Electronic Markets:
1he principle íunction oí an electronic market is to íacilitate the search
íor the required product or ser·ice. Airline booking svstems are an
example oí an electronic market.

Electronic Data Interchange (EDI):
LDI pro·ides íor the eííicient transaction oí recurrent trade exchanges
between commercial organizations. LDI is widelv used bv. íor example.
large retail groups and ·ehicle assemblers when trading with their

Internet Commerce
1he Internet and similar network íacilities, can be used íor ad·ertising
goods and ser·ices and transacting one-oíí deals.Internet commerce has
application íor both business-to-business and business to consumer
lig 1.1 : 1he three categories oí L (ommerce

The Scope of Electronic Commerce
Llectronic (ommerce e-(ommerce, is a term popularized bv the
ad·ent oí commercial ser·ices on the Internet. Internet e-(ommerce is
howe·er. onlv one part oí the o·erall sphere oí
e-(ommerce. 1he commercial use oí the Internet is perhaps tvpiíied bv
once-oíí sales to consumers. Other tvpes oí transactions use other
technologies. Llectronic Markets LMs, are in use in a number oí trade
segments with an emphasis on search íacilities and Llectronic Data
Interchange LDI, is used íor regular and standardized transactions
between organizations. 1he
mainstream oí e-(ommerce consists oí these three areas: these are
represented as a diagram in ligure 1.1 and outlined in a little more detail

Electronic Markets
An electronic market is the use oí iníormation and communications
technologv to present a range oí oííerings a·ailable in a market segment
so that the purchaser can compare the prices and other attributes, oí
the oííerings and make a purchase decision. 1he usual example oí an
electronic market is an airline booking svstem.

Electronic Data Interchange (EDI)
LDI pro·ides a standardized svstem íor coding trade transactions so
that thev can be communicated directlv írom one computer svstem to
another without the need íor printed
orders and in·oices and the delavs and errors implicit in paper handling.
LDI is used bv organizations that make a large number oí regular
transactions. One sector where LDI is
extensi·elv used is the large supermarket chains. which use LDI íor
transactions with their suppliers.

Internet Commerce
Iníormation and communications technologies can also be used to
ad·ertise and make once-oíí sales oí a wide range oí goods and ser·ices.
1his tvpe oí e-(ommerce is tvpiíied bv the commercial use oí the
Internet. 1he Internet can. íor example. be used íor the purchase oí
books that are then deli·ered bv post or the booking oí tickets that can
be picked up bv the clients when thev arri·e at the e·ent. It is to be
noted that the Internet is not the
onlv technologv used íor this tvpe oí ser·ice and this is not the onlv use
oí the Internet in e-(ommerce.

Usage of Electronic Markets
Llectronic markets are exampled bv the airline booking
svstems.Llectronic markets are also used in the íinancial and commoditv
markets and again the dealing is done ·ia intermediaries: to buv
stocks and shares a member oí the public uses the ser·ices oí a
stockbroker. Arguablv the use oí electronic markets has ser·ed the
customer well. \ith the assistance oí a good tra·el agent the
airline customer can be iníormed oí all the ílights a·ailable íor an
intended journev and then select. on the basis oí
price.con·enience.lovaltv scheme. etc. the ílight that thev wish to book.

Advantages and Disadvantages of Electronic Markets
1he ad·antages oí an electronic market to the customer are selí e·ident.
Using an airline booking svstem. íor example. there is a screen that
shows all the ílights írom sav, New \ork to Los Angeles and the
consumer can make an iníormed choice without
ha·ing to spend time and eííort íinding out which airlines ílv that route
and then contacting each oí the airlines to obtain ílight times. price and
a·ailabilitv details. Once a ílight is selected the svstem íacilitates the
booking oí that ílight. paving the íare and printing the ticket.
lor the seller the ad·antages are less e·ident. 1he seller that is the most
competiti·e mav do well. the electronic market makes a·ailable
iníormation on their product and the ad·antage oí that oííering should
be apparent. Less competiti·e suppliers are likelv to be íorced into price.
Reductions and the competiti·e eííect mav íorce all suppliers to cut
prices. possiblv below the le·el at which it is possible to make a proíit
as in the case on some air transport routes,.

Iig J.2: Basic transactions in LDI
1he abo·e íigure shows the basic transactions which take place between
two business organizations. Let`s see the beneíits when these
transactions are not taking manuallv but through computer svstems and
that is known as LDI.
The Benefits of EDI
LDI can bring a number oí ad·antages to the organizations that use it.
It should sa·e considerable time on the exchange oí business
transactions and has the potential íor considerable sa·ings in costs. LDI
can be simplv used to replace paper transactions with electronic
transactions - this is the normal route taken in the initial installation oí
LDI. 1he íull ad·antage oí LDI is onlv realized when business practices
are restructured to make íull use oí the potential oí LDI: when LDI is
used as an enabling technologv to change the wav the business operates-
just-in-time JI1, manuíacture and quick response supplv being prime
examples oí where LDI is used as an enabling technologv to gain
competiti·e ad·antage.
The direct advantages of EDI include:
Shortened Ordering Time
Paper orders ha·e to be printed. en·eloped and sent out bv the
customer`s post room. passed through the postal ser·ice. recei·ed bv the
supplier`s post room. and input to the supplier`s order processing
svstem. 1o achie·e all this. reliablv. in under three davs would be to do
·erv well. LDI orders are sent straight into the network and the onlv
delav is how oíten the supplier retrie·es messages írom the svstem.
Orders can be in the supplier`s svstem within a dav. or ií there is urgencv
the messages can be retrie·ed more írequencv. íor example e·erv hour.
Cost Cutting
1he use oí LDI can cut costs. 1hese include the costs oí stationerv and
postage but these will probablv be íullv matched bv the costs oí running
the LDI ser·ice. 1he principle sa·ing írom the use oí LDI is the
potential to sa·e staíí costs. 1he ob·ious example oí this is that ií the
orders are directlv input to the svstem there is no need íor an order entrv
clerk. Note also that seasonal peak. staíí holidavs. etc. no longer create a
backlog in the order entrv area. 1he cost sa·ing need to be oííset against
the svstem de·elopment and network casts.
Elimination of Errors
Keving anv iníormation into a computer svstem is a source oí errors and
keving paper orders into the order processing svstem is no exception.
LDI eliminates this source oí errors. On the down side. there is no
order entrv clerk who might ha·e spotted errors made bv the customer -
the customer will get what the customer asked íor.
ast Response
\ith paper orders it would be se·eral davs beíore the customer was
iníormed oí anv supplv diííicultv. such as the product is out oí stock.
\ith alternati·e product to be ordered or an alternati·e supplier to be
Accurate Invoicing
Just like orders. in·oices can be sent electronicallv. LDI in·oices ha·e
similar ad·antages to LDI orders in sa·ed time and a·oided errors.
lowe·er. the major ad·antage in LDI in·oices is that thev can be
automaticallv matched against the original order and cleared íor pavment
without the sort oí queries that arise when paper in·oices are matched
to orders.
EDI Payment
Pavment can also be made bv LDI. 1he LDI pavment svstem can also
generate an LDI pavment ad·ice that can be electronicallv matched
against the rele·ant in·oices. again a·oiding querv and delav.

Indirect advantages of the use of EDI can be:
Reduced Stock Holding
1he abilitv to order regularlv and quicklv reduces the amount oí goods
that need to be kept in a store room or warehouse at the shop or the
íactorv. lor manv JI1 manuíacture and quick response supplv svstems
stockholding is eliminated altogether with goods being deli·ered onlv as
thev are needed. Reduced stock holding cuts the cost oí warehousing.
the double handling goods into store and then out again onto the
íactorv or shop, and the capital requirement to pav íor the goods that
are just sitting in store.
Cash low
Speeding up the trade cvcle bv getting in·oices out quicklv. and
directlv matched to the corresponding orders and deli·eries. can
and should speed up pavments and hence impro·e cash ílow.
Llimination oí most in·oice queries can be particularlv signiíicant
in reducing delavs in pavments.
Business Opportunities
1here is a steadv increase in the number oí customers. particularlv
large. poweríul customers. that will onlv trade with suppliers that
do business ·ia LDI. Supermarkets and ·ehicle assemblers are
prime examples. Being readv and able to trade electronicallv can be
an ad·antage when competing íor new business.
Customer Lock-in
An established LDI svstem should be oí considerable ad·antage
to both customer and supplier. Switching to a new supplier
requires that the electronic trading svstem and trading relationship
be rede·eloped. a problem to be a·oided ií a switch oí supplier is
not essential.
1o gain these ad·antages LDI has to be seen as an in·estment
there are costs upíront and the pavback is longer term. 1he costs is
the set up oí the LDI svstem hardware. soítware and network,
and the time required to establish agreements with trading partners.
1he sa·ings onlv start when there is a signiíicant ·olume oí
business transacted using LDI. a point that is called the critical
mass` in the jargon oí LDI.

OLlectronic (ommerce e-(ommerce, is a general concept
co·ering anv íorm oí business transaction or iníormation
exchange executed using iníormation and communication
technologies I(1s,.
OL-(ommerce takes place between companies. between
companies and their customers. or between companies and
public administrations.
OLlectronic (ommerce includes electronic trading oí goods.
ser·ices and electronic material.
OAn electronic market is the use oí iníormation and
communications technologv to present a range oí oííerings
a·ailable in a market segment so that the purchaser can
compare the prices and other attributes, oí the oííerings
and make a purchase decision.
OLDI pro·ides a standardized svstem íor coding trade
transactions so that thev can be communicated directlv írom
one computer svstem to another without the need íor
printed orders and in·oices and the delavs and errors implicit
in paper handling.
OIníormation and communications technologies can also be
used to ad·ertise and make once-oíí sales oí a wide range oí
goods and ser·ices. 1his tvpe oí e-(ommerce is tvpiíied bv
the commercial use oí the Internet.

OCategories of L commerce
OBenefits and limitations of L Commerce
O Comparison between 1raditional Commerce and


ODescribe the categories of L commerce
ODescribe the benefits and limitations of L Commerce
In the pre·ious lecture we di·ided the applications oí L commerce
in three categories. todav we will di·ide categorize L commerce
according to the parties in·ol·ed in the business.
Business-to-business (B2B). Most oí L( todav is oí this
tvpe. It includes the LDI transactions described earlier and
electronic market transactions between organizations.
OBusiness-to-consumer (B2C). 1hese are retailing
transactions with indi·idual shoppers. 1he tvpical shopper at
Amazon.com is a consumer. or customer.
OConsumer-to-consumer (C2C). In this categorv consumer
sells directlv to consumers. Lxamples are indi·iduals selling
in classiíied ads e.g.. www.clas-siíied2000.com, and selling
residential propertv. cars. and so on. Ad·ertising personal
ser·ices on the Internet and selling knowledge and expertise
is another example oí (2(. Se·eral auction sites allow
indi·iduals to put items up íor auctions. linallv. manv
indi·iduals are using intranets and other organizational
internal networks to ad·ertise items íor sale or ser·ices.
OConsumer-to-business (C2B). 1his categorv includes
indi·iduals who sell products or ser·ices to organizations. as
well as indi·iduals who seek sellers. interact with them. and
conclude a transaction.
Oonbusiness LC. An increased number oí nonbusiness
institutions such as academic institutions. not-íor-proíit
organizations. religious organizations. social organizations.
and go·ernment agencies are using ·arious tvpes oí L( to
reduce their expenses e.g.. impro·e purchasing, or to
impro·e their operations and customer ser·ice. Note that in
the pre·ious categories one can usuallv replace the word
business with organization.,
OIntrabusiness (organizational) LC. In this categorv we
include all internal organizational acti·ities. usuallv
períormed on intranets. that in·ol·e exchange oí goods.
ser·ices or iníormation. Acti·ities can range írom selling
corporate products to Lmplovees to online training and cost
reduction acti·ities.
L·ervthing has its pros and cons. same is with L (ommerce. lets
ha·e a look.
Benefits and Limitations
The Benefits of EC
lew inno·ations in human historv encompass as manv potential
beneíits as L( does. 1he global nature oí the technologv. low
cost. opportunitv to reach hundreds oí millions oí people
projected within 10 vears,. interacti·e nature. ·arietv oí
possibilities. and resourceíulness and rapid growth oí the
supporting inírastructures especiallv the \eb, result in manv
potential beneíits to organizations. indi·iduals. and societv. 1hese
beneíits are just starting to materialize. but thev will increase
signiíicantlv as L( expands.

Benefits to Organizations
The benefits to organizations are as follows:
OLlectronic commerce expands the marketplace to national
and international markets. \ith minimal capital outlav. a
companv can easilv and quicklv locate more customers. the
best suppliers. and the most suitable business partners
worldwide. lor example. in 199¯. Boeing (orporation
reported a sa·ings oí 20 percent aíter a request íor a proposal
to manuíacture a subsvstem was posted on the Internet. A
small ·endor in lungarv answered the request and won the
electronic bid. Not onlv was the subsvstem cheaper. but it
was deli·ered quicklv.
OLlectronic commerce decreases the cost oí creating. processing.
distributing. storing. and retrie·ing paper-based iníormation. lor
example. bv introducing an electronic procurement svstem. companies
can cut the purchasing administrati·e costs bv as much as 85 percent.
Another example is beneíit pavments. lor the U.S. íederal
go·ernment. the cost oí issuing a paper check is 430. 1he
cost oí electronic pavment is 20.
OAbilitv íor creating highlv specialized businesses. lor example. dog
tovs which can be purchased onlv in pet shops or department and
discounte stores in the phvsical world. are sold now in a specialized
www.dogtovs.com also see www.cattovs.com,.
OLlectronic commerce allows reduced in·entories and
o·erhead bv íacilitating pull`-tvpe supplv chain
management. In a pull-tvpe svstem the process starts írom
customer orders and uses just-in-time manuíacturing.
O1he pull-tvpe processing enables expensi·e customization
oí products and ser·ices. which pro·ides competiti·e
ad·antage to its implementers. A classic example is Dell
(omputer (orp.. whose case will be described later.
OLlectronic commerce reduces the time between the outlav oí
capital and the receipt oí products and ser·ices.
OLlectronic commerce initiates business processes
reengineering projects. Bv changing processes. producti·itv
oí salespeople. knowledge workers. and administrators can
increase bv 100 percent or more.
OLlectronic commerce lowers telecommunications cost-the
Internet is much cheaper than VANs.
OOther beneíits include impro·ed image. impro·ed customer
ser·ice. newíound business partners. simpliíied processes.
compressed cvcle and deli·erv time. increased producti·itv.
eliminating paper. expediting access to iníormation. reduced
transportation costs. and increased ílexibilitv.
Benefits to Consumers
1he beneíits oí L( to consumers are as íollows:
OLlectronic commerce enables customers to shop or do other
transactions 24 hours a dav. all vear round. írom almost anv
OLlectronic commerce pro·ides customers with more choices:
thev can select Llectronic commerce írequentlv pro·ides
customers with less expensi·e products and ser·ices bv
allowing them to shop in manv places and conduct quick
OIn some cases. especiallv with digitized products. L( allows
quick deli·erv.
O(ustomers can recei·e rele·ant and detailed iníormation in
seconds. rather than davs or weeks.
OLlectronic commerce makes it possible to participate in
·irtual auctions.
OLlectronic commerce allows customers to interact with other
customers in electronic communities and exchange ideas as
well as compare experiences.
OLlectronic commerce íacilitates competition. which results in
substantial discounts.
Benefits to Society
1he beneíits oí L( to societv are as íollows:
OLlectronic commerce enables more indi·iduals to work at
home and to do less tra·eling íor shopping. resulting in less
traííic on the roads and lower air pollution.
OLlectronic commerce allows some merchandise to be sold at
lower prices. so less aííluent people can buv more and
increase their standard oí li·ing.
OLlectronic commerce enables people in 1hird \orld
countries and rural areas to enjov products and ser·ices that
otherwise are not a·ailable to them.
O1his includes opportunities to learn proíessions and earn
college degrees.
OLlectronic commerce íacilitates deli·erv oí public ser·ices.
such as health care. education. and distribution oí
go·ernment social ser·ices at a reduced cost and´or
impro·ed qualitv. lealth-care ser·ices. íor example. can reach
patients in rural areas.

1he limitations oí L( can be grouped into technical and
nontechnical categories.
Technical Limitations of EC
1he technical limitations oí L( are as íollows:
O1here is a lack oí svstem securitv. reliabilitv. standards. and
some communication protocols.
O1here is insuííicient telecommunication bandwidth.
O1he soítware de·elopment tools are still e·ol·ing and
changing rapidlv.
OIt is diííicult to integrate the Internet and L( soítware with
some existing applications and databases.
OVendors mav need special \eb ser·ers and other
inírastructures. in addition to the network ser·ers.
OSome L( soítware might not íit with some hardware. or
mav be incompatible with some operating svstems or other
As time passes. these limitations will lessen or be o·ercome:
appropriate planning can minimize their impact.
NonTechnical Limitations
Oí the manv nontechnical limitations that slow the spread oí
L(. the íollowing are the major ones.
O(ost and justiíication 1he cost oí de·eloping L( in-house
can be ·erv high. and mistakes due to lack oí experience mav
result in delavs. 1here are manv opportunities íor
outsourcing. but where and how to do it is not a simple
issue. lurthermore. to justiív the svstem one must deal with
some intangible beneíits such as impro·ed customer ser·ice
and the ·alue oí ad·ertisement,. which are diííicult to
OSecuritv and pri·acv 1hese issues are especiallv important in
the B2( area. especiallv securitv issues which are percei·ed to
be more serious than thev reallv are when appropriate
encrvption is used. Pri·acv measures are constantlv impro·ed.
\et. the customers percei·e these issues as ·erv important.
and. the L( industrv has a ·erv long and diííicult task oí
con·incing customers that online transactions and pri·acv
are. in íact. ·erv secure.
OLack oí trust and user resistance (ustomers do not trust an
unknown íaceless seller sometimes thev do not trust e·en
known ones,. paperless transactions. and electronic monev.
So switching írom phvsical to ·irtual stores mav be diííicult.
OOther limiting íactors. Lack oí touch and íeel online. Some
customers like to touch items such as clothes and like to
know exactlv what thev are buving.
OManv legal issues are as vet unresol·ed. and go·ernment
regulations and standards are not reíined enough íor manv
OLlectronic commerce. as a discipline. is still e·ol·ing and
changing rapidlv. Manv people are looking íor a stable area
beíore thev enter into it.
O1here are not enough support ser·ices. lor example.
copvright clearance centers íor L( transactions do not exist.
and high-qualitv e·aluators. or qualiíied L( tax experts. are
OIn most applications there are not vet enough sellers and
buvers íor proíitable
OLlectronic commerce could result in a breakdown oí human
OAccessibilitv to the Internet is still expensi·e and´or
incon·enient íor manv potential customers. \ith \eb 1V.
cell telephone access. kiosks. and constant media attention.
the critical mass will e·entuallv de·elop.,
Despite these limitations. rapid progress in L( is taking place. lor
example. the number oí people in the United States who buv and
sell stocks electronicallv increased írom 300.000 at the beginning
oí 1996 to about 10 million in íall 1999. As experience accumulates
and technologv impro·es. the ratio oí L( beneíits to costs will
increase. resulting in a greater rate oí L( adoption. 1he potential
beneíits mav not be con·incing enough reasons to start L( acti·ities
O\e can categorize L commerce according to the parties
in·ol·ed in the business like B2B. B2(. (2( and (2B
O1he beneíits oí L (ommerce to Organizations include
expansion oí the marketplace to national and international
markets. decreases in the cost oí creating. processing.
distributing. storing. and retrie·ing paper-based
iníormation. reduction in in·entories
OL commerce enables customers to shop or do other
transactions 24 hours a dav and pro·ides customers with
more choices
OLlectronic commerce íacilitates deli·erv oí public ser·ices.
such as health care. education. and distribution oí
go·ernment social ser·ices at a reduced cost and´or
impro·ed qualitv
OLimitations oí L (ommerce can be technical like lack oí
svstem securitv. reliabilitv. standards. and some
communication protocols and non technical limitations like
the cost in·ol·e in de·eloping in house L (ommerce and the
securitv oí data


A computer network is an interconnection oI various computer systems
located at diIIerent places. In computer network two or more computers are
linked together with a medium and data communication devices Ior the
purpose oI communicating data and sharing resources. The computer that
provides resources to other computers on a network is known as server. In
the network the individual computers, which access shared network
resources, are known as workstations or nodes.
Computer Networks may be classiIied on the basis oI geographical area in
two broad categories.
1. Local Area Network (LAN)
2. Wide Area Network (WAN)

Local Area Network
Networks used to interconnect computers in a single room, rooms within a
building or buildings on one site are called Local Area Network (LAN). LAN
transmits data with a speed oI several megabits per second (106 bits per
second). The transmission medium is normally coaxial cables.
LAN links computers, i.e., soItware and hardware, in the same area Ior the
purpose oI sharing inIormation. Usually LAN links computers within a limited
geographical area because they must be connected by a cable, which is quite
expensive. People working in LAN get more capabilities in data processing,
work processing and other inIormation exchange compared to stand-alone
computers. Because oI this inIormation exchange most oI the business and
government organisations are using LAN.
Major Characteristics of LAN
O very computer has the potential to communicate with any other
computers oI the network
O high degree oI interconnection between computers
O easy physical connection oI computers in a network
O inexpensive medium oI data transmission
O high data transmission rate

O The reliability oI network is high because the Iailure oI one
computer in the network does not eIIect the Iunctioning Ior other computers.
O Addition oI new computer to network is easy.
O igh rate oI data transmission is possible.
OPeripheral devices like magnetic disk and printer can be shared by other

O II the communication line Iails, the entire network system breaks down.

Use of LAN
Followings are the maior areas where LAN is normally used
O File transIers and Access
O Word and text processing
O lectronic message handling
O #emote database access
O Personal computing
O igital voice transmission and storage

Wide Area Network
The term Wide Area Network (WAN) is used to describe a computer network
spanning a regional, national or global area. For example, Ior a large company
the head quarters might be at elhi and regional branches at Bombay, Madras,
Bangalore and Calcutta. ere regional centers are connected to head quarters
through WAN. The distance between computers connected to WAN is larger.
ThereIore the transmission medium used are normally telephone lines,
microwaves and satellite links.

Characteristics of WAN
Followings are the maior characteristics oI WAN.
1. Communication acility: For a big company spanning over diIIerent parts
oI the country the employees can save long distance phone calls and it
overcomes the time lag in overseas communications. Computer conIerencing
is another use oI WAN where users communicate with each other through
their computer system.
2. Remote Data Entry: #emote data entry is possible in WAN. It means
sitting at any location you can enter data, update data and query other
inIormation oI any computer attached to the WAN but located in other cities.
For example, suppose you are sitting at Madras and want to see some data oI
a computer located at elhi, you can do it through WAN.
3. Centralised Information: In modern computerised environment you will
Iind that big organisations go Ior centralised data storage. This means iI the
organisation is spread over many cities, they keep their important business
data in a single place. As the data are generated at diIIerent sites, WAN
permits collection oI this data Irom diIIerent sites and save at a single site.

Examples of WAN
1. Ethernet: thernet developed by Xerox Corporation is a Iamous example oI
WAN. This network uses coaxial cables Ior data transmission. Special
integrated circuit chips called controllers are used to connect equipment to
the cable.
2. Aparnet: The Aparnet is another example oI WAN. It was developed at
Advanced #esearch Proiects Agency oI U. S. epartment. This Network
connects more than 40 universities and institutions throughout USA and

Difference between LAN and WAN
. LAN is restricted to limited geographical area oI Iew kilometers. But
WAN covers great distance and operate nationwide or even worldwide.
. In LAN, the computer terminals and peripheral devices are
connected with wires and coaxial cables. In WAN there is no physical
connection. Communication is done through telephone lines and satellite links.
. Cost oI data transmission in LAN is less because the transmission
medium is owned by a single organisation. In case oI WAN the cost oI data
transmission is very high because the transmission medium used are hired,
either telephone lines or satellite links.

The Internet is a network oI networks. Millions oI computers all over the
world are connected through the Internet. Computer users on the Internet can
contact one another anywhere in the world. II your computer is connected to
the Internet, you can connect to millions oI computers. You can gather
inIormation and distribute your data. It is very much similar to the telephone
connection where you can talk with any person anywhere in the world.
In Internet a huge resource oI inIormation is accessible to people across the
world. InIormation in every Iield starting Irom education, science, health,
medicine, history, and geography to business, news, etc. can be retrieved
through Internet. You can also download programs and soItware packages
Irom anywhere in the world. ue to the tremendous inIormation resources the
Internet can provide, it is now indispensable to every organisation.

Origin of Internet
In 1969 epartment oI eIence () oI USA started a network called
A#PANT (Advanced #esearch Proiects Administration Network) with one
computer at CaliIornia and three at Utah. Later on other universities and # &
institutions were allowed to connect to the Network. APA#NT quickly grew
to encompass the entire American continent and became a huge success. very
university in the country wanted to become a part oI A#PANT. So the
network was broken into two smaller parts MILNT Ior managing military sites
and A#PANT (smaller) Ior managing non-military sites. Around 1980,
NSFNT (National Science Foundation Network) was created. With the
advancement oI modern communication Iacilities, other computers were also
allowed to be linked up with any computer oI NSFNT. By 1990 many
computers were looking up to NSFNT giving birth to Internet.
How Internet functions
Internet is not a governmental organisation. The ultimate authority oI the
Internet is the Internet Society. This is a voluntary membership organisation
whose purpose is to promote global inIormation exchange. Internet has more
than one million computers attached to it.
-mail stands Ior electronic mail. This is one oI the most widely used Ieatures
oI Internet. Mails are regularly used today where with the help oI postage stamp
we can transIer mails anywhere in the world. With electronic mail the service is
similar. But here data are transmitted through Internet and thereIore within
minutes the message reaches the destination may it be anywhere in the world.
ThereIore the mailing system is excessively Iast and is being used widely Ior
mail transIer.


O1ypes of Llectronic Payment $ystems
O1ypes of digital tokens
ODiscuss L-Cash

OUnderstand what is an Llectronic Pavment Svstem
ODescribe e-cash as one oí the Llectronic Pavment Svstems
All oí vou might ha·e heard the term Llectronic Pavment`. As
the name is suggesting it means making pavments electronicallv
i.e. through computer and telecommunication components.
Let`s Discuss this in more Detail
Types of Electronic Payment Systems
Llectronic pavment svstems are proliíerating in banking. retail.
health care. on-line markets. and e·en go·ernment-in íact. anvwhere
monev needs to change hands. Organizations are moti·ated bv
the need to deli·er products and ser·ices more cost eííecti·elv and
to pro·ide a higher qualitv oí ser·ice to customers. 1his section
will brieílv describe the pertinent de·elopments in ·arious
industries to pro·ide an o·erall picture oí electronic pavment
svstems oí the past and present.
Research into electronic pavment svstems íor consumers can be
traced back to the 1940s. and the íirst applications-credit cardsappeared
soon aíter. In the earlv 19¯0s. the emerging electronic
pavment technologv was labeled electronic funds transfer (LI1).
Ll1 is deíined as anv transíer oí íunds initiated through an
electronic terminal. telephonic instrument. or computer or magnetic
tape so as to order. instruct. or authorize a íinancial institution to
debit or credit an account.` Ll1 utilizes computer and
telecommunication components both to supplv and to transíer
monev or íinancial assets.
1ransíer is iníormation-based and intangible. 1hus Ll1 stands
in marked contrast to con·entional monev and pavment modes
that relv on phvsical deli·erv oí cash or checks or other paper
orders to pav, bv truck. train. or airplane. \ork on Ll1 can be
segmented into three broad categories:
Banking and inancial Payments
OLarge-scale or wholesale pavments e.g.. bank-to-bank
OSmall-scale or retail pavments e.g.. automated teller machines
and cash dispensers,
Olome banking e.g.. bill pavment,
Retailing Payments
O(redit cards e.g.. VISA or Master(ard,
OPri·ate label credit´debit cards e.g.. J.(. Pennev (ard,
O(harge cards e.g.. American Lxpress,
On-line electronic commerce payments
O1oken-based pavment svstems
Llectronic cash e.g.. Digi(ash,
Llectronic checks e.g.. Net(heque,
Smart cards or debit cards e.g.. Mondex Llectronic (urrencv (ard,

Credit card-based payment systems
Lncrvpted credit cards e.g.. \orld \ide \eb íormbased
encrvption, 1hird-partv authorization numbers e.g.. lirst Virtual,
Period Innovation
BC Larliest coins produced in western 1urkev to pav
mercenaries or taxes.
J4 lirst banks open. in Italv and (atalonia. honoring
checks against cash reser·es.
J694 1he Bank oí Lngland opens. creating deposits on the
- principle that not all deposit receipts will be presented
íor redemption simultaneouslv. 1he bank
monopolizes the issuing oí bank notes.
J865 A sample oí pavments into British banks shows. that
9¯ percent are made bv check.
J88 1he phrase credit card is coined in Looking Backward. a
no·el bv Ldward Bellamv.
J88-J9J4 levdav oí the gold standard as major currencies are
pegged to gold at íixed rates.
J945 Bretton \oods agreement links currencies to gold ·ia
their íixed parities with the U.S. dollar.
J94 llatbush National Bank issues íirst general purpose
credit card. íor use in select New \ork shops.
J95 Diners (lub (harge (ard introduced mid 1950s 1he
de·elopment oí magnetic ink character recognition
MI(R,. íacilitating more timelv processing oí checks.
sealed the check`s standing as the preíerred noncash
pavment option.
J958 BankAmerica. in lresno. (aliíornia. executes the íirst
mass mailing oí credit cards.
J96 \estminster Bank installs íirst automated teller
machine at Victoria. London. branch.
J9 1he New \ork (learing louse launches (lIPS the
(learing louse Interbank Pavments Svstem-which
pro·ides U.S.-dollar íunds-transíer and transaction
settlements on-line and in real time.
late J9s (hemical Bank launches its Pronto svstem pro·iding
3000 computer terminals to customers` homes linked
to its central computers b· telephone.
It oííers a range oí íacilities: balance inquiries. monev transíers
between (hemical Bank accounts. jind bill pavments to selected
local stores.1he stumbling block íor íirst-generation home
banking svstems in general was who is to pav íor the terminals at
J985 Llectronic data interchange LDI, extensi·elv used in
bank-to-bank pavment svstems.
J994 Digital cash trials bv Digi(ash oí lolland conducted
J995 Mondex electronic currencv trials begin in Swindon.
Let`s discuss ·arious tvpes oí Llectronic pavment svstems.
lirstlv we will ha·e a look on Llectronic 1okens`.
Digital 1oken-Based Llectronic Pavment Svstems
None oí the banking or retailing pavment methods are completelv
adequate in their present íorm íor the consumer oriented ecommerce
en·ironment. 1heir deíiciencv is their assumption that
the parties will at some time or other be in each other`s phvsical
presence or that there will be a suííicient delav in the pavment
process íor írauds. o·erdraíts. and other undesirables to be
identiíied and corrected. 1hese assumptions mav not hold íor
ecommerce and so manv oí these pavment mechanisms are being
modiíied and adapted íor the conduct oí business o·er networks.
Lntirelv new íorms oí íinancial instruments are also being
de·eloped. One such new íinancial instrument is electronic
tokens` in the íorm oí electronic cash´monev or checks.
Llectronic tokens are designed as electronic analogs oí ·arious
íorms oí pavment backed bv a bank or íinancial institution. Simplv
stated. electronic tokens are equi·alent to cash that is backed bv a
Electronic Tokens are of Three Types:
J. Cash or real-time. 1ransactions are settled with the
exchange oí electronic currencv. An example oí on-line
currencv exchange is electronic cash e-cash,.
2. Debit or prepaid. Users pav in ad·ance íor the pri·ilege oí
getting iníormation. Lxamples oí prepaid pavment
mechanisms are stored in smart cards and electronic purses
that store electronic monev.
3. Credit or postpaid. 1he ser·er authenticates the customers
and ·eriíies with the bank that íunds are adequate beíore
purchase. Lxamples oí postpaid mechanisms are credit´
debit cards and electronic checks.
1he íollowing sections examine these methods oí on-line
pavment. But we must íirst understand the diííerent ·iewpoints
that these pavment instruments bring to electronic commerce.
lere are íour dimensions that are useíul íor analvzing the diííerent
1. 1he nature oí the transaction íor which the instrument is
designed. Some-tokens are-speciíicallv designed to handle
micro pavments. that is. pavments íor small snippets oí
iníormation. Others are designed íor more traditional
products. Some svstems target speciíic niche transactions:
others seek more general transactions. 1he kev is-to identiív
the parties in·ol·ed. the a·erage amounts. and the purchase
2. 1he means oí settlement used. 1okens must be backed bv
cash. credit. elec-tronic bill pavments prearranged and
spontaneous,. cashier`s checks. lOUs. letters and lines oí
credit. and wire transíers. to name a íew. Lach option incurs
trade-oíís among transaction speed. risk. and cost. Most
transaction settlement methods use (redit cards. while
others use other proxies íor ·alue. eííecti·elv creating
currencies oí dubious liquiditv and with interesting tax. risk.
and íloat implications.
3. Approach to securitv. anonvmitv. and authentication.
Llectronic tokens ·arv in the protection oí pri·acv and
coníidentialitv oí the transactions. Some mav be more open
to potentiallv prving eves-or e·en to the participants
themsel·es. Lncrvption can help with authentication. non
reputabilitv. and asset management.
4. 1he question oí risk. \ho assumes what kind oí risk at
what time· 1he tokens might suddenlv become worthless
and the customers might ha·e the currencv that nobodv will
accept. Ií the svstem stores ·alue in a smart card. consumers
mav be exposed to risk as thev hold static assets. Also
electronic tokens might be subject to discounting or
arbitrage. Risk also arises ií the transaction has long lag times
between product deli·erv and pavments to merchants. 1his
exposes merchants to the risk that buvers don`t pav-or ·ice
·ersa that the ·endor doesn`t deli·er.
Let`s discus Llectronic cash (e-cash) which is a new concept in online
pavment svstems because it combines computerized con·enience with
securitv and pri·acv that impro·e on paper cash. Its ·ersatilitv opens up
a host oí new markets and applications.L-cash presents some interesting
characteristics that should make it an attracti·e alternati·e íor pavment
o·er the Internet.
lectronic Cash (-cash)
L-cash íocuses on replacing cash as the principal. pavment ·ehicle
in consumer-oriented electronic pavments. Although it mav be
surprising to some. cash is still the most pre·alent consumer
pavment instrument e·en aíter thirtv vears oí continuous
de·elopments in electronic pavment svstems.
Cash remains the dominant form of payment for three
1, lack oí trust in the banking svstem.
2, ineííicient clearing and settlement oí non-cash transactions.
3, negati·e real interest rates paid on bank deposits.
1hese reasons seem like issues seen primarilv in de·eloping
countries. Not true. L·en in the most industrialized countries.
the ratio oí notes and coins in circulation per capita is quite large
and is estimated to range írom >446 to >2¯48. (onsider the
situation in two oí the most industrialized nations in world: the
United States and the United Kingdom. In the United States.
there supposedlv was about >300 billion oí notes and coins in
circulation in 1992. Interestinglv. this .number is not shrinking
but growing at approximatelv 8 percent per vear. Deposits bv
check are growing bv onlv 6 percent per vear. It has been reported
that in the United Kingdom about a quarter oí all spontaneous`
pavments o·er 100 pounds sterling are still made with cash. lor
pavments under íi·e pounds sterling. the percentage is 98 percent
. 1he predominance oí cash indicates an opportunitv íor inno·ati·e
business practice that re·amps the purchasing process where
consumers are hea·v users oí cash. 1o reallv displace cash. the
electronic pavment svstems need to ha·e some qualities oí cash
that current credit and debit cards lack. lor example. cash is
negotiable. meaning it can be gi·en or traded to some-one else.
(ash is legal tender. meaning the pavee is obligated to take it. (ash
is a bearer instrument. meaning that possession is prima íacie
prooí oí ownership. Also. cash can be held and used bv anvone
e·en those who don`t ha·e a bank account. and cash places no risk
on the part oí the acceptor that the medium oí exchange mav not
be good.
Now compare cash to credit and debit cards. lirst. thev can`t be
gi·en awav because. technicallv. thev are identiíication cards owned
bv the issuer and restricted to one user. (redit and debit cards are
not legal tender. gi·en that merchants ha·e the right to reíuse to
accept them. Nor are credit and debit cards bearer instruments:
their usage requires an account relationship and authorization
svstem. Similarlv. checks require either personal
knowledge oí the paver or a check guarantee svstem. lence. to
reallv create a no·el electronic pavment method. we need to do
more than recreate the con·enience that is oííered bv credit and
debit cards. \e need to de·elop e-cash that has some oí the
properties oí cash.
Properties of Electronic Cash
Oí the manv wavs that exist íor implementing an e-cash svstem.
all must incorporate a íew common íeatures. Speciíicallv. e-cash
must ha·e the íollowing íour properties: monetarv ·alue.
interoperabilitv. irretrie·abilitv. and securitv.
L-cash must have a monetary value. bank authorized credit. or
a bank-certiíied cashier`s check. \hen e-cash created bv one bank is
accepted bv others. reconciliation must occur without anv problems.
Stated. another wav. e-cash without proper bank certiíication carries
the risk that when deposited. it might be returned íor insuííicient
L-cash must be interoperable-that is. exchangeable as pavment
íor other e-cash. paper cash. goods or ser·ices. lines oí credit.
deposits in banking accounts. bank notes or obligations. electronic
beneíits transíers. and the like. Most e-cash proposals use a single
bank. In practice. multiple banks are required with an international
clearinghouse that handles the exchange-abilitv issues because all
customers are not going to be using the same bank or e·en be in
the same countrv.
L-cash must be storable and retrievable. Remote storage and
retrie·al e.g.. írom a telephone or personal communications
de·ice, would allow users to exchange e-cash e.g.. withdraw írom
and deposit into banking accounts, írom home or oííice or while
tra·eling. 1he cash could be stored on a remote computer`s memorv.
in smart cards. or in other easilv transported standard or specialpurpose
de·ices. Because it might be easv to create counteríeit cash
that is stored in a computer. it might be preíerable to store cash on
a dedicated de·ice that cannot be altered. 1his de·ice should ha·e
a suitable interíace to íacilitate personal authentication using
passwords or other means and a displav so that the user can ·iew
the card`s contents. One example oí a de·ice that can store e-cash
is the Mondex card-a pocket-sized electronic wallet.
L-cash should not be easy to copy or tamper with while being
exchanged: this includes pre·enting or detecting duplication and
double-spending. (ounteríeiting poses a particular problem. since
a counteríeiter mav. in the Internet en·ironment. be anvwhere in
the world and consequentlv be diííicult to catch without
appropriate international agreements.
Detection is essential in order to audit whether pre·ention is
working. 1hen there is the trickv issue oí double spending. lor
instance. vou could use vour e-cash simultaneouslv to buv
something in Japan. India. and Lngland. Pre·enting double
spending írom occurring is extremelv diííicult ií multiple banks
are in·ol·ed in the transaction. lor this reason. most svstems relv
on post-íact detection and punishment. Now we will see the
concept oí Llectronic (ash actuallv works.
Electronic Cash in Action
Llectronic cash is based on crvptographic svstems called digital
signatures`. 1his method in·ol·es a pair oí numeric kevs ·erv
large integers or numbers, that work in tandem: one íor locking
or encoding, and the other íor unlocking or decoding,. Messages
encoded with one numeric kev can onlv be decoded with the other
numeric kev and none other. 1he encoding kev is kept pri·ate and
the decoding kev is made public. Bv supplving all customers buvers
and sellers, with its public kev. a bank enables customers to decode
anv message or currencv, encoded with the bank`s pri·ate kev. Ií
decoding bv a customer vields a recognizable message:` the
customer can be íairlv coníident that onlv the bank could ha·e
encoded it. 1hese digital signatures are as secure as the mathematics
in·ol·ed and ha·e pro·ed o·er .the past two decades to be more
resistant to íorgerv than handwritten signatures. Beíore e-cash can
be used to buv products or ser-·ices. it must be procured írom a
currencv ser·er.
Purchasing E-cash from Currency Servers
1he purchase oí e cash írom an on-line currencv ser·er or bank,
in·ol·es two steps:
1, establishment oí an account and
2, maintaining enough monev in the account to back the
Some customers might preíer to purchase e-cash with paper
currencv. either to maintain anonvmitv or because thev don`t ha·e
a bank account. (urrentlv. in most e-cash trials all customers must
ha·e an account with a central on-line bank. 1his is o·erlv restricti·e
íor international use and multi-currencv transactions. íor customers
should be able to access and pav íor íoreign ser·ices as well as local
ser·ices. 1o support this access. e-cash must be a·ailable in multiple
currencies backed bv se·eral banks. A ser·ice pro·ider in one countrv
could then accept tokens oí ·arious currencies írom users in manv
diííerent countries. redeem them with their issuers. and ha·e the
íunds transíerred back to banks in the local countrv. A possible
solution is to use an association oí digital banks similar to
organizations like VISA to ser·e as a clearinghouse íor manv
credit card issuing banks.
And íinallv. consumers use the e-cash soítware on the computer
to generate a random number. which ser·es as the note.` In
exchange íor monev debited írom the customer`s account. the
bank uses its pri·ate kev to digitallv sign the note íor the amount
requested and transmits the note back to the customer.1he network
currencv ser·er. in eííect. is issuing a bank note.` with a serial
number and a dollar amount. Bv digitallv signing it. the bank is
committing itselí to back that note with its íace ·alue in real
dollars.1his method oí note generation is ·erv secure. as neither
the customer paver, nor the merchant pavee, can counteríeit the
bank`s digital signature analogous to the watermark in paper
currencv,. Paver and pavee can ·eriív that the pavment is ·alid. since
each knows the bank`s public kev. 1he bank is protected against
íorgerv. the pavee against the bank`s reíusal to honor a legitimate
note. and the user against íalse accusations and in·asion oí pri·acv.
How does this Process Work in Practice?
In the case oí Digi(ash. e·erv person using e-cash has an e-cash
account at a digital bank lirst Digital Bank, on the Internet.
Using that account. people can withdraw and deposit e-cash. \hen
an e-cash withdrawal is made. the P( oí the e-cash user calculates
how manv digital coins oí what denominations are needed to
withdraw the requested amount. Next. random serial numbers
íor those coins will be generated and the blinding random
number, íactor will be included. 1he result oí these calculations
will be sent to the digital bank. 1he bank will encode the blinded
numbers with its secret kev digital signature, and at the same
time debit the account oí the client íor the same amount. 1he
authenticated coins are sent back to the user and íinallv the user
will take out the blinding íactor that he or she introduced earlier.
1he serial numbers-plus their signatures are now digital coins:
their ·alue is guaranteed bv the bank. Llectronic cash can be
completelv anonvmous. Anonvmitv allows íree-dom oí usage-
to buv illegal products such as drugs or pornographic material or
to buv legal product and ser·ices. 1his is accomplished in the
íollowing manner. \hen the e-cash soítware generates a note. it
masks the original number or blinds` the note using a random
number and transmits it to a bank. 1he blinding` carried out bv
the customer`s soítware makes it impossible íor anvone to link
pavment to paver. L·en the bank can`t connect the signing with
the pavment. since the customer`s original note number was
blinded when it was signed. In other words. it is a wav oí creating
anonvmous. untraceable currencv. \hat makes it e·en more
interesting is that users can pro·e unequi·ocallv that thev did or
did not make a particular pavment. 1his allows the bank to sign
the note` without e·er actuallv knowing how the issued currencv
will be used. lor those readers who are mathematicallv inclined.
the protocol behind blind signatures is presented.
1he customer`s soítware chooses a blinding íactor. R.
independentlv and uniíormlv at random and presents the bank
with XR,L mod PO,.where X is the note number to be signed
and ] is the bank`s public kev.
1. 1he bank signs it: XRL,D ~ RXD mod PO,. D is the
bank`s pri·ate kev.
2. On recei·ing the currencv. the customer di·ides out the
blinding íactor: RXD,´R ~ XD mod PO,.
3. 1he customer stores XD. the signed note that is used to pav
íor the purchase oí products or ser·ices. Since R is random.
the bank cannot deter-mine X and thus cannot connect the
signing with the subsequent pavment. \hile blinding works
in theorv. it remains to be seen how it will be used in the real
business world.
OLlectronic pavment means making pavments electronicallv i.e.
through computer and telecommunication components.
OLlectronic tokens are designed as electronic analogs oí
·arious íorms oí pavment backed bv a bank or íinancial
OLlectronic tokens are oí three tvpes: Cash or real-time,
Debit or prepaid and Credit or postpaid.
OLlectronic cash is based on crvptographic svstems called
digital signatures`.

ODigital currency
OLimitations of L-cash

OUnderstand how to use e-cash
ODescribe the ·arious issues that mav arise in the organization
due to the use oí e-cash
Let`s purchase something on the Internet using Digital (urrencv.
Using the igital Currency
Once the tokens are purchased. the e-cash soítware on the customer`s
P( stores digital monev undersigned bv a bank. 1he user tan
spend the digital-monev oí anv shop accepting e-cash. without
ha·ing to open an account there íirst or-ha·ing to transmit credit
card numbers. As soon as the customer wants to make a pavment.
the soítware collects the necessarv amount írom the stored tokens.
Two Types of Transactions are Possible: Bilateral and Trilateral.
1vpicallv. transactions in·ol·ing cash are bilateral or two-partv
buver and seller, transactions. wherebv the merchant checks the
·eracitv oí the note`s digital signature bv using the bank`s public
kev. Ií satisíied with the pavment. the merchant stores the digital
currencv on his machine and deposits it later in the bank to redeem
the íace ·alue oí the note. 1ransactions in·ol·ing íinancial
instruments other than cash are usuallv trilateral or three-partv
buver. seller. and bank, transactions. wherebv the notes` are
sent to the merchant. who immediatelv sends them directlv to the
digital bank. 1he bank ·eriíies the ·aliditv oí these notes` and that thev
ha·e not been spent beíore.
1he account oí the merchant is credited. In this case. e·erv note`
can be used onlv once. In manv business situations. the bilateral
transaction is not íeasible because oí the potential íor double
spending. which is equi·alent to bouncing a check. Double
spending becomes possible because it is ·erv easv to make copies
oí the e-cash. íorcing banks and merchants to take extra
precautions. 1o unco·er double spending. banks must compare
the note passed to it bv the merchant against a database oí spent
notes .Just as paper currencv is identiíied with a unique serial
number. digital cash can also be protected. 1he abilitv to detect
double spending has to in·ol·e some íorm oí registration so
that all notes` issued globallv can be uniquelv identiíied. lowe·er.
this method oí matching notes with a central registrv has problems
in the on-line world. lor most svstems. which handle high ·olumes
oí micro pavments. this method would simplv be too expensi·e.
In addition. the problem oí double spending means that banks
ha·e to carrv added o·erhead because oí the constant checking
and auditing logs. Double spending would not be a major problem ií the
need íor anonvmitv were relaxed. In such situations. when the consumer
is issued a bank note. it is issued to that person`s unique license. \hen
he or she gi·es it to somebodv else. it is transíerred speciíicallv to that
other person`s license.
Lach time the monev changes hands. the old owner adds a tinv bit
oí iníormation to the bank note based on the bank note`s serial
number and his or her license. Ií somebodv attempts to spend
monev twice. the bank will now be able to use the two bank notes
to determine who the cheater is. L·en ií the bank notes pass
through manv diííerent people`s hands. whoe·er cheated will get
caught. and none oí the other people will e·er ha·e to know. 1he
downside is that the bank can tell preciselv what vour buving
habits are since it can check the numbers on the e-cash and the
·arious merchant accounts that are being credited. Manv people
would íeel uncomíortable letting others know this personal
Drawback of E-cash
One drawback oí e-cash is its inabilitv to be easilv di·ided into
smaller amounts. It is oíten necessarv to get small denomination
change in business transactions. A number oí ·ariations ha·e
been de·eloped íor dealing with the change` problem. lor the
bank to issue users with enough separate electronic coins` oí
·arious denominations would be cumbersome in communication
and storage. So would a method that required pavees to return
extra change. 1o sidestep such costs. customers are issued a single
number called an open check` that contains multiple
denomination ·alues suííicient íor transactions up to a prescribed
limit. At pavment time. the e-cash soítware on the client`s computer
would create a note oí the transaction ·alue írom the open check.`
Let`s see how the business organizations gain írom e-cash and
how sometimes it can create problems.
Business Issues and lectronic Cash
Llectronic cash fulfills two main functions: as a medium oí
exchange and as a store oí ·alue. Digital monev is a períect medium
oí exchange. Bv mo·ing monetarv claims quicklv and bv eííecting
instant settlement oí transactions. e-cash mav help simpliív the
complex interlocking credit and liabilities that characterize todav`s
commerce. lor instance. small businesses that spend months
waiting íor big customers to pav their bills would beneíit hugelv
írom a digital svstem in which instant settlement is the norm.
Instant settlement oí micro pavments is also a tantalizing
1he controversial aspects oí e-cash are those that relate to the
other role. as a store oí ·alue. luman needs tend to require that
monev take a tangible íorm and be widelv accepted. or legal tender`.
In most countries. a creditor bv law cannot reíuse cash as settlement
íor a debt. \ith the acceptabilitv oí cash guaranteed bv law. most
people are willing to bank their monev and settle manv oí their
bills bv checks and debits. coníident that. barring a catastrophe.
thev can obtain legal tender cash, on demand. Ií e-cash had to be
con·ertible into legal tender on demand. then íor e·erv unit there
would ha·e to be a
unit oí cash reser·ed in the real economv: or. to look at it the
other wav round. there would be cash in the real world íor which
digital proxies were created and made a·ailable. 1his creates
problems. because in an eííicient svstem. ií each e-cash unit
represents a unit oí real cash. then positi·e balances oí e-cash will
earn no interest: íor the interest thev might earn would be oííset
bv the interest íoregone on the real cash that is backing them.
1he enormous currency fluctuations in international finance
pose another problem. On the Internet. the buver could be in
Mexico and the seller in the United States. low do vou check-that
the partv in Mexico is gi·ing a ·alid electronic currencv that has
suitable backing· L·en ií it were ·alid todav. what would happen
ií a sudden de·aluation occurs such as the one in December 1994
where the peso was de·alued 30 percent o·ernight. \ho holds
the liabilitv. the buver or the seller· 1hese are not technological
issues but business issues that must be addressed íor large-scale
bilateral transactions to occur. Unless. we ha·e one central bank
oííering one tvpe oí electronic currencv. it is ·erv diííicult to see ecash
being ·erv prominent except in narrow application domains.
Irom a banker's point of view, e-cash would be a mixed blessing.
Because thev could not create new monev ·ia lending in the digital
world. banks would see electronic monev as unproducti·e. 1hev
might charge íor con·erting it. or take a transaction íee íor issuing
it. but on-line competition would surelv make this a low-proíit
aííair. In the short term. banks would probablv make less írom
this new business than thev would lose írom the driít oí customers
awav írom traditional ser·ices. It seems unlikelv that e-cash would
be allowed to realize its potential íor bvpassing the transaction
costs oí the íoreign exchange market. Ií vou pav ven íor e-cash in
Osaka and buv something írom a merchant based in New \ork
who cashes them íor írancs. a currencv con·ersion has taken place.
1hat. howe·er. is an acti·itv toward which most go·ernments íeel
highlv deíensi·e: and ií e-cash started to bvpass regulated íoreign
exchange markets bv de·eloping its own grav market íor settlement.
then go·ernments might be pro·oked into trving to clamp down
on it. Because oí these obstacles. e-cash in its earlv íorms mav be
denominated in single currencies and exchanged at con·entional
market rates.
Next we will see the risks in·ol·ed while doing the transactions
in·ol·ing the use oí e-cash.
Operational Risk and Electronic Cash
Operational risk associated with e-cash can be mitigated bv
imposing constraints. such as limits on
1, the time o·er which a gi·en electronic monev is ·alid.
2, how much can be stored on and transíerred bv electronic
3, the number oí exchanges that can take place beíore a monev
needs to be redeposit with a bank or íinancial institution.
4, the number oí such transactions that can be made during a
gi·en period oí time.
1hese constraints introduce a whole new set of
implementation issues lor example. time limits could be set
bevond which the electronic monev. would expire and become
worthless. 1he customer would ha·e to redeem or exchange the
monev prior to the expiration deadline. lor this íeature to work:
electronic monev would ha·e to be time-stamped. and time would
ha·e to be svnchronized across the network to some degree oí
precision. 1he objecti·e oí imposing constraints is to limit the
issuer`s liabilitv. A maximum upper limit could be imposed on
the ·alue that could be assigned to anv single transaction or that
could be transíerred to the same ·endor within a gi·en period oí
time. Since the user`s computer could be programmed to execute
small transactions continuouslv at a high rate o·er the network. a
strategv oí reporting transactions o·er a certain amount would be
ineííecti·e íor law eníorcement. lowe·er. a well-designed svstem
could eníorce a policv in·ol·ing both transaction size and ·alue
with time. lor example. an anonvmous coin-purse` íeature might
be capable oí recei·ing or spending no more than >500 in anv
twentv-íour hour period. Alternati·elv. the rate ceiling` íor the
next twentv-íour hours could be made dependent on the rate oí
use or on the number oí exchanges that could be permitted beíore
anv electronic monev would ha·e to be redeposit in a bank or
íinancial institution and reissued.
linallv. exchanges could also be restricted to a class oí ser·ices or
goods e.g.. electronic beneíits could be used onlv íor íood.
clothing. shelter. or educational purposes,. 1he exchange process
should allow pavment to be withheld írom the seller upon the
buver`s instructions until the goods. or ser·ices are deli·ered within
a speciíied time in the íuture.
(on·erselv. it should allow deli·erv to be withheld upon the seller`s
instructions until pavment is recei·ed. 1he next section deals with
the legal aspects oí e-cash and the impact oí e-cash on taxation.
Legal Issues and Electronic Cash
Llectronic cash will íorce bankers and regulators to make tough
choices that will shape the íorm oí lawíul commercial acti·itv
related to electronic commerce. As a result oí the ·erv íeatures that
make it so attracti·e to manv. cash occupied an unstable and
uncomíortable place within the existing taxation and law
eníorcement svstems. Anonvmous and ·irtuallv untraceable. cash
transactions todav occupv a place in a kind oí underground
economv. 1his underground economv is generallv coníined to
relati·elv small scale transactions because paper monev in large
quantities is cumbersome to use and manipulate-organized crime
being the ob·ious exception. As long as the transactions íare
small in monetarv ·alue. thev are tolerated bv the go·ernment as
an uníortunate but largelv insigniíicant bv-product oí the modern
commercial .state. As transactions get larger the go·ernment
becomes more suspicious and enlists the aid oí the banks. through
the ·arious currencv reporting laws. in reporting large
disbursements oí cash so that additional o·ersight can be ordered.

Consider the Impact of E-Cash on Taxation.
1ransaction based taxes e.g.. sales taxes, account íor a signiíicant
portion oí state and local go·ernment re·enue. But ií e-cash reallv
is made to íunction the wav that paper monev does. pavments we
would ne·er think oí making in cash-to buv a new car. sav. or as
the down pavment on a house-could be made in this new íorm
oí currencv because there would be no problem oí bulk and no
risk oí robberv. 1he threat to the go·ernment`s re·enue ílow is a
·erv real one. and oííicials in go·ernment are starting to take
cognizance oí this de·elopment and to prepare their responses.
1o pre·ent an underground economv. the go·ernment through
law mav pre·ent a trulv anonvmous and untraceable e-cash svstem
írom de·eloping. But that raises its own problems because the
·ision oí Big Brother` rears its uglv head. Just as poweríul
encrvption schemes permit the design oí untraceable e-cash
svstems. so. too. do poweríul electronic record-keeping tools permit
the design oí traceable svstems-svstems in which all íinancial
transactions are dulv recorded in some database. allowing those with
access to know more about an indi·idual than anvone could know todav.
Anvthing that makes cash substantiallv easier to use in a broader range
oí transactions holds the potential to expand this underground economv
to proportions posing e·er more serious threats to the existing legal
order. Under the most ambitious ·isions oí e-cash. we would see
a new íorm oí currencv that could be íreelv passed oíí írom one
computer to another with no record. vet incapable oí being íorged.
A consumer could draw such e-cash electronicallv írom his or her
bank. 1he bank would ha·e a record oí that transaction. just as a
withdrawal or check is recorded now. But aíter that. the encrvpted
e-cash íile could be handed oíí without the knowledge oí anvone
but the par-ties to the transaction.
lowe·er. as the politics and business plav out. the technologv is
íorcing legal. as issues to be reconsidered. 1he question e-cash
poses is not. Should the law take notice oí this de·elopment·`but
rather. low can it not·`
Bv impacting re·enue-raising capabilities. e-cash cannot escape
go·ernment scrutinv and regulation: but it is going to take some
serious thinking to design a regulatorv scheme that balances
personal pri·acv. speed oí execution. and ease oí use. \ithout a
íunctioning svstem. what the go·ernment will do remains a mvsterv.
Moreo·er. it is not e·en clear vet that the market as a whole will
adopt an anonvmous e-cash standard. lor now. we are mainlv
watching and trving to educate oursel·es about the likelv path oí
the transition to electronic cash.
OOne drawback oí e-cash is its inabilitv to be easilv di·ided
into smaller amounts.
OOne oí the business issues while using Llectronic (ash is
that it can`t take tangible íorm.
O1he enormous currencv íluctuations in international íinance
pose another problem in business while using e-cash
OOperational risk associated with e-cash can be mitigated bv
imposing constraints. such as limits on
1,the time o·er which a gi·en electronic monev is ·alid.
2, how much can be stored on and transíerred bv
electronic monev
3,the number oí exchanges that can take place beíore a
monev needs to be redeposit with a bank or íinancial
institution. and
4,the number oí such transactions that can be made
during a gi·en period oí time.
O1he use oí e-cash can cause threat to the go·ernment`s
re·enue ílow.

ODiscuss Llectronic cheque, smart card, Credit Cards
OAdvantages of Llectronics cheques
OLlectronic Purses and Debit Cards

OUnderstand what is an Llectronic (heck`
ODescribe the use oí Smart cards and (redit cards
Another tvpe oí Llectronic Pavment scheme that we are going to
discuss todav is Llectronic (hecks`. 1his scheme is basicallv íor
those people who don`t preíer to pav bv cash.
Electronic Checks
Llectronic checks are another íorm oí electronic tokens. 1hev are
designed to accommodate the manv indi·iduals and entities that
might preíer to pav on credit or through some mechanism other
than cash. In the model shown in lig. 14.1. buvers must
register with a third-partv account ser·er beíore thev are able to
write electronic checks. 1he account ser·er also acts as a billing
ser·ice. 1he registration procedure can ·arv depending on the
particular account ser·er and mav require a credit card or a bank
account to back the checks. Once registered. a buver can then contact
sellers oí goods and ser·ices. 1o complete a transaction. the buver sends
a check to the seller íor a certain amount oí monev. 1hese checks mav
be sent using e-mail or other transport methods. \hen deposited. the
check authorizes the transíer oí account balances írom the account
against which the check was drawn to the account to which the
check was deposited. 1he e-check method was deliberatelv created
to work in much the same wav as a con·entional paper check. An
account holder will issue an electronic document that contains the
name oí the paver. the name oí the íinancial institution. the
paver`s account number. the name oí the pavee and amount oí
the check. Most oí the iníormation is in uncoded íorm. Like a
paper check. an e-check will bear the digital equi·alent oí a signature:
a computed number that authenticates the check as coming írom
the owner oí the account. And. again like a paper check. an e-check
will need to be endorsed bv the pavee. using another electronic
signature. beíore the check can be paid. Properlv signed and
endorsed checks can be electronicallv exchanged between íinancial
institutions through electronic clearinghouses. with the
institutions using these endorsed checks as tender to settle accounts.
1he speciíics oí the technologv work in the íollowing manner:
On recei·ing the check. the seller presents it to the accounting
ser·er íor ·eriíication and pavment. 1he accounting ser·er ·eriíies
the digital signature on the check using anv authentication scheme.
A user`s digital signature` is used to create one ticket-a checkwhich
the seller`s digital endorsement` transíorms into another-an order to a
bank computer íor íund transíer. Subsequent endorsers add successi·e
lavers oí iníormation onto the tickets. preciselv as a large number oí
banks mav wind up stamping the back oí a check along its journev
through the svstem.

Iigure J4.J Pavment transaction sequence in an electronic check svstem
Let`s see the ad·antages oí Llectronic checks.
Llectronic checks have the following advantages:
O1hev work in the same wav as traditional checks. thus
simpliíving customer education.
OLlectronic checks are well suited íor clearing micro pavments:
their use oí con·entional crvptographv makes it much íaster
than svstems based on public-kev crvptographv e-cash,.
OLlectronic checks create íloat and the a·ailabilitv oí íloat is an
important requirement íor commerce. 1he third-partv
accounting ser·er can make monev bv charging the buver or
seller a transaction íee or a ílat rate íee. or ií can act as a bank
and pro·ide deposit accounts and make monev on the
deposit account pool.
Olinancial risk is assumed bv the accounting ser·er and mav
result in easier acceptance. Reliabilitv and scalabilitv are
pro·ided bv using multiple accounting ser·ers. 1here can be
an inter account ser·er protocol to allow buver and seller to
belong` to diííerent domains. regions. or countries. \ou
all must agree that the major issue oí concern while doing
paving is securitv. In the next section we will discuss one oí
the Llectronic Pavment Svstems that is more secure as
compared to the abo·e discussed schemes.

Smart Cards and Electronic Payment Systems
1he enormous potential oí electronic tokens is currentlv stunted
bv the lack oí a widelv accepted and secure means oí transíerring
monev on-line. In spite oí the manv prototvpes de·eloped. we
are a long wav írom a uni·ersal pavment svstem because merchants
and banks ha·e to be signed up and a means has to be de·eloped
to transíer monev. Such a svstem moreo·er must be robust and
capable oí handling a large number oí transactions and will require
extensi·e testing and usage to iron out all the bugs.
In the meantime. thousands oí would-be sellers oí electronic
commerce ser·ices ha·e to pav one another and are acti·elv looking
íor pavment substitutes. One such substitute is the smart card.
Smart cards ha·e been in existence since the earlv 1980s and hold
promise íor secure transactions using existing inírastructure. Smart
cards are credit and debit cards and other card products enhanced
with microprocessors capable oí holding more iníormation than
the traditional magnetic stripe. 1he chip. at its current state oí
de·elopment. can store signiíicantlv greater amounts oí data.
estimated to be 80 times more than a magnetic stripe. Industrv
obser·ers ha·e predicted that. bv the vear 2000. one-halí oí all
pavment cards issued in the world will ha·e embedded
microprocessors rather than the simple magnetic stripe.
1he smart card technologv is widelv used in countries such as
lrance. Germanv. Japan. and Singapore to pav íor public phone
calls. transportation´ and shopper lovaltv programs. 1he idea has
taken longer to catch on in the United States. since a highlv reliable
and íairlv inexpensi·e telecommunications svstem has ía·ored
the use oí credit and debit cards. Smart cards are basicallv oí two
O#elationship-based smart credit cards
OLlectronic purses. Llectronic purses. which replace monev.
are also known as debit cards and electronic monev.
Relationship-Based Smart Cards
linancial institutions worldwide are de·eloping new methods to
maintain and expand their ser·ices to meet the needs oí increasinglv
sophisticated and technicallv smart customers. as well as to meet
the emerging pavment needs oí electronic commerce. 1raditional
credit cards are íast e·ol·ing into smart cards as consumers demand
pavment and íinancial ser·ices products that are user-íriendlv.
con·enient. and reliable.
A relationship-based smart card is an enhancement oí existing
card ser-·ices and´or the addition oí new ser·ices that a íinancial
institution deli·ers to its customers ·ia a chip-based card or other
de·ice. 1hese new ser·ices mav include access to multiple íinancial
accounts. ·alue-added marketing programs. or other iníormation
cardholders mav want to store on their card. 1he chip-based card
is but one tool that will help alter mass marketing techniques to
address each indi·idual`s speciíic íinancial and personal
requirements. Lnhanced credit cards store cardholder iníormation
including name. birth date. personal shopping preíerences. and
actual purchase records.
1his iníormation will enable merchants to accuratelv track consumer
beha·ior and de·elop promotional programs designed to increase
shopper lovaltv.Relationship-based products are expected to oííer
consumers íar greater options. including the íollowing:
OAccess to multiple accounts. such as debit. credit.
in·estments or stored ·alue íor e-cash. on one card or an
electronic de·ice
OA ·arietv oí íunctions. such as cash access. bill pavment.
balance inquirv. or íunds transíer íor selected accounts
OMultiple access options at multiple locations using multiple
de·ice tvpes. such as an automated teller machine. a screen
phone. a personal computer. a personal digital assistant
PDA,. or interacti·e 1Vs (ompanies are trving to
incorporate these ser·ices into a personalized banking
relationship íor each customer. 1hev can package íinancial
and non íinancial ser·ices with ·alue-added programs to
enhance con·enience. build lovaltv and retention. and attract
new customers. Banks are also attempting to customize
ser·ices on smart cards. oííering a menu oí ser·ices similar
to those that come up on A1M screens. As with credit
cards´banks mav link up with health care
pro·iders.telephone companies. retailers. and airlines to oííer
írequent shopping and ílver programs and other ser·ices.

Electronic Purses and Debit Cards
Despite their increasing ílexibilitv. relationship-based cards are credit
based and settlement occurs at the end oí the billing cvcle. 1here
remains a need íor a íinancial instrument to replace cash. 1o meet
this need. banks. credit card companies. and e·en go·ernment
institutions are racing to introduce electronic purses.` walletsized
smart cards embedded with programmable microchips that
store sums oí monev íor people to use instead oí cash íor
e·ervthing írom buving íood. to making photocopies. to paving
subwav íares.
The Electronic Purse Works in the ollowing Manner.
Aíter the purse is loaded with monev. at an A1M or through the
use oí an inexpensi·e special telephone. it can be used to pav íor.
sav. candv in a ·ending machine equipped with a card reader. 1he
·ending machine need onlv ·eriív that a card is authentic and there
is enough monev a·ailable íor a chocolate bar. In one second. the
·alue oí the purchase is deducted írom the balance on the card
and added to an e-cash box in the ·ending machine. 1he remaining
balance on the card is displaved bv the ·ending machine or can be
checked at an A1M or with a balance-reading de·ice. Llectronic
purses would ·irtuallv eliminate íumbling íor change or small
bills in a busv store or rush-hour toll booth. and waiting íor a
credit card purchase to be appro·ed. 1his allows customers to pav
íor rides and calls with a prepaid card that remembers` each
transaction. And when the balance on an electronic purse is
depleted. the purse can be recharged with more monev. As íor the
·endor. the receipts can be collected periodicallv in person-or.
more likelv. bv telephone and transíerred to a bank account. \hile
the technologv has been a·ailable íor a decade. the cards ha·e been
relati·elv expensi·e. írom >5 to >10. 1odav the cards cost >1. and
special telephones that consumers could install at home to recharge
the cards are projected to cost as little as >50. A simple card reader
would cost a merchant less than >200.
OLlectronic checks are another íorm oí electronic tokens. 1hev
are designed to accommodate the manv indi·iduals and entities that
might preíer to pav on credit or through some mechanism other than
OLlectronic checks are well suited íor clearing micro pavments:
their use oí con·entional crvptographv makes it much íaster
than svstems based on public-kev crvptographv
OLlectronic checks create íloat and the a·ailabilitv oí íloat is an
important requirement íor commerce
OSmart cards are credit and debit cards and other card products
enhanced with microprocessors capable oí holding more
iníormation than the traditional magnetic stripe
OSmart cards are basicallv oí two tvpes:

OCredit Card-Based Llectronic Payment $ystems
OLncryption in Credit Cards

OUnderstand whv pavment bv (redit card is more secure than
other Llectronic Pavment Svstems
1o a·oid the complexitv associated with digital cash and electronic
checks. consumers and ·endors are also looking at credit card
pavments on the Internet as one possible time-tested alternati·e.
Let`s discuss how the pavment is made online using credit cards.
Credit Card-Based Llectronic Payment $ystems
1here is nothing new in the basic process. Ií consumers want to
purchase a product or ser·ice. thev simplv send their credit card
details to the ser·ice pro·ider in·ol·ed and the credit card
organization will handle this pavment like anv other.
We can break credit card payment on on-line networks into
three basic categories:
1. Payments using plain credit card details. 1he easiest
method oí pavment is the exchange oí unencrvpted credit
cards o·er a public network such as telephone lines or the
Internet. 1he low le·el oí securitv inherent in the design oí
the Internet makes this method problematic anv snooper
can read a credit card number. and programs can be created to
scan the Internet traííic íor credit card numbers and send the
numbers to its master,. Authentication is also a signiíicant
problem. and the ·endor is usuallv responsible to ensure
that the person using the credit card is its owner. \ithout
encrvption there is no wav to do this.
2. Payments using encrypted credit card details. It would
make sense to encrvpt vour credit card details beíore sending
them out. but e·en then there are certain íactors to consider.
One would be the cost oí a credit card transaction itselí. Such
cost would prohibit low-·alue pavments micro pavments,
bv adding costs to the transactions.

3. Payments using third-party verification. One solution to
securitv and ·eriíication problems is the introduction oí a
third partv: a companv that collects and appro·es pavments
írom one client to another. Aíter a certain period oí time.
one credit card transaction íor the total accumulated amount
is completed.
Iirst Virtual Holdings:San Diego-based start-up oííers an
Internet pavment svstem to process credit card transactions
on the Internet. It`s allied with LD& íor data processing and
lirst USA Merchant Ser·ices in Dallas íor card processing
Interactive 1ransactions Partners Joint ·enture oí LDS.
lrance 1elecom. US\est. and l&R Block íor home banking and
electronic pavment ser·ices.
MasterBanking A home banking ser·ice started bv Master(ard
and (heckíree (orp.. an on-line pavments processor.
VI$A :Interacti·e VISA International acquired US Order. a
screen phone manuíacturer. VISA Interacti·e has signed up more
than 30 banks. including NationsBank.
Block Iinancial :1his l&R Block unit owns Managing \our
Monev personal-íinance soítware and (ompuSer·e. Pro·ides
electronic-banking ser·ices íor VISA member banks.
Prodigy 1eaming up with Meridian Bank and others to oííer P(based
home banking ·ia its online ser·ice.

1able J5.J Players in On-Line Credit Card 1ransaction Processing
Let`s see how the pavment bv credit card is more secure as compared
to other schemes.
Encryption and Credit Cards
Lncrvption is instantiated when credit card iníormation is entered
into a browser or other electronic commerce de·ice and sent securelv
o·er the net-work írom buver to seller as an encrvpted message.
1his practice. howe·er. does not meet important requirements
íor an adequate íinancial svstem. such as non reíutabilitv. speed.
saíetv. pri·acv. and securitv. 1o make a credit card transaction trulv
secure and nonreíutable. the íollowing sequence oí steps must
occur beíore actual goods. ser·ices. or íunds ílow:
1. A customer presents his or her credit card iníormation along
with an authenticitv signature or other iníormation such as
mother`s maiden name, securelv to the merchant.
2. 1he merchant ·alidates the customer`s identitv as the owner
oí the cred-it card account.
3. 1he merchant relavs the credit card charge iníormation and
signature to its bank or on-line credit card processors.
4. 1he bank or processing partv relavs the iníormation tot the
customer`s: bank íor authorization appro·al.
5. 1he customer`s bank returns the credit card data. charge
authentication. and authorization to the merchant.
In this scheme. each consumer and each ·endor generates a public
kev and a secret kev. 1he public kev is sent to the credit card companv
and put on its public kev ser·er. 1he secret kev is reencrvpted with
a password. and the unencrvpted ·ersion is erased. 1o steal a credit
card. a thieí would ha·e to get access to both a consumer`s encrvpted
secret kev and password. 1he credit card companv sends the
consumer a credit card number and a credit limit. 1o buv something
írom ·endor X. the consumer sends ·endor X the message. It is now
time 1. I am paving \ dollars to X íor item Z.` then the consumer uses
his or her password to sign the message with the public kev. 1he ·endor
will then sign the message with its own secret kev and send it to the
credit card companv. which will bill the consumer íor \ dollars
and gi·e the same amount less a íee, to X. See lig.15.1,
Nobodv can cheat this svstem. 1he consumer can`t claim that he
didn`t agree to the transaction. because he signed it as in e·ervdav
liíe,. 1he ·endor can`t in·ent íake charges. because he doesn`t ha·e
access to the consumer`s kev. le can`t submit the same charge
twice. because the consumer included the precise time in the
message. 1o become useíul. credit (ard svstems will ha·e to
de·elop distributed kev ser·ers and card checkers.
Otherwise. a con-centrated attack on these sites could bring the
svstem to a halt.
Support íor Pri·acv Lnhanced Mail PLM, and Prettv Good Pri·acv
PGP, encrvption has been built into se·eral browsers. Both oí
these schemes can be substantiallv bolstered with the addition oí
encrvption to deíeat snooping attacks. Now anv ·endor can create
a secure svstem that accepts credit card numbers in about an hour.
Third-Party Processors and Credit Cards
In third-partv processing. consumers register with a third partv on
the Internet to ·eriív electronic micro transactions. Veriíication
mechanisms can be designed with manv oí the
attributes oí electronic tokens. including anonvmitv. 1hev diííer
írom electronic token svstems in that
1, thev depend on existing íinancial instruments and
2, thev require the on-line in·ol·e-ment oí at least one
additional partv and. in some cases. multiple parties to
ensure extra securitv. lowe·er. requiring an on-line thirdpartv
connection íor each transaction to diííerent banks could
lead to processing bottlenecks that could undermine the goal
oí reliable use. (ompanies that are alreadv pro·iding thirdpartv
pavment are reíerred to as on-line third-partv processors
O1PPs, since both methods are íairlv similar in
nature.O1PPs ha·e created a six-step process that thev
belie·e will be a íast and eííicient wav to buv iníormation online:
1. 1he consumer acquires an O1PP account number bv íilling out a
registration íorm.1his will gi·e the O1PP a customer iníormation
proíile that is backed bv a traditional íinancial instrument such as a
credit card.
2. 1o purchase an article. soítware. or other iníormation online. the
consumer requests the item írom the merchant bv quoting her
O1PP account number. 1he purchase can take place in one oí two
wavs: 1he consumer can automaticallv authorize the merchant`
·ia browser settings to access her O1PP account and bill her. or she can
tvpe in the account iníormation.
3. 1he merchant contacts the O1PP pavment ser·er with the customer`s
account number.
4. 1he O1PP pavment ser·er ·eriíies the customer`s account number oí
the ·endor and checks íor suííicient íunds.
5. 1he O1PP pavment ser·er sends an electronic message to the buver.
1his message could be an automatic \\\ íorm that is sent bv the
O1PP ser·er or could be a simple e-mail. 1he buver responds to the
íorm or e-mail in one oí three wavs: \es. I agree to pav: No. I
will not pav: or lraud. I ne·er asked íor this.
6. Ií the O1PP pavment ser·er gets a \es írom the customer. the
merchant is iníormed and the customer is allowed to download the
material immediatelv.
¯. 1he O1PP will not debit the buver`s account until it recei·es
coníirmation oí purchase completion. Abuse bv buvers who recei·e
iníormation or a product and decline to pav can result in account
suspension.1o use this svstem. both customers and merchant must
be registered with the O1PP. An on-line en·ironment suitable íor micro
transactions will require that manv oí the preceding steps
be automated. \orld \ide \eb browsers capable oí encrvption can
ser·e this purpose.
lere the two kev ser·ers are merchant ser·er and pavment ser·er .
Users íirst establish an account with the pavment ser·er.
1hen. using a client browser. a user makes a purchase írom a merchant
ser·er bv clicking on a pavment URL hvper-Links,. which is
attached to the product on a \\\ page. Unknown to the customer.
the pavment URL encodes the íollowing details oí purchase: price oí
item. target URL íor hard goods. this URL is usuallv an order status
page: íor iníormation goods. Points to the iníormation customers are
purchasing,. and duration íor iníormation goods. it speciíies how long
customers can get access to the target URL,.
Pavment URLs send the encoded iníormation to the pavment
ser·er. In other words. the pavment URL directs the customer`s
browser to the pavment ser·er. which authenticates the user bv
asking her íor the account number and other identiíication
iníormation. Ií the iníormation entered bv the customer is ·alid
and íunds are a·ailable. the pavment ser·er processes the pavment
transaction. 1he pavment ser·er then redirects the user`s browser
using an l11P redirect operation, to the purchased item with an
access URL. which encodes the details oí the pavment transaction
the amount. what was purchased. and duration,. 1he access URL
is eííecti·elv-a digital in·oice that has been stamped paid` bv the
pavment ser·er. It pro·ides e·idence to the merchant that the user
has paid íor the iníormation and pro·ides a receipt that grants the
user access. 1he access URL is the original target URL sent bv the
merchant`s ser·er. with additional íields that contain details oí
the access: expiration time optional,. user`s address to pre·ent
sharing,. 1he merchant runs an l11P ser·er that is modiíied to
process access URLs l11P redirects,. 1he ser·er checks the
·aliditv oí the URL and grants access ií the expiration time has
not passed. Ií access has expired. the ser·er returns a page that
mav gi·e the user an opportunitv to repurchase the item. 1he
pavment svstem can also generate access URLs in a íormat that can
be parsed bv (GI scripts running on an unmodiíied l11P ser·er.
Once a customer is authenticated. the pavment is automaticallv
processed. 1he pavment ser·er implements a modular pavment
architecture where accounts can be backed bv diííerent tvpes oí
íinancial instruments. credit card accounts. prepaid accounts. billed
accounts. debit cards. and other pavment mechanisms. lor credit
card accounts. the pavment svstem has a real-time connection to
the credit card clearing network. 1he svstem can authorize pavment
in real time based on the proíile oí the transaction and the user.
1he svstem supports small transactions bv accumulating them
and settling them in aggregate. All transactions are recorded in a user`s
on-line statement.
1he statement is a summarv oí recent purchases. and each
summarv line is a hvpertext link. lor iníormation
goods. this is a link back to the purchased item. Ií access has
expired. the merchant`s ser·er will gi·e the user the opportunitv
to repurchase the item. lor non iníormation goods. the link mav
point to an order status or summarv page.

Iigure J5.2 On-line pavment process using a third-partv processor
OLlectronic checks are another íorm oí electronic tokens. 1hev
are designed to accommodate the manv indi·iduals and
entities that might preíer to pav on credit or through some
mechanism other than cash.
O1he enormous potential oí electronic tokens is currentlv
stunted bv the lack oí a widelv accepted and secure means oí
transíerring monev on-line.
OSmart cards are credit and debit cards and other card products
enhanced with microprocessors capable oí holding more
iníormation than the traditional magnetic stripe.
OSmart cards are basicallv oí two tvpes: #elationship-based
smart credit cards and Llectronic purses.
OLncrvption is instantiated when credit card iníormation is entered into
a browser or other electronic commerce de·ice and sent securelv o·er
the net-work írom buver to seller as an encrvpted message.
OAdvantages and disadvantages of Credit Cards
OManaging Credit #isk
OUnderstand the ad·antages and disad·antages ií using (redit cards
ODescribe the inírastructure required to support (redit (ard Processing
In the pre·ious lectures we ha·e learnt a lot about the use oí
(redit cards. Also we ha·e seen the securitv aspect oí using the
credit cards. 1odav we will take a look at what are the Business
Pros and (ons oí (redit (ard-Based Pavment.
1hird-partv processing íor credit cards. entails a number oí pros
as well as cons 1hese companies are chartered to gi·e credit accounts
to indi·iduals and act as bill collection agencies íor businesses.
(onsumers use credit cards bv presenting them íor pavment and
then paving an aggregate bill once a month. (onsumers pav either
bv ílat íee or indi·idual transaction charges íor this ser·ice.
Merchants get paid íor the credit card draíts that thev submit to
the credit card companv. Businesses get charged a transaction charge
ranging írom 1 percent to 3 percent íor each draít submitted.
Credit cards have advantages over checks in that the credit card
companv assumes a larger share oí íinancial risk íor both buver
and seller in a transaction. Buvers can sometimes dispute a charge
retroacti·elv and ha·e the credit card companv act on their behalí.
Sellers are ensured that thev will be paid íor all their sales-thev
needn`t worrv about íraud. 1his translates into a con·enience íor
the buver. in that credit card transactions are usuallv quicker and
easier than check and sometimes e·en cash, transactions.
One disadvantage to credit cards is that their transactions are not
anonvmous. and credit card companies do in íact compile ·aluable
data about spending habits.
#ecord keeping with credit cards is one of the features
consumers value most because of disputes and mistakes in
billing. Disputes mav arise because diííerent ser·ices mav ha·e
diííerent policies. lor example. an iníormation pro·ider might
charge íor partial deli·erv oí a íile the user mav ha·e abandoned
the session aíter reading part oí the íile,. and a mo·ie distributor
might charge depending on how much oí the ·ideo had been
downloaded. 1he cause oí interrupted deli·erv needs to
be considered in resol·ing disputes e.g.. intentional customer
action ·ersus a problem in the network or pro·ider`s equipment,.
In general. implementing pavment policies will be simpler when
pavment is made bv credit rather than with cash.
1he complexity of credit card processing takes place in the
verification phase. a potential bottleneck. Ií there is a lapse in
time between the charging and the deli·erv oí goods or ser·ices
íor example. when an airline ticket is purchased well in ad·ance
oí the date oí tra·el,. the customer ·eriíication process is simple
because it does not ha·e to be done in real time. In íact. all the
relaving and authorizations can occur aíter the customer-merchant
transaction is completed. unless the authorization request is denied.
Ií the customer wants a report or e·en a digital airline ticket,.
which would be downloaded into a P( or other iníormation
appliance immediatelv at the time oí purchase. howe·er. manv
message relavs and authorizations take place in real time while the
customer waits. Such exchanges mav require manv sequence-speciíic
operations such as staged encrvption and decrving and exchanges
oí crvptographic kevs.
Lncryption and transaction speed must be balanced.howe·er.
as research has show that on-line users get ·erv impatient and
tvpicallv wait íor 20 seconds beíore pursuing other actions. lence.
on-line credit card users must íind the process to be accessible.
simple. and íast. Speed will ha·e design and cost implications. as
it is a íunction oí network capabilities. computing power. a·ailable
at e·erv ser·er. and the speciíic íorm oí the transaction. 1he
inírastructure supporting the exchange must be reliable. 1he user
must íeel coníident that the supporting pavment inírastructure
will be a·ailable on demand and that the svstem will operate
reasonablv well regardless oí component íailures or svstem load
conditions. 1he builders and pro·iders oí this inírastructure are
aware oí customer requirements and are in íierce competition to
íulíill those needs.
1here is also no question that banks and other íinancial institutions
must resol·e manv kev issues beíore oííering on-line processing
ser·ices in e-com-merce markets. Should thev go it alone or íorm
a partnership- and with whom· \hat technologv to use· \hat
ser·ices to oííer·\hich consumers are interested and who should
be targeted· A wide ·arietv oí organizations are jumping into the
írav. Regional electronic íunds transíer Ll1, networks. credit card
associations. equipment ·endors. data processors. soítware
de·elopers. bill pavment companies. and telecommunications
pro·iders are all wooing banks with the goal oí building the
transaction processing iníra-structure on the Internet .
Infrastructure for On-Line Credit Card Processing
(ompetition among these plavers is based on ser·ice qualitv. price.
processing svstem speed. customer support. and reliabilitv. Most
third-partv processors market their ser·ices directlv to large regional
or national merchants rather than through íinancial institutions
or independent sales organizations.
Barriers to entry include
1, large initial capital requirements.
2, ongoing expenses related to establishing and maintaining an
electronic transaction processing network.
3, the abilitv to obtain competiti·elv priced access to an existing
network. and
4, the reluctance oí merchants to change processors. \hat
exactlv is at stake here· A lot. In the emerging world oí
ecommerce.. the companies that own the transaction
inírastructure will be able to charge a íee. much as banks do
todav with A1Ms. 1his could be extremelv proíitable.
Microsoít. VISA. and other companies understand that thev
ha·e to do something. Ií thev wait íor a clear path to emerge.
it will be too little too late.` 1hev know all too well that
ecommerce transaction architectures similar to MS-DOS or
\indows, on which other e-commerce applications are
de·eloped will be ·erv proíitable.
Manv companies are de·eloping ad·anced electronic ser·ices íor
home-based íinancial transactions. and soítware companies are
increasinglv allving with banks to sell home banking. L·entuallv.
the goal would be to oííer e·ervthing írom mutual íunds to
brokerage ser·ices o·er the network. Manv banks are concerned
about this prospect and ·iew it as an encroachment on their turí.
Aíter vears oí dabbling. mostlv unsuccessíullv. with remote
banking. banking is recei·ing a jarring message: Get wired or lose
1he traditional roles are most deíinitelv being reshuííled. and
electronic pavment on the Internet can ha·e a substantial eííect on
transaction processing in the real` non electronic, world.
According to some estimates. trans-action processing ser·ices
account. íor as much as 25 percent oí non interest income íor
banks. so banks clearlv stand to lose business. \hv banks are on
the deíensi·e is ob·ious ií we look at banking in the last ten vears.
A decade ago. banks processed 90 percent oí all bank card
transactions. such as VISA and Master(ard. 1odav. ¯0 percent oí
those transactions are processed bv nonbanks such as lirst Data
Resources. Ií soítware companies and other interlopers become
electronic toll-takers. banks could become mere homes íor deposits.
not the pro·iders oí lucrati·e ·alue-added ser·ices.
L·en more worrisome. banks could lose the all-important direct
link to be the customer`s primarv pro·ider oí íinancial ser·ices
that lets them hawk proíitable ser·ices. 1he eííect oí electronic
commerce on the banking industrv has been one oí total
coníusion. 1o be íair. things are happening so íast in this area that
it`s hard to keep up with it all. Let`s see some oí the risks in·ol·ed
in the Llectronic Pavment Svstem.
Risks from Mistake and Disputes: Consumer Protection
Virtuallv all electronic pavment svstems need some abilitv to keep
automatic records. íor ob·ious reasons. lrom a technical
standpoint. this is no problem íor electronic svstems. (redit and
debit cards ha·e them and e·en the paper-based check creates an
automatic record. Once iníormation has been captured
electronicallv. it is easv and inexpensi·e to keep it might e·en cost
more to throw it awav than to keep it,. lor example. in manv
transaction processing svstems. old or blocked accounts are ne·er
purged and old transaction histories can be kept íore·er on
magnetic tape. Gi·en the intangible nature oí electronic transactions
and dispute resolution relving solelv on records. a general law oí
pavment dvnamics and banking technologv might be: No data
need e·er be discarded. 1he record íeature is an aíter-the-íact
transcription oí what happened. created without anv explicit eííort
bv the transaction parties. leatures oí these automatic records
1, permanent storage:
2, accessibilitv and traceabilitv:
3, a pav-ment svstem database: and
4, data transíer to pavment maker. bank. or monetarv authorities.
1he need íor record keeping íor purposes oí risk management
conílicts with the transaction anonvmitv oí cash. One can sav that
anonvmitv exists todav onlv because cash is a ·erv old concept.
in·ented long beíore the computer and networks ga·e us the
abilitv to track e·ervthing. Although a segment oí the pavment making
public will alwavs desire transaction anonvmitv. manv belie·e that
anonvmitv runs counter to the public welíare because too manv tax.
smuggling. and´or monev laundering possibilities exist. 1he anonvmitv
issue raises the question: (an electronic pavments hap-pen without an
automatic record íeature· Manv recent pavment svstems seem to be
ambi·alent on this point. lor instance. the Mondex electronic purse
touts equi·alence with cash. but its electronic wallets are designed to
hold automatic records oí the card`s last twentv transactions with a
statement built in. Ob·iouslv. the card-reading terminals. machines. or
telephones could all maintain records oí all transactions and thev
probablv ultimatelv will. \ith these records. the balance on anv
smart card could be reconstructed aíter the íact. thus allowing íor
additional protection against loss or theít. 1his would certainlv
add some ·alue ·ersus cash. In sum. anonvmitv is an issue that
will ha·e to be addressed through regulation co·ering consumer
protection in electronic transactions. 1here is considerable debate
on this point. An anonvmous pavment svstem without automatic
record keeping will be diííicult íor bankers and go·ernments to
accept. \ere the regulation to applv. each transaction would ha·e
to be reported. meaning it would appear on an account statement
making mistakes and disputes easier to resol·e. lowe·er.
customers might íeel that all this record keeping is an in·asion oí
pri·acv resulting in slower than expected adoption oí electronic
pavment svstems. 1he next risk in·ol·ed is the pri·acv oí the customer
making a purchase.

Managing Information Privacy
1he electronic pavment svstem must ensure and maintain pri·acv.
L·erv time one purchases goods using a credit card. subscribes to
a magazine or accesses a ser·er. that iníormation goes into. a
database somewhere. lurthermore. all these records can be linked
so that thev constitute in eííect a single dossier.1his dossier would
reílect what items were bought and where and when. 1his ·iolates
one the unspoken laws oí doing business: that the pri·acv oí
customers should be protected as much as possible. All details oí
a consumer`s pavments can be easilv be aggregated: \here. when.
and sometimes what the consumer buvs is stored. 1his collection
oí data tells much about the person and as such can conílict with
the indi·idual`s right to pri·acv. Users must be assured that
knowledge oí transactions will be coníidential. limited onlv to the
parties in·ol·ed and their designated agents ií anv,.Pri·acv must
be maintained against ea·esdroppers on the network and against
unauthorized insiders. 1he users must be assured that thev cannot
be easilv duped. swindled. or íalselv implicated in a íraudulent
transaction. 1his protection must applv throughout the whole
transaction protocol bv which a good or ser·ice is purchased and
deli·ered. 1his implies that. íor manv tvpes oí transactions. trusted
third-partv agents will be needed to ·ouch íor the authenticitv and
good íaith oí the in·ol·ed parties..
Managing Credit Risk
(redit or svstemic risk is a major concern in net settlement svstems
because a bank`s íailure to settle its net position could lead to a
chain reaction oí bank íailures. 1he digital central bank must
de·elop policies to deal with this possibilitv. Various alternati·es
exist. each with ad·antages and disad·antages. A digital central
bank guarantee on settlement remo·es the insol·encv test írom
the svstem because banks will more readilv assume credit risks
írom other banks. \ithout such guarantees the de·elopment oí
clearing and settlement svstems and monev markets-mav be impeded. A
middle road is also possible. íor example. setting controls on
bank exposures bilateral or multilateral, and requiring collateral.
Ií the central bank does not guarantee settlement. it must deíine.
at least internallv. the conditions and terms íor extending liquiditv
to banks in connection with settlement.
Despite cost and eííiciencv gains. manv hurdles remain to the
spread oí electronic pavment svstems. 1hese include se·eral íactors.
manv non technical in nature. that must be addressed beíore anv
new pavment method can be successíul. Let`s see what are the
hurdles we ha·e to pass íor successíul implementation oí
Llectronic Pavment Svstems.
Designing Electronic Payment Systems
OPri·acv. A user expects to trust in a secure svstem: just as the
telephone is a saíe and pri·ate medium íree oí wiretaps and
hackers. electronic communication must merit equal trust.
OSecuritv. A secure svstem ·eriíies the identitv oí two-partv
transactions through user authentication` and reser·es
ílexibilitv to restrict iníormation´ser·ices through access
control. 1omorrow`s bank robbers will need no getawav cars
just a computer terminal. the price oí a telephone call. and a
little ingenuitv. Millions oí dollars ha·e been embezzled bv
computer íraud. No svstems are vet íool-prooí. although
designers are concentrating closelv on securitv.
OIntuiti·e interíaces. 1he pavment interíace must be as easv to
use as a telephone. Generallv speaking. users ·alue
con·enience more than anvthing.
ODatabase integration. \ith home banking. íor example. a
customer wants to plav with all his accounts. 1o date.
separate accounts ha·e been stored on separate databases.
1he challenge beíore banks is to tie these databases together
and to allow customers access to anv oí them while keeping
the data up-to-date and error íree.
OBrokers. A network banker`-someone to broker goods and
ser·ices. settle conílicts. and íacilitate íinancial transactions
electronicallv-must be in place.
OOne íundamental issue is how to price pavment svstem
ser·ice. lor example. should subsidies be used to encourage
users to shiít írom one íorm oí pavment to another. írom
cash to bank pavments. írom paper-`based to e-cash. 1he
problem with subsidies is the potential waste oí resources.
as monev mav be in·ested in svstems that will not be used.
1hus in·estment in svstems not onlv might not be reco·ered but
substantial ongoing operational subsidies will also be necessarv.
On the other hand. it must be recognized that
without subsidies. it is diííicult to price all ser·ices aííordablv. ·
Standards. \ithout standards. the welding oí diííerent pavment
users into diííerent networks and diííerent svstems is impossible.
Standards enable interoperabilitv. gi·ing users the abilitv to buv
and recei·e iníormation. regardless oí which bank is managing
their monev. None oí these hurdles are insurmountable. Most
will be jumped within the next íew vears. 1hese technical problems.
experts hope. will be sol·ed as technologv is impro·ed and
experience is gained. 1he biggest question concerns how customers
will take to a paperless and ií not cashless, less-cash world.
O(redit cards ha·e ad·antages o·er checks in that the credit
card companv assumes a larger share oí íinancial risk íor
both buver and seller in a transaction.
OOne disad·antage to credit cards is that their transactions are
not anonvmous. and credit card companies do in íact
compile ·aluable data about spending habits.
ORecord keeping with credit cards is one oí the íeatures
consumers ·alue most because oí disputes and mistakes in
O1he electronic pavment svstem must ensure and maintain
pri·acv. securitv. Intuiti·e interíaces. Brokers and Standards.

O1echnical elements of an LDI
OLDI $tandards

OUnderstand details oí the technical elements oí an LDI
OLDI $tandards
LDI as discussed beíore stands íor Llectronic Data Interchange.
1his is one oí the applications oí L (ommerce which makes
Business to Business transactions possible o·er a network.
Llectronic data interchange LDI, is a technologv poised íor
explosi·e growth in use as the Internet pro·ides an aííordable
wav íor businesses to connect and exchange documents with
customers and suppliers oí anv size. LDI is the electronic exchange
oí business documents. data. and other iníormation in a publicstandard
íormat. It cuts the cost oí managing business-to-business transactions bv
eliminating the need íor labor-intensi·e manual generation and
processing oí documents.
In this lecture we will discuss the LDI standards. the LDI networks
and the LDI soítware that interíaces these two elements and the
business applications. 1hese elements together with the LDI
Agreement are co·ered in detail in this lecture.
Let`s start with LDI Standards.
EDI Standards
At the heart oí anv LDI application is the LDI standard. 1he
essence oí LDI is the coding and structuring oí the data into a
common and generallv accepted íormat -anvthing less is
nothing more than a svstem oí íile-transíers. (oding and
structuring the documents íor business transactions is no easv
matter. 1here ha·e been a number oí LDI standards de·eloped
in ·arious industrv sectors or within a speciíic countrv and there
are complex committee structures and procedures to support them.
lollowing on írom the ·arious sectorial and national LDI
standards is the United Nations UN, LDI Standard:
LDIlA(1. 1his is the standard that should be adopted íor anv
new LDI application.
Now the question arises whv we require LDI standards· LDI
pro·ides an electronic linkage between two trading partners.
Business transactions are output írom the sending
computer svstem. transmitted or transported in electronic íormat
and input into the second. recei·ing computer svstem. 1he
computer svstems that exchange data need a common íormat:
without a common íormat the data is meaningless. 1wo
organizations that exchange data can. with relati·e ease. agree a
íormat that meets their mutual needs. As the network oí exchanges
de·elops then the number oí organizations needing to be partv
to the agreement grows.
1o illustrate this. assume a network oí three customers sav
supermarkets, ordering goods írom íour suppliers íood
manuíacturers,. see ligure 8.1.

Iig. 8.J Interchanges between Customers and $uppliers.
1he network in ligure 8.1 has 12 separate interchanges. It is unlikelv
that each oí these exchanges would ha·e its own íormat but it is
períectlv possible that each customer would ha·e de·eloped its
own standards gi·ing each supplier three separate standards to
cope with,. It is also possible that new exchanges added to the
svstem will ha·e requirements not en·isaged when the data
íormats were originallv agreed: this would require a change to the
existing standard or the introduction oí an additional standard.
1he o·erall picture is one oí unnecessarv complexitv and
LDI standards o·ercome these diííiculties. 1he LDI standard
pro·ides. or attempts to pro·ide. a standard íor data interchange
that is:
OReadv íormulated and a·ailable íor use:
O(omprehensi·e in its co·erage oí the data requirements íor
anv gi·en transaction:
OIndependent oí hardware and soítware:
OIndependent oí the special interest oí anv partv in the
trading network.


LDI Standards pro·ide a common language íor the interchange
oí standard transactions.
Most oí the work on LDI standards has been concerned with the
interchange oí trade documentation and íinancial transactions
but the principle applies to anv interchange where the data can be
svstematized and codiíied. LDI standards are used íor the
interchange oí iníormation as di·erse as weather station readings
and school exam results.
Now let`s see how the ·arious standards e·ol·e.
National and Sectorial Standards
OLvolution of LDI $tandards
1he íirst LDI standards e·ol·ed írom the íormats used íor
íile transíer oí data between computer applications. 1he
e·olution oí LDI standards can be seen as ha·ing three
stages although in practice it was and is somewhat more
complex than that,:
1. 1he íirst íormats that might properlv be called LDI were
de·eloped bv organizations that had to process data írom a
large number oí customer organizations. 1he data recipients
set the standard and the customers coníormed to it.
2. 1he concept oí LDI as an application independent
interchange standard e·ol·ed and se·eral industrv sector and
´ or national standards bodies de·eloped LDI standards to
meet the needs oí a speciíic user communitv.
3. 1he requirements oí international and cross sector trade
meant that the sector and national standards were becoming
an impediment to the íurther de·elopment oí electronic
trading. LDIlA(1 was de·eloped. under the auspices oí the
United Nations UN,. as a uni·ersal standard íor commercial
Early EOI Applications
An example oí an earlv LDI application in the UK was the BAGS
BA(S was and is a consortium oí the major banks that pro·ides
an automated clearing ser·ice íor the transíer oí monev between
bank accounts. Manv organisations that made a
signiíicant number oí pavments including the pav-roll, use this
Users oí the BAGS svstem recorded the iníormation thev would
ha·e printed as cheques on a computer íile in accordance with the
íormat required bv BAGS. 1he data was then sent to BAGS where
the pavments were processed without the delav. expense and risk
oí paper documents and manual data input.
1he use oí the svstem was made much easier bv the a·ailabilitv.
íor most tvpes oí computer. oí standard soítware that output
the pavment data in the required íormat.
In the earlv davs the computer íile would be recorded on a magnetic
tape and couriered to the BAGS headquarters. Subsequentlv an
online submission íacilitv was added to the ser·ice.
Sector and National EDI Standards
1he use oí LDI on svstems such as BAGS and the more general
use oí online svstems demonstrated the potential oí LDI íor the
exchange oí general business documents. A number oí trade
sector organizations understood this potential and de·eloped
LDI íormats íor use in their sector. Some oí the more notable
examples are:
An LDI íormat de·eloped íor. and widelv used in. the Luropean
motor industrv. ODL11L stands íor theOrganisation íor Data
Lxchange bv 1eletransmission in Lurope. ODL11L was predated
bv VGA. a standard de·eloped. and still used. bv the German
motor industrv. 1he motor industrv is planning to mo·e írom
VGA and ODL11L to LDIlA(1 when the standards are stable
and their requirements are íullv met.
One problem thev ha·e is that the LDIlA(1 standard. with its
wider application and more bureaucratic procedures. is slower to
react to e·ol·ing needs than is the case with the sector based
ODL11L standard.
A UK LDI standard íor general trade de·eloped bv the ANA
Article Numbering Association, in 1982. 1RADA(OMS e·ol·ed
to become the predominate UK LDI standard with widespread
application in the retail and catering trades this was in the late
1980`s ´ earlv 1990`s when Britain accounted íor halí the Luropean
LDI acti·itv,. Other Luropean countries also de·eloped their own
standards íor retail ´ general trade: examples oí such standards
are SLDAS in Germanv and GLN(OD in lrance. 1RADA(OMS
and the other national standards mentioned here are looking to
e·ol·e to. or con·ert to LDIlA(1 - a slow process gi·en the
in·estment in the existing standards.
1he ANA is the bodv responsible íor the allocation and
administration oí the product codes used íor the bar codes on
grocerv and other items -product coding has an important role to
plav in LDI svstems,.
Ansi X12
LDI in North America de·eloped with diííering standards in the
·arious business sectors. Lxamples oí such standards are U(S
íor the grocerv industrv and ORDLRNL1 íor the
pharmaceutical trade Sokol. 1989,. Llectronic trade had de·eloped
rapidlv in North America and the problems oí cross sector trade
were becoming apparent. 1he problem was taken up bv the
American National Standards Institute ANSI, and X12 was
de·eloped as a national standard with the aim oí replacing the
·arious sector standards.
The International I Standard
As alreadv outlined. LDI de·eloped in closed user communities
within trade sectors and ´ or national boundaries. 1he use oí
sector and national standards íor this tvpe oí trade was
satisíactorv. lowe·er. as electronic trade de·eloped to co·er wider
trading relationships there is a growing problem oí trade between
organisations using diííerent LDI standards.
In addition to the problem oí cross sector trade there is a desire to
use LDI íor international trade. 1his sensiblv, requires a common
íormat íor the exchange oí the standard business íorms order.
in·oice. etc., between organisations in diííering countries.
International trade also requires a great deal oí additional
documentation íor shipping. customs authorities. international
credit arrangements. etc. - all oí this is potentiallv electronic and
ob·iouslv a common íormat is ·erv desirable. 1o íacilitate this
cross sector and international de·elopment oí LDI the LDIIAC1
standard has been. and is being. de·eloped.
LDIIAC1 is the United Nations standard oí Llectronic Data
Interchange for Administration, Commerce and
1ransport.1he LDIlA(1 standard was born. in the mid-1980s
out oí a United Nations Lconomic (ommission íor Lurope
UNL(L, committee and is supported bv the (ommission oí
the Luropean Union.
Underlving the LDIlA(1 initiati·e are ·arious UN attempts to
standardize on trade documentation. 1hese speciív. íor example.
standards íor the lavouts oí in·oices a pro·ision oí some
importance íor organisations processing manv hundreds. oí
in·oices írom numerous sources,. Notable amongst the standards
documentation is the UN 1rade Data Llement Directorv. a subset
oí which íorms the LDIlA(1 Data Llement Directorv.
LDIlA(1 eííecti·elv assumed a world role when the Americans
accepted it as the world standard while retaining their own ANSI
X12 standard íor domestic use in the short term,:
1he acceptance bv the North Americans oí LDIlA(1 as the
international standard was somewhat surprising. ANSI had done
a lot oí de·elopment work on the X12 standard and
LDIlA(1 was. at that time. essentiallv a Luropean standard.
Since 1988 the use oí LDI has been ·igorouslv promoted bv the
Luropean Union LU, through its 1LDIS programme. 1LDIS
has promoted LDI through sectorial organisations but has also
emphasised intersectorial trade. LDIlA(1 is seen as the common
standard and as ·ital íor electronic trade within the single market`
- íunds ha·e been made a·ailable íor industrv sectors to change
írom their existing LDI standard to LDIlA(1.
LDIlA(1 has been adopted as the LDI standard oí choice bv
countries and sectors new to LDI. In Lurope. countries such as
the Netherlands. Denmark and Norwav ha·e been noted íor their
recent de·elopment oí LDI with LDIlA(1 as the predominate
standard. Llectronic trade is also de·eloping outside Lurope and
North America: Australia and Singapore ha·e been much written
about with LDIlA(1 being the standard oí choice. 1he
importance oí a single international standard has been recognised
bv manv sectors currentlv using their own LDI standards. Manv
sector and national standards are been replaced or are e·ol·ing`
towards the LDIlA(1 standard -included in this process are
ODL11L. 1RADA(OMS and ANSI X12. a de·elopment alreadv
mentioned abo·e.
The EDIACT Standard
1he LDIlA(1 standard. like all other LDI standards. is about
the exchange oí electronic, documents - íor LDIlA(1 each
document tvpe is reíerred to as a message. lor trade purposes the
documents include order. dispatch ad·ice. in·oice. pavment order
and remittance ad·ice.lor transmission purposes LDIlA(1
messages are sent in an electronic en·elope known as an
interchange. Note this is the data standard and is separatelv deíined
írom anv en·eloping requirement oí the transmission protocol.
\ithin that interchange there mav well be a number oí messages.
Messages equate to the trade documents and order and in·oice are
prime examples.
1he messages themsel·es are made up oí a series oí data segments.
Data segments encode a single aspect oí the trade document. íor
instance the order date or the buvers name and address. Lach
LDIlA(1 message speciíies a great number oí data segments
and indi·idual data segments mav be .components oí a number
oí messages. 1he users oí the message select the data segments
that are applicable to their particular needs.
Data segments are. in turn´made up oí tag and a number oí data
items. 1he tag identiíies the data segment and the data elements
gi·e the codes and ´ or ·alues required in the document message,.
1he data elements include the codes and ·alues íor items such as
date and address code but thev are írequentlv used in combination
with tvpe or qualiíier data items to speciív the íormat oí the data
and its use: íor instance a date could be the order date and be in
eight digit centurv íormat. 1he requirement to use data elements
together íorms a composite data element. 1his structure oí the
LDIlA(1 message is shown in ligure 8.2. 1he íunction groups
ha·e been omitted: these are an intermediarv le·el between the
interchange and the message but thev are not normallv

Iig. 8.2 LDIIAC1 $tructure Chart ($implified).
Coding Standards
1he LDI standard pro·ides the common íormat íor the message
but just as important is the abilitv to correctlv interpret the data
held within that íormat. Data in computer svstems normallv has
a code as a kev. (omputer svstems ha·e codes íor customers.
suppliers. products and so on. lor LDI it is preíerable to send the
codes rather than the associated names. addresses and descriptions.
1he use oí codes cuts down the size oí the transmitted message
and. pro·ided the codes are mutuallv agreed. thev can be used to
match the appropriate records in the recei·ing computer svstem.
lor the grocerv and general retail trade there are standard svstems
oí coding. 1hese are used íor bar codes on merchandise and to
identiív address points within the participating organisations: thev
are also used in LDI messages. 1he two main svstems are:
OLAN Luropean Article Number
OUP( Uni·ersal Product (ode American,
1he coding svstems are administered bv the national Article
Numbering Associations ANA,. 1hese organizations ha·e also
been closelv in·ol·ed in the de·elopment oí LDI: the British
ANA de·eloped the 1radacom LDI standard that was discussed
earlier in this chapter.
1he LAN and the UP( svstems are similar. 1he LAN is a 13 digit
code with a two digit countrv code whereas the UP( is a 12 digit
code with onlv a single digit íor the countrv. 1he makeup oí the
LAN code is shown in ligure 8.3.

Iig. 8.3 LA Coding $ystem.
1he check digit calculation. íor the product code. uses a modulus
10 algorithm. 1his is calculated bv multiplving alternati·e digits.
oí the code. bv 1 and 3 respecti·elv. 1he results oí these
multiplications are summed and the check digit is the diííerence
between that sum and the next highest multiple oí 10. see ligure

Iig. 8.4 LA Checkdigit Calculation.
lor ·erv small items. eight digit LAN-8, codes can be allocated.
1his is so that the smaller bar code can be printed on indi·idual
1he LAN code in the example abo·e is a product code íor a 420
gram tin oí leinz Baked Beans. Lach leinz product has the
same manuíacturers` preíix but a diííerent item code allocated bv
the companv. íor example:
Baked Beans - 420 gram tin: 50 0015¯ 001¯1 9
(ream oí 1omato Soup - 300 gram tin: 500015¯ 0020¯ 5
Baked Beans - 205 gram tin: 50 0015¯ 00023 1
In the LDI Order message these codes can be used in the order
line. e.g. the line: LIN-1--500015¯001¯19:LN` LAN address
point codes are used in LDI messages to identiív the sender and
recei·er oí the message. Address point codes are similar to the
product code: the countrv and manuíacturer`s preíix are the same
as íor the companies products but the check digit calculation diííers
íor the two usages. 1he sender oí the order mav wish to speciív a
number oí locations. íor instance an order. in addition to the
buver and supplier. might identiív: 1he Deli·erv Point - the
warehouse where the goods will be deli·ered: 1he In·oice Point -
the head oííice where the in·oice is to be sent.
1he LDIlA(1 order message pro·ides íor up to 20 name and
address segments NAD, to be sent in an order.
eneric Products
LAN codes are appropriate íor ordering branded products. 1hev
are not applicable where the requirement is íor a generic product.
1his circumstance mav not arise when baked beans are ordered
we all tend to ha·e our preíerences íor a particular brand, but the
order might be íor:
OA generic product. e.g. red biros anv old red biros,. or
OA commoditv product. e.g. sheet steel or paper.
Product coding in these circumstances is either agreed between
customer and supplier or there is an agreement on an industrv
sector basis. 1he paper and board trade is one such industrv where
coding con·entions ha·e been agreed -to speciív grams ´ sq. cm.
direction oí íibre. size oí sheet. etc. (oupled with such a con·ention
is the need íor an understanding oí the pack quantitv`. It is
uníortunate ií an order íor 1.000 sheets oí paper is interpreted as
an order íor 1.000 reams and it has happened!,.
O1he essence oí LDI is the coding and structuring oí the data
into a common and generallv accepted íormat -anvthing less
is nothing more than a svstem oí íile-transíers.
O1he íirst LDI standards e·ol·ed írom the íormats used íor
íile transíer oí data between computer applications.
OAn example oí an earlv LDI application in the UK was the
BAGS svstem
O1o íacilitate the cross sector and international de·elopment
oí LDI the LDIlA(1 standard has been. and is being.
de·eloped. LDIlA(1 is the United Nations standard oí
Llectronic Data Interchange íor Administration. (ommerce
and 1ransport
OLDI etwork

OUnderstand details oí the technical elements oí an LDI
OLDI Networks
Aíter discussing about LDI standards and coding let`s see how
the transmission oí electronic data takes place and what are the
requirements íor this electronic transmission.
I Communications
1he LDI standard speciíies the svntax íor the coding oí the
electronic document. it does not speciív the method oí
transmission. 1he transmission oí the electronic document can
OA magnetic tape or diskette that is posted or dispatched
using a courier ser·ice.
OA direct data communications link.
OA ·alue added data ser·ice VADS,. also known as a ·alue
added network VAN,.
1he phvsical transíer oí magnetic tape or diskette is one wav oí
transmitting LDI messages. lowe·er. one oí the ad·antages oí
LDI is speed oí transmission and this is hardlv íacilitated bv the
phvsical transportation oí the diskette or tape. lor this. and other
reasons. this wav oí transmitting LDI is declining in popularitv.
1he use oí direct data communications links is the second
possibilitv. It can be appropriate íor trading relationships where
there are large data ·olumes or where there are onlv one or two
trading partners in·ol·ed. It does. howe·er. ha·e a number oí
complications. It presumes that the trading partners agree
transmission times. protocols and line speeds - requirements
that become complex when there are se·eral trading partners. some
oí them in·ol·ed in a number oí trading relationships. 1he íinal
possibilitv is the use oí a VADS. 1hese can pro·ide a number oí
íacilities but the essential is the use oí postboxes and mailboxes
to pro·ide time independence` and protocol independence`. 1he
íacilities oí a VADS are íurther discussed in the íollowing sections.
Postboxes and Mailboxes
1he basic íacilitv oí a VADS is a post and íorward network. 1his
network is centered on a computer svstem with communications
íacilities. lor each user oí the svstem there are two íiles:
O1he postbox - where outgoing messages are placed.
O1he mailbox - where incoming messages can be picked up.
1aking the trading network shown at ligure 12.1. the postbox
and mailbox arrangement oí the VADS would be as shown at
ligure 9.1.

Iig. 9.J VAD$ ÷ Postbox and Mailbox Iiles.
Ií Sa·a store. íor example. needed to place orders íor bread. meat
and ·egetables then it íormats an LDI interchange containing a
number oí orders íor those three suppliers. 1he sequence oí
e·ents would then be:
OSa·a Store establishes a communication link to the VADS
svstem. Sa·a Store makes extensi·e use oí the svstem and
has a leased line communications link.
O1he VADS computer svstem inspects postboxes. unpacks
the interchanges. mo·es anv a·ailable messages orders in
this case, to the mailbox oí the intended recipients and
repackages them as new interchanges. 1he inspection oí
postboxes is írequent and. to all intents and purposes. the
interchanges are immediatelv a·ailable to the recipient.
O1he users oí the svstem establishes a communication link
to the VADS svstem at their con·enience. Best Bread is the
íirst user oí the svstem to come online. in this case the
communications link is a dial-up line.
OBest Bread inspects its mailboxes íor new interchanges. On
íinding the order írom Sa·a Store and possiblv íurther
interchanges írom other customers, it causes them to be
transmitted to its own order processing svstem.
1he LDI interchange is then a·ailable íor processing in the user`s
application. See ligure 9.2 íor a diagram oí this interchange taking


Iig. 9.2 VADS - Lxample Interchange.
1he post-box ´ mailbox svstem is also reíerred to as a store and
íorward` svstem. 1he two principle ad·antages oí such a svstem
Time Independence
1he sending and receipt oí the interchange are svnchronous. 1he
two processes can be carried out at the con·enience oí the users
in·ol·ed. 1he íirst user mav send all its LDI transmissions. to all
its trading partners. in a single batch. at the end oí its o·ernight
processing run. 1he indi·idual interchange can then be picked up
bv the trading partners. at their indi·idual con·enience.
Protocol Independence
1he tvpe oí communications link to be used is an option a·ailable
to each user oí the VADS svstem. Low ·olume users will probablv
opt íor a dial-up modern link whereas high ·olume users mav
well use a leased line or a packet switching network. 1he VADS
supplier makes a·ailable a wide ·arietv oí communications íacilities
and has the abilitv to handle a range oí protocols. 1he transmission
protocol en·elope is stripped oíí incoming interchanges lea·ing
just the LDI interchange.Interchanges are then re-en·eloped with
the transmission protocol appropriate to the recipient when thev
are retrie·ed írom the mailbox.
'alue Added Data Services
A number oí organizations ha·e set out to pro·ide VADS. 1he
basic and most important íacilitv oí the VADS is the postbox ´
mailbox pro·ision. 1here are. howe·er. a number oí íurther
íacilities that can be made a·ailable: some or all oí them mav be
pro·ided bv anv particular VADS pro·ider.
Trading Community
An established LDI VADS will ha·e a large number oí clients all
with an interest in electronic trade. 1here is a tendencv íor
organisations in a particular trade sector to concentrate on one
particular VADS there are instances oí íormal agreements between
a trade sector organisation and a VADS,. Joining the appropriate
VADS can ease access to new electronic trading partners.
Inter-network Connections
A VADS íacilitates trade between partners that subscribe to the
same VADS but not between partners that might be using diííerent
VADS ser·ices - not inírequentlv organisations ha·e joined more
than one VADS to o·ercome this problem. A number oí the
VADS ha·e made inter-network agreements that pro·ide íor the
passing oí interchanges between them.
International Connections
Manv VADS are nationallv based with a single computer ser·ice
pro·iding the switching ser·ice - a set-up that is appropriate íor
domestic trade. A number oí the VADS`s are part oí international
organisations or ha·e alliances with VADS`s in other countries
thus íacilitating international trade.
Privacy. Security and Reliability
A commonlv expressed concern bv LDI users is the pri·acv oí the
svstem and the securitv oí their messages a concern that can seem
exaggerated gi·en the relati·e insecuritv oí the postal svstem that
LDI might be replacing,.Pri·acv pro·isions will normallv include
user-id ´ password protection. oí postboxes and mailboxes. 1he
setting up oí a trading relationship can also be under user control
with both users required to enter the appropriate control message
beíore the exchange oí message can take place. 1he LDI message
can also be encrvpted or can include an electronic signature
pro·isions that are not dependant on the VADS,.
Securitv will be built into the VADS svstem - it is important to the
users and to the reputation oí the VADS that messages are not
lost. 1he ser·ice must also be reliable - the VADS should ha·e an
appropriate hardware and soítware coníiguration so that it can
ensure the continuous a·ailabilitv oí its ser·ice.
Message Storage and Logging
Users oí the VADS would normallv ha·e control o·er the retrie·al
and retention oí messages in their mailbox. New messages can be
called oíí selecti·elv or in total. Once a message has been called oíí
it will be marked as no longer new but it can still be retained in the
mailbox and it is worthwhile making use oí this íacilitv until the
message is secure in the users svstem,.
As part oí its ser·ice pro·ision the VADS mav well ha·e a message
logging íacilities. 1his pro·ides an audit trail oí when the message
arri·ed in the VADS. when the recipient retrie·ed it and when it
was e·entuallv deleted. A useíul pro·ision should messages be
lost - the result oí an enquirv is normallv to pro·e a íault in one oí
the users svstems ´ procedures rather than anv íault in the operation
oí the VADS.
Message 'alidation
A number oí VADS will pro·ide a ser·ice that ·alidates LDI
messages íor coníormance with the chosen LDI standard and
returns an in·alid interchange. 1his ser·ice is optional and normallv
incurs an extra charge.
Local Access
VADS. despite their alternati·e name oí Value Added Network
are message switching ser·ices. not network ser·ices. 1he cost oí
the connection írom the user to the VADS can be reduced bv
using a local access node or a packet switching ser·ice. 1he time
independence pro·ided bv the VADS gi·es the user the option
oí accessing the ser·ice when cheap rate telephone charges applv.
1he VADS is a commercial organisation and charges íor its ser·ices.
1he charges tend to be a combination oí :
$ubscription A monthlv or annual subscription.
Usage charge:A charge íor the number oí characters transmitted.
Diííering VADS applv these charges in diííering combinations - in
theorv a user could select the VADS with the charging structure
that ga·e it most ad·antage - in practice users choose the VADS
alreadv used bv their trading partners. lor the Pens and 1hings
example. the VADS that is most likelv to be adopted is that alreadv
used bv Packaging Solutions.
SoItware and Consultancy
Network pro·iders tend to ha·e considerable experience in LDI
and an interest in promoting its widespread adoption. Most
VADS pro·iders supplv or sell, LDI soítware that pro·ides íor
easv access to their own network. 1hese VADS pro·iders will also
pro·ide consultancv and training - the basic pro·ision concerns
the use oí the soítware and the network but there can also be
consultancv on the business use oí LDI within the organisation.
OLlectronic Data Interchange is one oí the applications oí L
(ommerce which makes Business to Business transactions
possible o·er a network.
OLDI standards are required so that the computer svstems
can exchange data in a common íormat.
OLDIlA(1 is the United Nations standard oí Llectronic
Data Interchange íor Administration. (ommerce and
OVADS stands íor Value Added Data Ser·ices. 1he basic
íacilitv oí a VADS is a post and íorward network which is
1ime and Protocol independent. VADS is also known as
VAN Value Added Network,.

OLDI Implementation

OUnderstand details oí the technical elements oí an LDI svstem:
OLDI Implementation
Now we will discuss the phvsical implementation oí VADS. LDI
in the Internet.
Recentlv a number oí organisations ha·e started using the Internet
as an LDI VADS. Using the Internet pro·ides the basic store and
íorward íacilities but not necessarilv the other íeatures oí a VADS
ser·ice that are listed abo·e. Securitv and reliabilitv are two oí the
major concerns. unlike the traditional VADS. the Internet does
not guarantee the saíe deli·erv oí anv data vou send into it. 1he
plus side oí using the Internet is that it is cheaper than anv oí the
commercial networks that pro·ide speciíic LDI VADS ser·ices.
EDI Implementation
1he íinal technical element oí the LDI svstem is the LDI soítware.
Ií a companv is to send an order írom its production control
svstem to Packaging Solutions it needs to code that order into the
agreed LDI standard and squirt` it into the chosen VADS. 1o
pick up the order at the other end. Packaging Solutions has a
similar need to extract the data írom the network and to decode
the data írom the LDI message into its order processing svstem.
1he coding ´ decoding oí the LDI message and the interíacing
with the VADS is normallv achie·ed using LDI Soítware. 1he
o·erall picture is summarized in ligure 10.1.

Iig. J.J $ending an order using LDI $oftware.
EDI Software
1he LDI soítware is normallv bought in írom a specialist supplier.
1here are a number oí soítware houses supplving LDI solutions
or the LDI soítware mav come írom: · A major trading partner -
the trading partner mav supplv the soítware or recommend a
third partv supplier.
O1he VADS supplier.
OAs part oí application package. e.g. packaged soítware íor
production control. order processing or accounting mav
include LDI soítware as an integral íeature or as an optional
OA third partv. An example oí this is that a number oí banks
pro·ide LDI solutions that include the collection oí and
accounting íor electronic pavments. Obtaining LDI soítware
írom an interested` partv has both ad·antages and
disad·antages. Ií the soítware is. íor example. bought írom
the VADS supplier then. hopeíullv. there would not be anv
problem interíacing with the chosen network but using an
additional VADS or switching to a new network supplier
mav be more problematic.
1he basic íunctions oí the LDI Soítware are the two alreadv
outlined. namelv:
O(oding business transactions into the chosen LDI Standard:
OInteríacing with the VADS.
Manv LDI soítware suppliers pro·ide additional íunctions.1hese
mav include:
OA trading partner database integrated into the LDI
Soítware.1his can pro·ide íor code translation e.g. internal
customer codes to a trade sector standard code, and ´ or íor
the speciíication oí the LDI requirements oí each trading
OSupport oí multiple LDI Standards. 1he selection oí the
appropriate standard mav be determined bv the trading
partner database:
OSophisticated íacilities to ease the íormatting oí internal
application data to and írom the LDI Standard. Drag and
drop` interíaces are a·ailable íor this purpose. Various LDI
Soítware suppliers ha·e associations with the large suppliers
oí business applications production planning. order
processing. etc., and pro·ide standardised interíaces to those
Olacilities íor transactions to be sent bv íax or e-Mail to
customers that do not use LDI. 1he identiíication oí such
customers mav be determined bv the trading partner
OInteríacing with a ·arietv oí LDI VADS including the
Internet,. 1he selection oí the appropriate VADS mav be
determined bv a trading partner database:
O1he option to encrvpt the LDI Message:
Olacilities íor the automatic acknowledgement oí the LDI
OMessage tracking and an audit trail oí messages sent and
ODirect input and printed output oí LDI transactions
allowing íree standing LDI Operation-in eííect the LDI
svstem pro·ides the ser·ice oí a íax machine.
LDI Soítware is a·ailable on a ·arietv oí platíorms írom the basic
P( up to a mainírame svstem. As with all classes oí soítware the
price ·aries: the basic P( packages starting at sav, 500 pounds
sterling ´ 800 US dollars and the price then goes up írom there íor
the larger machines. additional íacilities and ser·ices such as
consultancv. lor some LDI soítware the support oí each standard
and ´ or VADS is an additional plugin that is paid íor separatelv.
\earlv maintenance charges. that include updates as the new
·ersions oí the LDI Standards are released. tend to be quite heítv.
At the top oí the range is the concept oí an LDI (orporate
Interíace. 1his soítware. oíten mounted on its own. mid range.
machine acts as a central clearing house íor all the e-(ommerce
transactions oí a large organisation. 1he external interíaces can
link to se·eral LDI VADS`s and translate to a ·arietv oí LDI
Standards to meet the needs oí a large number oí trading partners.
1he internal interíaces can link to a number oí business svstems
such as order processing and accounts pavable.possiblv svstems
that are replicated across the ·arious di·isions oí the organisation.
1he svstem can also be used íor intra organizational transactions
- ií the interíace íor external customers and suppliers uses LDI.
whv not use the same interíaces íor trades between di·isions oí
the organisation.
I Integration
LDI soítware will do its job well at a relati·elv modest price. \hat
pre-packaged LDI soítware cannot do is automaticallv integrate
with the business application and a comprehensi·e solution to
this requirement can take a lot oí time and cost a lot oí monev.
1he simple wav to implement LDI is not to link the LDI soítware
and the applications - a set-up sometimes reíerred to as LDI-lax
or LDInterruptus. 1his is. a course. íollowed bv
manv organisations when thev íirst start and persisted with bv
manv small organisations who are onlv doing LDI` because a
large trading partner has told them to. In this mode oí operation:
OIncoming LDI messages are printed out írom the LDI
soítware and then manuallv keved into the business
application that thev are intended íor:
OOutgoing LDI messages are extracted írom the business
application and tvped into the LDI soítware íor íormatting
and onward transmission.
1he use oí LDI in this wav ensures that the transactions get
through quicklv hence the term LDI-lax, but it rules out anv oí
the other ad·antages oí using LDI. lor íull integration oí the
business application and the LDI Soítware there needs to be an
interíace to transíer data írom the business application to the LDI
soítware and ·is a ·ersa. 1o ease this process. most LDI soítware
pro·ides íor a ílat íile` interíace. Ií the data to be sent is sav, an
order then the business application can be modiíied so that:
O1he supplier record in the order processing svstem has an
indicator to sav that its orders are to be sent ·ia LDI:
O1he order print run is modiíied so that orders íor LDI
capable suppliers are not printed:
OAn additional run is included to take the orders írom the
LDI capable suppliers and íormat the data onto the ílat íile:
O1he ílat íile is accessed bv the LDI soítware and. using user
supplied parameters. the order data is íormatted into the
required LDI standard and posted into the VADS.
1he re·erse process is used íor incoming LDI messages. 1his will
in·ol·e the creation oí a batch input routine to run in parallel with
the online íacilities utilized bv most business
applications. 1he additional worrv with incoming LDI messages
is ·alidation. lor orders. in·oices and anv other data manuallv
input into a business application there will be or should be,
comprehensi·e primarv and secondarv ·alidation built into the
svstem and there is a human operator there to deal with anv
lor LDI messages there will not be anv input errors at the recei·ing
end but there isnormallv, no guarantee that the data sent bv the
trading partner is correct or acceptable. Arguablv the LDI routines
taking input messages need all the same ·alidation checks as the
equi·alent manual input routines and there needs to be procedures
íor correcting the problems or iníorming the trading partner and
getting them to transmit a corrected message.
EDI Operation
Once the LDI svstem is set-up it. like anv other data processing
svstems. needs careíul and svstematic operation. A big diííerence
between electronic transactions and their paper equi·alents is that
with electronic transactions there is no paperwork to íall back on
should anvthing go wrong. In these circumstances. thereíore. it is
sensible to keep a securitv copv oí all incoming transactions -
preíerablv in their LDI íormat as soon as thev enter the svstem.
1his then gi·es a íall-back position should anv data be lost or
corrupted and is an aid to the diagnosis oí anv problems.
1he second aspect to LDI operation is how oíten should the
svstem be run. LDI has been implemented. in part at least. to cut
down transaction cvcle time and there is no point in reintroducing
unnecessarv delavs. lor manv organisations a dailv download írom
the mailbox and processing run is suííicient - howe·er. this is not
entirelv satisíactorv ií the dailv run is timed íor an hour beíore a
major trading partner sends out their dailv orders. In some
circumstances. such as just-in-time manuíacture in the ·ehicle
assemblv business. cvcle times can be as short as one hour and
ob·iouslv order processing needs to be ·erv írequent ´ real-time.

Sample EDI Application
\ebLogic Integration pro·ides an LDI sample application that
demonstrates how \ebLogic Integration with the LDI (onnect
íor \ebLogic Integration add-on can be used to exchange LDI
purchase-order iníormation o·er a VAN. In the sample application.
a supplier trading partner uses the LDI integration íunctionalitv
oí \ebLogic Integration to connect to a buver o·er a VAN.
1he interactions between the buver and supplier occur in the
íollowing sequence:
1. A buver trading partner submits an LDI purchase order.
o·er a VAN to the supplier.
2. 1he LDI-to-XML transíormation engine bundled with
Power.Ser·er! con·erts the purchase order to XML.
3. 1he XML document triggers a business process in the
supplier application. 1he business process generates an XML
purchase order acknowledgment.
4. 1he supplier íorwards the acknowledgment to the
transíormation engine which con·erts it to LDI. and then
íorwards it o·er a VAN to the buver.
OA number oí organisations ha·e started using the Internet
as an LDI VADS
OUnlike the traditional VADS. the Internet does not
guarantee the saíe deli·erv oí anv data vou send into it
O1he plus side oí using the Internet is that it is cheaper than
anv oí the commercial networks that pro·ide speciíic LDI
VADS ser·ices.
O1he coding ´ decoding oí the LDI message and the
interíacing with the VADS is normallv achie·ed using LDI
Olor íull integration oí the business application and the LDI
Soítware there needs to be an interíace to transíer data írom
the business application to the LDI soítware and ·is a ·ersa.
A big diííerence between electronic transactions and their paper
equi·alents is that with electronic transactions there is no paperwork
to íall back on should anvthing go wrong. In these circumstances.
thereíore. it is sensible to keep a securitv copv oí all incoming
OLDI Agreement
OLDI security issues

Aíter this lecture the students will be able to:
OUnderstand details oí the technical elements oí an LDI
OLDI Agreements
OLDI Securitv
Aíter discussing how the LDI is being implemented it is clear that
a large organization that processes manv electronic transactions is
going to need its own LDI set-up. 1here are. howe·er. manv
small companies that are dragged into LDI trade bv a large trading
partner but íor who the set-up and running costs oí an LDI
íacilitv would outweigh the beneíits. lor these organizations there
are a number oí alternati·es as discussed below:
I Alternatives
O1he low cost. P( based. íree-standing LDI íacilitv.
OMaking use oí an LDI clearing house. 1o do this the
companv contract íor their LDI messages to be sent to a
clearing house who decode them. print them out and then
post or íax them on. 1he British Post Oííice is an example
oí an organisation that pro·ides this ser·ice.
OInternet access ·ia a clearing house. 1his is an update on the
LDI-Post ser·ice outlined abo·e where a clearing house is
used but the inward and outward transactions are
transmitted between the end user and the clearing house and
accessed bv the client using a standard web browser.
As vou know setting up an LDI svstem requires a lot oí discussion
with trading partners. Manual svstems relv a lot on the
understanding oí the people in·ol·ed: when these interchanges
are automated there is no understanding between the machines -
thev just do what thev are told well thev do on a good dav!,.
1he introduction oí LDI mav also be part oí a wider process oí
business processing re-engineering that makes the eííecti·e
operation oí the supplv chain much more crucial to successíul
business operation. 1raditional logistics had buííer stocks in the
íactorv`s parts warehouse or the retailer`s regional depot and stock
room. In just-in-time manuíacture and quick response supplv
these buííer stocks are eliminated - this reduces the capital
emploved and a·oids the need to double handle goods. \ithout
these buííer stocks the LDI svstems become crucial -the orders
need to be deli·ered on time or cars will be made
with missing wheels and there will be no cornílakes on the shel·es
in the supermarket. lence to achie·e a successíul. electronicallv
controlled supplv chain. businesses ha·e to talk. 1hev need to
agree the nature oí the business that is to be done electronicallv.
the technical details oí how it is to be undertaken and the procedures
íor resol·ing anv disputes that arise.
I Interchange Agreements
1he appropriate wav to document the details oí a trading
arrangement between electronic trading partners is an LDI
Interchange Agreement. 1he agreement makes clear the trading
intentions oí both parties. the technical íramework íor the
transactions and the procedures to be íollowed in the e·ent oí a
dispute. 1he LDI Agreement is a document. normallv on paper.
and signed bv both trading partners beíore electronic trading
begins. 1he íirst requirement oí the agreement is to establish the
legal íramework. 1his has a special signiíicance as most business
law relates to paper based trading and how that law should applv
to the less tangible íorm oí an electronic message is not alwavs
clear although a number oí countries are updating their legal
pro·isions to take account oí electronic trade,. 1his point is made
in the commentarv that is included in the Luropean
Model lectronic ata Interchange (I) Agreement (UIA):
lor LDI to be a successíul alternati·e to paper trading. it is essential
that messages are accorded a comparable legal ·alue as their paper
equi·alent when the íunctions eííected in an electronic en·ironment
are similar to those eííected in a paper en·ironment. and where all
appropriate measures ha·e been taken to secure and store the

The EU-IA. in the text of the Agreement. Includes the Clause:
1he parties. intending to be legallv bound bv the Agreement.
expresslv wai·e anv right to contest the ·aliditv oí a contract
eííected bv the use oí LDI in accordance with the terms and
conditions oí the Agreement on the sole grounds that it was
eííected bv LDI.`And the agreement also speciíies:
O1he point in its transmission and processing at which a
message will be deemed to be legallv binding - the usuallv
accepted standard is that the document` achie·es legal status
when it arri·es at the recei·ing partv. the reception rule`.
O1he timescale íor processing LDI massages. One purpose
oí LDI is to speed up the trade cvcle and this is not achie·ed
ií messages are not reliablv processed within an agreed
O1he time that copies oí the message will be retained a
deíault oí three vears is pro·ided íor bv the LU-IA but
manv member states require longer periods. e.g. se·en or ten
O1he procedure íor settling anv disputes. 1he LU-IA
suggests a choice between arbitration bv a named
organisation. e.g. a chamber oí commerce appointed
arbitration chamber. or bv recourse to the judicial process.
O1he legal jurisdiction in which. anv disputes should be
settled. In addition to the legal or legalistic, aspects oí the
agreement it is important to speciív the technical
requirements. 1hese requirements include:
O1he coding svstems that will be used íor identiíving entities
such as organisations and products and attributes such as
O1he LDI standard that is to be emploved and. within that.
the messages and data segments that will be used. Updating
oí message standards as new ·ersions are released is an issue
that also needs to be co·ered.
O1he network that is to be used - including details oí
scheduling and protocol where a post and íorward network
is not to be emploved.
Model agreements are a·ailable írom ·arious parties. including
trade organisations. and reíerences to example agreements can be
íound on the web pages that accompanv this book.
Another major issue oí concern is the pri·acv and securitv oí the
messages and their exchange. Let`s discuss how to protect the data
while it is being transíerred írom one place to another.
I Security
1he íirst point is to ensure that interchange oí messages is reliable.
In the íirst instance this is a matter oí procedures at both ends oí
the trading agreements. Procedures. rigid procedures. are required
to ensure that all the processes are run and that thev reach their
successíul conclusion - an old-íashioned requirement called data
processing standards`. Procedures are particularlv important where
operations are manual as opposed to being controlled bv job
control programs J(P, run under the appropriate operating
svstem,. Particular attention is needed ií the LDI soítware is run
on a separate machine sav a P(, and the application soítware
operates in a mainírame or similar en·ironment: it is ·ital that all
the data recei·ed on the LDI machine is passed to and processed
once onlv!, on the mainírame and that outgoing data is reliablv
processed in the re·erse direction.
Further aspects oI security are:
Controls in the EDI Standards:
LDI Standards include controls designed to protect against errors
in. and corruption oí. the message. 1he sort oí thing that is
pro·ided is íor segment counts in the message and message counts
in the interchange.
Controls in the Transmission Protocol:
1ransmission protocols include protection. such as longitudinal
control totals. to detect anv data corruption that occurs during
transmission. \here corruption is detected the network svstem
occasions a retransmission without the need íor outside
Protection against Tampering:
\here there-is concern that the transmission might be intercepted
and modiíied it can be protected bv a digital signature. 1his is
designed to ensure that the message recei·ed is exactlv the same as
the message sent and that the source oí the message is an
authorized trading partner.
Privacy of Message:
\here the contents oí the message are considered sensiti·e the
pri·acv oí the message can be protected. during transmission. bv
encrvpting the data.
One potential problem is that the recipient oí the message might
denv ha·ing recei·ed it: the electronic equi·alent oí the idea that
the unpaid in·oice must ha·e got lost in the post`.
One wav out oí this is to use the receipt acknowledgement
messages see below, but the other alternati·e is a trusted third
partv`. 1he trusted third partv` can be the VADS supplier or. ií
vou don`t trust them. some other organisation. 1he role oí the
third partv is to audit trail all transactions a role the VADS pro·ider
is ideallv positioned to íulíill, and to settle anv dispute about
what messages were sent and what messages were recei·ed.
One aspect oí securitv pro·ided íor bv the LDI standard is the
receipt acknowledgement message. 1his is a transaction speciíic
message sent out bv the recei·ing svstem to acknowledge each
message. order or whate·er. 1rading partners that use receipt
acknowledgement messages need to be clear about the le·el oí
securitv guarantee, implied bv the receipt oí the acknowledgement.
1he LDI acknowledgement message can be:
OAutomaticallv generated bv the LDI Soítware Phvsical
Acknowledgement,. It iníorms the sender that the message
has arri·ed but there is no guarantee that it is passed to the
application íor processing or that it is a ·alid transaction
within the application.
O(oded into the application to coníirm that it is in the svstem
íor processing.
OProduced bv the application once the message is processed to
coníirm that the message was ·alid and possiblv to gi·e
additional iníormation such as stock allocation and expected
deli·erv date Logical Acknowledgement,.
1he need íor securitv in an LDI svstem needs to be kept in
proportion: aíter all LDI is ·erv probablv replacing a paper based
svstem where computer output orders. without signatures. were
bunged in the post and e·entuallv manuallv keved in bv an order
entrv clerk. 1ransmission and LDI message controls are automatic.
(hecks o·er and abo·e that all come at a cost: encrvption and
digital signatures both require extra soítware and procedures:
message acknowledgements require additional soítware to generate
the message and to match it to the original transaction on the
other side oí the trading relationship. LDI orders and in·oices
íor regular transaction oí relati·elv low cost supplies do not justiív
too hea·v an in·estment in pri·acv and securitv - ií an extra load
oí cornílakes arri·es at the supermarket distribution centre it ca be
sorted out on the phone and the error will probablv be in the
warehouse. not the LDI svstem whate·er the supplier tells the
LDI pavments require more care: normallv the pavment transaction
is sent to a bank with its own procedures, with the pavment
ad·ice being sent to the trading partner. 1he o·erall íacilities íor
LDI pri·acv and securitv are summed up in ligure 11.1

Iig. JJ.J LDI Privacy and $ecurity
1he o·erall LDI technical setup is summarized in íig 11.2

Iig JJ.2 LDI summary

O1here are number oí alternati·es instead oí setting own
LDI setup like the low cost. P( based. íree-standing LDI
íacilitv. making use oí an LDI clearing house. Internet access
·ia a clearing house.
O1he appropriate wav to document the details oí a trading
arrangement between electronic trading partners is an LDI
Interchange Agreement
O1he securitv aspects in LDI are (ontrols in the LDI
Standards. (ontrols in the 1ransmission Protocol.
Protection against 1ampering. Pri·acv oí Message.

OVarious preventive measures for computer
OData Lncryption $tandard (DL$)

ODescribe some securitv measures to pre·ent the (omputer
Svstems írom ·arious threats in a network .
1he incredible growth oí the Internet has excited businesses and
consumers alike with its promise oí changing the wav we li·e and
work. But a major concern has been just how secure the Internet
is. especiallv when vou`re sending sensiti·e iníormation through
Let`s íace it. there`s a whole lot oí iníormation that we don`t want
other people to see. such as:
O(redit-card iníormation
OSocial Securitv numbers
OPri·ate correspondence
OPersonal details
OSensiti·e companv iníormation
OBank-account iníormation
Iníormation securitv is pro·ided on computers and o·er the
Internet bv a ·arietv oí methods. A simple but straightíorward
securitv method is to onlv keep sensiti·e iníormation on remo·able
storage media like íloppv disks. But the most popular íorms oí
securitv all relv on encryption . the process oí encoding
iníormation in such a wav that onlv the person or computer,
with the key can decode it.
In the Key of...
(omputer encrvption is based on the science oí crvptographv.
which has been used throughout historv. Beíore the digital age.
the biggest users oí crvptographv were go·ernments. particularlv
íor militarv purposes. 1he existence oí coded messages has been
·eriíied as íar back as the Roman Lmpire. But most íorms oí
cryptography in use these davs relv on computers. simplv because
a human-based code is too easv íor a computer to crack.
Most computer encrvption svstems belong in one oí two
categories. Broadlv speaking. there are two tvpes oí encrvption
OSecret-kev crvptographv
OPublic-kev crvptographv
Secret-Key Cryptography
Secret-kev crvptographv the use oí a shared kev íor both encrvption
bv the transmitter and decrvption bv the recei·er. Shared-kev
techniques suííer írom the problem oí kev distribution. since
shared kevs must be securelv` distributed to each pair oí
communicating parties. Secure-kev distribution becomes
cumbersome in large networks.
1o illustrate secret kev crvptographv. A encrvpts a message with a
secret kev and e-mails the encrvption message to B. On recei·ing
the message. B checks the header to identiív the sender. then
unlocks his electronic kev storage area and takes out the duplicate
oí the secret kev. B then uses the secret kev to decrvpt the message.
1he Achilles heel oí secret-kev crvptographv is getting the sender
and recei·er to agree on the secret kev without a third partv íinding
out. 1his is diííicult because ií A and B are in separate sites. thev
must trust not being o·erheard during íace-to-íace meetings or
o·er a public messaging svstem a phone svstem. a postal ser·ice,
when the secret kev is being exchanged. Anvone who o·erhears or
intercepts the kev in transit can later read all encrvpted messages
using that kev. 1he generation. transmission. and storage oí kevs
is called kev management: all crvptosvstems must deal with kev
management issues. Although the secret-kev method is quite
íeasible and protocol íor one-on-one document interchange. it
does not scale. In a business en·ironment where a companv deals
with thousands oí on-line customers. it is impractical to assume
that kev management will be ílawless. lence. we can saíelv assume
that secret-kev crvptographv will not be a dominant plaver in
gi·en its diííicultv pro·iding secure kev management.
Data Encryption Standard (DES)
A widelv-adopted implementation oí secret-kev crvptographv is
Data Lncrvption Standard DLS,. 1he actual soítware to períorm
DLS is readilv a·ailable at no cost to anvone who has access to the
Internet. DLS was introduced in 19¯5 bv IBM. the National Securitv
Agencv NSA,. and the National Bureau oí Standards NBS, which
is now called NIS1,. DLS has been extensi·elv researched and
studied o·er the last twentv vears
and is deíinitelv the most well-known and widelv used
crvptosvstem in the world. DLS is secret-kev. svmmetric
crvptosvstem: \hen used íor communication. both sender and
recei·er must know the same secret kev. which is used both to
encrvpt and decrvpt the message. DLS can also be used íor single
user encrvption. íor example. to store íiles on a hard disk in
encrvpted íorm. In a multiuser en·ironment. howe·er. secure-kev
distribution becomes diííicult: public-kev crvptographv. discussed
in the next subsection. was de·eloped to sol·e this problem.
DLS operates on 64-bit blocks with a 56-bit secret kev. Designed
íor hardware implementation. it operation is relati·elv íast and
works well íor large bulk documents or encrvption. Instead oí
deíining just one encrvption algorithm. DLS deíines a whole
íamilv oí them. \ith a íew exceptions. a diííerent algorithm is generated
íor each secret kev. 1his means that e·ervbodv can be
told about the algorithm and vour message will still be secure.
\ou just need to tell others vour secret kev a number less than 256.
1he number 256 is also large enough to make it diííicult to break
the code using a brute íorce attack trving to break the cipher bv
using all possible kevs,.
DLS has withstood the test oí time. Despite the íact that its
algorithm is well known. it is impossible to break the cipher without
using tremendous amounts oí computing power. A new
technique íor impro·ing the securitv oí DLS is triple encrvption
1riple DLS,. that is. encrvpting each message block using three
diííerent kevs in succession. 1riple DLS. thought to be equi·alent
to doubling the kev size oí DLS. to 112 bits. should pre·ent
decrvption bv a third partv capable oí single-kev exhausti·e search.
Oí course. using triple-encrvption takes three times as long as
single-encrvption DLS. Ií vou use DLS three times on the same
message with diííerent secret kevs. it is ·irtuallv impossible to
break it using existing algorithms.. O·er the past íew vears se·eral
new. íaster svmmetric algorithms ha·e been de·eloped. but DLS
remains the most írequentlv used.
Public Key Cryptography
A more poweríul íorm oí crvptographv in·ol·es the use oí public
kevs. Public-kev techniques in·ol·e a pair oí kevs: a pri·ate kev and
a public kev associated with each user. Iníormation encrvpted bv
the pri·ate kev can be decrvpted onlv using the corresponding
public kev. 1he pri·ate kev. used to encrvpt transmitted iníormation
bv the user. is kept secret. 1he public kev is used to decrvpt
iníormation at the recei·er and is not kept secret. Since onlv the
bona íide author oí an encrvpted message has knowledge oí the
pri·ate kev. a successíul decrvption using the corresponding public
kev ·eriíies the identitv oí the author and ensures message integritv.
Public kevs can be maintained in some central repositorv and
retrie·ed to decode or encode iníormation. Public kev techniques
alle·iate the problem oí distribution oí kevs
Let`s examine How this Process Works:
Lach partv to a public-kev pairing recei·es a pair oí kevs. the public
kev and the pri·ate kev. \hen A wishes to send a message to B. A
looks up B`s public kev in a directorv. A then uses the public kev to
encrvpt the message and mail it to B. B uses the secret pri·ate kev
to decrvpt the message and read it. Anvone can send an encrvpted
message to B but onlv B can read it. Unless. a third partv. sav (. has
access to B`s pri·ate kev. it is impossible to decrvpt the message
sent bv A. 1his ensure coníidentialitv.
(learlv. one ad·antage oí public kev crvptographv is that no one
can íigure out the pri·ate kev írom the corresponding public kev.
lence. the kev management problem is mostlv coníined to the
management oí pri·ate kevs. 1he need íor sender and recei·er to
share secret iníormation o·er` public channels is completelv
eliminated: All transactions in·ol·e onlv public kevs. and no pri·ate
kev is e·er transmitted or shared: 1he secret kev ne·er lea·es the
user`s Pc. 1hus a sender can send. a coníidential message merelv bv
using public iníormation and that message can be decrvpted onlv
with a pri·ate kev in the sole possession oí the intended recipient.
lurthermore. public-kev crvptographv can be used íor sender
authentication. known as digital signatures. lere`s how
authentication is achie·ed using public-kev crvptographv: A. to
digitallv sign a document. puts his pri·ate kev and the document
together and períorms a computation on the composite kev -
document, to generate a unique number called the digital signature.
lor instance. when an electronic document. such as an order íorm
with a credit card number. is run through the method. the output
is a unique íingerprint` oí the document. 1his íingerprint` is
attached to the original message and íurther encrvpted with the
signer A`s pri·ate kev. 1he result oí the second encrvption is then
sent to B. who then íirst decrvpts the document using Ks public
kev. B checks whether the message has been tampered with or is
coming írom a third partv (. posing as A.
1o ·eriív the signature. B does some íurther computation
in·ol·ing the original document. the purported signature. and
Ks public kev. Ií the results oí the computation generate a
matching íinger-print` oí the document. the digital signature is
·eriíied as genuine: otherwise. the signature mav be íraudulent or
the message altered. and thev are discarded. 1his method is the
basis íor secure e-(ommerce. ·ariations oí which are being
explored bv se·eral companies.
Se·eral implementations oí these popular encrvption techniques
are currentlv emploved. In public-kev encrvption. the RSA
implementation dominates and is considered ·erv secure. but
using it íor o·erseas traííic conílicts \ith the US go·ernment`s
position on export oí munitions technologv oí militarv
importance. (learlv. the go·ernment has not reckoned with the
Internet data ílow.
O1he most popular íorms oí securitv all relv on encryption.
the process oí encoding iníormation in such a wav that onlv
the person or computer, with the key can decode it.
O1here are two tvpes oí encrvption methods:
$ecret-key cryptography and Public-key cryptography
OSecret-kev crvptographv the use oí a shared kev íor both
encrvption bv the transmitter and decrvption bv the recei·er
OA widelv-adopted implementation oí secret-kev
crvptographv is Data Lncryption $tandard (DL$)
OA more poweríul íorm oí crvptographv in·ol·es the use oí
public kevs. Public-kev techniques in·ol·e a pair oí kevs: a
pri·ate kev and a public kev associated with each user.
Iníormation encrvpted bv the pri·ate kev can be decrvpted
onlv using the corresponding public kev

RSA and Public-Key Cryptography
RSA is a public-kev crvptosvstem íor both encrvption and
authentication de·eloped in 19¯¯ bv Ron Ri·est. Adi Shamir. and
Leonard Adleman. RSA svstem uses a matched pair oí encrvption
and decrvption kevs. each. per-íorming a one wav transíormation
oí the data. RSA is also de·eloping digital signatures. which are
mathematical algorithms that encrvpt an entire document. 1he
securitv oí RSA is predicated on the íact that it is extremelv diííicult
e·en íor the-íastest computers-to íactor large numbers that are
the products oí two prime numbers kevs,. each greater than
2112. RSA is important because it enables digital Signatures. which
can be used to authenticate electronic documents the same wav
handwritten signatures are used to authenticate paper documents.
lere`s how. a digital signature works íor an electronic document
to be sent írom the sender X to the recei·er \: X runs a: program
that uses a hash algorithm to generate a digital íingerprint-a pattern
oí bits that uniquelv identiíies a much larger pattern oí bits-íor
the document and encrvpts the íingerprint with his pri·ate kev.
1his is X`s digital signature. which is transmitted along with the
data. \ decrvpts the signature with X`s public kev and runs the
same hash program on the document. Ií the digital íingerprint
output bv the hash program does not match the íingerprint sent
bv X aíter that has been decrvpted,. then the signature is in·alid.
Ií the íingerprints do match. howe·er. then \ can be quite sure
that the digital signature is authentic. Ií the document were altered
en route. the íingerprints will not match the output írom the
hash programs will be diííerent, and the recei·er will know that
data tampering occurred. Ií the sender`s
signature has been íorged encrvpted with the wrong pri·ate kev,.
the íingerprints` won`t match either. 1hereíore the digital signature
·eriíies both the identitv oí the sender and the authenticitv oí the
data in the document.
1he use oí RSA is undergoing a period oí rapid expansion and
mav bec0me ubiquitous. It is currentlv used in a wide ·arietv oí
products. plat-íorms. and industries around the world. It is being
incorporated into the \orld \ide \eb browsers such as NetScape.
gi·ing it a wider audience. In hardware. RSA can be íound in
secure telephones. on Lthernet network cards. and on smart cards.
Adoption oí RSA seems to be proceeding more quicklv íor
authentication digital signatures, than íor pri·acv encrvption,.
Perhaps in part because products íor authentication are easier to
export than those íor pri·acv.
Mixing RSA and DES
ORSA allows two important íunctions not pro·ided bv DLS:
OSecure kev exchange without prior exchange oí kevs. and
ODigital signatures.
Olor encrvpting messages. RSA and DLS are usuallv
combined as íollows:
Oíirst the message is encrvpted with a random DLS kev. then.
beíore being sent o·er an insecure communications channel.
the DLS kev is encrvpted with RSA.
O1ogether. the DLS-encrvpted message and the RSAencrvpted
DLS kev are sent. 1his protocol is known as an
RSA digital en·elope.
\hv not just use RSA to encrvpt the whole message and not use
DLS at all· Although RSA mav be íine íor small messages. DLS
or another cipher, is preíerable íor larger messages due to its
greater speed. In some situations. RSA is not necessarv and DLSkev
agreement can take place the two-user en·ironment: íor
example. ií vou want to keep vour personal íiles encrvpted. just
do so with DLS using. sav. a password as the DLS kev.
RSA. and public kev crvptographv in general. is best suited íor a
multiuser en·ironment. Also. anv svstem in which digital
signatures are desired needs RSA or some other public-kev svstem.
Digital Public-Key Certificates
1he most diííicult aspect oí creating an eííecti·e multipartv
transaction svs-tem is the distribution oí public kevs. Because the
kevs are intended to. be public and widelv distributed. secrecv is
not a concern: anvone should be able to get a copv oí a public kev.
Rather. the primarv concern is authenticitv. An impostor could
easilv create a pri·ate ´ public kev pair and distribute the public kev.
claiming it belonged to someone else.
lor instance. ií A in Lngland is doing business with B in (anada
and wants to encrvpt iníormation so that onlv B can read it. A
must íirst get the public kev oí B írom a kev directorv.
1hat`s where the problem lies. 1here is nothing that savs that this
public kev iníormation is ·alid and not a íorgerv put there bv (
impersonating B. One solution to this problem is a public-kev
certiíicate. A public-kev certiíicate is a data structure. digitallv signed
bv a certiíication authoritv also known as the certiíicate issuer,.
that binds a public-kev ·alue to the identitv oí the entitv holding
the corresponding pri·ate kev. 1he latter entitv is known as the
subject oí the certiíicate. In essence. a certiíicate is a copv oí a
public kev and an identiíier number,. digitallv signed bv a trusted
partv. 1he problem is then transíormed into íinding a trusted
third partv to create these certiíicates. A public-kev user needs to
obtain and ·alidate a certiíicate containing the required public kev.
1his is where it gets complicated. Ií the public-kev user does not
alreadv ha·e a copv oí the public kev oí the trusted partv that
signed bv one certiíicate. then the user mav need an additional
certiíicate to get that public kev- In such cases. a chain oí multiple
certiíicates mav be needed. comprising a certiíicate oí the publickev
owner signed bv one certiíication authoritv. and additional
certiíicates oí certiíication authorities signed bv other certiíication

Clipper Chip
(lipper is an encrvption chip de·eloped as part oí the (apstone
project. Announced bv the \hite louse in April 1993. (lipper
was designed to balance the competing concerns oí íederal law
eníorcement agencies with those oí pri·ate citizens and industrv.
Law eníorcement agencies wish to ha·e access-íor example. bv
wire-tapping-to the communications oí suspected criminals. and
these needs are threatened bv secure crvptographv. (lipper
technologv attempts to balance these needs bv using escrowed
kevs. 1he idea is that communications would be encrvpted with a
secure algorithm. but the kevs would be kept bv one or more third
parties the escrow agencies`, and made a·ailable to law
eníorcement agencies when authorized bv a court-issued warrant.
1hus. íor example. personal communications would be
imper·ious to recreational ea·esdroppers and commercial
communications would be imper·ious to industrial espionage.
and vet the lBI could listen in on suspected terrorists or gangsters.
Skipjack. designed bv the NSA. is the encrvption algorithm
contained in. the clipper chip. It uses One 80-bit kev to encrvpt and
decrvpt 64-bit blocks oí data. Skipjack can be used in the same wav
as DLS and mav be more secure than . DLS. since it uses 80-bit
kevs and scrambles the data íor 32 steps. or rounds`: bv contrast.
DLS uses 56-bit kevs and scrambles the data íor onlv 16 rounds.
1he details oí Skipjack are classiíied .1he decision not to make the
details oí the algorithm publiclv a·ailable has been widelv criticized.
and manv are suspicious that Skipjack is not secure. either due to
design o·ersight or to deliberate introduction oí a secret trapdoor.
Bv contrast. the manv íailed attempts to íind weaknesses in DLS
o·er the vears ha·e made people coníident in the securitv oí DLS.
Since Skipjack is not public. the same scrutinv cannot be applied.
and thus a corresponding le·el oí coníidence mav not arise.
Aware oí such criticism. the go·ernment in·ited a small group oí
independent crvptographers to examine the Skiplack algorithm.
1heir report stated that. although their studv was too limited to
reach a deíiniti·e conclusion. thev ne·ertheless belie·e that Skipjack
is secure. Another consequence oí Skipjack`s classiíied status is
that it cannot be implemented in soítware. but onlv in hardware
bv go·ernment-authorized chip manuíacturers.
ORSA is a public-kev crvptosvstem íor both encrvption and
authentication de·eloped in 19¯¯ bv Ron Ri·est. Adi Shamir.
and Leonard Adleman.
OA public-kev certiíicate is a data structure. digitallv signed bv a
certiíication authoritv also known as the certiíicate issuer,.
that binds a public-kev ·alue to the identitv oí the entitv
holding the corresponding pri·ate kev
O1he idea behind the clipper is that communications would
be encrvpted with a secure algorithm. but the kevs would be
kept bv one or more third parties the escrow agencies`, and
made a·ailable to law eníorcement agencies when authorized
bv a court-issued warrant

UNIT - '

OVarious Anti Viruses

ODescribe some security measures to prevent the Computer
$ystems from various threats in a network
In the pre·ious lecture we discussed (rvptographv technique to
pro·ide securitv oí data in a network. 1odav we will take a look on
other techniques which can íurther enhance the securitv.
Ií vou ha·e been using the Internet íor anv length oí time. and
especiallv ií vou work at a larger companv and browse the \eb
while vou are at work. vou ha·e probablv heard the term firewall
used. lor example. vou oíten hear people in companies sav things
like. I can`t use that site because thev won`t let it through the
Ií vou ha·e a íast Internet connection into vour home either a
DSL connection or a cable modem,. vou mav ha·e íound vourselí
hearing about íirewalls íor vour home network as well. It turns
out that a small home network has manv oí the same securitv
issues that a large corporate network does. \ou can use a íirewall
to protect vour home network and íamilv írom oííensi·e \eb
sites and potential hackers.
Basicallv. a íirewall is a barrier to keep destructi·e íorces awav írom
vour propertv. In íact. that`s whv its called a íirewall. Its job is
similar to a phvsical íirewall that keeps a íire írom spreading írom
one area to the next. As vou read through this article. vou will learn
more about íirewalls. how thev work and what kinds oí threats
thev can protect vou írom.
What It Does
A íirewall is simplv a program or hardware de·ice that íilters the
iníormation coming through the Internet connection into vour
pri·ate network or computer svstem. Ií an incoming packet oí
iníormation is ílagged bv the íilters. it is not allowed through.
Let`s sav that vou work at a companv with 500 emplovees. 1he
companv will thereíore ha·e hundreds oí computers that all ha·e
network cards connecting them together.
In addition. the companv will ha·e one or more connections to
the Internet through something like 11 or 13 lines. \ithout a
íirewall in place. all oí those hundreds oí computers are directlv
accessible to anvone on the Internet. A person who knows what
he or she is doing can probe those computers. trv to make l1P
connections to them. trv to make telnet connections to them and
so on. Ií one emplovee makes a mistake and lea·es a securitv hole.
hackers can get to the machine and exploit the hole.
\ith a íirewall in place. the landscape is much diííerent. A companv
will place a íirewall at e·erv connection to the Internet íor example.
at e·erv 11 line coming into the companv,. 1he íirewall can
implement securitv rules. lor example. one oí the securitv rules
inside the companv might be:
Out oí the 500 computers inside this companv. onlv one oí them
is permitted to recei·e public l1P traííic. Allow l1P connections
onlv to that one computer and pre·ent them on all others. A
companv can set up rules like this íor l1P ser·ers. \eb ser·ers.
1elnet ser·ers and so on. In addition. the companv can control
how emplovees connect to \eb sites. whether íiles are allowed to
lea·e the companv o·er the network and so on. A íirewall gi·es a
companv tremendous control o·er how people use the network.
lirewalls use one or more oí three methods to control traííic
ílowing in and out oí the network:
OPacket filtering - Packets small chunks oí data, are
analvzed against a set oí filters. Packets that make it through
the íilters are sent to the requesting svstem and all others are
OProxy service - Iníormation írom the Internet is retrie·ed
bv the íirewall and then sent to the requesting svstem and
·ice ·ersa.
O$tateful inspection - A newer method that doesn`t examine
the contents oí each packet but instead compares certain kev
parts oí the packet to a database oí trusted iníormation.
Iníormation tra·eling írom inside the íirewall to the outside is
monitored íor speciíic deíining characteristics. then incoming
iníormation is compared to these characteristics. Ií the comparison
vields a reasonable match. the iníormation is allowed through.
Otherwise it is discarded
What It Protects You rom
1here are manv creati·e wavs that unscrupulous people use to
access or abuse unprotected computers:
O#emote login - \hen someone is able to connect to vour
computer and control it in some íorm. 1his can range írom
being able to ·iew or access vour íiles to actuallv running
programs on vour computer.
OApplication backdoors - Some programs ha·e special
íeatures that allow íor remote access. Others contain bugs
that pro·ide a backdoor. or hidden access. that pro·ides
some le·el oí control oí the program.
O$M1P session hijacking - SM1P is the most common
method oí sending e-mail o·er the Internet. Bv gaining
access to a list oí e-mail addresses. a person can send
unsolicited junk e-mail spam, to thousands oí users. 1his
is done quite oíten bv redirecting the e-mail through the
SM1P ser·er oí an unsuspecting host. making the actual
sender oí the spam diííicult to trace.
OOperating system bugs - Like applications. some operating
svstems ha·e backdoors. Others pro·ide remote access with
insuííicient securitv controls or ha·e bugs that an experienced
hacker can take ad·antage oí.
ODenial of service - \ou ha·e probablv heard this phrase
used in news reports on the attacks on major \eb sites. 1his
tvpe oí attack is nearlv impossible to counter. \hat happens
is that the hacker sends a request to the ser·er to connect to
it. \hen the ser·er responds with an acknowledgement and
tries to establish a session. it cannot íind the svstem that
made the request. Bv inundating a ser·er with these
unanswerable session requests. a hacker causes the ser·er to
slow to a crawl or e·entuallv crash.
OL-mail bombs - An e-mail bomb is usuallv a personal
attack. Someone sends vou the same e-mail hundreds or
thousands oí times until vour e-mail svstem cannot accept
anv more messages.
OMacros - 1o simpliív complicated procedures. manv
applications allow vou to create a script oí commands that
the application can run. 1his script is known as a macro.
lackers ha·e taken ad·antage oí this to create their own
macros that. depending on the application. can destrov vour
data or crash vour computer.
OViruses - Probablv the most well-known threat is computer
·iruses. A ·irus is a small program that can copv itselí to
other computers. 1his wav it can spread quicklv írom one
svstem to the next. Viruses range írom harmless messages to
erasing all oí vour data.
O$pam-1vpicallv harmless but alwavs annoving. spam is the
electronic equi·alent oí junk mail. Spam can be dangerous
though. Ouite oíten it contains links to \eb sites. Be careíul
oí clicking on these because vou mav accidentallv accept a
cookie that pro·ides a backdoor to vour computer.
O#edirect bombs - lackers can use I(MP to change redirect,
the path iníormation takes bv sending it to a diííerent router.
1his is one oí the wavs that a denial oí ser·ice attack is set
O$ource routing - In most cases. the path a packet tra·els
o·er the Internet or anv other network, is determined bv the
routers along that path. But the source pro·iding the packet
can arbitrarilv speciív the route that the packet should tra·el.
lackers sometimes take ad·antage oí this to make
iníormation appear to come írom a trusted source or e·en
írom inside the network! Most íirewall products disable
source routing bv deíault.
Some oí the items in the list abo·e are hard. ií not impossible. to
íilter using a íirewall. \hile some íirewalls oííer ·irus protection.
it is worth the in·estment to install anti-·irus soítware on each
computer. And. e·en though it is annoving. some spam is going
to get through vour íirewall as long as vou accept e-mail.
1he le·el oí securitv vou establish will determine how manv oí
these threats can be stopped bv vour íirewall. 1he highest le·el oí
securitv would be to simplv block e·ervthing. Ob·iouslv that deíeats
the purpose oí ha·ing an Internet connection. But a common
rule oí thumb is to block e·ervthing. then begin to select what
tvpes oí traííic vou will allow. \ou can also restrict traííic that
tra·els through the íirewall so that onlv certain tvpes oí
iníormation. such as e-mail. can get through. 1his is a good rule
íor businesses that ha·e an experienced network administrator
that understands what the needs are and knows exactlv what traííic
to allow through. lor most oí us. it is probablv better to work
with the deíaults pro·ided bv the íirewall de·eloper unless there is
a speciíic reason to change it. One oí the best things about a
íirewall írom a securitv standpoint is that it stops anvone on the
outside írom logging onto a computer in vour pri·ate network.
\hile this is a big deal íor businesses. most home networks will
probablv not be threatened in this manner. Still. putting a íirewall
in place pro·ides some peace oí mind.
Proxy Application Gateways
A proxv application gatewav is a special ser·er that tvpicallv runs
on a íirewall machine. 1heir primarv use is access to applications
such as the \orld. \ide \eb írom within a secure perimeter lig
22.1, Instead oí talking directlv to external \\\ ser·ers. each
request írom the client would be routed \ed to a proxv on the
íirewall that is deíined bv the user. 1he proxv knows how to get
through the íirewall. An application le·el proxv makes a íirewall
saíelv permeable íor users in an organization. without creating a
potential securitv hole through which hackers can get into corporate
networks. 1he proxv waits íor a request írom inside the íirewall.
íorwards the request to the remote ser·er
outside the íirewall. reads the response. and then returns it to the
client. In the usual case. all clients within a gi·en subnet use the
same proxv. 1his makes it possible íor the proxv to execute eííicient
caching oí documents that are requested bv a number oí clients.
Proxv gatewavs ha·e se·eral ad·antages. 1hev allow browser
programmers to ignore the complex networking code necessarv
to support e·erv íirewall protocol and concentrate on important
client issues. lor instance. bv using l11P between the client and
proxv. no protocol íunctionalitv is lost. since l1P. Gopher. and
other \eb Protocols map well into l11P methods. 1his íeature
is in·aluable. íor users needn`t ha·e separate. speciallv modiíied
l1P. Gopher. and \AIS clients to get through a íirewall-- a single
\eb client with a proxv ser·er handles all oí these cases.
Proxies can manage network íunctions. Proxving allows íor creating
audit trails oí client transactions´including client IP address. date
and time. bvte count. and success code. Anv regular íields and
meta-iníormation íields in a transaction are candidates íor logging.
1he proxv also can control access to ser·ices íor indi·idual
methods. host and domain. and the like. Gi·en this íirewall design
in which the proxv acts as an intermediarv. it is natural to design
securitv-rele·ant mediation within the proxv. Proxv mediation
helps mitigate securitv concerns bv
1, limiting dangerous subsets oí the l11P protocol a site`s
securitv policv mav prohibit the use oí some oí l11P`s
2, eníorcing client and´or ser·er access to designated hosts an
organization should ha·e the capabilitv to speciív acceptable
web sites,:
3, implementing access control íor network ser·ices that is lost
when the proxv is installed to restore the securitv policv
eníorced bv the íirewall,: and
4, checking ·arious protocols íor well-íormed commands. A
bug existed in a pre·ious ·ersion oí the Mosaic browser that
permitted ser·ers to download a 1rojan horse` URL to the
client that would cause the client to run an arbitrarv program.
1he proxv must be in a position to íilter dangerous URLs and
malíormed commands.

What is antivirus software?
Anti·irus soítware is a program that either comes installed on
vour computer or that vou purchase and install vourselí. It helps
protect vour computer against most ·iruses. worms. 1rojans. and
other unwanted in·aders that can make vour computer sick.`
Viruses. worms. and the like oíten períorm malicious acts. such as
deleting íiles. accessing personal data. or using vour computer to
attack other computers.
Why should I use antivirus software?
\ou can help keep vour computer healthv bv using anti·irus
soítware. Remember to update vour anti·irus soítware regularlv.
1hese updates are generallv a·ailable through a subscription írom
vour anti·irus ·endor.
Regular Backups
1his poster reminds each computer user oí their responsibilitv to
make regular backups to protect their computer data. 1he task oí
backing up the data íound on vour computer is oíten the most
o·erlooked and hardlv e·er done until its too late` action within
the computer end-user communitv. \ith the soítware tools now
a·ailable. it no longer is the arduous task that is once was a íew
vears ago... 1here is no excuse not to backup vour data - do it now.
don`t wait until its too late! Once vour svstem is in use. vour next
consideration should be to back up the íile svstems. directories.
and íiles. liles and directories represent a signiíicant in·estment oí time
and eííort.
At the same time. all computer íiles are potentiallv easv to change
or erase. either intentionallv or bv accident. Ií vou take a careíul
and methodical approach to backing up vour íile svstems. vou
should alwavs be able to restore recent ·ersions oí íiles or íile
svstems with little diííicultv.
ote: \hen a hard disk crashes. the iníormation contained on
that disk is destroved. 1he onlv wav to reco·er the destroved data
is to retrie·e the iníormation írom vour backup copv.
1here are se·eral diííerent methods oí backing up. 1he most
írequentlv used method is a regular backup. which is a copv oí a
íile svstem. directorv. or íile that is kept íor íile transíer or in case
the original data is unintentionallv changed or destroved. Another
íorm oí backing up is the archi·e backup: this method is used íor
a copv oí one or more íiles. or an entire database that is sa·ed íor
íuture reíerence. historical purposes. or íor reco·erv ií the original
data is damaged or lost. Usuallv an archi·e is used when that
speciíic data is remo·ed írom the svstem.
A íirewall is simplv a program or hardware de·ice that íilters the
iníormation coming through the Internet connection into vour
pri·ate network or computer svstem. Ií an incoming packet oí
iníormation is ílagged bv the íilters. it is not allowed through.
lirewalls use one or more oí three methods to control traííic
ílowing in and out oí the network: Packet filtering, Proxy
service, $tateful inspection
Olirewall protects írom #emote login. Application
backdoors, Operating system bugs, Denial of service.Lmail
bombs. Virus
OA proxv application gatewav is a special ser·er that tvpicallv
runs on a íirewall machine. Instead oí talking directlv to
external \\\ ser·ers. each request írom the client would
be routed \ed to a proxv on the íirewall that is deíined bv
the user. 1he proxv knows how to get through the íirewall.
OAnti·irus soítware is a program that either comes installed
on vour computer or that vou purchase and install vourselí.
It helps protect vour computer against most ·iruses. worms.
1rojans. and other unwanted in·aders that can make vour
computer sick.`

OLthical, $ocial, and Political issues in LCommerce

OUnderstand Lthical. Social. and Political issues in L(ommerce
Deíining the rights oí people to express their ideas and the
propertv rights oí copvright owners are just two oí manv ethical.
social. and political issues raised bv the rapid e·olution oí ecommerce.
1hese questions are not just ethical questions that we as indi·iduals ha·e
to answer: thev also in·ol·e social Institutions such as íamilv. schools.
and business íirms. And these questions ha·e ob·ious political
dimensions because thev in·ol·e collecti·e choices about how we
should li·e and what laws we would like to li·e under.
In this lecture we discuss the ethical. social. and political issues
raised in e-commerce. pro·ide a íramework íor organizing the
issues. and make recommendations íor managers who are gi·en
the responsibilitv oí operating e-commerce companies within
commonlv accepted standards oí appropriateness.
Understanding Lthical. Social. And Political Issues In L-(ommerce
Internet and its use in e-commerce ha·e raised per·asi·e ethical.
social and political issues on a scale unprecedented íor computer
technologv. Lntire sections oí dailv newspapers and weeklv
magazines are de·oted to the social impact oí the Internet. \hv is
this so· \hv is the Internet at the root oí so manv contemporarv
contro·ersies· Part oí the answer lies in the underlving íeatures oí
Internet technologv and the wavs in which it has been exploited
bv business íirms. Internet technologv and its use in e-commerce
disrupts existing social and business relationships and understandings.
Instead oí considering the business consequences oí each unique
íeature. here we examine the actual or potential ethical. social.
and´or political consequences oí the technologv see 1able 23.1,.
\e li·e in an iníormation societv.` where power and wealth
increasinglv depend on iníormation and knowledge as central
assets. (ontro·ersies o·er iníormation are oíten in íact
disagreements o·er power. wealth. iníluence. and other things
thought to be ·aluable. Like other technologies such as steam.
electricitv. telephones. and tele·ision. the Internet and e-commerce
can be used to achie·e social progress. and íor the most part. this
has occurred. lowe·er. the same technologies can be used to
commit crimes. despoil the en·ironment. and threaten cherished
social ·alues. Beíore automobiles. there was ·erv little interstate
crime and ·erv little íederal jurisdiction o·er crime. Likewise with
the Internet: Beíore the Internet. there was ·erv little cvber crime.`
Manv business íirms and indi·iduals are beneíiting írom the
commercial de·elopment oí the Internet. but this de·elopment
also exacts a price írom indi·iduals. organizations. and
societies.1hese costs and beneíits must be careíullv considered bv
those seeking to make ethical and sociallv responsible decisions in
this new en·ironment. 1he question is: how can vou as a manager
make reasoned judgments abo·e what vour íirm should do in a
number oí e-commerce areas- írom securing the pri·acv oí vour
customer`s click stream to ensuring the integritv oí vour companv
domain name·
1he major ethical. social. and political issues that ha·e de·eloped
around e-commerce o·er the past se·en to eight vears can be looselv
categorized into íour major dimensions: iníormation rights.
propertv rights. go·ernance. and public saíetv and welíare as shown
in lig 23.1Some oí the ethical. social. and political issues raised in
each oí these areas include the íollowing:
OInformation rights: \hat rights to their own personal
iníormation do indi·iduals ha·e in a public marketplace. or
in their pri·ate homes. when Internet technologv make
iníormation collection so per·asi·e and eííicient· \hat
rights do indi·iduals ha·e to access iníormation about
business íirms and other organizations·
OProperty rights: low can traditional intellectual propertv
rights be eníorced in an internet world where períect copies
oí protected works can be made and easilv distributed
worldwide in seconds·
Oovernance: Should the Internet and e-commerce be
subject to public laws· And ií so. what law-making bodies
ha·e jurisdiction - state. íederal. and´or international·
OPublic safety and welfare: \hat eííorts should be
undertaken to ensure equitable access to the Internet and
ecommerce channels· Should go·ernments be responsible
íor ensuring that schools and colleges ha·e access to the
Internet· Is certain online content and acti·ities - such as
pornographv and gambling - a threat to public saíetv and
welíare· Should mobile commerce be allowed írom mo·ing
1o illustrate. imagine that at anv gi·en moment societv and
indi·iduals are more or less in an ethical equilibrium brought
about bv a delicate balancing oí indi·iduals. social organizations.
and political institutions. Indi·iduals know what is expected oí
them. social organizations such as business íirms know their
limits. capabilities. and roles and political institutions pro·ide a
supporti·e íramework oí market regulation. banking and
commercial law that pro·ides sanctions against ·iolators.Now.
imagine we drop into the middle oí this calm setting a poweríul
new technologv such as the Internet and e-commerce.
Suddenlv indi·iduals. business íirms. and political institutions
are coníronted bv new possibilities oí beha·ior. lor instance.
indi·iduals disco·er that thev can download períect digital copies
oí music tracks. something which. under the old technologv oí
(Ds. would ha·e been impossible. 1his can be done. despite the
íact that these music tracks still belong` as a legal matter to the
owners oí the copvright - musicians and record label companies.
1he introduction oí the Internet and e-commerce impacts
indi·iduals. societies. and political institutions. 1hese impacts can
be classiíied into íour moral dimensions: propertv rights.
iníormation rights. go·ernance. and public saíetv and welíare 1hen
business íirms disco·er that thev can make a business out oí
aggregating these musical tracks - or creating a mechanism íor
sharing musical tracks- e·en though thev do not own` them in
the traditional sense. 1he record companies. courts. and (ongress
were not prepared at íirst to cope with the onslaught oí online
digital copving. (ourts and legislati·e bodies will ha·e to make
new laws and reach new judgments about who owns digital
copies oí copvrighted works and under what conditions such
works can be shared.` It mav take vears to de·elop new
understandings. laws. and acceptable beha·ior in just this one area
oí social impact. In the meantime. as an indi·idual and a manager.
vou will ha·e to decide what vou and vour íirm should do in legal
grev`- areas. where there is conílict between ethical principles. but
no c1ear-cutural guidelines. low can vou make good decisions in
this tvpe oí situation·
Beíore re·iewing the íour moral dimensions oí e-commerce in
greater depth. we will brieílv re·iew some basic concepts oí ethical
reasoning that vou can use as a guide to ethical decision making.
and pro·ide general reasoning principles about social political
issues oí the Internet that vou will íace in the íuture.

lig 23.1 1he Moral Dimensions oí an Internet Societv
Let`s take a look on what are Lthics. \hat is an Lthical dilemma
and what are the Lthical principles which we can íollow in order to
come out oí the ethical dilemma.
Basic Ethical Concepts: Responsibility Accountability. and
Lthics is at the heart oí social and political debates about the
Internet. Lthics is the studv oí principles that indi·iduals and
organizations can use to determine right and wrong courses oí
action. It is assumed in ethics that indi·iduals are íree moral agents
who are in a position to make choices. \hen íaced with alternati·e
courses oí action. what is the correct moral choice·
Lxtending ethics írom indi·iduals 94 business íirms and e·en
entire societies can be diííicult. but it is not impossible. As long as
there is a decision-making bodv or indi·idual such as a Board oí
Directors or (LO in a business íirm or a go·ernmental bodv in a
societv,. their decisions can be judged against a ·arietv oí ethical
principles. Ií vou understand some basic ethical principles. vour
abilitv 94 reason about larger social ava political debates will be
impro·ed. In western culture. there are abilitv and liabilitv principles
that all ethical schools oí thought share: responsibilitv. accountliabilitv.
Respons1nilitv means that as íree moral agents. indi·iduals.
organizations and societies are responsible íor the actions thev
take. Accountabilitv means that indi·iduals. organizations. and
societies should be held accountable 94 others íor the consequences
oí their actions. 1he third principle -liabilitv - extends the concepts
oí responsibilitv and accountabilitv 94 the area oí law. Liabilitv is a
íeature oí political svstems in which a bodv oí law is in place that
permits indi·iduals 94 reco·er the damages done 94 them bv other
actors. svstems. or organizations. Due process is a íeature oí law
go·erned societies and reíers 94 a process in which laws are known
and understood and there is an abilitv 94 appeal 94 higher authorities
to ensure that the laws ha·e been applied correctlv.
Analyzing Ethical Dilemmas
Lthical. social. and political contro·ersies usuallv present themsel·es
as dilemmas. A dilemma is a situation in which there are at least
two diametricallv opposed actions. each oí which supports a
desirable outcome. \hen coníronted with a situation that seems
to present ethical dilemmas. how can vou analvze and reason
about the situation· 1he íollowing is a íi·estep process that should
J. Identify and describe clearly the facts. lind out who did
what to whom. and where. when. and how. In manv
instances. vou will be surprised at the errors in the initiallv
reported íacts. and oíten vou will íind that simplv getting the
íacts straight helps deíine the solution. It also helps to get
the opposing parties in·ol·ed in an ethical dilemma to agree
on the íacts.
2. Define the conflict or dilemma and identify the higher
order value involved. Lthical. social. and political issues
alwavs reíerence higher ·alues. Otherwise. there would be no
debate. 1he parties to a dispute all claim to be pursuing
higher ·alues e.g.. íreedom. pri·acv. protection oí propertv.
and the -enterprise svstem,. lor example. Double(lick and
its supporters argue that their tracking oí consumer
mo·ements on the \eb increases market eííiciencv and the
wealth oí the entire societv. Opponents argue this claimed
eííiciencv comes at the expense oí indi·idual pri·acv. and
Double(lick should cease its or oííer \eb users the option
oí not participating in such tracking.
3. Identify the stakeholders. L·erv ethical. social. and political
issue has stakeholders: plavers in the game who ha·e an
interest in the outcome. who ha·e its ·ested in the situation.
and usuallv who ha·e ·ocal opinions. lind out the identitv
oí these groups and what thev want. 1his will be useíul later
when designing a solution.
4. Identity the options that you can reasonably take. \ou
mav íind that none oí the options satisíies all the interests
in·ol·ed. but that some options do a better job than others.
Sometimes. arri·ing at a good` or ethical solution mav not.
alwavs be a balancing oí consequences to stakeholders.
5. Identify the potential consequences of your
options.Some options mav be ethicallv correct. but
disastrous írom other points oí ·iew. Other options mav
work in this one instance. but not in other similar instances.
Alwavs ask vourselí. what ií I choose this option
consistentlv o·er time·` Once vour analvsis is complete. vou
can reíer to the íollowing well established ethical principle to
help decide the matter.
Candidate Ethical Principles
Although vou are the onlv one who can decide which among
manv ethical principles vou will íollow and how vou will prioritize
them. it is helpíul to consider some ethical principles with deep
roots in manv cultures that ha·e sur·i·ed throughout recorded
O1he olden #ule: Do unto others as vou would ha·e them
do unto vou. Putting vourselí into the place oí others and
thinking oí vourselí as the object oí the decision can help
vou think about íairness in decision making.
OUniversalism: Ií an action is not right íor all situations.
then it is not right íor anv speciíic situation Immanuel
Kant`s categorical imperati·e,. Ask vourselí. Ií we adopted
this rule in e·erv case. could the organization. or societv.
O$lippery $lope: Ií an action cannot be taken repeatedlv. then
it is not right to take at all Descartes` rule oí change,. An
action mav appear to work in one instance to sol·e a
problem. but ií repeated. would result in a negati·e
outcome. In plain Lnglish. this rule might be stated as once
started down a slipperv path. vou mav not be able to stop.`
OCollective Utilitarian Principle: 1ake the action that
achie·es the greater ·alue íor all oí societv. 1his rule assumes
vou can prioritize ·alues in a rank order and understand the
consequences oí ·arious courses oí action.
O#isk Aversion: 1ake the action that produces the least harm.
or the least potential cost. Some actions ha·e extremelv high
íailure costs oí ·erv low probabilitv e.g.. building a nuclear
generating íacilitv in an urban area, or extremelv high íailure
costs oí moderate probabilitv speeding and automobile
accidents,. A·oid the high-íailure cost actions and choose
those actions whose consequences would not be
catastrophic. e·en ií there were a íailure.
Oo Iree Lunch: Assume that ·irtuallv all tangible and
intangible objects are owned bv someone else unless there is
a speciíic declaration otherwise. 1his is the ethical no íree
lunch` rule., Ií something someone else has created is useíul
to vou. it has ·alue and vou should assume the creator wants
compensation íor this work.
O1he ew York 1imes 1est (Perfect Information #ule):
Assume that the result oí vour decision on a matter will be
the subject oí the lead article in the 0 Y47 )iv08 the next
dav. \ill the reaction oí readers be positi·e or negati·e·
\ould vour parents. íriends. and children be proud oí vour
decision· Most criminals and unethical actors assume
imperíect iníormation. and thereíore thev assume the
decisions and actions will ne·er be re·ealed. \hen making
decisions in·ol·ing ethical dilemmas. it is wise to assume
períect iníormation markets.
O1he $ocial Contract #ule: \ould vou like to li·e in a
societv where the principle vou are supporting would become
an organizing principle oí the entire societv· lor instance.
vou might think it is wonderíul to download illegal copies
oí vv8ic tracks. but vou might not want to li·e in a societv
that did not respect proper:` rights. such as vour propertv
rights to the car in vour dri·ewav. or vour rights to a term
paper or original art. None oí these rules is an absolute
guide. and there are exceptions and logical diííiculties with all
these rules. Ne·ertheless. actions that do not easilv pass these
guide-lines deser·e some ·erv close attention and a great deal
oí caution because the appearance oí unethical beha·ior mav
do as much harm to vou and vour companv as the actual
Now that vou ha·e an understanding oí some basic ethical
reasoning concept. let`s take a closer look at each oí the major
tvpes oí ethical. social. and political debates that ha·e arisen in
Privacy and Information Rights
1he Internet and the \eb pro·ide an ideal en·ironment íor
in·ading the personal pri-·acv oí millions oí users on a scale
unprecedented in historv. Perhaps no other recent -issue has raised
as much widespread social and political concern as protecting the
pri·acv oí o·er 160 million \eb users in the United States alone.
1he major ethical issues related to ecommerce and pri·acv includes
the íollowing: Under what conditions should we in·ade the pri·acv
oí others· \hat legitimates intruding into others li·es through
unobtrusi·e sur·eillance. market research. or other means· 1he
major social issues related to e-commerce and pri·acv concern the
de·elopment oí exception oí pri·acv` or pri·acv norms. as well
as public attitudes. In what areas oí should we as a societv encourage
people to think thev are in pri·ate territorv` as opposed to public
·iew· 1he major political issues related to ecommerce and pri·acv
concern the de·elopment oí statutes that go·ern the relations
between record keepers and indi·iduals.
low should organizations - public and pri·ate -who are reluctant
to remit the ad·antages that come írom the uníettered ílow oí
iníormation on indi·iduals - be restrained. ií at all· In the íollowing
section. we will look íirst at the ·arious practices oí e-commerce
companies that pose a threat to pri·acv.

Information Collected At E-Commerce Sites
Almost all 9¯°, \eb sites collect personallv identiíiable
iníormation and use cookies to track the click stream beha·ior oí
·isitors on the site.
Personally identifiable information (PH) is anv data that can
be used to identiív. locate. or contact an indi·idual. As describe
below. ad·ertising networks track the beha·ior oí consumers across
thousands oí popular sites. not just at one site. In addition.
most sites collect anonymous information composed oí
demographic and beha·ioral iníormation that does not include
anv personal identiíiers. lor instance. sites collect Iníormation
about age. occupation. income. zip code. ethnicitv. and other data
that place a cookie on vour hard dri·e to identiív vou bv numberbut
not bv name.
1able 23.1 lists manv oí the personal identiíiers routinelv
collected bv online e-commerce sites. 1able 23.2 illustrates some
oí the major wavs online íirms gather iníormation about

1able 23.J Personal Information Collected by L Commerce $ites

Iig 23.2 1he Internet's major Personally identifiable
Information Gathering Tools
Profiling: Privacy And Advertising Networks
A majoritv 5¯ °, oí all \eb sites. and ¯8 ° oí the most popular
100 sites allow third parties-including ad·ertising networks such
as Adíorce. A·enue A. Double(lick. Lngage. L90. MatchLogic.
and 24´¯ Media these íirms constitute about 90 ° oí the network
ad·ertising industrv,- to place cookies on a ·isitor`s hard dri·e in
order to engage in proíiling.
Profiling is the creation oí digital images that characterize online
indi·idual and group beha·ior. An ad·ertising network such as
24´¯ Media maintains o·er 60 million anonvmous proíiles and
more than 20 million personal proíiles. Double(lick maintains
o·er 100 million anonvmous proíiles.
Anonymous profiles identiív people as belonging to highlv
speciíic and targeted groups. íor example. 20-30-vear-old males.
with college degrees and incomes greater than >30.000 a vear. and
interested in high íashion clothing.
Personal profiles add a personal e-mail address. postal address.
and´or phone number to beha·ioral data. Increasinglv. online
íirms are attempting to link their online proíiles to oííline
consumer data collected bv the established retail and catalog íirms.
In the past. indi·idual stores collected data on customer mo·ement
through a single store in order to understand consumer beha·ior
and alter the design oí stores accordinglv. Also. purchase and
expenditure data was gathered on consumers purchasing írom
multiple stores - usuallv long aíter the purchases were made - the
data was used to target direct mail
and in-store campaigns. and mass media ad·ertising. 1he online
ad·ertising networks ha·e added se·eral new dimensions to
established oííline marketing techniques. lirst. thev ha·e the abilitv
to preciselv track not just consumer purchases but , b748ivg
b0,;i47 on the \eb at thousands oí most popular member sites.
including browsing book lists. íilling out preíerence íorms. and
·iewing content pages. Second. thev create the abilitv to dvnamicallv
-adjust what the shopper sees on screen - including prices. 1hird.
thev create the abilitv to build and continuallv reíresh highresolution
data images or beha·ioral proíiles oí consumers . \hat`s
diííerent about ad·ertising networks is the scope and- intensitv
oí the data dragnet. and the abilitv to manipulate the shopping
en·ironment to the ad·antage oí the merchant. Most oí this
acti·itv occurs in the background without the knowledge oí the
shopper. and it occurs dvnamicallv online in less than a second.
Online consumer Joe Smith goes to a \eb site that sells sporting
goods. le clicks on the pages íor golí bags. \hile there. he see a
banner ad. which he ignores as it does not interest him. 1he ad
was placed bv USA and Network. le then goes to a tra·el site and
enters a search on lawaii` the USAad Networks ser·es ads on
this site. and Joe sees an ad íor rental cars there. Joe then ·isits an
online bookstore and browses through books about he worlds
best golí courses. USAad Network ser·es ads there as well. A
week later. Joe ·isits his ía·orite online news site. and notices an
ad íor golí ·acation packages in lawaii. Delighted. he clicks on the
ad. which was ser·ed bv USAad Network. Later. Joe begins to
wonder whether it was a coincidence that this particular ad appeared
and. ií not. how it happened. 1he sample online proíile illustrates
se·eral íeatures oí such proíiles.
lirst. the proíile created íor Joe Smith was completelv anonvmous
and did not require anv per-sonal iníormation such as a name. email
address. or social securitv number. Ob·iouslv. this proíile
would be more ·aluable ií the svstem did ha·e personal
iníormation because men Joe could be sent e-mail marketing.
Second. ad networks do not know who is operating the browser.
Ií other members oí Joe`s íamilv used the same computer to
shop the \eb. thev would be exposed to golí ·acation ads. and
Joe could be exposed to ads more appropriate to his wiíe or
children. 1hird. proíiles are usuallv ·erv imprecise. the result oí
best guesses` and just plain guesses. Proíiles are built using a
product´ser·ice scoring svstem that is not ·erv detailed. and as a
result the proíiles are crude.
In the abo·e example. Joe is ob·iouslv interested in golí and
tra·el because he intentionallv expressed these interests. lowe·er.
he mav ha·e wanted to scuba di·e in lawaii. or ·isit old íriends.
not plav golí. 1he proíiling svstem in the example took a leap oí
íaith that a golí ·acation in lawaii is what Joe reallv wants.
Sometimes these guesses work. but there is considerable e·idence
to suggest that simplv knowing Joe made an inquirv about lawaii
would be suííicient to sell him a trip to lawaii íor anv oí se·eral
acti·ities and the USAad Network pro·ided little additional ·alue.
As a result oí the crudeness oí the proíiles. marketers ha·e been
unwilling to pav premium prices íor highlv targeted. proíile-based
ads. preíerring instead to use more ob·ious and less expensi·e
techniques such as placing tra·el ads on tra·el sites and golí ads
on golí sites.
Network ad·ertising íirms argue that \eb proíiling beneíits both
consumers and businesses. Proíiling permits targeting oí ads.
ensuring that consumers see ad·ertising mostlv íor products and
ser·ices in which thev are actuallv interested. Business beneíit bv
not paving íor wasted ad·ertising sent to consumers who ha·e no
interest in their product or ser·ice. 1he industrv argues that bv
increasing the eííecti·eness oí ad·ertising. more ad·ertising
re·enues go to the Internet. which in turn subsidizes íree content
on the Internet. Last. product designers and entrepreneurs beneíit
bv sensing demand íor new products and ser·ices bv examining
user searches and proíiles.
(ritics argue that proíiling undermines the expectation oí
anonvmitv and pri·acv that most people ha·e when using the
Internet. and change what should be a pri·ate experience into one
where an indi·idual`s e·erv mo·e is recorded. As people become
aware that their e·erv mo·e is being watched. thev will be íar less
likelv to explore -sensiti·e topics. browse pages. or read about
contro·ersial issues. In most cases. the proíiling is in·isible to
users. and e·en hidden. (onsumers are not notiíied that proíiling
is occurring. Proí1ling permits aggregating data on hundreds or
e·en thousands oí unrelated sites on the \eb.
1he cookies placed bv ad networks are persistent. 1heir tracking
occurs o·er an extended period oí time and resumes each time the
indi·idual on to the Internet. 1his click stream data is used to
create proíiles that can include hundreds oí distinct data íields íor
each consumer. Associating so-called anonvmous proíiles with
personal iníormation is íairlv easv. and companies can change
policies quicklv without iníorming the consumer.
Some critics belie·e proíiling permits weblining - charging some
customers more monev íor products ser·ices based on their
Although the iníormation gathered bv network ad·ertisers is oíten
anonvmous. in manv cases. the proíiles deri·ed írom tracking
consumers` acti·ities on the \eb are linked or merged with
personallv identiíiable iníormation. Double(lick and other
ad·ertising network íirms ha·e attempted to purchase oííline
marketing íirms that collect oííline consumer data íor the purpose
oí matching oííline and online beha·ioral data at the indi·idual
le·el. lowe·er. public reaction was so negati·e that no network
ad·ertising íirms publiclv admit to matching oííline Pl with online
proíile data. Ne·ertheless. client \eb sites encourage ·isitors to
register íor prizes. beneíits. or content access in order to capture
personal iníormation such as e-mail addresses. Anonvmous
beha·ioral data is íar more ·aluable ií it can be linked with oííline
consumer beha·ior. e-mail addresses. and postal addresses. 1his
consumer data can also be combined with data on the consumers`
oííline purchases. or iníormation collected directlv írom consumers
through sur·evs and registration íorms.
As the technologv oí connection to the Internet íor consumers
mo·es awav írom telephone modems where IP addresses are
assigned dvnamicallv. and toward static assigned IP addresses used
bv DSL and cable modems. then connecting anonvmous proí1les
to personal names and e-mail addresses will become easier and
more pre·alent.
lrom a pri·acv protection perspecti·e. the ad·ertising network
raise issues about who will see and use the iníormation held bv
pri·ate companies. the absence oí consumer control o·er the use
oí the iníormation. the lack oí consumer choice. the notice. and
the lack oí re·iew and amendment procedures. 1he per·asi·e and
largelv unregulated collection oí personal iníormation online íears
and opposition among consumers. In recent sur·evs. 92°oeholds
said thev do not trust online companies to keep their personal
iníormation coníidential. and 82 ° agreed that the go·ernment
should regulate how online companies use personal iníormation.
One result oí the lack oí trust toward online íirms speciíic íears
oí pri·acv in·asion is a reduction in online purchases. An estimated
>3 billion was lost in 2000 sales. and >18 billion will be lost in
2002 online sales ií nothing is done to allav consumer íears.
(oncerns about online pri·acv ha·e led to two tvpes oí regulatorv
eííorts: go·ernmental regulation bv íederal and state agencies and
pri·ate selí-regulation eííorts led bv industrv groups. But beíore
considering these eííorts to preser·e and maintain pri·acv. we
should íirst take a more in-depth look at the concept oí pri·acv.
The Concept of Privacy
Pri·acv is the moral right oí indi·iduals to be leít alone. íree írom
sur·eillance or interíerence írom other indi·iduals or organizations.
including the state. Pri·acv is a girder supporting íreedom: \ithout
the pri·acv required to think. write. plan. and associate
independentlv and without íear. social and political íreedom is
weakened. and perhaps destroved. Iníormation pri·acv is a subset
oí pri·acv. 1he right to iníormation pri·acv includes both the
claim that certain iníormation should not be collected at all bv
go·ernments or business íirms. and the claim oí indi·iduals to
control o·er personal oí whate·er iníormation that is collected
about them. Indi·idual control o·er personal iníormation is at
the core oí the pri·acv concept.
Due process also plavs an important role in deíining pri·acv. 1he
best statement oí due process in record keeping is gi·en bv the
lair Iníormation Practices doctrine de·eloped in the earlv 19¯0s
and extended to the online pri·acv debate in the late 1990s
described below,.
Privacy claims-and thinking about pri·acv - mushroomed in.
the United States at the end oí the nineteenth centurv as the
technologv oí photographv and tabloid claim oí indi·iduals to
journalism enabled the in·asion oí the heretoíore pri·ate li·es oí
wealthv industrialists. lor most oí the twentieth centurv. howe·er.
pri·acv thinking and legislation íocused on restraining the
go·ernment írom collecting and using personal iníormation.\ith
the explosion in the collection 41 pri·ate personal iníormation bv
\eb-based marketing íirms since 1995. pri·acv concerns are
increasinglv directed toward restraining the acti·ities 41 pri·ate
íirms in the collection and use 41 in 147v,tion on the
Web. Claims to privacy are also involved at the workplace:
Millions oí emplovees are subject to ·arious íorms 41 electronic
sur·eillance that in manv cases is enhanced bv íirm Intranets and
\eb technologies. lor instance. 38° 4 1 emplovers monitor
emplovee e-mail. and 30° monitor emplovee computer íiles.
Legal Protections
In the United States. (anada. and Germanv. rights to pri·acv are
explicitlv granted in or can be deri·ed írom. íounding documents
such as constitutions. as well as in speciíic statutes. In Lngland
and the United States. there is also protection oí pri·acv in the
common law. a bodv oí court decisions in·ol·ing torts or personal
injuries. lor instance. in the United States. íour pri·acv-related
torts ha·e been deíined in court decisions in·ol·ing claims oí
injurv to indi·iduals caused bv other pri·ate parties intrusion on
solitude. public disclosure oí pri·ate íacts. publicitv placing a
person in a íalse light. and appropriation oí a person`s name or
likeness mostlv concerning celebrities, íor a commercial purpose.
In the United States. the claim to pri·acv against go·ernment
intrusion is protected primarilv bv the lirst Amendment
guarantees oí íreedom oí speech and association and the lourth:
Amendment protections against unreasonable search and seizure
oí one`s personal documents or home. and the lourteenth
Amendment`s guarantee oí due process.
In addition to common law and the (onstitution. there are both
íederal laws and state laws that protect indi·iduals against
go·ernment intrusion and in some cases deíine pri·acv rights ·isa-
·is pri·ate organizations such as íinancial. education~. and media
institutions cable tele·ision and ·ideo rentals,
OInternet and its use in e-commerce ha·e raised per·asi·e
ethical. social and political issues on a scale unprecedented íor
computer technologv.
O1he major ethical. social. and political issues that ha·e
de·eloped around e-commerce o·er the past se·en to eight
vears can be looselv categorized into íour major dimensions:
iníormation rights. propertv rights. go·ernance. and public
saíetv and welíare.
OLthics is at the heart oí social and political debates about the
Internet. Lthics is the studv oí principles that indi·iduals
and organizations can use to determine right and wrong
courses oí action

 0.9743.,7098 3 00.9743. 2,709 8 90 :80 41 31472,943 ,3/ .422:3.,9438 90.344945708039,7,30414110738,;,,-03,2,709802039 84 9,9 90 5:7.,807 .,3 .425,70 90 57.08 ,3/ 4907 ,997-:908  41 90 4110738 ,3/ 2,0 , 5:7.,80 /0.843  %0 :8:, 0,250 41 ,3 00.9743.2,7098,3,730-44388902   0.9743.,9,3907.,30    574;/08 , 89,3/,7/0/ 88902 147 .4/3 97,/0 97,38,.9438 84 9,9 90 .,3 -0 .422:3.,90/ /70.9 1742 430 .425:907 88902 94 ,3490794:990300/14757390/ 47/078,3/3;4.08,3/90/0,8,3/07747825.935,507,3/3   8 :80/ - 47,3,9438 9,9 2,0 , ,70 3:2-07 41 70:,7 97,38,.9438  3080.9470708 09038;0 :80/ 8 90 ,70 8:5072,709 .,38  . :80  147 97,38,.943899078:55078   390730942207.0 31472,943 ,3/ .422:3.,9438 90.34408 .,3 ,84 -0 :80/ 94 ,/;07980,3/2,043.0
4118,0841,/07,304144/8,3/807;.08  %8 950 41 0 
42207.0 8 9510/ - 90 .42207., :80 41 90 3907309  %0 3907309 .,3  147 0,250  -0 :80/ 147 90 5:7.,80 41 -4489,9,70903/0;070/-54894790-443419.0989,9.,3 -0 5.0/ :5 - 90 .0398 03 90 ,77;0 ,9 90 0;039  9 8 94 -0 3490/9,9903907309834990 4390.344:80/1479895041807;.0,3/9883499043:80 4190390730930 

 &8,0410.9743.,7098 0.9743. 2,7098 ,70 0,250/ - 90 ,730 -443 889028 0.9743.2,7098,70,84:80/39013,3.,,3/.4224/9 2,7098,3/,,390/0,38/430;,390720/,70894-: 894.8 ,3/ 8,708 , 202-07 41 90 5:-. :808 90 807;.08 41 , 894.-7407  7:,- 90 :80 41 00.9743. 2,7098 ,8 807;0/ 90 .:8942070 990,8889,3.041,44/97,;0,03990 ,730 .:894207 .,3 -0 314720/ 41 , 90 198 ,;,,-0 147 ,3 3903/0/ 4:730 ,3/ 903 800.9  43 90 -,88 41 57.0 .43;0303.0 4,98.020 09. 90199,990894-44   /;,39,08,3/8,/;,39,08410.9743.,7098 %0,/;,39,0841,300.9743.2,7099490.:894207,708010;/039  &83 ,3 ,730 -443 88902  147 0,250  9070 8 , 8.7003 9,9 848 , 90 198 1742 8,  0 47 94 48 3008 ,3/ 90 .438:207.,32,0,3314720/.4.094:9 ,;3948503/920,3/01147913/34:9.,730819,974:90 ,3/903.439,.930,.4190,7308944-9,3199208 57.0,3/ ,;,,-9 /09,8  3.0 , 19 8 800.90/ 90 88902 1,.9,908 90 -443419,919 5,3901,70,3/57393909.09  4790800790,/;,39,08,700880;/039 %080079,98902489 .425099;0 2, /4 0  90 00.9743. 2,709 2,08 ,;,,-0 31472,94343907574/:.9,3/90,/;,39,0419,941107384:/ -0,55,7039 088.425099;08:55078,70094-0147.0/39457.0  #0/:.9438 ,3/ 90 .425099;0 0110.9 2, 147.0 , 8:55078 94 .:9 57.08 5488--0490 0;0,9.985488-0942,0,57419 ,8390.,80438420,797,38547974:908    

,8.97,38,.94383 %0,-4;01:7084890-,8.97,38,.9438.9,05,.0-09003 94 -:83088 47,3,9438  09 8 800 90 -030198 03 9080 

41038 :80/.98 70.08 1742 90 88902  7/078.4898 %04-.425:907889028.703499.-390..3/ 35:9 94 90 8:5507 8 47/07 574.908 :89 3 920 %  2.507 97.089.507 47/078 394 90 47/07 574.:894207 854897442 5.39.8  %003019841 .70.0  %0 573.890549039.507 47/078 .08 .0452039.90.3-070970..948.94341  %01:.-:9974:.0/-90 8:5507 8 5489 7442  ...3/ 8039 4:9 - 90 .908 98 84:7.98343.08413.:/090.7070897:./.39.08 2088.383.389 9088902/0.3/30947..3/.9438.331472.880/974:905489.07 490.3/ 90 43 /0.438/07.. 89.30 41 -:83088 97.3 -0 825 :80/ 94 705.9.114/.11./...48984189.94389.0.9 394 90 30947 ..3.07 0   47/078 .3 03. 70854380 8:55 -03 5720 0.3 1742 90 :80 41  8 90 549039..84:7.147.08949047.0 70. 344307.438/   023..3-03908:5507 88890293.34494.90-:830884507.0 5.9:70/942.3/ 6:.70/70. 47190708:703..898  23..70.843.0-:99080574-.8 09.. 8 4 41903 90 8:5507 70970.3-73..807.:9.3:1.9434177478 03./. .9:809  9 84:/ 8.38.250419889.935:99490889029070834300/147.3:.425:907889028.39.- 3:3/079700/.0 41 077478  3 90 /43 8/0  9070 8 34 .0 .4:80.849. 902088.3:2-0741.0883 88902 %4.-3 90. %0.2508 41 070  8 :80/ ./.9190 47/078...8.74:909.2500.9:70 .04184370.0... 97...38. -..074:7  489:993 %0:8041.--01:2.94307..347/070397 .3090.9438 988903472.-08.344 94 ..0339039.980.70 8039 897.50 8.38.041077478.38.3 .389.9438 9 00.3300/94-0411809.0883 88902 8 34 0.97./.3/ 03 5. 1470...08.4898.84:/-094/4 .0  %0/70.0/03-:8308857..0/-90.3/ 9.39.4898417:333 90  807.9438.943394.8 .303.0...0 94 -0 57390/  03..425099.01::804190549039...4898 %0803.439047/070397.9743.-0 920 43 90 0.3/ 5489.:/0 $479030/ 7/073%20 !.0.4898  .

3-05./0- %05.9.706:702039945.8 -01470 90 .39..4.708543808:55889028 894.990./.9.9434124893.9908454790 1.3/9034:9.9 .070/43.3/90.7 .9 .9 8 4:9 41 894.3//0..4..0/.0/894.9.20398  :83088 55479:3908 %0708.94747845 .9.4...7831.70/:.84 $500/3:59097.   3/70.   3..79.3.780035.507 47/078 9 4:/ -0 80.47/070397..7 .39.0 82.9743.90 .. .3 -0 00.3/6:.0/ .9 ..:894207 .4/0/ 077478  40.  9 .38990700..3 8:55 /11.5073. 2.:7.08 94  47/078 3 8.940907944/8-03/0.3/.393.704:80..:.3.0 9. .3 :89 0 47/078 .08 8 9.814  23.84-02.0/9490.0890. .70:898993389470  .4/38023..59.89#0854380 9 5.704:83  90/4:-0..835.084:96:.0/$94.9:70.70300/0/ #0/:.47 ./3.89470744247.0/ 920 ..0 3  3.1479044/89.:894207  90.3439490 1.20398.9.:89420709./0-90./.947 472.8 90 574/:.803903:2-0741.3/344/8 39489470.:8942078 5.3-0 #0/:.9 90 .3/ .3/0.3 9447/078  !..47708543/347/078.:942.08 ..48941.4.4.4/3 %0.084190:8041.84 0307./0.3/6:.39 370/:.2039 !..38990473./098:550789.7.9300/94-00593.:9  8:.80/147  ..94397..4/3.903.07  90 2.3%2.9073.:894207...0-09933.2039 .2.2039.90/.24:394144/8 9.8 314720/ 41 .9073.02574.9 94-047/070/ 47 .3.47/07./.0 8:550794 -0 :80/  .0708 .. /....203988902.3 -0 .9...3 -0 8039 00.07429..4.0854990/0774782.06:0708.9743.9.8 90..2039 94:9 908479416:0708 9.702.3//0.08 .890.9.9.3/ /70./.:.:8942078 9.0 574/:.3/84:/8500/:55.70 54071:.:9890...3 .

42207.943 90.2.3/.9743.425.42509314730-:83088  :8942074..-0.39.3/905.0 94-49.3-0 .422:3.997-:908 41904110738 .  O300.308..943.38..7/0/88902147.0892039 9070.-8.30414110738 .-80/8890284:/-041.425..0/90 ./08.3000.2.74341   $:22..97. 3 3089.894-08003..8.8802-078.9438849../370.3/07747825.003.7/.3/30947  ..831.3/90920706:70/94089../0 97.2508 0370.3/.3/4907.03.2..70020398997.073.9743...9743.:90/:8331472.9743.0.9905:7..709890:804131472.425.7098.0 0 42207.39.54399.394.0450/ .507.-03..308:5507 706:7089.4/0/1.790390708.9743.0.059 .39.94385 -070/0..43.0-09003.3/907.3/97./.09.418:55078 349088039.89..709057...3490794:990300/147 57390/47/078.08.:/0800.384389.08 . 2.3/ .4:2041 -:8308897.38.39080.3.425.793078  %08.843  O574.08.4/397.:8942078 47-09003.  %4./..7.79.-.4.70 57200.943890..08. $:5072.3/90/0./.807.70.70 8419.3/3  .42207.97..709802039849.38.89..3-0.3/.422:3..308 -09003 .843079072 %0.0 390..907..085.3/2.5:7.3/.90//70.943 0.90/:83 .943..4898:517439./000.9743./23897.9434731472.308./4-:83088.9 35./35./.438/07.48988 90809:5419088902 .7 O0.3/00./34144/8  807.344945708039.34408 %8  O 42207.3/3.8.0307.574-0294-0.39.990.80/0.3/8:5507 $9.3/ 5:-..91742 430.:894207.4..98.3 .3147241-:8308897./388902.425:9078890294.0..9438  O0..9743..99000.

3/8443 /.8480574/:.:/089097.47/394905.9047.7-090-030198./:. 807.0/390-:83088  :83088 94 -:83088  4894194/.70997.3041 44/8.438:2078 ..0 .3/803 708/039./.438:207  %080..:894207  O438:207 94 .943841.0843903907309./:.3/490747. 2.08 %8950410 42207.9 2./943.70709.9743.38.30947894.90470.043.3.42207.:.9.07983507843.9:700/.25041 $0.3098.089447..3/29.0 4118..8455078 %095..94384142207..438:207  398.0 O$:22.0 O030198.9438 3.38.8810/.3.7843-09003%7.703/.349070.55.422:3.4.994.38..3/ 00.3 3/..O31472.9438/08../..0 O08.707.. 39073.90470841.943890.089510/- 90.438:207 808/70.7  -0.904708 94/.84198 950 93.3/29.3/2.0 39700.047807.8 810/ ./:.943 O.0841.9847807..4:80.34408..438:207 47..84-0 :80/94.8803 3..42207./0.7-0/0.2508.:/08 3/.3..8.943.8 ...3.0 O 425.90470841..42207.78 .42207.9438908.3/0507980 8.3 97..3/..9438-0900347..0 390570.:.90473..9438  O:83088 94 .3/ .94384142207./0/90.845507.42 .8945:99028:5147.42207.07.9438 .943893/./:.79083.08  O438:207 94 -:83088  %8.0798090281478.7-090./:.0.4 3/.428.07980.:8041903907309   O3974/:.2.42207.943.0/./07./8 0   .3/807.5745079 .3/803340/0.42207.08  O08.70:83397.43 ..

943  O43-:83088 33.0 098 .904708430.9.489 455479:399470.:/0..8.3/9024898:9.3/6:.3/7084:7.97..989425400894433097.3841 507.47547..0793...81448 O0.943.425...3/29.70.9438 %003019841 0334.9438 84.3549039.-0301989447.7098 9232.93 90570..3/7.05:7.0..:894207807.9438.8.793942.943.3/.30.0943.0.3.943.2.37.708:932.70.59.208942207.70. .47.301742803 .00..90470 3.44  030198.3.943  O397.09070503808 0  2574..8....:/0.039.9:708 0850.99902 . 50714720/43397.425.39.706:089147.70941 5488-908 .03./:.80 831.3.3894703.9438.574548.88.43.3/4.3/84.344 4 .9438  .900..907.805./:...03.39073.3.08.908 :8:..-0-:830885.438 8.8985748.793078 47//0 470..8/408 %04-.3 549039.9438 704:847.33.70:8989..9.943..3/39073.. .3/8902.3..7095. -030198.4.250 3 40347547.3/8   03019894 7.0  4909.47.42207.83/.  398.82..3/.084731472.705.-:83088 47.3/.1907.8480080078 3907...908.09074507.9438 3/.  .78 3907.9.005.304144/8  807.897:.943.:3/70/84124384150450 5740.90/93 0.4./02.90574/:.09 %080 -030198.3.:8942078 90 -0898:55078 .943 7054790/. .3...3:8:.09047/ -:83088947.9:70 .38.74:895084194 70/:.9438 %0-0301989447.3.943 .70:83..9743.8 ..83 4794 2574..3098 9. ...4:8.489 70/:.3.5/7494190 8:554793317.9:70419090.9.94383:2.4:9.3/ .80/3:2-0741343-:83088 3899:94388:.3899:9438 349 147 57419 47.01:3088.0 -:9903.0732039.

0/2.9:70.9743.:9905:7.02039 3.507 -.422:3.98 ./08.08808 574/:.80/31472.9 418.41 .4898-.84800 ...425099..070.907  O0..07920 3.82:.0.0.3:1..04078900.-0805038.4898 ...9.42 .93 574.793078 82510/574.80-0/08..:8942..3/807...3/3.3:1...93 5: 9508:55.93850..39.9743..7-0/.0/ 90 390730982:.854890/43903907309  82.792039.908-:83088574...9743.5: 9508890290574.574..70..0883  /897-:93 89473 .385479.9743.943 70/:./.3/.3/4390 00.3'8  O 907-0301983.:89420747/078.0732039 90.0 2574.942.0/ -3974/:.3.. 4.:/02574..507..05941574/:...59.507 050/93.80/433509845847/05.070/6:.42207.98./-1.250 /4 948.3/807.0.7084/343.574.300.0 .0/-:8308808 470.48941.70.42570880/.08889.80890.039  349070..9:73  O%05: 950574.5079.3/ /8.42207.08  O0.  O0.308 .088303.9478.47/ ...7981742 .0.0889431472..7.070/:.80/10-9  03019894438:2078 .425.9743.0850450 340/047078 .4894100..0.0 3014:3/-:830885.943.8507.5.98.3/70970..039472470  O0.08 .0/.094982502039078 .42207.4:39089470839058..80/574/:.3//0..9438.9.943 47 0.42207.42  O0.70.850./23897.9743.88.9743.38070/90706:089.70.3 2.943 41574/:.8908:-88902.2508-030195.4870/:.35.42207..935..0/  /4948 .-/ 4943.80- 507.3/9070./23897.9743.3-05:7.4894188:3.9  023.8:-88902.3.20398 4790& $ 10/07.9948 .20398  O-9147.8 %0 .08808 7003300735740.3/:808:89 3 9202.3.9.08808  .5.03/473:3.25080 425:907475 480.3/ 4.33574.:70203988902 .507 -:99 .0394708.8/0.9.83..0890920-09003904:9.70.3 3.:894207 807.0/3.

3/./08.3/.01.0314784553 708:933088 97.42207.08.9433 80.08- ..:./8.-0824703/.-08504503%7/47/ .3  O0..9743.9743.8..3/8094-084/.0..9.08 90.07  O:8942078.42207.422:3908.48 6:.-094902  O%83.09.07415:-. .807.30/0.:/08455479:3908940.3/7:7.9743.0/31472.70.3 4.425.3/807.42207.35.2489../.3/0.847008  O0....38.:8942078908805038.0.89447.9743..9743..943 .5.39.:8942078300..9743.425.42207.3/94/408897.0895488-0945.708:983 8:-89.3/0.3//897-:94341 4.9 420.089..79.9743.9438  O0.908/0.807.:894207892470.3//09..:89420789484547/44907 97.9079..943  O0.8.%0-0301984194.808 0850.08  8:.9.994907 .4.439074.9743.42207.8090789...81448 O0.903 ..8 0.70...4:39708../0..370.400/07008  O0.94384:78./08 .70050703.09 %0-030198419484.70349.9.98.42207.9743..3/407..42207.0574/:.073203984.3/.0700.. ./8.42207.3/807.908.9743.42207.42509943 .7/41.9/90/574/:.70/:.489..003..11:03950450.9 490780..11.4:398  03019894$4.98 .08.9 40757.90.70 0/:.439029484532.894034574/:..01.735741088438.81448 O0.08  O0.70.0..78438  O38420.01706:039574.98.003.08 84088..3-:2470.3/ 3.754:943  O0.48..003..:8942078943907.9743.9.438:2078.....0.43/:.39.488420207..02.774:3/ 1742.43/8 7../:..-08.80.0574.42207.3800.3/.0/.79:.70.73 .96:.

..250 .9 0.08 1470.47 2574..9 .70807.0/6:. .370..

/41  901443.984908570.9  43%0.70/0.759438:80/ !7..9-0984204507..422:3.8250 88:0 :79072470 94:89190889024302:89/0.29.%08088:08.94380880347-04..93889028474907 .337.70 47 2.3 -:9070.0908088:08../.557457.702.709 84200893.0..25479.897:.8808 908029.:041.904708  %0.55.39070..9:708 3.41050703..9 842039.3/:891.0-807.04533 4:80 .3.3232090725.-.4389.3/90.425430398  89205.:9943907..-03.-9 89.02.943%0.4.48  O%070838:11.48941/0..80.334390.:79.9438 1902.0/..905.3.0.420 .3.:7988:08..04520399448.3-074:50/39490.3/ 903/:897.418890280.078  O$4208419.9039837:7.3.8:708..422:3..3//11.3/289.3/4907 317.7/.808  O'03/4782.94389.7/8 .08/:094.70902.943-.0/  09 90...943841.39  .9438.078.3-0-030198 8:.393 90.392574.....3.94357494.81448 O%0708.474308  O489..:894207807.70/11.8   %029.3/57..425..943841.3.29.700850.7003.70.70890...82574. 0850...3.20..:8942078507.3-0.0725479.039900..//943949030947807.8 %070. 708:93/0.3//.9.3/494/498349.07.079802039 ..391  O$0.3/.943841 %090.70507.333.3/8419.557457..0743.29.8.07 .8.5/  O98/11.841 ..300/850.3/ 8420.29.3/ 34390.5..3455479:3908147 4:984:7.70293491998420.0 ..0/94 -024708074:89..:994 6:.:99..70.70.3/ .:79 70.70.90903907309.90 03.3//9  O%08419..

38.0/ .3/1004330 $420 .350450..:70  O.9 .70443147.70349034:8:55479807..9743.3/ -:07814757419.9433097.3/00./4341:2.3/094 340.70.-0..3174258.3 70.990.9438 .89...943858  O..4908.42207.9438/4349089  .2430  $489.:894207809494:.:.0.38.3 .38.08 470.9438.42207.3/.3/89.0 .9.43.7/8.3/:80770889. -0147090039073949  O%070.9743..  O0...70  O32489.0.50708897.3/.94389070.:89420789.0732039 70:..:9  O 9072931..530 8890.79:...4194:.70 31.4:/708:93.3.3/4.9478 476:.0..00888007 8420920890/434997:890.-0/ .7034970130/034:1472.8.70-:3  O.3/57.050798 .3.337.70.9438../8.8947082. .3/ .03 3434308 5.3/ 6:.55.-70.250  .94....9478 .03907814797.-0 O0.90.3.70 7.0:8942078/434997:89.4197:89..90288:.7034909034:80078.3 :33431.809:37084.30.0780.88:08.

...70..3.880..0/390-:830880  .045  08590908029.908 ..9441-03019894.349-0.80 708:933.90470..2...80/1742 .35.08 907.039:..3.4898 3.4389.7908 3.9077.79.3920/.3/ .43.0 47 0. 8050703.9084-:.3034:70..3442574.088 488 .42207.250 903:2-074150450390&390/$9.0.47 3.5/5747088389.9743./45943 %0549039.7 O0.3/ 80894.9041.3549039./0.030391472.-4:9 24331.800.70.84389489.3/.990-0333 4194.79..43.9438 -0301982..09005430.47/394905.:2:.0..9903943  90.908 $:22.70.:8942078  90-%'  .

9743.003.3.943 70/:..70.7098 /0.943.70 0/:.08 O0.O%0-0301984142207.:89420789 2470.3/574.42207.073203984.807.08  8:.9.9..0394708 O.908/0..507 -..42207. 2.94384:78.70/:.48941..807./.94383.70..489.93 574.4..80/ 31472.3/39073..35.808390.3//897-:94341 4.943.7095.3/70970.0883  /897-:93 89473 .-08.094 7..38.9.943 .08.07415:-.384341902..:/0 05..:89420789484547/44907 97.80.94333.0/.0943.3/.01../08.

-0.9 574.94357494..74:8.93/.29..904708   4...9.309478343.422:3.08 3..0947    /070.08944907.425:907889028 4.422:3.  D-@    !&%#% # .3/8420 ..3 94-74.70 30/9409079..90/.425:9078 .425:907843.425:9079.:7941/.3-090.94384142207.07 3 9030947903/.08 ...8841047.94384734/08  425:907094782.9/11070395.:79 70...0.3.045334:8042207.9.20/:2.../:...08 %0./.0888.41 8890280.0.94380 89..33907..47 2574.737084:7.7/8 .4..3/.0814790 5:7548041.70343.0.70/30947 7084:7.8810/4390-.84789.70.94341../087084:7.943/0.3/90 80.9 O29.70.425:907309478.9.0947   ..

9.4330..90 .20.9.-941309478-0.7331472.073203947.5.30947 305038.14790 5:75480418..70.38288437.97.8307442 7442893.5.30.38..3/490731472.70/9489.9.909.9.382884385488-0  . -:/347-:/3843430890.9.47.8  7.4330.9041/...9430.70.0883  47574...-08  38.39.43/ %097.97.34907 .943-09003..70.574.07.7.43/  -98507 80.3024894190-:83088.3/ .94.422:3...70:83  ..0/4..0883.-9083/.9..9..7/..0947   97.08 O %070.425:907.90/-.3/ 4.425:9078  O O //9434130.841 O .70..94331474907.07.290/ 047.86:90 05038.70 3908.425:9078  0 8419..9901:3.8500/4180.-0.858.425:907943094780.0 !04504733092470.38.020/:241/.890549039.425:9078 0.94341.9430..20...425:9078419030947 O O O O  /.3828843 /.:80901.425:907893.70.3/..9438.4330.4.425:9078 0.943 &8:.4330.90789.425:90739030947/4083490110.:7041430 /0700413907.  4.-0 .:80419831472.425..:80902:89-0.425:90783.0947 09478:80/943907.97.382884320/:283472.425:90783.70.38298/.430 .-9850780.

08.4.3 900.841 4438.4330...250 147..3/3 #02490/.-.47.8 90039703094788902-70. 470.3/.3/573907./6:.0947  8:80/94/08.088 47/...382884320/:2:80/.425:90730947 85..9743. O O O O O O  /070.909038   .3/8947.309.90789.3./0.:99.9005430308  2.0 .70902.381078.0947 %09072/070.90.7-0..47.3/7043.70902.0-09003.470.70.943../6:.088 !07843.425:93 9.74.08..3/.333.7907829-0.2088.90/948.0883 0.7..8/43   &8041 4438.O!07507..4330.80.841  097.7.807083472./7.942-.3/8.9./.08 O 190. 3.7043.703472.425:9078.70.3...422:3.8  .425:9078 0707043. .0802.-7..707  %07014709097.90789.70/-4907 .3-08.79078 974: %0/89.

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

70 .4.41104209078 :9 .83047.9/89.0.382884320/:2:80/..5.07870.0347//0   3 90.943/0470.9..4330.7070/  09079005430308478.38288438.3/507507.. ..38./0.:809097.3828843 20/:28430/-.3.382884338088-0.90/94290/047.3/.08.425:90790723.9438/430974:9005430308.804190.:809097....909038  .943 3.3/4507.943 422:3.903..90/9708.9.07-0.48941/..  870897. 97.3/8.-08 3907083458..97.4.4330.70..8.909038   48941/.

425:9078.9438.3/-0.9430947 9430 .70.3343 29..1473.0/ 974:3907309 4:.072:.40/94.07 :3.4330.908 4907..425:907.748890 47/ 31472.798%1472.425.3/8419.3.3507843.020394124/073.3.03..9430.4330.0789390.3.9437084:7.3094741309478 43841.390/94-0..994243841..3.307039047/  33907309.3//897-:904:7/.943.9.9430947 .70.39.3/#  3899:9438070.0747.3574.9430704:.04:3/.90/94 903907309 4:.34907..425:9078070.84/434.3/9700. %#% %039073098.79317420/:.307039047/ 14:7.0890 3907309.04131472.907434907:3.9.088-09450450.3.7941#!% $490 30947.90/ 990 .3-070970.078908.. .:07084:7.943 8.08 1742.889003970207..4393039.9.0   41&$89.3/047.0710/89./0 98343/85038.3 .425:9078 4:.28.8-74033949482.075..4.0/#080.70 9403..329..4330.792039410103..84 .9431...5.94330.3/#!% 82.30 8947 .-0940. .088 ..907 31472..4330. 98.7.03...705..0 0.4330.90/974:903907309 425:907:807843903907309.$./5747.943   73413907309 305.82.78908 .20.420.794909005430 .:08:.30947./.594-:83088 308 09.3.0/ #!% /..439.943.98/23897.307039047/ :09490970203/4:831472.!740.425:9078..07 1472.790/.4:397..0790 47/.38.9  20/.994900947 !#%6:.9&9.3..78908 74:3/  $% .422:3.8.3.

8.9743.8.2.8 O$:22.397.9743.9430.3/.943 %0:92.0/949   2..90.9432.30 3907309..7202-078547.:94794190 39073098903907309$4.9-0.99.90807.3430243.07099005415489.7070:.82470 9.3/814700.:88 .!.0732039.31472..070.30.9743.3/8-03:80//0147 2.9743.!.307039047/ 900.94038 O8.38107    &%   %45.9438 39073098349.4:39.943 O%508410.01. O3974/:.08 82.9743.943 4805:7548089457424904-.7  -0..9.2.382990/974:3907309.843041900.8.3/9070147093 23:908902088.3-79943907309  439073091:3...25 0.38890280.9743.38.7/909072 0....2039 8 .307039047/  %0701470902.38.!.7 :9070/. %8843041902489/0:80/$8902 O08.9.40/94-030/:59.7:80/94/.00.!.3 .0890/0893.08 O&3/0789.9:708 413907309 .  2.7097.47.425:90741$%  2..089.2039$89028 414:29.425:9078.2039$89028 O%50841/ .09 %88.425:9078070443:594$%.

047709.3.33 0  -5.943.90/974:.8907.!.5084.425430398  09 88.-0.9 .38107 24304713.1:3/897.90.30 4743%.5.70/ 8443.3/ 94574...88098  %7..8.047408.2430.9 47..89447/07 3897:.3 47.3070 2430300/894.5.425:907.7 8 900207300.3/5.4397.309.045203983.7-09050793039/0.8994...9743..  0..9:704100.3/.422:3.3. 5.39400.:8942078 %880.203924/08 9.3/3.!./.3 00.4:39 %:908.943 -...98.076:./0..0.3899:94394 /0-947.74:8 3/:8970894574..3.70/9.70 8.7/8.33.70/.425430398-49948:55...07.7.425:907.  0 974:..082470.4890110.5.933-.03943.3.. 9.3-0 %:8%89.90723.3/8 32..2039889028147.70/9.9743.05..7/  O!7.3!.3/807.9743...9.903.9.0732039 31. 97.9704358.20398 O70/9.34.89.:9470.9743.70574107.5.203990.943...9743.8/85038078  O420-.20398 O.344..0/-.:88983247009.0741.2039$89028 0.382.-00/00.904708 .7/8 0  '$47.550.20398 0  .438:2078..3 97.80/. 8.2039800.425:907472.90/90072.43.2088:0893920.1907 3900.3/39.9743.13.70249.35.7098 .90/- 90300/94/0.422:3./0.3/5708039  #080.70/9..33 709.3897:2039 47.9490 8 .308 .3/8  7. %508410.2039 88902841905.507 47/078945./0.2039889028.75.38107411:3/839.0.397.3 94 -.70 43 302.3.55...5.20398 0  -.38107831472.9438 .3/900.30.3-0 97.8 .38107 %  %8/0130/..3/901789.3/9497.3-0 8020390/3949700-74.943 -701/08.9438.38107  O$2.9743.9743.847. 900543. -97:..8 4749075..941807.3/0.2039  #09.034.:942.3/ 900..07574/:.094.

.7/  O./0-9.7/8 0  207..357088  ..70.7/8 0    !0330.

 207.79.7  ..250415.70/9. 43473 .41904/89.70/9.8  80..203945943  .9.3.2039889028 0.8 0  ...702.3413.70 500/944/..039.43943 # 1.7/8.7590/.9743.:942....0..20398394798-.2   0/. 370834 .90/9007 2.908  70994344/8.43.388:0817890307.47...3/.89057010770/343.0598-057080390/ 14770/02594382:9.7/8  089238907.81789.7/ .7089.05.3 243454089088:341-.734:80.:908901789 2.7/0.0/2/ 8%0 /0.3 3000.943.3.0/3089073%:70945.38848 9.70/9.7.7908990& $ /4.80/5.3/45038 .  %057.3/..9349.304:8 %0-.2039889028 3. 889.80.80/5..9-:8../0548970..0-/.20398 O%403 -.90478458   3078:-.9743.82.79.80/ 03.0.870807.9433:2-078 0  789'79:.7/3974/:.7/847/0-9. 43/43 -7...8 5.8.309.384503 39..08  %0..5:75480 .9743.7/.700203938..9743.947...3389.  !074/334.70.7/8 0  43/00.882.509.. 90710/5.70.9 507.7/   70/9.7/ 147:803800.93/0548984390 573.:7703.:7703.8 0  0906:0  $2..334908  8.389.30.438574/:..90770..:947.3207.1473. 34.943  .:3.:7703.9'.088341.8  0.70/9.03.0452039412.08   789-.08!$90 .08944/.7/8 0  47//00-1472-.0.932470920574.0.75943 %7/ 5.430/3443.708479.0/90. 00.42207./0-.7/ -.   %00470.0.3/3.910/

90/ 4.0.07/7.3388902830307.9743.0450/  308:.97.99070-0.941-:830884.8414.90 802..3828.894708 %089:2-3-4..5.8-033$3/43  3.3897:20398 00.3 94 -.74:89508410..3.%403 .943420 -. 94038 39014724100./3  .3/.:88.35.71:3/8 97.4770.30411.:8942078 420830/ 9498.:/8 4.3./06:.3494/147 0.039/0..!.88:2594382.8907.3/842.438:207470390/0..9743.897.425090 .90/ 43 30  43/000.7432039 %07/01.0. 570803.3347709.8-.9743.70-03 24/10/.3013.42207..9743.8:11.198 .894.0:80/3 -.4907 858.07309478  397030147284113.4:398 3/-5.4443 0.3/.2039889028  7890.9039075708039147214790..80/0.2039$89028 4304190-..3.20398$8902 ..943 809902039843 30.3/97.43/:.88:259439.734:803907-.3905..3/  09 8/8.9743.38107...9005430  9411078.8.-0894-0 /03910/.:7703.1479090723.70.2039889028  9..8.3/370..2039894800.3907.848945.590/14790.9743.7908..3.90/ %080.20392094/8..381078 -0900302.0397.34190805...35.3.0./.43/:.38.3897:20398..42207.203920.:3.7.920  .9743..84-03 /0.3/.3!.036:708 243097..08814717.98420920474907-030./.03.0479.0 03.0898!7439488902574.425:90790723... 574.9 420  0..3/4907:3/087.908-.%4038  9.425:9078-.2039 574.9 905.70.1471789 0307.9.30  09038./08& $ /4..

0/-.89..-..94038.9438..0.03994.9743.90/ 00..243047..70/0830/..2039-.38. -.84770.9743.74:8 14728415.9743.94038.7006:..3899:943 $25 89.8  0.3  0.98-..800.7041%700%508  .0/-.%4038.4841.7080990/990 . 920 %7.9743.34713.3.3.

:9039.98947000.9743.3/00.07108990-.3/. 30.91:3/8.70./06:.39.304100.8 0 ....70..70/9.:8942078 .2504143 30 .07.0.7/8..943 .01479057.25084154895.90890..3./20.9743.80 .:7703..3828.79.5:7808 9./...0.30800.7089470/382.9743.3.2430   70/94754895.90-01470 5:7.2039 20./5.3828./ &80785./ %0807.9743...:7703.2508415705..8   0-9475705.0041 099331472.

3.:79 .903897:20398 /0830/ $420 94038../0830/94.:9039.20393897:20398-739400.38.9.:78 97.3/9390708939.8  %0144380.88092.054398 9.0... 574/:..97..24397.94038.24:398 .0.9419097.3059.745.3/.02039  ..9438500/ 78 .398 90280..38.2039 :902:891789:3/0789.4.807 8.20398 9...3/ .709850.70/0830/147247097..5.3/.3/14./0 4118.3/0 2.80 3907.9:70419097.943 343 705:9.98 $4208890289.30/..9.459433.08 3.835509841 31472.390/1107039 39.70 850..9438 4907880024700307.70/9 .38.0/- .70.70/9 00./943.. 9743.943  0.79..3/30841 .34329 .20398 570..9480. /0-9.70:801:147..1.3/ 85439...:7703.77.9743.739057490.75943.431/039..0841/:-4:86:/9.9438 $4202.:0 0110.:9039..93 .9.3..3/7097.-9 .20...3841809902039:80/ %40382:89-0-.3/90/1107039.10 .9743.-024704503 94549039.0/ 90.2039814782.07.381078 943.0.0.0394905.0  070.9438   5574...08   %03.8 . 78  .3/00.7/8 0 49078:80490757408147.304:8 .097.7/8.9438099020392094/8:8070/9.943   %020.7014:7/20384389..3/.9743.8  &8 099078.9434157.990805.23090802094/84143 30 5.3/905:7.489 489 97.925.9438 %008 94/0391 905.42207.79083.943147.573008 470.38.94380.1.3.943  9078.98 5.38..38.-5..

9.8   .07.2039889028  . 5.-0 8:75783948420 .059 19088902894708.3/.0395070.8.4:39708 4997:0 .3/5..9433 39070893 98 3:2-0783498733 -:9743.9 .9085.908.9208 -09003574/:.8 0 .79.3/.43.48941302.990.425:9070/.391472415.3/90&390/3/42 390&390/$9.0339024893/:897.:79.:894207829..3/.9.943507.8-0037054790/ .0.8  .0435..0/.:.90/947.843.857080398842039070893 .3/80990203941343 .3989490789.73/0.3/054898  %08070.0.20393897:20390.88:208...398 %8 054808207.9743.3/80892.7/  30..507.88098 84 00.039..997.7 054898- .3388902   3011..780819097.90789.0 #8.9-:078/43 95.9.0395070..9743.943. %06:089434178 4..0 .4383.7/ ..20391479700 70.:7703.4:39347 .9403829-08:- 4.438:207 &390/$9.42-308.38.9/0.86:90.438:2078 2...84388002088:088003572.4:39708  907.2039894207..814..7841..984:/2.7..890573..30174294 438/0790 89:.8.09 80.897.05934330 .38.04520398300.-4:9 -434134908.70743-43507.8904/89.070.:809.03.9.7 9.55742..0 3..908  90708:55480/.943394419024893/:897.9438  .7-97.2039.0.70 .8702.3/57.9743.438:207 470390/00..09.01475.4383 .  0..3/90.93/4178.:03..89.07  09 8/8.90507. 47.20398 94:92.7098.:80.19079790.8438  ..9.3.4393:4:8 /0.55.9920%094038298://03-0.73.9945038:5 .-005480/9478.039..8 98.944134908.8 ..03/47/4083 9/ .4197:89390-.7.0303..3890/423.39070897..5.:.7.0453 ..:80843705.9438  .

2:893.059902 47.98411070/-..041.349 -044/  4. 340/041905.0394804/43 9.8 47 5.30 .90841.88 3049..8.5.-4:9..10.33905..0.3//0-9. 90.70/9.3...3//0-9..9090.90.70/9..880.20398:3/071.7/8 789 90.3.7708 90789.7/8.....3455479:39147334.903/054890/ 929-0709:730/14738:11.039.304:8  5.0706:708..99020/:2410.9.90/94430:807 70/9.3/70897.90...0 -:8308857.95488088438572.908914725020393.07 54:3/889073.70892.083478 43905.7 .894:9574507-..339.0450 .034797..3//0-9.:794:9.3/.9...7/8.34.3/:80/-.0.85.3...7/8-0.3//0-9.:0  39074507...0590/-49078 70.09.370.3-0.70.70....203984..8 90 00. 030 .9..3-00/..3.894.039.:0 -..0791..903/07 .3.9432:894..70.4:3970.-9 ..:79   .9743.8  !74507908410./09.0 5744141430785 84 ..09 . 470.:.89...425.7/8 0300/94/0.3 9-0 .039 1:3/8  .94385..4:39 .70/0391.250 .:80 90....3430 0.07910/.03.3/80.943.70 3490..1.943 88902 $2.903/07 20..970.7073897:20398 907:8.89.-9 770970.6:.390088902 03.054:3/889073 90507.:9470/.-0..790741.059479.8 2:89.084206:.70.3/ /0-9.0.888902  .-./85.9:708 $50...4224310.. 0 .:947.5.43.0303.08507...9207.8 %470.83574.8 9..09.3.70/9..2039889028300/94..70/9 47 .9743.700..807 8.8.0.:77039.339.7.-.70.90/ .438:2078.3 .398.20392094/ 0300/94/4 24709.34907....7073897:2039 20...088070 .83/.9743.3.....794190.0084-.-0 20.70/9../0/948420 430080  .908.039 %0570/423.:807841.8 1902.. 85439.90/-430-.000..302.47547.8706:700907507843.24309...884204190 57450790841.258905:7.943.9..0.7/8430/ -9088:07.0907994701:8094 .0 94 70. 0 .38 .9390&390/3/42.090144314:757450790824309.7.7.3574-028  $9.43..-0.0747.82:89.90/949.3/.0.

250790-03 0.0 .7432039 -0.38.339073. .5:75480 /0.:912:950-.3/70970.88:041/4:-08503/3 47 389..0941.3.20-.20..:7738097020/11...5.4390398  300.347/0794.882:9.75947..9743...70/9  /0548983-.33.8 5.943..0393/4:-0 8503/317424.0470 97...7/47850.8.09.:8942078.90.. 0  1742.-0.30.4:/-089470/43.09.943 0.38.9039073.422:3.894.3854790/89.93/:5.304:894-: 8420933.5.0 90.4:/:804:70 .90507843.08 .334908474-.33.943.3/900 4890 .3/..0 .. .4.900543047507843. -03019897.8847/847490720./0....7/ .45479.0 4:/.557457.3/5:382039 4080090 .9:708 %82094/3.79.4:398 174242047411.9438088039.-039071.-09489470...0 2:950-.9.4:3907109072..7574-02 83..-0 9..0 4:.300 .702490.-0 #024908947.8:9.9743.43806:039-0/11.990:807./0/.381078 ..8 9..9..70020398  090.478  0..943:83 5.08 0.8 44/847807..09 80/00.7/ 8...08 30841.09   ..9743.1742 ..5.3 3/.3/3. 390390730903.80/43..3/ !70..703494394-0:83908..3 357.25041.3349-0.084:/.:80929-00.8.-988:08-0.. . .9.889028.4:8078940.83.9070/ %8/0.943..4..3/ /4:-0 8503/3 4:3907109354808.30703 9047/.94:9 .90//0.2039 14749070 .03-03 908.8 0  9/7.7/8 47349070.:994.849..9743.9.884:/349-00..830 -.30 ../85.8574548..9.98 0..07 .7413:207.425:907 820247  382.703.:..039347/090...0/39097.03 % .897.943 479870.43.3.:/90907570..843 .0.3470.30/983.:/08570.9743..:80. 83..3/ 70970.54.894.38.9438 00..507..4:397   .3/.8:80.70706:70/9.8 89043/0.70.9889470/3.3//05489394-.3/..9438 /0....3/08900..82:89-08947.82:89-039074507.9:.9/090.......039438 473 %03907089097.79.059410.843 248988902870 435489 1.425:907 929-0570107..4:3907109.0.5.-0.943.0/ /9..9.38 .:9039.4:398 -.

0574.3/7990383....3.:7703.884.4/3-..7.4:39 :77039 324890 .4.07 47-.8 3.3 .83..9:708 014700 .84..97.0/4.4:39708 70/002902990788:078 .:7703..0/..81742.38.08-.3/423:2-07 .0599403841..343-0/0.3 47/0...507 .:8942078 84:/-0.3/34304907 %003.890 3490 3 0.4/3 .0.0770897.431/0399....4.3/2:9 ..301472430/0-90/174290.07.:894207894/0.303.08...:894207829570107945:7.0 . 0907942.07 905.3/80078 9985:-...704390.081742:807832.14714703807..4:397 5488-0 84:943894:80.24:39 ..078 %05:7../073430.0 47.3.3/...70390078473:2-078 9.3.900 1 /0.9.:894207 8.4/0/990-.800 .0 .:894207.:89420782:89 .80.90 5:7.39.3 /1107039.383904. 03.0.807.902..70/9.90...3./0894-02470 70889.. 8:553.:7703.:7703.08.895.90...3 -0:80/94-:574/:..94-.-.3-01.880.4/0/9 %080/9.3/024301474..438:2078:80900 ..4/3082..3/  2.4/30805957.-08....$07.81742:7703..7/88:3-.74:8.3/.:8090/43 9..:7703.4:3994-.:8942078 -:078 .:70/1742.0 03..343 30.807.425:907 940307.43 30-..94739.088 0 .. 90 .0..83 .-032:950 .-.943. 807.-8203941. .7.3 4703.94390-..8994/0.-.4/3 47.3...3:8089857.090 1:3/897.-094.4/0/9904907 3:207.4:397 .94380'$94807.:70. ./05:-.39.3/5..80  $420.3 857.9..32088.33034:2430390..80410.9847807 .90094/9.8390349014790.08 92:89-0574....0 14739073..3432947-0.08 %48:5547998.38  3/13.4:/903. ....3882.:8942070/8.3 %884.88419.9:708.07  !:7.089489058  089.4:39 90 -..08 03.3  3.82:89-0.-02088.38 807.3/904907147:34..:7703.:7703.3.4:39..9438 147.3994147079.4:/..:80.4:399.4/0/94303:207.....0/-80.94341/9.3.807.3/ 90/0.70.3810770/-.897.

:70 .:08:.08 %88. /4.507 .0719.574/:.-.3 %0-.9:70 .0 390.3430943 5.9438 -080399490/9.3.8890473.82...:.8434157.3 7899..807.3..33490 9.9.770/4:9- 90..90/.3 9.38298994..438 907.032470 .:894207 88419.0  94-:0.:...9490...9:70 ..9072..8.3 85:-.706:0890/.0.908 42.3.9490:807.908.9905.89/7.944347..70./4..41.20.38990-.47 94-:0...2039 83..3 43903907309  &839.3857490.80.7.3:2-0747 -3/8 903490:83.9908339 905.:/0/ %0  708:9419080...830907 90.24:39 %0 ..30 .9.438.389 14707 905..38 .39 5.0 0.0890.4:394190.24:39 /9.8.07..38298903490-.9047803974/:.4:39.00 .481700 /4241:8.30 .3-0 .44:89490. !.07 34790207.90 3490 ..092.90:807 9.24:39 09 7.3/5..39/7.07507843:830 ..3900/-90-.2.9438.9.7.9/03423..5.7034/9.3 8/9..3 0.8 -3/0/039. -..20398.9908.8/7:847547347.039147908.4/090-3/0/ 3:2-07899880.8 .8041.3891.988:..438-00307.7090 /9.9479.0390-.00..9.425090.907.8..08925488-0147.3/42807.9..78 %82094/4134900307.:894207 8473.:0370.42580/390 14432.7.3/.  4/40898!74.3/.83.:894207 5....422993980194-.3490 9 2.8 03 .-0.3/97.43841.3/9.0..:7703.:7703.807.:8.-..9743.0 %0-.3307 03900 .90/.3/42 3:2-07 1.735.88419.707  %0807.8339 90-.3//054890 ./ 83.2039945.3.83..3/90:807.93 ..3:2-078 5:890783.70300/0/94 9/7.:9039.34324:8 :397.07 30110.0/0.4:390710990 -.07 ..090.3/90-3/3 7.700307.:894207 %030947 . 3:2-07.3/97..9438.3/3..00.708039-.92....90706:0890/.702.:7703.9438.3/807..934909981. .088473!7....4:39 50450.8830/ 3490747/8 98.3/13.303.90/../9./0 90!41900 .3/42 3:2-07.3 %0 -3/3 ..4330.-..3 8701:8.04:990-3/31.34324:8 34329.9 888:3.34903:2-07.34890-.9:708..574/:.947-03..0780..3:2-078 1479480.8 0...20 920/0-990.8:807.

97.900    370.3907089389.3/:31472.:7703.9:708857080390/  %0..0.-3/ -0:80/ 47948070.79.4-03/-3/83.2039 %8.3574.3..:894207/.0:306:.9:.34349088:0/.0./0784.9.9:8078.3 85:-..3/5708039890-.07.39483 90 3490 94:90.3 9 #  24/!" 07089034903:2-0794-0830/ ../084:990 -3/31..44808.947 # .5.902.947 #  3/0503/039.702..38389 # # 24/!" 890 -. 90.30/  9057494.3 857.0   %0-..3/U890-.:.990//47 //3492.75.:894207 88419.:7703.

35.800.3/42  90-.3/9:8.8041574/:.5.9.75947.9743..425430398  O0.425:907.88-..889028.84770.94038.3.943 O9. -:8308847/  $:22.:894207894708 90830/34909...80/43.. 920  0-9475705./.704197009508. O3974/:.94038...9743.4330.203920.74:814728415..08 .3/900. O29..34713..2039-.70/0830/.3894-0800349-0:80/39070.:7703.8 O$:22.# 24/!"   %0.943841 .83.382.-.0#87.422:3.0/ /9.5.3349/0907 230.98:80/945../  O0.0/-.3/70/94754895..943.990 8339908:-806:0395.7 O0.3349.9743.08 $3. 147905:7.9743.9743.. 0  974:.2039 0-3/3478 39047 9702.3.2039800.. 3899:943  O0.4841 .9:708   %45.7  -0..3.9743.9847807.

9.425.907..78039047...943834910.3944503.99490 /9.9. 0 18.3/-.8.4:394190207.:804190549039.4.3-0:36:0/03910/ 40.O&3/0789.4.0.382:89..943 /:09490:80410 ..3.07  982094/412.070.07/4:-08503/3 -..94383.  &83909.70 9034905.479700 5.. 3..890 .9 /4:-08503/3.38.3..84-057490.94383.8/03910/9.38.7-090..8-0-0.70 80399490207.0097.389.8 09 85:7. 97.90/ %0.3-:8308889:.3/0.38..9810/9905.0710890.09094038.0./9419080 34908 .3.39470/002 901.3/%7..4:399070178947 .90803/8902/70.4382.147/4:-0 8503/3 .5.38.398942..880/949-90207..745...70/9 .2039  908419..989030.70-. 3897:2039849079. 4:-0 8503/3-0.:8098.70!488-0...3/9.398949.4:208 412.. 570.70:8:..8574-028 39043 3047/ 472489889028 ..704390..3..0 32....70/90/ 398.907390-..7/3:2-078 88443..907.088.38.88419.39497.8.0.  %5.3349089.39 4220/.92...3.0.:894207 8 !894708/9.-.:041903490 %7.:7703.94384 9.3845.03994-4:3..:9438 %4:3.85.20398 982094/4:/825-094405038.97.941903490 8/9./...9:70-:8390-.07.05930 .9438 070-90207.990 .907..-994/090.3-0:80/4343.907.3/494:800 .2430:3/07830/-.7...24:3917429089470/94038  %4%50841%7.38.313..:7703..3-.3989470890/9. 34908 88:0/4-.3/8007 97.42085488-0-0.8 147..80/ 900 .:7703.507.70..83..79 -:07 8007 .8084209343903907309:839.:36:0807..4794 5.3829..9438 90-.-.3//0548989.79 -: O08.3 8503/90/9.3.890.3 %0-... .:7703.8942..804185039 34908 :89. 243041.8 94:9 .2039 90207.3 97.8.3 85:-..4. 3:2-07 /9.3/207.705:7.4508 41900 ..39.3 %0:8079.907.38..3.3.74:888:089.398.9.0349-00385039-01470  %0.39.0  .0397.9438..8943.40...9438 070-90 34908 ...0.:894207.80 0. 97.806:.70897..0842014724170897.07 3490  .-.

..09.324309.//943 90574-0241/4:-08503/320.93 .8 0.00894709:73 097.9438.3 ..3/343041904907504500.390570.:2-0784203.9438:594.4:3989.350450 4:/100:3.943.3/0.3/-0110.30 24.39..-.0380 03 04780.2.. 9..943 .-98.9439490-.9438.830 3:2-07..30 574-02 4790 -..39.50710.3/110703950450 8.9706:70/5.3/84707.8..39488:0:80789034:805.286:.0.3/90 .:9 .07.38..088...-00993490783498507843..2094/9.33490 8807.03190-..30..33490-.308.421479.039 8...990-.3810770/850.70.334908 94/0907230490.33490 9888:0/949./-0.3 4503.425:907 4:/..:/9348 4:-08503/34:/349-0.8947041.  09 8800490-:8308847.4389.3/.0.9902598948503/ 24309.//8.3.920/:2 410.3/.90.3.3/8 40.0/ 38:..7.//0/4..094.410 .9743.704390.07..38 .3.422:3.7083.0 90-...24308.88983. .90574-028  :8308888:08.0 -003/0.3349085.-.89:.:8942078../03423.0.:0174290 4503.93-9 4131472.74:8207...24:398 984190330.70/90/ .943 .20/:241 0.089948420-4/080 9897.90/09 .30 %48/089058:.03914797.9438 0390.8.41 .8.303-:8308897.949.9438.438:207 888:0/.9507843 8:36:0.9.3432907070.9743.389.7-0/ 29 95..7940982...0..439.9-.-.3990 .:804190.0380 18420-4/.-994-00.:0 9.81:18942.74:8/03423.0450/147/0.94384:/-0..3.3490419097.3/ 4842092089...80/4390-..0380  .09434 %0 /438/089.7.7088:0/...9078 .903:2-07843900 .-094:809094-.31:3.47574-02190 300/147..5708.9 4907507843 8..9743.1. 3:2-07.3/8947.0..70-03.7..382:950 /03423.07./0/394 82.3. 31472.8/.4898 ..0 $44:/.38.77.88 974:2..943  7..2039920 900 . .070.9000.438 41 .:088:11..8 30/7.943.88419.38.334-0..80.920902430.9438 3:2-0741.317420 .3/8 904/4307.

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

9.7/.-0 /03423.207.08 0 .78.40/9470.24894.3983974/:.9438 3.3899:943  .08.3/0..3.3988942990 ./0/:73.3089.80890214717..3/9204:/ . 980028:309.994...3-029.:8942074:/.07939 479...709147809902039  9034.0-01470.0 %0 29...90/14703 0.035074/41920  %080..908  090800907883.7430/.90/- 25483.94389.8.25/43 439 0..9.07.9743.889.035.8 507.04125483. 2.43.05....7147282.8:3574/:.97.84:/ -0.7 39084799072 -..00881742 9830-:830889..709 14:5..38.:8942078 .48984190147030.38.4 57419 .3/-:8420931742.83 8.9743.9.34713.250/ ..0300.94388:08470.39-..9 40..302.3090 243057479490057.2430 300/894-070/054899.943 .43.147-5.9.943.43897. ..39...9743..943.38..4.43897.94310014788:3 9 -:943 30.74889030947948420/070041 570.09470/002470..3/10 ..83980.03943.-.3-02..30/.0.90/90 .3810770/-00.:7703./30 479810.094-083.094-0920 89.24308.9:709447 00..398 8:.97.3.843 %04-0.24304:/.884..0/0/439097.829843  909204.43897.098.11..89.9743.9..098549039.2430 4:/0570.70147.425099434:/8:702.43.384:/574-.302./   42:.90 ..403080941 2502039.250 920298.7097. 2430  903:2-07410..790/94-5.8839097..3..0.:804190804-89.07320398100 /01038.9743.0732039829-0574.384:/80000.3/-0.-2.2430.031470 .07 8.045398437.38.390:80410 .3/97..3/  903:2-07418:.3/0..174297.9000.2..0  %.3904:/480174290/71941..807..47/ -..943/0.07843...9743.80/3047 4.8  507..3-089470/43.90/3830.4:/-0809 -043/.:7703.7098-/0.420 479088 %0.#8.8 .40/39497394.

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

759438../0941:3.8 37054793./ :89.438/070/ %06:089430 ..9.039.3/0/41194:990340/041.04198/0.834.47/0/38420/...4:39147..8 94-:.7898:0.870.9.7590/ 0 .97:.8 889028 84 944 /454071:00.30147241.0452039 -:9 .47/0/34 :9.3/:397.810..:7703.0.890549.888902 1742/0.90 897.80/9. 47/07 &3/07902489.0452039..38.:7703.5072430/408 5.4:/-02.8089843574-028-0.38.854071: 03.0732039974: .039.425:90794. 47.02085072990/08341:397..8:./0398301472 41.994904.707904.70.34:/.94390.3/945705./:..95..47/ 093.-4:9. 82..13..42207.943  40.7054793.3:3/0774:3/0.70.073203970.74:8.90.47/419.8 548088349  $4:/90.. .0.870.997.:8090 .9.03:0148.943-.34324:8.:8090704:/-034574-0241-:.43. 89.943  %7.  3939.3/98:3/0774:3/0.8849.7089.2..0 .39 5479434189.3490793470.9 9003.570.04198/0.174284707 -.3.-0889028 8890283.4:/3494/.8438410 ...888:0894-070.0732039.38 974: 90.3448 147.80 .0.70907708543808  %4570.//943.4394809 .3-047/070/   438/079025.3/34 784174--07 %0970.19079.4:/-017005.30.800.3430 -:9905.8.39..:7703.08 .880/4111742430 .33.4:9 9090..3.80794:803.0789....47/ 0053944850729 90/0834197..203980 4:/30.-00 .08.0732039 -0.438:207.4342 904...98949008930.38..2-94:8.3/-:830885.38..70 /8-:7802039841.30 4197.089.4342 94574547943854830.4://7./077.84341 74907 70.-041-031470/  .-0.-74.38...9743..0.831.941 .0.5.. 97../4190-.-00 .33/.7 908949097.4:8.7 8.3 %0-.0453 :99.97.3/4.4.03:0 :910 .-..9405.8 90/435.8..943 :89.203943.07 .38.70/:70.3.4..4:80 .843%.9.9.47..0 .08 0  8.3/0389890.3430. .943809.8 04:/800 .9438..0.30.430 ..94384/890549039.88:-89.0732039 870.4:/-0.3/411.0724708074:8970.0349.08894342470.92..0793412.793949...420824708:85.0770..9. 9/7.9743.9.

 1:3.9902.7.3/0-9..943 O8.5.. O3974/:.829843  909204.8.943-:99843949.97....-.8..9.06:08 O0.7/ 70/9.7/ 4734 0..7 .941 9097.3-02./459.410 .-. 8500/4100.7099..90/90 .3/0.3/97.035074/41920  O%0:80410 .40 .. 2430300/894-070/054899.8  $:22..3810770/- 00.9743..9743.38./0/ 39482.:943 .334908.3 99.70:.43897..99.07 983490.0.3/  903:2-07418:.943388902 ...08.702.3089.50 4.9-.-908 0 ./0 /:73.07320398..0732039 8 70..3/973940/:.994904.39349  25..8041:80 94:9.:880.9370.-4:99005..06:0 82. 3899:943 ..0209.3.39..88 9.3.907  4..:80970..88983.34324:80 .9:.9743..-994-00..08410.34907574-023-:830880:830 .34713.9743.9..9743.3.3-089470/43..8 O 507.0 5480.03.79.83..398 8:.7/8 O/.05.3.3..09.24:398  O 304190-:8308888:080:830.0732039/4702.07..28907  4704.8/..884..13..2430  903:2-07410.90/- 25483.08420 8074:893394/083.3-01472  O%0034724:8.7/8 O$:22./   42:...07...:7703.0300.7 O 30/ 507843.943.9743.943.709.57.3/70:.1:..9438339073..9.03:014   %45.0-01470.94389.24308.03:0 7.38..3-029.3/.!:7808..3 .7:93.889.8.8.389439400.9743.8.904:780.3.

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

3/:589.3.-94114.09 . 83...8 9:8 82513.83.4:393807..39./0/-:832:950.80.9743. -.. 708:930.42207.9.20398 907:8041.7390-:0747 8007.90100 471..43984:730 974:9088902   :70 !.3/8..75947.:9039.97.39706:702039147.9743.904309.07..9:704390.. 03/47802039 97.3/2..50 ..807.:8942070/:.8  O0.41../.38107 $:-806:03903/478078.79 .347/0794..3 25479..4:393807..3/2.024304390 /05489.0757494.0 .03.../943.0.. 908007 8/9..1.8....0784131472..80/435:-.88902 09 880090. ...3814728394.8.70 574..2039 %0.4:39544  O3.4:393807.9...059.3889028-.07108 90/9.943.43.0901443./0/05489..38.3...897.088.8..9:70 8:80/94.7008:90/147.071.3/90..4:39708 4: ..300.9438.494..94310047.97.98.425:9071471:3/ 570.0 %097/ 5.1.8907  0.203997.9014.4-:07..3/5..3/800794 -043 94/1107039/42.70.07147.943  O0.38 70438 47.03943.8.078 %070.703:2-0741 -.9434394909.745.:83.943806:03.9743.0.-9.75947.34907 .3 .38.3..0 #0.0892:...0..33907....8....807.//8:.-.0.07.382.0..08 O%0473908.0.4:398..4:393807.70.02430-..732.020  :807 8/9.788..20./.32. 0.25390-.

9743.38.3/0.1742.385479. 5.088478.078.0590/.0900.430.078.7/8.9438....8:-899:9089082.7/90..943.3/4907.2.3.3/706:70 09038.39082502.3 ..5470945.70..7/888:0/39047/.8 7.094-0830/:5.3920 94:8.389470831.5..2039$890289.79.4:397088:.0/ 92..0 072.:79 39030980.3/4/ 57428014780.:7703989.0807.384197.7 430 .3810773 243043 30 3859041902.3/-.0450/ 0 .70.0-003308903..309.89750  %082.5.42207.072:89-074-:89.90/9.7009.9 -900.:8843041 900.90/94-0 920824709.-0414/3247031472.703:2-074197..5 .998.79.9439.3//0-9.3/$3.002-0//0/ 2.43..08..20398:-899:908  308:.9430/8.43..7 8./0.24:39841/..!.0945.:7097..897:.3574949508/0.9743.70.9438:830893317.8 .9803..3 .89750 3/:897 4-807.3/ .425.894-0/0.0450/ 9497..0/8.7/8.0730/43 5.7/8.7/574/:.0570/.:80207.398 .7/  $2.3/..9.98247080.0452039 .9743.  0892.9902..70/9490.74574.3/:8.:880/8.5.309.:3.8 97.203988902-0.2039$89028 %0034724:8549039.309..3448/0:80/3.3970.90-:8  39020.74574..9041 /0.79.1475:-.3 9097.:70.0947434:9.2: -90.38.34907.89750 %0.3/.3880.0884787.-041.5430 .4100.79.20.....9079.3.2.2039.-4.38..141..0208   $2./943.4788:041..79 .3/3.!.381072430 $:.5.70/9.907.940388.8890224704.9:70 $2.:7020. ..7/8.3/80.083..3/8414:/ -0800784100.41.9743.38.0443 1475.

3/1.7/8 .8/0-9.80/82..7/8 $2.79..8 9.7/8..43390&390/$9.70-.908 83.2430  #0.4194 9508 O#0.70.28 %0/0.7/8 O0.94385 .9.3/8455074.79.70.80/$2.3/00.-0 .7305038.9743.9743.02430  .705.3//0-9..5:7808 .0900.9743...470/ 90:8041.84343.5:7808 0..03430794.94385 -.

0453302094/894 2.70/9.2039.4..83 84589.3/13. .3/70.3.9743.3.80.303.8./943.438:2078/02.79.701.9.:8942078 ..08574/:.02039410893 ...339482.3899:943847//0.03039 ..2039300/84100..79.8942009 90020735.70.807.0 %7.890.42207.7/807 .43.08.989.7/8.7/8..3/ 5.0894200990300/8413...39.3.3/.90/.-0  70.70/ -..70:807 1703/  .79.

7 9494809.308.882.089.3/34313.70/9  3.70038 89.807.9743.905..0/-.04557424943.:/33..770.:01470 .....0 -:/4../9.3.088 -5.997..84.2039  -..4:398 ..70/9 .98.33 70.7/4/0731472..3/ .80/.709390.39948947043907.0/..943851470..3/507843.94385 -.79.8.7/ %0.47547.438:20781..3/.47..420:543%8.013.70/9.7003 5430 .9..4790.9072.38107147800.:/3901443 O.3.13.:8942078...9097.5 -..9.92:9504..3.70.2894 03.089.//0/5747..5:7.09508 8:.438:207 -0.3.9438 8:.9.8 43430.08 ..7/ 8-:94309449.5747...8.:/0.7/4/0782.089203984789470/../0.507843.:942.. 3899:943/0.9..943 3.203:41807.0303.1.088942:950...425:907 .7/8 411073.80/.8/0-9 . ..20 -79/.3.4:398 O:950.7/889470.3.28 47490731472.3//0.0%'8425.//9434130807.088459438..//0/2..3/.3 00.8...13...4:398 8:.:89420 807.90/9441107 .0 %08030807.9 30.507843.036:7 471:3/897.39894.80 8455074....90 507843..80/574/:.3/70903943 ..90/90072.0 O.:7.38..3..0789498./:.36:0894 ..9438:832:950 /0.7/474907 /0.084382. 8850.70935747.9 #0..082..507843.47/8  %831472.35..//70880....3..70050.5 -..990259394.088942:95013.7/47.30 ...0882.909080807.28/0830/943...8455357010703...:894207 %0.943 ...-0207.8.08394.8070.:0 ...:8942078 . .7097394 3..8889.9:..3.43.709411:3.0.90/. 706:7020398 3.70.39 ! 473907....:0 .3....94303.907459438 3.


 .705740..382. .304782.7/8/85...7 343080.0598.308 .3/4907807.70/924702430 814790 .3.300.3/.7/8.-0147.8310-9 70.03/32.70 90.7/8.79:.708  %00.99003/4190-3.0/ %8..79.0 00..:8942078945.8990.03/47 9070..034.3943974/:.078 ..9743.35494.33 -.70 574.4508 945.3  .3 8:-.3-0.0-003 70.3/0-9.-.3-070.7/.08    0..9 70202-078 0..0980/ 82.90/94..3-0 .9.9.207../0 90.04390.0/..023.43/ 90 ..73089441107 1706:03984553.3/3.48.-0147..03/32..13.3%479.-:889470477:8 4:794-449 .3507843 47  24700 -9005430.3/ 850.7/5:7...70.9743.7/8.90/5074/.7/8.3006:550/9.438:2078.40.9743.4:/389.28.943 3/0390-.04390.0 70.9005430 9..3047..3/.3810770/94.3..74.8 8250.0 %070 702..7/ .3-0:80/945.900543089...89..390889./...0850.0719.9..:78.. 97.3/.07931742-:3144/ 942.0.308 709.80/.30300/43..8-4390..8 %42009 98300/ -..30 .94385 -.707..70.8094-0.70/9.80/./41.//0/94.70/9.3/1075747.3/0.7/8.043../07 %0 .4:39 0 9090. 1477/08.30 %0702..3:590.:041905:7..0732039 3899:9438.589.94209470.7/8 085909073..3/8099020394.7/70.3.300/147.005038.8-003.. 5:78084:/.38.9743.0 174294 %4/...9.808/0/:.0..3/97..425..0/-90..90-.7/ .38.-../07 4:/.3307  1907905:78084.489..-02.9. -83.5705.9 894708:284124301475045094:803890.3/9070 8034:2430..70/9 -.22.-....../0.:9039.93147..489 .3305038.1.5:7808 /05090/ 905:780.4./078 9005430.0 0.901:2-3147./3/0..147  8.344.9743.5574./0/92430 .03/32.3.489..7/802-0//0/95747...90...!:7808.3%47974:90 :8041.38 ...3/.425.!:780478390443.8147 0.03/32.3...3897:203994705....

39706:702039147.9743.7/ 47.3889028-.8.98...3/.9./943.70/9.8.9439.38249079.:884905.8..70.75947.3/90.3..!.3/0399089.2039-70/9.7/8  70/9.7/ /09.34907  0.0  09 8/8.3//0-9.70/9..08 O&3/0789.088 1.4/90.2039$89028 %4.745.2039$89028 O3.0.947807.8  O0.98 03.7//09.0 O$2..9743.43..20390.0.9743..8.-94114. 49070.2.41949508  %45..7590/.39097.3 25479..309.7008:90/147.3/4907..$:22.3490714724100.03/478.70.03943.7  -0.7/8. O3974/:.943 O70/9.7/574/:.70/9.0 90825803/907.70/9 .9743..80/0.574.8 %00.4./:.2039$89028 %0708349330390-.70-. ..80/0.!.89490807.70/9..2039843903907309..3 . 0.5.70/947974:842020.43.52.3/90.70/0830/94.574/:.9073.42207.8.943.20398:835..20398900.8..3041:303.70.84305488-0920 90890/.3-70.75943370/9.9743.90/9/9.7/8..!..7/8247080.0892:..088478.9743..89750 O$2.75947.0..80..7/ ..84443.3/00.42509./04330: 31472.8.70/9...3/5.7/8 O$:22.732.9743..94038 %0 .74574.3994 5:7.904708  !.7/ 5.80/435:-.0/92..8.8089 2094/415.438:2078.79.20398 907:8041.70/9..8 . 30309478394 9700-.33/.8907 9..7/ .7/8..7 O0.3/0985.5 O0.438:2078.:709..70/9./073.0574..9 29570107945.

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

0.7594394/010.4330.0 %0.3/5.4390808908.:8090.03/47.425..438:20787089079.-4:9.830.438:207:808 847075.943 20..420:801: .:800/4083 9.70/9.425.3 9.03/470307.045/897-:90/0807.70/9. !! 03.3/.3/0. 10 %0.0598...438:207 80 0.03/47 90.3 93.3 .38.709087003.0  9834 920% .-748078 4941 90808.7590/9 .078  90780 .90.438:207803/8.0208.03/47902088.4:/ .79.700949097.4.790894 038:70097.3 98:-29908.7090.094 /0.94038 3..8847/ ..34329 %0/1107 174200..3/90:303..0880399490.9014:/.5...425.9  90/0503/43089313.25....70/9.90 .0397.7/..90/.:/0/90570.0391.3/5:943985:-..438:207147/4.:70889029.088478.7943 90390730994.078.0/.38..24:39 088.7894147902 90390.07.99.438:2073.70/929 %4-:842093 1742.3.3.07/.438:207.708 -0.3/4..3/.3/70/9.3.7/3:2-07.0.09984380.07100.70/9.07 706:73..34:7  %7/ !..70 9.7/.7/.03/47..-90.0889490.80...3/!709944/!7.808 2:9505.9743.89430 ..8-003-:939480.39.3.0883 ..438:207.3.3/ 38420..80/ %4890.7/8 397/ 5..8 4.3803/890 .0 -0.97/5..0908.90 //3 9.99.7/ .438:207...7497..0 .3988.:/3.7/.79!74..94394/1107039-...80920390 2088.43 .3/  90706:709043 303.3897:20398.7590/.29.943 -0.07843807.9438 '071..3-0/0830/92.9  $:55479147!7.3-08:-89.997-:9084100.7090..2.34190 ..7090 %05:-.9743.7/3:2-0783...3/.78 .3.9743..80.:800830/9 .5.//943.908...438:207 803.97.343 3097/5.020 0.38.7/889028.7590/ 80.:79 40..70/ 94  $00    4-4/.70/9 .0.3/.38.9834453..3/803/99490 .3 ..940388902839.4:/-7390 8890294.08894-49. 0...79574.0 203941.09409.9.70/9...-489070/990.8847/ %0.5:-....0 %4-0.. ! .79 .09905:-...9431470.20.0807.70.75943.07 %080.99888902 %0.//94341 03.03/47 90383902088.3828.8847/9483902088.

0391:3/8   %0 %!!5.0..05. .:942.80.7/   %45:7.39.438:207.300.-0:80 425.:894207 8 ..07..0-492094/8.843 3097/ 5.9743..73 3.907.0985:75480  07090940807.3.782.-7480780993894.3897:20398:.9434330  %0. %0-:07708543/89490 1472470 2..990 -00.8 8905574.078.74320398:9..3 807.3/207...4:393:2-07 %05:7.3/-07 4780.3.392:89 -07089070/990 %!! 343 3003.:894207 8..39807.0/389058 -0.:/ 30..08 ...9890 %!!5.89..07990.988039-90 %!!807.4:/-0.0-  3495.220/..9434330 90 .08174290..89.808 .3708:93..0747.70.5.701.3.81478:11.9.700945.2088.943 574109....2039807.07.0..943   %0207.39...0.3 950390..97.574/:.:942.0.80/14798   190 %!!5.:89420731472.3/. 70897.2039807.0710890.3/5.4:393:2-07   %0 %!!5.90   %0 %!!349/0-990-:07 8.3.70/9.2039807.13.438:207706:089890902174290207.3//0..9431472 %8..70...98-.14729.07  ..0 8419.9..:942..090 %!!.707010770/94.4:393:2-0741 90.70.94-:31472.3/011..0/-.0883-499030./397/5.../94574.38.9.-04103.74 97.94347.0889.3 %!!.07098.4:39:39970.8%0.39-6:49307 %!!..79 5.70 47490731472.92.088478 %!!8 83...9438706:709.2039..34190570...-8...2039807.2039807.-01472..439.07  &80781789089.0.4:393:2-07-134:9.90/.:8942078.70207.82500 2. 4170.3..4:/:3/07230904.438:207.3430419700.43172.6:708.4:3931472.9:70 %!!8.8.07803/8...03/47.79574..30945.4:399905.034304194 .4250943 -:80--:078470.943415:7.4:39./943.09490-:07  %82088.4:39 8:8503843 %4:809888902 -49.4:/-0.0 31472.0..08807 %!!.39  .40/94/434.3089.9./574.90/ 47//00--748078./90 2.9.75943.1.80.79.:8942078..3/90.477.398314720/.:947090 207.:894207 90 207.2039807..039.

0.10/89.85./.3/7.090:807.309./080.943.09.0/-/1107039950841 13..088&#83.840307...398.3/574..250/ 5.801742.70/9.088&#8 %%!70/70.70.7/8 .39 8807..07 .7/44/8 98&#8:8:.8415:7.0599.0/9490574/:.943 31472.70...943039070/-90..841 90..-0 905.07 9.088&#890473.108443 ...2039&#/70.07-.041 902 9.//7088 94570.2039 97.07 3490747/8 905.99.07574.:894207 8 -7480794905.7330947 %088902.07709:738...70/9.97... :807 8.4/0/31472.09.9:70070.94394 90.2039807..088190057.3//:7.0880/ %05.%03 :83.2039 .7/.:8942078.9 2..709&# 147.943920 45943...8057.880/ 1..4:398.088..:9039.70..4.03.4:398 /0-9.830714790.5:7.3897:20398 .9.2039807.90890:807- .347/0789...09490207.0 ..70/9 .5.203988902.3/1:3/8.841905.5.2039807.08.9.088..943920..2039 807.0.9824/10/94 574.088&# 80110.94507.38.9.3%%!807.0 &33439490..90.3-0-.83 .94344/8 9850.203997.943 90.07.207../03.943 94905:7.98 %0807.039-74807 .:8942078.80/9029.9890:807 8-74807 :83.0.8 3495./94190&#...3 ..9...:8942078.4/0890/09. 574.397:38.203920..2039&# 507 38 ..70 5:7..9.709&#8039-90 207..990:807 .8 .3.75987:33343.3/49075.4:398 -0/ . 920.39 807.709&#  !...07 9574..73 %0207.24:39 ...2039807.3.3828 47./08.3.088&# .039 8.08894909.....088057.80570/ 90807.07  3.439.9..3.:8072.3 -05.08808905.3%%!70/70.24/:..7/.780/-8...943 %05.2039807.4:393:2-07.7/.943 14731472./ -90 5.3/09./9..4330.943 %0.......//943.4:398 5705.890 .:94705..9:8 5...:9039.2039&#8803/9003.014731472.943.399.079.343.5.3455479:3994705:7.80/ .0790370/70.0725020398.90.9.8-00389.:942.943 19031472.4:398 905....1472..20398.8.94344/8 !4398949031472....3/4907/0391.9890.94394905.203988902.3:324/10/%%!807.38.:8942078..4/08901443/09.85:7.:894207  905.75.3//:7.088 %0.90/ 905./ .39890 :807./1479031472...2039 ..99.8090902 %0 5.7.2039&#03.943.

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

074/..3/309478.7908 0.:809442.07-0/8.2.3/.5.70.3 4724309..9 ..3/-.34329 2.43-0.70-0.431.38.:/0  5072.47/10.97..9.  82:3 .-9  .0:890 .90/94:9..43.7594341.9....3432941..20392.0390/43-0147090.9 97.-.02039 .8.80.0793 94:.8/087097.39.9899097.3..47/00531475:75480841782.2039/3.38107945.3/97.3390.7/0/ %070...0.943.-99497.425:907.9 .20392.34329089894/.9011479 -9097.01.80203941905.70.47/8 3..088-9.4:390794905:-.343297:38.0.:947908  %0300/14770.55030/ .7.1907 90 1. 203988902/.07 -.:80.9.9:708.9435.5.3..9:708419080.34429-04/.:942.3-00.88.8  30. 300/0.305.9..3/  /..30398947.38.3 5:-.38.38..0  .943.09.38.9..059  3.9.

.4:3989.90 43985439 3.094-0.7/ 70.08.34329 88:07.079./390723.0 94-07054790/ 20.4.43897:.472430.708:93384079..03943985439 47389.2039889028800294-0 .0732039894 .5 50394:9.7/.38.3/4.20398890294:9..098.07  .//8420.043.9.55 0.9..370. 89.47/0053-0/11.9743.97.0395..4:/-070..97..943.3 .33.438:207 57490.0 9043/000.9743.3..94394..:942.3078.-0/0-..90 9908070.902039 2.94389.308 47 90054308.8 -:99800..8 38:2 .:942.47/10.5:780 94:9806:.388:09.4:/.89903997.38.3 .:9147-.3050.9743.7/ 8.//943.39.389488479019 %84:/.2.3394:/.550.059 0709070:.47/84190..:0..57490.343298...70.073.807947084.943..9434:/.9743.9 ..300..//70880/974:70:.9438 %0708.9.3/90 574-./459434100. 70.9438..3.3289..47/8 90-.38.70/0830/94 4/.8 2.2-.43147 .:3/0735488-908089 %0.4:8 90.902039-:93  -.808906:08943.743.79. .1907901.9743.70..9870.-:92...438/07.90/.5.47/00538.3//85:9080.9:70.09.0 40.38.3 82..97.:942.20398.90/.9 9:8.943300..34324:85.03.3..9.370..078:8.47/841.:8942078291009.84341 57.

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

3/ 92:89-070.:8942078 9.07..97..308/431.39..70/9 .990797.847/  $:22.094.47/00539.- g $9.3/.083 -3  O%000.3/.-03..890.34324:8 ..-0/.807..3/.7/88430419010.943.7078.3.7/803.:79 39: 088 .089203938890283494329349-070.839.:02489-0.4250.9743.507088..38..9:708 .30/ %0-0896:08943..38.88:208.43.0890/38890289.2039 :8078394/1107039309478.3/80073.0.9.70/9.8 %0 574-0298:-8/08890549039.0.9349-0:80/  %:83.-..39.34482574.425.9438.4..425.39..70/9.9 .20398 17425.890417084:7..5.:8041/85:908.943 70./.39.3/2...78147 -49-:07.9 94:98:-8/08 98/11.039071.3/70.08 74078..894-.704113.3/$9.7/.3..070/-:9 8:-89.70/9..84-030.-039074507.3:807890.3/ 050703.3..507 -.574-028  050798450 - 9072430 430419080:7/08.3/289.35.08  ..-0 489 -0:250/9390309100.70 349.031472.990.382.7/.7/8 900/341/11070395.7/08841.5.43434507.80/940 .07384.438:2078.7/8           .3/ 1349./.3/.7  3904907.2039889022:89038:70.943  O 30/8.7 O70/9.3//1107039889028825488-0  $9.-98  O#0.430/9..-4:98503/3.824302.1147/....7/8 94:989. 80.-994-: .3/.0/.3 57..:99457.088..78 %08090.08.:.8:-8/08.7038:724:39.0/.-9 .7/889.7/8...

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

3.9438 -:990573.390708941..943 O3/0503/03941.90/.7/97.43.98070473.088/.7/8574.9.3/.7/47903974/:.7/8.9438 %0/.9438  4894190474389.9.:8942078.:2039..947.990259894574.3/.0/0390/.70 O3/0503/0394190850..4314720/949  .94341.//943.42243.700/984:/706:70.39.3/.79390 97.50.3810741/..9:70843041:330.9-9  89.50398 8099089.89..-0147:80 O42570038.1742..4:94341$9.4.04190/.3/.4/10/ 89.7/84.9.3/.0/070 /0.304131472..0450/-47./94574.3/.425.943.7/147/.0147903907.3:..55.0  .38.8.706:7020398147 ..550894.0706:702039834903.3..9..3/..30 4189.70:80/14790 3907..703:2-0741.8.38.30 9.98 O#0.088.3/90.9.-09003.7/80.9.98:80/147 1097.304197.07.9..0/1742901472.42509.33907.943.35./0.3/13.3/8419.:89420747.3/ 3.0780.845488-09.5..7/.3/.42509.80.07..3/.3/$0.3/8.3907.:908 %089.07.94389..3/.943. 1472.0397. ..989..$9.08 ./0/4.8-003.9300.3/.70.4509 98.8/.2708:98  409 8800490./0 .94370.7/  %04.3.0730/990 3907.9438 %0 0..9./38 .09.309490 089389.90789./1472:.3-0 88902..7/8 %0178989..4.94:357....7/8.7/ 574..74:889.3/.97.4./330947   %# %%#  $9.3/.90/./08 47.7.3/.440.7/8.308..3/.//0/9490 88902.8.3007090/.425:907.4209080/11.3.3/88420.3/.0398.92470 .3.3-08003.9   %017891472...7/8 O.3/.929574507-0.39700 89.7/80.70.

0/.7/ 3907..3..3/.07.3/ .4.8.3089.3/80.947. %0.

3/78 415./02:.4:7070/9490$0.943.1.25041.4114790 0.47-.0450/89.943390&.06:0843.309./0 20./6:.947.38107412430-09003 -.9706:70/-$ %0/.:85.748880.99080.   .7 55.709.$9.89.-:83088/4.943.9743.92.9.7/8 %0:8041438890288:.084190 &390/.:3.38.7/..9/0...:20398 3:2-074197..79078 $:-806:039.7.0  $0..94:95:9 905.7/147.850.3. :80414330889028/0243897./3 %.890.9438 30.3/.3/8..507/4.7/8-4/08/0..3:.3//0.393:2-07415.473. 97.94747.3.9..55../0..422:39   %0706:70203984139073.3/.47/.8903803994$070 905.7/894 200990300/841.943.0  &80784190$8890270.3.3250/203994901:7907/0. 831.057390/.425:907103.3..20398070574.3/.73807.47/0/43.3/...98147:80390780.7/8070-0.0.9438:3/078944/98549039.0450/ 1472..3/3.438479:241902.94797.8/0. 9.3/.9.8.94389.0990 1472.42207.0450/ :3/0790.7/8419.35:9  %0:80419088902./0 80.-0 0.8.2039/.9438 & .425:907 4189.47/0/9031472. 050380./08 .8.423 .:807.890$ 88902 $.8$.30..389.3/.3 43308:-288431..:/3905.947 $42041902470349.89.4:398 .3 ...3//0:80/3 90:7450.:20398.3/.30410307.078.425:907104:/-070..9.20398 3. 74 :8098 807.943904:/ .807-90.0.90/90549039.3/.//0/9490807.9574..2.347.943.90/.70 %% 31472.50..399.0880/94:990/0.04520394100./.3/9024700307.2508.3/.01479097.9  3900.3/2.:942.-9  1472489950841.390706:70/1472.82.947.8..0450/147 ..89.

7089.428 &89.7.90/ -' .8390.3/.943147.089.3/814790 7./ .7/1470307.9.:.9940.947-.55.3/907706:7020398.0/ 94-0.3/.3/.38288433:7450  %%.7//0..01742 '..0450/-90 79.8570/.3/2470-:70.0/:708 8840794 70.3/.97.3/.55.943./.4..943390709.574.42090570/423.3339424.943 3 %# $0.80/ %%89.7/8..89.3 249473/:897 %0249473/:89785.3890.90&89..907397.990%89./0/0..3/.7/9/08570.4.8099080.3/./08 98.701:209  30574-0290.90  8..3300/89.0:2-073884.9.3/ %%94%039089.3/89:80/ -90072..-0 . ..38..7/ 998 /07.249473/:897  %%89.7/  %7.30-%0097.0450/ .

.84/0.3.9  907:7450.3..190:7450.7 80379.3 .3/.4:39708..4:390/147.0450/90743 89.7/8147709.9.0..

$9.7044394 0.7/8 .3/.94797..07994% .0450/9/1107389.9743.943..943.7/990.89.7/ 8..7/8  %0890-4/7085438-014790.74:880.390 ..3/.5/3479207.748880./0 070-0..3.2508418:.3/.97.3.3/.0 %# $ .423.7/83899:90 $ .0450/.8./00.7/8.0450/ 7.088.3/ 37.2508418:.8.7039 %0574- 47.943. .3/90574-02841...3/.9.3/ .3/..943.0307.7.3/.4./4:930/ /0.0450/3./0.3889028  38 3479207.7/8390 .3974094 5.073/:897.9478 .43./23897.84574..325479./0.74:8-:8308880.4/0843 74.241705.9.7/8  %039073.3/ ##%14790 5.3/.480/:807.97.943.$ 1479074.8 /0.9434190574/:../0 $44  0.//0.94789.0390 3.4/08:80/14790-.3/49079028 574/:.0:9.3.3/.70$$3072.03:5-90 207.$9.3/9049073.


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

9.802039../03910890/.3:2-0741/.9.3/90/./0:5419.9.3/.2. 9028 %09.0020398 .


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

/09070.4/3889028.&!4/08 479074.84:80/32088.70 O:7450..9347.379..08 %0942.943.79.3.3/.943890 .97.7/889028 41.9438  %08047..078.//70885439893905.0:2-07 O&!&3.0 :2-073884.5.3/80.3  %0.!74/:.3/0307.94/0 207.4/3 %080.70.4/0843207.7089.0.7.9438.38.70..70:80/147-.84 ./2389070/-903.709.3/94 /0391.3889028.79.07.

-003.4803;4;0/390/0;04520394190798 /0;0450/90%7,/,.4289,3/,7/9,9,8/8.:880/ 0,707398.,5907  %0,3/90&!889028,7082,7 %08,/9 .4/09,94/9.4:397.4/0070,890&!8,/9 .4/0943,830/914790.4:397 %02,0:54190 .4/088433:70   

  4/3$8902  %0.0./9.,.:,943 14790574/:.9.4/0 :808,24/::8  ,4792 %88.,.:,90/-2:953,9073,9;0/98  4190.4/0 -,3/70850.9;0 %0708:98419080 2:95.,9438,708:220/,3/90.0./9890/110703.0 -090039,98:2,3/903090892:95041 800:70     

  0./9,.:,943  47;0782,9028 09/9  
.4/08.,3-0,4.,90/  %88849,99082,07-,7.4/0.,3-057390/433/;/:, 9028  %0.4/03900,250,-4;08,574/:.9.4/0147,  7,2934103,0/0,38 ,.03574/:.9,890 8,202,3:1,.9:7078 5701-:9,/1107039902.4/0,4.,90/- 90.425,3 1470,250 ,0/0,38  
7,293    70,241%42,94$4:5  
7,293    ,0/0,38  
7,293    390 7/072088,09080.4/08.,3-0:80/39047/07

30 0  9030     ,//7088 5439.4/08,70:80/32088,0894/039190803/07,3/ 70.0;0741902088,0 //70885439.4/08,7082,79490 574/:.9.4/090.4:397,3/2,3:1,.9:707 85701,70908,20 ,814790.425,308574/:.98-:990.0./9.,.:,943/11078 1479094:8,08 %0803/07419047/072,894850.1, 3:2-07414.,9438 147389,3.0,347/07 3,//9439490 -:07,3/8:5507 29/0391%00;07!439 
90 ,704:800709044/8-0/0;070/%03;4.0!439 
900,/411.0070903;4.0894-08039  %0%47/072088,0574;/08147:594 3,20,3/ ,//70888020398  94-080393,347/07  0307.!74/:.98 .4/08,70,557457,9014747/073-7,3/0/574/:.98 %0 ,70349,55.,-007090706:7020398147,0307.574/:.9  %8.7.:289,3.02,349,78003-,0/-0,38,7047/070/ 0,903/94,;04:757010703.08147,5,79.:,7-7,3/ -:990 47/0729-0147 O0307.574/:.9 0  70/-748 ,34/70/-748 47 O.4224/9574/:.9 0  80098900475,507  !74/:.9.4/339080.7.:289,3.0880907,700/-09003 .:894207,3/8:55074790708,3,700203943,33/:897 80.947-,88 %05,507,3/-4,7/97,/084308:.3/:897070 .4/3.43;039438,;0-003,700/

86 .2  /70.943411-70 80418009 09. 4:50/98:.,.43;03943 890300/147,3:3/0789,3/34190 5,.6:,399 98 :31479:3,901,347/07147 80098415,5078390757090/,8 ,347/07147 70,28 ,3/9,8,55030/  $:22,7 O%008803.041890.4/3,3/897:.9:734190/,9, 394,.42243,3/0307,,..0590/1472,9
,393088 8349324709,3,889024110
97,381078  O%0178989,3/,7/80;4;0/1742901472,98:80/147 1097,3810741/,9,-09003.425:907,55.,9438  O30,25041,30,7,55.,943390&,890 $88902 O%41,.9,9090.748880.947,3/39073,943,/0;0452039

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

425:907889029.8.94341 5489-40881706:039.08 47/0783 98.3/..9-0.-408 94574.97.308 %03850./ 20.5489.0 .422:3.-02088.-441903903/0/70.0809038.-0890391472.8 903907.701:7907/8..3/ 57494.39097.70220/.3:2-0741 1.425:907889023850.3/.'$ %080..07./35.90...039070/43.009... 3:2-074147/078147948097008:55078 %0806:03.250 300/0/945.3/ 94.908-:990088039..98.7094108 O%05489-4 0704:9432088.-408  1$.9..-0949070.8843.3-05.3020394190'$4:/-0.33.-4 0703.943858 %013./0 9203/0503/03.3/....705./330947843.'$.0/3.-4.3:2-074197..$94702.7080.80/30...33907.5039  .43/0503/03..0/  O%02.4232088.4250039070.793078 8420 419023.03984:/903-0 O$.4.-808.94383  O%0'$.7/30947 %8 309478.041 0.420.0.1.3/ 705.941.3/ ...9 :70      '$ !489-4.08.:880/390144380.3./0..-408 %0-.3/2.30..08902..08.80 94902.94339490'$ 88902 $./370.908 470.3574...439. 5488-9890:8041..:8074190889029070.9:70  905489-4 .390398...308 24.3/5:754808 90 3907.9438  !489-408..985489-408 :35..0:80419088902.$9470089.308.0 %0 1...08.0/:5  %..8303907...047/078147-70.50398.89470 1470.3/2.77.422:3.9438 1.90841.422:3.'$8.8.3/147.890:80415489-408.9 ..

9433 9490'$88902..:80890294-0 97./3850.422:3.2503907..7.-0147574.241983907.9907.088388902  %03907.. :530  O08970...:8942078 9.8090 .-808.43.../..0   %# %%#      '$ .-408147303907..382990/94984347/07574.0303..98982..3 5.308903./.30  %05489 -4.0 08970..309.0883390:807 8 .943838.308  3 13/39047/071742$..55.30817424907...4204330 398.3/5488-1:7907 3907.943 $00:70 147.422:3..$9470 .O%0:8078419088902089../890 1789:80741908890294.

43.38288438 94...0303.43/0503/03.88902 .. 89470.9.04190:8078 3.3-0.7/ 88902 %094573.803/.05941903907.3903-05./:.770/4:9.99003/41984.39.0/ %01789:8072.847010770/94.0739 574..08837:3 %03/.-4889028.3/ 147.3907.422:3.70 %203/0503/03.08418:.08808.9897.50.0 %0803/3.30.7434:8 %0 94574..99073/.2.793078 ..345943../35.4:20:8078574-..0303.3/70.793078 3../. ./35.8.0 %095041.- .. 9897./:.30.830-..:8074190'$88902 4.7083.0  !7494.9438394-0:80/8...4.990.0/:5 -9097.43.-0 940.

9.. 0:80.04508897550/4113.557457.8..48 %097.3080.30 3907..391.308.3/.890.403..8.94381.08.0/1742902.70941.08094:994574.3/0.-4  '.50390390 ...330947 %0'$ 8:55072.908 .5.422:3...3 :89903907..08 3:2-074147.$07.7.-994.0450/9 9097.4233907.0.4:20:80782./0'$ %0 -.3828843 57494.7090370 03.7070970./...382884357494. :524/0733070.-0.459147.9438.80/3047../0.4.3/248925479.94190'$8905489-4..304157494..0989.3..:0//0/.90949070.

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

..84383472.3 !7..29-0705.574.3.:/0 :807 /.

-408 %0 80993:541.08.97.0473949.0 431. 02088.70.8847/57490.0/411 9-02.3.557457./0090/ :801:574.70349/0503/.70/.:79-0-:939490'$88902 9825479..0.8-003.0  088.431:7..3/8419.0.:70390:807888902  85..1.77.908 %8574.0.0.834430730-:99.30/390 2.9.0 .557457..3/9847902.94574......503970970.30412088.39.3/2.3/039 ..0/9.9434190'$9.079070970.9743.0880.3:8041981.389-0709.394390'$  $0.0839072.0$947.:/0.0574.3 038:7090.0 %02088.02:89.3.84-003.943 415489-408.0 .80.439742088.94385.9:70 574.84390'$2..:9343041 90:8078889028./08.439744.943849.2088.84-070.05.3036:783472.3.3/70903943412088.84-0:3/07:807.0 -01470900..:/997..-4 .4393:4:8.3-0 ..08-0 489 90708:941.9.4103902088.039:.0.  3.3 .84384:/2088.3/43 &80784190'$4:/3472.9:3990 2088...7/....90.399490 :8078.33.70349 489 %0807.-94198807.794198807.300.0.-0 90'$84:/..3/9490705:9.0./370..92088.90.83..99.0/390'$ 039070.7590/47.0/411800. .5.43974 9-49:8078706:70/940390790...84389.

.3/3472.3/.089.55  .3.:0//0/0947 .0845943.08834/047.57...31.574.003...4.33...48941 90.3...3807.0 %0920 3/0503/03.431472./.3/ 709:738..:93904507.708. 3.5.08 34930947807.908 2088..08 %0.0989.0'.702088.0890:8079045943 41.9079..08147.943174290:8079490'$..807./0.909005430.9073.943 4190'$  088.9.943 3:2-0741'$574..2041'...0/- :83./0/-90'$.9.480389./3907..3097...088 '$ /08590907.3-070/:.0.:78.7/./..4330.70  4...03.09..0/:7087..30 %8807.088390807.3807.0574.0990.

84-0 ..33:...38.$07.55.08:8308894:8308897..0738 90:8041908419.9...709.70814798807.94341 $:-8.943 42207.9.7/8.3/%38 0.382990/  11073'$.438/07.9. 1.8..3/97.088949074330947 %080'$574..0 357.70.3.03 .38..'$8.47.08  %0.73897:.4390-:83088:8041939047.943.9..30..574...42-3..092489.941.75943  &8.708 %0'$8.9  O%890&390/.3/8147'..5489.3.9743.38.4:/800.0.425:907889028 . .448090'$ .0. 0947574.250 90'$9.70.07..70.9743.33 90-.2.943  $:22.7.42-3.3/./:80/-90797.9438 3 9047.70.907897.943841 42207.43.70147903:2-0741.42207.943889.708903/94-0./0788:55 4780 8419.3084304190....8:-8.3/ %7.-0050703.8 ' '...982489094-0./..0:8078..7/410../0.:0//0/0947        .08 %0-.990..84343.75943243947...3.3/!7494./4590/89./08147 0.7 O0./35./.3/.3/.3/9030947-:99070.438:9./078903/94.3907.3/.3/438:9.:807.30147/23897./078.339070893574249398/08570.385479  O'$89.39.9..3$4:9438  $419.70.0.3907.438:9.7083/11073.0.9.7/30947.30/./ :80/-!.3/147.70706:70/849.9.9574.8.793078 4790!038.8./45943 489 '$574.9:70 9.9438 5488-04.8 %20.30947  O89.422431472.3.43/0503/039 '$8.:0//0/.843.3...84 574.990'$990.559080....

08  2502039.943.088..-4.0020394190889028908419.947/0739490 .3:2-074147.47.9:70841.089.9.94341'$  3903907309  #0.9..'$ 807.943 %013.7300/94097..:889058.3$4:94389300/894.43974 8890294!.   %45.70944190 2.1.1742902088.3/94/0.425.0741.3/70..9438.3'$ &83903907309574.8.943 O$:22.3.3/.039.3/ 147.4/0 90/.4803'$ %4 5.90.9..388902 O2502039.4:803/3949 %0 5:88/041:8390390730989.998.990490703/ !.8.3$4:9438.70890/. O3974/:.9574./943.:79.700/89.3/ 86:79 939490.4/3.34190 .943 40/8./0850.088388902  %0..3894803/.2502039.3/.8.43.:59047/07.'$807..'$ 903907309/408 349:.-9.09.3900908.347/07174298574/:.89470.3.8419090.7   -0.70  1.3094789./0890-.990/..790/:83903907309 .10/0.7/.790490710.42207..943 O2502039.17429030947.4/09.002039841.0 $0.03949847/07574..08 O&3/0789..9.7..7/1.9.3//09.38.5079. 82.0.0738 :309097..908-:934930.3..

70/3:70     .0./0.70 %0 4..3 990'$83472.5.9:7088:22.0/:83$419.07.3/9039071..4/341902088..0.

702./35.93.7083472.70..94789.-.//943.70 1742.70.4:39314700../084:94389./35.4201742g2.394./080.70.250 -4:91742 90'$8:5507903 4501: 90704:/349-0..-4:931742. 3../0147.7941...480330947-:9:83.90/39490 $419.:/0 O97.'$4789.70..70  $419.3 574-0239071.943.4/0894.338419.088347.3/ /8.943839490.33907./.10.39.79307  9097.708 1470.  %0-.:/090.9438 %080 2.//943.9743.704770.38.1:3.3990.79307/..5.8-49./0.3/.3 39070890/ 5.8.3:2-0741-.43974 47/07574.38419.97..0/8419.94384190$419.70 %08419.8.42203/.704:8088:55384:9438 47908419.38.898:5507  %070. 24/:0  O97/5.798:5507  O%0'$8:5507  O85.70147 574/:.708:55078574.40.-02470574-02.250419889.7/ O39071.8.1:3.850..8:55908419.3990'$  .     $03/3.3/.4/097..38 574.9435.347/07:83$419../.4:3932.39.4/0 .:894207.70 %8..79 30.943 0  39073.3574.345943.08 1908419.9:7047.9. 97/5. ...79.0 0  5.709094./35..30309478:5507 2.55.20 O4/3-:8308897.3.3 .793072.20398  -9.3/ ./ 4:930/ 3.4803$9.3/.9.3:2-07418419.7/..94341.9.:/08419.08.4797.803907.

79307 O$:55479412:950$9.47147 90850..3/..97.1.7/8 %0800./3 5.9434190706:7020398410.9434190 .

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

89.78. &$/4.3/9057.8 .3/.1.3/.088:.908. 4784208419.3.70908:55479410.438:9.7072..3/807.308 .0903408:517429070147 90.7/ ....//943..

.08.80/ 903/94-06:90019  99094541907.0.0 97.89030 ..3.908.7.943 %009073.90  0./147805..900 42207.985.98.05941..38..0784384190$9.//943.39071.47'$8.70700.30  2.0397.90 39071.43.347547.7/8..:/0:5/.30890.708 9.5:39.7047.38.70 4190324:390/439843 2/7.3/.943841.72.3903..0 %88419.8.3...93.0..3 .734:80147.30.

/35..943  %088902.09497..38..7097.347.9.9 O%08:550770..9094.00/39490-:83088 ..024/08957.99097.38.3/.55.55.4232088.39.9438 19039071.38.9.90 990-:83088..79.943.3/90.. 1.910 39071.94380390178989. 4739077:59:8 %88 .70.7094-08039. 8:.74:8/.79307..894/90294 39824/0414507.3/.55.7/894200990300/841.174290-:83088.3828843  %0:8041398.:80. .84-0:80/147397.9..3/43.9..3/.'$ 8./08147.-08:55078.0909072 .55.70 .70.0883.703:2-074197.4:780 1440/- 2.3349/48.793078  %039073...943 O3.943.9..38..0841:83 471:3907..2039071.9425020398349943908419..7057390/4:9174290 8419.47..3.39./08-09003/..038:7089.9.088388902.90/174290-:83088 .3:..943809 974:6:.99847/078..943.3-024/10/849.748890.47.0 ..3 39071.. -:997:084:9..3/.-0 5488-889028 9.809 :5842092087010770/94.39071.3/97.084:94394 98706:702039.701471472.:8942078.0 190/.489.8098574.70.9439490 8419..0/8419.9 570 5.:942.94-080398 8...38.709070300/894-0.947/078147 .9434190 -:83088..70941 $9. .3 47/0790390-:83088.3/8:55078:808  349:80908.0814797.90/.7034957390/ .3/90$419.38107/.55..3/.8.55../35.014709073.39480.7/97. 03..3. O%047/0757397:3824/10/849.993 ...7043 /43 -0.943  3907..38. %40.08.088 24898419.08.42570038.341 904907.70.3 3/.3/9032..70/4984-0..70 574.990..70705.843841 9047.943./.382.5.0.94384.943.07..3394.943 8419.9438 ..4941920...847/07574.703903/0/147 O :9432088.38..8 .97.4:3985.3/5078890/9- 2.3/950/394908419.70097.49412430  %08250.9439.947948.3907.

4797.//943.08.089070349-0.9..3:./..9.38.09047/078174290 .8039-90 97.850.7/0.08 90701470 98 8038-094005.//943.347.. 35:9394.090.89 94..3/907083454393703974/:.943-:939490 88902.42570038.55.07 988349 039708.9.0883 889028 300/8.4770.4770..9743.3:. 34:.34907/.:79. 2.3/1472.947..088.-048947 .35:974:9308./35.9439070-0 4784:/-0  .908:90/-2489-:83088 .38.943 3.3 6:0708  472088.50747941.:9 /4397.0880/-908419.08 8.348841.:/0/949.79307803/84:9907/./9490/.4541.0./.3/9070300/894-0574.9743.335:92088.039 40.574.34907/.910 O%01.090889028809 :59 0.:2.38.-:83088.9.209078 9047/07/.99070./35.3934743 39080.908.35:974:930947:335.3/80.88443.3/.7.059.3.-0 7:.97.38.3/88902.7.81472.3/9075..947907094/0.70.4394901.943 -/110703.54894384:/.4232088.3.3/ :83:807 8:550/5.97.0   507.9438  570107.990/. -.9.3 :330.1.9438 %0.3574-028  %080.-.7.20.5./434.70...9.981..2.3/8.7.943..335:9077478.90/2088.943 4747/078 3.9.701:.943.3/.38.7:383.7:38920/147.0920.9438.:289.-9074:9308 9.4232088.08.43 84:/..3/54890/39490'$  %070.9944507.3829.0/:708 147.9 900..8-00325020390/ 35.50706:.39009../1742 902.9.7/.80.9438.943844190384:/90 88902-07:3 .34:7-01470.947190/.0780574./.990/.34507..0572.8 472./35.08837:388:11.0 -0900300.890039079088902  %8903.-39071472.43/.55../. 9043301.990/39490 706:70/89.3/ 09939029497.-.3/90708.7.O3.94341.477:590/..47793..4770.79.-08:55078.08 %8 3..9108.9390574-028473147239097.08300/.039889.0888:80/1473.42397.4..3/.8..43/.3..-4.0392..90.47/078 38420 .79307.9.890 06:.943890708345.3 03/-:990708 3472.

9:70390.7.0.84304:7.88479..3:1.3.8802--:83088 .4:847/07574.08 8:.0883300/894-0.8:89 3 9202.3/ 4-.3-0.0 .071706:039....09208.:289..

.9434../35.94394.3094789.5079.80 47/0731472./08.07. 920    $.9.9431:3.25055..943..4:803/3949 O%05:88/041:8390390730989..9 /0243897.340/20399490 97.7/890.9439904330.7/894..7 O3:2-074147.943 %0-:83088574.34190.07.0880307.4330.'9490-:07  $:22.42207..07.943.7.381472.790/:83903907309 .9 410-4.250..793078:-298.3 .90840-4.70.9430330-:3/0/9 !407 $07.'$ 903907309/408349 :.0  -:0797.8047/07.38.3907.3907..0798905:7.8047/0794   %0/4.55.088390 8:5507.3/8:55074.908.'94908:5507   %0 94 97.43./   %08:5507147..9438.994..10/0.9574.250.3-0:80/940.943 0-4.9 1470-4./943..8:550797.// 43.-:074.8047/07  4.3907.3900908./0850.9438-0900390-:07..3907...1..08  O%0.9439.8.79307:808903907.3 5:7.55.0.:7390 1443806:03.38.30 5:7.:203997078.3/903 147.3/.943574.07.9430330.0741.381472.4/3.3'$ O&309097...0798994 .089.943  .-:83088574.43.' 3908.998. '$807.35:7.'  %03907.

94394908419.709070300/894-0..  .1742 90-:83088.3/90 39071.3990'$83472.70..0.4/341902088..3/.9434190-:83088.943.09497.339071.9.70 O471:3907./0.38107/.55.3/90 $419..0...0/:83 $419.8.55..078.

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

.9743.17.070/4392047.3/6:..0.557457.088370 03300739.0.709 03.435./3 .793078-0147000.8438949.489.0..947 85..9.3 -:8308808./0 92883008.3/044/8 94:9 9080-:1107894.4731.3/830/--4997.44//./07574.3/90574.0949.17.798.0.308 .3.0/:708 1477084.0890..3:.9743..79.8...  %03974/:.70020392./09..0/0390803907.7002039894089./0 390...70:5/.2047 %8..38.79097.780  3907./35.7:.3/85:9089./35.8:. 9.07 87043.420.3:2-0741. ./-:1107894...08 3908:5072.7094/ 090/443./943.90/ 9870/:.425.9:704190-:830889.-890 0.7930788..704:804790709..983.70023.8 .8:.3 4/00.3:1. 9047/078 300/94-0/0.70..997. 574./4..2088.3.9.841./0 %8543982.3/9070-034.9.84149894-0:3/079.97./3.. 7442 3:89 3 9202.9073..939070.708543808:55 9080-:1107894.89075.831.80/97..494390 :3/0789./3 98088039.-00.3/49.700903.4/890300/94/4:-0.82489-:83088 .308  90:89/4..08841 -:83088574.0881:.  9090.92. %0300/94 .92088..793078 .300. /85:90 %070020398.32:.9743./3 -038 %01789706:7020394190.97.507-.422039.7:.7908 9090.3/3-09003902..3 3907.90.08349.9438.908945.3./ .3/90574.88902870.9743.59.03941.990.3/. 02540/.:203990/09.94341908:55.9743.03..0945.3907.948:.507  .47/0/..094..50797.943 %7.7 ./0549.0881: 00....3-0147241.0/:70894-01440/3900.3..08.08900110.302039-0900300.850.8390 1.70.:0.9894-0/43000.2470.77.08439080./3 3903943841-495.9:70.3070020398 %0.:2039 3472.55 94900889.0 4507.9743.0881: -:830884507.9743.7941.439740/8:55.943412..:/0/390:7450.84:/.0.204714790 97.70.4:394100.3/34190504503.84-05.307002039 %0.30  7002039 &  4794-

9 0110.99070.3/85:90884:/-0 80990/ 8:.700/ 9208. 412088.70700.9020.3/ 939./941.0-0709.03903901:3./0/147-90& -:9 2.4:7809490:/..7-97.:2039 ..90/3.//94394900..3/85:908 %0&  8:0898.943 0  .39908  O%089.850..554390/ .08  305:75480 418948500/:59097.943-.79 90 70.0147574. .3/.43/943841907002039439084074:3/89.38.9438.7082.. .3202-0789.-4:3/-907002039  057088.-3/3 90:8:. /01.19090.99.:78/.8 6:.9743.0-09003.3/.059437:0  O%09208.42207.06:..3/988349.4397.0.7/89. .9894-002540/.3828843.9.98.:/0890.847.0  O%09209..089.3.7/ 0  80.088  O%00.9:8 039.078438.94380110. 470.0.08.039480.20/ 47.3994850.:94197000.3.0/ 12088.47/.9  902088.3//.574.0883..77.0.30/ .-574.7-97.3/070...90/-90:80413.37994.   %0&  39090941907002039 3.2-0741..9433.80/8.. 706:7020398 %080706:70203983.90/3.9.7908 3903/394-00..0-0/0020/94-00.9-0:80/ &5/.79494800110.8:708. 2088.099090728.3/.89.4/38890289.943.0880/93.3/574.3/.08832.3/8947090 /.0.. .080.3/ .03.388:0 .43908990.84850.78  O%0574.:/0 O%0.0347903 0..450841902088.0590/89./0.:70..984190 .50703.5.300.7432039 ..7/9.:80 %05.0/:7014780993.90/- 3/90.788574..2-07 47-70.7432039 .88..38.0-0039..557457.997-:9088:.9.8 0110....108 O%0543939897.89.990 /4.7002039.

3/.3/90.702.43974949.0880/39070.0/:3.7.557457.7/8 $9.805.880/94.70.5489.3/.870.743203998..250.8438.84300/894-0.9.-0  3901789389.0880/ 43.8455480/94-03.3828843 070.477:59438/090...907 8:.043 43902.:843 .0988.9.34907  $0.38.902.3/9.9438.439748/0830/9457490.943 8:..3/.55.70020398.4070.3810770/17424305..99039438300/0/1908419..4.30412088.3-0 14:3/43900-5.3/9070.79..20.-01742.:.0.7097...7908 3.:79.9083.:8849457490.9.0/:708 7/574.93907.0780/70....70 439748390$9.9.477:59439.25073 .:/057490.707:3.79.- 574.70 4507.317.089.070/  O%0309479.990741574.3/2088.483.3.08.0881:.3/147.34/ 1..98 574.705.9.0/ /./3.8 94/090.7/8 !74.9.9438419.4 %7.477:594341 902088.841 8.4788:041.9438 .:/3/09.30 09 8/8.:78/:73 97.990/...3:.3/574.93 88902 !.9.9.! .70020398 !74.0/:708 .0/43902.850.70.382884394:990300/1474:98/0 3907...425.088389.08870..904507.7.90574.382884357494.99070..9-4903/841 9097. 90/.2.943.7/83.3828843!7494.08808.439740/-4- .9894-0:80/ 3..3/7010703.204782.3085.9. 574..:794190 2088. 098-0397.9.8439:/3. .984180..8430/706:702039.703.943  :7907.2.39070 4507.0.43..70020398.0 %0847941939.90/903094788902 4.:/0.9./0/8147802039./047.0/:708.70706:70/ 94038:709.:/3 97.094.4:3983902088.74:85.9..398-44  349072.:.94.30  439748390%7.3/.9.07389057.7087:3 43.3/.94:943/.3/80..317.7/30947 834994-002540/  4/0..725479.43.4:398 3903907.439745747.3/9.03943  !7490.30 8. .389%.08940.28 ! 7:3:3/0790.9..:79 %017895439894038:709..389077478 3 .0.3/57494.0/:708.

9902088.8..94343...0 07090.340/020392088.9985..3/.998.0.0 %88. 2088.7.3/9.943 30549039.3/9480990..38.:79574.0 .0/  30.9438:./9.90/ /:7397./..943 9390.0.3-057490.0/-90..20.340/020392088..3-0 O:942.0739.943147574.340/02039  .0../97.340/020392088.9902088.08300/94-0.31472.059.0.431729.9.77..43.431729.38890294.029 /03.79307  !7.0307.41902088.3/050.92088..943 %07404190 97/5.049 4893905489  30./35.07 %7.79894.70 !8.9908.0883479.90/-.080708039.79 %0 97:890/97/5.8894.55.02:89.79 .38..3/24/10/9../3.39009..880/9490 .99839088902 147574.759390/.041 80.3828843 - 03.07/.0807070.99084:7.99097.0709070 8.0594190.340/02039 2088.9.:9470/97.0.503941902088.. 97:890/97/ 5.:79 :.7.3/.08 800-04 -:9904907.0/-:99070834:.70.850.3/5488-94.4..080394:9-9070.3-057490.08.0.0590/ .7/890 70.370.340/00./35..08039.059 .340/02039 931472890803/079.94394..438/070/80389.0880/94 .8 902088..5489430/941:1 .0 .3900 250/-9070..943  O4/0/39490..90 4.74090'$574.340/02039  %0.9902088.0883  O!74/:.3 .9...99070.3-090'$8:550747 1 4:/43 997:89902 8420490747..:/997..  43 #05:/.83..06:.38.92088.0/99000.0394190/0.-4:9 .55.//943. .08.9073.0.08574.439039841902088..1.059. 2088.90/-90$419./0/147-9089..9:8070.7930789..574-0289.3/85:90.0/80.55..0902088.382884329-03907.-4:9900.41088.070.97..94180.. 90:35.9743.90/ /0.0..38.041902088..9438 .4:94198894:809070.4.090 57.0 47/0747./07 8/0.943850.8..0.9:70 %88 /0830/94038:709.

%0300/14780.:793,388902300/894-00593 574547943,1907,8;07574-,-705,.3,5,507-,80/ 88902070.425:9074:95:947/078 94:983,9:708 070 -:30/3905489,3/0;039:,2,3:,00/3-,347/07 0397.07 %7,3828843,3/2088,0.439748,70,:942,9.  0.84;07,3/,-4;09,9,.420,9,.48903.75943,3/ /9,83,9:708-49706:70097,8419,70,3/574.0/:708 2088,0,.340/020398706:70,//943,8419,70940307,90 902088,0,3/942,9.99490473,97,38,.9434390 49078/0419097,/370,94385 47/078,3/3;4.08 14770:,797,38,.9434170,9;04.4898:5508/4349:891 9440,;,33;0892039357;,.,3/80.:79 1,3097,4,/ 41.4731,08,77;08,9908:5072,709/897-:943.039709.,-0 84790/4:943905430,3/9007747574-,--0390 ,704:80 3499088902 ,90;07908:550790890 .:894207  5,20398706:702470.,703472,905,203997,38,.943 8803994,-,3 99843574.0/:708 9905,2039 ,/;.0-038039949097,/35,79307 %04;07,1,.908147 57;,.,3/80.:79,708:220/:53:70  

   !7;,.,3/$0.:79 %04;07,90.3.,809:588:22,70/31 

   8:22,7  $:22,7 O%070,703:2-0741,9073,9;083890,/418099343 809:50904.489 !-,80/ 1700
89,3/3 1,.9 2,3:8041,3.0,734:80 3907309,..088 ;,,.0,734:80  O%0,557457,90,94/4.:203990/09,841,97,/3 ,77,302039-0900300.9743.97,/35,7930788,3 3907.,307002039 O%080.:79,850.983,70439748390 $9,3/,7/8 439748390%7,3828843!7494.4  !7490.943,,389%,25073 !7;,.41088,0  43705:/,943  %45. O3974/:.943 O',74:8570;039;020,8:708147.425:907 O75947,5 O,9,3.75943$9,3/,7/ $  O$:22,7  -0.9;08 O08.7-0842080.:7920,8:70894570;03990425:907 $890281742;,74:8970,983,30947  %03.70/-074941903907309,80.90/-:8308808,3/ .438:2078,099857428041.,3390,0;0,3/ 47 :9,2,47.43.073,8-003:89480.:70903907309

8 0850.,034: 70803/380389;031472,943974: 9  09 81,.09 9070 8,40494131472,9439,90/43 9,39 49075045094800 8:.,8 O70/9
.,7/31472,943 O$4.,$0.:793:2-078 O!7;,90.47708543/03.0 O!07843,/09,8 O$0389;0.425,331472,943 O,3
,..4:3931472,943 31472,94380.:798574;/0/43.425:9078,3/4;0790 3907309-,;,709412094/8 8250-:9897,9147,7/ 80.:792094/8944300580389;031472,943437024;,-0 8947,020/,01455/88 :9902489545:,71472841 80.:79,704303.75943 90574.0884103.4/3 31472,94338:.,,9,94390507843 47.425:907  9900.,3/0.4/09  390041  425:90703.759438-,80/43908.03.041.75947,5  .,8-003:80/974:4:98947 0147090/9,,0  90-089:807841.75947,50704;07320398 5,79.:,7 14729,75:754808 %008903.041.4/0/2088,08,8-003 ;0710/,81,7-,.,890#42,32570 :924891472841 .75947,53:809080/,87043.425:9078 825-0.,:80 ,:2,3
-,80/.4/089440,8147,.425:90794.7,.  489.425:90703.75943889028-04334304194 .,904708 74,/850,3 9070,709495084103.75943 2094/8 O$0.709 
0.75947,5 O!:-. 
0.75947,5 $0.709 
075947,5 $0.709 
0.75947,590:8041,8,70/0147-4903.75943 -9097,3829907,3//0.75943-9070.0;07 $,70/ 
0 90.36:088:1107174290574-02410/897-:943 83.0 8,70/082:89-080.:70 /897-:90/940,.5,741 .422:3.,935,7908 $0.:70 
0/897-:943-0.4208 .:2-0784203,70309478 

709 02094/86:90 10.759902088.709094:9.0 0.3/8947.75947.0 3.9.89003.:7002.08947.709 0 822097..3/90.75947.9080.75947.5:-.7/ $ %0.088 03..75947.8.%4:897.073 42207.02039-01.709094/0.$0.2080.0 $.:79 03.759.9434180.3/57494.3.3/9.425.75948890203:80/147.97/5.908908 90 2:8997:89349-034..7590/2088..90 419080.072:8934908.08 :839.0398/11.3/70.7432039070.0.3/84143 30./. 0.70945071472 $870.58099390803/07 .3/.759902088.:9-0.5489.0794.58 .88:20 9.78 .709 0./4590/2502039./0794/039190803/07 903 :34..4147430 43 430/4.943.10.83974/:.703805.90 2.:880/ .3/ 70.75948890239047/ $880./380.07 80.0/$% $.90770.3.0  039080.0/3- 90.7.7913/3 4:9 %88/11.2088.7432039 40.8-00309038.943 97...:70..0/.0 94 1.75943$9..:41$9.75943$9.070.094  370.5349-0.02039  .9.709 0.0 .5 /8.75947.08004180. .7090. .75948890282:89/0.7/8 $  ..03.84-0:80/147830 :80703.389..7.3/0 2..3.0. $ .07080..700439080.7847 3907. 834. 80.7/ $  /0 .7//:731.3/./423.3/.7598.902.2088.8800.4208/11.30/ 343044.980.0203988:08 94:9080.3..7090 903:8089080..38.75943 1470.0 .-0.759432088.3 902088.422:3.0/02.48994.0.94.90 %00307.:8942078 98257.5 03.-:8308803.9:...388902 ..7//83 03.:70 0 /897-:943-0.7090 .8:80/-4994 03.084:990/:5.3.30 9 /4083498.07..395.3.3/8/013909024890 343.0.709 0.250 948947010843..9743.3..04108 8.34304.:9574.543088902 .0598900397.70.0790.:20393907.934.02039.70908-030.807.3828843 .7590/1472 3.8 994:8.020093847 4.:801.0889490 3907309 $.8419.3/ 89:/0/4.3/0...8-0..3.943 -49803/07.88:20 9.:95:-.0  %0.7090..

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

.9090574-0241/897-:9434108 09 80.900 0380894803/.8.0415:-.9430307.5 94 /9.943..3/70..9008 %0300/147803/07.5.9:70  47389.70970.8/9.7590/ 2088.900 %0708:9419080.33088.900 9825488-094/0.759438903 803994 49031789/0.3803/..7590/43 9..943 !:-.390473. 0.0.90 080..3.07 5:-.0435:-.900.9:708 070 84 .8  %4.300./4.0.5039  :79072470 5:-..08.90.39./9 3430.25070/9478 .9  0.0..3-0/0..:2039 %8 13075739 8 .90/97.3-0:80/147803/07 .0.3/70. 8:.0 03..0.425090 023.425:9.4254890 0  /4.74108 905:-.83.:2039:8385:-.9:70 .:2039 5:98857.75947. .92088.90039084054880884341903903/0/70.7370.020394157.4.0/9490473.08 .947 903:808905:-.../70.3/90/4.0 9002. 0 .75947.4/04703.3. .0.094 03.0719083.9:70 /40884201:7907...70931472.4231742.7/3:2-07 87:3974:902094/ 904:95:9 8.02039574-0282489. 0.97/5..99.3/ 85:-.9434./.08894 857.3/3457.03.:36:03:2-07.43130/9490 2...:9039.431/039.0 8039- %8038:70..370.347/071472 9.9438.759902088.:36:0 13075739 4190/4. 05.7080..7994.:9039.943 343.83..3/9.43/03..0 190708:984190.0794 8.3/9057.7590/990 8307 857..943 3.5.36:08 .02070- :835:-.38.088478 .8-0039.9434390. 5483..0/90/9.900 94/0.4/031472.0890 :807 8!.994 :8089080.0..9743.79 8.70/%080.2088./9 &3088 .0./4.0  03.0/:835:-.803/07.31472.094-:943.0797..425:9.2088.0...97/5.:2039 905:754790/83.431/039.90.47708543/35:-.:2039 940907.934430 .5:-.75947.8 .31:704:99057.759902088..:2039 940307.3803/ .83.303.7 430.230498!74.0.759890/4. %:8.3/2.2088.382990/478..094  448:5 85:-.../4.70957.3/1:790703.759902088..70/9.0/94/0..070.900174290.

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

.2 9.13075739 4:95:9-90.9:70 .3/ O9.9:709 85:-..:77039:80/3.83./9.:20398  070 84 .9:808.07349.:9039./  190130757398/42.3948014757..47547.7590/ 9039083.70941 574/:. #$825479.250734.9. 190/4.:7000.9:36:0/039108.9./4..:2039  %0:8041#$8:3/0743.9000.382990/.$3.39-0.:9039.9:708 . .9070/ 0374:90 901307573983492. 03.3/ 2.3-06:908:70 9.19079..9.4792940307.98 5.7/.7075..94190 /.0 3.90130757398039 - ..:/03.3/90..75989083..8-0031470/ 03.943./0/-$ O$0.9:70478147.79-0.3094:957470.9.147 .83.07108-4990/03994190803/07.:2039070.9:708.3/$.5.79. 40.75943  !07.85747.83.0.391:3.:2039.2:...9:70.9.08 #$.9907341-98 147 90/4.3/$ O#$.3/9070.-0./9.9.7/8 .900  90130757398 43 92.304108 ..3843.390/4.:80574/:.9743.70:8:.85747.809$.28-0/1107039 .70 #$.9 14728 .314757.8-003/0..9743.489425479. ..7/8  /4594341#$8002894-0574.83.:9039.:9039. .3/7990383.  3#$..0907 %070147090/9.507/4.8.07 903.99073 41-989.90/3949047//00--7480788:.9:708  O4703.897.00/324706:.9.50  .:2039 190/9.3-0:80/94.9.9438349574.3-014:3/3 80.5835.5074/417..943 /9. 904:95:9174290 .80794 054799.. 20:-6:94:8 98.9:708.759890130757399857..:9039..43990 /.13075739 .5/05.9:7083.077:38.:7090054308 4390730930947.81448 .0.85747.5747. /0.75932088.74:3/9047/ 98-03 3.2/4083492.24390/4.70:80/94.:9039...83.98147.990/9..900  %88 8/9..9 /.7590/99074357.:80903.700.905.9.0./4.:20398908...3/4382.:770/ 190803/07 8 83.9:70 .300.20.3/7:3890 8.20.42-30/.:2039 94-08039174290803/07949070.39..3/3/:89708./07.3/03.9:708 9.83./0.-08/9.90.

75990402088.75947.0 9094 :80703..0.5.708039 %857494..3/$0 .5:-.088.43.94388 902890/897-:943415:-.0.507 8570107.3/5:-.3/42$0 903  -01470-0380394..43.30110.422:3.9438.$0  #$ ..90.7.250 14:.7432039 84 .7432039147 0.70.:70.. .O1789902088.941.7590/ $0.7590/2088.850.57.0738.2088.3 #$/9.03.0803.. 088902  9.94:#$2.9078500/ 3842089:.908 %02489/11.9.02:95.70..7590/ :89 /4849$:83 8.530307.08 $ 47.:9.93.10803.343084:/-0.4:/ 0.:8090 08...9 32548947.7.4541.0  #.!:-.-013014782.9:708.3/90#$03.9438 #$834930.3//0/897-:90/ 80.-09409. 00791.8847/.38.48343.703903/0/94 -05:-.7072088.7002039.08 $.:9039.39940054:7507843.3380.9. 2:9:80703..34907.79 97.907 90572.-0147.0450  349:89:80#$9403.7590/9.8 349./9.3889023.70.70/0870/300/8#$47842049075:-. 83.7..08/:09498 70.330  90$0803.7590/9#$  O%40907 90$ 03.07. 8-0898:90/147.8.

.5:-.89.3/. 0:807300/894 .0791..3/039107 3:2-07 /9.890.943849.93  3084:9439498574-028.370.0/70.70..908..05.0791./9  2:89178909905:-. .3814720/39413/3.84343.0791.031472.3.9.3/. 0.0.9-3/8...90 5:-.947  %.97:890/ 97/5.9 807090574-0208 %070834939.79 %0574-02890397.9088:07  9.:9479 .75931472.47708543/357.239-0430/948420430080  47389.0791.943.98.9438.3/349.3//897-:90905:-.830/-..4541...908 5:-.998 5:-.0 133.900 %0.97:890/ 5. 5:-. 0.147075:99070- 2507843.5:-..90 308803.908..3./.890 8:-0./.94190..990703998343.:09490/0399419003994/3 90.0  .5:-.7..0791./.3989403.830/ -. 0 .0791..0411742.897:.3/8/43-:8308893.909080.943.0791.0 .7994..9:70 /9.

79.9094099.250 507843.74./0.30/3 90.9438418:850.95:-.9041905:-.422:3.02039...8 ..0791.0/-90904:80357 5507 .90/90774789847.09:808 -9 08..8810/ %0/0.422:3.3/ 9080300/8.303.90/.07894794/0-07.841$5.89.3-0:80/3908.3088083$ .794190...3.90.9030/-80.99025989413/0.90.5/447  .47925:-.4792 .-0247080.4:89470.7..70.:709.9$5..0791. .9.07384110/07.3.9038.5 5507 90.759.:70 0907/:094 /0834..:9479 ..77..1474374:3/8  %0/09..3/2.3/..7590/9. $5.08543.300/.943.3/0990..0450/.439.4:79 88:0/.3/8.3.799.03.0803.9 830/-430.75947. /0830/-90$ 89003.:947908   55075 55078..8$.990259894-.0791.7.9.4:89.//943.:947908830/-4907.723..3/8.3/2.08894..422:3.0791.708:85.14789058 47 74:3/8 -.0  %880709098.75943.3/ /0.08 ...0419097:890/5.-0300/0/ ..08994804157.943 .439...//943.0/.-0.20.422:3.4397.0.2-0890/.5507...03.-094..0  .5/0.0/  . .90/ 1905:-.3. .. .425.08/7455078. 0:807/408349 .0791.85..70.09080300/8-:8308..808 ..4397.841/..8-003/0.02039.389078  $5.740/ 08 %0/0.0 38:.03..903974/:..0.425093.9.4:/89033438:850.8/0830/94-...../.0791.344.759 -9-4.9.843349942..43.31.4-9.70997.:9470/-....03.5 9:808 30 -909403.943.3/3/:897  ..42207..3/2./.75943.90.0..4541905:-.90841..3/. 80.3 $ 83.:70.70970.0791. 03147..03147.943.088 1470.2-0890/..70.090 /09.94384:/-003.89 902.3412:950 ..7908 90 08.0791.553 9490.090.94341. 03147.4:8943/:897.834980.0791.84190.3.589430 5740.3/.90 90390:8072.:70..89  $:808 -908.250 - 70 9.9082.94384:/-02507.02039.4792 -:990084:/-0059-43047247097/ 5.3390706:70/5:-.80.9 334:3.39  %:8 1470..94384:/-0 2507.425783.0 4307830/-430.

80.8810/89.943.0791.3349-0..43806:03.08 O08..82. 908.349.70418:./0.908.:09490/039941900399 4/390.82 904.5:-.9088:07  9./080.897:.3/ 2.550789.900 O%0/0..07900. O3974/:.9:7078  $:22.0791..9:70 /9. 0.759488902147-4903.03147.09..08 .9./0139...4792  %0770547989.70 -:9433.041.78.:7920..74:839'7:808 O$:22.:70 34907.07320393.39  &% '  %45.. 9.0790088-00..7/.041$5.02.9-3/8..99.3349-025020390/38419.9$5..550/  .7 O#$8.9..:7941/.27  .30947 390570.422:3.089 /$.4.4792 -:990084:/-0 059-43047247097/5. 8.8944290/94 70. 880. 0.943/0.75947../050450.8:70894570.9.47708543/30.:7941$  $3.208.94384:/ -003.3./.0732039 .780  .0791.70 -4..7590/9.74:541 3/0503/039.:9470/ -.7:93..830/-..03990425:907 $890281742.4443 .74:8970.03.84343.943 O70.3  O5:-.02.4:79 88:0/.431/03939080.:9470/.90/..:70.30947 %4/.590.47708543/357..0$ .:843 9030.4:80.09.36:094 574.7-0842080.0.5:-. .7  -0.3/9:8.:9479 . 0.23090$5.0450/3-#43#...74.-03/90.90/9.3:1.0803.94:90789:/.. O'.75943.7//02.7908 90 08.9 .:880/75947.43..

.31:790703..357490.3/0.3.170. 14:.3088.5747...170.0 4:0.-4:9170.3.3574-09480.0574-...94:742030947..943894902.82.17017428570..9030947/408 4:.903094747.3/./974:98.0/.0 .:79  70.893907309.70.3/-7480900- 04:.425:90789.09.80.09080.0..0-003:83903907309147.9.250 4:419030.943894902 97942.82.0/-9019078 98349.00- 8908./1107039 .289.-0.943.35.9.088-094.9433944:7 57.2080..938 0  .3.5082:.707.79.. :80/ 470..425..1..58..9... 9457490.0:3/70/841.0941 31472.08..0 30947.425...47547.0%! .94381.078.14:47.3/05499040  9.419480:3/70/841.....08..341908.:79 88:089.247.7/909072170.7/8.94:47.390701470.170.. $.4330.//943 90.42030947.0430472470.7504503.8 49047.490790.3 9:809..3/549039.9 047808/43.:809043 9099974:90 170.3/1..423974:903907309..303941920 .9890-0.70.-024/02 4:2.425:9078 97942.:7940  .80 99:738 4:99.770794005/0897:.170..35.170.98 90.4330.9433944:7420 0907.9.794.90058..0 90..81474:742030947..40/974:  09 88.3/8.947 4:.4235.  14:.0. .425:9078.425.39 0254008 %0 ..70.93902940907  3..425.1742 4:75745079 31.425.36:08..943894 903907309974:8420930%47%308 94:9.-. 170.73 2470.425:90788902 1.3/ 0850.9 898.3:80. 984-8 82..4330.8825.70/0.91907890 31472.0147.9.3 ...4330..4330.30./31742 430.9.078  .9490309 84:70.9.21742411038.090309..014:3/4:7801 0.4330.99408 170.9 5078434348.9.94347.70/70.8.4330.33.425.7/..-4:9170.08.9 .93/841970.94:1742  .30994902.3/ 8443 14300254002.

425:907  O55.3/8443 170.90/.90789.3/.425.07450450:809030947  70.4330.9438..-:80:357490....425.4330.7/0/  O!74807.8 9033./4478 $4205747..170.3 4343041902 85072990/9470..70.:797:08 38/090..9:..9/4083 90.30 5.425..708.70 .230 90.3 250203980. 10...425.11.250  .:3841/.07%30.9944:7 .92.7080399490706:089388902..389.0/.49078.-.%!97.7/0/ .3/8443 3..90.439.425.3/ .439749384201472 %8.3.//943 90.3 %0170.7:5:4:850450:8094 .09-:93890.11.99!7490.42339490.3/570.9438.3.70 /8.8 190...425:907.9.43974 40254008.329-0 :94190 .08847.425:907838/098.3/90380399490706:089388902.3809:57:08098147%!807./..0.70/949080.03174238/090170./0133.078  %0309807.0/ -90170.423 31472.70.9. 4%!..079030947.  O$9..03990243..7.250 430419080.08.5.9:7089.439744.3970203/4:8.0884:710894.301742 -03.-094.0.901:3850.425:907..-02.4330.:797:08 470.5.078 0-807.078.425.07.94394903907309 1470.0.9.40/974:  9078098/8.098 82.425.1.49078  .9.94904:98/08 2439470/147850.702.3/4:9419030947 O!.7:333 5747.-094.8094119078 !.943 30072094/9.0994..8:804304724704197002094/894.79841905.425:9078 O#0249043 0384204308. 9031472.37.3/.9940-8908 0907108. .7.425.34..3.94397.090.425.4330..28434:7.90... ..9431742903907309870970.0989.804197:890/31472.7843 0/8.4397497..05:-.9.425.3.0919073 !.. 1433.047..70.89.843.984:742 %070.9:38.90789../..3-:8 ..3.0850.0 31472.9438 43949.0..28..079.078.9430..09974: 9019078.943  31472...4147702490.088  9078.40/94 0.4390398410..943-.

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

078842092089.7:88419./3905.../03.72088-:9../447944:7.03941:32.9743.3..9/010.39 .0394:98.7850.0574.0.943  98479903.943.8809 :5  O$4:7.04198942.0793  -.3343 85.80 2.0470.84394./23897.808 905.943 :9.0793 903-0394800.:9  $4204190902839089.0 31472.2 %5.9.-/0.341 9080970.843.550../039.--099079447 990/01.3/8.9-42-8 .70..3/543989.0  .....997.4201742.03 174238/09030947489170..3.3-0894550/-4:7170.3950841 31472.11.7:857490. .2890 4.42243 7:0419:2-894-4..98.04180.-8/090723042..33907309.0..7/ 134925488-0 94 1907:83.850.9./0.34304390 4:98/01742434394.2.9.70...947 9.84:..0/30947. 94..97:890/84:7..0.. 08420170.:7989.3..70... 170.4:.9 :99084:7..9030947  0988.9 95084197.3838940-8908 0..074:93 32489.3:80!94../0/-90170.:794:089.. ..4974: 47248941:8 98574-..80.0.931472.0.8..7-97.11.997.:794:/-094825-4.147-:8308808 2489420309478 .309974: %88./110703974:907  %884304190.701: 41.3343 842085.9.439.9574..08-803/3994..089203994389.425:90734:757.19074:909..3/3480./.4 4:.41807.9439..08974:90170.425:907  O#0/70./08.078.4:89.3490730947 8/0907230/-90 74:9078.3074:8 94: ":90419039.943 8:.0997..95.943..-.3-0/.11..0590 2.574/:.849.04507:308890708 . .:804:2.  %00.39..98/8.O$5.-0 84:7.041 80.9:3/0789.-4.89.70430..4330.9  905.:98574..1.-4:9.309  304190-089938.425:907 3/ 0.0984:/97.990300/8.06:.8470897.07903907309 47.9 97.98 905:7548041.439. $5.9905..3050703.30 70/70.9.4409.9989458..170. %00890.794.44/7:0 147-:83088089.2843 9409974:4:7170...99.5.841107..1742.09 .

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

/083 3.3//42.08894807..2.97.94310/83.3.90574. 31472./:.4/0 370:.3/900 .943.7 983.9439390574 !7420/.8.3.9:7.3//.90814743  %0574.890 8 80..3/ 209.039!.9080.574-990:8041842041%%! 8 ..:79 700.0738-  293/.38.3 .43.3390720/.4 .3/920 -90...90 .710/8..3/8:. 2094/8 489.43974.088.84.3920/.3074:88:-80984190%%!57494.4:39 ..98.943 05829.70.//7088 /..0398170.:/3.94/083 80..:79.081473/.:7954.

2094/8   03147.3.3/.039.

4 %0708340.10 0.14:3/434:7.:54:7/.908.29.7/:4:89.4:8.70944834 .422. /4934  /43 9.0399.38 ..089.4907.4397414730947807.7:8 8419..98.9-:83.9.3/  .70 39.7070:.70 #0202-0794:5/.425:90794 .9.7:8..04:78890283:80 4:7309 .94:5:7.  '7:808 4728 .94708  ..425:9078  84:/:80.7:88419...3/ .0883507843.90 . .0/ 9470894709080.3/8   .425:90703/ :807.3/389.3 47.3.5747.7:88419.:8034994-.7.99.759431742 4:7.425:907479.059.4:7801 9058 57490..70 4:.08894/083.9....-0974:.94:7.570.94:/..0/43 4:7.:59010889028 /70.481470 14720/..98 8:...8:-8.3892489.39.94393 90..088.0/-90170. 03147.841 -.8 /0093108 . 47:834:7..34780 &#9490 ./.0.3/ 4907:3..9:3998944.9 5072990/807..07/430:3998944.0.90907.438/07.7-97.07..425:907.3.39..:589457490..7:88419.904:7..04:7. %74.9..422.422:39 9908419.07894/434...39.425:907/.3:590/.-0 0-8908    25020393../0789.-0 9344307890.74:857494.3/9004190350714722.7/0.390/ 8.425:9070.7:808 4728 %74.9907.3/8  -:0890/3.75747.9.8..7:88419.700307.14720/.4208389...03/47  #0:. %09.3074:8&#8.9843.90/4898 .94384:/-094-.3.32..47807.-748079.425:907:807419077085438-994 2..425:907841903902489 4.3/ 2.2  %05742:89-03..7  %080:5/.5.39.94384:/...:58 %85489077023/80.:8090.78.548943941907/.90 3..98489 03905748389...7-.3050054:7./.090.039947:3.80..4:8.

./419..5747.0790/089740//.078438411084710 8890289990/11.943.170.80..4.8-0.80 09073903943.70549039.903094747.5744390170.5747..425:907479...55.0394:/ -074:90/0/94.078 0.9433944:7 57.9388902-:8 03.-094708947070.995.943.706:089174290.07190473..:5 ..0/ 434:7.0-.30 3890.0/17429088902  $:22. -42-8 '7:8 O574.:5982094/8:80/147 .8.90907.039.4.07..089203941920 .831.4397497..70:.0 $9.-.09031472..94:7.809.:9  49003.3892489.80 90473.3:5 %02489 1706:039:80/2094/8.947 47109.8825.850./039 14:9.9.7-.425:907.4235.7.9.4330.3/389.9/88/089740/ %043.3/2094/....33..87024..94708705708039.0 2.0919073 !74 807..30 4707....45  %070.08:80/039..981742#0249043 55.. 1088902 /70./.425:90788902 1.9470.943 -.3:54:710889028 4: 84:/..3/70..3/011479  9908.8.9.5:754808 4714770.393.98/0130/- 90:807 %057434849409974:90170....701: ./4478  507..3//70.20920 .980591471097.8:804304724704197002094/894..0.807.3:5890. /..94381.91907890 31472.  O39.57490.901:3850.247..7:88419.8/...9.9 850.94317424:7-.:5.2.425:907108.40/974:  70...7//8.994 09073.3/108 08.0.0/-9019078 98349.7/.../11070392094/841-.70/0.0941 31472.4541430472470108 47.11.708.9.303970/../.0/147 1:9:707010703.30/43 9.30/47/089740/ 34907 147241-.3.9.439.3/4:9419030947!.7:808 4728  .7.4208389.94-.38107473.09.7 170.94:5:7.47-.807. 89470970..4:7801  905857490.988.8:33903943.5574.90.7080.943 O70.079...808 9031472.0/47489 &8:..423974:903907309.0 8947.943.894.41807. 7:3843. 1433.

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

344./41.943858..8-00305490/ --:830881728 390730990.08410.42207..43806:03.3/38  3890.3/98:8030 .09.83.3/.9:70 07000. 84.3/-:8308870..0 /87:598089384.23090.47549039.3/:3/0789.:36:0 10..344..  .3/90.9.438/07390-:83088..9:.390730990.

70.0/ .943798  5745079798 4..-07.83.8970.3.943.84383 983003.3-:830881728.7208 /08549003.3 31472.9 31:03.42207..0780/ 84..8980.34408.07 2..3/0 .7085438-0/0.9 /8./:.70.084..3/549.3/970..344088:.03.3/01.0..80/3 0.:.90 .0 31472.3-04480 . .:894207 8.8.075407 0.9 .903.4709.840..0450/ .414:7 . 3:2-07410 .943.3-0:80/94.0 .3442.0 .9438 .3/..943.0..57.078084.:/0901443 O31472.8.0 47 390757.09 0705407.3/84.07990390789.294038:739039079414:7.84.9 3. 31472.8843 3 $420419009...438/070/- 94808003942.344 800%.0731472.070.07 908.5:-.4898..3/1479024895.42207...8.720 0809 90390730901470903907309 9070.704190331.78..07905.0.43806:03.0452039 .9..-0   0.3. .045203941903907309 -:998/0..07990 ./0.2.94384507.943/43/.20 %02.701:..47549.3/340/ 903907309.:78/.0799010/07.94:717284://43.3 /42./:. 84.40.3/3/.47/203843831472.8.3/4907938 94:994-0.8 174280.03.720  ..3/900.:770/ 40.3/-0301982:89-0.017423/.98.8.83/0503/4331472../:..3/0.8 47..-0 0490790.073.0908 %080.039..8430/:/20398.419080.7432039 .:08 01470.:739057.4229.3/5:-.:9424-08 9070..8.009.9 90054308 .42207.3/549.88098 43974.3/011.94384.720.- 84.8.34:..07..70..79 98 .425.7095..3.8890..42207.88:087. 84.74:3/0 .88:089.904208 03390730990.0394090..3-0:80/94 ..7432039 %06:0894384.2  00.9434. .700203984..97989490743507843.5747088 .33..0397.70.08419090..0 .

0$4:/903907309.943 89.0/3../0.3-4/08 .3/..9945:-./943..073..3900.3/0 ..5745079 798-003147.3/490747.3-02.0:78/.08831472./:.9:.3.83/184 .4508 4157490.3.397.0-0 8:-0.9..9.3390730947/07050710..8.90 10/07.3/0.8/897-:90/ 47//0380.094.90/478.42207. 2.-4:9 -:830881728. .9438 O!7450797984.43/8 O4.943.798/43/.

3/ .073.439039.0908 .90-.8 84.3/.2.90 2.8../088..42207.990802:8.4508 412:8.3413/.2047412.47 47389.99.34441 8 4:/.970. .08894903907309.3/549..308  %03974/:.8.025.3/70.8810/39414:7247.9478 4  2.3..9.0-00325488-0 %8.9.448.70$4:/24-0..42207.-0.3/549.990./:.3/7408.3/434.9574.8.70%03 .8 -:830881728 .4739073. 8:55479.9945:-.3899:9438 %08025..-4:9-.943...70970:../50710..43174390/-305488-90841-0.38.3/...8-:83088172834907 298 .8/8.54071: 3090.3/549.3/..2-3 .3/5:-.06:-7:2-74:9 .0889490 39073098.8 84. :3/07904/90.40/174224.0  3/..3/549.908 8:.4..4.0  $://033/./:.3/0 ../:.3899:9438 3/../:..834.9/9...3448:.3..9438..9438  .3 .8 842093.3-0/430 /0859090 1.3/0 .9.0.8./:.943798 4. O!:-.079..0324203984.109..0.389.309...5.4008.017.109.99079490 430784190.309.33.-0.889 -043 .3/01./0.9.702470470883.8 547347.94388:.42207.97.42207.0-0.300/745394902//04198.98..70..9011479884:/-0 :3/079.079..42207.3899:9438574.47/...08 %4:897.47.34330.98.3.98050.3 -0./20384385745079798  31472..90/41 902 84.3.8903907309.3.5..3/ 01.47..0.280993.07320398-07085438-0 147038:739.425.-908 ..97.3/ ../:.3308$4:/4.70..3/ 3/.109.943 -./0.3/01.98 3/.4579 2:8.94341903907309.

059.308 .98.70/ 92./0.94:.943 0147070.453 4:798.044//0.8 ./943./022..-4:984.0-4/08.-:830884:941 .8432.43/94388:.03901:9:70    %047..:9:7.3/4:717284://430.../:.7 .45790/478.33907309$4.97.09 09 89.9390802:8.70/.70../0.3  .0.3/. 88:08419039073099.70.34:2.25.3:80.9. 70 .-:830881728/8.431.07  4:.94:1..20.84339.8.3/.:/09409.:/0308 4.-4:94438/9.4:798 .8.3/08.3/574.450990438.8./022.03 70.3/.-0-0.8..732:8. .8433573.508 -:9 34.8 0.709..93...3-0 8..9.70.33/.08420-..0.8 47.4...0394:90/4349 43 9023 9097.9..70909.450841..3.4204:9419009.9-0900309.094/0.8 07090708.3/:3/07.9 39020.573.3144347/0794 . 70.00.47/.04530 :3/0789. 4184..508.425.508.549.80380 %070.70..:9414330 /9.0 30.84383 989504189:.. 478....7894/0.382147 8.8 .30:/20398.907/059 0-70170...3/437088 0703495705./00307. .0.05984109.  . ..94:.573.039014:7247.0942.473:8998430.3/38 .3920 .0..

389.-9 .09 907/0.90.8.-9  #0854383920.88.8.89470.3/549.508 9.2097..550/.4.:9 -:99834925488-0 843. /087.8 90708./0.943890 9.843.-98.8 9.8890283.-:8308817247.93/.3/70107894.0/9..89 94/.0908.03 0397084...3.9247.943%014438.8 /022.5089.980028 94570803909.3/549./:.3-4/473/.3/ 84.4:780841 ./0-.8:554798...1..022.4:39..420 03.0.0908.0888.984:/ 05   /0391.9438 .4:780841.9407..7/41 70.3/ . 4.9433.89.4:39..88:20/309.3.9439..3/.08905574..0398 3/. 84.9438.455480/.3/90708.7094109..389.8 4.908.93/...3/84.3.89:.8/022.090884:/-00/..548943942.835.81700247.-0944907814790.39..43.98 3/4:94// ./:./:.707085438-014790.4770.-4/3.-9.550.70343 .43174390/9.3:8094/090723079..0398 4.0732039.990.3/8420-.4484194:98.9  3.943 ..947847 3..9073.3.7-0..43.9 5072983/.07808:8:.3-0:/0/.. 10..0.843 .3/.817423/.-994.10.09.9:7041.4..894-:830881728.3/ 47../022.508 4:7 .43806:03...943 98.8.8  47./:.0.08/43094902-4907 .70.843 2.389.89:.9438 %097/573..4.0730/84.8..3/:3/078944/.-9573.570803990280.0889.. .08 41907.908-0 2574.:9:70 9070.9./0-.08 ...41.9900.9.9.3/0.701700247.09.4770..3/70.4:39.7901.0/ 3089073.. 84.8 47.4./:.3/549.3.0883.43974.-9 0903/890..-4:9./:.794184.9438 0..2.3-0/ .8.0 ..9070..:947908 94038:709.9:7041549.-9 9.9478 889028 4747.50 .3//08..508 14::3/0789..4:39..70.93/.0 .0 903/309.-04:9. 8:...0-003.889089:/41573.9890.-4/41.34:.0598#085438-9.0790/.9438 :0574.09.573../:.4.4:39...-4:990 3907309 9.0598 417085438-9.. 573.70.3/743.8438. .8.9438.0908..9..-99490.703..-99470.3.08 031.8..-4:99089:.-920.

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

90/-43300 .33/.08908 %..9...99457.-031472.3/-0.3/.8 -070897.42207.47549.94340.9/4083493.8455480/945:-..47.07390/0.88:0870.8  484:/47.0798330947897./039107874:930 ..43.43.80 .990.0 4.74:857.4741 . ...0%02.9438 -0900370.30/ 1.3/57..943 .9438 5:-.9430890 3.931472.   31472.31472..3089.7//7.-4:9 .47/005078...90 47..0739070.84.0..943.94340.7488 94:8.0$908  ..045203941 0.95480.894784390890  !07843.3/:80. 4757.90731472.-0 :897.3/57.420174290:31099070/1441 31472.-0 8982.:5.9.85:-.90 4./..4784.4741.9.9439.0 50450949390./:.943 0441789.  0-8908..42207.438:2078    %..943.40. .438:2078./0391.20  %.3/841545:..970.40..0903.094/03914:-3:2-07-:9 349-3.34324:831472.42207.703 57./:.9:9089.9./0391.089..9.0$908 2489.. 9.3901443 80.943433/.84184:/0.8970.059434157.3/57.70.90/9 42207...39 94702990.31472.9088420 41902.-4:9. 8/08.7-0 -04 .9.0..95.04520394189.88:0870.0.2-0.3 -0:80/94/0391 4.07390 /0.7070:.34190507843.90..8.0 8908.3507843.0 .90/940..5..440434:7.999:/08 3.943.:/0 .425480/41 /0247..//943  24898908.3/4907/.2..420 5.39..943 3.943 ! 8..3/3/.4/0 093.40.439.90/-42207.-0 !07843.843301728.4:7.-0 31472.9 ./0391078 47389.78908 349:89.9507843..08410 .9.44089497./.9.9.425.34728 . .3.40./:.909077947 .9..42207.90-0..47.

479  41.7908 3.8/147.03:0 4:-0.943.-0 31472.  ./0391.47!07843.0 .4.0798309478 2..9073%448 !7413!7.3/41902489545:.079833094788:. 3..497/5./.  %03907309 82. .7  8908.0-8908 .3//.9.3/.:/3.0  .

0/.079833/:897 945.3/74:5-0.47 3../:..089.8947 8.7//7.0.03 47/079403..94341/9.90704330 3/.2.-4:9 419030947 .07983309478:./../. 90801728.8 .7.43899:90.9...440843.70..0357413  !7413890.

//7088  .38 4.2.07 243.34324:8574108  34324:8574108/039150450.34324:8574108.3/3.3/ 24709.507843.07 .384.420870.3 243507843.574108 4:-0.7 4/2.0..08  9..250   0.0/.//.843.3 .0 2.8-043394 850.493  !07843.9079.39.400/07008.//7088 5489.39.7090/74:58 1470.574108..3/ 39070890/31.

9..83 4330 1728...89 3/.9070/43.3/ 0503/9:70/.3/3 89470.9..438:207-0...4754303:2-0794-0.-80/709.40.43.709/70.92.41728  3905../:.894708.25.80.90//./..1907905:7./0 90 /.43.8.438:207/.9.83089470347/0794:3/0789.8:80/949.47.8080702..3/2.438:20785:7.:89420724..47 .47/3 84 5:7.90790/08341894708./.3/.38 ..40.07983 %04330 . 3.990259394390743305741089441130 .831742 2:950894708 :8:.3/.02039 974:..9.3/.90/-90089. ..

7093  $0.574108  789 9057410.09.908 80.08.90/14740$29...:793:2-07  -.9985.39 4894198 .7017087084:943 /.8097..8.-4:9047/8 -08941./09478807..907  3./8 .43.74320399490. 31472.36:08 789 90.079833094788908.450.3/ 390389 4190/.3.0/-&$.9.7003 3.8.-9942.438:2078 .909084553 03..0.:78390-.03..3/94.2...425:90794 845900./309478/434934484507.08.../89070.4393:.9090.0507843.70:8:./843 98890 .07. 090/ 0.898.08 $0./82470.30/203843894 089.3307.0/-&$./703 %7/ 574108.2:80/908.79..07983309478...3/ ..9908455078008438.94.8 09070 0800.9 8 /1107039.70.-994/3.:.//0/80../.35:.9438:.:/3-7483-44898 134:957010703.08.3/90.43 ././.4:/-005480/94.84390 .4:8 9857410 4:/-02470.0847-0.04190207.3/ 40.9.3///349706:70.789070 40903.4743900-./03.083...3/349.89/40834939070892 %0./0947807.550.349:89.89881.709390. .072570..3 ./ .../0947 .9808854793 44/8 0....3/8412489545:.43/ .3/-74808974:-448.31472.-7483 - 4330-4489470.10.4:/-080390 2.34324:8 .47.943.433030889.-4:9.39./.97../:89./14741. 90&$. .3.80 90708:941 .70.//7088 4784.85.0814741-..034708./ .909481047 .7..43/  330.80  00.557457./1477039.8807.438:2075:7..994:8.47904330308890 .090.80.9435..2.309 .:78/3.943-0.-9 94570..3/ 039078.:/357.-994-:/..9390-74807  14907202-0784140 81.55030/ %08.74:3/94:990340/04190 845507 .57410841.907 40-03894 43/0709079..014728 .20..:...3/0947 090340894...9.0-8909.08 %7/  90.80.20 02.0890.425090.3/ 1349 49./ ..3.843905.2.-019088902//.438:20740$2940894. -.3/408008.9090.250433057410:897.904:/-005480/9441.3507 843..70/ ./7.43/ 90.:8020340..9:708418:.-80/411302.4:7808 &$.80..

9.3:08808 !74108. 574/:.-089:08808 .70-:9:83.3/:895.

34329.08908..083.39070890/ :83088-03019- 3495.89 574/:./.0870.7:/030884190574108 2.7:09.3/41./0947574.3/807...43:3/70/847 0./.541 1.0724.420 .03994802../8 570107733890.4:839070890/341.957413 84.88:08 32489.3/.8 -74805. 708:990574108.0570880/908039070898 40.93/..98./8  038:739.7034934910/9.08-03..0/ 90-01...9.398  $42092089080:0880847 -:990708.4:8.390/948. .3/0397057030:78-03019 -80383/02.3/841:370.3/ 97.9.8.:8003903943.0308841.3/90&$..07983 70.0394430 070.08 4770.0394:8. 47..0 90.99.8-094 :8078 ..94341 . 4:/-08:11./..70.07  02.0-003 :33945.97594.9248950450.957413:3/07230890050.807.34180.894/1703/8  3495.233 :80780.708:94190.0/ ..9- 3..70.9825343402.-00.808 905741383.003:8390 3907309 .08.03:08494903907309 ./0/990.07983803994. .336:7.0 %03/:897.9.397.0 948:0899.83900110./.70.30..8.5702:257.-4:9.. 807..9./94:8024704-..9..7088 09405470 80389.081479./.079831728.3/14730574/:..0.85.0..473889029.90050703.3/.7090/ 57410 -..7:09./.147.7:089.80/ .7.709078.709341..947807..250 4084-./03./84397.41 %057413889023900./8 43418908  0947.3/08805038.47/0/ 850450-0.41...0945.39:738:-8/081700.57..07.:-./0.08-0..07983 2470.90/890843900-  .709.3/0.43974.07/09.00.9:.7:/0  390.9.-4:9 .438/07.3/574108  79.-4.3/57..9./:.3147.:773 !7413507298.890/.70.250944.90..0-0.03//03 438:2078.3/-:8308808 !74135072989.9433.94070.8.034 39070893907574/:.9/083078..438:20784.:0  8.33/.36:088:.//943... 80./.439039 43903907309 .908..98349.984:/-0.0724.079832489147574/:.438:2078.438:2078800.99070.

4..8088:08.905741089.0 90..30 54.9.438:207/.8041130 2.30903/0/5074/41920.//708808 34324:8 -0..94:931472390.4330.3/0 2.9.34324:85741089 507843.8.%0.7/89.94394903907309147.//708808 %8 ..8-00.438:207.438:207 884.0798317285:-.80/43907 574108  94:9031472.943 90..709317289.47.72470.88430.0798078841903 ..439744.341130.9.9.//708808-0.9070/-30947.9902590/945:7./../.9.3/4907 .42-30/9/.0798330947 7.70.4390.3..438:207/.0574135072980-33 .3-030/941130 .0/174297.. 0.44085.203/2039574..0.3.808 90574108/07.57490.09.9.3/ 2470570.-031472./309478.:/0:3/70/841/893..438: 5:-.147905:75480 412.2/..039  742..34441.438:2078 974:8:7.:894207824702430147574/:.9./.4394903907309 %8.2.0/.90843900-.0/-..439039.93.9438:.93430947 ./.07../:.0 40.341130!94330 57410/..3/..3.3/ ..31472.70 ./0391..9.9./:.70.0 90349.59:70 507843.40.9384 .47 0 2...4170.57.3 4...438:2078  411305:7.807.:.7030/472070/9 507843.91742..08.//708808 .0.3/ 90.10/8147 0.738420 ./..3/5489.438:207-0.9.//708808.9.84-0.0/:708 %0507.8947894 7089071475708 -030198 47.-803.9.0790:80 419031472..8830//3..0.3/...9/.0 .3.-019..47.808 4731472.3/94.08.086:.34324:8574108 94507843.-4:94800.9.0790088 .3/:809031472.9.3/4330-0.98807.041.90..308.94314728  89090..8:80/94 .438:207  $420.8970.438:2078 .33.943.81.70507889039 %0797.07983309471728..3/70897.4330...8830/!.0390-890803.9.34324:8 32..8 . 0..3 ..438:2078 24.:784. ..0../..80 2.941130.425..92090 3/.3/708:2080..-024/028 903.425..9430/- 57..4:7..1742900543024/028070!..208.088347/0794.943507850.41..9903/.//708808:80/ -$.31472../29942.3/..308 90.943 4:-0.

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

1.//94394.813. 84.3/549.3098.908 14:757..3/ .798...957490.8..9434157.943- 0- -.40.-080.3/:83507843.857..3/38420.94388:.0 ..9.344  O%02.0 438410254008..4:79/0.8.31472.0733.389:370.843.:2039847420 .7.3-0/07.0/-172397..90/572.4...843.2047 03088 2489.557457./:.943 9 90054843390.48:704157..3/98:8030 .. 5078433.3.00-7908 147./047039.88:0843...70 05.70-49 10/07.808803..0/0390/147 ..34408 47389.09.8.39479847507843.0..84383.3.4709.. .390/347.-4/ 3:7943/..29457.3/072.07320391742..901.70.0 57. 0/:.3/89.80/507.808/013057.93. 84.90/ 94798.8.43899:9438 .4:79/0..0 390&390/$9.80/2. 3899:9438 .1.908 90708...94341.95..3..3/:804131472..4.8  $:22.425:90790../:.994..90. 8:7./8.. .9438 390&390/$9.!7490.97.425:907108  0.83/70.9434157... 3:708 47389..905.7/70897.9047..8..3 7989457.8..3.90507843.3/904:790039 203/2039 8:.3..70 3. 9434390 0- .  .908 90./4.8..90 1728390..3/549..0-003/0130/3.88:089.93/..:80/-490757... 70...3/.7908397:84343 849:/0 5:-..843.3/ 243947025400.42207.8457490..89..4.98 5:-.884.43.9438.31472.3.3/9043899:943 9070.4.0732039397:843.3/90&390/$9.74:8147284100..3.990475.7.289457.708:-0.9743.943.0/.42243.0 09.0 410254078243947 0254000 2.3390.389 4.0.932.. .3/80:70 41430 8507843.3..83850..088  3.7093172883.0732039 397:843857490.3/.84383.7.70.0:3570..943..9:908 33.0/1742 14:3/3/4.3.3/20/.5:75480  390&390/$9..3/.3/ 0-90.90/94..42207./..0738.:20398 8:.42243.943= ..809 ..507843 83.40.908 .390041/:0574.80.9084157.7 O3907309.39008411700/42418500..3894..-0900.7-90789203/2039 :..43.89.390 . .3.3/904:79 203/203957490.40.

.07905..4:780841.3/549.3/47..47/2038438 31472.04.3-04480.88.42207.3.. 8./0.9438./0-.3/5:-.8980.0450/.073.74:3/0 ..908.93/.8 .90470/39414:72./:.70  O9.78..3:8094/090723079..-4:990 3907309 9.3/743 .943798 5745079798 4.109.039409 0.3/01.5089.889089:/41573.3.9900.943  .0 .794184.