<?xml version="1.0" encoding="UTF-8"?><xml><records><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>10</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Anna Spagnolli</style></author><author><style face="normal" font="default" size="100%">Mariavittoria Masotina</style></author><author><style face="normal" font="default" size="100%">Annalorena Scarcia</style></author><author><style face="normal" font="default" size="100%">Beatrice Zuffi</style></author><author><style face="normal" font="default" size="100%">Luciano Gamberini</style></author></authors></contributors><titles><title><style face="normal" font="default" size="100%">How to get away with cyberattacks: An argumentative approach to cyberattacks’ legitimization by common users</style></title><secondary-title><style face="normal" font="default" size="100%">CHI '22: CHI Conference on Human Factors in Computing Systems</style></secondary-title></titles><dates><year><style  face="normal" font="default" size="100%">2022</style></year><pub-dates><date><style  face="normal" font="default" size="100%">April 2022 </style></date></pub-dates></dates><pages><style face="normal" font="default" size="100%">1–12</style></pages><language><style face="normal" font="default" size="100%">eng</style></language></record></records></xml>