{"@context":{"dc":"http:\/\/purl.org\/dc\/elements\/1.1\/","skos":"http:\/\/www.w3.org\/2004\/02\/skos\/core#","skos:broader":{"@type":"@id"},"skos:inScheme":{"@type":"@id"},"skos:related":{"@type":"@id"},"skos:narrower":{"@type":"@id"},"skos:hasTopConcept":{"@type":"@id"},"skos:topConceptOf":{"@type":"@id"}},"@id":"http:\/\/vocbank.opendiscoveryspace.eu\/thematic\/?tema=1223","@type":"skos:Concept","skos:inScheme":"http:\/\/vocbank.opendiscoveryspace.eu\/thematic\/","dct:created":"2013-11-28 16:33:59","skos:prefLabel":[{"@language":"en","@value=":"IT Strategy"},{"@language":"es","@value=":"Estrategia TI"},{"@language":"pt","@value=":"Estrat\u00e9gia TI"},{"@language":"nl","@value=":"IT -strategie"},{"@language":"et","@value=":"IT strateegiad"},{"@language":"de","@value=":"IT Strategie"},{"@language":"lt","@value=":"IT strategija"},{"@language":"lv","@value=":"IT strat\u0113\u0123ija"},{"@language":"it","@value=":"IT Strategy"},{"@language":"fi","@value=":"IT-strategia"},{"@language":"ga","@value=":"Strait\u00e9is TF"},{"@language":"fr","@value=":"Strat\u00e9gie"},{"@language":"ro","@value=":"Strategie IT"},{"@language":"el","@value=":"\u03a3\u03c4\u03c1\u03b1\u03c4\u03b7\u03b3\u03b9\u03ba\u03ae \u03c4\u03b5\u03c7\u03bd\u03bf\u03bb\u03bf\u03b3\u03af\u03b1\u03c2 \u03c4\u03b7\u03c2 \u03c0\u03bb\u03b7\u03c1\u03bf\u03c6\u03bf\u03c1\u03af\u03b1\u03c2"},{"@language":"bg","@value=":"\u0418\u0422 \u0441\u0442\u0440\u0430\u0442\u0435\u0433\u0438\u0438"},{"@language":"ru","@value=":"\u0418\u0422-\u0441\u0442\u0440\u0430\u0442\u0435\u0433\u0438\u044f"}],"skos:broader":["http:\/\/vocbank.opendiscoveryspace.eu\/thematic\/?tema=1216"]}