{"@context":{"ns0":"http://eurovoc.europa.eu/","rdf":"http://www.w3.org/1999/02/22-rdf-syntax-ns#","owl":"http://www.w3.org/2002/07/owl#","skos":"http://www.w3.org/2004/02/skos/core#","metadata_def":"http://data.bioontology.org/metadata/def/"},"@graph":[{"@id":"ns0:c_04ae3ba8","@type":["owl:NamedIndividual","skos:Concept"],"skos:prefLabel":[{"@value":"tietoturvallisuus","@language":"fi"},{"@value":"siguria informatike","@language":"sq"},{"@value":"információbiztonság","@language":"hu"},{"@value":"информатичка безбедност","@language":"mk"},{"@value":"sécurité des systèmes d’information","@language":"fr"},{"@value":"infoturve","@language":"et"},{"@value":"sicurezza delle informazioni","@language":"it"},{"@value":"bezpečnosť informačných systémov","@language":"sk"},{"@value":"informacijska sigurnost","@language":"hr"},{"@value":"varovanje tajnosti podatkov","@language":"sl"},{"@value":"ασφάλεια των συστημάτων πληροφοριών","@language":"el"},{"@value":"informatiebeveiliging","@language":"nl"},{"@value":"bezpečnost informačních systémů","@language":"cs"},{"@value":"informacijos saugumas","@language":"lt"},{"@value":"informācijas drošība","@language":"lv"},{"@value":"segurança da informação","@language":"pt"},{"@value":"informationssäkerhet","@language":"sv"},{"@value":"informationssikkerhed","@language":"da"},{"@value":"slándáil faisnéise","@language":"ga"},{"@value":"information security","@language":"en"},{"@value":"seguridad informática","@language":"es"},{"@value":"securitatea sistemelor informatice","@language":"ro"},{"@value":"информационна сигурност","@language":"bg"},{"@value":"sikurezza tal-informazzjoni","@language":"mt"},{"@value":"bezpieczeństwo informacji","@language":"pl"},{"@value":"Informationssicherheit","@language":"de"}],"skos:notation":"c_04ae3ba8","metadata_def:mappingSameURI":{"@id":"ns0:c_04ae3ba8"},"metadata_def:mappingLoom":"informationsecurity","skos:broader":{"@id":"ns0:5922"},"skos:related":[{"@id":"ns0:c_4e75f061"},{"@id":"ns0:7938"},{"@id":"ns0:6779"},{"@id":"ns0:5181"}],"skos:inScheme":[{"@id":"ns0:100141"},{"@id":"ns0:100223"}]},{"@id":"ns0:5922","skos:narrower":{"@id":"ns0:c_04ae3ba8"}},{"@id":"ns0:c_4e75f061","skos:related":{"@id":"ns0:c_04ae3ba8"}},{"@id":"ns0:7938","skos:related":{"@id":"ns0:c_04ae3ba8"}},{"@id":"ns0:6779","skos:related":{"@id":"ns0:c_04ae3ba8"}},{"@id":"ns0:5181","skos:related":{"@id":"ns0:c_04ae3ba8"}}]}
{"@context":{"ns0":"http://eurovoc.europa.eu/","rdf":"http://www.w3.org/1999/02/22-rdf-syntax-ns#","owl":"http://www.w3.org/2002/07/owl#","skos":"http://www.w3.org/2004/02/skos/core#","metadata_def":"http://data.bioontology.org/metadata/def/"},"@graph":[{"@id":"ns0:c_04ae3ba8","@type":["owl:NamedIndividual","skos:Concept"],"skos:prefLabel":[{"@value":"tietoturvallisuus","@language":"fi"},{"@value":"siguria informatike","@language":"sq"},{"@value":"információbiztonság","@language":"hu"},{"@value":"информатичка безбедност","@language":"mk"},{"@value":"sécurité des systèmes d’information","@language":"fr"},{"@value":"infoturve","@language":"et"},{"@value":"sicurezza delle informazioni","@language":"it"},{"@value":"bezpečnosť informačných systémov","@language":"sk"},{"@value":"informacijska sigurnost","@language":"hr"},{"@value":"varovanje tajnosti podatkov","@language":"sl"},{"@value":"ασφάλεια των συστημάτων πληροφοριών","@language":"el"},{"@value":"informatiebeveiliging","@language":"nl"},{"@value":"bezpečnost informačních systémů","@language":"cs"},{"@value":"informacijos saugumas","@language":"lt"},{"@value":"informācijas drošība","@language":"lv"},{"@value":"segurança da informação","@language":"pt"},{"@value":"informationssäkerhet","@language":"sv"},{"@value":"informationssikkerhed","@language":"da"},{"@value":"slándáil faisnéise","@language":"ga"},{"@value":"information security","@language":"en"},{"@value":"seguridad informática","@language":"es"},{"@value":"securitatea sistemelor informatice","@language":"ro"},{"@value":"информационна сигурност","@language":"bg"},{"@value":"sikurezza tal-informazzjoni","@language":"mt"},{"@value":"bezpieczeństwo informacji","@language":"pl"},{"@value":"Informationssicherheit","@language":"de"}],"skos:notation":"c_04ae3ba8","metadata_def:mappingSameURI":{"@id":"ns0:c_04ae3ba8"},"metadata_def:mappingLoom":"informationsecurity","skos:broader":{"@id":"ns0:5922"},"skos:related":[{"@id":"ns0:c_4e75f061"},{"@id":"ns0:7938"},{"@id":"ns0:6779"},{"@id":"ns0:5181"}],"skos:inScheme":[{"@id":"ns0:100141"},{"@id":"ns0:100223"}]},{"@id":"ns0:5922","skos:narrower":{"@id":"ns0:c_04ae3ba8"}},{"@id":"ns0:c_4e75f061","skos:related":{"@id":"ns0:c_04ae3ba8"}},{"@id":"ns0:7938","skos:related":{"@id":"ns0:c_04ae3ba8"}},{"@id":"ns0:6779","skos:related":{"@id":"ns0:c_04ae3ba8"}},{"@id":"ns0:5181","skos:related":{"@id":"ns0:c_04ae3ba8"}}]}