-k8凯发棋牌
��ࡱ�>�� np����m��������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������u �r�mbjbj�n�n2r��a��ap(
�������""������������8�le��olaaaaa���ooooooo$nq�t<'ou������'o��aa4�ommm�b�a�aom�ommma������-��a������m�n�o0�om@t�f@tmm|0@t��k$��m�����'o'o- ����o������������������������������������������������������������������������@t���������"qs: journal of contemporary china
volume 32, issue 139, jan 2023
1. title: conditioning china s influence: intentionality, intermediaries, and institutions
authors: fung, courtney j; han, enze; quek, kai; strange, austin.
abstract: according to popular accounts, china�s international influence is increasing with its growing material capabilities. however, researchers repeatedly demonstrate gaps between china�s power and its influence. building on earlier research, we propose an inclusive approach to conceptualizing china�s influence abroad. our approach conditions china�s net influence on three dimensions. first, intentionality distinguishes between intentional influence-seeking and influence that accrues unintentionally via influence externalities. second, a systematic treatment of chinese intermediaries�the diverse set of substate actors operating overseas�is needed in order to expand the study of chinese influence beyond state-level behavior. finally, domestic institutions in host countries are essential conduits for conditioning how the behavior of chinese actors, as well as group and individual reactions within host countries, are aggregated up to the policy level.
2. title: the securitization of �chinese influence� in australia
authors: chubb, andrew.
abstract: this article traces the emergence of �chinese influence� as a conceptual touchstone of australia�s public policy discourse in 2017�2018. the people�s republic of china�s (prc) efforts to influence politics abroad had been well documented since the 2000s and cannot explain the timing of their securitization from mid-2017. it was through the formation of a securitizing coalition of intelligence officials, politicians, and journalists that the prc as a source of existential threats gained policy traction. but as the coalition expanded from security agencies to politicians and the media, the scope of the threat expanded from an initial concern with prc party-state activity to the securitization of a much wider array of state and non-state activities under the ambiguous label �chinese influence�.
3. title: national identity and the limits of chinese public diplomacy in the philippines
authors: yeo, andrew; enrico, gloria.
abstract: despite a rise in chinese public diplomacy efforts in the philippines, filipino perceptions of china have mainly remained negative during the duterte period. this article examines why and how china�s public diplomacy efforts have primarily failed despite president duterte�s pro-china position. it draws on constructivist approaches to demonstrate how national identity mediates the impact of chinese influence. in particular, chinese incursions in the west philippine sea, and an influx of china-based offshore gaming businesses in the country, have elicited a strong nationalist response from filipinos, perpetuating perceptions of china as untrustworthy and threatening. evidence is drawn to determine correlation between an increase in chinese public diplomacy and a decrease in public trust towards china. this is followed by process-tracing how national identity dampens any positive effect chinese public diplomacy may have on philippine attitudes towards china.
4. title: chinese influence through technical standardization power
authors: r�hlig, tim.
abstract: geo-economic rivalry is back on the international agenda, particularly in the field of high technology. very often, technical standards are regarded as being a central arena of this competition. surprisingly ignored is the question, how precisely technical standard-setting (such as wi-fi or 5g) empowers china. based on the analysis of quantitative data, primary sources, and in-depth interviews, this article substantiates the widespread hypothesis that china�s growing footprint in technical standardization empowers the chinese party-state. it introduces seven proxies to measure influence on standard-setting. next, it explains how technical standards can be utilized by states to gain economic, legal, political, and discursive influence. finally, it shows thatchina�s growing footprint in technical standardization is the result of party-state engagement, which provides leverage to china�s political leadership.
5. title: top-level design and enlarged diplomacy: foreign and security policymaking in xi jinping�s china
authors: zhao, suisheng.
abstract: xi jinping has centralized foreign policymaking authorities by setting up new central coordination organizations with himself as the head to bypass entrenched interests and cut through bureaucratic roadblocks. staking his claim to power on the party and demanding personal loyalty of chinese bureaucrats to him in a way that none of his recent predecessors could; xi has introduced a top-level design to develop strategic visions, conduct strategic planning, and make tough decisions. the top-level design has advanced the enlarged diplomacy far beyond the sphere of professional diplomats. but xi�s personalization of chinese foreign and security policymaking has increased the possibility of intended and unintended consequences of foreign adventure and actions.
6. title: china�s digital yuan: motivations of the chinese government and potential global effects
authors: kshetri, nir.
abstract: this article highlights the key motivations behind china�s plan to launch the digital yuan and reviews the potential impacts on china and abroad. the article analyzes the digital yuan�s benefits to consumers, such as a reliable low-risk, low cost, and high-efficiency payment solution and the potential to promote financial inclusion. it compares the digital yuan with its most prominent competitors. also discussed is how the digital yuan is expected to provide the chinese communist party with a new powerful tool to monitor and control its economy and people. the article provides a critical evaluation of the potential of the digital yuan�s internationalization. this article also provides a perspective on the digital yuan to set global standards for the development of national digital currencies.
7. title: strong state or vulnerable homeland: how chinese state media sought to combat democratic diffusion during the 2019 hong kong protests
authors: ma, shiqi; jessica chen weiss.
abstract: departing from its typical silence on pro-democracy movements around the world, chinese state media encouraged a flood of reports about the 2019 anti-extradition law movement in hong kong. this article investigates two different media framing strategies to prevent democratic diffusion: demobilizing the masses by emphasizing state capacity and repression, and rallying the masses by emphasizing threats to national unity. analyzing an original dataset of articles about the hong kong protests in the people�s daily, this article documents a greater overall reliance on the rallying strategy, a tendency that became particularly pronounced in the later stage of the protest movement. chinese media selectively reported events that would emphasize threats and downplayed stories about repression.
8. title: china�s ideational influence in central and eastern europe (cee): a comparative analysis of chinese and european scholars� interpretations of china-cee cooperation
authors: garlick, jeremy; qin, fangxing.
abstract: chinese and european scholarly debates on china�s relations with central and eastern europe (cee) have steadily heated up since the introduction of the 16/17 1 cooperation mechanism in 2012. however, they have tended to take place in discrete linguistic and academic bubbles. this article has three aims: first, to introduce chinese scholarly debates on china-cee cooperation to an anglophone readership; second, to conduct a critical assessment of chinese and european scholars� inclusions and omissions; and third, to compare the narratives presented by chinese scholars concerning china-cee cooperation with european scholars interpretations. the content analysis demonstrates that chinese scholars under-emphasize the influence-forming and ideational aspects of the platform, while european scholars insufficiently analyze the extent to which the 16/17 1�s characteristics are shared with other chinese regional cooperation platforms.
9. title: elite networks and the transregional dimension of authoritarianism: sino-emirati relations in times of a global pandemic
authors: gurol, julia; zumbr�gel, tobias; demmelhuber, thomas.
abstract: scholarly debates on chinese foreign policy in the middle east and the international dimension of authoritarianism have gained momentum since beijing s belt and road initiative (bri) in 2013. at the same time, the global pandemic provided a window of opportunity to autocrats worldwide to fine-tune their modes of surveillance for the sake of regime survival. this article deconstructs sino-emirati relations in the field of digital surveillance. inspired by social network theory, we explore three transregional public-private elite networks as multipliers for the traveling of authoritarian practices. we show that authoritarian diff:<jn^`dhntxz|��2 ��ʻʪ�ʘ�zf^qc5hu �hu �5�ojqj^jh�"�hu<�5�ojqj^jh�ud5�ojqj^jo(h�"�h�"�o(&h�"�h�"�5�cjojqj^jajo(h�]5�cjojqj^jajh
2e5�cjojqj^jaj#hu �hu �5�cjojqj^jaj h��5�cjojqj^jajo(hu �5�cjojqj^jaj#h�"�h�"�5�cjojqj^jaj h$-�5�cjojqj^jajo(#hu �hu �5�cjojqj^jaj<z|~4 � �
�
�
�
,�������5<�����������������������gd�psgd)w�gd$?�gdto�gd�l$gd%j,gdu �gdu<�gd�"�$a$gdt42 4 d f � � � � �
�
�
�
�
�
�
�
�
�
�
�
�
���̼审��{�m{_om{_omahih�l$ojqj^jo(hvi�h�l$5�ojqj^jo(h�q�h�q�5�ojqj^jh�l$h�l$5�ojqj^jh�l$5�ojqj^jo(hj�5�ojqjo(hiht4ojqj^jo(h�8�h�8�ojqj^jhihj�ojqj^jo(hu �ht45�ojqj^jo(hu �hu �5�ojqj^jhicy5�ojqj^jh�"�hu<�5�ojqj^jhj�5�ojqj^jo(* ,-./56����������������Ϳ��͜��͜��~qd�wi;h$?�h$?�5�ojqj^jh�"�h%j,5�ojqj^jhs/�5�ojqj^jo(hihanojqj^jhy�hy�ojqj^jh�)hto�ojqj^jo(hvi�hto�5�ojqj^jo(hy�hy�5�ojqj^jhto�hto�5�ojqj^jhto�hto�h�"�h�`�5�ojqj^jhto�5�ojqj^jo(h%j,5�ojqjo(hihu<�ojqj^jo(h�q�h�q�ojqj^j�����.0�������$%45>�������ǹ����xj��\j��l>h$?�h)w�5�ojqj^jhvi�h)w�5�ojqj^jo(hvi�h�ps5�ojqj^jh�psh�ps5�ojqj^jh�"�h)w�5�ojqj^jh�ps5�ojqj^jo(h)w�5�ojqjo(hvi�h%j,ojqj^jo(h0fgh0fgojqj^jh�)h$?�ojqj^jo(h$?�h$?�5�ojqj^jhvi�h$?�5�ojqj^jo(h0fgh0fg5�ojqj^jh$?�5�ojqj^jo(>?;<=>@fg���������!�!�!�!�!���˾������x�hz�m��@�h|�5�ojqj^jo(h}�h}�ojqj^jh$?�h)w�5�ojqj^jhvi�h)w�5�ojqj^jo(hvi�hvi�5�ojqj^jhvi�hr7a5�ojqj^jh}�h}�5�ojqj^jhr7ahr7a5�ojqj^jh�"�h)w�5�ojqj^jhr7a5�ojqj^jo(h)w�5�ojqjo(hvi�h)w�ojqj^jo(h0fgh0fgojqj^jh}onh)w�ojqj^jo(<=���!�!�">#�&�&t'�'�,�,�-6.�h�hpiiimmmmm������������������������gd�gd�_gdlz�gd�)ggd}�gd|�gdr7agd)w��!�!�!�"�"�"<#>#p#r#e$d$�&�&�&�&�&�&�&s'�����ָ�����wl_qc_5h��h��5�ojqj^jh�)gh�)g5�ojqj^jh�"�h)w�5�ojqj^jh�)g5�ojqj^jo(h)w�5�ojqjo(hvi�h)w�ojqj^jo(h\ �ojqj^jh}�h}�ojqj^jh}onh)w�ojqj^jo(h$?�h)w�5�ojqj^jh}�h)w�5�ojqj^jo(hvi�h|�5�ojqj^jh}�h}�5�ojqj^jh|�5�ojqj^jo(h|�h|�5�ojqj^js't'|'}'�'�'�'�'�,�,�,�,�,�,�,�-���ȸ����vi[m@2h9"jh9"j5�ojqj^jhlz�5�ojqj^jo(hlz�hlz�5�ojqj^jh�"�h)w�5�ojqj^jhr5�ojqj^jo(h)w�5�ojqjo(hvi�h)w�ojqj^jo(h��h��ojqj^jhih)w�ojqj^jo(h$?�h)w�5�ojqj^jhvi�h)w�5�ojqj^jo(h��h��5�ojqj^jh�)g5�ojqj^jo(h�)gh�)g5�ojqj^jhvi�h�)g5�ojqj^j�-�-�-4.6.h.j.�1h�h�h�h�h�h�h�hoipiyi���ŷ������tfxk=/xhvi�h�_5�ojqj^jh�<;h�<;5�ojqj^jh�_5�ojqj^jo(h�_h�_5�ojqj^jh�"�h)w�5�ojqj^jhr5�ojqj^jo(h)w�5�ojqjo(hvi�h)w�ojqj^jo(uh9"jh9"jojqj^jhih)w�ojqj^jo(h$?�h)w�5�ojqj^jhvi�h)w�5�ojqj^jo(h9"jh9"j5�ojqj^jhlz�hlz�5�ojqj^jhvi�hlz�5�ojqj^jusion under the umbrella of fighting the pandemic is not spatially bound to geographical proximity or other structural similarities but rather a global phenomenon that state and non-state actors reproduce.
10. title: the impact of china�s dams on the mekong river basin: governance, sustainable development, and the energy-water nexus
authors: ogden, suzanne.
abstract: china has made yunnan province its �southern gateway� and the hub of its transportation corridors and energy-water nexus in southeast asia by incorporating the greater mekong subregion into its �belt and road initiative.� china�s lancang river (upper mekong) hydropower development generates costs and benefits for downstream countries. china dominates the greater mekong subregion through institutional development, technological expertise, and financial investment; yet, despite asymmetrical power relationships, china�s mekong neighbors guard their sovereignty and maintain substantial bargaining power. china is most successful when it embraces the �preferences� it shares with them. an ongoing debate likewise undermines beijing�s dominance among china�s stakeholders, who contest the developmental model versus the environmental sustainability model, as well as the meaning of �environmental protection.�
yihiiirisimmmmmm mmmmm���ÿ����������hg,�jhg,�uhnhj<ojqj^jo(h�<;h�<;ojqj^jhih)w�ojqj^jo(h$?�h)w�5�ojqj^jhvi�h)w�5�ojqj^jo(h�<;h�<;5�ojqj^jm
mm
mmmm������gd)w�gd�01�82p��. ��a!�"�#��$��%��s����s2���� 0@p`p������2(�� 0@p`p������ 0@p`p������ 0@p`p������ 0@p`p������ 0@p`p������ 0@p`p��8x�v~�������� 0@�� 0@�� 0@�� 0@�� 0@�� 0@�� 0@�� 0@�� 0@�� 0@�� 0@�� 0@�� 0@�� 0@pj_hmh nhsh thj`��jck�e$1$a$ cjkh_hajmh nhsh th$a ���$؞���k=�w[sobi���bnf�h�&��ŝ�]�6��ҩ��n=���in����a7���qb&>!"�h
[�� �lx�z)��w�v�og�%�ţ|8mă#�/��8��'��=���q�u*��c�`c�w{�d6��/�[��yl���%�� ��n� {�\�o�sm�/�~��i�bcax���/=xe��'5��&\�h�4da���,ye\}�)�l�a�����r�^��*�z���y�v-wowz�n�]��:m�v�=t�c���w��r�b���*i�v�u�r��u����|�nc`�|����*^����pk!
ѐ��'theme/theme/_rels/thememanager.xml.rels��m
�0���wooӻ�&݈э���5
6?$q��
�,.�a��i����c2�1h�:�q��m��@rn��;d�`��o7�g�k(m&$r(.1�r'j��њt���8��v�"��aȼ�h�u}��|�$�b{��p����8�g/]�qasم(����#��l�[������pk-!����[content_types].xmlpk-!�֧��60_rels/.relspk-!ky���theme/theme/thememanager.xmlpk-!���f���theme/theme/theme1.xmlpk-!
ѐ��'� theme/theme/_rels/thememanager.xml.relspk]�
~(r���� 2 �>�!s'�-yim !"'<mm(�@� @���������h ��0�( �
����0�( �
��b
�s���� ?�����ckd k � � �����w~��qv.2kraig t � � � � � � �"�"�%�%�%�%u&^&p(r(s(u(v(x(y({((p((m3p(r(s(u(v(x(y({((%'/247:<??i�����������*,,6�����������}���
mw������cmlw����akju$ & & 0 � � � � ;$=$=$h$�$�$�$�$o((��q04e��n[g],-�o�����`<|��o";0ri1�%�rrsui��w�i�={u�,� uz*�m� �r=��-9h�s��eme�.~��
{r�v�4�1l2q �"�iaha��og>�u��`�1_%v��nh{��q��u�3�d]-�z:kkkkn;�q0�<�?*�7��:a��^b� �l{��2h�(�#!�q��m4-cqrrs�4>�p]�sao-�?��yn�b~i�(��)ib��>!]�.�`
rv:g&>!��}n!�l��2�"�0r��\�|�md-%;�blrbr]�a
6ji� ��vj�`�[jo 5j90�ry �:[u9_ �
k 3q-r�jx 8i� tp� k�|�$qk
2~�
��y��k�
?i��� *�?=��#??*�@�4le�dw"
���z�g�kd�2�^e�-h2wt�x�w��t�bs &�x�-z�y��w�i�>�:-��u
kkkkdw"
q�x�-h�
k^r�
�^�vxb�
�=#�/y�pur ����
��'ff�x-z�d�y�(��)fk{z��fv��-ae��p�'�e��4�!~q�2h`�?i��be��@��fk-<"��l�q�u��y/�x{��]^�~76=&����`
[� ��rh&<�^��oc!��d{�/�"���[��h�2��d���t��w�8i� (f�tl(����}�t�a9�~�8��7l��4�";�g)n��p7v}g�xd|��&�h�w�a�g�b�u�d\*�)#jb�l�d�
)r�}��w�gl$l��r�qh� v���/xcz.�^m~;�|p%�fzps7l�ps�#���<>)��s��vj��h5h 5� a�l[�x� xcz�be�yfdxl�y��raj>�n�cr%v��h�a9�� !`��}<�q�}q =�7y]��r�-��.��zf�7��
�e�o[kh,~�hmpm~�mg�=�j��>m�?[%��'w�jo8-��l�y2\gqwez ��p]74�`a��m�!�|z��z:�*��b!�g;cq�qq�h�nk^r a�x�t
an�gap�y8��x���s��d���z��j�vzq��t\
~��av'po�_m4�i�w��tkpb�`
rq1��yn�pur �p}��� urep�&>!�z[fxx)!�b!x{�ec!�t�k��oc!�v�>b(p!� ]!�3�l��!nr�q�m�!�j#�g-�!�f�d�[z"�u&z�6'�"�zy�q �"ji�_��m�"� ]!�&�"�)��/�"|z�s\�"=v�g��~#�)9~��k#�� �i3#�#?�=#�i\;�j#p%�sh�#���2k�#�|�#ry �ps�#pb��9�#�sa�d $��yj!4$�`�%�qg$�ep$�"e<@v�$:*�$�[��p�$�]'��?[>�?z]%�`�%vd�i1�%�lyk-,�%�,�=��l�%�z�@�x�%�!0��e&poq�bs &�b*&t�(6=&�'w�rh&2\�qp&nyvc��t�&��&�]'�ep$�tw�'~d:(�r�'�kl��>�'��5�l�'�taz��w(r�@�~d:(�_(it~tl(�x�,�dm�(�t�(�pi�(��]�a#�(�j�`�<>)^e��w)!,�f���)�l�%��)mq{�"*�^�i��le*^l�x�ne*n9��^�*�:8t��[? �v ��o�(s� qh� �`� q�f�� {p���c,@�i��#,�dq[mk, @p�qb,�d&d��,�>m��x�,�{u�,�@�q>,-�m4-rt�h�fk-�r�-�j�n�2@�-�ggc���-x*�y���->o.-dt��t�.��z]�.�x��<}7/d|���y/ds}���/: o=tj�/0�u0{z�o�!0�ran 0gy|�5j90�$�}�;1�0��efw2
�z��>2"o�m�29!"e�w�2�f\�h�2n�~�w�3ui�� �3dj�u�3��x@�4�;�4�d5��p�4@l�5h 5�^b^�
-a5�pv5�d5tw�'��5��5md-�b�5i�d��j�5�v�5
-a5�a
6�`d�#6ghch�81�6�&7��6�a�r!�6q1���@�6xx�6)1:t�&7�x�\�x 7�~74\�7bd9t=r�7��gr
f8c�]��jo8�~�8���8��b�n9?oi�q�9�a:�kx_�s�:kkkk�3�:�!�q�o";�4mjjo;�i\;�%�|c;�q��viu;�ru�;�~7�[u�u�`fr>�>�'i�>r]��v�>lrb�mt?<#iq!{�?p[5=�tf�?�t�&�?�*��o-�?�mt?�s�?
u|3e�?�-x{�8�?�,�?�@}��*.}@��)��-�@�t�`�r�@g��z�@z]%hag;��:a�s6ay8���doahu�(�a�le*�&e�ana��.�an���a�$,&d]�l�d|1�q�i�dbl#g�>e�\���ez�v�n�e�v ��'�e�#�c�hfs�]�=bdf�^^n��z[f�y���f�"�o w~g� l`�#�g�{9=��g=v�g�o�t�{s
h�-h�pv5p@h�og�ghch'\l��&�h�t�e�hoaq�!~q��y#%�q@gku�nr�q�q��qqg$�r)b;r�,�q��0hr�l��zwr�
{r;1�0��y{r�i�r�� �(u�r�$atxcs�#sw/�=fzps8ts)b;r��ts�#�g3%�s�{�s�;�4��g/t�4>�:8t�gn�bd9t]z[t� �m��td $�`�t�s��,!u�rdi�@gku�u0
g�u���uxcs>�uc;�rxyyv�d�^�v4�o�v�j$w�w�w�6�x�m�2:3�x�q�y���x�3�:��o�x�#s��x^l�x\<�jg�xq>,- q�x�}<��x_/,j�zy��t��`-y<myv��q�yv^mc���y<z�&xfk{z�kd
�zhp��[�enx�:[�=�^�`
[�0�[(>y��f\�?\i�(��\�m��x�\~�f<1/�\�s���7y]�>aqs�]���c�]hv�i���]viu;�]^ph$^�^b^�`.�^�=�^�1_�kx_�a9�ji�_l{�� !`�qb,�� l`�y`� ��t�`�=�}�j�`�qq��u�`�>�`_m�t
a��&na[mk,�9a��q���a��5��>�asq�y�3j�a�zwr�a�t�3b@�z��)ib�u~b1�h��u�b�~#�%;�b@v�$03cd.�bka:c�ggcg-�!�va�c�^����c(�a�u�c�0hr��#�c�j$wvd0q|�`d�d&d�@�m�f�d,-�zn�d�|�#�9!"e2k�#�g e�/e� *^ee����l\e�>e��eme�hgqwe�u
�t�edu�efd��&fji�,\f<}7/��zfs{tq�f3%�s!,�fqx{~�fxx�6�a�f6�f<z�bl#g�^blkqg�j9r��g8|k=�z�g�-9h�k?oi�u�<mebi�rdi�b*&��b~i�y{r4�i�`-y�^�ix�u�nf�i�~7djtj�/v,�j�8�?w�j�`�t�=�j�4�q\<�j�dk�g�tkzl!{�?�klv:g��3�l<|�<ie�lj l�^(m��k��.�mz*�ma�� �m�hn�y`�gn��!�g)nfr>��^^nv��,mn�kj>�nh#�n�gv'po�
���"�o�"�o6gp�e�oh��.�o�r��v�omg���o]z[thptf�?(ap(s� @p�[? bep=r�7�c�p�qp&��dq�vzq� �<#iq�!�q� ���qq =��,�q�w�#!�q{s
h�4�q�a�f�l�q|1�q6s�~r�q3q-rie�l��j9r �3�c;�rn[g� �r�-�@�y0�sb(p!un�s��s{fm-dt�y�)1:to
�v�$at�6�x� 0w?0w?0w?0w?�.�t�/e��t(ap�}�t�o�t�u2�&xph$^�enx[�x,mnf�x&xn
�x�0�<�=.y6�f�� oyrgox*�y�x�u��yd]-sq�y7���yxl�y�t�.��y];yw��y�w��u&z�*n{��tazr=��whkzjx �.tzji��z@�z�.�o���z�`�o��%�z�q�wv{�nh{$,&d�*n{�s�?mq{
hr{��6�jbs{�-x{qx{�@�6m�{�d��0q|�~�vgy|��s�
u|�[|�w)�\�| w~g;�|�g ek�|�.�t�y>�|b�5�ds}xyyv�p}�r>�$�}dm�(�m�}j<�v��=�}jbs{�q�}\
~�=�h,~03c��)9~whkzit~�;�~j{�~0�n�n�~l�s{t�<(>y\*�4e�z �j�{p�4\�7��(k�i����x��m�j�����[w�3`2 r� �p
j^�n�_ati�wbx��]�.h j<sh�tyo>s�r#�l$�:&�}&�m'�m(�)�g)%j,�p.�i/�2�z2'4t4.6�6*8;i8cj8�9�<;�i;�e=k&>e!@jj@r7a�ec�nd�udvf0fg0i4tj�kul%mnan�%smkxgy�pys0\�]�^ro_5a�7ahc
2e�lf�qf�)g�/ijmi9"j�ckalthllmnnm}on[r�ps0@ui1vywicyc|�x}�/�\ �wt�mw��=��=��`�j�nj��9�l�.~�v���=h��j��~�du�� �=i�fj�to�4��m�}��2�)w���lz���c�7�u<�[��t��r�������cb��^�v��\�a�vi�|w�r������,�$?��n�u ��
��!�s/����8�*��-��_�$-��8����f�g,�y�><����r��c��q�7"����s�?5����"�gl�bj�h��-���
��"�l%�w�p�2����y����e�`-�|�p(r(�@�2222p��
����!n#~(��@��0@�"�h@�*�`@��@��unknown������������g��.�[x� �times new roman5��symbol3.��.�[x� �arial7.���[ @�verdana;���(�[sosimsuna����$b�cambria math 1��h;"�fꂲ��` g"i g"i!-!),.:;?]}���� & 6"0000 00
00000��� ������=�@�\�]�^���([{� 0
000000��;�[����������\(\( 2�q��hp��?�����������������������"�2!xx��!����userlib-x��
�����oh�� '��0t������� ��
(4<dl�usernormallib-x172microsoft office word@@�,1@�y��\�@4��a� g"��
��՜.�� ,��0�
x`t|�������microsofti\(
!"#$%&'()���� ,-./01����3456789:;<=>?@abcdefghijklmnopqrstuvwxyz[\����^_`abcd����fghijkl��������o��������������������������������������������������������������������root entry�������� �f04��a�q�data
������������*1table����2@tworddocument����2rsummaryinformation(������������]documentsummaryinformation8��������ecompobj������������n������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������
���� �fmicrosoft word 97-2003 �ĵ�
msworddocword.document.8�9�q