitude emphasizes the importance of being suspicious online. For example, being suspicious of unsolicited communication.

Inherits from (4):
sc2r:AttitudinalMeasure | sc2r:AnticipateMeasure | sc2r:PrepareMeasure | sc2r:Response

Implementation:

@prefix owl: <http://www.w3.org/2002/07/owl#> .
@prefix rdfs: <http://www.w3.org/2000/01/rdf-schema#> .
@prefix sc2r: <http://cs.unu.edu/sc2r#> .

sc2r:BeSuspicious a owl:Class ;
rdfs:label "Be Suspicious" ;
rdfs:comment """This attitude emphasizes the importance of being suspicious online.

For example, being suspicious of unsolicited communication.""" ;
rdfs:subClassOf sc2r:AttitudinalMeasure .

Class: sc2r:BeVigilant   back to top


NOTE sc2r:BeVigilant is a leaf node.

Description
This attitude emphasizes the need to be vigilant online.

Inherits from (4):
sc2r:AttitudinalMeasure | sc2r:AnticipateMeasure | sc2r:PrepareMeasure | sc2r:Response

Implementation:

@prefix owl: <http://www.w3.org/2002/07/owl#> .
@prefix rdfs: <http://www.w3.org/2000/01/rdf-schema#> .
@prefix sc2r: <http://cs.unu.edu/sc2r#> .

sc2r:BeVigilant a owl:Class ;
rdfs:label "Be Vigilant" ;
rdfs:comment "This attitude emphasizes the need to be vigilant online." ;
rdfs:subClassOf sc2r:AttitudinalMeasure .

Class: sc2r:BehaviouralData   back to top


NOTE sc2r:BehaviouralData is a leaf node.

Description
Behavioural Data refers to data collected from individuals' online activities, typically commercial behaviour using a range of devices connected to the Internet. Behavioural data tracks the sites visited, the apps downloaded, or the games played.

Inherits from (4):
sc2r:PersonalData | sc2r:Data | sc2r:DigitalResource | sc2r:Resource

Implementation:

@prefix owl: <http://www.w3.org/2002/07/owl#> .
@prefix rdfs: <http://www.w3.org/2000/01/rdf-schema#> .
@prefix sc2r: <http://cs.unu.edu/sc2r#> .

sc2r:BehaviouralData a owl:Class ;
rdfs:label "Behavioral Data" ;
rdfs:comment "Behavioural Data refers to data collected from individuals' online activities, typically commercial behaviour using a range of devices connected to the Internet. Behavioural data tracks the sites visited, the apps downloaded, or the games played." ;
rdfs:subClassOf sc2r:PersonalData .

Class: sc2r:BiometricToken   back to top


NOTE sc2r:BiometricToken is a leaf node.

Description
Biometric Token is a biometric-based security token that is used for authentication or verification purpose.

Inherits from (6):
sc2r:Credential | sc2r:IdentifyingData | sc2r:PersonalData | sc2r:Data | sc2r:DigitalResource | sc2r:Resource

Implementation:

@prefix owl: <http://www.w3.org/2002/07/owl#> .
@prefix rdfs: <http://www.w3.org/2000/01/rdf-schema#> .
@prefix sc2r: <http://cs.unu.edu/sc2r#> .

sc2r:BiometricToken a owl:Class ;
rdfs:label "Biometric Token" ;
rdfs:comment "Biometric Token is a biometric-based security token that is used for authentication or verification purpose." ;
rdfs:subClassOf sc2r:Credential .

Class: sc2r:BlackPropaganda   back to top


NOTE sc2r:BlackPropaganda is a leaf node.

Description
Where white propaganda clearly states its source and grey propaganda obscures its origins, black propaganda actively deceives about its origins.

Inherits from (3):
sc2r:SocialHacking | sc2r:SocialThreat | sc2r:Threat

Implementation:

@prefix owl: <http://www.w3.org/2002/07/owl#> .
@prefix rdfs: <http://www.w3.org/2000/01/rdf-schema#> .
@prefix sc2r: <http://cs.unu.edu/sc2r#> .

sc2r:BlackPropaganda a owl:Class ;
rdfs:label "Black Propaganda"@en ;
rdfs:comment "Where white propaganda clearly states its source and grey propaganda obscures its origins, black propaganda actively deceives about its origins."@en ;
rdfs:subClassOf sc2r:SocialHacking .

Class: sc2r:Blacklisted   back to top


NOTE sc2r:Blacklisted is a leaf node.

Description
Blacklisted refers to the state in which the individual is regarded as unacceptable or untrustworthy and should be excluded or avoided.

Inherits from (2):
sc2r:ReputationalHarm | sc2r:Harm

Implementation:

@prefix owl: <http://www.w3.org/2002/07/owl#> .
@prefix rdfs: <http://www.w3.org/2000/01/rdf-schema#> .
@prefix sc2r: <http://cs.unu.edu/sc2r#> .

sc2r:Blacklisted a owl:Class ;
rdfs:label "Blacklisted" ;
rdfs:comment "Blacklisted refers to the state in which the individual is regarded as unacceptable or untrustworthy and should be excluded or avoided." ;
rdfs:subClassOf sc2r:ReputationalHarm .

Class: sc2r:BodilyInjury   back to top


Description
Bodily Injury refers to the wound caused to individual's body.

Inherits from (2):
sc2r:PhysicalHarm | sc2r:Harm

Implementation:

@prefix owl: <http://www.w3.org/2002/07/owl#> .
@prefix rdfs: <http://www.w3.org/2000/01/rdf-schema#> .
@prefix sc2r: <http://cs.unu.edu/sc2r#> .

sc2r:BodilyInjury a owl:Class ;
rdfs:label "Bodily Injury" ;
rdfs:comment "Bodily Injury refers to the wound caused to individual's body." ;
rdfs:subClassOf sc2r:PhysicalHarm .

Class: sc2r:BoyfriendingGirlfriending   back to top


NOTE sc2r:BoyfriendingGirlfriending is a leaf node.

Description
Boyfriending/girlfriending occurs when individuals are manipulated into thinking that they are in a relationship with the perpetrator.

Inherits from (4):
sc2r:SexualAbuse | sc2r:Abuse | sc2r:PersonalThreat | sc2r:Threat

Implementation:

@prefix owl: <http://www.w3.org/2002/07/owl#> .
@prefix rdfs: <http://www.w3.org/2000/01/rdf-schema#> .
@prefix sc2r: <http://cs.unu.edu/sc2r#> .

sc2r:BoyfriendingGirlfriending a owl:Class ;
rdfs:label "Boyfriending and Girlfriending" ;
rdfs:comment "Boyfriending/girlfriending occurs when individuals are manipulated into thinking that they are in a relationship with the perpetrator." ;
rdfs:subClassOf sc2r:SexualAbuse .

Class: sc2r:CapacityBuilding   back to top


NOTE sc2r:CapacityBuilding is a leaf node.

Description
The capacity-building measures involve increasing the level of nominal cyber functioning of individuals.

Inherits from (2):
sc2r:AdaptMeasure | sc2r:Response

Implementation:

@prefix owl: <http://www.w3.org/2002/07/owl#> .
@prefix rdfs: <http://www.w3.org/2000/01/rdf-schema#> .
@prefix sc2r: <http://cs.unu.edu/sc2r#> .

sc2r:CapacityBuilding a owl:Class ;
rdfs:label "Capacity-building" ;
rdfs:comment "The capacity-building measures involve increasing the level of nominal cyber functioning of individuals." ;
rdfs:subClassOf sc2r:AdaptMeasure .

Class: sc2r:Catphishing   back to top


NOTE sc2r:Catphishing is a leaf node.

Description
Catphishing occurs when individuals are targeted by the perpetrator who creates a fictitious online profile to seduce them into a fictitious online relationship in order to benefit from them. The perpetrator often uses social media or dating sites to get to their target.

Inherits from (6):
sc2r:Phishing | sc2r:SocialEngineering | sc2r:InfluenceThreat | sc2r:CognitiveThreat | sc2r:PersonalThreat | sc2r:Threat

Implementation:

@prefix owl: <http://www.w3.org/2002/07/owl#> .
@prefix rdfs: <http://www.w3.org/2000/01/rdf-schema#> .
@prefix sc2r: <http://cs.unu.edu/sc2r#> .

sc2r:Catphishing a owl:Class ;
rdfs:label "Catphishing"@en ;
rdfs:comment "Catphishing occurs when individuals are targeted by the perpetrator who creates a fictitious online profile to seduce them into a fictitious online relationship in order to benefit from them. The perpetrator often uses social media or dating sites to get to their target." ;
rdfs:subClassOf sc2r:Phishing .

Class: sc2r:Censorship   back to top


NOTE sc2r:Censorship is a leaf node.

Description
Censorship occurs when individuals are suppressed or constrained by institutions from achieving specific cyber functionings - including consuming and producing information, accessing content, software, or media.

Inherits from (3):
sc2r:InstitutionalThreat | sc2r:EnvironmentalThreat | sc2r:Threat

Implementation:

@prefix owl: <http://www.w3.org/2002/07/owl#> .
@prefix rdfs: <http://www.w3.org/2000/01/rdf-schema#> .
@prefix sc2r: <http://cs.unu.edu/sc2r#> .

sc2r:Censorship a owl:Class ;
rdfs:label "Censorship"@en ;
rdfs:comment "Censorship occurs when individuals are suppressed or constrained by institutions from achieving specific cyber functionings - including consuming and producing information, accessing content, software, or media."@en ;
rdfs:subClassOf sc2r:InstitutionalThreat .

Class: sc2r:Cheerleading   back to top


NOTE sc2r:Cheerleading is a leaf node.

Description
Using information influence techniques to crowd out dissent.

Inherits from (3):
sc2r:SocialHacking | sc2r:SocialThreat | sc2r:Threat

Implementation:

@prefix owl: <http://www.w3.org/2002/07/owl#> .
@prefix rdfs: <http://www.w3.org/2000/01/rdf-schema#> .
@prefix sc2r: <http://cs.unu.edu/sc2r#> .

sc2r:Cheerleading a owl:Class ;
rdfs:label "Cheerleading"@en ;
rdfs:comment "Using information influence techniques to crowd out dissent."@en ;
rdfs:subClassOf sc2r:SocialHacking .

Class: sc2r:Coercion   back to top


NOTE sc2r:Coercion is a leaf node.

Description
Coercion occurs when individuals are persuaded by threats or force to do something.

Inherits from (4):
sc2r:InfluenceThreat | sc2r:CognitiveThreat | sc2r:PersonalThreat | sc2r:Threat

Implementation:

@prefix owl: <http://www.w3.org/2002/07/owl#> .
@prefix rdfs: <http://www.w3.org/2000/01/rdf-schema#> .
@prefix sc2r: <http://cs.unu.edu/sc2r#> .

sc2r:Coercion a owl:Class ;
rdfs:label "Coercion"@en ;
rdfs:comment "Coercion occurs when individuals are persuaded by threats or force to do something." ;
rdfs:subClassOf sc2r:InfluenceThreat .

Class: sc2r:CognitiveImpairement   back to top


NOTE sc2r:CognitiveImpairement is a leaf node.

Description
Cognitive Impairment refers to the state in which the individual has trouble remembering, learning new things, concentrating, or making decisions that affect their everyday life.

Inherits from (2):
sc2r:PsychologicalHarm | sc2r:Harm

Implementation:

@prefix owl: <http://www.w3.org/2002/07/owl#> .
@prefix rdfs: <http://www.w3.org/2000/01/rdf-schema#> .
@prefix sc2r: <http://cs.unu.edu/sc2r#> .

sc2r:CognitiveImpairement a owl:Class ;
rdfs:label "Cognitive Impairement" ;
rdfs:comment "Cognitive Impairment refers to the state in which the individual has trouble remembering, learning new things, concentrating, or making decisions that affect their everyday life." ;
rdfs:subClassOf sc2r:PsychologicalHarm .

Class: sc2r:CognitiveThreat   back to top


Description
Cognitive and Influece Threats are adverse incidents that compromise or affect individuals cognitive functioning. They include efforts to influence the perceptions, behaviour, and decisions of individuals for the benefit of others.

Inherits from (2):
sc2r:PersonalThreat | sc2r:Threat

Implementation:

@prefix owl: <http://www.w3.org/2002/07/owl#> .
@prefix rdfs: <http://www.w3.org/2000/01/rdf-schema#> .
@prefix sc2r: <http://cs.unu.edu/sc2r#> .

sc2r:CognitiveThreat a owl:Class ;
rdfs:label "Cognitive Threat"@en ;
rdfs:comment "Cognitive and Influece Threats are adverse incidents that compromise or affect individuals cognitive functioning. They include efforts to influence the perceptions, behaviour, and decisions of individuals for the benefit of others."@en ;
rdfs:subClassOf sc2r:PersonalThreat .

Class: sc2r:CompensationPayment   back to top


NOTE sc2r:CompensationPayment is a leaf node.

Description
Compensation Payment is the costs that the individual has to pay as compensation to those affected by the incident.

Inherits from (2):
sc2r:EconomicHarm | sc2r:Harm

Implementation:

@prefix owl: <http://www.w3.org/2002/07/owl#> .
@prefix rdfs: <http://www.w3.org/2000/01/rdf-schema#> .
@prefix sc2r: <http://cs.unu.edu/sc2r#> .

sc2r:CompensationPayment a owl:Class ;
rdfs:label "Compensation Payment" ;
rdfs:comment "Compensation Payment is the costs that the individual has to pay as compensation to those affected by the incident." ;
rdfs:subClassOf sc2r:EconomicHarm .

Class: sc2r:Compromised   back to top


NOTE sc2r:Compromised is a leaf node.

Description
Comprised is the state in which the resources are physically or digitally affected.

Inherits from (2):
sc2r:PhysicalHarm | sc2r:Harm

Implementation:

@prefix owl: <http://www.w3.org/2002/07/owl#> .
@prefix rdfs: <http://www.w3.org/2000/01/rdf-schema#> .
@prefix sc2r: <http://cs.unu.edu/sc2r#> .

sc2r:Compromised a owl:Class ;
rdfs:label "Compromised" ;
rdfs:comment "Comprised is the state in which the resources are physically or digitally affected." ;
rdfs:subClassOf sc2r:PhysicalHarm .

Class: sc2r:Computer   back to top


NOTE sc2r:Computer is a leaf node.

Description
Computer is an electronic device that can store, retrieve, and process data.

Inherits from (3):
sc2r:ComputingAsset | sc2r:PhysicalResource | sc2r:Resource

Implementation:

@prefix owl: <http://www.w3.org/2002/07/owl#> .
@prefix rdfs: <http://www.w3.org/2000/01/rdf-schema#> .
@prefix sc2r: <http://cs.unu.edu/sc2r#> .

sc2r:Computer a owl:Class ;
rdfs:label "Computer" ;
rdfs:comment "Computer is an electronic device that can store, retrieve, and process data." ;
rdfs:subClassOf sc2r:ComputingAsset .

Class: sc2r:ComputingAsset   back to top


Description
Computing Asset is any asset that utilises computing processes.

Inherits from (2):
sc2r:PhysicalResource | sc2r:Resource

Implementation:

@prefix owl: <http://www.w3.org/2002/07/owl#> .
@prefix rdfs: <http://www.w3.org/2000/01/rdf-schema#> .
@prefix sc2r: <http://cs.unu.edu/sc2r#> .

sc2r:ComputingAsset a owl:Class ;
rdfs:label "Computing Asset" ;
rdfs:comment "Computing Asset is any asset that utilises computing processes." ;
rdfs:subClassOf sc2r:PhysicalResource .

Class: sc2r:ConfidentialityThreat   back to top


Description
Confidentiality Threats compromise the Confidentiality cybersecurity goal.

Inherits from (2):
sc2r:TechnologicalThreat | sc2r:Threat

Implementation:

@prefix owl: <http://www.w3.org/2002/07/owl#> .
@prefix rdfs: <http://www.w3.org/2000/01/rdf-schema#> .
@prefix sc2r: <http://cs.unu.edu/sc2r#> .

sc2r:ConfidentialityThreat a owl:Class ;
rdfs:label "Confidentiality Threat"@en ;
rdfs:comment "Confidentiality Threats compromise the Confidentiality cybersecurity goal."@en ;
rdfs:subClassOf sc2r:TechnologicalThreat .

Class: sc2r:Conflict   back to top


NOTE sc2r:Conflict is a leaf node.

Description
Conflict refers to an active disagreement between the individual with those with opposing opinions or principles.

Inherits from (2):
sc2r:SocialHarm | sc2r:Harm

Implementation:

@prefix owl: <http://www.w3.org/2002/07/owl#> .
@prefix rdfs: <http://www.w3.org/2000/01/rdf-schema#> .
@prefix sc2r: <http://cs.unu.edu/sc2r#> .

sc2r:Conflict a owl:Class ;
rdfs:label "Conflict" ;
rdfs:comment "Conflict refers to an active disagreement between the individual with those with opposing opinions or principles." ;
rdfs:subClassOf sc2r:SocialHarm .

Class: sc2r:ConfrontThreat   back to top


NOTE sc2r:ConfrontThreat is a leaf node.

Description
Confronting the threat is an engage response that involves directly confronting the cyber threat. For examples, in the case of socio-technical threats, this involves direct engagement with the threat actors.

Inherits from (3):
sc2r:EngageMeasure | sc2r:AbsorbMeasure | sc2r:Response

Implementation:

@prefix owl: <http://www.w3.org/2002/07/owl#> .
@prefix rdfs: <http://www.w3.org/2000/01/rdf-schema#> .
@prefix sc2r: <http://cs.unu.edu/sc2r#> .

sc2r:ConfrontThreat a owl:Class ;
rdfs:label "Confront the Threat" ;
rdfs:comment "Confronting the threat is an engage response that involves directly confronting the cyber threat. For examples, in the case of socio-technical threats, this involves direct engagement with the threat actors." ;
rdfs:subClassOf sc2r:EngageMeasure .

Class: sc2r:Confusion   back to top


Description
Confusion refers to the state in which individuals being bewildered, uncertain, or unclear about something.

Inherits from (2):
sc2r:PsychologicalHarm | sc2r:Harm

Implementation:

@prefix owl: <http://www.w3.org/2002/07/owl#> .
@prefix rdfs: <http://www.w3.org/2000/01/rdf-schema#> .
@prefix sc2r: <http://cs.unu.edu/sc2r#> .

sc2r:Confusion a owl:Class ;
rdfs:label "Confusion" ;
rdfs:comment "Confusion refers to the state in which individuals being bewildered, uncertain, or unclear about something." ;
rdfs:subClassOf sc2r:PsychologicalHarm .

Class: sc2r:Conscientiousness   back to top


NOTE sc2r:Conscientiousness is a leaf node.

Description
Conscientiousness refers to individual's ability to control, regulate, and direct their impulses.

Inherits from (2):
sc2r:Individual | sc2r:Vulnerability

Implementation:

@prefix owl: <http://www.w3.org/2002/07/owl#> .
@prefix rdfs: <http://www.w3.org/2000/01/rdf-schema#> .
@prefix sc2r: <http://cs.unu.edu/sc2r#> .

sc2r:Conscientiousness a owl:Class ;
rdfs:label "Conscientiousness" ;
rdfs:comment "Conscientiousness refers to individual's ability to control, regulate, and direct their impulses." ;
rdfs:subClassOf sc2r:Individual .

Class: sc2r:ContractBreach   back to top


NOTE sc2r:ContractBreach is a leaf node.

Description
A contract breach occurs when individuals break conditions of a contract in the course of utilizing cyber resources.

Inherits from (4):
sc2r:Violation | sc2r:InstitutionalThreat | sc2r:EnvironmentalThreat | sc2r:Threat

Implementation:

@prefix owl: <http://www.w3.org/2002/07/owl#> .
@prefix rdfs: <http://www.w3.org/2000/01/rdf-schema#> .
@prefix sc2r: <http://cs.unu.edu/sc2r#> .

sc2r:ContractBreach a owl:Class ;
rdfs:label "Breach of Contract"@en ;
rdfs:comment "A contract breach occurs when individuals break conditions of a contract in the course of utilizing cyber resources."@en ;
rdfs:subClassOf sc2r:Violation .

Class: sc2r:Corrupted   back to top


NOTE sc2r:Corrupted is a leaf node.

Description
Corrupted is the state where the resources are being physically or digitally debased or their integrity affected.

Inherits from (2):
sc2r:PhysicalHarm | sc2r:Harm

Implementation:

@prefix owl: <http://www.w3.org/2002/07/owl#> .
@prefix rdfs: <http://www.w3.org/2000/01/rdf-schema#> .
@prefix sc2r: <http://cs.unu.edu/sc2r#> .

sc2r:Corrupted a owl:Class ;
rdfs:label "Corrupted" ;
rdfs:comment "Corrupted is the state where the resources are being physically or digitally debased or their integrity affected." ;
rdfs:subClassOf sc2r:PhysicalHarm .

Class: sc2r:Credential   back to top


Description
A Credential is the tool for authentication or verification. A credential may be part of a certificate or other authentication process that helps confirm a user’s identity in relation to a network address or other system ID.

Inherits from (5):
sc2r:IdentifyingData | sc2r:PersonalData | sc2r:Data | sc2r:DigitalResource | sc2r:Resource

Implementation:

@prefix owl: <http://www.w3.org/2002/07/owl#> .
@prefix rdfs: <http://www.w3.org/2000/01/rdf-schema#> .
@prefix sc2r: <http://cs.unu.edu/sc2r#> .

sc2r:Credential a owl:Class ;
rdfs:label "Credential" ;
rdfs:comment "A Credential is the tool for authentication or verification. A credential may be part of a certificate or other authentication process that helps confirm a user’s identity in relation to a network address or other system ID." ;
rdfs:subClassOf sc2r:IdentifyingData .

Class: sc2r:Curiosity   back to top


NOTE sc2r:Curiosity is a leaf node.

Description
Curiosity is the desire to learn or know about anything.

Inherits from (2):
sc2r:Individual | sc2r:Vulnerability

Implementation:

@prefix owl: <http://www.w3.org/2002/07/owl#> .
@prefix rdfs: <http://www.w3.org/2000/01/rdf-schema#> .
@prefix sc2r: <http://cs.unu.edu/sc2r#> .

sc2r:Curiosity a owl:Class ;
rdfs:label "Curiosity" ;
rdfs:comment "Curiosity is the desire to learn or know about anything." ;
rdfs:subClassOf sc2r:Individual .

Class: sc2r:CyberPredator   back to top


NOTE sc2r:CyberPredator is a leaf node.

Description
Cyber Predator refers to those who use the Internet to exploit others, usually young people, for emotional, sexual, and other purposes.

Inherits from (3):
sc2r:Abuse | sc2r:PersonalThreat | sc2r:Threat

Implementation:

@prefix owl: <http://www.w3.org/2002/07/owl#> .
@prefix rdfs: <http://www.w3.org/2000/01/rdf-schema#> .
@prefix sc2r: <http://cs.unu.edu/sc2r#> .

sc2r:CyberPredator a owl:Class ;
rdfs:label "Cyber Predator"@en ;
rdfs:comment "Cyber Predator refers to those who use the Internet to exploit others, usually young people, for emotional, sexual, and other purposes." ;
rdfs:subClassOf sc2r:Abuse .

Class: sc2r:CyberStalking   back to top


NOTE sc2r:CyberStalking is a leaf node.

Description
Cyber Stalking occurs to individuals when they are being stalked online or through the use of digital technology. Motives for cyber stalking may be to control or intimidate the victim, or to gather information for use in other crimes.

Inherits from (3):
sc2r:Abuse | sc2r:PersonalThreat | sc2r:Threat

Implementation:

@prefix owl: <http://www.w3.org/2002/07/owl#> .
@prefix rdfs: <http://www.w3.org/2000/01/rdf-schema#> .
@prefix sc2r: <http://cs.unu.edu/sc2r#> .

sc2r:CyberStalking a owl:Class ;
rdfs:label "Cyber Stalking"@en ;
rdfs:comment "Cyber Stalking occurs to individuals when they are being stalked online or through the use of digital technology. Motives for cyber stalking may be to control or intimidate the victim, or to gather information for use in other crimes." ;
rdfs:subClassOf sc2r:Abuse .

Class: sc2r:Cyberbullying   back to top


NOTE sc2r:Cyberbullying is a leaf node.

Description
Cyberbullying occurs when individuals are bullied, harassed, humiliated, threatened, embarrased, or targeted through the use of online communication methods.

Inherits from (3):
sc2r:Abuse | sc2r:PersonalThreat | sc2r:Threat

Implementation:

@prefix owl: <http://www.w3.org/2002/07/owl#> .
@prefix rdfs: <http://www.w3.org/2000/01/rdf-schema#> .
@prefix sc2r: <http://cs.unu.edu/sc2r#> .

sc2r:Cyberbullying a owl:Class ;
rdfs:label "Cyberbullying"@en ;
rdfs:comment "Cyberbullying occurs when individuals are bullied, harassed, humiliated, threatened, embarrased, or targeted through the use of online communication methods." ;
rdfs:subClassOf sc2r:Abuse .

Class: sc2r:CyptoCurrency   back to top


NOTE sc2r:CyptoCurrency is a leaf node.

Description
A Cryptocurrency is a digital or virtual currency that is secured by cryptography.

Inherits from (4):
sc2r:File | sc2r:Data | sc2r:DigitalResource | sc2r:Resource

Implementation:

@prefix owl: <http://www.w3.org/2002/07/owl#> .
@prefix rdfs: <http://www.w3.org/2000/01/rdf-schema#> .
@prefix sc2r: <http://cs.unu.edu/sc2r#> .

sc2r:CyptoCurrency a owl:Class ;
rdfs:label "Crypto Currency" ;
rdfs:comment "A Cryptocurrency is a digital or virtual currency that is secured by cryptography." ;
rdfs:subClassOf sc2r:File .

Class: sc2r:Damage   back to top


NOTE sc2r:Damage is a leaf node.

Description
These are damages to cyber resources, including data, software, and hard, that compromise the integrity and proper functioning of the resources.

Inherits from (3):
sc2r:IntegrityThreat | sc2r:TechnologicalThreat | sc2r:Threat

Implementation:

@prefix owl: <http://www.w3.org/2002/07/owl#> .
@prefix rdfs: <http://www.w3.org/2000/01/rdf-schema#> .
@prefix sc2r: <http://cs.unu.edu/sc2r#> .

sc2r:Damage a owl:Class ;
rdfs:label "Damage"@en ;
rdfs:comment "These are damages to cyber resources, including data, software, and hard, that compromise the integrity and proper functioning of the resources."@en ;
rdfs:subClassOf sc2r:IntegrityThreat .

Class: sc2r:DamagedRelationship   back to top


NOTE sc2r:DamagedRelationship is a leaf node.

Description
Damaged Relationship refers to an adverse change in relationship between the individuals with other people.

Inherits from (2):
sc2r:SocialHarm | sc2r:Harm

Implementation:

@prefix owl: <http://www.w3.org/2002/07/owl#> .
@prefix rdfs: <http://www.w3.org/2000/01/rdf-schema#> .
@prefix sc2r: <http://cs.unu.edu/sc2r#> .

sc2r:DamagedRelationship a owl:Class ;
rdfs:label "Damaged Relationship" ;
rdfs:comment "Damaged Relationship refers to an adverse change in relationship between the individuals with other people." ;
rdfs:subClassOf sc2r:SocialHarm .

Class: sc2r:DamagedSocialPerception   back to top


NOTE sc2r:DamagedSocialPerception is a leaf node.

Description
Damaged Social Perception refers to an adverse change in how the individual is regarded within their social network.

Inherits from (2):
sc2r:ReputationalHarm | sc2r:Harm

Implementation:

@prefix owl: <http://www.w3.org/2002/07/owl#> .
@prefix rdfs: <http://www.w3.org/2000/01/rdf-schema#> .
@prefix sc2r: <http://cs.unu.edu/sc2r#> .

sc2r:DamagedSocialPerception a owl:Class ;
rdfs:label "Damaged Social Perception" ;
rdfs:comment "Damaged Social Perception refers to an adverse change in how the individual is regarded within their social network." ;
rdfs:subClassOf sc2r:ReputationalHarm .

Class: sc2r:DarkAdvertising   back to top


NOTE sc2r:DarkAdvertising is a leaf node.

Description
Dark Advertising is a type of advertising where the message can only be seen by the advertiser and the specific target group. Other people with dissimilar interests or who fall outside of the target group will usually be completely unaware of their existence.

Inherits from (5):
sc2r:PsychographicHacking | sc2r:InfluenceThreat | sc2r:CognitiveThreat | sc2r:PersonalThreat | sc2r:Threat

Implementation:

@prefix owl: <http://www.w3.org/2002/07/owl#> .
@prefix rdfs: <http://www.w3.org/2000/01/rdf-schema#> .
@prefix sc2r: <http://cs.unu.edu/sc2r#> .

sc2r:DarkAdvertising a owl:Class ;
rdfs:label "Dark Advertising" ;
rdfs:comment "Dark Advertising is a type of advertising where the message can only be seen by the advertiser and the specific target group. Other people with dissimilar interests or who fall outside of the target group will usually be completely unaware of their existence." ;
rdfs:subClassOf sc2r:PsychographicHacking .

Class: sc2r:Data   back to top


Description
Data is information that has been translated into a form that is efficient for movement or processing.

Inherits from (2):
sc2r:DigitalResource | sc2r:Resource

Implementation:

@prefix owl: <http://www.w3.org/2002/07/owl#> .
@prefix rdfs: <http://www.w3.org/2000/01/rdf-schema#> .
@prefix sc2r: <http://cs.unu.edu/sc2r#> .

sc2r:Data a owl:Class ;
rdfs:label "Data" ;
rdfs:comment "Data is information that has been translated into a form that is efficient for movement or processing." ;
rdfs:subClassOf sc2r:DigitalResource .

Class: sc2r:DataBreach   back to top


NOTE sc2r:DataBreach is a leaf node.

Description
A data breach occurs when there is unauthorized access to data as a result of an attacker exploiting data systems which host individuals' confidential data. The source of data breaches is external.

Inherits from (3):
sc2r:ConfidentialityThreat | sc2r:TechnologicalThreat | sc2r:Threat

Implementation:

@prefix owl: <http://www.w3.org/2002/07/owl#> .
@prefix rdfs: <http://www.w3.org/2000/01/rdf-schema#> .
@prefix sc2r: <http://cs.unu.edu/sc2r#> .

sc2r:DataBreach a owl:Class ;
rdfs:label "Data Breach"@en ;
rdfs:comment "A data breach occurs when there is unauthorized access to data as a result of an attacker exploiting data systems which host individuals' confidential data. The source of data breaches is external."@en ;
rdfs:seeAlso sc2r:DataLeak ;
rdfs:subClassOf sc2r:ConfidentialityThreat .

Class: sc2r:DataCorruption   back to top


NOTE sc2r:DataCorruption is a leaf node.

Description
Data Corruption occurs when there are errors to data which compromise the integrity of the data.

Inherits from (3):
sc2r:IntegrityThreat | sc2r:TechnologicalThreat | sc2r:Threat

Implementation:

@prefix owl: <http://www.w3.org/2002/07/owl#> .
@prefix rdfs: <http://www.w3.org/2000/01/rdf-schema#> .
@prefix sc2r: <http://cs.unu.edu/sc2r#> .

sc2r:DataCorruption a owl:Class ;
rdfs:label "Data Corruption"@en ;
rdfs:comment "Data Corruption occurs when there are errors to data which compromise the integrity of the data."@en ;
rdfs:seeAlso sc2r:DataError ;
rdfs:subClassOf sc2r:IntegrityThreat .

Class: sc2r:DataError   back to top


NOTE sc2r:DataError is a leaf node.

Description
These are data errors that compromise the integrity of data.

Inherits from (3):
sc2r:IntegrityThreat | sc2r:TechnologicalThreat | sc2r:Threat

Implementation:

@prefix owl: <http://www.w3.org/2002/07/owl#> .
@prefix rdfs: <http://www.w3.org/2000/01/rdf-schema#> .
@prefix sc2r: <http://cs.unu.edu/sc2r#> .

sc2r:DataError a owl:Class ;
rdfs:label "Data Error"@en ;
rdfs:comment "These are data errors that compromise the integrity of data."@en ;
rdfs:seeAlso sc2r:DataCorruption ;
rdfs:subClassOf sc2r:IntegrityThreat .

Class: sc2r:DataLeak   back to top


NOTE sc2r:DataLeak is a leaf node.

Description
A data leak occurs when confidential information is made accessible to unauthorized individuals a a result of an internal factor.

Inherits from (3):
sc2r:ConfidentialityThreat | sc2r:TechnologicalThreat | sc2r:Threat

Implementation:

@prefix owl: <http://www.w3.org/2002/07/owl#> .
@prefix rdfs: <http://www.w3.org/2000/01/rdf-schema#> .
@prefix sc2r: <http://cs.unu.edu/sc2r#> .

sc2r:DataLeak a owl:Class ;
rdfs:label "Data Leak"@en ;
rdfs:comment "A data leak occurs when confidential information is made accessible to unauthorized individuals a a result of an internal factor."@en ;
rdfs:seeAlso sc2r:DataBreach ;
rdfs:subClassOf sc2r:ConfidentialityThreat .

Class: sc2r:DataRecovery   back to top


NOTE sc2r:DataRecovery is a leaf node.

Description
Data recovery measures involve the recovery of data resources, from data backups, to enable continued use of data after an adverse cyber incident, such as data corruption and loss.

Inherits from (2):
sc2r:RecoverMeasure | sc2r:Response

Implementation:

@prefix owl: <http://www.w3.org/2002/07/owl#> .
@prefix rdfs: <http://www.w3.org/2000/01/rdf-schema#> .
@prefix sc2r: <http://cs.unu.edu/sc2r#> .

sc2r:DataRecovery a owl:Class ;
rdfs:label "Data Recovery" ;
rdfs:comment "Data recovery measures involve the recovery of data resources, from data backups, to enable continued use of data after an adverse cyber incident, such as data corruption and loss." ;
rdfs:subClassOf sc2r:RecoverMeasure .

Class: sc2r:DataRedundancy   back to top


NOTE sc2r:DataRedundancy is a leaf node.

Description
Data redundancy measure involves having data backups and redundant data storage.

Inherits from (4):
sc2r:RedundancyMeasure | sc2r:AnticipateMeasure | sc2r:PrepareMeasure | sc2r:Response

Implementation:

@prefix owl: <http://www.w3.org/2002/07/owl#> .
@prefix rdfs: <http://www.w3.org/2000/01/rdf-schema#> .
@prefix sc2r: <http://cs.unu.edu/sc2r#> .

sc2r:DataRedundancy a owl:Class ;
rdfs:label "Data Redundancy" ;
rdfs:comment "Data redundancy measure involves having data backups and redundant data storage." ;
rdfs:subClassOf sc2r:RedundancyMeasure .

Class: sc2r:DataToken   back to top


NOTE sc2r:DataToken is a leaf node.

Description
Data Token is tokenized data access that is used to secure access to data.

Inherits from (6):
sc2r:Credential | sc2r:IdentifyingData | sc2r:PersonalData | sc2r:Data | sc2r:DigitalResource | sc2r:Resource

Implementation:

@prefix owl: <http://www.w3.org/2002/07/owl#> .
@prefix rdfs: <http://www.w3.org/2000/01/rdf-schema#> .
@prefix sc2r: <http://cs.unu.edu/sc2r#> .

sc2r:DataToken a owl:Class ;
rdfs:label "Data Token" ;
rdfs:comment "Data Token is tokenized data access that is used to secure access to data." ;
rdfs:subClassOf sc2r:Credential .

Class: sc2r:DataVulnerability   back to top


NOTE sc2r:DataVulnerability is a leaf node.

Description
Data Vulnerabilities are the weaknesses associated with data.

Inherits from (2):
sc2r:Digital | sc2r:Vulnerability

Implementation:

@prefix owl: <http://www.w3.org/2002/07/owl#> .
@prefix rdfs: <http://www.w3.org/2000/01/rdf-schema#> .
@prefix sc2r: <http://cs.unu.edu/sc2r#> .

sc2r:DataVulnerability a owl:Class ;
rdfs:label "Data Vulnerability" ;
rdfs:comment "Data Vulnerabilities are the weaknesses associated with data." ;
rdfs:subClassOf sc2r:Digital .

Class: sc2r:Deceit   back to top


Description
Threat of deceptive content and information

Inherits from (4):
sc2r:Disinformation | sc2r:CognitiveThreat | sc2r:PersonalThreat | sc2r:Threat

Implementation:

@prefix owl: <http://www.w3.org/2002/07/owl#> .
@prefix rdfs: <http://www.w3.org/2000/01/rdf-schema#> .
@prefix sc2r: <http://cs.unu.edu/sc2r#> .

sc2r:Deceit a owl:Class ;
rdfs:label "Deceit"@en ;
rdfs:comment "Threat of deceptive content and information"@en ;
rdfs:subClassOf sc2r:Disinformation .

Class: sc2r:DemographicInformation   back to top


NOTE sc2r:DemographicInformation is a leaf node.

Description
Demographic Information is information about groups of people according to certain attributes, such as age, gender, place of residence, and socio-economic status.

Inherits from (4):
sc2r:PersonalData | sc2r:Data | sc2r:DigitalResource | sc2r:Resource

Implementation:

@prefix owl: <http://www.w3.org/2002/07/owl#> .
@prefix rdfs: <http://www.w3.org/2000/01/rdf-schema#> .
@prefix sc2r: <http://cs.unu.edu/sc2r#> .

sc2r:DemographicInformation a owl:Class ;
rdfs:label "Demographic Information" ;
rdfs:comment "Demographic Information is information about groups of people according to certain attributes, such as age, gender, place of residence, and socio-economic status." ;
rdfs:subClassOf sc2r:PersonalData .

Class: sc2r:DenialOfService   back to top


NOTE sc2r:DenialOfService is a leaf node.

Description
A Denial of Service occurs when attackers maliciously restrict and limit access to information and services from legitimate users.

Inherits from (3):
sc2r:AvailabilityThreat | sc2r:TechnologicalThreat | sc2r:Threat

Implementation:

@prefix owl: <http://www.w3.org/2002/07/owl#> .
@prefix rdfs: <http://www.w3.org/2000/01/rdf-schema#> .
@prefix sc2r: <http://cs.unu.edu/sc2r#> .

sc2r:DenialOfService a owl:Class ;
rdfs:label "Denial of Service"@en ;
rdfs:comment "A Denial of Service occurs when attackers maliciously restrict and limit access to information and services from legitimate users."@en ;
rdfs:subClassOf sc2r:AvailabilityThreat .

Class: sc2r:Depressed   back to top


NOTE sc2r:Depressed is a leaf node.

Description
Depressed is the state in which the individual experiences low-spiritedness, unhappiness, or despondency.

Inherits from (2):
sc2r:PsychologicalHarm | sc2r:Harm

Implementation:

@prefix owl: <http://www.w3.org/2002/07/owl#> .
@prefix rdfs: <http://www.w3.org/2000/01/rdf-schema#> .
@prefix sc2r: <http://cs.unu.edu/sc2r#> .

sc2r:Depressed a owl:Class ;
rdfs:label "Depressed" ;
rdfs:comment "Depressed is the state in which the individual experiences low-spiritedness, unhappiness, or despondency." ;
rdfs:subClassOf sc2r:PsychologicalHarm .

Class: sc2r:Destroyed   back to top


NOTE sc2r:Destroyed is a leaf node.

Description
Destroyed refers to the state in which the resources being physically or digitally ruined.

Inherits from (2):
sc2r:PhysicalHarm | sc2r:Harm

Implementation:

@prefix owl: <http://www.w3.org/2002/07/owl#> .
@prefix rdfs: <http://www.w3.org/2000/01/rdf-schema#> .
@prefix sc2r: <http://cs.unu.edu/sc2r#> .

sc2r:Destroyed a owl:Class ;
rdfs:label "Destroyed" ;
rdfs:comment "Destroyed refers to the state in which the resources being physically or digitally ruined." ;
rdfs:subClassOf sc2r:PhysicalHarm .

Class: sc2r:DeviceIdentification   back to top


NOTE sc2r:DeviceIdentification is a leaf node.

Description
Device authentication is the process is verifying the identity of the devices that are used to connect to network resources.

Inherits from (4):
sc2r:Identification | sc2r:PreventionMeasure | sc2r:PrepareMeasure | sc2r:Response

Implementation:

@prefix owl: <http://www.w3.org/2002/07/owl#> .
@prefix rdfs: <http://www.w3.org/2000/01/rdf-schema#> .
@prefix sc2r: <http://cs.unu.edu/sc2r#> .

sc2r:DeviceIdentification a owl:Class ;
rdfs:label "Device Identification" ;
rdfs:comment "Device authentication is the process is verifying the identity of the devices that are used to connect to network resources." ;
rdfs:subClassOf sc2r:Identification .

Class: sc2r:DiffusionOfResponsibility   back to top


NOTE sc2r:DiffusionOfResponsibility is a leaf node.

Description
Diffusion of Responsibility is a psychological phenomenon in which individuals are less likely to take action or responsibility when in the presence of a large group of people.

Inherits from (2):
sc2r:Individual | sc2r:Vulnerability

Implementation:

@prefix owl: <http://www.w3.org/2002/07/owl#> .
@prefix rdfs: <http://www.w3.org/2000/01/rdf-schema#> .
@prefix sc2r: <http://cs.unu.edu/sc2r#> .

sc2r:DiffusionOfResponsibility a owl:Class ;
rdfs:label "Diffusion of Responsibility" ;
rdfs:comment "Diffusion of Responsibility is a psychological phenomenon in which individuals are less likely to take action or responsibility when in the presence of a large group of people." ;
rdfs:subClassOf sc2r:Individual .

Class: sc2r:Digital   back to top


Description
Digital Vulnerabilities are weaknesses associated with digital resources.

Inherits from (1):
sc2r:Vulnerability

Implementation:

@prefix owl: <http://www.w3.org/2002/07/owl#> .
@prefix rdfs: <http://www.w3.org/2000/01/rdf-schema#> .
@prefix sc2r: <http://cs.unu.edu/sc2r#> .

sc2r:Digital a owl:Class ;
rdfs:label "Digital Vulnerability" ;
rdfs:comment "Digital Vulnerabilities are weaknesses associated with digital resources." ;
rdfs:subClassOf sc2r:Vulnerability .

Class: sc2r:DigitalFootprint   back to top


NOTE sc2r:DigitalFootprint is a leaf node.

Description
Digital Footprint Management involves understanding the digital resources, including the trail of data, that is involved and used in individuals Cyber functionings.

Inherits from (4):
sc2r:Awareness | sc2r:AnticipateMeasure | sc2r:PrepareMeasure | sc2r:Response

Implementation:

@prefix owl: <http://www.w3.org/2002/07/owl#> .
@prefix rdfs: <http://www.w3.org/2000/01/rdf-schema#> .
@prefix sc2r: <http://cs.unu.edu/sc2r#> .

sc2r:DigitalFootprint a owl:Class ;
rdfs:label "Digital Footprint Management" ;
rdfs:comment "Digital Footprint Management involves understanding the digital resources, including the trail of data, that is involved and used in individuals Cyber functionings." ;
rdfs:subClassOf sc2r:Awareness .

Class: sc2r:DigitalHoarding   back to top


NOTE sc2r:DigitalHoarding is a leaf node.

Description
Digital hoarding (also known as e-hoarding, datahording or cyberhoarding) is excessive acquisition and reluctance to delete electronic material no longer valuable to the user.

Inherits from (3):
sc2r:CognitiveThreat | sc2r:PersonalThreat | sc2r:Threat

Implementation:

@prefix owl: <http://www.w3.org/2002/07/owl#> .
@prefix rdfs: <http://www.w3.org/2000/01/rdf-schema#> .
@prefix sc2r: <http://cs.unu.edu/sc2r#> .

sc2r:DigitalHoarding a owl:Class ;
rdfs:label "Digital Hoarding"@en ;
rdfs:comment "Digital hoarding (also known as e-hoarding, datahording or cyberhoarding) is excessive acquisition and reluctance to delete electronic material no longer valuable to the user."@en ;
rdfs:seeAlso "https://en.wikipedia.org/wiki/Digital_hoarding"@en ;
rdfs:subClassOf sc2r:CognitiveThreat .

Class: sc2r:DigitalResource   back to top


Description
Digital resources are resources that have been conceived and created digitally or by converting analogue materials to a digital format (digitised).

Inherits from (1):
sc2r:Resource

Implementation:

@prefix owl: <http://www.w3.org/2002/07/owl#> .
@prefix rdfs: <http://www.w3.org/2000/01/rdf-schema#> .
@prefix sc2r: <http://cs.unu.edu/sc2r#> .

sc2r:DigitalResource a owl:Class ;
rdfs:label "Digital Resource" ;
rdfs:comment "Digital resources are resources that have been conceived and created digitally or by converting analogue materials to a digital format (digitised)." ;
rdfs:subClassOf sc2r:Resource .

Class: sc2r:Discomfort   back to top


NOTE sc2r:Discomfort is a leaf node.

Description
Discomfort is the state in which the individual experiences uneasiness or anxiety.

Inherits from (2):
sc2r:PsychologicalHarm | sc2r:Harm

Implementation:

@prefix owl: <http://www.w3.org/2002/07/owl#> .
@prefix rdfs: <http://www.w3.org/2000/01/rdf-schema#> .
@prefix sc2r: <http://cs.unu.edu/sc2r#> .

sc2r:Discomfort a owl:Class ;
rdfs:label "Discomfort" ;
rdfs:comment "Discomfort is the state in which the individual experiences uneasiness or anxiety." ;
rdfs:subClassOf sc2r:PsychologicalHarm .

Class: sc2r:DisconnectMeasure   back to top


NOTE sc2r:DisconnectMeasure is a leaf node.

Description
The Disconnect measure involves removal of connection and interaction between the threat and the affected cyber resource. While the threat remains, the affected resource is removed from the attack situation. For example, in the case of a Remote Execution attack or Denial of Service attack, this could include physical disconnection of affected devices from the network. In the case of socio-technical threats, such as cyberbullying, it could include disconnecting from the relevant platform.

Inherits from (3):
sc2r:EngageMeasure | sc2r:AbsorbMeasure | sc2r:Response

Implementation:

@prefix owl: <http://www.w3.org/2002/07/owl#> .
@prefix rdfs: <http://www.w3.org/2000/01/rdf-schema#> .
@prefix sc2r: <http://cs.unu.edu/sc2r#> .

sc2r:DisconnectMeasure a owl:Class ;
rdfs:label "Disconnect Measure" ;
rdfs:comment """The Disconnect measure involves removal of connection and interaction between the threat and the affected cyber resource. While the threat remains, the affected resource is removed from the attack situation.

For example, in the case of a Remote Execution attack or Denial of Service attack, this could include physical disconnection of affected devices from the network. In the case of socio-technical threats, such as cyberbullying, it could include disconnecting from the relevant platform.""" ;
rdfs:subClassOf sc2r:EngageMeasure .

Class: sc2r:Disempowerment   back to top


NOTE sc2r:Disempowerment is a leaf node.

Description
Disempowerment is the state in which the individual feels weak, ineffectual, not confident, or unimportant.

Inherits from (2):
sc2r:PsychologicalHarm | sc2r:Harm

Implementation:

@prefix owl: <http://www.w3.org/2002/07/owl#> .
@prefix rdfs: <http://www.w3.org/2000/01/rdf-schema#> .
@prefix sc2r: <http://cs.unu.edu/sc2r#> .

sc2r:Disempowerment a owl:Class ;
rdfs:label "Disempowerment" ;
rdfs:comment "Disempowerment is the state in which the individual feels weak, ineffectual, not confident, or unimportant." ;
rdfs:subClassOf sc2r:PsychologicalHarm .

Class: sc2r:Disinformation   back to top


Description
Disinformation is false or misleading information that is spread deliberately to cause harm. This is a subset of misinformation, which may also be unintentional.

Inherits from (3):
sc2r:CognitiveThreat | sc2r:PersonalThreat | sc2r:Threat

Implementation:

@prefix owl: <http://www.w3.org/2002/07/owl#> .
@prefix rdfs: <http://www.w3.org/2000/01/rdf-schema#> .
@prefix sc2r: <http://cs.unu.edu/sc2r#> .

sc2r:Disinformation a owl:Class ;
rdfs:label "Disinformation"@en ;
rdfs:comment "Disinformation is false or misleading information that is spread deliberately to cause harm. This is a subset of misinformation, which may also be unintentional."@en ;
rdfs:seeAlso "https://en.wikipedia.org/wiki/Disinformation"@en ;
rdfs:subClassOf sc2r:CognitiveThreat .

Class: sc2r:DisruptedIncome   back to top


NOTE sc2r:DisruptedIncome is a leaf node.

Description
Disrupted Income refers to the suspension of individual's income flow as a result of cyber threats.

Inherits from (2):
sc2r:EconomicHarm | sc2r:Harm

Implementation:

@prefix owl: <http://www.w3.org/2002/07/owl#> .
@prefix rdfs: <http://www.w3.org/2000/01/rdf-schema#> .
@prefix sc2r: <http://cs.unu.edu/sc2r#> .

sc2r:DisruptedIncome a owl:Class ;
rdfs:label "Disrupted Income" ;
rdfs:comment "Disrupted Income refers to the suspension of individual's income flow as a result of cyber threats." ;
rdfs:subClassOf sc2r:EconomicHarm .

Class: sc2r:DisruptedWork   back to top


NOTE sc2r:DisruptedWork is a leaf node.

Description
Disrupted Work refers to the suspension of work as a result of the cyber threats.

Inherits from (2):
sc2r:EconomicHarm | sc2r:Harm

Implementation:

@prefix owl: <http://www.w3.org/2002/07/owl#> .
@prefix rdfs: <http://www.w3.org/2000/01/rdf-schema#> .
@prefix sc2r: <http://cs.unu.edu/sc2r#> .

sc2r:DisruptedWork a owl:Class ;
rdfs:label "Disrupted Work" ;
rdfs:comment "Disrupted Work refers to the suspension of work as a result of the cyber threats." ;
rdfs:subClassOf sc2r:EconomicHarm .

Class: sc2r:Disruption   back to top


NOTE sc2r:Disruption is a leaf node.

Description
Disruption occurs when individuals' access to information and resources is disrupted.

Inherits from (3):
sc2r:AvailabilityThreat | sc2r:TechnologicalThreat | sc2r:Threat

Implementation:

@prefix owl: <http://www.w3.org/2002/07/owl#> .
@prefix rdfs: <http://www.w3.org/2000/01/rdf-schema#> .
@prefix sc2r: <http://cs.unu.edu/sc2r#> .

sc2r:Disruption a owl:Class ;
rdfs:label "Disruption"@en ;
rdfs:comment "Disruption occurs when individuals' access to information and resources is disrupted."@en ;
rdfs:subClassOf sc2r:AvailabilityThreat .

Class: sc2r:Distraction   back to top


NOTE sc2r:Distraction is a leaf node.

Description
Distraction is the state in which the individual experiences extreme agitation of the mind or emotions that prevents them from giving full attention to something else.

Inherits from (2):
sc2r:PsychologicalHarm | sc2r:Harm

Implementation:

@prefix owl: <http://www.w3.org/2002/07/owl#> .
@prefix rdfs: <http://www.w3.org/2000/01/rdf-schema#> .
@prefix sc2r: <http://cs.unu.edu/sc2r#> .

sc2r:Distraction a owl:Class ;
rdfs:label "Distraction" ;
rdfs:comment "Distraction is the state in which the individual experiences extreme agitation of the mind or emotions that prevents them from giving full attention to something else." ;
rdfs:subClassOf sc2r:PsychologicalHarm .

Class: sc2r:Doxing   back to top


NOTE sc2r:Doxing is a leaf node.

Description
Doxing is when private and confidential information about individuals is researched and published online with malicious intent.

Inherits from (3):
sc2r:ConfidentialityThreat | sc2r:TechnologicalThreat | sc2r:Threat

Implementation:

@prefix owl: <http://www.w3.org/2002/07/owl#> .
@prefix rdfs: <http://www.w3.org/2000/01/rdf-schema#> .
@prefix sc2r: <http://cs.unu.edu/sc2r#> .

sc2r:Doxing a owl:Class ;
rdfs:label "Doxing"@en ;
rdfs:comment "Doxing is when private and confidential information about individuals is researched and published online with malicious intent."@en ;
rdfs:subClassOf sc2r:ConfidentialityThreat .

Class: sc2r:Eavesdropping   back to top


NOTE sc2r:Eavesdropping is a leaf node.

Description
Eavesdropping occurs when attackers secretly and stealthly gain access to private and confidential communication without the consent of and the authorization from the communicating parties.

Inherits from (4):
sc2r:Interception | sc2r:ConfidentialityThreat | sc2r:TechnologicalThreat | sc2r:Threat

Implementation:

@prefix owl: <http://www.w3.org/2002/07/owl#> .
@prefix rdfs: <http://www.w3.org/2000/01/rdf-schema#> .
@prefix sc2r: <http://cs.unu.edu/sc2r#> .

sc2r:Eavesdropping a owl:Class ;
rdfs:label "Eavesdropping"@en ;
rdfs:comment "Eavesdropping occurs when attackers secretly and stealthly gain access to private and confidential communication without the consent of and the authorization from the communicating parties."@en ;
rdfs:subClassOf sc2r:Interception .

Class: sc2r:EconomicHarm   back to top


Description
Economic Harm is the harm that relates to negative financial or economic consequences.

Inherits from (1):
sc2r:Harm

Implementation:

@prefix owl: <http://www.w3.org/2002/07/owl#> .
@prefix rdfs: <http://www.w3.org/2000/01/rdf-schema#> .
@prefix sc2r: <http://cs.unu.edu/sc2r#> .

sc2r:EconomicHarm a owl:Class ;
rdfs:label "Economic Harm" ;
rdfs:comment "Economic Harm is the harm that relates to negative financial or economic consequences." ;
rdfs:subClassOf sc2r:Harm .

Class: sc2r:Electricity   back to top


NOTE sc2r:Electricity is a leaf node.

Description
Electricity is the flow of electrical power or charge that is used to power the infrastructures supporting our cyber functionings.

Inherits from (2):
sc2r:InfrastructureResource | sc2r:Resource

Implementation:

@prefix owl: <http://www.w3.org/2002/07/owl#> .
@prefix rdfs: <http://www.w3.org/2000/01/rdf-schema#> .
@prefix sc2r: <http://cs.unu.edu/sc2r#> .

sc2r:Electricity a owl:Class ;
rdfs:label "Electricity" ;
rdfs:comment "Electricity is the flow of electrical power or charge that is used to power the infrastructures supporting our cyber functionings." ;
rdfs:subClassOf sc2r:InfrastructureResource .

Class: sc2r:EmailHygiene   back to top


NOTE sc2r:EmailHygiene is a leaf node.

Description
Email hygiene are measures and practices that contribute to safe and secure use of email.

Inherits from (4):
sc2r:WebHygiene | sc2r:PreventionMeasure | sc2r:PrepareMeasure | sc2r:Response

Implementation:

@prefix owl: <http://www.w3.org/2002/07/owl#> .
@prefix rdfs: <http://www.w3.org/2000/01/rdf-schema#> .
@prefix sc2r: <http://cs.unu.edu/sc2r#> .

sc2r:EmailHygiene a owl:Class ;
rdfs:label "Email Hygiene" ;
rdfs:comment "Email hygiene are measures and practices that contribute to safe and secure use of email." ;
rdfs:subClassOf sc2r:WebHygiene .

Class: sc2r:Embarrassed   back to top


NOTE sc2r:Embarrassed is a leaf node.

Description
Embarrassed is the state in which the individual feels humiliated or shameful.

Inherits from (2):
sc2r:PsychologicalHarm | sc2r:Harm

Implementation:

@prefix owl: <http://www.w3.org/2002/07/owl#> .
@prefix rdfs: <http://www.w3.org/2000/01/rdf-schema#> .
@prefix sc2r: <http://cs.unu.edu/sc2r#> .

sc2r:Embarrassed a owl:Class ;
rdfs:label "Embarrassed" ;
rdfs:comment "Embarrassed is the state in which the individual feels humiliated or shameful." ;
rdfs:subClassOf sc2r:PsychologicalHarm .

Class: sc2r:EngageMeasure   back to top


Description
Engage measures involve direct handling of and engagement with the adverse cyber incident.

Inherits from (2):
sc2r:AbsorbMeasure | sc2r:Response

Implementation:

@prefix owl: <http://www.w3.org/2002/07/owl#> .
@prefix rdfs: <http://www.w3.org/2000/01/rdf-schema#> .
@prefix sc2r: <http://cs.unu.edu/sc2r#> .

sc2r:EngageMeasure a owl:Class ;
rdfs:label "Engage Measure" ;
rdfs:comment "Engage measures involve direct handling of and engagement with the adverse cyber incident." ;
rdfs:subClassOf sc2r:AbsorbMeasure .

Class: sc2r:EngineeredContent   back to top


NOTE sc2r:EngineeredContent is a leaf node.

Description
Engineered content is broadly information that is produced for specific influence and cognitive disinformation objectives.

Inherits from (4):
sc2r:Disinformation | sc2r:CognitiveThreat | sc2r:PersonalThreat | sc2r:Threat

Implementation:

@prefix owl: <http://www.w3.org/2002/07/owl#> .
@prefix rdfs: <http://www.w3.org/2000/01/rdf-schema#> .
@prefix sc2r: <http://cs.unu.edu/sc2r#> .

sc2r:EngineeredContent a owl:Class ;
rdfs:label "Engineered Content"@en ;
rdfs:comment "Engineered content is broadly information that is produced for specific influence and cognitive disinformation objectives."@en ;
rdfs:subClassOf sc2r:Disinformation .

Class: sc2r:EnvironmentalThreat   back to top


Description
Environmental Threats emanate from individuals' wider environmental and institutional context.

Inherits from (1):
sc2r:Threat

Implementation:

@prefix owl: <http://www.w3.org/2002/07/owl#> .
@prefix rdfs: <http://www.w3.org/2000/01/rdf-schema#> .
@prefix sc2r: <http://cs.unu.edu/sc2r#> .

sc2r:EnvironmentalThreat a owl:Class ;
rdfs:label "Environmental Threat"@en ;
rdfs:comment "Environmental Threats emanate from individuals' wider environmental and institutional context."@en ;
rdfs:subClassOf sc2r:Threat .

Class: sc2r:Evolve   back to top


NOTE sc2r:Evolve is a leaf node.

Description
The evolve measure involves an adaptation in the use of cyber resource through the adoption of complementary resources that enable higher nominal cyber functioning.

Inherits from (2):
sc2r:AdaptMeasure | sc2r:Response

Implementation:

@prefix owl: <http://www.w3.org/2002/07/owl#> .
@prefix rdfs: <http://www.w3.org/2000/01/rdf-schema#> .
@prefix sc2r: <http://cs.unu.edu/sc2r#> .

sc2r:Evolve a owl:Class ;
rdfs:label "Evolve Measure" ;
rdfs:comment "The evolve measure involves an adaptation in the use of cyber resource through the adoption of complementary resources that enable higher nominal cyber functioning." ;
rdfs:subClassOf sc2r:AdaptMeasure .

Class: sc2r:Exposed   back to top


NOTE sc2r:Exposed is a leaf node.

Description
Exposed is the state in which the resources are physically or digitally disclosed.

Inherits from (2):
sc2r:PhysicalHarm | sc2r:Harm

Implementation:

@prefix owl: <http://www.w3.org/2002/07/owl#> .
@prefix rdfs: <http://www.w3.org/2000/01/rdf-schema#> .
@prefix sc2r: <http://cs.unu.edu/sc2r#> .

sc2r:Exposed a owl:Class ;
rdfs:label "Exposed" ;
rdfs:comment "Exposed is the state in which the resources are physically or digitally disclosed." ;
rdfs:subClassOf sc2r:PhysicalHarm .

Class: sc2r:Expression   back to top


NOTE sc2r:Expression is a leaf node.

Description
The Right to Expression (freedom of expression) is individual's right to express their beliefs, thoughts, ideas, and emotions about different issues.

Inherits from (3):
sc2r:Right | sc2r:IndividualResource | sc2r:Resource

Implementation:

@prefix owl: <http://www.w3.org/2002/07/owl#> .
@prefix rdfs: <http://www.w3.org/2000/01/rdf-schema#> .
@prefix sc2r: <http://cs.unu.edu/sc2r#> .

sc2r:Expression a owl:Class ;
rdfs:label "Right to Expression" ;
rdfs:comment "The Right to Expression (freedom of expression) is individual's right to express their beliefs, thoughts, ideas, and emotions about different issues." ;
rdfs:subClassOf sc2r:Right .

Class: sc2r:ExternalHardDrive   back to top


NOTE sc2r:ExternalHardDrive is a leaf node.

Description
External Hard Drive is a portable storage device located outside of a computer that is connected through a USB cable or wireless connection.

Inherits from (3):
sc2r:StorageAsset | sc2r:PhysicalResource | sc2r:Resource

Implementation:

@prefix owl: <http://www.w3.org/2002/07/owl#> .
@prefix rdfs: <http://www.w3.org/2000/01/rdf-schema#> .
@prefix sc2r: <http://cs.unu.edu/sc2r#> .

sc2r:ExternalHardDrive a owl:Class ;
rdfs:label "External Hard Drive" ;
rdfs:comment "External Hard Drive is a portable storage device located outside of a computer that is connected through a USB cable or wireless connection." ;
rdfs:subClassOf sc2r:StorageAsset .

Class: sc2r:ExternalSupport   back to top


Description
External support involves receiving external input and support towards recovering and restoring cyber functioning.

Inherits from (2):
sc2r:RecoverMeasure | sc2r:Response

Implementation:

@prefix owl: <http://www.w3.org/2002/07/owl#> .
@prefix rdfs: <http://www.w3.org/2000/01/rdf-schema#> .
@prefix sc2r: <http://cs.unu.edu/sc2r#> .

sc2r:ExternalSupport a owl:Class ;
rdfs:label "External Support" ;
rdfs:comment "External support involves receiving external input and support towards recovering and restoring cyber functioning." ;
rdfs:subClassOf sc2r:RecoverMeasure .

Class: sc2r:ExtorsionPayment   back to top


NOTE sc2r:ExtorsionPayment is a leaf node.

Description
Extorsion Payment refers to the costs that the individual has to pay to continue their cyber functioning (e.g. after ransom-related incidents).

Inherits from (2):
sc2r:EconomicHarm | sc2r:Harm

Implementation:

@prefix owl: <http://www.w3.org/2002/07/owl#> .
@prefix rdfs: <http://www.w3.org/2000/01/rdf-schema#> .
@prefix sc2r: <http://cs.unu.edu/sc2r#> .

sc2r:ExtorsionPayment a owl:Class ;
rdfs:label "Extorsion Payment" ;
rdfs:comment "Extorsion Payment refers to the costs that the individual has to pay to continue their cyber functioning (e.g. after ransom-related incidents)." ;
rdfs:subClassOf sc2r:EconomicHarm .

Class: sc2r:Extortion   back to top


NOTE sc2r:Extortion is a leaf node.

Description
Extortion refers to the use of threat or intimidation by a perpetrator to gain something from the target.

Inherits from (4):
sc2r:InfluenceThreat | sc2r:CognitiveThreat | sc2r:PersonalThreat | sc2r:Threat

Implementation:

@prefix owl: <http://www.w3.org/2002/07/owl#> .
@prefix rdfs: <http://www.w3.org/2000/01/rdf-schema#> .
@prefix sc2r: <http://cs.unu.edu/sc2r#> .

sc2r:Extortion a owl:Class ;
rdfs:label "Extortion"@en ;
rdfs:comment "Extortion refers to the use of threat or intimidation by a perpetrator to gain something from the target." ;
rdfs:subClassOf sc2r:InfluenceThreat .

Class: sc2r:Fabrication   back to top


NOTE sc2r:Fabrication is a leaf node.

Description
Fabrication refers to an attack where illegitimate information is generated under the pretence of a false identity.

Inherits from (3):
sc2r:AuthenticationThreat | sc2r:TechnologicalThreat | sc2r:Threat

Implementation:

@prefix owl: <http://www.w3.org/2002/07/owl#> .
@prefix rdfs: <http://www.w3.org/2000/01/rdf-schema#> .
@prefix sc2r: <http://cs.unu.edu/sc2r#> .

sc2r:Fabrication a owl:Class ;
rdfs:label "Fabrication"@en ;
rdfs:comment "Fabrication refers to an attack where illegitimate information is generated under the pretence of a false identity."@en ;
rdfs:subClassOf sc2r:AuthenticationThreat .

Class: sc2r:Fact-checking   back to top


NOTE sc2r:Fact-checking is a leaf node.

Description
Fact-checking involves establishing the truth and validating the facts behind a specific adverse incident. In the case of socio-technical threats such as misinformation attacks, fact-checking involves establishing the veracity of the information consumed. In the case of technical threat, it would involve understanding and documenting the experience of an adverse incident.

Inherits from (2):
sc2r:RecoverMeasure | sc2r:Response

Implementation:

@prefix owl: <http://www.w3.org/2002/07/owl#> .
@prefix rdfs: <http://www.w3.org/2000/01/rdf-schema#> .
@prefix sc2r: <http://cs.unu.edu/sc2r#> .

sc2r:Fact-checking a owl:Class ;
rdfs:label "Fact-checking" ;
rdfs:comment """Fact-checking involves establishing the truth and validating the facts behind a specific adverse incident.

In the case of socio-technical threats such as misinformation attacks, fact-checking involves establishing the veracity of the information consumed. In the case of technical threat, it would involve understanding and documenting the experience of an adverse incident.""" ;
rdfs:subClassOf sc2r:RecoverMeasure .

Class: sc2r:FailureDetection   back to top


NOTE sc2r:FailureDetection is a leaf node.

Description
Failure detection is the monitoring measure that involves checking for the failure in the operation of specific cyber resources.

Inherits from (4):
sc2r:ThreatMonitoringMeasure | sc2r:MonitoringMeasure | sc2r:PrepareMeasure | sc2r:Response

Implementation:

@prefix owl: <http://www.w3.org/2002/07/owl#> .
@prefix rdfs: <http://www.w3.org/2000/01/rdf-schema#> .
@prefix sc2r: <http://cs.unu.edu/sc2r#> .

sc2r:FailureDetection a owl:Class ;
rdfs:label "Failure Detection" ;
rdfs:comment "Failure detection is the monitoring measure that involves checking for the failure in the operation of specific cyber resources." ;
rdfs:subClassOf sc2r:ThreatMonitoringMeasure .

Class: sc2r:FakeGiveways   back to top


NOTE sc2r:FakeGiveways is a leaf node.

Description
Fake Giveaway scam occurs when individuals are promised a prize in exchange for doing something beforehand, such as paying a fee.

Inherits from (4):
sc2r:Scam | sc2r:TheftThreat | sc2r:PersonalThreat | sc2r:Threat

Implementation:

@prefix owl: <http://www.w3.org/2002/07/owl#> .
@prefix rdfs: <http://www.w3.org/2000/01/rdf-schema#> .
@prefix sc2r: <http://cs.unu.edu/sc2r#> .

sc2r:FakeGiveways a owl:Class ;
rdfs:label "Fake Giveaways"@en ;
rdfs:comment "Fake Giveaway scam occurs when individuals are promised a prize in exchange for doing something beforehand, such as paying a fee." ;
rdfs:subClassOf sc2r:Scam .

Class: sc2r:FakeNews   back to top


NOTE sc2r:FakeNews is a leaf node.

Description
Fake News is news that include deliberate disinformation content.

Inherits from (4):
sc2r:Disinformation | sc2r:CognitiveThreat | sc2r:PersonalThreat | sc2r:Threat

Implementation:

@prefix owl: <http://www.w3.org/2002/07/owl#> .
@prefix rdfs: <http://www.w3.org/2000/01/rdf-schema#> .
@prefix sc2r: <http://cs.unu.edu/sc2r#> .

sc2r:FakeNews a owl:Class ;
rdfs:label "Fake News"@en ;
rdfs:comment "Fake News is news that include deliberate disinformation content."@en ;
rdfs:seeAlso sc2r:Disinformation,
sc2r:Malinformation ;
rdfs:subClassOf sc2r:Disinformation .

Class: sc2r:Fear   back to top


NOTE sc2r:Fear is a leaf node.

Description
Fear is an emotion caused by anxiety or the uneasiness of being afraid of something or someone.

Inherits from (2):
sc2r:Individual | sc2r:Vulnerability

Implementation:

@prefix owl: <http://www.w3.org/2002/07/owl#> .
@prefix rdfs: <http://www.w3.org/2000/01/rdf-schema#> .
@prefix sc2r: <http://cs.unu.edu/sc2r#> .

sc2r:Fear a owl:Class ;
rdfs:label "Fear" ;
rdfs:comment "Fear is an emotion caused by anxiety or the uneasiness of being afraid of something or someone." ;
rdfs:subClassOf sc2r:Individual .

Class: sc2r:FeelingUpset   back to top


NOTE sc2r:FeelingUpset is a leaf node.

Description
Feeling Upset is the state in which the individual feels unhappy, disappointed, or worried.

Inherits from (2):
sc2r:PsychologicalHarm | sc2r:Harm

Implementation:

@prefix owl: <http://www.w3.org/2002/07/owl#> .
@prefix rdfs: <http://www.w3.org/2000/01/rdf-schema#> .
@prefix sc2r: <http://cs.unu.edu/sc2r#> .

sc2r:FeelingUpset a owl:Class ;
rdfs:label "Feeling Upset" ;
rdfs:comment "Feeling Upset is the state in which the individual feels unhappy, disappointed, or worried." ;
rdfs:subClassOf sc2r:PsychologicalHarm .

Class: sc2r:File   back to top


Description
A File is an object on a computer that stores data, information, settings, or commands used with a computer program.

Inherits from (3):
sc2r:Data | sc2r:DigitalResource | sc2r:Resource

Implementation:

@prefix owl: <http://www.w3.org/2002/07/owl#> .
@prefix rdfs: <http://www.w3.org/2000/01/rdf-schema#> .
@prefix sc2r: <http://cs.unu.edu/sc2r#> .

sc2r:File a owl:Class ;
rdfs:label "File Resource" ;
rdfs:comment "A File is an object on a computer that stores data, information, settings, or commands used with a computer program." ;
rdfs:subClassOf sc2r:Data .

Class: sc2r:FinancialData   back to top


NOTE sc2r:FinancialData is a leaf node.

Description
Financial Data is data on individual's assets, liabilities, equity, income, expenses, and cash flow.

Inherits from (5):
sc2r:IdentifyingData | sc2r:PersonalData | sc2r:Data | sc2r:DigitalResource | sc2r:Resource

Implementation:

@prefix owl: <http://www.w3.org/2002/07/owl#> .
@prefix rdfs: <http://www.w3.org/2000/01/rdf-schema#> .
@prefix sc2r: <http://cs.unu.edu/sc2r#> .

sc2r:FinancialData a owl:Class ;
rdfs:label "Financial Data" ;
rdfs:comment "Financial Data is data on individual's assets, liabilities, equity, income, expenses, and cash flow." ;
rdfs:subClassOf sc2r:IdentifyingData .

Class: sc2r:Fine   back to top


NOTE sc2r:Fine is a leaf node.

Description
Fine Payment refers to the fine that the individual is liable to pay.

Inherits from (2):
sc2r:EconomicHarm | sc2r:Harm

Implementation:

@prefix owl: <http://www.w3.org/2002/07/owl#> .
@prefix rdfs: <http://www.w3.org/2000/01/rdf-schema#> .
@prefix sc2r: <http://cs.unu.edu/sc2r#> .

sc2r:Fine a owl:Class ;
rdfs:label "Fine Payment" ;
rdfs:comment "Fine Payment refers to the fine that the individual is liable to pay." ;
rdfs:subClassOf sc2r:EconomicHarm .

Class: sc2r:Firehosing   back to top


NOTE sc2r:Firehosing is a leaf node.

Description
Firehosing (firehose of falsehood) is a technique in which a large number of messages are broadcast rapidly, repetitively, and continuously over multiple channels without regard for truth or consistency. While Gish Gallop usually refers to a single online encounter, firehosing involves a strategy of massive disinformation over time and in multiple venues.

Inherits from (5):
sc2r:MalignRhetoric | sc2r:Disinformation | sc2r:CognitiveThreat | sc2r:PersonalThreat | sc2r:Threat

Implementation:

@prefix owl: <http://www.w3.org/2002/07/owl#> .
@prefix rdfs: <http://www.w3.org/2000/01/rdf-schema#> .
@prefix sc2r: <http://cs.unu.edu/sc2r#> .

sc2r:Firehosing a owl:Class ;
rdfs:label "Firehosing" ;
rdfs:comment "Firehosing (firehose of falsehood) is a technique in which a large number of messages are broadcast rapidly, repetitively, and continuously over multiple channels without regard for truth or consistency. While Gish Gallop usually refers to a single online encounter, firehosing involves a strategy of massive disinformation over time and in multiple venues." ;
rdfs:subClassOf sc2r:MalignRhetoric .

Class: sc2r:Firewall   back to top


NOTE sc2r:Firewall is a leaf node.

Description
Firewall is a mechanism for allowing and denying access to specific network resources.

Inherits from (4):
sc2r:AccessControl | sc2r:PreventionMeasure | sc2r:PrepareMeasure | sc2r:Response

Implementation:

@prefix owl: <http://www.w3.org/2002/07/owl#> .
@prefix rdfs: <http://www.w3.org/2000/01/rdf-schema#> .
@prefix sc2r: <http://cs.unu.edu/sc2r#> .

sc2r:Firewall a owl:Class ;
rdfs:label "Firewall" ;
rdfs:comment "Firewall is a mechanism for allowing and denying access to specific network resources." ;
rdfs:subClassOf sc2r:AccessControl .

Class: sc2r:Flaming   back to top


NOTE sc2r:Flaming is a leaf node.

Description
Flaming is the online act of posting insults, often laced with profanity or other offensive language on social networking sites.

Inherits from (3):
sc2r:Abuse | sc2r:PersonalThreat | sc2r:Threat

Implementation:

@prefix owl: <http://www.w3.org/2002/07/owl#> .
@prefix rdfs: <http://www.w3.org/2000/01/rdf-schema#> .
@prefix sc2r: <http://cs.unu.edu/sc2r#> .

sc2r:Flaming a owl:Class ;
rdfs:label "Flaming"@en ;
rdfs:comment "Flaming is the online act of posting insults, often laced with profanity or other offensive language on social networking sites."@en ;
rdfs:seeAlso "https://en.wikipedia.org/wiki/Flaming_(Internet)"@en ;
rdfs:subClassOf sc2r:Abuse .

Class: sc2r:Flooding   back to top


NOTE sc2r:Flooding is a leaf node.

Description
Flooding involves the generation of fraudulent messages to increase traffic on the network for consuming server’s or network’s resources.

Inherits from (3):
sc2r:SocialHacking | sc2r:SocialThreat | sc2r:Threat

Implementation:

@prefix owl: <http://www.w3.org/2002/07/owl#> .
@prefix rdfs: <http://www.w3.org/2000/01/rdf-schema#> .
@prefix sc2r: <http://cs.unu.edu/sc2r#> .

sc2r:Flooding a owl:Class ;
rdfs:label "Flooding"@en ;
rdfs:comment "Flooding involves the generation of fraudulent messages to increase traffic on the network for consuming server’s or network’s resources." ;
rdfs:subClassOf sc2r:SocialHacking .

Class: sc2r:Forging   back to top


NOTE sc2r:Forging is a leaf node.

Description
Forging is the illegitimate dissemination of falsified evidence.

Inherits from (5):
sc2r:Deceit | sc2r:Disinformation | sc2r:CognitiveThreat | sc2r:PersonalThreat | sc2r:Threat

Implementation:

@prefix owl: <http://www.w3.org/2002/07/owl#> .
@prefix rdfs: <http://www.w3.org/2000/01/rdf-schema#> .
@prefix sc2r: <http://cs.unu.edu/sc2r#> .

sc2r:Forging a owl:Class ;
rdfs:label "Forging"@en ;
rdfs:comment "Forging is the illegitimate dissemination of falsified evidence." ;
rdfs:subClassOf sc2r:Deceit .

Class: sc2r:Fraud   back to top


NOTE sc2r:Fraud is a leaf node.

Description
Online Fraud is a type of deception or fraud scheme that uses the Internet and digital communications technology to provide fraudulent solicitations to prospective targets to conduct fraudulent transactions, or to transmit the proceeds of fraud to those connected with the scheme. Online fraud may include identity theft, non-delivery payment, and online advertising fraud.

Inherits from (3):
sc2r:TheftThreat | sc2r:PersonalThreat | sc2r:Threat

Implementation:

@prefix owl: <http://www.w3.org/2002/07/owl#> .
@prefix rdfs: <http://www.w3.org/2000/01/rdf-schema#> .
@prefix sc2r: <http://cs.unu.edu/sc2r#> .

sc2r:Fraud a owl:Class ;
rdfs:label "Fraud"@en ;
rdfs:comment "Online Fraud is a type of deception or fraud scheme that uses the Internet and digital communications technology to provide fraudulent solicitations to prospective targets to conduct fraudulent transactions, or to transmit the proceeds of fraud to those connected with the scheme. Online fraud may include identity theft, non-delivery payment, and online advertising fraud." ;
rdfs:subClassOf sc2r:TheftThreat .

Class: sc2r:Frustration   back to top


NOTE sc2r:Frustration is a leaf node.

Description
Frustration is the state in which the individual feels upset or annoyed, especially because of inability to change or achieve something.

Inherits from (2):
sc2r:PsychologicalHarm | sc2r:Harm

Implementation:

@prefix owl: <http://www.w3.org/2002/07/owl#> .
@prefix rdfs: <http://www.w3.org/2000/01/rdf-schema#> .
@prefix sc2r: <http://cs.unu.edu/sc2r#> .

sc2r:Frustration a owl:Class ;
rdfs:label "Frustration" ;
rdfs:comment "Frustration is the state in which the individual feels upset or annoyed, especially because of inability to change or achieve something." ;
rdfs:subClassOf sc2r:PsychologicalHarm .

Class: sc2r:GishGalloping   back to top


NOTE sc2r:GishGalloping is a leaf node.

Description
Gish Galloping is a rhetorical tactic used to flood individuals with as many arguments as possible (without regard for accuracy or strength of the argument) in a way that make them feel overwhelmed. Gish galloping usually refers to a single online encounter, for example in an online debate setting.

Inherits from (5):
sc2r:MalignRhetoric | sc2r:Disinformation | sc2r:CognitiveThreat | sc2r:PersonalThreat | sc2r:Threat

Implementation:

@prefix owl: <http://www.w3.org/2002/07/owl#> .
@prefix rdfs: <http://www.w3.org/2000/01/rdf-schema#> .
@prefix sc2r: <http://cs.unu.edu/sc2r#> .

sc2r:GishGalloping a owl:Class ;
rdfs:label "Gish Galloping"@en ;
rdfs:comment "Gish Galloping is a rhetorical tactic used to flood individuals with as many arguments as possible (without regard for accuracy or strength of the argument) in a way that make them feel overwhelmed. Gish galloping usually refers to a single online encounter, for example in an online debate setting."@en ;
rdfs:subClassOf sc2r:MalignRhetoric .

Class: sc2r:Gluttony   back to top


NOTE sc2r:Gluttony is a leaf node.

Description
Gluttony refers to over-indulgence in being online.

Inherits from (2):
sc2r:PsychologicalHarm | sc2r:Harm

Implementation:

@prefix owl: <http://www.w3.org/2002/07/owl#> .
@prefix rdfs: <http://www.w3.org/2000/01/rdf-schema#> .
@prefix sc2r: <http://cs.unu.edu/sc2r#> .

sc2r:Gluttony a owl:Class ;
rdfs:label "Gluttony" ;
rdfs:comment "Gluttony refers to over-indulgence in being online." ;
rdfs:subClassOf sc2r:PsychologicalHarm .

Class: sc2r:Greed   back to top


NOTE sc2r:Greed is a leaf node.

Description
Greed is an overwhelming urge to have more of something, usually more than needed.

Inherits from (2):
sc2r:Individual | sc2r:Vulnerability

Implementation:

@prefix owl: <http://www.w3.org/2002/07/owl#> .
@prefix rdfs: <http://www.w3.org/2000/01/rdf-schema#> .
@prefix sc2r: <http://cs.unu.edu/sc2r#> .

sc2r:Greed a owl:Class ;
rdfs:label "Greed" ;
rdfs:comment "Greed is an overwhelming urge to have more of something, usually more than needed." ;
rdfs:subClassOf sc2r:Individual .

Class: sc2r:Grooming   back to top


NOTE sc2r:Grooming is a leaf node.

Description
Grooming occurs when the pepetrator uses tactics to gain the target's trust and to develop a relationship with the target by giving complimenets, attention, affection, or gifts.

Inherits from (4):
sc2r:SexualAbuse | sc2r:Abuse | sc2r:PersonalThreat | sc2r:Threat

Implementation:

@prefix owl: <http://www.w3.org/2002/07/owl#> .
@prefix rdfs: <http://www.w3.org/2000/01/rdf-schema#> .
@prefix sc2r: <http://cs.unu.edu/sc2r#> .

sc2r:Grooming a owl:Class ;
rdfs:label "Grooming" ;
rdfs:comment "Grooming occurs when the pepetrator uses tactics to gain the target's trust and to develop a relationship with the target by giving complimenets, attention, affection, or gifts." ;
rdfs:subClassOf sc2r:SexualAbuse .

Class: sc2r:Guilt   back to top


NOTE sc2r:Guilt is a leaf node.

Description
Guilt is a feeling of worry or unhappiness that an individual has because they have done something wrong or bad.

Inherits from (2):
sc2r:Individual | sc2r:Vulnerability

Implementation:

@prefix owl: <http://www.w3.org/2002/07/owl#> .
@prefix rdfs: <http://www.w3.org/2000/01/rdf-schema#> .
@prefix sc2r: <http://cs.unu.edu/sc2r#> .

sc2r:Guilt a owl:Class ;
rdfs:label "Guilt" ;
rdfs:comment "Guilt is a feeling of worry or unhappiness that an individual has because they have done something wrong or bad." ;
rdfs:subClassOf sc2r:Individual .

Class: sc2r:Guilty   back to top


NOTE sc2r:Guilty is a leaf node.

Description
Guilty refers to the state in which the individual feels regretful or remorse.

Inherits from (2):
sc2r:PsychologicalHarm | sc2r:Harm

Implementation:

@prefix owl: <http://www.w3.org/2002/07/owl#> .
@prefix rdfs: <http://www.w3.org/2000/01/rdf-schema#> .
@prefix sc2r: <http://cs.unu.edu/sc2r#> .

sc2r:Guilty a owl:Class ;
rdfs:label "Guilty" ;
rdfs:comment "Guilty refers to the state in which the individual feels regretful or remorse." ;
rdfs:subClassOf sc2r:PsychologicalHarm .

Class: sc2r:HardwareVulnerability   back to top


NOTE sc2r:HardwareVulnerability is a leaf node.

Description
Hardware Vulnerabilities are exploitable weaknesses in a computer system that enables attack through remote or physical access to system hardware. - Hardware Vulnerability

Inherits from (2):
sc2r:Physical | sc2r:Vulnerability

Implementation:

@prefix owl: <http://www.w3.org/2002/07/owl#> .
@prefix rdfs: <http://www.w3.org/2000/01/rdf-schema#> .
@prefix sc2r: <http://cs.unu.edu/sc2r#> .

sc2r:HardwareVulnerability a owl:Class ;
rdfs:comment "Hardware Vulnerabilities are exploitable weaknesses in a computer system that enables attack through remote or physical access to system hardware.",
"Hardware Vulnerability" ;
rdfs:subClassOf sc2r:Physical .

Class: sc2r:Harm   back to top


Description
A Harm, also called Impact, is the negative consequences of unmitigated Threats

Inherits from:
owl:Thing

Property Domain of:
sc2r:canBeResultOf | sc2r:isResultOf

Property Range of:
sc2r:canResultIn | sc2r:resultsIn

Implementation:

@prefix owl: <http://www.w3.org/2002/07/owl#> .
@prefix rdfs: <http://www.w3.org/2000/01/rdf-schema#> .
@prefix sc2r: <http://cs.unu.edu/sc2r#> .

sc2r:Harm a owl:Class ;
rdfs:label "Harm"@en ;
rdfs:comment "A Harm, also called Impact, is the negative consequences of unmitigated Threats"@en .

Class: sc2r:Helpfulness   back to top


NOTE sc2r:Helpfulness is a leaf node.

Description
Helpfulness is the quality of being ready to give help.

Inherits from (2):
sc2r:Individual | sc2r:Vulnerability

Implementation:

@prefix owl: <http://www.w3.org/2002/07/owl#> .
@prefix rdfs: <http://www.w3.org/2000/01/rdf-schema#> .
@prefix sc2r: <http://cs.unu.edu/sc2r#> .

sc2r:Helpfulness a owl:Class ;
rdfs:label "Helpfulness" ;
rdfs:comment "Helpfulness is the quality of being ready to give help." ;
rdfs:subClassOf sc2r:Individual .

Class: sc2r:HumorAndMeme   back to top


NOTE sc2r:HumorAndMeme is a leaf node.

Description
Humor and Memes that are employed to influence individuals and shape narratives.

Inherits from (5):
sc2r:InfluenceOperation | sc2r:Disinformation | sc2r:CognitiveThreat | sc2r:PersonalThreat | sc2r:Threat

Implementation:

@prefix owl: <http://www.w3.org/2002/07/owl#> .
@prefix rdfs: <http://www.w3.org/2000/01/rdf-schema#> .
@prefix sc2r: <http://cs.unu.edu/sc2r#> .

sc2r:HumorAndMeme a owl:Class ;
rdfs:label "Humor and Meme"@en ;
rdfs:comment "Humor and Memes that are employed to influence individuals and shape narratives."@en ;
rdfs:subClassOf sc2r:InfluenceOperation .

Class: sc2r:Identification   back to top


Description
Identification is a prevention measure that involves confirming claimed identity online.

Inherits from (3):
sc2r:PreventionMeasure | sc2r:PrepareMeasure | sc2r:Response

Implementation:

@prefix owl: <http://www.w3.org/2002/07/owl#> .
@prefix rdfs: <http://www.w3.org/2000/01/rdf-schema#> .
@prefix sc2r: <http://cs.unu.edu/sc2r#> .

sc2r:Identification a owl:Class ;
rdfs:label "Identification" ;
rdfs:comment "Identification is a prevention measure that involves confirming claimed identity online." ;
rdfs:subClassOf sc2r:PreventionMeasure .

Class: sc2r:IdentifyingData   back to top


Description
Identifying Data includes all kinds of data that can be used to identify an individual and their personal information.

Inherits from (4):
sc2r:PersonalData | sc2r:Data | sc2r:DigitalResource | sc2r:Resource

Implementation:

@prefix owl: <http://www.w3.org/2002/07/owl#> .
@prefix rdfs: <http://www.w3.org/2000/01/rdf-schema#> .
@prefix sc2r: <http://cs.unu.edu/sc2r#> .

sc2r:IdentifyingData a owl:Class ;
rdfs:label "Identifying Data" ;
rdfs:comment "Identifying Data includes all kinds of data that can be used to identify an individual and their personal information." ;
rdfs:subClassOf sc2r:PersonalData .

Class: sc2r:Identity   back to top


NOTE sc2r:Identity is a leaf node.

Description
Identity consists of individual personal attributes, such as gender, race, ethnicity, abilities, and socio-economic status.

Inherits from (2):
sc2r:IndividualResource | sc2r:Resource

Implementation:

@prefix owl: <http://www.w3.org/2002/07/owl#> .
@prefix rdfs: <http://www.w3.org/2000/01/rdf-schema#> .
@prefix sc2r: <http://cs.unu.edu/sc2r#> .

sc2r:Identity a owl:Class ;
rdfs:label "Identity" ;
rdfs:comment "Identity consists of individual personal attributes, such as gender, race, ethnicity, abilities, and socio-economic status." ;
rdfs:subClassOf sc2r:IndividualResource .

Class: sc2r:IdentityTheft   back to top


NOTE sc2r:IdentityTheft is a leaf node.

Description
Identity theft is the deliberate use of someone else's identity, usually as a method to gain a financial advantage or obtain credit and other benefits in the other person's name, and perhaps to the other person's disadvantage or loss.

Inherits from (3):
sc2r:TheftThreat | sc2r:PersonalThreat | sc2r:Threat

Implementation:

@prefix owl: <http://www.w3.org/2002/07/owl#> .
@prefix rdfs: <http://www.w3.org/2000/01/rdf-schema#> .
@prefix sc2r: <http://cs.unu.edu/sc2r#> .

sc2r:IdentityTheft a owl:Class ;
rdfs:label "Identity Theft"@en ;
rdfs:comment "Identity theft is the deliberate use of someone else's identity, usually as a method to gain a financial advantage or obtain credit and other benefits in the other person's name, and perhaps to the other person's disadvantage or loss."@en ;
rdfs:seeAlso "https://en.wikipedia.org/wiki/Identity_theft"@en ;
rdfs:subClassOf sc2r:TheftThreat .

Class: sc2r:IdentityTheftLoss   back to top


NOTE sc2r:IdentityTheftLoss is a leaf node.

Description
Identity Theft Loss refers to the state in which the individual's personal information is stolen.

Inherits from (2):
sc2r:PsychologicalHarm | sc2r:Harm

Implementation:

@prefix owl: <http://www.w3.org/2002/07/owl#> .
@prefix rdfs: <http://www.w3.org/2000/01/rdf-schema#> .
@prefix sc2r: <http://cs.unu.edu/sc2r#> .

sc2r:IdentityTheftLoss a owl:Class ;
rdfs:label "Identity Theft Harm" ;
rdfs:comment "Identity Theft Loss refers to the state in which the individual's personal information is stolen." ;
rdfs:subClassOf sc2r:PsychologicalHarm .

Class: sc2r:ImpairedPrivateSocialBoundary   back to top


NOTE sc2r:ImpairedPrivateSocialBoundary is a leaf node.

Description
Impaired Private Social Boundary refers to the state in which the boundary between the individual's private and social affairs is no longer clear.

Inherits from (2):
sc2r:SocialHarm | sc2r:Harm

Implementation:

@prefix owl: <http://www.w3.org/2002/07/owl#> .
@prefix rdfs: <http://www.w3.org/2000/01/rdf-schema#> .
@prefix sc2r: <http://cs.unu.edu/sc2r#> .

sc2r:ImpairedPrivateSocialBoundary a owl:Class ;
rdfs:label "Impaired Private Social Boundary" ;
rdfs:comment "Impaired Private Social Boundary refers to the state in which the boundary between the individual's private and social affairs is no longer clear." ;
rdfs:subClassOf sc2r:SocialHarm .

Class: sc2r:Impulsiveness   back to top


NOTE sc2r:Impulsiveness is a leaf node.

Description
Impulsiveness (or impulsivity) refers to a tendency to act on a whim, displaying behaviour characterised by little or no forethought, reflection, or consideration of the consequences.

Inherits from (2):
sc2r:Individual | sc2r:Vulnerability

Implementation:

@prefix owl: <http://www.w3.org/2002/07/owl#> .
@prefix rdfs: <http://www.w3.org/2000/01/rdf-schema#> .
@prefix sc2r: <http://cs.unu.edu/sc2r#> .

sc2r:Impulsiveness a owl:Class ;
rdfs:label "Impulsiveness" ;
rdfs:comment "Impulsiveness (or impulsivity) refers to a tendency to act on a whim, displaying behaviour characterised by little or no forethought, reflection, or consideration of the consequences." ;
rdfs:subClassOf sc2r:Individual .

Class: sc2r:InadvertentDisclosure   back to top


NOTE sc2r:InadvertentDisclosure is a leaf node.

Description
Inadvertent information disclosure occurs when individuals disclose private and confidential information inadvertently.

Inherits from (3):
sc2r:ConfidentialityThreat | sc2r:TechnologicalThreat | sc2r:Threat

Implementation:

@prefix owl: <http://www.w3.org/2002/07/owl#> .
@prefix rdfs: <http://www.w3.org/2000/01/rdf-schema#> .
@prefix sc2r: <http://cs.unu.edu/sc2r#> .

sc2r:InadvertentDisclosure a owl:Class ;
rdfs:label "Inadvertent Information Disclosure"@en ;
rdfs:comment "Inadvertent information disclosure occurs when individuals disclose private and confidential information inadvertently."@en ;
rdfs:subClassOf sc2r:ConfidentialityThreat .

Class: sc2r:InappropriateContent   back to top


Description
Inappropriate information is content that causes harm to individuals who consume it.

Inherits from (4):
sc2r:Malinformation | sc2r:CognitiveThreat | sc2r:PersonalThreat | sc2r:Threat

Implementation:

@prefix owl: <http://www.w3.org/2002/07/owl#> .
@prefix rdfs: <http://www.w3.org/2000/01/rdf-schema#> .
@prefix sc2r: <http://cs.unu.edu/sc2r#> .

sc2r:InappropriateContent a owl:Class ;
rdfs:label "Inappropriate Content"@en ;
rdfs:comment "Inappropriate information is content that causes harm to individuals who consume it."@en ;
rdfs:subClassOf sc2r:Malinformation .

Class: sc2r:IncidentReporting   back to top


NOTE sc2r:IncidentReporting is a leaf node.

Description
Incident reporting is the formal documentation and reporting of adverse cyber incidents that are experienced by individuals.

Inherits from (3):
sc2r:Reporting | sc2r:AbsorbMeasure | sc2r:Response

Implementation:

@prefix owl: <http://www.w3.org/2002/07/owl#> .
@prefix rdfs: <http://www.w3.org/2000/01/rdf-schema#> .
@prefix sc2r: <http://cs.unu.edu/sc2r#> .

sc2r:IncidentReporting a owl:Class ;
rdfs:label "Incident Reporting" ;
rdfs:comment "Incident reporting is the formal documentation and reporting of adverse cyber incidents that are experienced by individuals." ;
rdfs:subClassOf sc2r:Reporting .

Class: sc2r:IncreaseResources   back to top


NOTE sc2r:IncreaseResources is a leaf node.

Description
This measure involves increasing resources that are allocated towards maintaining the desired level of cyber functioning and supplementing the affected resources. For example, in cases where the adverse cyber incident deminished the quality of functioning of specific cyber resources, this measure would involve adding more resources (e.g., computing resources) to enable continue desired functioning.

Inherits from (3):
sc2r:WithstandMeasure | sc2r:AbsorbMeasure | sc2r:Response

Implementation:

@prefix owl: <http://www.w3.org/2002/07/owl#> .
@prefix rdfs: <http://www.w3.org/2000/01/rdf-schema#> .
@prefix sc2r: <http://cs.unu.edu/sc2r#> .

sc2r:IncreaseResources a owl:Class ;
rdfs:label "Increase Resource Measure" ;
rdfs:comment """This measure involves increasing resources that are allocated towards maintaining the desired level of cyber functioning and supplementing the affected resources.

For example, in cases where the adverse cyber incident deminished the quality of functioning of specific cyber resources, this measure would involve adding more resources (e.g., computing resources) to enable continue desired functioning.""" ;
rdfs:subClassOf sc2r:WithstandMeasure .

Class: sc2r:Individual   back to top


Description
Individual and Personal Vulnerabilities are situations and attributes of individuals that not only expose them to threats, but also that can be exploited and compromised by specific threats.

Inherits from (1):
sc2r:Vulnerability

Implementation:

@prefix owl: <http://www.w3.org/2002/07/owl#> .
@prefix rdfs: <http://www.w3.org/2000/01/rdf-schema#> .
@prefix sc2r: <http://cs.unu.edu/sc2r#> .

sc2r:Individual a owl:Class ;
rdfs:label "Individual and Personal Vulnerability" ;
rdfs:comment "Individual and Personal Vulnerabilities are situations and attributes of individuals that not only expose them to threats, but also that can be exploited and compromised by specific threats." ;
rdfs:subClassOf sc2r:Vulnerability .

Class: sc2r:IndividualResource   back to top


Description
Individual resources are a combination of natural endowments and what is acquired through social relationships.

Inherits from (1):
sc2r:Resource

Implementation:

@prefix owl: <http://www.w3.org/2002/07/owl#> .
@prefix rdfs: <http://www.w3.org/2000/01/rdf-schema#> .
@prefix sc2r: <http://cs.unu.edu/sc2r#> .

sc2r:IndividualResource a owl:Class ;
rdfs:label "Individual Personal Resource" ;
rdfs:comment "Individual resources are a combination of natural endowments and what is acquired through social relationships." ;
rdfs:subClassOf sc2r:Resource .

Class: sc2r:Infected   back to top


NOTE sc2r:Infected is a leaf node.

Description
Infected is the state in which the resources are physically or digitally contaminated.

Inherits from (2):
sc2r:PhysicalHarm | sc2r:Harm

Implementation:

@prefix owl: <http://www.w3.org/2002/07/owl#> .
@prefix rdfs: <http://www.w3.org/2000/01/rdf-schema#> .
@prefix sc2r: <http://cs.unu.edu/sc2r#> .

sc2r:Infected a owl:Class ;
rdfs:label "Infected" ;
rdfs:comment "Infected is the state in which the resources are physically or digitally contaminated." ;
rdfs:subClassOf sc2r:PhysicalHarm .

Class: sc2r:InfluenceOperation   back to top


Description
Influence Operations are efforts to influence the perceptions, behaviour, and decisions of individuals for the benefit of others.

Inherits from (4):
sc2r:Disinformation | sc2r:CognitiveThreat | sc2r:PersonalThreat | sc2r:Threat

Implementation:

@prefix owl: <http://www.w3.org/2002/07/owl#> .
@prefix rdfs: <http://www.w3.org/2000/01/rdf-schema#> .
@prefix sc2r: <http://cs.unu.edu/sc2r#> .

sc2r:InfluenceOperation a owl:Class ;
rdfs:label "Influence Operation"@en ;
rdfs:comment "Influence Operations are efforts to influence the perceptions, behaviour, and decisions of individuals for the benefit of others."@en ;
rdfs:subClassOf sc2r:Disinformation .

Class: sc2r:InfluenceThreat   back to top


Description
Influence Threat is any threat that is intended to influence individual's perceptions and prejudices.

Inherits from (3):
sc2r:CognitiveThreat | sc2r:PersonalThreat | sc2r:Threat

Implementation:

@prefix owl: <http://www.w3.org/2002/07/owl#> .
@prefix rdfs: <http://www.w3.org/2000/01/rdf-schema#> .
@prefix sc2r: <http://cs.unu.edu/sc2r#> .

sc2r:InfluenceThreat a owl:Class ;
rdfs:label "Influence Threat" ;
rdfs:comment "Influence Threat is any threat that is intended to influence individual's perceptions and prejudices." ;
rdfs:subClassOf sc2r:CognitiveThreat .

Class: sc2r:Information   back to top


NOTE sc2r:Information is a leaf node.

Description
The Right to Information is individual's right to access personal and non-personal information held by government.

Inherits from (3):
sc2r:Right | sc2r:IndividualResource | sc2r:Resource

Implementation:

@prefix owl: <http://www.w3.org/2002/07/owl#> .
@prefix rdfs: <http://www.w3.org/2000/01/rdf-schema#> .
@prefix sc2r: <http://cs.unu.edu/sc2r#> .

sc2r:Information a owl:Class ;
rdfs:label "Right to Information" ;
rdfs:comment "The Right to Information is individual's right to access personal and non-personal information held by government." ;
rdfs:subClassOf sc2r:Right .

Class: sc2r:InformationFlooding   back to top


NOTE sc2r:InformationFlooding is a leaf node.

Description
Information Flooding occurs when individuals are exposed to too much information and data.

Inherits from (3):
sc2r:Abuse | sc2r:PersonalThreat | sc2r:Threat

Implementation:

@prefix owl: <http://www.w3.org/2002/07/owl#> .
@prefix rdfs: <http://www.w3.org/2000/01/rdf-schema#> .
@prefix sc2r: <http://cs.unu.edu/sc2r#> .

sc2r:InformationFlooding a owl:Class ;
rdfs:label "Information Flooding"@en ;
rdfs:comment "Information Flooding occurs when individuals are exposed to too much information and data."@en ;
rdfs:subClassOf sc2r:Abuse ;
owl:equivalentClass sc2r:InformationOverload .

Class: sc2r:InformationOverload   back to top


NOTE sc2r:InformationOverload is a leaf node.

Description
Information Overload (information anxiety; information explosion) occurs when individuals are exposed to too much information and data that makes it difficult for them to understand an issue and effectively make decisions.

Inherits from (4):
sc2r:InfluenceThreat | sc2r:CognitiveThreat | sc2r:PersonalThreat | sc2r:Threat

Implementation:

@prefix owl: <http://www.w3.org/2002/07/owl#> .
@prefix rdfs: <http://www.w3.org/2000/01/rdf-schema#> .
@prefix sc2r: <http://cs.unu.edu/sc2r#> .

sc2r:InformationOverload a owl:Class ;
rdfs:label "Information Overload"@en ;
rdfs:comment "Information Overload (information anxiety; information explosion) occurs when individuals are exposed to too much information and data that makes it difficult for them to understand an issue and effectively make decisions." ;
rdfs:subClassOf sc2r:InfluenceThreat .

Class: sc2r:InformationalPrivacy   back to top


NOTE sc2r:InformationalPrivacy is a leaf node.

Description
Informational Privacy is individual's right to determine for themselves when, how, and to what extend information about them is communicated to others.

Inherits from (4):
sc2r:Privacy | sc2r:Right | sc2r:IndividualResource | sc2r:Resource

Implementation:

@prefix owl: <http://www.w3.org/2002/07/owl#> .
@prefix rdfs: <http://www.w3.org/2000/01/rdf-schema#> .
@prefix sc2r: <http://cs.unu.edu/sc2r#> .

sc2r:InformationalPrivacy a owl:Class ;
rdfs:label "Right to Information Privacy" ;
rdfs:comment "Informational Privacy is individual's right to determine for themselves when, how, and to what extend information about them is communicated to others." ;
rdfs:subClassOf sc2r:Privacy .

Class: sc2r:InfrastructureResource   back to top


Description
Infrastructure resources are physical and virtual resources that support the internet-enabled flow, storage, processing, and analysis of data.

Inherits from (1):
sc2r:Resource

Implementation:

@prefix owl: <http://www.w3.org/2002/07/owl#> .
@prefix rdfs: <http://www.w3.org/2000/01/rdf-schema#> .
@prefix sc2r: <http://cs.unu.edu/sc2r#> .

sc2r:InfrastructureResource a owl:Class ;
rdfs:label "Infrastructure Resource" ;
rdfs:comment "Infrastructure resources are physical and virtual resources that support the internet-enabled flow, storage, processing, and analysis of data." ;
rdfs:subClassOf sc2r:Resource .

Class: sc2r:InstitutionalThreat   back to top


Description
Institution Threats are adverse cyber incidents that are associated with institutions within individuals' context.

Inherits from (2):
sc2r:EnvironmentalThreat | sc2r:Threat

Implementation:

@prefix owl: <http://www.w3.org/2002/07/owl#> .
@prefix rdfs: <http://www.w3.org/2000/01/rdf-schema#> .
@prefix sc2r: <http://cs.unu.edu/sc2r#> .

sc2r:InstitutionalThreat a owl:Class ;
rdfs:label "Institutional Threat"@en ;
rdfs:comment "Institution Threats are adverse cyber incidents that are associated with institutions within individuals' context."@en ;
rdfs:subClassOf sc2r:EnvironmentalThreat .

Class: sc2r:IntegrityThreat   back to top


Description
Integrity Threats compromise the Integrity cybersecurity goal.

Inherits from (2):
sc2r:TechnologicalThreat | sc2r:Threat

Implementation:

@prefix owl: <http://www.w3.org/2002/07/owl#> .
@prefix rdfs: <http://www.w3.org/2000/01/rdf-schema#> .
@prefix sc2r: <http://cs.unu.edu/sc2r#> .

sc2r:IntegrityThreat a owl:Class ;
rdfs:label "Integrity Threat"@en ;
rdfs:comment "Integrity Threats compromise the Integrity cybersecurity goal."@en ;
rdfs:subClassOf sc2r:TechnologicalThreat .

Class: sc2r:Interception   back to top


Description
Interception occurs when unauthorized access is gained to private or confidential information.

Inherits from (3):
sc2r:ConfidentialityThreat | sc2r:TechnologicalThreat | sc2r:Threat

Implementation:

@prefix owl: <http://www.w3.org/2002/07/owl#> .
@prefix rdfs: <http://www.w3.org/2000/01/rdf-schema#> .
@prefix sc2r: <http://cs.unu.edu/sc2r#> .

sc2r:Interception a owl:Class ;
rdfs:label "Interception"@en ;
rdfs:comment "Interception occurs when unauthorized access is gained to private or confidential information."@en ;
rdfs:subClassOf sc2r:ConfidentialityThreat .

Class: sc2r:InternetConnectivity   back to top


NOTE sc2r:InternetConnectivity is a leaf node.

Description
Internet Connectivity refers to the way people are connected to the Internet, and may include dial-up telephone lines, always-on broadband connections, and wireless devices.

Inherits from (2):
sc2r:InfrastructureResource | sc2r:Resource

Implementation:

@prefix owl: <http://www.w3.org/2002/07/owl#> .
@prefix rdfs: <http://www.w3.org/2000/01/rdf-schema#> .
@prefix sc2r: <http://cs.unu.edu/sc2r#> .

sc2r:InternetConnectivity a owl:Class ;
rdfs:label "Internet Connectivity" ;
rdfs:comment "Internet Connectivity refers to the way people are connected to the Internet, and may include dial-up telephone lines, always-on broadband connections, and wireless devices." ;
rdfs:subClassOf sc2r:InfrastructureResource .

Class: sc2r:IntimacyThreat   back to top


NOTE sc2r:IntimacyThreat is a leaf node.

Description
Intimacy Threat occurs when individuals' preference to be alone with their significant others in their intimate online environments is threatened.

Inherits from (3):
sc2r:PrivacyThreat | sc2r:PersonalThreat | sc2r:Threat

Implementation:

@prefix owl: <http://www.w3.org/2002/07/owl#> .
@prefix rdfs: <http://www.w3.org/2000/01/rdf-schema#> .
@prefix sc2r: <http://cs.unu.edu/sc2r#> .

sc2r:IntimacyThreat a owl:Class ;
rdfs:label "Intimacy Threat"@en ;
rdfs:comment "Intimacy Threat occurs when individuals' preference to be alone with their significant others in their intimate online environments is threatened." ;
rdfs:subClassOf sc2r:PrivacyThreat .

Class: sc2r:IntrusionDetection   back to top


NOTE sc2r:IntrusionDetection is a leaf node.

Description
Intrusion detection involves monitoring and checking for unauthorized access to cyber resources including networking resources.

Inherits from (4):
sc2r:ThreatMonitoringMeasure | sc2r:MonitoringMeasure | sc2r:PrepareMeasure | sc2r:Response

Implementation:

@prefix owl: <http://www.w3.org/2002/07/owl#> .
@prefix rdfs: <http://www.w3.org/2000/01/rdf-schema#> .
@prefix sc2r: <http://cs.unu.edu/sc2r#> .

sc2r:IntrusionDetection a owl:Class ;
rdfs:label "Intrusion Detection" ;
rdfs:comment "Intrusion detection involves monitoring and checking for unauthorized access to cyber resources including networking resources." ;
rdfs:subClassOf sc2r:ThreatMonitoringMeasure .

Class: sc2r:IsolateMeasure   back to top


NOTE sc2r:IsolateMeasure is a leaf node.

Description
The isolate measure involves isolating the affected cyber resources from the connection with the threat. While related to Disconnect measures, isolation measures involve the continual operation of the cyber resources in an isolated context.

Inherits from (3):
sc2r:EngageMeasure | sc2r:AbsorbMeasure | sc2r:Response

Implementation:

@prefix owl: <http://www.w3.org/2002/07/owl#> .
@prefix rdfs: <http://www.w3.org/2000/01/rdf-schema#> .
@prefix sc2r: <http://cs.unu.edu/sc2r#> .

sc2r:IsolateMeasure a owl:Class ;
rdfs:label "Isolate Measure" ;
rdfs:comment """The isolate measure involves isolating the affected cyber resources from the connection with the threat.

While related to Disconnect measures, isolation measures involve the continual operation of the cyber resources in an isolated context.""" ;
rdfs:subClassOf sc2r:EngageMeasure .

Class: sc2r:Isolation   back to top


NOTE sc2r:Isolation is a leaf node.

Description
Isolation refers to the individual's act of completely separating themselves from others.

Inherits from (2):
sc2r:SocialHarm | sc2r:Harm

Implementation:

@prefix owl: <http://www.w3.org/2002/07/owl#> .
@prefix rdfs: <http://www.w3.org/2000/01/rdf-schema#> .
@prefix sc2r: <http://cs.unu.edu/sc2r#> .

sc2r:Isolation a owl:Class ;
rdfs:label "Isolation" ;
rdfs:comment "Isolation refers to the individual's act of completely separating themselves from others." ;
rdfs:subClassOf sc2r:SocialHarm .

Class: sc2r:Knowledge   back to top


NOTE sc2r:Knowledge is a leaf node.

Description
Knowledge is familiarity with, awareness, or understanding of various objects, events, ideas, or ways of doing things which is acquired through experience or education.

Inherits from (4):
sc2r:MentalFaculties | sc2r:Agency | sc2r:IndividualResource | sc2r:Resource

Implementation:

@prefix owl: <http://www.w3.org/2002/07/owl#> .
@prefix rdfs: <http://www.w3.org/2000/01/rdf-schema#> .
@prefix sc2r: <http://cs.unu.edu/sc2r#> .

sc2r:Knowledge a owl:Class ;
rdfs:label "Knowledge Resource" ;
rdfs:comment "Knowledge is familiarity with, awareness, or understanding of various objects, events, ideas, or ways of doing things which is acquired through experience or education." ;
rdfs:subClassOf sc2r:MentalFaculties .

Class: sc2r:Laptop   back to top


NOTE sc2r:Laptop is a leaf node.

Description
A Laptop is a portable computer.

Inherits from (3):
sc2r:ComputingAsset | sc2r:PhysicalResource | sc2r:Resource

Implementation:

@prefix owl: <http://www.w3.org/2002/07/owl#> .
@prefix rdfs: <http://www.w3.org/2000/01/rdf-schema#> .
@prefix sc2r: <http://cs.unu.edu/sc2r#> .

sc2r:Laptop a owl:Class ;
rdfs:label "Laptop" ;
rdfs:comment "A Laptop is a portable computer." ;
rdfs:subClassOf sc2r:ComputingAsset .

Class: sc2r:Laundering   back to top


NOTE sc2r:Laundering is a leaf node.

Description
Laundering is a combination of several techniques, such as tainted leaks, fake news, and potemkin village to create the appearance of legitimate and significant controversy where there is none.

Inherits from (3):
sc2r:SocialHacking | sc2r:SocialThreat | sc2r:Threat

Implementation:

@prefix owl: <http://www.w3.org/2002/07/owl#> .
@prefix rdfs: <http://www.w3.org/2000/01/rdf-schema#> .
@prefix sc2r: <http://cs.unu.edu/sc2r#> .

sc2r:Laundering a owl:Class ;
rdfs:label "Laundering" ;
rdfs:comment "Laundering is a combination of several techniques, such as tainted leaks, fake news, and potemkin village to create the appearance of legitimate and significant controversy where there is none." ;
rdfs:subClassOf sc2r:SocialHacking .

Class: sc2r:LeastPrivilege   back to top


NOTE sc2r:LeastPrivilege is a leaf node.

Description
Least privilege is the principle and mechanism of giving the minimum required privileges necessary for performing specific functions.

Inherits from (4):
sc2r:AccessControl | sc2r:PreventionMeasure | sc2r:PrepareMeasure | sc2r:Response

Implementation:

@prefix owl: <http://www.w3.org/2002/07/owl#> .
@prefix rdfs: <http://www.w3.org/2000/01/rdf-schema#> .
@prefix sc2r: <http://cs.unu.edu/sc2r#> .

sc2r:LeastPrivilege a owl:Class ;
rdfs:label "Least Privilege" ;
rdfs:comment "Least privilege is the principle and mechanism of giving the minimum required privileges necessary for performing specific functions." ;
rdfs:subClassOf sc2r:AccessControl .

Class: sc2r:LocationData   back to top


NOTE sc2r:LocationData is a leaf node.

Description
Location data is geographial information about a specific device's whereabouts associated to a time identifier.

Inherits from (4):
sc2r:PersonalData | sc2r:Data | sc2r:DigitalResource | sc2r:Resource

Implementation:

@prefix owl: <http://www.w3.org/2002/07/owl#> .
@prefix rdfs: <http://www.w3.org/2000/01/rdf-schema#> .
@prefix sc2r: <http://cs.unu.edu/sc2r#> .

sc2r:LocationData a owl:Class ;
rdfs:label "Location Data" ;
rdfs:comment "Location data is geographial information about a specific device's whereabouts associated to a time identifier." ;
rdfs:subClassOf sc2r:PersonalData .

Class: sc2r:LoggingAndAudit   back to top


NOTE sc2r:LoggingAndAudit is a leaf node.

Description
Logging and audit is a monitoring measure that involves keeping a record of relevant cyber activities, events, as well as states and operations of cyber resources.

Inherits from (3):
sc2r:MonitoringMeasure | sc2r:PrepareMeasure | sc2r:Response

Implementation:

@prefix owl: <http://www.w3.org/2002/07/owl#> .
@prefix rdfs: <http://www.w3.org/2000/01/rdf-schema#> .
@prefix sc2r: <http://cs.unu.edu/sc2r#> .

sc2r:LoggingAndAudit a owl:Class ;
rdfs:label "Logging and Audit" ;
rdfs:comment "Logging and audit is a monitoring measure that involves keeping a record of relevant cyber activities, events, as well as states and operations of cyber resources." ;
rdfs:subClassOf sc2r:MonitoringMeasure .

Class: sc2r:LossOfConfidence   back to top


NOTE sc2r:LossOfConfidence is a leaf node.

Description
Loss of Confidence refers to the state in which the individual experiences a lack of courage or certainty.

Inherits from (2):
sc2r:PsychologicalHarm | sc2r:Harm

Implementation:

@prefix owl: <http://www.w3.org/2002/07/owl#> .
@prefix rdfs: <http://www.w3.org/2000/01/rdf-schema#> .
@prefix sc2r: <http://cs.unu.edu/sc2r#> .

sc2r:LossOfConfidence a owl:Class ;
rdfs:label "Loss of Confidence" ;
rdfs:comment "Loss of Confidence refers to the state in which the individual experiences a lack of courage or certainty." ;
rdfs:subClassOf sc2r:PsychologicalHarm .

Class: sc2r:LossOfLife   back to top


NOTE sc2r:LossOfLife is a leaf node.

Description
Loss of Life refers to the passing of the individual as the result of realised impacts of cyber threats.

Inherits from (2):
sc2r:PhysicalHarm | sc2r:Harm

Implementation:

@prefix owl: <http://www.w3.org/2002/07/owl#> .
@prefix rdfs: <http://www.w3.org/2000/01/rdf-schema#> .
@prefix sc2r: <http://cs.unu.edu/sc2r#> .

sc2r:LossOfLife a owl:Class ;
rdfs:label "Loss of Life" ;
rdfs:comment "Loss of Life refers to the passing of the individual as the result of realised impacts of cyber threats." ;
rdfs:subClassOf sc2r:PhysicalHarm .

Class: sc2r:LossOfWork   back to top


NOTE sc2r:LossOfWork is a leaf node.

Description
Loss of Work refers to the situation in which the individual loses their job as the impact of the cyber threats of which they are the victim.

Inherits from (2):
sc2r:EconomicHarm | sc2r:Harm

Implementation:

@prefix owl: <http://www.w3.org/2002/07/owl#> .
@prefix rdfs: <http://www.w3.org/2000/01/rdf-schema#> .
@prefix sc2r: <http://cs.unu.edu/sc2r#> .

sc2r:LossOfWork a owl:Class ;
rdfs:label "Loss of Work" ;
rdfs:comment "Loss of Work refers to the situation in which the individual loses their job as the impact of the cyber threats of which they are the victim." ;
rdfs:subClassOf sc2r:EconomicHarm .

Class: sc2r:LostCredentials   back to top


NOTE sc2r:LostCredentials is a leaf node.

Description
Lost Credentials is when access to information and services is not possible due to lost account creditials.

Inherits from (3):
sc2r:AvailabilityThreat | sc2r:TechnologicalThreat | sc2r:Threat

Implementation:

@prefix owl: <http://www.w3.org/2002/07/owl#> .
@prefix rdfs: <http://www.w3.org/2000/01/rdf-schema#> .
@prefix sc2r: <http://cs.unu.edu/sc2r#> .

sc2r:LostCredentials a owl:Class ;
rdfs:label "Lost Credentials"@en ;
rdfs:comment "Lost Credentials is when access to information and services is not possible due to lost account creditials."@en ;
rdfs:subClassOf sc2r:AvailabilityThreat .

Class: sc2r:LostDevices   back to top


NOTE sc2r:LostDevices is a leaf node.

Description
This is a loss of computing devices that results in lack of access to the associated information and services.

Inherits from (3):
sc2r:AvailabilityThreat | sc2r:TechnologicalThreat | sc2r:Threat

Implementation:

@prefix owl: <http://www.w3.org/2002/07/owl#> .
@prefix rdfs: <http://www.w3.org/2000/01/rdf-schema#> .
@prefix sc2r: <http://cs.unu.edu/sc2r#> .

sc2r:LostDevices a owl:Class ;
rdfs:label "Lost Devices"@en ;
rdfs:comment "This is a loss of computing devices that results in lack of access to the associated information and services."@en ;
rdfs:subClassOf sc2r:AvailabilityThreat .

Class: sc2r:LoveBombing   back to top


NOTE sc2r:LoveBombing is a leaf node.

Description
Love Bombing occurs when the perpetrator gives the target an abundance of compliments and affection to gain their love and trust.

Inherits from (4):
sc2r:SexualAbuse | sc2r:Abuse | sc2r:PersonalThreat | sc2r:Threat

Implementation:

@prefix owl: <http://www.w3.org/2002/07/owl#> .
@prefix rdfs: <http://www.w3.org/2000/01/rdf-schema#> .
@prefix sc2r: <http://cs.unu.edu/sc2r#> .

sc2r:LoveBombing a owl:Class ;
rdfs:label "Love Bombing" ;
rdfs:comment "Love Bombing occurs when the perpetrator gives the target an abundance of compliments and affection to gain their love and trust." ;
rdfs:subClassOf sc2r:SexualAbuse .

Class: sc2r:LowMorale   back to top


NOTE sc2r:LowMorale is a leaf node.

Description
Low Morale refers to the state in which the individual's general confidence, enthusiasm, mood, and discipline is negatively impacted.

Inherits from (2):
sc2r:PsychologicalHarm | sc2r:Harm

Implementation:

@prefix owl: <http://www.w3.org/2002/07/owl#> .
@prefix rdfs: <http://www.w3.org/2000/01/rdf-schema#> .
@prefix sc2r: <http://cs.unu.edu/sc2r#> .

sc2r:LowMorale a owl:Class ;
rdfs:label "Low Morale" ;
rdfs:comment "Low Morale refers to the state in which the individual's general confidence, enthusiasm, mood, and discipline is negatively impacted." ;
rdfs:subClassOf sc2r:PsychologicalHarm .

Class: sc2r:LowSatisfaction   back to top


NOTE sc2r:LowSatisfaction is a leaf node.

Description
Low Satisfaction refers to the state in which the individual experiences a lack of contentment.

Inherits from (2):
sc2r:PsychologicalHarm | sc2r:Harm

Implementation:

@prefix owl: <http://www.w3.org/2002/07/owl#> .
@prefix rdfs: <http://www.w3.org/2000/01/rdf-schema#> .
@prefix sc2r: <http://cs.unu.edu/sc2r#> .

sc2r:LowSatisfaction a owl:Class ;
rdfs:label "Low Satisfaction" ;
rdfs:comment "Low Satisfaction refers to the state in which the individual experiences a lack of contentment." ;
rdfs:subClassOf sc2r:PsychologicalHarm .

Class: sc2r:Luring   back to top


NOTE sc2r:Luring is a leaf node.

Description
Luring occurs when the perpetrator uses online communication to contact the target who they think is under 18, in order to make it easier for them to commit a sexual offence against them.

Inherits from (4):
sc2r:SexualAbuse | sc2r:Abuse | sc2r:PersonalThreat | sc2r:Threat

Implementation:

@prefix owl: <http://www.w3.org/2002/07/owl#> .
@prefix rdfs: <http://www.w3.org/2000/01/rdf-schema#> .
@prefix sc2r: <http://cs.unu.edu/sc2r#> .

sc2r:Luring a owl:Class ;
rdfs:label "Luring Sexual Threat" ;
rdfs:comment "Luring occurs when the perpetrator uses online communication to contact the target who they think is under 18, in order to make it easier for them to commit a sexual offence against them." ;
rdfs:subClassOf sc2r:SexualAbuse .

Class: sc2r:Malfunction   back to top


NOTE sc2r:Malfunction is a leaf node.

Description
Malfunctions occurs when systems do not function as they are supposed to. This can be due to malicious factors or human errors.

Inherits from (3):
sc2r:IntegrityThreat | sc2r:TechnologicalThreat | sc2r:Threat

Implementation:

@prefix owl: <http://www.w3.org/2002/07/owl#> .
@prefix rdfs: <http://www.w3.org/2000/01/rdf-schema#> .
@prefix sc2r: <http://cs.unu.edu/sc2r#> .

sc2r:Malfunction a owl:Class ;
rdfs:label "Malfunction"@en ;
rdfs:comment "Malfunctions occurs when systems do not function as they are supposed to. This can be due to malicious factors or human errors."@en ;
rdfs:subClassOf sc2r:IntegrityThreat .

Class: sc2r:MaliciousContactRemoval   back to top


NOTE sc2r:MaliciousContactRemoval is a leaf node.

Description
This measures involves the removal and elimination of contact with an individual who is a threat actor.

Inherits from (4):
sc2r:RemovalMeasure | sc2r:EngageMeasure | sc2r:AbsorbMeasure | sc2r:Response

Implementation:

@prefix owl: <http://www.w3.org/2002/07/owl#> .
@prefix rdfs: <http://www.w3.org/2000/01/rdf-schema#> .
@prefix sc2r: <http://cs.unu.edu/sc2r#> .

sc2r:MaliciousContactRemoval a owl:Class ;
rdfs:label "Malicious Contact Removal" ;
rdfs:comment "This measures involves the removal and elimination of contact with an individual who is a threat actor." ;
rdfs:subClassOf sc2r:RemovalMeasure .

Class: sc2r:MaliciousContentRemoval   back to top


NOTE sc2r:MaliciousContentRemoval is a leaf node.

Description
This measures involves the removal and elimination of content that is a cause of a cyber threat.

Inherits from (4):
sc2r:RemovalMeasure | sc2r:EngageMeasure | sc2r:AbsorbMeasure | sc2r:Response

Implementation:

@prefix owl: <http://www.w3.org/2002/07/owl#> .
@prefix rdfs: <http://www.w3.org/2000/01/rdf-schema#> .
@prefix sc2r: <http://cs.unu.edu/sc2r#> .

sc2r:MaliciousContentRemoval a owl:Class ;
rdfs:label "Malicious Content Removal" ;
rdfs:comment "This measures involves the removal and elimination of content that is a cause of a cyber threat." ;
rdfs:subClassOf sc2r:RemovalMeasure .

Class: sc2r:MaliciousSoftwareDetection   back to top


NOTE sc2r:MaliciousSoftwareDetection is a leaf node.

Description
Malicious software detection involves scanning computing equipment to check for the presence of malicious software.

Inherits from (4):
sc2r:ThreatMonitoringMeasure | sc2r:MonitoringMeasure | sc2r:PrepareMeasure | sc2r:Response

Implementation:

@prefix owl: <http://www.w3.org/2002/07/owl#> .
@prefix rdfs: <http://www.w3.org/2000/01/rdf-schema#> .
@prefix sc2r: <http://cs.unu.edu/sc2r#> .

sc2r:MaliciousSoftwareDetection a owl:Class ;
rdfs:label "Malicious Software Detection" ;
rdfs:comment "Malicious software detection involves scanning computing equipment to check for the presence of malicious software." ;
rdfs:subClassOf sc2r:ThreatMonitoringMeasure .

Class: sc2r:MaliciousSoftwareRemoval   back to top


NOTE sc2r:MaliciousSoftwareRemoval is a leaf node.

Description
This measures involves the removal and elimination of software, usually malware, that is a source of a cyber threat.

Inherits from (4):
sc2r:RemovalMeasure | sc2r:EngageMeasure | sc2r:AbsorbMeasure | sc2r:Response

Implementation:

@prefix owl: <http://www.w3.org/2002/07/owl#> .
@prefix rdfs: <http://www.w3.org/2000/01/rdf-schema#> .
@prefix sc2r: <http://cs.unu.edu/sc2r#> .

sc2r:MaliciousSoftwareRemoval a owl:Class ;
rdfs:label "Malicious Software Removal" ;
rdfs:comment "This measures involves the removal and elimination of software, usually malware, that is a source of a cyber threat." ;
rdfs:subClassOf sc2r:RemovalMeasure .

Class: sc2r:MalignRhetoric   back to top


Description
Malign Rhetoric is an influence effort that aims to subvert and undermine specific narratives and views that individuals might hold.

Inherits from (4):
sc2r:Disinformation | sc2r:CognitiveThreat | sc2r:PersonalThreat | sc2r:Threat

Implementation:

@prefix owl: <http://www.w3.org/2002/07/owl#> .
@prefix rdfs: <http://www.w3.org/2000/01/rdf-schema#> .
@prefix sc2r: <http://cs.unu.edu/sc2r#> .

sc2r:MalignRhetoric a owl:Class ;
rdfs:label "Malign Rhetoric"@en ;
rdfs:comment "Malign Rhetoric is an influence effort that aims to subvert and undermine specific narratives and views that individuals might hold."@en ;
rdfs:subClassOf sc2r:Disinformation .

Class: sc2r:Malinformation   back to top


Description
Malinformation occurs when individuals are exposed to content and information that is based on reality but taken out of context with malicious intent to inflict harm.

Inherits from (3):
sc2r:CognitiveThreat | sc2r:PersonalThreat | sc2r:Threat

Implementation:

@prefix owl: <http://www.w3.org/2002/07/owl#> .
@prefix rdfs: <http://www.w3.org/2000/01/rdf-schema#> .
@prefix sc2r: <http://cs.unu.edu/sc2r#> .

sc2r:Malinformation a owl:Class ;
rdfs:label "Malinformation"@en ;
rdfs:comment "Malinformation occurs when individuals are exposed to content and information that is based on reality but taken out of context with malicious intent to inflict harm."@en ;
rdfs:subClassOf sc2r:CognitiveThreat .

Class: sc2r:Malware   back to top


NOTE sc2r:Malware is a leaf node.

Description
Malware is software that is created for malicious purposes to compromise and damage individuals' cyber resources.

Inherits from (3):
sc2r:IntegrityThreat | sc2r:TechnologicalThreat | sc2r:Threat

Implementation:

@prefix owl: <http://www.w3.org/2002/07/owl#> .
@prefix rdfs: <http://www.w3.org/2000/01/rdf-schema#> .
@prefix sc2r: <http://cs.unu.edu/sc2r#> .

sc2r:Malware a owl:Class ;
rdfs:label "Malware"@en ;
rdfs:comment "Malware is software that is created for malicious purposes to compromise and damage individuals' cyber resources."@en ;
rdfs:subClassOf sc2r:IntegrityThreat .

Class: sc2r:Masquerading   back to top


NOTE sc2r:Masquerading is a leaf node.

Description
Masquerading is an attack where false identity is used to gain access to unauthorized information. The attacker pretends to be and masquerades as the victim.

Inherits from (3):
sc2r:AuthenticationThreat | sc2r:TechnologicalThreat | sc2r:Threat

Implementation:

@prefix owl: <http://www.w3.org/2002/07/owl#> .
@prefix rdfs: <http://www.w3.org/2000/01/rdf-schema#> .
@prefix sc2r: <http://cs.unu.edu/sc2r#> .

sc2r:Masquerading a owl:Class ;
rdfs:label "Masquerading"@en ;
rdfs:comment "Masquerading is an attack where false identity is used to gain access to unauthorized information. The attacker pretends to be and masquerades as the victim."@en ;
rdfs:subClassOf sc2r:AuthenticationThreat .

Class: sc2r:MediationMeasures   back to top


Description
Mediation measures are measures that are put in place for other individuals to limit the impact of adverse cyber incidents. For example, guardians and parents can put in place mediation measures that limit the negative outcomes of online gaming.

Inherits from (2):
sc2r:PrepareMeasure | sc2r:Response

Implementation:

@prefix owl: <http://www.w3.org/2002/07/owl#> .
@prefix rdfs: <http://www.w3.org/2000/01/rdf-schema#> .
@prefix sc2r: <http://cs.unu.edu/sc2r#> .

sc2r:MediationMeasures a owl:Class ;
rdfs:label "Mediation Measures" ;
rdfs:comment """Mediation measures are measures that are put in place for other individuals to limit the impact of adverse cyber incidents.

For example, guardians and parents can put in place mediation measures that limit the negative outcomes of online gaming.""" ;
rdfs:subClassOf sc2r:PrepareMeasure .

Class: sc2r:MentalFaculties   back to top


Description
Mental Faculties are the various functions of the mind, or things the mind can "do". Mental faculties comprise cognitive, affective, and conative skills that are crucial to human’s conscious experience and decision-making process.

Inherits from (3):
sc2r:Agency | sc2r:IndividualResource | sc2r:Resource

Implementation:

@prefix owl: <http://www.w3.org/2002/07/owl#> .
@prefix rdfs: <http://www.w3.org/2000/01/rdf-schema#> .
@prefix sc2r: <http://cs.unu.edu/sc2r#> .

sc2r:MentalFaculties a owl:Class ;
rdfs:label "Mental Faculties" ;
rdfs:comment "Mental Faculties are the various functions of the mind, or things the mind can \"do\". Mental faculties comprise cognitive, affective, and conative skills that are crucial to human’s conscious experience and decision-making process." ;
rdfs:subClassOf sc2r:Agency .

Class: sc2r:Microtargeting   back to top


NOTE sc2r:Microtargeting is a leaf node.

Description
Microtargeting (or niche-tageting) occurs when individuals are targeted by marketing content that is personalised to attract the attention of the members of the sub-group the individuals are segmented in, to influence their actions.

Inherits from (5):
sc2r:PsychographicHacking | sc2r:InfluenceThreat | sc2r:CognitiveThreat | sc2r:PersonalThreat | sc2r:Threat

Implementation:

@prefix owl: <http://www.w3.org/2002/07/owl#> .
@prefix rdfs: <http://www.w3.org/2000/01/rdf-schema#> .
@prefix sc2r: <http://cs.unu.edu/sc2r#> .

sc2r:Microtargeting a owl:Class ;
rdfs:label "Microtargeting"@en ;
rdfs:comment "Microtargeting (or niche-tageting) occurs when individuals are targeted by marketing content that is personalised to attract the attention of the members of the sub-group the individuals are segmented in, to influence their actions." ;
rdfs:subClassOf sc2r:PsychographicHacking .

Class: sc2r:Misconfiguration   back to top


NOTE sc2r:Misconfiguration is a leaf node.

Description
Misconfiguration occurs when systems have been configured in a way that compromise their functioning and integrity. Misconfiguration exposes resources to vulnerabilities that can be avoided through better configuration.

Inherits from (3):
sc2r:IntegrityThreat | sc2r:TechnologicalThreat | sc2r:Threat

Implementation:

@prefix owl: <http://www.w3.org/2002/07/owl#> .
@prefix rdfs: <http://www.w3.org/2000/01/rdf-schema#> .
@prefix sc2r: <http://cs.unu.edu/sc2r#> .

sc2r:Misconfiguration a owl:Class ;
rdfs:label "Misconfiguration"@en ;
rdfs:comment "Misconfiguration occurs when systems have been configured in a way that compromise their functioning and integrity. Misconfiguration exposes resources to vulnerabilities that can be avoided through better configuration."@en ;
rdfs:subClassOf sc2r:IntegrityThreat .

Class: sc2r:Misinformation   back to top


Description
Misinformation is false or inaccurate information. Examples of misinformation include false rumours, or insults and pranks, while examples of more deliberate disinformation include malicious content such as hoaxes, spearphishing, andd computational propaganda.

Inherits from (3):
sc2r:CognitiveThreat | sc2r:PersonalThreat | sc2r:Threat

Implementation:

@prefix owl: <http://www.w3.org/2002/07/owl#> .
@prefix rdfs: <http://www.w3.org/2000/01/rdf-schema#> .
@prefix sc2r: <http://cs.unu.edu/sc2r#> .

sc2r:Misinformation a owl:Class ;
rdfs:label "Misinformation"@en ;
rdfs:comment "Misinformation is false or inaccurate information. Examples of misinformation include false rumours, or insults and pranks, while examples of more deliberate disinformation include malicious content such as hoaxes, spearphishing, andd computational propaganda."@en ;
rdfs:seeAlso "https://en.wikipedia.org/wiki/Misinformation"@en ;
rdfs:subClassOf sc2r:CognitiveThreat .

Class: sc2r:MisleadingAdvertising   back to top


NOTE sc2r:MisleadingAdvertising is a leaf node.

Description
This is advertising content that is meant to mislead consumers.

Inherits from (5):
sc2r:MisleadingInformation | sc2r:Misinformation | sc2r:CognitiveThreat | sc2r:PersonalThreat | sc2r:Threat

Implementation:

@prefix owl: <http://www.w3.org/2002/07/owl#> .
@prefix rdfs: <http://www.w3.org/2000/01/rdf-schema#> .
@prefix sc2r: <http://cs.unu.edu/sc2r#> .

sc2r:MisleadingAdvertising a owl:Class ;
rdfs:label "Misleading Advertising"@en ;
rdfs:comment "This is advertising content that is meant to mislead consumers." ;
rdfs:subClassOf sc2r:MisleadingInformation .

Class: sc2r:MisleadingInformation   back to top


Description
Misleading Information is content that is meant to mislead or misinform.

Inherits from (4):
sc2r:Misinformation | sc2r:CognitiveThreat | sc2r:PersonalThreat | sc2r:Threat

Implementation:

@prefix owl: <http://www.w3.org/2002/07/owl#> .
@prefix rdfs: <http://www.w3.org/2000/01/rdf-schema#> .
@prefix sc2r: <http://cs.unu.edu/sc2r#> .

sc2r:MisleadingInformation a owl:Class ;
rdfs:label "Misleading Information"@en ;
rdfs:comment "Misleading Information is content that is meant to mislead or misinform." ;
rdfs:subClassOf sc2r:Misinformation .

Class: sc2r:Misled   back to top


NOTE sc2r:Misled is a leaf node.

Description
Misled is the state in which the individual is led to believe something that is not true.

Inherits from (3):
sc2r:Confusion | sc2r:PsychologicalHarm | sc2r:Harm

Implementation:

@prefix owl: <http://www.w3.org/2002/07/owl#> .
@prefix rdfs: <http://www.w3.org/2000/01/rdf-schema#> .
@prefix sc2r: <http://cs.unu.edu/sc2r#> .

sc2r:Misled a owl:Class ;
rdfs:label "Misled" ;
rdfs:comment "Misled is the state in which the individual is led to believe something that is not true." ;
rdfs:subClassOf sc2r:Confusion .

Class: sc2r:Mistreatment   back to top


NOTE sc2r:Mistreatment is a leaf node.

Description
Mistreatment refers to the state in which the individual feels mistreated.

Inherits from (2):
sc2r:PsychologicalHarm | sc2r:Harm

Implementation:

@prefix owl: <http://www.w3.org/2002/07/owl#> .
@prefix rdfs: <http://www.w3.org/2000/01/rdf-schema#> .
@prefix sc2r: <http://cs.unu.edu/sc2r#> .

sc2r:Mistreatment a owl:Class ;
rdfs:label "Mistreatment" ;
rdfs:comment "Mistreatment refers to the state in which the individual feels mistreated." ;
rdfs:subClassOf sc2r:PsychologicalHarm .

Class: sc2r:MitigationCost   back to top


NOTE sc2r:MitigationCost is a leaf node.

Description
Mitigation Cost refers to the costs, charges, fees, or payment incurred in taking action that is intended to mitigate the severity of harms that would occur if the cyber threat is realised.

Inherits from (2):
sc2r:EconomicHarm | sc2r:Harm

Implementation:

@prefix owl: <http://www.w3.org/2002/07/owl#> .
@prefix rdfs: <http://www.w3.org/2000/01/rdf-schema#> .
@prefix sc2r: <http://cs.unu.edu/sc2r#> .

sc2r:MitigationCost a owl:Class ;
rdfs:label "Mitigation Cost" ;
rdfs:comment "Mitigation Cost refers to the costs, charges, fees, or payment incurred in taking action that is intended to mitigate the severity of harms that would occur if the cyber threat is realised." ;
rdfs:subClassOf sc2r:EconomicHarm .

Class: sc2r:MobileDevice   back to top


NOTE sc2r:MobileDevice is a leaf node.

Description
Mobile Device is any portable computing device, such as a smartphone or tablet computer.

Inherits from (3):
sc2r:ComputingAsset | sc2r:PhysicalResource | sc2r:Resource

Implementation:

@prefix owl: <http://www.w3.org/2002/07/owl#> .
@prefix rdfs: <http://www.w3.org/2000/01/rdf-schema#> .
@prefix sc2r: <http://cs.unu.edu/sc2r#> .

sc2r:MobileDevice a owl:Class ;
rdfs:label "Mobile Device" ;
rdfs:comment "Mobile Device is any portable computing device, such as a smartphone or tablet computer." ;
rdfs:subClassOf sc2r:ComputingAsset .

Class: sc2r:MonitoringMeasure   back to top


Description
Monitoring measure involves observing and checking the state of individual cyber functions as well as the operation of relevant cyber resources.

Inherits from (2):
sc2r:PrepareMeasure | sc2r:Response

Implementation:

@prefix owl: <http://www.w3.org/2002/07/owl#> .
@prefix rdfs: <http://www.w3.org/2000/01/rdf-schema#> .
@prefix sc2r: <http://cs.unu.edu/sc2r#> .

sc2r:MonitoringMeasure a owl:Class ;
rdfs:label "Monitoring Measure" ;
rdfs:comment "Monitoring measure involves observing and checking the state of individual cyber functions as well as the operation of relevant cyber resources." ;
rdfs:subClassOf sc2r:PrepareMeasure .

Class: sc2r:Motivation   back to top


NOTE sc2r:Motivation is a leaf node.

Description
Motivation is the internal needs, desires, wants or drives of individuals.

Inherits from (4):
sc2r:MentalFaculties | sc2r:Agency | sc2r:IndividualResource | sc2r:Resource

Implementation:

@prefix owl: <http://www.w3.org/2002/07/owl#> .
@prefix rdfs: <http://www.w3.org/2000/01/rdf-schema#> .
@prefix sc2r: <http://cs.unu.edu/sc2r#> .

sc2r:Motivation a owl:Class ;
rdfs:label "Motivation" ;
rdfs:comment "Motivation is the internal needs, desires, wants or drives of individuals." ;
rdfs:subClassOf sc2r:MentalFaculties .

Class: sc2r:MultiFactorAuthentication   back to top


NOTE sc2r:MultiFactorAuthentication is a leaf node.

Description
Multi-factor authentication is the process of using multiple authentication methods to verify claimed identity.

Inherits from (4):
sc2r:Identification | sc2r:PreventionMeasure | sc2r:PrepareMeasure | sc2r:Response

Implementation:

@prefix owl: <http://www.w3.org/2002/07/owl#> .
@prefix rdfs: <http://www.w3.org/2000/01/rdf-schema#> .
@prefix sc2r: <http://cs.unu.edu/sc2r#> .

sc2r:MultiFactorAuthentication a owl:Class ;
rdfs:label "Multifactor Authentication" ;
rdfs:comment "Multi-factor authentication is the process of using multiple authentication methods to verify claimed identity." ;
rdfs:subClassOf sc2r:Identification .

Class: sc2r:MutualAuthentication   back to top


NOTE sc2r:MutualAuthentication is a leaf node.

Description
Mutual authentication is a process of two-way authentication between the communicating entities.

Inherits from (4):
sc2r:Identification | sc2r:PreventionMeasure | sc2r:PrepareMeasure | sc2r:Response

Implementation:

@prefix owl: <http://www.w3.org/2002/07/owl#> .
@prefix rdfs: <http://www.w3.org/2000/01/rdf-schema#> .
@prefix sc2r: <http://cs.unu.edu/sc2r#> .

sc2r:MutualAuthentication a owl:Class ;
rdfs:label "Mutual Authentication" ;
rdfs:comment "Mutual authentication is a process of two-way authentication between the communicating entities." ;
rdfs:subClassOf sc2r:Identification .

Class: sc2r:NaturalDisaster   back to top


NOTE sc2r:NaturalDisaster is a leaf node.

Description
Natural disasters affect the cyber resources that support individuals' cyber functionings.

Inherits from (2):
sc2r:EnvironmentalThreat | sc2r:Threat

Implementation:

@prefix owl: <http://www.w3.org/2002/07/owl#> .
@prefix rdfs: <http://www.w3.org/2000/01/rdf-schema#> .
@prefix sc2r: <http://cs.unu.edu/sc2r#> .

sc2r:NaturalDisaster a owl:Class ;
rdfs:label "Natural Disaster Threat"@en ;
rdfs:comment "Natural disasters affect the cyber resources that support individuals' cyber functionings."@en ;
rdfs:subClassOf sc2r:EnvironmentalThreat .

Class: sc2r:NegativePerception   back to top


NOTE sc2r:NegativePerception is a leaf node.

Description
Negative Perception refers to the state in which the individual experiences an adverse change in their perception about something.

Inherits from (2):
sc2r:PsychologicalHarm | sc2r:Harm

Implementation:

@prefix owl: <http://www.w3.org/2002/07/owl#> .
@prefix rdfs: <http://www.w3.org/2000/01/rdf-schema#> .
@prefix sc2r: <http://cs.unu.edu/sc2r#> .

sc2r:NegativePerception a owl:Class ;
rdfs:label "Negative Perception" ;
rdfs:comment "Negative Perception refers to the state in which the individual experiences an adverse change in their perception about something." ;
rdfs:subClassOf sc2r:PsychologicalHarm .

Class: sc2r:NetworkEquipment   back to top


NOTE sc2r:NetworkEquipment is a leaf node.

Description
Network Equipment (networking hardware; networking device) comprises electronic devices which are required for communication and interaction between devices on a computer network.

Inherits from (2):
sc2r:PhysicalResource | sc2r:Resource

Implementation:

@prefix owl: <http://www.w3.org/2002/07/owl#> .
@prefix rdfs: <http://www.w3.org/2000/01/rdf-schema#> .
@prefix sc2r: <http://cs.unu.edu/sc2r#> .

sc2r:NetworkEquipment a owl:Class ;
rdfs:label "Network Equipment" ;
rdfs:comment "Network Equipment (networking hardware; networking device) comprises electronic devices which are required for communication and interaction between devices on a computer network." ;
rdfs:subClassOf sc2r:PhysicalResource .

Class: sc2r:NetworkIntrusion   back to top


NOTE sc2r:NetworkIntrusion is a leaf node.

Description
Network intrusion occurs when there is unauthorized access to a digital network.

Inherits from (4):
sc2r:UnauthorizedAccess | sc2r:AuthenticationThreat | sc2r:TechnologicalThreat | sc2r:Threat

Implementation:

@prefix owl: <http://www.w3.org/2002/07/owl#> .
@prefix rdfs: <http://www.w3.org/2000/01/rdf-schema#> .
@prefix sc2r: <http://cs.unu.edu/sc2r#> .

sc2r:NetworkIntrusion a owl:Class ;
rdfs:label "Network Intrusion"@en ;
rdfs:comment "Network intrusion occurs when there is unauthorized access to a digital network."@en ;
rdfs:subClassOf sc2r:UnauthorizedAccess .

Class: sc2r:NetworkRedundancy   back to top


NOTE sc2r:NetworkRedundancy is a leaf node.

Description
Network redundancy involves having redundant network connectivity to allow for alternative connection to the internet in cases where the primary connectivity is negatively affected by adverse cyber incidents.

Inherits from (4):
sc2r:RedundancyMeasure | sc2r:AnticipateMeasure | sc2r:PrepareMeasure | sc2r:Response

Implementation:

@prefix owl: <http://www.w3.org/2002/07/owl#> .
@prefix rdfs: <http://www.w3.org/2000/01/rdf-schema#> .
@prefix sc2r: <http://cs.unu.edu/sc2r#> .

sc2r:NetworkRedundancy a owl:Class ;
rdfs:label "Network Redundancy" ;
rdfs:comment "Network redundancy involves having redundant network connectivity to allow for alternative connection to the internet in cases where the primary connectivity is negatively affected by adverse cyber incidents." ;
rdfs:subClassOf sc2r:RedundancyMeasure .

Class: sc2r:NetworkVulnerability   back to top


NOTE sc2r:NetworkVulnerability is a leaf node.

Description
Network Vulnerabilities are weaknesses in the network resources.

Inherits from (2):
sc2r:Digital | sc2r:Vulnerability

Implementation:

@prefix owl: <http://www.w3.org/2002/07/owl#> .
@prefix rdfs: <http://www.w3.org/2000/01/rdf-schema#> .
@prefix sc2r: <http://cs.unu.edu/sc2r#> .

sc2r:NetworkVulnerability a owl:Class ;
rdfs:label "Network Vulnerability" ;
rdfs:comment "Network Vulnerabilities are weaknesses in the network resources." ;
rdfs:subClassOf sc2r:Digital .

Class: sc2r:NonRepudiationThreat   back to top


NOTE sc2r:NonRepudiationThreat is a leaf node.

Description
Non-repudiation Threats compromise the non-repudiation cybersecurity goal.

Inherits from (2):
sc2r:TechnologicalThreat | sc2r:Threat

Implementation:

@prefix owl: <http://www.w3.org/2002/07/owl#> .
@prefix rdfs: <http://www.w3.org/2000/01/rdf-schema#> .
@prefix sc2r: <http://cs.unu.edu/sc2r#> .

sc2r:NonRepudiationThreat a owl:Class ;
rdfs:label "Non-repudiation Threat"@en ;
rdfs:comment "Non-repudiation Threats compromise the non-repudiation cybersecurity goal."@en ;
rdfs:subClassOf sc2r:TechnologicalThreat .

Class: sc2r:OffensiveLanguage   back to top


NOTE sc2r:OffensiveLanguage is a leaf node.

Description
This is information and content that uses language that is offensive to individuals under specific contexts.

Inherits from (5):
sc2r:InappropriateContent | sc2r:Malinformation | sc2r:CognitiveThreat | sc2r:PersonalThreat | sc2r:Threat

Implementation:

@prefix owl: <http://www.w3.org/2002/07/owl#> .
@prefix rdfs: <http://www.w3.org/2000/01/rdf-schema#> .
@prefix sc2r: <http://cs.unu.edu/sc2r#> .

sc2r:OffensiveLanguage a owl:Class ;
rdfs:label "Offensive Language"@en ;
rdfs:comment "This is information and content that uses language that is offensive to individuals under specific contexts."@en ;
rdfs:subClassOf sc2r:InappropriateContent ;
owl:equivalentClass sc2r:Profanity .

Class: sc2r:OnlineServices   back to top


NOTE sc2r:OnlineServices is a leaf node.

Description
An Online Service refers to any information and services provided over the Internet.

Inherits from (3):
sc2r:Software | sc2r:DigitalResource | sc2r:Resource

Implementation:

@prefix owl: <http://www.w3.org/2002/07/owl#> .
@prefix rdfs: <http://www.w3.org/2000/01/rdf-schema#> .
@prefix sc2r: <http://cs.unu.edu/sc2r#> .

sc2r:OnlineServices a owl:Class ;
rdfs:label "Online Service" ;
rdfs:comment "An Online Service refers to any information and services provided over the Internet." ;
rdfs:subClassOf sc2r:Software .

Class: sc2r:Opinion   back to top


NOTE sc2r:Opinion is a leaf node.

Description
The Right to Opinion (freedom of opinion) is individual's right to hold opinions without interference, and cannot be subject to any exception or restriction.

Inherits from (3):
sc2r:Right | sc2r:IndividualResource | sc2r:Resource

Implementation:

@prefix owl: <http://www.w3.org/2002/07/owl#> .
@prefix rdfs: <http://www.w3.org/2000/01/rdf-schema#> .
@prefix sc2r: <http://cs.unu.edu/sc2r#> .

sc2r:Opinion a owl:Class ;
rdfs:label "Right to Opinion" ;
rdfs:comment "The Right to Opinion (freedom of opinion) is individual's right to hold opinions without interference, and cannot be subject to any exception or restriction." ;
rdfs:subClassOf sc2r:Right .

Class: sc2r:OpposingInformation   back to top


NOTE sc2r:OpposingInformation is a leaf node.

Description
This is part of disinformation and influence campaign in which content is distributed to counter specific narratives and perspectives.

Inherits from (4):
sc2r:Disinformation | sc2r:CognitiveThreat | sc2r:PersonalThreat | sc2r:Threat

Implementation:

@prefix owl: <http://www.w3.org/2002/07/owl#> .
@prefix rdfs: <http://www.w3.org/2000/01/rdf-schema#> .
@prefix sc2r: <http://cs.unu.edu/sc2r#> .

sc2r:OpposingInformation a owl:Class ;
rdfs:label "Opposing Information"@en ;
rdfs:comment "This is part of disinformation and influence campaign in which content is distributed to counter specific narratives and perspectives."@en ;
rdfs:subClassOf sc2r:Disinformation .

Class: sc2r:Overwhelmed   back to top


NOTE sc2r:Overwhelmed is a leaf node.

Description
Overwhelmed refers to the state in which the individual feels completely submerged by their thoughts and emotions to the point where they lack efficacy and feel frozen or paralysed.

Inherits from (2):
sc2r:PsychologicalHarm | sc2r:Harm

Implementation:

@prefix owl: <http://www.w3.org/2002/07/owl#> .
@prefix rdfs: <http://www.w3.org/2000/01/rdf-schema#> .
@prefix sc2r: <http://cs.unu.edu/sc2r#> .

sc2r:Overwhelmed a owl:Class ;
rdfs:label "Overwhelmed" ;
rdfs:comment "Overwhelmed refers to the state in which the individual feels completely submerged by their thoughts and emotions to the point where they lack efficacy and feel frozen or paralysed." ;
rdfs:subClassOf sc2r:PsychologicalHarm .

Class: sc2r:Pain   back to top


NOTE sc2r:Pain is a leaf node.

Description
Pain refers to the experience of agony of the individual.

Inherits from (3):
sc2r:BodilyInjury | sc2r:PhysicalHarm | sc2r:Harm

Implementation:

@prefix owl: <http://www.w3.org/2002/07/owl#> .
@prefix rdfs: <http://www.w3.org/2000/01/rdf-schema#> .
@prefix sc2r: <http://cs.unu.edu/sc2r#> .

sc2r:Pain a owl:Class ;
rdfs:label "Bodily Pain" ;
rdfs:comment "Pain refers to the experience of agony of the individual." ;
rdfs:subClassOf sc2r:BodilyInjury .

Class: sc2r:ParasocialHacking   back to top


NOTE sc2r:ParasocialHacking is a leaf node.

Description
Parasocial Hacking exploits the biases arising from individual's parasocial relationships.

Inherits from (3):
sc2r:SocialHacking | sc2r:SocialThreat | sc2r:Threat

Implementation:

@prefix owl: <http://www.w3.org/2002/07/owl#> .
@prefix rdfs: <http://www.w3.org/2000/01/rdf-schema#> .
@prefix sc2r: <http://cs.unu.edu/sc2r#> .

sc2r:ParasocialHacking a owl:Class ;
rdfs:label "Parasocial Hacking" ;
rdfs:comment "Parasocial Hacking exploits the biases arising from individual's parasocial relationships." ;
rdfs:subClassOf sc2r:SocialHacking .

Class: sc2r:Parody   back to top


NOTE sc2r:Parody is a leaf node.

Description
Parody used in the context of an influence campaign to shape narratives and influence individuals.

Inherits from (5):
sc2r:InfluenceOperation | sc2r:Disinformation | sc2r:CognitiveThreat | sc2r:PersonalThreat | sc2r:Threat

Implementation:

@prefix owl: <http://www.w3.org/2002/07/owl#> .
@prefix rdfs: <http://www.w3.org/2000/01/rdf-schema#> .
@prefix sc2r: <http://cs.unu.edu/sc2r#> .

sc2r:Parody a owl:Class ;
rdfs:label "Parody"@en ;
rdfs:comment "Parody used in the context of an influence campaign to shape narratives and influence individuals."@en ;
rdfs:subClassOf sc2r:InfluenceOperation .

Class: sc2r:PasswordManagement   back to top


NOTE sc2r:PasswordManagement is a leaf node.

Description
Password management is the use of password of authentication in a safe and secure manner.

Inherits from (4):
sc2r:Identification | sc2r:PreventionMeasure | sc2r:PrepareMeasure | sc2r:Response

Implementation:

@prefix owl: <http://www.w3.org/2002/07/owl#> .
@prefix rdfs: <http://www.w3.org/2000/01/rdf-schema#> .
@prefix sc2r: <http://cs.unu.edu/sc2r#> .

sc2r:PasswordManagement a owl:Class ;
rdfs:label "Password Management" ;
rdfs:comment "Password management is the use of password of authentication in a safe and secure manner." ;
rdfs:subClassOf sc2r:Identification .

Class: sc2r:Persistence   back to top


NOTE sc2r:Persistence is a leaf node.

Description
Persistence occurs when someone keeps asking for something, even when the victim repeatedly says “no.”

Inherits from (4):
sc2r:SexualAbuse | sc2r:Abuse | sc2r:PersonalThreat | sc2r:Threat

Implementation:

@prefix owl: <http://www.w3.org/2002/07/owl#> .
@prefix rdfs: <http://www.w3.org/2000/01/rdf-schema#> .
@prefix sc2r: <http://cs.unu.edu/sc2r#> .

sc2r:Persistence a owl:Class ;
rdfs:label "Persistence Sexual Threat" ;
rdfs:comment "Persistence occurs when someone keeps asking for something, even when the victim repeatedly says “no.”" ;
rdfs:subClassOf sc2r:SexualAbuse .

Class: sc2r:PersonalData   back to top


Description
Personal data is any data relating to an identified or identifiable natural person (‘data subject’).

Inherits from (3):
sc2r:Data | sc2r:DigitalResource | sc2r:Resource

Implementation:

@prefix owl: <http://www.w3.org/2002/07/owl#> .
@prefix rdfs: <http://www.w3.org/2000/01/rdf-schema#> .
@prefix sc2r: <http://cs.unu.edu/sc2r#> .

sc2r:PersonalData a owl:Class ;
rdfs:label "Personal Data" ;
rdfs:comment "Personal data is any data relating to an identified or identifiable natural person (‘data subject’)." ;
rdfs:subClassOf sc2r:Data .

Class: sc2r:PersonalThreat   back to top


Description
Personal Threats are associated with individuals' personal attributes and endowments. They include cognitive and influence threats, as well as privacy and identity threats.

Inherits from (1):
sc2r:Threat

Implementation:

@prefix owl: <http://www.w3.org/2002/07/owl#> .
@prefix rdfs: <http://www.w3.org/2000/01/rdf-schema#> .
@prefix sc2r: <http://cs.unu.edu/sc2r#> .

sc2r:PersonalThreat a owl:Class ;
rdfs:label "Individual and Personal Threat"@en ;
rdfs:comment "Personal Threats are associated with individuals' personal attributes and endowments. They include cognitive and influence threats, as well as privacy and identity threats."@en ;
rdfs:subClassOf sc2r:Threat .

Class: sc2r:Phishing   back to top


Description
Phishing is a broader term for any attempt to trick individuals to share sensitive information, such as passwords, usernames, and credit card details for malicious reasons using a message sent via email, text, phone call, or direct-chat message that appears to be from a trusted source.

Inherits from (5):
sc2r:SocialEngineering | sc2r:InfluenceThreat | sc2r:CognitiveThreat | sc2r:PersonalThreat | sc2r:Threat

Implementation:

@prefix owl: <http://www.w3.org/2002/07/owl#> .
@prefix rdfs: <http://www.w3.org/2000/01/rdf-schema#> .
@prefix sc2r: <http://cs.unu.edu/sc2r#> .

sc2r:Phishing a owl:Class ;
rdfs:label "Phishing"@en ;
rdfs:comment "Phishing is a broader term for any attempt to trick individuals to share sensitive information, such as passwords, usernames, and credit card details for malicious reasons using a message sent via email, text, phone call, or direct-chat message that appears to be from a trusted source." ;
rdfs:subClassOf sc2r:SocialEngineering .

Class: sc2r:Physical   back to top


Description
Physical Vulnerabilities are weaknesses associated with the materiality of cyber resources that individuals own.

Inherits from (1):
sc2r:Vulnerability

Implementation:

@prefix owl: <http://www.w3.org/2002/07/owl#> .
@prefix rdfs: <http://www.w3.org/2000/01/rdf-schema#> .
@prefix sc2r: <http://cs.unu.edu/sc2r#> .

sc2r:Physical a owl:Class ;
rdfs:label "Physical Vulnerability" ;
rdfs:comment "Physical Vulnerabilities are weaknesses associated with the materiality of cyber resources that individuals own." ;
rdfs:subClassOf sc2r:Vulnerability .

Class: sc2r:PhysicalHarm   back to top


Description
Physical harm is the negative effect on physical or digital resources.

Inherits from (1):
sc2r:Harm

Implementation:

@prefix owl: <http://www.w3.org/2002/07/owl#> .
@prefix rdfs: <http://www.w3.org/2000/01/rdf-schema#> .
@prefix sc2r: <http://cs.unu.edu/sc2r#> .

sc2r:PhysicalHarm a owl:Class ;
rdfs:label "Physical Harm" ;
rdfs:comment "Physical harm is the negative effect on physical or digital resources." ;
rdfs:subClassOf sc2r:Harm .

Class: sc2r:PhysicalPrivacy   back to top


NOTE sc2r:PhysicalPrivacy is a leaf node.

Description
Physical Privacy is individual's right to determine the degree of their physical inaccessibility to others and to prevent intrusion into their physical place or solitude.

Inherits from (4):
sc2r:Privacy | sc2r:Right | sc2r:IndividualResource | sc2r:Resource

Implementation:

@prefix owl: <http://www.w3.org/2002/07/owl#> .
@prefix rdfs: <http://www.w3.org/2000/01/rdf-schema#> .
@prefix sc2r: <http://cs.unu.edu/sc2r#> .

sc2r:PhysicalPrivacy a owl:Class ;
rdfs:label "Right to Physical Privacy" ;
rdfs:comment "Physical Privacy is individual's right to determine the degree of their physical inaccessibility to others and to prevent intrusion into their physical place or solitude." ;
rdfs:subClassOf sc2r:Privacy .

Class: sc2r:PhysicalResource   back to top


Description
Physical resources are technological resources in material form.

Inherits from (1):
sc2r:Resource

Implementation:

@prefix owl: <http://www.w3.org/2002/07/owl#> .
@prefix rdfs: <http://www.w3.org/2000/01/rdf-schema#> .
@prefix sc2r: <http://cs.unu.edu/sc2r#> .

sc2r:PhysicalResource a owl:Class ;
rdfs:label "Physical Resource" ;
rdfs:comment "Physical resources are technological resources in material form." ;
rdfs:subClassOf sc2r:Resource .

Class: sc2r:PhysicalRestriction   back to top


NOTE sc2r:PhysicalRestriction is a leaf node.

Description
This is the measure for restricting and limiting access to physical resources.

Inherits from (4):
sc2r:AccessControl | sc2r:PreventionMeasure | sc2r:PrepareMeasure | sc2r:Response

Implementation:

@prefix owl: <http://www.w3.org/2002/07/owl#> .
@prefix rdfs: <http://www.w3.org/2000/01/rdf-schema#> .
@prefix sc2r: <http://cs.unu.edu/sc2r#> .

sc2r:PhysicalRestriction a owl:Class ;
rdfs:label "Physical Restriction" ;
rdfs:comment "This is the measure for restricting and limiting access to physical resources." ;
rdfs:subClassOf sc2r:AccessControl .

Class: sc2r:PhysicalToken   back to top


NOTE sc2r:PhysicalToken is a leaf node.

Description
Physical Token (hardware token) is a security token that is in the form of hardware device that the user carries to authorise access to a network service.

Inherits from (6):
sc2r:Credential | sc2r:IdentifyingData | sc2r:PersonalData | sc2r:Data | sc2r:DigitalResource | sc2r:Resource

Implementation:

@prefix owl: <http://www.w3.org/2002/07/owl#> .
@prefix rdfs: <http://www.w3.org/2000/01/rdf-schema#> .
@prefix sc2r: <http://cs.unu.edu/sc2r#> .

sc2r:PhysicalToken a owl:Class ;
rdfs:label "Physical Token" ;
rdfs:comment "Physical Token (hardware token) is a security token that is in the form of hardware device that the user carries to authorise access to a network service." ;
rdfs:subClassOf sc2r:Credential .

Class: sc2r:Piggybacking   back to top


NOTE sc2r:Piggybacking is a leaf node.

Description
Piggybacking is when individuals gain unauthorized free access to a network. Piggybacking is usually not for malicious intent besides gaining free access to a network.

Inherits from (4):
sc2r:UnauthorizedAccess | sc2r:AuthenticationThreat | sc2r:TechnologicalThreat | sc2r:Threat

Implementation:

@prefix owl: <http://www.w3.org/2002/07/owl#> .
@prefix rdfs: <http://www.w3.org/2000/01/rdf-schema#> .
@prefix sc2r: <http://cs.unu.edu/sc2r#> .

sc2r:Piggybacking a owl:Class ;
rdfs:label "Piggybacking"@en ;
rdfs:comment "Piggybacking is when individuals gain unauthorized free access to a network. Piggybacking is usually not for malicious intent besides gaining free access to a network."@en ;
rdfs:subClassOf sc2r:UnauthorizedAccess .

Class: sc2r:PointAndShriek   back to top


NOTE sc2r:PointAndShriek is a leaf node.

Description
Exploiting existing sensitivities, such as using misleading evidence to depict a military attack as having taking place at a place of worship to influence opinion.

Inherits from (3):
sc2r:SocialHacking | sc2r:SocialThreat | sc2r:Threat

Implementation:

@prefix owl: <http://www.w3.org/2002/07/owl#> .
@prefix rdfs: <http://www.w3.org/2000/01/rdf-schema#> .
@prefix sc2r: <http://cs.unu.edu/sc2r#> .

sc2r:PointAndShriek a owl:Class ;
rdfs:label "Point and Shriek"@en ;
rdfs:comment "Exploiting existing sensitivities, such as using misleading evidence to depict a military attack as having taking place at a place of worship to influence opinion."@en ;
rdfs:subClassOf sc2r:SocialHacking .

Class: sc2r:Polarization   back to top


NOTE sc2r:Polarization is a leaf node.

Description
Influence techniques can be applied to discredit moderate views and force narratives to focus on extreme positions.

Inherits from (3):
sc2r:SocialHacking | sc2r:SocialThreat | sc2r:Threat

Implementation:

@prefix owl: <http://www.w3.org/2002/07/owl#> .
@prefix rdfs: <http://www.w3.org/2000/01/rdf-schema#> .
@prefix sc2r: <http://cs.unu.edu/sc2r#> .

sc2r:Polarization a owl:Class ;
rdfs:label "Polarization"@en ;
rdfs:comment "Influence techniques can be applied to discredit moderate views and force narratives to focus on extreme positions."@en ;
rdfs:subClassOf sc2r:SocialHacking .

Class: sc2r:Pornography   back to top


NOTE sc2r:Pornography is a leaf node.

Description
Pornography is visual content depicting sexual subject matter that may be inappropriate to individuals.

Inherits from (5):
sc2r:InappropriateContent | sc2r:Malinformation | sc2r:CognitiveThreat | sc2r:PersonalThreat | sc2r:Threat

Implementation:

@prefix owl: <http://www.w3.org/2002/07/owl#> .
@prefix rdfs: <http://www.w3.org/2000/01/rdf-schema#> .
@prefix sc2r: <http://cs.unu.edu/sc2r#> .

sc2r:Pornography a owl:Class ;
rdfs:label "Pornography"@en ;
rdfs:comment "Pornography is visual content depicting sexual subject matter that may be inappropriate to individuals."@en ;
rdfs:subClassOf sc2r:InappropriateContent .

Class: sc2r:PotemkinVillageEvidence   back to top


NOTE sc2r:PotemkinVillageEvidence is a leaf node.

Description
Potemkin villages of evidence refer to the attempt to set up intricate institutional networks that are controlled and used by actors as a fact-producing apparatus for the promotion and amplification of specific narratives. Potemkin villages can, for instance, consist of an array of illegitimate or fake research, (online) journals, NGOs or thinktanks that produce studies, working papers, conferences, etc. to present the respective narrative as a product of careful scholarly consideration.

Inherits from (5):
sc2r:Deceit | sc2r:Disinformation | sc2r:CognitiveThreat | sc2r:PersonalThreat | sc2r:Threat

Implementation:

@prefix owl: <http://www.w3.org/2002/07/owl#> .
@prefix rdfs: <http://www.w3.org/2000/01/rdf-schema#> .
@prefix sc2r: <http://cs.unu.edu/sc2r#> .

sc2r:PotemkinVillageEvidence a owl:Class ;
rdfs:label "Potemkin Village Evidence"@en ;
rdfs:comment "Potemkin villages of evidence refer to the attempt to set up intricate institutional networks that are controlled and used by actors as a fact-producing apparatus for the promotion and amplification of specific narratives. Potemkin villages can, for instance, consist of an array of illegitimate or fake research, (online) journals, NGOs or thinktanks that produce studies, working papers, conferences, etc. to present the respective narrative as a product of careful scholarly consideration." ;
rdfs:subClassOf sc2r:Deceit .

Class: sc2r:PrepareMeasure   back to top


Description
Responses are framed around four resilience phases of Prepare, Absorb, Recover, and Adapt. The Prepare phase represents the baseline level of individuals’ cyber functioning during which Prepare measures are undertaken for facilitating responses in the subsequent phases.

Inherits from (1):
sc2r:Response

Implementation:

@prefix owl: <http://www.w3.org/2002/07/owl#> .
@prefix rdfs: <http://www.w3.org/2000/01/rdf-schema#> .
@prefix sc2r: <http://cs.unu.edu/sc2r#> .

sc2r:PrepareMeasure a owl:Class ;
rdfs:label "Prepare Measure" ;
rdfs:comment """Responses are framed around four resilience phases of Prepare, Absorb, Recover, and Adapt.

The Prepare phase represents the baseline level of individuals’ cyber functioning during which Prepare measures are undertaken for facilitating responses in the subsequent phases.""" ;
rdfs:subClassOf sc2r:Response .

Class: sc2r:Pretexting   back to top


NOTE sc2r:Pretexting is a leaf node.

Description
Pretexting occurs when individuals are targeted by an attempt to trick them into handing sensitive data or login credentials to the perpetrator who uses a good pretext or fabricated scenario to build a false sense of trust.

Inherits from (5):
sc2r:SocialEngineering | sc2r:InfluenceThreat | sc2r:CognitiveThreat | sc2r:PersonalThreat | sc2r:Threat

Implementation:

@prefix owl: <http://www.w3.org/2002/07/owl#> .
@prefix rdfs: <http://www.w3.org/2000/01/rdf-schema#> .
@prefix sc2r: <http://cs.unu.edu/sc2r#> .

sc2r:Pretexting a owl:Class ;
rdfs:label "Pretexting"@en ;
rdfs:comment "Pretexting occurs when individuals are targeted by an attempt to trick them into handing sensitive data or login credentials to the perpetrator who uses a good pretext or fabricated scenario to build a false sense of trust." ;
rdfs:subClassOf sc2r:SocialEngineering .

Class: sc2r:PreventionMeasure   back to top


Description
Prevention measures are put in place to limit and stop the occurance of specific cyber threats.

Inherits from (2):
sc2r:PrepareMeasure | sc2r:Response

Implementation:

@prefix owl: <http://www.w3.org/2002/07/owl#> .
@prefix rdfs: <http://www.w3.org/2000/01/rdf-schema#> .
@prefix sc2r: <http://cs.unu.edu/sc2r#> .

sc2r:PreventionMeasure a owl:Class ;
rdfs:label "Prevention Measure" ;
rdfs:comment "Prevention measures are put in place to limit and stop the occurance of specific cyber threats." ;
rdfs:subClassOf sc2r:PrepareMeasure .

Class: sc2r:Privacy   back to top


Description
The Right to Privacy is individual's right to be free from intrusion into or publicity concerning matters of a personal nature.

Inherits from (3):
sc2r:Right | sc2r:IndividualResource | sc2r:Resource

Implementation:

@prefix owl: <http://www.w3.org/2002/07/owl#> .
@prefix rdfs: <http://www.w3.org/2000/01/rdf-schema#> .
@prefix sc2r: <http://cs.unu.edu/sc2r#> .

sc2r:Privacy a owl:Class ;
rdfs:label "Right to Privacy" ;
rdfs:comment "The Right to Privacy is individual's right to be free from intrusion into or publicity concerning matters of a personal nature." ;
rdfs:subClassOf sc2r:Right .

Class: sc2r:PrivacyThreat   back to top


Description
Privacy Threat is an adverse cyber incident that negatively impacts and violates individuals' various dimensions of privacy.

Inherits from (2):
sc2r:PersonalThreat | sc2r:Threat

Implementation:

@prefix owl: <http://www.w3.org/2002/07/owl#> .
@prefix rdfs: <http://www.w3.org/2000/01/rdf-schema#> .
@prefix sc2r: <http://cs.unu.edu/sc2r#> .

sc2r:PrivacyThreat a owl:Class ;
rdfs:label "Privacy Threat"@en ;
rdfs:comment "Privacy Threat is an adverse cyber incident that negatively impacts and violates individuals' various dimensions of privacy." ;
rdfs:subClassOf sc2r:PersonalThreat .

Class: sc2r:Profanity   back to top


NOTE sc2r:Profanity is a leaf node.

Description
This is information and content that uses language that is offensive to individuals under specific contexts.

Inherits from (5):
sc2r:InappropriateContent | sc2r:Malinformation | sc2r:CognitiveThreat | sc2r:PersonalThreat | sc2r:Threat

Implementation:

@prefix owl: <http://www.w3.org/2002/07/owl#> .
@prefix rdfs: <http://www.w3.org/2000/01/rdf-schema#> .
@prefix sc2r: <http://cs.unu.edu/sc2r#> .

sc2r:Profanity a owl:Class ;
rdfs:label "Profanity"@en ;
rdfs:comment "This is information and content that uses language that is offensive to individuals under specific contexts."@en ;
rdfs:subClassOf sc2r:InappropriateContent .

Class: sc2r:ProfessionalSupport   back to top


NOTE sc2r:ProfessionalSupport is a leaf node.

Description
This is receiving professional input to assist in dealing with an adverse incident and recovering the lost cyber functioning.

Inherits from (3):
sc2r:ExternalSupport | sc2r:RecoverMeasure | sc2r:Response

Implementation:

@prefix owl: <http://www.w3.org/2002/07/owl#> .
@prefix rdfs: <http://www.w3.org/2000/01/rdf-schema#> .
@prefix sc2r: <http://cs.unu.edu/sc2r#> .

sc2r:ProfessionalSupport a owl:Class ;
rdfs:label "Professional Support" ;
rdfs:comment "This is receiving professional input to assist in dealing with an adverse incident and recovering the lost cyber functioning." ;
rdfs:subClassOf sc2r:ExternalSupport .

Class: sc2r:Propaganda   back to top


NOTE sc2r:Propaganda is a leaf node.

Description
Propaganda is information that is used to promote and advance a specific political perspective or point of view.

Inherits from (4):
sc2r:Disinformation | sc2r:CognitiveThreat | sc2r:PersonalThreat | sc2r:Threat

Implementation:

@prefix owl: <http://www.w3.org/2002/07/owl#> .
@prefix rdfs: <http://www.w3.org/2000/01/rdf-schema#> .
@prefix sc2r: <http://cs.unu.edu/sc2r#> .

sc2r:Propaganda a owl:Class ;
rdfs:label "Propaganda"@en ;
rdfs:comment "Propaganda is information that is used to promote and advance a specific political perspective or point of view."@en ;
rdfs:subClassOf sc2r:Disinformation .

Class: sc2r:Prosecution   back to top


NOTE sc2r:Prosecution is a leaf node.

Description
Prosecution refers the state in which the individual feels prosecuted, tried, or wrongly convicted.

Inherits from (2):
sc2r:PsychologicalHarm | sc2r:Harm

Implementation:

@prefix owl: <http://www.w3.org/2002/07/owl#> .
@prefix rdfs: <http://www.w3.org/2000/01/rdf-schema#> .
@prefix sc2r: <http://cs.unu.edu/sc2r#> .

sc2r:Prosecution a owl:Class ;
rdfs:label "Prosecution" ;
rdfs:comment "Prosecution refers the state in which the individual feels prosecuted, tried, or wrongly convicted." ;
rdfs:subClassOf sc2r:PsychologicalHarm .

Class: sc2r:PsychographicHacking   back to top


Description
Psychographic Hacking refers to the covert targeting and influencing of individuals using messages created to appeal to precisely identified groups or individuals based on their psychographic profiles.

Inherits from (4):
sc2r:InfluenceThreat | sc2r:CognitiveThreat | sc2r:PersonalThreat | sc2r:Threat

Implementation:

@prefix owl: <http://www.w3.org/2002/07/owl#> .
@prefix rdfs: <http://www.w3.org/2000/01/rdf-schema#> .
@prefix sc2r: <http://cs.unu.edu/sc2r#> .

sc2r:PsychographicHacking a owl:Class ;
rdfs:label "Psychographic Hacking"@en ;
rdfs:comment "Psychographic Hacking refers to the covert targeting and influencing of individuals using messages created to appeal to precisely identified groups or individuals based on their psychographic profiles." ;
rdfs:subClassOf sc2r:InfluenceThreat .

Class: sc2r:PsychologicalHarm   back to top


Description
Psychological harm is the harm which focuses on an individual and their mental well-being and psyche.

Inherits from (1):
sc2r:Harm

Implementation:

@prefix owl: <http://www.w3.org/2002/07/owl#> .
@prefix rdfs: <http://www.w3.org/2000/01/rdf-schema#> .
@prefix sc2r: <http://cs.unu.edu/sc2r#> .

sc2r:PsychologicalHarm a owl:Class ;
rdfs:label "Psychological Harm" ;
rdfs:comment "Psychological harm is the harm which focuses on an individual and their mental well-being and psyche." ;
rdfs:subClassOf sc2r:Harm .

Class: sc2r:PsychologicalPrivacy   back to top


NOTE sc2r:PsychologicalPrivacy is a leaf node.

Description
Psychological Privacy is individual's right to control cognitive and affective inputs and outputs, to form values, and to determine with whom and under what circumstances their thoughts will be shared or intimate information revealed.

Inherits from (4):
sc2r:Privacy | sc2r:Right | sc2r:IndividualResource | sc2r:Resource

Implementation:

@prefix owl: <http://www.w3.org/2002/07/owl#> .
@prefix rdfs: <http://www.w3.org/2000/01/rdf-schema#> .
@prefix sc2r: <http://cs.unu.edu/sc2r#> .

sc2r:PsychologicalPrivacy a owl:Class ;
rdfs:label "Right to Psychological Privacy" ;
rdfs:comment "Psychological Privacy is individual's right to control cognitive and affective inputs and outputs, to form values, and to determine with whom and under what circumstances their thoughts will be shared or intimate information revealed." ;
rdfs:subClassOf sc2r:Privacy .

Class: sc2r:QuidProQuo   back to top


NOTE sc2r:QuidProQuo is a leaf node.

Description
Quid Pro Quo occurs when individuals are targeted by an attempt to trick them into handing their login credentials to the perpetrator who leverages the offer of free services.

Inherits from (5):
sc2r:SocialEngineering | sc2r:InfluenceThreat | sc2r:CognitiveThreat | sc2r:PersonalThreat | sc2r:Threat

Implementation:

@prefix owl: <http://www.w3.org/2002/07/owl#> .
@prefix rdfs: <http://www.w3.org/2000/01/rdf-schema#> .
@prefix sc2r: <http://cs.unu.edu/sc2r#> .

sc2r:QuidProQuo a owl:Class ;
rdfs:label "Quid Pro Quo"@en ;
rdfs:comment "Quid Pro Quo occurs when individuals are targeted by an attempt to trick them into handing their login credentials to the perpetrator who leverages the offer of free services." ;
rdfs:subClassOf sc2r:SocialEngineering .

Class: sc2r:Radicalisation   back to top


NOTE sc2r:Radicalisation is a leaf node.

Description
Radicalisation refers to the state in which the individual adopts increasingly radical views in opposition to a political, social, or religious status quo.

Inherits from (2):
sc2r:SocialHarm | sc2r:Harm

Implementation:

@prefix owl: <http://www.w3.org/2002/07/owl#> .
@prefix rdfs: <http://www.w3.org/2000/01/rdf-schema#> .
@prefix sc2r: <http://cs.unu.edu/sc2r#> .

sc2r:Radicalisation a owl:Class ;
rdfs:label "Radicalisation" ;
rdfs:comment "Radicalisation refers to the state in which the individual adopts increasingly radical views in opposition to a political, social, or religious status quo." ;
rdfs:subClassOf sc2r:SocialHarm .

Class: sc2r:Raiding   back to top


NOTE sc2r:Raiding is a leaf node.

Description
Rapid and coordinated influence attacks.

Inherits from (3):
sc2r:SocialHacking | sc2r:SocialThreat | sc2r:Threat

Implementation:

@prefix owl: <http://www.w3.org/2002/07/owl#> .
@prefix rdfs: <http://www.w3.org/2000/01/rdf-schema#> .
@prefix sc2r: <http://cs.unu.edu/sc2r#> .

sc2r:Raiding a owl:Class ;
rdfs:label "Raiding"@en ;
rdfs:comment "Rapid and coordinated influence attacks."@en ;
rdfs:subClassOf sc2r:SocialHacking .

Class: sc2r:Ransomware   back to top


NOTE sc2r:Ransomware is a leaf node.

Description
Ransomware is malicious software that limits or restricts access to information and services with a demand for a ransom fee to be paid.

Inherits from (3):
sc2r:AvailabilityThreat | sc2r:TechnologicalThreat | sc2r:Threat

Implementation:

@prefix owl: <http://www.w3.org/2002/07/owl#> .
@prefix rdfs: <http://www.w3.org/2000/01/rdf-schema#> .
@prefix sc2r: <http://cs.unu.edu/sc2r#> .

sc2r:Ransomware a owl:Class ;
rdfs:label "Ransomware"@en ;
rdfs:comment "Ransomware is malicious software that limits or restricts access to information and services with a demand for a ransom fee to be paid."@en ;
rdfs:subClassOf sc2r:AvailabilityThreat .

Class: sc2r:Reconnaissance   back to top


NOTE sc2r:Reconnaissance is a leaf node.

Description
Reconnaissance occurs when an attacker engages in both passive and active collection of information that can be used to execute an attack on individuals' cyber resources.

Inherits from (3):
sc2r:ConfidentialityThreat | sc2r:TechnologicalThreat | sc2r:Threat

Implementation:

@prefix owl: <http://www.w3.org/2002/07/owl#> .
@prefix rdfs: <http://www.w3.org/2000/01/rdf-schema#> .
@prefix sc2r: <http://cs.unu.edu/sc2r#> .

sc2r:Reconnaissance a owl:Class ;
rdfs:label "Reconnaissance"@en ;
rdfs:comment "Reconnaissance occurs when an attacker engages in both passive and active collection of information that can be used to execute an attack on individuals' cyber resources."@en ;
rdfs:subClassOf sc2r:ConfidentialityThreat .

Class: sc2r:RecoverMeasure   back to top


Description
Responses are framed around four resilience phases of Prepare, Absorb, Recover, and Adapt. The Recover phase starts from the moment the adverse incident stops or is halted, and when restoration of lost cyber functioning begins. Timely and effective recover measures are necessary to reduce the compounded negative impacts of disrupted cyber functioning.

Inherits from (1):
sc2r:Response

Implementation:

@prefix owl: <http://www.w3.org/2002/07/owl#> .
@prefix rdfs: <http://www.w3.org/2000/01/rdf-schema#> .
@prefix sc2r: <http://cs.unu.edu/sc2r#> .

sc2r:RecoverMeasure a owl:Class ;
rdfs:label "Recover Measure" ;
rdfs:comment """Responses are framed around four resilience phases of Prepare, Absorb, Recover, and Adapt.

The Recover phase starts from the moment the adverse incident stops or is halted, and when restoration of lost cyber functioning begins. Timely and effective recover measures are necessary to reduce the compounded negative impacts of disrupted cyber functioning.""" ;
rdfs:subClassOf sc2r:Response .

Class: sc2r:RecoveryPlan   back to top


NOTE sc2r:RecoveryPlan is a leaf node.

Description
Recovery planning is the process of putting in place plans to restore and recover cyber functioning when adverse incidents do occur.

Inherits from (3):
sc2r:AnticipateMeasure | sc2r:PrepareMeasure | sc2r:Response

Implementation:

@prefix owl: <http://www.w3.org/2002/07/owl#> .
@prefix rdfs: <http://www.w3.org/2000/01/rdf-schema#> .
@prefix sc2r: <http://cs.unu.edu/sc2r#> .

sc2r:RecoveryPlan a owl:Class ;
rdfs:label "Recovery Plan" ;
rdfs:comment "Recovery planning is the process of putting in place plans to restore and recover cyber functioning when adverse incidents do occur." ;
rdfs:subClassOf sc2r:AnticipateMeasure .

Class: sc2r:ReducedOpportunities   back to top


NOTE sc2r:ReducedOpportunities is a leaf node.

Description
Reduced Opportunities refers to an adverse change in the established reputation of the individual's.

Inherits from (2):
sc2r:ReputationalHarm | sc2r:Harm

Implementation:

@prefix owl: <http://www.w3.org/2002/07/owl#> .
@prefix rdfs: <http://www.w3.org/2000/01/rdf-schema#> .
@prefix sc2r: <http://cs.unu.edu/sc2r#> .

sc2r:ReducedOpportunities a owl:Class ;
rdfs:label "Reduced Opportunities" ;
rdfs:comment "Reduced Opportunities refers to an adverse change in the established reputation of the individual's." ;
rdfs:subClassOf sc2r:ReputationalHarm .

Class: sc2r:ReducedPerformance   back to top


NOTE sc2r:ReducedPerformance is a leaf node.

Description
Reduced Performance refers to the state in which the ability of resources to function is lowered.

Inherits from (2):
sc2r:PhysicalHarm | sc2r:Harm

Implementation:

@prefix owl: <http://www.w3.org/2002/07/owl#> .
@prefix rdfs: <http://www.w3.org/2000/01/rdf-schema#> .
@prefix sc2r: <http://cs.unu.edu/sc2r#> .

sc2r:ReducedPerformance a owl:Class ;
rdfs:label "Reduced Performance" ;
rdfs:comment "Reduced Performance refers to the state in which the ability of resources to function is lowered." ;
rdfs:subClassOf sc2r:PhysicalHarm .

Class: sc2r:RedundancyMeasure   back to top


Description
Redundancy measure is a preparation measure that involves putting in place redundant resources, to be utilized in cases where core resources are compromised and affected by adverse cyber incidents.

Inherits from (3):
sc2r:AnticipateMeasure | sc2r:PrepareMeasure | sc2r:Response

Implementation:

@prefix owl: <http://www.w3.org/2002/07/owl#> .
@prefix rdfs: <http://www.w3.org/2000/01/rdf-schema#> .
@prefix sc2r: <http://cs.unu.edu/sc2r#> .

sc2r:RedundancyMeasure a owl:Class ;
rdfs:label "Redundancy Measure" ;
rdfs:comment "Redundancy measure is a preparation measure that involves putting in place redundant resources, to be utilized in cases where core resources are compromised and affected by adverse cyber incidents." ;
rdfs:subClassOf sc2r:AnticipateMeasure .

Class: sc2r:RemoteExecution   back to top


NOTE sc2r:RemoteExecution is a leaf node.

Description
Remote Execution occurs when an attacker exploits a vulnerability in networking and computing systems to run commands and software on individuals computing resources.

Inherits from (3):
sc2r:IntegrityThreat | sc2r:TechnologicalThreat | sc2r:Threat

Implementation:

@prefix owl: <http://www.w3.org/2002/07/owl#> .
@prefix rdfs: <http://www.w3.org/2000/01/rdf-schema#> .
@prefix sc2r: <http://cs.unu.edu/sc2r#> .

sc2r:RemoteExecution a owl:Class ;
rdfs:label "Remote Code Execution"@en ;
rdfs:comment "Remote Execution occurs when an attacker exploits a vulnerability in networking and computing systems to run commands and software on individuals computing resources."@en ;
rdfs:subClassOf sc2r:IntegrityThreat .

Class: sc2r:RemovalMeasure   back to top


Description
Removal measure involve the direct removal and elimination of the cyber threat.

Inherits from (3):
sc2r:EngageMeasure | sc2r:AbsorbMeasure | sc2r:Response

Implementation:

@prefix owl: <http://www.w3.org/2002/07/owl#> .
@prefix rdfs: <http://www.w3.org/2000/01/rdf-schema#> .
@prefix sc2r: <http://cs.unu.edu/sc2r#> .

sc2r:RemovalMeasure a owl:Class ;
rdfs:label "Removal Measure" ;
rdfs:comment "Removal measure involve the direct removal and elimination of the cyber threat." ;
rdfs:subClassOf sc2r:EngageMeasure .

Class: sc2r:Replay   back to top


NOTE sc2r:Replay is a leaf node.

Description
Replay attacks occur when legitimate information and network transactions are repeated and retransmitted for malicious purposes.

Inherits from (3):
sc2r:IntegrityThreat | sc2r:TechnologicalThreat | sc2r:Threat

Implementation:

@prefix owl: <http://www.w3.org/2002/07/owl#> .
@prefix rdfs: <http://www.w3.org/2000/01/rdf-schema#> .
@prefix sc2r: <http://cs.unu.edu/sc2r#> .

sc2r:Replay a owl:Class ;
rdfs:label "Replay"@en ;
rdfs:comment "Replay attacks occur when legitimate information and network transactions are repeated and retransmitted for malicious purposes."@en ;
rdfs:subClassOf sc2r:IntegrityThreat .

Class: sc2r:Reporting   back to top


Description
Reporting measure is the reporting of an adverse cyber incident to external responders.

Inherits from (2):
sc2r:AbsorbMeasure | sc2r:Response

Implementation:

@prefix owl: <http://www.w3.org/2002/07/owl#> .
@prefix rdfs: <http://www.w3.org/2000/01/rdf-schema#> .
@prefix sc2r: <http://cs.unu.edu/sc2r#> .

sc2r:Reporting a owl:Class ;
rdfs:label "Reporting Measure" ;
rdfs:comment "Reporting measure is the reporting of an adverse cyber incident to external responders." ;
rdfs:subClassOf sc2r:AbsorbMeasure .

Class: sc2r:Reputation   back to top


NOTE sc2r:Reputation is a leaf node.

Description
Reputation is the overall quality or character as recognised by other people.

Inherits from (3):
sc2r:SocialCapital | sc2r:IndividualResource | sc2r:Resource

Implementation:

@prefix owl: <http://www.w3.org/2002/07/owl#> .
@prefix rdfs: <http://www.w3.org/2000/01/rdf-schema#> .
@prefix sc2r: <http://cs.unu.edu/sc2r#> .

sc2r:Reputation a owl:Class ;
rdfs:label "Reputation Resource" ;
rdfs:comment "Reputation is the overall quality or character as recognised by other people." ;
rdfs:subClassOf sc2r:SocialCapital .

Class: sc2r:ReputationalHarm   back to top


Description
Reputational harm is the harm pertaining to the general opinion held about an entity.

Inherits from (1):
sc2r:Harm

Implementation:

@prefix owl: <http://www.w3.org/2002/07/owl#> .
@prefix rdfs: <http://www.w3.org/2000/01/rdf-schema#> .
@prefix sc2r: <http://cs.unu.edu/sc2r#> .

sc2r:ReputationalHarm a owl:Class ;
rdfs:label "Reputational Harm" ;
rdfs:comment "Reputational harm is the harm pertaining to the general opinion held about an entity." ;
rdfs:subClassOf sc2r:Harm .

Class: sc2r:ReserveThreat   back to top


NOTE sc2r:ReserveThreat is a leaf node.

Description
Reserve Threat occurs when individuals' preference to not interact or remain strangers with others online is threatened.

Inherits from (3):
sc2r:PrivacyThreat | sc2r:PersonalThreat | sc2r:Threat

Implementation:

@prefix owl: <http://www.w3.org/2002/07/owl#> .
@prefix rdfs: <http://www.w3.org/2000/01/rdf-schema#> .
@prefix sc2r: <http://cs.unu.edu/sc2r#> .

sc2r:ReserveThreat a owl:Class ;
rdfs:label "Reserve Threat"@en ;
rdfs:comment "Reserve Threat occurs when individuals' preference to not interact or remain strangers with others online is threatened." ;
rdfs:subClassOf sc2r:PrivacyThreat .

Class: sc2r:Resource   back to top


Description
A Resource is a capability input that contributes to individuals cyber activities. Resources are framed much broader that technological computing assets (i.e., hardware, software, data) and include individual and social resources.

Inherits from:
owl:Thing

Property Domain of:
sc2r:hasVulnerability | sc2r:isDamagedBy

Property Range of:
sc2r:damages | sc2r:isAVulnerabilityOf

Implementation:

@prefix owl: <http://www.w3.org/2002/07/owl#> .
@prefix rdfs: <http://www.w3.org/2000/01/rdf-schema#> .
@prefix sc2r: <http://cs.unu.edu/sc2r#> .

sc2r:Resource a owl:Class ;
rdfs:label "Resource"@en ;
rdfs:comment "A Resource is a capability input that contributes to individuals cyber activities. Resources are framed much broader that technological computing assets (i.e., hardware, software, data) and include individual and social resources."@en ;
rdfs:seeAlso "https://en.wikipedia.org/wiki/Asset_(computer_security)"@en .

Class: sc2r:Response   back to top


Description
A Response, also called Countermeasure, is an intervention that can be employed to mitigate Threats and reduce Vulnerabilities. Responses are framed around the four phases of resilience: prepare, absorb, recover, and adapt.

Inherits from:
owl:Thing

Property Domain of:
sc2r:mitigates | sc2r:reduces

Property Range of:
sc2r:isMitigatedBy | sc2r:isReducedBy

Implementation:

@prefix owl: <http://www.w3.org/2002/07/owl#> .
@prefix rdfs: <http://www.w3.org/2000/01/rdf-schema#> .
@prefix sc2r: <http://cs.unu.edu/sc2r#> .

sc2r:Response a owl:Class ;
rdfs:label "Response"@en ;
rdfs:comment "A Response, also called Countermeasure, is an intervention that can be employed to mitigate Threats and reduce Vulnerabilities. Responses are framed around the four phases of resilience: prepare, absorb, recover, and adapt."@en ;
rdfs:seeAlso ""@en .

Class: sc2r:RestrictiveMediation   back to top


NOTE sc2r:RestrictiveMediation is a leaf node.

Description
Restrictive mediation are a set of rules and limits that are placed on individuals to minimize the negative impacts in use of cyber resources.

Inherits from (3):
sc2r:MediationMeasures | sc2r:PrepareMeasure | sc2r:Response

Implementation:

@prefix owl: <http://www.w3.org/2002/07/owl#> .
@prefix rdfs: <http://www.w3.org/2000/01/rdf-schema#> .
@prefix sc2r: <http://cs.unu.edu/sc2r#> .

sc2r:RestrictiveMediation a owl:Class ;
rdfs:label "Restrictive Mediation" ;
rdfs:comment "Restrictive mediation are a set of rules and limits that are placed on individuals to minimize the negative impacts in use of cyber resources." ;
rdfs:subClassOf sc2r:MediationMeasures .

Class: sc2r:Right   back to top


Description
Rights are non-negotiable entitlements grounded in the idea of justice.

Inherits from (2):
sc2r:IndividualResource | sc2r:Resource

Implementation:

@prefix owl: <http://www.w3.org/2002/07/owl#> .
@prefix rdfs: <http://www.w3.org/2000/01/rdf-schema#> .
@prefix sc2r: <http://cs.unu.edu/sc2r#> .

sc2r:Right a owl:Class ;
rdfs:label "Rights" ;
rdfs:comment "Rights are non-negotiable entitlements grounded in the idea of justice." ;
rdfs:subClassOf sc2r:IndividualResource .

Class: sc2r:SDCard   back to top


NOTE sc2r:SDCard is a leaf node.

Description
SD Card (Secure Digital Card) is an ultra small flash memory card designed to provide high-capacity memory in a small size.

Inherits from (3):
sc2r:StorageAsset | sc2r:PhysicalResource | sc2r:Resource

Implementation:

@prefix owl: <http://www.w3.org/2002/07/owl#> .
@prefix rdfs: <http://www.w3.org/2000/01/rdf-schema#> .
@prefix sc2r: <http://cs.unu.edu/sc2r#> .

sc2r:SDCard a owl:Class ;
rdfs:label "SD Card" ;
rdfs:comment "SD Card (Secure Digital Card) is an ultra small flash memory card designed to provide high-capacity memory in a small size." ;
rdfs:subClassOf sc2r:StorageAsset .

Class: sc2r:Sandboxing   back to top


NOTE sc2r:Sandboxing is a leaf node.

Description
Sandboxing is a mechanism of isolating the operation of cyber resources that may otherwise cause widespread adverse incidents.

Inherits from (4):
sc2r:AccessControl | sc2r:PreventionMeasure | sc2r:PrepareMeasure | sc2r:Response

Implementation:

@prefix owl: <http://www.w3.org/2002/07/owl#> .
@prefix rdfs: <http://www.w3.org/2000/01/rdf-schema#> .
@prefix sc2r: <http://cs.unu.edu/sc2r#> .

sc2r:Sandboxing a owl:Class ;
rdfs:label "Sandboxing" ;
rdfs:comment "Sandboxing is a mechanism of isolating the operation of cyber resources that may otherwise cause widespread adverse incidents." ;
rdfs:subClassOf sc2r:AccessControl .

Class: sc2r:Satire   back to top


NOTE sc2r:Satire is a leaf node.

Description
Satire used as part of an influence campaign.

Inherits from (5):
sc2r:InfluenceOperation | sc2r:Disinformation | sc2r:CognitiveThreat | sc2r:PersonalThreat | sc2r:Threat

Implementation:

@prefix owl: <http://www.w3.org/2002/07/owl#> .
@prefix rdfs: <http://www.w3.org/2000/01/rdf-schema#> .
@prefix sc2r: <http://cs.unu.edu/sc2r#> .

sc2r:Satire a owl:Class ;
rdfs:label "Satire"@en ;
rdfs:comment "Satire used as part of an influence campaign."@en ;
rdfs:subClassOf sc2r:InfluenceOperation .

Class: sc2r:Scam   back to top


Description
Scam is the broader term for the use of internet services or software to defraud or take advantage of targets, typically financial gain or other valuable information. Scam types include romance scam, the overpayment scam, quick-money promise, impersonation scam, and tech support online scam.

Inherits from (3):
sc2r:TheftThreat | sc2r:PersonalThreat | sc2r:Threat

Implementation:

@prefix owl: <http://www.w3.org/2002/07/owl#> .
@prefix rdfs: <http://www.w3.org/2000/01/rdf-schema#> .
@prefix sc2r: <http://cs.unu.edu/sc2r#> .

sc2r:Scam a owl:Class ;
rdfs:label "Scam"@en ;
rdfs:comment "Scam is the broader term for the use of internet services or software to defraud or take advantage of targets, typically financial gain or other valuable information. Scam types include romance scam, the overpayment scam, quick-money promise, impersonation scam, and tech support online scam." ;
rdfs:subClassOf sc2r:TheftThreat .

Class: sc2r:ScamCost   back to top


NOTE sc2r:ScamCost is a leaf node.

Description
Scam Cost refers to the costs that the individual has to pay as a result of successful scam scheme of which they are victim.

Inherits from (2):
sc2r:EconomicHarm | sc2r:Harm

Implementation:

@prefix owl: <http://www.w3.org/2002/07/owl#> .
@prefix rdfs: <http://www.w3.org/2000/01/rdf-schema#> .
@prefix sc2r: <http://cs.unu.edu/sc2r#> .

sc2r:ScamCost a owl:Class ;
rdfs:label "Scam Cost" ;
rdfs:comment "Scam Cost refers to the costs that the individual has to pay as a result of successful scam scheme of which they are victim." ;
rdfs:subClassOf sc2r:EconomicHarm .

Class: sc2r:Scareware   back to top


NOTE sc2r:Scareware is a leaf node.

Description
Scareware is a form of malware that is designed to manipulate individuals to buy or download unnecessary and potentially dangerous software, such as fake antivirus protection.

Inherits from (4):
sc2r:InfluenceThreat | sc2r:CognitiveThreat | sc2r:PersonalThreat | sc2r:Threat

Implementation:

@prefix owl: <http://www.w3.org/2002/07/owl#> .
@prefix rdfs: <http://www.w3.org/2000/01/rdf-schema#> .
@prefix sc2r: <http://cs.unu.edu/sc2r#> .

sc2r:Scareware a owl:Class ;
rdfs:label "Scareware"@en ;
rdfs:comment "Scareware is a form of malware that is designed to manipulate individuals to buy or download unnecessary and potentially dangerous software, such as fake antivirus protection." ;
rdfs:subClassOf sc2r:InfluenceThreat .

Class: sc2r:Sealioning   back to top


NOTE sc2r:Sealioning is a leaf node.

Description
Sealioning is a type of troll tactic which consists of pursuing people with persistent requests for evidence or repeated questions, while maintaining a pretense of civility and sincerity.

Inherits from (4):
sc2r:Trolling | sc2r:Abuse | sc2r:PersonalThreat | sc2r:Threat

Implementation:

@prefix owl: <http://www.w3.org/2002/07/owl#> .
@prefix rdfs: <http://www.w3.org/2000/01/rdf-schema#> .
@prefix sc2r: <http://cs.unu.edu/sc2r#> .

sc2r:Sealioning a owl:Class ;
rdfs:label "Sealioning" ;
rdfs:comment "Sealioning is a type of troll tactic which consists of pursuing people with persistent requests for evidence or repeated questions, while maintaining a pretense of civility and sincerity." ;
rdfs:subClassOf sc2r:Trolling .

Class: sc2r:SelfCensorship   back to top


NOTE sc2r:SelfCensorship is a leaf node.

Description
Self-censorship is the state in which the individual exercises control over what they say and do, especially to avoid castigation.

Inherits from (2):
sc2r:PsychologicalHarm | sc2r:Harm

Implementation:

@prefix owl: <http://www.w3.org/2002/07/owl#> .
@prefix rdfs: <http://www.w3.org/2000/01/rdf-schema#> .
@prefix sc2r: <http://cs.unu.edu/sc2r#> .

sc2r:SelfCensorship a owl:Class ;
rdfs:label "Self-Censorship" ;
rdfs:comment "Self-censorship is the state in which the individual exercises control over what they say and do, especially to avoid castigation." ;
rdfs:subClassOf sc2r:PsychologicalHarm .

Class: sc2r:SelfHarm   back to top


NOTE sc2r:SelfHarm is a leaf node.

Description
Self Harm refers to intentional damage or injury done to the individual's body.

Inherits from (3):
sc2r:BodilyInjury | sc2r:PhysicalHarm | sc2r:Harm

Implementation:

@prefix owl: <http://www.w3.org/2002/07/owl#> .
@prefix rdfs: <http://www.w3.org/2000/01/rdf-schema#> .
@prefix sc2r: <http://cs.unu.edu/sc2r#> .

sc2r:SelfHarm a owl:Class ;
rdfs:label "Self Harm" ;
rdfs:comment "Self Harm refers to intentional damage or injury done to the individual's body." ;
rdfs:subClassOf sc2r:BodilyInjury .

Class: sc2r:Server   back to top


NOTE sc2r:Server is a leaf node.

Description
A Server is a computer or system that provides resources, data services, or programs to other computers.

Inherits from (3):
sc2r:ComputingAsset | sc2r:PhysicalResource | sc2r:Resource

Implementation:

@prefix owl: <http://www.w3.org/2002/07/owl#> .
@prefix rdfs: <http://www.w3.org/2000/01/rdf-schema#> .
@prefix sc2r: <http://cs.unu.edu/sc2r#> .

sc2r:Server a owl:Class ;
rdfs:label "Server" ;
rdfs:comment "A Server is a computer or system that provides resources, data services, or programs to other computers." ;
rdfs:subClassOf sc2r:ComputingAsset .

Class: sc2r:Sextortion   back to top


NOTE sc2r:Sextortion is a leaf node.

Description
Sextortion occurs when the perpetrator uses unwanted sexually explicit material of the target to blackmail or coerce the target into extorting sexual favors.

Inherits from (4):
sc2r:SexualAbuse | sc2r:Abuse | sc2r:PersonalThreat | sc2r:Threat

Implementation:

@prefix owl: <http://www.w3.org/2002/07/owl#> .
@prefix rdfs: <http://www.w3.org/2000/01/rdf-schema#> .
@prefix sc2r: <http://cs.unu.edu/sc2r#> .

sc2r:Sextortion a owl:Class ;
rdfs:label "Sextortion" ;
rdfs:comment "Sextortion occurs when the perpetrator uses unwanted sexually explicit material of the target to blackmail or coerce the target into extorting sexual favors." ;
rdfs:subClassOf sc2r:SexualAbuse .

Class: sc2r:SexualAbuse   back to top


Description
Sexual Abuse occurs to individuals when they are targeted by a virtual, distanced sexual abuse or exploitation through the use of online communication.

Inherits from (3):
sc2r:Abuse | sc2r:PersonalThreat | sc2r:Threat

Implementation:

@prefix owl: <http://www.w3.org/2002/07/owl#> .
@prefix rdfs: <http://www.w3.org/2000/01/rdf-schema#> .
@prefix sc2r: <http://cs.unu.edu/sc2r#> .

sc2r:SexualAbuse a owl:Class ;
rdfs:label "Sexual Abuse Threat"@en ;
rdfs:comment "Sexual Abuse occurs to individuals when they are targeted by a virtual, distanced sexual abuse or exploitation through the use of online communication." ;
rdfs:subClassOf sc2r:Abuse .

Class: sc2r:SexualAssault   back to top


NOTE sc2r:SexualAssault is a leaf node.

Description
Sexual Assault occurs when the perpetrator constantly threats the target with sexual assault online.

Inherits from (4):
sc2r:SexualAbuse | sc2r:Abuse | sc2r:PersonalThreat | sc2r:Threat

Implementation:

@prefix owl: <http://www.w3.org/2002/07/owl#> .
@prefix rdfs: <http://www.w3.org/2000/01/rdf-schema#> .
@prefix sc2r: <http://cs.unu.edu/sc2r#> .

sc2r:SexualAssault a owl:Class ;
rdfs:label "Sexual Assault" ;
rdfs:comment "Sexual Assault occurs when the perpetrator constantly threats the target with sexual assault online." ;
rdfs:subClassOf sc2r:SexualAbuse .

Class: sc2r:Shameful   back to top


NOTE sc2r:Shameful is a leaf node.

Description
Shameful refers to the state in which the individual experiences disgracefulness.

Inherits from (2):
sc2r:PsychologicalHarm | sc2r:Harm

Implementation:

@prefix owl: <http://www.w3.org/2002/07/owl#> .
@prefix rdfs: <http://www.w3.org/2000/01/rdf-schema#> .
@prefix sc2r: <http://cs.unu.edu/sc2r#> .

sc2r:Shameful a owl:Class ;
rdfs:label "Shameful" ;
rdfs:comment "Shameful refers to the state in which the individual experiences disgracefulness." ;
rdfs:subClassOf sc2r:PsychologicalHarm .

Class: sc2r:Shilling   back to top


NOTE sc2r:Shilling is a leaf node.

Description
Shilling involves a person engaging with a particular subject (e.g. through marketing or a review) jointly with the actor concerned, for example someone writing a glowing customer review or answering their own questions under different identities to simulate a debate.

Inherits from (5):
sc2r:Deceit | sc2r:Disinformation | sc2r:CognitiveThreat | sc2r:PersonalThreat | sc2r:Threat

Implementation:

@prefix owl: <http://www.w3.org/2002/07/owl#> .
@prefix rdfs: <http://www.w3.org/2000/01/rdf-schema#> .
@prefix sc2r: <http://cs.unu.edu/sc2r#> .

sc2r:Shilling a owl:Class ;
rdfs:label "Shilling"@en ;
rdfs:comment "Shilling involves a person engaging with a particular subject (e.g. through marketing or a review) jointly with the actor concerned, for example someone writing a glowing customer review or answering their own questions under different identities to simulate a debate." ;
rdfs:subClassOf sc2r:Deceit .

Class: sc2r:Skills   back to top


NOTE sc2r:Skills is a leaf node.

Description
A Skill is the ability and capacity to perform an action with determined results.

Inherits from (4):
sc2r:MentalFaculties | sc2r:Agency | sc2r:IndividualResource | sc2r:Resource

Implementation:

@prefix owl: <http://www.w3.org/2002/07/owl#> .
@prefix rdfs: <http://www.w3.org/2000/01/rdf-schema#> .
@prefix sc2r: <http://cs.unu.edu/sc2r#> .

sc2r:Skills a owl:Class ;
rdfs:label "Skills" ;
rdfs:comment "A Skill is the ability and capacity to perform an action with determined results." ;
rdfs:subClassOf sc2r:MentalFaculties .

Class: sc2r:Skimming   back to top


NOTE sc2r:Skimming is a leaf node.

Description
Skimming occurs when attackers steal and capture private and confidential information, such as credit card details, in the course of a 'legitimate' use of services.

Inherits from (3):
sc2r:ConfidentialityThreat | sc2r:TechnologicalThreat | sc2r:Threat

Implementation:

@prefix owl: <http://www.w3.org/2002/07/owl#> .
@prefix rdfs: <http://www.w3.org/2000/01/rdf-schema#> .
@prefix sc2r: <http://cs.unu.edu/sc2r#> .

sc2r:Skimming a owl:Class ;
rdfs:label "Skimming"@en ;
rdfs:comment "Skimming occurs when attackers steal and capture private and confidential information, such as credit card details, in the course of a 'legitimate' use of services."@en ;
rdfs:subClassOf sc2r:ConfidentialityThreat .

Class: sc2r:Smishing   back to top


NOTE sc2r:Smishing is a leaf node.

Description
Smishing occurs when individuals receive a convincing yet fraudulent text message (instead of email) from the perpetrator that attempts to trick into handing over personal information.

Inherits from (6):
sc2r:Phishing | sc2r:SocialEngineering | sc2r:InfluenceThreat | sc2r:CognitiveThreat | sc2r:PersonalThreat | sc2r:Threat

Implementation:

@prefix owl: <http://www.w3.org/2002/07/owl#> .
@prefix rdfs: <http://www.w3.org/2000/01/rdf-schema#> .
@prefix sc2r: <http://cs.unu.edu/sc2r#> .

sc2r:Smishing a owl:Class ;
rdfs:label "Smishing"@en ;
rdfs:comment "Smishing occurs when individuals receive a convincing yet fraudulent text message (instead of email) from the perpetrator that attempts to trick into handing over personal information." ;
rdfs:subClassOf sc2r:Phishing .

Class: sc2r:SocialCapital   back to top


Description
Social capital is the accumulation of actual and potential resources linked to the possession of a social network.

Inherits from (2):
sc2r:IndividualResource | sc2r:Resource

Implementation:

@prefix owl: <http://www.w3.org/2002/07/owl#> .
@prefix rdfs: <http://www.w3.org/2000/01/rdf-schema#> .
@prefix sc2r: <http://cs.unu.edu/sc2r#> .

sc2r:SocialCapital a owl:Class ;
rdfs:label "Social Capital Resource" ;
rdfs:comment "Social capital is the accumulation of actual and potential resources linked to the possession of a social network." ;
rdfs:subClassOf sc2r:IndividualResource .

Class: sc2r:SocialContact   back to top


NOTE sc2r:SocialContact is a leaf node.

Description
Social Contact refers to individual's contact list and the conversation they have with others that occur through the use of a digital device.

Inherits from (4):
sc2r:PersonalData | sc2r:Data | sc2r:DigitalResource | sc2r:Resource

Implementation:

@prefix owl: <http://www.w3.org/2002/07/owl#> .
@prefix rdfs: <http://www.w3.org/2000/01/rdf-schema#> .
@prefix sc2r: <http://cs.unu.edu/sc2r#> .

sc2r:SocialContact a owl:Class ;
rdfs:label "Social Contact" ;
rdfs:comment "Social Contact refers to individual's contact list and the conversation they have with others that occur through the use of a digital device." ;
rdfs:subClassOf sc2r:PersonalData .

Class: sc2r:SocialEngineering   back to top


Description
Social Engineering is the use of deception to manipulate individuals into divulging confidential or personal information that may be used for fraudulent purposes.

Inherits from (4):
sc2r:InfluenceThreat | sc2r:CognitiveThreat | sc2r:PersonalThreat | sc2r:Threat

Implementation:

@prefix owl: <http://www.w3.org/2002/07/owl#> .
@prefix rdfs: <http://www.w3.org/2000/01/rdf-schema#> .
@prefix sc2r: <http://cs.unu.edu/sc2r#> .

sc2r:SocialEngineering a owl:Class ;
rdfs:label "Social Engineering"@en ;
rdfs:comment "Social Engineering is the use of deception to manipulate individuals into divulging confidential or personal information that may be used for fraudulent purposes." ;
rdfs:subClassOf sc2r:InfluenceThreat .

Class: sc2r:SocialHacking   back to top


Description
Social hacking is the act of attempting to manipulate outcomes of social behaviour through orchestrated actions.

Inherits from (2):
sc2r:SocialThreat | sc2r:Threat

Implementation:

@prefix owl: <http://www.w3.org/2002/07/owl#> .
@prefix rdfs: <http://www.w3.org/2000/01/rdf-schema#> .
@prefix sc2r: <http://cs.unu.edu/sc2r#> .

sc2r:SocialHacking a owl:Class ;
rdfs:label "Social Hacking"@en ;
rdfs:comment "Social hacking is the act of attempting to manipulate outcomes of social behaviour through orchestrated actions."@en ;
rdfs:subClassOf sc2r:SocialThreat .

Class: sc2r:SocialHarm   back to top


Description
Social harm is the harm that may result in a social context or society more broadly.

Inherits from (1):
sc2r:Harm

Implementation:

@prefix owl: <http://www.w3.org/2002/07/owl#> .
@prefix rdfs: <http://www.w3.org/2000/01/rdf-schema#> .
@prefix sc2r: <http://cs.unu.edu/sc2r#> .

sc2r:SocialHarm a owl:Class ;
rdfs:label "Social Harm" ;
rdfs:comment "Social harm is the harm that may result in a social context or society more broadly." ;
rdfs:subClassOf sc2r:Harm .

Class: sc2r:SocialMediaHygiene   back to top


NOTE sc2r:SocialMediaHygiene is a leaf node.

Description
Social media hygiene are measures and practices that contribute to safe and secure use of social media.

Inherits from (4):
sc2r:WebHygiene | sc2r:PreventionMeasure | sc2r:PrepareMeasure | sc2r:Response

Implementation:

@prefix owl: <http://www.w3.org/2002/07/owl#> .
@prefix rdfs: <http://www.w3.org/2000/01/rdf-schema#> .
@prefix sc2r: <http://cs.unu.edu/sc2r#> .

sc2r:SocialMediaHygiene a owl:Class ;
rdfs:label "Social Media Hygiene" ;
rdfs:comment "Social media hygiene are measures and practices that contribute to safe and secure use of social media." ;
rdfs:subClassOf sc2r:WebHygiene .

Class: sc2r:SocialMediaMonitoring   back to top


NOTE sc2r:SocialMediaMonitoring is a leaf node.

Description
Social media monitoring involves observing and checking social media resources for signs of adverse incidents.

Inherits from (4):
sc2r:ThreatMonitoringMeasure | sc2r:MonitoringMeasure | sc2r:PrepareMeasure | sc2r:Response

Implementation:

@prefix owl: <http://www.w3.org/2002/07/owl#> .
@prefix rdfs: <http://www.w3.org/2000/01/rdf-schema#> .
@prefix sc2r: <http://cs.unu.edu/sc2r#> .

sc2r:SocialMediaMonitoring a owl:Class ;
rdfs:label "Social Media Monitoring" ;
rdfs:comment "Social media monitoring involves observing and checking social media resources for signs of adverse incidents." ;
rdfs:subClassOf sc2r:ThreatMonitoringMeasure .

Class: sc2r:SocialNetwork   back to top


NOTE sc2r:SocialNetwork is a leaf node.

Description
Social Network refers to individual's network of social interactions and personal relationships.

Inherits from (3):
sc2r:SocialCapital | sc2r:IndividualResource | sc2r:Resource

Implementation:

@prefix owl: <http://www.w3.org/2002/07/owl#> .
@prefix rdfs: <http://www.w3.org/2000/01/rdf-schema#> .
@prefix sc2r: <http://cs.unu.edu/sc2r#> .

sc2r:SocialNetwork a owl:Class ;
rdfs:label "Social Network Resource" ;
rdfs:comment "Social Network refers to individual's network of social interactions and personal relationships." ;
rdfs:subClassOf sc2r:SocialCapital .

Class: sc2r:SocialPrivacy   back to top


NOTE sc2r:SocialPrivacy is a leaf node.

Description
Social Privacy is individual's right to keep their social network to themselves to protect the privacy of others within the network.

Inherits from (4):
sc2r:Privacy | sc2r:Right | sc2r:IndividualResource | sc2r:Resource

Implementation:

@prefix owl: <http://www.w3.org/2002/07/owl#> .
@prefix rdfs: <http://www.w3.org/2000/01/rdf-schema#> .
@prefix sc2r: <http://cs.unu.edu/sc2r#> .

sc2r:SocialPrivacy a owl:Class ;
rdfs:label "Right to Social Privacy" ;
rdfs:comment "Social Privacy is individual's right to keep their social network to themselves to protect the privacy of others within the network." ;
rdfs:subClassOf sc2r:Privacy .

Class: sc2r:SocialSupport   back to top


NOTE sc2r:SocialSupport is a leaf node.

Description
This involves leveraging individuals social capital towards recovery to the lost cyber functioning. For example, in the case of socio-technical threats, social support can enable individuals to deal with the adverse incident and to recover from its impacts.

Inherits from (3):
sc2r:ExternalSupport | sc2r:RecoverMeasure | sc2r:Response

Implementation:

@prefix owl: <http://www.w3.org/2002/07/owl#> .
@prefix rdfs: <http://www.w3.org/2000/01/rdf-schema#> .
@prefix sc2r: <http://cs.unu.edu/sc2r#> .

sc2r:SocialSupport a owl:Class ;
rdfs:label "Social Support" ;
rdfs:comment """This involves leveraging individuals social capital towards recovery to the lost cyber functioning.

For example, in the case of socio-technical threats, social support can enable individuals to deal with the adverse incident and to recover from its impacts.""" ;
rdfs:subClassOf sc2r:ExternalSupport .

Class: sc2r:SocialThreat   back to top


Description
Social Threats are associated with individuals' social and societal context.

Inherits from (1):
sc2r:Threat

Implementation:

@prefix owl: <http://www.w3.org/2002/07/owl#> .
@prefix rdfs: <http://www.w3.org/2000/01/rdf-schema#> .
@prefix sc2r: <http://cs.unu.edu/sc2r#> .

sc2r:SocialThreat a owl:Class ;
rdfs:label "Societal and Social Threat"@en ;
rdfs:comment "Social Threats are associated with individuals' social and societal context."@en ;
rdfs:subClassOf sc2r:Threat .

Class: sc2r:SocialWithdrawal   back to top


NOTE sc2r:SocialWithdrawal is a leaf node.

Description
Social Withdrawal refers to the state in which the individual avoids people and activities they would usually enjoy, that could lead to a point of social isolation.

Inherits from (2):
sc2r:SocialHarm | sc2r:Harm

Implementation:

@prefix owl: <http://www.w3.org/2002/07/owl#> .
@prefix rdfs: <http://www.w3.org/2000/01/rdf-schema#> .
@prefix sc2r: <http://cs.unu.edu/sc2r#> .

sc2r:SocialWithdrawal a owl:Class ;
rdfs:label "Social Withdrawal" ;
rdfs:comment "Social Withdrawal refers to the state in which the individual avoids people and activities they would usually enjoy, that could lead to a point of social isolation." ;
rdfs:subClassOf sc2r:SocialHarm .

Class: sc2r:SociocognitiveHacking   back to top


NOTE sc2r:SociocognitiveHacking is a leaf node.

Description
Socio-cognitive hacking seeks to manipulate the perception of people by exploiting their psychosocial vulnerabilities with the purpose of changing people's behaviour. The most common tool used is weaponised information.

Inherits from (3):
sc2r:SocialHacking | sc2r:SocialThreat | sc2r:Threat

Implementation:

@prefix owl: <http://www.w3.org/2002/07/owl#> .
@prefix rdfs: <http://www.w3.org/2000/01/rdf-schema#> .
@prefix sc2r: <http://cs.unu.edu/sc2r#> .

sc2r:SociocognitiveHacking a owl:Class ;
rdfs:label "Socio-cognitive Hacking"@en ;
rdfs:comment "Socio-cognitive hacking seeks to manipulate the perception of people by exploiting their psychosocial vulnerabilities with the purpose of changing people's behaviour. The most common tool used is weaponised information." ;
rdfs:subClassOf sc2r:SocialHacking .

Class: sc2r:SockPuppetry   back to top


NOTE sc2r:SockPuppetry is a leaf node.

Description
Sock Puppetry is a form of deception that involves the misleading use of online identities to manipulate public opinion, or to circumvent restrictions, suspension or an outright ban from a website.

Inherits from (3):
sc2r:SocialHacking | sc2r:SocialThreat | sc2r:Threat

Implementation:

@prefix owl: <http://www.w3.org/2002/07/owl#> .
@prefix rdfs: <http://www.w3.org/2000/01/rdf-schema#> .
@prefix sc2r: <http://cs.unu.edu/sc2r#> .

sc2r:SockPuppetry a owl:Class ;
rdfs:label "Sock Puppetry"@en ;
rdfs:comment "Sock Puppetry is a form of deception that involves the misleading use of online identities to manipulate public opinion, or to circumvent restrictions, suspension or an outright ban from a website." ;
rdfs:subClassOf sc2r:SocialHacking .

Class: sc2r:Software   back to top


Description
A Software is a set of programs, procedures, and routines used to operate computers and execute specific tasks.

Inherits from (2):
sc2r:DigitalResource | sc2r:Resource

Implementation:

@prefix owl: <http://www.w3.org/2002/07/owl#> .
@prefix rdfs: <http://www.w3.org/2000/01/rdf-schema#> .
@prefix sc2r: <http://cs.unu.edu/sc2r#> .

sc2r:Software a owl:Class ;
rdfs:label "Software" ;
rdfs:comment "A Software is a set of programs, procedures, and routines used to operate computers and execute specific tasks." ;
rdfs:subClassOf sc2r:DigitalResource .

Class: sc2r:SoftwareRedundancy   back to top


NOTE sc2r:SoftwareRedundancy is a leaf node.

Description
Software redundancy involves having redundant software in place to be utilized in cases where primary software is affected by adverse cyber incidents.

Inherits from (4):
sc2r:RedundancyMeasure | sc2r:AnticipateMeasure | sc2r:PrepareMeasure | sc2r:Response

Implementation:

@prefix owl: <http://www.w3.org/2002/07/owl#> .
@prefix rdfs: <http://www.w3.org/2000/01/rdf-schema#> .
@prefix sc2r: <http://cs.unu.edu/sc2r#> .

sc2r:SoftwareRedundancy a owl:Class ;
rdfs:label "Software Redundancy" ;
rdfs:comment "Software redundancy involves having redundant software in place to be utilized in cases where primary software is affected by adverse cyber incidents." ;
rdfs:subClassOf sc2r:RedundancyMeasure .

Class: sc2r:SoftwareVulnerability   back to top


NOTE sc2r:SoftwareVulnerability is a leaf node.

Description
Sofware Vulnerabilities are weaknesses in software resources.

Inherits from (2):
sc2r:Digital | sc2r:Vulnerability

Implementation:

@prefix owl: <http://www.w3.org/2002/07/owl#> .
@prefix rdfs: <http://www.w3.org/2000/01/rdf-schema#> .
@prefix sc2r: <http://cs.unu.edu/sc2r#> .

sc2r:SoftwareVulnerability a owl:Class ;
rdfs:label "Software Vulnerability" ;
rdfs:comment "Sofware Vulnerabilities are weaknesses in software resources." ;
rdfs:subClassOf sc2r:Digital .

Class: sc2r:SolitudeThreat   back to top


NOTE sc2r:SolitudeThreat is a leaf node.

Description
Solitude Threat occurs when individuals' preference to be alone by themselves and free from observations by others is threatened.

Inherits from (3):
sc2r:PrivacyThreat | sc2r:PersonalThreat | sc2r:Threat

Implementation:

@prefix owl: <http://www.w3.org/2002/07/owl#> .
@prefix rdfs: <http://www.w3.org/2000/01/rdf-schema#> .
@prefix sc2r: <http://cs.unu.edu/sc2r#> .

sc2r:SolitudeThreat a owl:Class ;
rdfs:label "Solitude Threat"@en ;
rdfs:comment "Solitude Threat occurs when individuals' preference to be alone by themselves and free from observations by others is threatened." ;
rdfs:subClassOf sc2r:PrivacyThreat .

Class: sc2r:SourceRedundancy   back to top


NOTE sc2r:SourceRedundancy is a leaf node.

Description
Source redundancy involves having alternative sources of information, content and services to be utilized in cases where primary sources are affected by adverse cyber incidents.

Inherits from (4):
sc2r:RedundancyMeasure | sc2r:AnticipateMeasure | sc2r:PrepareMeasure | sc2r:Response

Implementation:

@prefix owl: <http://www.w3.org/2002/07/owl#> .
@prefix rdfs: <http://www.w3.org/2000/01/rdf-schema#> .
@prefix sc2r: <http://cs.unu.edu/sc2r#> .

sc2r:SourceRedundancy a owl:Class ;
rdfs:label "Source Redundancy" ;
rdfs:comment "Source redundancy involves having alternative sources of information, content and services to be utilized in cases where primary sources are affected by adverse cyber incidents." ;
rdfs:subClassOf sc2r:RedundancyMeasure .

Class: sc2r:SpamEmail   back to top


NOTE sc2r:SpamEmail is a leaf node.

Description
Spam Emails (junk emails) are unsolicited messages sent in bulk through email with commercial, fraudulent, or malicious intent.

Inherits from (4):
sc2r:UnsolicitedCommunication | sc2r:Abuse | sc2r:PersonalThreat | sc2r:Threat

Implementation:

@prefix owl: <http://www.w3.org/2002/07/owl#> .
@prefix rdfs: <http://www.w3.org/2000/01/rdf-schema#> .
@prefix sc2r: <http://cs.unu.edu/sc2r#> .

sc2r:SpamEmail a owl:Class ;
rdfs:label "Spam Email"@en ;
rdfs:comment "Spam Emails (junk emails) are unsolicited messages sent in bulk through email with commercial, fraudulent, or malicious intent." ;
rdfs:subClassOf sc2r:UnsolicitedCommunication .

Class: sc2r:SpearPhishing   back to top


Description
Spear Phishing occurs when individuals receive a convincing yet fraudulent message from the perpetrator who poses as a familiar person or entity to the individual in an attempt to trick them into sharing sensitive information.

Inherits from (6):
sc2r:Phishing | sc2r:SocialEngineering | sc2r:InfluenceThreat | sc2r:CognitiveThreat | sc2r:PersonalThreat | sc2r:Threat

Implementation:

@prefix owl: <http://www.w3.org/2002/07/owl#> .
@prefix rdfs: <http://www.w3.org/2000/01/rdf-schema#> .
@prefix sc2r: <http://cs.unu.edu/sc2r#> .

sc2r:SpearPhishing a owl:Class ;
rdfs:label "Spear Phishing"@en ;
rdfs:comment "Spear Phishing occurs when individuals receive a convincing yet fraudulent message from the perpetrator who poses as a familiar person or entity to the individual in an attempt to trick them into sharing sensitive information." ;
rdfs:subClassOf sc2r:Phishing .

Class: sc2r:Spoofing   back to top


NOTE sc2r:Spoofing is a leaf node.

Description
Spoofing is an attack where fake and falsified identity is provided by individuals or machines. For example, a rogue website pretending to be another legitimate website by spoofing the address.

Inherits from (3):
sc2r:AuthenticationThreat | sc2r:TechnologicalThreat | sc2r:Threat

Implementation:

@prefix owl: <http://www.w3.org/2002/07/owl#> .
@prefix rdfs: <http://www.w3.org/2000/01/rdf-schema#> .
@prefix sc2r: <http://cs.unu.edu/sc2r#> .

sc2r:Spoofing a owl:Class ;
rdfs:label "Spoofing"@en ;
rdfs:comment "Spoofing is an attack where fake and falsified identity is provided by individuals or machines. For example, a rogue website pretending to be another legitimate website by spoofing the address."@en ;
rdfs:subClassOf sc2r:AuthenticationThreat .

Class: sc2r:StorageAsset   back to top


Description
Storage Asset comprises any recording media used to retain data using computers or other devices.

Inherits from (2):
sc2r:PhysicalResource | sc2r:Resource

Implementation:

@prefix owl: <http://www.w3.org/2002/07/owl#> .
@prefix rdfs: <http://www.w3.org/2000/01/rdf-schema#> .
@prefix sc2r: <http://cs.unu.edu/sc2r#> .

sc2r:StorageAsset a owl:Class ;
rdfs:label "Storage Asset" ;
rdfs:comment "Storage Asset comprises any recording media used to retain data using computers or other devices." ;
rdfs:subClassOf sc2r:PhysicalResource .

Class: sc2r:Strawman   back to top


NOTE sc2r:Strawman is a leaf node.

Description
Strawman attack is a technique that is used to undermine a specific position by summarising the position inaccurately so as to weaken it and then by refuting that inaccurate rendition.

Inherits from (5):
sc2r:MalignRhetoric | sc2r:Disinformation | sc2r:CognitiveThreat | sc2r:PersonalThreat | sc2r:Threat

Implementation:

@prefix owl: <http://www.w3.org/2002/07/owl#> .
@prefix rdfs: <http://www.w3.org/2000/01/rdf-schema#> .
@prefix sc2r: <http://cs.unu.edu/sc2r#> .

sc2r:Strawman a owl:Class ;
rdfs:label "Strawman Attack"@en ;
rdfs:comment "Strawman attack is a technique that is used to undermine a specific position by summarising the position inaccurately so as to weaken it and then by refuting that inaccurate rendition."@en ;
rdfs:subClassOf sc2r:MalignRhetoric .

Class: sc2r:Surveillance   back to top


NOTE sc2r:Surveillance is a leaf node.

Description
Surveillance occurs when individuals are observed and monitored for the purposes of collecting information, influencing or managing.

Inherits from (3):
sc2r:InstitutionalThreat | sc2r:EnvironmentalThreat | sc2r:Threat

Implementation:

@prefix owl: <http://www.w3.org/2002/07/owl#> .
@prefix rdfs: <http://www.w3.org/2000/01/rdf-schema#> .
@prefix sc2r: <http://cs.unu.edu/sc2r#> .

sc2r:Surveillance a owl:Class ;
rdfs:label "Surveillance"@en ;
rdfs:comment "Surveillance occurs when individuals are observed and monitored for the purposes of collecting information, influencing or managing."@en ;
rdfs:subClassOf sc2r:InstitutionalThreat .

Class: sc2r:SweepstakesScam   back to top


NOTE sc2r:SweepstakesScam is a leaf node.

Description
Sweepstakes scam occurs when individuals are told that they have won a prize and that they need to pay a fee before receiving their prize.

Inherits from (4):
sc2r:Scam | sc2r:TheftThreat | sc2r:PersonalThreat | sc2r:Threat

Implementation:

@prefix owl: <http://www.w3.org/2002/07/owl#> .
@prefix rdfs: <http://www.w3.org/2000/01/rdf-schema#> .
@prefix sc2r: <http://cs.unu.edu/sc2r#> .

sc2r:SweepstakesScam a owl:Class ;
rdfs:label "Sweepstakes Scam" ;
rdfs:comment "Sweepstakes scam occurs when individuals are told that they have won a prize and that they need to pay a fee before receiving their prize." ;
rdfs:subClassOf sc2r:Scam .

Class: sc2r:Sympathy   back to top


NOTE sc2r:Sympathy is a leaf node.

Description
Sympathy is an affinity, association, or understanding of someone else's feeling, problem, or suffering.

Inherits from (2):
sc2r:Individual | sc2r:Vulnerability

Implementation:

@prefix owl: <http://www.w3.org/2002/07/owl#> .
@prefix rdfs: <http://www.w3.org/2000/01/rdf-schema#> .
@prefix sc2r: <http://cs.unu.edu/sc2r#> .

sc2r:Sympathy a owl:Class ;
rdfs:label "Sympathy" ;
rdfs:comment "Sympathy is an affinity, association, or understanding of someone else's feeling, problem, or suffering." ;
rdfs:subClassOf sc2r:Individual .

Class: sc2r:SystemRecovery   back to top


NOTE sc2r:SystemRecovery is a leaf node.

Description
System recovery involves the restoration of a system, including services and configuration, to the level of nominal functioning equivalent to that before an adverse cyber incident.

Inherits from (2):
sc2r:RecoverMeasure | sc2r:Response

Implementation:

@prefix owl: <http://www.w3.org/2002/07/owl#> .
@prefix rdfs: <http://www.w3.org/2000/01/rdf-schema#> .
@prefix sc2r: <http://cs.unu.edu/sc2r#> .

sc2r:SystemRecovery a owl:Class ;
rdfs:label "System Recovery" ;
rdfs:comment "System recovery involves the restoration of a system, including services and configuration, to the level of nominal functioning equivalent to that before an adverse cyber incident." ;
rdfs:subClassOf sc2r:RecoverMeasure .

Class: sc2r:Tailgating   back to top


NOTE sc2r:Tailgating is a leaf node.

Description
Tailgating (or piggybacking) occurs when individuals are targeted by an attempt to trick them to help the perpetrator gain unauthorised access into a secure, restricted area.

Inherits from (5):
sc2r:SocialEngineering | sc2r:InfluenceThreat | sc2r:CognitiveThreat | sc2r:PersonalThreat | sc2r:Threat

Implementation:

@prefix owl: <http://www.w3.org/2002/07/owl#> .
@prefix rdfs: <http://www.w3.org/2000/01/rdf-schema#> .
@prefix sc2r: <http://cs.unu.edu/sc2r#> .

sc2r:Tailgating a owl:Class ;
rdfs:label "Tailgating"@en ;
rdfs:comment "Tailgating (or piggybacking) occurs when individuals are targeted by an attempt to trick them to help the perpetrator gain unauthorised access into a secure, restricted area." ;
rdfs:subClassOf sc2r:SocialEngineering .

Class: sc2r:TechnicalMediation   back to top


NOTE sc2r:TechnicalMediation is a leaf node.

Description
Technical mediation is the use of technology solutions to limit the impact of adverse cyber incidents.

Inherits from (3):
sc2r:MediationMeasures | sc2r:PrepareMeasure | sc2r:Response

Implementation:

@prefix owl: <http://www.w3.org/2002/07/owl#> .
@prefix rdfs: <http://www.w3.org/2000/01/rdf-schema#> .
@prefix sc2r: <http://cs.unu.edu/sc2r#> .

sc2r:TechnicalMediation a owl:Class ;
rdfs:label "Technical Mediation" ;
rdfs:comment "Technical mediation is the use of technology solutions to limit the impact of adverse cyber incidents." ;
rdfs:subClassOf sc2r:MediationMeasures .

Class: sc2r:TechnologicalThreat   back to top


Description
Technological Threats are associated with and affect individuals' computing resources.

Inherits from (1):
sc2r:Threat

Implementation:

@prefix owl: <http://www.w3.org/2002/07/owl#> .
@prefix rdfs: <http://www.w3.org/2000/01/rdf-schema#> .
@prefix sc2r: <http://cs.unu.edu/sc2r#> .

sc2r:TechnologicalThreat a owl:Class ;
rdfs:label "Technological Threat"@en ;
rdfs:comment "Technological Threats are associated with and affect individuals' computing resources."@en ;
rdfs:subClassOf sc2r:Threat .

Class: sc2r:TerritorialPrivacy   back to top


NOTE sc2r:TerritorialPrivacy is a leaf node.

Description
The right to protect personal space, property, and objects.

Inherits from (4):
sc2r:Privacy | sc2r:Right | sc2r:IndividualResource | sc2r:Resource

Implementation:

@prefix owl: <http://www.w3.org/2002/07/owl#> .
@prefix rdfs: <http://www.w3.org/2000/01/rdf-schema#> .
@prefix sc2r: <http://cs.unu.edu/sc2r#> .

sc2r:TerritorialPrivacy a owl:Class ;
rdfs:label "Right to Territorial Privacy" ;
rdfs:comment "The right to protect personal space, property, and objects." ;
rdfs:subClassOf sc2r:Privacy .

Class: sc2r:Theft   back to top


NOTE sc2r:Theft is a leaf node.

Description
Theft Harm refers to the state in which individual's resources are physically or digitally stolen.

Inherits from (2):
sc2r:PhysicalHarm | sc2r:Harm

Implementation:

@prefix owl: <http://www.w3.org/2002/07/owl#> .
@prefix rdfs: <http://www.w3.org/2000/01/rdf-schema#> .
@prefix sc2r: <http://cs.unu.edu/sc2r#> .

sc2r:Theft a owl:Class ;
rdfs:label "Theft Harm" ;
rdfs:comment "Theft Harm refers to the state in which individual's resources are physically or digitally stolen." ;
rdfs:subClassOf sc2r:PhysicalHarm .

Class: sc2r:TheftOfFinances   back to top


NOTE sc2r:TheftOfFinances is a leaf node.

Description
Theft of Finances the state in which individual's financial resources are stolen.

Inherits from (2):
sc2r:EconomicHarm | sc2r:Harm

Implementation:

@prefix owl: <http://www.w3.org/2002/07/owl#> .
@prefix rdfs: <http://www.w3.org/2000/01/rdf-schema#> .
@prefix sc2r: <http://cs.unu.edu/sc2r#> .

sc2r:TheftOfFinances a owl:Class ;
rdfs:label "Theft of Finances" ;
rdfs:comment "Theft of Finances the state in which individual's financial resources are stolen." ;
rdfs:subClassOf sc2r:EconomicHarm .

Class: sc2r:TheftThreat   back to top


Description
Theft Threats aim to steal of defraud individuals of certain resources.

Inherits from (2):
sc2r:PersonalThreat | sc2r:Threat

Implementation:

@prefix owl: <http://www.w3.org/2002/07/owl#> .
@prefix rdfs: <http://www.w3.org/2000/01/rdf-schema#> .
@prefix sc2r: <http://cs.unu.edu/sc2r#> .

sc2r:TheftThreat a owl:Class ;
rdfs:label "Theft Threat" ;
rdfs:comment "Theft Threats aim to steal of defraud individuals of certain resources." ;
rdfs:subClassOf sc2r:PersonalThreat .

Class: sc2r:Threat   back to top


Description
A Threat is a potential adverse cyber incident that has an impact on individuals. Threats are framed around individuals' personal, social, and environmental conversion factors which consitute their personal utilization function.

Inherits from:
owl:Thing

Property Domain of:
sc2r:canResultIn | sc2r:damages | sc2r:exploits | sc2r:isMitigatedBy | sc2r:resultsIn

Property Range of:
sc2r:canBeResultOf | sc2r:isDamagedBy | sc2r:isExploitedBy | sc2r:isResultOf | sc2r:mitigates

Implementation:

@prefix owl: <http://www.w3.org/2002/07/owl#> .
@prefix rdfs: <http://www.w3.org/2000/01/rdf-schema#> .
@prefix sc2r: <http://cs.unu.edu/sc2r#> .

sc2r:Threat a owl:Class ;
rdfs:label "Threat"@en ;
rdfs:comment "A Threat is a potential adverse cyber incident that has an impact on individuals. Threats are framed around individuals' personal, social, and environmental conversion factors which consitute their personal utilization function."@en ;
rdfs:seeAlso "https://en.wikipedia.org/wiki/Threat_(computer)"@en .

Class: sc2r:ThreatMonitoringMeasure   back to top


Description
Threat monitoring is the process of continually monitoring and observing the operation and use of cyber resources for signs of adverse cyber incidents and threats.

Inherits from (3):
sc2r:MonitoringMeasure | sc2r:PrepareMeasure | sc2r:Response

Implementation:

@prefix owl: <http://www.w3.org/2002/07/owl#> .
@prefix rdfs: <http://www.w3.org/2000/01/rdf-schema#> .
@prefix sc2r: <http://cs.unu.edu/sc2r#> .

sc2r:ThreatMonitoringMeasure a owl:Class ;
rdfs:label "Threat Monitoring Measure" ;
rdfs:comment "Threat monitoring is the process of continually monitoring and observing the operation and use of cyber resources for signs of adverse cyber incidents and threats." ;
rdfs:subClassOf sc2r:MonitoringMeasure .

Class: sc2r:TimeWasted   back to top


NOTE sc2r:TimeWasted is a leaf node.

Description
Time Wasted refers to the unnecessary loss of time spent due to dealing with cyber threats and the impacts.

Inherits from (2):
sc2r:EconomicHarm | sc2r:Harm

Implementation:

@prefix owl: <http://www.w3.org/2002/07/owl#> .
@prefix rdfs: <http://www.w3.org/2000/01/rdf-schema#> .
@prefix sc2r: <http://cs.unu.edu/sc2r#> .

sc2r:TimeWasted a owl:Class ;
rdfs:label "Time Wasted" ;
rdfs:comment "Time Wasted refers to the unnecessary loss of time spent due to dealing with cyber threats and the impacts." ;
rdfs:subClassOf sc2r:EconomicHarm .

Class: sc2r:Training   back to top


NOTE sc2r:Training is a leaf node.

Description
Training is a capability-building measure that enhances individuals' skills and competencies to be able to deal with and handle adverse cyber incidents.

Inherits from (3):
sc2r:AnticipateMeasure | sc2r:PrepareMeasure | sc2r:Response

Implementation:

@prefix owl: <http://www.w3.org/2002/07/owl#> .
@prefix rdfs: <http://www.w3.org/2000/01/rdf-schema#> .
@prefix sc2r: <http://cs.unu.edu/sc2r#> .

sc2r:Training a owl:Class ;
rdfs:label "Training" ;
rdfs:comment "Training is a capability-building measure that enhances individuals' skills and competencies to be able to deal with and handle adverse cyber incidents." ;
rdfs:subClassOf sc2r:AnticipateMeasure .

Class: sc2r:Transfer   back to top


NOTE sc2r:Transfer is a leaf node.

Description
Transfer information attack occurs when information, content, and arguments are associated with partisan and controversial themes for influence and distortion purposes.

Inherits from (5):
sc2r:MalignRhetoric | sc2r:Disinformation | sc2r:CognitiveThreat | sc2r:PersonalThreat | sc2r:Threat

Implementation:

@prefix owl: <http://www.w3.org/2002/07/owl#> .
@prefix rdfs: <http://www.w3.org/2000/01/rdf-schema#> .
@prefix sc2r: <http://cs.unu.edu/sc2r#> .

sc2r:Transfer a owl:Class ;
rdfs:label "Transfer Information Attack"@en ;
rdfs:comment "Transfer information attack occurs when information, content, and arguments are associated with partisan and controversial themes for influence and distortion purposes."@en ;
rdfs:subClassOf sc2r:MalignRhetoric .

Class: sc2r:Trolling   back to top


Description
Trolling is the deliberate act of making random unsolicited, inflammatory, and/or controversial comments online with the intent to provoke emotional responses from unsuspecting readers to engage in a fight or argument.

Inherits from (3):
sc2r:Abuse | sc2r:PersonalThreat | sc2r:Threat

Implementation:

@prefix owl: <http://www.w3.org/2002/07/owl#> .
@prefix rdfs: <http://www.w3.org/2000/01/rdf-schema#> .
@prefix sc2r: <http://cs.unu.edu/sc2r#> .

sc2r:Trolling a owl:Class ;
rdfs:label "Trolling"@en ;
rdfs:comment "Trolling is the deliberate act of making random unsolicited, inflammatory, and/or controversial comments online with the intent to provoke emotional responses from unsuspecting readers to engage in a fight or argument." ;
rdfs:subClassOf sc2r:Abuse .

Class: sc2r:TrustedData   back to top


NOTE sc2r:TrustedData is a leaf node.

Description
Trusted data is the use of measures that ensure the safety, security and veracity of data.

Inherits from (3):
sc2r:PreventionMeasure | sc2r:PrepareMeasure | sc2r:Response

Implementation:

@prefix owl: <http://www.w3.org/2002/07/owl#> .
@prefix rdfs: <http://www.w3.org/2000/01/rdf-schema#> .
@prefix sc2r: <http://cs.unu.edu/sc2r#> .

sc2r:TrustedData a owl:Class ;
rdfs:label "Trusted Data" ;
rdfs:comment "Trusted data is the use of measures that ensure the safety, security and veracity of data." ;
rdfs:subClassOf sc2r:PreventionMeasure .

Class: sc2r:TrustedInformation   back to top


NOTE sc2r:TrustedInformation is a leaf node.

Description
Trusted information is the use of information that is verified and safe, and from trusted sources.

Inherits from (3):
sc2r:PreventionMeasure | sc2r:PrepareMeasure | sc2r:Response

Implementation:

@prefix owl: <http://www.w3.org/2002/07/owl#> .
@prefix rdfs: <http://www.w3.org/2000/01/rdf-schema#> .
@prefix sc2r: <http://cs.unu.edu/sc2r#> .

sc2r:TrustedInformation a owl:Class ;
rdfs:label "Trusted Information" ;
rdfs:comment "Trusted information is the use of information that is verified and safe, and from trusted sources." ;
rdfs:subClassOf sc2r:PreventionMeasure .

Class: sc2r:TrustedInfrastructure   back to top


Description
Trusted infrastructure involves the use of safe, secure, verified and trusted cyber infrastructure.

Inherits from (3):
sc2r:PreventionMeasure | sc2r:PrepareMeasure | sc2r:Response

Implementation:

@prefix owl: <http://www.w3.org/2002/07/owl#> .
@prefix rdfs: <http://www.w3.org/2000/01/rdf-schema#> .
@prefix sc2r: <http://cs.unu.edu/sc2r#> .

sc2r:TrustedInfrastructure a owl:Class ;
rdfs:label "Trusted Infrastructure" ;
rdfs:comment "Trusted infrastructure involves the use of safe, secure, verified and trusted cyber infrastructure." ;
rdfs:subClassOf sc2r:PreventionMeasure .

Class: sc2r:TrustedNetworking   back to top


Description
Trusted Networking is the use of networking resources in a safe, secure, and trusted manner.

Inherits from (4):
sc2r:TrustedInfrastructure | sc2r:PreventionMeasure | sc2r:PrepareMeasure | sc2r:Response

Implementation:

@prefix owl: <http://www.w3.org/2002/07/owl#> .
@prefix rdfs: <http://www.w3.org/2000/01/rdf-schema#> .
@prefix sc2r: <http://cs.unu.edu/sc2r#> .

sc2r:TrustedNetworking a owl:Class ;
rdfs:label "Trusted Networking" ;
rdfs:comment "Trusted Networking is the use of networking resources in a safe, secure, and trusted manner." ;
rdfs:subClassOf sc2r:TrustedInfrastructure .

Class: sc2r:TrustedSoftware   back to top


NOTE sc2r:TrustedSoftware is a leaf node.

Description
Trusted software involves the use of software that is safe, secure, verified and trusted. It involves using software from legitimate sources.

Inherits from (3):
sc2r:PreventionMeasure | sc2r:PrepareMeasure | sc2r:Response

Implementation:

@prefix owl: <http://www.w3.org/2002/07/owl#> .
@prefix rdfs: <http://www.w3.org/2000/01/rdf-schema#> .
@prefix sc2r: <http://cs.unu.edu/sc2r#> .

sc2r:TrustedSoftware a owl:Class ;
rdfs:label "Trusted Software" ;
rdfs:comment "Trusted software involves the use of software that is safe, secure, verified and trusted. It involves using software from legitimate sources." ;
rdfs:subClassOf sc2r:PreventionMeasure .

Class: sc2r:USBDrive   back to top


NOTE sc2r:USBDrive is a leaf node.

Description
USB Drive is an external hard disk drive or optical disc drive that plugs into the USB port.

Inherits from (3):
sc2r:StorageAsset | sc2r:PhysicalResource | sc2r:Resource

Implementation:

@prefix owl: <http://www.w3.org/2002/07/owl#> .
@prefix rdfs: <http://www.w3.org/2000/01/rdf-schema#> .
@prefix sc2r: <http://cs.unu.edu/sc2r#> .

sc2r:USBDrive a owl:Class ;
rdfs:label "USB Drive" ;
rdfs:comment "USB Drive is an external hard disk drive or optical disc drive that plugs into the USB port." ;
rdfs:subClassOf sc2r:StorageAsset .

Class: sc2r:UnauthorizedAccess   back to top


Description
Unauthorized access occurs when individuals or machines gain access to information or services that they are not authorized to.

Inherits from (3):
sc2r:AuthenticationThreat | sc2r:TechnologicalThreat | sc2r:Threat

Implementation:

@prefix owl: <http://www.w3.org/2002/07/owl#> .
@prefix rdfs: <http://www.w3.org/2000/01/rdf-schema#> .
@prefix sc2r: <http://cs.unu.edu/sc2r#> .

sc2r:UnauthorizedAccess a owl:Class ;
rdfs:label "Unauthorized Access"@en ;
rdfs:comment "Unauthorized access occurs when individuals or machines gain access to information or services that they are not authorized to."@en ;
rdfs:subClassOf sc2r:AuthenticationThreat .

Class: sc2r:Unavailable   back to top


NOTE sc2r:Unavailable is a leaf node.

Description
Unavailable is the state in which the resources become physically or digitally unavailable to use.

Inherits from (2):
sc2r:PhysicalHarm | sc2r:Harm

Implementation:

@prefix owl: <http://www.w3.org/2002/07/owl#> .
@prefix rdfs: <http://www.w3.org/2000/01/rdf-schema#> .
@prefix sc2r: <http://cs.unu.edu/sc2r#> .

sc2r:Unavailable a owl:Class ;
rdfs:label "Unavailable" ;
rdfs:comment "Unavailable is the state in which the resources become physically or digitally unavailable to use." ;
rdfs:subClassOf sc2r:PhysicalHarm .

Class: sc2r:UnderScrutiny   back to top


NOTE sc2r:UnderScrutiny is a leaf node.

Description
Under Scrutiny refers to refers to the state in which the individual's action is continuosly being scruitinised.

Inherits from (2):
sc2r:ReputationalHarm | sc2r:Harm

Implementation:

@prefix owl: <http://www.w3.org/2002/07/owl#> .
@prefix rdfs: <http://www.w3.org/2000/01/rdf-schema#> .
@prefix sc2r: <http://cs.unu.edu/sc2r#> .

sc2r:UnderScrutiny a owl:Class ;
rdfs:label "Under Scrutiny" ;
rdfs:comment "Under Scrutiny refers to refers to the state in which the individual's action is continuosly being scruitinised." ;
rdfs:subClassOf sc2r:ReputationalHarm .

Class: sc2r:UnsolicitedCommunication   back to top


Description
Unsolicited communication occurs when individuals receive communication that they haven't requested or solicited.

Inherits from (3):
sc2r:Abuse | sc2r:PersonalThreat | sc2r:Threat

Implementation:

@prefix owl: <http://www.w3.org/2002/07/owl#> .
@prefix rdfs: <http://www.w3.org/2000/01/rdf-schema#> .
@prefix sc2r: <http://cs.unu.edu/sc2r#> .

sc2r:UnsolicitedCommunication a owl:Class ;
rdfs:label "Unsolicited Communication"@en ;
rdfs:comment "Unsolicited communication occurs when individuals receive communication that they haven't requested or solicited." ;
rdfs:subClassOf sc2r:Abuse .

Class: sc2r:UnsolicitedSocialRequest   back to top


NOTE sc2r:UnsolicitedSocialRequest is a leaf node.

Description
Unsolicited Social Request occurs when individuals receive a request for information from a person or an entity that is unknown to or has no connection with them.

Inherits from (4):
sc2r:UnsolicitedCommunication | sc2r:Abuse | sc2r:PersonalThreat | sc2r:Threat

Implementation:

@prefix owl: <http://www.w3.org/2002/07/owl#> .
@prefix rdfs: <http://www.w3.org/2000/01/rdf-schema#> .
@prefix sc2r: <http://cs.unu.edu/sc2r#> .

sc2r:UnsolicitedSocialRequest a owl:Class ;
rdfs:label "Unsolicited Social Request"@en ;
rdfs:comment "Unsolicited Social Request occurs when individuals receive a request for information from a person or an entity that is unknown to or has no connection with them." ;
rdfs:subClassOf sc2r:UnsolicitedCommunication .

Class: sc2r:Urgency   back to top


NOTE sc2r:Urgency is a leaf node.

Description
Urgency is the need to deal with something quickly; the feeling of wanting something very much.

Inherits from (2):
sc2r:Individual | sc2r:Vulnerability

Implementation:

@prefix owl: <http://www.w3.org/2002/07/owl#> .
@prefix rdfs: <http://www.w3.org/2000/01/rdf-schema#> .
@prefix sc2r: <http://cs.unu.edu/sc2r#> .

sc2r:Urgency a owl:Class ;
rdfs:label "Urgency" ;
rdfs:comment "Urgency is the need to deal with something quickly; the feeling of wanting something very much." ;
rdfs:subClassOf sc2r:Individual .

Class: sc2r:UserGeneratedContent   back to top


NOTE sc2r:UserGeneratedContent is a leaf node.

Description
User Generated Content (UGC) is any content, including text, audio, videos, images, and reviews, that are created by users/people and posted on online platforms.

Inherits from (4):
sc2r:PersonalData | sc2r:Data | sc2r:DigitalResource | sc2r:Resource

Implementation:

@prefix owl: <http://www.w3.org/2002/07/owl#> .
@prefix rdfs: <http://www.w3.org/2000/01/rdf-schema#> .
@prefix sc2r: <http://cs.unu.edu/sc2r#> .

sc2r:UserGeneratedContent a owl:Class ;
rdfs:label "User-Generated Content" ;
rdfs:comment "User Generated Content (UGC) is any content, including text, audio, videos, images, and reviews, that are created by users/people and posted on online platforms." ;
rdfs:subClassOf sc2r:PersonalData .

Class: sc2r:UserIdentification   back to top


NOTE sc2r:UserIdentification is a leaf node.

Description
Use identification is the confirmation of the claimed identify of users.

Inherits from (4):
sc2r:Identification | sc2r:PreventionMeasure | sc2r:PrepareMeasure | sc2r:Response

Implementation:

@prefix owl: <http://www.w3.org/2002/07/owl#> .
@prefix rdfs: <http://www.w3.org/2000/01/rdf-schema#> .
@prefix sc2r: <http://cs.unu.edu/sc2r#> .

sc2r:UserIdentification a owl:Class ;
rdfs:label "User Identification" ;
rdfs:comment "Use identification is the confirmation of the claimed identify of users." ;
rdfs:subClassOf sc2r:Identification .

Class: sc2r:Vandalism   back to top


NOTE sc2r:Vandalism is a leaf node.

Description
Digital Vandalism occurs when individuals' digital resources, for example websites, are maliciously defaced or permanently damaged.

Inherits from (3):
sc2r:IntegrityThreat | sc2r:TechnologicalThreat | sc2r:Threat

Implementation:

@prefix owl: <http://www.w3.org/2002/07/owl#> .
@prefix rdfs: <http://www.w3.org/2000/01/rdf-schema#> .
@prefix sc2r: <http://cs.unu.edu/sc2r#> .

sc2r:Vandalism a owl:Class ;
rdfs:label "Vandalism"@en ;
rdfs:comment "Digital Vandalism occurs when individuals' digital resources, for example websites, are maliciously defaced or permanently damaged."@en ;
rdfs:subClassOf sc2r:IntegrityThreat .

Class: sc2r:Violation   back to top


Description
Violations occur when an individual breaks the stipulated and expected conditions in the use of cyber resources. These include violations of policies and contracts.

Inherits from (3):
sc2r:InstitutionalThreat | sc2r:EnvironmentalThreat | sc2r:Threat

Implementation:

@prefix owl: <http://www.w3.org/2002/07/owl#> .
@prefix rdfs: <http://www.w3.org/2000/01/rdf-schema#> .
@prefix sc2r: <http://cs.unu.edu/sc2r#> .

sc2r:Violation a owl:Class ;
rdfs:label "Violation"@en ;
rdfs:comment "Violations occur when an individual breaks the stipulated and expected conditions in the use of cyber resources. These include violations of policies and contracts."@en ;
rdfs:subClassOf sc2r:InstitutionalThreat .

Class: sc2r:Violence   back to top


NOTE sc2r:Violence is a leaf node.

Description
This is content of violent nature that may be inappropriate to individuals.

Inherits from (5):
sc2r:InappropriateContent | sc2r:Malinformation | sc2r:CognitiveThreat | sc2r:PersonalThreat | sc2r:Threat

Implementation:

@prefix owl: <http://www.w3.org/2002/07/owl#> .
@prefix rdfs: <http://www.w3.org/2000/01/rdf-schema#> .
@prefix sc2r: <http://cs.unu.edu/sc2r#> .

sc2r:Violence a owl:Class ;
rdfs:label "Voilent Content"@en ;
rdfs:comment "This is content of violent nature that may be inappropriate to individuals."@en ;
rdfs:subClassOf sc2r:InappropriateContent .

Class: sc2r:VirtualPrivateNetwork   back to top


NOTE sc2r:VirtualPrivateNetwork is a leaf node.

Description
A virtual private network is a networking measure that extends a private network over a public network, in a manner that ensures safety and security.

Inherits from (5):
sc2r:TrustedNetworking | sc2r:TrustedInfrastructure | sc2r:PreventionMeasure | sc2r:PrepareMeasure | sc2r:Response

Implementation:

@prefix owl: <http://www.w3.org/2002/07/owl#> .
@prefix rdfs: <http://www.w3.org/2000/01/rdf-schema#> .
@prefix sc2r: <http://cs.unu.edu/sc2r#> .

sc2r:VirtualPrivateNetwork a owl:Class ;
rdfs:label "Virtual Private Network" ;
rdfs:comment "A virtual private network is a networking measure that extends a private network over a public network, in a manner that ensures safety and security." ;
rdfs:subClassOf sc2r:TrustedNetworking .

Class: sc2r:Vishing   back to top


NOTE sc2r:Vishing is a leaf node.

Description
Vishing occurs when individuals receive a phone call that appears to be from a trusted source aiming to trick them to share sensitive information.

Inherits from (6):
sc2r:Phishing | sc2r:SocialEngineering | sc2r:InfluenceThreat | sc2r:CognitiveThreat | sc2r:PersonalThreat | sc2r:Threat

Implementation:

@prefix owl: <http://www.w3.org/2002/07/owl#> .
@prefix rdfs: <http://www.w3.org/2000/01/rdf-schema#> .
@prefix sc2r: <http://cs.unu.edu/sc2r#> .

sc2r:Vishing a owl:Class ;
rdfs:label "Vishing"@en ;
rdfs:comment "Vishing occurs when individuals receive a phone call that appears to be from a trusted source aiming to trick them to share sensitive information." ;
rdfs:subClassOf sc2r:Phishing .

Class: sc2r:Vulnerability   back to top


Description
A Vulnerability is a weakness of Cyber Resources, that can be exploited by a Threat.

Inherits from:
owl:Thing

Property Domain of:
sc2r:isAVulnerabilityOf | sc2r:isExploitedBy | sc2r:isReducedBy

Property Range of:
sc2r:exploits | sc2r:hasVulnerability | sc2r:reduces

Implementation:

@prefix owl: <http://www.w3.org/2002/07/owl#> .
@prefix rdfs: <http://www.w3.org/2000/01/rdf-schema#> .
@prefix sc2r: <http://cs.unu.edu/sc2r#> .

sc2r:Vulnerability a owl:Class ;
rdfs:label "Vulnerability"@en ;
rdfs:comment "A Vulnerability is a weakness of Cyber Resources, that can be exploited by a Threat."@en ;
rdfs:seeAlso "https://en.wikipedia.org/wiki/Vulnerability_(computing)"@en .

Class: sc2r:WebHygiene   back to top


Description
Web hygiene are measures and steps that individuals undertake to improve their cyber security and safety.

Inherits from (3):
sc2r:PreventionMeasure | sc2r:PrepareMeasure | sc2r:Response

Implementation:

@prefix owl: <http://www.w3.org/2002/07/owl#> .
@prefix rdfs: <http://www.w3.org/2000/01/rdf-schema#> .
@prefix sc2r: <http://cs.unu.edu/sc2r#> .

sc2r:WebHygiene a owl:Class ;
rdfs:label "Web Hygiene" ;
rdfs:comment "Web hygiene are measures and steps that individuals undertake to improve their cyber security and safety." ;
rdfs:subClassOf sc2r:PreventionMeasure .

Class: sc2r:Whaling   back to top


NOTE sc2r:Whaling is a leaf node.

Description
Whaling occurs when individuals receive fraudulent message from a perpetrator that masquarades as a senior or important individual at an organisation aiming to trick into sharing sensitive information.

Inherits from (7):
sc2r:SpearPhishing | sc2r:Phishing | sc2r:SocialEngineering | sc2r:InfluenceThreat | sc2r:CognitiveThreat | sc2r:PersonalThreat | sc2r:Threat

Implementation:

@prefix owl: <http://www.w3.org/2002/07/owl#> .
@prefix rdfs: <http://www.w3.org/2000/01/rdf-schema#> .
@prefix sc2r: <http://cs.unu.edu/sc2r#> .

sc2r:Whaling a owl:Class ;
rdfs:label "Whaling Phishing"@en ;
rdfs:comment "Whaling occurs when individuals receive fraudulent message from a perpetrator that masquarades as a senior or important individual at an organisation aiming to trick into sharing sensitive information." ;
rdfs:subClassOf sc2r:SpearPhishing .

Class: sc2r:WhatAboutism   back to top


NOTE sc2r:WhatAboutism is a leaf node.

Description
WhatAboutism is a disinformation techniques that involves distracting individuals from one issue to another.

Inherits from (5):
sc2r:MalignRhetoric | sc2r:Disinformation | sc2r:CognitiveThreat | sc2r:PersonalThreat | sc2r:Threat

Implementation:

@prefix owl: <http://www.w3.org/2002/07/owl#> .
@prefix rdfs: <http://www.w3.org/2000/01/rdf-schema#> .
@prefix sc2r: <http://cs.unu.edu/sc2r#> .

sc2r:WhatAboutism a owl:Class ;
rdfs:label "WhatAboutism"@en ;
rdfs:comment "WhatAboutism is a disinformation techniques that involves distracting individuals from one issue to another."@en ;
rdfs:subClassOf sc2r:MalignRhetoric .

Class: sc2r:WithstandMeasure   back to top


Description
Withstand measures aim to stand against and resist the adverse incidents to maintain a level of cyber funtioning.

Inherits from (2):
sc2r:AbsorbMeasure | sc2r:Response

Implementation:

@prefix owl: <http://www.w3.org/2002/07/owl#> .
@prefix rdfs: <http://www.w3.org/2000/01/rdf-schema#> .
@prefix sc2r: <http://cs.unu.edu/sc2r#> .

sc2r:WithstandMeasure a owl:Class ;
rdfs:label "Withstand Measure" ;
rdfs:comment "Withstand measures aim to stand against and resist the adverse incidents to maintain a level of cyber funtioning." ;
rdfs:subClassOf sc2r:AbsorbMeasure .

Class: sc2r:Worried   back to top


NOTE sc2r:Worried is a leaf node.

Description
Worried refers to the state in which the individual experiences mental distress or agitation resulting from concern usually for something impending or anticipated.

Inherits from (2):
sc2r:PsychologicalHarm | sc2r:Harm

Implementation:

@prefix owl: <http://www.w3.org/2002/07/owl#> .
@prefix rdfs: <http://www.w3.org/2000/01/rdf-schema#> .
@prefix sc2r: <http://cs.unu.edu/sc2r#> .

sc2r:Worried a owl:Class ;
rdfs:label "Worried" ;
rdfs:comment "Worried refers to the state in which the individual experiences mental distress or agitation resulting from concern usually for something impending or anticipated." ;
rdfs:subClassOf sc2r:PsychologicalHarm .

Class: sc2r:YouAreNotImmune   back to top


NOTE sc2r:YouAreNotImmune is a leaf node.

Description
This attitude emphasizes the fact that everyone is susceptible to adverse cyber incidents.

Inherits from (4):
sc2r:AttitudinalMeasure | sc2r:AnticipateMeasure | sc2r:PrepareMeasure | sc2r:Response

Implementation:

@prefix owl: <http://www.w3.org/2002/07/owl#> .
@prefix rdfs: <http://www.w3.org/2000/01/rdf-schema#> .
@prefix sc2r: <http://cs.unu.edu/sc2r#> .

sc2r:YouAreNotImmune a owl:Class ;
rdfs:label "You Are Not Immune" ;
rdfs:comment "This attitude emphasizes the fact that everyone is susceptible to adverse cyber incidents." ;
rdfs:subClassOf sc2r:AttitudinalMeasure .


 Object Properties

Object Property: sc2r:canBeResultOf   back to top


Description

Has sub-property (direct):
sc2r:isResultOf

Class Domain for:
sc2r:Harm

Class Range for:
sc2r:Threat

Implementation:

@prefix owl: <http://www.w3.org/2002/07/owl#> .
@prefix rdfs: <http://www.w3.org/2000/01/rdf-schema#> .
@prefix sc2r: <http://cs.unu.edu/sc2r#> .

sc2r:canBeResultOf a owl:ObjectProperty ;
rdfs:domain sc2r:Harm ;
rdfs:range sc2r:Threat ;
owl:inverseOf sc2r:canResultIn .

Object Property: sc2r:canResultIn   back to top


Description

Has sub-property (direct):
sc2r:resultsIn

Class Domain for:
sc2r:Threat

Class Range for:
sc2r:Harm

Implementation:

@prefix owl: <http://www.w3.org/2002/07/owl#> .
@prefix rdfs: <http://www.w3.org/2000/01/rdf-schema#> .
@prefix sc2r: <http://cs.unu.edu/sc2r#> .

sc2r:canResultIn a owl:ObjectProperty ;
rdfs:domain sc2r:Threat ;
rdfs:range sc2r:Harm .

Object Property: sc2r:damages   back to top


NOTE sc2r:damages is a leaf node.

Description

Class Domain for:
sc2r:Threat

Class Range for:
sc2r:Resource

Implementation:

@prefix owl: <http://www.w3.org/2002/07/owl#> .
@prefix rdfs: <http://www.w3.org/2000/01/rdf-schema#> .
@prefix sc2r: <http://cs.unu.edu/sc2r#> .

sc2r:damages a owl:ObjectProperty ;
rdfs:domain sc2r:Threat ;
rdfs:range sc2r:Resource ;
owl:inverseOf sc2r:isDamagedBy .

Object Property: sc2r:exploits   back to top


NOTE sc2r:exploits is a leaf node.

Description

Class Domain for:
sc2r:Threat

Class Range for:
sc2r:Vulnerability

Implementation:

@prefix owl: <http://www.w3.org/2002/07/owl#> .
@prefix rdfs: <http://www.w3.org/2000/01/rdf-schema#> .
@prefix sc2r: <http://cs.unu.edu/sc2r#> .

sc2r:exploits a owl:ObjectProperty ;
rdfs:domain sc2r:Threat ;
rdfs:range sc2r:Vulnerability ;
owl:inverseOf sc2r:isExploitedBy .

Object Property: sc2r:hasVulnerability   back to top


NOTE sc2r:hasVulnerability is a leaf node.

Description

Class Domain for:
sc2r:Resource

Class Range for:
sc2r:Vulnerability

Implementation:

@prefix owl: <http://www.w3.org/2002/07/owl#> .
@prefix rdfs: <http://www.w3.org/2000/01/rdf-schema#> .
@prefix sc2r: <http://cs.unu.edu/sc2r#> .

sc2r:hasVulnerability a owl:ObjectProperty ;
rdfs:domain sc2r:Resource ;
rdfs:range sc2r:Vulnerability ;
owl:inverseOf sc2r:isAVulnerabilityOf .

Object Property: sc2r:isAVulnerabilityOf   back to top


NOTE sc2r:isAVulnerabilityOf is a leaf node.

Description

Class Domain for:
sc2r:Vulnerability

Class Range for:
sc2r:Resource

Implementation:

@prefix owl: <http://www.w3.org/2002/07/owl#> .
@prefix rdfs: <http://www.w3.org/2000/01/rdf-schema#> .
@prefix sc2r: <http://cs.unu.edu/sc2r#> .

sc2r:isAVulnerabilityOf a owl:ObjectProperty ;
rdfs:domain sc2r:Vulnerability ;
rdfs:range sc2r:Resource .

Object Property: sc2r:isDamagedBy   back to top


NOTE sc2r:isDamagedBy is a leaf node.

Description

Class Domain for:
sc2r:Resource

Class Range for:
sc2r:Threat

Implementation:

@prefix owl: <http://www.w3.org/2002/07/owl#> .
@prefix rdfs: <http://www.w3.org/2000/01/rdf-schema#> .
@prefix sc2r: <http://cs.unu.edu/sc2r#> .

sc2r:isDamagedBy a owl:ObjectProperty ;
rdfs:domain sc2r:Resource ;
rdfs:range sc2r:Threat .

Object Property: sc2r:isExploitedBy   back to top


NOTE sc2r:isExploitedBy is a leaf node.

Description

Class Domain for:
sc2r:Vulnerability

Class Range for:
sc2r:Threat

Implementation:

@prefix owl: <http://www.w3.org/2002/07/owl#> .
@prefix rdfs: <http://www.w3.org/2000/01/rdf-schema#> .
@prefix sc2r: <http://cs.unu.edu/sc2r#> .

sc2r:isExploitedBy a owl:ObjectProperty ;
rdfs:domain sc2r:Vulnerability ;
rdfs:range sc2r:Threat .

Object Property: sc2r:isMitigatedBy   back to top


NOTE sc2r:isMitigatedBy is a leaf node.

Description

Class Domain for:
sc2r:Threat

Class Range for:
sc2r:Response

Implementation:

@prefix owl: <http://www.w3.org/2002/07/owl#> .
@prefix rdfs: <http://www.w3.org/2000/01/rdf-schema#> .
@prefix sc2r: <http://cs.unu.edu/sc2r#> .

sc2r:isMitigatedBy a owl:ObjectProperty ;
rdfs:domain sc2r:Threat ;
rdfs:range sc2r:Response ;
owl:inverseOf sc2r:mitigates .

Object Property: sc2r:isReducedBy   back to top


NOTE sc2r:isReducedBy is a leaf node.

Description

Class Domain for:
sc2r:Vulnerability

Class Range for:
sc2r:Response

Implementation:

@prefix owl: <http://www.w3.org/2002/07/owl#> .
@prefix rdfs: <http://www.w3.org/2000/01/rdf-schema#> .
@prefix sc2r: <http://cs.unu.edu/sc2r#> .

sc2r:isReducedBy a owl:ObjectProperty ;
rdfs:domain sc2r:Vulnerability ;
rdfs:range sc2r:Response ;
owl:inverseOf sc2r:reduces .

Object Property: sc2r:isResultOf   back to top


NOTE sc2r:isResultOf is a leaf node.

Description

Inherits from (1):
sc2r:canBeResultOf

Class Domain for:
sc2r:Harm

Class Range for:
sc2r:Threat

Implementation:

@prefix owl: <http://www.w3.org/2002/07/owl#> .
@prefix rdfs: <http://www.w3.org/2000/01/rdf-schema#> .
@prefix sc2r: <http://cs.unu.edu/sc2r#> .

sc2r:isResultOf a owl:ObjectProperty ;
rdfs:domain sc2r:Harm ;
rdfs:range sc2r:Threat ;
rdfs:subPropertyOf sc2r:canBeResultOf ;
owl:inverseOf sc2r:resultsIn .

Object Property: sc2r:mitigates   back to top


NOTE sc2r:mitigates is a leaf node.

Description

Class Domain for:
sc2r:Response

Class Range for:
sc2r:Threat

Implementation:

@prefix owl: <http://www.w3.org/2002/07/owl#> .
@prefix rdfs: <http://www.w3.org/2000/01/rdf-schema#> .
@prefix sc2r: <http://cs.unu.edu/sc2r#> .

sc2r:mitigates a owl:ObjectProperty ;
rdfs:domain sc2r:Response ;
rdfs:range sc2r:Threat .

Object Property: sc2r:reduces   back to top


NOTE sc2r:reduces is a leaf node.

Description

Class Domain for:
sc2r:Response

Class Range for:
sc2r:Vulnerability

Implementation:

@prefix owl: <http://www.w3.org/2002/07/owl#> .
@prefix rdfs: <http://www.w3.org/2000/01/rdf-schema#> .
@prefix sc2r: <http://cs.unu.edu/sc2r#> .

sc2r:reduces a owl:ObjectProperty ;
rdfs:domain sc2r:Response ;
rdfs:range sc2r:Vulnerability .

Object Property: sc2r:relatesTo   back to top


NOTE sc2r:relatesTo is a leaf node.

Description

Implementation:

@prefix owl: <http://www.w3.org/2002/07/owl#> .
@prefix sc2r: <http://cs.unu.edu/sc2r#> .

sc2r:relatesTo a owl:ObjectProperty,
owl:SymmetricProperty .

Object Property: sc2r:resultsIn   back to top


NOTE sc2r:resultsIn is a leaf node.

Description

Inherits from (1):
sc2r:canResultIn

Class Domain for:
sc2r:Threat

Class Range for:
sc2r:Harm

Implementation:

@prefix owl: <http://www.w3.org/2002/07/owl#> .
@prefix rdfs: <http://www.w3.org/2000/01/rdf-schema#> .
@prefix sc2r: <http://cs.unu.edu/sc2r#> .

sc2r:resultsIn a owl:ObjectProperty ;
rdfs:domain sc2r:Threat ;
rdfs:range sc2r:Harm ;
rdfs:subPropertyOf sc2r:canResultIn .


 Datatype Properties

Datatype Property: sc2r:hasDescription   back to top


NOTE sc2r:hasDescription is a leaf node.

Description

Class Domain for:
owl:Thing

Class Range for:
rdfs:Literal

Implementation:

@prefix owl: <http://www.w3.org/2002/07/owl#> .
@prefix rdfs: <http://www.w3.org/2000/01/rdf-schema#> .
@prefix sc2r: <http://cs.unu.edu/sc2r#> .

sc2r:hasDescription a owl:DatatypeProperty ;
rdfs:domain owl:Thing ;
rdfs:range rdfs:Literal .

Datatype Property: sc2r:hasID   back to top


NOTE sc2r:hasID is a leaf node.

Description

Implementation:

@prefix owl: <http://www.w3.org/2002/07/owl#> .
@prefix sc2r: <http://cs.unu.edu/sc2r#> .

sc2r:hasID a owl:DatatypeProperty .


 Annotation Properties

Annotation Property: dc:creator   back to top


NOTE dc:creator is a leaf node.

Description

Implementation:

@prefix dc: <http://purl.org/dc/elements/1.1/#> .
@prefix owl: <http://www.w3.org/2002/07/owl#> .

dc:creator a owl:AnnotationProperty .

Annotation Property: dc:description   back to top


NOTE dc:description is a leaf node.

Description

Implementation:

@prefix dc: <http://purl.org/dc/elements/1.1/#> .
@prefix owl: <http://www.w3.org/2002/07/owl#> .

dc:description a owl:AnnotationProperty .

Annotation Property: dc:rights   back to top


NOTE dc:rights is a leaf node.

Description

Implementation:

@prefix dc: <http://purl.org/dc/elements/1.1/#> .
@prefix owl: <http://www.w3.org/2002/07/owl#> .

dc:rights a owl:AnnotationProperty .

Annotation Property: dc1:creator   back to top


NOTE dc1:creator is a leaf node.

Description

Implementation:

@prefix dc1: <http://purl.org/dc/elements/1.1/> .
@prefix owl: <http://www.w3.org/2002/07/owl#> .

dc1:creator a owl:AnnotationProperty .

Annotation Property: dc1:description   back to top


NOTE dc1:description is a leaf node.

Description

Implementation:

@prefix dc1: <http://purl.org/dc/elements/1.1/> .
@prefix owl: <http://www.w3.org/2002/07/owl#> .

dc1:description a owl:AnnotationProperty .

Annotation Property: dc1:rights   back to top


NOTE dc1:rights is a leaf node.

Description

Implementation:

@prefix dc1: <http://purl.org/dc/elements/1.1/> .
@prefix owl: <http://www.w3.org/2002/07/owl#> .

dc1:rights a owl:AnnotationProperty .


Ontology documentation automatically generated by Ontospy on 25th August 2020 12:18