<?xml version="1.0" encoding="UTF-8"?><xml><records><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>27</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Nazli Choucri</style></author><author><style face="normal" font="default" size="100%">Chrisma Jackson</style></author><author><style face="normal" font="default" size="100%">Lyla Fischer</style></author><author><style face="normal" font="default" size="100%">Brooke Gier</style></author><author><style face="normal" font="default" size="100%">Vivian Peron</style></author><author><style face="normal" font="default" size="100%">Ben Ze Yuan</style></author><author><style face="normal" font="default" size="100%">Liu Yangyue</style></author><author><style face="normal" font="default" size="100%">Glenn Voelz</style></author></authors></contributors><titles><title><style face="normal" font="default" size="100%">Perspectives!on!Cybersecurity:!! A!Collaborative!Study!</style></title><secondary-title><style face="normal" font="default" size="100%">Research Paper</style></secondary-title></titles><dates><year><style  face="normal" font="default" size="100%">2015</style></year></dates><number><style face="normal" font="default" size="100%">2016-2</style></number><publisher><style face="normal" font="default" size="100%">Massachusetts Institute of Technology,  Political!Science!Department!</style></publisher><language><style face="normal" font="default" size="100%">eng</style></language></record></records></xml>