CORD-19:f20c8063e9b843c787707e5fc938200b3fd14ebf / 207231-207466 JSONTXT

Annnotations TAB JSON ListView MergeView

{"target":"https://pubannotation.org/docs/sourcedb/CORD-19/sourceid/f20c8063e9b843c787707e5fc938200b3fd14ebf","sourcedb":"CORD-19","sourceid":"f20c8063e9b843c787707e5fc938200b3fd14ebf","text":"• Is there a plan in place to ensure that, when key information (such as access codes) or hardware (secure phones) is lost, stolen or misplaced, it can be protected or deactivated so that the communications system is not compromised? •","tracks":[{"project":"CORD-19_Custom_license_subset","denotations":[{"id":"T46","span":{"begin":0,"end":235},"obj":"Sentence"}],"attributes":[{"subj":"T46","pred":"source","obj":"CORD-19_Custom_license_subset"}]},{"project":"CORD-19-Sentences","denotations":[{"id":"T76540","span":{"begin":0,"end":235},"obj":"Sentence"}],"namespaces":[{"prefix":"_base","uri":"http://pubannotation.org/ontology/tao.owl#"}],"attributes":[{"subj":"T76540","pred":"source","obj":"CORD-19-Sentences"}]},{"project":"Epistemic_Statements","denotations":[{"id":"T798","span":{"begin":0,"end":233},"obj":"Epistemic_statement"}],"attributes":[{"subj":"T798","pred":"source","obj":"Epistemic_Statements"}]}],"config":{"attribute types":[{"pred":"source","value type":"selection","values":[{"id":"CORD-19_Custom_license_subset","color":"#dc93ec","default":true},{"id":"CORD-19-Sentences","color":"#93ecc2"},{"id":"Epistemic_Statements","color":"#eca893"}]}]}}