<> <http://www.w3.org/2000/01/rdf-schema#comment> "The repository administrator has not yet configured an RDF license."^^<http://www.w3.org/2001/XMLSchema#string> . <> <http://xmlns.com/foaf/0.1/primaryTopic> <https://discovery.ucl.ac.uk/id/eprint/10017716> . <https://discovery.ucl.ac.uk/id/eprint/10017716> <http://www.w3.org/1999/02/22-rdf-syntax-ns#type> <http://purl.org/ontology/bibo/BookSection> . <https://discovery.ucl.ac.uk/id/eprint/10017716> <http://www.w3.org/1999/02/22-rdf-syntax-ns#type> <http://purl.org/ontology/bibo/Article> . <https://discovery.ucl.ac.uk/id/eprint/10017716> <http://purl.org/dc/terms/title> "Grand theft algorithm: purposeful play, appropriated play and aberrant players"^^<http://www.w3.org/2001/XMLSchema#string> . <https://discovery.ucl.ac.uk/id/eprint/10017716> <http://purl.org/dc/terms/date> "2008" . <https://discovery.ucl.ac.uk/id/document/562862> <http://www.w3.org/1999/02/22-rdf-syntax-ns#type> <http://purl.org/ontology/bibo/Document> . <https://discovery.ucl.ac.uk/id/org/ext-4a589dd2f7d4f2f5124726e57436646e> <http://www.w3.org/1999/02/22-rdf-syntax-ns#type> <http://xmlns.com/foaf/0.1/Organization> . <https://discovery.ucl.ac.uk/id/org/ext-4a589dd2f7d4f2f5124726e57436646e> <http://xmlns.com/foaf/0.1/name> "ACM press"^^<http://www.w3.org/2001/XMLSchema#string> . <https://discovery.ucl.ac.uk/id/org/ext-4a589dd2f7d4f2f5124726e57436646e> <http://www.w3.org/1999/02/22-rdf-syntax-ns#type> <http://xmlns.com/foaf/0.1/Organization> . <https://discovery.ucl.ac.uk/id/org/ext-4a589dd2f7d4f2f5124726e57436646e> <http://xmlns.com/foaf/0.1/name> "ACM press"^^<http://www.w3.org/2001/XMLSchema#string> . <https://discovery.ucl.ac.uk/id/eprint/10017716> <http://purl.org/dc/terms/publisher> <https://discovery.ucl.ac.uk/id/org/ext-4a589dd2f7d4f2f5124726e57436646e> . <https://discovery.ucl.ac.uk/id/eprint/10017716> <http://purl.org/ontology/bibo/status> <http://purl.org/ontology/bibo/status/nonPeerReviewed> . <https://discovery.ucl.ac.uk/id/eprint/10017716> <http://purl.org/ontology/bibo/status> <http://purl.org/ontology/bibo/status/published> . <https://discovery.ucl.ac.uk/id/eprint/10017716> <http://purl.org/dc/terms/creator> <https://discovery.ucl.ac.uk/id/person/ext-a.gazzard@ioe.ac.uk> . <https://discovery.ucl.ac.uk/id/eprint/10017716> <http://purl.org/ontology/bibo/authorList> <https://discovery.ucl.ac.uk/id/eprint/10017716#authors> . <https://discovery.ucl.ac.uk/id/eprint/10017716#authors> <http://www.w3.org/1999/02/22-rdf-syntax-ns#_1> <https://discovery.ucl.ac.uk/id/person/ext-a.gazzard@ioe.ac.uk> . <https://discovery.ucl.ac.uk/id/person/ext-a.gazzard@ioe.ac.uk> <http://www.w3.org/1999/02/22-rdf-syntax-ns#type> <http://xmlns.com/foaf/0.1/Person> . <https://discovery.ucl.ac.uk/id/person/ext-a.gazzard@ioe.ac.uk> <http://xmlns.com/foaf/0.1/givenName> "Alison"^^<http://www.w3.org/2001/XMLSchema#string> . <https://discovery.ucl.ac.uk/id/person/ext-a.gazzard@ioe.ac.uk> <http://xmlns.com/foaf/0.1/familyName> "Gazzard"^^<http://www.w3.org/2001/XMLSchema#string> . <https://discovery.ucl.ac.uk/id/person/ext-a.gazzard@ioe.ac.uk> <http://xmlns.com/foaf/0.1/name> "Alison Gazzard"^^<http://www.w3.org/2001/XMLSchema#string> . <https://discovery.ucl.ac.uk/id/eprint/10017716> <http://www.w3.org/1999/02/22-rdf-syntax-ns#type> <http://eprints.org/ontology/EPrint> . <https://discovery.ucl.ac.uk/id/eprint/10017716> <http://www.w3.org/1999/02/22-rdf-syntax-ns#type> <http://eprints.org/ontology/BookSectionEPrint> . <https://discovery.ucl.ac.uk/id/eprint/10017716> <http://purl.org/dc/terms/isPartOf> <https://discovery.ucl.ac.uk/id/repository> . <https://discovery.ucl.ac.uk/id/eprint/10017716> <http://eprints.org/ontology/hasDocument> <https://discovery.ucl.ac.uk/id/document/562862> . <https://discovery.ucl.ac.uk/id/document/562862> <http://www.w3.org/1999/02/22-rdf-syntax-ns#type> <http://eprints.org/ontology/Document> . <https://discovery.ucl.ac.uk/id/document/562862> <http://www.w3.org/2000/01/rdf-schema#label> "Grand theft algorithm: purposeful play, appropriated play and aberrant players (Text)"^^<http://www.w3.org/2001/XMLSchema#string> . <https://discovery.ucl.ac.uk/id/eprint/10017716> <http://purl.org/dc/elements/1.1/hasVersion> <https://discovery.ucl.ac.uk/id/document/562862> . <https://discovery.ucl.ac.uk/id/eprint/10017716> <http://eprints.org/ontology/hasSubmitted> <https://discovery.ucl.ac.uk/id/document/562862> . <https://discovery.ucl.ac.uk/id/document/562862> <http://eprints.org/ontology/hasFile> <https://discovery.ucl.ac.uk/id/eprint/10017716/1/903715.pdf> . <https://discovery.ucl.ac.uk/id/document/562862> <http://purl.org/dc/terms/hasPart> <https://discovery.ucl.ac.uk/id/eprint/10017716/1/903715.pdf> . <https://discovery.ucl.ac.uk/id/eprint/10017716/1/903715.pdf> <http://www.w3.org/2000/01/rdf-schema#label> "903715.pdf"^^<http://www.w3.org/2001/XMLSchema#string> . <https://discovery.ucl.ac.uk/id/eprint/10017716> <http://eprints.org/ontology/hasDocument> <https://discovery.ucl.ac.uk/id/document/571726> . <https://discovery.ucl.ac.uk/id/document/571726> <http://www.w3.org/1999/02/22-rdf-syntax-ns#type> <http://eprints.org/ontology/Document> . <https://discovery.ucl.ac.uk/id/document/571726> <http://www.w3.org/2000/01/rdf-schema#label> "Grand theft algorithm: purposeful play, appropriated play and aberrant players (Other)"^^<http://www.w3.org/2001/XMLSchema#string> . <https://discovery.ucl.ac.uk/id/document/571726> <http://eprints.org/relation/isVersionOf> <https://discovery.ucl.ac.uk/id/document/562862> . <https://discovery.ucl.ac.uk/id/document/571726> <http://eprints.org/relation/isVolatileVersionOf> <https://discovery.ucl.ac.uk/id/document/562862> . <https://discovery.ucl.ac.uk/id/document/571726> <http://eprints.org/relation/islightboxThumbnailVersionOf> <https://discovery.ucl.ac.uk/id/document/562862> . <https://discovery.ucl.ac.uk/id/document/571726> <http://eprints.org/ontology/hasFile> <https://discovery.ucl.ac.uk/id/eprint/10017716/2/lightbox.jpg> . <https://discovery.ucl.ac.uk/id/document/571726> <http://purl.org/dc/terms/hasPart> <https://discovery.ucl.ac.uk/id/eprint/10017716/2/lightbox.jpg> . <https://discovery.ucl.ac.uk/id/eprint/10017716/2/lightbox.jpg> <http://www.w3.org/2000/01/rdf-schema#label> "lightbox.jpg"^^<http://www.w3.org/2001/XMLSchema#string> . <https://discovery.ucl.ac.uk/id/eprint/10017716> <http://eprints.org/ontology/hasDocument> <https://discovery.ucl.ac.uk/id/document/571727> . <https://discovery.ucl.ac.uk/id/document/571727> <http://www.w3.org/1999/02/22-rdf-syntax-ns#type> <http://eprints.org/ontology/Document> . <https://discovery.ucl.ac.uk/id/document/571727> <http://www.w3.org/2000/01/rdf-schema#label> "Grand theft algorithm: purposeful play, appropriated play and aberrant players (Other)"^^<http://www.w3.org/2001/XMLSchema#string> . <https://discovery.ucl.ac.uk/id/document/571727> <http://eprints.org/relation/isVersionOf> <https://discovery.ucl.ac.uk/id/document/562862> . <https://discovery.ucl.ac.uk/id/document/571727> <http://eprints.org/relation/isVolatileVersionOf> <https://discovery.ucl.ac.uk/id/document/562862> . <https://discovery.ucl.ac.uk/id/document/571727> <http://eprints.org/relation/ispreviewThumbnailVersionOf> <https://discovery.ucl.ac.uk/id/document/562862> . <https://discovery.ucl.ac.uk/id/document/571727> <http://eprints.org/ontology/hasFile> <https://discovery.ucl.ac.uk/id/eprint/10017716/3/preview.jpg> . <https://discovery.ucl.ac.uk/id/document/571727> <http://purl.org/dc/terms/hasPart> <https://discovery.ucl.ac.uk/id/eprint/10017716/3/preview.jpg> . <https://discovery.ucl.ac.uk/id/eprint/10017716/3/preview.jpg> <http://www.w3.org/2000/01/rdf-schema#label> "preview.jpg"^^<http://www.w3.org/2001/XMLSchema#string> . <https://discovery.ucl.ac.uk/id/eprint/10017716> <http://eprints.org/ontology/hasDocument> <https://discovery.ucl.ac.uk/id/document/571728> . <https://discovery.ucl.ac.uk/id/document/571728> <http://www.w3.org/1999/02/22-rdf-syntax-ns#type> <http://eprints.org/ontology/Document> . <https://discovery.ucl.ac.uk/id/document/571728> <http://www.w3.org/2000/01/rdf-schema#label> "Grand theft algorithm: purposeful play, appropriated play and aberrant players (Other)"^^<http://www.w3.org/2001/XMLSchema#string> . <https://discovery.ucl.ac.uk/id/document/571728> <http://eprints.org/relation/isVersionOf> <https://discovery.ucl.ac.uk/id/document/562862> . <https://discovery.ucl.ac.uk/id/document/571728> <http://eprints.org/relation/isVolatileVersionOf> <https://discovery.ucl.ac.uk/id/document/562862> . <https://discovery.ucl.ac.uk/id/document/571728> <http://eprints.org/relation/ismediumThumbnailVersionOf> <https://discovery.ucl.ac.uk/id/document/562862> . <https://discovery.ucl.ac.uk/id/document/571728> <http://eprints.org/ontology/hasFile> <https://discovery.ucl.ac.uk/id/eprint/10017716/4/medium.jpg> . <https://discovery.ucl.ac.uk/id/document/571728> <http://purl.org/dc/terms/hasPart> <https://discovery.ucl.ac.uk/id/eprint/10017716/4/medium.jpg> . <https://discovery.ucl.ac.uk/id/eprint/10017716/4/medium.jpg> <http://www.w3.org/2000/01/rdf-schema#label> "medium.jpg"^^<http://www.w3.org/2001/XMLSchema#string> . <https://discovery.ucl.ac.uk/id/eprint/10017716> <http://eprints.org/ontology/hasDocument> <https://discovery.ucl.ac.uk/id/document/571729> . <https://discovery.ucl.ac.uk/id/document/571729> <http://www.w3.org/1999/02/22-rdf-syntax-ns#type> <http://eprints.org/ontology/Document> . <https://discovery.ucl.ac.uk/id/document/571729> <http://www.w3.org/2000/01/rdf-schema#label> "Grand theft algorithm: purposeful play, appropriated play and aberrant players (Other)"^^<http://www.w3.org/2001/XMLSchema#string> . <https://discovery.ucl.ac.uk/id/document/571729> <http://eprints.org/relation/isVersionOf> <https://discovery.ucl.ac.uk/id/document/562862> . <https://discovery.ucl.ac.uk/id/document/571729> <http://eprints.org/relation/isVolatileVersionOf> <https://discovery.ucl.ac.uk/id/document/562862> . <https://discovery.ucl.ac.uk/id/document/571729> <http://eprints.org/relation/issmallThumbnailVersionOf> <https://discovery.ucl.ac.uk/id/document/562862> . <https://discovery.ucl.ac.uk/id/document/571729> <http://eprints.org/ontology/hasFile> <https://discovery.ucl.ac.uk/id/eprint/10017716/5/small.jpg> . <https://discovery.ucl.ac.uk/id/document/571729> <http://purl.org/dc/terms/hasPart> <https://discovery.ucl.ac.uk/id/eprint/10017716/5/small.jpg> . <https://discovery.ucl.ac.uk/id/eprint/10017716/5/small.jpg> <http://www.w3.org/2000/01/rdf-schema#label> "small.jpg"^^<http://www.w3.org/2001/XMLSchema#string> . <https://discovery.ucl.ac.uk/id/eprint/10017716> <http://eprints.org/ontology/hasDocument> <https://discovery.ucl.ac.uk/id/document/571730> . <https://discovery.ucl.ac.uk/id/document/571730> <http://www.w3.org/1999/02/22-rdf-syntax-ns#type> <http://eprints.org/ontology/Document> . <https://discovery.ucl.ac.uk/id/document/571730> <http://www.w3.org/2000/01/rdf-schema#label> "Grand theft algorithm: purposeful play, appropriated play and aberrant players (Other)"^^<http://www.w3.org/2001/XMLSchema#string> . <https://discovery.ucl.ac.uk/id/document/571730> <http://eprints.org/relation/isVersionOf> <https://discovery.ucl.ac.uk/id/document/562862> . <https://discovery.ucl.ac.uk/id/document/571730> <http://eprints.org/relation/isVolatileVersionOf> <https://discovery.ucl.ac.uk/id/document/562862> . <https://discovery.ucl.ac.uk/id/document/571730> <http://eprints.org/relation/isIndexCodesVersionOf> <https://discovery.ucl.ac.uk/id/document/562862> . <https://discovery.ucl.ac.uk/id/document/571730> <http://eprints.org/ontology/hasFile> <https://discovery.ucl.ac.uk/id/eprint/10017716/6/indexcodes.txt> . <https://discovery.ucl.ac.uk/id/document/571730> <http://purl.org/dc/terms/hasPart> <https://discovery.ucl.ac.uk/id/eprint/10017716/6/indexcodes.txt> . <https://discovery.ucl.ac.uk/id/eprint/10017716/6/indexcodes.txt> <http://www.w3.org/2000/01/rdf-schema#label> "indexcodes.txt"^^<http://www.w3.org/2001/XMLSchema#string> . <https://discovery.ucl.ac.uk/id/eprint/10017716> <http://www.w3.org/2000/01/rdf-schema#seeAlso> <https://discovery.ucl.ac.uk/id/eprint/10017716/> . <https://discovery.ucl.ac.uk/id/eprint/10017716/> <http://purl.org/dc/elements/1.1/title> "HTML Summary of #10017716 \n\nGrand theft algorithm: purposeful play, appropriated play and aberrant players\n\n" . <https://discovery.ucl.ac.uk/id/eprint/10017716/> <http://purl.org/dc/elements/1.1/format> "text/html" . <https://discovery.ucl.ac.uk/id/eprint/10017716/> <http://xmlns.com/foaf/0.1/primaryTopic> <https://discovery.ucl.ac.uk/id/eprint/10017716> .