<?xml version="1.0" encoding="UTF-8"?><xml><records><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>17</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Tim Sweijs</style></author><author><style face="normal" font="default" size="100%">Milos Jovanovic</style></author></authors></contributors><titles><title><style face="normal" font="default" size="100%">Assessing Comprehensive Security Approaches in Action: An Introduction</style></title><secondary-title><style face="normal" font="default" size="100%">Information &amp; Security: An International Journal</style></secondary-title></titles><dates><year><style  face="normal" font="default" size="100%">2015</style></year><pub-dates><date><style  face="normal" font="default" size="100%">2015</style></date></pub-dates></dates><volume><style face="normal" font="default" size="100%">33</style></volume><pages><style face="normal" font="default" size="100%">5-9</style></pages><abstract><style face="normal" font="default" size="100%">&lt;p&gt;This article introduces the reader to the exploration of the evolving concept of security and the main findings, reflected in the contributions to this special issue of &amp;quot;Information &amp;amp; Security&amp;quot;.&lt;/p&gt;</style></abstract><issue><style face="normal" font="default" size="100%">1</style></issue></record></records></xml>