-k8凯发棋牌
��ࡱ�>�� tw����s��������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������u �r��wbjbj�n�n2^��a��a�.
�������""������������8�le�lqlaaaaa���p
p
p
p
p
p
p$�r�nu<1p�������1p��aa4q������a�ap��p���a������f������c��oq0lq��usf�u���0�u��l@��������1p1p� ���lq�������������������������������������������������������������������������u���������"qs: journal of contemporary china
volume 33, issue 146, march 2024
1. title: the chinese conception of cybersecurity: a conceptual, institutional, and regulatory genealogy
authors: creemers, rogier.
abstract: how does the chinese government define cybersecurity? security in the digital realm has gained increasing prominence in recent years, both within china�s domestic policy landscape and in its participation with global digital governance. however, the chinese conception of this term is different from the western one, and is embedded within the country�s distinctive political, economic and technological context. drawing on chinese government documents, this paper will trace the evolution of how successive generations of chinese leaders have identified digital security concerns, and how they have deployed institutional, regulatory and policy tools to respond to them.
2. title: china s artificial intelligence ethics: policy development in an emergent community of practice
authors: qiao-franco, guangyu; zhu, rongsheng.
abstract: extant literature has not fully accounted for the changes underway in china s perspectives on the ethical risks of artificial intelligence (ai). this article develops a community-of-practice (cop) approach to the study of chinese policymaking in the field of ai. it shows that the chinese approach to ethical ai emerges from the communication of practices of a relatively stable group of actors from three domains�the government, academia, and the private sector. this chinese cop is actively cultivated and led by government actors. the paper draws attention to cop configurations during collective situated-learning and problem-solving among its members that inform the evolution of chinese ethical concerns of ai. in so doing, it demonstrates how a practice-oriented approach can contribute to interpreting chinese politics on ai governance.
3. title: why did china�s zero-covid policy persist? decision urgency, regime type, and political opportunity structures
authors: shu keng; zhong, lingna; xie, fang.
abstract: despite soaring social costs, opposed professional opinions, and divergent foreign experiences, china still persisted with its zero-covid policy. preexisting theories of policy change are unable to explain the continuation of china�s covid policy. corresponding to the three stages of policy making, implementation and adjustment, the authors propose a framework of three decision-making constraints: (1) decision urgency, (2) regime type, and (3) political opportunity structures, which are believed to jointly shape china�s policy against omicron and obstruct chinese decision-makers from adjusting it. this intensive case study enriches understanding of china�s covid policy specifically and the policy process in china more generally.
4. title: exploring the social dynamics of public stigmatization in china of wuhanese during the initial outbreak of covid-19: a moral panic analysis
authors: he, longtao; jean, jason allan; lu, yixi; pan, yangu.
abstract: during the initial outbreak of covid-19 in china in 2019 and 2020, the wuhanese suffered tremendous public stigmatization. why and how did the general public in china develop such strong feelings against the wuhanese? to address these questions and understand the social forces underlying this phenomenon, a moral panic analysis was conducted. using a mixed-method design, this research examined the scale and mechanisms of the public stigmatization of the wuhanese as �the folk devil� of a moral panic and identified the social factors (social media, the collective memory of sars, and the influence of close relations) which produced and facilitated the initial panic and subsequent public stigmatization. through its presentation and analysis of quantitative and qualitative data, this article explains how public stigmatization has served as an effective social control instrument in china during the covid-19 outbreak, used to contain the disease, garner strong public support for the government authorities, legitimize extreme methods used to implement containment policies, and monitor and restrict the population.
5. title: the initial digitalization of chinese diplomacy (2019�2021): establishing global communication networks on twitter
authors: thun�, mette; nielbo, kristoffer laigaard.
abstract: the way in which chinese diplomats communicate has changed recently, from being mostly reactive and pragmatic to being rhetorically more combative. this has generated strong academic, media, and policy interest. however, less academic attention has been devoted to the employment of social media for china�s new diplomatic communication strategy. by analyzing the recent employment of twitter by china�s ministry of foreign affairs (mfa), this article explores the initial digitalization of china�s public diplomacy from november 2019 to february 2021. approaching twitter as both a virtual network structure and an interactive strategic communication process, we collected 61,000 tweets from chinese diplomats plus 282,000 tweets from chinese official media and applied data analytics to examine how the mfa augmented its diplomatic digital presence by responding, reposting/retweeting, mentioning, and hashtagging. we also used discourse analysis to investigate how chinese diplomats selected topics to generate, diffuse, and affect hegemonic discourses. we argue that china�s mfa initially adopted twitter using a centrally controlled structure of topic, rhetoric, and discourses as well as cohesive dissemination and augmenting strategies. these communication structures created a self-referencing network closely aligned with chinese official media on twitter.
6. title: twitter, public diplomacy and social power in soft-balancing china france relations
authors: tran, emilie.
abstract: this article is part of the special section on china�s twitter diplomacy. arguing that the concepts of hard power and soft power may no longer reflect the ever-intricate state of global politics in the twenty-first century, it intersects two distinct concepts in international relations, peter van ham�s social power and robert pape�s and t.v. paul�s soft balancing theory, to examine china�s public diplomacy and its outcomes in the covid-19 era (2019�2023). it is a case study of the communication strategies of the chinese embassy in paris, whose ambassador, lu shaye, proudly presents himself as a wolf warrior diplomat. to untangle china s social power and soft-balancing mechanisms in sino-french relations, this article uses quantitative and qualitative mix-methods, applied to three distinct datasets: n = 9,162 tweets from three chinese diplomatic accounts in france; interviews and reports in the french broadcast and printed media; and foreign policy documents and statements. it shows that china s social power consists of mainly place branding, while some of its communication attempts to frame certain issues and set the agenda in china�france relations and global affairs, by undermining, frustrating and delegitimizing, that is soft-balancing, the french and the west at large.
7. title: china�s twitter diplomacy in germany: practices, reactions, and discrepancies
authors: yu-chin, tseng.
abstract: china s digital public diplomacy on social media and the ways in which chinese diplomats communicate have received international attention and generated academic interest. as the first study to conduct country-specific investigation on how chinese diplomats in germany practice digital public diplomacy on twitter, this article examines their communication strategies based on twitter data collected from verified accounts of chinese diplomats in germany during the part of the pandemic from january 2020 to february 2021. the study also identifies discrepancies between the actual practices of china�s twitter diplomacy in germany and media perception of china�s twitter diplomacy represented by relevant news articles from two german mainstream newspapers, frankfurter allgemeine zeitung and the s�ddeutsche zeitung in 2020. the discrepancies, the author claims, can be attributed to the process of othering china, i.e. framing china as the other, that eventually compromises the effectiveness of china�s communication strategies. seeing china�s twitter diplomacy as network-centric public diplomacy with chinese characteristics, this article depicts the ways in which the case of germany contributes to the understanding of the global communication network of china s public diplomacy on twitter by showing its country-specific communication strategies.
8. title: the evolution of american contemporary china studies: coming full circle?
authors: shambaugh, david.
abstract: in the nearly 75 years that the people s republic of china has been in existence, the field of contemporary china studies in the united states has developed and evolved through six distinguishable generations of scholarship. the evolving social science scholarly analyses of contemporary china have paralleled the changes in the prc itself over time, but they have also reflected paradigmatic changes in scholarly disciplines in the united states. other stimuli which have also impacted the field include domestic politics in america and shifts in us-china relations. this article traces the evolution o:<jn^dhrx|~���r t d ��ʸʸʦ��tl_qc6qhj�5�ojqj^jo(h�-�h�-�5�ojqj^jh�"�hu<�5�ojqj^jh�ud5�ojqj^jo(h�"�h�"�o(&h�"�h�"�5�cjojqj^jajo(h!@�5�cjojqj^jajh
2e5�cjojqj^jaj#h�qh�q5�cjojqj^jaj#h�.h�.5�cjojqj^jaj#h�"�h�"�5�cjojqj^jaj h$-�5�cjojqj^jajo(#h�-�h�-�5�cjojqj^jaj<~��t � ���
bc� ���9:���"�����������������������gd�psgd)w�gd�-�gd$?�gdto�gd�l$gd%j,gdu<�gd�"�$a$gdt4d f � � � � ��������
�
�
�
(*abc���˽�����|��l|��l|^�peh%j,5�ojqjo(hihu<�ojqj^jo(hih�l$ojqj^jo(hvi�h�l$5�ojqj^jo(h�l$h�l$5�ojqj^jh�l$5�ojqj^jo(hj�5�ojqjo(hiht4ojqj^jo(h�-�h�-�ojqj^jhihj�ojqj^jo(h�"�hu<�5�ojqj^jht45�ojqj^jo(h�-�h�-�5�ojqj^jhicy5�ojqj^jcdeflm���� ����������²��ж�|qdvh;h$?�5�ojqj^jo(h$?�h$?�5�ojqj^jh�"�h%j,5�ojqj^jhs/�5�ojqj^jo(h%j,5�ojqjo(hihanojqj^jh�"�h�"�ojqj^jh�)hto�ojqj^jo(h�-�h�-�5�ojqj^jhvi�hto�5�ojqj^jo(h� h� 5�ojqj^jhto�hto�5�ojqj^jhto�hto�h�"�h�`�5�ojqj^jhto�5�ojqj^jo(*,����89:;=cd��������ƹ�ӛ�tgykg�=kg�hvi�h�ps5�ojqj^jh�psh�ps5�ojqj^jh�"�h)w�5�ojqj^jh�ps5�ojqj^jo(h)w�5�ojqjo(hvi�h%j,ojqj^jo(h�[�h�[�ojqj^jh�)h$?�ojqj^jo(h�-�h$?�5�ojqj^jo(h�-�h�-�5�ojqj^jh$?�5�ojqj^jo(h$?�h$?�5�ojqj^jhvi�h$?�5�ojqj^jo(h�[�h�[�5�ojqj^j�����"�"�"�"�"�"�"r#t#d#f#�#�#�#�#�*�*�*���ǹ�����wi�[m���@��h�yrh�yrojqj^jh�-�h�-�5�ojqj^jhvi�hvi�5�ojqj^jhvi�hr7a5�ojqj^jh�yrh�yr5�ojqj^jhr7ahr7a5�ojqj^jh�"�h)w�5�ojqj^jhr7a5�ojqj^jo(h)w�5�ojqjo(hvi�h)w�ojqj^jo(h�[�h�[�ojqj^jh}onh)w�ojqj^jo(h$?�h)w�5�ojqj^jhvi�h)w�5�ojqj^jo(�"�"t#�#�*�*3 ",�2�2z3�3m m�m�m_q`q�q r�w�w�w�w�w������������������������gd�gd�_gdlz�gd�)ggd�-�gd|�gdr7agd)w��*�*�*�*�*2 3 , ,",4,6,�2�2�2�2�2�2�2x3����ɻ���tf[n�@n2h�^)h�^)5�ojqj^jh�)gh�)g5�ojqj^jh�)g5�ojqj^jo(h)w�5�ojqjo(hvi�h)w�ojqj^jo(h�s�h�s�ojqj^jh}onh)w�ojqj^jo(h$?�h)w�5�ojqj^jh�-�h)w�5�ojqj^jo(h�-�h�-�5�ojqj^jhvi�h|�5�ojqj^jh�s�h�s�5�ojqj^jh|�h|�5�ojqj^jh�"�h)w�5�ojqj^jh|�5�ojqj^jo(x3z3�3�3�3�3�3�3?7lmm m
mmmm�m���ȸ�����tgyk>0h[=zh[=z5�ojqj^jhlz�5�ojqj^jo(hlz�hlz�5�ojqj^jh�"�h)w�5�ojqj^jhr5�ojqj^jo(h)w�5�ojqjo(hvi�h)w�ojqj^jo(uh�^)h�^)ojqj^jhih)w�ojqj^jo(h$?�h)w�5�ojqj^jhvi�h)w�5�ojqj^jo(h�-�h�-�5�ojqj^jh�)g5�ojqj^jo(h�)gh�)g5�ojqj^jhvi�h�)g5�ojqj^jf field (as observed and interpreted by the author); it concludes that while the field is generally very healthy, diverse, and enjoys great breadth and depth of knowledge, it faces significant new challenges for source material and research in xi jinping�s china.
9. title: the nexus between china�s global image and attitudes toward diasporic chinese: a comparison of australia and the united states
authors: tan, xiao; rennie, lee; ruppanner, leah.
abstract: the covid-19 pandemic intensified unfavorable international news coverage of the chinese government with consequences for the chinese diaspora broadly. to understand these relationships, we conducted surveys in australia and the united states from 8 to 21 june 2021. using a survey experiment, we find a significant negative impact of the chinese government�s early handling of covid-19 on public sentiment toward the chinese government in australia but not in the united states. in both countries, expressing unfriendly feelings toward the chinese government tends to harm chinese temporary residents more (compared to permanent residents). the associations between attitudes toward the chinese government and diasporic chinese differ significantly across demographic groups but overall, holding cold attitudes toward the chinese government has stronger negative implications for diasporic chinese in australia.
10. title: hoping for the best, preparing for the worst: china�s varied responses to us strategic competition
authors: zhang, baohui.
abstract: america s embracement of a competition posture against china has redefined their bilateral relationship and reordered the latter s strategic environment. however, how china has responded to us strategic competition has been understudied. this study seeks to fill the gap by using structural realism to gauge china�s reactions. it argues that china�s periodic confrontations with the united states, such as the one over nancy pelosi�s taiwan visit, do not define its strategy towards the united states. in fact, this strategy incorporates three components: binding, balancing, and competition. china continues to seek to bind further with the us to limit washington�s ability to shift towards a full containment posture. as the same time, china has also been pursuing bolder or new balancing and competition measures to safeguard its security and influences. while binding represents china �hoping for the best�, balancing and competition show it is �preparing for the worst�. china�s balancing and competition measures have only further intensified the strategic rivalry with the us, even though beijing prefers as much cooperation with washington as possible.
�m�m�m�m�m�m�m^q_q`qbqdqjqkq�q�qrr���ŷ����vhzm?1z�hvi�h�_5�ojqj^jh�~ch�~c5�ojqj^jh�_5�ojqj^jo(h�_h�_5�ojqj^jh�"�h)w�5�ojqj^jhr5�ojqj^jo(h)w�5�ojqjo(hvi�h)w�ojqj^jo(h[=zh[=zojqj^jhih)w�ojqj^jo(h$?�h)w�5�ojqj^jhvi�h)w�5�ojqj^jo(h�-�h�-�5�ojqj^jhlz�hlz�5�ojqj^jhvi�hlz�5�ojqj^jr r2r4r�w�w�w�w�w�w�w�w�w�w�w���ǹ���������h�|njh�|nuhoshj<ojqj^jo(h�~ch�~cojqj^jhih)w�ojqj^jo(h$?�h)w�5�ojqj^jh�-�h)w�5�ojqj^jo(�w�w�w�w�w�w�w������gd)w�gd�01�82p��. ��a!�"�#��$��%��s����s2���� 0@p`p������2(�� 0@p`p������ 0@p`p������ 0@p`p������ 0@p`p������ 0@p`p������ 0@p`p��8x�v~�������� 0@�� 0@�� 0@�� 0@�� 0@�� 0@�� 0@�� 0@�� 0@�� 0@�� 0@�� 0@�� 0@�� 0@pj_hmh nhsh thj`��jck�e$1$a$ cjkh_hajmh nhsh th$a ���$؞���k=�w[sobi���bnf�h�&��ŝ�]�6��ҩ��n=���in����a7���qb&>!"�h
[�� �lx�z)��w�v�og�%�ţ|8mă#�/��8��'��=���q�u*��c�`c�w{�d6��/�[��yl���%�� ��n� {�\�o�sm�/�~��i�bcax���/=xe��'5��&\�h�4da���,ye\}�)�l�a�����r�^��*�z���y�v-wowz�n�]��:m�v�=t�c���w��r�b���*i�v�u�r��u����|�nc`�|����*^����pk!
ѐ��'theme/theme/_rels/thememanager.xml.rels��m
�0���wooӻ�&݈э���5
6?$q��
�,.�a��i����c2�1h�:�q��m��@rn��;d�`��o7�g�k(m&$r(.1�r'j��њt���8��v�"��aȼ�h�u}��|�$�b{��p����8�g/]�qasم(����#��l�[������pk-!����[content_types].xmlpk-!�֧��60_rels/.relspk-!ky���theme/theme/thememanager.xmlpk-!���f���theme/theme/theme1.xmlpk-!
ѐ��'� theme/theme/_rels/thememanager.xml.relspk]�
/^���� d c��*x3�mr�w !#$,-�"�w�w".�@� @���������h ��0�( �
����0�( �
��b
�s���� ?��������������hk�������dl������&���
�
��������}�zdelu���"".&7&y*_*�.�.�.�.�.�.�.//�./a�.�.�.�.�.�.�.//%'/249<>aak����pqq{��
accm���
�
�
����8::d����jllv��������2<lw�!�!�!�!�!"""�%�%�%�%&&>&i&�)�)�)�)h*r*a*l*�./��q04e��n[g],-�o�����`<|��o";0ri1�%�rrsui��w�i�={u�,� uz*�m� �r=��-9h�s��eme�.~��
{r�v�4�1l2q �"�iaha��og>�u��`�1_%v��nh{��q��u�3�d]-�z:kkkkn;�q0�<�?*�7��:a��^b� �l{��2h�(�#!�q��m4-cqrrs�4>�p]�sao-�?��yn�b~i�(��)ib��>!]�.�`
rv:g&>!��}n!�l��2�"�0r��\�|�md-%;�blrbr]�a
6ji� ��vj�`�[jo 5j90�ry �:[�
k 3q-r�jx 8i� tp� k�|�2~�
��y� v�
�k�
?i��� *�?=��#??*�@�4le�dw"
���z�g�kd�2�^e�-h�x�w��t�bs &�x�-z�y��w�i�>�:-��u
kkkkdw"
q�x�-h�
k^r�
�^�vxb�
�=#�/y�pur ����
��'ff�x-z�d�y�(��)fk{z��fv��-�p�'�e��4�!~q�2h`�?i��be��@��fk-<"��l�q�u��y/�x{��]^�~76=&����`
[� ��rh&<�^��oc!��d{�/�"���[��h�2��d���t��w�8i� (f�tl(����}�t�3*�a9�~�8��7l��4�";�g)n��p7v}g�xd|��&�h�w�a�g�b�u�d\*�)#jb�l�d�
)r�}��w�gl$l��r�qh� v���/xcz.�^m~;�|p%�fzps7l�ps�#���<>)��s��vj��h5h 5� a�l[�x� xcz�be�yfdxl�y��raj>�n�cr%v��h�a9�� !`��}<�q�}q =�7y]��r�-��.��zf�7��
�e�o[kh,~�hmpm~�mg�=�j��>m�?[%��'w�jo8�l�y2\gqwez ��p]74�`a��m�!�|z��z:�*��b!�g;cq�<�qq�h�nk^r a�x�t
an�gap�y8��x���s��d���z�jd�j�vzq��t\
~��av'po�_m4�i�w��tkpb�`
rq1��yn�pur �p}��� urep�&>!�z[fxx)!�b!x{�ec!�t�k��oc!�v�>b(p!� ]!�3�l��!nr�q�m�!�j#�g-�!�f�d�[z"�u&z�6'�"�zy�q �"ji�_��b�"�m�"� ]!�&�"�)��/�"|z�s\�"=v�g��~#�)9~��k#�� �i3#�#?�=#�i\;�j#p%�sh�#���2k�#�|�#ry �ps�#pb��9�#�sa�d $��yam $j!4$�`�%�qg$�ep$�"e<@v�$:*�$�[��p�$�]'��?[>�?z]%�`�%vd�i1�%�lyk-,�%�,�=��l�%�z�@�x�%�!0��e&poq�bs &�b*&t�(6=&�'w�rh&2\�qp&nyvc��t�&��&�]'�ep$�tw�'~d:(�r�'�kl��>�'��5�l�'�taz��w(r�@�~d:(�_(it~tl(�x�,�dm�(�t�(�pi�(��]�a#�(�j�`�<>)^e��w)!,�f���)�l�%��)mq{�"*�^�i��le*^l�x�ne*n9��^�*�:8t��[? �v ��o�(s� qh� �`� q�f�� {p���c,@�i��#,�dq[mk, @p�qb,�d&d��,�>m��x�,�{u�,�@�q>,-�m4-rt�h�fk-�r�-�j�n�2@�-�ggc���-x*�y���->o.-dt��t�.��z]�.�x��<}7/d|���y/ds}���/: o=tj�/0�u0{z�o�!0�ran 0gy|�5j90�$�}�;1�0��efw2
�z��>2"o�m�29!"e�w�2�f\�h�2n�~�w�3ui�� �3dj�u�3��x@�4�;�4�d5��p�4@l�5h 5�^b^�
-a5�pv5�d5tw�'��5��5md-�b�5i�d��v�5
-a5�a
6�`d�#6ghch�81�6�&7��6�a�r!�6q1���@�6xx�6)1:t'o7�&7�x�\�~74\�7bd9t=r�7��gr
f8c�]��jo8�~�8���8��b�n9?oi�#�9�q�9�a:�kx_�s�:kkkk�3�:�!�q�o";�4mjjo;�i\;�%�|c;�q��viu;�ru�;�~7�rn:<[u�u�`fr>�>�'i�>r]��v�>lrb�mt?<#iq!{�?p[5=�tf�?�t�&�?�*��o-�?�mt?�s�?
u|3e�?�-x{�8�?�@}��*.}@��)��-�@�t�`�r�@g��z�@z]%hag;��:a�s6ay8���doahu�(�a�le*�&e�ana��.�an���a�$,&d]�l�d|1�q�i�dbl#g�>e�\���ez�v�n�e�v ��'�e�#�c�hfs�]�=bdf�^^n��z[f�y���f�"�o�?ug v�
��� w~g� l`�#�g�{9=��g=v�g�o�t�{s
h�-h�pv5p@h�og�ghch'\l��&�h�t�e�hoaq�!~q��y#%�q@gku�nr�q�q��qqg$�r)b;r�,�q��0hr�l��zwr�
{r;1�0��y{r�i�r�� �(u�r�$atxcs�#sw/�=fzps8ts)b;r��ts�#�g3%�s�{�s�;�4��g/t�4>�:8t�gn�bd9t]z[t� �m��td $�`�t�s��,!u�rdi�@gku�u0
g�u���uxcs>�uc;�rxyyv�d�^�v4�o�v�j$w�w�w�6�x�m�2:3�x�q�y���x�3�:��o�x�#s^l�x\<�jg�xq>,- q�x�}<��x_/,j�zy��t��`-y<myv��q�yv^mc���yl�y<z�&xfk{z�kd
�zhp��[�enx�:[�=�^�`
[�0�[(>y��f\�?\i�(��\�m��x�\~�f<1/�\�s���7y]�>aqs�]���c�]hv�i���]viu;�]^ph$^�^b^�`.�^�=�^�1_�kx_�a9�ji�_l{�� !`�qb,�� l`�y`� ��t�`�=�}�j�`�qq��u�`�>�`_m�t
a��&na[mk,�9a��q�;ba��a��5��>�asq�y�3j�a�zwr�a�t�3b@�z��)ib�u~b1�h��u�b�~#�%;�b@v�$03cd.�b�ggcg-�!�va�c�^����c(�a�u�c�0hr��#�c�j$wvd0q|�`d�d&d�@�m�f�d,-�zn�d�|�#�9!"e2k�#�g e�/e� *^ee����l\e�>e��eme�hgqwe�u
�t�edu�efd��&fji�,\f<}7/��zfs{tq�f3%�s!,�fqx{~�fxx�6�a�f6�f<z�bl#g�^blkqg�j9r��g8|k=�z�g�-9h�k?oi�u�<mebi]dci�rdi�b*&��b~i�y{r4�i�`-y�^�ix�u�nf�i�~7djtj�/v,�j�8�?w�j�`�t�=�j�4�q\<�j�dk�g�tkzl!{�?�klv:g��3�l<|�<ie�lj l�^(m��k��.�mz*�ma�� �m�hn�y`�gn��!�g)nfr>��^^nv��,mn�kj>�nh#�n�gv'po�
���"�o�"�o6gp�e�oh��.�o�r��v�omg���o]z[thptf�?(ap(s� @p�[? bep=r�7^�p�c�p�qp&��dq�vzq� �<#iq�!�q� ���qq =��,�q�w�#!�q{s
h�4�q�a�f�l�q|1�q6s�~r�q3q-rie�l��j9r �3�c;�rn[g� �r�-�@�y0�sb(p!��s{fm-dt�y�)1:to
�v�$at�6�x� 0w?0w?0w?0w?�.�t�/e��t(ap�}�t�o�t�u2�&xph$^�enx[�x,mnf�x&xn
�x�0�<�=.y6�f�� oyrgox*�y�x�u��yd]-sq�y7���yxl�y�t�.��y];yw��y�w��u&z�*n{��tazr=��whkzjx �.tzjio]sz'o7�����z@�z�.�o���z�`�o��%�z�q�wv{�nh{$,&d�*n{�s�?mq{
hr{��6�jbs{�-x{qx{�@�6m�{�d��0q|�~�vgy|��s�
u|�[|�w)�\�| w~g;�|�g ek�|�.�t�y>�|b�5�ds}xyyv�p}�r>�$�}dm�(�m�}j<�v��=�}jbs{�q�}\
~�=�h,~03c��)9~whkzit~�;�~j{�~0�n�n�~l�s{t�<(>y\*�4e�z �j�{p�4\�7��(k�i����x��m�j�����os[w�3`�q2 r� �p
j^�5�n�_ati�wb��.xwh j<sh�to>s
c �r#�l$�}&b'�m'�m(�)�g)�^)� %j,�.�p.�i/�2�z2'4t4.6�6*8;i8cj8�9�f:�i;�e=k&>e!@jj@r7a�ec�nd�udvf0i4tj�kul%man�|n�lp�yr�%smkxgy�py�[�]�^ro_5a�7ahc�~c
2e�lf�qf�)gjmi�ckalthllmnnm}on[r�ps0@ui1vywicy[=z�x}�/�wt�mw��=��=��q��`�j�nj��9�l�.~�u?�v��[�*��"�=h��j��~�du�� �=i�fj�to�4��m��2�)w����l�lz���c�7�u<�[��t��r�����f
���cb��^�v��\�a�vi�|w�r�����$?��n��
��!�s/����8�*��-��s��_�$-��f�><����r��c��-�7"����s�?5����"�oa�gl�bj�h��-���
��"�l%�w�p�!@�2����y����e�`-��d�|��.�.�@�)*�)�)�<<?@abcdefghijklmnopqrstuvwxyz[\]^_`ab����defghij����lmnopqr��������uv��������y����������������������������root entry�������� �f@x�f��x@data
������������01table��������8�uworddocument
����2^summaryinformation(������������cdocumentsummaryinformation8��������kmsodatastore��������@_�f����f��w���f���eeop�g�iep���q==2��������@_�f����f��item
���� ����2properties������������ucompobj����n����������������
������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������
��
���� �fmicrosoft word 97-2003 �ĵ�
msworddocword.document.8�9�q