<?xml version="1.0" encoding="UTF-8"?><xml><records><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>17</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Xingan Li</style></author><author><style face="normal" font="default" size="100%">Henry Joutsijoki</style></author><author><style face="normal" font="default" size="100%">Jorma Laurikkala</style></author><author><style face="normal" font="default" size="100%">Martti Juhola</style></author></authors></contributors><titles><title><style face="normal" font="default" size="100%">GDP growth vs. criminal phenomena: data mining of Japan 1926–2013</style></title><secondary-title><style face="normal" font="default" size="100%">AI &amp; SOCIETY</style></secondary-title></titles><dates><year><style  face="normal" font="default" size="100%">2018</style></year><pub-dates><date><style  face="normal" font="default" size="100%">May 2018</style></date></pub-dates></dates><volume><style face="normal" font="default" size="100%">33</style></volume><pages><style face="normal" font="default" size="100%">261–274</style></pages><language><style face="normal" font="default" size="100%">eng</style></language><issue><style face="normal" font="default" size="100%">2</style></issue></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>17</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Xingan Li</style></author><author><style face="normal" font="default" size="100%">Martti Juhola</style></author></authors></contributors><titles><title><style face="normal" font="default" size="100%">Country crime analysis using the self-organising map, with special regard to economic factors </style></title><secondary-title><style face="normal" font="default" size="100%">International Journal of Data Mining, Modelling and Management </style></secondary-title></titles><dates><year><style  face="normal" font="default" size="100%">2015</style></year></dates><volume><style face="normal" font="default" size="100%">7</style></volume><language><style face="normal" font="default" size="100%">eng</style></language><issue><style face="normal" font="default" size="100%">2</style></issue></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>17</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Xingan Li</style></author><author><style face="normal" font="default" size="100%">Henry Joutsijoki</style></author><author><style face="normal" font="default" size="100%">Jorma Laurikkala</style></author><author><style face="normal" font="default" size="100%">Martti Juhola</style></author></authors></contributors><titles><title><style face="normal" font="default" size="100%">Crime vs. Demographic Factors Revisited: Application of Data Mining Methods</style></title><secondary-title><style face="normal" font="default" size="100%">Webology</style></secondary-title></titles><dates><year><style  face="normal" font="default" size="100%">2015</style></year><pub-dates><date><style  face="normal" font="default" size="100%">June 2015</style></date></pub-dates></dates><volume><style face="normal" font="default" size="100%">12</style></volume><language><style face="normal" font="default" size="100%">eng</style></language><issue><style face="normal" font="default" size="100%">1</style></issue></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>12</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Xingan Li</style></author><author><style face="normal" font="default" size="100%">Henry Joutsijoki</style></author><author><style face="normal" font="default" size="100%">Jorma Laurikkala</style></author><author><style face="normal" font="default" size="100%">Martti Juhola</style></author></authors></contributors><titles><title><style face="normal" font="default" size="100%">Crime vs. demographic factors revisited:  Application of data mining methods</style></title><secondary-title><style face="normal" font="default" size="100%">Webology</style></secondary-title></titles><dates><year><style  face="normal" font="default" size="100%">2015</style></year></dates><language><style face="normal" font="default" size="100%">eng</style></language></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>17</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Xingan Li</style></author><author><style face="normal" font="default" size="100%">Henry Joutsijoki</style></author><author><style face="normal" font="default" size="100%">Jorma Laurikkala</style></author><author><style face="normal" font="default" size="100%">Markku Siermala</style></author><author><style face="normal" font="default" size="100%">Martti Juhola</style></author></authors></contributors><titles><title><style face="normal" font="default" size="100%">Homicide and Its Social Context: Analysis Using the Self-Organizing Map</style></title><secondary-title><style face="normal" font="default" size="100%">Applied Artificial Intelligence An International Journal</style></secondary-title></titles><dates><year><style  face="normal" font="default" size="100%">2015</style></year></dates><volume><style face="normal" font="default" size="100%">29</style></volume><language><style face="normal" font="default" size="100%">eng</style></language><issue><style face="normal" font="default" size="100%">4</style></issue></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>17</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Xingan Li</style></author><author><style face="normal" font="default" size="100%">Martti Juhola</style></author></authors></contributors><titles><title><style face="normal" font="default" size="100%">Application of the self-organising map to visualisation of and exploration into historical development of criminal phenomena in the USA, 1960–2007 </style></title><secondary-title><style face="normal" font="default" size="100%">International Journal of Society Systems Science</style></secondary-title></titles><dates><year><style  face="normal" font="default" size="100%">2014</style></year></dates><volume><style face="normal" font="default" size="100%">6</style></volume><language><style face="normal" font="default" size="100%">eng</style></language><issue><style face="normal" font="default" size="100%">2</style></issue></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>17</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Xingan Li</style></author><author><style face="normal" font="default" size="100%">Martti Juhola</style></author></authors></contributors><titles><title><style face="normal" font="default" size="100%">Country crime analysis using the self-organizing map, with special regard to demographic factors</style></title><secondary-title><style face="normal" font="default" size="100%">AI &amp; SOCIETY</style></secondary-title></titles><dates><year><style  face="normal" font="default" size="100%">2014</style></year><pub-dates><date><style  face="normal" font="default" size="100%">February 2014</style></date></pub-dates></dates><volume><style face="normal" font="default" size="100%">29</style></volume><pages><style face="normal" font="default" size="100%">53–68</style></pages><language><style face="normal" font="default" size="100%">eng</style></language><issue><style face="normal" font="default" size="100%">1</style></issue></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>47</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Xingan Li</style></author><author><style face="normal" font="default" size="100%">Martti Juhola</style></author></authors></contributors><titles><title><style face="normal" font="default" size="100%">Crime and Its Social Context: Analysis Using the Self-Organizing Map</style></title><secondary-title><style face="normal" font="default" size="100%">European Intelligence and Security Informatics Conference</style></secondary-title></titles><dates><year><style  face="normal" font="default" size="100%">2013</style></year><pub-dates><date><style  face="normal" font="default" size="100%">12-14 Aug. 2013 </style></date></pub-dates></dates><pub-location><style face="normal" font="default" size="100%">Uppsala, Sweden </style></pub-location><language><style face="normal" font="default" size="100%">eng</style></language></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>17</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Xingan Li</style></author></authors></contributors><titles><title><style face="normal" font="default" size="100%">Cybersecurity as a Relative Concept</style></title><secondary-title><style face="normal" font="default" size="100%">Information &amp; Security: An International Journal</style></secondary-title></titles><keywords><keyword><style  face="normal" font="default" size="100%">Cybersecurity</style></keyword><keyword><style  face="normal" font="default" size="100%">Economic Analysis</style></keyword><keyword><style  face="normal" font="default" size="100%">Illegal Behavior</style></keyword></keywords><dates><year><style  face="normal" font="default" size="100%">2006</style></year><pub-dates><date><style  face="normal" font="default" size="100%">2006</style></date></pub-dates></dates><volume><style face="normal" font="default" size="100%">18</style></volume><pages><style face="normal" font="default" size="100%">11-24</style></pages><language><style face="normal" font="default" size="100%">eng</style></language><abstract><style face="normal" font="default" size="100%">Based on the relativity of the concept of cybersecurity, this article analyzes the economic impact of cybersecurity breaches, identifies cybersecurity as a private good that should be provided mainly by the private sector. However, public provision is also necessary when severe security breaches occur and liability mechanisms should be triggered.</style></abstract></record></records></xml>