-k8凯发棋牌

��ࡱ�>�� ������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������u �r�хbjbj�n�n2���a��a�\ �������""������������8�d]��olyyyyy���o!o!o!o!o!o!o$hq��s<eoq������eo��yy4�o����2�y�yo��o���y�����p�y��������(� o�o0�o�:tf:t���0:t��k`��������eoeom�����o������������������������������������������������������������������������:t���������"q s: risk analysis volume 42, issue 10, october 2022 1. title: characterization of asbestos exposures associated with the use of facial makeups authors: michael holton, jennifer ellis, evan anderson, james poole abstract: there has been renewed interest in the safety of cosmetics that may contain asbestos or other elongate mineral particles at very low levels as a naturally occurring contaminant. the authors evaluated asbestos exposure during the application of facial makeups in a constructed chamber simulating a bathroom space. the facial makeups tested included products previously found to have very low or �trace� asbestos content by governmental and commercial laboratories using a variety of bulk analysis methods. tremolite asbestos was detected in five of 54 personal air samples and three of 72 area air samples in 18 simulations. the calculated geometric mean and 95th percentile task-based asbestos concentration associated with personal facial makeup use in this study, incorporating censored data, is 0.0015 and 0.0018 fiber per cubic centimeter (f/cc), respectively, with a corresponding 95th percentile 24-h time-weighted average (twa) asbestos concentration of 0.00008 f/cc for three applications per day in a simulated bathroom with no active ventilation. based on these results, cumulative non-occupational asbestos exposures confer a less than one in 1,000,000 risk of asbestos-related disease based on many typical usage patterns and less than 1/100,000 risk with upper-end lifetime usage patterns, using the us environmental protection agency asbestos risk model. 2. title: holton et al., characterization of asbestos exposures associated with the use of facial makeups. risk analysis, 42, 2129�2139 authors: murray m. finkelstein abstract: holton and colleagues have performed a risk assessment after measuring asbestos released from several samples of facial makeup. unfortunately, it is not possible to interpret or generalize their findings because the authors have not described the source(s) of the talc tested or the asbestos concentrations of the samples. the concentration of amphiboles varies widely between sources, and the authors are urged to divulge the locations of the ore bodies providing the talc for their samples, as well as the asbestos concentration of the samples, so that the results may be interpreted and possibly generalized. 3. title: authors� response to the letter to the editor on �characterization of asbestos exposures associated with the use of facial makeups� authors: michael holton, jennifer ellis, evan anderson abstract: we appreciate the opportunity to respond to the comments of the letter writer. the writer states in his letter to the editor that the findings in our publication are not interpretable and/or cannot be generalized due to the lack of understanding of the source mine and bulk content of the cosmetic talc used in the facial makeups. in brief, we performed an exposure simulation study using established industrial hygiene methods, planned and conducted by certified industrial hygienists (cihs), to assess asbestos exposures during the use of facial makeups that were found to contain very low levels of asbestos below the conventional detection limits of x-ray diffraction and polarized light microscopy. in total, 54 personal air samples and 72 area samples were collected from six different products. out of the 126 samples collected and analyzed, asbestos was only found in eight samples (five personal samples and three area samples). a 95th percentile 24-h time-weighted average (twa) result of 0.00008 fibers/cubic centimeter was calculated based on censored data and an assumed three applications per day. we believe these results may be of utility to understand the risk of low-level asbestos content in facial makeups regardless of source or bulk content, as described in our study, and do not find the writer's assertion of generalizability or interpretability to be compelling reasons not to apply our results, as is, for prospective purposes. 4. title: examining insensitivity to probability in evidence-based communication of relative risks: the role of affect and communication format authors: claire louise heard, tim rakow abstract: affect can influence judgments of event riskiness and use of risk-related information. two studies (ns: 85 and 100) examined the insensitivity-to-probability effect�where people discount probability information when scenarios are affect-rich�applying it to evidence-informed risk communication. we additionally investigated whether this effect is moderated by format, based on predictions from the evaluability and pattern-recognition literatures, suggesting that graphical formats may attenuate insensitivity to probability. participants completed a prior beliefs questionnaire (study 1), and risk perception booklet (both studies) that presented identical statistical information about the relative risks associated with two scenarios�one with an affect-rich outcome, the other an affect-poorer outcome. in study 1, this was presented graphically. in study 2, information was presented in one of three formats: written, tabular, or graphical. participants provided their perceptions of the risk for each scenario at a range of risk-levels. the affect-rich scenario was perceived as higher in risk, and, importantly, despite presenting identical relative risk information in both scenarios, was associated with a reduced sensitivity to probability information (both studies). these differences were predicted by participants� prior beliefs concerning the scenario events (study 1) and were larger for the single-item written format than graphical format (study 2). the findings illustrate that insensitivity to probability information can occur in evidence-informed risk communications and highlight how communication format can moderate this effect. this interplay between affect and format therefore reflects an important consideration for information designers and researchers. 5. title: information seeking and risk reduction intentions in response to environmental threat messages: the role of message processing authors: elisabeth bigsby, shelly r. hovick, naomi q. p. tan, sarah n. thomas, sam r. wilson abstract: communicating complex information about environmental health risks in a single message is impossible. thus, message designers hope that risk messages encourage people to think more about the message and risks, look for more information, and ultimately make behavior changes. the presentation of information about environmental risks using threat appeals is a common message design strategy thought to increase message engagement and influence attitudes, information seeking, and risk reduction behaviors. we compared lower threat messages, which did not include explicit statements about susceptibility and severity of a risk, to higher threat messages, which did. we combined predictions from the extended parallel process model with dual-process theories of persuasion to examine whether people respond to these types of messages differently. in an online experiment, participants (n = 892) were randomly assigned to a message condition (higher or lower threat) and topic condition (arsenic, bisphenol a, or volatile organic compounds). overall, participants exposed to higher threat messages (regardless of risk topic) reported experiencing higher levels of fear. higher levels of fear were associated with more positive thoughts about the message (in alignment with the message advocacy) and fewer negative thoughts about the message (against the message advocacy), both of which influenced message attitudes. finally, message attitudes were associated with increased information seeking and intentions to engage in risk reduction behaviors. 6. title: are some narratives better than others? : the impact of different narrative forms on adolescents� intentions to text and drive authors: courtney l. scherr, helen lillie, chelsea l. ratcliff, melinda krakow, miao liu, jakob d. jensen abstract: psychological reactance theory posits individuals seek to restore freedom when threatened. communication scholars have hypothesized persuasive messages can constitute threats to freedom. the current study engages questions about the potential for different forms of narratives in public service announcements (psas) to trigger freedom threats by examining responses to a psa campaign that utilized three forms of narrative (celebrity testimonials, peer testimonials, and accident stories) to decrease adolescent texting and driving intentions. participants (n = 214) watched anti-texting and driving narratives, and completed measures of threat to freedom, anger, negative cognition, and attitudes/intentions toward texting/driving. compared to celebrity/peer testimonial psas, accident stories triggered increased anger and, indirectly, decreased intentions to drive safely. the results also suggest the need for continued examination of the best way to model psychological reactance theory, and the value of further research explicating anger as a mechanism of message effects. 7. title: cultural orientation and risk perception: development of a scale operating in a french context authors: bruno chauvin, ianis chassang abstract: cultural theory has often been invoked to explain risk preferences, yet empirical evidence for that influence has regularly been challenged. this research addresses this issue by reassessing the role of cultural orientation in understanding risk perception through the development of an alternative assessment tool of worldviews operating in a french context. using data from two samples of french citizens (n = 192 and n = 631), study 1 conducted exploratory and confirmatory factor analyses which provided support for a three-factor scale of worldviews: hierarchy-individualism, egalitarianism, and fatalism. based on data from two other independent samples (n = 111 and n = 422), study 2 affirmed, for each worldview, its convergent validity (with its counterpart in another worldview measure), discriminant validity (from all other subscales), and predictive validity (for specific patterns of risk perception). of particular interest is that culturally diverse individuals hold divergent positions on risk (skepticism, sensibility, neutrality) depending on, and in proportion to, the (in)compatibility of the hazardous activity to their preferred worldview. implications for risk management and communication are discussed. 8. title: comparative risk: dread and unknown characteristics of the covid-19 pandemic versus covid-19 vaccines authors: jody chin sing wong, janet zheng yang abstract: this research characterizes risk perceptions of the covid-19 pandemic and the covid-19 vaccines based on the dread and unknown dimensions of the psychometric paradigm. we examine if mental risk comparisons of these two risk objects influence risk mitigation behaviors (vaccination intention; vaccine acceptance; preventive behaviors) and emotional responses among unvaccinated and vaccinated americans. a survey (n = 1532) was conducted based on a nationally representative sample of u.s. adults in may 2021. results reveal considerable impact of risk comparison, especially along the dread dimension, on the outcomes of interest. in essence, this research reveals critical insights regarding vaccine hesitancy and risk communication about vaccination. 9. title: judging pharmaceutical environmental risk by its cover? the effects of prescription medication and disease severity on environmental risk perception authors: s�lvia lu�s, rita moura, maria lu�sa lima, lucia poggio, juan ignacio aragon�s, cristina camilo abstract: recent wastewater analyses performed in care homes for the elderly showed high levels of water pollution resulting from pharmaceutical waste. the way people perceive the environmental risk of pharmaceuticals can contribute to reversing this problem, but the factors that influence risk perception remain relatively unknown. the aims of the study are two-fold. we first focused on exploring the levels of knowledge regarding environment/water pollution due to pharmaceutical residues from the groups responsible for prescribing (health professionals), handling (staff), and consuming pharmaceuticals (residents) in care homes for the elderly. second, we assessed the environmental risk perception of pharmaceuticals based on two main factors: prescription medication (nonprescribed versus prescribed) and disease severity (milder versus severe disease), accounting for their level of knowledge (deficit versus sufficiency of knowledge). the study was designed based on correlational research. data were collected in homes for the elderly located in three southwestern european countries (n = 300), using self-report surveys. current knowledge was perceived to be low and the need to know more was perceived to be high, across all groups. as hypothesized, results indicated that to assess the environmental risk, participants made use of information that was unrelated to pharmaceutical persistence, bioaccumulation, and toxicity (pbt). prescribed pharmaceuticals and/or medication used to treat severe diseases were perceived as being more hazardous for the environment. simple main effects analysis comparing between knowledge levels confirmed that this effect occurred mostly when participants had knowledge deficit for disease severity but not for prescription medication. these misconceptions might discourage taking an active role in reducing the impact of pharmaceutical residues in the environment. 10. title: progressing the aerospace performance factor toward nonlinear interactions authors: oldyich `tumbauer, andrej lalia abstract: evaluation of safety performance remains central to any safety and risk management. currently, there are very few support tools and methods which allow for quantitative approach in this domain. one of the successful methods available to this end is the aerospace performance factor (apf). the method is based on hierarchical clustering of taxonomy-based safety performance indicators, using simple and intelligible formula to compute the overall safety performance signal. the work presented in this study deals with one of the apf shortcomings, namely the absence of nonlinear relations among the performance indicators to capture more accurately the risk in the assessed system. it proposes an addition of new decision criteria behind the apf method as part of the application of analytical hierarchy process (ahp), namely the impact of respective performance indicator on other indicators, regardless of their hierarchical structure. this addition leads to relative changes of performance indicators significance, where those with the highest potential for nonlinear interactions among the entire set of performance indicators are emphasized and the change in their weight ultimately leads to changes in the overall apf signal. the study results indicate that the extended apf signal is refined in terms of extremes and it draws more accurate picture about the actual safety performance, eventually supporting better identification of deviations from its acceptable values. the study was experimentally carried out in the aviation with data from the european central repository (ecr) originating from united kingdom during the years 2013�2015 and verified further on data sets from finland and denmark. 11. title: forty years of risk analysis: a scientometric overview authors: floris goerlandt, jie li abstract: risk analysis was first published in 1981, established with a vision to provide a platform for inquiry into fundamental risk-related concepts and theories, and to disseminate new knowledge about methods and approaches for identifying, analyzing, evaluating, managing, and communicating risk. the journal has also contributed significantly to a scientific understanding of specific risks related to human health and safety, engineering, ecological, and social systems. published on behalf of the society for risk analysis, the journal has become a leading platform over its 40-year history. complementing recent celebratory overviews and perspectives on the evolution, achievements, and future challenges for risk analysis, this article presents a scientometric overview of the journal between 1981 and 2020. the study presents high-level insights in the journal publication trends and structure and trends in the leading countries/regions, institutions, and authors, in relation to their respective collaboration networks. furthermore, the structure and evolution of research focus issues is analyzed, and highly cited publications are identified. the findings are primarily intended to provide high-level insights, which may be useful for early career academics and risk practitioners to understand the structure and development of the research domain, and its main contributors and topics, and for experienced researchers to reflect on the achievements and future developments. 12. title: a bayesian framework for the analysis and optimal mitigation of cyber threats to cyber-physical systems authors: piotr {ebrowski, aitor couce-vieira, alessandro mancuso abstract: critical infrastructures are increasingly reliant on information and communications technology (ict) for more efficient operations, which, at the same time, exposes them to cyber threats. as the frequency and severity of cyberattacks are increasing, so are the costs of critical infrastructure security. efficient allocation of resources is thus a crucial issue for cybersecurity. a common practice in managing cyber threats is to conduct a qualitative analysis of individual attack scenarios through risk matrices, prioritizing the scenarios according to their perceived urgency and addressing them in order until all the resources available for cybersecurity are spent. apart from methodological caveats, this approach may lead to suboptimal resource allocations, given that potential synergies between different attack scenarios and among available security measures are not taken into consideration. to overcome this shortcoming, we propose a quantitative framework that features: (1) a more holistic picture of the cybersecurity landscape, represented as a bayesian network (bn) that encompasses multiple attack scenarios and thus allows for a better appreciation of vulnerabilities; and (2) a multiobjective optimization model built on top of the said bn that explicitly represents multiple dimensions of the potential impacts of successful cyberattacks. our framework adopts a broader perspective than the standard cost�benefit analysis and allows the formulation of more nuanced security objectives. we also propose a computationally efficient algorithm that identifies the set of pareto�optimal portfolios of security measures that simultaneously minimize various types of expected cyberattack impacts, while satisfying budgetary and other constraints. we illustrate our framework with a case study of electric power grids. 13. title: spatial modeling of maritime risk using machine learning authors: andrew rawson, mario brito, zoheir sabeur abstract: managing navigational safety is a key responsibility of coastal states. predicting and measuring these risks has a high complexity due to their infrequent occurrence, multitude of causes, and large study areas. as a result, maritime risk models are generally limited in scale to small regions, generalized across diverse environments, or rely on the use of expert judgement. therefore, such an approach has limited scalability and may incorrectly characterize the risk. within this article a novel method for undertaking spatial modeling of maritime risk is proposed through machine learning. this enables navigational safety to be characterized while leveraging the significant volumes of relevant data available. the method comprises two key components: aggregation of historical accident data, vessel traffic, and other exploratory features into a spatial grid; and the implementation of several classification algorithms that predicts annual accident occurrence for various vessel types. this approach is applied to characterize the risk of collisions and groundings in the united kingdom. the results vary between hazard types and vessel types but show remarkable capability at characterizing maritime risk, with accuracies and area under curve scores in excess of 90% in most implementations. furthermore, the ensemble tree-based algorithms of xgboost and random forest consistently outperformed other machine learning algorithms that were tested. the resultant potential risk maps provide decisionmakers with actionable intelligence in order to target risk mitigation measures in regions with the greatest requirement. 14. title: the cost burden of safety risk incidents on construction: a probabilistic quantification method authors: maryam alkaissy, mehrdad arashpour, ron wakefield, reza hosseini, peter gill abstract: the construction sector is vulnerable to safety risk incidents due to its dynamic nature. although numerous research efforts and technological advancements have focused on addressing workplace injuries, most of the studies perform empirical and deterministic postimpact evaluations on construction project performance. the effective modeling of the safety risk impacts on project performance provides decisionmakers with a valuable tool toward incidents prevention and proper safety risk management. therefore, this study collected australian incident records from the construction industry from 2016 onwards and conducted discrete event simulation to quantitatively measure the impact of safety risk incidents on project cost performance. moreover, this study investigated the correlation between safety risk incidents and the age of injured workers. the findings show a strong correlation between the middle-aged workforce and the severity of incidents on project cost overruns. the ex-ante, nondeterministic analysis of safety risk impacts on project performance provides insightful results that will advance safety management theory in the direction of achieving zero harm workplace environments. 15. title: evaluating mail-based security for electoral processes using attack trees authors: natalie m. scala, paul l. goethals, josh dehlinger, yeabsira mezgebe, betelhem jilcha, isabella bloomquist abstract: since the reports of russian interference in the 2016 united states general election, the security of voting processes has received increased attention from both state and federal authorities. the declaration by the us department of homeland security in january 2017 that election systems be classified as the 17th component of critical infrastructure is just the beginning of a need for more secure voting processes. more recently, the covid-19 pandemic and the 2020 us general election have placed greater emphasis specifically on mail-based voting processes for electoral systems. the objective of this research is to provide greater insight into potential threats to mail-based voting processes. upon identifying an attack tree as an initial structure for evaluation, new t  !#* -/013<���ʻʪ�ʘ��zf^qc5hms#hms#5�ojqj^jh�"�hu<�5�ojqj^jh�ud5�ojqj^jo(h�"�h�"�o(&h�"�h�"�5�cjojqj^jajo(h�u�5�cjojqj^jajh 2e5�cjojqj^jaj#hms#hms#5�cjojqj^jaj h��5�cjojqj^jajo(hms#5�cjojqj^jaj#h�"�h�"�5�cjojqj^jaj h$-�5�cjojqj^jajo(#hms#hms#5�cjojqj^jaj012��45��jk���y��� h |&}&������������������������gd�psgd)w�gd$?�gdto�gd�l$gd%j,gdu<�gd�"�$a$gdt4��������34568>?�����������̿層��~�p~brp~brpdhih�l$ojqj^jo(hvi�h�l$5�ojqj^jo(h�_�h�_�5�ojqj^jh�l$h�l$5�ojqj^jh�l$5�ojqj^jo(hj�5�ojqjo(hiht4ojqj^jo(hms#hms#ojqj^jhihj�ojqj^jo(ht45�ojqj^jo(hms#hms#5�ojqj^jhicy5�ojqj^jh�"�hu<�5�ojqj^jhj�5�ojqj^jo(�ijklmntu�������������Ϳ��͜��͜��~�q�dvhh$?�h$?�5�ojqj^jh�"�h%j,5�ojqj^jhs/�5�ojqj^jo(hihanojqj^jh� )hto�ojqj^jo(hvi�hto�5�ojqj^jo(h�_�h�_�5�ojqj^jhto�hto�5�ojqj^j hto�hto�h�"�h�`�5�ojqj^jhto�5�ojqj^jo(h%j,5�ojqjo(hihu<�ojqj^jo(h�_�h�_�ojqj^j��xyab�����������   g h �������ǹ����xj�\nj�\>hvi�h)w�5�ojqj^jo(hvi�h�ps5�ojqj^jh�e6h�e65�ojqj^jh�psh�ps5�ojqj^jh�"�h)w�5�ojqj^jh�ps5�ojqj^jo(h)w�5�ojqjo(hvi�h%j,ojqj^jo(h�7qh�7qojqj^jh� )h$?�ojqj^jo(h$?�h$?�5�ojqj^jhvi�h$?�5�ojqj^jo(h�7qh�7q5�ojqj^jh$?�5�ojqj^jo(h q r {&|&}&~&�&�&�&�&�&''''o'p'y'z'� � � ���ƚ�����{�m�_�o��bƚh�bh�bojqj^jhvi�h)w�5�ojqj^jo(hvi�hvi�5�ojqj^jhvi�hr7a5�ojqj^jhr8�5�ojqj^jh�bh�b5�ojqj^jhr7ahr7a5�ojqj^jh�"�h)w�5�ojqj^jhr7a5�ojqj^jo(h)w�5�ojqjo(hvi�h)w�ojqj^jo(h�e6h�e6ojqj^jh}onh)w�ojqj^jo(h$?�h)w�5�ojqj^j}&'p'� � ,c,11�1�1�4�4u5�59=:=�=@>�e�ef9fll�l�������������������������gd�s�gd�_gdlz�gd�)ggd|�gd)w�gdr7a� � � � � ,,%,b,c,l,m,11111$1%1�1����ɻ�ɫ���ti\�n\@h%5�h%5�5�ojqj^jh�)gh�)g5�ojqj^jh�)g5�ojqj^jo(h)w�5�ojqjo(hvi�h)w�ojqj^jo(h��h��ojqj^jh}onh)w�ojqj^jo(h$?�h)w�5�ojqj^jhvi�h)w�5�ojqj^jo(hvi�h|�5�ojqj^jh��h��5�ojqj^jh|�h|�5�ojqj^jh�"�h)w�5�ojqj^jh|�5�ojqj^jo(�1�1�1�1�1�1�1�1�4�4�4�4�4�4�4t5���ȸ����vi[m@2h�* h�* 5�ojqj^jhlz�5�ojqj^jo(hlz�hlz�5�ojqj^jh�"�h)w�5�ojqj^jhr5�ojqj^jo(h)w�5�ojqjo(hvi�h)w�ojqj^jo(h%5�h%5�ojqj^jhih)w�ojqj^jo(h$?�h)w�5�ojqj^jhvi�h)w�5�ojqj^jo(h%5�h%5�5�ojqj^jh�)g5�ojqj^jo(h�)gh�)g5�ojqj^jhvi�h�)g5�ojqj^jt5u5^5�5�5�5�58=9=:=<=>=d=e=�=�=>>>@>���ŷ����vhzm?1z?�hvi�h�_5�ojqj^jhn4�hn4�5�ojqj^jh�_5�ojqj^jo(h�_h�_5�ojqj^jh�"�h)w�5�ojqj^jhr5�ojqj^jo(h)w�5�ojqjo(hvi�h)w�ojqj^jo(h�* h�* ojqj^jhih)w�ojqj^jo(h$?�h)w�5�ojqj^jhvi�h)w�5�ojqj^jo(h�* h�* 5�ojqj^jhlz�hlz�5�ojqj^jhvi�hlz�5�ojqj^j@>r>t>�e�e�e�e�e�e�efff f8f9fbfcfllll l,l.l���ƚ�����x�j�z��m?�����h[h)w�ojqj^jo(h��h��ojqj^jh[h)w�5�ojqj^jo(h[h[5�ojqj^jh[h�s�5�ojqj^jh��h��5�ojqj^jh�s�h�s�5�ojqj^jh�"�h)w�5�ojqj^jh�s�5�ojqj^jo(h)w�5�ojqjo(h}onh)w�ojqj^jo(hn4�hn4�ojqj^jhih)w�ojqj^jo(h$?�h)w�5�ojqj^j.l�l�lmm~m�m�m�m�t�t�t�t�t�t�t7u8uaujukutuuu�[�[����񷩛��uhz�hl��l���?�hr�hr�ojqj^jhr�hr�5�ojqj^jh�"�h)w�5�ojqj^jh�s�5�ojqj^jo(h�~�5�ojqjo(h[h)w�ojqj^jo(h1*vh1*vojqj^jhih)w�ojqj^jo(h$?�h)w�5�ojqj^jh[h)w�5�ojqj^jo(h�9�h[5�ojqj^jh�s�h�s�5�ojqj^jh[h�s�5�ojqj^jh1*vh1*v5�ojqj^j�l�m�t�t8uku�[�[;\�\lama�ab…åņƅȅʌ˅̅΅υѕх�������������������������gd�gd �gdmw�gd)w�gd�s��[�[�[�[�[�[�[:\;\d\�\�\�\�\kalamaoapaqawa���Ϳ������xj]o���h:h �h �5�ojqj^j h �h �h[h)w�ojqj^jo(h#�h#�ojqj^jhih)w�ojqj^jo(h$?�h)w�5�ojqj^jh[h)w�5�ojqj^jo(h[hmw�5�ojqj^jh#�h#�5�ojqj^jhmw�5�ojqj^jo(hmw�hmw�5�ojqj^jh�"�h)w�5�ojqj^jh)w�5�ojqj^jo(h�s�5�ojqj^jo(h)w�5�ojqjo(waxa�a�a�abbb b)e���…åąƅdžʌʅ̅ͅѕх����幫�����rjfjfjfjfrhc/@jhc/@uh7v�ha2ojqj^jo(h[h)w�ojqj^jo(uh��h��ojqj^jhih)w�ojqj^jo(h$?�h)w�5�ojqj^jh$?�h �5�ojqj^jo(hmw�h �5�ojqj^jh[h �5�ojqj^jh��h��5�ojqj^jh �5�ojqj^jo(hreats are postulated, and an updated tree is proposed that accounts for more recent activities. then, using an established assessment framework, the relative likelihood of each mail-based voting process attack scenario is identified. the results facilitate providing election officials and policymakers with greater knowledge of how mail-based voting system vulnerabilities develop as well as specific security measures that may be most beneficial.     01�82p��. ��a!�"�#��$��%��s�� ��s2���� 0@p`p������2(�� 0@p`p������ 0@p`p������ 0@p`p������ 0@p`p������ 0@p`p������ 0@p`p��8x�v~�������� 0@�� 0@�� 0@�� 0@�� 0@�� 0@�� 0@�� 0@�� 0@�� 0@�� 0@�� 0@�� 0@�� 0@pj_hmh nhsh thj`��j ck�e $1$a$ cjkh_hajmh nhsh th$a ���$ ؞���k=�w[sobi���b nf�h�&��ŝ�]�6��ҩ��n=���in����a7���qb&>!"�h [�� �lx�z)��w�v�og�%�ţ|8mă#�/��8��'��=���q�u*��c�`c�w{�d6��/�[��yl���%�� ��n� {�\�o�sm�/�~��i�bcax���/=x e��'5��&\�h�4da���,ye\}�)�l�a�����r�^��*�z���y�v-wowz�n�]��:m�v�=t�c���w��r�b���*i�v�u�r��u����|�nc`�|����*^����pk! ѐ��'theme/theme/_rels/thememanager.xml.rels��m �0���wooӻ�&݈э���5 6?$q�� �,.�a��i����c2�1h�:�q��m��@rn��;d�`��o7�g�k(m&$r(.1�r'j��њt���8��v�"��aȼ�h�u}��|�$�b{��p����8�g/]�qasم(����#��l�[������pk-!����[content_types].xmlpk-!�֧��6 0_rels/.relspk-!ky���theme/theme/thememanager.xmlpk-!���f���theme/theme/theme1.xmlpk-! ѐ��'� theme/theme/_rels/thememanager.xml.relspk]� �\����� ���h � �1t5@>.l�[waх35678:;<=>@a}&�lх49?�@� @���������h ��0�( � ����0�( � ��b �s ���� ?� /��{�$06t]!`e4$9$:$b$^-d-e-i-}-�-�-�-�-�-�0�0�5�5�5�5�5�5�<�<�<�<�<�<�?�?'c0c2c7c8c=ch h�j�j�jktp[p�p�p�q�q�q�q�q�q7sas�s�smwvwxw�w�w�w�w�w�w�w�w�w�\�\�\�\�\�\�\�\�\0���\�\32�\�\�\�\�\�\�\�\�\./����m<m<4r�v�v�v�v:w;w;wdw�w�w�\�\�\��q04e��n[g],-�o�����`<|��o";0ri1�%�rrs�tui��w�i���= {u�,� uz*�m� �r=��-9h�s��eme�.~�� {r�v �4�1l2q �"�i aha��og>�u��`�1_%v��nh{��q��u�3�d]-�z:kkkkn;�q0�<�?*� 7��:a��^b� �l{��2h�(�#!�q��m4-cqrrs�4>�p]�sao-�?��yn�b~i�(��)ib��>!]�.�` rv:g&>!��}n!�l��2�"�0r��\�|�md-%;�blrbr]�a 6ji� ��vj�`�[jo 5j90�ry �:[� k 3q-r�jx 8i� tp� k�|�2~� ��y�7>� �k� ?i��� * �? = ��#? ?*� @�4le� dw" �� �z�g�kd �2�^e �-h�x �w��t� bs &v:� �x� -z�y� �w� i�>�:-� �u kkkkdw" q�x�-h� k^r� �^�vxb� �=#�/y�pur ���� ��'ff�x-z�d�y�(��)fk{z��fv��-�p�'�e��4�!~q�2h`�?i��be��@��fk-<"��l�q�u��y/�x{��]^�~76=&����` [� ��rh&<�^��oc!��d{�/�"���[��h�2��d���t��w�8i� (f�tl(����}�t�a9�~�8� �7l��4�";�g)n��p7v}g�xd|��&�h�w�a�g�b�u�d\*�)#jb�l�d� )r�}��w�gl$l��r�qh� v���/xcz.�^m~;�|p%�fzps7l�ps�#���<>)��s��vj��h5h 5� a�l[�x� xcz�be�yfdxl�y��raj>�n�cr%v��h�a9�� !`��}<�q�}q =�7y]��r�-��.��zf�7�� �e �o[kh,~�hmpm~� mg�=�j��>m�?[%��'w�jo8�l�y2\gqwez ��p]74�`a��m�!�|z��z:�*��b!�g;cq�qq�h�nk^r a�x�t an�gap�y8��x� ��s��d���z��j�vzq��t\ ~��av'po�_m4�i�w��tkpb�` rq1��yn�pur �p}��� urep�&>!�z[fxx)!�b!x{�ec!�t�k��oc!�v�>b(p!� ]!�3�l� �!nr�q�m�!�j#�g-�!�f�d�[z"�u&z�6'�"�zy�q �"ji�_��m�"� ]!�&�"�)��/�"|z�s\�"=v�g��~#�)9~��k#� � �i3#�#? �=#�i\;�j#p%�sh�#���2k�#�|�#ry �ps�#pb��9�#�sa�d $��yj!4$�`�%�qg$�ep$�"e<@v�$:*�$�[��p�$�]'��?[>�?z]%�`�%vd�i1�%�lyk-,�%�,�=��l�%�z�@�x�%�!0��e&poq�bs &�b*&t�(6=&�'w�rh&2\�qp&nyvc��t�&��&�]'�ep$�tw�'~d:(�r�'�kl��>�'��5�l�'�taz��w (r�@�~d:(� _(it~tl(�x�,�dm�(�t�(�pi�(��]�a#�(�j�`�<>)^e ��w)!,�f���)�l�%��)mq{�"*�^�i��le*^l�x�ne*n9��^�*�:8t��[? �v ��o�(s� qh� �`� q�f� � {p���c,@�i��#,�dq[mk, @p�qb,�d&d� �,�>m��x�,� {u�,�@�q>,-�m4-rt�h�fk-�r�-�j�n�2@�-�ggc���-x*�y���->o.-dt��t�.��z]�.�x��<}7/d|���y/ds}���/: o=�*�/tj�/0�u0{z�o�!0�ran 0gy|�5j90�$�}�;1�0��eg9�1fw2 �z��>2"o�m�29!"e�w�2�f\�h�2n�~�w�3ui�� �3dj�u�3��x@�4�;�4�d5��p�4@l�5h 5�^b^� -a5�pv5�d5tw�'��5��5md-�b�5i�d��v�5 -a5�a 6�`d�#6ghch�81�6�&7��6�a�r!�6q1���@�6xx�6)1:t�u7�&7�x�\bg7�~74\�7bd9t=r�7��gr f8c�]��jo8�~�8�� �8��b�n9?oi�q�9�a:�kx_�s�:kkkk�o�:�3�:�!�q�o";�4mjj o;�i\;�%�|c;�q��viu;�ru�;�~7�[u�u�`fr>�>�'i�>r]��v�>lrb�mt?<#iq!{�?p[5=�tf�?�t�&�?�*��o-�?�mt?�s�? u|3e�?�-x{�8�?�@}��*.}@��)��-�@�t�`�r�@g��z�@z]%hag;��:a�s6ay8���doahu�(�a�le*�&e�ana��.�an���a�$,&d]�l�d|1�q�i�dbl#g�>e�\���ez�v�n�e�v ��'�e�#�c�hfs�]�=bdf�^^n��z[f�y� ��f�"�o w~g� l`�#�g�{9=��g=v�g�o�t�{s h�-h�pv5o|hp@h�og�ghch'\l��&�h�t�e�hoaq�!~q��y#%�q@gku�nr�q �q� �qqg$h_r�r)b;r�,�q��0hr�l��zwr� {r;1�0��y{r�i�r�� �(u�r�$atxcs�#sw/�=fzps8ts)b;r��ts�#�g3%�s�{�s�;�4��g/t�4>�:8t�gn�bd9t]z[t� �m��td $�`�t�s��,!u�rdi�@gku�u0 g�u���uxcs>�uc;�rxyyv�d�^�v4�o�v�j$w�w�w�6�x�m�2:3�x�q�y���x�3�:��o�x�#s^l�x\<�jg�xq>,- q�x�}<��x_/,j�zy��t��`-y<myv ��q�yv^mc���y< z�&xfk{z�kd  �zhp�� [�enx�:[�=�^�` [�0�[(>y��f\�?\i�(��\�m��x�\~�f<1/�\�s���7y]�>aqs�]���c�]hv�i���]viu;�]^ph$^�^b^�`.�^�=�^�1_�gm_�kx_�a9�ji�_l{�� !`�qb,�� l`�y`� ��t�`�=�}�j�`�qq��u�`�>�`_m�t a��&na[mk,�9a��q���a��5��>�asq�y�3j�a�zwr�a�t� 3b@�z��)ib�u~b1�h��u�b�~#�%;�b@v�$03cd.�b�ggcg-�!�va�c�^����c(�a�u�c�0hr��#�c�j$wvd0q|�`d�d&d�@�m�f�d,-�zn�d�|�#�9!"e2k�#�g e�/e� * ^ee����l\e�>e��eme�hgqwe�u �t�edu�efd�'y�e�&fji�,\f<}7/��zfs{tq�f3%�s!,�fqx{~�fxx�6�a�f6�f< z�bl#g�^blkqg�j9r��g8|k=�z�g�-9h�k?oi�u�<mebi�rdi�b*&��b~i�y{r4�i�`-y�^�ix�u�nf�i�~7djtj�/v,�j�8�?w�j�`�t�=�j�4�q\<�j�dk�g�tkz l!{�?�klv:g��3�l<|�<ie�lj l�^(m��k��.�mz*�ma�� �m�hn�y`�gn� �!�g)nfr>��^^nv��, mn�kj>�nh#�n�gv'po� ���"�o�"�o6gp�e �oh��.�o�r��v�o mg���o]z[thptf�?(ap(s� @p�[? bep=r�7�c�p�qp&��dq�vzq� �<#iq�!�q� ���qq =��,�q�w�#!�q{s h�4�q�a�f�l�q|1�q6s�~r�q3q-rie�l��j9r �3�c;�rn[g� �r�-�@�y0�sb(p!��s{fm-dt�y�)1:to �v�$at�6�x� 0w?0w?0w?0w?�.�t�/e��t(ap�}�t�o�t�u2�&xph$^�enx[�x, mnf�x&xn �x�0�<�=.y6�f�� oyrgox*�y�x�u��yd]-sq�y7���yxl�y�t�.��y];yw��y�w��u&z�*n{��tazr=��whkzjx �.tzji��z@�z�.�o���z�`�o��%�z�q�wv{�nh{$,&d�*n{�s�?mq{ hr{��6�jbs{�-x{qx{�@�6m�{�d��0q|�~�vgy|��s� u|�[|�w)�\�| w~g;�|�g ek�|�.�t�y>�|b�5�ds}xyyv�p}�r>�$�}dm�(�m�}j<�v��=�}jbs{�q�}\ ~ �=��d~h,~03c��)9~whkzit~�;�~j{�~0�n�qc�~n�~l�s{t�<(>y\*�4e�z �j�{p�4\�7��(k�i����x ��m�j�����[w�3`2 r� �p j^ �* ��n�_�bat yi�wb��.h j<sha2�t�#o>sms#�r#�l$�}&�m'�m(� )�g)%j,�p.�i/�2�z2'4t4.6�e6�6*8;i8cj8�97r:�i;�e=k&>e!@c/@jj@r7a�ec�nd�ud�gfvf�g�lg0 i4tj�kul%m�vmanxq�%s1*vmkxgy�py5[�^ro_5a�7a�zbhc 2e�lf�qf�)gjmi�ckalthllmnnm}on�7q[r�ps0@ui1vywicy�x}�/�wt�mw��=��=�@x��`�j�nj��9�l�.~�r8�v��'�=h��j��~�du��u�� �=i�fj�to�4��m��2�)w���lz� �s%��c�7v�#�7��a�u<�[��t��r���������cb��^�v��\�a�vi�|w�r�����$?�� ��!�s/��n�� ��8�*��-��_�$-��f�><����r����_�%5��c�7"����s�?5����"�gl�bj�h��-��� ��"�l%�#p�w� p���2����y�r�� ��e�`-�n4���`*�|��\�\�@�////l�5�6�b�c�z�\�@�>��@�l��@�@��unknown������������g��.�[x� �times new roman5��symbol3.� �.�[x� �arial7.� ��[ @�verdana;���(�[sosimsuna����$b�cambria math 1��h;"�f�ë���� �n/�� �n/�!-!),.:;?]}����    & 6"0000 0 0 00000��� � �����=�@�\�]�^���([{�  0 0 00000��;�[����������v\v\ 2�q��hp��?�����������������������"�2!xx�z�w ���userlib-x�� �����oh�� '��0t������� ��   (4<dl�usernormallib-x226microsoft office word@^�w6@�y��\�@��i���� �n�� ��՜.�� ,��0� x`t|�� ����� microsoft�/v\   !"#$%&'()* ,-./0123456789:;<=>?@abc����efghijk����mnopqrstuvwxyz[\]^_`abcdefghijklmnopqrstuv����xyz{|}~����������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������root entry�������� �f� �y�����data ������������d1table����l:tworddocument����2�summaryinformation(������������wdocumentsummaryinformation8��������compobj������������n������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������ ���� �fmicrosoft word 97-2003 �ĵ� msworddocword.document.8�9�q
网站地图