-凯发k8游戏
��ࡱ�>�� {}����z��������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������u �r�vhbjbj�n�n2l��a��a>
�������""������������8�tm�ppl���������o�o�o�o�o�o�o$�q��tf�oq�������o����4*p�v�����o��o�����0��$ө�����4�o@p0pp�tgfu�/�t�t$��l���������o�o�����pp������������������������������������������������������������������������u���������"qs: public administration review
volume 81, issue 5, september/october 2021
1. title: accountable artificial intelligence: holding algorithms to account
authors: madalina busuioc
abstract: artificial intelligence (ai) algorithms govern in subtle yet fundamental ways the way we live and are transforming our societies. the promise of efficient, low-cost, or �neutral� solutions harnessing the potential of big data has led public bodies to adopt algorithmic systems in the provision of public services. as ai algorithms have permeated high-stakes aspects of our public existence�from hiring and education decisions to the governmental use of enforcement powers (policing) or liberty-restricting decisions (bail and sentencing)�this necessarily raises important accountability questions: what accountability challenges do ai algorithmic systems bring with them, and how can we safeguard accountability in algorithmic decision-making? drawing on a decidedly public administration perspective, and given the current challenges that have thus far become manifest in the field, we critically reflect on and map out in a conceptually guided manner the implications of these systems, and the limitations they pose, for public accountability.
2. title: algorithmization of bureaucratic organizations: using a practice lens to study how context shapes predictive policing systems
authors: albert meijer; lukas lorenz; martijn wessels.
abstract: the current scientific debate on algorithms in the public sector is dominated by a focus on technology rather than organizational patterns. this paper extends our understanding of these patterns by studying the algorithmization of bureaucratic organizations, which is the process in which an organization rearranges its working routines around the use of algorithms. to explore the algorithmization of bureaucratic organizations, we conducted a comparative empirical analysis of predictive policing in berlin (germany) and amsterdam (netherlands) through in-depth qualitative research. our study identified two emergent patterns: the �algorithmic cage' (berlin, more hierarchical control) and the �algorithmic colleague' (amsterdam, room for professional judgment). these patterns result from administrative cultures and reinforce existing patterns of organization. the study highlights that two patterns of algorithmization of government bureaucracy can be identified and that these patterns depend on dominant social norms and interpretations rather than the technological features of algorithmic systems.
3. title: an improvised patchwork: success and failure in cybersecurity policy for critical infrastructure
authors: sean atkins; chappell lawson.
abstract: the last two decades have revealed the vulnerability of privately owned �critical infrastructure��the power grid, pipelines, financial networks, and other vital systems�to cyberattack. the central u.s. response to this challenge has been a series of sectoral �partnerships� with private owner-operators of critical infrastructure, involving varying degrees of regulation. qualitative analysis based on in-depth interviews with over 40 policymakers and senior private sector managers, as well as public documents, reveals considerable variation in how well this approach has worked in practice. the main predictors of policy success appear to be (a) the nature of the cyber threat to firms� operations and (b) regulatory pressure on firms. however, other factors�such as the nature of intra-industry competition�also affect how well the current regime works in specific sectors. our findings have implications for public administration on civilian cybersecurity, as well as ramifications for regulation in other policy domains.
4. title: what's in it for us? benevolence, national security, and digital surveillance
authors: sara degli esposti; kirstie ball; sally dibb.
abstract: this article challenges suggestions that citizens should accept digital surveillance technologies (dsts) and trade their privacy for better security. drawing on data from nine eu countries, this research shows that citizens� support for dsts varies not only depending on the way their data are used but also depending on their views of the security agency operating them. using an institutional trustworthiness lens, this research investigates three dst cases�smart cctv, smartphone location tracking, and deep packet inspection�that present escalating degrees of privacy risk to citizens. the findings show that the perceived benevolence of security agencies is essential to acceptability in all three cases. for dsts with greater privacy risk, questions of competence and integrity enter citizens' assessments.
5. title: service design and citizen satisfaction with e-government services: a multidimensional perspective
authors: frank k. y. chan; james y. l. thong; susan a. brown; viswanath venkatesh.
abstract: this research examines the relationship between service design and citizen satisfaction with e-government services. based on a multidimensional conceptualization of service, we define three key service perceptions, each comprising different design characteristics, that jointly influence perceived service quality and citizen satisfaction with e-government services. the service perceptions and their corresponding design characteristics are: (1) perceptions of a core service�accuracy, completeness, self-service capability, and convenience; (2) perceptions of facilitating services�accessibility, privacy protection, security protection, and user support; and (3) perceptions of supporting services�personalization capability and transparency. we tested our research model using data from a two-stage survey of 3,065 users of three e-government services. the results showed that all design characteristics contributed to their respective service perceptions that influenced perceived service quality that in turn influenced citizen satisfaction. the finding of a three-way interaction among the service perceptions supported their complementary role in influencing perceived service quality.
6. title: analyzing the effectiveness of networks for addressing public problems: evidence from a longitudinal study
authors: michael d. siciliano; jered b. carr; victor g. hugg.
abstract: while scholars and practitioners frequently laud the potential of networks to address complex policy problems, empirical evidence of the effectiveness of networks is scarce. this study examines how changes in network structure (centralization and transitivity), network composition (sector diversity and geographic range), and tie properties (stability and strength) influence community-level outcomes. relying on a statutory requirement in the state of iowa requiring local governments to file all instances of intergovernmental and intersectoral collaboration, we measure collaboration networks in 81 counties over 17 years in the areas of crime and economic development. using fixed effects models, we examine how changes in the structure and composition of these county-level networks affect substantive policy outcomes. our findings indicate that network properties matter, but that the specific properties may be context dependent. we find network centralization and stability are stronger predictors of crime while network composition is more strongly associated with economic development.
7. title: toward a multiplex network theory of interlocal service contracting
authors: manoj k. shrestha; richard c. feiock.
abstract: debates about risk in interlocal service contracts treat contracts as discrete dyadic exchanges. we challenge this notion by advancing a multiplex network contacting approach, which asserts that interlocal contracting represents a multiplex network phenomenon, defined as overlapping multiple service contract networks. simultaneous treatment of multiple networks is required to understand how local governments mitigate contract risks. we claim that local governments create multiplex network structures comprising more than one service contract networks in order to reduce service contracting risks. multivariate exponential random graph models were fit to joint high-risk and low or mixed-risk contract networks involving eight local government services in pinellas county, florida. the results demonstrate that local governments mitigate risk by creating multiplex reciprocity and multiplex network closure in contracts that involve multiple services.
8. title: collaborative innovation in labor market inclusion
authors: colin lindsay; sarah pearson; elaine batty; anne marie cullen; will eadson.
abstract: this article deploys the concept of �collaborative innovation� to discuss key stakeholders� and service users' experiences of innovative labor market inclusion services. we draw on work by s�rensen and torfing (2011, 2016, 2017) to frame collaborative innovation as a distinctive approach to the coproduction of services that respond to user needs, and highlight the importance of governance and leadership practices that foster mutual learning and boundary spanning innovation. the article reports on 102 interviews with service users (in this case, unemployed lone parents) and 117 interviews with key stakeholders involved in local partnerships. we identify benefits from such collaborative approaches in terms of innovative service design and positive outcomes for service users. we conclude that policy makers should consider the potential added value of collaborative innovation in labor market inclusion.
9. title: social-psychological context moderates incentives to co-produce: evidence from a large-scale survey experiment on park upkeep in an urban setting
authors: natalia letki; trui steen.
abstract: this paper presents evidence that the relevance of incentives to co-produce depends on the social-psychological context under which actors operate. we propose that context (including community attachment, trust in local authorities, ethnic diversity, unemployment level, and population density) moderates effect of incentives (utility of the co-produced service, monetary and reputational rewards, and social norms). through a survey experiment carried out in 593 urban locations across 13 countries, we show that willingness to co-produce increases with community attachment and decreases with ethnic diversity of the local area. the relevance of utility and social norms as determinants of willingness to co-produce depends on the social-psychological context. reputational and monetary rewards have limited effect, and their relation to the context is less clear. all incentives are largely irrelevant when actors operate in cooperation-conducive circumstances, where co-production is a value in itself. however, their importance as �tools� to encourage co-production arises under challenging contexts.
10. title: getting a grip on the performance of collaborations: examining collaborative performance regimes and collaborative performance summits
authors: scott douglas; chris ansell.
abstract: collaborative governance is popular among practitioners and scholars, but getting a grip on the performance of collaborations remains a challenge. recent research has made progress by identifying appropriate performance measures, yet managing performance also requires appropriate performance routines. this article brings together insights from collaborative governance and performance management to conceptualize collaborative performance regimes; the collection of routines used by actors working together on a societal issue to explicate their goals, exchange performance information, examine progress, and explore performance improvement actions. the concept of regimes is made concrete by focusing on the specific routine of organizing a collaborative performance summit; a periodic gathering where partners review their joint performance. such summits are both manifestations of the performance regime and potential turning points for regime change. using three local public health collaborations as illustration, this article offers a framework for understanding collaborative performance regimes, summits, and the dynamics between them.
11. title: when illusion met illusion: how interacting biases affect (dis)trust within coopetitive policy networks
authors: junesoo lee
abstract: coopetition is a universal relationship in policy networks where various organizations cooperate and also compete with one another. dealing with the ambivalent relationships in policy networks, organizations in the network need to assess their internal and external environments. however, such assessments are usually inclined to be biased for various reasons. the question is �if multiple organizations� assessment biases interact with one another, what happens to mutual trust or distrust?� this study explores the patterns and impact of interactions of assessment biases using surveys and interviews administered to nuclear-related public institutions in south korea. the findings imply that the interactions of individual biases impact trust and distrust differently according to diverse dimensions of bias, including power, cooperation, competition, and contribution in policy networks. what determines trust or distrust among network members may not only be whether biases exist but also how biases of network members are combined and matched.
12. title: policy coordination and integration: a research agenda
authors: philipp trein; robbert biesbroek; thomas bolognesi; guillermo m. cejudo; robert duffy; thurid hustedt; iris meyer.
abstract: coordinating and integrating different policies and public sector organizations is a major challenge for practitioners and a continuing topic of interest for researchers. this viewpoint essay argues that research on this topic needs reorientation to provide better insights for practice and theory of policy making, as well as policy implementation. the authors offer four suggestions on how future research could advance: (1) combining existing conceptual and epistemological approaches more systematically; (2) complementing case studies and surveys with large-n analyses and novel research tools and methods; (3) more systematic analysis of the causal mechanisms in policy coordination and integration; and (4) more thorough study of the real-world impact of policy coordination and integration.
13. title: learning from local government research partnerships in a fragmented political setting
authors: megan mullin
abstract: research partnerships between scholars and local governments offer promise to advance scholarly understanding of local public administration and to improve the lives of people living and working in local communities. yet political fragmentation complicates the prospect of broader learning from these partnerships and creates the risk that research partnerships will amplify disparities in local government performance. if scholars and practitioners are attentive to these risks, they can design research to facilitate learning across local government settings. lessons from policy diffusion, program evaluation, and team science inform a set of recommendations for the conduct of local government research partnerships and the distribution of results.
�nn/ffnċ�
14. title: annabelle lever and andrei poama, the routledge handbook of ethics and public policy (new york, ny: routledge, 2018). 560 pp.; $145.03 (hardcover), isbn: 9781138201279.
authors: ratna okhai
abstract: the article reviews the book �the routledge handbook of ethics and public policy� by annabelle lever and andrei poama.
15. title: ijeoma oluo. 2020. mediocre: the dangerous legacy of white male america. new york: seal press. 336 pp.; $28 (hardcover). isbn: 9781580059510
authors: staci m. zavattaro
abstract: the article reviews the book$&./12:beghikt�����ʻʻʻ����xpcug:uhj�5�ojqj^jo(h�0ph�0p5�ojqj^jh�"�hu<�5�ojqj^jh�ud5�ojqj^jo(h�"�h�"�o(&h�"�h�"�5�cjojqj^jajo(hm8x5�cjojqj^jajh
2e5�cjojqj^jaj h�0p5�cjojqj^jajo(h�0p5�cjojqj^jaj#h�"�h�"�5�cjojqj^jaj h$-�5�cjojqj^jajo(#h�0ph�0p5�cjojqj^jajhij����z
�
��[����vw���������������������������gd�psgd)w�gd$?�gdto�gd�l$gd%j,gdu<�gd�"�$a$gdt4�������������y
z
b
c
p
q
~
�
�
�
�
�
����˽�����|��l|��a�a�al|s�hih�l$ojqj^jo(h�0p5�ojqj^jhvi�h�l$5�ojqj^jo(h�l$h�l$5�ojqj^jh�l$5�ojqj^jo(hj�5�ojqjo(hiht4ojqj^jo(h�0ph�0pojqj^jhihj�ojqj^jo(h�"�hu<�5�ojqj^jht45�ojqj^jo(h�0ph�0p5�ojqj^jhicy5�ojqj^j��������z[cdop��������������ķ٨��٨�����re�xjh�"�h%j,5�ojqj^jhs/�5�ojqj^jo(hihanojqj^jh�0ph�0pojqj^jh�)hto�ojqj^jo(h�0p5�ojqj^jhvi�hto�5�ojqj^jo(h�0ph�0p5�ojqj^jhto�hto�5�ojqj^jhto�hto�h�"�h�`�5�ojqj^jhto�5�ojqj^jo(h%j,5�ojqjo(hihu<�ojqj^jo(�������()uvwxz`a��������������ֻֻֻ��zl^z�p^zֻֻ�hvi�h�ps5�ojqj^jh�psh�ps5�ojqj^jh�"�h)w�5�ojqj^jh�ps5�ojqj^jo(h)w�5�ojqjo(hvi�h%j,ojqj^jo(h�0ph�0pojqj^jh�)h$?�ojqj^jo(h�0p5�ojqj^jhvi�h$?�5�ojqj^jo(h�0ph�0p5�ojqj^jh$?�5�ojqj^jo(h$?�h$?�5�ojqj^j !�������@ a i j ^ _ m n } ~ � � �%�%�%����ⱥ����yk��]ko�������ⱥ���hvi�hvi�5�ojqj^jhvi�hr7a5�ojqj^jhr7ahr7a5�ojqj^jh�"�h)w�5�ojqj^jhr7a5�ojqj^jo(h)w�5�ojqjo(hvi�h)w�ojqj^jo(h�0ph�0pojqj^jh}onh)w�ojqj^jo(h$?�h)w�5�ojqj^jhvi�h)w�5�ojqj^jo(h�0ph�0p5�ojqj^jh�0p5�ojqj^j�a �%�%!&p&**t*�*c.d.�./`3a3�34�8�89&9j=k=�=�������������������������gd�s�gd�_gdlz�gd�)ggd|�gd)w�gdr7a�%�%�%�%�% &!&*&;&<&n&o&p&y&z&***** *!*s*����ɻ�ɰɰ���wi^q�cq�h�)gh�)g5�ojqj^jh�)g5�ojqj^jo(h)w�5�ojqjo(hvi�h)w�ojqj^jo(h�0ph�0pojqj^jh}onh)w�ojqj^jo(h$?�h)w�5�ojqj^jhvi�h)w�5�ojqj^jo(h�0p5�ojqj^jhvi�h|�5�ojqj^jh�0ph�0p5�ojqj^jh|�h|�5�ojqj^jh�"�h)w�5�ojqj^jh|�5�ojqj^jo(s*t*\*]*j*k*y*z*�*�*�*�*�*�*�*�*�*b.c.d.e.g.m.���ƚƚƚƚƚ����vk^pbhlz�hlz�5�ojqj^jh�"�h)w�5�ojqj^jhr5�ojqj^jo(h)w�5�ojqjo(hvi�h)w�ojqj^jo(h�0ph�0pojqj^jhih)w�ojqj^jo(h$?�h)w�5�ojqj^jhvi�h)w�5�ojqj^jo(h�0p5�ojqj^jh�0ph�0p5�ojqj^jh�)g5�ojqj^jo(h�)gh�)g5�ojqj^jhvi�h�)g5�ojqj^jm.n.�.�.�.�.�.///
//_3`3a3c3e3k3l3�3�����微���wl_qc6�h�_5�ojqj^jo(h�_h�_5�ojqj^jh�"�h)w�5�ojqj^jhr5�ojqj^jo(h)w�5�ojqjo(hvi�h)w�ojqj^jo(h�0ph�0pojqj^jhih)w�ojqj^jo(h$?�h)w�5�ojqj^jhvi�h)w�5�ojqj^jo(h�0p5�ojqj^jhlz�hlz�5�ojqj^jhvi�hlz�5�ojqj^jh�0ph�0p5�ojqj^jhlz�5�ojqj^jo(�3�3�3 4
4444"4#4�8�8�8�8�8�8�8999�����ʺ����xk]ok�aoh[h�s�5�ojqj^jh�s�h�s�5�ojqj^jh�"�h)w�5�ojqj^jh�s�5�ojqj^jo(h)w�5�ojqjo(h}onh)w�ojqj^jo(h�0ph�0pojqj^jhih)w�ojqj^jo(h$?�h)w�5�ojqj^jhvi�h)w�5�ojqj^jo(h�0p5�ojqj^jh�0ph�0p5�ojqj^jh�_h�_5�ojqj^jhvi�h�_5�ojqj^j99%9&9/909i=j=k=m=o=u=v=�=�=�=�=�=�=�=�=�=�=�=�=�=���ŷ����vh��zhl�a�a�a�a�h�0p5�ojqj^jh�9�h[5�ojqj^jh[h�s�5�ojqj^jh�s�h�s�5�ojqj^jh�"�h)w�5�ojqj^jh�s�5�ojqj^jo(h)w�5�ojqjo(h[h)w�ojqj^jo(h�0ph�0pojqj^jh}onh)w�ojqj^jo(h$?�h)w�5�ojqj^jh[h)w�5�ojqj^jo(h�0ph�0p5�ojqj^jh[h[5�ojqj^j�=�=�=�=>> >>>1a2a3a5a7a=a>a�a�a�a�a�a�a�ajelene������ⱥ����yk��]k��ⱥ�seh[h�]�ojqj^jo(h)w�ojqj^jh[h�s�5�ojqj^jh�s�h�s�5�ojqj^jh�"�h)w�5�ojqj^jh�s�5�ojqj^jo(h�~�5�ojqjo(h[h)w�ojqj^jo(h�0ph�0pojqj^jhih)w�ojqj^jo(h$?�h)w�5�ojqj^jh[h)w�5�ojqj^jo(h�0ph�0p5�ojqj^jh�0p5�ojqj^j�= >2a3a�a�alene\e^ecfxf�f�f�g�ghhjhkhmhnhphqhshthuhvh��������������������������gd�gd
�gdmw�gd�0pgd)w�gd�s�neze\e^e`ebeferetebfcflfwfxf�f�f�f�f�f�f������������zl^q@2@h�0pojqj^jmh sh h�0ph�0pojqj^jmh sh h�0ph�0pojqj^jhih)w�ojqj^jo(h$?�h)w�5�ojqj^jh[h)w�5�ojqj^jo(h[hmw�5�ojqj^jh�0ph�0p5�ojqj^jhmw�5�ojqj^jo(hmw�hmw�5�ojqj^jh�"�h)w�5�ojqj^jh)w�5�ojqj^jo(h�s�5�ojqj^jo(h�0p5�ojqjh�0ph�0p5�ojqjo(�f�f�f�f�f�f�fgg�g�g�g�g�g�g�g�gh���̾�����r�btf97uh�0ph�0pojqj^jhih)w�ojqj^jo(h$?�h)w�5�ojqj^jh$?�h
�5�ojqj^jo(hmw�h
�5�ojqj^jh[h
�5�ojqj^jh�0ph�0p5�ojqj^jh
�5�ojqj^jo(h
�h
�5�ojqj^jh
�h
�h�"�h)w�5�ojqj^jh�s�5�ojqj^jo(h)w�5�ojqjo(h�0ph)w�ojqj^jo(h�0pojqj^jmh sh �mediocre: the dangerous legacy of white male america� by ijeoma oluo.
h:h;hfhghhhihkhlhnhohqhrhuhvh��������������h��jh��uh�0phj<ojqj^jo(h�0pojqj^jmh sh h�0ph�0p h�0ph�0pojqj^jmh sh 01�82p��. ��a!�"�#��$��%��s��������i���[�cs2���� 0@p`p������2(�� 0@p`p������ 0@p`p������ 0@p`p������ 0@p`p������ 0@p`p������ 0@p`p��8x�v~�������� 0@�� 0@�� 0@�� 0@�� 0@�� 0@�� 0@�� 0@�� 0@�� 0@�� 0@�� 0@�� 0@�� 0@pj_hmh nhsh thj`��jck�e$1$a$ cjkh_hajmh nhsh th$a ���$؞���k=�w[sobi���bnf�h�&��ŝ�]�6��ҩ��n=���in����a7���qb&>!"�h
[�� �lx�z)��w�v�og�%�ţ|8mă#�/��8��'��=���q�u*��c�`c�w{�d6��/�[��yl���%�� ��n� {�\�o�sm�/�~��i�bcax���/=xe��'5��&\�h�4da���,ye\}�)�l�a�����r�^��*�z���y�v-wowz�n�]��:m�v�=t�c���w��r�b���*i�v�u�r��u����|�nc`�|����*^����pk!
ѐ��'theme/theme/_rels/thememanager.xml.rels��m
�0���wooӻ�&݈э���5
6?$q��
�,.�a��i����c2�1h�:�q��m��@rn��;d�`��o7�g�k(m&$r(.1�r'j��њt���8��v�"��aȼ�h�u}��|�$�b{��p����8�g/]�qasم(����#��l�[������pk-!����[content_types].xmlpk-!�֧��60_rels/.relspk-!ky���theme/theme/thememanager.xmlpk-!���f���theme/theme/theme1.xmlpk-!
ѐ��'� theme/theme/_rels/thememanager.xml.relspk]�
*>l���� ����%s*m.�39�=ne�fhvh$&'() ,-./0235��=vh%*1�@� @���������h ��0�( �
����0�( �
��b
�s���� ?���������n~)' 7 ���u^imy}��*/hnpz'�!�!p"x"}"�"�%�%�%�%�/00!0�4�4�4�4�4�4�4�4�4�4�4�4�4�4�;�;�;�;l<q<r<w<�<�<====�=�=>>>>>>>!>">$>%>'> >��@7e7�;�;> >33�;�;>>>!>">$>%>'> >$&./1begjjt������yc��� � z
d
�
�
����)ua��!��@j~��� *oz!!!s!]!�!�!b%n%�%�%&&_*l*�*�* # �/�/�/�/00%000i4v4�4�45518>8�8�8�8�8�;�;�;�;b<l<w<x<x<�<�<=�=�=�=�=> >��q04e��n[g],-�o�����`<|��o";0ri1�%�rrsui��w�i�={u�,� uz*�m� �r=��-9h�s��eme�.~��
{r�v�4�1l2q �"�iaha��og>�u��`�1_%v��nh{��q��u�3�d]-�z:kkkkn;�q0�<�?*�7��:a��^b� �l{��2h�(�#!�q��m4-cqrrs�4>�p]�sao-�?��yn�b~i�(��)ib��>!]�.�`
rv:g&>!��}n!�l��2�"�0r��\�|�md-%;�blrbr]�a
6ji� ��vj�`�[jo 5j90�ry �:[�
k 3q-r�jx 8i� tp� k�|�2~�
��y��k�
?i��� *�?=��#??*�@�4le�dw"
���z�g�kd�2�^e�-h�x�w��t�bs &�x�-z�y��w�i�>�:-��u
kkkkdw"
q�x�-h�
k^r�
�^�vxb�
�=#�/y�pur ����
��'ff�x-z�d�y�(��)fk{z��fv��-�p�'�e��4�!~q�2h`�?i��be��@��fk-<"��l�q�u��y/�x{��]^�~76=&����`
[� ��rh&<�^��oc!��d{�/�"���[��h�2��d���t��w�8i� (f�tl(����}�t�a9�~�8��7l��4�";�g)n��p7v}g�xd|��&�h�w�a�g�b�u�d\*�)#jb�l�d�
)r�}��w�gl$l��r�qh� v���/xcz.�^m~;�|p%�fzps7l�ps�#���<>)��s��vj��h5h 5� a�l[�x� xcz�be�yfdxl�y��raj>�n�cr%v��h�a9�� !`��}<�q�}q =�7y]��r�-��.��zf�7��
�e�o[kh,~�hmpm~�mg�=�j��>m�?[%��'w�jo8�l�y2\gqwez ��p]74�`a��m�!�|z��z:�*��b!�g;cq�qq�h�nk^r a�x�t
an�gap�y8��x���s��d���z��j�vzq��t\
~��av'po�_m4�i�w��tkpb�`
rq1��yn�pur �p}��� urep�&>!�z[fxx)!�b!x{�ec!�t�k��oc!�v�>b(p!� ]!�3�l��!nr�q�m�!�j#�g-�!�f�d�[z"�u&z�6'�"�zy�q �"ji�_��m�"� ]!�&�"�)��/�"|z�s\�"=v�g��~#�)9~��k#�� �i3#�#?�=#�i\;�j#p%�sh�#���2k�#�|�#ry �ps�#pb��9�#�sa�d $��yj!4$�`�%�qg$�ep$�"e<@v�$:*�$�[��p�$�]'��?[>�?z]%�`�%vd�i1�%�lyk-,�%�,�=��l�%�z�@�x�%�!0��e&poq�bs &�b*&t�(6=&�'w�rh&2\�qp&nyvc��t�&��&�]'�ep$�tw�'~d:(�r�'�kl��>�'��5�l�'�taz��w(r�@�~d:(�_(it~tl(�x�,�dm�(�t�(�pi�(��]�a#�(�j�`�<>)^e��w)!,�f���)�l�%��)mq{�"*�^�i��le*^l�x�ne*n9��^�*�:8t��[? �v ��o�(s� qh� �`� q�f�� {p���c,@�i��#,�dq[mk, @p�qb,�d&d��,�>m��x�,�{u�,�@�q>,-�m4-rt�h�fk-�r�-�j�n�2@�-�ggc���-x*�y���->o.-dt��t�.��z]�.�x��<}7/d|���y/ds}���/: o=tj�/0�u0{z�o�!0�ran 0gy|�5j90�$�}�;1�0��efw2
�z��>2"o�m�29!"e�w�2�f\�h�2n�~�w�3ui�� �3dj�u�3��x@�4�;�4�d5��p�4@l�5h 5�^b^�
-a5�pv5�d5tw�'��5��5md-�b�5i�d��v�5
-a5�a
6�`d�#6ghch�81�6�&7��6�a�r!�6q1���@�6xx�6)1:t�&7�x�\�~74\�7bd9t=r�7��gr
f8c�]��jo8�~�8���8��b�n9?oi�q�9�a:�kx_�s�:kkkk�3�:�!�q�o";�4mjjo;�i\;�%�|c;�q��viu;�ru�;�~7�[u�u�`fr>�>�'i�>r]��v�>lrb�mt?<#iq!{�?p[5=�tf�?�t�&�?�*��o-�?�mt?�s�?
u|3e�?�-x{�8�?�@}��*.}@��)��-�@�t�`�r�@g��z�@z]%hag;��:a�s6ay8���doahu�(�a�le*�&e�ana��.�an���a�$,&d]�l�d|1�q�i�dbl#g�>e�\���ez�v�n�e�v ��'�e�#�c�hfs�]�=bdf�^^n��z[f�y���f�"�o w~g� l`�#�g�{9=��g=v�g�o�t�{s
h�-h�pv5p@h�og�ghch'\l��&�h�t�e�hoaq�!~q��y#%�q@gku�nr�q�q��qqg$�r)b;r�,�q��0hr�l��zwr�
{r;1�0��y{r�i�r�� �(u�r�$atxcs�#sw/�=fzps8ts)b;r��ts�#�g3%�s�{�s�;�4��g/t�4>�:8t�gn�bd9t]z[t� �m��td $�`�t�s��,!u�rdi�@gku�u0
g�u���uxcs>�uc;�rxyyv�d�^�v4�o�v�j$w�w�w�6�x�m�2:3�x�q�y���x�3�:��o�x�#s^l�x\<�jg�xq>,- q�x�}<��x_/,j�zy��t��`-y<myv��q�yv^mc���y<z�&xfk{z�kd
�zhp��[�enx�:[�=�^�`
[�0�[(>y��f\�?\i�(��\�m��x�\~�f<1/�\�s���7y]�>aqs�]���c�]hv�i���]viu;�]^ph$^�^b^�`.�^�=�^�1_�kx_�a9�ji�_l{�� !`�qb,�� l`�y`� ��t�`�=�}�j�`�qq��u�`�>�`_m�t
a��&na[mk,�9a��q���a��5��>�asq�y�3j�a�zwr�a�t�3b@�z��)ib�u~b1�h��u�b�~#�%;�b@v�$03cd.�b�ggcg-�!�va�c�^����c(�a�u�c�0hr��#�c�j$wvd0q|�`d�d&d�@�m�f�d,-�zn�d�|�#�9!"e2k�#�g e�/e� *^ee����l\e�>e��eme�hgqwe�u
�t�edu�efd��&fji�,\f<}7/��zfs{tq�f3%�s!,�fqx{~�fxx�6�a�f6�f<z�bl#g�^blkqg�j9r��g8|k=�z�g�-9h�k?oi�u�<mebi�rdi�b*&��b~i�y{r4�i�`-y�^�ix�u�nf�i�~7djtj�/v,�j�8�?w�j�`�t�=�j�4�q\<�j�dk�g�tkzl!{�?�klv:g��3�l<|�<ie�lj l�^(m��k��.�mz*�ma�� �m�hn�y`�gn��!�g)nfr>��^^nv��,mn�kj>�nh#�n�gv'po�
���"�o�"�o6gp�e�oh��.�o�r��v�omg���o]z[thptf�?(ap(s� @p�[? bep=r�7�c�p�qp&��dq�vzq� �<#iq�!�q� ���qq =��,�q�w�#!�q{s
h�4�q�a�f�l�q|1�q6s�~r�q3q-rie�l��j9r �3�c;�rn[g� �r�-�@�y0�sb(p!��s{fm-dt�y�)1:to
�v�$at�6�x� 0w?0w?0w?0w?�.�t�/e��t(ap�}�t�o�t�u2�&xph$^�enx[�x,mnf�x&xn
�x�0�<�=.y6�f�� oyrgox*�y�x�u��yd]-sq�y7���yxl�y�t�.��y];yw��y�w��u&z�*n{��tazr=��whkzjx �.tzji��z@�z�.�o���z�`�o��%�z�q�wv{�nh{$,&d�*n{�s�?mq{
hr{��6�jbs{�-x{qx{�@�6m�{�d��0q|�~�vgy|��s�
u|�[|�w)�\�| w~g;�|�g ek�|�.�t�y>�|b�5�ds}xyyv�p}�r>�$�}dm�(�m�}j<�v��=�}jbs{�q�}\
~�=�h,~03c��)9~whkzit~�;�~j{�~0�n�n�~l�s{t�<(>y\*�4e�z �j�{p�4\�7��(k�i����x��m�j�����[w�3`2 r� �p
j^�n�_ati�wb��.h j<sh�to>s�r#�l$�}&�m'�m(�)%j,�p.�i/�2�z2'4t4.6�6*8;i8cj8�9�e=k&>e!@jj@r7a�ec�nd�udvf0i4tj�kul%man�0p�%smkxgy�py�^ro_5a�7ahc
2e�lf�qf�)gjmi�ckalthllmnnm}on[r�ps0@ui1vywm8xicy�x}�/�wt�mw��=��=��`�j�nj��9�l�.~�v�=h��j��~�du�� �=i�fj�to�4��m��2�)w���lz���c�7�u<�[��t��r��������^�v��\�a�vi�|w�r�����$?��
��!�s/����8�*��]��-��_�$-��f�><����r����c��_�7"����s�?5�����"�gl�bj�h��-���
��"�w�p�2����y����e�`-�|�>>�@��;�;�;�;l;<�=*>�@�"�h@�d��@��@��unknown������������g��.�[x� �times new roman5��symbol3.��.�[x� �arial7.���[ @�verdana;���(�[sosimsuna����$b�cambria math 1��h;"�fkz�g�ke �4pe �4p!-!),.:;?]}���� & 6"0000 00
00000��� ������=�@�\�]�^���([{� 0
000000��;�[�����������=�= 2�q��hp��?�����������������������"�2!xx����r���user
windows (u7b2 > ���i ���z'��`���i���z'����
�����oh�� '��0`������� ��
(
4@hpx�usernormal.dotmwindows �û�134microsoft office word@b�2@�y��\�@j�ө�e �4��
��՜.�� ,��0�
x`t|�������microsoftp�=
!"#$%&'()* ,-./0123456����89:;<=>����@abcdefghijklmnopqrstuvwxyz[\]^_`abcdefghi����klmnopq����stuvwxy��������|����������������root entry�������� �f���$ө�~�data
������������71table����?uworddocument����2lsummaryinformation(������������jdocumentsummaryinformation8��������rcompobj������������n������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������
���� �fmicrosoft word 97-2003 �ĵ�
msworddocword.document.8�9�q