Electronic marketplace (EM) has been considered lately as an alternative coordination mechanism between suppliers and buyers in a supply chain. In this paper an appropriate model for EM-based supply chain is developed in order to investigate the impact of EM on two important supply chain performance measures - total supply chain cost per sale and customer fill rate. We adopt a simulation modeling approach and conduct experiments with key factors which include auction-based coordination mechanism. In addition, supply chain effects such as demand pooling, matching and aggregation effects in procurement of parts, etc. are also considered. The results indicate that EM could bring operational benefits even though strategic and situational factors that change the magnitude of benefits may occasionally prevent EM from being successful in a supply chain.
{"title":"An Investigation of the Roles of Electronic Marketplace in the Supply Chain","authors":"Sungjune Park, N. Suresh","doi":"10.1109/HICSS.2005.93","DOIUrl":"https://doi.org/10.1109/HICSS.2005.93","url":null,"abstract":"Electronic marketplace (EM) has been considered lately as an alternative coordination mechanism between suppliers and buyers in a supply chain. In this paper an appropriate model for EM-based supply chain is developed in order to investigate the impact of EM on two important supply chain performance measures - total supply chain cost per sale and customer fill rate. We adopt a simulation modeling approach and conduct experiments with key factors which include auction-based coordination mechanism. In addition, supply chain effects such as demand pooling, matching and aggregation effects in procurement of parts, etc. are also considered. The results indicate that EM could bring operational benefits even though strategic and situational factors that change the magnitude of benefits may occasionally prevent EM from being successful in a supply chain.","PeriodicalId":355838,"journal":{"name":"Proceedings of the 38th Annual Hawaii International Conference on System Sciences","volume":"20 7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-01-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124339229","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Finding images over the internet can be trying at best. Many industries such as advertising, marketing, image consultants, print media, and medical imaging deal with electronic images on a daily basis. Images are often stored by some non-descriptive ordering system and come in a variety of formats. Using image metadata, information such as the physical, technical and content related characteristics can be captured. Prior research has primarily addressed specific types of images and addressed the storage of metadata in a database format. This paper presents a Resource Description Framework Schema for the generic categorization of electronic image characteristics and traits. This schema is useful for image management and can be widely utilized in document management systems which traditionally use film and optical technology to store images. An image editor is prototyped with the capability of annotating the metadata into the image or exporting image metadata into other business oriented systems.
{"title":"A Metadata Model for Electronic Images","authors":"R. M. Mathis, Lucinda Caughey","doi":"10.1109/HICSS.2005.23","DOIUrl":"https://doi.org/10.1109/HICSS.2005.23","url":null,"abstract":"Finding images over the internet can be trying at best. Many industries such as advertising, marketing, image consultants, print media, and medical imaging deal with electronic images on a daily basis. Images are often stored by some non-descriptive ordering system and come in a variety of formats. Using image metadata, information such as the physical, technical and content related characteristics can be captured. Prior research has primarily addressed specific types of images and addressed the storage of metadata in a database format. This paper presents a Resource Description Framework Schema for the generic categorization of electronic image characteristics and traits. This schema is useful for image management and can be widely utilized in document management systems which traditionally use film and optical technology to store images. An image editor is prototyped with the capability of annotating the metadata into the image or exporting image metadata into other business oriented systems.","PeriodicalId":355838,"journal":{"name":"Proceedings of the 38th Annual Hawaii International Conference on System Sciences","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-01-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124387994","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Since 9/11, intelligence agencies in the United States have expanded experimentation and use of data mining and analysis techniques to combat terrorism. These efforts have generated significant privacy concerns and discussions about the appropriate balance between civil liberties and technology-aided information integration. This paper argues that while privacy discussions are important, they should be framed within a discussion of the likely ability of data mining systems to meet their stated policy goals. If goal success is not assured, the decision calculus for balancing the use of data integration technology against concerns of privacy abuse will be significantly altered.
{"title":"Information Policy, Data Mining, and National Security: False Positives and Unidentified Negatives","authors":"T. Maxwell","doi":"10.1109/HICSS.2005.317","DOIUrl":"https://doi.org/10.1109/HICSS.2005.317","url":null,"abstract":"Since 9/11, intelligence agencies in the United States have expanded experimentation and use of data mining and analysis techniques to combat terrorism. These efforts have generated significant privacy concerns and discussions about the appropriate balance between civil liberties and technology-aided information integration. This paper argues that while privacy discussions are important, they should be framed within a discussion of the likely ability of data mining systems to meet their stated policy goals. If goal success is not assured, the decision calculus for balancing the use of data integration technology against concerns of privacy abuse will be significantly altered.","PeriodicalId":355838,"journal":{"name":"Proceedings of the 38th Annual Hawaii International Conference on System Sciences","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-01-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124534783","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Many information systems (IS) studies portray use as an indicator of system success. However, "simply saying that more use will yield more benefits without considering the nature of this use, is clearly insufficient" [1 p. 16]. Researchers are also urged to address the study context in defining components of IS success. Our research specifies the use quality construct in the context of a mission critical system deployment, namely, the use of medical video conferencing for patient examinations. This type of telemedicine encounter provides an interesting context of system use as people in various roles interact with each other and with technology. We use a multi-method field study to collect and interpret a rich set of data on telemedicine encounters. We analyze the data from the perspectives of both patients and providers in the encounter. The result of this field study is a socio-technical framework of use quality for telemedicine service encounters in which the individual use quality attributes are identified, discussed, and compared via provider and patient perspectives.
许多信息系统(IS)研究将使用描述为系统成功的一个指标。然而,“仅仅说更多的使用会产生更多的好处,而不考虑这种使用的性质,显然是不够的”[1 p. 16]。研究人员还被敦促在定义IS成功的组成部分时解决研究背景。我们的研究明确了在关键任务系统部署背景下的使用质量结构,即使用医疗视频会议进行患者检查。这种类型的远程医疗相遇提供了一个有趣的系统使用环境,因为不同角色的人彼此之间以及与技术之间进行了交互。我们使用一种多方法的实地研究来收集和解释一套丰富的远程医疗遭遇数据。我们从遇到的患者和提供者的角度分析数据。这项实地研究的结果是一个远程医疗服务使用质量的社会技术框架,其中个人使用质量属性通过提供者和患者的角度进行识别、讨论和比较。
{"title":"It's More than Just Use: An Investigation of Telemedicine Use Quality","authors":"C. LeRouge, A. Hevner","doi":"10.1109/HICSS.2005.363","DOIUrl":"https://doi.org/10.1109/HICSS.2005.363","url":null,"abstract":"Many information systems (IS) studies portray use as an indicator of system success. However, \"simply saying that more use will yield more benefits without considering the nature of this use, is clearly insufficient\" [1 p. 16]. Researchers are also urged to address the study context in defining components of IS success. Our research specifies the use quality construct in the context of a mission critical system deployment, namely, the use of medical video conferencing for patient examinations. This type of telemedicine encounter provides an interesting context of system use as people in various roles interact with each other and with technology. We use a multi-method field study to collect and interpret a rich set of data on telemedicine encounters. We analyze the data from the perspectives of both patients and providers in the encounter. The result of this field study is a socio-technical framework of use quality for telemedicine service encounters in which the individual use quality attributes are identified, discussed, and compared via provider and patient perspectives.","PeriodicalId":355838,"journal":{"name":"Proceedings of the 38th Annual Hawaii International Conference on System Sciences","volume":"56 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-01-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114625908","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Understanding the antecedents to the adoption of information technology is important to both technology firms and policy analysts that study the effects of technology adoption on healthcare. This paper uses a transactional cost approach to investigate the role of trust and privacy as moderators in the adoption of Application Service Providers (ASPs) as a new form of information technology outsourcing in the healthcare industry within the current regulatory climate created by HIPAA (Health Insurance Portability and Accountability Act). The analysis utilized a seven-stage measure to capture adoption. Our analysis showed that Transactions costs and the antecedents of transaction costs were highly significant in the ASP adoption process. The direct and moderated effects of Trust and Privacy were not significant.
{"title":"Exploring the Moderating Effect of Trust and Privacy in the Adoption of Application Service Providers in the Healthcare Industry","authors":"Ebrahim Randeree, R. Kishore, H. R. Rao","doi":"10.1109/HICSS.2005.263","DOIUrl":"https://doi.org/10.1109/HICSS.2005.263","url":null,"abstract":"Understanding the antecedents to the adoption of information technology is important to both technology firms and policy analysts that study the effects of technology adoption on healthcare. This paper uses a transactional cost approach to investigate the role of trust and privacy as moderators in the adoption of Application Service Providers (ASPs) as a new form of information technology outsourcing in the healthcare industry within the current regulatory climate created by HIPAA (Health Insurance Portability and Accountability Act). The analysis utilized a seven-stage measure to capture adoption. Our analysis showed that Transactions costs and the antecedents of transaction costs were highly significant in the ASP adoption process. The direct and moderated effects of Trust and Privacy were not significant.","PeriodicalId":355838,"journal":{"name":"Proceedings of the 38th Annual Hawaii International Conference on System Sciences","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-01-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114915909","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
The economics of robot manufacturing is driving us toward situations in which a single human operator will be expected to split attention across multiple semi-autonomous vehicles, and remotely intercede if necessary. We present an analysis of such situations, with the goal of creating decision aids. Toward this end, the concept of special regions is introduced. In one set of situations special regions designate areas that are dangerous, and require teleoperation. We show how to move through single route and multi-route situations, and prove the later problem NP-Complete. In another set of situations, special regions can be used to represent areas outside direct radio contact. We present a way to minimize communication distance and plan for interventions. We relate our findings to concepts of neglect time, interaction time, and fan-out. We discuss a measure of effective fan-out for transportation tasks, and present simulation results. The work has potential impact to those engaged in emergency response and search and rescue.
{"title":"Attention and Communication: Decision Scenarios for Teleoperating Robots","authors":"J. Nickerson, S. Skiena","doi":"10.1109/HICSS.2005.107","DOIUrl":"https://doi.org/10.1109/HICSS.2005.107","url":null,"abstract":"The economics of robot manufacturing is driving us toward situations in which a single human operator will be expected to split attention across multiple semi-autonomous vehicles, and remotely intercede if necessary. We present an analysis of such situations, with the goal of creating decision aids. Toward this end, the concept of special regions is introduced. In one set of situations special regions designate areas that are dangerous, and require teleoperation. We show how to move through single route and multi-route situations, and prove the later problem NP-Complete. In another set of situations, special regions can be used to represent areas outside direct radio contact. We present a way to minimize communication distance and plan for interventions. We relate our findings to concepts of neglect time, interaction time, and fan-out. We discuss a measure of effective fan-out for transportation tasks, and present simulation results. The work has potential impact to those engaged in emergency response and search and rescue.","PeriodicalId":355838,"journal":{"name":"Proceedings of the 38th Annual Hawaii International Conference on System Sciences","volume":"83 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-01-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117258900","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
We compare two alternative mechanisms for capping prices in two-settlement electricity markets. With sufficient lead time and competitive entry opportunities, forward market prices are implicitly capped by competitive pressure of potential entry that will occur when forward prices rise above a certain level. Another more direct approach is to cap spot prices through regulatory intervention. In this paper we explore the implications of the two alternative mechanisms in a two settlement Cournot equilibrium framework. We formulate the market equilibrium as a stochastic equilibrium problem with equilibrium constraints (EPEC) capturing congestion effects, probabilistic contingencies and market power. As an illustrative test case we use the 53-bus Belgian electricity network with representative generator cost but hypothetical demand and ownership assumptions. When compared to two-settlement systems without price caps we find that either of the price capping alternatives results in reduced forward contracting. Furthermore the reduction in spot prices due to forward contracting is smaller.
{"title":"Cournot Equilibrium in Price-Capped Two-Settlement Electricity Markets","authors":"Jian Yao, B. Willems, S. Oren, I. Adler","doi":"10.1109/HICSS.2005.172","DOIUrl":"https://doi.org/10.1109/HICSS.2005.172","url":null,"abstract":"We compare two alternative mechanisms for capping prices in two-settlement electricity markets. With sufficient lead time and competitive entry opportunities, forward market prices are implicitly capped by competitive pressure of potential entry that will occur when forward prices rise above a certain level. Another more direct approach is to cap spot prices through regulatory intervention. In this paper we explore the implications of the two alternative mechanisms in a two settlement Cournot equilibrium framework. We formulate the market equilibrium as a stochastic equilibrium problem with equilibrium constraints (EPEC) capturing congestion effects, probabilistic contingencies and market power. As an illustrative test case we use the 53-bus Belgian electricity network with representative generator cost but hypothetical demand and ownership assumptions. When compared to two-settlement systems without price caps we find that either of the price capping alternatives results in reduced forward contracting. Furthermore the reduction in spot prices due to forward contracting is smaller.","PeriodicalId":355838,"journal":{"name":"Proceedings of the 38th Annual Hawaii International Conference on System Sciences","volume":"52 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-01-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117308385","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
This paper examines the textual structure of English chatroom discourse focusing on the cohesive elements which are utilised by the participants in order to create a semantically coherent structure. Due to multiple conversations simultaneously occurring and the linearity imposed by the chat software, conversations become intertwined with each other, and adjacent turns often appear to be semantically unrelated. Schönfeldt and Golato demonstrate that participants in a German chatgroup cope with the lack of adjacency by evoking the name of the recipient whom they are addressing. Unfortunately, every chatroom does not adopt such conventions. Based on a preliminary analysis of a Yahoo! chatgroup, this study will show that cohesive devices (e.g., referential forms) are aiding the participants. Cohesive devices such as lexical relationships and direct address are very frequent in chatroom discourse. Furthermore, certain cohesive elements that are common in spoken discourse (e.g., ellipsis) are used less often in chatrooms because they have a greater potential of leading to ambiguity and misinterpretations.
{"title":"Cohesion and Reference in English Chatroom Discourse","authors":"C. M. Nash","doi":"10.1109/HICSS.2005.143","DOIUrl":"https://doi.org/10.1109/HICSS.2005.143","url":null,"abstract":"This paper examines the textual structure of English chatroom discourse focusing on the cohesive elements which are utilised by the participants in order to create a semantically coherent structure. Due to multiple conversations simultaneously occurring and the linearity imposed by the chat software, conversations become intertwined with each other, and adjacent turns often appear to be semantically unrelated. Schönfeldt and Golato demonstrate that participants in a German chatgroup cope with the lack of adjacency by evoking the name of the recipient whom they are addressing. Unfortunately, every chatroom does not adopt such conventions. Based on a preliminary analysis of a Yahoo! chatgroup, this study will show that cohesive devices (e.g., referential forms) are aiding the participants. Cohesive devices such as lexical relationships and direct address are very frequent in chatroom discourse. Furthermore, certain cohesive elements that are common in spoken discourse (e.g., ellipsis) are used less often in chatrooms because they have a greater potential of leading to ambiguity and misinterpretations.","PeriodicalId":355838,"journal":{"name":"Proceedings of the 38th Annual Hawaii International Conference on System Sciences","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-01-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122052936","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
The way in which organizations manage the knowledge that underlies their capabilities can be a powerful tool in explaining their behavior and competitiveness. While much research in knowledge management has illuminated the understanding of knowledge management, little is understood about the attributes of implementing a system that helps to create, mobilize and diffuse knowledge. Aiming at narrowing this gap, our research examines the experiences of a major oilfield services company in transforming itself to overcome a hierarchical knowledge flow to support its operations in the oil fields by putting into operation a system that facilitates the creation, mobilization and diffusion of knowledge in the technical service delivery process. By adopting the Abductive Strategy, and utilizing the means-end model with its laddering technique, the study reveals the attributes in operationalizing "InTouch", the system that supports the process.
{"title":"Overcoming Barriers To Knowledge Flow: Evidence-Based Attributes Enabling The Creation, Mobilization, and Diffusion of Knowledge","authors":"Satrijo Tanudjojo, A. Braganza","doi":"10.1109/HICSS.2005.482","DOIUrl":"https://doi.org/10.1109/HICSS.2005.482","url":null,"abstract":"The way in which organizations manage the knowledge that underlies their capabilities can be a powerful tool in explaining their behavior and competitiveness. While much research in knowledge management has illuminated the understanding of knowledge management, little is understood about the attributes of implementing a system that helps to create, mobilize and diffuse knowledge. Aiming at narrowing this gap, our research examines the experiences of a major oilfield services company in transforming itself to overcome a hierarchical knowledge flow to support its operations in the oil fields by putting into operation a system that facilitates the creation, mobilization and diffusion of knowledge in the technical service delivery process. By adopting the Abductive Strategy, and utilizing the means-end model with its laddering technique, the study reveals the attributes in operationalizing \"InTouch\", the system that supports the process.","PeriodicalId":355838,"journal":{"name":"Proceedings of the 38th Annual Hawaii International Conference on System Sciences","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-01-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125866657","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
E-governments are becoming part and parcel of the virtual economic landscape and are plagued by the same lack of consumer trust that inhibits e-commerce transactions. To make matters worse, the political exclusivity and apathetic bureaucracy of public institutions have amplified the level of difficulty in trying to convince the citizenries to come onboard e-government initiatives. In a preliminary attempt to derive possible developmental implications for the restoring of public trust in e-governments, this study explores the success story of the Singapore's Electronic Tax-Filing (e-Filing) system to reveal how trust-building mechanisms have been incorporated into its techno-structure to attract a phenomenal rate of public user acceptance. Specifically, the case examines the means by which process-based, characteristic-based and institution-based trust have been restored in the e-Filing system. This paper concludes by suggesting that the restoration of public trust can only be achieved through a blend of socio-political strategies and Information Technology.
{"title":"Towards the Restoration of Public Trust in Electronic Governments: A Case Study of the E-Filing System in Singapore","authors":"Chee‐Wee Tan, S. Pan, Eric Tze Kuan Lim","doi":"10.1109/HICSS.2005.638","DOIUrl":"https://doi.org/10.1109/HICSS.2005.638","url":null,"abstract":"E-governments are becoming part and parcel of the virtual economic landscape and are plagued by the same lack of consumer trust that inhibits e-commerce transactions. To make matters worse, the political exclusivity and apathetic bureaucracy of public institutions have amplified the level of difficulty in trying to convince the citizenries to come onboard e-government initiatives. In a preliminary attempt to derive possible developmental implications for the restoring of public trust in e-governments, this study explores the success story of the Singapore's Electronic Tax-Filing (e-Filing) system to reveal how trust-building mechanisms have been incorporated into its techno-structure to attract a phenomenal rate of public user acceptance. Specifically, the case examines the means by which process-based, characteristic-based and institution-based trust have been restored in the e-Filing system. This paper concludes by suggesting that the restoration of public trust can only be achieved through a blend of socio-political strategies and Information Technology.","PeriodicalId":355838,"journal":{"name":"Proceedings of the 38th Annual Hawaii International Conference on System Sciences","volume":"95 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-01-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126148507","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}