Pub Date : 2018-11-01DOI: 10.1109/ISTAS.2018.8638276
P. Maxwell, Michael Nowatkowski
The development of unmanned vehicle technology is rapidly proceeding and will result in numerous advances in autonomous vehicles. Most of the research effort to date focuses on the safe and effective operation of these vehicles that will allow them to integrate into society. A research gap exists though in the technical, policy, and legal fields regarding illicit use of these vehicles beyond their programmed functions. In this paper we explore possible misuse of unmanned vehicles and illustrate the need for research in the technical, policy, and legal realms.
{"title":"The Unforeseen in Unmanned Vehicles","authors":"P. Maxwell, Michael Nowatkowski","doi":"10.1109/ISTAS.2018.8638276","DOIUrl":"https://doi.org/10.1109/ISTAS.2018.8638276","url":null,"abstract":"The development of unmanned vehicle technology is rapidly proceeding and will result in numerous advances in autonomous vehicles. Most of the research effort to date focuses on the safe and effective operation of these vehicles that will allow them to integrate into society. A research gap exists though in the technical, policy, and legal fields regarding illicit use of these vehicles beyond their programmed functions. In this paper we explore possible misuse of unmanned vehicles and illustrate the need for research in the technical, policy, and legal realms.","PeriodicalId":122477,"journal":{"name":"2018 IEEE International Symposium on Technology and Society (ISTAS)","volume":"171 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124161612","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2018-11-01DOI: 10.1109/istas.2018.8638161
{"title":"ISTAS 2018 Committees","authors":"","doi":"10.1109/istas.2018.8638161","DOIUrl":"https://doi.org/10.1109/istas.2018.8638161","url":null,"abstract":"","PeriodicalId":122477,"journal":{"name":"2018 IEEE International Symposium on Technology and Society (ISTAS)","volume":"126 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128207552","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2018-11-01DOI: 10.1109/ISTAS.2018.8638282
Beth-Anne Schuelke-Leech, Timothy C. Leech, Betsy Barry, Sara Jordan-Mattingly
The development of ethical autonomous systems requires that engineers determine the publicly acceptable actions and decisions of these systems. And yet, recent cases show that engineers working for large organizations do not always act for the public good or the benefit of society. Ethics are often presented as objective social and legal norms, rather than a complicated series of constraints and expectations, determined from multiple sources. Engineers are forced to navigate the expectations of the numerous groups of which they are members, including the organizations and industries that they work for, the engineering profession, regulators, and society in general. These expectations can come into conflict. Engineers are then expected to determine whose values and standards take precedence. Unfortunately, as the results of this study show, engineers rarely explicitly consider the ethical or social implications of the technologies that they are developing.
{"title":"Ethical Dilemmas for Engineers in the Development of Autonomous Systems","authors":"Beth-Anne Schuelke-Leech, Timothy C. Leech, Betsy Barry, Sara Jordan-Mattingly","doi":"10.1109/ISTAS.2018.8638282","DOIUrl":"https://doi.org/10.1109/ISTAS.2018.8638282","url":null,"abstract":"The development of ethical autonomous systems requires that engineers determine the publicly acceptable actions and decisions of these systems. And yet, recent cases show that engineers working for large organizations do not always act for the public good or the benefit of society. Ethics are often presented as objective social and legal norms, rather than a complicated series of constraints and expectations, determined from multiple sources. Engineers are forced to navigate the expectations of the numerous groups of which they are members, including the organizations and industries that they work for, the engineering profession, regulators, and society in general. These expectations can come into conflict. Engineers are then expected to determine whose values and standards take precedence. Unfortunately, as the results of this study show, engineers rarely explicitly consider the ethical or social implications of the technologies that they are developing.","PeriodicalId":122477,"journal":{"name":"2018 IEEE International Symposium on Technology and Society (ISTAS)","volume":"84 10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127977309","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2018-11-01DOI: 10.1109/ISTAS.2018.8638283
Sarah Jean Fusco, K. Michael, M. Michael, Roba Abbas
This paper is about location-based social media use within families. An experiment was devised to study different family relationships and dynamics with respect to the use and application of location-based social media services. The methodology applied was two-fold: (1) an experiment using Google Latitude, a location social media app; and (2) semi-structured interviews. The data from the study is analyzed using qualitative analysis and compares the responses between siblings with that of parent-child relationship. The results of the study raise issues about (1) use and experience; (2) the disclosure of location; and (3) and the power to view location information. In the discussion uses and benefits of this technology are presented, as well as negative issues, trust and control factors. The main finding of the study is that location-based social media use while very beneficial in families has the propensity to propagate a power asymmetry, one individual over the other, although this power is not always displayed explicitly. While location-based social media is about "sharing" one’s location, the sharing is not always equitable, nor is it bidirectional.
{"title":"Location-based Social Media Use in Families : Qualitative Outcomes from Participant Observations","authors":"Sarah Jean Fusco, K. Michael, M. Michael, Roba Abbas","doi":"10.1109/ISTAS.2018.8638283","DOIUrl":"https://doi.org/10.1109/ISTAS.2018.8638283","url":null,"abstract":"This paper is about location-based social media use within families. An experiment was devised to study different family relationships and dynamics with respect to the use and application of location-based social media services. The methodology applied was two-fold: (1) an experiment using Google Latitude, a location social media app; and (2) semi-structured interviews. The data from the study is analyzed using qualitative analysis and compares the responses between siblings with that of parent-child relationship. The results of the study raise issues about (1) use and experience; (2) the disclosure of location; and (3) and the power to view location information. In the discussion uses and benefits of this technology are presented, as well as negative issues, trust and control factors. The main finding of the study is that location-based social media use while very beneficial in families has the propensity to propagate a power asymmetry, one individual over the other, although this power is not always displayed explicitly. While location-based social media is about \"sharing\" one’s location, the sharing is not always equitable, nor is it bidirectional.","PeriodicalId":122477,"journal":{"name":"2018 IEEE International Symposium on Technology and Society (ISTAS)","volume":"76 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122235255","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2018-11-01DOI: 10.1109/ISTAS.2018.8638287
Till Winkler
Software has an increasing impact on individual well-being, the environment, and our society. To mitigate this potentially harmful impact, scholars have proposed to go beyond traditional requirements. One approach that has been proposed is the consideration of human values, which can be used to constitute dimensions of sustainability, as requirements in the process of software development. To this day, there is no consensus on which values that should be or where to find information about them. This contribution combines value lists of sources from multiple backgrounds into one extensive list of values, which can facilitate sustainable software development. This paper will demonstrate how this list of values can help define the social sustainability dimension. Such an extensive list is also important for other disciplines working with values, such as value sensitive design.
{"title":"Human Values as the Basis for Sustainable Software Development","authors":"Till Winkler","doi":"10.1109/ISTAS.2018.8638287","DOIUrl":"https://doi.org/10.1109/ISTAS.2018.8638287","url":null,"abstract":"Software has an increasing impact on individual well-being, the environment, and our society. To mitigate this potentially harmful impact, scholars have proposed to go beyond traditional requirements. One approach that has been proposed is the consideration of human values, which can be used to constitute dimensions of sustainability, as requirements in the process of software development. To this day, there is no consensus on which values that should be or where to find information about them. This contribution combines value lists of sources from multiple backgrounds into one extensive list of values, which can facilitate sustainable software development. This paper will demonstrate how this list of values can help define the social sustainability dimension. Such an extensive list is also important for other disciplines working with values, such as value sensitive design.","PeriodicalId":122477,"journal":{"name":"2018 IEEE International Symposium on Technology and Society (ISTAS)","volume":"177 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115416198","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2018-11-01DOI: 10.1109/ISTAS.2018.8638286
W. Diehl, Forrest Hare
There are countless connected devices and applications in the Internet of Things (IoT), in areas ranging from health to automotive and industrial, to energy, security, and logistics. Currently, a lack of security within the IoT presents significant cybersecurity risks, including the compromise of sensitive information and damage to infrastructure. As a way to overcome security challenges, this paper proposes expanding the current public-private partnership framework for cybersecurity to one that more effectively encompasses personal-level considerations. To be successful, this new public-private-personal partnership model will require simultaneous advancements in three co-equal domains: technology, policy, and society. Specifically, technology adjustments consist of upgrades to device access and authorization; policy adjustments consist of changes to cooperation regimes and regulations at the federal, state, and local level; and societal adjustments involve public education about vulnerabilities and changes in attitudes toward individual roles in security. In this research, we leverage two examples of emerging IoT applications: health monitoring and smart-grid. For each application and related sector, we outline the security challenges, discuss the shortcomings of existing public-private partnerships, and make recommendations for the expansion of existing partnerships to the personal level.
{"title":"Achieving Security in the Internet of Things through Expansion of the Partnership Model","authors":"W. Diehl, Forrest Hare","doi":"10.1109/ISTAS.2018.8638286","DOIUrl":"https://doi.org/10.1109/ISTAS.2018.8638286","url":null,"abstract":"There are countless connected devices and applications in the Internet of Things (IoT), in areas ranging from health to automotive and industrial, to energy, security, and logistics. Currently, a lack of security within the IoT presents significant cybersecurity risks, including the compromise of sensitive information and damage to infrastructure. As a way to overcome security challenges, this paper proposes expanding the current public-private partnership framework for cybersecurity to one that more effectively encompasses personal-level considerations. To be successful, this new public-private-personal partnership model will require simultaneous advancements in three co-equal domains: technology, policy, and society. Specifically, technology adjustments consist of upgrades to device access and authorization; policy adjustments consist of changes to cooperation regimes and regulations at the federal, state, and local level; and societal adjustments involve public education about vulnerabilities and changes in attitudes toward individual roles in security. In this research, we leverage two examples of emerging IoT applications: health monitoring and smart-grid. For each application and related sector, we outline the security challenges, discuss the shortcomings of existing public-private partnerships, and make recommendations for the expansion of existing partnerships to the personal level.","PeriodicalId":122477,"journal":{"name":"2018 IEEE International Symposium on Technology and Society (ISTAS)","volume":"50 2","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114041770","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2018-11-01DOI: 10.1109/ISTAS.2018.8638284
G. Adamson
Research into the field generally referred to as Artificial Intelligence (AI) has been undertaken for at least 70 years. It now appears that the sheer weight of research effort will lead to a breakthrough in the achievement of Artificial General Intelligence (AGI) in the near or medium future. A challenge in addressing uncertainty surrounding such development is the assertion of commercial secrecy. While AGI has potentially significant implications for society, its development is generally a closely guarded secret. This paper proposes an approach based on concepts of ‘controls’ from the operational risk literature. It proposes an approach to monitoring AGI research that does not require the company to reveal its research secrets, by inviting public scrutiny of the precautions in place regarding the research. It argues that such scrutiny of precautions addresses the problem that companies undertaking research have limited knowledge of the technologies they are developing. This is argued by analogy with an early major technology development, the steam engine, where commercialization preceded scientific understanding by more than half a century. Reliance on precautions in the development of AGI has a further benefit. Where companies’ precautions fail, they would be expected to explain what went wrong and what new or additional precautions would be adopted in the future, making this a self-improving process.
{"title":"Achieving trust in Artificial General Intelligence : Secrets, precautions, and public scrutiny","authors":"G. Adamson","doi":"10.1109/ISTAS.2018.8638284","DOIUrl":"https://doi.org/10.1109/ISTAS.2018.8638284","url":null,"abstract":"Research into the field generally referred to as Artificial Intelligence (AI) has been undertaken for at least 70 years. It now appears that the sheer weight of research effort will lead to a breakthrough in the achievement of Artificial General Intelligence (AGI) in the near or medium future. A challenge in addressing uncertainty surrounding such development is the assertion of commercial secrecy. While AGI has potentially significant implications for society, its development is generally a closely guarded secret. This paper proposes an approach based on concepts of ‘controls’ from the operational risk literature. It proposes an approach to monitoring AGI research that does not require the company to reveal its research secrets, by inviting public scrutiny of the precautions in place regarding the research. It argues that such scrutiny of precautions addresses the problem that companies undertaking research have limited knowledge of the technologies they are developing. This is argued by analogy with an early major technology development, the steam engine, where commercialization preceded scientific understanding by more than half a century. Reliance on precautions in the development of AGI has a further benefit. Where companies’ precautions fail, they would be expected to explain what went wrong and what new or additional precautions would be adopted in the future, making this a self-improving process.","PeriodicalId":122477,"journal":{"name":"2018 IEEE International Symposium on Technology and Society (ISTAS)","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128421654","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2018-11-01DOI: 10.1109/ISTAS.2018.8638278
G. Parise, L. Parise, Marialuisa Parise
This paper deals with the impact of IoT on the human society that produces opportunities for exciting innovations. IoT impacts ethical and social aspects towards human society, as individuals and as community, operational and global aspects towards the technical systems. It is a generator of individual and collective advantages that can be expropriated or inhibited for the benefit just a few individuals or groups. IoT must comply with the social right to a no-fake information and so must be protected globally by international laws and policies. Without invading the individual privacy IoT can provide to each person controlled automata, robosats (robot satellites), as extension of the personal sphere of action. It contributes to the globalization as a planetary complex of connected services where the reference system has to be the human society. This paper deals with the prospective impact of IoT on the utilization of electrical energy that can allow an epochal evolution in the structure/operation of power systems and facilitate an efficient constitution of the electrical microgrids. The interaction of the electrical equipment requires their "socialization" that is their improved integration by a revision of their load profiles and behaviors as much as possible.
{"title":"Evolution of Human Society and of Things Assisted by IoT","authors":"G. Parise, L. Parise, Marialuisa Parise","doi":"10.1109/ISTAS.2018.8638278","DOIUrl":"https://doi.org/10.1109/ISTAS.2018.8638278","url":null,"abstract":"This paper deals with the impact of IoT on the human society that produces opportunities for exciting innovations. IoT impacts ethical and social aspects towards human society, as individuals and as community, operational and global aspects towards the technical systems. It is a generator of individual and collective advantages that can be expropriated or inhibited for the benefit just a few individuals or groups. IoT must comply with the social right to a no-fake information and so must be protected globally by international laws and policies. Without invading the individual privacy IoT can provide to each person controlled automata, robosats (robot satellites), as extension of the personal sphere of action. It contributes to the globalization as a planetary complex of connected services where the reference system has to be the human society. This paper deals with the prospective impact of IoT on the utilization of electrical energy that can allow an epochal evolution in the structure/operation of power systems and facilitate an efficient constitution of the electrical microgrids. The interaction of the electrical equipment requires their \"socialization\" that is their improved integration by a revision of their load profiles and behaviors as much as possible.","PeriodicalId":122477,"journal":{"name":"2018 IEEE International Symposium on Technology and Society (ISTAS)","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121598351","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2018-11-01DOI: 10.1109/ISTAS.2018.8638274
Z. Pirtle
Engineers seek to improve how their work benefits society, but often lack clear frameworks on how to study the sources of innovation for engineering breakthroughs. Case studies are one way to assess how basic and applied research becomes used in some engineering developments. To provide a reference point for how engineers could study the sources of innovation, the paper will discuss the largest scale study to date of how science becomes used in engineering: the controversial 1963-1969 Project Hindsight study from the US Department of Defense. Hindsight studied 20 weapons systems developments that occurred from 1947-1962 by having teams of researchers do case studies on the developments’ history. The paper analyzes claims from the Hindsight report that showed few basic science research events leading to practical engineering developments, as well as subsequent criticisms. Reflecting on the Hindsight methodology and doing new case studies on engineering today could help engineers direct their work to a greater societal benefit.
{"title":"Project Hindsight Reconsidered: : Reflecting on how engineers can study the sources of innovation","authors":"Z. Pirtle","doi":"10.1109/ISTAS.2018.8638274","DOIUrl":"https://doi.org/10.1109/ISTAS.2018.8638274","url":null,"abstract":"Engineers seek to improve how their work benefits society, but often lack clear frameworks on how to study the sources of innovation for engineering breakthroughs. Case studies are one way to assess how basic and applied research becomes used in some engineering developments. To provide a reference point for how engineers could study the sources of innovation, the paper will discuss the largest scale study to date of how science becomes used in engineering: the controversial 1963-1969 Project Hindsight study from the US Department of Defense. Hindsight studied 20 weapons systems developments that occurred from 1947-1962 by having teams of researchers do case studies on the developments’ history. The paper analyzes claims from the Hindsight report that showed few basic science research events leading to practical engineering developments, as well as subsequent criticisms. Reflecting on the Hindsight methodology and doing new case studies on engineering today could help engineers direct their work to a greater societal benefit.","PeriodicalId":122477,"journal":{"name":"2018 IEEE International Symposium on Technology and Society (ISTAS)","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115305655","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2018-11-01DOI: 10.1109/ISTAS.2018.8638267
J. R. Ndiege, Patrick Kanyi
The primary objective of this study is to examine the problem of cyberbullying in institutions of higher learning with particular attention to developing countries by looking at its prevalence in one of the universities within Nairobi in Kenya. In this study, we conduct an exploratory study on 396 students to understand the prevalence of cyberbullying. The study findings revealed that the highest form of victimization was through the act of deception in which 75.8% indicated someone had lied to them electronically. On the other hand, the highest form of perpetration of cyberbullying was through malice in which 49.7% indicated that they had sent a rude message to someone electronically. The level of prevalence reported in this study appears slightly high in comparison to majority of the finding from developed countries. Consequently, we submit that it is imperative that educational systems in Africa and other developing countries put frameworks in place to deal with the emerging reality of cyberbullying within institutions of higher learning.
{"title":"Cyberbullying in institutions of higher learning in developing countries: Evidence from Kenya","authors":"J. R. Ndiege, Patrick Kanyi","doi":"10.1109/ISTAS.2018.8638267","DOIUrl":"https://doi.org/10.1109/ISTAS.2018.8638267","url":null,"abstract":"The primary objective of this study is to examine the problem of cyberbullying in institutions of higher learning with particular attention to developing countries by looking at its prevalence in one of the universities within Nairobi in Kenya. In this study, we conduct an exploratory study on 396 students to understand the prevalence of cyberbullying. The study findings revealed that the highest form of victimization was through the act of deception in which 75.8% indicated someone had lied to them electronically. On the other hand, the highest form of perpetration of cyberbullying was through malice in which 49.7% indicated that they had sent a rude message to someone electronically. The level of prevalence reported in this study appears slightly high in comparison to majority of the finding from developed countries. Consequently, we submit that it is imperative that educational systems in Africa and other developing countries put frameworks in place to deal with the emerging reality of cyberbullying within institutions of higher learning.","PeriodicalId":122477,"journal":{"name":"2018 IEEE International Symposium on Technology and Society (ISTAS)","volume":"35 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115001624","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}