<Record><identifier xmlns="http://purl.org/dc/elements/1.1/">URN:NBN:SI:doc-KI6X0SRC</identifier><date>2010</date><creator>Duong, Quang</creator><creator>LeFevre, Kristen</creator><creator>Wellman, Michael P.</creator><relation>documents/doc/K/URN_NBN_SI_doc-KI6X0SRC_001.pdf</relation><relation>documents/doc/K/URN_NBN_SI_doc-KI6X0SRC_001.txt</relation><format format_type="issue">2</format><format format_type="volume">34</format><format format_type="type">article</format><format format_type="extent">str. 151-158</format><identifier identifier_type="ISSN">0350-5596</identifier><identifier identifier_type="COBISSID">24155943</identifier><identifier identifier_type="URN">URN:NBN:SI:doc-KI6X0SRC</identifier><language>eng</language><publisher>Slovensko društvo Informatika</publisher><source>Informatica (Ljubljana)</source><rights>InC</rights><subject language_type_id="slv">informatika</subject><subject language_type_id="eng">information science</subject><subject language_type_id="slv">strateško načrtovanje</subject><subject language_type_id="slv">teorija iger</subject><subject language_type_id="slv">terorizem</subject><title>Strategic modeling of information sharing among data privacy attackers</title></Record>