[ {
  "@id" : "http://purl.org/dc/terms/RightsStatement",
  "@type" : [ "http://www.w3.org/2002/07/owl#Class" ]
}, {
  "@id" : "http://purl.org/dc/terms/abstract",
  "@type" : [ "http://www.w3.org/2002/07/owl#AnnotationProperty" ]
}, {
  "@id" : "http://purl.org/dc/terms/accessRights",
  "@type" : [ "http://www.w3.org/2002/07/owl#AnnotationProperty" ]
}, {
  "@id" : "http://purl.org/dc/terms/contributor",
  "@type" : [ "http://www.w3.org/2002/07/owl#AnnotationProperty" ]
}, {
  "@id" : "http://purl.org/dc/terms/created",
  "@type" : [ "http://www.w3.org/2002/07/owl#AnnotationProperty" ]
}, {
  "@id" : "http://purl.org/dc/terms/description",
  "@type" : [ "http://www.w3.org/2002/07/owl#AnnotationProperty" ]
}, {
  "@id" : "http://purl.org/dc/terms/format",
  "@type" : [ "http://www.w3.org/2002/07/owl#AnnotationProperty" ]
}, {
  "@id" : "http://purl.org/dc/terms/license",
  "@type" : [ "http://www.w3.org/2002/07/owl#AnnotationProperty" ]
}, {
  "@id" : "http://purl.org/dc/terms/modified",
  "@type" : [ "http://www.w3.org/2002/07/owl#AnnotationProperty" ]
}, {
  "@id" : "http://purl.org/dc/terms/rights",
  "@type" : [ "http://www.w3.org/2002/07/owl#AnnotationProperty" ]
}, {
  "@id" : "http://purl.org/dc/terms/source",
  "@type" : [ "http://www.w3.org/2002/07/owl#AnnotationProperty" ]
}, {
  "@id" : "http://purl.org/ontology/bibo/status",
  "@type" : [ "http://www.w3.org/2002/07/owl#AnnotationProperty" ]
}, {
  "@id" : "http://purl.org/vocab/vann/preferredNamespacePrefix",
  "@type" : [ "http://www.w3.org/2002/07/owl#AnnotationProperty" ]
}, {
  "@id" : "http://purl.org/vocab/vann/preferredNamespaceUri",
  "@type" : [ "http://www.w3.org/2002/07/owl#AnnotationProperty" ]
}, {
  "@id" : "http://schema.org/codeRepository",
  "@type" : [ "http://www.w3.org/2002/07/owl#AnnotationProperty" ]
}, {
  "@id" : "http://schema.org/license",
  "@type" : [ "http://www.w3.org/2002/07/owl#AnnotationProperty" ]
}, {
  "@id" : "http://www.w3.org/2001/XMLSchema#date",
  "@type" : [ "http://www.w3.org/2000/01/rdf-schema#Datatype" ]
}, {
  "@id" : "http://www.w3.org/2003/06/sw-vocab-status/ns#status",
  "@type" : [ "http://www.w3.org/2002/07/owl#AnnotationProperty" ]
}, {
  "@id" : "http://www.w3.org/2004/02/skos/core#Concept",
  "@type" : [ "http://www.w3.org/2002/07/owl#Class" ]
}, {
  "@id" : "http://www.w3.org/2004/02/skos/core#ConceptScheme",
  "@type" : [ "http://www.w3.org/2002/07/owl#Class" ]
}, {
  "@id" : "http://www.w3.org/2004/02/skos/core#broader",
  "@type" : [ "http://www.w3.org/2002/07/owl#AnnotationProperty" ]
}, {
  "@id" : "http://www.w3.org/2004/02/skos/core#definition",
  "@type" : [ "http://www.w3.org/2002/07/owl#AnnotationProperty" ]
}, {
  "@id" : "http://www.w3.org/2004/02/skos/core#inScheme",
  "@type" : [ "http://www.w3.org/2002/07/owl#AnnotationProperty" ]
}, {
  "@id" : "http://www.w3.org/2004/02/skos/core#narrower",
  "@type" : [ "http://www.w3.org/2002/07/owl#AnnotationProperty" ]
}, {
  "@id" : "http://www.w3.org/2004/02/skos/core#prefLabel",
  "@type" : [ "http://www.w3.org/2002/07/owl#AnnotationProperty" ]
}, {
  "@id" : "http://www.w3.org/ns/dcat#Distribution",
  "@type" : [ "http://www.w3.org/2002/07/owl#Class" ]
}, {
  "@id" : "http://www.w3.org/ns/dcat#accessURL",
  "@type" : [ "http://www.w3.org/2002/07/owl#AnnotationProperty" ]
}, {
  "@id" : "http://www.w3.org/ns/dcat#byteSize",
  "@type" : [ "http://www.w3.org/2002/07/owl#AnnotationProperty" ]
}, {
  "@id" : "http://www.w3.org/ns/dcat#downloadURL",
  "@type" : [ "http://www.w3.org/2002/07/owl#AnnotationProperty" ]
}, {
  "@id" : "https://openark.adaptcentre.ie/Ontologies/ARKControlTerminology#",
  "@type" : [ "http://www.w3.org/2002/07/owl#Ontology", "http://www.w3.org/2002/07/owl#NamedIndividual" ],
  "http://purl.org/dc/terms/abstract" : [ {
    "@language" : "en",
    "@value" : "This taxonomy defines cybersecurity terms, taken from ISO and NIST documents, that are used to model this domain on the ARK Platform. Due to copyright restrictions, no definitions are provided for ISO terms."
  } ],
  "http://purl.org/dc/terms/accessRights" : [ {
    "@id" : "http://publications.europa.eu/resource/authority/access-right/PUBLIC"
  } ],
  "http://purl.org/dc/terms/contributor" : [ {
    "@value" : "Junli Liang"
  }, {
    "@value" : "Rob Brennan"
  } ],
  "http://purl.org/dc/terms/created" : [ {
    "@type" : "http://www.w3.org/2001/XMLSchema#date",
    "@value" : "2024-04-08"
  } ],
  "http://purl.org/dc/terms/description" : [ {
    "@language" : "en",
    "@value" : "This taxonomy defines cybersecurity terms, taken from ISO and NIST documents, that are used to model this domain on the ARK Platform. Due to copyright restrictions, no definitions are provided for ISO terms."
  } ],
  "http://purl.org/dc/terms/format" : [ {
    "@value" : "text/turtle"
  } ],
  "http://purl.org/dc/terms/license" : [ {
    "@id" : "https://creativecommons.org/licenses/by/4.0/"
  } ],
  "http://purl.org/dc/terms/modified" : [ {
    "@type" : "http://www.w3.org/2001/XMLSchema#date",
    "@value" : "2024-05-29"
  } ],
  "http://purl.org/dc/terms/rights" : [ {
    "@id" : "https://openark.adaptcentre.ie/Ontologies/ARKControlTerminology#RightsStatement"
  } ],
  "http://purl.org/ontology/bibo/status" : [ {
    "@id" : "http://purl.org/ontology/bibo/status/draft"
  } ],
  "http://purl.org/vocab/vann/preferredNamespacePrefix" : [ {
    "@value" : "arkcyt"
  } ],
  "http://purl.org/vocab/vann/preferredNamespaceUri" : [ {
    "@id" : "https://openark.adaptcentre.ie/Ontologies/ARKControlTerminology#"
  } ],
  "http://schema.org/codeRepository" : [ {
    "@id" : "https://gogs.adaptcentre.ie/ARK/Ontologies/src/master/ARKControlOntology"
  } ],
  "http://schema.org/license" : [ {
    "@id" : "https://creativecommons.org/licenses/by/4.0/"
  } ],
  "http://www.w3.org/1999/02/22-rdf-syntax-ns#type" : [ {
    "@id" : "http://www.w3.org/2004/02/skos/core#ConceptScheme"
  }, {
    "@id" : "http://www.w3.org/ns/dcat#Distribution"
  } ],
  "http://www.w3.org/2000/01/rdf-schema#comment" : [ {
    "@language" : "en",
    "@value" : "This taxonomy defines cybersecurity terms, taken from ISO and NIST documents, that are used to model this domain on the ARK Platform. Due to copyright restrictions, no definitions are provided for ISO terms."
  } ],
  "http://www.w3.org/2000/01/rdf-schema#label" : [ {
    "@language" : "en",
    "@value" : "ARK Cybersecurity Terminology"
  } ],
  "http://www.w3.org/2002/07/owl#versionInfo" : [ {
    "@value" : "0.1"
  } ],
  "http://www.w3.org/2003/06/sw-vocab-status/ns#status" : [ {
    "@id" : "http://www.w3.org/2003/06/sw-vocab-status/ns#unstable"
  } ],
  "http://www.w3.org/2004/02/skos/core#prefLabel" : [ {
    "@language" : "en",
    "@value" : "ARK Cybersecurity Terminology"
  } ],
  "http://www.w3.org/ns/dcat#accessURL" : [ {
    "@id" : "https://openark.adaptcentre.ie/Ontologies/ARKControlOntology/ontology.ttl"
  } ],
  "http://www.w3.org/ns/dcat#byteSize" : [ {
    "@value" : "250KB"
  } ],
  "http://www.w3.org/ns/dcat#downloadURL" : [ {
    "@id" : "https://openark.adaptcentre.ie/Ontologies/ARKControlOntology/ontology.ttl"
  } ],
  "https://w3id.org/widoco/vocab#introduction" : [ {
    "@language" : "en",
    "@value" : "This taxonomy defines cybersecurity terms, taken from ISO and NIST documents, that are used to model this domain on the ARK Platform. Due to copyright restrictions, no definitions are provided for ISO terms."
  } ],
  "https://w3id.org/widoco/vocab#rdfxmlSerialization" : [ {
    "@id" : "https://openark.adaptcentre.ie/Ontologies/ARKControlOntology/ontology.ttl"
  } ]
}, {
  "@id" : "https://openark.adaptcentre.ie/Ontologies/ARKControlTerminology#AccessControl",
  "@type" : [ "http://www.w3.org/2002/07/owl#NamedIndividual" ],
  "http://purl.org/dc/terms/contributor" : [ {
    "@value" : "Junli Liang"
  }, {
    "@value" : "Rob Brennan"
  } ],
  "http://purl.org/dc/terms/created" : [ {
    "@type" : "http://www.w3.org/2001/XMLSchema#date",
    "@value" : "2024-04-08"
  } ],
  "http://purl.org/dc/terms/source" : [ {
    "@value" : "ISO27000:2018"
  } ],
  "http://www.w3.org/1999/02/22-rdf-syntax-ns#type" : [ {
    "@id" : "http://www.w3.org/2004/02/skos/core#Concept"
  } ],
  "http://www.w3.org/2000/01/rdf-schema#comment" : [ {
    "@language" : "en",
    "@value" : "means to ensure that access to assets is authorized and restricted based on business and security requirements"
  } ],
  "http://www.w3.org/2000/01/rdf-schema#isDefinedBy" : [ {
    "@id" : "https://openark.adaptcentre.ie/Ontologies/ARKControlTerminology#"
  } ],
  "http://www.w3.org/2000/01/rdf-schema#label" : [ {
    "@language" : "en",
    "@value" : "Access control"
  } ],
  "http://www.w3.org/2004/02/skos/core#broader" : [ {
    "@id" : "https://openark.adaptcentre.ie/Ontologies/ARKControlTerminology#InformationSecurity"
  } ],
  "http://www.w3.org/2004/02/skos/core#definition" : [ {
    "@language" : "en",
    "@value" : "means to ensure that access to assets is authorized and restricted based on business and security requirements"
  } ],
  "http://www.w3.org/2004/02/skos/core#inScheme" : [ {
    "@id" : "https://openark.adaptcentre.ie/Ontologies/ARKControlTerminology#"
  } ],
  "http://www.w3.org/2004/02/skos/core#prefLabel" : [ {
    "@language" : "en",
    "@value" : "Access control"
  } ]
}, {
  "@id" : "https://openark.adaptcentre.ie/Ontologies/ARKControlTerminology#ApplicationSecurity",
  "@type" : [ "http://www.w3.org/2002/07/owl#NamedIndividual" ],
  "http://purl.org/dc/terms/contributor" : [ {
    "@value" : "Junli Liang"
  }, {
    "@value" : "Rob Brennan"
  } ],
  "http://purl.org/dc/terms/created" : [ {
    "@type" : "http://www.w3.org/2001/XMLSchema#date",
    "@value" : "2024-03-14"
  } ],
  "http://purl.org/dc/terms/source" : [ {
    "@value" : "ISO/IEC 27002:2022(E)"
  } ],
  "http://www.w3.org/1999/02/22-rdf-syntax-ns#type" : [ {
    "@id" : "http://www.w3.org/2004/02/skos/core#Concept"
  } ],
  "http://www.w3.org/2000/01/rdf-schema#comment" : [ {
    "@language" : "en",
    "@value" : "includes all tasks that introduce a secure software development life cycle to development teams. Its final goal is to improve security practices and, through that, to find, fix and preferably prevent security issues within applications."
  } ],
  "http://www.w3.org/2000/01/rdf-schema#isDefinedBy" : [ {
    "@id" : "https://openark.adaptcentre.ie/Ontologies/ARKControlTerminology#"
  } ],
  "http://www.w3.org/2000/01/rdf-schema#label" : [ {
    "@language" : "en",
    "@value" : "Application security"
  } ],
  "http://www.w3.org/2004/02/skos/core#definition" : [ {
    "@language" : "en",
    "@value" : "includes all tasks that introduce a secure software development life cycle to development teams. Its final goal is to improve security practices and, through that, to find, fix and preferably prevent security issues within applications."
  } ],
  "http://www.w3.org/2004/02/skos/core#inScheme" : [ {
    "@id" : "https://openark.adaptcentre.ie/Ontologies/ARKControlTerminology#"
  } ],
  "http://www.w3.org/2004/02/skos/core#prefLabel" : [ {
    "@language" : "en",
    "@value" : "Application security"
  } ]
}, {
  "@id" : "https://openark.adaptcentre.ie/Ontologies/ARKControlTerminology#AssetManagement",
  "@type" : [ "http://www.w3.org/2002/07/owl#NamedIndividual" ],
  "http://purl.org/dc/terms/contributor" : [ {
    "@value" : "Junli Liang"
  }, {
    "@value" : "Rob Brennan"
  } ],
  "http://purl.org/dc/terms/created" : [ {
    "@type" : "http://www.w3.org/2001/XMLSchema#date",
    "@value" : "2024-03-14"
  } ],
  "http://purl.org/dc/terms/source" : [ {
    "@value" : "ISO/IEC 27002:2022(E)"
  } ],
  "http://www.w3.org/1999/02/22-rdf-syntax-ns#type" : [ {
    "@id" : "http://www.w3.org/2004/02/skos/core#Concept"
  } ],
  "http://www.w3.org/2000/01/rdf-schema#comment" : [ {
    "@language" : "en",
    "@value" : "An ISCM capability that identifies unauthorized software or unmanaged devices that are likely to be used by attackers as a platform from which to extend compromise of the network to be mitigated."
  } ],
  "http://www.w3.org/2000/01/rdf-schema#isDefinedBy" : [ {
    "@id" : "https://openark.adaptcentre.ie/Ontologies/ARKControlTerminology#"
  } ],
  "http://www.w3.org/2000/01/rdf-schema#label" : [ {
    "@language" : "en",
    "@value" : "Asset management"
  } ],
  "http://www.w3.org/2004/02/skos/core#definition" : [ {
    "@language" : "en",
    "@value" : "An ISCM capability that identifies unauthorized software or unmanaged devices that are likely to be used by attackers as a platform from which to extend compromise of the network to be mitigated."
  } ],
  "http://www.w3.org/2004/02/skos/core#inScheme" : [ {
    "@id" : "https://openark.adaptcentre.ie/Ontologies/ARKControlTerminology#"
  } ],
  "http://www.w3.org/2004/02/skos/core#prefLabel" : [ {
    "@language" : "en",
    "@value" : "Asset management"
  } ]
}, {
  "@id" : "https://openark.adaptcentre.ie/Ontologies/ARKControlTerminology#Attack",
  "@type" : [ "http://www.w3.org/2002/07/owl#NamedIndividual" ],
  "http://purl.org/dc/terms/contributor" : [ {
    "@value" : "Junli Liang"
  }, {
    "@value" : "Rob Brennan"
  } ],
  "http://purl.org/dc/terms/created" : [ {
    "@type" : "http://www.w3.org/2001/XMLSchema#date",
    "@value" : "2024-04-08"
  } ],
  "http://purl.org/dc/terms/source" : [ {
    "@value" : "ISO27000:2018"
  } ],
  "http://www.w3.org/1999/02/22-rdf-syntax-ns#type" : [ {
    "@id" : "http://www.w3.org/2004/02/skos/core#Concept"
  } ],
  "http://www.w3.org/2000/01/rdf-schema#comment" : [ {
    "@language" : "en",
    "@value" : "attempt to destroy, expose, alter, disable, steal or gain unauthorized access to or make unauthorized use of an asset."
  } ],
  "http://www.w3.org/2000/01/rdf-schema#isDefinedBy" : [ {
    "@id" : "https://openark.adaptcentre.ie/Ontologies/ARKControlTerminology#"
  } ],
  "http://www.w3.org/2000/01/rdf-schema#label" : [ {
    "@language" : "en",
    "@value" : "Attack"
  } ],
  "http://www.w3.org/2004/02/skos/core#broader" : [ {
    "@id" : "https://openark.adaptcentre.ie/Ontologies/ARKControlTerminology#InformationSecurityIncident"
  } ],
  "http://www.w3.org/2004/02/skos/core#definition" : [ {
    "@language" : "en",
    "@value" : "attempt to destroy, expose, alter, disable, steal or gain unauthorized access to or make unauthorized use of an asset."
  } ],
  "http://www.w3.org/2004/02/skos/core#inScheme" : [ {
    "@id" : "https://openark.adaptcentre.ie/Ontologies/ARKControlTerminology#"
  } ],
  "http://www.w3.org/2004/02/skos/core#prefLabel" : [ {
    "@language" : "en",
    "@value" : "Attack"
  } ]
}, {
  "@id" : "https://openark.adaptcentre.ie/Ontologies/ARKControlTerminology#Audit",
  "@type" : [ "http://www.w3.org/2002/07/owl#NamedIndividual" ],
  "http://purl.org/dc/terms/contributor" : [ {
    "@value" : "Junli Liang"
  }, {
    "@value" : "Rob Brennan"
  } ],
  "http://purl.org/dc/terms/created" : [ {
    "@type" : "http://www.w3.org/2001/XMLSchema#date",
    "@value" : "2024-04-08"
  } ],
  "http://purl.org/dc/terms/source" : [ {
    "@value" : "ISO27000:2018"
  } ],
  "http://www.w3.org/1999/02/22-rdf-syntax-ns#type" : [ {
    "@id" : "http://www.w3.org/2004/02/skos/core#Concept"
  } ],
  "http://www.w3.org/2000/01/rdf-schema#comment" : [ {
    "@language" : "en",
    "@value" : "systematic, independent and documented process (3.54) for obtaining audit evidence and evaluating it objectively to determine the extent to which the audit criteria are fulfilled Note 1 to entry: An audit can be an internal audit (first party) or an external audit (second party or third party), and it can be a combined audit (combining two or more disciplines). Note 2 to entry: An internal audit is conducted by the organization itself, or by an external party on its behalf. Note 3 to entry: “Audit evidence” and “audit criteria” are defined in ISO 19011."
  } ],
  "http://www.w3.org/2000/01/rdf-schema#isDefinedBy" : [ {
    "@id" : "https://openark.adaptcentre.ie/Ontologies/ARKControlTerminology#"
  } ],
  "http://www.w3.org/2000/01/rdf-schema#label" : [ {
    "@language" : "en",
    "@value" : "Audit"
  } ],
  "http://www.w3.org/2004/02/skos/core#definition" : [ {
    "@language" : "en",
    "@value" : "systematic, independent and documented process (3.54) for obtaining audit evidence and evaluating it objectively to determine the extent to which the audit criteria are fulfilled Note 1 to entry: An audit can be an internal audit (first party) or an external audit (second party or third party), and it can be a combined audit (combining two or more disciplines). Note 2 to entry: An internal audit is conducted by the organization itself, or by an external party on its behalf. Note 3 to entry: “Audit evidence” and “audit criteria” are defined in ISO 19011."
  } ],
  "http://www.w3.org/2004/02/skos/core#inScheme" : [ {
    "@id" : "https://openark.adaptcentre.ie/Ontologies/ARKControlTerminology#"
  } ],
  "http://www.w3.org/2004/02/skos/core#narrower" : [ {
    "@id" : "https://openark.adaptcentre.ie/Ontologies/ARKControlTerminology#CombinedAudit"
  }, {
    "@id" : "https://openark.adaptcentre.ie/Ontologies/ARKControlTerminology#ExternalAudit"
  }, {
    "@id" : "https://openark.adaptcentre.ie/Ontologies/ARKControlTerminology#InternalAudit"
  } ],
  "http://www.w3.org/2004/02/skos/core#prefLabel" : [ {
    "@language" : "en",
    "@value" : "Audit"
  } ]
}, {
  "@id" : "https://openark.adaptcentre.ie/Ontologies/ARKControlTerminology#AuditScope",
  "@type" : [ "http://www.w3.org/2002/07/owl#NamedIndividual" ],
  "http://purl.org/dc/terms/contributor" : [ {
    "@value" : "Junli Liang"
  }, {
    "@value" : "Rob Brennan"
  } ],
  "http://purl.org/dc/terms/created" : [ {
    "@type" : "http://www.w3.org/2001/XMLSchema#date",
    "@value" : "2024-04-08"
  } ],
  "http://purl.org/dc/terms/source" : [ {
    "@value" : "ISO27000:2018"
  } ],
  "http://www.w3.org/1999/02/22-rdf-syntax-ns#type" : [ {
    "@id" : "http://www.w3.org/2004/02/skos/core#Concept"
  } ],
  "http://www.w3.org/2000/01/rdf-schema#comment" : [ {
    "@language" : "en",
    "@value" : "extent and boundaries of an audit (3.3)"
  } ],
  "http://www.w3.org/2000/01/rdf-schema#isDefinedBy" : [ {
    "@id" : "https://openark.adaptcentre.ie/Ontologies/ARKControlTerminology#"
  } ],
  "http://www.w3.org/2000/01/rdf-schema#label" : [ {
    "@language" : "en",
    "@value" : "Audit scope"
  } ],
  "http://www.w3.org/2004/02/skos/core#broader" : [ {
    "@id" : "https://openark.adaptcentre.ie/Ontologies/ARKControlTerminology#Audit"
  } ],
  "http://www.w3.org/2004/02/skos/core#definition" : [ {
    "@language" : "en",
    "@value" : "extent and boundaries of an audit (3.3)"
  } ],
  "http://www.w3.org/2004/02/skos/core#inScheme" : [ {
    "@id" : "https://openark.adaptcentre.ie/Ontologies/ARKControlTerminology#"
  } ],
  "http://www.w3.org/2004/02/skos/core#prefLabel" : [ {
    "@language" : "en",
    "@value" : "Audit scope"
  } ]
}, {
  "@id" : "https://openark.adaptcentre.ie/Ontologies/ARKControlTerminology#Authentication",
  "@type" : [ "http://www.w3.org/2002/07/owl#NamedIndividual" ],
  "http://purl.org/dc/terms/contributor" : [ {
    "@value" : "Junli Liang"
  }, {
    "@value" : "Rob Brennan"
  } ],
  "http://purl.org/dc/terms/created" : [ {
    "@type" : "http://www.w3.org/2001/XMLSchema#date",
    "@value" : "2024-04-08"
  } ],
  "http://purl.org/dc/terms/source" : [ {
    "@value" : "ISO27000:2018"
  } ],
  "http://www.w3.org/1999/02/22-rdf-syntax-ns#type" : [ {
    "@id" : "http://www.w3.org/2004/02/skos/core#Concept"
  } ],
  "http://www.w3.org/2000/01/rdf-schema#comment" : [ {
    "@language" : "en",
    "@value" : "provision of assurance that a claimed characteristic of an entity is correct."
  } ],
  "http://www.w3.org/2000/01/rdf-schema#isDefinedBy" : [ {
    "@id" : "https://openark.adaptcentre.ie/Ontologies/ARKControlTerminology#"
  } ],
  "http://www.w3.org/2000/01/rdf-schema#label" : [ {
    "@language" : "en",
    "@value" : "Authentication"
  } ],
  "http://www.w3.org/2004/02/skos/core#broader" : [ {
    "@id" : "https://openark.adaptcentre.ie/Ontologies/ARKControlTerminology#InformationSecurity"
  } ],
  "http://www.w3.org/2004/02/skos/core#definition" : [ {
    "@language" : "en",
    "@value" : "provision of assurance that a claimed characteristic of an entity is correct."
  } ],
  "http://www.w3.org/2004/02/skos/core#inScheme" : [ {
    "@id" : "https://openark.adaptcentre.ie/Ontologies/ARKControlTerminology#"
  } ],
  "http://www.w3.org/2004/02/skos/core#prefLabel" : [ {
    "@language" : "en",
    "@value" : "Authentication"
  } ]
}, {
  "@id" : "https://openark.adaptcentre.ie/Ontologies/ARKControlTerminology#Authenticity",
  "@type" : [ "http://www.w3.org/2002/07/owl#NamedIndividual" ],
  "http://purl.org/dc/terms/contributor" : [ {
    "@value" : "Junli Liang"
  }, {
    "@value" : "Rob Brennan"
  } ],
  "http://purl.org/dc/terms/created" : [ {
    "@type" : "http://www.w3.org/2001/XMLSchema#date",
    "@value" : "2024-04-08"
  } ],
  "http://purl.org/dc/terms/source" : [ {
    "@value" : "ISO27000:2018"
  } ],
  "http://www.w3.org/1999/02/22-rdf-syntax-ns#type" : [ {
    "@id" : "http://www.w3.org/2004/02/skos/core#Concept"
  } ],
  "http://www.w3.org/2000/01/rdf-schema#comment" : [ {
    "@language" : "en",
    "@value" : "property that an entity is what it claims to be."
  } ],
  "http://www.w3.org/2000/01/rdf-schema#isDefinedBy" : [ {
    "@id" : "https://openark.adaptcentre.ie/Ontologies/ARKControlTerminology#"
  } ],
  "http://www.w3.org/2000/01/rdf-schema#label" : [ {
    "@language" : "en",
    "@value" : "Authenticity"
  } ],
  "http://www.w3.org/2004/02/skos/core#broader" : [ {
    "@id" : "https://openark.adaptcentre.ie/Ontologies/ARKControlTerminology#InformationSecurity"
  } ],
  "http://www.w3.org/2004/02/skos/core#definition" : [ {
    "@language" : "en",
    "@value" : "property that an entity is what it claims to be."
  } ],
  "http://www.w3.org/2004/02/skos/core#inScheme" : [ {
    "@id" : "https://openark.adaptcentre.ie/Ontologies/ARKControlTerminology#"
  } ],
  "http://www.w3.org/2004/02/skos/core#prefLabel" : [ {
    "@language" : "en",
    "@value" : "Authenticity"
  } ]
}, {
  "@id" : "https://openark.adaptcentre.ie/Ontologies/ARKControlTerminology#Availability",
  "@type" : [ "http://www.w3.org/2002/07/owl#NamedIndividual" ],
  "http://purl.org/dc/terms/contributor" : [ {
    "@value" : "Junli Liang"
  }, {
    "@value" : "Rob Brennan"
  } ],
  "http://purl.org/dc/terms/created" : [ {
    "@type" : "http://www.w3.org/2001/XMLSchema#date",
    "@value" : "2024-03-14"
  }, {
    "@type" : "http://www.w3.org/2001/XMLSchema#date",
    "@value" : "2024-04-08"
  } ],
  "http://purl.org/dc/terms/source" : [ {
    "@value" : "ISO/IEC 27002:2022(E)"
  }, {
    "@value" : "ISO27000:2018"
  } ],
  "http://www.w3.org/1999/02/22-rdf-syntax-ns#type" : [ {
    "@id" : "http://www.w3.org/2004/02/skos/core#Concept"
  } ],
  "http://www.w3.org/2000/01/rdf-schema#comment" : [ {
    "@language" : "en",
    "@value" : "Ensuring timely and reliable access to and use of information."
  }, {
    "@language" : "en",
    "@value" : "property of being accessible and usable on demand by an authorized entity."
  } ],
  "http://www.w3.org/2000/01/rdf-schema#isDefinedBy" : [ {
    "@id" : "https://openark.adaptcentre.ie/Ontologies/ARKControlTerminology#"
  } ],
  "http://www.w3.org/2000/01/rdf-schema#label" : [ {
    "@language" : "en",
    "@value" : "Availability"
  } ],
  "http://www.w3.org/2004/02/skos/core#broader" : [ {
    "@id" : "https://openark.adaptcentre.ie/Ontologies/ARKControlTerminology#InformationSecurity"
  } ],
  "http://www.w3.org/2004/02/skos/core#definition" : [ {
    "@language" : "en",
    "@value" : "Ensuring timely and reliable access to and use of information."
  }, {
    "@language" : "en",
    "@value" : "property of being accessible and usable on demand by an authorized entity."
  } ],
  "http://www.w3.org/2004/02/skos/core#inScheme" : [ {
    "@id" : "https://openark.adaptcentre.ie/Ontologies/ARKControlTerminology#"
  } ],
  "http://www.w3.org/2004/02/skos/core#prefLabel" : [ {
    "@language" : "en",
    "@value" : "Availability"
  } ]
}, {
  "@id" : "https://openark.adaptcentre.ie/Ontologies/ARKControlTerminology#BaseMeasure",
  "@type" : [ "http://www.w3.org/2002/07/owl#NamedIndividual" ],
  "http://purl.org/dc/terms/contributor" : [ {
    "@value" : "Junli Liang"
  }, {
    "@value" : "Rob Brennan"
  } ],
  "http://purl.org/dc/terms/created" : [ {
    "@type" : "http://www.w3.org/2001/XMLSchema#date",
    "@value" : "2024-04-08"
  } ],
  "http://purl.org/dc/terms/source" : [ {
    "@value" : "ISO27000:2018"
  } ],
  "http://www.w3.org/1999/02/22-rdf-syntax-ns#type" : [ {
    "@id" : "http://www.w3.org/2004/02/skos/core#Concept"
  } ],
  "http://www.w3.org/2000/01/rdf-schema#comment" : [ {
    "@language" : "en",
    "@value" : "measure (3.42) defined in terms of an attribute and the method for quantifying it Note 1 to entry: A base measure is functionally independent of other measures."
  } ],
  "http://www.w3.org/2000/01/rdf-schema#isDefinedBy" : [ {
    "@id" : "https://openark.adaptcentre.ie/Ontologies/ARKControlTerminology#"
  } ],
  "http://www.w3.org/2000/01/rdf-schema#label" : [ {
    "@language" : "en",
    "@value" : "Base measure"
  } ],
  "http://www.w3.org/2004/02/skos/core#broader" : [ {
    "@id" : "https://openark.adaptcentre.ie/Ontologies/ARKControlTerminology#Measure"
  } ],
  "http://www.w3.org/2004/02/skos/core#definition" : [ {
    "@language" : "en",
    "@value" : "measure (3.42) defined in terms of an attribute and the method for quantifying it Note 1 to entry: A base measure is functionally independent of other measures."
  } ],
  "http://www.w3.org/2004/02/skos/core#inScheme" : [ {
    "@id" : "https://openark.adaptcentre.ie/Ontologies/ARKControlTerminology#"
  } ],
  "http://www.w3.org/2004/02/skos/core#prefLabel" : [ {
    "@language" : "en",
    "@value" : "Base measure"
  } ]
}, {
  "@id" : "https://openark.adaptcentre.ie/Ontologies/ARKControlTerminology#CapabilitiesContext",
  "@type" : [ "http://www.w3.org/2002/07/owl#NamedIndividual" ],
  "http://purl.org/dc/terms/contributor" : [ {
    "@value" : "Junli Liang"
  }, {
    "@value" : "Rob Brennan"
  } ],
  "http://purl.org/dc/terms/created" : [ {
    "@type" : "http://www.w3.org/2001/XMLSchema#date",
    "@value" : "2024-04-08"
  } ],
  "http://purl.org/dc/terms/source" : [ {
    "@value" : "ISO27000:2030"
  } ],
  "http://www.w3.org/1999/02/22-rdf-syntax-ns#type" : [ {
    "@id" : "http://www.w3.org/2004/02/skos/core#Concept"
  } ],
  "http://www.w3.org/2000/01/rdf-schema#comment" : [ {
    "@language" : "en",
    "@value" : "Context capabilities are essential capabilities to get things done for a company. The context capabilities constitute the transactional services that typically are under the radar but surface when they do not work well. For example, Finance and Accounting are context capabilities for most companies."
  } ],
  "http://www.w3.org/2000/01/rdf-schema#isDefinedBy" : [ {
    "@id" : "https://openark.adaptcentre.ie/Ontologies/ARKControlTerminology#"
  } ],
  "http://www.w3.org/2000/01/rdf-schema#label" : [ {
    "@language" : "en",
    "@value" : "Capabilities context"
  } ],
  "http://www.w3.org/2004/02/skos/core#definition" : [ {
    "@language" : "en",
    "@value" : "Context capabilities are essential capabilities to get things done for a company. The context capabilities constitute the transactional services that typically are under the radar but surface when they do not work well. For example, Finance and Accounting are context capabilities for most companies."
  } ],
  "http://www.w3.org/2004/02/skos/core#inScheme" : [ {
    "@id" : "https://openark.adaptcentre.ie/Ontologies/ARKControlTerminology#"
  } ],
  "http://www.w3.org/2004/02/skos/core#prefLabel" : [ {
    "@language" : "en",
    "@value" : "Capabilities context"
  } ]
}, {
  "@id" : "https://openark.adaptcentre.ie/Ontologies/ARKControlTerminology#CombinedAudit",
  "@type" : [ "http://www.w3.org/2002/07/owl#NamedIndividual" ],
  "http://purl.org/dc/terms/contributor" : [ {
    "@value" : "Junli Liang"
  }, {
    "@value" : "Rob Brennan"
  } ],
  "http://purl.org/dc/terms/created" : [ {
    "@type" : "http://www.w3.org/2001/XMLSchema#date",
    "@value" : "2024-04-08"
  } ],
  "http://purl.org/dc/terms/source" : [ {
    "@value" : "ISO27000:2021"
  } ],
  "http://www.w3.org/1999/02/22-rdf-syntax-ns#type" : [ {
    "@id" : "http://www.w3.org/2004/02/skos/core#Concept"
  } ],
  "http://www.w3.org/2000/01/rdf-schema#comment" : [ {
    "@language" : "en",
    "@value" : "A combined audit is an efficient and cost-effective approach for organizations seeking to comply with multiple standards or regulatory requirements."
  } ],
  "http://www.w3.org/2000/01/rdf-schema#isDefinedBy" : [ {
    "@id" : "https://openark.adaptcentre.ie/Ontologies/ARKControlTerminology#"
  } ],
  "http://www.w3.org/2000/01/rdf-schema#label" : [ {
    "@language" : "en",
    "@value" : "Combined audit"
  } ],
  "http://www.w3.org/2004/02/skos/core#definition" : [ {
    "@language" : "en",
    "@value" : "A combined audit is an efficient and cost-effective approach for organizations seeking to comply with multiple standards or regulatory requirements."
  } ],
  "http://www.w3.org/2004/02/skos/core#inScheme" : [ {
    "@id" : "https://openark.adaptcentre.ie/Ontologies/ARKControlTerminology#"
  } ],
  "http://www.w3.org/2004/02/skos/core#prefLabel" : [ {
    "@language" : "en",
    "@value" : "Combined audit"
  } ]
}, {
  "@id" : "https://openark.adaptcentre.ie/Ontologies/ARKControlTerminology#Competence",
  "@type" : [ "http://www.w3.org/2002/07/owl#NamedIndividual" ],
  "http://purl.org/dc/terms/contributor" : [ {
    "@value" : "Junli Liang"
  }, {
    "@value" : "Rob Brennan"
  } ],
  "http://purl.org/dc/terms/created" : [ {
    "@type" : "http://www.w3.org/2001/XMLSchema#date",
    "@value" : "2024-04-08"
  } ],
  "http://purl.org/dc/terms/source" : [ {
    "@value" : "ISO27000:2018"
  } ],
  "http://www.w3.org/1999/02/22-rdf-syntax-ns#type" : [ {
    "@id" : "http://www.w3.org/2004/02/skos/core#Concept"
  } ],
  "http://www.w3.org/2000/01/rdf-schema#comment" : [ {
    "@language" : "en",
    "@value" : "ability to apply knowledge and skills to achieve intended results."
  } ],
  "http://www.w3.org/2000/01/rdf-schema#isDefinedBy" : [ {
    "@id" : "https://openark.adaptcentre.ie/Ontologies/ARKControlTerminology#"
  } ],
  "http://www.w3.org/2000/01/rdf-schema#label" : [ {
    "@language" : "en",
    "@value" : "Competence"
  } ],
  "http://www.w3.org/2004/02/skos/core#definition" : [ {
    "@language" : "en",
    "@value" : "ability to apply knowledge and skills to achieve intended results."
  } ],
  "http://www.w3.org/2004/02/skos/core#inScheme" : [ {
    "@id" : "https://openark.adaptcentre.ie/Ontologies/ARKControlTerminology#"
  } ],
  "http://www.w3.org/2004/02/skos/core#prefLabel" : [ {
    "@language" : "en",
    "@value" : "Competence"
  } ]
}, {
  "@id" : "https://openark.adaptcentre.ie/Ontologies/ARKControlTerminology#CompetitiveEnvironment",
  "@type" : [ "http://www.w3.org/2002/07/owl#NamedIndividual" ],
  "http://purl.org/dc/terms/contributor" : [ {
    "@value" : "Junli Liang"
  }, {
    "@value" : "Rob Brennan"
  } ],
  "http://purl.org/dc/terms/created" : [ {
    "@type" : "http://www.w3.org/2001/XMLSchema#date",
    "@value" : "2024-04-08"
  } ],
  "http://purl.org/dc/terms/source" : [ {
    "@value" : "ISO27000:2024"
  } ],
  "http://www.w3.org/1999/02/22-rdf-syntax-ns#type" : [ {
    "@id" : "http://www.w3.org/2004/02/skos/core#Concept"
  } ],
  "http://www.w3.org/2000/01/rdf-schema#comment" : [ {
    "@language" : "en",
    "@value" : "landscape in which various organizations, service providers, and technology developers operate, compete, and collaborate to offer cybersecurity solutions and services."
  } ],
  "http://www.w3.org/2000/01/rdf-schema#isDefinedBy" : [ {
    "@id" : "https://openark.adaptcentre.ie/Ontologies/ARKControlTerminology#"
  } ],
  "http://www.w3.org/2000/01/rdf-schema#label" : [ {
    "@language" : "en",
    "@value" : "Competitive environment"
  } ],
  "http://www.w3.org/2004/02/skos/core#definition" : [ {
    "@language" : "en",
    "@value" : "landscape in which various organizations, service providers, and technology developers operate, compete, and collaborate to offer cybersecurity solutions and services."
  } ],
  "http://www.w3.org/2004/02/skos/core#inScheme" : [ {
    "@id" : "https://openark.adaptcentre.ie/Ontologies/ARKControlTerminology#"
  } ],
  "http://www.w3.org/2004/02/skos/core#prefLabel" : [ {
    "@language" : "en",
    "@value" : "Competitive environment"
  } ]
}, {
  "@id" : "https://openark.adaptcentre.ie/Ontologies/ARKControlTerminology#Confidentiality",
  "@type" : [ "http://www.w3.org/2002/07/owl#NamedIndividual" ],
  "http://purl.org/dc/terms/contributor" : [ {
    "@value" : "Junli Liang"
  }, {
    "@value" : "Rob Brennan"
  } ],
  "http://purl.org/dc/terms/created" : [ {
    "@type" : "http://www.w3.org/2001/XMLSchema#date",
    "@value" : "2024-03-14"
  }, {
    "@type" : "http://www.w3.org/2001/XMLSchema#date",
    "@value" : "2024-04-08"
  } ],
  "http://purl.org/dc/terms/source" : [ {
    "@value" : "ISO/IEC 27002:2022(E)"
  }, {
    "@value" : "ISO27000:2018"
  } ],
  "http://www.w3.org/1999/02/22-rdf-syntax-ns#type" : [ {
    "@id" : "http://www.w3.org/2004/02/skos/core#Concept"
  } ],
  "http://www.w3.org/2000/01/rdf-schema#comment" : [ {
    "@language" : "en",
    "@value" : "Preserving authorized restrictions on information access and disclosure, including means for protecting personal privacy and proprietary information."
  }, {
    "@language" : "en",
    "@value" : "property that information is not made available or disclosed to unauthorized individuals, entities, or processes (3.54)"
  } ],
  "http://www.w3.org/2000/01/rdf-schema#isDefinedBy" : [ {
    "@id" : "https://openark.adaptcentre.ie/Ontologies/ARKControlTerminology#"
  } ],
  "http://www.w3.org/2000/01/rdf-schema#label" : [ {
    "@language" : "en",
    "@value" : "Confidentiality"
  } ],
  "http://www.w3.org/2004/02/skos/core#broader" : [ {
    "@id" : "https://openark.adaptcentre.ie/Ontologies/ARKControlTerminology#InformationSecurity"
  } ],
  "http://www.w3.org/2004/02/skos/core#definition" : [ {
    "@language" : "en",
    "@value" : "Preserving authorized restrictions on information access and disclosure, including means for protecting personal privacy and proprietary information."
  }, {
    "@language" : "en",
    "@value" : "property that information is not made available or disclosed to unauthorized individuals, entities, or processes (3.54)"
  } ],
  "http://www.w3.org/2004/02/skos/core#inScheme" : [ {
    "@id" : "https://openark.adaptcentre.ie/Ontologies/ARKControlTerminology#"
  } ],
  "http://www.w3.org/2004/02/skos/core#prefLabel" : [ {
    "@language" : "en",
    "@value" : "Confidentiality"
  } ]
}, {
  "@id" : "https://openark.adaptcentre.ie/Ontologies/ARKControlTerminology#Conformity",
  "@type" : [ "http://www.w3.org/2002/07/owl#NamedIndividual" ],
  "http://purl.org/dc/terms/contributor" : [ {
    "@value" : "Junli Liang"
  }, {
    "@value" : "Rob Brennan"
  } ],
  "http://purl.org/dc/terms/created" : [ {
    "@type" : "http://www.w3.org/2001/XMLSchema#date",
    "@value" : "2024-04-08"
  } ],
  "http://purl.org/dc/terms/source" : [ {
    "@value" : "ISO27000:2018"
  } ],
  "http://www.w3.org/1999/02/22-rdf-syntax-ns#type" : [ {
    "@id" : "http://www.w3.org/2004/02/skos/core#Concept"
  } ],
  "http://www.w3.org/2000/01/rdf-schema#comment" : [ {
    "@language" : "en",
    "@value" : "fulfilment of a requirement (3.56)"
  } ],
  "http://www.w3.org/2000/01/rdf-schema#isDefinedBy" : [ {
    "@id" : "https://openark.adaptcentre.ie/Ontologies/ARKControlTerminology#"
  } ],
  "http://www.w3.org/2000/01/rdf-schema#label" : [ {
    "@language" : "en",
    "@value" : "Conformity"
  } ],
  "http://www.w3.org/2004/02/skos/core#broader" : [ {
    "@id" : "https://openark.adaptcentre.ie/Ontologies/ARKControlTerminology#Requirement"
  } ],
  "http://www.w3.org/2004/02/skos/core#definition" : [ {
    "@language" : "en",
    "@value" : "fulfilment of a requirement (3.56)"
  } ],
  "http://www.w3.org/2004/02/skos/core#inScheme" : [ {
    "@id" : "https://openark.adaptcentre.ie/Ontologies/ARKControlTerminology#"
  } ],
  "http://www.w3.org/2004/02/skos/core#prefLabel" : [ {
    "@language" : "en",
    "@value" : "Conformity"
  } ]
}, {
  "@id" : "https://openark.adaptcentre.ie/Ontologies/ARKControlTerminology#Consequence",
  "@type" : [ "http://www.w3.org/2002/07/owl#NamedIndividual" ],
  "http://purl.org/dc/terms/contributor" : [ {
    "@value" : "Junli Liang"
  }, {
    "@value" : "Rob Brennan"
  } ],
  "http://purl.org/dc/terms/created" : [ {
    "@type" : "http://www.w3.org/2001/XMLSchema#date",
    "@value" : "2024-04-08"
  } ],
  "http://purl.org/dc/terms/source" : [ {
    "@value" : "ISO27000:2018"
  } ],
  "http://www.w3.org/1999/02/22-rdf-syntax-ns#type" : [ {
    "@id" : "http://www.w3.org/2004/02/skos/core#Concept"
  } ],
  "http://www.w3.org/2000/01/rdf-schema#comment" : [ {
    "@language" : "en",
    "@value" : "outcome of an event (3.21) affecting objectives (3.49) Note 1 to entry: An event can lead to a range of consequences. Note 2 to entry: A consequence can be certain or uncertain and, in the context of information security, is usually negative. Note 3 to entry: Consequences can be expressed qualitatively or quantitatively. Note 4 to entry: Initial consequences can escalate through knock-on effects."
  } ],
  "http://www.w3.org/2000/01/rdf-schema#isDefinedBy" : [ {
    "@id" : "https://openark.adaptcentre.ie/Ontologies/ARKControlTerminology#"
  } ],
  "http://www.w3.org/2000/01/rdf-schema#label" : [ {
    "@language" : "en",
    "@value" : "Consequence"
  } ],
  "http://www.w3.org/2004/02/skos/core#broader" : [ {
    "@id" : "https://openark.adaptcentre.ie/Ontologies/ARKControlTerminology#Event"
  } ],
  "http://www.w3.org/2004/02/skos/core#definition" : [ {
    "@language" : "en",
    "@value" : "outcome of an event (3.21) affecting objectives (3.49) Note 1 to entry: An event can lead to a range of consequences. Note 2 to entry: A consequence can be certain or uncertain and, in the context of information security, is usually negative. Note 3 to entry: Consequences can be expressed qualitatively or quantitatively. Note 4 to entry: Initial consequences can escalate through knock-on effects."
  } ],
  "http://www.w3.org/2004/02/skos/core#inScheme" : [ {
    "@id" : "https://openark.adaptcentre.ie/Ontologies/ARKControlTerminology#"
  } ],
  "http://www.w3.org/2004/02/skos/core#prefLabel" : [ {
    "@language" : "en",
    "@value" : "Consequence"
  } ]
}, {
  "@id" : "https://openark.adaptcentre.ie/Ontologies/ARKControlTerminology#ContinualImprovement",
  "@type" : [ "http://www.w3.org/2002/07/owl#NamedIndividual" ],
  "http://purl.org/dc/terms/contributor" : [ {
    "@value" : "Junli Liang"
  }, {
    "@value" : "Rob Brennan"
  } ],
  "http://purl.org/dc/terms/created" : [ {
    "@type" : "http://www.w3.org/2001/XMLSchema#date",
    "@value" : "2024-04-08"
  } ],
  "http://purl.org/dc/terms/source" : [ {
    "@value" : "ISO27000:2018"
  } ],
  "http://www.w3.org/1999/02/22-rdf-syntax-ns#type" : [ {
    "@id" : "http://www.w3.org/2004/02/skos/core#Concept"
  } ],
  "http://www.w3.org/2000/01/rdf-schema#comment" : [ {
    "@language" : "en",
    "@value" : "recurring activity to enhance performance (3.52)"
  } ],
  "http://www.w3.org/2000/01/rdf-schema#isDefinedBy" : [ {
    "@id" : "https://openark.adaptcentre.ie/Ontologies/ARKControlTerminology#"
  } ],
  "http://www.w3.org/2000/01/rdf-schema#label" : [ {
    "@language" : "en",
    "@value" : "Continual improvement"
  } ],
  "http://www.w3.org/2004/02/skos/core#broader" : [ {
    "@id" : "https://openark.adaptcentre.ie/Ontologies/ARKControlTerminology#Performance"
  } ],
  "http://www.w3.org/2004/02/skos/core#definition" : [ {
    "@language" : "en",
    "@value" : "recurring activity to enhance performance (3.52)"
  } ],
  "http://www.w3.org/2004/02/skos/core#inScheme" : [ {
    "@id" : "https://openark.adaptcentre.ie/Ontologies/ARKControlTerminology#"
  } ],
  "http://www.w3.org/2004/02/skos/core#prefLabel" : [ {
    "@language" : "en",
    "@value" : "Continual improvement"
  } ]
}, {
  "@id" : "https://openark.adaptcentre.ie/Ontologies/ARKControlTerminology#Continuity",
  "@type" : [ "http://www.w3.org/2002/07/owl#NamedIndividual" ],
  "http://purl.org/dc/terms/contributor" : [ {
    "@value" : "Junli Liang"
  }, {
    "@value" : "Rob Brennan"
  } ],
  "http://purl.org/dc/terms/created" : [ {
    "@type" : "http://www.w3.org/2001/XMLSchema#date",
    "@value" : "2024-03-14"
  } ],
  "http://purl.org/dc/terms/source" : [ {
    "@value" : "ISO/IEC 27002:2022(E)"
  } ],
  "http://www.w3.org/1999/02/22-rdf-syntax-ns#type" : [ {
    "@id" : "http://www.w3.org/2004/02/skos/core#Concept"
  } ],
  "http://www.w3.org/2000/01/rdf-schema#comment" : [ {
    "@language" : "en",
    "@value" : "The probability that the specified PNT system performance will be maintained for the duration of a phase of operation, presuming that the PNT system was available at the beginning of that phase of operation."
  } ],
  "http://www.w3.org/2000/01/rdf-schema#isDefinedBy" : [ {
    "@id" : "https://openark.adaptcentre.ie/Ontologies/ARKControlTerminology#"
  } ],
  "http://www.w3.org/2000/01/rdf-schema#label" : [ {
    "@language" : "en",
    "@value" : "Continuity"
  } ],
  "http://www.w3.org/2004/02/skos/core#definition" : [ {
    "@language" : "en",
    "@value" : "The probability that the specified PNT system performance will be maintained for the duration of a phase of operation, presuming that the PNT system was available at the beginning of that phase of operation."
  } ],
  "http://www.w3.org/2004/02/skos/core#inScheme" : [ {
    "@id" : "https://openark.adaptcentre.ie/Ontologies/ARKControlTerminology#"
  } ],
  "http://www.w3.org/2004/02/skos/core#prefLabel" : [ {
    "@language" : "en",
    "@value" : "Continuity"
  } ]
}, {
  "@id" : "https://openark.adaptcentre.ie/Ontologies/ARKControlTerminology#ContractualContext",
  "@type" : [ "http://www.w3.org/2002/07/owl#NamedIndividual" ],
  "http://purl.org/dc/terms/contributor" : [ {
    "@value" : "Junli Liang"
  }, {
    "@value" : "Rob Brennan"
  } ],
  "http://purl.org/dc/terms/created" : [ {
    "@type" : "http://www.w3.org/2001/XMLSchema#date",
    "@value" : "2024-04-08"
  } ],
  "http://purl.org/dc/terms/source" : [ {
    "@value" : "ISO27000:2037"
  } ],
  "http://www.w3.org/1999/02/22-rdf-syntax-ns#type" : [ {
    "@id" : "http://www.w3.org/2004/02/skos/core#Concept"
  } ],
  "http://www.w3.org/2000/01/rdf-schema#comment" : [ {
    "@language" : "en",
    "@value" : "A contextual theory of contract law also recognizes a number of phenomena. First, contract interpretation, through the lens of context, should be used to regulate influences that question the purity of the freedom of contract upon which most agreements are based."
  } ],
  "http://www.w3.org/2000/01/rdf-schema#isDefinedBy" : [ {
    "@id" : "https://openark.adaptcentre.ie/Ontologies/ARKControlTerminology#"
  } ],
  "http://www.w3.org/2000/01/rdf-schema#label" : [ {
    "@language" : "en",
    "@value" : "Contractual Context"
  } ],
  "http://www.w3.org/2004/02/skos/core#definition" : [ {
    "@language" : "en",
    "@value" : "A contextual theory of contract law also recognizes a number of phenomena. First, contract interpretation, through the lens of context, should be used to regulate influences that question the purity of the freedom of contract upon which most agreements are based."
  } ],
  "http://www.w3.org/2004/02/skos/core#inScheme" : [ {
    "@id" : "https://openark.adaptcentre.ie/Ontologies/ARKControlTerminology#"
  } ],
  "http://www.w3.org/2004/02/skos/core#prefLabel" : [ {
    "@language" : "en",
    "@value" : "Contractual Context"
  } ]
}, {
  "@id" : "https://openark.adaptcentre.ie/Ontologies/ARKControlTerminology#Control",
  "@type" : [ "http://www.w3.org/2002/07/owl#NamedIndividual" ],
  "http://purl.org/dc/terms/contributor" : [ {
    "@value" : "Junli Liang"
  }, {
    "@value" : "Rob Brennan"
  } ],
  "http://purl.org/dc/terms/created" : [ {
    "@type" : "http://www.w3.org/2001/XMLSchema#date",
    "@value" : "2024-04-08"
  } ],
  "http://purl.org/dc/terms/source" : [ {
    "@value" : "ISO27000:2018"
  } ],
  "http://www.w3.org/1999/02/22-rdf-syntax-ns#type" : [ {
    "@id" : "http://www.w3.org/2004/02/skos/core#Concept"
  } ],
  "http://www.w3.org/2000/01/rdf-schema#comment" : [ {
    "@language" : "en",
    "@value" : "measure that is modifying risk (3.61) Note 1 to entry: Controls include any process (3.54), policy (3.53), device, practice, or other actions which modify risk (3.61). Note 2 to entry: It is possible that controls not always exert the intended or assumed modifying effect."
  } ],
  "http://www.w3.org/2000/01/rdf-schema#isDefinedBy" : [ {
    "@id" : "https://openark.adaptcentre.ie/Ontologies/ARKControlTerminology#"
  } ],
  "http://www.w3.org/2000/01/rdf-schema#label" : [ {
    "@language" : "en",
    "@value" : "Control"
  } ],
  "http://www.w3.org/2004/02/skos/core#broader" : [ {
    "@id" : "https://openark.adaptcentre.ie/Ontologies/ARKControlTerminology#Risk"
  } ],
  "http://www.w3.org/2004/02/skos/core#definition" : [ {
    "@language" : "en",
    "@value" : "measure that is modifying risk (3.61) Note 1 to entry: Controls include any process (3.54), policy (3.53), device, practice, or other actions which modify risk (3.61). Note 2 to entry: It is possible that controls not always exert the intended or assumed modifying effect."
  } ],
  "http://www.w3.org/2004/02/skos/core#inScheme" : [ {
    "@id" : "https://openark.adaptcentre.ie/Ontologies/ARKControlTerminology#"
  } ],
  "http://www.w3.org/2004/02/skos/core#prefLabel" : [ {
    "@language" : "en",
    "@value" : "Control"
  } ]
}, {
  "@id" : "https://openark.adaptcentre.ie/Ontologies/ARKControlTerminology#ControlObjective",
  "@type" : [ "http://www.w3.org/2002/07/owl#NamedIndividual" ],
  "http://purl.org/dc/terms/contributor" : [ {
    "@value" : "Junli Liang"
  }, {
    "@value" : "Rob Brennan"
  } ],
  "http://purl.org/dc/terms/created" : [ {
    "@type" : "http://www.w3.org/2001/XMLSchema#date",
    "@value" : "2024-04-08"
  } ],
  "http://purl.org/dc/terms/source" : [ {
    "@value" : "ISO27000:2018"
  } ],
  "http://www.w3.org/1999/02/22-rdf-syntax-ns#type" : [ {
    "@id" : "http://www.w3.org/2004/02/skos/core#Concept"
  } ],
  "http://www.w3.org/2000/01/rdf-schema#comment" : [ {
    "@language" : "en",
    "@value" : "statement describing what is to be achieved as a result of implementing controls (3.14)"
  } ],
  "http://www.w3.org/2000/01/rdf-schema#isDefinedBy" : [ {
    "@id" : "https://openark.adaptcentre.ie/Ontologies/ARKControlTerminology#"
  } ],
  "http://www.w3.org/2000/01/rdf-schema#label" : [ {
    "@language" : "en",
    "@value" : "Control objective"
  } ],
  "http://www.w3.org/2004/02/skos/core#broader" : [ {
    "@id" : "https://openark.adaptcentre.ie/Ontologies/ARKControlTerminology#Control"
  } ],
  "http://www.w3.org/2004/02/skos/core#definition" : [ {
    "@language" : "en",
    "@value" : "statement describing what is to be achieved as a result of implementing controls (3.14)"
  } ],
  "http://www.w3.org/2004/02/skos/core#inScheme" : [ {
    "@id" : "https://openark.adaptcentre.ie/Ontologies/ARKControlTerminology#"
  } ],
  "http://www.w3.org/2004/02/skos/core#prefLabel" : [ {
    "@language" : "en",
    "@value" : "Control objective"
  } ]
}, {
  "@id" : "https://openark.adaptcentre.ie/Ontologies/ARKControlTerminology#Correction",
  "@type" : [ "http://www.w3.org/2002/07/owl#NamedIndividual" ],
  "http://purl.org/dc/terms/contributor" : [ {
    "@value" : "Junli Liang"
  }, {
    "@value" : "Rob Brennan"
  } ],
  "http://purl.org/dc/terms/created" : [ {
    "@type" : "http://www.w3.org/2001/XMLSchema#date",
    "@value" : "2024-04-08"
  } ],
  "http://purl.org/dc/terms/source" : [ {
    "@value" : "ISO27000:2018"
  } ],
  "http://www.w3.org/1999/02/22-rdf-syntax-ns#type" : [ {
    "@id" : "http://www.w3.org/2004/02/skos/core#Concept"
  } ],
  "http://www.w3.org/2000/01/rdf-schema#comment" : [ {
    "@language" : "en",
    "@value" : "action to eliminate a detected nonconformity (3.47)"
  } ],
  "http://www.w3.org/2000/01/rdf-schema#isDefinedBy" : [ {
    "@id" : "https://openark.adaptcentre.ie/Ontologies/ARKControlTerminology#"
  } ],
  "http://www.w3.org/2000/01/rdf-schema#label" : [ {
    "@language" : "en",
    "@value" : "Correction"
  } ],
  "http://www.w3.org/2004/02/skos/core#broader" : [ {
    "@id" : "https://openark.adaptcentre.ie/Ontologies/ARKControlTerminology#Nonconformity"
  } ],
  "http://www.w3.org/2004/02/skos/core#definition" : [ {
    "@language" : "en",
    "@value" : "action to eliminate a detected nonconformity (3.47)"
  } ],
  "http://www.w3.org/2004/02/skos/core#inScheme" : [ {
    "@id" : "https://openark.adaptcentre.ie/Ontologies/ARKControlTerminology#"
  } ],
  "http://www.w3.org/2004/02/skos/core#prefLabel" : [ {
    "@language" : "en",
    "@value" : "Correction"
  } ]
}, {
  "@id" : "https://openark.adaptcentre.ie/Ontologies/ARKControlTerminology#CorrectiveAction",
  "@type" : [ "http://www.w3.org/2002/07/owl#NamedIndividual" ],
  "http://purl.org/dc/terms/contributor" : [ {
    "@value" : "Junli Liang"
  }, {
    "@value" : "Rob Brennan"
  } ],
  "http://purl.org/dc/terms/created" : [ {
    "@type" : "http://www.w3.org/2001/XMLSchema#date",
    "@value" : "2024-04-08"
  } ],
  "http://purl.org/dc/terms/source" : [ {
    "@value" : "ISO27000:2018"
  } ],
  "http://www.w3.org/1999/02/22-rdf-syntax-ns#type" : [ {
    "@id" : "http://www.w3.org/2004/02/skos/core#Concept"
  } ],
  "http://www.w3.org/2000/01/rdf-schema#comment" : [ {
    "@language" : "en",
    "@value" : "action to eliminate the cause of a nonconformity (3.47) and to prevent recurrence."
  } ],
  "http://www.w3.org/2000/01/rdf-schema#isDefinedBy" : [ {
    "@id" : "https://openark.adaptcentre.ie/Ontologies/ARKControlTerminology#"
  } ],
  "http://www.w3.org/2000/01/rdf-schema#label" : [ {
    "@language" : "en",
    "@value" : "Corrective action"
  } ],
  "http://www.w3.org/2004/02/skos/core#broader" : [ {
    "@id" : "https://openark.adaptcentre.ie/Ontologies/ARKControlTerminology#Nonconformity"
  } ],
  "http://www.w3.org/2004/02/skos/core#definition" : [ {
    "@language" : "en",
    "@value" : "action to eliminate the cause of a nonconformity (3.47) and to prevent recurrence."
  } ],
  "http://www.w3.org/2004/02/skos/core#inScheme" : [ {
    "@id" : "https://openark.adaptcentre.ie/Ontologies/ARKControlTerminology#"
  } ],
  "http://www.w3.org/2004/02/skos/core#prefLabel" : [ {
    "@language" : "en",
    "@value" : "Corrective action"
  } ]
}, {
  "@id" : "https://openark.adaptcentre.ie/Ontologies/ARKControlTerminology#CulturalEnvironment",
  "@type" : [ "http://www.w3.org/2002/07/owl#NamedIndividual" ],
  "http://purl.org/dc/terms/contributor" : [ {
    "@value" : "Junli Liang"
  }, {
    "@value" : "Rob Brennan"
  } ],
  "http://purl.org/dc/terms/created" : [ {
    "@type" : "http://www.w3.org/2001/XMLSchema#date",
    "@value" : "2024-04-08"
  } ],
  "http://purl.org/dc/terms/source" : [ {
    "@value" : "ISO27000:2048"
  } ],
  "http://www.w3.org/1999/02/22-rdf-syntax-ns#type" : [ {
    "@id" : "http://www.w3.org/2004/02/skos/core#Concept"
  } ],
  "http://www.w3.org/2000/01/rdf-schema#comment" : [ {
    "@language" : "en",
    "@value" : "Cultural environment in cybersecurity"
  } ],
  "http://www.w3.org/2000/01/rdf-schema#isDefinedBy" : [ {
    "@id" : "https://openark.adaptcentre.ie/Ontologies/ARKControlTerminology#"
  } ],
  "http://www.w3.org/2000/01/rdf-schema#label" : [ {
    "@language" : "en",
    "@value" : "Cultural environment"
  } ],
  "http://www.w3.org/2004/02/skos/core#definition" : [ {
    "@language" : "en",
    "@value" : "Cultural environment in cybersecurity"
  } ],
  "http://www.w3.org/2004/02/skos/core#inScheme" : [ {
    "@id" : "https://openark.adaptcentre.ie/Ontologies/ARKControlTerminology#"
  } ],
  "http://www.w3.org/2004/02/skos/core#prefLabel" : [ {
    "@language" : "en",
    "@value" : "Cultural environment"
  } ]
}, {
  "@id" : "https://openark.adaptcentre.ie/Ontologies/ARKControlTerminology#CultureContext",
  "@type" : [ "http://www.w3.org/2002/07/owl#NamedIndividual" ],
  "http://purl.org/dc/terms/contributor" : [ {
    "@value" : "Junli Liang"
  }, {
    "@value" : "Rob Brennan"
  } ],
  "http://purl.org/dc/terms/created" : [ {
    "@type" : "http://www.w3.org/2001/XMLSchema#date",
    "@value" : "2024-04-08"
  } ],
  "http://purl.org/dc/terms/source" : [ {
    "@value" : "ISO27000:2053"
  } ],
  "http://www.w3.org/1999/02/22-rdf-syntax-ns#type" : [ {
    "@id" : "http://www.w3.org/2004/02/skos/core#Concept"
  } ],
  "http://www.w3.org/2000/01/rdf-schema#comment" : [ {
    "@language" : "en",
    "@value" : "Culture context in cybersecurity"
  } ],
  "http://www.w3.org/2000/01/rdf-schema#isDefinedBy" : [ {
    "@id" : "https://openark.adaptcentre.ie/Ontologies/ARKControlTerminology#"
  } ],
  "http://www.w3.org/2000/01/rdf-schema#label" : [ {
    "@language" : "en",
    "@value" : "Culture context"
  } ],
  "http://www.w3.org/2004/02/skos/core#definition" : [ {
    "@language" : "en",
    "@value" : "Culture context in cybersecurity"
  } ],
  "http://www.w3.org/2004/02/skos/core#inScheme" : [ {
    "@id" : "https://openark.adaptcentre.ie/Ontologies/ARKControlTerminology#"
  } ],
  "http://www.w3.org/2004/02/skos/core#prefLabel" : [ {
    "@language" : "en",
    "@value" : "Culture context"
  } ]
}, {
  "@id" : "https://openark.adaptcentre.ie/Ontologies/ARKControlTerminology#DecisionMakingProcessContext",
  "@type" : [ "http://www.w3.org/2002/07/owl#NamedIndividual" ],
  "http://purl.org/dc/terms/contributor" : [ {
    "@value" : "Junli Liang"
  }, {
    "@value" : "Rob Brennan"
  } ],
  "http://purl.org/dc/terms/created" : [ {
    "@type" : "http://www.w3.org/2001/XMLSchema#date",
    "@value" : "2024-04-08"
  } ],
  "http://purl.org/dc/terms/source" : [ {
    "@value" : "ISO27000:2033"
  } ],
  "http://www.w3.org/1999/02/22-rdf-syntax-ns#type" : [ {
    "@id" : "http://www.w3.org/2004/02/skos/core#Concept"
  } ],
  "http://www.w3.org/2000/01/rdf-schema#comment" : [ {
    "@language" : "en",
    "@value" : "The decision-making process in cybersecurity is a critical aspect of organizational governance, risk management, and resilience. By following a systematic approach to identify objectives, assess risks, evaluate options, and implement effective measures, organizations can make informed decisions that mitigate cyber threats, protect assets, and support business objectives."
  } ],
  "http://www.w3.org/2000/01/rdf-schema#isDefinedBy" : [ {
    "@id" : "https://openark.adaptcentre.ie/Ontologies/ARKControlTerminology#"
  } ],
  "http://www.w3.org/2000/01/rdf-schema#label" : [ {
    "@language" : "en",
    "@value" : "Decision making process context"
  } ],
  "http://www.w3.org/2004/02/skos/core#definition" : [ {
    "@language" : "en",
    "@value" : "The decision-making process in cybersecurity is a critical aspect of organizational governance, risk management, and resilience. By following a systematic approach to identify objectives, assess risks, evaluate options, and implement effective measures, organizations can make informed decisions that mitigate cyber threats, protect assets, and support business objectives."
  } ],
  "http://www.w3.org/2004/02/skos/core#inScheme" : [ {
    "@id" : "https://openark.adaptcentre.ie/Ontologies/ARKControlTerminology#"
  } ],
  "http://www.w3.org/2004/02/skos/core#prefLabel" : [ {
    "@language" : "en",
    "@value" : "Decision making process context"
  } ]
}, {
  "@id" : "https://openark.adaptcentre.ie/Ontologies/ARKControlTerminology#Defence",
  "@type" : [ "http://www.w3.org/2002/07/owl#NamedIndividual" ],
  "http://purl.org/dc/terms/contributor" : [ {
    "@value" : "Junli Liang"
  }, {
    "@value" : "Rob Brennan"
  } ],
  "http://purl.org/dc/terms/created" : [ {
    "@type" : "http://www.w3.org/2001/XMLSchema#date",
    "@value" : "2024-03-14"
  } ],
  "http://purl.org/dc/terms/source" : [ {
    "@value" : "ISO/IEC 27002:2022(E)"
  } ],
  "http://www.w3.org/1999/02/22-rdf-syntax-ns#type" : [ {
    "@id" : "http://www.w3.org/2004/02/skos/core#Concept"
  } ],
  "http://www.w3.org/2000/01/rdf-schema#comment" : [ {
    "@language" : "en",
    "@value" : "is a layered approach to cyber security that covers five important elements: detection, protection, management, response and recovery."
  } ],
  "http://www.w3.org/2000/01/rdf-schema#isDefinedBy" : [ {
    "@id" : "https://openark.adaptcentre.ie/Ontologies/ARKControlTerminology#"
  } ],
  "http://www.w3.org/2000/01/rdf-schema#label" : [ {
    "@language" : "en",
    "@value" : "Defence"
  } ],
  "http://www.w3.org/2004/02/skos/core#definition" : [ {
    "@language" : "en",
    "@value" : "is a layered approach to cyber security that covers five important elements: detection, protection, management, response and recovery."
  } ],
  "http://www.w3.org/2004/02/skos/core#inScheme" : [ {
    "@id" : "https://openark.adaptcentre.ie/Ontologies/ARKControlTerminology#"
  } ],
  "http://www.w3.org/2004/02/skos/core#prefLabel" : [ {
    "@language" : "en",
    "@value" : "Defence"
  } ]
}, {
  "@id" : "https://openark.adaptcentre.ie/Ontologies/ARKControlTerminology#DerivedMeasure",
  "@type" : [ "http://www.w3.org/2002/07/owl#NamedIndividual" ],
  "http://purl.org/dc/terms/contributor" : [ {
    "@value" : "Junli Liang"
  }, {
    "@value" : "Rob Brennan"
  } ],
  "http://purl.org/dc/terms/created" : [ {
    "@type" : "http://www.w3.org/2001/XMLSchema#date",
    "@value" : "2024-04-08"
  } ],
  "http://purl.org/dc/terms/source" : [ {
    "@value" : "ISO27000:2018"
  } ],
  "http://www.w3.org/1999/02/22-rdf-syntax-ns#type" : [ {
    "@id" : "http://www.w3.org/2004/02/skos/core#Concept"
  } ],
  "http://www.w3.org/2000/01/rdf-schema#comment" : [ {
    "@language" : "en",
    "@value" : "measure (3.42) that is defined as a function of two or more values of base measures (3.8)"
  } ],
  "http://www.w3.org/2000/01/rdf-schema#isDefinedBy" : [ {
    "@id" : "https://openark.adaptcentre.ie/Ontologies/ARKControlTerminology#"
  } ],
  "http://www.w3.org/2000/01/rdf-schema#label" : [ {
    "@language" : "en",
    "@value" : "Derived measure"
  } ],
  "http://www.w3.org/2004/02/skos/core#broader" : [ {
    "@id" : "https://openark.adaptcentre.ie/Ontologies/ARKControlTerminology#Measure"
  } ],
  "http://www.w3.org/2004/02/skos/core#definition" : [ {
    "@language" : "en",
    "@value" : "measure (3.42) that is defined as a function of two or more values of base measures (3.8)"
  } ],
  "http://www.w3.org/2004/02/skos/core#inScheme" : [ {
    "@id" : "https://openark.adaptcentre.ie/Ontologies/ARKControlTerminology#"
  } ],
  "http://www.w3.org/2004/02/skos/core#prefLabel" : [ {
    "@language" : "en",
    "@value" : "Derived measure"
  } ]
}, {
  "@id" : "https://openark.adaptcentre.ie/Ontologies/ARKControlTerminology#Detect",
  "@type" : [ "http://www.w3.org/2002/07/owl#NamedIndividual" ],
  "http://purl.org/dc/terms/contributor" : [ {
    "@value" : "Junli Liang"
  }, {
    "@value" : "Rob Brennan"
  } ],
  "http://purl.org/dc/terms/created" : [ {
    "@type" : "http://www.w3.org/2001/XMLSchema#date",
    "@value" : "2024-03-14"
  } ],
  "http://purl.org/dc/terms/source" : [ {
    "@value" : "ISO/IEC 27002:2022(E)"
  } ],
  "http://www.w3.org/1999/02/22-rdf-syntax-ns#type" : [ {
    "@id" : "http://www.w3.org/2004/02/skos/core#Concept"
  } ],
  "http://www.w3.org/2000/01/rdf-schema#comment" : [ {
    "@language" : "en",
    "@value" : "Develop and implement appropriate activities to identify the occurrence of a cyber security event."
  } ],
  "http://www.w3.org/2000/01/rdf-schema#isDefinedBy" : [ {
    "@id" : "https://openark.adaptcentre.ie/Ontologies/ARKControlTerminology#"
  } ],
  "http://www.w3.org/2000/01/rdf-schema#label" : [ {
    "@language" : "en",
    "@value" : "Detect"
  } ],
  "http://www.w3.org/2004/02/skos/core#definition" : [ {
    "@language" : "en",
    "@value" : "Develop and implement appropriate activities to identify the occurrence of a cyber security event."
  } ],
  "http://www.w3.org/2004/02/skos/core#inScheme" : [ {
    "@id" : "https://openark.adaptcentre.ie/Ontologies/ARKControlTerminology#"
  } ],
  "http://www.w3.org/2004/02/skos/core#prefLabel" : [ {
    "@language" : "en",
    "@value" : "Detect"
  } ]
}, {
  "@id" : "https://openark.adaptcentre.ie/Ontologies/ARKControlTerminology#DocumentedInformation",
  "@type" : [ "http://www.w3.org/2002/07/owl#NamedIndividual" ],
  "http://purl.org/dc/terms/contributor" : [ {
    "@value" : "Junli Liang"
  }, {
    "@value" : "Rob Brennan"
  } ],
  "http://purl.org/dc/terms/created" : [ {
    "@type" : "http://www.w3.org/2001/XMLSchema#date",
    "@value" : "2024-04-08"
  } ],
  "http://purl.org/dc/terms/source" : [ {
    "@value" : "ISO27000:2018"
  } ],
  "http://www.w3.org/1999/02/22-rdf-syntax-ns#type" : [ {
    "@id" : "http://www.w3.org/2004/02/skos/core#Concept"
  } ],
  "http://www.w3.org/2000/01/rdf-schema#comment" : [ {
    "@language" : "en",
    "@value" : "information required to be controlled and maintained by an organization (3.50) and the medium on which it is contained Note 1 to entry: Documented information can be in any format and media and from any source. Note 2 to entry: Documented information can refer to — the management system (3.41), including related processes (3.54); — information created in order for the organization (3.50) to operate (documentation); — evidence of results achieved (records)."
  } ],
  "http://www.w3.org/2000/01/rdf-schema#isDefinedBy" : [ {
    "@id" : "https://openark.adaptcentre.ie/Ontologies/ARKControlTerminology#"
  } ],
  "http://www.w3.org/2000/01/rdf-schema#label" : [ {
    "@language" : "en",
    "@value" : "Documented information"
  } ],
  "http://www.w3.org/2004/02/skos/core#definition" : [ {
    "@language" : "en",
    "@value" : "information required to be controlled and maintained by an organization (3.50) and the medium on which it is contained Note 1 to entry: Documented information can be in any format and media and from any source. Note 2 to entry: Documented information can refer to — the management system (3.41), including related processes (3.54); — information created in order for the organization (3.50) to operate (documentation); — evidence of results achieved (records)."
  } ],
  "http://www.w3.org/2004/02/skos/core#inScheme" : [ {
    "@id" : "https://openark.adaptcentre.ie/Ontologies/ARKControlTerminology#"
  } ],
  "http://www.w3.org/2004/02/skos/core#prefLabel" : [ {
    "@language" : "en",
    "@value" : "Documented information"
  } ]
}, {
  "@id" : "https://openark.adaptcentre.ie/Ontologies/ARKControlTerminology#EconomicEnvironment",
  "@type" : [ "http://www.w3.org/2002/07/owl#NamedIndividual" ],
  "http://purl.org/dc/terms/contributor" : [ {
    "@value" : "Junli Liang"
  }, {
    "@value" : "Rob Brennan"
  } ],
  "http://purl.org/dc/terms/created" : [ {
    "@type" : "http://www.w3.org/2001/XMLSchema#date",
    "@value" : "2024-04-08"
  } ],
  "http://purl.org/dc/terms/source" : [ {
    "@value" : "ISO27000:2052"
  } ],
  "http://www.w3.org/1999/02/22-rdf-syntax-ns#type" : [ {
    "@id" : "http://www.w3.org/2004/02/skos/core#Concept"
  } ],
  "http://www.w3.org/2000/01/rdf-schema#comment" : [ {
    "@language" : "en",
    "@value" : "Economic environment in cybersecurity"
  } ],
  "http://www.w3.org/2000/01/rdf-schema#isDefinedBy" : [ {
    "@id" : "https://openark.adaptcentre.ie/Ontologies/ARKControlTerminology#"
  } ],
  "http://www.w3.org/2000/01/rdf-schema#label" : [ {
    "@language" : "en",
    "@value" : "Economic environment"
  } ],
  "http://www.w3.org/2004/02/skos/core#definition" : [ {
    "@language" : "en",
    "@value" : "Economic environment in cybersecurity"
  } ],
  "http://www.w3.org/2004/02/skos/core#inScheme" : [ {
    "@id" : "https://openark.adaptcentre.ie/Ontologies/ARKControlTerminology#"
  } ],
  "http://www.w3.org/2004/02/skos/core#prefLabel" : [ {
    "@language" : "en",
    "@value" : "Economic environment"
  } ]
}, {
  "@id" : "https://openark.adaptcentre.ie/Ontologies/ARKControlTerminology#Effectiveness",
  "@type" : [ "http://www.w3.org/2002/07/owl#NamedIndividual" ],
  "http://purl.org/dc/terms/contributor" : [ {
    "@value" : "Junli Liang"
  }, {
    "@value" : "Rob Brennan"
  } ],
  "http://purl.org/dc/terms/created" : [ {
    "@type" : "http://www.w3.org/2001/XMLSchema#date",
    "@value" : "2024-04-08"
  } ],
  "http://purl.org/dc/terms/source" : [ {
    "@value" : "ISO27000:2018"
  } ],
  "http://www.w3.org/1999/02/22-rdf-syntax-ns#type" : [ {
    "@id" : "http://www.w3.org/2004/02/skos/core#Concept"
  } ],
  "http://www.w3.org/2000/01/rdf-schema#comment" : [ {
    "@language" : "en",
    "@value" : "extent to which planned activities are realized and planned results achieved."
  } ],
  "http://www.w3.org/2000/01/rdf-schema#isDefinedBy" : [ {
    "@id" : "https://openark.adaptcentre.ie/Ontologies/ARKControlTerminology#"
  } ],
  "http://www.w3.org/2000/01/rdf-schema#label" : [ {
    "@language" : "en",
    "@value" : "Effectiveness"
  } ],
  "http://www.w3.org/2004/02/skos/core#definition" : [ {
    "@language" : "en",
    "@value" : "extent to which planned activities are realized and planned results achieved."
  } ],
  "http://www.w3.org/2004/02/skos/core#inScheme" : [ {
    "@id" : "https://openark.adaptcentre.ie/Ontologies/ARKControlTerminology#"
  } ],
  "http://www.w3.org/2004/02/skos/core#prefLabel" : [ {
    "@language" : "en",
    "@value" : "Effectiveness"
  } ]
}, {
  "@id" : "https://openark.adaptcentre.ie/Ontologies/ARKControlTerminology#Event",
  "@type" : [ "http://www.w3.org/2002/07/owl#NamedIndividual" ],
  "http://purl.org/dc/terms/contributor" : [ {
    "@value" : "Junli Liang"
  }, {
    "@value" : "Rob Brennan"
  } ],
  "http://purl.org/dc/terms/created" : [ {
    "@type" : "http://www.w3.org/2001/XMLSchema#date",
    "@value" : "2024-04-08"
  } ],
  "http://purl.org/dc/terms/source" : [ {
    "@value" : "ISO27000:2018"
  } ],
  "http://www.w3.org/1999/02/22-rdf-syntax-ns#type" : [ {
    "@id" : "http://www.w3.org/2004/02/skos/core#Concept"
  } ],
  "http://www.w3.org/2000/01/rdf-schema#comment" : [ {
    "@language" : "en",
    "@value" : "occurrence or change of a particular set of circumstances Note 1 to entry: An event can be one or more occurrences, and can have several causes. Note 2 to entry: An event can consist of something not happening. Note 3 to entry: An event can sometimes be referred to as an “incident” or “accident”."
  } ],
  "http://www.w3.org/2000/01/rdf-schema#isDefinedBy" : [ {
    "@id" : "https://openark.adaptcentre.ie/Ontologies/ARKControlTerminology#"
  } ],
  "http://www.w3.org/2000/01/rdf-schema#label" : [ {
    "@language" : "en",
    "@value" : "Event"
  } ],
  "http://www.w3.org/2004/02/skos/core#definition" : [ {
    "@language" : "en",
    "@value" : "occurrence or change of a particular set of circumstances Note 1 to entry: An event can be one or more occurrences, and can have several causes. Note 2 to entry: An event can consist of something not happening. Note 3 to entry: An event can sometimes be referred to as an “incident” or “accident”."
  } ],
  "http://www.w3.org/2004/02/skos/core#inScheme" : [ {
    "@id" : "https://openark.adaptcentre.ie/Ontologies/ARKControlTerminology#"
  } ],
  "http://www.w3.org/2004/02/skos/core#prefLabel" : [ {
    "@language" : "en",
    "@value" : "Event"
  } ]
}, {
  "@id" : "https://openark.adaptcentre.ie/Ontologies/ARKControlTerminology#ExternalAudit",
  "@type" : [ "http://www.w3.org/2002/07/owl#NamedIndividual" ],
  "http://purl.org/dc/terms/contributor" : [ {
    "@value" : "Junli Liang"
  }, {
    "@value" : "Rob Brennan"
  } ],
  "http://purl.org/dc/terms/created" : [ {
    "@type" : "http://www.w3.org/2001/XMLSchema#date",
    "@value" : "2024-04-08"
  } ],
  "http://purl.org/dc/terms/source" : [ {
    "@value" : "ISO27000:2020"
  } ],
  "http://www.w3.org/1999/02/22-rdf-syntax-ns#type" : [ {
    "@id" : "http://www.w3.org/2004/02/skos/core#Concept"
  } ],
  "http://www.w3.org/2000/01/rdf-schema#comment" : [ {
    "@language" : "en",
    "@value" : "An external audit is performed by an independent auditor or auditing firm not affiliated with the organization being audited."
  } ],
  "http://www.w3.org/2000/01/rdf-schema#isDefinedBy" : [ {
    "@id" : "https://openark.adaptcentre.ie/Ontologies/ARKControlTerminology#"
  } ],
  "http://www.w3.org/2000/01/rdf-schema#label" : [ {
    "@language" : "en",
    "@value" : "External audit"
  } ],
  "http://www.w3.org/2004/02/skos/core#definition" : [ {
    "@language" : "en",
    "@value" : "An external audit is performed by an independent auditor or auditing firm not affiliated with the organization being audited."
  } ],
  "http://www.w3.org/2004/02/skos/core#inScheme" : [ {
    "@id" : "https://openark.adaptcentre.ie/Ontologies/ARKControlTerminology#"
  } ],
  "http://www.w3.org/2004/02/skos/core#prefLabel" : [ {
    "@language" : "en",
    "@value" : "External audit"
  } ]
}, {
  "@id" : "https://openark.adaptcentre.ie/Ontologies/ARKControlTerminology#ExternalContext",
  "@type" : [ "http://www.w3.org/2002/07/owl#NamedIndividual" ],
  "http://purl.org/dc/terms/contributor" : [ {
    "@value" : "Junli Liang"
  }, {
    "@value" : "Rob Brennan"
  } ],
  "http://purl.org/dc/terms/created" : [ {
    "@type" : "http://www.w3.org/2001/XMLSchema#date",
    "@value" : "2024-04-08"
  } ],
  "http://purl.org/dc/terms/source" : [ {
    "@value" : "ISO27000:2018"
  } ],
  "http://www.w3.org/1999/02/22-rdf-syntax-ns#type" : [ {
    "@id" : "http://www.w3.org/2004/02/skos/core#Concept"
  } ],
  "http://www.w3.org/2000/01/rdf-schema#comment" : [ {
    "@language" : "en",
    "@value" : "external environment in which the organization seeks to achieve its objectives (3.49) Note 1 to entry: External context can include the following: — the cultural, social, political, legal, regulatory, financial, technological, economic, natural and competitive environment, whether international, national, regional or local; — key drivers and trends having impact on the objectives of the organization (3.50); — relationships with, and perceptions and values of, external stakeholders (3.37)."
  } ],
  "http://www.w3.org/2000/01/rdf-schema#isDefinedBy" : [ {
    "@id" : "https://openark.adaptcentre.ie/Ontologies/ARKControlTerminology#"
  } ],
  "http://www.w3.org/2000/01/rdf-schema#label" : [ {
    "@language" : "en",
    "@value" : "External context"
  } ],
  "http://www.w3.org/2004/02/skos/core#definition" : [ {
    "@language" : "en",
    "@value" : "external environment in which the organization seeks to achieve its objectives (3.49) Note 1 to entry: External context can include the following: — the cultural, social, political, legal, regulatory, financial, technological, economic, natural and competitive environment, whether international, national, regional or local; — key drivers and trends having impact on the objectives of the organization (3.50); — relationships with, and perceptions and values of, external stakeholders (3.37)."
  } ],
  "http://www.w3.org/2004/02/skos/core#inScheme" : [ {
    "@id" : "https://openark.adaptcentre.ie/Ontologies/ARKControlTerminology#"
  } ],
  "http://www.w3.org/2004/02/skos/core#narrower" : [ {
    "@id" : "https://openark.adaptcentre.ie/Ontologies/ARKControlTerminology#ExternalEnvrionment"
  }, {
    "@id" : "https://openark.adaptcentre.ie/Ontologies/ARKControlTerminology#ExternalStakeholder"
  }, {
    "@id" : "https://openark.adaptcentre.ie/Ontologies/ARKControlTerminology#KeyDriversAndTrends"
  } ],
  "http://www.w3.org/2004/02/skos/core#prefLabel" : [ {
    "@language" : "en",
    "@value" : "External context"
  } ]
}, {
  "@id" : "https://openark.adaptcentre.ie/Ontologies/ARKControlTerminology#ExternalEnvironment",
  "@type" : [ "http://www.w3.org/2002/07/owl#NamedIndividual" ],
  "http://purl.org/dc/terms/contributor" : [ {
    "@value" : "Junli Liang"
  }, {
    "@value" : "Rob Brennan"
  } ],
  "http://purl.org/dc/terms/created" : [ {
    "@type" : "http://www.w3.org/2001/XMLSchema#date",
    "@value" : "2024-04-28"
  } ],
  "http://purl.org/dc/terms/source" : [ {
    "@value" : "ISO27000:2018"
  } ],
  "http://www.w3.org/1999/02/22-rdf-syntax-ns#type" : [ {
    "@id" : "http://www.w3.org/2004/02/skos/core#Concept"
  } ],
  "http://www.w3.org/2000/01/rdf-schema#comment" : [ {
    "@language" : "en",
    "@value" : "External Environment in cybersecurity"
  } ],
  "http://www.w3.org/2000/01/rdf-schema#isDefinedBy" : [ {
    "@id" : "https://openark.adaptcentre.ie/Ontologies/ARKControlTerminology#"
  } ],
  "http://www.w3.org/2000/01/rdf-schema#label" : [ {
    "@language" : "en",
    "@value" : "External Environment"
  } ],
  "http://www.w3.org/2004/02/skos/core#definition" : [ {
    "@language" : "en",
    "@value" : "External Environment in cybersecurity"
  } ],
  "http://www.w3.org/2004/02/skos/core#inScheme" : [ {
    "@id" : "https://openark.adaptcentre.ie/Ontologies/ARKControlTerminology#"
  } ],
  "http://www.w3.org/2004/02/skos/core#narrower" : [ {
    "@id" : "https://openark.adaptcentre.ie/Ontologies/ARKControlTerminology#CompetitiveEnvironment"
  }, {
    "@id" : "https://openark.adaptcentre.ie/Ontologies/ARKControlTerminology#CulturalEnvironment"
  }, {
    "@id" : "https://openark.adaptcentre.ie/Ontologies/ARKControlTerminology#EconomicEnvironment"
  }, {
    "@id" : "https://openark.adaptcentre.ie/Ontologies/ARKControlTerminology#FinancialEnvironment"
  }, {
    "@id" : "https://openark.adaptcentre.ie/Ontologies/ARKControlTerminology#LegalEnvironment"
  }, {
    "@id" : "https://openark.adaptcentre.ie/Ontologies/ARKControlTerminology#NaturalEnvironment"
  }, {
    "@id" : "https://openark.adaptcentre.ie/Ontologies/ARKControlTerminology#PoliticalEnvironment"
  }, {
    "@id" : "https://openark.adaptcentre.ie/Ontologies/ARKControlTerminology#RegulatoryEnvironment"
  }, {
    "@id" : "https://openark.adaptcentre.ie/Ontologies/ARKControlTerminology#SocialEnvironment"
  }, {
    "@id" : "https://openark.adaptcentre.ie/Ontologies/ARKControlTerminology#TechnologicalEnvironment"
  } ],
  "http://www.w3.org/2004/02/skos/core#prefLabel" : [ {
    "@language" : "en",
    "@value" : "External Environment"
  } ]
}, {
  "@id" : "https://openark.adaptcentre.ie/Ontologies/ARKControlTerminology#ExternalEnvrionment",
  "@type" : [ "http://www.w3.org/2002/07/owl#NamedIndividual" ],
  "http://purl.org/dc/terms/contributor" : [ {
    "@value" : "Junli Liang"
  }, {
    "@value" : "Rob Brennan"
  } ],
  "http://purl.org/dc/terms/created" : [ {
    "@type" : "http://www.w3.org/2001/XMLSchema#date",
    "@value" : "2024-04-08"
  } ],
  "http://purl.org/dc/terms/source" : [ {
    "@value" : "ISO27000:2046"
  } ],
  "http://www.w3.org/1999/02/22-rdf-syntax-ns#type" : [ {
    "@id" : "http://www.w3.org/2004/02/skos/core#Concept"
  } ],
  "http://www.w3.org/2000/01/rdf-schema#comment" : [ {
    "@language" : "en",
    "@value" : "External envrionment in cybersecurity"
  } ],
  "http://www.w3.org/2000/01/rdf-schema#isDefinedBy" : [ {
    "@id" : "https://openark.adaptcentre.ie/Ontologies/ARKControlTerminology#"
  } ],
  "http://www.w3.org/2000/01/rdf-schema#label" : [ {
    "@language" : "en",
    "@value" : "External envrionment"
  } ],
  "http://www.w3.org/2004/02/skos/core#definition" : [ {
    "@language" : "en",
    "@value" : "External envrionment in cybersecurity"
  } ],
  "http://www.w3.org/2004/02/skos/core#inScheme" : [ {
    "@id" : "https://openark.adaptcentre.ie/Ontologies/ARKControlTerminology#"
  } ],
  "http://www.w3.org/2004/02/skos/core#prefLabel" : [ {
    "@language" : "en",
    "@value" : "External envrionment"
  } ]
}, {
  "@id" : "https://openark.adaptcentre.ie/Ontologies/ARKControlTerminology#ExternalStakeholder",
  "@type" : [ "http://www.w3.org/2002/07/owl#NamedIndividual" ],
  "http://purl.org/dc/terms/contributor" : [ {
    "@value" : "Junli Liang"
  }, {
    "@value" : "Rob Brennan"
  } ],
  "http://purl.org/dc/terms/created" : [ {
    "@type" : "http://www.w3.org/2001/XMLSchema#date",
    "@value" : "2024-04-08"
  } ],
  "http://purl.org/dc/terms/source" : [ {
    "@value" : "ISO27000:2023"
  } ],
  "http://www.w3.org/1999/02/22-rdf-syntax-ns#type" : [ {
    "@id" : "http://www.w3.org/2004/02/skos/core#Concept"
  } ],
  "http://www.w3.org/2000/01/rdf-schema#comment" : [ {
    "@language" : "en",
    "@value" : "person or organization (3.50) that can affect, be affected by, or perceive itself to be affected by a decision or activity"
  } ],
  "http://www.w3.org/2000/01/rdf-schema#isDefinedBy" : [ {
    "@id" : "https://openark.adaptcentre.ie/Ontologies/ARKControlTerminology#"
  } ],
  "http://www.w3.org/2000/01/rdf-schema#label" : [ {
    "@language" : "en",
    "@value" : "External stakeholder"
  } ],
  "http://www.w3.org/2004/02/skos/core#definition" : [ {
    "@language" : "en",
    "@value" : "person or organization (3.50) that can affect, be affected by, or perceive itself to be affected by a decision or activity"
  } ],
  "http://www.w3.org/2004/02/skos/core#inScheme" : [ {
    "@id" : "https://openark.adaptcentre.ie/Ontologies/ARKControlTerminology#"
  } ],
  "http://www.w3.org/2004/02/skos/core#prefLabel" : [ {
    "@language" : "en",
    "@value" : "External stakeholder"
  } ]
}, {
  "@id" : "https://openark.adaptcentre.ie/Ontologies/ARKControlTerminology#FinancialEnvironment",
  "@type" : [ "http://www.w3.org/2002/07/owl#NamedIndividual" ],
  "http://purl.org/dc/terms/contributor" : [ {
    "@value" : "Junli Liang"
  }, {
    "@value" : "Rob Brennan"
  } ],
  "http://purl.org/dc/terms/created" : [ {
    "@type" : "http://www.w3.org/2001/XMLSchema#date",
    "@value" : "2024-04-08"
  } ],
  "http://purl.org/dc/terms/source" : [ {
    "@value" : "ISO27000:2022"
  } ],
  "http://www.w3.org/1999/02/22-rdf-syntax-ns#type" : [ {
    "@id" : "http://www.w3.org/2004/02/skos/core#Concept"
  } ],
  "http://www.w3.org/2000/01/rdf-schema#comment" : [ {
    "@language" : "en",
    "@value" : "The financial environment encompasses all external and internal factors that influence financial decision-making within an economy or organization."
  } ],
  "http://www.w3.org/2000/01/rdf-schema#isDefinedBy" : [ {
    "@id" : "https://openark.adaptcentre.ie/Ontologies/ARKControlTerminology#"
  } ],
  "http://www.w3.org/2000/01/rdf-schema#label" : [ {
    "@language" : "en",
    "@value" : "Financial environment"
  } ],
  "http://www.w3.org/2004/02/skos/core#definition" : [ {
    "@language" : "en",
    "@value" : "The financial environment encompasses all external and internal factors that influence financial decision-making within an economy or organization."
  } ],
  "http://www.w3.org/2004/02/skos/core#inScheme" : [ {
    "@id" : "https://openark.adaptcentre.ie/Ontologies/ARKControlTerminology#"
  } ],
  "http://www.w3.org/2004/02/skos/core#prefLabel" : [ {
    "@language" : "en",
    "@value" : "Financial environment"
  } ]
}, {
  "@id" : "https://openark.adaptcentre.ie/Ontologies/ARKControlTerminology#Governance",
  "@type" : [ "http://www.w3.org/2002/07/owl#NamedIndividual" ],
  "http://purl.org/dc/terms/contributor" : [ {
    "@value" : "Junli Liang"
  }, {
    "@value" : "Rob Brennan"
  } ],
  "http://purl.org/dc/terms/created" : [ {
    "@type" : "http://www.w3.org/2001/XMLSchema#date",
    "@value" : "2024-03-14"
  } ],
  "http://purl.org/dc/terms/source" : [ {
    "@value" : "ISO/IEC 27002:2022(E)"
  } ],
  "http://www.w3.org/1999/02/22-rdf-syntax-ns#type" : [ {
    "@id" : "http://www.w3.org/2004/02/skos/core#Concept"
  } ],
  "http://www.w3.org/2000/01/rdf-schema#comment" : [ {
    "@language" : "en",
    "@value" : "A set of processes that ensures that data assets are formally managed throughout the enterprise. A data governance model establishes authority and management and decision making parameters related to the data produced or managed by the enterprise."
  } ],
  "http://www.w3.org/2000/01/rdf-schema#isDefinedBy" : [ {
    "@id" : "https://openark.adaptcentre.ie/Ontologies/ARKControlTerminology#"
  } ],
  "http://www.w3.org/2000/01/rdf-schema#label" : [ {
    "@language" : "en",
    "@value" : "Governance"
  } ],
  "http://www.w3.org/2004/02/skos/core#definition" : [ {
    "@language" : "en",
    "@value" : "A set of processes that ensures that data assets are formally managed throughout the enterprise. A data governance model establishes authority and management and decision making parameters related to the data produced or managed by the enterprise."
  } ],
  "http://www.w3.org/2004/02/skos/core#inScheme" : [ {
    "@id" : "https://openark.adaptcentre.ie/Ontologies/ARKControlTerminology#"
  } ],
  "http://www.w3.org/2004/02/skos/core#prefLabel" : [ {
    "@language" : "en",
    "@value" : "Governance"
  } ]
}, {
  "@id" : "https://openark.adaptcentre.ie/Ontologies/ARKControlTerminology#GovernanceContext",
  "@type" : [ "http://www.w3.org/2002/07/owl#NamedIndividual" ],
  "http://purl.org/dc/terms/contributor" : [ {
    "@value" : "Junli Liang"
  }, {
    "@value" : "Rob Brennan"
  } ],
  "http://purl.org/dc/terms/created" : [ {
    "@type" : "http://www.w3.org/2001/XMLSchema#date",
    "@value" : "2024-04-08"
  } ],
  "http://purl.org/dc/terms/source" : [ {
    "@value" : "ISO27000:2051"
  } ],
  "http://www.w3.org/1999/02/22-rdf-syntax-ns#type" : [ {
    "@id" : "http://www.w3.org/2004/02/skos/core#Concept"
  } ],
  "http://www.w3.org/2000/01/rdf-schema#comment" : [ {
    "@language" : "en",
    "@value" : "Governance context in cybersecurity"
  } ],
  "http://www.w3.org/2000/01/rdf-schema#isDefinedBy" : [ {
    "@id" : "https://openark.adaptcentre.ie/Ontologies/ARKControlTerminology#"
  } ],
  "http://www.w3.org/2000/01/rdf-schema#label" : [ {
    "@language" : "en",
    "@value" : "Governance context"
  } ],
  "http://www.w3.org/2004/02/skos/core#definition" : [ {
    "@language" : "en",
    "@value" : "Governance context in cybersecurity"
  } ],
  "http://www.w3.org/2004/02/skos/core#inScheme" : [ {
    "@id" : "https://openark.adaptcentre.ie/Ontologies/ARKControlTerminology#"
  } ],
  "http://www.w3.org/2004/02/skos/core#prefLabel" : [ {
    "@language" : "en",
    "@value" : "Governance context"
  } ]
}, {
  "@id" : "https://openark.adaptcentre.ie/Ontologies/ARKControlTerminology#GovernanceInformationSecurity",
  "@type" : [ "http://www.w3.org/2002/07/owl#NamedIndividual" ],
  "http://purl.org/dc/terms/contributor" : [ {
    "@value" : "Junli Liang"
  }, {
    "@value" : "Rob Brennan"
  } ],
  "http://purl.org/dc/terms/created" : [ {
    "@type" : "http://www.w3.org/2001/XMLSchema#date",
    "@value" : "2024-04-08"
  } ],
  "http://purl.org/dc/terms/source" : [ {
    "@value" : "ISO27000:2018"
  } ],
  "http://www.w3.org/1999/02/22-rdf-syntax-ns#type" : [ {
    "@id" : "http://www.w3.org/2004/02/skos/core#Concept"
  } ],
  "http://www.w3.org/2000/01/rdf-schema#comment" : [ {
    "@language" : "en",
    "@value" : "system by which an organization’s (3.50) information security (3.28) activities are directed and controlled."
  } ],
  "http://www.w3.org/2000/01/rdf-schema#isDefinedBy" : [ {
    "@id" : "https://openark.adaptcentre.ie/Ontologies/ARKControlTerminology#"
  } ],
  "http://www.w3.org/2000/01/rdf-schema#label" : [ {
    "@language" : "en",
    "@value" : "Governance of information security"
  } ],
  "http://www.w3.org/2004/02/skos/core#broader" : [ {
    "@id" : "https://openark.adaptcentre.ie/Ontologies/ARKControlTerminology#InformationSecurity"
  } ],
  "http://www.w3.org/2004/02/skos/core#definition" : [ {
    "@language" : "en",
    "@value" : "system by which an organization’s (3.50) information security (3.28) activities are directed and controlled."
  } ],
  "http://www.w3.org/2004/02/skos/core#inScheme" : [ {
    "@id" : "https://openark.adaptcentre.ie/Ontologies/ARKControlTerminology#"
  } ],
  "http://www.w3.org/2004/02/skos/core#prefLabel" : [ {
    "@language" : "en",
    "@value" : "Governance of information security"
  } ]
}, {
  "@id" : "https://openark.adaptcentre.ie/Ontologies/ARKControlTerminology#Governance_and_Ecosystem",
  "@type" : [ "http://www.w3.org/2002/07/owl#NamedIndividual" ],
  "http://purl.org/dc/terms/contributor" : [ {
    "@value" : "Junli Liang"
  }, {
    "@value" : "Rob Brennan"
  } ],
  "http://purl.org/dc/terms/created" : [ {
    "@type" : "http://www.w3.org/2001/XMLSchema#date",
    "@value" : "2024-03-14"
  } ],
  "http://purl.org/dc/terms/source" : [ {
    "@value" : "ISO/IEC 27002:2022(E)"
  } ],
  "http://www.w3.org/1999/02/22-rdf-syntax-ns#type" : [ {
    "@id" : "http://www.w3.org/2004/02/skos/core#Concept"
  } ],
  "http://www.w3.org/2000/01/rdf-schema#comment" : [ {
    "@language" : "en",
    "@value" : "an approach that merges different disciplines to explore ways that human can protect the environment and maintain activities in a sustainable manner."
  } ],
  "http://www.w3.org/2000/01/rdf-schema#isDefinedBy" : [ {
    "@id" : "https://openark.adaptcentre.ie/Ontologies/ARKControlTerminology#"
  } ],
  "http://www.w3.org/2000/01/rdf-schema#label" : [ {
    "@language" : "en",
    "@value" : "Governance and ecosystem"
  } ],
  "http://www.w3.org/2004/02/skos/core#definition" : [ {
    "@language" : "en",
    "@value" : "an approach that merges different disciplines to explore ways that human can protect the environment and maintain activities in a sustainable manner."
  } ],
  "http://www.w3.org/2004/02/skos/core#inScheme" : [ {
    "@id" : "https://openark.adaptcentre.ie/Ontologies/ARKControlTerminology#"
  } ],
  "http://www.w3.org/2004/02/skos/core#prefLabel" : [ {
    "@language" : "en",
    "@value" : "Governance and ecosystem"
  } ]
}, {
  "@id" : "https://openark.adaptcentre.ie/Ontologies/ARKControlTerminology#GoverningBody",
  "@type" : [ "http://www.w3.org/2002/07/owl#NamedIndividual" ],
  "http://purl.org/dc/terms/contributor" : [ {
    "@value" : "Junli Liang"
  }, {
    "@value" : "Rob Brennan"
  } ],
  "http://purl.org/dc/terms/created" : [ {
    "@type" : "http://www.w3.org/2001/XMLSchema#date",
    "@value" : "2024-04-08"
  } ],
  "http://purl.org/dc/terms/source" : [ {
    "@value" : "ISO27000:2018"
  } ],
  "http://www.w3.org/1999/02/22-rdf-syntax-ns#type" : [ {
    "@id" : "http://www.w3.org/2004/02/skos/core#Concept"
  } ],
  "http://www.w3.org/2000/01/rdf-schema#comment" : [ {
    "@language" : "en",
    "@value" : "person or group of people who are accountable for the performance (3.52) and conformity of the organization (3.50) Note 1 to entry: The governing body can, in some jurisdictions, be a board of directors."
  } ],
  "http://www.w3.org/2000/01/rdf-schema#isDefinedBy" : [ {
    "@id" : "https://openark.adaptcentre.ie/Ontologies/ARKControlTerminology#"
  } ],
  "http://www.w3.org/2000/01/rdf-schema#label" : [ {
    "@language" : "en",
    "@value" : "Governing body"
  } ],
  "http://www.w3.org/2004/02/skos/core#broader" : [ {
    "@id" : "https://openark.adaptcentre.ie/Ontologies/ARKControlTerminology#Organization"
  } ],
  "http://www.w3.org/2004/02/skos/core#definition" : [ {
    "@language" : "en",
    "@value" : "person or group of people who are accountable for the performance (3.52) and conformity of the organization (3.50) Note 1 to entry: The governing body can, in some jurisdictions, be a board of directors."
  } ],
  "http://www.w3.org/2004/02/skos/core#inScheme" : [ {
    "@id" : "https://openark.adaptcentre.ie/Ontologies/ARKControlTerminology#"
  } ],
  "http://www.w3.org/2004/02/skos/core#prefLabel" : [ {
    "@language" : "en",
    "@value" : "Governing body"
  } ]
}, {
  "@id" : "https://openark.adaptcentre.ie/Ontologies/ARKControlTerminology#GuidelinesContext",
  "@type" : [ "http://www.w3.org/2002/07/owl#NamedIndividual" ],
  "http://purl.org/dc/terms/contributor" : [ {
    "@value" : "Junli Liang"
  }, {
    "@value" : "Rob Brennan"
  } ],
  "http://purl.org/dc/terms/created" : [ {
    "@type" : "http://www.w3.org/2001/XMLSchema#date",
    "@value" : "2024-04-08"
  } ],
  "http://purl.org/dc/terms/source" : [ {
    "@value" : "ISO27000:2032"
  } ],
  "http://www.w3.org/1999/02/22-rdf-syntax-ns#type" : [ {
    "@id" : "http://www.w3.org/2004/02/skos/core#Concept"
  } ],
  "http://www.w3.org/2000/01/rdf-schema#comment" : [ {
    "@language" : "en",
    "@value" : "Guidelines Context in cybersecurity"
  } ],
  "http://www.w3.org/2000/01/rdf-schema#isDefinedBy" : [ {
    "@id" : "https://openark.adaptcentre.ie/Ontologies/ARKControlTerminology#"
  } ],
  "http://www.w3.org/2000/01/rdf-schema#label" : [ {
    "@language" : "en",
    "@value" : "Guidelines context"
  } ],
  "http://www.w3.org/2004/02/skos/core#definition" : [ {
    "@language" : "en",
    "@value" : "Guidelines Context in cybersecurity"
  } ],
  "http://www.w3.org/2004/02/skos/core#inScheme" : [ {
    "@id" : "https://openark.adaptcentre.ie/Ontologies/ARKControlTerminology#"
  } ],
  "http://www.w3.org/2004/02/skos/core#prefLabel" : [ {
    "@language" : "en",
    "@value" : "Guidelines context"
  } ]
}, {
  "@id" : "https://openark.adaptcentre.ie/Ontologies/ARKControlTerminology#HumanResourceSecurity",
  "@type" : [ "http://www.w3.org/2002/07/owl#NamedIndividual" ],
  "http://purl.org/dc/terms/contributor" : [ {
    "@value" : "Junli Liang"
  }, {
    "@value" : "Rob Brennan"
  } ],
  "http://purl.org/dc/terms/created" : [ {
    "@type" : "http://www.w3.org/2001/XMLSchema#date",
    "@value" : "2024-03-14"
  } ],
  "http://purl.org/dc/terms/source" : [ {
    "@value" : "ISO/IEC 27002:2022(E)"
  } ],
  "http://www.w3.org/1999/02/22-rdf-syntax-ns#type" : [ {
    "@id" : "http://www.w3.org/2004/02/skos/core#Concept"
  } ],
  "http://www.w3.org/2000/01/rdf-schema#comment" : [ {
    "@language" : "en",
    "@value" : "Human Resources Security is a set of processes designed to ensure that all employees, suppliers, and contractors are qualified for and understand their engagement/job tasks and responsibilities, and that access is revoked after the engagement is finished."
  } ],
  "http://www.w3.org/2000/01/rdf-schema#isDefinedBy" : [ {
    "@id" : "https://openark.adaptcentre.ie/Ontologies/ARKControlTerminology#"
  } ],
  "http://www.w3.org/2000/01/rdf-schema#label" : [ {
    "@language" : "en",
    "@value" : "Human resource security"
  } ],
  "http://www.w3.org/2004/02/skos/core#definition" : [ {
    "@language" : "en",
    "@value" : "Human Resources Security is a set of processes designed to ensure that all employees, suppliers, and contractors are qualified for and understand their engagement/job tasks and responsibilities, and that access is revoked after the engagement is finished."
  } ],
  "http://www.w3.org/2004/02/skos/core#inScheme" : [ {
    "@id" : "https://openark.adaptcentre.ie/Ontologies/ARKControlTerminology#"
  } ],
  "http://www.w3.org/2004/02/skos/core#prefLabel" : [ {
    "@language" : "en",
    "@value" : "Human resource security"
  } ]
}, {
  "@id" : "https://openark.adaptcentre.ie/Ontologies/ARKControlTerminology#Identify",
  "@type" : [ "http://www.w3.org/2002/07/owl#NamedIndividual" ],
  "http://purl.org/dc/terms/contributor" : [ {
    "@value" : "Junli Liang"
  }, {
    "@value" : "Rob Brennan"
  } ],
  "http://purl.org/dc/terms/created" : [ {
    "@type" : "http://www.w3.org/2001/XMLSchema#date",
    "@value" : "2024-03-14"
  } ],
  "http://purl.org/dc/terms/source" : [ {
    "@value" : "ISO/IEC 27002:2022(E)"
  } ],
  "http://www.w3.org/1999/02/22-rdf-syntax-ns#type" : [ {
    "@id" : "http://www.w3.org/2004/02/skos/core#Concept"
  } ],
  "http://www.w3.org/2000/01/rdf-schema#comment" : [ {
    "@language" : "en",
    "@value" : "Develop the organisation’s understanding to manage cyber security risk to systems, assets, data and capabilities."
  } ],
  "http://www.w3.org/2000/01/rdf-schema#isDefinedBy" : [ {
    "@id" : "https://openark.adaptcentre.ie/Ontologies/ARKControlTerminology#"
  } ],
  "http://www.w3.org/2000/01/rdf-schema#label" : [ {
    "@language" : "en",
    "@value" : "Identify"
  } ],
  "http://www.w3.org/2004/02/skos/core#definition" : [ {
    "@language" : "en",
    "@value" : "Develop the organisation’s understanding to manage cyber security risk to systems, assets, data and capabilities."
  } ],
  "http://www.w3.org/2004/02/skos/core#inScheme" : [ {
    "@id" : "https://openark.adaptcentre.ie/Ontologies/ARKControlTerminology#"
  } ],
  "http://www.w3.org/2004/02/skos/core#prefLabel" : [ {
    "@language" : "en",
    "@value" : "Identify"
  } ]
}, {
  "@id" : "https://openark.adaptcentre.ie/Ontologies/ARKControlTerminology#IdentityAndAccessManagement",
  "@type" : [ "http://www.w3.org/2002/07/owl#NamedIndividual" ],
  "http://purl.org/dc/terms/contributor" : [ {
    "@value" : "Junli Liang"
  }, {
    "@value" : "Rob Brennan"
  } ],
  "http://purl.org/dc/terms/created" : [ {
    "@type" : "http://www.w3.org/2001/XMLSchema#date",
    "@value" : "2024-03-14"
  } ],
  "http://purl.org/dc/terms/source" : [ {
    "@value" : "ISO/IEC 27002:2022(E)"
  } ],
  "http://www.w3.org/1999/02/22-rdf-syntax-ns#type" : [ {
    "@id" : "http://www.w3.org/2004/02/skos/core#Concept"
  } ],
  "http://www.w3.org/2000/01/rdf-schema#comment" : [ {
    "@language" : "en",
    "@value" : "Access Management is the set of practices that enables only those permitted the ability to perform an action on a particular resource. The three most common Access Management services you encounter every day perhaps without realizing it are: Policy Administration, Authentication, and Authorization."
  } ],
  "http://www.w3.org/2000/01/rdf-schema#isDefinedBy" : [ {
    "@id" : "https://openark.adaptcentre.ie/Ontologies/ARKControlTerminology#"
  } ],
  "http://www.w3.org/2000/01/rdf-schema#label" : [ {
    "@language" : "en",
    "@value" : "Identity and access management"
  } ],
  "http://www.w3.org/2004/02/skos/core#definition" : [ {
    "@language" : "en",
    "@value" : "Access Management is the set of practices that enables only those permitted the ability to perform an action on a particular resource. The three most common Access Management services you encounter every day perhaps without realizing it are: Policy Administration, Authentication, and Authorization."
  } ],
  "http://www.w3.org/2004/02/skos/core#inScheme" : [ {
    "@id" : "https://openark.adaptcentre.ie/Ontologies/ARKControlTerminology#"
  } ],
  "http://www.w3.org/2004/02/skos/core#prefLabel" : [ {
    "@language" : "en",
    "@value" : "Identity and access management"
  } ]
}, {
  "@id" : "https://openark.adaptcentre.ie/Ontologies/ARKControlTerminology#Indicator",
  "@type" : [ "http://www.w3.org/2002/07/owl#NamedIndividual" ],
  "http://purl.org/dc/terms/contributor" : [ {
    "@value" : "Junli Liang"
  }, {
    "@value" : "Rob Brennan"
  } ],
  "http://purl.org/dc/terms/created" : [ {
    "@type" : "http://www.w3.org/2001/XMLSchema#date",
    "@value" : "2024-04-08"
  } ],
  "http://purl.org/dc/terms/source" : [ {
    "@value" : "ISO27000:2018"
  } ],
  "http://www.w3.org/1999/02/22-rdf-syntax-ns#type" : [ {
    "@id" : "http://www.w3.org/2004/02/skos/core#Concept"
  } ],
  "http://www.w3.org/2000/01/rdf-schema#comment" : [ {
    "@language" : "en",
    "@value" : "measure (3.42) that provides an estimate or evaluation."
  } ],
  "http://www.w3.org/2000/01/rdf-schema#isDefinedBy" : [ {
    "@id" : "https://openark.adaptcentre.ie/Ontologies/ARKControlTerminology#"
  } ],
  "http://www.w3.org/2000/01/rdf-schema#label" : [ {
    "@language" : "en",
    "@value" : "Indicator"
  } ],
  "http://www.w3.org/2004/02/skos/core#broader" : [ {
    "@id" : "https://openark.adaptcentre.ie/Ontologies/ARKControlTerminology#Measure"
  } ],
  "http://www.w3.org/2004/02/skos/core#definition" : [ {
    "@language" : "en",
    "@value" : "measure (3.42) that provides an estimate or evaluation."
  } ],
  "http://www.w3.org/2004/02/skos/core#inScheme" : [ {
    "@id" : "https://openark.adaptcentre.ie/Ontologies/ARKControlTerminology#"
  } ],
  "http://www.w3.org/2004/02/skos/core#prefLabel" : [ {
    "@language" : "en",
    "@value" : "Indicator"
  } ]
}, {
  "@id" : "https://openark.adaptcentre.ie/Ontologies/ARKControlTerminology#InformationFlowContext",
  "@type" : [ "http://www.w3.org/2002/07/owl#NamedIndividual" ],
  "http://purl.org/dc/terms/contributor" : [ {
    "@value" : "Junli Liang"
  }, {
    "@value" : "Rob Brennan"
  } ],
  "http://purl.org/dc/terms/created" : [ {
    "@type" : "http://www.w3.org/2001/XMLSchema#date",
    "@value" : "2024-04-08"
  } ],
  "http://purl.org/dc/terms/source" : [ {
    "@value" : "ISO27000:2041"
  } ],
  "http://www.w3.org/1999/02/22-rdf-syntax-ns#type" : [ {
    "@id" : "http://www.w3.org/2004/02/skos/core#Concept"
  } ],
  "http://www.w3.org/2000/01/rdf-schema#comment" : [ {
    "@language" : "en",
    "@value" : "Information flow control adds metadata to data flows (data transfer across networks, files read from the disc, and so on) and ensures that sensitive data does not flow from a higher security context to a lower security context."
  } ],
  "http://www.w3.org/2000/01/rdf-schema#isDefinedBy" : [ {
    "@id" : "https://openark.adaptcentre.ie/Ontologies/ARKControlTerminology#"
  } ],
  "http://www.w3.org/2000/01/rdf-schema#label" : [ {
    "@language" : "en",
    "@value" : "Information flow context"
  } ],
  "http://www.w3.org/2004/02/skos/core#definition" : [ {
    "@language" : "en",
    "@value" : "Information flow control adds metadata to data flows (data transfer across networks, files read from the disc, and so on) and ensures that sensitive data does not flow from a higher security context to a lower security context."
  } ],
  "http://www.w3.org/2004/02/skos/core#inScheme" : [ {
    "@id" : "https://openark.adaptcentre.ie/Ontologies/ARKControlTerminology#"
  } ],
  "http://www.w3.org/2004/02/skos/core#prefLabel" : [ {
    "@language" : "en",
    "@value" : "Information flow context"
  } ]
}, {
  "@id" : "https://openark.adaptcentre.ie/Ontologies/ARKControlTerminology#InformationNeed",
  "@type" : [ "http://www.w3.org/2002/07/owl#NamedIndividual" ],
  "http://purl.org/dc/terms/contributor" : [ {
    "@value" : "Junli Liang"
  }, {
    "@value" : "Rob Brennan"
  } ],
  "http://purl.org/dc/terms/created" : [ {
    "@type" : "http://www.w3.org/2001/XMLSchema#date",
    "@value" : "2024-04-08"
  } ],
  "http://purl.org/dc/terms/source" : [ {
    "@value" : "ISO27000:2018"
  } ],
  "http://www.w3.org/1999/02/22-rdf-syntax-ns#type" : [ {
    "@id" : "http://www.w3.org/2004/02/skos/core#Concept"
  } ],
  "http://www.w3.org/2000/01/rdf-schema#comment" : [ {
    "@language" : "en",
    "@value" : "insight necessary to manage objectives (3.49), goals, risks and problems."
  } ],
  "http://www.w3.org/2000/01/rdf-schema#isDefinedBy" : [ {
    "@id" : "https://openark.adaptcentre.ie/Ontologies/ARKControlTerminology#"
  } ],
  "http://www.w3.org/2000/01/rdf-schema#label" : [ {
    "@language" : "en",
    "@value" : "Information need"
  } ],
  "http://www.w3.org/2004/02/skos/core#definition" : [ {
    "@language" : "en",
    "@value" : "insight necessary to manage objectives (3.49), goals, risks and problems."
  } ],
  "http://www.w3.org/2004/02/skos/core#inScheme" : [ {
    "@id" : "https://openark.adaptcentre.ie/Ontologies/ARKControlTerminology#"
  } ],
  "http://www.w3.org/2004/02/skos/core#prefLabel" : [ {
    "@language" : "en",
    "@value" : "Information need"
  } ]
}, {
  "@id" : "https://openark.adaptcentre.ie/Ontologies/ARKControlTerminology#InformationProcessingFacility",
  "@type" : [ "http://www.w3.org/2002/07/owl#NamedIndividual" ],
  "http://purl.org/dc/terms/contributor" : [ {
    "@value" : "Junli Liang"
  }, {
    "@value" : "Rob Brennan"
  } ],
  "http://purl.org/dc/terms/created" : [ {
    "@type" : "http://www.w3.org/2001/XMLSchema#date",
    "@value" : "2024-04-08"
  } ],
  "http://purl.org/dc/terms/source" : [ {
    "@value" : "ISO27000:2018"
  } ],
  "http://www.w3.org/1999/02/22-rdf-syntax-ns#type" : [ {
    "@id" : "http://www.w3.org/2004/02/skos/core#Concept"
  } ],
  "http://www.w3.org/2000/01/rdf-schema#comment" : [ {
    "@language" : "en",
    "@value" : "any information processing system, service or infrastructure, or the physical location housing it."
  } ],
  "http://www.w3.org/2000/01/rdf-schema#isDefinedBy" : [ {
    "@id" : "https://openark.adaptcentre.ie/Ontologies/ARKControlTerminology#"
  } ],
  "http://www.w3.org/2000/01/rdf-schema#label" : [ {
    "@language" : "en",
    "@value" : "Information processing facility"
  } ],
  "http://www.w3.org/2004/02/skos/core#definition" : [ {
    "@language" : "en",
    "@value" : "any information processing system, service or infrastructure, or the physical location housing it."
  } ],
  "http://www.w3.org/2004/02/skos/core#inScheme" : [ {
    "@id" : "https://openark.adaptcentre.ie/Ontologies/ARKControlTerminology#"
  } ],
  "http://www.w3.org/2004/02/skos/core#prefLabel" : [ {
    "@language" : "en",
    "@value" : "Information processing facility"
  } ]
}, {
  "@id" : "https://openark.adaptcentre.ie/Ontologies/ARKControlTerminology#InformationProtection",
  "@type" : [ "http://www.w3.org/2002/07/owl#NamedIndividual" ],
  "http://purl.org/dc/terms/contributor" : [ {
    "@value" : "Junli Liang"
  }, {
    "@value" : "Rob Brennan"
  } ],
  "http://purl.org/dc/terms/created" : [ {
    "@type" : "http://www.w3.org/2001/XMLSchema#date",
    "@value" : "2024-03-14"
  } ],
  "http://purl.org/dc/terms/source" : [ {
    "@value" : "ISO/IEC 27002:2022(E)"
  } ],
  "http://www.w3.org/1999/02/22-rdf-syntax-ns#type" : [ {
    "@id" : "http://www.w3.org/2004/02/skos/core#Concept"
  } ],
  "http://www.w3.org/2000/01/rdf-schema#comment" : [ {
    "@language" : "en",
    "@value" : "Ensur(ing) that any data contained in a resource is not available when the resource is de-allocated from one object and reallocated to a different object."
  } ],
  "http://www.w3.org/2000/01/rdf-schema#isDefinedBy" : [ {
    "@id" : "https://openark.adaptcentre.ie/Ontologies/ARKControlTerminology#"
  } ],
  "http://www.w3.org/2000/01/rdf-schema#label" : [ {
    "@language" : "en",
    "@value" : "Information protection"
  } ],
  "http://www.w3.org/2004/02/skos/core#definition" : [ {
    "@language" : "en",
    "@value" : "Ensur(ing) that any data contained in a resource is not available when the resource is de-allocated from one object and reallocated to a different object."
  } ],
  "http://www.w3.org/2004/02/skos/core#inScheme" : [ {
    "@id" : "https://openark.adaptcentre.ie/Ontologies/ARKControlTerminology#"
  } ],
  "http://www.w3.org/2004/02/skos/core#prefLabel" : [ {
    "@language" : "en",
    "@value" : "Information protection"
  } ]
}, {
  "@id" : "https://openark.adaptcentre.ie/Ontologies/ARKControlTerminology#InformationSecurity",
  "@type" : [ "http://www.w3.org/2002/07/owl#NamedIndividual" ],
  "http://purl.org/dc/terms/contributor" : [ {
    "@value" : "Junli Liang"
  }, {
    "@value" : "Rob Brennan"
  } ],
  "http://purl.org/dc/terms/created" : [ {
    "@type" : "http://www.w3.org/2001/XMLSchema#date",
    "@value" : "2024-04-08"
  } ],
  "http://purl.org/dc/terms/source" : [ {
    "@value" : "ISO27000:2018"
  } ],
  "http://www.w3.org/1999/02/22-rdf-syntax-ns#type" : [ {
    "@id" : "http://www.w3.org/2004/02/skos/core#Concept"
  } ],
  "http://www.w3.org/2000/01/rdf-schema#comment" : [ {
    "@language" : "en",
    "@value" : "preservation of confidentiality (3.10), integrity (3.36) and availability (3.7) of information Note 1 to entry: In addition, other properties, such as authenticity (3.6), accountability, non-repudiation (3.48), and reliability (3.55) can also be involved."
  } ],
  "http://www.w3.org/2000/01/rdf-schema#isDefinedBy" : [ {
    "@id" : "https://openark.adaptcentre.ie/Ontologies/ARKControlTerminology#"
  } ],
  "http://www.w3.org/2000/01/rdf-schema#label" : [ {
    "@language" : "en",
    "@value" : "Information security"
  } ],
  "http://www.w3.org/2004/02/skos/core#definition" : [ {
    "@language" : "en",
    "@value" : "preservation of confidentiality (3.10), integrity (3.36) and availability (3.7) of information Note 1 to entry: In addition, other properties, such as authenticity (3.6), accountability, non-repudiation (3.48), and reliability (3.55) can also be involved."
  } ],
  "http://www.w3.org/2004/02/skos/core#inScheme" : [ {
    "@id" : "https://openark.adaptcentre.ie/Ontologies/ARKControlTerminology#"
  } ],
  "http://www.w3.org/2004/02/skos/core#prefLabel" : [ {
    "@language" : "en",
    "@value" : "Information security"
  } ]
}, {
  "@id" : "https://openark.adaptcentre.ie/Ontologies/ARKControlTerminology#InformationSecurityAssurance",
  "@type" : [ "http://www.w3.org/2002/07/owl#NamedIndividual" ],
  "http://purl.org/dc/terms/contributor" : [ {
    "@value" : "Junli Liang"
  }, {
    "@value" : "Rob Brennan"
  } ],
  "http://purl.org/dc/terms/created" : [ {
    "@type" : "http://www.w3.org/2001/XMLSchema#date",
    "@value" : "2024-03-14"
  } ],
  "http://purl.org/dc/terms/source" : [ {
    "@value" : "ISO/IEC 27002:2022(E)"
  } ],
  "http://www.w3.org/1999/02/22-rdf-syntax-ns#type" : [ {
    "@id" : "http://www.w3.org/2004/02/skos/core#Concept"
  } ],
  "http://www.w3.org/2000/01/rdf-schema#comment" : [ {
    "@language" : "en",
    "@value" : "Measure of confidence that the security features, practices, procedures, and architecture of an information system accurately mediates and enforces the security policy."
  } ],
  "http://www.w3.org/2000/01/rdf-schema#isDefinedBy" : [ {
    "@id" : "https://openark.adaptcentre.ie/Ontologies/ARKControlTerminology#"
  } ],
  "http://www.w3.org/2000/01/rdf-schema#label" : [ {
    "@language" : "en",
    "@value" : "Information security assurance"
  } ],
  "http://www.w3.org/2004/02/skos/core#definition" : [ {
    "@language" : "en",
    "@value" : "Measure of confidence that the security features, practices, procedures, and architecture of an information system accurately mediates and enforces the security policy."
  } ],
  "http://www.w3.org/2004/02/skos/core#inScheme" : [ {
    "@id" : "https://openark.adaptcentre.ie/Ontologies/ARKControlTerminology#"
  } ],
  "http://www.w3.org/2004/02/skos/core#prefLabel" : [ {
    "@language" : "en",
    "@value" : "Information security assurance"
  } ]
}, {
  "@id" : "https://openark.adaptcentre.ie/Ontologies/ARKControlTerminology#InformationSecurityContinuity",
  "@type" : [ "http://www.w3.org/2002/07/owl#NamedIndividual" ],
  "http://purl.org/dc/terms/contributor" : [ {
    "@value" : "Junli Liang"
  }, {
    "@value" : "Rob Brennan"
  } ],
  "http://purl.org/dc/terms/created" : [ {
    "@type" : "http://www.w3.org/2001/XMLSchema#date",
    "@value" : "2024-04-08"
  } ],
  "http://purl.org/dc/terms/source" : [ {
    "@value" : "ISO27000:2018"
  } ],
  "http://www.w3.org/1999/02/22-rdf-syntax-ns#type" : [ {
    "@id" : "http://www.w3.org/2004/02/skos/core#Concept"
  } ],
  "http://www.w3.org/2000/01/rdf-schema#comment" : [ {
    "@language" : "en",
    "@value" : "processes (3.54) and procedures for ensuring continued information security (3.28) operations."
  } ],
  "http://www.w3.org/2000/01/rdf-schema#isDefinedBy" : [ {
    "@id" : "https://openark.adaptcentre.ie/Ontologies/ARKControlTerminology#"
  } ],
  "http://www.w3.org/2000/01/rdf-schema#label" : [ {
    "@language" : "en",
    "@value" : "Information security continuity"
  } ],
  "http://www.w3.org/2004/02/skos/core#broader" : [ {
    "@id" : "https://openark.adaptcentre.ie/Ontologies/ARKControlTerminology#InformationSecurity"
  } ],
  "http://www.w3.org/2004/02/skos/core#definition" : [ {
    "@language" : "en",
    "@value" : "processes (3.54) and procedures for ensuring continued information security (3.28) operations."
  } ],
  "http://www.w3.org/2004/02/skos/core#inScheme" : [ {
    "@id" : "https://openark.adaptcentre.ie/Ontologies/ARKControlTerminology#"
  } ],
  "http://www.w3.org/2004/02/skos/core#prefLabel" : [ {
    "@language" : "en",
    "@value" : "Information security continuity"
  } ]
}, {
  "@id" : "https://openark.adaptcentre.ie/Ontologies/ARKControlTerminology#InformationSecurityEvent",
  "@type" : [ "http://www.w3.org/2002/07/owl#NamedIndividual" ],
  "http://purl.org/dc/terms/contributor" : [ {
    "@value" : "Junli Liang"
  }, {
    "@value" : "Rob Brennan"
  } ],
  "http://purl.org/dc/terms/created" : [ {
    "@type" : "http://www.w3.org/2001/XMLSchema#date",
    "@value" : "2024-04-08"
  } ],
  "http://purl.org/dc/terms/source" : [ {
    "@value" : "ISO27000:2018"
  } ],
  "http://www.w3.org/1999/02/22-rdf-syntax-ns#type" : [ {
    "@id" : "http://www.w3.org/2004/02/skos/core#Concept"
  } ],
  "http://www.w3.org/2000/01/rdf-schema#comment" : [ {
    "@language" : "en",
    "@value" : "identified occurrence of a system, service or network state indicating a possible breach of information security (3.28) policy (3.53) or failure of controls (3.14), or a previously unknown situation that can be security relevant."
  } ],
  "http://www.w3.org/2000/01/rdf-schema#isDefinedBy" : [ {
    "@id" : "https://openark.adaptcentre.ie/Ontologies/ARKControlTerminology#"
  } ],
  "http://www.w3.org/2000/01/rdf-schema#label" : [ {
    "@language" : "en",
    "@value" : "Information security event"
  } ],
  "http://www.w3.org/2004/02/skos/core#broader" : [ {
    "@id" : "https://openark.adaptcentre.ie/Ontologies/ARKControlTerminology#InformationSecurity"
  } ],
  "http://www.w3.org/2004/02/skos/core#definition" : [ {
    "@language" : "en",
    "@value" : "identified occurrence of a system, service or network state indicating a possible breach of information security (3.28) policy (3.53) or failure of controls (3.14), or a previously unknown situation that can be security relevant."
  } ],
  "http://www.w3.org/2004/02/skos/core#inScheme" : [ {
    "@id" : "https://openark.adaptcentre.ie/Ontologies/ARKControlTerminology#"
  } ],
  "http://www.w3.org/2004/02/skos/core#prefLabel" : [ {
    "@language" : "en",
    "@value" : "Information security event"
  } ]
}, {
  "@id" : "https://openark.adaptcentre.ie/Ontologies/ARKControlTerminology#InformationSecurityEventManagement",
  "@type" : [ "http://www.w3.org/2002/07/owl#NamedIndividual" ],
  "http://purl.org/dc/terms/contributor" : [ {
    "@value" : "Junli Liang"
  }, {
    "@value" : "Rob Brennan"
  } ],
  "http://purl.org/dc/terms/created" : [ {
    "@type" : "http://www.w3.org/2001/XMLSchema#date",
    "@value" : "2024-03-14"
  } ],
  "http://purl.org/dc/terms/source" : [ {
    "@value" : "ISO/IEC 27002:2022(E)"
  } ],
  "http://www.w3.org/1999/02/22-rdf-syntax-ns#type" : [ {
    "@id" : "http://www.w3.org/2004/02/skos/core#Concept"
  } ],
  "http://www.w3.org/2000/01/rdf-schema#comment" : [ {
    "@language" : "en",
    "@value" : "A program that provides centralized logging capabilities for a variety of log types."
  } ],
  "http://www.w3.org/2000/01/rdf-schema#isDefinedBy" : [ {
    "@id" : "https://openark.adaptcentre.ie/Ontologies/ARKControlTerminology#"
  } ],
  "http://www.w3.org/2000/01/rdf-schema#label" : [ {
    "@language" : "en",
    "@value" : "Information security event management"
  } ],
  "http://www.w3.org/2004/02/skos/core#definition" : [ {
    "@language" : "en",
    "@value" : "A program that provides centralized logging capabilities for a variety of log types."
  } ],
  "http://www.w3.org/2004/02/skos/core#inScheme" : [ {
    "@id" : "https://openark.adaptcentre.ie/Ontologies/ARKControlTerminology#"
  } ],
  "http://www.w3.org/2004/02/skos/core#prefLabel" : [ {
    "@language" : "en",
    "@value" : "Information security event management"
  } ]
}, {
  "@id" : "https://openark.adaptcentre.ie/Ontologies/ARKControlTerminology#InformationSecurityIncident",
  "@type" : [ "http://www.w3.org/2002/07/owl#NamedIndividual" ],
  "http://purl.org/dc/terms/contributor" : [ {
    "@value" : "Junli Liang"
  }, {
    "@value" : "Rob Brennan"
  } ],
  "http://purl.org/dc/terms/created" : [ {
    "@type" : "http://www.w3.org/2001/XMLSchema#date",
    "@value" : "2024-04-08"
  } ],
  "http://purl.org/dc/terms/source" : [ {
    "@value" : "ISO27000:2018"
  } ],
  "http://www.w3.org/1999/02/22-rdf-syntax-ns#type" : [ {
    "@id" : "http://www.w3.org/2004/02/skos/core#Concept"
  } ],
  "http://www.w3.org/2000/01/rdf-schema#comment" : [ {
    "@language" : "en",
    "@value" : "single or a series of unwanted or unexpected information security events (3.30) that have a significant probability of compromising business operations and threatening information security (3.28)"
  } ],
  "http://www.w3.org/2000/01/rdf-schema#isDefinedBy" : [ {
    "@id" : "https://openark.adaptcentre.ie/Ontologies/ARKControlTerminology#"
  } ],
  "http://www.w3.org/2000/01/rdf-schema#label" : [ {
    "@language" : "en",
    "@value" : "Information security incident"
  } ],
  "http://www.w3.org/2004/02/skos/core#broader" : [ {
    "@id" : "https://openark.adaptcentre.ie/Ontologies/ARKControlTerminology#InformationSecurity"
  } ],
  "http://www.w3.org/2004/02/skos/core#definition" : [ {
    "@language" : "en",
    "@value" : "single or a series of unwanted or unexpected information security events (3.30) that have a significant probability of compromising business operations and threatening information security (3.28)"
  } ],
  "http://www.w3.org/2004/02/skos/core#inScheme" : [ {
    "@id" : "https://openark.adaptcentre.ie/Ontologies/ARKControlTerminology#"
  } ],
  "http://www.w3.org/2004/02/skos/core#prefLabel" : [ {
    "@language" : "en",
    "@value" : "Information security incident"
  } ]
}, {
  "@id" : "https://openark.adaptcentre.ie/Ontologies/ARKControlTerminology#InformationSecurityIncidentManagement",
  "@type" : [ "http://www.w3.org/2002/07/owl#NamedIndividual" ],
  "http://purl.org/dc/terms/contributor" : [ {
    "@value" : "Junli Liang"
  }, {
    "@value" : "Rob Brennan"
  } ],
  "http://purl.org/dc/terms/created" : [ {
    "@type" : "http://www.w3.org/2001/XMLSchema#date",
    "@value" : "2024-04-08"
  } ],
  "http://purl.org/dc/terms/source" : [ {
    "@value" : "ISO27000:2018"
  } ],
  "http://www.w3.org/1999/02/22-rdf-syntax-ns#type" : [ {
    "@id" : "http://www.w3.org/2004/02/skos/core#Concept"
  } ],
  "http://www.w3.org/2000/01/rdf-schema#comment" : [ {
    "@language" : "en",
    "@value" : "set of processes (3.54) for detecting, reporting, assessing, responding to, dealing with, and learning from information security incidents (3.31)"
  } ],
  "http://www.w3.org/2000/01/rdf-schema#isDefinedBy" : [ {
    "@id" : "https://openark.adaptcentre.ie/Ontologies/ARKControlTerminology#"
  } ],
  "http://www.w3.org/2000/01/rdf-schema#label" : [ {
    "@language" : "en",
    "@value" : "Information security incident management"
  } ],
  "http://www.w3.org/2004/02/skos/core#broader" : [ {
    "@id" : "https://openark.adaptcentre.ie/Ontologies/ARKControlTerminology#InformationSecurityIncident"
  } ],
  "http://www.w3.org/2004/02/skos/core#definition" : [ {
    "@language" : "en",
    "@value" : "set of processes (3.54) for detecting, reporting, assessing, responding to, dealing with, and learning from information security incidents (3.31)"
  } ],
  "http://www.w3.org/2004/02/skos/core#inScheme" : [ {
    "@id" : "https://openark.adaptcentre.ie/Ontologies/ARKControlTerminology#"
  } ],
  "http://www.w3.org/2004/02/skos/core#prefLabel" : [ {
    "@language" : "en",
    "@value" : "Information security incident management"
  } ]
}, {
  "@id" : "https://openark.adaptcentre.ie/Ontologies/ARKControlTerminology#InformationSecurityManagementSystemProfessional",
  "@type" : [ "http://www.w3.org/2002/07/owl#NamedIndividual" ],
  "http://purl.org/dc/terms/contributor" : [ {
    "@value" : "Junli Liang"
  }, {
    "@value" : "Rob Brennan"
  } ],
  "http://purl.org/dc/terms/created" : [ {
    "@type" : "http://www.w3.org/2001/XMLSchema#date",
    "@value" : "2024-04-08"
  } ],
  "http://purl.org/dc/terms/source" : [ {
    "@value" : "ISO27000:2018"
  } ],
  "http://www.w3.org/1999/02/22-rdf-syntax-ns#type" : [ {
    "@id" : "http://www.w3.org/2004/02/skos/core#Concept"
  } ],
  "http://www.w3.org/2000/01/rdf-schema#comment" : [ {
    "@language" : "en",
    "@value" : "person who establishes, implements, maintains and continuously improves one or more information security management system processes (3.54)"
  } ],
  "http://www.w3.org/2000/01/rdf-schema#isDefinedBy" : [ {
    "@id" : "https://openark.adaptcentre.ie/Ontologies/ARKControlTerminology#"
  } ],
  "http://www.w3.org/2000/01/rdf-schema#label" : [ {
    "@language" : "en",
    "@value" : "Information security management system professional"
  } ],
  "http://www.w3.org/2004/02/skos/core#broader" : [ {
    "@id" : "https://openark.adaptcentre.ie/Ontologies/ARKControlTerminology#InformationSecurityIncidentManagement"
  } ],
  "http://www.w3.org/2004/02/skos/core#definition" : [ {
    "@language" : "en",
    "@value" : "person who establishes, implements, maintains and continuously improves one or more information security management system processes (3.54)"
  } ],
  "http://www.w3.org/2004/02/skos/core#inScheme" : [ {
    "@id" : "https://openark.adaptcentre.ie/Ontologies/ARKControlTerminology#"
  } ],
  "http://www.w3.org/2004/02/skos/core#prefLabel" : [ {
    "@language" : "en",
    "@value" : "Information security management system professional"
  } ]
}, {
  "@id" : "https://openark.adaptcentre.ie/Ontologies/ARKControlTerminology#InformationSharingCommunity",
  "@type" : [ "http://www.w3.org/2002/07/owl#NamedIndividual" ],
  "http://purl.org/dc/terms/contributor" : [ {
    "@value" : "Junli Liang"
  }, {
    "@value" : "Rob Brennan"
  } ],
  "http://purl.org/dc/terms/created" : [ {
    "@type" : "http://www.w3.org/2001/XMLSchema#date",
    "@value" : "2024-04-08"
  } ],
  "http://purl.org/dc/terms/source" : [ {
    "@value" : "ISO27000:2018"
  } ],
  "http://www.w3.org/1999/02/22-rdf-syntax-ns#type" : [ {
    "@id" : "http://www.w3.org/2004/02/skos/core#Concept"
  } ],
  "http://www.w3.org/2000/01/rdf-schema#comment" : [ {
    "@language" : "en",
    "@value" : "group of organizations (3.50) that agree to share information Note 1 to entry: An organization can be an individual."
  } ],
  "http://www.w3.org/2000/01/rdf-schema#isDefinedBy" : [ {
    "@id" : "https://openark.adaptcentre.ie/Ontologies/ARKControlTerminology#"
  } ],
  "http://www.w3.org/2000/01/rdf-schema#label" : [ {
    "@language" : "en",
    "@value" : "Information sharing community"
  } ],
  "http://www.w3.org/2004/02/skos/core#definition" : [ {
    "@language" : "en",
    "@value" : "group of organizations (3.50) that agree to share information Note 1 to entry: An organization can be an individual."
  } ],
  "http://www.w3.org/2004/02/skos/core#inScheme" : [ {
    "@id" : "https://openark.adaptcentre.ie/Ontologies/ARKControlTerminology#"
  } ],
  "http://www.w3.org/2004/02/skos/core#prefLabel" : [ {
    "@language" : "en",
    "@value" : "Information sharing community"
  } ]
}, {
  "@id" : "https://openark.adaptcentre.ie/Ontologies/ARKControlTerminology#InformationSystem",
  "@type" : [ "http://www.w3.org/2002/07/owl#NamedIndividual" ],
  "http://purl.org/dc/terms/contributor" : [ {
    "@value" : "Junli Liang"
  }, {
    "@value" : "Rob Brennan"
  } ],
  "http://purl.org/dc/terms/created" : [ {
    "@type" : "http://www.w3.org/2001/XMLSchema#date",
    "@value" : "2024-04-08"
  } ],
  "http://purl.org/dc/terms/source" : [ {
    "@value" : "ISO27000:2018"
  } ],
  "http://www.w3.org/1999/02/22-rdf-syntax-ns#type" : [ {
    "@id" : "http://www.w3.org/2004/02/skos/core#Concept"
  } ],
  "http://www.w3.org/2000/01/rdf-schema#comment" : [ {
    "@language" : "en",
    "@value" : "set of applications, services, information technology assets, or other information-handling components."
  } ],
  "http://www.w3.org/2000/01/rdf-schema#isDefinedBy" : [ {
    "@id" : "https://openark.adaptcentre.ie/Ontologies/ARKControlTerminology#"
  } ],
  "http://www.w3.org/2000/01/rdf-schema#label" : [ {
    "@language" : "en",
    "@value" : "Information system"
  } ],
  "http://www.w3.org/2004/02/skos/core#definition" : [ {
    "@language" : "en",
    "@value" : "set of applications, services, information technology assets, or other information-handling components."
  } ],
  "http://www.w3.org/2004/02/skos/core#inScheme" : [ {
    "@id" : "https://openark.adaptcentre.ie/Ontologies/ARKControlTerminology#"
  } ],
  "http://www.w3.org/2004/02/skos/core#prefLabel" : [ {
    "@language" : "en",
    "@value" : "Information system"
  } ]
}, {
  "@id" : "https://openark.adaptcentre.ie/Ontologies/ARKControlTerminology#InformationSystemContext",
  "@type" : [ "http://www.w3.org/2002/07/owl#NamedIndividual" ],
  "http://purl.org/dc/terms/contributor" : [ {
    "@value" : "Junli Liang"
  }, {
    "@value" : "Rob Brennan"
  } ],
  "http://purl.org/dc/terms/created" : [ {
    "@type" : "http://www.w3.org/2001/XMLSchema#date",
    "@value" : "2024-04-08"
  } ],
  "http://purl.org/dc/terms/source" : [ {
    "@value" : "ISO27000:2044"
  } ],
  "http://www.w3.org/1999/02/22-rdf-syntax-ns#type" : [ {
    "@id" : "http://www.w3.org/2004/02/skos/core#Concept"
  } ],
  "http://www.w3.org/2000/01/rdf-schema#comment" : [ {
    "@language" : "en",
    "@value" : "Information system context in cybersecurity"
  } ],
  "http://www.w3.org/2000/01/rdf-schema#isDefinedBy" : [ {
    "@id" : "https://openark.adaptcentre.ie/Ontologies/ARKControlTerminology#"
  } ],
  "http://www.w3.org/2000/01/rdf-schema#label" : [ {
    "@language" : "en",
    "@value" : "InformationSystemContext"
  } ],
  "http://www.w3.org/2004/02/skos/core#definition" : [ {
    "@language" : "en",
    "@value" : "Information system context in cybersecurity"
  } ],
  "http://www.w3.org/2004/02/skos/core#inScheme" : [ {
    "@id" : "https://openark.adaptcentre.ie/Ontologies/ARKControlTerminology#"
  } ],
  "http://www.w3.org/2004/02/skos/core#prefLabel" : [ {
    "@language" : "en",
    "@value" : "InformationSystemContext"
  } ]
}, {
  "@id" : "https://openark.adaptcentre.ie/Ontologies/ARKControlTerminology#Integreity",
  "@type" : [ "http://www.w3.org/2002/07/owl#NamedIndividual" ],
  "http://purl.org/dc/terms/contributor" : [ {
    "@value" : "Junli Liang"
  }, {
    "@value" : "Rob Brennan"
  } ],
  "http://purl.org/dc/terms/created" : [ {
    "@type" : "http://www.w3.org/2001/XMLSchema#date",
    "@value" : "2024-03-14"
  } ],
  "http://purl.org/dc/terms/source" : [ {
    "@value" : "ISO/IEC 27002:2022(E)"
  } ],
  "http://www.w3.org/1999/02/22-rdf-syntax-ns#type" : [ {
    "@id" : "http://www.w3.org/2004/02/skos/core#Concept"
  } ],
  "http://www.w3.org/2000/01/rdf-schema#comment" : [ {
    "@language" : "en",
    "@value" : "Guarding against improper information modification or destruction, and includes ensuring information non-repudiation and authenticity."
  } ],
  "http://www.w3.org/2000/01/rdf-schema#isDefinedBy" : [ {
    "@id" : "https://openark.adaptcentre.ie/Ontologies/ARKControlTerminology#"
  } ],
  "http://www.w3.org/2000/01/rdf-schema#label" : [ {
    "@language" : "en",
    "@value" : "Integreity"
  } ],
  "http://www.w3.org/2004/02/skos/core#definition" : [ {
    "@language" : "en",
    "@value" : "Guarding against improper information modification or destruction, and includes ensuring information non-repudiation and authenticity."
  } ],
  "http://www.w3.org/2004/02/skos/core#inScheme" : [ {
    "@id" : "https://openark.adaptcentre.ie/Ontologies/ARKControlTerminology#"
  } ],
  "http://www.w3.org/2004/02/skos/core#prefLabel" : [ {
    "@language" : "en",
    "@value" : "Integreity"
  } ]
}, {
  "@id" : "https://openark.adaptcentre.ie/Ontologies/ARKControlTerminology#Integrity",
  "@type" : [ "http://www.w3.org/2002/07/owl#NamedIndividual" ],
  "http://purl.org/dc/terms/contributor" : [ {
    "@value" : "Junli Liang"
  }, {
    "@value" : "Rob Brennan"
  } ],
  "http://purl.org/dc/terms/created" : [ {
    "@type" : "http://www.w3.org/2001/XMLSchema#date",
    "@value" : "2024-04-08"
  } ],
  "http://purl.org/dc/terms/source" : [ {
    "@value" : "ISO27000:2018"
  } ],
  "http://www.w3.org/1999/02/22-rdf-syntax-ns#type" : [ {
    "@id" : "http://www.w3.org/2004/02/skos/core#Concept"
  } ],
  "http://www.w3.org/2000/01/rdf-schema#comment" : [ {
    "@language" : "en",
    "@value" : "property of accuracy and completenes."
  } ],
  "http://www.w3.org/2000/01/rdf-schema#isDefinedBy" : [ {
    "@id" : "https://openark.adaptcentre.ie/Ontologies/ARKControlTerminology#"
  } ],
  "http://www.w3.org/2000/01/rdf-schema#label" : [ {
    "@language" : "en",
    "@value" : "Integrity"
  } ],
  "http://www.w3.org/2004/02/skos/core#broader" : [ {
    "@id" : "https://openark.adaptcentre.ie/Ontologies/ARKControlTerminology#InformationSecurity"
  } ],
  "http://www.w3.org/2004/02/skos/core#definition" : [ {
    "@language" : "en",
    "@value" : "property of accuracy and completenes."
  } ],
  "http://www.w3.org/2004/02/skos/core#inScheme" : [ {
    "@id" : "https://openark.adaptcentre.ie/Ontologies/ARKControlTerminology#"
  } ],
  "http://www.w3.org/2004/02/skos/core#prefLabel" : [ {
    "@language" : "en",
    "@value" : "Integrity"
  } ]
}, {
  "@id" : "https://openark.adaptcentre.ie/Ontologies/ARKControlTerminology#InterestedParty",
  "@type" : [ "http://www.w3.org/2002/07/owl#NamedIndividual" ],
  "http://purl.org/dc/terms/contributor" : [ {
    "@value" : "Junli Liang"
  }, {
    "@value" : "Rob Brennan"
  } ],
  "http://purl.org/dc/terms/created" : [ {
    "@type" : "http://www.w3.org/2001/XMLSchema#date",
    "@value" : "2024-04-08"
  } ],
  "http://purl.org/dc/terms/source" : [ {
    "@value" : "ISO27000:2018"
  } ],
  "http://www.w3.org/1999/02/22-rdf-syntax-ns#type" : [ {
    "@id" : "http://www.w3.org/2004/02/skos/core#Concept"
  } ],
  "http://www.w3.org/2000/01/rdf-schema#comment" : [ {
    "@language" : "en",
    "@value" : "person or organization (3.50) that can affect, be affected by, or perceive itself to be affected by a decision or activity."
  } ],
  "http://www.w3.org/2000/01/rdf-schema#isDefinedBy" : [ {
    "@id" : "https://openark.adaptcentre.ie/Ontologies/ARKControlTerminology#"
  } ],
  "http://www.w3.org/2000/01/rdf-schema#label" : [ {
    "@language" : "en",
    "@value" : "Interested party"
  } ],
  "http://www.w3.org/2004/02/skos/core#definition" : [ {
    "@language" : "en",
    "@value" : "person or organization (3.50) that can affect, be affected by, or perceive itself to be affected by a decision or activity."
  } ],
  "http://www.w3.org/2004/02/skos/core#inScheme" : [ {
    "@id" : "https://openark.adaptcentre.ie/Ontologies/ARKControlTerminology#"
  } ],
  "http://www.w3.org/2004/02/skos/core#prefLabel" : [ {
    "@language" : "en",
    "@value" : "Interested party"
  } ]
}, {
  "@id" : "https://openark.adaptcentre.ie/Ontologies/ARKControlTerminology#InternalAudit",
  "@type" : [ "http://www.w3.org/2002/07/owl#NamedIndividual" ],
  "http://purl.org/dc/terms/contributor" : [ {
    "@value" : "Junli Liang"
  }, {
    "@value" : "Rob Brennan"
  } ],
  "http://purl.org/dc/terms/created" : [ {
    "@type" : "http://www.w3.org/2001/XMLSchema#date",
    "@value" : "2024-04-08"
  } ],
  "http://purl.org/dc/terms/source" : [ {
    "@value" : "ISO27000:2019"
  } ],
  "http://www.w3.org/1999/02/22-rdf-syntax-ns#type" : [ {
    "@id" : "http://www.w3.org/2004/02/skos/core#Concept"
  } ],
  "http://www.w3.org/2000/01/rdf-schema#comment" : [ {
    "@language" : "en",
    "@value" : "An internal audit is conducted by the organization itself, or by an external party on its behalf."
  } ],
  "http://www.w3.org/2000/01/rdf-schema#isDefinedBy" : [ {
    "@id" : "https://openark.adaptcentre.ie/Ontologies/ARKControlTerminology#"
  } ],
  "http://www.w3.org/2000/01/rdf-schema#label" : [ {
    "@language" : "en",
    "@value" : "Internal audit"
  } ],
  "http://www.w3.org/2004/02/skos/core#definition" : [ {
    "@language" : "en",
    "@value" : "An internal audit is conducted by the organization itself, or by an external party on its behalf."
  } ],
  "http://www.w3.org/2004/02/skos/core#inScheme" : [ {
    "@id" : "https://openark.adaptcentre.ie/Ontologies/ARKControlTerminology#"
  } ],
  "http://www.w3.org/2004/02/skos/core#prefLabel" : [ {
    "@language" : "en",
    "@value" : "Internal audit"
  } ]
}, {
  "@id" : "https://openark.adaptcentre.ie/Ontologies/ARKControlTerminology#InternalContext",
  "@type" : [ "http://www.w3.org/2002/07/owl#NamedIndividual" ],
  "http://purl.org/dc/terms/contributor" : [ {
    "@value" : "Junli Liang"
  }, {
    "@value" : "Rob Brennan"
  } ],
  "http://purl.org/dc/terms/created" : [ {
    "@type" : "http://www.w3.org/2001/XMLSchema#date",
    "@value" : "2024-04-08"
  } ],
  "http://purl.org/dc/terms/source" : [ {
    "@value" : "ISO27000:2018"
  } ],
  "http://www.w3.org/1999/02/22-rdf-syntax-ns#type" : [ {
    "@id" : "http://www.w3.org/2004/02/skos/core#Concept"
  } ],
  "http://www.w3.org/2000/01/rdf-schema#comment" : [ {
    "@language" : "en",
    "@value" : "internal environment in which the organization (3.50) seeks to achieve its objectives Note 1 to entry: Internal context can include: — governance, organizational structure, roles and accountabilities; — policies (3.53), objectives (3.49), and the strategies that are in place to achieve them; — the capabilities, understood in terms of resources and knowledge (e.g. capital, time, people, processes (3.54), systems and technologies); — information systems (3.35), information flows and decision-making processes (both formal and informal); — relationships with, and perceptions and values of, internal stakeholders (3.37); — the organization's culture; — standards, guidelines and models adopted by the organization; — form and extent of contractual relationships."
  } ],
  "http://www.w3.org/2000/01/rdf-schema#isDefinedBy" : [ {
    "@id" : "https://openark.adaptcentre.ie/Ontologies/ARKControlTerminology#"
  } ],
  "http://www.w3.org/2000/01/rdf-schema#label" : [ {
    "@language" : "en",
    "@value" : "Internal context"
  } ],
  "http://www.w3.org/2004/02/skos/core#definition" : [ {
    "@language" : "en",
    "@value" : "internal environment in which the organization (3.50) seeks to achieve its objectives Note 1 to entry: Internal context can include: — governance, organizational structure, roles and accountabilities; — policies (3.53), objectives (3.49), and the strategies that are in place to achieve them; — the capabilities, understood in terms of resources and knowledge (e.g. capital, time, people, processes (3.54), systems and technologies); — information systems (3.35), information flows and decision-making processes (both formal and informal); — relationships with, and perceptions and values of, internal stakeholders (3.37); — the organization's culture; — standards, guidelines and models adopted by the organization; — form and extent of contractual relationships."
  } ],
  "http://www.w3.org/2004/02/skos/core#inScheme" : [ {
    "@id" : "https://openark.adaptcentre.ie/Ontologies/ARKControlTerminology#"
  } ],
  "http://www.w3.org/2004/02/skos/core#narrower" : [ {
    "@id" : "https://openark.adaptcentre.ie/Ontologies/ARKControlTerminology#CapabilitiesContext"
  }, {
    "@id" : "https://openark.adaptcentre.ie/Ontologies/ARKControlTerminology#ContractualContext"
  }, {
    "@id" : "https://openark.adaptcentre.ie/Ontologies/ARKControlTerminology#CultureContext"
  }, {
    "@id" : "https://openark.adaptcentre.ie/Ontologies/ARKControlTerminology#DecisionMakingProcessContext"
  }, {
    "@id" : "https://openark.adaptcentre.ie/Ontologies/ARKControlTerminology#GovernanceContext"
  }, {
    "@id" : "https://openark.adaptcentre.ie/Ontologies/ARKControlTerminology#GuidelinesContext"
  }, {
    "@id" : "https://openark.adaptcentre.ie/Ontologies/ARKControlTerminology#InformationFlowContext"
  }, {
    "@id" : "https://openark.adaptcentre.ie/Ontologies/ARKControlTerminology#InformationSystemContext"
  }, {
    "@id" : "https://openark.adaptcentre.ie/Ontologies/ARKControlTerminology#InternalStakeholderContext"
  }, {
    "@id" : "https://openark.adaptcentre.ie/Ontologies/ARKControlTerminology#ModelsContext"
  }, {
    "@id" : "https://openark.adaptcentre.ie/Ontologies/ARKControlTerminology#ObjectiveContext"
  }, {
    "@id" : "https://openark.adaptcentre.ie/Ontologies/ARKControlTerminology#OrganisationalStructureContext"
  }, {
    "@id" : "https://openark.adaptcentre.ie/Ontologies/ARKControlTerminology#OrganizationalAccountabilityContext"
  }, {
    "@id" : "https://openark.adaptcentre.ie/Ontologies/ARKControlTerminology#OrganizationalRoleContext"
  }, {
    "@id" : "https://openark.adaptcentre.ie/Ontologies/ARKControlTerminology#PolicyContext"
  }, {
    "@id" : "https://openark.adaptcentre.ie/Ontologies/ARKControlTerminology#StandardsContext"
  }, {
    "@id" : "https://openark.adaptcentre.ie/Ontologies/ARKControlTerminology#StrategyContext"
  } ],
  "http://www.w3.org/2004/02/skos/core#prefLabel" : [ {
    "@language" : "en",
    "@value" : "Internal context"
  } ]
}, {
  "@id" : "https://openark.adaptcentre.ie/Ontologies/ARKControlTerminology#InternalStakeholderContext",
  "@type" : [ "http://www.w3.org/2002/07/owl#NamedIndividual" ],
  "http://purl.org/dc/terms/contributor" : [ {
    "@value" : "Junli Liang"
  }, {
    "@value" : "Rob Brennan"
  } ],
  "http://purl.org/dc/terms/created" : [ {
    "@type" : "http://www.w3.org/2001/XMLSchema#date",
    "@value" : "2024-04-08"
  } ],
  "http://purl.org/dc/terms/source" : [ {
    "@value" : "ISO27000:2049"
  } ],
  "http://www.w3.org/1999/02/22-rdf-syntax-ns#type" : [ {
    "@id" : "http://www.w3.org/2004/02/skos/core#Concept"
  } ],
  "http://www.w3.org/2000/01/rdf-schema#comment" : [ {
    "@language" : "en",
    "@value" : "Internal stakeholder context in cybersecurity"
  } ],
  "http://www.w3.org/2000/01/rdf-schema#isDefinedBy" : [ {
    "@id" : "https://openark.adaptcentre.ie/Ontologies/ARKControlTerminology#"
  } ],
  "http://www.w3.org/2000/01/rdf-schema#label" : [ {
    "@language" : "en",
    "@value" : "Internal stakeholder context"
  } ],
  "http://www.w3.org/2004/02/skos/core#definition" : [ {
    "@language" : "en",
    "@value" : "Internal stakeholder context in cybersecurity"
  } ],
  "http://www.w3.org/2004/02/skos/core#inScheme" : [ {
    "@id" : "https://openark.adaptcentre.ie/Ontologies/ARKControlTerminology#"
  } ],
  "http://www.w3.org/2004/02/skos/core#prefLabel" : [ {
    "@language" : "en",
    "@value" : "Internal stakeholder context"
  } ]
}, {
  "@id" : "https://openark.adaptcentre.ie/Ontologies/ARKControlTerminology#KeyDriversAndTrends",
  "@type" : [ "http://www.w3.org/2002/07/owl#NamedIndividual" ],
  "http://purl.org/dc/terms/contributor" : [ {
    "@value" : "Junli Liang"
  }, {
    "@value" : "Rob Brennan"
  } ],
  "http://purl.org/dc/terms/created" : [ {
    "@type" : "http://www.w3.org/2001/XMLSchema#date",
    "@value" : "2024-04-08"
  } ],
  "http://purl.org/dc/terms/source" : [ {
    "@value" : "ISO27000:2025"
  } ],
  "http://www.w3.org/1999/02/22-rdf-syntax-ns#type" : [ {
    "@id" : "http://www.w3.org/2004/02/skos/core#Concept"
  } ],
  "http://www.w3.org/2000/01/rdf-schema#comment" : [ {
    "@language" : "en",
    "@value" : "The cybersecurity landscape is continually evolving, driven by a range of key factors and emerging trends. These drivers and trends shape the strategies of businesses, governments, and cybersecurity providers as they work to protect against increasingly sophisticated cyber threats."
  } ],
  "http://www.w3.org/2000/01/rdf-schema#isDefinedBy" : [ {
    "@id" : "https://openark.adaptcentre.ie/Ontologies/ARKControlTerminology#"
  } ],
  "http://www.w3.org/2000/01/rdf-schema#label" : [ {
    "@language" : "en",
    "@value" : "Key drivers and trends"
  } ],
  "http://www.w3.org/2004/02/skos/core#definition" : [ {
    "@language" : "en",
    "@value" : "The cybersecurity landscape is continually evolving, driven by a range of key factors and emerging trends. These drivers and trends shape the strategies of businesses, governments, and cybersecurity providers as they work to protect against increasingly sophisticated cyber threats."
  } ],
  "http://www.w3.org/2004/02/skos/core#inScheme" : [ {
    "@id" : "https://openark.adaptcentre.ie/Ontologies/ARKControlTerminology#"
  } ],
  "http://www.w3.org/2004/02/skos/core#prefLabel" : [ {
    "@language" : "en",
    "@value" : "Key drivers and trends"
  } ]
}, {
  "@id" : "https://openark.adaptcentre.ie/Ontologies/ARKControlTerminology#LegalAndCompliance",
  "@type" : [ "http://www.w3.org/2002/07/owl#NamedIndividual" ],
  "http://purl.org/dc/terms/contributor" : [ {
    "@value" : "Junli Liang"
  }, {
    "@value" : "Rob Brennan"
  } ],
  "http://purl.org/dc/terms/created" : [ {
    "@type" : "http://www.w3.org/2001/XMLSchema#date",
    "@value" : "2024-03-14"
  } ],
  "http://purl.org/dc/terms/source" : [ {
    "@value" : "ISO/IEC 27002:2022(E)"
  } ],
  "http://www.w3.org/1999/02/22-rdf-syntax-ns#type" : [ {
    "@id" : "http://www.w3.org/2004/02/skos/core#Concept"
  } ],
  "http://www.w3.org/2000/01/rdf-schema#comment" : [ {
    "@language" : "en",
    "@value" : "A comprehensive review of an organization's adherence to governing documents such as whether a Certification Practice Statement satisfies the requirements of a Certificate Policy and whether an organization adheres to its Certification Practice Statement."
  } ],
  "http://www.w3.org/2000/01/rdf-schema#isDefinedBy" : [ {
    "@id" : "https://openark.adaptcentre.ie/Ontologies/ARKControlTerminology#"
  } ],
  "http://www.w3.org/2000/01/rdf-schema#label" : [ {
    "@language" : "en",
    "@value" : "Legal and compliance"
  } ],
  "http://www.w3.org/2004/02/skos/core#definition" : [ {
    "@language" : "en",
    "@value" : "A comprehensive review of an organization's adherence to governing documents such as whether a Certification Practice Statement satisfies the requirements of a Certificate Policy and whether an organization adheres to its Certification Practice Statement."
  } ],
  "http://www.w3.org/2004/02/skos/core#inScheme" : [ {
    "@id" : "https://openark.adaptcentre.ie/Ontologies/ARKControlTerminology#"
  } ],
  "http://www.w3.org/2004/02/skos/core#prefLabel" : [ {
    "@language" : "en",
    "@value" : "Legal and compliance"
  } ]
}, {
  "@id" : "https://openark.adaptcentre.ie/Ontologies/ARKControlTerminology#LegalEnvironment",
  "@type" : [ "http://www.w3.org/2002/07/owl#NamedIndividual" ],
  "http://purl.org/dc/terms/contributor" : [ {
    "@value" : "Junli Liang"
  }, {
    "@value" : "Rob Brennan"
  } ],
  "http://purl.org/dc/terms/created" : [ {
    "@type" : "http://www.w3.org/2001/XMLSchema#date",
    "@value" : "2024-04-08"
  } ],
  "http://purl.org/dc/terms/source" : [ {
    "@value" : "ISO27000:2036"
  } ],
  "http://www.w3.org/1999/02/22-rdf-syntax-ns#type" : [ {
    "@id" : "http://www.w3.org/2004/02/skos/core#Concept"
  } ],
  "http://www.w3.org/2000/01/rdf-schema#comment" : [ {
    "@language" : "en",
    "@value" : "understanding the legal frameworks in which a business operates so that compliance can be achieved and maintained."
  } ],
  "http://www.w3.org/2000/01/rdf-schema#isDefinedBy" : [ {
    "@id" : "https://openark.adaptcentre.ie/Ontologies/ARKControlTerminology#"
  } ],
  "http://www.w3.org/2000/01/rdf-schema#label" : [ {
    "@language" : "en",
    "@value" : "Legal environment"
  } ],
  "http://www.w3.org/2004/02/skos/core#definition" : [ {
    "@language" : "en",
    "@value" : "understanding the legal frameworks in which a business operates so that compliance can be achieved and maintained."
  } ],
  "http://www.w3.org/2004/02/skos/core#inScheme" : [ {
    "@id" : "https://openark.adaptcentre.ie/Ontologies/ARKControlTerminology#"
  } ],
  "http://www.w3.org/2004/02/skos/core#prefLabel" : [ {
    "@language" : "en",
    "@value" : "Legal environment"
  } ]
}, {
  "@id" : "https://openark.adaptcentre.ie/Ontologies/ARKControlTerminology#LevelRisk",
  "@type" : [ "http://www.w3.org/2002/07/owl#NamedIndividual" ],
  "http://purl.org/dc/terms/contributor" : [ {
    "@value" : "Junli Liang"
  }, {
    "@value" : "Rob Brennan"
  } ],
  "http://purl.org/dc/terms/created" : [ {
    "@type" : "http://www.w3.org/2001/XMLSchema#date",
    "@value" : "2024-04-08"
  } ],
  "http://purl.org/dc/terms/source" : [ {
    "@value" : "ISO27000:2018"
  } ],
  "http://www.w3.org/1999/02/22-rdf-syntax-ns#type" : [ {
    "@id" : "http://www.w3.org/2004/02/skos/core#Concept"
  } ],
  "http://www.w3.org/2000/01/rdf-schema#comment" : [ {
    "@language" : "en",
    "@value" : "magnitude of a risk (3.61) expressed in terms of the combination of consequences (3.12) and their likelihood (3.40)"
  } ],
  "http://www.w3.org/2000/01/rdf-schema#isDefinedBy" : [ {
    "@id" : "https://openark.adaptcentre.ie/Ontologies/ARKControlTerminology#"
  } ],
  "http://www.w3.org/2000/01/rdf-schema#label" : [ {
    "@language" : "en",
    "@value" : "Level of risk"
  } ],
  "http://www.w3.org/2004/02/skos/core#broader" : [ {
    "@id" : "https://openark.adaptcentre.ie/Ontologies/ARKControlTerminology#Risk"
  } ],
  "http://www.w3.org/2004/02/skos/core#definition" : [ {
    "@language" : "en",
    "@value" : "magnitude of a risk (3.61) expressed in terms of the combination of consequences (3.12) and their likelihood (3.40)"
  } ],
  "http://www.w3.org/2004/02/skos/core#inScheme" : [ {
    "@id" : "https://openark.adaptcentre.ie/Ontologies/ARKControlTerminology#"
  } ],
  "http://www.w3.org/2004/02/skos/core#prefLabel" : [ {
    "@language" : "en",
    "@value" : "Level of risk"
  } ]
}, {
  "@id" : "https://openark.adaptcentre.ie/Ontologies/ARKControlTerminology#Likelihood",
  "@type" : [ "http://www.w3.org/2002/07/owl#NamedIndividual" ],
  "http://purl.org/dc/terms/contributor" : [ {
    "@value" : "Junli Liang"
  }, {
    "@value" : "Rob Brennan"
  } ],
  "http://purl.org/dc/terms/created" : [ {
    "@type" : "http://www.w3.org/2001/XMLSchema#date",
    "@value" : "2024-04-08"
  } ],
  "http://purl.org/dc/terms/source" : [ {
    "@value" : "ISO27000:2018"
  } ],
  "http://www.w3.org/1999/02/22-rdf-syntax-ns#type" : [ {
    "@id" : "http://www.w3.org/2004/02/skos/core#Concept"
  } ],
  "http://www.w3.org/2000/01/rdf-schema#comment" : [ {
    "@language" : "en",
    "@value" : "chance of something happening."
  } ],
  "http://www.w3.org/2000/01/rdf-schema#isDefinedBy" : [ {
    "@id" : "https://openark.adaptcentre.ie/Ontologies/ARKControlTerminology#"
  } ],
  "http://www.w3.org/2000/01/rdf-schema#label" : [ {
    "@language" : "en",
    "@value" : "Likelihood"
  } ],
  "http://www.w3.org/2004/02/skos/core#broader" : [ {
    "@id" : "https://openark.adaptcentre.ie/Ontologies/ARKControlTerminology#Risk"
  } ],
  "http://www.w3.org/2004/02/skos/core#definition" : [ {
    "@language" : "en",
    "@value" : "chance of something happening."
  } ],
  "http://www.w3.org/2004/02/skos/core#inScheme" : [ {
    "@id" : "https://openark.adaptcentre.ie/Ontologies/ARKControlTerminology#"
  } ],
  "http://www.w3.org/2004/02/skos/core#prefLabel" : [ {
    "@language" : "en",
    "@value" : "Likelihood"
  } ]
}, {
  "@id" : "https://openark.adaptcentre.ie/Ontologies/ARKControlTerminology#ManagementSystem",
  "@type" : [ "http://www.w3.org/2002/07/owl#NamedIndividual" ],
  "http://purl.org/dc/terms/contributor" : [ {
    "@value" : "Junli Liang"
  }, {
    "@value" : "Rob Brennan"
  } ],
  "http://purl.org/dc/terms/created" : [ {
    "@type" : "http://www.w3.org/2001/XMLSchema#date",
    "@value" : "2024-04-08"
  } ],
  "http://purl.org/dc/terms/source" : [ {
    "@value" : "ISO27000:2018"
  } ],
  "http://www.w3.org/1999/02/22-rdf-syntax-ns#type" : [ {
    "@id" : "http://www.w3.org/2004/02/skos/core#Concept"
  } ],
  "http://www.w3.org/2000/01/rdf-schema#comment" : [ {
    "@language" : "en",
    "@value" : "set of interrelated or interacting elements of an organization (3.50) to establish policies (3.53) and objectives (3.49) and processes (3.54) to achieve those objectives Note 1 to entry: A management system can address a single discipline or several disciplines. Note 2 to entry: The system elements include the organization’s structure, roles and responsibilities, planning and operation. Note 3 to entry: The scope of a management system may include the whole of the organization, specific and identified functions of the organization, specific and identified sections of the organization, or one or more functions across a group of organizations."
  } ],
  "http://www.w3.org/2000/01/rdf-schema#isDefinedBy" : [ {
    "@id" : "https://openark.adaptcentre.ie/Ontologies/ARKControlTerminology#"
  } ],
  "http://www.w3.org/2000/01/rdf-schema#label" : [ {
    "@language" : "en",
    "@value" : "Management system"
  } ],
  "http://www.w3.org/2004/02/skos/core#definition" : [ {
    "@language" : "en",
    "@value" : "set of interrelated or interacting elements of an organization (3.50) to establish policies (3.53) and objectives (3.49) and processes (3.54) to achieve those objectives Note 1 to entry: A management system can address a single discipline or several disciplines. Note 2 to entry: The system elements include the organization’s structure, roles and responsibilities, planning and operation. Note 3 to entry: The scope of a management system may include the whole of the organization, specific and identified functions of the organization, specific and identified sections of the organization, or one or more functions across a group of organizations."
  } ],
  "http://www.w3.org/2004/02/skos/core#inScheme" : [ {
    "@id" : "https://openark.adaptcentre.ie/Ontologies/ARKControlTerminology#"
  } ],
  "http://www.w3.org/2004/02/skos/core#prefLabel" : [ {
    "@language" : "en",
    "@value" : "Management system"
  } ]
}, {
  "@id" : "https://openark.adaptcentre.ie/Ontologies/ARKControlTerminology#Measure",
  "@type" : [ "http://www.w3.org/2002/07/owl#NamedIndividual" ],
  "http://purl.org/dc/terms/contributor" : [ {
    "@value" : "Junli Liang"
  }, {
    "@value" : "Rob Brennan"
  } ],
  "http://purl.org/dc/terms/created" : [ {
    "@type" : "http://www.w3.org/2001/XMLSchema#date",
    "@value" : "2024-04-08"
  } ],
  "http://purl.org/dc/terms/source" : [ {
    "@value" : "ISO27000:2018"
  } ],
  "http://www.w3.org/1999/02/22-rdf-syntax-ns#type" : [ {
    "@id" : "http://www.w3.org/2004/02/skos/core#Concept"
  } ],
  "http://www.w3.org/2000/01/rdf-schema#comment" : [ {
    "@language" : "en",
    "@value" : "variable to which a value is assigned as the result of measurement (3.43)"
  } ],
  "http://www.w3.org/2000/01/rdf-schema#isDefinedBy" : [ {
    "@id" : "https://openark.adaptcentre.ie/Ontologies/ARKControlTerminology#"
  } ],
  "http://www.w3.org/2000/01/rdf-schema#label" : [ {
    "@language" : "en",
    "@value" : "Measure"
  } ],
  "http://www.w3.org/2004/02/skos/core#broader" : [ {
    "@id" : "https://openark.adaptcentre.ie/Ontologies/ARKControlTerminology#Measurement"
  } ],
  "http://www.w3.org/2004/02/skos/core#definition" : [ {
    "@language" : "en",
    "@value" : "variable to which a value is assigned as the result of measurement (3.43)"
  } ],
  "http://www.w3.org/2004/02/skos/core#inScheme" : [ {
    "@id" : "https://openark.adaptcentre.ie/Ontologies/ARKControlTerminology#"
  } ],
  "http://www.w3.org/2004/02/skos/core#prefLabel" : [ {
    "@language" : "en",
    "@value" : "Measure"
  } ]
}, {
  "@id" : "https://openark.adaptcentre.ie/Ontologies/ARKControlTerminology#Measurement",
  "@type" : [ "http://www.w3.org/2002/07/owl#NamedIndividual" ],
  "http://purl.org/dc/terms/contributor" : [ {
    "@value" : "Junli Liang"
  }, {
    "@value" : "Rob Brennan"
  } ],
  "http://purl.org/dc/terms/created" : [ {
    "@type" : "http://www.w3.org/2001/XMLSchema#date",
    "@value" : "2024-04-08"
  } ],
  "http://purl.org/dc/terms/source" : [ {
    "@value" : "ISO27000:2018"
  } ],
  "http://www.w3.org/1999/02/22-rdf-syntax-ns#type" : [ {
    "@id" : "http://www.w3.org/2004/02/skos/core#Concept"
  } ],
  "http://www.w3.org/2000/01/rdf-schema#comment" : [ {
    "@language" : "en",
    "@value" : "process (3.54) to determine a value"
  } ],
  "http://www.w3.org/2000/01/rdf-schema#isDefinedBy" : [ {
    "@id" : "https://openark.adaptcentre.ie/Ontologies/ARKControlTerminology#"
  } ],
  "http://www.w3.org/2000/01/rdf-schema#label" : [ {
    "@language" : "en",
    "@value" : "Measurement"
  } ],
  "http://www.w3.org/2004/02/skos/core#definition" : [ {
    "@language" : "en",
    "@value" : "process (3.54) to determine a value"
  } ],
  "http://www.w3.org/2004/02/skos/core#inScheme" : [ {
    "@id" : "https://openark.adaptcentre.ie/Ontologies/ARKControlTerminology#"
  } ],
  "http://www.w3.org/2004/02/skos/core#prefLabel" : [ {
    "@language" : "en",
    "@value" : "Measurement"
  } ]
}, {
  "@id" : "https://openark.adaptcentre.ie/Ontologies/ARKControlTerminology#MeasurementFunction",
  "@type" : [ "http://www.w3.org/2002/07/owl#NamedIndividual" ],
  "http://purl.org/dc/terms/contributor" : [ {
    "@value" : "Junli Liang"
  }, {
    "@value" : "Rob Brennan"
  } ],
  "http://purl.org/dc/terms/created" : [ {
    "@type" : "http://www.w3.org/2001/XMLSchema#date",
    "@value" : "2024-04-08"
  } ],
  "http://purl.org/dc/terms/source" : [ {
    "@value" : "ISO27000:2018"
  } ],
  "http://www.w3.org/1999/02/22-rdf-syntax-ns#type" : [ {
    "@id" : "http://www.w3.org/2004/02/skos/core#Concept"
  } ],
  "http://www.w3.org/2000/01/rdf-schema#comment" : [ {
    "@language" : "en",
    "@value" : "algorithm or calculation performed to combine two or more base measures (3.8)"
  } ],
  "http://www.w3.org/2000/01/rdf-schema#isDefinedBy" : [ {
    "@id" : "https://openark.adaptcentre.ie/Ontologies/ARKControlTerminology#"
  } ],
  "http://www.w3.org/2000/01/rdf-schema#label" : [ {
    "@language" : "en",
    "@value" : "Measurement function"
  } ],
  "http://www.w3.org/2004/02/skos/core#broader" : [ {
    "@id" : "https://openark.adaptcentre.ie/Ontologies/ARKControlTerminology#Measurement"
  } ],
  "http://www.w3.org/2004/02/skos/core#definition" : [ {
    "@language" : "en",
    "@value" : "algorithm or calculation performed to combine two or more base measures (3.8)"
  } ],
  "http://www.w3.org/2004/02/skos/core#inScheme" : [ {
    "@id" : "https://openark.adaptcentre.ie/Ontologies/ARKControlTerminology#"
  } ],
  "http://www.w3.org/2004/02/skos/core#prefLabel" : [ {
    "@language" : "en",
    "@value" : "Measurement function"
  } ]
}, {
  "@id" : "https://openark.adaptcentre.ie/Ontologies/ARKControlTerminology#MeasurementMethod",
  "@type" : [ "http://www.w3.org/2002/07/owl#NamedIndividual" ],
  "http://purl.org/dc/terms/contributor" : [ {
    "@value" : "Junli Liang"
  }, {
    "@value" : "Rob Brennan"
  } ],
  "http://purl.org/dc/terms/created" : [ {
    "@type" : "http://www.w3.org/2001/XMLSchema#date",
    "@value" : "2024-04-08"
  } ],
  "http://purl.org/dc/terms/source" : [ {
    "@value" : "ISO27000:2018"
  } ],
  "http://www.w3.org/1999/02/22-rdf-syntax-ns#type" : [ {
    "@id" : "http://www.w3.org/2004/02/skos/core#Concept"
  } ],
  "http://www.w3.org/2000/01/rdf-schema#comment" : [ {
    "@language" : "en",
    "@value" : "logical sequence of operations, described generically, used in quantifying an attribute with respect to a specified scale Note 1 to entry: The type of measurement method depends on the nature of the operations used to quantify an attribute (3.4). Two types can be distinguished: — subjective: quantification involving human judgment; and — objective: quantification based on numerical rules."
  } ],
  "http://www.w3.org/2000/01/rdf-schema#isDefinedBy" : [ {
    "@id" : "https://openark.adaptcentre.ie/Ontologies/ARKControlTerminology#"
  } ],
  "http://www.w3.org/2000/01/rdf-schema#label" : [ {
    "@language" : "en",
    "@value" : "Measurement method"
  } ],
  "http://www.w3.org/2004/02/skos/core#broader" : [ {
    "@id" : "https://openark.adaptcentre.ie/Ontologies/ARKControlTerminology#Measurement"
  } ],
  "http://www.w3.org/2004/02/skos/core#definition" : [ {
    "@language" : "en",
    "@value" : "logical sequence of operations, described generically, used in quantifying an attribute with respect to a specified scale Note 1 to entry: The type of measurement method depends on the nature of the operations used to quantify an attribute (3.4). Two types can be distinguished: — subjective: quantification involving human judgment; and — objective: quantification based on numerical rules."
  } ],
  "http://www.w3.org/2004/02/skos/core#inScheme" : [ {
    "@id" : "https://openark.adaptcentre.ie/Ontologies/ARKControlTerminology#"
  } ],
  "http://www.w3.org/2004/02/skos/core#prefLabel" : [ {
    "@language" : "en",
    "@value" : "Measurement method"
  } ]
}, {
  "@id" : "https://openark.adaptcentre.ie/Ontologies/ARKControlTerminology#ModelsContext",
  "@type" : [ "http://www.w3.org/2002/07/owl#NamedIndividual" ],
  "http://purl.org/dc/terms/contributor" : [ {
    "@value" : "Junli Liang"
  }, {
    "@value" : "Rob Brennan"
  } ],
  "http://purl.org/dc/terms/created" : [ {
    "@type" : "http://www.w3.org/2001/XMLSchema#date",
    "@value" : "2024-04-08"
  } ],
  "http://purl.org/dc/terms/source" : [ {
    "@value" : "ISO27000:2040"
  } ],
  "http://www.w3.org/1999/02/22-rdf-syntax-ns#type" : [ {
    "@id" : "http://www.w3.org/2004/02/skos/core#Concept"
  } ],
  "http://www.w3.org/2000/01/rdf-schema#comment" : [ {
    "@language" : "en",
    "@value" : "Models context in cybersecurity"
  } ],
  "http://www.w3.org/2000/01/rdf-schema#isDefinedBy" : [ {
    "@id" : "https://openark.adaptcentre.ie/Ontologies/ARKControlTerminology#"
  } ],
  "http://www.w3.org/2000/01/rdf-schema#label" : [ {
    "@language" : "en",
    "@value" : "Models context"
  } ],
  "http://www.w3.org/2004/02/skos/core#definition" : [ {
    "@language" : "en",
    "@value" : "Models context in cybersecurity"
  } ],
  "http://www.w3.org/2004/02/skos/core#inScheme" : [ {
    "@id" : "https://openark.adaptcentre.ie/Ontologies/ARKControlTerminology#"
  } ],
  "http://www.w3.org/2004/02/skos/core#prefLabel" : [ {
    "@language" : "en",
    "@value" : "Models context"
  } ]
}, {
  "@id" : "https://openark.adaptcentre.ie/Ontologies/ARKControlTerminology#Monitoring",
  "@type" : [ "http://www.w3.org/2002/07/owl#NamedIndividual" ],
  "http://purl.org/dc/terms/contributor" : [ {
    "@value" : "Junli Liang"
  }, {
    "@value" : "Rob Brennan"
  } ],
  "http://purl.org/dc/terms/created" : [ {
    "@type" : "http://www.w3.org/2001/XMLSchema#date",
    "@value" : "2024-04-08"
  } ],
  "http://purl.org/dc/terms/source" : [ {
    "@value" : "ISO27000:2018"
  } ],
  "http://www.w3.org/1999/02/22-rdf-syntax-ns#type" : [ {
    "@id" : "http://www.w3.org/2004/02/skos/core#Concept"
  } ],
  "http://www.w3.org/2000/01/rdf-schema#comment" : [ {
    "@language" : "en",
    "@value" : "determining the status of a system, a process (3.54) or an activity Note 1 to entry: To determine the status, there may be a need to check, supervise or critically observe."
  } ],
  "http://www.w3.org/2000/01/rdf-schema#isDefinedBy" : [ {
    "@id" : "https://openark.adaptcentre.ie/Ontologies/ARKControlTerminology#"
  } ],
  "http://www.w3.org/2000/01/rdf-schema#label" : [ {
    "@language" : "en",
    "@value" : "Monitoring"
  } ],
  "http://www.w3.org/2004/02/skos/core#definition" : [ {
    "@language" : "en",
    "@value" : "determining the status of a system, a process (3.54) or an activity Note 1 to entry: To determine the status, there may be a need to check, supervise or critically observe."
  } ],
  "http://www.w3.org/2004/02/skos/core#inScheme" : [ {
    "@id" : "https://openark.adaptcentre.ie/Ontologies/ARKControlTerminology#"
  } ],
  "http://www.w3.org/2004/02/skos/core#prefLabel" : [ {
    "@language" : "en",
    "@value" : "Monitoring"
  } ]
}, {
  "@id" : "https://openark.adaptcentre.ie/Ontologies/ARKControlTerminology#NaturalEnvironment",
  "@type" : [ "http://www.w3.org/2002/07/owl#NamedIndividual" ],
  "http://purl.org/dc/terms/contributor" : [ {
    "@value" : "Junli Liang"
  }, {
    "@value" : "Rob Brennan"
  } ],
  "http://purl.org/dc/terms/created" : [ {
    "@type" : "http://www.w3.org/2001/XMLSchema#date",
    "@value" : "2024-04-08"
  } ],
  "http://purl.org/dc/terms/source" : [ {
    "@value" : "ISO27000:2038"
  } ],
  "http://www.w3.org/1999/02/22-rdf-syntax-ns#type" : [ {
    "@id" : "http://www.w3.org/2004/02/skos/core#Concept"
  } ],
  "http://www.w3.org/2000/01/rdf-schema#comment" : [ {
    "@language" : "en",
    "@value" : "The natural environment consists of land-based ecosystems such as grasslands and forests, aquatic ecosystems such as rivers and wetlands, and coastal and marine ecosystems such as mangroves and sea-grass meadows."
  } ],
  "http://www.w3.org/2000/01/rdf-schema#isDefinedBy" : [ {
    "@id" : "https://openark.adaptcentre.ie/Ontologies/ARKControlTerminology#"
  } ],
  "http://www.w3.org/2000/01/rdf-schema#label" : [ {
    "@language" : "en",
    "@value" : "Natural environment"
  } ],
  "http://www.w3.org/2004/02/skos/core#definition" : [ {
    "@language" : "en",
    "@value" : "The natural environment consists of land-based ecosystems such as grasslands and forests, aquatic ecosystems such as rivers and wetlands, and coastal and marine ecosystems such as mangroves and sea-grass meadows."
  } ],
  "http://www.w3.org/2004/02/skos/core#inScheme" : [ {
    "@id" : "https://openark.adaptcentre.ie/Ontologies/ARKControlTerminology#"
  } ],
  "http://www.w3.org/2004/02/skos/core#prefLabel" : [ {
    "@language" : "en",
    "@value" : "Natural environment"
  } ]
}, {
  "@id" : "https://openark.adaptcentre.ie/Ontologies/ARKControlTerminology#Nonconformity",
  "@type" : [ "http://www.w3.org/2002/07/owl#NamedIndividual" ],
  "http://purl.org/dc/terms/contributor" : [ {
    "@value" : "Junli Liang"
  }, {
    "@value" : "Rob Brennan"
  } ],
  "http://purl.org/dc/terms/created" : [ {
    "@type" : "http://www.w3.org/2001/XMLSchema#date",
    "@value" : "2024-04-08"
  } ],
  "http://purl.org/dc/terms/source" : [ {
    "@value" : "ISO27000:2018"
  } ],
  "http://www.w3.org/1999/02/22-rdf-syntax-ns#type" : [ {
    "@id" : "http://www.w3.org/2004/02/skos/core#Concept"
  } ],
  "http://www.w3.org/2000/01/rdf-schema#comment" : [ {
    "@language" : "en",
    "@value" : "non-fulfilment of a requirement (3.56)"
  } ],
  "http://www.w3.org/2000/01/rdf-schema#isDefinedBy" : [ {
    "@id" : "https://openark.adaptcentre.ie/Ontologies/ARKControlTerminology#"
  } ],
  "http://www.w3.org/2000/01/rdf-schema#label" : [ {
    "@language" : "en",
    "@value" : "Nonconformity"
  } ],
  "http://www.w3.org/2004/02/skos/core#broader" : [ {
    "@id" : "https://openark.adaptcentre.ie/Ontologies/ARKControlTerminology#Requirement"
  } ],
  "http://www.w3.org/2004/02/skos/core#definition" : [ {
    "@language" : "en",
    "@value" : "non-fulfilment of a requirement (3.56)"
  } ],
  "http://www.w3.org/2004/02/skos/core#inScheme" : [ {
    "@id" : "https://openark.adaptcentre.ie/Ontologies/ARKControlTerminology#"
  } ],
  "http://www.w3.org/2004/02/skos/core#prefLabel" : [ {
    "@language" : "en",
    "@value" : "Nonconformity"
  } ]
}, {
  "@id" : "https://openark.adaptcentre.ie/Ontologies/ARKControlTerminology#Nonrepudiation",
  "@type" : [ "http://www.w3.org/2002/07/owl#NamedIndividual" ],
  "http://purl.org/dc/terms/contributor" : [ {
    "@value" : "Junli Liang"
  }, {
    "@value" : "Rob Brennan"
  } ],
  "http://purl.org/dc/terms/created" : [ {
    "@type" : "http://www.w3.org/2001/XMLSchema#date",
    "@value" : "2024-04-08"
  } ],
  "http://purl.org/dc/terms/source" : [ {
    "@value" : "ISO27000:2018"
  } ],
  "http://www.w3.org/1999/02/22-rdf-syntax-ns#type" : [ {
    "@id" : "http://www.w3.org/2004/02/skos/core#Concept"
  } ],
  "http://www.w3.org/2000/01/rdf-schema#comment" : [ {
    "@language" : "en",
    "@value" : "ability to prove the occurrence of a claimed event (3.21) or action and its originating entities."
  } ],
  "http://www.w3.org/2000/01/rdf-schema#isDefinedBy" : [ {
    "@id" : "https://openark.adaptcentre.ie/Ontologies/ARKControlTerminology#"
  } ],
  "http://www.w3.org/2000/01/rdf-schema#label" : [ {
    "@language" : "en",
    "@value" : "Non-repudiation"
  } ],
  "http://www.w3.org/2004/02/skos/core#broader" : [ {
    "@id" : "https://openark.adaptcentre.ie/Ontologies/ARKControlTerminology#InformationSecurity"
  } ],
  "http://www.w3.org/2004/02/skos/core#definition" : [ {
    "@language" : "en",
    "@value" : "ability to prove the occurrence of a claimed event (3.21) or action and its originating entities."
  } ],
  "http://www.w3.org/2004/02/skos/core#inScheme" : [ {
    "@id" : "https://openark.adaptcentre.ie/Ontologies/ARKControlTerminology#"
  } ],
  "http://www.w3.org/2004/02/skos/core#prefLabel" : [ {
    "@language" : "en",
    "@value" : "Non-repudiation"
  } ]
}, {
  "@id" : "https://openark.adaptcentre.ie/Ontologies/ARKControlTerminology#Objective",
  "@type" : [ "http://www.w3.org/2002/07/owl#NamedIndividual" ],
  "http://purl.org/dc/terms/contributor" : [ {
    "@value" : "Junli Liang"
  }, {
    "@value" : "Rob Brennan"
  } ],
  "http://purl.org/dc/terms/created" : [ {
    "@type" : "http://www.w3.org/2001/XMLSchema#date",
    "@value" : "2024-04-08"
  } ],
  "http://purl.org/dc/terms/source" : [ {
    "@value" : "ISO27000:2018"
  } ],
  "http://www.w3.org/1999/02/22-rdf-syntax-ns#type" : [ {
    "@id" : "http://www.w3.org/2004/02/skos/core#Concept"
  } ],
  "http://www.w3.org/2000/01/rdf-schema#comment" : [ {
    "@language" : "en",
    "@value" : "result to be achieved Note 1 to entry: An objective can be strategic, tactical, or operational. Note 2 to entry: Objectives can relate to different disciplines (such as financial, health and safety, and environmental goals) and can apply at different levels [such as strategic, organization-wide, project, product and process (3.54)]. Note 3 to entry: An objective can be expressed in other ways, e.g. as an intended outcome, a purpose, an operational criterion, as an information security objective or by the use of other words with similar meaning (e.g. aim, goal, or target). Note 4 to entry: In the context of information security management systems, information security objectives are set by the organization, consistent with the information security policy, to achieve specific results."
  } ],
  "http://www.w3.org/2000/01/rdf-schema#isDefinedBy" : [ {
    "@id" : "https://openark.adaptcentre.ie/Ontologies/ARKControlTerminology#"
  } ],
  "http://www.w3.org/2000/01/rdf-schema#label" : [ {
    "@language" : "en",
    "@value" : "Objective"
  } ],
  "http://www.w3.org/2004/02/skos/core#broader" : [ {
    "@id" : "https://openark.adaptcentre.ie/Ontologies/ARKControlTerminology#ManagementSystem"
  } ],
  "http://www.w3.org/2004/02/skos/core#definition" : [ {
    "@language" : "en",
    "@value" : "result to be achieved Note 1 to entry: An objective can be strategic, tactical, or operational. Note 2 to entry: Objectives can relate to different disciplines (such as financial, health and safety, and environmental goals) and can apply at different levels [such as strategic, organization-wide, project, product and process (3.54)]. Note 3 to entry: An objective can be expressed in other ways, e.g. as an intended outcome, a purpose, an operational criterion, as an information security objective or by the use of other words with similar meaning (e.g. aim, goal, or target). Note 4 to entry: In the context of information security management systems, information security objectives are set by the organization, consistent with the information security policy, to achieve specific results."
  } ],
  "http://www.w3.org/2004/02/skos/core#inScheme" : [ {
    "@id" : "https://openark.adaptcentre.ie/Ontologies/ARKControlTerminology#"
  } ],
  "http://www.w3.org/2004/02/skos/core#prefLabel" : [ {
    "@language" : "en",
    "@value" : "Objective"
  } ]
}, {
  "@id" : "https://openark.adaptcentre.ie/Ontologies/ARKControlTerminology#ObjectiveContext",
  "@type" : [ "http://www.w3.org/2002/07/owl#NamedIndividual" ],
  "http://purl.org/dc/terms/contributor" : [ {
    "@value" : "Junli Liang"
  }, {
    "@value" : "Rob Brennan"
  } ],
  "http://purl.org/dc/terms/created" : [ {
    "@type" : "http://www.w3.org/2001/XMLSchema#date",
    "@value" : "2024-04-08"
  } ],
  "http://purl.org/dc/terms/source" : [ {
    "@value" : "ISO27000:2043"
  } ],
  "http://www.w3.org/1999/02/22-rdf-syntax-ns#type" : [ {
    "@id" : "http://www.w3.org/2004/02/skos/core#Concept"
  } ],
  "http://www.w3.org/2000/01/rdf-schema#comment" : [ {
    "@language" : "en",
    "@value" : "Objective context in cybersecurity"
  } ],
  "http://www.w3.org/2000/01/rdf-schema#isDefinedBy" : [ {
    "@id" : "https://openark.adaptcentre.ie/Ontologies/ARKControlTerminology#"
  } ],
  "http://www.w3.org/2000/01/rdf-schema#label" : [ {
    "@language" : "en",
    "@value" : "Objective context"
  } ],
  "http://www.w3.org/2004/02/skos/core#definition" : [ {
    "@language" : "en",
    "@value" : "Objective context in cybersecurity"
  } ],
  "http://www.w3.org/2004/02/skos/core#inScheme" : [ {
    "@id" : "https://openark.adaptcentre.ie/Ontologies/ARKControlTerminology#"
  } ],
  "http://www.w3.org/2004/02/skos/core#prefLabel" : [ {
    "@language" : "en",
    "@value" : "Objective context"
  } ]
}, {
  "@id" : "https://openark.adaptcentre.ie/Ontologies/ARKControlTerminology#OrganisationalStructureContext",
  "@type" : [ "http://www.w3.org/2002/07/owl#NamedIndividual" ],
  "http://purl.org/dc/terms/contributor" : [ {
    "@value" : "Junli Liang"
  }, {
    "@value" : "Rob Brennan"
  } ],
  "http://purl.org/dc/terms/created" : [ {
    "@type" : "http://www.w3.org/2001/XMLSchema#date",
    "@value" : "2024-04-08"
  } ],
  "http://purl.org/dc/terms/source" : [ {
    "@value" : "ISO27000:2027"
  } ],
  "http://www.w3.org/1999/02/22-rdf-syntax-ns#type" : [ {
    "@id" : "http://www.w3.org/2004/02/skos/core#Concept"
  } ],
  "http://www.w3.org/2000/01/rdf-schema#comment" : [ {
    "@language" : "en",
    "@value" : "The organizational structure in the context of cybersecurity refers to how a company is organized to effectively manage and implement its cybersecurity strategies and practices."
  } ],
  "http://www.w3.org/2000/01/rdf-schema#isDefinedBy" : [ {
    "@id" : "https://openark.adaptcentre.ie/Ontologies/ARKControlTerminology#"
  } ],
  "http://www.w3.org/2000/01/rdf-schema#label" : [ {
    "@language" : "en",
    "@value" : "Organisational structure context"
  } ],
  "http://www.w3.org/2004/02/skos/core#definition" : [ {
    "@language" : "en",
    "@value" : "The organizational structure in the context of cybersecurity refers to how a company is organized to effectively manage and implement its cybersecurity strategies and practices."
  } ],
  "http://www.w3.org/2004/02/skos/core#inScheme" : [ {
    "@id" : "https://openark.adaptcentre.ie/Ontologies/ARKControlTerminology#"
  } ],
  "http://www.w3.org/2004/02/skos/core#prefLabel" : [ {
    "@language" : "en",
    "@value" : "Organisational structure context"
  } ]
}, {
  "@id" : "https://openark.adaptcentre.ie/Ontologies/ARKControlTerminology#Organization",
  "@type" : [ "http://www.w3.org/2002/07/owl#NamedIndividual" ],
  "http://purl.org/dc/terms/contributor" : [ {
    "@value" : "Junli Liang"
  }, {
    "@value" : "Rob Brennan"
  } ],
  "http://purl.org/dc/terms/created" : [ {
    "@type" : "http://www.w3.org/2001/XMLSchema#date",
    "@value" : "2024-04-08"
  } ],
  "http://purl.org/dc/terms/source" : [ {
    "@value" : "ISO27000:2018"
  } ],
  "http://www.w3.org/1999/02/22-rdf-syntax-ns#type" : [ {
    "@id" : "http://www.w3.org/2004/02/skos/core#Concept"
  } ],
  "http://www.w3.org/2000/01/rdf-schema#comment" : [ {
    "@language" : "en",
    "@value" : "person or group of people that has its own functions with responsibilities, authorities and relationships to achieve its objectives (3.49) Note 1 to entry: The concept of organization includes but is not limited to sole-trader, company, corporation, firm, enterprise, authority, partnership, charity or institution, or part or combination thereof, whether incorporated or not, public or private."
  } ],
  "http://www.w3.org/2000/01/rdf-schema#isDefinedBy" : [ {
    "@id" : "https://openark.adaptcentre.ie/Ontologies/ARKControlTerminology#"
  } ],
  "http://www.w3.org/2000/01/rdf-schema#label" : [ {
    "@language" : "en",
    "@value" : "Organization"
  } ],
  "http://www.w3.org/2004/02/skos/core#definition" : [ {
    "@language" : "en",
    "@value" : "person or group of people that has its own functions with responsibilities, authorities and relationships to achieve its objectives (3.49) Note 1 to entry: The concept of organization includes but is not limited to sole-trader, company, corporation, firm, enterprise, authority, partnership, charity or institution, or part or combination thereof, whether incorporated or not, public or private."
  } ],
  "http://www.w3.org/2004/02/skos/core#inScheme" : [ {
    "@id" : "https://openark.adaptcentre.ie/Ontologies/ARKControlTerminology#"
  } ],
  "http://www.w3.org/2004/02/skos/core#prefLabel" : [ {
    "@language" : "en",
    "@value" : "Organization"
  } ]
}, {
  "@id" : "https://openark.adaptcentre.ie/Ontologies/ARKControlTerminology#OrganizationalAccountabilityContext",
  "@type" : [ "http://www.w3.org/2002/07/owl#NamedIndividual" ],
  "http://purl.org/dc/terms/contributor" : [ {
    "@value" : "Junli Liang"
  }, {
    "@value" : "Rob Brennan"
  } ],
  "http://purl.org/dc/terms/created" : [ {
    "@type" : "http://www.w3.org/2001/XMLSchema#date",
    "@value" : "2024-04-08"
  } ],
  "http://purl.org/dc/terms/source" : [ {
    "@value" : "ISO27000:2054"
  } ],
  "http://www.w3.org/1999/02/22-rdf-syntax-ns#type" : [ {
    "@id" : "http://www.w3.org/2004/02/skos/core#Concept"
  } ],
  "http://www.w3.org/2000/01/rdf-schema#comment" : [ {
    "@language" : "en",
    "@value" : "Organizational accountability context in cybersecurity"
  } ],
  "http://www.w3.org/2000/01/rdf-schema#isDefinedBy" : [ {
    "@id" : "https://openark.adaptcentre.ie/Ontologies/ARKControlTerminology#"
  } ],
  "http://www.w3.org/2000/01/rdf-schema#label" : [ {
    "@language" : "en",
    "@value" : "Organizational accountability context"
  } ],
  "http://www.w3.org/2004/02/skos/core#definition" : [ {
    "@language" : "en",
    "@value" : "Organizational accountability context in cybersecurity"
  } ],
  "http://www.w3.org/2004/02/skos/core#inScheme" : [ {
    "@id" : "https://openark.adaptcentre.ie/Ontologies/ARKControlTerminology#"
  } ],
  "http://www.w3.org/2004/02/skos/core#prefLabel" : [ {
    "@language" : "en",
    "@value" : "Organizational accountability context"
  } ]
}, {
  "@id" : "https://openark.adaptcentre.ie/Ontologies/ARKControlTerminology#OrganizationalRoleContext",
  "@type" : [ "http://www.w3.org/2002/07/owl#NamedIndividual" ],
  "http://purl.org/dc/terms/contributor" : [ {
    "@value" : "Junli Liang"
  }, {
    "@value" : "Rob Brennan"
  } ],
  "http://purl.org/dc/terms/created" : [ {
    "@type" : "http://www.w3.org/2001/XMLSchema#date",
    "@value" : "2024-04-08"
  } ],
  "http://purl.org/dc/terms/source" : [ {
    "@value" : "ISO27000:2045"
  } ],
  "http://www.w3.org/1999/02/22-rdf-syntax-ns#type" : [ {
    "@id" : "http://www.w3.org/2004/02/skos/core#Concept"
  } ],
  "http://www.w3.org/2000/01/rdf-schema#comment" : [ {
    "@language" : "en",
    "@value" : "Organizational role context in cybersecurity"
  } ],
  "http://www.w3.org/2000/01/rdf-schema#isDefinedBy" : [ {
    "@id" : "https://openark.adaptcentre.ie/Ontologies/ARKControlTerminology#"
  } ],
  "http://www.w3.org/2000/01/rdf-schema#label" : [ {
    "@language" : "en",
    "@value" : "Organizational role context"
  } ],
  "http://www.w3.org/2004/02/skos/core#definition" : [ {
    "@language" : "en",
    "@value" : "Organizational role context in cybersecurity"
  } ],
  "http://www.w3.org/2004/02/skos/core#inScheme" : [ {
    "@id" : "https://openark.adaptcentre.ie/Ontologies/ARKControlTerminology#"
  } ],
  "http://www.w3.org/2004/02/skos/core#prefLabel" : [ {
    "@language" : "en",
    "@value" : "Organizational role context"
  } ]
}, {
  "@id" : "https://openark.adaptcentre.ie/Ontologies/ARKControlTerminology#Outsource",
  "@type" : [ "http://www.w3.org/2002/07/owl#NamedIndividual" ],
  "http://purl.org/dc/terms/contributor" : [ {
    "@value" : "Junli Liang"
  }, {
    "@value" : "Rob Brennan"
  } ],
  "http://purl.org/dc/terms/created" : [ {
    "@type" : "http://www.w3.org/2001/XMLSchema#date",
    "@value" : "2024-04-08"
  } ],
  "http://purl.org/dc/terms/source" : [ {
    "@value" : "ISO27000:2018"
  } ],
  "http://www.w3.org/1999/02/22-rdf-syntax-ns#type" : [ {
    "@id" : "http://www.w3.org/2004/02/skos/core#Concept"
  } ],
  "http://www.w3.org/2000/01/rdf-schema#comment" : [ {
    "@language" : "en",
    "@value" : "make an arrangement where an external organization (3.50) performs part of an organization’s function or process (3.54) Note 1 to entry: An external organization is outside the scope of the management system (3.41), although the outsourced function or process is within the scope."
  } ],
  "http://www.w3.org/2000/01/rdf-schema#isDefinedBy" : [ {
    "@id" : "https://openark.adaptcentre.ie/Ontologies/ARKControlTerminology#"
  } ],
  "http://www.w3.org/2000/01/rdf-schema#label" : [ {
    "@language" : "en",
    "@value" : "Outsource"
  } ],
  "http://www.w3.org/2004/02/skos/core#broader" : [ {
    "@id" : "https://openark.adaptcentre.ie/Ontologies/ARKControlTerminology#Organization"
  } ],
  "http://www.w3.org/2004/02/skos/core#definition" : [ {
    "@language" : "en",
    "@value" : "make an arrangement where an external organization (3.50) performs part of an organization’s function or process (3.54) Note 1 to entry: An external organization is outside the scope of the management system (3.41), although the outsourced function or process is within the scope."
  } ],
  "http://www.w3.org/2004/02/skos/core#inScheme" : [ {
    "@id" : "https://openark.adaptcentre.ie/Ontologies/ARKControlTerminology#"
  } ],
  "http://www.w3.org/2004/02/skos/core#prefLabel" : [ {
    "@language" : "en",
    "@value" : "Outsource"
  } ]
}, {
  "@id" : "https://openark.adaptcentre.ie/Ontologies/ARKControlTerminology#Performance",
  "@type" : [ "http://www.w3.org/2002/07/owl#NamedIndividual" ],
  "http://purl.org/dc/terms/contributor" : [ {
    "@value" : "Junli Liang"
  }, {
    "@value" : "Rob Brennan"
  } ],
  "http://purl.org/dc/terms/created" : [ {
    "@type" : "http://www.w3.org/2001/XMLSchema#date",
    "@value" : "2024-04-08"
  } ],
  "http://purl.org/dc/terms/source" : [ {
    "@value" : "ISO27000:2018"
  } ],
  "http://www.w3.org/1999/02/22-rdf-syntax-ns#type" : [ {
    "@id" : "http://www.w3.org/2004/02/skos/core#Concept"
  } ],
  "http://www.w3.org/2000/01/rdf-schema#comment" : [ {
    "@language" : "en",
    "@value" : "measurable result Note 1 to entry: Performance can relate either to quantitative or qualitative findings. Note 2 to entry: Performance can relate to the management of activities, processes (3.54), products (including services), systems or organizations (3.50)"
  } ],
  "http://www.w3.org/2000/01/rdf-schema#isDefinedBy" : [ {
    "@id" : "https://openark.adaptcentre.ie/Ontologies/ARKControlTerminology#"
  } ],
  "http://www.w3.org/2000/01/rdf-schema#label" : [ {
    "@language" : "en",
    "@value" : "Performance"
  } ],
  "http://www.w3.org/2004/02/skos/core#broader" : [ {
    "@id" : "https://openark.adaptcentre.ie/Ontologies/ARKControlTerminology#Measurement"
  } ],
  "http://www.w3.org/2004/02/skos/core#definition" : [ {
    "@language" : "en",
    "@value" : "measurable result Note 1 to entry: Performance can relate either to quantitative or qualitative findings. Note 2 to entry: Performance can relate to the management of activities, processes (3.54), products (including services), systems or organizations (3.50)"
  } ],
  "http://www.w3.org/2004/02/skos/core#inScheme" : [ {
    "@id" : "https://openark.adaptcentre.ie/Ontologies/ARKControlTerminology#"
  } ],
  "http://www.w3.org/2004/02/skos/core#prefLabel" : [ {
    "@language" : "en",
    "@value" : "Performance"
  } ]
}, {
  "@id" : "https://openark.adaptcentre.ie/Ontologies/ARKControlTerminology#PhysicalSecurity",
  "@type" : [ "http://www.w3.org/2002/07/owl#NamedIndividual" ],
  "http://purl.org/dc/terms/contributor" : [ {
    "@value" : "Junli Liang"
  }, {
    "@value" : "Rob Brennan"
  } ],
  "http://purl.org/dc/terms/created" : [ {
    "@type" : "http://www.w3.org/2001/XMLSchema#date",
    "@value" : "2024-03-14"
  } ],
  "http://purl.org/dc/terms/source" : [ {
    "@value" : "ISO/IEC 27002:2022(E)"
  } ],
  "http://www.w3.org/1999/02/22-rdf-syntax-ns#type" : [ {
    "@id" : "http://www.w3.org/2004/02/skos/core#Concept"
  } ],
  "http://www.w3.org/2000/01/rdf-schema#comment" : [ {
    "@language" : "en",
    "@value" : "A set of mutually reinforcing security controls implemented by technical, physical, and procedural means. Such controls are typically selected to achieve a common information security-related purpose."
  } ],
  "http://www.w3.org/2000/01/rdf-schema#isDefinedBy" : [ {
    "@id" : "https://openark.adaptcentre.ie/Ontologies/ARKControlTerminology#"
  } ],
  "http://www.w3.org/2000/01/rdf-schema#label" : [ {
    "@language" : "en",
    "@value" : "Physical security"
  } ],
  "http://www.w3.org/2004/02/skos/core#definition" : [ {
    "@language" : "en",
    "@value" : "A set of mutually reinforcing security controls implemented by technical, physical, and procedural means. Such controls are typically selected to achieve a common information security-related purpose."
  } ],
  "http://www.w3.org/2004/02/skos/core#inScheme" : [ {
    "@id" : "https://openark.adaptcentre.ie/Ontologies/ARKControlTerminology#"
  } ],
  "http://www.w3.org/2004/02/skos/core#prefLabel" : [ {
    "@language" : "en",
    "@value" : "Physical security"
  } ]
}, {
  "@id" : "https://openark.adaptcentre.ie/Ontologies/ARKControlTerminology#Policy",
  "@type" : [ "http://www.w3.org/2002/07/owl#NamedIndividual" ],
  "http://purl.org/dc/terms/contributor" : [ {
    "@value" : "Junli Liang"
  }, {
    "@value" : "Rob Brennan"
  } ],
  "http://purl.org/dc/terms/created" : [ {
    "@type" : "http://www.w3.org/2001/XMLSchema#date",
    "@value" : "2024-04-08"
  } ],
  "http://purl.org/dc/terms/source" : [ {
    "@value" : "ISO27000:2018"
  } ],
  "http://www.w3.org/1999/02/22-rdf-syntax-ns#type" : [ {
    "@id" : "http://www.w3.org/2004/02/skos/core#Concept"
  } ],
  "http://www.w3.org/2000/01/rdf-schema#comment" : [ {
    "@language" : "en",
    "@value" : "intentions and direction of an organization (3.50), as formally expressed by its top management (3.75)"
  } ],
  "http://www.w3.org/2000/01/rdf-schema#isDefinedBy" : [ {
    "@id" : "https://openark.adaptcentre.ie/Ontologies/ARKControlTerminology#"
  } ],
  "http://www.w3.org/2000/01/rdf-schema#label" : [ {
    "@language" : "en",
    "@value" : "Policy"
  } ],
  "http://www.w3.org/2004/02/skos/core#broader" : [ {
    "@id" : "https://openark.adaptcentre.ie/Ontologies/ARKControlTerminology#ManagementSystem"
  } ],
  "http://www.w3.org/2004/02/skos/core#definition" : [ {
    "@language" : "en",
    "@value" : "intentions and direction of an organization (3.50), as formally expressed by its top management (3.75)"
  } ],
  "http://www.w3.org/2004/02/skos/core#inScheme" : [ {
    "@id" : "https://openark.adaptcentre.ie/Ontologies/ARKControlTerminology#"
  } ],
  "http://www.w3.org/2004/02/skos/core#prefLabel" : [ {
    "@language" : "en",
    "@value" : "Policy"
  } ]
}, {
  "@id" : "https://openark.adaptcentre.ie/Ontologies/ARKControlTerminology#PolicyContext",
  "@type" : [ "http://www.w3.org/2002/07/owl#NamedIndividual" ],
  "http://purl.org/dc/terms/contributor" : [ {
    "@value" : "Junli Liang"
  }, {
    "@value" : "Rob Brennan"
  } ],
  "http://purl.org/dc/terms/created" : [ {
    "@type" : "http://www.w3.org/2001/XMLSchema#date",
    "@value" : "2024-04-08"
  } ],
  "http://purl.org/dc/terms/source" : [ {
    "@value" : "ISO27000:2034"
  } ],
  "http://www.w3.org/1999/02/22-rdf-syntax-ns#type" : [ {
    "@id" : "http://www.w3.org/2004/02/skos/core#Concept"
  } ],
  "http://www.w3.org/2000/01/rdf-schema#comment" : [ {
    "@language" : "en",
    "@value" : "Policy context in cybersecurity"
  } ],
  "http://www.w3.org/2000/01/rdf-schema#isDefinedBy" : [ {
    "@id" : "https://openark.adaptcentre.ie/Ontologies/ARKControlTerminology#"
  } ],
  "http://www.w3.org/2000/01/rdf-schema#label" : [ {
    "@language" : "en",
    "@value" : "Policy context"
  } ],
  "http://www.w3.org/2004/02/skos/core#definition" : [ {
    "@language" : "en",
    "@value" : "Policy context in cybersecurity"
  } ],
  "http://www.w3.org/2004/02/skos/core#inScheme" : [ {
    "@id" : "https://openark.adaptcentre.ie/Ontologies/ARKControlTerminology#"
  } ],
  "http://www.w3.org/2004/02/skos/core#prefLabel" : [ {
    "@language" : "en",
    "@value" : "Policy context"
  } ]
}, {
  "@id" : "https://openark.adaptcentre.ie/Ontologies/ARKControlTerminology#PoliticalEnvironment",
  "@type" : [ "http://www.w3.org/2002/07/owl#NamedIndividual" ],
  "http://purl.org/dc/terms/contributor" : [ {
    "@value" : "Junli Liang"
  }, {
    "@value" : "Rob Brennan"
  } ],
  "http://purl.org/dc/terms/created" : [ {
    "@type" : "http://www.w3.org/2001/XMLSchema#date",
    "@value" : "2024-04-08"
  } ],
  "http://purl.org/dc/terms/source" : [ {
    "@value" : "ISO27000:2029"
  } ],
  "http://www.w3.org/1999/02/22-rdf-syntax-ns#type" : [ {
    "@id" : "http://www.w3.org/2004/02/skos/core#Concept"
  } ],
  "http://www.w3.org/2000/01/rdf-schema#comment" : [ {
    "@language" : "en",
    "@value" : "The political environment in the context of cybersecurity refers to the influence of governmental policies, regulations, and actions on cybersecurity practices, strategies, and challenges."
  } ],
  "http://www.w3.org/2000/01/rdf-schema#isDefinedBy" : [ {
    "@id" : "https://openark.adaptcentre.ie/Ontologies/ARKControlTerminology#"
  } ],
  "http://www.w3.org/2000/01/rdf-schema#label" : [ {
    "@language" : "en",
    "@value" : "Political environment"
  } ],
  "http://www.w3.org/2004/02/skos/core#definition" : [ {
    "@language" : "en",
    "@value" : "The political environment in the context of cybersecurity refers to the influence of governmental policies, regulations, and actions on cybersecurity practices, strategies, and challenges."
  } ],
  "http://www.w3.org/2004/02/skos/core#inScheme" : [ {
    "@id" : "https://openark.adaptcentre.ie/Ontologies/ARKControlTerminology#"
  } ],
  "http://www.w3.org/2004/02/skos/core#prefLabel" : [ {
    "@language" : "en",
    "@value" : "Political environment"
  } ]
}, {
  "@id" : "https://openark.adaptcentre.ie/Ontologies/ARKControlTerminology#Process",
  "@type" : [ "http://www.w3.org/2002/07/owl#NamedIndividual" ],
  "http://purl.org/dc/terms/contributor" : [ {
    "@value" : "Junli Liang"
  }, {
    "@value" : "Rob Brennan"
  } ],
  "http://purl.org/dc/terms/created" : [ {
    "@type" : "http://www.w3.org/2001/XMLSchema#date",
    "@value" : "2024-04-08"
  } ],
  "http://purl.org/dc/terms/source" : [ {
    "@value" : "ISO27000:2018"
  } ],
  "http://www.w3.org/1999/02/22-rdf-syntax-ns#type" : [ {
    "@id" : "http://www.w3.org/2004/02/skos/core#Concept"
  } ],
  "http://www.w3.org/2000/01/rdf-schema#comment" : [ {
    "@language" : "en",
    "@value" : "set of interrelated or interacting activities which transforms inputs into outputs."
  } ],
  "http://www.w3.org/2000/01/rdf-schema#isDefinedBy" : [ {
    "@id" : "https://openark.adaptcentre.ie/Ontologies/ARKControlTerminology#"
  } ],
  "http://www.w3.org/2000/01/rdf-schema#label" : [ {
    "@language" : "en",
    "@value" : "Process"
  } ],
  "http://www.w3.org/2004/02/skos/core#broader" : [ {
    "@id" : "https://openark.adaptcentre.ie/Ontologies/ARKControlTerminology#ManagementSystem"
  } ],
  "http://www.w3.org/2004/02/skos/core#definition" : [ {
    "@language" : "en",
    "@value" : "set of interrelated or interacting activities which transforms inputs into outputs."
  } ],
  "http://www.w3.org/2004/02/skos/core#inScheme" : [ {
    "@id" : "https://openark.adaptcentre.ie/Ontologies/ARKControlTerminology#"
  } ],
  "http://www.w3.org/2004/02/skos/core#prefLabel" : [ {
    "@language" : "en",
    "@value" : "Process"
  } ]
}, {
  "@id" : "https://openark.adaptcentre.ie/Ontologies/ARKControlTerminology#Protect",
  "@type" : [ "http://www.w3.org/2002/07/owl#NamedIndividual" ],
  "http://purl.org/dc/terms/contributor" : [ {
    "@value" : "Junli Liang"
  }, {
    "@value" : "Rob Brennan"
  } ],
  "http://purl.org/dc/terms/created" : [ {
    "@type" : "http://www.w3.org/2001/XMLSchema#date",
    "@value" : "2024-03-14"
  } ],
  "http://purl.org/dc/terms/source" : [ {
    "@value" : "ISO/IEC 27002:2022(E)"
  } ],
  "http://www.w3.org/1999/02/22-rdf-syntax-ns#type" : [ {
    "@id" : "http://www.w3.org/2004/02/skos/core#Concept"
  } ],
  "http://www.w3.org/2000/01/rdf-schema#comment" : [ {
    "@language" : "en",
    "@value" : "Develop and implement safeguards to deliver critical infrastructure services."
  } ],
  "http://www.w3.org/2000/01/rdf-schema#isDefinedBy" : [ {
    "@id" : "https://openark.adaptcentre.ie/Ontologies/ARKControlTerminology#"
  } ],
  "http://www.w3.org/2000/01/rdf-schema#label" : [ {
    "@language" : "en",
    "@value" : "Protect"
  } ],
  "http://www.w3.org/2004/02/skos/core#definition" : [ {
    "@language" : "en",
    "@value" : "Develop and implement safeguards to deliver critical infrastructure services."
  } ],
  "http://www.w3.org/2004/02/skos/core#inScheme" : [ {
    "@id" : "https://openark.adaptcentre.ie/Ontologies/ARKControlTerminology#"
  } ],
  "http://www.w3.org/2004/02/skos/core#prefLabel" : [ {
    "@language" : "en",
    "@value" : "Protect"
  } ]
}, {
  "@id" : "https://openark.adaptcentre.ie/Ontologies/ARKControlTerminology#Protection",
  "@type" : [ "http://www.w3.org/2002/07/owl#NamedIndividual" ],
  "http://purl.org/dc/terms/contributor" : [ {
    "@value" : "Junli Liang"
  }, {
    "@value" : "Rob Brennan"
  } ],
  "http://purl.org/dc/terms/created" : [ {
    "@type" : "http://www.w3.org/2001/XMLSchema#date",
    "@value" : "2024-03-14"
  } ],
  "http://purl.org/dc/terms/source" : [ {
    "@value" : "ISO/IEC 27002:2022(E)"
  } ],
  "http://www.w3.org/1999/02/22-rdf-syntax-ns#type" : [ {
    "@id" : "http://www.w3.org/2004/02/skos/core#Concept"
  } ],
  "http://www.w3.org/2000/01/rdf-schema#comment" : [ {
    "@language" : "en",
    "@value" : "In the context of systems security engineering, a control objective that applies across all types of asset types and the corresponding consequences of loss. A system protection capability is a system control objective and a system design problem. The solution to the problem is optimized through a balanced proactive strategy and a reactive strategy that is not limited to prevention. The strategy also encompasses avoiding asset loss and consequences; detecting asset loss and consequences; minimizing (i.e., limiting, containing, restricting) asset loss and consequences; responding to asset loss and consequences; recovering from asset loss and consequences; and forecasting or predicting asset loss and consequences."
  } ],
  "http://www.w3.org/2000/01/rdf-schema#isDefinedBy" : [ {
    "@id" : "https://openark.adaptcentre.ie/Ontologies/ARKControlTerminology#"
  } ],
  "http://www.w3.org/2000/01/rdf-schema#label" : [ {
    "@language" : "en",
    "@value" : "Protection"
  } ],
  "http://www.w3.org/2004/02/skos/core#definition" : [ {
    "@language" : "en",
    "@value" : "In the context of systems security engineering, a control objective that applies across all types of asset types and the corresponding consequences of loss. A system protection capability is a system control objective and a system design problem. The solution to the problem is optimized through a balanced proactive strategy and a reactive strategy that is not limited to prevention. The strategy also encompasses avoiding asset loss and consequences; detecting asset loss and consequences; minimizing (i.e., limiting, containing, restricting) asset loss and consequences; responding to asset loss and consequences; recovering from asset loss and consequences; and forecasting or predicting asset loss and consequences."
  } ],
  "http://www.w3.org/2004/02/skos/core#inScheme" : [ {
    "@id" : "https://openark.adaptcentre.ie/Ontologies/ARKControlTerminology#"
  } ],
  "http://www.w3.org/2004/02/skos/core#prefLabel" : [ {
    "@language" : "en",
    "@value" : "Protection"
  } ]
}, {
  "@id" : "https://openark.adaptcentre.ie/Ontologies/ARKControlTerminology#Recover",
  "@type" : [ "http://www.w3.org/2002/07/owl#NamedIndividual" ],
  "http://purl.org/dc/terms/contributor" : [ {
    "@value" : "Junli Liang"
  }, {
    "@value" : "Rob Brennan"
  } ],
  "http://purl.org/dc/terms/created" : [ {
    "@type" : "http://www.w3.org/2001/XMLSchema#date",
    "@value" : "2024-03-14"
  } ],
  "http://purl.org/dc/terms/source" : [ {
    "@value" : "ISO/IEC 27002:2022(E)"
  } ],
  "http://www.w3.org/1999/02/22-rdf-syntax-ns#type" : [ {
    "@id" : "http://www.w3.org/2004/02/skos/core#Concept"
  } ],
  "http://www.w3.org/2000/01/rdf-schema#comment" : [ {
    "@language" : "en",
    "@value" : "Develop and implement the appropriate activities to maintain plans for  resilience and to restore any capabilities or services that were  impaired due to a cyber security event."
  } ],
  "http://www.w3.org/2000/01/rdf-schema#isDefinedBy" : [ {
    "@id" : "https://openark.adaptcentre.ie/Ontologies/ARKControlTerminology#"
  } ],
  "http://www.w3.org/2000/01/rdf-schema#label" : [ {
    "@language" : "en",
    "@value" : "Recover"
  } ],
  "http://www.w3.org/2004/02/skos/core#definition" : [ {
    "@language" : "en",
    "@value" : "Develop and implement the appropriate activities to maintain plans for  resilience and to restore any capabilities or services that were  impaired due to a cyber security event."
  } ],
  "http://www.w3.org/2004/02/skos/core#inScheme" : [ {
    "@id" : "https://openark.adaptcentre.ie/Ontologies/ARKControlTerminology#"
  } ],
  "http://www.w3.org/2004/02/skos/core#prefLabel" : [ {
    "@language" : "en",
    "@value" : "Recover"
  } ]
}, {
  "@id" : "https://openark.adaptcentre.ie/Ontologies/ARKControlTerminology#RegulatoryEnvironment",
  "@type" : [ "http://www.w3.org/2002/07/owl#NamedIndividual" ],
  "http://purl.org/dc/terms/contributor" : [ {
    "@value" : "Junli Liang"
  }, {
    "@value" : "Rob Brennan"
  } ],
  "http://purl.org/dc/terms/created" : [ {
    "@type" : "http://www.w3.org/2001/XMLSchema#date",
    "@value" : "2024-04-08"
  } ],
  "http://purl.org/dc/terms/source" : [ {
    "@value" : "ISO27000:2039"
  } ],
  "http://www.w3.org/1999/02/22-rdf-syntax-ns#type" : [ {
    "@id" : "http://www.w3.org/2004/02/skos/core#Concept"
  } ],
  "http://www.w3.org/2000/01/rdf-schema#comment" : [ {
    "@language" : "en",
    "@value" : "that part of the firm's external marketing environment on which legal and political forces act to change regulations which affect the marketing effort"
  } ],
  "http://www.w3.org/2000/01/rdf-schema#isDefinedBy" : [ {
    "@id" : "https://openark.adaptcentre.ie/Ontologies/ARKControlTerminology#"
  } ],
  "http://www.w3.org/2000/01/rdf-schema#label" : [ {
    "@language" : "en",
    "@value" : "Regulatory environment"
  } ],
  "http://www.w3.org/2004/02/skos/core#definition" : [ {
    "@language" : "en",
    "@value" : "that part of the firm's external marketing environment on which legal and political forces act to change regulations which affect the marketing effort"
  } ],
  "http://www.w3.org/2004/02/skos/core#inScheme" : [ {
    "@id" : "https://openark.adaptcentre.ie/Ontologies/ARKControlTerminology#"
  } ],
  "http://www.w3.org/2004/02/skos/core#prefLabel" : [ {
    "@language" : "en",
    "@value" : "Regulatory environment"
  } ]
}, {
  "@id" : "https://openark.adaptcentre.ie/Ontologies/ARKControlTerminology#Reliability",
  "@type" : [ "http://www.w3.org/2002/07/owl#NamedIndividual" ],
  "http://purl.org/dc/terms/contributor" : [ {
    "@value" : "Junli Liang"
  }, {
    "@value" : "Rob Brennan"
  } ],
  "http://purl.org/dc/terms/created" : [ {
    "@type" : "http://www.w3.org/2001/XMLSchema#date",
    "@value" : "2024-04-08"
  } ],
  "http://purl.org/dc/terms/source" : [ {
    "@value" : "ISO27000:2018"
  } ],
  "http://www.w3.org/1999/02/22-rdf-syntax-ns#type" : [ {
    "@id" : "http://www.w3.org/2004/02/skos/core#Concept"
  } ],
  "http://www.w3.org/2000/01/rdf-schema#comment" : [ {
    "@language" : "en",
    "@value" : "property of consistent intended behaviour and results."
  } ],
  "http://www.w3.org/2000/01/rdf-schema#isDefinedBy" : [ {
    "@id" : "https://openark.adaptcentre.ie/Ontologies/ARKControlTerminology#"
  } ],
  "http://www.w3.org/2000/01/rdf-schema#label" : [ {
    "@language" : "en",
    "@value" : "Reliability"
  } ],
  "http://www.w3.org/2004/02/skos/core#broader" : [ {
    "@id" : "https://openark.adaptcentre.ie/Ontologies/ARKControlTerminology#InformationSecurity"
  } ],
  "http://www.w3.org/2004/02/skos/core#definition" : [ {
    "@language" : "en",
    "@value" : "property of consistent intended behaviour and results."
  } ],
  "http://www.w3.org/2004/02/skos/core#inScheme" : [ {
    "@id" : "https://openark.adaptcentre.ie/Ontologies/ARKControlTerminology#"
  } ],
  "http://www.w3.org/2004/02/skos/core#prefLabel" : [ {
    "@language" : "en",
    "@value" : "Reliability"
  } ]
}, {
  "@id" : "https://openark.adaptcentre.ie/Ontologies/ARKControlTerminology#Requirement",
  "@type" : [ "http://www.w3.org/2002/07/owl#NamedIndividual" ],
  "http://purl.org/dc/terms/contributor" : [ {
    "@value" : "Junli Liang"
  }, {
    "@value" : "Rob Brennan"
  } ],
  "http://purl.org/dc/terms/created" : [ {
    "@type" : "http://www.w3.org/2001/XMLSchema#date",
    "@value" : "2024-04-08"
  } ],
  "http://purl.org/dc/terms/source" : [ {
    "@value" : "ISO27000:2018"
  } ],
  "http://www.w3.org/1999/02/22-rdf-syntax-ns#type" : [ {
    "@id" : "http://www.w3.org/2004/02/skos/core#Concept"
  } ],
  "http://www.w3.org/2000/01/rdf-schema#comment" : [ {
    "@language" : "en",
    "@value" : "need or expectation that is stated, generally implied or obligatory Note 1 to entry: “Generally implied” means that it is custom or common practice for the organization and interested parties that the need or expectation under consideration is implied. Note 2 to entry: A specified requirement is one that is stated, for example in documented information."
  } ],
  "http://www.w3.org/2000/01/rdf-schema#isDefinedBy" : [ {
    "@id" : "https://openark.adaptcentre.ie/Ontologies/ARKControlTerminology#"
  } ],
  "http://www.w3.org/2000/01/rdf-schema#label" : [ {
    "@language" : "en",
    "@value" : "Requirement"
  } ],
  "http://www.w3.org/2004/02/skos/core#definition" : [ {
    "@language" : "en",
    "@value" : "need or expectation that is stated, generally implied or obligatory Note 1 to entry: “Generally implied” means that it is custom or common practice for the organization and interested parties that the need or expectation under consideration is implied. Note 2 to entry: A specified requirement is one that is stated, for example in documented information."
  } ],
  "http://www.w3.org/2004/02/skos/core#inScheme" : [ {
    "@id" : "https://openark.adaptcentre.ie/Ontologies/ARKControlTerminology#"
  } ],
  "http://www.w3.org/2004/02/skos/core#prefLabel" : [ {
    "@language" : "en",
    "@value" : "Requirement"
  } ]
}, {
  "@id" : "https://openark.adaptcentre.ie/Ontologies/ARKControlTerminology#ResidualRisk",
  "@type" : [ "http://www.w3.org/2002/07/owl#NamedIndividual" ],
  "http://purl.org/dc/terms/contributor" : [ {
    "@value" : "Junli Liang"
  }, {
    "@value" : "Rob Brennan"
  } ],
  "http://purl.org/dc/terms/created" : [ {
    "@type" : "http://www.w3.org/2001/XMLSchema#date",
    "@value" : "2024-04-08"
  } ],
  "http://purl.org/dc/terms/source" : [ {
    "@value" : "ISO27000:2018"
  } ],
  "http://www.w3.org/1999/02/22-rdf-syntax-ns#type" : [ {
    "@id" : "http://www.w3.org/2004/02/skos/core#Concept"
  } ],
  "http://www.w3.org/2000/01/rdf-schema#comment" : [ {
    "@language" : "en",
    "@value" : "risk (3.61) remaining after risk treatment (3.72) Note 1 to entry: Residual risk can contain unidentified risk. Note 2 to entry: Residual risk can also be referred to as “retained risk”."
  } ],
  "http://www.w3.org/2000/01/rdf-schema#isDefinedBy" : [ {
    "@id" : "https://openark.adaptcentre.ie/Ontologies/ARKControlTerminology#"
  } ],
  "http://www.w3.org/2000/01/rdf-schema#label" : [ {
    "@language" : "en",
    "@value" : "Residual risk"
  } ],
  "http://www.w3.org/2004/02/skos/core#broader" : [ {
    "@id" : "https://openark.adaptcentre.ie/Ontologies/ARKControlTerminology#Risk"
  } ],
  "http://www.w3.org/2004/02/skos/core#definition" : [ {
    "@language" : "en",
    "@value" : "risk (3.61) remaining after risk treatment (3.72) Note 1 to entry: Residual risk can contain unidentified risk. Note 2 to entry: Residual risk can also be referred to as “retained risk”."
  } ],
  "http://www.w3.org/2004/02/skos/core#inScheme" : [ {
    "@id" : "https://openark.adaptcentre.ie/Ontologies/ARKControlTerminology#"
  } ],
  "http://www.w3.org/2004/02/skos/core#prefLabel" : [ {
    "@language" : "en",
    "@value" : "Residual risk"
  } ]
}, {
  "@id" : "https://openark.adaptcentre.ie/Ontologies/ARKControlTerminology#Resilience",
  "@type" : [ "http://www.w3.org/2002/07/owl#NamedIndividual" ],
  "http://purl.org/dc/terms/contributor" : [ {
    "@value" : "Junli Liang"
  }, {
    "@value" : "Rob Brennan"
  } ],
  "http://purl.org/dc/terms/created" : [ {
    "@type" : "http://www.w3.org/2001/XMLSchema#date",
    "@value" : "2024-03-14"
  } ],
  "http://purl.org/dc/terms/source" : [ {
    "@value" : "ISO/IEC 27002:2022(E)"
  } ],
  "http://www.w3.org/1999/02/22-rdf-syntax-ns#type" : [ {
    "@id" : "http://www.w3.org/2004/02/skos/core#Concept"
  } ],
  "http://www.w3.org/2000/01/rdf-schema#comment" : [ {
    "@language" : "en",
    "@value" : "The ability of an information system to continue to: (i) operate under adverse conditions or stress, even if in a degraded or debilitated state, while maintaining essential operational capabilities; and (ii) recover to an effective operational posture in a time frame consistent with mission needs."
  } ],
  "http://www.w3.org/2000/01/rdf-schema#isDefinedBy" : [ {
    "@id" : "https://openark.adaptcentre.ie/Ontologies/ARKControlTerminology#"
  } ],
  "http://www.w3.org/2000/01/rdf-schema#label" : [ {
    "@language" : "en",
    "@value" : "Resilience"
  } ],
  "http://www.w3.org/2004/02/skos/core#definition" : [ {
    "@language" : "en",
    "@value" : "The ability of an information system to continue to: (i) operate under adverse conditions or stress, even if in a degraded or debilitated state, while maintaining essential operational capabilities; and (ii) recover to an effective operational posture in a time frame consistent with mission needs."
  } ],
  "http://www.w3.org/2004/02/skos/core#inScheme" : [ {
    "@id" : "https://openark.adaptcentre.ie/Ontologies/ARKControlTerminology#"
  } ],
  "http://www.w3.org/2004/02/skos/core#prefLabel" : [ {
    "@language" : "en",
    "@value" : "Resilience"
  } ]
}, {
  "@id" : "https://openark.adaptcentre.ie/Ontologies/ARKControlTerminology#Respond",
  "@type" : [ "http://www.w3.org/2002/07/owl#NamedIndividual" ],
  "http://purl.org/dc/terms/contributor" : [ {
    "@value" : "Junli Liang"
  }, {
    "@value" : "Rob Brennan"
  } ],
  "http://purl.org/dc/terms/created" : [ {
    "@type" : "http://www.w3.org/2001/XMLSchema#date",
    "@value" : "2024-03-14"
  } ],
  "http://purl.org/dc/terms/source" : [ {
    "@value" : "ISO/IEC 27002:2022(E)"
  } ],
  "http://www.w3.org/1999/02/22-rdf-syntax-ns#type" : [ {
    "@id" : "http://www.w3.org/2004/02/skos/core#Concept"
  } ],
  "http://www.w3.org/2000/01/rdf-schema#comment" : [ {
    "@language" : "en",
    "@value" : "Create and put into practice the appropriate activities to take action in response to detected cyber security events."
  } ],
  "http://www.w3.org/2000/01/rdf-schema#isDefinedBy" : [ {
    "@id" : "https://openark.adaptcentre.ie/Ontologies/ARKControlTerminology#"
  } ],
  "http://www.w3.org/2000/01/rdf-schema#label" : [ {
    "@language" : "en",
    "@value" : "Respond"
  } ],
  "http://www.w3.org/2004/02/skos/core#definition" : [ {
    "@language" : "en",
    "@value" : "Create and put into practice the appropriate activities to take action in response to detected cyber security events."
  } ],
  "http://www.w3.org/2004/02/skos/core#inScheme" : [ {
    "@id" : "https://openark.adaptcentre.ie/Ontologies/ARKControlTerminology#"
  } ],
  "http://www.w3.org/2004/02/skos/core#prefLabel" : [ {
    "@language" : "en",
    "@value" : "Respond"
  } ]
}, {
  "@id" : "https://openark.adaptcentre.ie/Ontologies/ARKControlTerminology#Review",
  "@type" : [ "http://www.w3.org/2002/07/owl#NamedIndividual" ],
  "http://purl.org/dc/terms/contributor" : [ {
    "@value" : "Junli Liang"
  }, {
    "@value" : "Rob Brennan"
  } ],
  "http://purl.org/dc/terms/created" : [ {
    "@type" : "http://www.w3.org/2001/XMLSchema#date",
    "@value" : "2024-04-08"
  } ],
  "http://purl.org/dc/terms/source" : [ {
    "@value" : "ISO27000:2018"
  } ],
  "http://www.w3.org/1999/02/22-rdf-syntax-ns#type" : [ {
    "@id" : "http://www.w3.org/2004/02/skos/core#Concept"
  } ],
  "http://www.w3.org/2000/01/rdf-schema#comment" : [ {
    "@language" : "en",
    "@value" : "activity undertaken to determine the suitability, adequacy and effectiveness (3.20) of the subject matter to achieve established objectives (3.49)"
  } ],
  "http://www.w3.org/2000/01/rdf-schema#isDefinedBy" : [ {
    "@id" : "https://openark.adaptcentre.ie/Ontologies/ARKControlTerminology#"
  } ],
  "http://www.w3.org/2000/01/rdf-schema#label" : [ {
    "@language" : "en",
    "@value" : "Review"
  } ],
  "http://www.w3.org/2004/02/skos/core#definition" : [ {
    "@language" : "en",
    "@value" : "activity undertaken to determine the suitability, adequacy and effectiveness (3.20) of the subject matter to achieve established objectives (3.49)"
  } ],
  "http://www.w3.org/2004/02/skos/core#inScheme" : [ {
    "@id" : "https://openark.adaptcentre.ie/Ontologies/ARKControlTerminology#"
  } ],
  "http://www.w3.org/2004/02/skos/core#prefLabel" : [ {
    "@language" : "en",
    "@value" : "Review"
  } ]
}, {
  "@id" : "https://openark.adaptcentre.ie/Ontologies/ARKControlTerminology#ReviewObject",
  "@type" : [ "http://www.w3.org/2002/07/owl#NamedIndividual" ],
  "http://purl.org/dc/terms/contributor" : [ {
    "@value" : "Junli Liang"
  }, {
    "@value" : "Rob Brennan"
  } ],
  "http://purl.org/dc/terms/created" : [ {
    "@type" : "http://www.w3.org/2001/XMLSchema#date",
    "@value" : "2024-04-08"
  } ],
  "http://purl.org/dc/terms/source" : [ {
    "@value" : "ISO27000:2018"
  } ],
  "http://www.w3.org/1999/02/22-rdf-syntax-ns#type" : [ {
    "@id" : "http://www.w3.org/2004/02/skos/core#Concept"
  } ],
  "http://www.w3.org/2000/01/rdf-schema#comment" : [ {
    "@language" : "en",
    "@value" : "specific item being reviewed."
  } ],
  "http://www.w3.org/2000/01/rdf-schema#isDefinedBy" : [ {
    "@id" : "https://openark.adaptcentre.ie/Ontologies/ARKControlTerminology#"
  } ],
  "http://www.w3.org/2000/01/rdf-schema#label" : [ {
    "@language" : "en",
    "@value" : "Review object"
  } ],
  "http://www.w3.org/2004/02/skos/core#broader" : [ {
    "@id" : "https://openark.adaptcentre.ie/Ontologies/ARKControlTerminology#Review"
  } ],
  "http://www.w3.org/2004/02/skos/core#definition" : [ {
    "@language" : "en",
    "@value" : "specific item being reviewed."
  } ],
  "http://www.w3.org/2004/02/skos/core#inScheme" : [ {
    "@id" : "https://openark.adaptcentre.ie/Ontologies/ARKControlTerminology#"
  } ],
  "http://www.w3.org/2004/02/skos/core#prefLabel" : [ {
    "@language" : "en",
    "@value" : "Review object"
  } ]
}, {
  "@id" : "https://openark.adaptcentre.ie/Ontologies/ARKControlTerminology#ReviewObjective",
  "@type" : [ "http://www.w3.org/2002/07/owl#NamedIndividual" ],
  "http://purl.org/dc/terms/contributor" : [ {
    "@value" : "Junli Liang"
  }, {
    "@value" : "Rob Brennan"
  } ],
  "http://purl.org/dc/terms/created" : [ {
    "@type" : "http://www.w3.org/2001/XMLSchema#date",
    "@value" : "2024-04-08"
  } ],
  "http://purl.org/dc/terms/source" : [ {
    "@value" : "ISO27000:2018"
  } ],
  "http://www.w3.org/1999/02/22-rdf-syntax-ns#type" : [ {
    "@id" : "http://www.w3.org/2004/02/skos/core#Concept"
  } ],
  "http://www.w3.org/2000/01/rdf-schema#comment" : [ {
    "@language" : "en",
    "@value" : "statement describing what is to be achieved as a result of a review (3.59)"
  } ],
  "http://www.w3.org/2000/01/rdf-schema#isDefinedBy" : [ {
    "@id" : "https://openark.adaptcentre.ie/Ontologies/ARKControlTerminology#"
  } ],
  "http://www.w3.org/2000/01/rdf-schema#label" : [ {
    "@language" : "en",
    "@value" : "Review objective"
  } ],
  "http://www.w3.org/2004/02/skos/core#broader" : [ {
    "@id" : "https://openark.adaptcentre.ie/Ontologies/ARKControlTerminology#Review"
  } ],
  "http://www.w3.org/2004/02/skos/core#definition" : [ {
    "@language" : "en",
    "@value" : "statement describing what is to be achieved as a result of a review (3.59)"
  } ],
  "http://www.w3.org/2004/02/skos/core#inScheme" : [ {
    "@id" : "https://openark.adaptcentre.ie/Ontologies/ARKControlTerminology#"
  } ],
  "http://www.w3.org/2004/02/skos/core#prefLabel" : [ {
    "@language" : "en",
    "@value" : "Review objective"
  } ]
}, {
  "@id" : "https://openark.adaptcentre.ie/Ontologies/ARKControlTerminology#RightsStatement",
  "@type" : [ "http://www.w3.org/2002/07/owl#NamedIndividual" ],
  "http://purl.org/dc/terms/rights" : [ {
    "@value" : "This work is licensed under a Creative Commons Attribution 4.0 International License."
  } ],
  "http://www.w3.org/1999/02/22-rdf-syntax-ns#type" : [ {
    "@id" : "http://purl.org/dc/terms/RightsStatement"
  } ],
  "http://www.w3.org/2000/01/rdf-schema#label" : [ {
    "@language" : "en",
    "@value" : "©2024 ARK"
  } ]
}, {
  "@id" : "https://openark.adaptcentre.ie/Ontologies/ARKControlTerminology#Risk",
  "@type" : [ "http://www.w3.org/2002/07/owl#NamedIndividual" ],
  "http://purl.org/dc/terms/contributor" : [ {
    "@value" : "Junli Liang"
  }, {
    "@value" : "Rob Brennan"
  } ],
  "http://purl.org/dc/terms/created" : [ {
    "@type" : "http://www.w3.org/2001/XMLSchema#date",
    "@value" : "2024-04-08"
  } ],
  "http://purl.org/dc/terms/source" : [ {
    "@value" : "ISO27000:2018"
  } ],
  "http://www.w3.org/1999/02/22-rdf-syntax-ns#type" : [ {
    "@id" : "http://www.w3.org/2004/02/skos/core#Concept"
  } ],
  "http://www.w3.org/2000/01/rdf-schema#comment" : [ {
    "@language" : "en",
    "@value" : "effect of uncertainty on objectives (3.49) Note 1 to entry: An effect is a deviation from the expected — positive or negative. Note 2 to entry: Uncertainty is the state, even partial, of deficiency of information related to, understanding or knowledge of, an event, its consequence, or likelihood. Note 3 to entry: Risk is often characterized by reference to potential “events” (as defined in ISO Guide 73:2009, 3.5.1.3) and “consequences” (as defined in ISO Guide 73:2009, 3.6.1.3), or a combination of these. Note 4 to entry: Risk is often expressed in terms of a combination of the consequences of an event (including changes in circumstances) and the associated “likelihood” (as defined in ISO Guide 73:2009, 3.6.1.1) of occurrence. Note 5 to entry: In the context of information security management systems, information security risks can be expressed as effect of uncertainty on information security objectives. Note 6 to entry: Information security risk is associated with the potential that threats will exploit vulnerabilities of an information asset or group of information assets and thereby cause harm to an organization."
  } ],
  "http://www.w3.org/2000/01/rdf-schema#isDefinedBy" : [ {
    "@id" : "https://openark.adaptcentre.ie/Ontologies/ARKControlTerminology#"
  } ],
  "http://www.w3.org/2000/01/rdf-schema#label" : [ {
    "@language" : "en",
    "@value" : "Risk"
  } ],
  "http://www.w3.org/2004/02/skos/core#definition" : [ {
    "@language" : "en",
    "@value" : "effect of uncertainty on objectives (3.49) Note 1 to entry: An effect is a deviation from the expected — positive or negative. Note 2 to entry: Uncertainty is the state, even partial, of deficiency of information related to, understanding or knowledge of, an event, its consequence, or likelihood. Note 3 to entry: Risk is often characterized by reference to potential “events” (as defined in ISO Guide 73:2009, 3.5.1.3) and “consequences” (as defined in ISO Guide 73:2009, 3.6.1.3), or a combination of these. Note 4 to entry: Risk is often expressed in terms of a combination of the consequences of an event (including changes in circumstances) and the associated “likelihood” (as defined in ISO Guide 73:2009, 3.6.1.1) of occurrence. Note 5 to entry: In the context of information security management systems, information security risks can be expressed as effect of uncertainty on information security objectives. Note 6 to entry: Information security risk is associated with the potential that threats will exploit vulnerabilities of an information asset or group of information assets and thereby cause harm to an organization."
  } ],
  "http://www.w3.org/2004/02/skos/core#inScheme" : [ {
    "@id" : "https://openark.adaptcentre.ie/Ontologies/ARKControlTerminology#"
  } ],
  "http://www.w3.org/2004/02/skos/core#prefLabel" : [ {
    "@language" : "en",
    "@value" : "Risk"
  } ]
}, {
  "@id" : "https://openark.adaptcentre.ie/Ontologies/ARKControlTerminology#RiskAcceptance",
  "@type" : [ "http://www.w3.org/2002/07/owl#NamedIndividual" ],
  "http://purl.org/dc/terms/contributor" : [ {
    "@value" : "Junli Liang"
  }, {
    "@value" : "Rob Brennan"
  } ],
  "http://purl.org/dc/terms/created" : [ {
    "@type" : "http://www.w3.org/2001/XMLSchema#date",
    "@value" : "2024-04-08"
  } ],
  "http://purl.org/dc/terms/source" : [ {
    "@value" : "ISO27000:2018"
  } ],
  "http://www.w3.org/1999/02/22-rdf-syntax-ns#type" : [ {
    "@id" : "http://www.w3.org/2004/02/skos/core#Concept"
  } ],
  "http://www.w3.org/2000/01/rdf-schema#comment" : [ {
    "@language" : "en",
    "@value" : "informed decision to take a particular risk (3.61) Note 1 to entry: Risk acceptance can occur without risk treatment (3.72) or during the process (3.54) of risk treatment. Note 2 to entry: Accepted risks are subject to monitoring (3.46) and review (3.58)."
  } ],
  "http://www.w3.org/2000/01/rdf-schema#isDefinedBy" : [ {
    "@id" : "https://openark.adaptcentre.ie/Ontologies/ARKControlTerminology#"
  } ],
  "http://www.w3.org/2000/01/rdf-schema#label" : [ {
    "@language" : "en",
    "@value" : "Risk acceptance"
  } ],
  "http://www.w3.org/2004/02/skos/core#broader" : [ {
    "@id" : "https://openark.adaptcentre.ie/Ontologies/ARKControlTerminology#Risk"
  } ],
  "http://www.w3.org/2004/02/skos/core#definition" : [ {
    "@language" : "en",
    "@value" : "informed decision to take a particular risk (3.61) Note 1 to entry: Risk acceptance can occur without risk treatment (3.72) or during the process (3.54) of risk treatment. Note 2 to entry: Accepted risks are subject to monitoring (3.46) and review (3.58)."
  } ],
  "http://www.w3.org/2004/02/skos/core#inScheme" : [ {
    "@id" : "https://openark.adaptcentre.ie/Ontologies/ARKControlTerminology#"
  } ],
  "http://www.w3.org/2004/02/skos/core#prefLabel" : [ {
    "@language" : "en",
    "@value" : "Risk acceptance"
  } ]
}, {
  "@id" : "https://openark.adaptcentre.ie/Ontologies/ARKControlTerminology#RiskAnalysis",
  "@type" : [ "http://www.w3.org/2002/07/owl#NamedIndividual" ],
  "http://purl.org/dc/terms/contributor" : [ {
    "@value" : "Junli Liang"
  }, {
    "@value" : "Rob Brennan"
  } ],
  "http://purl.org/dc/terms/created" : [ {
    "@type" : "http://www.w3.org/2001/XMLSchema#date",
    "@value" : "2024-04-08"
  } ],
  "http://purl.org/dc/terms/source" : [ {
    "@value" : "ISO27000:2018"
  } ],
  "http://www.w3.org/1999/02/22-rdf-syntax-ns#type" : [ {
    "@id" : "http://www.w3.org/2004/02/skos/core#Concept"
  } ],
  "http://www.w3.org/2000/01/rdf-schema#comment" : [ {
    "@language" : "en",
    "@value" : "process (3.54) to comprehend the nature of risk (3.61) and to determine the level of risk (3.39) Note 1 to entry: Risk analysis provides the basis for risk evaluation (3.67) and decisions about risk treatment (3.72). Note 2 to entry: Risk analysis includes risk estimation."
  } ],
  "http://www.w3.org/2000/01/rdf-schema#isDefinedBy" : [ {
    "@id" : "https://openark.adaptcentre.ie/Ontologies/ARKControlTerminology#"
  } ],
  "http://www.w3.org/2000/01/rdf-schema#label" : [ {
    "@language" : "en",
    "@value" : "Risk analysis"
  } ],
  "http://www.w3.org/2004/02/skos/core#broader" : [ {
    "@id" : "https://openark.adaptcentre.ie/Ontologies/ARKControlTerminology#Risk"
  } ],
  "http://www.w3.org/2004/02/skos/core#definition" : [ {
    "@language" : "en",
    "@value" : "process (3.54) to comprehend the nature of risk (3.61) and to determine the level of risk (3.39) Note 1 to entry: Risk analysis provides the basis for risk evaluation (3.67) and decisions about risk treatment (3.72). Note 2 to entry: Risk analysis includes risk estimation."
  } ],
  "http://www.w3.org/2004/02/skos/core#inScheme" : [ {
    "@id" : "https://openark.adaptcentre.ie/Ontologies/ARKControlTerminology#"
  } ],
  "http://www.w3.org/2004/02/skos/core#prefLabel" : [ {
    "@language" : "en",
    "@value" : "Risk analysis"
  } ]
}, {
  "@id" : "https://openark.adaptcentre.ie/Ontologies/ARKControlTerminology#RiskAssessment",
  "@type" : [ "http://www.w3.org/2002/07/owl#NamedIndividual" ],
  "http://purl.org/dc/terms/contributor" : [ {
    "@value" : "Junli Liang"
  }, {
    "@value" : "Rob Brennan"
  } ],
  "http://purl.org/dc/terms/created" : [ {
    "@type" : "http://www.w3.org/2001/XMLSchema#date",
    "@value" : "2024-04-08"
  } ],
  "http://purl.org/dc/terms/source" : [ {
    "@value" : "ISO27000:2018"
  } ],
  "http://www.w3.org/1999/02/22-rdf-syntax-ns#type" : [ {
    "@id" : "http://www.w3.org/2004/02/skos/core#Concept"
  } ],
  "http://www.w3.org/2000/01/rdf-schema#comment" : [ {
    "@language" : "en",
    "@value" : "overall process (3.54) of risk identification (3.68), risk analysis (3.63) and risk evaluation (3.67)"
  } ],
  "http://www.w3.org/2000/01/rdf-schema#isDefinedBy" : [ {
    "@id" : "https://openark.adaptcentre.ie/Ontologies/ARKControlTerminology#"
  } ],
  "http://www.w3.org/2000/01/rdf-schema#label" : [ {
    "@language" : "en",
    "@value" : "Risk assessment"
  } ],
  "http://www.w3.org/2004/02/skos/core#broader" : [ {
    "@id" : "https://openark.adaptcentre.ie/Ontologies/ARKControlTerminology#Risk"
  } ],
  "http://www.w3.org/2004/02/skos/core#definition" : [ {
    "@language" : "en",
    "@value" : "overall process (3.54) of risk identification (3.68), risk analysis (3.63) and risk evaluation (3.67)"
  } ],
  "http://www.w3.org/2004/02/skos/core#inScheme" : [ {
    "@id" : "https://openark.adaptcentre.ie/Ontologies/ARKControlTerminology#"
  } ],
  "http://www.w3.org/2004/02/skos/core#prefLabel" : [ {
    "@language" : "en",
    "@value" : "Risk assessment"
  } ]
}, {
  "@id" : "https://openark.adaptcentre.ie/Ontologies/ARKControlTerminology#RiskCommunicationConsultation",
  "@type" : [ "http://www.w3.org/2002/07/owl#NamedIndividual" ],
  "http://purl.org/dc/terms/contributor" : [ {
    "@value" : "Junli Liang"
  }, {
    "@value" : "Rob Brennan"
  } ],
  "http://purl.org/dc/terms/created" : [ {
    "@type" : "http://www.w3.org/2001/XMLSchema#date",
    "@value" : "2024-04-08"
  } ],
  "http://purl.org/dc/terms/source" : [ {
    "@value" : "ISO27000:2018"
  } ],
  "http://www.w3.org/1999/02/22-rdf-syntax-ns#type" : [ {
    "@id" : "http://www.w3.org/2004/02/skos/core#Concept"
  } ],
  "http://www.w3.org/2000/01/rdf-schema#comment" : [ {
    "@language" : "en",
    "@value" : "set of continual and iterative processes (3.54) that an organization conducts to provide, share or obtain information, and to engage in dialogue with stakeholders (3.37) regarding the management of risk (3.61) Note 1 to entry: The information can relate to the existence, nature, form, likelihood (3.41), significance, evaluation, acceptability and treatment of risk. Note 2 to entry: Consultation is a two-way process of informed communication between an organization (3.50) and its stakeholders on an issue prior to making a decision or determining a direction on that issue. Consultation is — a process which impacts on a decision through influence rather than power; and — an input to decision making, not joint decision making."
  } ],
  "http://www.w3.org/2000/01/rdf-schema#isDefinedBy" : [ {
    "@id" : "https://openark.adaptcentre.ie/Ontologies/ARKControlTerminology#"
  } ],
  "http://www.w3.org/2000/01/rdf-schema#label" : [ {
    "@language" : "en",
    "@value" : "Risk communication and consultation"
  } ],
  "http://www.w3.org/2004/02/skos/core#broader" : [ {
    "@id" : "https://openark.adaptcentre.ie/Ontologies/ARKControlTerminology#Risk"
  } ],
  "http://www.w3.org/2004/02/skos/core#definition" : [ {
    "@language" : "en",
    "@value" : "set of continual and iterative processes (3.54) that an organization conducts to provide, share or obtain information, and to engage in dialogue with stakeholders (3.37) regarding the management of risk (3.61) Note 1 to entry: The information can relate to the existence, nature, form, likelihood (3.41), significance, evaluation, acceptability and treatment of risk. Note 2 to entry: Consultation is a two-way process of informed communication between an organization (3.50) and its stakeholders on an issue prior to making a decision or determining a direction on that issue. Consultation is — a process which impacts on a decision through influence rather than power; and — an input to decision making, not joint decision making."
  } ],
  "http://www.w3.org/2004/02/skos/core#inScheme" : [ {
    "@id" : "https://openark.adaptcentre.ie/Ontologies/ARKControlTerminology#"
  } ],
  "http://www.w3.org/2004/02/skos/core#prefLabel" : [ {
    "@language" : "en",
    "@value" : "Risk communication and consultation"
  } ]
}, {
  "@id" : "https://openark.adaptcentre.ie/Ontologies/ARKControlTerminology#RiskCriteria",
  "@type" : [ "http://www.w3.org/2002/07/owl#NamedIndividual" ],
  "http://purl.org/dc/terms/contributor" : [ {
    "@value" : "Junli Liang"
  }, {
    "@value" : "Rob Brennan"
  } ],
  "http://purl.org/dc/terms/created" : [ {
    "@type" : "http://www.w3.org/2001/XMLSchema#date",
    "@value" : "2024-04-08"
  } ],
  "http://purl.org/dc/terms/source" : [ {
    "@value" : "ISO27000:2018"
  } ],
  "http://www.w3.org/1999/02/22-rdf-syntax-ns#type" : [ {
    "@id" : "http://www.w3.org/2004/02/skos/core#Concept"
  } ],
  "http://www.w3.org/2000/01/rdf-schema#comment" : [ {
    "@language" : "en",
    "@value" : "terms of reference against which the significance of risk (3.61) is evaluated Note 1 to entry: Risk criteria are based on organizational objectives, and external context (3.22) and internal context (3.38). Note 2 to entry: Risk criteria can be derived from standards, laws, policies (3.53) and other requirements (3.56)."
  } ],
  "http://www.w3.org/2000/01/rdf-schema#isDefinedBy" : [ {
    "@id" : "https://openark.adaptcentre.ie/Ontologies/ARKControlTerminology#"
  } ],
  "http://www.w3.org/2000/01/rdf-schema#label" : [ {
    "@language" : "en",
    "@value" : "Risk criteria"
  } ],
  "http://www.w3.org/2004/02/skos/core#broader" : [ {
    "@id" : "https://openark.adaptcentre.ie/Ontologies/ARKControlTerminology#Risk"
  } ],
  "http://www.w3.org/2004/02/skos/core#definition" : [ {
    "@language" : "en",
    "@value" : "terms of reference against which the significance of risk (3.61) is evaluated Note 1 to entry: Risk criteria are based on organizational objectives, and external context (3.22) and internal context (3.38). Note 2 to entry: Risk criteria can be derived from standards, laws, policies (3.53) and other requirements (3.56)."
  } ],
  "http://www.w3.org/2004/02/skos/core#inScheme" : [ {
    "@id" : "https://openark.adaptcentre.ie/Ontologies/ARKControlTerminology#"
  } ],
  "http://www.w3.org/2004/02/skos/core#prefLabel" : [ {
    "@language" : "en",
    "@value" : "Risk criteria"
  } ]
}, {
  "@id" : "https://openark.adaptcentre.ie/Ontologies/ARKControlTerminology#RiskEvaluation",
  "@type" : [ "http://www.w3.org/2002/07/owl#NamedIndividual" ],
  "http://purl.org/dc/terms/contributor" : [ {
    "@value" : "Junli Liang"
  }, {
    "@value" : "Rob Brennan"
  } ],
  "http://purl.org/dc/terms/created" : [ {
    "@type" : "http://www.w3.org/2001/XMLSchema#date",
    "@value" : "2024-04-08"
  } ],
  "http://purl.org/dc/terms/source" : [ {
    "@value" : "ISO27000:2018"
  } ],
  "http://www.w3.org/1999/02/22-rdf-syntax-ns#type" : [ {
    "@id" : "http://www.w3.org/2004/02/skos/core#Concept"
  } ],
  "http://www.w3.org/2000/01/rdf-schema#comment" : [ {
    "@language" : "en",
    "@value" : "process (3.54) of comparing the results of risk analysis (3.63) with risk criteria (3.66) to determine whether the risk (3.61) and/or its magnitude is acceptable or tolerable Note 1 to entry: Risk evaluation assists in the decision about risk treatment (3.72)."
  } ],
  "http://www.w3.org/2000/01/rdf-schema#isDefinedBy" : [ {
    "@id" : "https://openark.adaptcentre.ie/Ontologies/ARKControlTerminology#"
  } ],
  "http://www.w3.org/2000/01/rdf-schema#label" : [ {
    "@language" : "en",
    "@value" : "Risk evaluation"
  } ],
  "http://www.w3.org/2004/02/skos/core#broader" : [ {
    "@id" : "https://openark.adaptcentre.ie/Ontologies/ARKControlTerminology#Risk"
  } ],
  "http://www.w3.org/2004/02/skos/core#definition" : [ {
    "@language" : "en",
    "@value" : "process (3.54) of comparing the results of risk analysis (3.63) with risk criteria (3.66) to determine whether the risk (3.61) and/or its magnitude is acceptable or tolerable Note 1 to entry: Risk evaluation assists in the decision about risk treatment (3.72)."
  } ],
  "http://www.w3.org/2004/02/skos/core#inScheme" : [ {
    "@id" : "https://openark.adaptcentre.ie/Ontologies/ARKControlTerminology#"
  } ],
  "http://www.w3.org/2004/02/skos/core#prefLabel" : [ {
    "@language" : "en",
    "@value" : "Risk evaluation"
  } ]
}, {
  "@id" : "https://openark.adaptcentre.ie/Ontologies/ARKControlTerminology#RiskIdentification",
  "@type" : [ "http://www.w3.org/2002/07/owl#NamedIndividual" ],
  "http://purl.org/dc/terms/contributor" : [ {
    "@value" : "Junli Liang"
  }, {
    "@value" : "Rob Brennan"
  } ],
  "http://purl.org/dc/terms/created" : [ {
    "@type" : "http://www.w3.org/2001/XMLSchema#date",
    "@value" : "2024-04-08"
  } ],
  "http://purl.org/dc/terms/source" : [ {
    "@value" : "ISO27000:2018"
  } ],
  "http://www.w3.org/1999/02/22-rdf-syntax-ns#type" : [ {
    "@id" : "http://www.w3.org/2004/02/skos/core#Concept"
  } ],
  "http://www.w3.org/2000/01/rdf-schema#comment" : [ {
    "@language" : "en",
    "@value" : "process (3.54) of finding, recognizing and describing risks (3.61) Note 1 to entry: Risk identification involves the identification of risk sources, events (3.21), their causes and their potential consequences (3.12). Note 2 to entry: Risk identification can involve historical data, theoretical analysis, informed and expert opinions, and stakeholders’ (3.37) needs."
  } ],
  "http://www.w3.org/2000/01/rdf-schema#isDefinedBy" : [ {
    "@id" : "https://openark.adaptcentre.ie/Ontologies/ARKControlTerminology#"
  } ],
  "http://www.w3.org/2000/01/rdf-schema#label" : [ {
    "@language" : "en",
    "@value" : "Risk identification"
  } ],
  "http://www.w3.org/2004/02/skos/core#broader" : [ {
    "@id" : "https://openark.adaptcentre.ie/Ontologies/ARKControlTerminology#Risk"
  } ],
  "http://www.w3.org/2004/02/skos/core#definition" : [ {
    "@language" : "en",
    "@value" : "process (3.54) of finding, recognizing and describing risks (3.61) Note 1 to entry: Risk identification involves the identification of risk sources, events (3.21), their causes and their potential consequences (3.12). Note 2 to entry: Risk identification can involve historical data, theoretical analysis, informed and expert opinions, and stakeholders’ (3.37) needs."
  } ],
  "http://www.w3.org/2004/02/skos/core#inScheme" : [ {
    "@id" : "https://openark.adaptcentre.ie/Ontologies/ARKControlTerminology#"
  } ],
  "http://www.w3.org/2004/02/skos/core#prefLabel" : [ {
    "@language" : "en",
    "@value" : "Risk identification"
  } ]
}, {
  "@id" : "https://openark.adaptcentre.ie/Ontologies/ARKControlTerminology#RiskManagement",
  "@type" : [ "http://www.w3.org/2002/07/owl#NamedIndividual" ],
  "http://purl.org/dc/terms/contributor" : [ {
    "@value" : "Junli Liang"
  }, {
    "@value" : "Rob Brennan"
  } ],
  "http://purl.org/dc/terms/created" : [ {
    "@type" : "http://www.w3.org/2001/XMLSchema#date",
    "@value" : "2024-04-08"
  } ],
  "http://purl.org/dc/terms/source" : [ {
    "@value" : "ISO27000:2018"
  } ],
  "http://www.w3.org/1999/02/22-rdf-syntax-ns#type" : [ {
    "@id" : "http://www.w3.org/2004/02/skos/core#Concept"
  } ],
  "http://www.w3.org/2000/01/rdf-schema#comment" : [ {
    "@language" : "en",
    "@value" : "coordinated activities to direct and control an organization (3.50) with regard to risk (3.61)"
  } ],
  "http://www.w3.org/2000/01/rdf-schema#isDefinedBy" : [ {
    "@id" : "https://openark.adaptcentre.ie/Ontologies/ARKControlTerminology#"
  } ],
  "http://www.w3.org/2000/01/rdf-schema#label" : [ {
    "@language" : "en",
    "@value" : "Risk management"
  } ],
  "http://www.w3.org/2004/02/skos/core#broader" : [ {
    "@id" : "https://openark.adaptcentre.ie/Ontologies/ARKControlTerminology#Risk"
  } ],
  "http://www.w3.org/2004/02/skos/core#definition" : [ {
    "@language" : "en",
    "@value" : "coordinated activities to direct and control an organization (3.50) with regard to risk (3.61)"
  } ],
  "http://www.w3.org/2004/02/skos/core#inScheme" : [ {
    "@id" : "https://openark.adaptcentre.ie/Ontologies/ARKControlTerminology#"
  } ],
  "http://www.w3.org/2004/02/skos/core#prefLabel" : [ {
    "@language" : "en",
    "@value" : "Risk management"
  } ]
}, {
  "@id" : "https://openark.adaptcentre.ie/Ontologies/ARKControlTerminology#RiskManagementProcess",
  "@type" : [ "http://www.w3.org/2002/07/owl#NamedIndividual" ],
  "http://purl.org/dc/terms/contributor" : [ {
    "@value" : "Junli Liang"
  }, {
    "@value" : "Rob Brennan"
  } ],
  "http://purl.org/dc/terms/created" : [ {
    "@type" : "http://www.w3.org/2001/XMLSchema#date",
    "@value" : "2024-04-08"
  } ],
  "http://purl.org/dc/terms/source" : [ {
    "@value" : "ISO27000:2018"
  } ],
  "http://www.w3.org/1999/02/22-rdf-syntax-ns#type" : [ {
    "@id" : "http://www.w3.org/2004/02/skos/core#Concept"
  } ],
  "http://www.w3.org/2000/01/rdf-schema#comment" : [ {
    "@language" : "en",
    "@value" : "systematic application of management policies (3.53), procedures and practices to the activities of communicating, consulting, establishing the context and identifying, analysing, evaluating, treating, monitoring and reviewing risk (3.61) Note 1 to entry: ISO/IEC 27005 uses the term “process” (3.54) to describe risk management overall. The elements within the risk management (3.69) process are referred to as “activities”."
  } ],
  "http://www.w3.org/2000/01/rdf-schema#isDefinedBy" : [ {
    "@id" : "https://openark.adaptcentre.ie/Ontologies/ARKControlTerminology#"
  } ],
  "http://www.w3.org/2000/01/rdf-schema#label" : [ {
    "@language" : "en",
    "@value" : "Risk management process"
  } ],
  "http://www.w3.org/2004/02/skos/core#broader" : [ {
    "@id" : "https://openark.adaptcentre.ie/Ontologies/ARKControlTerminology#RiskManagement"
  } ],
  "http://www.w3.org/2004/02/skos/core#definition" : [ {
    "@language" : "en",
    "@value" : "systematic application of management policies (3.53), procedures and practices to the activities of communicating, consulting, establishing the context and identifying, analysing, evaluating, treating, monitoring and reviewing risk (3.61) Note 1 to entry: ISO/IEC 27005 uses the term “process” (3.54) to describe risk management overall. The elements within the risk management (3.69) process are referred to as “activities”."
  } ],
  "http://www.w3.org/2004/02/skos/core#inScheme" : [ {
    "@id" : "https://openark.adaptcentre.ie/Ontologies/ARKControlTerminology#"
  } ],
  "http://www.w3.org/2004/02/skos/core#prefLabel" : [ {
    "@language" : "en",
    "@value" : "Risk management process"
  } ]
}, {
  "@id" : "https://openark.adaptcentre.ie/Ontologies/ARKControlTerminology#RiskOwner",
  "@type" : [ "http://www.w3.org/2002/07/owl#NamedIndividual" ],
  "http://purl.org/dc/terms/contributor" : [ {
    "@value" : "Junli Liang"
  }, {
    "@value" : "Rob Brennan"
  } ],
  "http://purl.org/dc/terms/created" : [ {
    "@type" : "http://www.w3.org/2001/XMLSchema#date",
    "@value" : "2024-04-08"
  } ],
  "http://purl.org/dc/terms/source" : [ {
    "@value" : "ISO27000:2018"
  } ],
  "http://www.w3.org/1999/02/22-rdf-syntax-ns#type" : [ {
    "@id" : "http://www.w3.org/2004/02/skos/core#Concept"
  } ],
  "http://www.w3.org/2000/01/rdf-schema#comment" : [ {
    "@language" : "en",
    "@value" : "person or entity with the accountability and authority to manage a risk (3.61)"
  } ],
  "http://www.w3.org/2000/01/rdf-schema#isDefinedBy" : [ {
    "@id" : "https://openark.adaptcentre.ie/Ontologies/ARKControlTerminology#"
  } ],
  "http://www.w3.org/2000/01/rdf-schema#label" : [ {
    "@language" : "en",
    "@value" : "Risk owner"
  } ],
  "http://www.w3.org/2004/02/skos/core#broader" : [ {
    "@id" : "https://openark.adaptcentre.ie/Ontologies/ARKControlTerminology#RiskManagement"
  } ],
  "http://www.w3.org/2004/02/skos/core#definition" : [ {
    "@language" : "en",
    "@value" : "person or entity with the accountability and authority to manage a risk (3.61)"
  } ],
  "http://www.w3.org/2004/02/skos/core#inScheme" : [ {
    "@id" : "https://openark.adaptcentre.ie/Ontologies/ARKControlTerminology#"
  } ],
  "http://www.w3.org/2004/02/skos/core#prefLabel" : [ {
    "@language" : "en",
    "@value" : "Risk owner"
  } ]
}, {
  "@id" : "https://openark.adaptcentre.ie/Ontologies/ARKControlTerminology#RiskTreatment",
  "@type" : [ "http://www.w3.org/2002/07/owl#NamedIndividual" ],
  "http://purl.org/dc/terms/contributor" : [ {
    "@value" : "Junli Liang"
  }, {
    "@value" : "Rob Brennan"
  } ],
  "http://purl.org/dc/terms/created" : [ {
    "@type" : "http://www.w3.org/2001/XMLSchema#date",
    "@value" : "2024-04-08"
  } ],
  "http://purl.org/dc/terms/source" : [ {
    "@value" : "ISO27000:2018"
  } ],
  "http://www.w3.org/1999/02/22-rdf-syntax-ns#type" : [ {
    "@id" : "http://www.w3.org/2004/02/skos/core#Concept"
  } ],
  "http://www.w3.org/2000/01/rdf-schema#comment" : [ {
    "@language" : "en",
    "@value" : "process (3.54) to modify risk (3.61) Note 1 to entry: Risk treatment can involve: — avoiding the risk by deciding not to start or continue with the activity that gives rise to the risk; — taking or increasing risk in order to pursue an opportunity; — removing the risk source; — changing the likelihood (3.40); — changing the consequences (3.12); — sharing the risk with another party or parties (including contracts and risk financing); — retaining the risk by informed choice. Note 2 to entry: Risk treatments that deal with negative consequences are sometimes referred to as “risk mitigation”, “risk elimination”, “risk prevention” and “risk reduction”. Note 3 to entry: Risk treatment can create new risks or modify existing risks."
  } ],
  "http://www.w3.org/2000/01/rdf-schema#isDefinedBy" : [ {
    "@id" : "https://openark.adaptcentre.ie/Ontologies/ARKControlTerminology#"
  } ],
  "http://www.w3.org/2000/01/rdf-schema#label" : [ {
    "@language" : "en",
    "@value" : "Risk treatment"
  } ],
  "http://www.w3.org/2004/02/skos/core#broader" : [ {
    "@id" : "https://openark.adaptcentre.ie/Ontologies/ARKControlTerminology#RiskManagement"
  } ],
  "http://www.w3.org/2004/02/skos/core#definition" : [ {
    "@language" : "en",
    "@value" : "process (3.54) to modify risk (3.61) Note 1 to entry: Risk treatment can involve: — avoiding the risk by deciding not to start or continue with the activity that gives rise to the risk; — taking or increasing risk in order to pursue an opportunity; — removing the risk source; — changing the likelihood (3.40); — changing the consequences (3.12); — sharing the risk with another party or parties (including contracts and risk financing); — retaining the risk by informed choice. Note 2 to entry: Risk treatments that deal with negative consequences are sometimes referred to as “risk mitigation”, “risk elimination”, “risk prevention” and “risk reduction”. Note 3 to entry: Risk treatment can create new risks or modify existing risks."
  } ],
  "http://www.w3.org/2004/02/skos/core#inScheme" : [ {
    "@id" : "https://openark.adaptcentre.ie/Ontologies/ARKControlTerminology#"
  } ],
  "http://www.w3.org/2004/02/skos/core#prefLabel" : [ {
    "@language" : "en",
    "@value" : "Risk treatment"
  } ]
}, {
  "@id" : "https://openark.adaptcentre.ie/Ontologies/ARKControlTerminology#SecureConfiguration",
  "@type" : [ "http://www.w3.org/2002/07/owl#NamedIndividual" ],
  "http://purl.org/dc/terms/contributor" : [ {
    "@value" : "Junli Liang"
  }, {
    "@value" : "Rob Brennan"
  } ],
  "http://purl.org/dc/terms/created" : [ {
    "@type" : "http://www.w3.org/2001/XMLSchema#date",
    "@value" : "2024-03-14"
  } ],
  "http://purl.org/dc/terms/source" : [ {
    "@value" : "ISO/IEC 27002:2022(E)"
  } ],
  "http://www.w3.org/1999/02/22-rdf-syntax-ns#type" : [ {
    "@id" : "http://www.w3.org/2004/02/skos/core#Concept"
  } ],
  "http://www.w3.org/2000/01/rdf-schema#comment" : [ {
    "@language" : "en",
    "@value" : "A recognized standardized and established benchmark (e.g., National Checklist Program, DISA STIGs, CIS Benchmarks, etc.) that stipulates specific secure configuration settings for a given IT platform."
  } ],
  "http://www.w3.org/2000/01/rdf-schema#isDefinedBy" : [ {
    "@id" : "https://openark.adaptcentre.ie/Ontologies/ARKControlTerminology#"
  } ],
  "http://www.w3.org/2000/01/rdf-schema#label" : [ {
    "@language" : "en",
    "@value" : "Secure configuration"
  } ],
  "http://www.w3.org/2004/02/skos/core#definition" : [ {
    "@language" : "en",
    "@value" : "A recognized standardized and established benchmark (e.g., National Checklist Program, DISA STIGs, CIS Benchmarks, etc.) that stipulates specific secure configuration settings for a given IT platform."
  } ],
  "http://www.w3.org/2004/02/skos/core#inScheme" : [ {
    "@id" : "https://openark.adaptcentre.ie/Ontologies/ARKControlTerminology#"
  } ],
  "http://www.w3.org/2004/02/skos/core#prefLabel" : [ {
    "@language" : "en",
    "@value" : "Secure configuration"
  } ]
}, {
  "@id" : "https://openark.adaptcentre.ie/Ontologies/ARKControlTerminology#SecurityImplementationStandard",
  "@type" : [ "http://www.w3.org/2002/07/owl#NamedIndividual" ],
  "http://purl.org/dc/terms/contributor" : [ {
    "@value" : "Junli Liang"
  }, {
    "@value" : "Rob Brennan"
  } ],
  "http://purl.org/dc/terms/created" : [ {
    "@type" : "http://www.w3.org/2001/XMLSchema#date",
    "@value" : "2024-04-08"
  } ],
  "http://purl.org/dc/terms/source" : [ {
    "@value" : "ISO27000:2018"
  } ],
  "http://www.w3.org/1999/02/22-rdf-syntax-ns#type" : [ {
    "@id" : "http://www.w3.org/2004/02/skos/core#Concept"
  } ],
  "http://www.w3.org/2000/01/rdf-schema#comment" : [ {
    "@language" : "en",
    "@value" : "document specifying authorized ways for realizing security."
  } ],
  "http://www.w3.org/2000/01/rdf-schema#isDefinedBy" : [ {
    "@id" : "https://openark.adaptcentre.ie/Ontologies/ARKControlTerminology#"
  } ],
  "http://www.w3.org/2000/01/rdf-schema#label" : [ {
    "@language" : "en",
    "@value" : "Security implementation standard"
  } ],
  "http://www.w3.org/2004/02/skos/core#definition" : [ {
    "@language" : "en",
    "@value" : "document specifying authorized ways for realizing security."
  } ],
  "http://www.w3.org/2004/02/skos/core#inScheme" : [ {
    "@id" : "https://openark.adaptcentre.ie/Ontologies/ARKControlTerminology#"
  } ],
  "http://www.w3.org/2004/02/skos/core#prefLabel" : [ {
    "@language" : "en",
    "@value" : "Security implementation standard"
  } ]
}, {
  "@id" : "https://openark.adaptcentre.ie/Ontologies/ARKControlTerminology#SocialEnvironment",
  "@type" : [ "http://www.w3.org/2002/07/owl#NamedIndividual" ],
  "http://purl.org/dc/terms/contributor" : [ {
    "@value" : "Junli Liang"
  }, {
    "@value" : "Rob Brennan"
  } ],
  "http://purl.org/dc/terms/created" : [ {
    "@type" : "http://www.w3.org/2001/XMLSchema#date",
    "@value" : "2024-04-08"
  } ],
  "http://purl.org/dc/terms/source" : [ {
    "@value" : "ISO27000:2042"
  } ],
  "http://www.w3.org/1999/02/22-rdf-syntax-ns#type" : [ {
    "@id" : "http://www.w3.org/2004/02/skos/core#Concept"
  } ],
  "http://www.w3.org/2000/01/rdf-schema#comment" : [ {
    "@language" : "en",
    "@value" : "Social environment in cybersecurity"
  } ],
  "http://www.w3.org/2000/01/rdf-schema#isDefinedBy" : [ {
    "@id" : "https://openark.adaptcentre.ie/Ontologies/ARKControlTerminology#"
  } ],
  "http://www.w3.org/2000/01/rdf-schema#label" : [ {
    "@language" : "en",
    "@value" : "Social environment"
  } ],
  "http://www.w3.org/2004/02/skos/core#definition" : [ {
    "@language" : "en",
    "@value" : "Social environment in cybersecurity"
  } ],
  "http://www.w3.org/2004/02/skos/core#inScheme" : [ {
    "@id" : "https://openark.adaptcentre.ie/Ontologies/ARKControlTerminology#"
  } ],
  "http://www.w3.org/2004/02/skos/core#prefLabel" : [ {
    "@language" : "en",
    "@value" : "Social environment"
  } ]
}, {
  "@id" : "https://openark.adaptcentre.ie/Ontologies/ARKControlTerminology#StakeholderContext",
  "@type" : [ "http://www.w3.org/2002/07/owl#NamedIndividual" ],
  "http://purl.org/dc/terms/contributor" : [ {
    "@value" : "Junli Liang"
  }, {
    "@value" : "Rob Brennan"
  } ],
  "http://purl.org/dc/terms/created" : [ {
    "@type" : "http://www.w3.org/2001/XMLSchema#date",
    "@value" : "2024-04-28"
  } ],
  "http://purl.org/dc/terms/source" : [ {
    "@value" : "ISO27000:2018"
  } ],
  "http://www.w3.org/1999/02/22-rdf-syntax-ns#type" : [ {
    "@id" : "http://www.w3.org/2004/02/skos/core#Concept"
  } ],
  "http://www.w3.org/2000/01/rdf-schema#comment" : [ {
    "@language" : "en",
    "@value" : "Stakeholder Context in cybersecurity"
  } ],
  "http://www.w3.org/2000/01/rdf-schema#isDefinedBy" : [ {
    "@id" : "https://openark.adaptcentre.ie/Ontologies/ARKControlTerminology#"
  } ],
  "http://www.w3.org/2000/01/rdf-schema#label" : [ {
    "@language" : "en",
    "@value" : "Stakeholder Context"
  } ],
  "http://www.w3.org/2004/02/skos/core#definition" : [ {
    "@language" : "en",
    "@value" : "Stakeholder Context in cybersecurity"
  } ],
  "http://www.w3.org/2004/02/skos/core#inScheme" : [ {
    "@id" : "https://openark.adaptcentre.ie/Ontologies/ARKControlTerminology#"
  } ],
  "http://www.w3.org/2004/02/skos/core#narrower" : [ {
    "@id" : "https://openark.adaptcentre.ie/Ontologies/ARKControlTerminology#StakeholderPerception"
  }, {
    "@id" : "https://openark.adaptcentre.ie/Ontologies/ARKControlTerminology#StakeholderRelationship"
  }, {
    "@id" : "https://openark.adaptcentre.ie/Ontologies/ARKControlTerminology#StakeholderValue"
  } ],
  "http://www.w3.org/2004/02/skos/core#prefLabel" : [ {
    "@language" : "en",
    "@value" : "Stakeholder Context"
  } ]
}, {
  "@id" : "https://openark.adaptcentre.ie/Ontologies/ARKControlTerminology#StakeholderPerception",
  "@type" : [ "http://www.w3.org/2002/07/owl#NamedIndividual" ],
  "http://purl.org/dc/terms/contributor" : [ {
    "@value" : "Junli Liang"
  }, {
    "@value" : "Rob Brennan"
  } ],
  "http://purl.org/dc/terms/created" : [ {
    "@type" : "http://www.w3.org/2001/XMLSchema#date",
    "@value" : "2024-04-08"
  } ],
  "http://purl.org/dc/terms/source" : [ {
    "@value" : "ISO27000:2035"
  } ],
  "http://www.w3.org/1999/02/22-rdf-syntax-ns#type" : [ {
    "@id" : "http://www.w3.org/2004/02/skos/core#Concept"
  } ],
  "http://www.w3.org/2000/01/rdf-schema#comment" : [ {
    "@language" : "en",
    "@value" : "The stakeholder perception approach refers to the way stakeholders perceive and evaluate the actions and behavior of a company or organization."
  } ],
  "http://www.w3.org/2000/01/rdf-schema#isDefinedBy" : [ {
    "@id" : "https://openark.adaptcentre.ie/Ontologies/ARKControlTerminology#"
  } ],
  "http://www.w3.org/2000/01/rdf-schema#label" : [ {
    "@language" : "en",
    "@value" : "Stakeholder perception"
  } ],
  "http://www.w3.org/2004/02/skos/core#definition" : [ {
    "@language" : "en",
    "@value" : "The stakeholder perception approach refers to the way stakeholders perceive and evaluate the actions and behavior of a company or organization."
  } ],
  "http://www.w3.org/2004/02/skos/core#inScheme" : [ {
    "@id" : "https://openark.adaptcentre.ie/Ontologies/ARKControlTerminology#"
  } ],
  "http://www.w3.org/2004/02/skos/core#prefLabel" : [ {
    "@language" : "en",
    "@value" : "Stakeholder perception"
  } ]
}, {
  "@id" : "https://openark.adaptcentre.ie/Ontologies/ARKControlTerminology#StakeholderRelationship",
  "@type" : [ "http://www.w3.org/2002/07/owl#NamedIndividual" ],
  "http://purl.org/dc/terms/contributor" : [ {
    "@value" : "Junli Liang"
  }, {
    "@value" : "Rob Brennan"
  } ],
  "http://purl.org/dc/terms/created" : [ {
    "@type" : "http://www.w3.org/2001/XMLSchema#date",
    "@value" : "2024-04-08"
  } ],
  "http://purl.org/dc/terms/source" : [ {
    "@value" : "ISO27000:2031"
  } ],
  "http://www.w3.org/1999/02/22-rdf-syntax-ns#type" : [ {
    "@id" : "http://www.w3.org/2004/02/skos/core#Concept"
  } ],
  "http://www.w3.org/2000/01/rdf-schema#comment" : [ {
    "@language" : "en",
    "@value" : "professional connections businesses form with people or groups who have an interest in their activities and decisions."
  } ],
  "http://www.w3.org/2000/01/rdf-schema#isDefinedBy" : [ {
    "@id" : "https://openark.adaptcentre.ie/Ontologies/ARKControlTerminology#"
  } ],
  "http://www.w3.org/2000/01/rdf-schema#label" : [ {
    "@language" : "en",
    "@value" : "Stakeholder relationship"
  } ],
  "http://www.w3.org/2004/02/skos/core#definition" : [ {
    "@language" : "en",
    "@value" : "professional connections businesses form with people or groups who have an interest in their activities and decisions."
  } ],
  "http://www.w3.org/2004/02/skos/core#inScheme" : [ {
    "@id" : "https://openark.adaptcentre.ie/Ontologies/ARKControlTerminology#"
  } ],
  "http://www.w3.org/2004/02/skos/core#prefLabel" : [ {
    "@language" : "en",
    "@value" : "Stakeholder relationship"
  } ]
}, {
  "@id" : "https://openark.adaptcentre.ie/Ontologies/ARKControlTerminology#StakeholderValue",
  "@type" : [ "http://www.w3.org/2002/07/owl#NamedIndividual" ],
  "http://purl.org/dc/terms/contributor" : [ {
    "@value" : "Junli Liang"
  }, {
    "@value" : "Rob Brennan"
  } ],
  "http://purl.org/dc/terms/created" : [ {
    "@type" : "http://www.w3.org/2001/XMLSchema#date",
    "@value" : "2024-04-08"
  } ],
  "http://purl.org/dc/terms/source" : [ {
    "@value" : "ISO27000:2026"
  } ],
  "http://www.w3.org/1999/02/22-rdf-syntax-ns#type" : [ {
    "@id" : "http://www.w3.org/2004/02/skos/core#Concept"
  } ],
  "http://www.w3.org/2000/01/rdf-schema#comment" : [ {
    "@language" : "en",
    "@value" : "Stakeholder value refers to the benefits and advantages that various stakeholders derive from an organization's activities, policies, and performance."
  } ],
  "http://www.w3.org/2000/01/rdf-schema#isDefinedBy" : [ {
    "@id" : "https://openark.adaptcentre.ie/Ontologies/ARKControlTerminology#"
  } ],
  "http://www.w3.org/2000/01/rdf-schema#label" : [ {
    "@language" : "en",
    "@value" : "Stakeholder value"
  } ],
  "http://www.w3.org/2004/02/skos/core#definition" : [ {
    "@language" : "en",
    "@value" : "Stakeholder value refers to the benefits and advantages that various stakeholders derive from an organization's activities, policies, and performance."
  } ],
  "http://www.w3.org/2004/02/skos/core#inScheme" : [ {
    "@id" : "https://openark.adaptcentre.ie/Ontologies/ARKControlTerminology#"
  } ],
  "http://www.w3.org/2004/02/skos/core#prefLabel" : [ {
    "@language" : "en",
    "@value" : "Stakeholder value"
  } ]
}, {
  "@id" : "https://openark.adaptcentre.ie/Ontologies/ARKControlTerminology#StandardsContext",
  "@type" : [ "http://www.w3.org/2002/07/owl#NamedIndividual" ],
  "http://purl.org/dc/terms/contributor" : [ {
    "@value" : "Junli Liang"
  }, {
    "@value" : "Rob Brennan"
  } ],
  "http://purl.org/dc/terms/created" : [ {
    "@type" : "http://www.w3.org/2001/XMLSchema#date",
    "@value" : "2024-04-08"
  } ],
  "http://purl.org/dc/terms/source" : [ {
    "@value" : "ISO27000:2028"
  } ],
  "http://www.w3.org/1999/02/22-rdf-syntax-ns#type" : [ {
    "@id" : "http://www.w3.org/2004/02/skos/core#Concept"
  } ],
  "http://www.w3.org/2000/01/rdf-schema#comment" : [ {
    "@language" : "en",
    "@value" : "Standards in the context of cybersecurity are established frameworks, guidelines, and specifications that organizations follow to ensure their systems, processes, and practices are secure and resilient against cyber threats."
  } ],
  "http://www.w3.org/2000/01/rdf-schema#isDefinedBy" : [ {
    "@id" : "https://openark.adaptcentre.ie/Ontologies/ARKControlTerminology#"
  } ],
  "http://www.w3.org/2000/01/rdf-schema#label" : [ {
    "@language" : "en",
    "@value" : "Standards Context"
  } ],
  "http://www.w3.org/2004/02/skos/core#definition" : [ {
    "@language" : "en",
    "@value" : "Standards in the context of cybersecurity are established frameworks, guidelines, and specifications that organizations follow to ensure their systems, processes, and practices are secure and resilient against cyber threats."
  } ],
  "http://www.w3.org/2004/02/skos/core#inScheme" : [ {
    "@id" : "https://openark.adaptcentre.ie/Ontologies/ARKControlTerminology#"
  } ],
  "http://www.w3.org/2004/02/skos/core#prefLabel" : [ {
    "@language" : "en",
    "@value" : "Standards Context"
  } ]
}, {
  "@id" : "https://openark.adaptcentre.ie/Ontologies/ARKControlTerminology#StrategyContext",
  "@type" : [ "http://www.w3.org/2002/07/owl#NamedIndividual" ],
  "http://purl.org/dc/terms/contributor" : [ {
    "@value" : "Junli Liang"
  }, {
    "@value" : "Rob Brennan"
  } ],
  "http://purl.org/dc/terms/created" : [ {
    "@type" : "http://www.w3.org/2001/XMLSchema#date",
    "@value" : "2024-04-08"
  } ],
  "http://purl.org/dc/terms/source" : [ {
    "@value" : "ISO27000:2047"
  } ],
  "http://www.w3.org/1999/02/22-rdf-syntax-ns#type" : [ {
    "@id" : "http://www.w3.org/2004/02/skos/core#Concept"
  } ],
  "http://www.w3.org/2000/01/rdf-schema#comment" : [ {
    "@language" : "en",
    "@value" : "Strategy context in cybersecurity"
  } ],
  "http://www.w3.org/2000/01/rdf-schema#isDefinedBy" : [ {
    "@id" : "https://openark.adaptcentre.ie/Ontologies/ARKControlTerminology#"
  } ],
  "http://www.w3.org/2000/01/rdf-schema#label" : [ {
    "@language" : "en",
    "@value" : "Strategy context"
  } ],
  "http://www.w3.org/2004/02/skos/core#definition" : [ {
    "@language" : "en",
    "@value" : "Strategy context in cybersecurity"
  } ],
  "http://www.w3.org/2004/02/skos/core#inScheme" : [ {
    "@id" : "https://openark.adaptcentre.ie/Ontologies/ARKControlTerminology#"
  } ],
  "http://www.w3.org/2004/02/skos/core#prefLabel" : [ {
    "@language" : "en",
    "@value" : "Strategy context"
  } ]
}, {
  "@id" : "https://openark.adaptcentre.ie/Ontologies/ARKControlTerminology#SupplierRelationshipsSecurity",
  "@type" : [ "http://www.w3.org/2002/07/owl#NamedIndividual" ],
  "http://purl.org/dc/terms/contributor" : [ {
    "@value" : "Junli Liang"
  }, {
    "@value" : "Rob Brennan"
  } ],
  "http://purl.org/dc/terms/created" : [ {
    "@type" : "http://www.w3.org/2001/XMLSchema#date",
    "@value" : "2024-03-14"
  } ],
  "http://purl.org/dc/terms/source" : [ {
    "@value" : "ISO/IEC 27002:2022(E)"
  } ],
  "http://www.w3.org/1999/02/22-rdf-syntax-ns#type" : [ {
    "@id" : "http://www.w3.org/2004/02/skos/core#Concept"
  } ],
  "http://www.w3.org/2000/01/rdf-schema#comment" : [ {
    "@language" : "en",
    "@value" : "In a supplier relationship, it is important for an organisation to ensure that its information is protected against risks such as data breaches, unauthorized access, or loss of confidentiality. This can be achieved through a combination of technical and organisational measures and through establishing clear policies and procedures for handling and protecting information."
  } ],
  "http://www.w3.org/2000/01/rdf-schema#isDefinedBy" : [ {
    "@id" : "https://openark.adaptcentre.ie/Ontologies/ARKControlTerminology#"
  } ],
  "http://www.w3.org/2000/01/rdf-schema#label" : [ {
    "@language" : "en",
    "@value" : "Supplier relationship security"
  } ],
  "http://www.w3.org/2004/02/skos/core#definition" : [ {
    "@language" : "en",
    "@value" : "In a supplier relationship, it is important for an organisation to ensure that its information is protected against risks such as data breaches, unauthorized access, or loss of confidentiality. This can be achieved through a combination of technical and organisational measures and through establishing clear policies and procedures for handling and protecting information."
  } ],
  "http://www.w3.org/2004/02/skos/core#inScheme" : [ {
    "@id" : "https://openark.adaptcentre.ie/Ontologies/ARKControlTerminology#"
  } ],
  "http://www.w3.org/2004/02/skos/core#prefLabel" : [ {
    "@language" : "en",
    "@value" : "Supplier relationship security"
  } ]
}, {
  "@id" : "https://openark.adaptcentre.ie/Ontologies/ARKControlTerminology#SystemAndNetworkSecurity",
  "@type" : [ "http://www.w3.org/2002/07/owl#NamedIndividual" ],
  "http://purl.org/dc/terms/contributor" : [ {
    "@value" : "Junli Liang"
  }, {
    "@value" : "Rob Brennan"
  } ],
  "http://purl.org/dc/terms/created" : [ {
    "@type" : "http://www.w3.org/2001/XMLSchema#date",
    "@value" : "2024-03-14"
  } ],
  "http://purl.org/dc/terms/source" : [ {
    "@value" : "ISO/IEC 27002:2022(E)"
  } ],
  "http://www.w3.org/1999/02/22-rdf-syntax-ns#type" : [ {
    "@id" : "http://www.w3.org/2004/02/skos/core#Concept"
  } ],
  "http://www.w3.org/2000/01/rdf-schema#comment" : [ {
    "@language" : "en",
    "@value" : "Protecting network communications at the layer of the IP model that is responsible for routing packets across networks."
  } ],
  "http://www.w3.org/2000/01/rdf-schema#isDefinedBy" : [ {
    "@id" : "https://openark.adaptcentre.ie/Ontologies/ARKControlTerminology#"
  } ],
  "http://www.w3.org/2000/01/rdf-schema#label" : [ {
    "@language" : "en",
    "@value" : "System and network security"
  } ],
  "http://www.w3.org/2004/02/skos/core#definition" : [ {
    "@language" : "en",
    "@value" : "Protecting network communications at the layer of the IP model that is responsible for routing packets across networks."
  } ],
  "http://www.w3.org/2004/02/skos/core#inScheme" : [ {
    "@id" : "https://openark.adaptcentre.ie/Ontologies/ARKControlTerminology#"
  } ],
  "http://www.w3.org/2004/02/skos/core#prefLabel" : [ {
    "@language" : "en",
    "@value" : "System and network security"
  } ]
}, {
  "@id" : "https://openark.adaptcentre.ie/Ontologies/ARKControlTerminology#TechnologicalEnvironment",
  "@type" : [ "http://www.w3.org/2002/07/owl#NamedIndividual" ],
  "http://purl.org/dc/terms/contributor" : [ {
    "@value" : "Junli Liang"
  }, {
    "@value" : "Rob Brennan"
  } ],
  "http://purl.org/dc/terms/created" : [ {
    "@type" : "http://www.w3.org/2001/XMLSchema#date",
    "@value" : "2024-04-08"
  } ],
  "http://purl.org/dc/terms/source" : [ {
    "@value" : "ISO27000:2050"
  } ],
  "http://www.w3.org/1999/02/22-rdf-syntax-ns#type" : [ {
    "@id" : "http://www.w3.org/2004/02/skos/core#Concept"
  } ],
  "http://www.w3.org/2000/01/rdf-schema#comment" : [ {
    "@language" : "en",
    "@value" : "Technological environment om cybersecurity"
  } ],
  "http://www.w3.org/2000/01/rdf-schema#isDefinedBy" : [ {
    "@id" : "https://openark.adaptcentre.ie/Ontologies/ARKControlTerminology#"
  } ],
  "http://www.w3.org/2000/01/rdf-schema#label" : [ {
    "@language" : "en",
    "@value" : "Technological environment"
  } ],
  "http://www.w3.org/2004/02/skos/core#definition" : [ {
    "@language" : "en",
    "@value" : "Technological environment om cybersecurity"
  } ],
  "http://www.w3.org/2004/02/skos/core#inScheme" : [ {
    "@id" : "https://openark.adaptcentre.ie/Ontologies/ARKControlTerminology#"
  } ],
  "http://www.w3.org/2004/02/skos/core#prefLabel" : [ {
    "@language" : "en",
    "@value" : "Technological environment"
  } ]
}, {
  "@id" : "https://openark.adaptcentre.ie/Ontologies/ARKControlTerminology#Threat",
  "@type" : [ "http://www.w3.org/2002/07/owl#NamedIndividual" ],
  "http://purl.org/dc/terms/contributor" : [ {
    "@value" : "Junli Liang"
  }, {
    "@value" : "Rob Brennan"
  } ],
  "http://purl.org/dc/terms/created" : [ {
    "@type" : "http://www.w3.org/2001/XMLSchema#date",
    "@value" : "2024-04-08"
  } ],
  "http://purl.org/dc/terms/source" : [ {
    "@value" : "ISO27000:2018"
  } ],
  "http://www.w3.org/1999/02/22-rdf-syntax-ns#type" : [ {
    "@id" : "http://www.w3.org/2004/02/skos/core#Concept"
  } ],
  "http://www.w3.org/2000/01/rdf-schema#comment" : [ {
    "@language" : "en",
    "@value" : "potential cause of an unwanted incident, which can result in harm to a system or organization (3.50)"
  } ],
  "http://www.w3.org/2000/01/rdf-schema#isDefinedBy" : [ {
    "@id" : "https://openark.adaptcentre.ie/Ontologies/ARKControlTerminology#"
  } ],
  "http://www.w3.org/2000/01/rdf-schema#label" : [ {
    "@language" : "en",
    "@value" : "Threat"
  } ],
  "http://www.w3.org/2004/02/skos/core#broader" : [ {
    "@id" : "https://openark.adaptcentre.ie/Ontologies/ARKControlTerminology#InformationSecurityIncident"
  } ],
  "http://www.w3.org/2004/02/skos/core#definition" : [ {
    "@language" : "en",
    "@value" : "potential cause of an unwanted incident, which can result in harm to a system or organization (3.50)"
  } ],
  "http://www.w3.org/2004/02/skos/core#inScheme" : [ {
    "@id" : "https://openark.adaptcentre.ie/Ontologies/ARKControlTerminology#"
  } ],
  "http://www.w3.org/2004/02/skos/core#prefLabel" : [ {
    "@language" : "en",
    "@value" : "Threat"
  } ]
}, {
  "@id" : "https://openark.adaptcentre.ie/Ontologies/ARKControlTerminology#ThreatAndVulnerabilityManagement",
  "@type" : [ "http://www.w3.org/2002/07/owl#NamedIndividual" ],
  "http://purl.org/dc/terms/contributor" : [ {
    "@value" : "Junli Liang"
  }, {
    "@value" : "Rob Brennan"
  } ],
  "http://purl.org/dc/terms/created" : [ {
    "@type" : "http://www.w3.org/2001/XMLSchema#date",
    "@value" : "2024-03-14"
  } ],
  "http://purl.org/dc/terms/source" : [ {
    "@value" : "ISO/IEC 27002:2022(E)"
  } ],
  "http://www.w3.org/1999/02/22-rdf-syntax-ns#type" : [ {
    "@id" : "http://www.w3.org/2004/02/skos/core#Concept"
  } ],
  "http://www.w3.org/2000/01/rdf-schema#comment" : [ {
    "@language" : "en",
    "@value" : "An ISCM capability that identifies vulnerabilities [Common Vulnerabilities and Exposures (CVEs)] on devices that are likely to be used by attackers to compromise a device and use it as a platform from which to extend compromise to the network."
  } ],
  "http://www.w3.org/2000/01/rdf-schema#isDefinedBy" : [ {
    "@id" : "https://openark.adaptcentre.ie/Ontologies/ARKControlTerminology#"
  } ],
  "http://www.w3.org/2000/01/rdf-schema#label" : [ {
    "@language" : "en",
    "@value" : "Threat and vulnerability management"
  } ],
  "http://www.w3.org/2004/02/skos/core#definition" : [ {
    "@language" : "en",
    "@value" : "An ISCM capability that identifies vulnerabilities [Common Vulnerabilities and Exposures (CVEs)] on devices that are likely to be used by attackers to compromise a device and use it as a platform from which to extend compromise to the network."
  } ],
  "http://www.w3.org/2004/02/skos/core#inScheme" : [ {
    "@id" : "https://openark.adaptcentre.ie/Ontologies/ARKControlTerminology#"
  } ],
  "http://www.w3.org/2004/02/skos/core#prefLabel" : [ {
    "@language" : "en",
    "@value" : "Threat and vulnerability management"
  } ]
}, {
  "@id" : "https://openark.adaptcentre.ie/Ontologies/ARKControlTerminology#TopManagement",
  "@type" : [ "http://www.w3.org/2002/07/owl#NamedIndividual" ],
  "http://purl.org/dc/terms/contributor" : [ {
    "@value" : "Junli Liang"
  }, {
    "@value" : "Rob Brennan"
  } ],
  "http://purl.org/dc/terms/created" : [ {
    "@type" : "http://www.w3.org/2001/XMLSchema#date",
    "@value" : "2024-04-08"
  } ],
  "http://purl.org/dc/terms/source" : [ {
    "@value" : "ISO27000:2018"
  } ],
  "http://www.w3.org/1999/02/22-rdf-syntax-ns#type" : [ {
    "@id" : "http://www.w3.org/2004/02/skos/core#Concept"
  } ],
  "http://www.w3.org/2000/01/rdf-schema#comment" : [ {
    "@language" : "en",
    "@value" : "person or group of people who directs and controls an organization (3.50) at the highest level Note 1 to entry: Top management has the power to delegate authority and provide resources within the organization. Note 2 to entry: If the scope of the management system (3.41) covers only part of an organization, then top management refers to those who direct and control that part of the organization. Note 3 to entry: Top management is sometimes called executive management and can include Chief Executive Officers, Chief Financial Officers, Chief Information Officers, and similar roles."
  } ],
  "http://www.w3.org/2000/01/rdf-schema#isDefinedBy" : [ {
    "@id" : "https://openark.adaptcentre.ie/Ontologies/ARKControlTerminology#"
  } ],
  "http://www.w3.org/2000/01/rdf-schema#label" : [ {
    "@language" : "en",
    "@value" : "Top management"
  } ],
  "http://www.w3.org/2004/02/skos/core#broader" : [ {
    "@id" : "https://openark.adaptcentre.ie/Ontologies/ARKControlTerminology#Organization"
  } ],
  "http://www.w3.org/2004/02/skos/core#definition" : [ {
    "@language" : "en",
    "@value" : "person or group of people who directs and controls an organization (3.50) at the highest level Note 1 to entry: Top management has the power to delegate authority and provide resources within the organization. Note 2 to entry: If the scope of the management system (3.41) covers only part of an organization, then top management refers to those who direct and control that part of the organization. Note 3 to entry: Top management is sometimes called executive management and can include Chief Executive Officers, Chief Financial Officers, Chief Information Officers, and similar roles."
  } ],
  "http://www.w3.org/2004/02/skos/core#inScheme" : [ {
    "@id" : "https://openark.adaptcentre.ie/Ontologies/ARKControlTerminology#"
  } ],
  "http://www.w3.org/2004/02/skos/core#prefLabel" : [ {
    "@language" : "en",
    "@value" : "Top management"
  } ]
}, {
  "@id" : "https://openark.adaptcentre.ie/Ontologies/ARKControlTerminology#TrustedInformationCommunicationEntity",
  "@type" : [ "http://www.w3.org/2002/07/owl#NamedIndividual" ],
  "http://purl.org/dc/terms/contributor" : [ {
    "@value" : "Junli Liang"
  }, {
    "@value" : "Rob Brennan"
  } ],
  "http://purl.org/dc/terms/created" : [ {
    "@type" : "http://www.w3.org/2001/XMLSchema#date",
    "@value" : "2024-04-08"
  } ],
  "http://purl.org/dc/terms/source" : [ {
    "@value" : "ISO27000:2018"
  } ],
  "http://www.w3.org/1999/02/22-rdf-syntax-ns#type" : [ {
    "@id" : "http://www.w3.org/2004/02/skos/core#Concept"
  } ],
  "http://www.w3.org/2000/01/rdf-schema#comment" : [ {
    "@language" : "en",
    "@value" : "autonomous organization (3.50) supporting information exchange within an information sharing community (3.34)"
  } ],
  "http://www.w3.org/2000/01/rdf-schema#isDefinedBy" : [ {
    "@id" : "https://openark.adaptcentre.ie/Ontologies/ARKControlTerminology#"
  } ],
  "http://www.w3.org/2000/01/rdf-schema#label" : [ {
    "@language" : "en",
    "@value" : "Trusted information communication entity"
  } ],
  "http://www.w3.org/2004/02/skos/core#definition" : [ {
    "@language" : "en",
    "@value" : "autonomous organization (3.50) supporting information exchange within an information sharing community (3.34)"
  } ],
  "http://www.w3.org/2004/02/skos/core#inScheme" : [ {
    "@id" : "https://openark.adaptcentre.ie/Ontologies/ARKControlTerminology#"
  } ],
  "http://www.w3.org/2004/02/skos/core#prefLabel" : [ {
    "@language" : "en",
    "@value" : "Trusted information communication entity"
  } ]
}, {
  "@id" : "https://openark.adaptcentre.ie/Ontologies/ARKControlTerminology#Vulnerability",
  "@type" : [ "http://www.w3.org/2002/07/owl#NamedIndividual" ],
  "http://purl.org/dc/terms/contributor" : [ {
    "@value" : "Junli Liang"
  }, {
    "@value" : "Rob Brennan"
  } ],
  "http://purl.org/dc/terms/created" : [ {
    "@type" : "http://www.w3.org/2001/XMLSchema#date",
    "@value" : "2024-04-08"
  } ],
  "http://purl.org/dc/terms/source" : [ {
    "@value" : "ISO27000:2018"
  } ],
  "http://www.w3.org/1999/02/22-rdf-syntax-ns#type" : [ {
    "@id" : "http://www.w3.org/2004/02/skos/core#Concept"
  } ],
  "http://www.w3.org/2000/01/rdf-schema#comment" : [ {
    "@language" : "en",
    "@value" : "weakness of an asset or control (3.14) that can be exploited by one or more threats (3.74)"
  } ],
  "http://www.w3.org/2000/01/rdf-schema#isDefinedBy" : [ {
    "@id" : "https://openark.adaptcentre.ie/Ontologies/ARKControlTerminology#"
  } ],
  "http://www.w3.org/2000/01/rdf-schema#label" : [ {
    "@language" : "en",
    "@value" : "Vulnerability"
  } ],
  "http://www.w3.org/2004/02/skos/core#definition" : [ {
    "@language" : "en",
    "@value" : "weakness of an asset or control (3.14) that can be exploited by one or more threats (3.74)"
  } ],
  "http://www.w3.org/2004/02/skos/core#inScheme" : [ {
    "@id" : "https://openark.adaptcentre.ie/Ontologies/ARKControlTerminology#"
  } ],
  "http://www.w3.org/2004/02/skos/core#prefLabel" : [ {
    "@language" : "en",
    "@value" : "Vulnerability"
  } ]
}, {
  "@id" : "https://w3id.org/widoco/vocab#introduction",
  "@type" : [ "http://www.w3.org/2002/07/owl#AnnotationProperty" ]
}, {
  "@id" : "https://w3id.org/widoco/vocab#rdfxmlSerialization",
  "@type" : [ "http://www.w3.org/2002/07/owl#AnnotationProperty" ]
} ]