made by pyLODE 2.8.3

Smart Citizen Cyber Resilience Ontology

Metadata

URI
http://cs.unu.edu/sc2r
Version Information
0.1
Ontology RDF
RDF (xml)

Description

The Smart Citizen Cyber Resilience Ontology (SC2RO) maps the cyber resilience landscape for individuals. It identifies cyber resources, vulnerabilities, threats, responses and harms associated with and specific to individual citizen's cyber functionings.

Table of Contents

  1. Classes
  2. Object Properties
  3. Datatype Properties
  4. Annotation Properties
  5. Namespaces
  6. Legend

Overview

SC2RO Overview

Classes

Absorb Measurec

URI http://cs.unu.edu/sc2r#AbsorbMeasure
Description

Responses are framed around four resilience phases of Prepare, Absorb, Recover, and Adapt.

The Absorb phase is triggered by the occurrence of an adverse cyber event, which diminishes and degrades individuals’ overall core cyber functioning (i.e., harmful impact). The effectiveness of the Absorb measures adopted in this phase determines the extent of the impact of the adverse incident.

Super-classes sc2r:Responsec
Sub-classes sc2r:WithstandMeasurec
sc2r:Reportingc
sc2r:EngageMeasurec

Abuse Threatc

URI http://cs.unu.edu/sc2r#Abuse
Description

Abuse threats emanate from the harmful treatment of individuals online.

Super-classes sc2r:PersonalThreatc
Sub-classes sc2r:SexualAbusec
sc2r:Trollingc
sc2r:UnsolicitedCommunicationc
sc2r:CyberStalkingc
sc2r:CyberPredatorc
sc2r:Flamingc
sc2r:InformationFloodingc
sc2r:Cyberbullyingc

Abused Harmc

URI http://cs.unu.edu/sc2r#Abused
Description

Abused Harm refers to misuse of physical or digital assets.

Super-classes sc2r:PhysicalHarmc

Access Controlc

URI http://cs.unu.edu/sc2r#AccessControl
Description

Access control is the prevention measure that involves controlling and authorizing access to cyber resources.

Super-classes sc2r:PreventionMeasurec
Sub-classes sc2r:LeastPrivilegec
sc2r:Firewallc
sc2r:Sandboxingc
sc2r:PhysicalRestrictionc

Account Hijackingc

URI http://cs.unu.edu/sc2r#AccountHijacking
Description

This is the process where an individuals account is hijacked or stolen by someone else.

Super-classes sc2r:AuthenticationThreatc

Account Recoveryc

URI http://cs.unu.edu/sc2r#AccountRecovery
Description

Account recovery measures involve restoring access and control of an account after an adverse cyber incident.

Super-classes sc2r:RecoverMeasurec

Active Mediationc

URI http://cs.unu.edu/sc2r#ActiveMediation
Description

Active Mediation involves awareness-raising and discussion with potential victims of adverse cyber incidents.

Super-classes sc2r:MediationMeasuresc

Activity Datac

URI http://cs.unu.edu/sc2r#ActivityData
Description

Activity Data is the record of any user action (online or in the physical world) that can be logged on a computer.

Super-classes sc2r:PersonalDatac

Adapt Measurec

URI http://cs.unu.edu/sc2r#AdaptMeasure
Description

Responses are framed around four resilience phases of Prepare, Absorb, Recover, and Adapt.

Once baseline cyber functioning has been restored, the Adapt phase can commence and Adapt measures can be put in the place, using the learnings and experience from the adverse event to inform the evolution and increase in cyber functioning and to “bounce forward better”

Super-classes sc2r:Responsec
Sub-classes sc2r:Evolvec
sc2r:CapacityBuildingc

Addictionc

URI http://cs.unu.edu/sc2r#Addiction
Description

Addiction refers to the excessive, compulsive, non-productive use of the Internet by an individual desperately relying on it to occupy free time for recreation or social purposes.

Super-classes sc2r:PsychologicalHarmc

Agencyc

URI http://cs.unu.edu/sc2r#Agency
Description

Agency is the ability to define one’s goals and act upon them.

Super-classes sc2r:IndividualResourcec
Sub-classes sc2r:MentalFacultiesc

Alternative Resource Measurec

URI http://cs.unu.edu/sc2r#AlternativeResource
Description

This measure involves engaging alternative complementary cyber resources to deal with incidents that have deminished cyber functioning of primary resources.

For example, in cases of data corruption, the redundant backups of the data would be utilized. In cases where a computing device is damaged, an alternative device would be utilized.

Super-classes sc2r:WithstandMeasurec

Angler Phishingc

URI http://cs.unu.edu/sc2r#AnglerPhishing
Description

Angler Phishing occurs when individuals receive a message from a social media account masquerading as a corporate's customer support account that tricks them into handing over their sensitive information.

Super-classes sc2r:Phishingc

Anonymity Threatc

URI http://cs.unu.edu/sc2r#AnonymityThreat
Description

Anonimity Threat occurs when individuals' preference to remain anonymous or unnoticed online is threatened.

Super-classes sc2r:PrivacyThreatc

Anonymous Routingc

URI http://cs.unu.edu/sc2r#AnonymousRouting
Description

Anonymous routing is the use of computing networks in a way that protects communication from identification by third-party observers.

Super-classes sc2r:TrustedNetworkingc

Anticipate Measurec

URI http://cs.unu.edu/sc2r#AnticipateMeasure
Description

Anticipate Measures are put in place by an individual to prepare for and anticipate the inevitability of adverse cyber incidents.

Super-classes sc2r:PrepareMeasurec
Sub-classes sc2r:Awarenessc
sc2r:AttitudinalMeasurec
sc2r:Trainingc
sc2r:RecoveryPlanc
sc2r:RedundancyMeasurec

Right to Assemblyc

URI http://cs.unu.edu/sc2r#Assembly
Description

The Rght to Assemble (freedom of association) is individual's right to gather and meet, both publicly and privately.

Super-classes sc2r:Rightc

Asset Inventory Managementc

URI http://cs.unu.edu/sc2r#AssetInventory
Description

Asset Inventory Management involves maintaining a list of cyber resources and assets that individuals have access to.

Super-classes sc2r:Awarenessc

Attitudinal Measurec

URI http://cs.unu.edu/sc2r#AttitudinalMeasure
Description

Attitudinal Measures are attitudes that individuals can adopt in the context of preparing and planning for adverse cyber incidents.

Super-classes sc2r:AnticipateMeasurec
Sub-classes sc2r:BeVigilantc
sc2r:BeSuspiciousc
sc2r:BeCriticalc
sc2r:YouAreNotImmunec

Authentication Threatc

URI http://cs.unu.edu/sc2r#AuthenticationThreat
Description

Authentication threats compromise the Authentication cyber security goal.

Super-classes sc2r:TechnologicalThreatc
Sub-classes sc2r:Masqueradingc
sc2r:Fabricationc
sc2r:AccountHijackingc
sc2r:Spoofingc
sc2r:UnauthorizedAccessc

Availability Threatc

URI http://cs.unu.edu/sc2r#AvailabilityThreat
Description

Availability Threats compromise the Availability cyber security goal.

Super-classes sc2r:TechnologicalThreatc
Sub-classes sc2r:DenialOfServicec
sc2r:Disruptionc
sc2r:Ransomwarec
sc2r:LostDevicesc
sc2r:LostCredentialsc

Awarenessc

URI http://cs.unu.edu/sc2r#Awareness
Description

Awareness measures enhance the ability of individuals to comprehend their cybersecurity landscape.

Super-classes sc2r:AnticipateMeasurec
Sub-classes sc2r:AssetInventoryc
sc2r:DigitalFootprintc

Baitingc

URI http://cs.unu.edu/sc2r#Baiting
Description

Baiting occurs when individuals are tricked into handing their login credentials to the perpetrator who leverages the offer of free items or goods.

Super-classes sc2r:SocialEngineeringc

Bandwagon Effectc

URI http://cs.unu.edu/sc2r#BandwagonEffect
Description

Bandwagon Effect (contagion effect) refers to the creation of the illusion of group consensus to cause people to think or act in the same way as the group does.

Super-classes sc2r:PsychographicHackingc

Be Criticalc

URI http://cs.unu.edu/sc2r#BeCritical
Description

This attitude emphasizes the need to be critical in online engagements.

For example being critical with regard to news and content consumed online.

Super-classes sc2r:AttitudinalMeasurec

Be Suspiciousc

URI http://cs.unu.edu/sc2r#BeSuspicious
Description

This attitude emphasizes the importance of being suspicious online.

For example, being suspicious of unsolicited communication.

Super-classes sc2r:AttitudinalMeasurec

Be Vigilantc

URI http://cs.unu.edu/sc2r#BeVigilant
Description

This attitude emphasizes the need to be vigilant online.

Super-classes sc2r:AttitudinalMeasurec

Behavioral Datac

URI http://cs.unu.edu/sc2r#BehaviouralData
Description

Behavioural Data refers to data collected from individuals' online activities, typically commercial behaviour using a range of devices connected to the Internet. Behavioural data tracks the sites visited, the apps downloaded, or the games played.

Super-classes sc2r:PersonalDatac

Biometric Tokenc

URI http://cs.unu.edu/sc2r#BiometricToken
Description

Biometric Token is a biometric-based security token that is used for authentication or verification purpose.

Super-classes sc2r:Credentialc

Black Propagandac

URI http://cs.unu.edu/sc2r#BlackPropaganda
Description

Where white propaganda clearly states its source and grey propaganda obscures its origins, black propaganda actively deceives about its origins.

Super-classes sc2r:SocialHackingc

Blacklistedc

URI http://cs.unu.edu/sc2r#Blacklisted
Description

Blacklisted refers to the state in which the individual is regarded as unacceptable or untrustworthy and should be excluded or avoided.

Super-classes sc2r:ReputationalHarmc

Bodily Injuryc

URI http://cs.unu.edu/sc2r#BodilyInjury
Description

Bodily Injury refers to the wound caused to individual's body.

Super-classes sc2r:PhysicalHarmc
Sub-classes sc2r:Painc
sc2r:SelfHarmc

Boyfriending and Girlfriendingc

URI http://cs.unu.edu/sc2r#BoyfriendingGirlfriending
Description

Boyfriending/girlfriending occurs when individuals are manipulated into thinking that they are in a relationship with the perpetrator.

Super-classes sc2r:SexualAbusec

Capacity-buildingc

URI http://cs.unu.edu/sc2r#CapacityBuilding
Description

The capacity-building measures involve increasing the level of nominal cyber functioning of individuals.

Super-classes sc2r:AdaptMeasurec

Catphishingc

URI http://cs.unu.edu/sc2r#Catphishing
Description

Catphishing occurs when individuals are targeted by the perpetrator who creates a fictitious online profile to seduce them into a fictitious online relationship in order to benefit from them. The perpetrator often uses social media or dating sites to get to their target.

Super-classes sc2r:Phishingc

Censorshipc

URI http://cs.unu.edu/sc2r#Censorship
Description

Censorship occurs when individuals are suppressed or constrained by institutions from achieving specific cyber functionings - including consuming and producing information, accessing content, software, or media.

Super-classes sc2r:InstitutionalThreatc

Cheerleadingc

URI http://cs.unu.edu/sc2r#Cheerleading
Description

Using information influence techniques to crowd out dissent.

Super-classes sc2r:SocialHackingc

Coercionc

URI http://cs.unu.edu/sc2r#Coercion
Description

Coercion occurs when individuals are persuaded by threats or force to do something.

Super-classes sc2r:InfluenceThreatc

Cognitive Impairementc

URI http://cs.unu.edu/sc2r#CognitiveImpairement
Description

Cognitive Impairment refers to the state in which the individual has trouble remembering, learning new things, concentrating, or making decisions that affect their everyday life.

Super-classes sc2r:PsychologicalHarmc

Cognitive Threatc

URI http://cs.unu.edu/sc2r#CognitiveThreat
Description

Cognitive and Influece Threats are adverse incidents that compromise or affect individuals cognitive functioning. They include efforts to influence the perceptions, behaviour, and decisions of individuals for the benefit of others.

Super-classes sc2r:PersonalThreatc
Sub-classes sc2r:Malinformationc
sc2r:Disinformationc
sc2r:Misinformationc
sc2r:InfluenceThreatc
sc2r:DigitalHoardingc

Compensation Paymentc

URI http://cs.unu.edu/sc2r#CompensationPayment
Description

Compensation Payment is the costs that the individual has to pay as compensation to those affected by the incident.

Super-classes sc2r:EconomicHarmc

Compromisedc

URI http://cs.unu.edu/sc2r#Compromised
Description

Comprised is the state in which the resources are physically or digitally affected.

Super-classes sc2r:PhysicalHarmc

Computerc

URI http://cs.unu.edu/sc2r#Computer
Description

Computer is an electronic device that can store, retrieve, and process data.

Super-classes sc2r:ComputingAssetc

Computing Assetc

URI http://cs.unu.edu/sc2r#ComputingAsset
Description

Computing Asset is any asset that utilises computing processes.

Super-classes sc2r:PhysicalResourcec
Sub-classes sc2r:Computerc
sc2r:MobileDevicec
sc2r:Laptopc
sc2r:Serverc

Confidentiality Threatc

URI http://cs.unu.edu/sc2r#ConfidentialityThreat
Description

Confidentiality Threats compromise the Confidentiality cybersecurity goal.

Super-classes sc2r:TechnologicalThreatc
Sub-classes sc2r:Doxingc
sc2r:Skimmingc
sc2r:DataLeakc
sc2r:DataBreachc
sc2r:Interceptionc
sc2r:InadvertentDisclosurec
sc2r:Reconnaissancec

Conflictc

URI http://cs.unu.edu/sc2r#Conflict
Description

Conflict refers to an active disagreement between the individual with those with opposing opinions or principles.

Super-classes sc2r:SocialHarmc

Confront the Threatc

URI http://cs.unu.edu/sc2r#ConfrontThreat
Description

Confronting the threat is an engage response that involves directly confronting the cyber threat. For examples, in the case of socio-technical threats, this involves direct engagement with the threat actors.

Super-classes sc2r:EngageMeasurec

Confusionc

URI http://cs.unu.edu/sc2r#Confusion
Description

Confusion refers to the state in which individuals being bewildered, uncertain, or unclear about something.

Super-classes sc2r:PsychologicalHarmc
Sub-classes sc2r:Misledc

Conscientiousnessc

URI http://cs.unu.edu/sc2r#Conscientiousness
Description

Conscientiousness refers to individual's ability to control, regulate, and direct their impulses.

Super-classes sc2r:Individualc

Breach of Contractc

URI http://cs.unu.edu/sc2r#ContractBreach
Description

A contract breach occurs when individuals break conditions of a contract in the course of utilizing cyber resources.

Super-classes sc2r:Violationc

Corruptedc

URI http://cs.unu.edu/sc2r#Corrupted
Description

Corrupted is the state where the resources are being physically or digitally debased or their integrity affected.

Super-classes sc2r:PhysicalHarmc

Credentialc

URI http://cs.unu.edu/sc2r#Credential
Description

A Credential is the tool for authentication or verification. A credential may be part of a certificate or other authentication process that helps confirm a user’s identity in relation to a network address or other system ID.

Super-classes sc2r:IdentifyingDatac
Sub-classes sc2r:DataTokenc
sc2r:PhysicalTokenc
sc2r:BiometricTokenc

Curiosityc

URI http://cs.unu.edu/sc2r#Curiosity
Description

Curiosity is the desire to learn or know about anything.

Super-classes sc2r:Individualc

Cyber Predatorc

URI http://cs.unu.edu/sc2r#CyberPredator
Description

Cyber Predator refers to those who use the Internet to exploit others, usually young people, for emotional, sexual, and other purposes.

Super-classes sc2r:Abusec

Cyber Stalkingc

URI http://cs.unu.edu/sc2r#CyberStalking
Description

Cyber Stalking occurs to individuals when they are being stalked online or through the use of digital technology. Motives for cyber stalking may be to control or intimidate the victim, or to gather information for use in other crimes.

Super-classes sc2r:Abusec

Cyberbullyingc

URI http://cs.unu.edu/sc2r#Cyberbullying
Description

Cyberbullying occurs when individuals are bullied, harassed, humiliated, threatened, embarrased, or targeted through the use of online communication methods.

Super-classes sc2r:Abusec

Crypto Currencyc

URI http://cs.unu.edu/sc2r#CyptoCurrency
Description

A Cryptocurrency is a digital or virtual currency that is secured by cryptography.

Super-classes sc2r:Filec

Damagec

URI http://cs.unu.edu/sc2r#Damage
Description

These are damages to cyber resources, including data, software, and hard, that compromise the integrity and proper functioning of the resources.

Super-classes sc2r:IntegrityThreatc

Damaged Relationshipc

URI http://cs.unu.edu/sc2r#DamagedRelationship
Description

Damaged Relationship refers to an adverse change in relationship between the individuals with other people.

Super-classes sc2r:SocialHarmc

Damaged Social Perceptionc

URI http://cs.unu.edu/sc2r#DamagedSocialPerception
Description

Damaged Social Perception refers to an adverse change in how the individual is regarded within their social network.

Super-classes sc2r:ReputationalHarmc

Dark Advertisingc

URI http://cs.unu.edu/sc2r#DarkAdvertising
Description

Dark Advertising is a type of advertising where the message can only be seen by the advertiser and the specific target group. Other people with dissimilar interests or who fall outside of the target group will usually be completely unaware of their existence.

Super-classes sc2r:PsychographicHackingc

Datac

URI http://cs.unu.edu/sc2r#Data
Description

Data is information that has been translated into a form that is efficient for movement or processing.

Super-classes sc2r:DigitalResourcec
Sub-classes sc2r:Filec
sc2r:PersonalDatac

Data Breachc

URI http://cs.unu.edu/sc2r#DataBreach
Description

A data breach occurs when there is unauthorized access to data as a result of an attacker exploiting data systems which host individuals' confidential data. The source of data breaches is external.

Super-classes sc2r:ConfidentialityThreatc

Data Corruptionc

URI http://cs.unu.edu/sc2r#DataCorruption
Description

Data Corruption occurs when there are errors to data which compromise the integrity of the data.

Super-classes sc2r:IntegrityThreatc

Data Errorc

URI http://cs.unu.edu/sc2r#DataError
Description

These are data errors that compromise the integrity of data.

Super-classes sc2r:IntegrityThreatc

Data Leakc

URI http://cs.unu.edu/sc2r#DataLeak
Description

A data leak occurs when confidential information is made accessible to unauthorized individuals a a result of an internal factor.

Super-classes sc2r:ConfidentialityThreatc

Data Recoveryc

URI http://cs.unu.edu/sc2r#DataRecovery
Description

Data recovery measures involve the recovery of data resources, from data backups, to enable continued use of data after an adverse cyber incident, such as data corruption and loss.

Super-classes sc2r:RecoverMeasurec

Data Redundancyc

URI http://cs.unu.edu/sc2r#DataRedundancy
Description

Data redundancy measure involves having data backups and redundant data storage.

Super-classes sc2r:RedundancyMeasurec

Data Tokenc

URI http://cs.unu.edu/sc2r#DataToken
Description

Data Token is tokenized data access that is used to secure access to data.

Super-classes sc2r:Credentialc

Data Vulnerabilityc

URI http://cs.unu.edu/sc2r#DataVulnerability
Description

Data Vulnerabilities are the weaknesses associated with data.

Super-classes sc2r:Digitalc

Deceitc

URI http://cs.unu.edu/sc2r#Deceit
Description

Threat of deceptive content and information

Super-classes sc2r:Disinformationc
Sub-classes sc2r:PotemkinVillageEvidencec
sc2r:Shillingc
sc2r:Forgingc

Demographic Informationc

URI http://cs.unu.edu/sc2r#DemographicInformation
Description

Demographic Information is information about groups of people according to certain attributes, such as age, gender, place of residence, and socio-economic status.

Super-classes sc2r:PersonalDatac

Denial of Servicec

URI http://cs.unu.edu/sc2r#DenialOfService
Description

A Denial of Service occurs when attackers maliciously restrict and limit access to information and services from legitimate users.

Super-classes sc2r:AvailabilityThreatc

Depressedc

URI http://cs.unu.edu/sc2r#Depressed
Description

Depressed is the state in which the individual experiences low-spiritedness, unhappiness, or despondency.

Super-classes sc2r:PsychologicalHarmc

Destroyedc

URI http://cs.unu.edu/sc2r#Destroyed
Description

Destroyed refers to the state in which the resources being physically or digitally ruined.

Super-classes sc2r:PhysicalHarmc

Device Identificationc

URI http://cs.unu.edu/sc2r#DeviceIdentification
Description

Device authentication is the process is verifying the identity of the devices that are used to connect to network resources.

Super-classes sc2r:Identificationc

Diffusion of Responsibilityc

URI http://cs.unu.edu/sc2r#DiffusionOfResponsibility
Description

Diffusion of Responsibility is a psychological phenomenon in which individuals are less likely to take action or responsibility when in the presence of a large group of people.

Super-classes sc2r:Individualc

Digital Vulnerabilityc

URI http://cs.unu.edu/sc2r#Digital
Description

Digital Vulnerabilities are weaknesses associated with digital resources.

Super-classes sc2r:Vulnerabilityc
Sub-classes sc2r:DataVulnerabilityc
sc2r:NetworkVulnerabilityc
sc2r:SoftwareVulnerabilityc

Digital Footprint Managementc

URI http://cs.unu.edu/sc2r#DigitalFootprint
Description

Digital Footprint Management involves understanding the digital resources, including the trail of data, that is involved and used in individuals Cyber functionings.

Super-classes sc2r:Awarenessc

Digital Hoardingc

URI http://cs.unu.edu/sc2r#DigitalHoarding
Description

Digital hoarding (also known as e-hoarding, datahording or cyberhoarding) is excessive acquisition and reluctance to delete electronic material no longer valuable to the user.

Super-classes sc2r:CognitiveThreatc

Digital Resourcec

URI http://cs.unu.edu/sc2r#DigitalResource
Description

Digital resources are resources that have been conceived and created digitally or by converting analogue materials to a digital format (digitised).

Super-classes sc2r:Resourcec
Sub-classes sc2r:Softwarec
sc2r:Datac

Discomfortc

URI http://cs.unu.edu/sc2r#Discomfort
Description

Discomfort is the state in which the individual experiences uneasiness or anxiety.

Super-classes sc2r:PsychologicalHarmc

Disconnect Measurec

URI http://cs.unu.edu/sc2r#DisconnectMeasure
Description

The Disconnect measure involves removal of connection and interaction between the threat and the affected cyber resource. While the threat remains, the affected resource is removed from the attack situation.

For example, in the case of a Remote Execution attack or Denial of Service attack, this could include physical disconnection of affected devices from the network. In the case of socio-technical threats, such as cyberbullying, it could include disconnecting from the relevant platform.

Super-classes sc2r:EngageMeasurec

Disempowermentc

URI http://cs.unu.edu/sc2r#Disempowerment
Description

Disempowerment is the state in which the individual feels weak, ineffectual, not confident, or unimportant.

Super-classes sc2r:PsychologicalHarmc

Disinformationc

URI http://cs.unu.edu/sc2r#Disinformation
Description

Disinformation is false or misleading information that is spread deliberately to cause harm. This is a subset of misinformation, which may also be unintentional.

Super-classes sc2r:CognitiveThreatc
Sub-classes sc2r:Propagandac
sc2r:EngineeredContentc
sc2r:Deceitc
sc2r:FakeNewsc
sc2r:OpposingInformationc
sc2r:MalignRhetoricc
sc2r:InfluenceOperationc

Disrupted Incomec

URI http://cs.unu.edu/sc2r#DisruptedIncome
Description

Disrupted Income refers to the suspension of individual's income flow as a result of cyber threats.

Super-classes sc2r:EconomicHarmc

Disrupted Workc

URI http://cs.unu.edu/sc2r#DisruptedWork
Description

Disrupted Work refers to the suspension of work as a result of the cyber threats.

Super-classes sc2r:EconomicHarmc

Disruptionc

URI http://cs.unu.edu/sc2r#Disruption
Description

Disruption occurs when individuals' access to information and resources is disrupted.

Super-classes sc2r:AvailabilityThreatc

Distractionc

URI http://cs.unu.edu/sc2r#Distraction
Description

Distraction is the state in which the individual experiences extreme agitation of the mind or emotions that prevents them from giving full attention to something else.

Super-classes sc2r:PsychologicalHarmc

Doxingc

URI http://cs.unu.edu/sc2r#Doxing
Description

Doxing is when private and confidential information about individuals is researched and published online with malicious intent.

Super-classes sc2r:ConfidentialityThreatc

Eavesdroppingc

URI http://cs.unu.edu/sc2r#Eavesdropping
Description

Eavesdropping occurs when attackers secretly and stealthly gain access to private and confidential communication without the consent of and the authorization from the communicating parties.

Super-classes sc2r:Interceptionc

Economic Harmc

URI http://cs.unu.edu/sc2r#EconomicHarm
Description

Economic Harm is the harm that relates to negative financial or economic consequences.

Super-classes sc2r:Harmc
Sub-classes sc2r:MitigationCostc
sc2r:ExtorsionPaymentc
sc2r:TimeWastedc
sc2r:CompensationPaymentc
sc2r:TheftOfFinancesc
sc2r:Finec
sc2r:DisruptedIncomec
sc2r:LossOfWorkc
sc2r:ScamCostc
sc2r:DisruptedWorkc

Electricityc

URI http://cs.unu.edu/sc2r#Electricity
Description

Electricity is the flow of electrical power or charge that is used to power the infrastructures supporting our cyber functionings.

Super-classes sc2r:InfrastructureResourcec

Email Hygienec

URI http://cs.unu.edu/sc2r#EmailHygiene
Description

Email hygiene are measures and practices that contribute to safe and secure use of email.

Super-classes sc2r:WebHygienec

Embarrassedc

URI http://cs.unu.edu/sc2r#Embarrassed
Description

Embarrassed is the state in which the individual feels humiliated or shameful.

Super-classes sc2r:PsychologicalHarmc

Engage Measurec

URI http://cs.unu.edu/sc2r#EngageMeasure
Description

Engage measures involve direct handling of and engagement with the adverse cyber incident.

Super-classes sc2r:AbsorbMeasurec
Sub-classes sc2r:ConfrontThreatc
sc2r:IsolateMeasurec
sc2r:DisconnectMeasurec
sc2r:RemovalMeasurec

Engineered Contentc

URI http://cs.unu.edu/sc2r#EngineeredContent
Description

Engineered content is broadly information that is produced for specific influence and cognitive disinformation objectives.

Super-classes sc2r:Disinformationc

Environmental Threatc

URI http://cs.unu.edu/sc2r#EnvironmentalThreat
Description

Environmental Threats emanate from individuals' wider environmental and institutional context.

Super-classes sc2r:Threatc
Sub-classes sc2r:InstitutionalThreatc
sc2r:NaturalDisasterc

Evolve Measurec

URI http://cs.unu.edu/sc2r#Evolve
Description

The evolve measure involves an adaptation in the use of cyber resource through the adoption of complementary resources that enable higher nominal cyber functioning.

Super-classes sc2r:AdaptMeasurec

Exposedc

URI http://cs.unu.edu/sc2r#Exposed
Description

Exposed is the state in which the resources are physically or digitally disclosed.

Super-classes sc2r:PhysicalHarmc

Right to Expressionc

URI http://cs.unu.edu/sc2r#Expression
Description

The Right to Expression (freedom of expression) is individual's right to express their beliefs, thoughts, ideas, and emotions about different issues.

Super-classes sc2r:Rightc

External Hard Drivec

URI http://cs.unu.edu/sc2r#ExternalHardDrive
Description

External Hard Drive is a portable storage device located outside of a computer that is connected through a USB cable or wireless connection.

Super-classes sc2r:StorageAssetc

External Supportc

URI http://cs.unu.edu/sc2r#ExternalSupport
Description

External support involves receiving external input and support towards recovering and restoring cyber functioning.

Super-classes sc2r:RecoverMeasurec
Sub-classes sc2r:ProfessionalSupportc
sc2r:SocialSupportc

Extorsion Paymentc

URI http://cs.unu.edu/sc2r#ExtorsionPayment
Description

Extorsion Payment refers to the costs that the individual has to pay to continue their cyber functioning (e.g. after ransom-related incidents).

Super-classes sc2r:EconomicHarmc

Extortionc

URI http://cs.unu.edu/sc2r#Extortion
Description

Extortion refers to the use of threat or intimidation by a perpetrator to gain something from the target.

Super-classes sc2r:InfluenceThreatc

Fabricationc

URI http://cs.unu.edu/sc2r#Fabrication
Description

Fabrication refers to an attack where illegitimate information is generated under the pretence of a false identity.

Super-classes sc2r:AuthenticationThreatc

Fact-checkingc

URI http://cs.unu.edu/sc2r#Fact-checking
Description

Fact-checking involves establishing the truth and validating the facts behind a specific adverse incident.

In the case of socio-technical threats such as misinformation attacks, fact-checking involves establishing the veracity of the information consumed. In the case of technical threat, it would involve understanding and documenting the experience of an adverse incident.

Super-classes sc2r:RecoverMeasurec

Failure Detectionc

URI http://cs.unu.edu/sc2r#FailureDetection
Description

Failure detection is the monitoring measure that involves checking for the failure in the operation of specific cyber resources.

Super-classes sc2r:ThreatMonitoringMeasurec

Fake Giveawaysc

URI http://cs.unu.edu/sc2r#FakeGiveways
Description

Fake Giveaway scam occurs when individuals are promised a prize in exchange for doing something beforehand, such as paying a fee.

Super-classes sc2r:Scamc

Fake Newsc

URI http://cs.unu.edu/sc2r#FakeNews
Description

Fake News is news that include deliberate disinformation content.

Super-classes sc2r:Disinformationc

Fearc

URI http://cs.unu.edu/sc2r#Fear
Description

Fear is an emotion caused by anxiety or the uneasiness of being afraid of something or someone.

Super-classes sc2r:Individualc

Feeling Upsetc

URI http://cs.unu.edu/sc2r#FeelingUpset
Description

Feeling Upset is the state in which the individual feels unhappy, disappointed, or worried.

Super-classes sc2r:PsychologicalHarmc

File Resourcec

URI http://cs.unu.edu/sc2r#File
Description

A File is an object on a computer that stores data, information, settings, or commands used with a computer program.

Super-classes sc2r:Datac
Sub-classes sc2r:CyptoCurrencyc

Financial Datac

URI http://cs.unu.edu/sc2r#FinancialData
Description

Financial Data is data on individual's assets, liabilities, equity, income, expenses, and cash flow.

Super-classes sc2r:IdentifyingDatac

Fine Paymentc

URI http://cs.unu.edu/sc2r#Fine
Description

Fine Payment refers to the fine that the individual is liable to pay.

Super-classes sc2r:EconomicHarmc

Firehosingc

URI http://cs.unu.edu/sc2r#Firehosing
Description

Firehosing (firehose of falsehood) is a technique in which a large number of messages are broadcast rapidly, repetitively, and continuously over multiple channels without regard for truth or consistency. While Gish Gallop usually refers to a single online encounter, firehosing involves a strategy of massive disinformation over time and in multiple venues.

Super-classes sc2r:MalignRhetoricc

Firewallc

URI http://cs.unu.edu/sc2r#Firewall
Description

Firewall is a mechanism for allowing and denying access to specific network resources.

Super-classes sc2r:AccessControlc

Flamingc

URI http://cs.unu.edu/sc2r#Flaming
Description

Flaming is the online act of posting insults, often laced with profanity or other offensive language on social networking sites.

Super-classes sc2r:Abusec

Floodingc

URI http://cs.unu.edu/sc2r#Flooding
Description

Flooding involves the generation of fraudulent messages to increase traffic on the network for consuming server’s or network’s resources.

Super-classes sc2r:SocialHackingc

Forgingc

URI http://cs.unu.edu/sc2r#Forging
Description

Forging is the illegitimate dissemination of falsified evidence.

Super-classes sc2r:Deceitc

Fraudc

URI http://cs.unu.edu/sc2r#Fraud
Description

Online Fraud is a type of deception or fraud scheme that uses the Internet and digital communications technology to provide fraudulent solicitations to prospective targets to conduct fraudulent transactions, or to transmit the proceeds of fraud to those connected with the scheme. Online fraud may include identity theft, non-delivery payment, and online advertising fraud.

Super-classes sc2r:TheftThreatc

Frustrationc

URI http://cs.unu.edu/sc2r#Frustration
Description

Frustration is the state in which the individual feels upset or annoyed, especially because of inability to change or achieve something.

Super-classes sc2r:PsychologicalHarmc

Gish Gallopingc

URI http://cs.unu.edu/sc2r#GishGalloping
Description

Gish Galloping is a rhetorical tactic used to flood individuals with as many arguments as possible (without regard for accuracy or strength of the argument) in a way that make them feel overwhelmed. Gish galloping usually refers to a single online encounter, for example in an online debate setting.

Super-classes sc2r:MalignRhetoricc

Gluttonyc

URI http://cs.unu.edu/sc2r#Gluttony
Description

Gluttony refers to over-indulgence in being online.

Super-classes sc2r:PsychologicalHarmc

Greedc

URI http://cs.unu.edu/sc2r#Greed
Description

Greed is an overwhelming urge to have more of something, usually more than needed.

Super-classes sc2r:Individualc

Groomingc

URI http://cs.unu.edu/sc2r#Grooming
Description

Grooming occurs when the pepetrator uses tactics to gain the target's trust and to develop a relationship with the target by giving complimenets, attention, affection, or gifts.

Super-classes sc2r:SexualAbusec

Guiltc

URI http://cs.unu.edu/sc2r#Guilt
Description

Guilt is a feeling of worry or unhappiness that an individual has because they have done something wrong or bad.

Super-classes sc2r:Individualc

Guiltyc

URI http://cs.unu.edu/sc2r#Guilty
Description

Guilty refers to the state in which the individual feels regretful or remorse.

Super-classes sc2r:PsychologicalHarmc

HardwareVulnerabilityc

URI http://cs.unu.edu/sc2r#HardwareVulnerability
Description

Hardware Vulnerability

Super-classes sc2r:Physicalc

Harmc

URI http://cs.unu.edu/sc2r#Harm
Description

A Harm, also called Impact, is the negative consequences of unmitigated Threats

Sub-classes sc2r:SocialHarmc
sc2r:PhysicalHarmc
sc2r:PsychologicalHarmc
sc2r:EconomicHarmc
sc2r:ReputationalHarmc
In domain of sc2r:isResultOfop
sc2r:canBeResultOfop
In range of sc2r:canResultInop
sc2r:resultsInop

Helpfulnessc

URI http://cs.unu.edu/sc2r#Helpfulness
Description

Helpfulness is the quality of being ready to give help.

Super-classes sc2r:Individualc

Humor and Memec

URI http://cs.unu.edu/sc2r#HumorAndMeme
Description

Humor and Memes that are employed to influence individuals and shape narratives.

Super-classes sc2r:InfluenceOperationc

Identificationc

URI http://cs.unu.edu/sc2r#Identification
Description

Identification is a prevention measure that involves confirming claimed identity online.

Super-classes sc2r:PreventionMeasurec
Sub-classes sc2r:UserIdentificationc
sc2r:MultiFactorAuthenticationc
sc2r:MutualAuthenticationc
sc2r:DeviceIdentificationc
sc2r:PasswordManagementc

Identifying Datac

URI http://cs.unu.edu/sc2r#IdentifyingData
Description

Identifying Data includes all kinds of data that can be used to identify an individual and their personal information.

Super-classes sc2r:PersonalDatac
Sub-classes sc2r:Credentialc
sc2r:FinancialDatac

Identityc

URI http://cs.unu.edu/sc2r#Identity
Description

Identity consists of individual personal attributes, such as gender, race, ethnicity, abilities, and socio-economic status.

Super-classes sc2r:IndividualResourcec

Identity Theftc

URI http://cs.unu.edu/sc2r#IdentityTheft
Description

Identity theft is the deliberate use of someone else's identity, usually as a method to gain a financial advantage or obtain credit and other benefits in the other person's name, and perhaps to the other person's disadvantage or loss.

Super-classes sc2r:TheftThreatc

Identity Theft Harmc

URI http://cs.unu.edu/sc2r#IdentityTheftLoss
Description

Identity Theft Loss refers to the state in which the individual's personal information is stolen.

Super-classes sc2r:PsychologicalHarmc

Impaired Private Social Boundaryc

URI http://cs.unu.edu/sc2r#ImpairedPrivateSocialBoundary
Description

Impaired Private Social Boundary refers to the state in which the boundary between the individual's private and social affairs is no longer clear.

Super-classes sc2r:SocialHarmc

Impulsivenessc

URI http://cs.unu.edu/sc2r#Impulsiveness
Description

Impulsiveness (or impulsivity) refers to a tendency to act on a whim, displaying behaviour characterised by little or no forethought, reflection, or consideration of the consequences.

Super-classes sc2r:Individualc

Inadvertent Information Disclosurec

URI http://cs.unu.edu/sc2r#InadvertentDisclosure
Description

Inadvertent information disclosure occurs when individuals disclose private and confidential information inadvertently.

Super-classes sc2r:ConfidentialityThreatc

Inappropriate Contentc

URI http://cs.unu.edu/sc2r#InappropriateContent
Description

Inappropriate information is content that causes harm to individuals who consume it.

Super-classes sc2r:Malinformationc
Sub-classes sc2r:Profanityc
sc2r:Violencec
sc2r:Pornographyc
sc2r:OffensiveLanguagec

Incident Reportingc

URI http://cs.unu.edu/sc2r#IncidentReporting
Description

Incident reporting is the formal documentation and reporting of adverse cyber incidents that are experienced by individuals.

Super-classes sc2r:Reportingc

Increase Resource Measurec

URI http://cs.unu.edu/sc2r#IncreaseResources
Description

This measure involves increasing resources that are allocated towards maintaining the desired level of cyber functioning and supplementing the affected resources.

For example, in cases where the adverse cyber incident deminished the quality of functioning of specific cyber resources, this measure would involve adding more resources (e.g., computing resources) to enable continue desired functioning.

Super-classes sc2r:WithstandMeasurec

Individual and Personal Vulnerabilityc

URI http://cs.unu.edu/sc2r#Individual
Description

Individual and Personal Vulnerabilities are situations and attributes of individuals that not only expose them to threats, but also that can be exploited and compromised by specific threats.

Super-classes sc2r:Vulnerabilityc
Sub-classes sc2r:Impulsivenessc
sc2r:Fearc
sc2r:Sympathyc
sc2r:DiffusionOfResponsibilityc
sc2r:Greedc
sc2r:Guiltc
sc2r:Curiosityc
sc2r:Urgencyc
sc2r:Conscientiousnessc
sc2r:Helpfulnessc

Individual Personal Resourcec

URI http://cs.unu.edu/sc2r#IndividualResource
Description

Individual resources are a combination of natural endowments and what is acquired through social relationships.

Super-classes sc2r:Resourcec
Sub-classes sc2r:Identityc
sc2r:Rightc
sc2r:Agencyc
sc2r:SocialCapitalc

Infectedc

URI http://cs.unu.edu/sc2r#Infected
Description

Infected is the state in which the resources are physically or digitally contaminated.

Super-classes sc2r:PhysicalHarmc

Influence Operationc

URI http://cs.unu.edu/sc2r#InfluenceOperation
Description

Influence Operations are efforts to influence the perceptions, behaviour, and decisions of individuals for the benefit of others.

Super-classes sc2r:Disinformationc
Sub-classes sc2r:HumorAndMemec
sc2r:Satirec
sc2r:Parodyc

Influence Threatc

URI http://cs.unu.edu/sc2r#InfluenceThreat
Description

Influence Threat is any threat that is intended to influence individual's perceptions and prejudices.

Super-classes sc2r:CognitiveThreatc
Sub-classes sc2r:PsychographicHackingc
sc2r:Coercionc
sc2r:Extortionc
sc2r:SocialEngineeringc
sc2r:Scarewarec
sc2r:InformationOverloadc

Right to Informationc

URI http://cs.unu.edu/sc2r#Information
Description

The Right to Information is individual's right to access personal and non-personal information held by government.

Super-classes sc2r:Rightc

Information Floodingc

URI http://cs.unu.edu/sc2r#InformationFlooding
Description

Information Flooding occurs when individuals are exposed to too much information and data.

Super-classes sc2r:Abusec

Information Overloadc

URI http://cs.unu.edu/sc2r#InformationOverload
Description

Information Overload (information anxiety; information explosion) occurs when individuals are exposed to too much information and data that makes it difficult for them to understand an issue and effectively make decisions.

Super-classes sc2r:InfluenceThreatc

Right to Information Privacyc

URI http://cs.unu.edu/sc2r#InformationalPrivacy
Description

Informational Privacy is individual's right to determine for themselves when, how, and to what extend information about them is communicated to others.

Super-classes sc2r:Privacyc

Infrastructure Resourcec

URI http://cs.unu.edu/sc2r#InfrastructureResource
Description

Infrastructure resources are physical and virtual resources that support the internet-enabled flow, storage, processing, and analysis of data.

Super-classes sc2r:Resourcec
Sub-classes sc2r:InternetConnectivityc
sc2r:Electricityc

Institutional Threatc

URI http://cs.unu.edu/sc2r#InstitutionalThreat
Description

Institution Threats are adverse cyber incidents that are associated with institutions within individuals' context.

Super-classes sc2r:EnvironmentalThreatc
Sub-classes sc2r:Surveillancec
sc2r:Censorshipc
sc2r:Violationc

Integrity Threatc

URI http://cs.unu.edu/sc2r#IntegrityThreat
Description

Integrity Threats compromise the Integrity cybersecurity goal.

Super-classes sc2r:TechnologicalThreatc
Sub-classes sc2r:Misconfigurationc
sc2r:Malwarec
sc2r:Replayc
sc2r:DataErrorc
sc2r:Damagec
sc2r:RemoteExecutionc
sc2r:Malfunctionc
sc2r:Vandalismc
sc2r:DataCorruptionc

Interceptionc

URI http://cs.unu.edu/sc2r#Interception
Description

Interception occurs when unauthorized access is gained to private or confidential information.

Super-classes sc2r:ConfidentialityThreatc
Sub-classes sc2r:Eavesdroppingc

Internet Connectivityc

URI http://cs.unu.edu/sc2r#InternetConnectivity
Description

Internet Connectivity refers to the way people are connected to the Internet, and may include dial-up telephone lines, always-on broadband connections, and wireless devices.

Super-classes sc2r:InfrastructureResourcec

Intimacy Threatc

URI http://cs.unu.edu/sc2r#IntimacyThreat
Description

Intimacy Threat occurs when individuals' preference to be alone with their significant others in their intimate online environments is threatened.

Super-classes sc2r:PrivacyThreatc

Intrusion Detectionc

URI http://cs.unu.edu/sc2r#IntrusionDetection
Description

Intrusion detection involves monitoring and checking for unauthorized access to cyber resources including networking resources.

Super-classes sc2r:ThreatMonitoringMeasurec

Isolate Measurec

URI http://cs.unu.edu/sc2r#IsolateMeasure
Description

The isolate measure involves isolating the affected cyber resources from the connection with the threat.

While related to Disconnect measures, isolation measures involve the continual operation of the cyber resources in an isolated context.

Super-classes sc2r:EngageMeasurec

Isolationc

URI http://cs.unu.edu/sc2r#Isolation
Description

Isolation refers to the individual's act of completely separating themselves from others.

Super-classes sc2r:SocialHarmc

Knowledge Resourcec

URI http://cs.unu.edu/sc2r#Knowledge
Description

Knowledge is familiarity with, awareness, or understanding of various objects, events, ideas, or ways of doing things which is acquired through experience or education.

Super-classes sc2r:MentalFacultiesc

Laptopc

URI http://cs.unu.edu/sc2r#Laptop
Description

A Laptop is a portable computer.

Super-classes sc2r:ComputingAssetc

Launderingc

URI http://cs.unu.edu/sc2r#Laundering
Description

Laundering is a combination of several techniques, such as tainted leaks, fake news, and potemkin village to create the appearance of legitimate and significant controversy where there is none.

Super-classes sc2r:SocialHackingc

Least Privilegec

URI http://cs.unu.edu/sc2r#LeastPrivilege
Description

Least privilege is the principle and mechanism of giving the minimum required privileges necessary for performing specific functions.

Super-classes sc2r:AccessControlc

Location Datac

URI http://cs.unu.edu/sc2r#LocationData
Description

Location data is geographial information about a specific device's whereabouts associated to a time identifier.

Super-classes sc2r:PersonalDatac

Logging and Auditc

URI http://cs.unu.edu/sc2r#LoggingAndAudit
Description

Logging and audit is a monitoring measure that involves keeping a record of relevant cyber activities, events, as well as states and operations of cyber resources.

Super-classes sc2r:MonitoringMeasurec

Loss of Confidencec

URI http://cs.unu.edu/sc2r#LossOfConfidence
Description

Loss of Confidence refers to the state in which the individual experiences a lack of courage or certainty.

Super-classes sc2r:PsychologicalHarmc

Loss of Lifec

URI http://cs.unu.edu/sc2r#LossOfLife
Description

Loss of Life refers to the passing of the individual as the result of realised impacts of cyber threats.

Super-classes sc2r:PhysicalHarmc

Loss of Workc

URI http://cs.unu.edu/sc2r#LossOfWork
Description

Loss of Work refers to the situation in which the individual loses their job as the impact of the cyber threats of which they are the victim.

Super-classes sc2r:EconomicHarmc

Lost Credentialsc

URI http://cs.unu.edu/sc2r#LostCredentials
Description

Lost Credentials is when access to information and services is not possible due to lost account creditials.

Super-classes sc2r:AvailabilityThreatc

Lost Devicesc

URI http://cs.unu.edu/sc2r#LostDevices
Description

This is a loss of computing devices that results in lack of access to the associated information and services.

Super-classes sc2r:AvailabilityThreatc

Love Bombingc

URI http://cs.unu.edu/sc2r#LoveBombing
Description

Love Bombing occurs when the perpetrator gives the target an abundance of compliments and affection to gain their love and trust.

Super-classes sc2r:SexualAbusec

Low Moralec

URI http://cs.unu.edu/sc2r#LowMorale
Description

Low Morale refers to the state in which the individual's general confidence, enthusiasm, mood, and discipline is negatively impacted.

Super-classes sc2r:PsychologicalHarmc

Low Satisfactionc

URI http://cs.unu.edu/sc2r#LowSatisfaction
Description

Low Satisfaction refers to the state in which the individual experiences a lack of contentment.

Super-classes sc2r:PsychologicalHarmc

Luring Sexual Threatc

URI http://cs.unu.edu/sc2r#Luring
Description

Luring occurs when the perpetrator uses online communication to contact the target who they think is under 18, in order to make it easier for them to commit a sexual offence against them.

Super-classes sc2r:SexualAbusec

Malfunctionc

URI http://cs.unu.edu/sc2r#Malfunction
Description

Malfunctions occurs when systems do not function as they are supposed to. This can be due to malicious factors or human errors.

Super-classes sc2r:IntegrityThreatc

Malicious Contact Removalc

URI http://cs.unu.edu/sc2r#MaliciousContactRemoval
Description

This measures involves the removal and elimination of contact with an individual who is a threat actor.

Super-classes sc2r:RemovalMeasurec

Malicious Content Removalc

URI http://cs.unu.edu/sc2r#MaliciousContentRemoval
Description

This measures involves the removal and elimination of content that is a cause of a cyber threat.

Super-classes sc2r:RemovalMeasurec

Malicious Software Detectionc

URI http://cs.unu.edu/sc2r#MaliciousSoftwareDetection
Description

Malicious software detection involves scanning computing equipment to check for the presence of malicious software.

Super-classes sc2r:ThreatMonitoringMeasurec

Malicious Software Removalc

URI http://cs.unu.edu/sc2r#MaliciousSoftwareRemoval
Description

This measures involves the removal and elimination of software, usually malware, that is a source of a cyber threat.

Super-classes sc2r:RemovalMeasurec

Malign Rhetoricc

URI http://cs.unu.edu/sc2r#MalignRhetoric
Description

Malign Rhetoric is an influence effort that aims to subvert and undermine specific narratives and views that individuals might hold.

Super-classes sc2r:Disinformationc
Sub-classes sc2r:WhatAboutismc
sc2r:Strawmanc
sc2r:Transferc
sc2r:GishGallopingc
sc2r:Firehosingc

Malinformationc

URI http://cs.unu.edu/sc2r#Malinformation
Description

Malinformation occurs when individuals are exposed to content and information that is based on reality but taken out of context with malicious intent to inflict harm.

Super-classes sc2r:CognitiveThreatc
Sub-classes sc2r:InappropriateContentc

Malwarec

URI http://cs.unu.edu/sc2r#Malware
Description

Malware is software that is created for malicious purposes to compromise and damage individuals' cyber resources.

Super-classes sc2r:IntegrityThreatc

Masqueradingc

URI http://cs.unu.edu/sc2r#Masquerading
Description

Masquerading is an attack where false identity is used to gain access to unauthorized information. The attacker pretends to be and masquerades as the victim.

Super-classes sc2r:AuthenticationThreatc

Mediation Measuresc

URI http://cs.unu.edu/sc2r#MediationMeasures
Description

Mediation measures are measures that are put in place for other individuals to limit the impact of adverse cyber incidents.

For example, guardians and parents can put in place mediation measures that limit the negative outcomes of online gaming.

Super-classes sc2r:PrepareMeasurec
Sub-classes sc2r:ActiveMediationc
sc2r:RestrictiveMediationc
sc2r:TechnicalMediationc

Mental Facultiesc

URI http://cs.unu.edu/sc2r#MentalFaculties
Description

Mental Faculties are the various functions of the mind, or things the mind can "do". Mental faculties comprise cognitive, affective, and conative skills that are crucial to human’s conscious experience and decision-making process.

Super-classes sc2r:Agencyc
Sub-classes sc2r:Motivationc
sc2r:Knowledgec
sc2r:Skillsc

Microtargetingc

URI http://cs.unu.edu/sc2r#Microtargeting
Description

Microtargeting (or niche-tageting) occurs when individuals are targeted by marketing content that is personalised to attract the attention of the members of the sub-group the individuals are segmented in, to influence their actions.

Super-classes sc2r:PsychographicHackingc

Misconfigurationc

URI http://cs.unu.edu/sc2r#Misconfiguration
Description

Misconfiguration occurs when systems have been configured in a way that compromise their functioning and integrity. Misconfiguration exposes resources to vulnerabilities that can be avoided through better configuration.

Super-classes sc2r:IntegrityThreatc

Misinformationc

URI http://cs.unu.edu/sc2r#Misinformation
Description

Misinformation is false or inaccurate information. Examples of misinformation include false rumours, or insults and pranks, while examples of more deliberate disinformation include malicious content such as hoaxes, spearphishing, andd computational propaganda.

Super-classes sc2r:CognitiveThreatc
Sub-classes sc2r:MisleadingInformationc

Misleading Advertisingc

URI http://cs.unu.edu/sc2r#MisleadingAdvertising
Description

This is advertising content that is meant to mislead consumers.

Super-classes sc2r:MisleadingInformationc

Misleading Informationc

URI http://cs.unu.edu/sc2r#MisleadingInformation
Description

Misleading Information is content that is meant to mislead or misinform.

Super-classes sc2r:Misinformationc
Sub-classes sc2r:MisleadingAdvertisingc

Misledc

URI http://cs.unu.edu/sc2r#Misled
Description

Misled is the state in which the individual is led to believe something that is not true.

Super-classes sc2r:Confusionc

Mistreatmentc

URI http://cs.unu.edu/sc2r#Mistreatment
Description

Mistreatment refers to the state in which the individual feels mistreated.

Super-classes sc2r:PsychologicalHarmc

Mitigation Costc

URI http://cs.unu.edu/sc2r#MitigationCost
Description

Mitigation Cost refers to the costs, charges, fees, or payment incurred in taking action that is intended to mitigate the severity of harms that would occur if the cyber threat is realised.

Super-classes sc2r:EconomicHarmc

Mobile Devicec

URI http://cs.unu.edu/sc2r#MobileDevice
Description

Mobile Device is any portable computing device, such as a smartphone or tablet computer.

Super-classes sc2r:ComputingAssetc

Monitoring Measurec

URI http://cs.unu.edu/sc2r#MonitoringMeasure
Description

Monitoring measure involves observing and checking the state of individual cyber functions as well as the operation of relevant cyber resources.

Super-classes sc2r:PrepareMeasurec
Sub-classes sc2r:LoggingAndAuditc
sc2r:ThreatMonitoringMeasurec

Motivationc

URI http://cs.unu.edu/sc2r#Motivation
Description

Motivation is the internal needs, desires, wants or drives of individuals.

Super-classes sc2r:MentalFacultiesc

Multifactor Authenticationc

URI http://cs.unu.edu/sc2r#MultiFactorAuthentication
Description

Multi-factor authentication is the process of using multiple authentication methods to verify claimed identity.

Super-classes sc2r:Identificationc

Mutual Authenticationc

URI http://cs.unu.edu/sc2r#MutualAuthentication
Description

Mutual authentication is a process of two-way authentication between the communicating entities.

Super-classes sc2r:Identificationc

Natural Disaster Threatc

URI http://cs.unu.edu/sc2r#NaturalDisaster
Description

Natural disasters affect the cyber resources that support individuals' cyber functionings.

Super-classes sc2r:EnvironmentalThreatc

Negative Perceptionc

URI http://cs.unu.edu/sc2r#NegativePerception
Description

Negative Perception refers to the state in which the individual experiences an adverse change in their perception about something.

Super-classes sc2r:PsychologicalHarmc

Network Equipmentc

URI http://cs.unu.edu/sc2r#NetworkEquipment
Description

Network Equipment (networking hardware; networking device) comprises electronic devices which are required for communication and interaction between devices on a computer network.

Super-classes sc2r:PhysicalResourcec

Network Intrusionc

URI http://cs.unu.edu/sc2r#NetworkIntrusion
Description

Network intrusion occurs when there is unauthorized access to a digital network.

Super-classes sc2r:UnauthorizedAccessc

Network Redundancyc

URI http://cs.unu.edu/sc2r#NetworkRedundancy
Description

Network redundancy involves having redundant network connectivity to allow for alternative connection to the internet in cases where the primary connectivity is negatively affected by adverse cyber incidents.

Super-classes sc2r:RedundancyMeasurec

Network Vulnerabilityc

URI http://cs.unu.edu/sc2r#NetworkVulnerability
Description

Network Vulnerabilities are weaknesses in the network resources.

Super-classes sc2r:Digitalc

Non-repudiation Threatc

URI http://cs.unu.edu/sc2r#NonRepudiationThreat
Description

Non-repudiation Threats compromise the non-repudiation cybersecurity goal.

Super-classes sc2r:TechnologicalThreatc

Offensive Languagec

URI http://cs.unu.edu/sc2r#OffensiveLanguage
Description

This is information and content that uses language that is offensive to individuals under specific contexts.

Super-classes sc2r:InappropriateContentc

Online Servicec

URI http://cs.unu.edu/sc2r#OnlineServices
Description

An Online Service refers to any information and services provided over the Internet.

Super-classes sc2r:Softwarec

Right to Opinionc

URI http://cs.unu.edu/sc2r#Opinion
Description

The Right to Opinion (freedom of opinion) is individual's right to hold opinions without interference, and cannot be subject to any exception or restriction.

Super-classes sc2r:Rightc

Opposing Informationc

URI http://cs.unu.edu/sc2r#OpposingInformation
Description

This is part of disinformation and influence campaign in which content is distributed to counter specific narratives and perspectives.

Super-classes sc2r:Disinformationc

Overwhelmedc

URI http://cs.unu.edu/sc2r#Overwhelmed
Description

Overwhelmed refers to the state in which the individual feels completely submerged by their thoughts and emotions to the point where they lack efficacy and feel frozen or paralysed.

Super-classes sc2r:PsychologicalHarmc

Bodily Painc

URI http://cs.unu.edu/sc2r#Pain
Description

Pain refers to the experience of agony of the individual.

Super-classes sc2r:BodilyInjuryc

Parasocial Hackingc

URI http://cs.unu.edu/sc2r#ParasocialHacking
Description

Parasocial Hacking exploits the biases arising from individual's parasocial relationships.

Super-classes sc2r:SocialHackingc

Parodyc

URI http://cs.unu.edu/sc2r#Parody
Description

Parody used in the context of an influence campaign to shape narratives and influence individuals.

Super-classes sc2r:InfluenceOperationc

Password Managementc

URI http://cs.unu.edu/sc2r#PasswordManagement
Description

Password management is the use of password of authentication in a safe and secure manner.

Super-classes sc2r:Identificationc

Persistence Sexual Threatc

URI http://cs.unu.edu/sc2r#Persistence
Description

Persistence occurs when someone keeps asking for something, even when the victim repeatedly says “no.”

Super-classes sc2r:SexualAbusec

Personal Datac

URI http://cs.unu.edu/sc2r#PersonalData
Description

Personal data is any data relating to an identified or identifiable natural person (‘data subject’).

Super-classes sc2r:Datac
Sub-classes sc2r:SocialContactc
sc2r:IdentifyingDatac
sc2r:ActivityDatac
sc2r:LocationDatac
sc2r:DemographicInformationc
sc2r:BehaviouralDatac
sc2r:UserGeneratedContentc

Individual and Personal Threatc

URI http://cs.unu.edu/sc2r#PersonalThreat
Description

Personal Threats are associated with individuals' personal attributes and endowments. They include cognitive and influence threats, as well as privacy and identity threats.

Super-classes sc2r:Threatc
Sub-classes sc2r:TheftThreatc
sc2r:Abusec
sc2r:CognitiveThreatc
sc2r:PrivacyThreatc

Phishingc

URI http://cs.unu.edu/sc2r#Phishing
Description

Phishing is a broader term for any attempt to trick individuals to share sensitive information, such as passwords, usernames, and credit card details for malicious reasons using a message sent via email, text, phone call, or direct-chat message that appears to be from a trusted source.

Super-classes sc2r:SocialEngineeringc
Sub-classes sc2r:SpearPhishingc
sc2r:AnglerPhishingc
sc2r:Smishingc
sc2r:Catphishingc
sc2r:Vishingc

Physical Vulnerabilityc

URI http://cs.unu.edu/sc2r#Physical
Description

Physical Vulnerabilities are weaknesses associated with the materiality of cyber resources that individuals own.

Super-classes sc2r:Vulnerabilityc
Sub-classes sc2r:HardwareVulnerabilityc

Physical Harmc

URI http://cs.unu.edu/sc2r#PhysicalHarm
Description

Physical harm is the negative effect on physical or digital resources.

Super-classes sc2r:Harmc
Sub-classes sc2r:Corruptedc
sc2r:Exposedc
sc2r:Abusedc
sc2r:Destroyedc
sc2r:ReducedPerformancec
sc2r:Theftc
sc2r:Infectedc
sc2r:BodilyInjuryc
sc2r:LossOfLifec
sc2r:Compromisedc
sc2r:Unavailablec

Right to Physical Privacyc

URI http://cs.unu.edu/sc2r#PhysicalPrivacy
Description

Physical Privacy is individual's right to determine the degree of their physical inaccessibility to others and to prevent intrusion into their physical place or solitude.

Super-classes sc2r:Privacyc

Physical Resourcec

URI http://cs.unu.edu/sc2r#PhysicalResource
Description

Physical resources are technological resources in material form.

Super-classes sc2r:Resourcec
Sub-classes sc2r:NetworkEquipmentc
sc2r:StorageAssetc
sc2r:ComputingAssetc

Physical Restrictionc

URI http://cs.unu.edu/sc2r#PhysicalRestriction
Description

This is the measure for restricting and limiting access to physical resources.

Super-classes sc2r:AccessControlc

Physical Tokenc

URI http://cs.unu.edu/sc2r#PhysicalToken
Description

Physical Token (hardware token) is a security token that is in the form of hardware device that the user carries to authorise access to a network service.

Super-classes sc2r:Credentialc

Piggybackingc

URI http://cs.unu.edu/sc2r#Piggybacking
Description

Piggybacking is when individuals gain unauthorized free access to a network. Piggybacking is usually not for malicious intent besides gaining free access to a network.

Super-classes sc2r:UnauthorizedAccessc

Point and Shriekc

URI http://cs.unu.edu/sc2r#PointAndShriek
Description

Exploiting existing sensitivities, such as using misleading evidence to depict a military attack as having taking place at a place of worship to influence opinion.

Super-classes sc2r:SocialHackingc

Polarizationc

URI http://cs.unu.edu/sc2r#Polarization
Description

Influence techniques can be applied to discredit moderate views and force narratives to focus on extreme positions.

Super-classes sc2r:SocialHackingc

Pornographyc

URI http://cs.unu.edu/sc2r#Pornography
Description

Pornography is visual content depicting sexual subject matter that may be inappropriate to individuals.

Super-classes sc2r:InappropriateContentc

Potemkin Village Evidencec

URI http://cs.unu.edu/sc2r#PotemkinVillageEvidence
Description

Potemkin villages of evidence refer to the attempt to set up intricate institutional networks that are controlled and used by actors as a fact-producing apparatus for the promotion and amplification of specific narratives. Potemkin villages can, for instance, consist of an array of illegitimate or fake research, (online) journals, NGOs or thinktanks that produce studies, working papers, conferences, etc. to present the respective narrative as a product of careful scholarly consideration.

Super-classes sc2r:Deceitc

Prepare Measurec

URI http://cs.unu.edu/sc2r#PrepareMeasure
Description

Responses are framed around four resilience phases of Prepare, Absorb, Recover, and Adapt.

The Prepare phase represents the baseline level of individuals’ cyber functioning during which Prepare measures are undertaken for facilitating responses in the subsequent phases.

Super-classes sc2r:Responsec
Sub-classes sc2r:MediationMeasuresc
sc2r:AnticipateMeasurec
sc2r:PreventionMeasurec
sc2r:MonitoringMeasurec

Pretextingc

URI http://cs.unu.edu/sc2r#Pretexting
Description

Pretexting occurs when individuals are targeted by an attempt to trick them into handing sensitive data or login credentials to the perpetrator who uses a good pretext or fabricated scenario to build a false sense of trust.

Super-classes sc2r:SocialEngineeringc

Prevention Measurec

URI http://cs.unu.edu/sc2r#PreventionMeasure
Description

Prevention measures are put in place to limit and stop the occurance of specific cyber threats.

Super-classes sc2r:PrepareMeasurec
Sub-classes sc2r:TrustedDatac
sc2r:TrustedSoftwarec
sc2r:TrustedInformationc
sc2r:WebHygienec
sc2r:AccessControlc
sc2r:TrustedInfrastructurec
sc2r:Identificationc

Right to Privacyc

URI http://cs.unu.edu/sc2r#Privacy
Description

The Right to Privacy is individual's right to be free from intrusion into or publicity concerning matters of a personal nature.

Super-classes sc2r:Rightc
Sub-classes sc2r:InformationalPrivacyc
sc2r:SocialPrivacyc
sc2r:TerritorialPrivacyc
sc2r:PsychologicalPrivacyc
sc2r:PhysicalPrivacyc

Privacy Threatc

URI http://cs.unu.edu/sc2r#PrivacyThreat
Description

Privacy Threat is an adverse cyber incident that negatively impacts and violates individuals' various dimensions of privacy.

Super-classes sc2r:PersonalThreatc
Sub-classes sc2r:SolitudeThreatc
sc2r:AnonymityThreatc
sc2r:IntimacyThreatc
sc2r:ReserveThreatc

Profanityc

URI http://cs.unu.edu/sc2r#Profanity
Description

This is information and content that uses language that is offensive to individuals under specific contexts.

Super-classes sc2r:InappropriateContentc

Professional Supportc

URI http://cs.unu.edu/sc2r#ProfessionalSupport
Description

This is receiving professional input to assist in dealing with an adverse incident and recovering the lost cyber functioning.

Super-classes sc2r:ExternalSupportc

Propagandac

URI http://cs.unu.edu/sc2r#Propaganda
Description

Propaganda is information that is used to promote and advance a specific political perspective or point of view.

Super-classes sc2r:Disinformationc

Prosecutionc

URI http://cs.unu.edu/sc2r#Prosecution
Description

Prosecution refers the state in which the individual feels prosecuted, tried, or wrongly convicted.

Super-classes sc2r:PsychologicalHarmc

Psychographic Hackingc

URI http://cs.unu.edu/sc2r#PsychographicHacking
Description

Psychographic Hacking refers to the covert targeting and influencing of individuals using messages created to appeal to precisely identified groups or individuals based on their psychographic profiles.

Super-classes sc2r:InfluenceThreatc
Sub-classes sc2r:BandwagonEffectc
sc2r:DarkAdvertisingc
sc2r:Microtargetingc

Psychological Harmc

URI http://cs.unu.edu/sc2r#PsychologicalHarm
Description

Psychological harm is the harm which focuses on an individual and their mental well-being and psyche.

Super-classes sc2r:Harmc
Sub-classes sc2r:FeelingUpsetc
sc2r:Frustrationc
sc2r:IdentityTheftLossc
sc2r:NegativePerceptionc
sc2r:Addictionc
sc2r:Disempowermentc
sc2r:Worriedc
sc2r:Guiltyc
sc2r:LowSatisfactionc
sc2r:Confusionc
sc2r:CognitiveImpairementc
sc2r:Discomfortc
sc2r:Shamefulc
sc2r:Distractionc
sc2r:Embarrassedc
sc2r:SelfCensorshipc
sc2r:Mistreatmentc
sc2r:Overwhelmedc
sc2r:LossOfConfidencec
sc2r:Gluttonyc
sc2r:Depressedc
sc2r:Prosecutionc
sc2r:LowMoralec

Right to Psychological Privacyc

URI http://cs.unu.edu/sc2r#PsychologicalPrivacy
Description

Psychological Privacy is individual's right to control cognitive and affective inputs and outputs, to form values, and to determine with whom and under what circumstances their thoughts will be shared or intimate information revealed.

Super-classes sc2r:Privacyc

Quid Pro Quoc

URI http://cs.unu.edu/sc2r#QuidProQuo
Description

Quid Pro Quo occurs when individuals are targeted by an attempt to trick them into handing their login credentials to the perpetrator who leverages the offer of free services.

Super-classes sc2r:SocialEngineeringc

Radicalisationc

URI http://cs.unu.edu/sc2r#Radicalisation
Description

Radicalisation refers to the state in which the individual adopts increasingly radical views in opposition to a political, social, or religious status quo.

Super-classes sc2r:SocialHarmc

Raidingc

URI http://cs.unu.edu/sc2r#Raiding
Description

Rapid and coordinated influence attacks.

Super-classes sc2r:SocialHackingc

Ransomwarec

URI http://cs.unu.edu/sc2r#Ransomware
Description

Ransomware is malicious software that limits or restricts access to information and services with a demand for a ransom fee to be paid.

Super-classes sc2r:AvailabilityThreatc

Reconnaissancec

URI http://cs.unu.edu/sc2r#Reconnaissance
Description

Reconnaissance occurs when an attacker engages in both passive and active collection of information that can be used to execute an attack on individuals' cyber resources.

Super-classes sc2r:ConfidentialityThreatc

Recover Measurec

URI http://cs.unu.edu/sc2r#RecoverMeasure
Description

Responses are framed around four resilience phases of Prepare, Absorb, Recover, and Adapt.

The Recover phase starts from the moment the adverse incident stops or is halted, and when restoration of lost cyber functioning begins. Timely and effective recover measures are necessary to reduce the compounded negative impacts of disrupted cyber functioning.

Super-classes sc2r:Responsec
Sub-classes sc2r:ExternalSupportc
sc2r:DataRecoveryc
sc2r:Fact-checkingc
sc2r:SystemRecoveryc
sc2r:AccountRecoveryc

Recovery Planc

URI http://cs.unu.edu/sc2r#RecoveryPlan
Description

Recovery planning is the process of putting in place plans to restore and recover cyber functioning when adverse incidents do occur.

Super-classes sc2r:AnticipateMeasurec

Reduced Opportunitiesc

URI http://cs.unu.edu/sc2r#ReducedOpportunities
Description

Reduced Opportunities refers to an adverse change in the established reputation of the individual's.

Super-classes sc2r:ReputationalHarmc

Reduced Performancec

URI http://cs.unu.edu/sc2r#ReducedPerformance
Description

Reduced Performance refers to the state in which the ability of resources to function is lowered.

Super-classes sc2r:PhysicalHarmc

Redundancy Measurec

URI http://cs.unu.edu/sc2r#RedundancyMeasure
Description

Redundancy measure is a preparation measure that involves putting in place redundant resources, to be utilized in cases where core resources are compromised and affected by adverse cyber incidents.

Super-classes sc2r:AnticipateMeasurec
Sub-classes sc2r:DataRedundancyc
sc2r:SourceRedundancyc
sc2r:SoftwareRedundancyc
sc2r:NetworkRedundancyc

Remote Code Executionc

URI http://cs.unu.edu/sc2r#RemoteExecution
Description

Remote Execution occurs when an attacker exploits a vulnerability in networking and computing systems to run commands and software on individuals computing resources.

Super-classes sc2r:IntegrityThreatc

Removal Measurec

URI http://cs.unu.edu/sc2r#RemovalMeasure
Description

Removal measure involve the direct removal and elimination of the cyber threat.

Super-classes sc2r:EngageMeasurec
Sub-classes sc2r:MaliciousSoftwareRemovalc
sc2r:MaliciousContentRemovalc
sc2r:MaliciousContactRemovalc

Replayc

URI http://cs.unu.edu/sc2r#Replay
Description

Replay attacks occur when legitimate information and network transactions are repeated and retransmitted for malicious purposes.

Super-classes sc2r:IntegrityThreatc

Reporting Measurec

URI http://cs.unu.edu/sc2r#Reporting
Description

Reporting measure is the reporting of an adverse cyber incident to external responders.

Super-classes sc2r:AbsorbMeasurec
Sub-classes sc2r:IncidentReportingc

Reputation Resourcec

URI http://cs.unu.edu/sc2r#Reputation
Description

Reputation is the overall quality or character as recognised by other people.

Super-classes sc2r:SocialCapitalc

Reputational Harmc

URI http://cs.unu.edu/sc2r#ReputationalHarm
Description

Reputational harm is the harm pertaining to the general opinion held about an entity.

Super-classes sc2r:Harmc
Sub-classes sc2r:UnderScrutinyc
sc2r:DamagedSocialPerceptionc
sc2r:ReducedOpportunitiesc
sc2r:Blacklistedc

Reserve Threatc

URI http://cs.unu.edu/sc2r#ReserveThreat
Description

Reserve Threat occurs when individuals' preference to not interact or remain strangers with others online is threatened.

Super-classes sc2r:PrivacyThreatc

Resourcec

URI http://cs.unu.edu/sc2r#Resource
Description

A Resource is a capability input that contributes to individuals cyber activities. Resources are framed much broader that technological computing assets (i.e., hardware, software, data) and include individual and social resources.

Sub-classes sc2r:InfrastructureResourcec
sc2r:PhysicalResourcec
sc2r:DigitalResourcec
sc2r:IndividualResourcec
In domain of sc2r:hasVulnerabilityop
sc2r:isDamagedByop
In range of sc2r:damagesop
sc2r:isAVulnerabilityOfop

Responsec

URI http://cs.unu.edu/sc2r#Response
Description

A Response, also called Countermeasure, is an intervention that can be employed to mitigate Threats and reduce Vulnerabilities. Responses are framed around the four phases of resilience: prepare, absorb, recover, and adapt.

Sub-classes sc2r:RecoverMeasurec
sc2r:AbsorbMeasurec
sc2r:PrepareMeasurec
sc2r:AdaptMeasurec
In domain of sc2r:reducesop
sc2r:mitigatesop
In range of sc2r:isMitigatedByop
sc2r:isReducedByop

Restrictive Mediationc

URI http://cs.unu.edu/sc2r#RestrictiveMediation
Description

Restrictive mediation are a set of rules and limits that are placed on individuals to minimize the negative impacts in use of cyber resources.

Super-classes sc2r:MediationMeasuresc

Rightsc

URI http://cs.unu.edu/sc2r#Right
Description

Rights are non-negotiable entitlements grounded in the idea of justice.

Super-classes sc2r:IndividualResourcec
Sub-classes sc2r:Privacyc
sc2r:Opinionc
sc2r:Expressionc
sc2r:Assemblyc
sc2r:Informationc

SD Cardc

URI http://cs.unu.edu/sc2r#SDCard
Description

SD Card (Secure Digital Card) is an ultra small flash memory card designed to provide high-capacity memory in a small size.

Super-classes sc2r:StorageAssetc

Sandboxingc

URI http://cs.unu.edu/sc2r#Sandboxing
Description

Sandboxing is a mechanism of isolating the operation of cyber resources that may otherwise cause widespread adverse incidents.

Super-classes sc2r:AccessControlc

Satirec

URI http://cs.unu.edu/sc2r#Satire
Description

Satire used as part of an influence campaign.

Super-classes sc2r:InfluenceOperationc

Scamc

URI http://cs.unu.edu/sc2r#Scam
Description

Scam is the broader term for the use of internet services or software to defraud or take advantage of targets, typically financial gain or other valuable information. Scam types include romance scam, the overpayment scam, quick-money promise, impersonation scam, and tech support online scam.

Super-classes sc2r:TheftThreatc
Sub-classes sc2r:SweepstakesScamc
sc2r:FakeGivewaysc

Scam Costc

URI http://cs.unu.edu/sc2r#ScamCost
Description

Scam Cost refers to the costs that the individual has to pay as a result of successful scam scheme of which they are victim.

Super-classes sc2r:EconomicHarmc

Scarewarec

URI http://cs.unu.edu/sc2r#Scareware
Description

Scareware is a form of malware that is designed to manipulate individuals to buy or download unnecessary and potentially dangerous software, such as fake antivirus protection.

Super-classes sc2r:InfluenceThreatc

Sealioningc

URI http://cs.unu.edu/sc2r#Sealioning
Description

Sealioning is a type of troll tactic which consists of pursuing people with persistent requests for evidence or repeated questions, while maintaining a pretense of civility and sincerity.

Super-classes sc2r:Trollingc

Self-Censorshipc

URI http://cs.unu.edu/sc2r#SelfCensorship
Description

Self-censorship is the state in which the individual exercises control over what they say and do, especially to avoid castigation.

Super-classes sc2r:PsychologicalHarmc

Self Harmc

URI http://cs.unu.edu/sc2r#SelfHarm
Description

Self Harm refers to intentional damage or injury done to the individual's body.

Super-classes sc2r:BodilyInjuryc

Serverc

URI http://cs.unu.edu/sc2r#Server
Description

A Server is a computer or system that provides resources, data services, or programs to other computers.

Super-classes sc2r:ComputingAssetc

Sextortionc

URI http://cs.unu.edu/sc2r#Sextortion
Description

Sextortion occurs when the perpetrator uses unwanted sexually explicit material of the target to blackmail or coerce the target into extorting sexual favors.

Super-classes sc2r:SexualAbusec

Sexual Abuse Threatc

URI http://cs.unu.edu/sc2r#SexualAbuse
Description

Sexual Abuse occurs to individuals when they are targeted by a virtual, distanced sexual abuse or exploitation through the use of online communication.

Super-classes sc2r:Abusec
Sub-classes sc2r:BoyfriendingGirlfriendingc
sc2r:Persistencec
sc2r:SexualAssaultc
sc2r:Sextortionc
sc2r:Luringc
sc2r:LoveBombingc
sc2r:Groomingc

Sexual Assaultc

URI http://cs.unu.edu/sc2r#SexualAssault
Description

Sexual Assault occurs when the perpetrator constantly threats the target with sexual assault online.

Super-classes sc2r:SexualAbusec

Shamefulc

URI http://cs.unu.edu/sc2r#Shameful
Description

Shameful refers to the state in which the individual experiences disgracefulness.

Super-classes sc2r:PsychologicalHarmc

Shillingc

URI http://cs.unu.edu/sc2r#Shilling
Description

Shilling involves a person engaging with a particular subject (e.g. through marketing or a review) jointly with the actor concerned, for example someone writing a glowing customer review or answering their own questions under different identities to simulate a debate.

Super-classes sc2r:Deceitc

Skillsc

URI http://cs.unu.edu/sc2r#Skills
Description

A Skill is the ability and capacity to perform an action with determined results.

Super-classes sc2r:MentalFacultiesc

Skimmingc

URI http://cs.unu.edu/sc2r#Skimming
Description

Skimming occurs when attackers steal and capture private and confidential information, such as credit card details, in the course of a 'legitimate' use of services.

Super-classes sc2r:ConfidentialityThreatc

Smishingc

URI http://cs.unu.edu/sc2r#Smishing
Description

Smishing occurs when individuals receive a convincing yet fraudulent text message (instead of email) from the perpetrator that attempts to trick into handing over personal information.

Super-classes sc2r:Phishingc

Social Capital Resourcec

URI http://cs.unu.edu/sc2r#SocialCapital
Description

Social capital is the accumulation of actual and potential resources linked to the possession of a social network.

Super-classes sc2r:IndividualResourcec
Sub-classes sc2r:Reputationc
sc2r:SocialNetworkc

Social Contactc

URI http://cs.unu.edu/sc2r#SocialContact
Description

Social Contact refers to individual's contact list and the conversation they have with others that occur through the use of a digital device.

Super-classes sc2r:PersonalDatac

Social Engineeringc

URI http://cs.unu.edu/sc2r#SocialEngineering
Description

Social Engineering is the use of deception to manipulate individuals into divulging confidential or personal information that may be used for fraudulent purposes.

Super-classes sc2r:InfluenceThreatc
Sub-classes sc2r:Pretextingc
sc2r:Baitingc
sc2r:QuidProQuoc
sc2r:Phishingc
sc2r:Tailgatingc

Social Hackingc

URI http://cs.unu.edu/sc2r#SocialHacking
Description

Social hacking is the act of attempting to manipulate outcomes of social behaviour through orchestrated actions.

Super-classes sc2r:SocialThreatc
Sub-classes sc2r:SockPuppetryc
sc2r:SociocognitiveHackingc
sc2r:ParasocialHackingc
sc2r:Raidingc
sc2r:Floodingc
sc2r:Cheerleadingc
sc2r:PointAndShriekc
sc2r:BlackPropagandac
sc2r:Polarizationc
sc2r:Launderingc

Social Harmc

URI http://cs.unu.edu/sc2r#SocialHarm
Description

Social harm is the harm that may result in a social context or society more broadly.

Super-classes sc2r:Harmc
Sub-classes sc2r:Isolationc
sc2r:Conflictc
sc2r:SocialWithdrawalc
sc2r:DamagedRelationshipc
sc2r:Radicalisationc
sc2r:ImpairedPrivateSocialBoundaryc

Social Media Hygienec

URI http://cs.unu.edu/sc2r#SocialMediaHygiene
Description

Social media hygiene are measures and practices that contribute to safe and secure use of social media.

Super-classes sc2r:WebHygienec

Social Media Monitoringc

URI http://cs.unu.edu/sc2r#SocialMediaMonitoring
Description

Social media monitoring involves observing and checking social media resources for signs of adverse incidents.

Super-classes sc2r:ThreatMonitoringMeasurec

Social Network Resourcec

URI http://cs.unu.edu/sc2r#SocialNetwork
Description

Social Network refers to individual's network of social interactions and personal relationships.

Super-classes sc2r:SocialCapitalc

Right to Social Privacyc

URI http://cs.unu.edu/sc2r#SocialPrivacy
Description

Social Privacy is individual's right to keep their social network to themselves to protect the privacy of others within the network.

Super-classes sc2r:Privacyc

Social Supportc

URI http://cs.unu.edu/sc2r#SocialSupport
Description

This involves leveraging individuals social capital towards recovery to the lost cyber functioning.

For example, in the case of socio-technical threats, social support can enable individuals to deal with the adverse incident and to recover from its impacts.

Super-classes sc2r:ExternalSupportc

Societal and Social Threatc

URI http://cs.unu.edu/sc2r#SocialThreat
Description

Social Threats are associated with individuals' social and societal context.

Super-classes sc2r:Threatc
Sub-classes sc2r:SocialHackingc

Social Withdrawalc

URI http://cs.unu.edu/sc2r#SocialWithdrawal
Description

Social Withdrawal refers to the state in which the individual avoids people and activities they would usually enjoy, that could lead to a point of social isolation.

Super-classes sc2r:SocialHarmc

Socio-cognitive Hackingc

URI http://cs.unu.edu/sc2r#SociocognitiveHacking
Description

Socio-cognitive hacking seeks to manipulate the perception of people by exploiting their psychosocial vulnerabilities with the purpose of changing people's behaviour. The most common tool used is weaponised information.

Super-classes sc2r:SocialHackingc

Sock Puppetryc

URI http://cs.unu.edu/sc2r#SockPuppetry
Description

Sock Puppetry is a form of deception that involves the misleading use of online identities to manipulate public opinion, or to circumvent restrictions, suspension or an outright ban from a website.

Super-classes sc2r:SocialHackingc

Softwarec

URI http://cs.unu.edu/sc2r#Software
Description

A Software is a set of programs, procedures, and routines used to operate computers and execute specific tasks.

Super-classes sc2r:DigitalResourcec
Sub-classes sc2r:OnlineServicesc

Software Redundancyc

URI http://cs.unu.edu/sc2r#SoftwareRedundancy
Description

Software redundancy involves having redundant software in place to be utilized in cases where primary software is affected by adverse cyber incidents.

Super-classes sc2r:RedundancyMeasurec

Software Vulnerabilityc

URI http://cs.unu.edu/sc2r#SoftwareVulnerability
Description

Sofware Vulnerabilities are weaknesses in software resources.

Super-classes sc2r:Digitalc

Solitude Threatc

URI http://cs.unu.edu/sc2r#SolitudeThreat
Description

Solitude Threat occurs when individuals' preference to be alone by themselves and free from observations by others is threatened.

Super-classes sc2r:PrivacyThreatc

Source Redundancyc

URI http://cs.unu.edu/sc2r#SourceRedundancy
Description

Source redundancy involves having alternative sources of information, content and services to be utilized in cases where primary sources are affected by adverse cyber incidents.

Super-classes sc2r:RedundancyMeasurec

Spam Emailc

URI http://cs.unu.edu/sc2r#SpamEmail
Description

Spam Emails (junk emails) are unsolicited messages sent in bulk through email with commercial, fraudulent, or malicious intent.

Super-classes sc2r:UnsolicitedCommunicationc

Spear Phishingc

URI http://cs.unu.edu/sc2r#SpearPhishing
Description

Spear Phishing occurs when individuals receive a convincing yet fraudulent message from the perpetrator who poses as a familiar person or entity to the individual in an attempt to trick them into sharing sensitive information.

Super-classes sc2r:Phishingc
Sub-classes sc2r:Whalingc

Spoofingc

URI http://cs.unu.edu/sc2r#Spoofing
Description

Spoofing is an attack where fake and falsified identity is provided by individuals or machines. For example, a rogue website pretending to be another legitimate website by spoofing the address.

Super-classes sc2r:AuthenticationThreatc

Storage Assetc

URI http://cs.unu.edu/sc2r#StorageAsset
Description

Storage Asset comprises any recording media used to retain data using computers or other devices.

Super-classes sc2r:PhysicalResourcec
Sub-classes sc2r:USBDrivec
sc2r:ExternalHardDrivec
sc2r:SDCardc

Strawman Attackc

URI http://cs.unu.edu/sc2r#Strawman
Description

Strawman attack is a technique that is used to undermine a specific position by summarising the position inaccurately so as to weaken it and then by refuting that inaccurate rendition.

Super-classes sc2r:MalignRhetoricc

Surveillancec

URI http://cs.unu.edu/sc2r#Surveillance
Description

Surveillance occurs when individuals are observed and monitored for the purposes of collecting information, influencing or managing.

Super-classes sc2r:InstitutionalThreatc

Sweepstakes Scamc

URI http://cs.unu.edu/sc2r#SweepstakesScam
Description

Sweepstakes scam occurs when individuals are told that they have won a prize and that they need to pay a fee before receiving their prize.

Super-classes sc2r:Scamc

Sympathyc

URI http://cs.unu.edu/sc2r#Sympathy
Description

Sympathy is an affinity, association, or understanding of someone else's feeling, problem, or suffering.

Super-classes sc2r:Individualc

System Recoveryc

URI http://cs.unu.edu/sc2r#SystemRecovery
Description

System recovery involves the restoration of a system, including services and configuration, to the level of nominal functioning equivalent to that before an adverse cyber incident.

Super-classes sc2r:RecoverMeasurec

Tailgatingc

URI http://cs.unu.edu/sc2r#Tailgating
Description

Tailgating (or piggybacking) occurs when individuals are targeted by an attempt to trick them to help the perpetrator gain unauthorised access into a secure, restricted area.

Super-classes sc2r:SocialEngineeringc

Technical Mediationc

URI http://cs.unu.edu/sc2r#TechnicalMediation
Description

Technical mediation is the use of technology solutions to limit the impact of adverse cyber incidents.

Super-classes sc2r:MediationMeasuresc

Technological Threatc

URI http://cs.unu.edu/sc2r#TechnologicalThreat
Description

Technological Threats are associated with and affect individuals' computing resources.

Super-classes sc2r:Threatc
Sub-classes sc2r:NonRepudiationThreatc
sc2r:IntegrityThreatc
sc2r:ConfidentialityThreatc
sc2r:AvailabilityThreatc
sc2r:AuthenticationThreatc

Right to Territorial Privacyc

URI http://cs.unu.edu/sc2r#TerritorialPrivacy
Description

The right to protect personal space, property, and objects.

Super-classes sc2r:Privacyc

Theft Harmc

URI http://cs.unu.edu/sc2r#Theft
Description

Theft Harm refers to the state in which individual's resources are physically or digitally stolen.

Super-classes sc2r:PhysicalHarmc

Theft of Financesc

URI http://cs.unu.edu/sc2r#TheftOfFinances
Description

Theft of Finances the state in which individual's financial resources are stolen.

Super-classes sc2r:EconomicHarmc

Theft Threatc

URI http://cs.unu.edu/sc2r#TheftThreat
Description

Theft Threats aim to steal of defraud individuals of certain resources.

Super-classes sc2r:PersonalThreatc
Sub-classes sc2r:IdentityTheftc
sc2r:Fraudc
sc2r:Scamc

Threatc

URI http://cs.unu.edu/sc2r#Threat
Description

A Threat is a potential adverse cyber incident that has an impact on individuals. Threats are framed around individuals' personal, social, and environmental conversion factors which consitute their personal utilization function.

Sub-classes sc2r:TechnologicalThreatc
sc2r:PersonalThreatc
sc2r:EnvironmentalThreatc
sc2r:SocialThreatc
In domain of sc2r:isMitigatedByop
sc2r:canResultInop
sc2r:exploitsop
sc2r:resultsInop
sc2r:damagesop
In range of sc2r:mitigatesop
sc2r:isExploitedByop
sc2r:isResultOfop
sc2r:isDamagedByop
sc2r:canBeResultOfop

Threat Monitoring Measurec

URI http://cs.unu.edu/sc2r#ThreatMonitoringMeasure
Description

Threat monitoring is the process of continually monitoring and observing the operation and use of cyber resources for signs of adverse cyber incidents and threats.

Super-classes sc2r:MonitoringMeasurec
Sub-classes sc2r:FailureDetectionc
sc2r:MaliciousSoftwareDetectionc
sc2r:SocialMediaMonitoringc
sc2r:IntrusionDetectionc

Time Wastedc

URI http://cs.unu.edu/sc2r#TimeWasted
Description

Time Wasted refers to the unnecessary loss of time spent due to dealing with cyber threats and the impacts.

Super-classes sc2r:EconomicHarmc

Trainingc

URI http://cs.unu.edu/sc2r#Training
Description

Training is a capability-building measure that enhances individuals' skills and competencies to be able to deal with and handle adverse cyber incidents.

Super-classes sc2r:AnticipateMeasurec

Transfer Information Attackc

URI http://cs.unu.edu/sc2r#Transfer
Description

Transfer information attack occurs when information, content, and arguments are associated with partisan and controversial themes for influence and distortion purposes.

Super-classes sc2r:MalignRhetoricc

Trollingc

URI http://cs.unu.edu/sc2r#Trolling
Description

Trolling is the deliberate act of making random unsolicited, inflammatory, and/or controversial comments online with the intent to provoke emotional responses from unsuspecting readers to engage in a fight or argument.

Super-classes sc2r:Abusec
Sub-classes sc2r:Sealioningc

Trusted Datac

URI http://cs.unu.edu/sc2r#TrustedData
Description

Trusted data is the use of measures that ensure the safety, security and veracity of data.

Super-classes sc2r:PreventionMeasurec

Trusted Informationc

URI http://cs.unu.edu/sc2r#TrustedInformation
Description

Trusted information is the use of information that is verified and safe, and from trusted sources.

Super-classes sc2r:PreventionMeasurec

Trusted Infrastructurec

URI http://cs.unu.edu/sc2r#TrustedInfrastructure
Description

Trusted infrastructure involves the use of safe, secure, verified and trusted cyber infrastructure.

Super-classes sc2r:PreventionMeasurec
Sub-classes sc2r:TrustedNetworkingc

Trusted Networkingc

URI http://cs.unu.edu/sc2r#TrustedNetworking
Description

Trusted Networking is the use of networking resources in a safe, secure, and trusted manner.

Super-classes sc2r:TrustedInfrastructurec
Sub-classes sc2r:VirtualPrivateNetworkc
sc2r:AnonymousRoutingc

Trusted Softwarec

URI http://cs.unu.edu/sc2r#TrustedSoftware
Description

Trusted software involves the use of software that is safe, secure, verified and trusted. It involves using software from legitimate sources.

Super-classes sc2r:PreventionMeasurec

USB Drivec

URI http://cs.unu.edu/sc2r#USBDrive
Description

USB Drive is an external hard disk drive or optical disc drive that plugs into the USB port.

Super-classes sc2r:StorageAssetc

Unauthorized Accessc

URI http://cs.unu.edu/sc2r#UnauthorizedAccess
Description

Unauthorized access occurs when individuals or machines gain access to information or services that they are not authorized to.

Super-classes sc2r:AuthenticationThreatc
Sub-classes sc2r:Piggybackingc
sc2r:NetworkIntrusionc

Unavailablec

URI http://cs.unu.edu/sc2r#Unavailable
Description

Unavailable is the state in which the resources become physically or digitally unavailable to use.

Super-classes sc2r:PhysicalHarmc

Under Scrutinyc

URI http://cs.unu.edu/sc2r#UnderScrutiny
Description

Under Scrutiny refers to refers to the state in which the individual's action is continuosly being scruitinised.

Super-classes sc2r:ReputationalHarmc

Unsolicited Communicationc

URI http://cs.unu.edu/sc2r#UnsolicitedCommunication
Description

Unsolicited communication occurs when individuals receive communication that they haven't requested or solicited.

Super-classes sc2r:Abusec
Sub-classes sc2r:UnsolicitedSocialRequestc
sc2r:SpamEmailc

Unsolicited Social Requestc

URI http://cs.unu.edu/sc2r#UnsolicitedSocialRequest
Description

Unsolicited Social Request occurs when individuals receive a request for information from a person or an entity that is unknown to or has no connection with them.

Super-classes sc2r:UnsolicitedCommunicationc

Urgencyc

URI http://cs.unu.edu/sc2r#Urgency
Description

Urgency is the need to deal with something quickly; the feeling of wanting something very much.

Super-classes sc2r:Individualc

User-Generated Contentc

URI http://cs.unu.edu/sc2r#UserGeneratedContent
Description

User Generated Content (UGC) is any content, including text, audio, videos, images, and reviews, that are created by users/people and posted on online platforms.

Super-classes sc2r:PersonalDatac

User Identificationc

URI http://cs.unu.edu/sc2r#UserIdentification
Description

Use identification is the confirmation of the claimed identify of users.

Super-classes sc2r:Identificationc

Vandalismc

URI http://cs.unu.edu/sc2r#Vandalism
Description

Digital Vandalism occurs when individuals' digital resources, for example websites, are maliciously defaced or permanently damaged.

Super-classes sc2r:IntegrityThreatc

Violationc

URI http://cs.unu.edu/sc2r#Violation
Description

Violations occur when an individual breaks the stipulated and expected conditions in the use of cyber resources. These include violations of policies and contracts.

Super-classes sc2r:InstitutionalThreatc
Sub-classes sc2r:ContractBreachc

Voilent Contentc

URI http://cs.unu.edu/sc2r#Violence
Description

This is content of violent nature that may be inappropriate to individuals.

Super-classes sc2r:InappropriateContentc

Virtual Private Networkc

URI http://cs.unu.edu/sc2r#VirtualPrivateNetwork
Description

A virtual private network is a networking measure that extends a private network over a public network, in a manner that ensures safety and security.

Super-classes sc2r:TrustedNetworkingc

Vishingc

URI http://cs.unu.edu/sc2r#Vishing
Description

Vishing occurs when individuals receive a phone call that appears to be from a trusted source aiming to trick them to share sensitive information.

Super-classes sc2r:Phishingc

Vulnerabilityc

URI http://cs.unu.edu/sc2r#Vulnerability
Description

A Vulnerability is a weakness of Cyber Resources, that can be exploited by a Threat.

Sub-classes sc2r:Individualc
sc2r:Physicalc
sc2r:Digitalc
In domain of sc2r:isReducedByop
sc2r:isAVulnerabilityOfop
sc2r:isExploitedByop
In range of sc2r:hasVulnerabilityop
sc2r:reducesop
sc2r:exploitsop

Web Hygienec

URI http://cs.unu.edu/sc2r#WebHygiene
Description

Web hygiene are measures and steps that individuals undertake to improve their cyber security and safety.

Super-classes sc2r:PreventionMeasurec
Sub-classes sc2r:EmailHygienec
sc2r:SocialMediaHygienec

Whaling Phishingc

URI http://cs.unu.edu/sc2r#Whaling
Description

Whaling occurs when individuals receive fraudulent message from a perpetrator that masquarades as a senior or important individual at an organisation aiming to trick into sharing sensitive information.

Super-classes sc2r:SpearPhishingc

WhatAboutismc

URI http://cs.unu.edu/sc2r#WhatAboutism
Description

WhatAboutism is a disinformation techniques that involves distracting individuals from one issue to another.

Super-classes sc2r:MalignRhetoricc

Withstand Measurec

URI http://cs.unu.edu/sc2r#WithstandMeasure
Description

Withstand measures aim to stand against and resist the adverse incidents to maintain a level of cyber funtioning.

Super-classes sc2r:AbsorbMeasurec
Sub-classes sc2r:AlternativeResourcec
sc2r:IncreaseResourcesc

Worriedc

URI http://cs.unu.edu/sc2r#Worried
Description

Worried refers to the state in which the individual experiences mental distress or agitation resulting from concern usually for something impending or anticipated.

Super-classes sc2r:PsychologicalHarmc

You Are Not Immunec

URI http://cs.unu.edu/sc2r#YouAreNotImmune
Description

This attitude emphasizes the fact that everyone is susceptible to adverse cyber incidents.

Super-classes sc2r:AttitudinalMeasurec

Object Properties

canBeResultOfop

URI http://cs.unu.edu/sc2r#canBeResultOf
Inverse properties sc2r:canResultInop
Domain(s) sc2r:Harmc
Range(s) sc2r:Threatc

canResultInop

URI http://cs.unu.edu/sc2r#canResultIn
Domain(s) sc2r:Threatc
Range(s) sc2r:Harmc

damagesop

URI http://cs.unu.edu/sc2r#damages
Inverse properties sc2r:isDamagedByop
Domain(s) sc2r:Threatc
Range(s) sc2r:Resourcec

exploitsop

URI http://cs.unu.edu/sc2r#exploits
Inverse properties sc2r:isExploitedByop
Domain(s) sc2r:Threatc
Range(s) sc2r:Vulnerabilityc

hasVulnerabilityop

URI http://cs.unu.edu/sc2r#hasVulnerability
Inverse properties sc2r:isAVulnerabilityOfop
Domain(s) sc2r:Resourcec
Range(s) sc2r:Vulnerabilityc

isAVulnerabilityOfop

URI http://cs.unu.edu/sc2r#isAVulnerabilityOf
Domain(s) sc2r:Vulnerabilityc
Range(s) sc2r:Resourcec

isDamagedByop

URI http://cs.unu.edu/sc2r#isDamagedBy
Domain(s) sc2r:Resourcec
Range(s) sc2r:Threatc

isExploitedByop

URI http://cs.unu.edu/sc2r#isExploitedBy
Domain(s) sc2r:Vulnerabilityc
Range(s) sc2r:Threatc

isMitigatedByop

URI http://cs.unu.edu/sc2r#isMitigatedBy
Inverse properties sc2r:mitigatesop
Domain(s) sc2r:Threatc
Range(s) sc2r:Responsec

isReducedByop

URI http://cs.unu.edu/sc2r#isReducedBy
Inverse properties sc2r:reducesop
Domain(s) sc2r:Vulnerabilityc
Range(s) sc2r:Responsec

isResultOfop

URI http://cs.unu.edu/sc2r#isResultOf
Super-properties sc2r:canBeResultOfop
Inverse properties sc2r:resultsInop
Domain(s) sc2r:Harmc
Range(s) sc2r:Threatc

mitigatesop

URI http://cs.unu.edu/sc2r#mitigates
Domain(s) sc2r:Responsec
Range(s) sc2r:Threatc

reducesop

URI http://cs.unu.edu/sc2r#reduces
Domain(s) sc2r:Responsec
Range(s) sc2r:Vulnerabilityc

relatesToop

URI http://cs.unu.edu/sc2r#relatesTo

resultsInop

URI http://cs.unu.edu/sc2r#resultsIn
Super-properties sc2r:canResultInop
Domain(s) sc2r:Threatc
Range(s) sc2r:Harmc

Datatype Properties

hasDescriptiondp

URI http://cs.unu.edu/sc2r#hasDescription
Domain(s) owl:Thingc
Range(s) rdfs:Literalc

hasIDdp

URI http://cs.unu.edu/sc2r#hasID

Annotation Properties

creatorap

URI http://purl.org/dc/elements/1.1/#creator

descriptionap

URI http://purl.org/dc/elements/1.1/#description

rightsap

URI http://purl.org/dc/elements/1.1/#rights

creatorap

URI http://purl.org/dc/elements/1.1/creator

descriptionap

URI http://purl.org/dc/elements/1.1/description

rightsap

URI http://purl.org/dc/elements/1.1/rights

Named Individuals

Namespaces

:
http://www.semanticweb.org/mamello/ontologies/2020/5/sc2r#
dc
http://purl.org/dc/elements/1.1/#
owl
http://www.w3.org/2002/07/owl#
prov
http://www.w3.org/ns/prov#
rdf
http://www.w3.org/1999/02/22-rdf-syntax-ns#
rdfs
http://www.w3.org/2000/01/rdf-schema#
sc2r
http://cs.unu.edu/sc2r#
sdo
https://schema.org/
skos
http://www.w3.org/2004/02/skos/core#
xsd
http://www.w3.org/2001/XMLSchema#

Legend

cClasses
opObject Properties
fpFunctional Properties
dpData Properties
dpAnnotation Properties
pProperties
niNamed Individuals