{"@context":"http://iiif.io/api/presentation/2/context.json","@type":"sc:Manifest","@id":"https://iiif.quartexcollections.com/lse/iiif/a9a3c0b5-6be8-4012-b8bb-34e5e08ab19a/manifest","label":"ORG_15_203","metadata":[{"label":"Collection","value":["Oxford Research Group"]},{"label":"Series title","value":["ORG Blog"]},{"label":"Title","value":"Cyber Threats and Nuclear Weapons"},{"label":"Date","value":"28/08/2018"},{"label":"Date range","value":"D:28 M:08 Y:2018"},{"label":"Source","value":"<a href=\"https://archives.lse.ac.uk/records/ORG/15/203\">ORG/15/203</a>"},{"label":"Copyright and reuse","value":"<a href=\"https://digital.library.lse.ac.uk/about#terms\">In Copyright</a>"},{"label":"Rights","value":["In Copyright"]},{"label":"Collecting area","value":["Politics, economics and social science collections"]},{"label":"Resource type general","value":["Other"]},{"label":"Type","value":["Born-digital","Blog"]}],"description":"Cyber Threats and Nuclear Weapons","sequences":[{"@type":"sc:Sequence","canvases":[{"@id":"https://iiif.quartexcollections.com/lse/iiif/a9a3c0b5-6be8-4012-b8bb-34e5e08ab19a/canvas/_1","@type":"sc:Canvas","label":"Cyber Threats and Nuclear Weapons _ Oxford Research Group_Page_1","height":1366,"width":1932,"images":[{"@type":"oa:Annotation","motivation":"sc:painting","resource":{"@id":"https://iiif.quartexcollections.com/lse/iiif/4f6e59bb-62bf-4418-ac06-4123bd6aadf3/full/full/0/default.jpg","@type":"dctypes:Image","format":"image/jpeg","service":{"@context":"http://iiif.io/api/image/2/context.json","@id":"https://iiif.quartexcollections.com/lse/iiif/4f6e59bb-62bf-4418-ac06-4123bd6aadf3","profile":"http://iiif.io/api/image/2/level2.json","tiles":[{"width":512,"scaleFactors":[1,2,4]}]},"height":1366,"width":1932},"on":"https://iiif.quartexcollections.com/lse/iiif/a9a3c0b5-6be8-4012-b8bb-34e5e08ab19a/canvas/_1","metadata":[]}],"thumbnail":{"@id":"https://iiif.quartexcollections.com/lse/iiif/4f6e59bb-62bf-4418-ac06-4123bd6aadf3/full/500,500/0/default.jpg","@type":"dctypes:Image","height":500,"width":500}},{"@id":"https://iiif.quartexcollections.com/lse/iiif/a9a3c0b5-6be8-4012-b8bb-34e5e08ab19a/canvas/_2","@type":"sc:Canvas","label":"Cyber Threats and Nuclear Weapons _ Oxford Research Group_Page_2","height":1656,"width":2342,"images":[{"@type":"oa:Annotation","motivation":"sc:painting","resource":{"@id":"https://iiif.quartexcollections.com/lse/iiif/01fb96db-7f6e-44bc-ab66-c7682ef7d320/full/full/0/default.jpg","@type":"dctypes:Image","format":"image/jpeg","service":{"@context":"http://iiif.io/api/image/2/context.json","@id":"https://iiif.quartexcollections.com/lse/iiif/01fb96db-7f6e-44bc-ab66-c7682ef7d320","profile":"http://iiif.io/api/image/2/level2.json"},"height":1656,"width":2342},"on":"https://iiif.quartexcollections.com/lse/iiif/a9a3c0b5-6be8-4012-b8bb-34e5e08ab19a/canvas/_2","metadata":[]}],"thumbnail":{"@id":"https://iiif.quartexcollections.com/lse/iiif/01fb96db-7f6e-44bc-ab66-c7682ef7d320/full/500,500/0/default.jpg","@type":"dctypes:Image","height":500,"width":500}},{"@id":"https://iiif.quartexcollections.com/lse/iiif/a9a3c0b5-6be8-4012-b8bb-34e5e08ab19a/canvas/_3","@type":"sc:Canvas","label":"Cyber Threats and Nuclear Weapons _ Oxford Research Group_Page_3","height":1656,"width":2342,"images":[{"@type":"oa:Annotation","motivation":"sc:painting","resource":{"@id":"https://iiif.quartexcollections.com/lse/iiif/193b26fb-9774-4a50-99ad-79f430011091/full/full/0/default.jpg","@type":"dctypes:Image","format":"image/jpeg","service":{"@context":"http://iiif.io/api/image/2/context.json","@id":"https://iiif.quartexcollections.com/lse/iiif/193b26fb-9774-4a50-99ad-79f430011091","profile":"http://iiif.io/api/image/2/level2.json"},"height":1656,"width":2342},"on":"https://iiif.quartexcollections.com/lse/iiif/a9a3c0b5-6be8-4012-b8bb-34e5e08ab19a/canvas/_3","metadata":[]}],"thumbnail":{"@id":"https://iiif.quartexcollections.com/lse/iiif/193b26fb-9774-4a50-99ad-79f430011091/full/500,500/0/default.jpg","@type":"dctypes:Image","height":500,"width":500}},{"@id":"https://iiif.quartexcollections.com/lse/iiif/a9a3c0b5-6be8-4012-b8bb-34e5e08ab19a/canvas/_4","@type":"sc:Canvas","label":"Cyber Threats and Nuclear Weapons _ Oxford Research Group_Page_4","height":1656,"width":2342,"images":[{"@type":"oa:Annotation","motivation":"sc:painting","resource":{"@id":"https://iiif.quartexcollections.com/lse/iiif/f0021d07-21ec-4832-9196-692cbb9d4d41/full/full/0/default.jpg","@type":"dctypes:Image","format":"image/jpeg","service":{"@context":"http://iiif.io/api/image/2/context.json","@id":"https://iiif.quartexcollections.com/lse/iiif/f0021d07-21ec-4832-9196-692cbb9d4d41","profile":"http://iiif.io/api/image/2/level2.json"},"height":1656,"width":2342},"on":"https://iiif.quartexcollections.com/lse/iiif/a9a3c0b5-6be8-4012-b8bb-34e5e08ab19a/canvas/_4","metadata":[]}],"thumbnail":{"@id":"https://iiif.quartexcollections.com/lse/iiif/f0021d07-21ec-4832-9196-692cbb9d4d41/full/500,500/0/default.jpg","@type":"dctypes:Image","height":500,"width":500}},{"@id":"https://iiif.quartexcollections.com/lse/iiif/a9a3c0b5-6be8-4012-b8bb-34e5e08ab19a/canvas/_5","@type":"sc:Canvas","label":"Cyber Threats and Nuclear Weapons _ Oxford Research Group_Page_5","height":1656,"width":2342,"images":[{"@type":"oa:Annotation","motivation":"sc:painting","resource":{"@id":"https://iiif.quartexcollections.com/lse/iiif/cd7c2e91-a1b8-42c6-8041-e7682b24a13b/full/full/0/default.jpg","@type":"dctypes:Image","format":"image/jpeg","service":{"@context":"http://iiif.io/api/image/2/context.json","@id":"https://iiif.quartexcollections.com/lse/iiif/cd7c2e91-a1b8-42c6-8041-e7682b24a13b","profile":"http://iiif.io/api/image/2/level2.json"},"height":1656,"width":2342},"on":"https://iiif.quartexcollections.com/lse/iiif/a9a3c0b5-6be8-4012-b8bb-34e5e08ab19a/canvas/_5","metadata":[]}],"thumbnail":{"@id":"https://iiif.quartexcollections.com/lse/iiif/cd7c2e91-a1b8-42c6-8041-e7682b24a13b/full/500,500/0/default.jpg","@type":"dctypes:Image","height":500,"width":500}},{"@id":"https://iiif.quartexcollections.com/lse/iiif/a9a3c0b5-6be8-4012-b8bb-34e5e08ab19a/canvas/_6","@type":"sc:Canvas","label":"Cyber Threats and Nuclear Weapons _ Oxford Research Group_Page_6","height":1656,"width":2342,"images":[{"@type":"oa:Annotation","motivation":"sc:painting","resource":{"@id":"https://iiif.quartexcollections.com/lse/iiif/468adf68-449e-49b2-82d2-fedfe4e7aaf5/full/full/0/default.jpg","@type":"dctypes:Image","format":"image/jpeg","service":{"@context":"http://iiif.io/api/image/2/context.json","@id":"https://iiif.quartexcollections.com/lse/iiif/468adf68-449e-49b2-82d2-fedfe4e7aaf5","profile":"http://iiif.io/api/image/2/level2.json"},"height":1656,"width":2342},"on":"https://iiif.quartexcollections.com/lse/iiif/a9a3c0b5-6be8-4012-b8bb-34e5e08ab19a/canvas/_6","metadata":[]}],"thumbnail":{"@id":"https://iiif.quartexcollections.com/lse/iiif/468adf68-449e-49b2-82d2-fedfe4e7aaf5/full/500,500/0/default.jpg","@type":"dctypes:Image","height":500,"width":500}},{"@id":"https://iiif.quartexcollections.com/lse/iiif/a9a3c0b5-6be8-4012-b8bb-34e5e08ab19a/canvas/_7","@type":"sc:Canvas","label":"Cyber Threats and Nuclear Weapons _ Oxford Research Group_Page_7","height":3502,"width":4941,"images":[{"@type":"oa:Annotation","motivation":"sc:painting","resource":{"@id":"https://iiif.quartexcollections.com/lse/iiif/865623ef-fee5-4414-b3be-d7273b582406/full/full/0/default.jpg","@type":"dctypes:Image","format":"image/jpeg","service":{"@context":"http://iiif.io/api/image/2/context.json","@id":"https://iiif.quartexcollections.com/lse/iiif/865623ef-fee5-4414-b3be-d7273b582406","profile":"http://iiif.io/api/image/2/level2.json"},"height":3502,"width":4941},"on":"https://iiif.quartexcollections.com/lse/iiif/a9a3c0b5-6be8-4012-b8bb-34e5e08ab19a/canvas/_7","metadata":[]}],"thumbnail":{"@id":"https://iiif.quartexcollections.com/lse/iiif/865623ef-fee5-4414-b3be-d7273b582406/full/500,500/0/default.jpg","@type":"dctypes:Image","height":500,"width":500}}]}],"thumbnail":"https://iiif.quartexcollections.com/lse/iiif/4f6e59bb-62bf-4418-ac06-4123bd6aadf3/full/300,300/0/default.jpg","logo":"https://iiif.quartexcollections.com/lse/iiif/logo"}