<> <http://www.w3.org/2000/01/rdf-schema#comment> "The repository administrator has not yet configured an RDF license."^^<http://www.w3.org/2001/XMLSchema#string> .
<> <http://xmlns.com/foaf/0.1/primaryTopic> <https://discovery.ucl.ac.uk/id/eprint/10017716> .
<https://discovery.ucl.ac.uk/id/eprint/10017716> <http://www.w3.org/1999/02/22-rdf-syntax-ns#type> <http://purl.org/ontology/bibo/BookSection> .
<https://discovery.ucl.ac.uk/id/eprint/10017716> <http://www.w3.org/1999/02/22-rdf-syntax-ns#type> <http://purl.org/ontology/bibo/Article> .
<https://discovery.ucl.ac.uk/id/eprint/10017716> <http://purl.org/dc/terms/title> "Grand theft algorithm: purposeful play, appropriated play and aberrant players"^^<http://www.w3.org/2001/XMLSchema#string> .
<https://discovery.ucl.ac.uk/id/eprint/10017716> <http://purl.org/dc/terms/date> "2008" .
<https://discovery.ucl.ac.uk/id/document/562862> <http://www.w3.org/1999/02/22-rdf-syntax-ns#type> <http://purl.org/ontology/bibo/Document> .
<https://discovery.ucl.ac.uk/id/org/ext-4a589dd2f7d4f2f5124726e57436646e> <http://www.w3.org/1999/02/22-rdf-syntax-ns#type> <http://xmlns.com/foaf/0.1/Organization> .
<https://discovery.ucl.ac.uk/id/org/ext-4a589dd2f7d4f2f5124726e57436646e> <http://xmlns.com/foaf/0.1/name> "ACM press"^^<http://www.w3.org/2001/XMLSchema#string> .
<https://discovery.ucl.ac.uk/id/org/ext-4a589dd2f7d4f2f5124726e57436646e> <http://www.w3.org/1999/02/22-rdf-syntax-ns#type> <http://xmlns.com/foaf/0.1/Organization> .
<https://discovery.ucl.ac.uk/id/org/ext-4a589dd2f7d4f2f5124726e57436646e> <http://xmlns.com/foaf/0.1/name> "ACM press"^^<http://www.w3.org/2001/XMLSchema#string> .
<https://discovery.ucl.ac.uk/id/eprint/10017716> <http://purl.org/dc/terms/publisher> <https://discovery.ucl.ac.uk/id/org/ext-4a589dd2f7d4f2f5124726e57436646e> .
<https://discovery.ucl.ac.uk/id/eprint/10017716> <http://purl.org/ontology/bibo/status> <http://purl.org/ontology/bibo/status/nonPeerReviewed> .
<https://discovery.ucl.ac.uk/id/eprint/10017716> <http://purl.org/ontology/bibo/status> <http://purl.org/ontology/bibo/status/published> .
<https://discovery.ucl.ac.uk/id/eprint/10017716> <http://purl.org/dc/terms/creator> <https://discovery.ucl.ac.uk/id/person/ext-a.gazzard@ioe.ac.uk> .
<https://discovery.ucl.ac.uk/id/eprint/10017716> <http://purl.org/ontology/bibo/authorList> <https://discovery.ucl.ac.uk/id/eprint/10017716#authors> .
<https://discovery.ucl.ac.uk/id/eprint/10017716#authors> <http://www.w3.org/1999/02/22-rdf-syntax-ns#_1> <https://discovery.ucl.ac.uk/id/person/ext-a.gazzard@ioe.ac.uk> .
<https://discovery.ucl.ac.uk/id/person/ext-a.gazzard@ioe.ac.uk> <http://www.w3.org/1999/02/22-rdf-syntax-ns#type> <http://xmlns.com/foaf/0.1/Person> .
<https://discovery.ucl.ac.uk/id/person/ext-a.gazzard@ioe.ac.uk> <http://xmlns.com/foaf/0.1/givenName> "Alison"^^<http://www.w3.org/2001/XMLSchema#string> .
<https://discovery.ucl.ac.uk/id/person/ext-a.gazzard@ioe.ac.uk> <http://xmlns.com/foaf/0.1/familyName> "Gazzard"^^<http://www.w3.org/2001/XMLSchema#string> .
<https://discovery.ucl.ac.uk/id/person/ext-a.gazzard@ioe.ac.uk> <http://xmlns.com/foaf/0.1/name> "Alison Gazzard"^^<http://www.w3.org/2001/XMLSchema#string> .
<https://discovery.ucl.ac.uk/id/eprint/10017716> <http://www.w3.org/1999/02/22-rdf-syntax-ns#type> <http://eprints.org/ontology/EPrint> .
<https://discovery.ucl.ac.uk/id/eprint/10017716> <http://www.w3.org/1999/02/22-rdf-syntax-ns#type> <http://eprints.org/ontology/BookSectionEPrint> .
<https://discovery.ucl.ac.uk/id/eprint/10017716> <http://purl.org/dc/terms/isPartOf> <https://discovery.ucl.ac.uk/id/repository> .
<https://discovery.ucl.ac.uk/id/eprint/10017716> <http://eprints.org/ontology/hasDocument> <https://discovery.ucl.ac.uk/id/document/562862> .
<https://discovery.ucl.ac.uk/id/document/562862> <http://www.w3.org/1999/02/22-rdf-syntax-ns#type> <http://eprints.org/ontology/Document> .
<https://discovery.ucl.ac.uk/id/document/562862> <http://www.w3.org/2000/01/rdf-schema#label> "Grand theft algorithm: purposeful play, appropriated play and aberrant players (Text)"^^<http://www.w3.org/2001/XMLSchema#string> .
<https://discovery.ucl.ac.uk/id/eprint/10017716> <http://purl.org/dc/elements/1.1/hasVersion> <https://discovery.ucl.ac.uk/id/document/562862> .
<https://discovery.ucl.ac.uk/id/eprint/10017716> <http://eprints.org/ontology/hasSubmitted> <https://discovery.ucl.ac.uk/id/document/562862> .
<https://discovery.ucl.ac.uk/id/document/562862> <http://eprints.org/ontology/hasFile> <https://discovery.ucl.ac.uk/id/eprint/10017716/1/903715.pdf> .
<https://discovery.ucl.ac.uk/id/document/562862> <http://purl.org/dc/terms/hasPart> <https://discovery.ucl.ac.uk/id/eprint/10017716/1/903715.pdf> .
<https://discovery.ucl.ac.uk/id/eprint/10017716/1/903715.pdf> <http://www.w3.org/2000/01/rdf-schema#label> "903715.pdf"^^<http://www.w3.org/2001/XMLSchema#string> .
<https://discovery.ucl.ac.uk/id/eprint/10017716> <http://eprints.org/ontology/hasDocument> <https://discovery.ucl.ac.uk/id/document/571726> .
<https://discovery.ucl.ac.uk/id/document/571726> <http://www.w3.org/1999/02/22-rdf-syntax-ns#type> <http://eprints.org/ontology/Document> .
<https://discovery.ucl.ac.uk/id/document/571726> <http://www.w3.org/2000/01/rdf-schema#label> "Grand theft algorithm: purposeful play, appropriated play and aberrant players (Other)"^^<http://www.w3.org/2001/XMLSchema#string> .
<https://discovery.ucl.ac.uk/id/document/571726> <http://eprints.org/relation/isVersionOf> <https://discovery.ucl.ac.uk/id/document/562862> .
<https://discovery.ucl.ac.uk/id/document/571726> <http://eprints.org/relation/isVolatileVersionOf> <https://discovery.ucl.ac.uk/id/document/562862> .
<https://discovery.ucl.ac.uk/id/document/571726> <http://eprints.org/relation/islightboxThumbnailVersionOf> <https://discovery.ucl.ac.uk/id/document/562862> .
<https://discovery.ucl.ac.uk/id/document/571726> <http://eprints.org/ontology/hasFile> <https://discovery.ucl.ac.uk/id/eprint/10017716/2/lightbox.jpg> .
<https://discovery.ucl.ac.uk/id/document/571726> <http://purl.org/dc/terms/hasPart> <https://discovery.ucl.ac.uk/id/eprint/10017716/2/lightbox.jpg> .
<https://discovery.ucl.ac.uk/id/eprint/10017716/2/lightbox.jpg> <http://www.w3.org/2000/01/rdf-schema#label> "lightbox.jpg"^^<http://www.w3.org/2001/XMLSchema#string> .
<https://discovery.ucl.ac.uk/id/eprint/10017716> <http://eprints.org/ontology/hasDocument> <https://discovery.ucl.ac.uk/id/document/571727> .
<https://discovery.ucl.ac.uk/id/document/571727> <http://www.w3.org/1999/02/22-rdf-syntax-ns#type> <http://eprints.org/ontology/Document> .
<https://discovery.ucl.ac.uk/id/document/571727> <http://www.w3.org/2000/01/rdf-schema#label> "Grand theft algorithm: purposeful play, appropriated play and aberrant players (Other)"^^<http://www.w3.org/2001/XMLSchema#string> .
<https://discovery.ucl.ac.uk/id/document/571727> <http://eprints.org/relation/isVersionOf> <https://discovery.ucl.ac.uk/id/document/562862> .
<https://discovery.ucl.ac.uk/id/document/571727> <http://eprints.org/relation/isVolatileVersionOf> <https://discovery.ucl.ac.uk/id/document/562862> .
<https://discovery.ucl.ac.uk/id/document/571727> <http://eprints.org/relation/ispreviewThumbnailVersionOf> <https://discovery.ucl.ac.uk/id/document/562862> .
<https://discovery.ucl.ac.uk/id/document/571727> <http://eprints.org/ontology/hasFile> <https://discovery.ucl.ac.uk/id/eprint/10017716/3/preview.jpg> .
<https://discovery.ucl.ac.uk/id/document/571727> <http://purl.org/dc/terms/hasPart> <https://discovery.ucl.ac.uk/id/eprint/10017716/3/preview.jpg> .
<https://discovery.ucl.ac.uk/id/eprint/10017716/3/preview.jpg> <http://www.w3.org/2000/01/rdf-schema#label> "preview.jpg"^^<http://www.w3.org/2001/XMLSchema#string> .
<https://discovery.ucl.ac.uk/id/eprint/10017716> <http://eprints.org/ontology/hasDocument> <https://discovery.ucl.ac.uk/id/document/571728> .
<https://discovery.ucl.ac.uk/id/document/571728> <http://www.w3.org/1999/02/22-rdf-syntax-ns#type> <http://eprints.org/ontology/Document> .
<https://discovery.ucl.ac.uk/id/document/571728> <http://www.w3.org/2000/01/rdf-schema#label> "Grand theft algorithm: purposeful play, appropriated play and aberrant players (Other)"^^<http://www.w3.org/2001/XMLSchema#string> .
<https://discovery.ucl.ac.uk/id/document/571728> <http://eprints.org/relation/isVersionOf> <https://discovery.ucl.ac.uk/id/document/562862> .
<https://discovery.ucl.ac.uk/id/document/571728> <http://eprints.org/relation/isVolatileVersionOf> <https://discovery.ucl.ac.uk/id/document/562862> .
<https://discovery.ucl.ac.uk/id/document/571728> <http://eprints.org/relation/ismediumThumbnailVersionOf> <https://discovery.ucl.ac.uk/id/document/562862> .
<https://discovery.ucl.ac.uk/id/document/571728> <http://eprints.org/ontology/hasFile> <https://discovery.ucl.ac.uk/id/eprint/10017716/4/medium.jpg> .
<https://discovery.ucl.ac.uk/id/document/571728> <http://purl.org/dc/terms/hasPart> <https://discovery.ucl.ac.uk/id/eprint/10017716/4/medium.jpg> .
<https://discovery.ucl.ac.uk/id/eprint/10017716/4/medium.jpg> <http://www.w3.org/2000/01/rdf-schema#label> "medium.jpg"^^<http://www.w3.org/2001/XMLSchema#string> .
<https://discovery.ucl.ac.uk/id/eprint/10017716> <http://eprints.org/ontology/hasDocument> <https://discovery.ucl.ac.uk/id/document/571729> .
<https://discovery.ucl.ac.uk/id/document/571729> <http://www.w3.org/1999/02/22-rdf-syntax-ns#type> <http://eprints.org/ontology/Document> .
<https://discovery.ucl.ac.uk/id/document/571729> <http://www.w3.org/2000/01/rdf-schema#label> "Grand theft algorithm: purposeful play, appropriated play and aberrant players (Other)"^^<http://www.w3.org/2001/XMLSchema#string> .
<https://discovery.ucl.ac.uk/id/document/571729> <http://eprints.org/relation/isVersionOf> <https://discovery.ucl.ac.uk/id/document/562862> .
<https://discovery.ucl.ac.uk/id/document/571729> <http://eprints.org/relation/isVolatileVersionOf> <https://discovery.ucl.ac.uk/id/document/562862> .
<https://discovery.ucl.ac.uk/id/document/571729> <http://eprints.org/relation/issmallThumbnailVersionOf> <https://discovery.ucl.ac.uk/id/document/562862> .
<https://discovery.ucl.ac.uk/id/document/571729> <http://eprints.org/ontology/hasFile> <https://discovery.ucl.ac.uk/id/eprint/10017716/5/small.jpg> .
<https://discovery.ucl.ac.uk/id/document/571729> <http://purl.org/dc/terms/hasPart> <https://discovery.ucl.ac.uk/id/eprint/10017716/5/small.jpg> .
<https://discovery.ucl.ac.uk/id/eprint/10017716/5/small.jpg> <http://www.w3.org/2000/01/rdf-schema#label> "small.jpg"^^<http://www.w3.org/2001/XMLSchema#string> .
<https://discovery.ucl.ac.uk/id/eprint/10017716> <http://eprints.org/ontology/hasDocument> <https://discovery.ucl.ac.uk/id/document/571730> .
<https://discovery.ucl.ac.uk/id/document/571730> <http://www.w3.org/1999/02/22-rdf-syntax-ns#type> <http://eprints.org/ontology/Document> .
<https://discovery.ucl.ac.uk/id/document/571730> <http://www.w3.org/2000/01/rdf-schema#label> "Grand theft algorithm: purposeful play, appropriated play and aberrant players (Other)"^^<http://www.w3.org/2001/XMLSchema#string> .
<https://discovery.ucl.ac.uk/id/document/571730> <http://eprints.org/relation/isVersionOf> <https://discovery.ucl.ac.uk/id/document/562862> .
<https://discovery.ucl.ac.uk/id/document/571730> <http://eprints.org/relation/isVolatileVersionOf> <https://discovery.ucl.ac.uk/id/document/562862> .
<https://discovery.ucl.ac.uk/id/document/571730> <http://eprints.org/relation/isIndexCodesVersionOf> <https://discovery.ucl.ac.uk/id/document/562862> .
<https://discovery.ucl.ac.uk/id/document/571730> <http://eprints.org/ontology/hasFile> <https://discovery.ucl.ac.uk/id/eprint/10017716/6/indexcodes.txt> .
<https://discovery.ucl.ac.uk/id/document/571730> <http://purl.org/dc/terms/hasPart> <https://discovery.ucl.ac.uk/id/eprint/10017716/6/indexcodes.txt> .
<https://discovery.ucl.ac.uk/id/eprint/10017716/6/indexcodes.txt> <http://www.w3.org/2000/01/rdf-schema#label> "indexcodes.txt"^^<http://www.w3.org/2001/XMLSchema#string> .
<https://discovery.ucl.ac.uk/id/eprint/10017716> <http://www.w3.org/2000/01/rdf-schema#seeAlso> <https://discovery.ucl.ac.uk/id/eprint/10017716/> .
<https://discovery.ucl.ac.uk/id/eprint/10017716/> <http://purl.org/dc/elements/1.1/title> "HTML Summary of #10017716 \n\nGrand theft algorithm: purposeful play, appropriated play and aberrant players\n\n" .
<https://discovery.ucl.ac.uk/id/eprint/10017716/> <http://purl.org/dc/elements/1.1/format> "text/html" .
<https://discovery.ucl.ac.uk/id/eprint/10017716/> <http://xmlns.com/foaf/0.1/primaryTopic> <https://discovery.ucl.ac.uk/id/eprint/10017716> .