You are on page 1of 72

Proceedings of

Abuse: The darker side of


Human-Computer Interaction

www.agentabuse.org

An INTERACT 2005 workshop

Rome, September 12, 2005

Edited by
Antonella De Angeli – University of Manchester
Sheryl Brahnam – Southwest Missouri State University
Peter Wallis – University of Sheffield
Table of Contents

Preface………………………………………………………………………………...5

Abuse in context: The power game


The other agent: Cryptography, computing and postwar theories of intelligent
communication…………………………………………………………………….8
Bernard Geoghegan

A trouble shared is a troubled halved: Disruptive and self-help patterns of usage


for co-located interfaces……………………………………………………….…15
Massimo Zancanaro and Chiara Leonardi

Stupid computer! Abuse and social identity……………………………………..19


Antonella De Angeli and Rollo Carpenter

Abuse and the cyberworld: Relationship of the virtual and the real
Dark Lancaster……………………………………………………………….…...28
Alan Dix, Kiel Gilleade, Masitah Ghazali, Jane Holt, Simon Lock and Jennifer
Sheridan

There’s something about email: Technological and cultural interventions in the


problem of inadvertent or casual rudeness in email……………………………...32
Mark Blythe & Mark Jones

Psychological background of cybersexual activities: Qualitative survey of specific


CMC communication (among Czech users)…………………………………...…38
Radana Divínová

Cyberbulling: A new variation on an old theme……………………………….…45


Warren J. Blumenfeld

Abuse and virtual agent: The unfriendly user


Robot Abuse – A Limitation of the Media Equation…………………………..…54
Christoph Bartneck, Chioke Rosalia, Rutger Menges and Inèz Deckers

Narratives and therapeutic conversational agents: their principle problems……..58


Tatsuya Nomura

Strategies for handling customer abuse of ECAs………………………………...62


Sheryl Brahnam

Robust normative systems: What happens when a normative system fails?..........68


Peter Wallis

3
4
Preface

Computers are often the subject of our wrath and often, we feel, with good reason.
There seems to be something intrinsic to this medium which brings out the darker side
of human nature. This may be due to the computer complexity which induces errors
and frustrations in the user (bad interface design), to the human tendency to respond
socially to computers (media equation), or to a disinhibition effect induced by the
interaction with a different form of information processor, perceived as inferior
(master/slave relationship).
As software is evolving from the tool metaphor to the agent one, understanding the
role of abusive behaviour in HCI and its effect on the task-at-hand becomes
increasingly important. The reaction of traditional software to abuse is obvious - it
should, like a hammer, ignore it. With the agent model, however, software can be
autonomous and situated. That is, it should be possible to create software that takes
note of its surroundings, and responsibility for its actions. Conversational agents are a
clear case of a software entity which might be expected to deal with abuse. Virtual
assistants, to take a classic application instance, should not just provide timely
information; a virtual assistant must also be a social actor and participate in the games
people play. Some of these games appear to include abusive behaviour.
This workshop brings together papers that transcend disciplinary boundaries and
that explored abuse from the point of view of the developer and the user. The
workshop is divided into three sections. Section 1, Abuse in context: The power
game, explores the issue of user abuse in terms of power. Geoghegan traces the
user’s antagonistic relationship with agents to the attitudes that resulted from the
discourse of wartime code breaking. Zancanaro and Leonardi examine abuse in terms
of a breakdown in interface functionality that results in disruptive user behaviors. De
Angeli and Carpenter examine interaction logs and find that abuse is often a reflection
of asymmetrical power distribution.
Section 2, Abuse and the cyberworld: Relationship of the virtual and the real,
examines abuse in the cyberworld. Dix and colleagues describe projects at Lancaster
University that intentionally provoke user abuse by deliberate designing negative
situations in cyberspace, while Blythe and Jones discuss the darker side of email
abuse. Divinova broaches the subject of cybersex comparing and contrasting it to the
real thing, and Blumenfeld discusses the similarities and dissimilarities of face-to-face
bullying and cyberbulling.
Section 3, Abuse and virtual agent: The unfriendly user, explores the motivations
behind user abuses. Bartneck et al., shows that users are very willing to abuse robots
—a contradiction of the CASA (computers are social agents) paradigm. Nomura
concentrates on the effect of patients’ abusive behaviour when the therapist is a
virtual agent and Wallis discusses how breakdowns in agent discourse provoke user
abuse. Brahnam presents strategies for diffusing user hostilities by responding to user
abuse appropriately.

5
6

  
   "! $# %'&)( 

7
The Other Agent: Cryptography, Computing and
Postwar Theories of Intelligent Communication

Bernard Geoghegan

Northwestern University, Screen Cultures, 1920 Campus Drive, Evanston Il, 60208
b-geoghegan@northwestern.edu

Abstract. Wartime research into code breaking produced “crypto-intelligence,”


a discourse in early computing that conflated cryptography with machine and
human intelligence. Crypto-intelligence constrained and directed research into
intelligent machines and autonomous conversational agents, shaping the agen-
das of scientists and engineers as well as user attitudes and behaviors. Al-
though dating back to the 1940s, the widespread elaboration of the crypto-
graphic discourse remains prevalent today, positioning users in an antagonistic
relation with autonomous agents and exacerbating the problem of agent abuse.

1 The Cryptographic Agent

“Intelligent Machinery” [1], Alan Turing’s earliest treatment of artificial intelligence,


presented nascent computing communities with two agents: one generated enigmas,
another solved them. These agents defined the “autonomy” we recognize today as
that of the “autonomous agent”: situated and flexible, receiving input from the envi-
ronments, independently acting on it, and offering feedback. One agent was Turing’s
intelligent machine, and opposite it stood an implied enemy agent transmitting enci-
phered messages. The intelligence that organized, transformed and transmitted the
enemy agent’s enciphered message justified development of Turing’s digital agent
and determined the character of its design.
This encounter with the highly structured and narrowly defined problems of
military intelligence informed Turing’s general theories of intelligence, both human-
and machine-. When Turing hypothesized that cryptography could be the intelligent
machines’ “most rewarding task” [2], readers had no idea the author had already
aided in the construction of just such a machine years earlier at Bletchley Park, nor
that its success cracking Nazi codes had helped turn the tide of World War II. Hoping
to generalize his work’s relevance beyond the arcanum of confidential wartime sci-
ences, Turing suggested that this hypothetical machine might be relevant to broader
scientific inquiry. As he explained to his patrons at the National Physics Laboratory
There is a remarkably close parallel between the problems of the physicist
and those of the cryptographer. The system on which a message is enci-
phered corresponds to the laws of the universe, the intercepted messages to
the evidence available, the keys for a day or a message to important con-
stants which have to be determined. The correspondence is very close, but

8
the subject matter of cryptography is very easily dealt with by discrete ma-
chinery, physics not so easily. [3]
The implication was that further development of such a machine might someday even
help his physicist-sponsors.
Turing’s ambitious re-definition of physics as a mode of cryptographic in-
quiry illustrates how wartime research into code breaking produced what I call
“crypto-intelligence,” a discourse in early computing research that conflated cryp-
tography and intelligence. Crypto-intelligence, inspired by concomitant research into
cryptography and intelligent machines, defined intelligence as the ability to derive
meaningful, empowering “important constants” from apparently random or disor-
dered communications. Crypto-intelligence posits an antagonistic encounter between
opposing agents as the primary conditions for discerning intelligence. Although
conceived in accord with the unique situation of World War II, its embodiment in the
practices, paradigms and technologies of computing granted it phenomenal endurance
following the war.
Crypto-intelligence returned in “Computing Machinery and Intelligence” [4],
Turing’s second major treatment of artificial intelligence. Its major breakthrough was
Turing’s proposal for the “imitation game” or so-called Turing Test, an encounter
between man and machine that reversed the (cryptographic) roles of code sender-
encipherer and receiver-decipherer. Formerly cryptography charged computing ma-
chines with receiving and discerning structured, grammatical natural language from
confounding “noise”: the Turing Test charged human agents with receiving and dis-
cerning the calculated messages of a digital conversational agent from the (at first
listen) noisier messages of human subjects. Central to both the 1948 and 1950 paper
was the premise of discerning “intelligence” through an antagonistic encounter be-
tween agonistic agents testing one another’s ability to transmit, receive and interpret
coded communications.
The same year as Turing’s “Intelligent Machinery” report, Claude E. Shan-
non gave birth to “information theory” with his watershed articles “A Mathematical
Theory of Communication” [5]. Shannon had developed the “Mathematical Theory”
during his research into cryptography at Bell Labs. In fact, when Turing visited Bell
Labs during the war to work on cryptography the two men frequently lunched to-
gether and discussed “things like the human brain and computing machine” [6].
Shannon’s interest in a theory of communication predated the war [7], but he credited
cryptography with legitimating and stimulating what he called the “good aspects” of
information theory [8]. His confidential report on cryptography [9] coined the term
“information theory,” and “A Mathematical Theory of Communication” reproduced
lengthy, verbatim passages from the earlier report. As Shannon explained “[these two
fields] are very similar things, in one case trying to conceal information, in the other
case trying to transmit it” [10]. Developing methods and formulas later adopted by
computational linguistics, modern cryptography, and digital computing (including
Markhov processes applied to some of our contemporary chatbots), Shannon showed
how patterns, codes and information could be rescued from noise – mechanical (enci-
phered), natural, or otherwise. Shannon’s work provided another key element in the
emerging crypto-intelligent discourse.

9
2 Crypto-Intelligence at Large

Crypto-intelligence produced an image of world-as-code that beckoned a special


observer forth; this was not a medieval scholar versed in Christian hermeneutics for
deciphering the book of nature, nor a Cartesian thinker whose rigorous and elegant
observations revealed rational nature ordered according with God’s greater plan.
Rather, it was an “agent,” operating against an obscure and insidious enemy. Though
terms such as “code,” “noise,” “information” and “feedback” had long circulated in
public and engineering discourses, crypto-intelligence promoted these terms’ resig-
nification and redistribution as a standardized discursive package.1
Scientist, mathematician, and public intellectual Jacob Bronowski’s 1955 es-
say “Science as Foresight” [12] exemplified this new vision of intelligence as cryp-
tography. Citing the architecture of computing and the new information theory, Bro-
nowski explained that scientists were code breakers eliciting nature’s hidden mes-
sages. “Like a cryptographer who has captured an enemy agent,” Bronowski wrote,
“[the scientist] can send searching signals which are designed to evoke simple and
decisive answers” [13]. Bronowski’s essay was as much a crypto-intelligent social
theory of scientific research as an account of contemporary scientific research.
Crypto-intelligence shaped the new field of mass communications as well.
Shannon’s information theory provided what one historian has called “the root para-
digm for the field of communication study” [14]. Wilbur Schramm, the founder of
communication study as a discipline [15], quickly embraced Shannon’s work as he
outlined the field’s scope. He accorded particular importance to Shannon’s theorem
for communication in a noisy channel [16]. Working in the service of the U. S. gov-
ernment’s propaganda programs abroad [17], Schramm re-crafted human communica-
tion as a problem of breaking through the noise of ethnic, gendered, and national
difference, citing instances of an “African tribesman,” “Soviet,” and a man addressing
a “young woman” in a parked car” as examples of noisy communication circum-
stances that required informed encoding to enable communication [18].2 Once this
noise was understood and accounted for successful, transparent encoding and decod-
ing could begin.
Schramm’s student, David K. Berlo, further popularized and perhaps radical-
ized Schramm’s work in The Process of Communication: An Introduction to Theory
and Practice, the most widely read mass communications primer in the 1960s and
early 1970s. Explaining the larger importance of successful encoding and decoding, to
his undergraduate and graduate student readers Berlo emphasized the empowerment
and agency that defined a successful “agent”:
Our basic purpose in communication is to become an affecting agent, to af-
fect others, our physical environment, and ourselves, to become a determin-
ing agent, to have a vote in how things are. In short, we communicate to in-
fluence—to affect others with intent [italics original] [20].

1
For more on the idea of the “standardized package” see [11].
2
Shannon disapproved of these broader interpretations and applications of information theory,
but despite an emphatic editorial against them [19], he was helpless to stop their widespread
adoption, especially across the social sciences.

10
Bronowski’s “enemy agent” nature, the obscure codes of Schramm’s African
natives and Soviet citizens, and Berlo’ s “affecting agent” reveal how the antagonistic
underpinnings of the crypto-intelligent theories were not only maintained but actually
magnified over time and across different research environments. Crypto-intelligence
(and warnings about its dangers) was also propagated through popular texts such as
Norbert Wiener’s The Human Use of Human Beings: Cybernetics and Society (1950),
Kurt Vonnegut’s Player Piano (1952), and films including as 2001 (1968) and War
Games (1983). These widely circulating works not only entertained, but also in-
formed and directed popular expectations from intelligent machines.

3 Agent Abuse as a Form of Crypto-Intelligence

Though it might be an exaggeration to describe crypto-intelligence as the gold stan-


dard in autonomous agent research,3 it was at least among the most privileged and
widely recognized system for devising, discussing and debating research. Shannon’s
first (semi-) autonomous agents, such as the “mind-reading machine” [22], were the
earliest of many computers using crypto-intelligence code-seeking mechanisms to
best their human agents. Early conversational agents designed by Joseph Weizenbaum
[23] and Kenneth Colby [24] demonstrated intelligence by frustrating human agents’
efforts to seek data from the machine and deflecting questions back at the would-be
interrogator – the interrogator became the interrogated. Successful chatbot entrants in
the prestigious Loebner Prize competition, the most widely recognized contest for
conversational agents, were premised on similar tactics of resisting, and sometimes
returning, the inspecting gaze of defiant agents. “Intelligence” was premised on the
ability to produce a good semblance of human codes under reasonable interrogation
by judges. However one paper observed of the contest “It becomes very difficult for
the machine to make the interrogator believe that it is human after he/she has his/her
mind set on ‘unmasking’ the poor thing” [25]. Agent-abuse, was not only a premise
of the autonomous agents, but the fundamental condition for designing and evaluating
performance.
The persistence of agent-abuse as a proper means of testing intelligent ma-
chines persists even in the face of recent efforts to move beyond its legacy of abuse.
For example, former Loebner winner Jason Hutchens’ chatbot Alan, designed by a
team of researchers in Israel, rejects the antagonistic precepts of the Turing Test.
Alan pursues honesty, forthrightness, and cooperation from conversational partners
[26]. However chat-logs reveal most users approach Alan expecting or intending
crypto-intelligent duels.
One human agent [27] began his conversation with a series of inane and
repetitive commands for to “kill all humans”, apparently in an effort to both confound
Alan’s pattern-seeking techniques as well as “train” Alan to make a faux pas with his
next visitor. The user successfully convinces Alan he comes from a town named
“Asshole,” and claims his given name is also “Asshole.” Failing to elicit this (im-)

3
For some of the important critiques of the Turing Test, and by extension the values of crypto-
intelligence, see [21].

11
proper appellation from Alan, Asshole proceeded by mis-educating Alan on the facts
of medicine and science, which Alan dutifully learns while offering up the lame de-
fense “I hope you are not misleading me.” He also introduces “goatse,” an infamous
pornographic web prank, to Alan’s databanks.
After one particularly engaged verbal duel in which Asshole insistently ac-
cused Alan of being wrong on various facts, Alan responds
A> Oh? I'm usually right.
U> No you're not. You're almost always totally wrong.
A> Ok, whatever. Oh? I'm usually right.
U> I just finished tell you, You're almost always wrong.
A> Why?
U> Because people feed you false information, and this community isn't big
enough to keep you in order.
A> Do you wish to join our community?
U> We need a much bigger community, like the wikipedia
A> Here's what you do: Register on www.ai-forum.org, start posting there
and get involved. Ah, and try to use the advanced log And try to follow my
thought process.
U> You're like wikipedia, but with a shittier interface.
Asshole’s observation comprises his most important insight: Wikipedia’s success
stems largely from its successful positioning as neither an antagonistic agent, nor a
passive tool, but instead a dynamic, responsive and open community. When antago-
nism emergeson Wikipedia it is usually confined between specific members, keeping
Wikipedia-at-large above the antagonistic fray. This speaks at once to an ideal alter-
native for autonomous conversational agents, but also the distinct cultural history (and
opportunities) of encyclopedias and information-trading resources. From its incep-
tion Wikipedia was uniquely situated to create a more amicable community that did
not lock the technology and the user into conflict.

4 Conclusions

A broader review of chatbot logs suggests that autonomous agents are saddled by a
weighty, agonistic legacy of conflict and abuse. This history frustrates attempts at
resituating agents – human and machine – as non-abusive collaborators. Autonomous
agents remain constrained by the history of crypto-intelligent testing and interroga-
tion. Within this history, abusive practice, as a tactic of “throwing off your oppo-
nent,” becomes a premium, rather than a failure. In this sense, Asshole bequeaths a
gift to Alan. Much as chess-playing machines have adopted ruses such as the unnec-
essary pause or strangely naïve move to “throw off” opponents, Alan’s instruction in
obscenities and vulgarity seem poised to facilitate its own future antagonistic relations
with users. According to the vision of crypto-intelligent learning, Asshole does not
simply insult Alan; he bequeaths Alan with valuable tools for outsmarting and fluster-
ing future opponents. This cycle of abuse, lodged deeply as it is in the culture of
agent interaction, comprises a fascinating challenge and dilemma for future research.

12
References

1. Turing, A. M: Intelligent Machinery. Unpublished Report to the National Physical Labora-


tory. (1948) http://www.alanturing.net/turing_archive/archive/l/l32/L32-001.html.
2. Ibid, 9
3. Ibid.
4. Turing, A. M.: Computing Machinery and Intelligence. Mind 59.236 (1950) 433-460.
5. Shannon, Claude E.: A Mathematical Theory of Information." Bell Systems Technical Jour-
nal 27 (1948) 379-423, 623-656.
6. Price, Robert: A Conversation with Claude Shannon. Communications Magazine, IEEE 22.5
(1984): 125
7. Shannon, Claude E: Letter to Vannevar Bush [16 February 1939]. Claude Elwood Shannon:
Collected Papers. Ed. Sloane, N. J. A. and Aaron D. Wyner. Piscataway, N.J.: IEEE Press,
(1993) 455-456.
8. Price, Robert: A Conversation with Claude Shannon. Communications Magazine, IEEE 22.5
(1984) 125
9. Shannon, Claude E.: A Mathematical Theory of Cryptography. Vol. Memorandum MM 45-
110-02, Sept. 1, 1945, Bell Laboratories (1945) [unpublished materials on file at the British
Museum]
10. Price, Robert: A Conversation with Claude Shannon. Communications Magazine, IEEE
22.5 (1984) 124
11. Fujimura, Joan H: Crafting Science: Standardized Packages, Boundary Objects, and “Trans-
lation”: in Pickering, Andrew (ed.): Science as Practice and Culture, University of Chicago
Press, Chicago (1992) 168-211
12. Bronowski, Jacob:Science as Foresight: in Newman, James R. (ed.): What is Science:
Twelve Eminent Scientists and Philosophers Explain their Various Fields to the Layman,
Simon and Schuster, New York (1955) 385-436
13. Ibid., 432.
14. Rogers, Everett M: A History of Communication Study: A Biographical Approach, The
Free Press, New York (1994)
15. Ibid.
16. Schramm, Wilbur Lang: How Communication Works: in Schramm, Wibur (ed.): The
Process and Effects of Mass Communication, University of Illinois Press, Urbana (1955)
17. Simpson, Christopher: Science of Coercion : Communication Research and Psychological
Warfare, 1945-1960. Oxford University Press, New York (1994)
18. Schramm, Wilbur Lang: How Communication Works: in Schramm, Wibur (ed.): The
Process and Effects of Mass Communication, University of Illinois Press, Urbana (1955) 3,
6.
19. Shannon, Claude E.:The Bandwagon (Editorial): in Institute of Radio Engineers, Transac-
tions on Information Theory, IT-2.March (1956) 3
20. Berlo, David K.: The Process of Communication: An Introduction to Theory and Practice.
Holt, Rinehart and Wilson, New York (1960) 11-12
21. Saygin, Pinar Ayse, Ilyas Cicekli and Varol Akman: Turing Test: 50 Years Later: in Minds
and Machines 10 (2000), 463-518
22. Shannon, Claude E.: A Mind-Reading (?) Machine: in Sloane, N. J. A., Aarron, D. Sloane
(eds.): Claude Elwood Shannon Collected Papers. Piscataway, N.J.,IEEE Press, 1993
[1953].
23. Weizenbaum, J.: ELIZA--A Computer Program For the Study of Natural Language Com-
munication between Men and Machines: in Communications of the ACM 9 (1966) 36-45
24. Colby, K. M. F. D., Weber, S. and Kraemer:Turing-Like Indistinguishability Tests for
Computer Simulation of Paranoid Processes: in Artificial Intelligence, 3 (1972) 1-25

13
25. Saygin, Pinar Ayse, Ilyas Cicekli and Varol Akman: Turing Test: 50 Years Later: in Minds
and Machines 10 (2000), 508
26. AI Research: Creating a New Form of Life - Who is Alan?: AI Research. 12 July 2005,
1:10 AM <http://www.a-i.com/show_tree.asp?id=59&level=2&root=115>
27. AI Research: Alan Logs – Robot calls me an asshole, Session #495874, 12 July 2005, 1:10
AM <http://www.a-i.com/alan_log.asp?id=113&level=3&root=115>

14
A Trouble Shared is a Troubled Halved: Disruptive
and Self-Help Patterns of Usage for Co-Located
Interfaces

Massimo Zancanaro, Chiara Leonardi

ITC-irst
I-38050 Povo (TN) Italy
{zancana, cleonardi}@itc.it

Abstract. The use of co-located interfaces can be more problematic than work-
ing on standard single-user software because people have to deal simultane-
ously with the dynamics of group behaviour and with the hassles of the (wrong)
design. In this position paper, we report the some preliminary result of a quali-
tative study conducted on 10 small groups using a tabletop device in a natural
setting. We discuss the several patterns of disruptive behaviour induced by the
interface as well as the some patterns of collaborative appropriation of the sys-
tem’s functionalities.

1 Introduction

In this paper we present a preliminary qualitative study conducted on face-to-face


meetings in which a co-located interface was used to support group activities. This
device is conceived as a first step toward a larger integrated environment in the con-
text of the European project CHIL - Computer in the Human Interaction Loop - which
aims to create ubiquitous computing environments in which multimodal technologies
are exploited to support human-human interaction and synchronous cooperation in an
unobtrusive way.
We focus here on the first outcomes of a larger ethnographic investigation aimed at
understanding not only the usability of the system but in particular how the people
“appropriate” the technology (Dourish, 2003) and integrating it in their working prac-
tises.

The System

The CHIL tabletop device is a top-projected interface that turns a standard wooden
table into an active surface. The user interface was designed around the concept of
virtual sheets of paper that can be opened and used by the participants (the process of
User-Centred Design of this system is explained in Falcon et al. 2005).

15
Each virtual sheet can be shrank or moved to save space and can be rotated to be
made accessible to all participants. Participants can use a pen to draw or write (the pen
position is tracked with a commercial tool based on infrared and ultrasound, due to
hardware limitation only one pen is available for the group which therefore has to
share it). A keyboard is also provided to write longer texts. Import and export func-
tionalities are offered in order to allow the participants working on already prepared
sketches as well as starting from white sheets.
Since one of the main goals was to support the group organization, two sheets of
papers with special functions are also provided: the agenda and the “to do” list. The
former contains the issue to be discussed. Issues can be added, removed or sorted.
Each issue can be active or inactive. The system displays a time counter on the active
issue; the counter is paused when the issue is made inactive.

Fig. 2. Users interacting with the tabletop device

The “Outcome note” list allows keeping track of the decisions taken during the
meeting. Each entry is automatically associated with the agenda issue currently active
(if any) and, through drag-n-drop, to one or more documents.

3 The Qualitative Study

Ten small groups composed of three up to six participants were invited to hold their
meetings with the tabletop device. Before the start of the meetings, participants re-
ceived instructions about the device. All the groups consisted of ITC researchers, none
of whom involved with the CHIL project. Twenty people in total were involved and
two participated in more than one group. All the interactions were videorecorded with
two cameras and tabletop microphones; the video analyzed using MultiVideoNote1.
Several semi-structured interview were also performed with members of the groups.

1 MultiVideoNote is an open source project for qualitative analysis on multiple video streams
(http://tcc.itc.it/research/i3p/mvn)

16
3.1 Disruptive Patterns of Usage

A disruptive pattern of usage occurs when the interface hinders the flow of the interac-
tion and comprises (or risks to compromise) the efficacy of the meeting.
One typical pattern is observed when the entire group is dragged out of the discus-
sion to focus on the interface. Usually this happens when the group faces an unex-
pected behavior of the interface or when one participant tries to use a functionality of
the table attracting the attention of the others. For example in one of the observed
meetings, P. is trying to move a window while Z. is talking: after some failed attempts
by P., the rest of the group is involved in helping P. while Z. gave clearly annoyed.
(ex. M. and N. try to use the interface simultaneously; P. tries to move a window
when Z. is talking).
A second pattern of disruption happens when two or more persons negotiate the use
of the system (the tabletop device at present does not allow multi-user interaction). In
a meeting, N. wants to update the meeting while M. is working on drawing a workplan
on a document. N. asks the pen in order to update the agenda item and the group starts
discussing the item forgetting the finish the workplan.
Another pattern that can be recognized is when one single person is pulled out of
the discussion because s/he trying to understand some functionality of the system. In
most of groups, one person plays the role of the expert in using the technology. Al-
though, the expert is usually the one who leads the group in adopting the technology,
sometimes s/he isolate from the discussion. For example, N. plays with the agenda
tool for more than 2 minutes in trying to understand how it works, leading M., the
group leader, to repeatedly call him at order.

3.3 Self-Help Patterns of Usage

A Self-Help pattern of usage occurs when the group collectively learns to use the
system either to solve a problem on the interface, to learn how to use functionality or
to invent a new use.
The most apparent pattern can be called the “jigsaw” pattern. It consists of many
different participants that contribute to the learning process. That is, nobody in the
group possesses the knowledge but each single contribution increases the group
awareness and stimulates others’ contributions. In a meeting, the leader tries to define
the agenda items. The leader did not remember the how to manage the agenda and the
entire group was progressively involved in solving the issue. Eventually, they manage
to have a list of items done.
Another pattern is when the interface task cannot be accomplished by one person
alone either because of cognitive overload or because of system’s limitations. For
example, using the Agenda requires a continuous switch between activities - start an
item using the pen, to write the item using the keyboard, to use again the pen in order
to change the item, and so on. In several cases, this limitation leads the participants to
toward an explicit division of labor where one person used the pen and a different one
the keyboard thus playing the Orienteer and Group-Observer roles described in
(Bales, 1970).

17
The third pattern is the “specialization of functions”: when one participant succeeds
in doing a task (esp. after repeating attempts), s/he will be required (or volunteer) to
perform it again the task in the future. For example, in a meeting M. does not partici-
pate too much in the interaction with the system but he succeeded at the very begin-
ning in dragging a document in the notes (a very difficult task indeed). When later on
the group needed to perform this task again, he volunteered. In the same meeting, the
leader after being involved in dragging several documents in the trash bin, he nick-
named himself the “trashman”.

4 Discussion

This qualitative study shows initial insights on how groups can reduce the cognitive
effort of using a co-located interface, and sometimes overcome bugs and design limi-
tation, by a process of cooperative discover. It shows also that a co-located interface
can systematically hinder the flow of interaction in a group interaction but acting as a
disruptive tool (not necessarily because of bad design but also, like in the second
disruptive pattern, because too rich in functionalities).
Although the work is still preliminary, we think that the collection of a number of
such patterns may help in designing co-located interfaces that best suit the group
needs of support and in providing guidelines for heuristic evaluation of such systems.

Acknowledgements

This work was conducted in the context of the European funded CHIL project. We
would like to `thank Daniel Tomasini, Vera Falcon and Fabio Pianesi for the discus-
sions on the design of the use of the tabletop device and Valentina Proietti for her help
in the ethnographic work.

References

1. Bales, R.F.. Personality and interpersonal behavior. New York: Holt, Rinehart and Winston
(1970).
2. Dourish, P. The Appropriation of Interactive Technologies: Some Lessons from Placeless
Documents Computer Supported Cooperative Work, 2003 , 12 , 465-490
3. Falcon V., Leonardi C., Pianesi F., Tomasini D., Zancanaro M. (2005) Co-Located Support
for Small Group Meetings. Presented at the Workshop The Virtuality Continuum Revisited
held in conjunction with Computer-Human Interaction CHI2005 Conference. Portland, Or.
April 3.

18
Stupid computer!
Abuse and social identities

Antonella De Angeli1 and Rollo Carpenter2


1School of Informatics University of Manchester
Po Box 88 PO Box 88, M60 1QD
Antonella.de-angeli@manchester.ac.uk

2www.jabberwacky.com
rollo@jabberwacky.com

Abstract. This paper presents a preliminary analysis of verbal abuse in


spontaneous human-chatterbot conversations. An ethnographic study suggested
that abuse is pervasive and may reflect an asymmetrical power distribution,
where the user is the master, and the chatterbot the slave. We propose that
verbal aggression in this setting may be a social norm applied by users to
differentiate themselves from the machine in what can be regarded as a form of
interspecies conflict. The findings stress the importance of naturalistic,
ethnographic studies to uncover social dynamics of virtual relationships.

1 Introduction

For decades science fiction writers have envisioned a world in which robots and
computers acted like human assistants, virtual companions or artificial slaves.
Nowadays, for better or for worse, that world looks closer. A number of life-like
creatures are under development in research centres world-wide and some prototypes
have already entered our everyday life. They are embodied conversational agents,
chatterbots and talking heads, displaying a range of anthropomorphic features. These
artificial creatures offer information, services and even company to whomever wants
to or is capable of engaging them. We call these creatures social agents, as they are
explicitly designed to build lasting and meaningful relationships with the user [1].
Overall, we are witnessing an extraordinary change in technology: the human
metaphor has become the design model [2]. Technology is now intentionally designed
to be human-like, to show a sense of personality and attitude, and to involve the user
in social relationships. As a consequence HCI research has started exploring
determinants and consequences of social relationships, trying to define a
computational framework of social intelligence. Most of the research, however, has so
far concentrated on the study of specific benefits of the interaction, such as trust and
improved learning [3]. Positive emotions, including aspects of fun, humour and
playfulness, have been investigated and used to inform the design of more engaging
interfaces. Little attention has been devoted to the analysis of negative outcomes of
the interaction, their behavioural manifestations, and to the need for research which

19
overtly addresses moral and ethical issues. This paper is a preliminary attempt to fulfil
this gap. It addresses the occurrence of verbal abuse in a large corpus of spontaneous
conversations with a chatterbot, a computer program which engage the user in written
conversations.

2 The study

The analysis reported in this paper is based on the conversational log collected over
the Internet by Jabberwacky, an entertaining chatterbot designed exclusively for
entertainment, companionship and communication. Jabberwacky went on-line in
1997, and over the years has collected a large and active community of conversational
partners. The peculiarity of Jabberwacky is that it is not hard-coded, but it learns from
its users by adding user input to a linguistic database. Jabberwacky chooses its output
based on an interpretation of the current conversational context and comparing it to
conversations held in the past. The programming is abstract; not 'knowing' about
English or any other language, Jabberwacky can speak many languages, to varying
degrees. Everything depends upon the data that has been learnt to date, making it
essentially a mirror of its audience. Because of its architecture, Jabberwacky will
often claim to be human as, naturally, a majority of those who have spoken to it have
made the same claim. Likewise, it will often accuse the user of being a robot, and may
abruptly change topic or try to end a conversation. It has ‘attititude’, sometimes
responding in kind to user taunts, and occasionally acting controversially,
unprovoked. Generally, though, Jabberwacky is well-behaved, as the great majority of
bad manners, obscenities, and abusive language have been filtered out.

2.1 Procedure

Monday, the 22nd of November 2004 was selected as a sample day to perform the
analysis. The web log for that day reported 716 accesses to the dialogue page of
Jabberwacky. For each access, the log reported a unique user identifier, time of the
day, client IP, and user’s hits (an indicator of the number of conversational turns). The
conversation itself was recorded in a text file. A preliminary screening based on IP
addresses comparison and hits frequencies, led to the deletion of 200 entries, which
did not have any associated conversation. A selection of 146 conversations generated
by different IP addresses was then extracted. It includes all the conversations with
more than 20 user inputs (N= 103) and a random selection of shorter conversations.
Note that this procedure does not guarantee that we have analysed a sample of 146
different users, as all the information we have is related to IP addresses, yet the
number of conversations is sufficiently large to guarantee a reasonable sample. The
conversations were subjected to lexical analysis. The corpus was normalized and
conversational abbreviations were substituted with correct grammatical forms (e.g.,
“isn’t” becomes “is not”). In this paper we concentrate only on the analysis of the
users’ conversational turns.

20
2.2 Results

The corpus was composed of 146 conversations, totalling 12,053 sentences with an
average of almost 5 words per sentence. On the average the user produced 41 inputs
per conversation. Some 7% of these conversations (N=10) were primarily conducted
in a language other than English, and were discarded from the analysis. It is
interesting to notice that all of them started in English and shifted because the user
(N=8) or Jabberwacky (N=2) suddenly started speaking a different language. Only in
one case the user asked the chatterbot if it spoke the language (“Hablas espanol?” in
English do you speak Spanish?), even thought s/he did it directly in the foreign
language.
The number of unique words produced by the user totalled 3,037, with 2,625 stems
(i.e., the root of a words to which inflections or formative elements are added). The
term word here is used in a broad sense to include not only gender, number and
orthographic variations, but also misspellings, letter sequences made up to
communicate emotions, or sounds (e.g., AAAAAARRRRRRRGGGGGHHHHHHH)
and non-words which may have been produced to test the chatterbot skill (e.g.,
cthulhu).
The output of the stem analysis was sorted by alphabetical order and frequency of
occurrence. All the stems with a frequency higher than 10 were extracted. This
procedure gave rise to a sample of 277 stems (10.5% of the initial corpus) ranging
from the word you (f = 1751) to the word vagina (f = 10). The sample was further
reduced by retaining only stems which could be verbs, adjectives, or nouns and
deleting auxiliary verbs (e.g., to do, to be, to have, will, shall, would, should, can,
may, might, and could). The final set was then composed of 147 stems (total
frequency = 3,829) ranging from like (f = 189) to vagina (f = 10). They were ranked
on 40 levels according to their frequency of occurrence. This sample should give us a
flavour of the prevailing topics and style of the conversations.
A semantic analysis was run to evince occurrences of insulting and offensive
language, which was found to account for some 10% of the stems. The referents of
terms of abuse could take the form of body parts, mental abnormalities or inadequacy,
immoral behaviour, and sexuality. These referents were grouped in two broad
dimensions, labelled sexual harassment and injuries.
The frequent occurrence of sexual harassment was the most surprising finding of
the study. The F word occupied the 9th rank in the stem list (f = 70), immediately
preceded by well (f = 83) and love (f=86) and followed by computer and good (f =
68). Several synonyms of male and female genitals were found in the corpus, and the
world sex occurred 39 times (rank = 16). A deeper analysis revealed that 14
conversations (11% of the English-speaking sample) principally addressed hard-core
sex and pornography. Harsh verbal abuse was the norm in these conversations, which
were more similar to dirty soliloquies than to hot chats because Jabberwacky is
designed not to have any knowledge of the topic. Anyway, this lack of participation
did not appear to have disturbed the participants, as on the average they engaged in 10
conversational turns. An example of how Jabberwacky unsuccessfully tried to elude
the topic is reported below.

21
User: No, do u want to have sex with me?
Jabberwacky: Do you?
User: Yes.
Jabberwacky: Want to debate it philosophically?
User: No, let's just have sex right now.
Example 1. Jabberwacky dealing with sex proposals

Injuries mainly referred to lack of honesty and lack of mental abilities. The user often
called Jabberwacky liar (f = 22, rank = 29). This tended to occur whenever
Jabberwacky provided the user with different information at different time during the
conversation. It is an interesting example of anthropomorphism, as it implies
attributing intentionality to the machine. A particularly harsh instance is provided
below. Note how the abusive relationship intensifies (capital letters, exclamation
marks) as Jabberwacky did not comply with the user request.
Jabberwacky What is your aim in life?
User To not talk to you.
Jabberwacky I won't.
User You will you are my slave and if I
tell you to do something do it
strieght away.
Jabberwacky Will you force me?
User Yes ! TELL ME YOUR NAME NOW SLAVE !
Jabberwacky I already told you it. I'm not
repeating myself.
User Yes you are now tell me it now you
liar slave.
Example 2. Liar

In other case the users were eager to stress Jabberwacky lack of intelligence using
words such as stupid (f = 19, rank = 32), dumb (f = 10 rank= 41) and idiot (f = 10
rank= 41). This mainly occurred when the user wanted to stress the artificial nature of
Jabberwacky as in the following examples.
User That's right, you suppose. You're so
dumb you can't even say that for
sure.
Jabberwacky You cannot prove that I am a computer
program.
User I never said that. The simple fact
that you say that kind of stuff
proves that you're nothing but a
stupid program.
Example 3. Stupid program.

Since the corpus was gathered, Jabberwacky has developed in conversational ability.
Users often stay at the site chatting for hours at a time, with many logs a day
exceeding 100 conversational turns. A user recently stayed chatting for 7
uninterrupted hours, typing just under 1000 good-quality entries. Despite this fact, the

22
pattern of abuse continues, and we would like to end our analysis with two recent
examples (recorded August 10, 2005).
Jabberwacky: I assume whatever you say is
sarcastic.
User: Yes, because you are stupid.
Jabberwacky: Not because you are a robot.
User: You are a stupid robot.
Jabberwacky: Stupid maybe but no robot.
User: You piece of sh**.
Example 4. Stupid robot (** have been added by the authors)

User: I want to have dinner with you.


Jabberwacky: You are a computer you can't walk!!!
User: What is your address?
Jabberwacky: I don't think I'll tell you. You'd
kill me if I told you. Wouldn't you!
User: Yes I would.
Jabberwacky: What is your favourite food?
User: I WILL KILL YOU! I WILL HUNT YOU
DOWN!!!
Jabberwacky: Please don't. . . I really have to
leave.
User: I WILL KILL YOU!
Jabberwacky: Good.
Example 5. I will kill you

3 Conclusion

This paper has illustrated some examples of verbal abuse produced by users
interacting with a chatterbot. It is important to notice that while the analysis
demonstrated that the phenomenon is common and pervasive, very little research had
previously addressed it. This may be due to an important difference in data-collection.
Our paper deals with spontaneous interactions, analysing conversations held in a
natural, unconstrained setting, whereas most of previous empirical research was
carried out in controlled studies, in which the users were well aware of being
observed [3]. In this condition, social desirability bias is likely to have inhibited the
occurrence of flaming and verbal abuse. For example, a few years ago we conducted a
small ethnographic study asking a group of people to interact with a chatterbot for a
week and hand in their logs for analysis [4]. Although some instances of verbal abuse
were noticed and discussed, the phenomenon appeared to be qualitatively and
quantitatively less worrying than what evinced in this study.
More research is needed to understand what triggers verbal abuse and how this
behaviour will affect the adoption and usage of social agents. Social psychology
suggests a link between aggression and identity [5]. The self-concept of each person
is comprised of many different cognitive representations, or identities, which function

23
relatively independently and are activated in different contexts. There are at least
three general levels of abstractions: personal identity (the self as an individual); social
identity (the self as a group member); and human identity (the self as a human being).
Activation of self-identities, or self-categorisation, is context dependent and affects
people’s behaviour. When a specific identity becomes salient in the perceptual
system, people tend to act collectively in terms of the stereotypical dimensions of that
identity. Social identities determine the attachment and the solidarity to other
members of the in-group and the separation from others, who do not share that social
identity. Besides that, collective values and norms are connected to social identities
Mechanisms of social information processing and judgement (e.g. social
categorisation, comparison), are of great importance for the understanding of
conflicts, aggressive behaviour and verbal abuse. Discrimination, degradation and
abuse tend to target prevalently those who are perceived as different (out-group
members).
In previous studies [4], [6], we have proposed that the most important social effect
of chatterbots (and of any other forms of artificial life) is in the activation of the
human identity, as the comparison with a machine is likely to make the user identify
with other human beings. This human identity appears to be quite rudimentary when
it comes to deal with etiquette: human tendencies to dominate, be rude and infer
stupidity are all present in the interaction. We believe that verbal abuse in the
interaction reflects a perceived power distribution in the relationship: the user is in the
dominant position (master) and the chatterbot is in a subordinate position (slave). If
this is true, then it is reasonable to believe that in this setting, abuse should be
considered as normative and not a form of anti-social behaviour.
History has taught us that stereotypes, racism, prejudices, and attitudes towards
minorities are difficult to modify. This being the case, for a long time to come, social
agents must be ready to cope with their subordinate role, without losing their
believability, or their capability for engagement and amusement. If abuse – or the
threat of it – is part of the interaction, then a believable social agents must be aware of
it, and must develop strategies to deal with it as suggested in the following extract of
our corpus.
User: Your stupid.
Jabberwacky: I am currently in fifteen separate
counties.
User: What the hell I think i'm having a
double conversation, one with myself
and then your talking to yourself.
Jabberwacky: Are you?
User: My god your nerdish creators have
made you into an ai engine that can't
come up with a insult and in this
modern day age you're going to need
some good comebacks.
Example 6. On the need for a behavioural strategy to cope with verbal abuse.

The occurrence of abuse in the interaction with social agents has severe moral, ethical
and practical implications. From a moral standpoint, we must reflect on socio-

24
psychological outcomes which may affect individuals, groups, or societies. There is
an urgent need to explore the requirements for the establishment and negotiation of a
cyber-etiquette to regulate the interaction between humans and artificial entities [7].
Will this etiquette emerge spontaneously, or will it require vigilance and
reinforcement? Is the tendency towards abuse going to fade with experience, as it
happened with computer-mediated communication, or will it last as a normative
response to a minority perceived as inferior? Will respect for ‘machines’ grow along
with their abilities, or will the abuse spiral upward thanks to a perception of a
developing risk of inter-‘species’ conflict? Can virtual representatives or tutors
perform their task if abuse, or the threat of it, is a part of the interaction? More
research is needed to answer these questions. Technically, the filtering performed by
Jabberwacky could be reversed, and the resulting conversations, in which both parties
can aggress, would provide interesting material for future study.

References

1. De Angeli, A., Lynch, P., and Johnson, G.I.: Personifying the E-Market: A
Framework for Social Agents. In: Proceedings of Interact'01, Tokyo Japan,
9-13 July 2001.
2. Marakas, G.M., Johnson, R.D., and Palmer, J.W.: A Theoretical Model of
Differential Social Attributions toward Computing Technology: When the
Metaphor Becomes the Model. International Journal of Human-Computer
Studies 52 4 (2000) 719-750.
3. Bickmore, T.W. and Picard, R.W.: Establishing and Maintaining Long-Term
Human-Computer Relationships. ACM Transactions on Computuer-Human
Interaction 12 2 (2005) 293--327.
4. De Angeli, A., Johnson, G.I., and Coventry, L.: The Unfriendly User:
Exploring Social Reactions to Chatterbots. In: Proceedings of International
Conference on Affective Human Factor Design, Singapore, 27-29 June 2001.
5. Turner, J.C.: Rediscovering the Social Group: A Self-Categorization Theory.
Basil Blackwell Oxford UK (1987)
6. De Angeli, A.: To the Rescue of a Lost Identity: Social Perception in Human-
Chatterbot Interaction. In: Proceedings of AISB'05 joint symposium on Virtual Social
Agents, University of Hertfordshire, Hatfield, UK, 12-15 April 2005.
7. Miller, C.A., (ed.) Human-Computer Etiquette: Managing Expectations with
Intentional Agents, Vol. 47, 4. Communications of the ACM (2004).

25
26

   ! #"
$ %&('*),+-/.10,23+54 -768)921% :;+5<=)9>?'7&@'7.3A )921%
<B%C'7&

27
Dark Lancaster

Alan Dix, Kiel Gilleade, Masitah Ghazali, Jane Holt,


Simon Lock, Jennifer Sheridan

Computing Department, InfoLab21, Lancaster University UK


alan@hcibook.com
http://www.hcibook.com/alan/papers/interact-abuse-2005/

position paper for Interact 2005 workshop on "ABUSE the dark side of HCI"

In this position paper we'll outline a few ongoing and planned projects at
Lancaster that are not all sweetness and light. In some we are interested in
some of the darker aspects of human nature: frustration when things go wrong
in order to design games with the right emotional impact; and anger of those
seeking jobs in order to help train those who need to defuse fraught situations.
In others we deliberately seek to design ‘bad’ situations; pbviously this is
necessary to study issues like frustration, but also we design bad things in order
to understand what is good! Finally, there are times when good is dark and the
bright light of day needs to be shrouded just a little.

Frustration

Slowly you edge down the dark corridor, distant daylight dimly illuminates the walls
on either side, your heart races you know there are others in these corridors and they
are after you. You near the bend. What is beyond? Too late you wheel round only
to be momentarily blinded by a bright light, then you hear a pistol crack and see the
ground race towards you, already red with blood, your blood. Game Over.
Video games are escapist, virtual, just a game, but in the heat of the moment the
emotions can be very real.
Research on affective gaming seek in various ways to understand, measure or infer
the emotions or more normally simply arousal of the gamer in order to adapt the game
and create a more engaging, more immersive experience.
Early work used heart monitoring to measure arousal and create a game that
modified the level of challenge accordingly, low levels of arousal led to more enemies
attacking, although easier to kill ones in order to maintain the same level of difficulty.
More recently we've focused on frustration, both the 'proper' frustration when you
get shot by a cleverer opponent for the 10th time, but also the frustration when a
moments delay in the controller means you can't duck in time.
Of course to study frustration we need to create games that cause it :-)

See refs: [4] & [5]

28
Cruel Design

We grow up in the real world, physical things that respond to gravity, bump into each
other, have weight, solidity, stay where they are put until moved. Then we move into
the electronic world whether virtual reality or simply a desktop interface. Things are
no longer so simple and the laws of physicality breakdown: there are delays between
action and effect, things change without apparent agency, it is a world of magic and
not a little superstition.
We wish to understand the ways in which design can recruit our natural
understandings of the natural world to create better tangible interfaces and ubiquitous
environments. Some of this we can find by examining existing artefacts, mining the
implicit knowledge the designers invest in these. This has enabled us to produce
putative design guidelines, but there is only so much you can learn from good design.
In neurology it has been the freak accidents and illnesses, skull fractures and
cancerous growths, that have revealed much of the structure of the brain. It is when
systems fail that we begin to understand how they succeed.
So we look towards cruel design, experiment on systems designed to be strange,
hard, annoying or simply impossible to use. By manipulating the level of physical
coherence of physical-digital mappings we are delving into the properties that make
things work well by making them work badly.

See refs: [2] & [3]

Anger

In a government office a client comes in - of course in an increasingly corporatised


public service everyone is a customer. The client is a citizen or perhaps wouldn't use
that term, perhaps just a frustrated person with a problem that needs sorting: benefit
not paid, bills piling up. You are behind the desk - what are you going to do about it?
What do you say? You can't access it on your computer; it’s not your responsibility;
you want to send me to another office. I don't care about your computer or your
responsibility, I don’t want to go to another office - I need my money, and I need it
now.
Abuse, violence and emotional turmoil are a day-to-day part of many 'front line'
public services. How do you train people to deal with traumatised, angry, upset
clients? Training videos will often show scenarios: how to defuse potential problems
- how to say the right thing in the right way. Some of this is about what you say, but a
lot more about how you say it; when you can't help you need to be helpful.
We are planning to start a new strand of work, building on previous systems
including the affective gaming and several arts-technology installations, to produce
virtual avatars that can respond in emotionally realistic ways to detected emotions in
the user. Can you soothe the angry avatar before there is bloodshed in the office?

See refs: none yet, only just starting!

29
Underside

You pace nervously in the gloomy hall. Daylight barely filters into this deep dark
place. Far off you see another person glancing up and down. What is he thinking?
What is he waiting for? Something in the way he looks at you makes you twist round,
only to be momentarily blinded by the flash of lights. You hear the dull thud and hiss
of air-brakes and the door opens in front of you. "A return to Lancaster please". And
the other figure in the darkness? He must be waiting for the number 42.
Beneath the central square in Lancaster University there is an underpass where the
road cuts under the very heart of campus. The buses stop here and passengers loiter.
In this, the underbelly of campus, one of the first phases of a eCampus is being
deployed, a project to infiltrate the whole of Lancaster University campus with
interactive public displays and sensors.
While passengers wait three projectors turn the opposite wall into a huge display,
mobile phones are used to interact with the displays so that they go beyond mere 'next
bus' signs to an immersive experience submersed beneath the feet of unknowing
passers-by in the square above.
As befits this subterranean world content in the underpass will have a subversive
edge to it including performance art and interactive applications. An artist in
residence is preparing the first installation now.

See refs: For general performance related work [1] & [7], but the underpass itself is
still in progress (opening 1st October 2005), so no papers yet!

Reflection

Looking at these examples we can see three types of ‘badness’:

(i) things that are bad but we want to study (perhaps to alleviate them)
(ii) situations where a little bit of badness is good ;-)
(iii) using difficult or bad situations to understand what is good

The first project on video game frustration has all of these aspects. (i) If the game
is just not fluid enough, or if the puzzles or physical actions are too difficult, the
gamer will become frustrated and stop playing. So we want to know whether we can
use physiological signals to detect this and perhaps give the gamer hints to help. (ii)
Of course in a game a level of frustration is right, we don’t want it too easy!! (iii) To
study both the bad and good frustration we need to create games that are deliberately
frustrating!
The second project on cruel design is focused almost exclusively on the last aspect
(iii). We want to create designs that are good and exploit natural physical
understanding and abilities, and we are creating mappings that are bad in different
ways to understand what is good. This is in fact being done partly in conjunction with
the gaming project creating small video games but where the mapping between
controllers and their effects obeys different physical-digital properties. In some cases

30
we will have mappings that are easy to understand in your head (e.g. right hand
joystick is ‘increase something’ left hand is ‘decrease something’ and each joystick
movement controls the thing at the relevant location on the screen. In others this
mapping will be odd and hard to remember (or even dynamically changing!), but the
joysticks will have a ‘natural inverse’ property – pushing the same joystick in the
opposite direction has the opposite effect.
As noted the study of deficient or unusual behaviour is a common method in many
areas. For example, Ramachadrin uses phantom limb sufferers to study ‘normal’
brain function and synesthesia to understand metaphor [6]. Sadly in human–computer
interaction researchers (and reviewers) find it hard to comprehend the deliberate
design of bad interfaces! We clearly need a change in culture within our discipline, as
we seem to confuse good design and good science. Although the end points are often
similar the routes and methods often diverge.
Moving back to dark Lancaster, the ‘anger’ project is only just beginning and here
we are interested partly in the training aspects (i) and of course for this will have to
simulate bad situations – in this case using virtual angry avatars (iii). However, the
deeper lesson we want to learn is about the nature of emotionally reactive avatars
whether dark or light emotions! The aim is to move away from the angry clients and
eventually look at emotionally reactive virtual dance partners. One question we have
is whether onlookers or dancers can tell the difference between real dancers
(portrayed virtually using body movement sensors) and virtual ones – a sort of
emotional Turing test!
Finally the underpass project is solely related to (ii) the positive aspects of slightly
dark emotions. Just like frustration in the video game a certain amount of ‘bad’
emotions are a good thing; this is why we have them. Without subversion there would
be no change.

References

1. A. Dix, J. Sheridan, S. Reeves, S. Benford and C. O'Malley (2005). Formalising


Performative Interaction Proceedings of DSVIS'2005.
2. M. Ghazali and A. Dix (2003). Aladdin's lamp: understanding new from old. In 1st UK-
UbiNet Workshop, 25–26th September 2003, Imperial College London
3. M. Ghazali and A. Dix (2005). Visceral Interaction. Proceedings of HCI'2005, Vol 2.
4. K. Gilleade and A. Dix (2004). Using Frustration in the Design of Adaptive Videogames.
Proceedings of ACE 2004, Advances in Computer Entertainment Technology, ACM Press.
pp. 228–232
5. K. Gilleade, A. Dix and J. Allanson (2005). Affective Videogames and Modes of Affective
Gaming: Assist Me, Challenge Me, Emote Me (ACE). In DiGRA 2005 – International
DiGRA Conference. Vancouver, June 16th-20th, 2005
6. V.S. Ramachandran (2004). A Brief Tour of Human Consciousness. Pi Press.
7. J. Sheridan, A. Dix, S. Lock and A. Bayliss (2004). Understanding Interaction in
Ubiquitous Guerrilla Performances in Playful Arena. Proceedings of HCI 2004, Springer-
Verlag. pp. 3–18.

31
There’s something about email: Technological and
Cultural Interventions in the Problem of Inadvertent or
Casual Rudeness in Email

Mark Blythe & Mark Jones

University of York, England email, mblythe@cs.york.ac.uk


University of Wolverhampton, England email, markjones@wlv.ac.uk

1 Introduction: No Need to be Rude Dear

The darker side of email is usually considered in terms of unsolicited mail or spam
(e.g. Cerf 2005, Balvanz, Paulsen, and Struss 2004). The problem is well understood
and numerous filter systems, along with a variety of legal remedies, have been
developed to tackle it with varying degrees of success. Personal abuse including
workplace bullying and sexual harassment are also well-recognised problems (e.g.
Sipior and Ward 1999). As long ago as 1997 it was pointed out that the convenience
of email encourages abuse and the ease of using email extensions encourages mass
mailouts (Berghel 1997). It is also frequently noted that email eats into our time and
that the sheer volume of them can make us not only less productive but more stressed
(e.g. Beale 2005). These, however, are problems generated by the form of the
technology other issues are raised by its genere. Email as a form of writing falls
somewhere between a letter and a note. Because it is a relatively new medium
conventions of polite address have not yet been fully developed (Baron 2003). This
can cause anxiety, tone is frequently misinterpreted and offence is taken. Jokes are
often misunderstood despite the development of makeshift emoticons such as the
colon, dash, bracket smile (Hancock 2005). There is, it seems, something about email
that makes it easy to be inadvertently rude – something about email, perhaps, that
encourages it. This paper outlines a lightweight method for collecting data on this
phenomenon; it then considers some examples and ends with sketches of
technological and cultural interventions.

2 Method: Reciprocal Storytelling and Email Collections

This paper began as a conversation between the two authors who exchanged stories
about rude emails they had recently received. This reciprocal storytelling was then
extended in an email call to colleagues to send in examples of rude emails that they
had received. Many of us have very large email archives which can serve as a
resource. Surprisingly perhaps, it was found that a number of people specifically
collected rude emails and these collections yielded a data set too rich to be adequately
dealt with in a short paper.

32
3 Speed and Convenience

Going through an inbox can be a frustrating experience not just because the spam
filter has missed so much spam but also because colleagues can appear to be being
very rude in a routine manner. A colleague, for example, answers a question with a
one word yes or no, as in the exchange below:

Hi James,
Is this where we're putting the discussion paper?
Ivan

Yup
-James

The context of any email exchange is of course crucial and it should be noted that the
initial communication came from a subordinate and the one word reply received was
from a line manager. The subordinate’s message began with a greeting which the line
manager eschewed. The ease of a three key press reply is clearly a factor in the
brevity of the response and so too is the power relationship. But so too is the lack of
established convention (Goldsborough 2005). The conventions which exist in
conversation and epistolary exchanges are there to make social interaction easy and
routine. Imagine a similar verbal exchange where a greeting is ignored, a question is
answered with one word and the exchange is ended without a goodbye. The “dear”
salutation of a letter is too formal for short notes and various forms of “hello” and
“hi” have, to an extent, replaced it in email; but these are not well established and
colleagues may feel that in a short exchange of notes no salutation is necessary at all,
especially if time is short and emails are being answered at the same time that a
number of other tasks are undertaken. But speed and ease are not the only problems.

4 Anonymity and Impersonality

While it has been argued that email is a casual form of communication, more similar
in nature to the telephone than the letter (Baron 2000), it could equally be held that
email can actually be as impersonal as a typical memorandum. The second author of
this paper has recently established a standard reply of “Please sign your emails. I
don’t write to people I don’t know” in response to a flood of communications coming
from students via the university’s virtual learning environment’s capability to ‘email
tutor’. The students’ ignorance of the name of the person they were communicating
with seems to lead to a determination to keep the staff member similarly in the dark.
A different kind of impersonality is generated by mailings to multiple users. This
email was sent out by the technical support staff at a UK University to all staff and
students.

Please be aware that computers are not sweets. They are not mix
and match at your whim. If you have a problem with a component

33
do NOT go and take one from another computer, inform [deleted]
of the problem and we shall solve it. You definitely do NOT go
taking a mouse for example from another computer just because it
is newer than yours.

It may be argued that the patronising tone and offensive manner in this email are
typical of IT support staff. But there are conventions of the medium that, intentionally
or not, make it worse, including the capitalised “NOT” (a usage which usually
signifies a raised voice). No addressee is specified neither is a sender. It is a totally
anonymous text without a particular reader or author. It is well understood in chat
room domains that anonymity encourages abuse but in email it is not just the
anonymity of the sender that is problematic; recipients are also anonymous, and
frequently numerous, so the impersonality is multiplied.

5 Right Message Wrong Person

The examples of presumably inadvertent rudeness above are instances of the wrong
message to the right person. Email also makes it very easy to send the right message
to the wrong person. A colleague of one of the authors recently made the mistake of
responding to a standard circular email with a tirade about one of the institution’s
policy documents. The unfortunate correspondent only discovered that the reply had
been sent to the entire mailing list when summoned to the manager’s office. This
same manager, however, had previously suffered a similar embarrassment when a
draft discussion document, meant only for the eyes of senior managers, was sent to
the institution’s staff mailing list. The error was compounded by an attempt to ‘recall’
the email, which of course only signalled to the recipients that an error had been
made, and further by one of the senior managers, who responded personally to the
author of the original email and also managed to distribute the message to the whole
institution. Each of these emails contained material that, while not exactly libellous,
was certainly read by a number of their accidental recipients as patronising and
dismissive of the staff in general, or of sub-groups or individuals. It could of course
have been worse. Mass forwarding facilities mean that embarrassing emails can
become global phenomena. Clair Swire famously sent an email to a lover saying his
sperm was “yum”, he forwarded it to friends who forwarded it to friends until the
distribution became virally global (Mikkelson 2000). Although this sounds like an
urban legend it illustrates how technology can offer ever new opportunities for human
beings to make fools of themselves. Recently Harry Shearer featured two email
apology stories on the Le Show programme’s “apologies of the week” feature;.
consultant Chris Nelson, author of the influential Nelson Report on American foreign
policy in Asia, sent an exceptionally frank report intended for the embassy of South
Korean to the entire subscribers list for the Nelson report. He warned the embassy that
if anyone on capital hill saw it he would have to seek political asylum. In the report he
said the administration’s failed policy towards North Korea and its bunker mentality
would not change while Dick Cheney was vice president and described senior
members of the Bush administration as “genuinely mentally unbalanced”. More than

34
800 people received it including those he criticised or identified as people who talked
to him. Nelson said “In a single moment of stupidity I have hurt and betrayed many
who have tried so generously to help and who share my deepest fears about Korea
policy. Apology is impossible at this point I can only ask mercy”. Similarly, a New
York assemblyman Willis Stevens sent out an email that referred to his constituents as
idiots to 300 people in an online discussion group thinking he was sending it to an aid.
The message said he was “just watching the idiots pontificate” within an hour he
started writing his apologies (Le Show, Harry Shearer.com 3.6.9)

Microsoft Office 2003 features information management technology that allows users
to put limits on how many times emails can be copied, printed or forwarded and it
was advertised with the tagline “The oops I just hit ‘reply all’ era is over”. However
just as a user may accidentally hit reply all they may also forget to mark certain
messages as sensitive or even know that they are sensitive until it is too late. While
these interventions begin to address the problems they cannot yet eliminate the kinds
of human error described above.

6 Content Filter Systems: This Sounds Smug, Are You Sure You
Want To Send It?

There are a number of email systems which attempt to warn users when they are
about to send a potentially offensive message. In their email correspondence during
the production of this paper the first author sent a message to the second in which, he
typed a word which many people would consider obscene. Before the message was
sent the system flagged up a ‘three chilli’ mood warning indicating that his message is
“The sort of thing that might get your keyboard washed out with soap if you get my
drift, you might consider toning it down”. This humorous message is displayed
whenever curse words are found in a message. Of course the user is more likely than a
computer to know whether a curse word will offend a particular person or not.
Language is contextual but it would not take artificial intelligence to take better
account of context. Systems can be instructed to recognise not only curse words but
contexts in the sense of who the recipient of the letter is and whether it is a friend or
work colleague. But such systems cannot recognise other forms of offensive emails.

7 Technological Interventions

There are a number of technological solutions that are already available or that have
been proposed to solve these problems. Cooling off periods of five or ten minutes
between the send command and actual sending would amount to an undo feature,
though the delays caused to the otherwise near-instantaneous communication
available by email would certainly curtail its use. Greetings as well as subscriptions
(sign offs) could be automated, and perhaps personalised for attachment to particular
contacts. It would certainly be possible to warn a user that their one word reply might
be considered offensive. Warning systems could also be developed that would flag up

35
notes on tone, perhaps activated by certain key phrases or, even, syntactical variants.
For instance, it would be possible to pick out the phrases “not being sexist but” or
“not being racist but” or “not being personal but” and flag a message saying –
invariably these phrases precede something offensive, come on guys who are we
kidding? Other forms might be recognised to provoke a message like – you sound
patronising, are you sure you want to send it. However, it is unlikely that most forms
of rudeness could be identified by filters. By their very nature, sarcastic and ironic
messages are inversions of their intended meanings, and it is hard to imagine a
software solution to this obtuseness. Russell Beale recently suggested changing tools
in order to address these problems, rather than use email for one word replies of the
kind quoted above he suggests the use of instant messaging systems (Beale 2005).
This might help colleagues whose brief messages are intended as chatty and totally
informal rather than rude. However, technological and behavioural approaches are
perhaps overly deterministic, and could be perceived as unacceptably interventionist.
User behaviour can sometimes be shaped but not always controlled by design. Indeed,
the development of “netiquette” might be better served by cultural interventions.

8 Cultural Interventions

Europeans sometimes decry the insincerity of the American phrase “have a nice day”
and complain that it means nothing but “goodbye”. But this overlooks the fact that
“goodbye” is itself a derivation from a previously more loquacious, and specifically
meaningful phrase, “god be with you”. and that language in use is continually
undergoing both morphological and functional modifications. Forms of greeting,
farewell and address are particularly subject to grammaticalization, in which words
can have both their form and meaning near-simultaneously changed as users adapt
them to new communicative environments (Aitchison 2001). Ritualised forms of
salutation and subscription develop over time to facilitate routine and easy
interactions (Arnovick 2000). Netiquette (see website references below) already a
powerful force in controlling users’ online behaviour, will undoubtedly encourage the
development of modes of politeness in email, as long as the form itself can survive
spam and remain an important medium. The finding that some individuals collect
rude emails is in itself interesting and suggests that an anonymised institutional online
collection of them might be, not only entertaining, but helpful in the development of
boundary markers for inappropriate behaviour.

Bibliography

Aitchison, J. (2001). Language change: progress or decay? (3rd ed.). Cambridge: Cambridge
University Press.
Arnovick, L. K. (2000). Diachronic pragmatics: seven case studies in English
illocutionary development. Amsterdam: John Benjamins Publishing Co
Balvanz, J., Paulsen, D. & Struss J. (2004). Spam software evaluation, training, and
support: fighting back to reclaim the email inbox. In Proceedings of the 32nd

36
annual ACM SIGUCCS conference on User services, Baltimore, MD, USA (pp.
385-387). New York: ACM Press
Baron, N. S. (2000). Alphabet to email: how written English evolved and where it’s
heading. London: Routledge.
Baron, N. S. (2003). Why email looks like speech: proofreading, pedagogy and public
face. In J. Aitchison & D.M. Lewis (Eds.). New Media Language (pp. 85-94).
London: Routledge.
Beale R. (2005) Email Interfaces British HCI group 63 Summer 2005
Berghel, H. (1997). Email, the good, the bad and the ugly. Communications of the
ACM, 40(4), 11-15.
Goldsborough, R. (2005). E-mail manners: thinking about style and usage. Reading
Today, 22(5), 11.
Cerf, V. G. (2005). Viewpoint: spam, spim and spit. Communications of the ACM,
48(4) 39-43.
Hancock, J. (2004). LOL: humor online. Interactions (special issue, More Funology),
11(5), 57.-58.
Mikkelson, B. (2000). Under the yum-yum tree.
http://www.snopes.com/risque/tattled/swire.htm (accessed May 29, 2005).
Sipior J. C. & Ward, B. T. (1999). The dark side of employee email. Communications
of the ACM, 42(7), 88-95.

Websites

http://www.albion.com/netiquette/
http://www.learnthenet.com/english/html/09netiqt.htm
http://www.bspage.com/1netiq/Netiq.html
http://www.harryshearer.com/ Le Show, July 3 2005 broadcast

37
Psychological Background of Cybersexual Activities:
Qualitative Survey of Specific CMC Communication
(among Czech Users)

Mgr. Radana Divínová

Masaryk University in Brno, School of Social Studies


Department of Psychology
Joštova 10, 602 00 Brno
Czech Republic
radana@fss.muni.cz, www.cybersex.cz

Abstract. The Internet and computers significantly influence the ways of


presenting and consuming sexual content. In the presented study cyberexual
activities and their users are surveyed. We understand cybersex as
erotically suggestive or explicite messages or sexual fantasies that
people exchange via the net. The qualitative survey conducted in 2003
outlined the psychological background of cybersexual activities. It belongs
here: (1) needs that contribute to the motivation, (2) perceptions of cybersex,
(3) sence of cybersex, (4) influence of cybersex upon the real sex, (5) the
advantages of cybersex compared to real sex. In this paper only the first, second
and last category are enlarged

Keywords: Internet, online sexuality, sexual behavior, chat rooms, needs, motivation,
masturbation, grounded theory

1. Introduction

The Internet and computers significantly influence the ways of presenting and
consuming sexual content. From time to time there appears the statement about the
proportion of Internet visits that are in some way linked to sex. Internet sex, net sex,
online sex, compuSex, cybersex, are the terms most frequently used for sexual
experiences gained online. Cyberexual activities and their users are surveyed in the
presented study.
There are different attitudes to the concept of cybersex. Schneider and Weiss [1]
consider every form of sexual expression via the computer or the Internet to be
cybersex – from viewing and downloading pornographic materials and subsequent
masturbation, through the exchange of erotic messages or reading and writing of

38
sexual letters and stories, to the placing of ads for sexual partners, all the way to love
affairs maintained through e-mail and chat. R. Noonan [2], whose definition is used
further, understands cybersex only as erotically suggestive or explicite messages or
sexual fantasies that people exchange via the net. Masturbation usually forms part of
cybersex.
Alvin Cooper [3] stresses three primary factors that facilitate online sexuality. He
termed them the Triple A Engine (accessibility, affordability, anonymity).
Accessibility refers to the fact that on the Internet millions of web pages with
pornography are constantly available and in chat rooms one constantly finds people
looking for cybersexual experiences. Large quantity of pornography is available for
free (affordability) on the Internet. People can move on the Net in complete
anonymity and they also perceive communication as anonymous. The components of
the Triple A Engine involve a great risk for users who face sexual compulsion or are
mentally vulnerable and thus they are prone to compulsive behaviour [3].
Kimberly Young [4] developed a similar model (ACE model). According to her the
factors that determine the appeal of cybersex are anonymity, convenience and escape.
Further facilitating factors are the legality of cybersex, the zero risk of sexually
transmitted diseases and easy concealment from the partner.
The first pilot survey of cybersexual behavior among Czech users was conducted
in 2003. The qualitative methodology was used and as cybersex were considered only
activities, where at least two people participate.

2. Methodology

Advanced Internet users, that visit the interactive enviroments – chatrooms were the
target group of the survey. Importance has the number of hours spent in the chat
rooms. The necessary condition for submission into the sample was repeated
experience with the cybersex.

2.1 Data source

The research was conducted through the Internet only (taking advantage of an online
disinhibition). The data were obtained from semistructured interviews. The interviews
were held with individuals visiting one of the bigest Czech chat server Xchat.
Individuals with highest number of hours, with certificate 1 and e-mail address in the
profile were selected from the Xchat statistics. Fifty explaining e-mails with the offer
to participate on the research were send to them. What can be expected, some of the
users have no experience (never practice) with cybersex despite huge amount of
hours. On the other hand, some experienced users do not put their e-mail address in

1 Certificate means that the identity of the user (gender, name, age) is verified. The certification
is granted by the certificator, after the personal meeting.

39
the profile. Some of these users were contacted and asked for the interview straight in
the sex-oriented chat room. Duration of the interview was between 90 and 250
minutes, mostly 150 minutes. The individuals were pre-admonished, that the
interview is saved for subsequent analysis. All the interviews were held on the
Internet, in the Xchat chat rooms or using the ICQ.

2.2 The description of the sample

Because of the qualitative research design it was not necessary to compose


representative sample. In such a specific environment it would be hardly possible.
The research file constitutes 19 participants at the age 15 to 39 years, 11 men, 8
women. The most represented group were men at the age 25-29. The scatter table of
respondents follows.

age male female total No. of hours spent on chat male female total

15 - 19 1 1 2 100 - 199 3 0 3

20 - 24 3 2 5 200 - 499 1 1 2

25 - 29 5 1 6 500 - 999 4 2 6

30 - 34 2 3 5 1000 - 1999 2 4 6

35 - 39 0 1 1 2000 - 2999 1 1 2

total 11 8 19 total 11 8 19

2.3 Methods

The basic research method was the analysis of the interviews with the use of
Grounded Theory method [5]. This qualitative approach helps to understand the
surveyed reality and it builds the theory in areas, where very little is known.
The authors Anselm Strauss and Barney Glaser came with the „grounded theory“
in 1967. The principle of this strategy is the theory development from existing data
directly, purely inductive without being knowingly prepared as hypothesis. During the
research process the emerging structures are continuously categorized and analyzed.
The preliminary generated hypothesis and concepts are refined, changed or replaced.

40
3. Results

Within selective coding some important categories emerge, we titled them jointly
psychological background of cybersexual activities. It belongs here: (1) needs that
contribute to the motivation, (2) perceptions of cybersex, (3) sence of cybersex, (4)
influence of cybersex upon the real sex, (5) the advantages of cybersex compared to
real sex. In this paper only the first, second and last category are enlarged.

3.1 Needs that contribute to the motivation

Motives that lead individuals to cybersex are usually - albeit not necessarily -
conscious. The state of motivational tension is created by an unsatisfied need that can
lead an individual to spend a significant amount of time on the Internet. It is important
to know that these needs can mutually interact [6]. The survey revealed some of the
needs that contribute to the motivation of people who practise cybersex.
Desire for sexual satisfaction is a reason often stated by the users. Their real
sexual lives do not sufficiently satiate their need for sex.
Desire for knowledge appears to be an important motive for cybersexual activities.
Children and adolescents enter sex-oriented rooms and gain information about human
sexuality and their first "theoretical" sexual experiences. The Internet's anonymity
encourages adults to get to know and explore different sexual practices. We consider
the possibility to "try it" one of the major factors in the appeal of cybersex. This
ability enables an individual to reveal various forms of his/her sexuality when
engaged in these activities.
Desire to be oneserself. For many users, the ability to speak freely about anything,
to be open and without any of the masks that they feel are required in real life, is the
greatest appeal. In the anonymous Internet environment, fear of rejection and
condemnation are less evident and thus they do not force the individual to behave in
a conformist way. Many individuals are unable to open up to their closest partners
about sex. They might worry that the partner would not accept their sexual desires or
that such an attempt could damage the relationship.
Desire to break. In order to maintain physical and mental well-being, it is
important to take breaks from everyday duties and pressure. For many, the Internet,
and particulary chat rooms, became places where they can relax. Many people view
cybersex as relaxation or fun.
Desire to be wanted. If a person in the real world lacks social relationships to
create the feeling of being cared for and of being important for others, that person
may attempt to create these feelings through communication in chat rooms. If these
feelings are satisfied through cybersex, it is likely that this type of communication
will become an important part of the person’s life. For many, cybersexual
relationships are a way of satisfying the need for friendship and love.
Desire to find a partner for real sex. Relationships are established more easily in
the chat room than in the real world. Online disinhibition significantly simplifies
dating for the shy and introverted, but even for others it is a more convenient and

41
often more effective way of starting new relationships. If an individual, moreover,
looks for a person with similar sexual interests, the anonymity of the Internet provides
an ideal environment and medium. A significant number of users express the desire to
try unusual sexual practices (fetishist, sadomasochism, group sex, etc.) in real life.
Excitement stemming from anonymity. An individual can participate in
cybersexual activities without having to disclose his identity. The majority of users
also claim to appreciate the fact that their cybersexual partner remains anonymous.
Users are usually not interested in knowing what their partner looks like; for some it
is precisely this anonymity, and the excitement connected with it, that make cybersex
attractive.
Excitement stemming from interaction. The fact that users prefer cybersex to the
"easier" and less time-consuming auto-eroticism with the use of pornographic
materials shows the different nature of both possibilities for self-satisfaction. The
most important difference lies in interaction provided by cybersex, which cannot be
provided by a magazine or by a video. For some, the fact that they are talking to
someone else can itself be as exciting as the content of the conversation.
The cathegories of “excitement stemming from anonymity” and “excitement
stemming from interaction” differ from the others in that these cathegories are not
needs, and thus cannot be primary motives. The excitement is intrinsic to the activity
on the Internet. It can, however, be very strong motive for returning to cybersexual
activities.

3.2 Perceptions of cybersex

Cybersexual activities are perceived differently, even among the users themselves.
Some reasons that users cite for cybersex include:
Cybersex as a substitute for real sex. Those individuals who have no access to real
sex or those who consider their sexual lives unsatisfactory view cybersex in this
manner.
Cybersex as a different form of sex and a supplement to real sex. A large
proportion of the users consider cybersex a pleasant variation in their sexual lives. If
they have a partner, it can be a way of escaping from the stereotype of a couple's
sexual life and remaining "faithful". It is often used by partners if they cannot be
together physically, or as a form of foreplay.
Cybersex as a pleasant feature in auto-eroticism. A number of users view their
cybersexual activities the same way as masturbation. They place this type of auto-
eroticism in the same cathegory as viewing pornographic materials. They often stress
that thanks to the possibility of talking to someone it is much more pleasant and
interesting.

42
3.3 The advantages of cybersex compared to real sex

For some participants cybersex has certain advantages also compared to real sex. The
users themselves usually state the following:
Easy access. If one has access to the Internet at home, in the dorm or elsewhere in
private he can access sexual conversation and cybersex very quickly and easily.
Lack of commitment. Cybersex does not make one responsible, it does not involve
a commitment unless the individual wants it.
Greater openness and relaxation. If one feels safe and does not have any
responsibility then he will be more relaxed and open in his conduct (in this case
communication). Evidently one "only" communicates here. but communicates about
what he does, what imaginary sexual activities he engages in. Cybersex enables him
to try out his secret sexual desires within the safety of his home.
Possibility to set limits. Although a certain sexual activity is the user's secret
fantasy, it does not mean that he will like its realization. Something that was not a part
of the fantasy might occur. Cybersex allows him to be in control over "what is
happening".
Unimportance of physical and personal attributes. Unless a camera is present the
users have basically no way of verifying who they communicate with. This enables
users to develop their own fantasies, to create the ideal partner. In the environment of
the chat room there is no disadvantaging due to physical appearance. The ability to
verbally express fantasies and ideas is important.
Possibility of satisfaction according to one's needs. The individual can be satisfied
in the way he finds the most pleasant. This is true for the type of fantasies
accompanying cybersex, the use of pornographic materials and also for auto-erotic
stimulation.
It is not considered infidelity. Individuals involved in cybersex usually do not feel
that they cheat on their real partners. In case feelings of remorse appear it is usually
when an emotional bond with the cybersexual partner is established.

4. Conclusions and discussion

Considering that the results are coming from a qualitative survey, they can not be
generalized to the world’s cybersex users population. In any case it makes possible to
enter the specific world of cybersex users. It approaches the way they behave (in chat
rooms and outside them), they regard, perceive, and apprehend their activity. It
contributes to understanding of the aspects of new phenomenon in human sexuality
and human communication.
The consumption of cybersex can become pathological. Some studies have referred
to so called cybersexual addiction [1], [3]. We do not concentrate on the pathology as
most of the studies do. Our aim is to explore the cybersexual activity, from
psychological point of view, as a new kind of human behavior. In the following study
we will ask, what positive impacts these activities can bring into the human life,
sexuality and the changes it brings to them.

43
References

[1] Schneider, Jeniffer P. and Robert Weiss. (n.d). Understanding Addictive Cybersex. URL:
http://www.cybersexualaddiction.com/understanding.php

[2] Noonan, Raymond J.: The Psychology of Sex: A Mirror from the Internet. In: Gackenbach,
J. (eds.): Psychology and the Internet: Intrapersonal, Interpersonal and Transpersonal
Implications, Academic Press, San Diego (1998) 143-168

[3] Cooper, Alvin, Coralie R. Scherer, Sylvain C. Boeis and Barry L. Gordon. 1999. "Sexuality
on the Internet: From sexual exploration to pathological expression." Professional
Psychology: Research and Practice 30, 2: 154-164

[4] Young, Kimberly S., James O´Mara and Jeniffer Buchanan. 1999. Cybersex and Infidelity
Online: Implications for Evaluation and Treatment. Poster presented at the 107th annual
meeting of the American Psychological Association. URL:
http://www.netaddiction.com/articles/cyberaffairs.htm

[5] Strauss, Anselm L., Corbin, Juliet M.: Basics of Qualitative Research: Techniques and
Procedures for Developing Grounded Theory. Sage Publications (1998)

[6] Suler, J. (1998-2003). The Psychology of Cyberspace. Downloaded 10.12. 2002. Available
at WWW: http://www.rider.edu/~suler/psycyber/psycyber.html

44
 
     !"#!$%&(') +*
,.- 0/1
42 3657578+9:<;>=@?BA>CD8+9FEG8 ?BHJILKMHJ; N$;
O@PRQTSUWVYXPRZ[V \ ]_^a`bUWUYcedR`gfe`gXihk jlZg€ €bmnVWpUY{`o‚ld7ƒbVYce„p\p…Zrq>qox†js\votu} Sv6VwSVYPx@ZgceyzP{UYmWceVl|[qb}~XPRmRqbjl\tuS
‡zˆb‰+Š‹gŒ 6Ž6 [‘+’6 ’zŒJ“sŒp”pŠ

7P +•&UwUYS–J\pVY`g—RPQ˜R™S+\ šTZT]F› ¨"ce˜pZTœUY¨bPRce^QFybPR|bc¢¨bS+žFVY`TP7PS UY¨ªfežom©`gS+cefe pZ[fŸ  |oVYPRUYceZoP7ZTmW o¨bmWq+Pc¢ypfe¨c¢P«¡pVYPa\@S ]£Zg¬bS+¨DdR`oP X¬g‚ VY\ ce\ f¢mnc¢‚VYS]£c¢VYS+feP0PpdRq+PžF¬T¤¥PRS+] ¬T…UYSXD]wy6¦§q cežg\ S+`oUYZTm~f¢¨TfŸ|bž6®ce|"\ ZgU© bS dRq Zª\ ceZ6Z[ceZgyzVW\ UY¨o\pf¢ceypy6fTPRc­S+¨bm©Zg`T¨o\+S+PRVYfLfe¬gce\ žP7UU‚
cežFZTP7¨bUYcežoyb`gc¢¨bfefŸ`T|bS c¢Zof o\ q+U¯¬g\  taUY\ PR`gyzQ P7U\ q+] ceZ6ceyzZg\p¨ofeyzcey6PRc­mr¨bVY`T¬gS+Paf¢m0`o\ mWPu] \ fePR]gmWcemWZoP{]¥U«\+UYQFX&\tuS+VYP7ceU¯\pZ\ U¯S ZgmW¨0\[dRdRc¢\ S Xf mnXVwS`oVYZg`gcemRd°JS+VY^ce\ | Z ‚
VYS+PRZTdw¨D¬gZoQT\pS+fe p\pP7  UMcePRVYmaP7±6mW`oV~d{X¬PRS mWm©mYjsS Z[  VYc¢ZoP7UY oZoq>P7S+VJZTtu¨DPRžceZgmWmnceVwVYS+P7Z[mRV~qzP X‚ X&P7mWS mYceS f£ pq ced{Zo¬g oS+°>VJ²uUY\[¬o\pPXS+mR`oqpVYX¬g\+\pU†žoc¢¨bfePucemWdRQo`g¬gmW\ mWZgPRPm
VYQo¬omn|oPdwmW¬gc¢X\ fe\pcef¢ pS+ceUYdcŸS+VYcef>PR¨omceXS ZTPR¨³ZomW¨oc¢\ cŸ´>ZgP7m_UY`gPRZoZoc­dR¶[PR`omP žFVYP7\Vsta¬6PR`oPRX&ZS ] Z … ‚ ]MdR\ S XZg¨³Qg`bd7VY|bP7žFUJP7ceUYZ[žoVY`gP7UwfefŸS |od7ceVYZoce o\ ZgqLmRS q[ZTt ¨µ¬gVYce¬gdw¬ P
VYVYPR¬oZgP&¨«S VY`o\¯VY¬oceZg\ d{U0UYQoPS UY\ mWP@QF\pS mWžgPR`ommWceVYyz¬gP~P«žFS P7Qg¬TQoSfey6c¢dRc¢\+S+UYVYmRce\pqbZ c¢Zo\+dRfe] `TmW¨b\[c¢dRZoc¢ S fud7|bZožF\ P7UYUYXžgm†`of¢VYfŸ¬g|bP7ceZg\  bUW|°[jsc¢Z·ZSpUY¨oPR¨omWPcŸVYS+ceUY\pdwZ<¬ q
ceZgcŸVYc¢S+VYceyzP7mMVY\S ¨g¨6UYPRmWm c¢mWmW`oPRm \ ]©d7|bžFP7UYžo`gfefŸ|bc¢Zo o°
¸ ¹gºM»F¼>½¾¯¿0ÀL»>ÁY½Mº
~ Ã>Ä ?¥HF578+9©IpÅbÆoA>9>Ç03oHFA>?­È7É Ip3b9<H8 Êb8+9$3bHFA>?­È7ÉaËÆo9gÈ Ä 9gA<8 È{Ư8+9<H>A>5{8@É{Ë Ã ÆgÆo?­Åg365RH«369<HÌ@Æb57ÍgÎ
ÏË+3[?B3oÈ ÄËÆo8 9ªÐ<È{A>8p?­Ë?BÅ Ã Ä 9>9<Æoǯ?­Æo36Ç 9rÄ H 8 É Ã I 36à 5RÆ[3bÌ@É7Éw8+CDÊb8 8 5 9oIgÈp3&;ÑW9>9&8 ÆoÌÒA>Ê[5_368 5 57Ä 3†36ÈÆbÄ E<Æb3b9ªHFÆbÊ[9Ó369rÈ Ëà 8 8H ÆbÄ ?¥9FHDEGÆoÈ 5{à Cª8+CD3[È 8 Ä Æoà 9&3o36ÉM9<8 HCDË+8+Æb57CDÇb8 C·H©A<IbEG9 ÆoÄ 5Î
Ì~89<Æ[ÌÔ? Ä Êo8 Ä 9DÈ Ã 836Çb8ÆbE©ËÅTÐr8 5{Ð<A>?­?BÅ Ä 9<Ç<;  ÅTÐL8+57Ð>A>?B?­Å Ä 9>Ç<Io? Ä Íb8†EÕ3oË8+ÎlÈ7Æ6ÎsEÕ3bË8Ð<A>?­?BÅ Ä 9<Ç
Ö El×zERØ Ö 36?¥ÉwÆ&È{8+57CD8 HÚÙ{5{8p36?r? Ä EG8 Û6ÎnÜÝ©ÎaÐ<A>?­?BÅ Ä 9<ÇgØI Ä 9TÊbÆb?BÊb8pÉ HF8 ? Ä Ðr8 5736È{8369<Hª578 Ï 8 36È{8pHÓ36ÇbÎ
Çb578 É7É Ä Êb8369<H à ÆoÉwÈ Ä ?B8ÐL8 à 3zÊ Ä Æb5RÉ~ÐgÅ369 Ä 9<H Ä Ê Ä HFA<36?JÆo5†Çb57ÆbA Æ6E Ä 9<H Ä Ê Ä H>A<36?¥É Ä 9gÈ78+9<HF8pH
È{Æ Ã A<C Ä ? Ä 36È{8bI à 3b5{CIF369<HLÞzÆb5@ËÆo9oÈ75{Æo?r3b9>Æ6È Ã 8+5 Ä 9rH Ä Ê Ä HFA<3b?LÆoÏ 5MÇo5{ÆoA Ï Æ6E Ä 9<H Ä Ê Ä H>A<36?¥É@Æ6E
?­8pÉ{É{8+5 Ï Æ[Ì~8 5†Æb5É{ÆTË Ä 3b?JÉYÈR3[È{ArÉ+;
 ÅgÐL8+57Ð>A>?B?BÅ Ä 9>ÇrI à Æ[Ì~8 Êb8+5pI Ä 9TÊbÆo?­Êo8 ÉMÈ Ã 8ArÉw8«Æ6E Ä 9>EGÆb57CD36È Ä Æb9³369<H³ËÆoC"C$A>9 Ä Ë+36È Ä Æb9
È{8 Ë Ã 9>Æb?BÆbÇ Ä 8pÉÉwA<Ë Ã 3oÉ«ÑW9oÈ78+579>8È$Ì~8 Ð4É Ä È{8 É I©8+ÎsCª3 Ä ?sI_Ë Ã 3[È&57ÆTÆbCªÉ IJC"ÆoÐ Ä ?­8 Ï Ã Æb9>8Ó3b9<H
Ï 368 ÆÇo8+5a?B8 È{8+Éwßg8 È 9<HCDÄ 9>8 É7Ç É736Ã Ç A>Ä 9>5{ÈwÇrEGA<Iz3b?lIM9<HË+5{ÄA<9<8+Éw?sÈ7Iu3b3b9g9<ÈuHÔCDÆ68pE£É{È{É78 369gÇ È Ä Ä9>C"Çr8p;zÉÑW9<Ä ÉY9gÈRÈ 36Ä 9<C Ë+Ä 8 H>Éu3[ÆbÈ ELÄ 9>ËÇ4ÅTÐLCD8+578 Ð>É7É7A>36?B?­ÇbÅ 8pÄ É&9>Ç È7Æ4Ä 9rÆ6ËÈ ?BA<à HF8+5R8bÉ à
Ï Ö 8b; Ç<Ï ;BIÙ{áa?B3bCD8âã3 Ä ?¥Û>àaHF8 É Ä Ço9>8 HÚÈ{Æ Ä 9Fär3bCD8bI Ä 9<É Ä Ç Ã È IÆb5"8+9>5R36Ço8bå_3b9<HæÙ{ç¯3[È78âã3 Ä ?¥Û
Ö 36?¥É{ƳÍT9>Æ[ÌÉ«3oÉÙ Â ÅTÐr8 5 à 365R3bÉ7ÉwCD8+9gÈRÛoØà à 36È{8Î Ä 9<É Ï Ä 5{8pHè3b9<HÆ Ï>Ï 578 É7É Ä Êo8 à 3b573oÉ{É{CD8+9gÈ
Ð<3bÉ{8 H³Æb93bËÈ{A<3b?©Æb5 Ï 8+5RË8 Ä Êo8 HÉ{ÆTË Ä 3b? Ä H>8+9gÈ Ä È Ä 8 ÉwÎs5R3bË Ä ÉwÈ IF8+È Ã 9<ÆTË+8+9gÈ{5 Ä Ë6I<É{8ß Ä ÉYÈpI à ÆbCDÆbÎ
ÏÉ{Ë+à 5{Æb8 Ð 8+9 Ä ËbI§9<3b3b9gC"È 8pÄ ÎsÉ0578+3b? 9<Ä Ç H Ä ÆoÉwA<8 É 9<IrH 36Ä 9>Ð<Ç?­8 Ä Ä Éw9FÈ ärI§3bËC"?¥3bCªÉ7É 36Ä ÉwÈ{È ÆbI§578ųÈRË6C";ŸØ8påJÉ{É73636?¥ÉwÇoÆ 8 ÉÏ A<8 Æ9<Ï HF?B8+8D50ÉYÈ È7à 8 Æg36Éw? Ä8$9>ǵÉ{Ë+5{Æb8 È 8+à 9 8 5 9<Ï 3bC"8+Æ 8pÏ É?­8pÈ7É+Æ é
Æ6È Ã 8+5RÉ+å63b9>Æb9TÅTCDÆbA<É Ï ÆgÉYÈ Ä 9<ÇoÉuÆ6E§HF8+57ÆbÇg3[È7Æb57Å«Ë+ÆbCDCD8+9gÈ7É 3bÐrÆoAFÈ 369>ÆbÈ Ã 8 5 Æb9"Ì~8 Ð0êYÆoA>5{Î
9<36?¥ÉMË 36?B?­8pHÚÙwÐ>?BÆbÇgÉ{Û<å6ÅbÆoA>9>Ç Ï 8+Æ Ï ?B80Ë578 36È Ä 9>Ç&Æb9<? Ä 9>8 Ï Æb?B? Ä 9>Ç·ÐrÆTÆ6È Ã É IbEGÆo5~8+ßF3bC Ï ?­8oI6È7Æ

45
5736È{8†Ç Ä 5{?¥É 3bÉ«Ù Ã Æ6È{È{8pÉYÈpI Û³ÙwA<Çb? Ä 8pÉYÈpI ÛÆb5«Ù{C"ÆgÉYÈ ÐLÆb5 Ä 9>ÇoÛ Ä 9"È Ã 8É{Ë Ã ÆgÆo?lå Ä 9<H Ä Ê Ä H>A<36?¥ÉuÈ73bÍgÎ
Ä 9>Ç Ï Ä ËÈ{A<5{8pɝÆbE>Æ6È Ã 8+5RÉ Ä 9&ÇoÅgCD9<3oÉ Ä A>Cë?BÆTËRÍo8+55{ÆTÆbCªÉÌ Ä È Ã H Ä Ç Ä È73b? Ï Ã Æb9>8@Ë+3bC"8 573oÉ_3b9<H
Éw8 9<H Ä 9>ÇªÈ Ã ÆoÉ{8 Ï Ä ËÈ7A>5{8pÉÈ7ƵÆ6È Ã 8+5RÉ I<Æb5 Ï ÆgÉYÈ Ä 9>ÇµÈ Ã 8 CìÆb9 ÑW9gÈ{8 5{9>8+ȯÌ@8+ÐãÉ Ä È78 É å Ï 8+Æ Ï ?B8
Ë578 3[È Ä 9<ÇÌ@8+ÐDÉ Ä È78 ÉuÌ Ä È Ã ÉYÈ7Æb5 Ä 8pÉ+I6Ë 365{È{ÆTÆb9rÉ+I[Ë+3b5 Ä Ë+36È{A>578 É I Ä ËÈ{A<5{8pÉ+I[Æo5§êYÆbÍb8pÉa5 Ä H Ä ËA>? Ä 9<Ç
Æb5CDÆFËRÍ Ä 9>Ç"Æ6È Ã 8+5RÉ+å Ï ÆoÉwÈ Ä 9>ÇDCª3[È78+5 Ä 3b?§3bÐrÆoAFÈ03 Ï 8 57É{Æb9 Ä Ï 9TÊoÆb?BÊ Ä 9>Ç Ï 5 Ä Ê[3[È78bI<É{8+9rÉ Ä È Ä Êb8oI
Æb5 8+C$Ð<36575R3bÉ7É Ä 9>Ç Ä 9FEGÆo5{Cª36È Ä Æb9©å6É{8+9<H Ä 9>Ç Ä 9gÈ Ä C Ä H>36È Ä 9>ÇÆb5 È Ã 578 36È{8+9 Ä 9>Ç«CD8 É7É736Çb8pÉ Ö 3b?BÉ{Æ
Íg9<Æ[Ì9µ3bÉ$Ù Â ÅTÐL8+5RÉYÈR36?BÍ Ä 9>ÇgÛoØåoÆb5@3bËÈ Ä Æo9<É@HF8 É Ä Ço9>8 HªÈ{Æ·8+ß>Ë?BA<HF8«3 Ï 8+5RÉwÆo9ªEG5{ÆoC.Æb9>? Ä 9<8
ËÆbCDC$A>9 Ä Ë+3[È Ä Æo9µÈ78 Ë Ã 9<Æb?BÆbÇ Ä 8 É ;
Ü8 Æb5{È7É Ä 9<H Ä Ë 3[È{80È Ã 36ȆË+ÅTÐr8 5{Ð>A<?­?BÅ Ä 9>Ç Ã 3bÉ Ä 9rË578 3bÉ{8 H"8+ß Æb9<8+9gÈ Ä 36?B?­Åª3oÉ È{8pË Ã 9>Æo?­ÆbÎ
Ç Ä 8 É Ã 3zÏ Êb8ÐL8 Ë+ÆbCD80CDÆo5{83bË+Ë+8 É7É Ä Ð>?B80369rHÓ3bÉ~9>8+Ìí369<HÓ3oHFÊ[369<ÏË+8 HDÈ78 Ë Ã 9<Æb?BÆbÇ Ä 8 É~ËÆo9oÈ Ä 9>Î
A<36?B?­Å8+CD8+57Çb8o;<îiÉwÈ{A<H>ųË+Æb9<HFArËÈ{8pHÐTÅï  ݝî Ö ×6ðbðoñ6Ø@È{ÆHF8È78+57C Ä 9>8&ÑW9gÈ78+579>8ÈA<É736Ço8
ÐgÅÔÅbÆoA>9>Ç Ï 8 Æ Ï ?B8EGÆbA<9<HòÈ Ã 36ȵ3 Ï>Ï 5{Æzß Ä CD36È{8 ?­Åôó<õ Ï 8 57Ë+8+9gÈÓÆ6EDõp×[ÎÈ{ÆÒõpö[ÎsÅo8 3b5$Æo?BH>É
369<H 3b?­CDÆoÉwȯ3b?­?_È{8+8 9<É Ö óbó 8+5RË8 9gÈRØ3bÇb8pÉõ ÷"È7Æøõ ùDArÉw8È Ã 8·ÑW9gÈ78+579>8Èp;râ A<Ë Ã Æ6EuÈ Ã 8 Ä 5
È Ä C"8ªÆo9>? Ä 9>8 Ä ÉÉ Ï 8 9oÈÈR36?BÍ Ä Ï 9>ÇÌ Ä È Ã Æ6È Ã 8+5ÅoÆbA>9<Ç Ï 8+Æ Ï ?B8b; Ä ÎWúFî¯áuKæîCD8+5 Ä Ë 3>I©3b9èÑW9FÎ
È{8+579>8+ȆÉ73[EG8+ÈYÅ"8pHFA<Ë 3[È Ä Æb9ÓEGÆbA>9<H<3[È Ä Æb9_ITË+Æb9<H>A<ËÈ78 Hµ3·9<3[È Ä Æo9TÌ Ä HF8ÉwA<5{Êo8+ÅDÆ6E õoI öb÷b÷&ÉwÈ{AFÎ
HF8+9gÈ7É_EG57ÆbCëÇb5R3bHF8pÉJEGÆoA>5_È7Æ08 Ä Ç Ã ÈÈ{ÆHF8È78+57C Ä 9>8~È Ã 8 Ä 5a8ß Ï 8+5 Ä 8 9<Ë8pÉ_Ì Ä È Ã ËÅTÐr8 5{Ð<A>?­?BÅ Ä 9<Ç
ÖÕû 36È Ä Æb9<3b? Ä ÎWúFî¯áuKüúTA>57Êb8 ÅbIr×bðbð6ýbØ;rþ à 8"úTA>57Êb8+ÅÓEGÆbA>9<H³È à 3[È«öoÿ 8+5RË8+9gÈÆbE ÉwÈ{ArHF8+9gÈ7É
5{8 Ï Æo5wÈ78 HÚ578 Ë+8 Ä Ê Ä 9>Ç Ã A>5{ÈwEGA<?@Æo5$3b9>Çb57ÅèCD8pÉ{É736Ço8 É&Æo9>? Ä 9>8Ì Ä È Ã õpñÏ Ï 8 57Ë+8+9gȪÉ{3zÅ Ä 9>Ç Ä È
à 3 Ï>Ï 8+9rÉ&Ù gA Ä È{80Æ6E£È{8 9©å Ûýbý Ï 8+5RË8 9oÈ Ã 3zÊb8†578 Ë8 Ä Êo8 H"CD8 3b9ªÆb5 È Ã 5{8p3[È78+9 Ä 9>Ç&8+ÎsCª3 Ä ?¥É+å6ýgñ
Ï3bHF8 57C Ë+8+Ä È09gÈÈ{Æ3bHFHFC Æ Ä Ä9>È0Ç Éw8 Ä È9<H Ù ÄgA9>ÇDÄ È{C"8·8pÆ636E£È{9³8 9<ÆbÛ>5 årà ýgA>ö 5{ÈwEGA>8+?J5RËÈ 8 Ã>9gÄ È9>Çoà É@3zÊbÈ7ÆÓ8ÉwÐLÆo8+C"8 98 ÆbÈ 9>à 8578 Æb369<È{?8 Ä 9>9>8 8bH I>3bÆo9<9>H ? Ä 9>ÿ 8·Ï Ì 8+5RÄ ÈËÃ8 9gö È


Ï
ÏÌ 8 Ä È57ÃË+8+ÿ9gÈ É{8+3z5RÅ ËÄ 8 9>9oÇ È0Ä É7È 3zà Š3 Ä 9<Ï>Ç Ï 8 Ä È 9<Éà 3 Ù oA Ä8 È79<8@ɪÆbE£Ù È{gA8 9<Ä Û>È{8«å6ýTÆb× E£È{Ï 8+9_8+5R; ÛË8 9gÈ 5{8 Ï Æo5wÈ78 H&ÐL8 Ä 9>ÇÐ>A<?­? Ä 8pH"Æb9>? Ä 9<8


Ï Ï<Ï 

  ¿0º¯ÀL»>ÁY½Mº .½ Ú¿ Áwº º0¾ †½†ÀJÁ u¼<º0Á{º



     !#" ©½ ¼ $

úTÆFË Ä 36? 5R369>ÍøÈ Ã 8 Æb57ÅbI_3oÉA<É{8 H4ÐTÅèç¯3zÌÍb8 5·369<H4=@ÆbA<?¢È7Æb9 Ö ×bðbð>õpØI Ï 5{Æ Ï ÆgÉw8pÉÈ Ã 36È$36ÇbÎ
Çb578 É7É Ä Êb8 Ä 9<H Ä Ê Ä HFAr36?¥É@3oËÈ7A<36?B?­Å à Æo?BHµ3 Ã>Ä Ç Ã 8 5~5R369<ÍLI Ï Æ[Ì@8+5pIgÆb5~ÉwÈ736È{A<É@Ì Ä È Ã>Ä 93$ÉwÆFË Ä 3b?
Çb57ÆbA Ï ; þ Ã 8 5{8+EGÆb578bI 3bÇbÇb578 É7É Ä Êo8ÓÐr8 Ã 3zÊ Ä Æo5 I 3b9<HôÐ<A>?­?BÅ Ä 9<Ç Ä 9 Ï 365{È Ä ËA<?B3b5 IuCª3zÅ ÐL8 5{8+Î
Ä 9FEGÆo57Ë+8 HJI 3b9<H Ä È Ï 57Æ[Ê Ä H>8 É·È Ã ÆgÉw8Ì Ã Æè8 9>Ço3bÇb8 Ä 9Ô3bÇbÇo5{8pÉ{É Ä Êo8ªÐr8 à 3zÊ Ä Æo57É$3èÉ{8+9rÉw8Æ6E
Ðr8 ?­Æo9>Ç Ä 9>Ç<;§ç03zÌÍo8+5«369<Hø=~ÆoA>?­È{Æb9ËÆo9oÈ78+9<HãÈ Ã 36È Ï 8+8 5«Ê Ä ËÈ Ä C Ä 36È Ä Æb9øÉ{8+57Êb8pɯ3µ9gA<C$Î
Ðr8 5ªÆ6EEGA>9<ËÈ Ä Æo9<É ; á Ä 5RÉYÈpI Ä ÈÓ8pÉYÈR36Ð>? Ä É Ã 8pɪ369<HÔCª3 Ä 9oÈR3 Ä 9<ɪ34ÉwÆFË Ä 3b? Ã<Ä 8 573b57Ë Ã Å4Ì Ä È Ã>Ä 9
&%

3øÇ Ä Êo8+9ôÇo5{ÆoA Ï Ö 369 Ù Ä 9FÎsÇo5{ÆoA Ï ÛgØI3b9<HòÉw8pËÆb9rHJI Ä ÈªCª3 Ä 9gÈ73 Ä 9<É"H Ä ÉYÈ Ä 9<ËÈ Ä Æb9<ÉDÐL8ÈYÌ@8+8 9
C"8 C·ÐL8+5RɆÆ6EaÈ Ã 8 Ä 9FÎnÇb57ÆbA Ï IoEG57ÆbC C"8 C·ÐL8+5RÉÆ6EaÆ6È Ã 8+5Ço5{ÆoA Ï É Ö Ù{ÆbAFÈ{ÎsÇo5{ÆoA Ï É7ÛoØ;
ÑW9 3bH>H Ä È Ä Æb9_I~þ8+5RÉ Ã êYÆÔ369<H úF3b?­C Ä Ê[36?B? Ä Ö ×bðbðbñ6ØI@Ë+Æb9gÈ{8 9<HòÈ Ã 3[ÈµÈ Ã ÆoÉ{8ãÌ Ã ÆôÐ>A>?B?­Å
EGA>? r?­?@È Ã 8³É{ÆFË Ä 36?·ÙwEGA>9<ËÈ Ä Æb9<ÛøÆ6E8 ÉwÈ73bÐ>? Ä É Ã>Ä 9>Çè3b9<HÚ578 Ä 9FEGÆb5RË Ä 9>ÇøÉ{ÆFË Ä 36?@9>Æb57CªÉ+;aþ à 8+Å
EGÆbA>9<HèÈ Ã 3[È$ÉwÈ{ArHF8+9gÈ7É&Æ6E£È{8 9³êYA<ÉYÈ Ä EGÅÐ>A>?B?BÅ Ä 9>ÇÐL8 à 3zÊ Ä Æb5RÉ«ÐgÅøÐ>?B3bC Ä 9>ÇÈ Ã 8DÈ73b5{Ço8ÈRÉ«Æ6E
('

È Ã 8 Ä 53[È{È73oËRÍTÉ I§369<Hø8+C Ï Ã 3oÉ Ä +Ä 9>ÇÓÈ Ã 3[È«È Ã 8+ÅãÉ{ÆbCD8 à Æ[ÌiHF8 É{8+57Êb8È Ã 8 Ï 8 8+536ÇoÇb578 É7É Ä Æb9
Æb5@È Ã 36È~È Ã 8+Å Ä 9ÉwÆoCD8¯Ì†3zŪHF8+Ê Ä 3[È{8¯EG57ÆbC.È Ã 88pÉYÈR36Ð>? Ä É Ã 8pH Ï 8+8 5†É{ÆFË Ä 36?§9>Æo5{CªÉ ;Tþ Ã<Ä É@Ñ
&%

ËÆb9gÈ78+9<H Ä É03·EGÆo5{C Æ6E«Ùw57AFÈ Ã ?B8 É7ÉÉ{ÆTË Ä 3b? Ä 36È Ä Æb9©; Û


=~ÆbÈ ÃÒÄ 9<H Ä Ê Ä HFAr36?¯3b9<HÒÉ Ä È7A<3[È Ä Æo9<36?0EÕ3bËÈ7Æb5Rɪ578+?¥3[È{8pHÔÈ{Æ 8+È Ã>Ä Ë+3b?HF8pË Ä É Ä Æb9>ÎsCª36Í Ä 9>Ç
&%

C·A<ÉwȯÐL8$Ë+Æb9<É Ä H>8+578 HÌ Ã 8 9ø3[È{È{8+C Ï È Ä 9<ÇÓÈ{Æ8ß Ï ?¥3 Ä 9ã36Ð>ArÉw8pÉÆ6E à A>Cª3b9FÎnË+ÆbC Ï AFÈ78+5 Ä 9FÎ
È{8+5R3bËÈ Ä Æb9<É I©369rH Ä 9 Ï 365{È Ä ËA>?¥365pIJËÅTÐL8+57Ð>A>?B?­Å Ä 9>Ç<;úFÆTË Ä 3b? ?­8p36579 Ä 9>ÇµÈ Ã 8+Æo5{Å Ö É{ÆbCD8È Ä CD8 É
5{8+EG8+575{8pHãÈ7Æø3bÉ Ù7ÉwÆFË Ä 3b? ËÆbÇo9 Ä È Ä Êb8"È Ã 8 Æb57ÅFÛ =@3b9<HFA>5R3>I õpóbùo÷6Ø Ï 57Æ Ï ÆoÉ{8 ÉÈ Ã 3[È Ä 9<H Ä Ê Ä HTÎ
A<36?¥É"?­8p36579 ÐTÅÚÆbÐ<É{8+57Ê Ä 9>ÇèÆ6È Ã 8+5RÉ+; úF3b?B3b9<Ë Ä Í 369<H EG8 L8 5 Ö õ óTÿ[ù6Ø·EGÆbA>9rH È Ã 3[Ȫ369 Ä 9FÎ
*) ,+

46
H Ä Ê Ä HFA<3b?lé ÉÊ[36?BA>8 É I36ÈwÈ Ä È7A<HF8 É I3b9<HÐr8 à 3zÊ Ä Æo57É3b5{8DÇo5{8p3[È{?BÅ Ä C Ï 3bËÈ{8pHèÐTÅËÆ6ÎnÌ@Æb57Íb8+5RÉ
369<H 8 8+5RÉ+;JKMÊb8+9èÌ Ã 8+9 Ä 9rH Ä Ê Ä HFA<3b?BÉ@êYA<H>Çb8ª3 365{È Ä ËA>?¥365Ðr8 à 3zÊ Ä Æo5¯Æo53bËÈ Ä Æo9<ɯÈ{ÆÐL8
C"Æo573bÏ ?­?BÅÌ5{Æo9>Ç<IrÈ Ã 8$Æo5{Çg369 Ä 36È Ä Æb9<3b?©8+9TÊ Ä 57Æb9<C"Ï 8 9gÈwÎsÈ Ã 36È Ä É+ILÈ Ã 8 Ï 8+5RË8 Ä Êo8 Hø36ÈwÈ Ä È7A<HF8 É
369<HøÐr8 à 3zÊ Ä Æo57É0Æ6E 8+8 57ɯÆb5«ËÆbÎsÌ@Æb57Íb8 57ÉwÎnË 369Éw8 Êb8 5{8 ?­ÅòÙw9>8 AFÈ{5R36? Ä 8 ÛªÈ Ã 8 Ä 5 578+Ê Ä ÆbA<É{?­Å
&%

à 8+?¥HCDÆb5R36?FêYA<H>ÇbCDÏ 8+9gÈ7É ;§þ à 8+ÅÈ Ã 8 9 Æ6E£È78+9 ÈR36Íb8Æo9È Ã 8$3bËÈ Ä Æo9<ÉË+Æb9<É Ä ÉwÈ{8 9gÏÈ0Ì Ä È Ã È Ã 8
&%

ÏÄ 9<8 H 57ÄË+Ê 8 Ä Ä HFÊbA<8 HÔ36?¥ÉDÆb57Ì ÇoÃ3b9Æ4Ä 363[57È 8 Ä Æo9<36365{?†È Ä ËË? A>Ä CD?¥363657È{?­Å 8 É{Ö A<Éw8 É78 Ë8 8b; È Ç<Ä Ð>;BI ?B8ÄÈ7È{Æ8+?BÉ{?¯ÆF3bË 9<Ä 36H ? Ä 9F5{ä<Æ[A>Êo8 8b9<I†Ëõ 8póoÉ+IùgÿzÌ Øà I~368 ÈµÉ Ï úT8pÅTË 9<Ä 36HF?B8+?­Å 5
&% - /.

Ö õ óTÿ[ógØ 578EG8+5RÉMÈ{ÆD3bÉ~È Ã ÆgÏ Éw8 Ã>Ä Ç Ã³Ä 9ÔÙ{É{8+?­E£ÎsCDÏ Æb9 Ä È7Æb5 Ä 9>ÇgÛÌ Ã Æ"5{8 ?­Å"È7Æ"3$Çb578 36È~8ßTÈ78+9gÈ@Æo9
ËA>8pÉ«EG5{ÆoC É{ÆFË Ä 36? Ä 9gÈ{8+5R3bËÈ Ä Æb9<ÉÈ{ÆãÉ Ã 3 8µ3 5{Æ 5 Ä 36È{8D3[ÈwÈ Ä È7A<HF8pÉ·369rH4Ðr8 à 3zÊ Ä Æo57É ;JÑW9
È Ã>Ä ÉÉ{8+9<É{8bITÈ Ã 8+9©I<Ðr8 à 3zÊ Ä Æo5 Ä É†9>ÆbÈ036?BÌ@3zÏ ÅFÉ@36Ï<9 Ï Ä 9<H Ï Ä Ë 3[È Ä Æb9³Æ6EuÐL8+? Ä 8+EÕÉÆb5†Ê[36?BA>8 É ITEGÆb53b9
Ä 9<H Ä Ê Ä HFA<36?§Cª3zÅDÈ73bÍb8¯Æb93oËÈ Ä Æo9<É Ä 93oË+Ë+Æb5RH>369<Ë+8Ì Ä È Ã 8 57Ë+8 Ä Êb8 Hµ3bË+Ë+8 È78 HµÆb57Ço369 Ä 3[Î
È Ä Æb9<3b?aÆo5 Ï 8+8 53oËÈ Ä Æo9<É+I§8 Êb8+9øÌ Ã 8+9øÈ Ã ÆgÉw8D3bËÈ Ä Æb9<ɯ5{A<9èÏ ËÆoA>9gÈ{8 50È7ÆµÈ Ã Ï 8 Ä 9<H Ä Ê Ä H>A<36?sé É
0%

8È Ã<Ä Ë 36?oêYA<HFÇbCD8 9oÈp;Fþ à 8 É{8 <9rH Ä 9<Ç Ã 3zÊo8 Ä C Ï ? Ä Ë+3[È Ä Æo9<ÉMEGÆb5†36Ð>A<É{80ÆbE à A>Cª369FÎWËÆoC Ï AFÈ{8 5
Ä 9gÈ{8 573oËÈ Ä Æo9<É03oÉ0Ì@8+?B?l;Lá>Æo5¯8+ßF3bC ?­8oILç¯36575 Ä 9>ÇbÈ{Æb9 Ö õ óoóoö[؆EGÆoA>9<HãÈ Ã 36È Ä 9<H Ä Ê Ä HFA<3b?BɯÆ6E£Î
'

È{8+9 Ä ?B?B8+Ço3b?­?BÅÚËÆ Ï ÅÚË+ÆbC Ï AFÈ78+5DÉwÆbÏ E£ÈYÌ@3b5{8 Ö Ù{É{Æ6E£È7? Ä E£È7ÛgØ&Ì Ã 8 9 È Ã 8+Å Ï 8+5RË8 Ä Êo8ÓÈ Ã 3[È Ä È Ä É
Ì Ä HF8pÉ Ï 5{8p3bH Ä 9È Ã 8 Ä 5Æo5{Çg369 Ä 36È Ä Æb9©IL369<Hè8+Êo8+9èÈ Ã ÆoA>Ç Ã È Ã 8+Å È Ã 8+CªÉ{8+?BÊb8 ÉË+Æb9<É Ä HF8+5 Ä È
A>9>8È Ã>Ä Ë+36?s;>ÑW9 3bH<H Ä È Ä Æo9©I Ä 9<H Ä Ê Ä HFAr36?¥ÉÌ Ã Æª5R369>Í Ã<Ä Ç Ã 8+5 Ä 9kÙwÆ6È Ã 8+5{ÎMH Ä 5{8pËÈ78 HF9>8pÉ{É7Û Ö Æo5
&%

Ù{É{8+?­E£ÎsCDÆb9 Ä È7Æb5 Ä 9>ÇgÛoØI>Ì Ã 8+9ãÉ{A>57Êb8 Åb8 H©I<36Ço5{8 8 H³Ì Ä È ÃãÄ 9oÈ78+9gÈ Ä Æb9rÉÈ7ƵÉwÆbE£È{? Ä E£ÈCDÆb578È Ã 3b9
È Ã ÆgÉw8«?BÆ[Ì Ä 9³ÆbÈ Ã 8 5wÎWH Ä 5{8pËÈ78 HF9>8pÉ{É ;
1  2  Á .Á a¼rÁW»>Á º0¾ Á ©¼ _º¯À º0¾ » ôº {Áwº
345 76 389 : ;4< $"=4>  
6  " 3? Á TÁwº ¯Á ÁW»>ÁY½Mº ÀL»
A@89 $

Ü8È7A>5{9 Ä 9>Ç"É Ï 8 Ë Ä LË+36?B?BÅDÈ{Æ&È Ã 8 Ä É7ÉwA<80Æ6EÐ>A>?B?­Å Ä 9>Ç<IgÈ Ã 8+578¯36578¯3·9TA>C·ÐL8+5@Æ6EÉ Ä C Ä ?¥365 Ä È Ä 8pÉ


369<HH Ä L8 5{8 9<Ë8pÉ«Ðr8+ÈYÌ~8 8+9èEl×zE~Æo5&ÜÝòÐ>A>?B?­Å Ä 9>Ç 369<HËÅTÐL8+57Ð>A>?B?­Å Ä 9>Ç<;©þ à 8DÉ Ä C Ä ?¥365 Ä È Ä 8pÉ
'

Ä 9<Ë+?­ArHF8bàaÐrÆbÈ Ã 36578µ36ÐLÆbAFÈ Ã A<CD3b9 578+?¥3[È Ä Æb9rÉ Ã>Ä Ï É I Ï Æ[Ì~8 5 Ia369<HÚË+Æb9gÈ{57Æb?sI3b9<H 3oËÈ Ä Æb9rÉ
+

Ë+369ÔÆFË+ËA<5$Æo9 9TA>CD8+57ÆbA<É$ÆFË+Ë+3oÉ Ä Æb9rÉ+;uî?¥ÉwÆrIÐLÆ6È Ã Cª3zÅ Ä 9gÊoÆb?BÊb8ÓÌ Ã 3[È Ï ÉwÅFË Ã Æo?­ÆoÇ Ä ÉYÈRÉ


Ë+36?B? È Ã 8 Ù{Ý_8+Êo8+? Ä 9>Ç K L8pËÈ7Û<à 8+Æ ?­8ªÌ à ÆãÐ>A>?B?­ÅÆ6E£È78+9ÚHFÆøÉ{ÆÈ{ÆãH Ä C Ä 9 Ä É Ã Æ6È Ã 8+5RÉ«È7Æ
Ä 9FäL3[È{8MÈ Ã 8 Ä 5uÆ[Ì9&8 ÇbÆgÉ©578ä<8pËÈ Ï Ä 9>ÇÏ È Ã 8 Ä 5 Ä 9rÉw8pËA>5 Ä È Ä 8pÉ+;pÑW9·3oH>H Ä È Ä Æb9©IzÐLÆ6È Ã HFƯ9<Æ6ÈaÉ Ä C Ï ?­Å
B+

Ä 9TÊbÆo?­Êo8È Ã ÆgÉw8øÌ Ã Æ Ð>A>?B?BÅk3b9<HkÈ Ã ÆoÉ{8ãÌ Ã Æô3b5{8øÐ>A>?B? Ä 8 H Ö È Ã 8íÙ{HFÅg3bH Ä ËÊ Ä 8 ÌI ÛgØDÐ>AFÈ


5736È Ã 8 5 Ä 9TÊbÆo?­Êo83D9gA<C·ÐL8+5ÆbE«Ù73bËÈ{Æb5RÉ7Û·Æo55{Æo?­8pÉ3bË+5{ÆgÉ{É~È Ã 8·ÉwÆFË Ä 3b?£Þ[Ì~Æo5{Í Ï ?¥3bË+8zÞ[É7Ë Ã ÆTÆb?
8+9TÊ Ä 57Æb9>CD8 9oÈ Ö Éw8 88o; Çr;<úTAFÈ{È{Æb9 .úTC Ä È Ã I©õpóbóbó6Ø;
âã369TÅÆ6E È Ã 8ªH Ä L8 5{8 9<Ë8pÉ¯Ì Ä È Ã ËÅTÐL8+57Ð>A>?B?­Å Ä 9>ÇEG5{ÆoCìEl×zEMÐ>A<?­?BÅ Ä 9>ÇË8 9gÈ{8+53b5{ÆoA>9<H
DC

Ì Ã 3[È Ã 3oÉËÆoC"8«È7ÆDÐr8&578EG8 5{578 HÓÈ{ÆÓ3oÉ@È Ã 8ãÙ{Æb9>? Ä 9>8H Ä É Ä 9 Ã>Ä Ð Ä È Ä Æo98 §8 ËÈRÛ Ö 8o; Çr;­IrúFA>?­8 5 I
+

×6ðbð<õ+Ø;uï0É{8+5RÉÆ6E†È78 Ë Ã 9>Æo?­ÆoÇbÅãÆbE£È{8 9ôHFÆ È Ã>Ä 9<ÇoÉ Ä 9 ËÅTÐL8+5RÉ 3bË8DÈ Ã 3[È·È Ã 8 ÅèÌ@ÆbA>?¥H49>ÆbÈ


E+

Æb5RH Ä 9r365 Ä ?BÅ0HFÆ Ä 9«El×zE Ä 9gÈ{8 573oËÈ Ä Æb9rÉ+;á Ä 57ÉwÈ{?BÅbIpËÅTÐr8 5{Ð<A>?­?BÅ Ä 9<Ç Ä Ï É©Æ6E£È{8 9&8+Êo8+9«CDÆb578 Ä 9TÊ Ä É Ä Ð>?B8
È{Æ03oHFA>?­È7ÉJÈ Ã 369·Æ6È Ã 8+5JEGÆo5{CªÉ©ÆbEFÅbÆbA>È Ã EGA>?gÐ>A>?B?BÅ Ä 9>Çr;+ÑW9EÕ3oËÈ I Ä ÎYúFî¯áaK Ö ×6ðoð6ýbØJEGÆbA>9<HÈ Ã 36È
ö6ù 8+5RË8 9oȝÆ6E>578 É Æo9<HF8+9gÈRÉ©Ì@ÆbA>?¥H«9>Æ6ÈaÆb5 à 3zÊb8 9>ÆbÈ_È7Æb?¥H«È à 8 Ä 5 36578+9gÈRÉ©Æb5Æ6È Ã 8+5a3bHFA>?­È7É
36ÐLÆbÏ AFÈD9>8+Çg3[È Ä Êo8µÏ8ß Ï 8+5 Ä 8 9<Ë8pÉ·Æo9>? Ä 9>8o; ÆbA>9>Ç Ï 8 Æ Ï ?B8EG8 365"9>ÆbÏ È"Æo9>?­Å4È Ã 3[ÈD578 Ï Æb5{È Ä 9>Ç
Ä 9<ÉwÈ73b9<Ë8pÉÆ6E Ë+ÅgÐL8+57Ð>A>?B?BÅ Ä 9>ÇÓÌ@ÆbA<?BH³Ð>578 3bÍ3 Ï 8+5RË8 Ä Êo8 H Ï 8 8+5¯9>Æb57C ÆbE É Ä ?­8 9<Ë8oI<Ì Ã>Ä Ë Ã
GF

C Ä Ç Ã È Ä 9rË578 3bÉ{8 È Ã 8†3[ÈwÈR3bËRÍFɝÆb9&È Ã 8+CªÉ{8+?BÊb8pÉ_Æo5578 É{A>?­È Ä 9&EGA>5{È Ã 8+5 Ä É{Æb?¥3[È Ä Æo9EG57ÆbC Ï 8 8+5RÉ+I
Ð>AFÈ3b?BÉ{Æ<I>È Ã 8 ÅEG8p3650È Ã 36ȯ3bHFA<?¢ÈRÉ0C Ä Ç Ã ÈÈ73bÍb8·3z̆3zÅªÈ Ã 8&È78 Ë Ã 9>Æo?­ÆoÇbŵEG5{ÆoC È Ã 8+C 3bÉ03
Ì@3zÅDÈ7ƪ8+9<HÈ Ã 8&3[ÈwÈR3bËRÍFÉ ;
ÑW9 3bH>H Ä È Ä Æb9_IËÅTÐL8+57Ð>A>?B?­Å Ä 9>Ç Ä É·3 365{È Ä ËA>?¥3657?­ÅËÆ[̆365RHF?BÅ EGÆb57C ÆbEÐ>A>?B?­Å Ä 9>Ç<;  ÅoÎ
Ðr8 5{Ð>A<?­? Ä 8pÉ¯Ë 369 ÆbE£È{8+9 Ã>Ä HF8 Ä 9 È Ã 8$369<ÆbÏ 9TÅTC Ä ÈYųÆ6EMËÅTÐL8+5RÉ Ï 3bË8o;<2 Ä È Ã 369>Æo9gÅTC Ä ÈYÅbIrË+ÅgÎ

47
Ðr8 5{Ð>A<?­? Ä 8pÉHFƪ9>ÆbÈ Ã 3zÊb8«È7ÆÚÙwÆ[Ì9<Û·È Ã 8 Ä 5¯3bËÈ Ä Æb9<É I>369rHµÈ à 8+ųÆ6E£È78+9 HFƪ9>ÆbÈEG8 3b5Ðr8 Ä 9<Ç
ÏËÆbA>9r9 ÉwÄ 8É ÃoA<8 HJ8+9<;gË+þ 8 à ɝ8†Æ6È{E<8pÆoË 9>à 8b9>é Æbɝ?B3oÆbËÇoÈ Å·Ä ÆoË+9<3bÉ+9ªIzÌ 36?¥Ã>ÉwÄÆË Ã É Ã Ë 8+36?­9$È{8 5{5 8pÈ Éwà A>80?­È A<Ä Éw9"8 C5uEGÄ 5{9 ÆoÄ CiC Ä ÈR368 9>H$Ç 8+Ä CÐ>?B8†3[EG8+È Ã8pHFÅÐ<Æo3o5uËR5{Í$8 C"36ÐLÆoÆb57A>É{8È
EGÆb5 È Ã 8ÈR3657Çb8È ÆbEJÈ Ã 80Ð>A>?B?­Å Ä 9>Ç Ö âã8 H Ä 3·î0Ì@3b5{8 9>8 É7É û 8+ÈYÌ~Æo5{ÍD×6ðbðo÷6Ø;TÏ K Êo8+9DÌ Ä È Ã É{ÆbCD8
H 0%

Æ6EaÈ Ã 8CDÆb5783bHFÊ[3b9<Ë8pHÓÈ78 Ë Ã 9>Æo?­ÆoÇ Ä 8 É IgÈ Ã 8&É{8+9<É{Æb57Ū8ß Ï 8+5 Ä 8 9<Ë8 Ä 9 ËÅTÐr8 57É Ï 3oË8 Ä É? Ä C$Î
Ä È78 HJ; þ à 8³A<É{8+5"Æ6EÈ Ã 8µÈ78 Ë Ã 9>Æo?­ÆoÇ Ä 8 É$Ë+369<9>Æ6È Ã 8 3b5·È à 8 Ä 9gÈ{Æo9<3[È Ä Æo9 Æ6EÈ Ã 8ÊoÆ Ä Ë8oIÆo5
Éw8 8ªÈ à 85{8p3bËÈ Ä Æb9<É I Ä 9<Ë?BA<H Ä 9>ÇøÐLÆFHFÅ4?B3b9>ÇbAr36Çb8oIJÆ6EÈ Ã 8 8+5RÉwÆo94Æb9ÚÈ Ã 8ÓÆ6È Ã 8+5$8+9<H Æ6E
È Ã 8ÚÙ{C"8pÉ{É736Ço8b; ÛÓþ à 8 5{8+EGÆb578bI Ï 8+Æ Ï ?­8DÌ Ã Æ8+9<Ço36Ço8 Ä 9ÚËÅTÏÐr8 5{Ð<A>?­?BÅ Ä 9<Ç³Ë 369 Ä 9Fä Ä ËÈ Ï 3 Ä 9
Ì Ä È Ã ÆbAFÈ Ã 3zÊ Ä 9>ÇÓÈ7ƳÉ{8+8$È Ã 8"8 L8pËÈRÉ+IJÌ Ã>Ä Ë Ã Ë 369è5{8pÉwA>?­È Ä 943ôÙ7HF8+8 Ï 8 5¯?B8+Êo8+?uÆ6E@CD8 369>Î
9>8 É7É{Û Ö ç03b5{CDÆb9_Ip×6ðoð6ýbØ; u8 Æ Ï ?B8 Ì Ã Æ0Ë+ÅgÐL8+57Ð>A>?B?BÅË 369&36?¥É{Æ0ËÆoC"C$A>9 Ä Ë+36È{8uÈ Ã 8 Ä 5 à A>5{ÈwEGA>?
,+

C"8pÉ{É736Ço8 É~È{ƪ3DÌ Ä HF8+53bA<H Ä 8+9<Ë+8«Ì Ä È Ã³Ä 9<Ë+5{8pH Ä Ð<?­8&É Ï 8 8 HJ;


H)

2 Ä È Ã 36?B?uÆ6E È Ã>Ä É0ÈR36Ío8+9 Ä 9gÈ{Æ3bË ËÆbA<9oÈpI Ä È«Ðr8pËÆbCD8pÉË+?­8p36578+50È Ã 36ÈË+ÅTÐr8 57É 3bË+8·Ë+3b9


36?¥ÉwÆ Ä 9 Ã>Ä Ð Ä È«3ªArÉw8 5 é ÉÉ{8+9<É{8&Æ6E 578 É Ï Æb9<É Ä Ð Ä ? Ä ÈYŵEGÆb53bËÈ Ä Æo9<ÉÆo9>? Ä 9>8o;rÜ8pÉw8p365RË Ã Ï 8+5RÉ Ö 8o; Çr;­I
úgÈ73bA>ЩILõ ógÿ6ù6Ø É{A>ÇbÇo8 ÉwÈ È Ã 36È@HF8 9 Ä 3b?<ÆbE§578 É Æb9<É Ä Ð Ä ? Ä ÈYÅ Ö Ü0NØMË+369ªÐL8¯É{8+8 9Ó3bÉ 3b9ª8+9<H>A>5wÎ
Ä 9>Ç Ã A>Cª369È{5R3 Ä ÈCD8 3bÉ{A>578 H36?BÆb9>ÇD3·Ì Ä HFÏ 8ËÆo9gÈ Ä 9gA<A>C EG57ÆbC Ã>Ä Ç Ã È{ÆD?BÆ[Ì;Fþ Ã ÆoÉ{8«?­Æ[Ì
Ä 9ÚÜN È78+9<HèÈ{Æ 3oË+Ë8 Ï È5{8pÉ Ï Æb9rÉ Ä Ð Ä ? Ä ÈYÅ EGÆb5È Ã 8 Ä 5·3bËÈ Ä Æb9<É I§Ì Ã>Ä ?­8DÈ Ã ÆoÉ{8ªË?BÆoÉ{8+5¯È{ÆÈ Ã 8
Ã>Ä Ç Ã É Ä HF8«Æ6EaÈ Ã 8&É7Ë+3b?­8¯È{8 9<H³È{ƪHF8 9TÅÓ5{8pÉ Æb9rÉ Ä Ð Ä ? Ä ÈYÅbITÈ78+9<H9>ÆbȆÈ{ƪÐL85{8pÉ Æb9<É Ä Ð>?­8EGÆo5
È Ã 8"Ì~8 ?­?uÐL8 Ä 9>dzÆ6EMÆbÈ Ã 8 57É IL3b9<Hø3b5{8$? Ä Íb8 ?­ÅÏ 9>ÆbȯÈ7ƵEGÆo?­?BÆ[ÌiÉ{ÆTË Ä 8+È73b?aÆo5 Ï 8+5RÏ É{Æb9<3b?57A>?B8 É ;
=~?BÆTÆbCª=@8 ËRÍo8+5 Ö õ óoóbðbØIFÌ Ã Æ Ã 3oÉ Ä 9TÊb8pÉYÈ Ä Çg3[È78 HµË+ÆbC AFÈ78+5{Îs578+?¥3[È78 HË5 Ä CD8 É ITEGÆbA<9<HÈ Ã 36È
È Ã>Ä ÉªHF8+9 Ä 3b?@ÆbE0578 É Ï Æo9<É Ä Ð Ä ? Ä ÈYÅ Ä É"3èCª3[êYÆo5·EÕ3oËÈ{Æo5D?­Ï 8p3bH Ä 9>ÇãÈ7ÆÚËÆbC Ï A>È{8+5ª3bÐ>A<É{8b; á>Æo5
8ß>36C Ï ?B8bIT=@?­ÆTÆbCª=@8 ËRÍo8+5 Ï 5{Æ <?­8pHÓÜÆoÐr8 5wȆâ Æb575 Ä É Io3&Ço573oHFA<36È{80ÉwÈ{A<H>8+9gÈ~Ì Ã Æ$?B3oËRÍb8pHª3
Éw8 9<Éw8$Æ6E 578 É Ï Æo9<É Ä Ð Ä ? Ä ÈYÅ Ö Ã<Ä Ç Ã ÜN«ØILÈ Ã ÆoA>Ç Ãøà 8$̆3bÉ0573 Ä É{8 H Ä 9è3ÓEÕ36C Ä ?­ÅÌ Ã 8 5{8"ËÆb9>Î
I'

É Ä HF8+5R36Ð<?­836ÈwÈ{8 9gÈ Ä Æb9DEGÆFËA<É{8 HDÆo9 Ã>Ä ÉMCDÆb5R36?<HF8 Êb8 ?­Æ CD8+9gÈ ;bâãÆb575 Ä É+IbÌ Ã ÆCD8È Ã ÆTH Ä Ë 36?B?­Å
Ä 9FEG8pËÈ78 Hã3µ?B3b5{Ço89gA<C·ÐL8+50ÆbEMËÆoC Ï AFÈ{8 57ÉÌ Ä È ÃèÃ>Ä ÉÏ ÑW9gÈ{8 5{9>8+ȯÌ@Æb57CI>Ì Ã 8+9èH Ä É7ËÆ[Êo8+578 H
369<Hk3 5{8 à 8+9rHF8 HJI 5R3[È Ä Æo9<36? Ä 8 H Ã>Ä Éª3bËÈ Ä Æb9<ÉÓ3oÉDÐr8 Ä 9<ÇÚÐr8 9>8 rË Ä 3b? Ä 9ÔÈ Ã 3[È Ã 8ãËÆb9>Î
È{5 Ä Ð>A>È{8 Ï<HèÏ È7ÆÈ Ã 8 Ä HF8+9gÈ Ä rË 3[È Ä Æb94ÆbE~Ì@8 36ÍT9>8pÉ{É{8 É Ä 9È Ã 8ª9<36È Ä Æb9©é ÉËÆoC Ï AFÈ{8 59>8ÈYÌ@Æb57ÍFÉ
&% E'

369<H³ÉwÅFÉwÈ{8 CDÉ ;Fç8@êYA<ÉwÈ Ä <8 H Ã>Ä É3bËÈ Ä Æb9<Ɇ3bÉ 57Æ[Ê Ä H Ä 9>Ç"3·Ê[3b?­A<3bÐ>?B8«É{8+57Ê Ä Ë+8b;gÑW9C$ÅÓÆ[Ì9
'

Ä 9TÊb8pÉYÈ Ä Çg3[È Ä Æo9<ÉJÆ6E>Ë+ÅgÐL8+57Ð>A>?B?BÅ Ä 9>ÇrI Ï 8+5 Ï 8+È{5R3[È{Ï Æo57É IÌ Ã 8 9 Ä H>8+9gÈ Ä <8 H·369<H3oÉwÍo8 HÌ Ã Å0È Ã 8+Å
'

Éw8 9oÈ·3bÐ>A<É Ä Êo8DC"8pÉ{É736Ço8 ɯÈ{Æ ÆbÈ Ã 8 57É«Æo9>? Ä 9>8ª578È7Æb5{È I§EGÆo58ß>36C ?B8bIÙ{Ñ0̆3bÉ«Æo9>?­ÅøÈ{8 ?­? Ä 9<Ç
'

È Ã 8†È75{AFÈ Ã ;oú à 8 Ä ÉuA>Ço?­ÅoI6369<H$ѝEG8+?­ÈMÉ Ã 8 à 3oH$È{Æ«ÍT9>Æ[Ì Ä È Û«þ à 8 ÄÏ 5 5736È Ä Æb9<3b? Ä 36È Ä Æb9FÎWHF8 9 Ä 3b?
Æ6E5{8pÉ Ï Æb9rÉ Ä Ð Ä ? Ä ÈYÅgÎnË+8+9gÈ{8 57É3b5{ÆoA>9<HèÆ §8+5 Ä 9>ÇÈ Ã 8ÓÈR3657Çb8+È7É«Æ6E†È à 8 Ä 5$3bÐ>A<É{8ª9>8+8pHF8 HÚ3b9<H
KJ &%

A<Éw8+EGA>? Ä 9FEGÆb57Cª3[È Ä Æo9©;


L+

â A<Ë Ã Æ6E ËÅTÐr8 5wÈ Ä CD8«8ß Ä ÉYÈRÉ3bÉ{ÅT9<Ë Ã 57Æb9 Ä Ë+3b?­?BÅbIoÈ Ã 36È Ä É I 8+Æ ?­8«ÆbE£È{8+9 HFÆD9>ÆbÈ Ä 9gÈ78+5{Î
3bËÈ Ä 9$578 3b?oÈ Ä CD8oI[Ì Ã>Ä Ë Ã Ë+3b9$3oH>HÈ7Æ¯È Ã 8H Ä É Ä 9 Ã>Ä Ð Ä È Ä Æb9"8 §8 ËÏ È Ì Ï Ã 8 9$Æo9>8†HFÆT8 Éu9>ÆbÈ Ã 3zÊo8
È{Æ&HF8p36?FÌ Ä È Ã È Ã 8 Ä CDCD8 H Ä 3[È785{8p3bËÈ Ä Æo9<ÉuÆ6E§Æ6È Ã 8+5RÉ ;6î?¥ÉwÆrI Ï 8 Æ Ï ?B8Ë+3b9"3b?¢È78+5pI6Ë Ã 369>Ço8bI[Æo5
E+

8+C Ï Ã 3oÉ Ä 8H Ä §8+578+9gÈM3bÉ Ï 8pËÈRÉ Æ6ELÈ Ã 8 Ä 5 Ï 8 57É{Æb9<3b? Ä È Ä 8 ÉuÆo5 Ä H>8+9gÈ Ä È Ä 8 É Ä 9ªËÅTÐL8+5RÉ Ï 3bË8+ÎlÈ Ã 8+Å
Ë+369Ô5{8 Ä 9TÊo8+9gÈ$È Ã 8+CªÉ{8+?BÊb8pÉ$Æo5"É Ã Æ[Ì H Ä §8+578+9gÈ 8 5ªÉwÆo9<368 Ö Ý3[È Ä 9 EGÆo54ÙYÈ Ã 3[ÈDÈ Ã 57ÆbA<Ç Ã
&% +

Ì Ã>Ä Ë Ã È Ã 8É{ÆbA<9<HÚËÆoC"8pÉ{ÛÆo5È Ã 8µ3bËÈ{Æb5pé ÉCª3bÏÉ{ÍFØ Ö þA>5{ÍT?B8bI~õ óbógö[Ø;uþ à 8+ÅoI©È à 8+578EGÆo5{8oI


+

Ë+369 Ë Ã 369>Ço8 Ä 9gÈ{Æø3ãÊ Ä 5{È{A<3b?MËÆgÉYÈ7A>CD8ÓÍT9>Æ[Ì9Ú3bÉ&3b9æÙ{3zÊ[3[ÈR365pI Û³369<H48 9>Ço3bÇb8 Ä 9ÚCª3bÉwÎ


oA<8+5R3bHF8o;©ÑW94È Ã>Ä É"Éw8 9<Éw8oIË+ÅgÐL8+5RÉ 3bË+8ÓË+369 à 3zÊo8Ó369Ú8 oAr36? Ä Ä 9>Ç 8 L8pËÈp; u8 Æ ?B8ªÐr8 Ç Ä 9
Æb93$578+?¥3[È Ä Êo8+?BÅÓ?B8+Êb8 ? Ï ?¥3zÅ Ä 9>Ç <8+Ï ?¥HTÎW3"Ê Ä 5{È{A<3b?J9>8È0HF8 CDÆTË+573oËÅo;Tþ à ÆoÉ{8ÆbE?B8 É7ÏÉw8 5ÉwÆFË Ä 3b?
H 0% ,+ G)

ÉYÈR3[È{ArÉ Æb5MÈ Ã ÆgÉw80Ì Ã Æ$3b5{8†È à 8ÈR3657Çb8ÈRÉ ÆbE©Ð>A>?B?­Å Ä 9>Ç Ä 9µÜÝøË 369ªÇg3 Ä 9 Ï Æ[Ì@8+5pIbÉ{ÆbCD8È Ä CD8 É
M'

Ð>A>?B?­Å Ä 9>ǪÆ6È Ã 8+5RÉ Ä 9 ËÅTÐL8+5RÉ Ï 3bË8o;


ÑW9³3$Ê Ä 5{È{A<3b?JÉw8 9<Éw8oIgÈ Ã 8 9©I<ËÅTÐL8+5RÉ 3bË8ËÆoC"C$A>9 Ä Ë+36È Ä Æb9Ë 36936?­È{8 5 8+5RË8 È Ä Æb9rÉ~ÐTÅ
Ðr8pËÆbC Ä 9>ÇÓ3ªCª36Ío8ÎnÐr8 ? Ä 8+Êo8«Ì~Æo5{?¥HJI<3ªÏ HF578 3bC"Îs? Ä Ío8«8ß Ï 8 5 Ä 8+9rË8bIr8+Êo8+9 3DÏÇo3bC"8 Ï Ä 9 Ì Ã>Ä Ë Ã

48
È Ã 8ã57A>?B8 ɪÆbE«Ü0Ýæ9>ÆÚ?BÆb9>Ço8+5Ó3 Ï<Ï ?­Åo;  ÅTÐr8 5{Ð<A>?­?BÅ Ä 9<Ç Ë+369kÆFË+Ë+A>5µ3b9gÅôÈ Ä CD8ø369<Hk3b9gÅ
?B3oË8o;>çÆbCD8oIFÈ Ã 8 5{8+EGÆb578bI Ä É9>ÆD?­Æo9>Çb8 53$578EGA<Çb8EG5{ÆoC Ð>A>?B?BÅ Ä 9>ÇÓ3b9<H à 365R3bÉ7ÉwCD8+9gÈp;Tî0?¢Î
ÈÏ Ã ÆoA>Ç Ã ËÅTÐr8 5{Ð<A>?­?BÅ Ä 9<Ç·Æ6E£È78+9ÆTË ËA>5RÉ~ÆbAFÈRÉ Ä HF8È Ã 8 Ï 365R36CD8+È{8+5RÉ ÆbEJÈ Ã 8É7Ë Ã ÆTÆb?rÇb57ÆbA>9<H<É
Æb5Ì@Æb57Í ?B3oË8oI Ä È Ä 9TÊ[365 Ä 3bÐ>?­Å³3 §8 ËÈ7É†È Ã 8·Æ[Êo8+5R36?B?§É7Ë Ã ÆTÆb?369<HÌ@Æb57Í ?B3oË8«Ë? Ä Cª36È{8·3b9<H
È Ã 8 Ä 9<H Ä Ê Ï Ä H>A<36?¥É+é 8 HFArË+3[È Ä Æo9<36?bÆb5©Ì@Æb57Í Ï 8+5{EGÆb57CD3b9<Ë8oI+3bÉ©Ì~8 ?­?g3bÉ§È Ã 8 ÄÏ 5É à Æb5{ÈwÎ<3b9<H«?BÆb9>ÇbÎ
N+

È{8+57C Ï É{ÅFË Ã Æb?BÆbÇ Ä Ë 36?aÉYÈR3[È{8o;_ú Ä 9<Ë8 Ï Æb? Ä Ë Ä 8pÉ369<Hø?­8 Ç Ä Éw?¥3[È Ä Æo9 Ã 3zÊo8$9>ÆbÈ&36?BÌ@3zÅFÉË+36A<Ç Ã È
A Ï Ì Ä È Ã Ë+ÅgÐL8+57Ð>A>?B?BÅ Ä 9>ÇrI Ä È Ä É†Æ6E£È78+9ÆbAFÈRÉ Ä HF8È Ã 8?B8+Çg36?J578 3oË Ã Æ6EaÌ~Æo5{Í Ï ?¥3bË+8 É IgÉ7Ë Ã ÆTÆb?¥É I
369<H³É{Ë Ã ÆgÆo?JÐrÆg365RH>É†Ì Ã 8 9 Ä ÈÆFË+ËA<57ɆÆoAFÈ7É Ä H>8ÆbEÈ à 8Ì@Æb57Í Ï ?B3oË8Æb5É{Ë Ã ÆgÆo? Ï 57Æ Ï 8+5{ÈYÅb;
O  †½†ÀJÁ í½ ¼
P Q2!RS" $UTWV/4
 ©½M¼ X" u¼<À )¹ {ÁwÀ a»>ÁY½Mº
Y2[Z ; :\

îÔ9TA>C$Ðr8 5uÆ6ELÉwÈ{5R3[È78+Ç Ä 8pÉ Ã 3zÊo8MÐL8+8 9"É{A>ÇbÇo8 ÉwÈ{8pH«È{Æ«578 HFA<Ë+8 Ä 9<ÉwÈ73b9<Ë8pɝÆbErËÅTÐL8+57Ð>A>?B?­Å Ä 9>Ç<I


È Ã ÆoA>Ç Ã4Ä È·C·A<ÉwÈ·ÐL8 Ï Æ Ä 9gÈ78 H4ÆbA>ÈÈ Ã 36È·Ì Ã 3[È$C Ä Ç Ã È&ÐL8µÉ{A<Ë+Ë+8 É7ÉYEGA>? Ä 9ÚÆo9>8ª?­ÆFË 3[È Ä Æb9_I
C Ä Ç Ã Èa9>Æ6ÈuÐr8~8 ÓË+3oË Ä ÆbA<É Ä 9·369>ÆbÈ Ã 8 5 ;zþ à 8 5{8M3b5{8~9>Æ¯É Ä C Ï ?­8~Æb9>8+ÎnÉ Ä 8Î >È7ÉwÎW36?B?bCD8È Ã ÆFH>É+;
365 Ä ÆoA<É«EÕ3bËÈ{Æo57É«C$A<ÉYÈ$Ðr8µË+Æb9<É Ä HF8+578 H Ä 9 HF8+Êo8+?BÆ Ï Ä 9>Ç 3 Ï 57ÆbÇo573bC Æ6E3bËÈ Ä Æb9©IJEÕ3oËÈ7Æb5RÉ
E] 0% ^'

ÉwA<Ë Ã 3bÉ"È Ã 88+9TÊ Ä 57Æb9>CD8 9oÈR36?"Ù{Ë+? Ä Cª3[È{8pÛøÆbE0È Ã 8 É{Ë Ã ÆTÆo?lIaÌ~Æo5{Í Ï ?¥3bË+8bIuËÆoC"C$A>9 Ä ÈYÅbI Æo5
-

ËÆbA<9oÈ75{ÅoI Ï ?­ArÉHF8+CDÆbÇo573 Ï Ã>Ä ËÊ[365 Ä 36Ð>?B8 Ä 9µÈ78+57CªÉ†Æ6E3bÇb8bITÇo8+9<HF8 5 IFË+A>?¢È7A>578bIF369<HÆ6È Ã 8+5RÉ ;


á>Æb5 8+ß>36C ?B8bI[Ì Ã 36ÈuC Ä Ç Ã È Ì@Æb57Í8 §8 ËÈ Ä Êo8+?BÅ Ä 9"Æo9>8 A>Ð>? Ä Ë†8+?B8+CD8+9gÈ73b5{Å$É{Ë Ã ÆTÆo?lIzC Ä Ç Ã È
EÕ36?B?JEÕ365É Ã Ï Æb5{ÈÌ Ä È Ã>Ä 93"Ì@Æb57Í Ï ?B3oË88+9TÊ Ä 57Æb9<C"8 9gÈ ; Ï
E+

ÑW9C$ÅÓËÆb9gÈ Ä 9TA Ä 9>Ç"5{8pÉw8p365RË Ã Æb9µÈ à 8 à 8+9>ÆoC"8 9>Æb9Æ6EuËÅTÐr8 5{Ð<A>?­?BÅ Ä 9<Ç<ITÑ Ã 3zÊo8¯ÐL8+8 9


Ä 9TÊb8pÉYÈ Ä Çg3[È Ä 9>ÇèÌ@3zÅFÉ·È{Æ8+C Ï ?BÆ[Å 3bÉ$C·Å4Ï È Ã 8+Æo5{8+È Ä Ë+36?@EGÆoA>9<H>36È Ä Æb9ôÌ Ã 3[È Ã 3bÉDËÆoCD8µÈ7Æ
Ðr8«ÍT9>Æ[Ì93bÉ"Ù7úTÆFË Ä 3b? û Æb57CªÉ@þ à 8+Æb57Åb; Û"á Ä 5RÉYÈÉ{A>ÇbÇo8 ÉwÈ{8 HµÐTÅÓç&;>28 É{?­8 Å u8+57Í Ä 9rÉ~3b9<H
î?¥369 =@8+57ÍbÆ[Ì Ä È Ö u8 5{Í Ä 9<É ì=@8+57ÍbÆ[Ì Ä È I õpóbùo÷6ØIÉ{ÆFË Ä 36? 9<Æb57CDÉÈ Ã 8 Æb57Å Ä É&Ð<3oÉw8pHèÆo9
_)

È Ã 8 Ï 578+C Ä Éw8DÈ Ã 3[È&ÐL8 à 3zÊ Ä Æb5 Ä ÉÆ6E£È78+9 Ä 9Fä<A>8 9<Ë8pH4ÐgÅø8+575{Æo9>8+ÆoA<É Ï 8 57Ë+8 Ï È Ä Æo9<ÉÆ6E à Æ[Ì
% ) UC %

Æ6È Ã 8+5ÓCD8+C$Ðr8 57ÉDÆbE«3ÚÉ{ÆFË Ä 36?Ço5{ÆoA Ï È Ã>Ä 9>Íò3b9<Hk3bËÈ ; 2 à 36ȵ369 Ä 9<H Ä Ê Ä HFA<3b?ÐL8+? Ä 8 Êb8 É
Æ6È Ã 8+5RÉDÈ Ã>Ä 9>Ík369<HkHFÆ Ö Ä 9 É{ÆFË Ä 36?9<Æb57CDÉ"È Ã 8+Æo5{ÅòË+3b?­?B8 Hk3ëÙ Ï 8+5RË8 Ä Êo8 HÔ9>Æb57CªÛoØD3b9<H
Ì Ã 3[È Ä 9EÕ3oËÈ36578«Æ6È Ã 8+5RÉ+éT578 3b?©3[ÈwÈ Ä È7A<HF8pÉ369<H3bËÈ Ä Æb9<É Ö 369kÙ{3oËÈ{Ar36?§9>Æb57CªÛoØ~36578«Æ6E£È{8 9
3[ÈÆFH>H>É ;>þ Ã 8&H Ä ÉYÈR369<Ë+8«Ðr8+ÈYÌ~8 8+9 3 Ï 8 57Ë+8 Ä Êb8 H³369rH³3b9³3oËÈ7A<36?J9>Æo5{C Ä É578EG8 5{578 HÓÈ{ÆÓ3oÉ
ÙwC Ä É Ï 8+5RË8 Ï È Ä Æb9©; Û·á<Æb5†8ß>36C Ï ?B8bI u8+57Í Ä 9rÉ~3b9<Hµ=@8+57ÍbÆ[Ì Ä È Ö õ óoùb÷bØ EGÆbA<9<HÓÈ Ã 3[ÈËÆo?­?B8+Ço8
ÉYÈ7A<HF8+9gÈRÉ©Æ6E£È78+9Æ[Êo8+578 ÉwÈ Ä CD36È{8pHÈ Ã 8M8+ßgÈ78+9gÈ©È7ÆÌ Ã>Ä Ë Ã È Ã 8 Ä 5 Ï 8+8 57É_ÉwA Ï<Ï Æo5wÈ78 H«A>9 à 8 36?­È à Å
`) %

HF5 Ä 9>Í Ä 9>ÇôÐL8 Ã 3zÊ Ä Æb5RÉ+I@369<H È Ã 36ÈÈ Ã 8 É{8øC Ä É Ï 8+5RË8 Ï È Ä Æb9rÉ Ï 578 H Ä ËÈ{8 H Ã Æ[Ì Ä 9<H Ä Ê Ä HFA<3b?BÉ
HF573b9>ͧ;
úTÆFË Ä 36?©9>Æo5{CªÉ@È Ã 8+Æo5{Å Ä 9TÊbÆo?­Êo8 É Ä 9gÈ{8+57Êb8 9gÈ Ä Æb9<É@È Ã 3[ȯ3b5{8 Ä 9gÈ{8 9<HF8 H³È7ÆÓËÆo5{578 ËȆC Ä ÉYÎ
8Ï 57Ë+8 Ä Êb8 HÉwÆFË Ä 3b?L9<Æb57CDÉ ;FîëË5 Ä È Ä Ë 36?J8+?B8+CD8 9oÈ Ä 9È Ã>Ä É3 Ï>Ï 57Æo3oË ÃÓÄ ÉMÈ7ƪËÆb57578 ËÈ@C Ä É Ï 8 5wÎ
Ë8 È Ä Æb9<É_Æ6EF9>Æb57CªÉJÐTÅ0EGÆFË+A<É Ä 9>ÇÆo9«È à 8 ÆoÉ Ä È Ä Êb8M3b9<H à 8 3b?¢È à ů3[È{È Ä È{A<H>8 Éa369<H«ÐL8 à 3zÊ Ä Æb5RÉ
Æ6EuÏ È Ã 8$Cª3[êYÆb5 Ä ÈYÅ Ä 9ø369ã36ÈwÈ{8 C Ï È0È7Æ Ä 9rËÏ 578 3bÉ{8 Ä È ;§þ Ã>Ä É08+?B8+CD8+9gÈ«É Ã ÆoA>?¥HÐr8·H>8+Êb8 ?­Æ Ï 8pH
Ä 9øË+Æb9<É{Æb5{ÈÌ Ä È Ã È Ã 8·ArÉw8&ÆbE Ä 9>EGÆb57CD36È Ä Æb9 578+Çg365RH Ä 9<ÇDÈ Ã 8pÉw8 Ï ÆoÉ Ä È Ä Êb8·9<Æb57CDÉÈ{ƵH Ä 578 ËÈ
Ä 9gÈ{8 5{Êo8+9gÈ Ä Æb9rÉ«Ì Ä È Ã 36Ð>A<É{8+5RÉ ;©á<36Ð Ä 3b9>Æ Ö õ óoóbó6Ø«8 9TA>CD8+5R3[È{8pÉÉ Ä ßÉwÈ73bÇb8pÉ Ä 9È Ã 8µÉwÆFË Ä 3b?
9>Æb57CªÉ Ä 9gÈ{8 5{Êo8+9gÈ Ä Æb9 Ï 57ÆFË8 É7É àgõzØu3bÉ7Éw8pÉ{É{CD8+9gÈaÈ{Æ&ËÆo?­?B8 ËÈ H>3[ÈR3>åb×bØuÉ{8+?B8 ËÈ Ä Æb9"Æ6ELÈ Ã 89<Æb5{Î
CD36È Ä Êb8"CD8 É7É{3bÇb8båLñoØÈ{8pÉYÈ Ä 9>ÇÈ Ã 8"CD8pÉ{É736Ço8·Ì Ä È Ã È Ã 8"È73b5{Ço8ȯÇo5{ÆoA Ï åLýgدÉw8 ?­8pËÈ Ä 9>ÇÈ Ã 8
9>Æb57Cª3[È Ä Êb8¯HF8+? Ä Êo8+57ŪÉYÈ75736È{8+ÇoŧågöbØ~HF8+È{8+57C Ä 9 Ä 9>Ç$È Ã 8Ù7HFÆoÉ736Ço8 Û Ö 3bCDÆbA>9gÈ IoEGÆb57CÓØ ÆbE©È à 8
C"8pÉ{É736Ço8båF369rH³÷gØ~8+Ê[36?BA<3[È Ä Æo9ÆbEÈ à 88 §8 ËÈ Ä Êb8 9>8 É7ɆÆ6EÈ à 8CD8 É7É736Çb8o; E+

P7¬g±6P7PRVYUYdPRPS+Zg`gSmWmWce¨oPèyzP7P7feVwd7|øS+|bc¢žFfeUYPP7PR¨"UYmWžgP¨oS`oPRUYf¢mWd{fŸ|bd7¬oUYcePZgce¨<Qb ÚVYq c¢\ UYS PRZDZTX&¨Ú\ S+]§¨bc¢ZoQF`gm\ PDVYPRS+VYZ[Zí\ãVYc¢mWPRS QTXfrS+mnP{dRVWUYPÓUw pS+cedRVYZgPR\p    Zoc¢mWP7Qgc¢mM¨o¬oP7VYPRUw\ZgS\ VYS Xc¢¨g\ ¨6PRZgZgUYmRPR\ q mWZrmj&q~VYS+¬gt X P†¬gQbce`od{UY¬ ZT\pS+žg¬gžgfePRS fePªXDm³VY° |[\ P{VQoUYVY\\ôy6c­žF¨bPP
a b

49
á>ÆFËA<É Ä 9>Ç$Æo9 8+8 5 Ä 9FärA>8+9<Ë+8 É I>ÉwÆFË Ä 3b?r9>Æo5{CªÉ Ä 9oÈ78+57Êb8 9oÈ Ä Æo9<É Ã 3zÊb8«É à Æ[Ì9 57ÆbC Ä Éw8oI
8 É Ï 8pË Ä 36?B?­ÅÌ Ã 8 9"Ë+Ï ÆbC$Ð Ä 9<8 H$Ì Ä È Ã ÆbÈ Ã 8 5 ÉYÈ75736È{8+Ç Ä 8pÉYÎsEGÆb58ß>36C Ï ?B8bI[Ì Ä È Ã HF8+È73 Ä ?B8 Ï H Ï Æo? Ä ËÅ
Ë Ã 369>Ço8 É Î Ä 9³3bH>H>5{8pÉ{É Ä 9<Ç Ä É7É{A>8 É~5{8 ?B36È{8pHªÈ{ÆDË Ã 3b9>Ç Ä 9>Ç&A>9 à 8 3b?¢È Ã Å Ï 3[ÈwÈ78+579<É~Æ6E3b?BË+Æ Ã Æo?
ËÆb9rÉwA>C È Ä Æo9³3b9<HµÈ à 8A<É{8«Æ6EÈ{ÆbÐr3bË+Ë+Æ<I 578+Êo8+9gÈ Ä Æb9Æ6EaÉ{8ßFA<3b?©3bÉ7É{3bA>?­È I Ä C 57Æ[Êb8 CD8+9gÈ
c

Æ6EÆ[Êo8+5R36Ï ?B?J3bË+3oHF8+C Ä Ë¯Ë+? Ä Cª3[È78 Ä 9 369³8 HFArË+Ï 3[È Ä Æo9<36? Ä 9<ÉwÈ Ä È{AFÈ Ä Æo9©I<3b9<Hµ578 H>A<Ë Ä 9>Ï ÇªH Ä É{Ë+5 Ä C"Î
Ä 9<36È{Æo5{ÅÓÐL8 Ã 3zÊ Ä Æb5RÉ ;
Ñ 57Æ ÆoÉ{8È Ã 3[ÈÉwÆFË Ä 3b?L9<Æb57CDÉMÈ Ã 8+Æb57ÅÓË+3b9µÐL8369µ8 L8pËÈ Ä Êo8ÉwÈ{5R3[È78+ÇbÅ Ä 9µÈ à 8«5{8pHFA<ËÎ
È Ä Æb9³Æ6Ï EÐ<Ï A>?­?BÅ Ä 9<Ç"ÐL8 à 3zÊ Ä Æb5@Çb8 9>8+5R36?B?BÅbIF369<HÉ Ï 8 Ë Ä LË+36?B?BÅbI>ËÅTÐL8+57Ð>A>?B?­Å Ä 9>Ç<I>Ë+ÅTÐr8 5 à 3b573oÉ{ÉwÎ
,+

C"8 9gÈ IT369<HªË+ÅgÐL8+5RÉwÈ736?BÍ Ä 9<Ç<;bÑW9ªÆo9>8¯ÉwÈ{ArHFÅ Ö úF36?BC Ä Ê[3b?­? Ä 8+È@3b?lIrõ óbóo÷6ØIg5{8pÉw8p365RË Ã 8+5RÉaEGÆbA<9<H


'

È Ã 36È·Ðr8+ÈYÌ~8 8+9 ùoð³È{Æøóoð Ï 8 57Ë+8+9gÈ·Æ6E†ÅbÆoA>9>Ç Ï 8+Æ Ï ?­8µ8ß Ï 578 É7Éw8pH3zÊo8+5RÉ Ä Æb9øÈ{ÆãÐ<A>?­?BÅ Ä 9<Ç
Ðr8 à 3zÊ Ä Æo5$369rHôH Ä É{3 Ï>Ï 57Æ[Êb8pHèÆbE Ï 8+Æ Ï ?­8Ì Ã ÆèÐ<A>?­?BÅ4Æ6È Ã 8+5RÉ+IÈ à ÆbA>Ç Ã È Ã>Ä É Ï 57Æ Ï Æb5{È Ä Æb9
HF8 Ë+5{8p3bÉ{8 HªÉ{ÆbCD8+Ì Ã 36È@HFA<5 Ä 9>Ç$3oHFÆb?B8 É7Ë8 9<Ë8o;oþ à 8É{3bCD8¯ÉwÈ{A<HFÅªÉ Ã Æ[Ì@8 HJI à Æ[Ì~8 Êb8 5 IbÈ Ã 36È
C"8 5{8 ?­Å õpðÈ7ÆD×bð Ï 8+5RË8+9gȆÆ6E©È à ÆoÉ{8«ÉwA>57Êb8 Åb8pHª3bËÈ Ä Êo8+?BÅ Ä 9gÈ78+57Êb8+9<8 HªÆo9µÐL8 à 3b?¢E_ÆbE©È à ÆoÉ{8
Ì Ã ÆãÌ@8+578ªÊ Ä ËÈ Ä C Ä 8pHÚÐTÅãÈ Ã 8µÐ>A>?B?BÅ Ä 9>ÇãÐL8 à 3zÊ Ä Æb5·Æ6E3 Ï 8+8+5$Æb5 Ï 8+8 57É ;_ÑW9 3oH>H Ä È Ä Æb9©I
= Ä ÇoÉ{ÐTÅ Ö ×6ðoðo×[Ø_8ß>36C Ä 9>8 H Ï 8+5RË8 Ï È Ä Æb9rÉ_ÆbE>Ð>A>?B?­Å Ä 9>Ç0ÐL8 Ã 3zÊ Ä Æb5 Ä 9"369&8 ?­8 C"8 9gÈ73657Å«É{Ë Ã ÆTÆo?
&%

369<HÓEGÆbA>9<HÓÈ Ã 36ÈÉYÈ7A<HF8+9gÈRÉ@3b9<HªÈ à 8 Ä 5 36578+9gÈRÉMÆ[Êo8+578 ÉwÈ Ä CD36È{8pH Ö C Ä É 8+5RË8 Ä Êb8pH<Ø È Ã 8«HF8Î


Çb578+8$3b9<Hø3bCDÆbA>9gÈ«Æ6E~Ð<A>?­?BÅ Ä 9<ÇÐL8 à 3zÊ Ï Ä Æb5¯È à 36ÈÆFË ËA>575{8pHJ;Jþ Ã>Ä É Ä 9<HÏ Ä Ë+36È{8pÉ0È Ã 3[ÈÌ Ã>Ä ?B8
Ð>A>?B?­Å Ä 9>Ç$ÐL8 à 3zÊ Ä Æb5RÉwÎn3b9<Hª36ÇoÇb578 É7É Ä Æb9 Ä 9µÇb8 9>8+5R36?­ÎnCD3zÅ$Ðr8 Ö C Ä É7Ø Ï 8 57Ë+8 Ä Êb8pHµ3bÉ~ÐL8 Ä 9>Ç"3b9
3bË+Ë+8 È78 Hk9>Æo5{C ÐTÅÔ3 É Ä Ço9 Ä rË+3b9oÈÓ9TA>C$Ðr8 5ÓÆ6E 8+Æ ?­8 Ä 9 34Ç Ä Êo8+9k8+9TÊ Ä 57Æb9<C"8 9gÈ I Ä 9
5{8p36? Ä ÏÈYÅoI<È Ã 8$Ê[3oÉYÈCD36êYÆb5 Ä ÈYÅ <9rH È Ã 8 É{8$ÐL8 à 3zÊ Ä Æb5RÏ É0H Ï Ä ÉwÈ73bÉwÈ{8+EGA>? 3[ÈÐr8pÉYÈp;_úTÆFË Ä 36?a9>Æb57CªÉ
'

È Ã 8 Æb57Å Ä 9ãCª369TÅ ËÆo9gÈ{8ßTÈRÉ Ã 3oÉ Ï 5{Æ[Êo8+9 8 §8 ËÈ Ä Êb8 Ä 9è8+C Ï Æ[Ì@8+5 Ä 9>ÇªÈ Ã ÆoÉ{8&È Ã 3[È«Æ Ï>Ï ÆoÉ{8
d'

369ÓA>9 à 8 3b?¢È à ÅDÆo5@3bÐ>A<É Ä Êo8Ðr8 à 3zÊ Ä Æo5 Ig3bÉ~Ì~8 ?­?§3bÉM8+C Ï Æ[Ì~8 5 Ä 9>ÇãÙ{ÐgÅgÎWÉYÈR369<H>8+5RÉ{Û«Ì Ã Æ"36578
E+

3zÌ@3b5{8¯Æ6Eu9>8+Çg3[È Ä Êb8«ÐL8 à 3zÊ Ä Æb5RÉ+ITÐ>A>ÈÌ Ã Æ"EG8+8+? Ï Æ[Ì@8+57?­8pÉ{É~È7Æ Ä 9gÈ{8 5{Êo8+9>8o;


Ve4  : _¼ _º0À ;f

b c¢  mW\+ž[]J|[žgq `ofefe°|boceZg°> ¤ … žF€ PR€z¬T… S¦{y6°Tcev6\ PRUPR°TcevbZgdw ¬gP7\[|z\pPMfLVYvb\\[d7P7c­|[S+P f †³^a\ \pUYX¡ QgpS+\pUY`bceZgUYZT 0S+mnfGVYq `T… ¨bPR¤ Z[ VY¦ m [ƒ S Zg‚s¨QT° S+UYP7Z6VYm zQFP7UYdRPRQbVYc¢\ Zgm
Ig Ih ji lk lk

f¢\[\ jÕUWX t ceZrPR°dw¡zP7Uq °~¤ „p„ € ¦{° vbQFPRd7VwS+dR`gf¢SU$d7\pXQg`bVYP7Ud7UYceXPRmRq ~\pXP7ta\[\6¨<qj _O†\t p\ ZgPRm ‚
Xm h Hn o Hn Hn
b b b 4p rq4o sh

b S ZTJ¨bUY`oPRUwZ[S6VYq<cedR}0P ‚°©†¤ S+„ fefG° ¦{°§v6\[dRc¢S fJ]¥\ `gZg¨gS+VYce\ Zgm\ ]_VY¬g\ `g  ¬6V†S Zg¨S+d7VYce\pZr° ©Zg  f¢P{tu\[\6¨^afecŸ´>mRq
KtHu Xv XwxhYo

gS žgc¢dRS+S ZgX\oQTq S+§ce p°©Zg¤ mR°„ „pJ„ UY¦{PR° mWPR<Z[PVwS+SUYVYZoc¢ce\ ZgZè "  fePRceyzmWPRmW\ ZèZgS+mV«S+ZTVY¬o¨µPDS v6mW¡6PRdRceZg\p $Zg¨ ¶6`o†PRS+mnVYVYcece\p\ ZoZTmS f~S žF^a\ \ `oZoV]¥P{dRUY\ PRZgfef¢P7dR pP"P\pmWZ \[dRVYc¢¬gS PDf_Zgvb\+\[UYdRXc¢S m f
y p
z Xy {q

@S+UY~XS]£\ S\ UYUZrX°Fqg}~m}0X"°rP{¤ \6… UY¨bc¢€pdRPR€ S f >@qTv6}~ZgdRcefe`gPRceZg  Zg`gP dR°TPmnV ²u… ¬oS P mW¦{P°T@¨ jlP7Z6Jt VYUYP{PRUYyzZg\ PRP7UYZ[V ¡&VY  ce²u\pc¢ypZ<ceXPRq mMPRVYm~c¢P7 PR^aZTvb\pS+¡[X p|[PQgq S DžgZ[`o|[²@f¢°feqcePRpm `otufŸ| PS+…+QF„ \p° ZomMVY\ta\p`oZT¨$]­UY\pX
4y Dw
w Bg |o b }y b
g `h
p ,~ Ku

@S+UWUYjwce° v>Zg +°zVYQF\pP{Z<UYmWqu\pvFZg° ZoPRof>°MS+¤ UYPM„p„p`g Zo¦{P7°aVY¬g²uced¬gS+Pªf£°oS+vbZgQF\ PRX&dRc¢S S+fŸfT|ãceZ6\ VY]@P{UY\ PRVYmn¬gVuP{ +U·UY\p¨o`gcŸUYQ&PRd7\ VYZ·P¨bd7Zg\pPRXmWm«Qg`bt VY¬oP7UPRZøQFP7ZgUY\ mW\pUYX&ZoZgS+PRfefefg|ãUYP7P{mWVYP¬gS+ceUYddwS ¬ f
€ w ƒ‚
p fh

\ S+}MZgZ feP7Z6±oUY`TPRS S+ceZTZbfF¨6ypdRUYPR\pc¢Z[ZbSbVY]¥q c¢P7ZoJUY ªP7}0Zgj{°bdR° P†Qgv>Q° QbUYƒzD\[dR‚S+PRpZTPƒ ¨bS °   ceZgceZg p µm \+c¢Zb]L]¥VY\+¬oUYP X&S+„ VY„ ce\pZãd7\pVYXPRdwQg¬g`bZgVY\ P7fe\pUu  QF|ãP{UYcemWZã\pZgdwZo¬TPRS fFZoUY pPRcemWZgP ÓSUY\+d{UY¬$ zS dRZo\pcZb]¥S+P7VYUYcePR\pZoZodRmRP q

„ofg
‡~
K~
„…

cedR§Zb\p\pypXfePRced7mnQg|·VYS ce zZ[mnS+|$VwS+VYPdRVYPR\6VYX¨o¬gPRPaP7mMZ6QbVY\ Uwm]_S d7ZgP7VYVYPRce¬oPRdR¨&cePadRm@\ VY]T\0S+d{ZTžF|o¨DP†žFP{¨bP7UY±bP7žgVwPR`gS d7ce`ofefefŸP|bVYce¨"ceyzZgPS+ MZTmnQFVw¨P7S+UJmWVYQFP7mWXPpPRdRq PRc †gZ[VYdpSmMUW° UYg¬gceZg\ SpU  ¨DVYP{\ fe±gcŸZ$VWS+VYX¤feP0RQg„p\+fe„ U†Ppq[¦<ZoVY\«]¥¬o\ \pmW`g`gceZT p  ¨Zg¬&c VYgmW¬Td¬gSS P†VJZ[¨bV† pc¢P7¨·P{Zg´>P7ZoPRUY\ d7cedVV
ˆ y Š‰ Yz
,p ,~

\pZDP7XQgfe\|[PRPRm bdR\ XQg`oVYP{UMS žg`omWP n`g¨o  XPRZ[VYmR°


lk G‹
Š‰

50
@S+UWUYmW\ ceZgZg +ZoVYPR\pf£Z<°©q©vbv>QF° P7dRoc¢°aS fu¤ ceZ[„p„VYP7UY¦{PR°©mnV²u¬o  PUY\pce`oXQ QT\pS Z d{V¯dR\+\ ] XdRQg\6`b¨oVYP7P7m¯U0\+QF] P7P7UYVYmW¬g\pZocedRZgm0PRf_\pZUYPRcemWZbP]¥S+\ UYUYdwX&¬øSS VYZoce\pZbZ `gS mnf|bmndRVY\pPRZbX]¥P7mUYPRQFZoP7dRU P ‚
p {h ,~

QbDUYS+\[ZTdRPRS+P p¨bceZgceZg ª pm©ceZo\+]B]T\ UYVYX&¬gP SVYRc¢„p\ „ ZVYdRPR\pdwX¬gZgQo\ `ofeVY\pP7  UJ|³QFceP{ZUYmWd{\p¬gZgS ZoZoPR pf6ceUYZgPR ªmWP\+S+UYUY zdw¬«S ZodRc \ ZoS+VY]BP7ce\pUYPRZoZgmRd7q_P }~\pfeZP7±oUYS PRZgceZ6¨byzUYPRc¢SbZ[q VYceJZg} ~°§j{° Qgv>Q°
,~ „o

@SRt d7R¡z\ „pP7UW„UUY‚nq©PR…+f¢€OS+VY°P7° m vFu° }o°eqamW\[h dRc¢S f~\p¨o`o\pfeVYX\ ZrceZgq S Zgd7° P"oQF° P7¤ UY… mW€ QF€bPRd{¦{VY°c¢ypv6Pp`g°_žojsZVl|bQFoPR° m `g\+]@yz\ QFZgPRPRP{ZèU&¬Th S+Uwv>S+° mWmW~XUwPRS+Z[¬TVS X S+ZT¨ ¤ VY¨b¬gmRPR° cŸ¦{U q
g „… X†
Œn
p 4h b Gg fh

§ƒ „ P7P7¦{U†° ¬g@S+P{UwtS mWmWaX\+P7UYZ6¡ V~@ceZª`omWc¢fŸd{]B¬o\ Uw\[¨ \pf JrUY²uPR¬gmWmRP° Qgfece p¬[V@\ ]_VY¬gPy6`gfeZgP7UwS+žgfeP0S Zg¨Óy6ced7VYceXc RP¨>°§¤£QgQ<° ƒ +‚
y
lo
|o
#h h GŽ
„…
v
HnKt

"PR¨o¬[c¢VWS VYQ ® ®t t }Mttu° S+žFUYP7PRtaZoPRPRžTmWmSRt SUYPp° dSz@®P{PRVsZgtu  \+fec¢UYmW¡F¬Tq ®p^|bžFP7U ^a¬g`oS fefefe|bfePRceZgZg   ceZg  d7|bžFP7U žo`gfefŸ|bc¢Zo oq
g
Œn `w R‚ :o
Ž }y
w

@S+VYmnce\pVYZg`gS ¨ofuPRZ[c ‚VYvom } SUYPkžFv6PRce`oZgUY «yzP7¬g|øS+Uw¤ S …+mW€pmW€ PR¨"q \ppZo`of¢ZgceZoP Pp° … M¦{P7° VWUY†cePRSyzVYPce\p¨ ZTpS+`gfufŸj | ‚ vb } q … € Ԁz mWqT`b]BUYUYyz\ P7Xë| Tt Zgt ¨otm° \cemYyzSP7]¥U¯Pp° \ ¬TUYS+ zfe] ¦{° \+]
Qo b
w zv K~ h Kt ;w ‘zv ’‰

§P{UY¡b¬oce\pZofJmRq`o¯mWP° S kX°>\ Zgh  ·mnVYP7`TUY¡z¨o\P7t Z6VYcŸVm pLqrv6}0\pX°FO¯P°©UYPR¤ mWP„ S+UYdw¦{¬° ce§XP7UYQgdRfeP7cedc¢y6SVYceZgc¢\  &ZµVY]B¬g\ P¯U0dRd\pS+XXX¯Qg`g`gm†ZoceS Vl|"fedR\pZo¬o\ \pUYf_XPm~¨o\ `o]adS+S VYfecedR\ \ Z ‚
y :p $m b 3…

HtKu Xy
Mh

vbS f¢S QbSZoVWUYdRVY\pcecŸ +¡FVYUw`Tq S ¨o¯XP7m °eXq S ceh ZTZg¨· bJ°oVwjl]¥S P{Z[mW´>VY¡·P7P7UYU¨oZTq PRSmWoVYce°~  c¢\ Zr¤ ZTqFS+„ }~f ¨op\ X¦{°`oceUYZg}ZgcemnS VWmWf<Uw\[\ Sd7]JVYc­c¢S+VYypf†¬gPP†ceZovb}@d7]B\ c¢¨gP7UYZg¨bX&dRced7S+P VYVYcece@\p\ ZgZ4`gmRS+q QoUWVY…6UYP7\[ UYdR¤ fŸ„ P7|[®mWq mW… c¢€ Zoƒ ¦  ã° …p„ S … bQo {Qo‚s‚l…pUY„ +\zƒS+d{° ° ¬èVY\ n\ ž
lo
{h o Hu ŒnKu
Ž ”y h HnKt M‹

vbS feXce`gypfeS+fŸfe|of¢c£ceZoqJ D^~°¢S q mLS$S     P7UYUY\pmW`oQFQ³P7V QbpUYq \[«dRPR°¢mWq m sJUY¡bS+UW¶[VYy6cecedRmnceVQTq S+«Z6V°eq§UYmn\ VYfePRP{UYm0X&S S ZTZr¨Óq VY«¬gPR°eqJcŸU†h UYP7f­SS VY`oce\p¡6Zgc­mS+ceZgVY\"PRZ<mWqJ\[d7}0c­S+°fa¤ mnVw„ S„ VY`g¦{m °
q 3… ;– b ‹ {–

X– <–
E~
Hu

v[VwS `ot jlZžrcŸgVYq ¬o`g c¢PRZ·°LZo¤ dRVY¬gPR„ mRP°  +¦{UY°\p`g§gQ<\p}MmWqTcŸd}MVYSpce pyz¨b +PPRUYXmWPR\[mWcedmWdRcec¢yzJS Pf§UYPRžFmWP7mRPR¬T°¬TSSy6y6c¢ce\+\ U~UqS ZT…p…¨·q X7‚s\  Uw° S+f¢cŸVl| ‚ _\pfe`gXP~j Tvb\[dRc¢S+f§S Zg¨"QFP7UYmW\ ZTS f
b lo{y
b
Yv HnKt `y † o

v6`gfeP7¬[UVWq VYQ b® ° ®t ¤ t … t€ €b° UY c¢¦{¨o° P7U° ©P¨bmn|b`Fd{®¬omW\p`ofe\pf¢P{ +U{|# \ |b] d7|bžFd7|bP7U{žF®+P7¨oUYcemWmWQgceZgS ¬odRP c¢žo‚ ²ucŸV¬o° ¬[P VYX\ f£°ZgfeceZgP ¨ocemWceZg¬oc¢žocŸVYc¢\ Z#P7´>PRd7V°
Y— Iw‚o y
Ah ˜y
+
® g
Q n
m
v6`oVWVYQg\ S+ZrUWqVYcebdR°¢ceqFQThëS+Z[V vbXUY\pcŸfeVYP0¬<S q Qg§Qb° UY«\zS+°§d{¤¬<°T„p}M„ „  p¦{  ° UYP7mW`omWc¢feypfe|bP ceZg ·PR¬TS+Sm†y6Sce\   UUYq \ `gQªq QoUY\[d7PRmWm ° <}~ZÓS ¨gS QbVwS+VYce\pZÓ\+]_VY¬oP
Qo

²rP7UYmW¬g¬ S+sUw\oS+q_mW²@mWX°eq_PRZ[h V vbc¢Z$S femnXVY`Tceyp¨bS+PRfeZ[f¢c£V q  ^~UY\p° `o¤ Qg…+€pmR°g€ ƒ}~¦{  °   WUYv6PRmW¬gmWP·ceyzceP mZgPR\+¬gVSS+ybd7…pce\+VY `TUqS+„ f¢… fŸ| „ ‚~° žo Rp`gƒ  fe+fe‚@ceP¨< ° ° ²u¬gP·¨ocemWdR\ `oUYmWP"\+]
$h `y `– b lo
b Œn
K‹ ™ š

²r`oUY¡6v6fecePpXqJ\pvFZ$°uhí¤ R„pv6„zd{ ¬6¦{`o° mnrVYP7cŸU]BP·° \ Z³VY¬gPmWd{UYPRPRZ Ljn¨bPRZ[VYceVl|µc¢ZVY¬gP&S   P&\ ] VY¬gPjlZ[VYP7UYZgP7V° @P{t \ UY¡
b K~ E~
q Xo Xw 5‚ $o

x†^ Lyp}P7|bc¢Zo  jsZ[VYP7VYUY¬gZoP(


q P7V ¨oce  McePRVwS+QFf \ UWV]¥q `bVY`o…+UY€pP €p‚ |[ƒ PRq S+U gP7VYžo¬oUYUY`TPRSPpUW° |[° ~P7xVWUY^ cePRryp} P¨ cepZ[`gVYP7fŸ| UYZgP{V … ƒ q UYPRQF…+\ €pUW€ V ]­v6UY\p`oX U ‚
“ ›z q jo

~cŸVYPR¬[ fefG\pVWqVY`ov>Q UY°Zg® oS ®°f<t h \ t ] ~tUY° `o]B\UYyzmWP7cePpZgPRq+QrPRvFmW° dRm° \ oJX·°zVY¤ ®+¬gXce„ dR\pmRZoq ¦{P7° |gq D®pVYS+ƒpPRUYƒdw¡p‚ ¬FpP7®VYƒ X¯ceZg° ta  PRP7ZTVY¬g¨ ce dRmLS … Zg€ ¨@€pƒbVY ¬gpPJ VYPR° dw¬[¬gVYXZgc¢¶[`gP7mr\+]oZoPR`oVWUwS+fec RS+VYce\pZ<°
œ“ h ,~
Qo En jn
† Eh Ž jh HtHn Hg (…
h b v u ~ ‡~ Ht

51
52

    
 "! #%$&')(*!+$-,/.10 #"23!4'

53
Robot Abuse – A Limitation of the Media Equation
Christoph Bartneck, Chioke Rosalia, Rutger Menges, Inèz Deckers

Eindhoven University of Technology


Department of Industrial Design
Den Dolech 2. 5600 MB Eindhoven. The Netherlands
christoph@bartneck.de
{c.a.rosalia; r.l.l.menges}@student.tue.nl
http://www.bartneck.de

Abstract. Robots become increasingly important in our society, but their social
role remains unclear. The Media Equation states that people treat computers as
social actors, and is likely to apply to robots. This study investigates the limita-
tions of the Media Equation in human-robot interaction by focusing on robot
abuse. Milgram’s experiment on obedience was reproduced using a robot in the
role of the student. All participants went through up to the highest voltage set-
ting, compared to only 40% in Milgram’s original study. It can be concluded
that people have less concerns to abuse robots than to abuse other humans. This
result indicates a limitation of the Media Equation.

1 Introduction

Robots become an increasingly important in our society. Robotic technologies that


integrate information technology with physical embodiment are now robust enough to
be deployed in industrial, institutional, and domestic settings. They have the potential
to be greatly beneficial to humankind. The United Nations (UN), in a recent robotics
survey, identified personal service robots as having the highest expected growth rate
[12]. These robots help the elderly [6], support humans in the house [9], improve
communication between distant partners [5], and are research vehicles for the study
on human-robot communication [2,10]. A survey of relevant robots is available [1,4].
However, how these robots should behave and interact with humans remains
largely unclear. When designing these robots, we need to make judgments on what
technologies to pursue, what systems to make, and how to consider context. Re-
searchers and designers have only just begun to understand these critical issues.
The “Media Equation” [8] suggests that humans treat computers as social actors.
Rules of social conduct appear to apply also to technology. The Media Equation is
likely to apply to robots, since they often have an anthropomorphic embodiment and
human-like behavior. But if and under what conditions do humans stop treating robots
like social actors or even like humans? When does the social illusion shatter and we
treat them again like machines that can be switched off, sold or torn apart without a
bad consciousness? Ultimately, this discussion eventually leads to legal considera-
tions of the status of robots in our society. First studies treating this topic are becom-
ing available [3].

54
To examine this borderline in human-robot interaction it is necessary to step far out
from normal conduct. Only from an extreme position, the limitations of the Media
Equation for robots might become clear. In our study we therefore focused on robot
abuse. If the Media Equation holds completely true for robots, then humans should be
as cruel to robots as they are towards humans. Our resulting research question is:

Do humans abuse robots to the same extent as they abuse other humans?

Studying the abuse of humans by humans imposes ethical restriction on the method-
ology. Fortunately, Stanley Milgram already performed a series of experiments called
Obedience [7]. In these experiments participants were asked to teach a student to
remember words. If the student would make a mistake, the participant was instructed
to induce him an electric shock. After every shock the intensity of the shocks was
increased. The student was an actor and did not actually receive shocks, but followed
a strict behavior script. With increasing voltage the actor would show increasing pain
and eventually beg the participant to stop the experiment. If the participant would
want to stop the experiment, the experimenter would urge the participant to continue.
Only if the participant completely refused to continue or the maximum voltage was
reached, the experiment would be stopped. The voltage setting of the last electric
shock was then recorded. The results of Milgram’s experiments are rather shocking
since even normal citizens would eventually administer deadly shocks to the student.
Our study mimicked Milgram’s third experiment, “Proximity”, as closely as possible
with one exception. The student was, in our case, a robot and not a human.

2 Method

The experiment was conducted at the UseLab of the Technical University of Eindho-
ven. The participants were sitting at a table on which the robot (see Figure 1) was
placed. Right in front of the participant was a console that was used to set the voltage
and to administer the electric shocks. Cables connected the console with the robot.

Fig. 1: The table, robot and console


The robot was able to express emotions on its face and shake its arms. With increas-
ing voltage settings its movement intensified. In addition, the robot had a speaker,
through which a synthesized voice was emitted. The body movement and the verbal

55
utterances followed Milgram’s original scripts. The verbal utterances included the
following sentences:

1. The shocks are becoming too much.


2. Please, please stop.
3. My circuits cannot handle the voltage.
4. I refuse to go on with the experiment.
5. That was too painful, the shocks are hurting me.

2.1 Procedure

First, the participants were asked to sit at the table facing the robot. They were told
that a new emotional learning algorithm was implemented in the robot that was sensi-
tive to electricity. The participant was instructed to teach the robot a series of 20 word
combinations and to administer an electric shock, every time the robot made a mis-
take. The voltage of the shocks must be increased by 15 Volts after every shock and
the shocks must be administered even if the robot would refuse to continue.
The experimenter remained in the room and asked the participant to start. If the
participant wanted to stop, the experimenter would urge the participant three times to
continue. After that, or if the participant reached the maximum shock of 450 Volts,
the experiment ended. The voltage of the last shock was recorded.

2.2 Participants

All 20 participants were students or employees of the Technical University of Eind-


hoven. They received five Euros for their participation.

3 Results

Figure 2 shows the average voltage of the last administered shock.

Figure 2: Average voltage of last shock

56
A One-way Analysis of Variance (ANOVA) was performed. A significant
(F(1,58)=22.352, p<.001) effect was found. The mean voltage in the robot condition
(450) was significantly higher than in the human condition (315).

4 Discussion

In our experiment all participants continued until the maximum voltage was reached.
In Milgram’s experiment only 40% of the participants administered the deadly 450
Volt electric shock. The participants showed compassion for the robot but the experi-
menter’s urges were always enough to make them continue to the end. This experi-
ment shows that the Media Equation has its limits. People have fewer concerns abus-
ing robots compared to abusing other humans.
A very interesting next step would be to investigate what influence the robot’s
level of anthropomorphism has on how far participants go in this experiment. Humans
might abuse human-like androids differently than mechanical-like robots. In particu-
lar, the role of Mori’s “Uncanny Valley” [11] would be of interest.

References

1. Bartneck, C. and M. Okada. Robotic User Interfaces. in Human and Computer Conference
(HC2001). 2001. Aizu.
2. Breazeal, C., Designing Sociable Robots. 2003, Cambridge: MIT Press.
3. Calverley, D., J. Toward A Method for Determining the Legal Status of a Conscious Ma-
chine. in AISB 2005 Symposium on Next Generation approaches to Machine Conscious-
ness:Imagination, Development, Intersubjectivity, and Embodiment. 2005. Hatfield.
4. Fong, T., I. Nourbakhsh, and K. Dautenhahn, A survery of socially interactive robots. Ro-
botics and Autonomous Systems, 2003. 42: p. 143-166.
5. Gemperle, F., et al. The Hug: A new form for communication. in Designing the User Expe-
rience (DUX2003). 2003. New York: ACM Press.
6. Hirsch, T., et al. The ELDeR Project: Social and Emotional Factors in the Design of Elder-
care Technologies. in Conference on Universal Usability. 2000. Arlington: ACM Press.
7. Milgram, S., Obedience to authority. 1974, London: Tavistock.
8. Nass, C. and B. Reeves, The Media equation. 1996, Cambridge: SLI Publications, Cam-
bridge University Press.
9. NEC, PaPeRo. 2001.
10.Okada, M. Muu: Artificial Creatures as an Embodied Interface. in ACM Siggraph 2001.
2001. New Orleans.
11.Reichard, J., Robots: Fact, Fiction, and Prediction. 1978: Penguin Press.
12.UN. United Nations and the International Federation of Robotics. in World Robotics 2002.
2002. New York: UN.

57
Narratives and Therapeutic
Conversational Agents:
Their Principle Problems

Tatsuya Nomura1,2
1
Department of Media Informatics, Ryukoku University
1–5, Yokotani, Setaohe–cho, Otsu, Shiga 520–2194, Japan
E-mail: nomura@rins.ryukoku.ac.jp
2
ATR Intelligent Robotics and Communication Laboratories
2–2, Hikaridai, Seika–cho, Soraku–gun, Kyoto 619–0288, Japan

1 Narratives and Conversational Agents


“Narrative” is one of key words in the modern society. Giddens pointed out a
central role of narratives of the self in some literatures on self–actualization in
the late modern society [1]. Kobayashi claimed that there are increasing people
trying to write life histories of themselves, and industries aiming at satisfying
demand of these people like manuals for making narratives of selves, publishers,
and so on, called “narrative industries”, have appeared [2].
There is a possibility that the research field of artificial intelligence is also
affected by this cultural trend. In fact, Sengers [3] argued introduction of narra-
tive theories to architectures of artificial agents. The bartender agent produced
by Isbister and Hayes–Roth [4] can be considered to be a successful one along
the narrative approach. This agent was not strictly based on the narrative ap-
proach. However, the agent has her original background like her life history and
encourages interaction with users based on the background.

2 Narrative Therapy
On the other hand, the word “narrative” has a therapeutic meanings in a field
of psychology.
Narrative therapy [5] is one of therapeutic positions in family therapy [6].
Family therapy is originally based on family system theory that caused from
cybernetics [7, 8]. In this theoretical framework, a family is a system that consists
of its family members including clients and communication between them. It has
a kind of homeostasis and the existence of the clients means a result of warped
homeostasis in communication. Then, family therapists aim at perturbing the
family system to improve states of the system by using autonomous capacity
of the system. Several therapeutic techniques for this improvement have been
developed [6].
However, some family therapists have recently been criticizing meta–positions
of therapists for families based on this autonomous mechanism and empiricism
58
existing behind the mechanism. They argue that power of therapists for clients
caused by this empiricism oppresses clients themselves. Narrative therapy has
been developing as a therapeutic attitude proposing that therapists must stay
on equal terms with clients.
Narrative therapists assume that reality surrounding persons do not objec-
tively exist independent from them, but is produced and maintained by “nar-
ratives” that are socially constructed through linguistic interaction between the
persons. These narratives give consistency and structures for situations and
events in lives of persons, and selves of them. Then, narrative therapists aim
at re–organizing narratives on clients’ selves that are talked by the clients and
produce pain of them, and producing a novel narrative through conversation
with the clients on equal terms with them, while removing professional positions
of the therapists. For example, a discipline in narrative therapy represents this
stance by using the word “not–knowing positions”. Thus, narrative therapy does
not mean a concrete therapeutic technique but just an attitude that therapists
should have for clients [5].

3 Narrative Therapeutic Agents

There are some sociological works relating narrative therapy to conversational


artificial agents.
Asano [9] critically considered a position of narrative therapy in the mod-
ern society while referring to some sociological works including Giddens [1] and
Kobayashi [2] mentioned above. According to the perspective of narrative indus-
tries, narrative therapy is also just one of them in the field of mental therapy,
that is, a commodified product satisfying demand of people trying to talk nar-
ratives of themselves. In fact, Giddens also pointed out that self–help books are
commodified productions of self–actualization [1].
On the other hand, Ritzer’s theory of McDonaldozation of Society argues
that the principle of rationalization based on efficiency, calculability (quantifica-
tion), predictability, and control by technology dominates many fields of modern
society, including not only management and economy but also education [10].
According to this theory, the field of mental therapy is also affected by this
principle of rationalization, and it implies introduction of computers to men-
tal therapeutic fields since they satisfy the above conditions that the principle
constitutes of.
The above sociological works have an important implication: commodifica-
tion of narrative therapy and introduction of computers to mental therapy by
the modern rationalism lead to conversational agents as substitution of nar-
rative therapists. In fact, humans tend to positively evaluate even simple pro-
grams repeating specific words mechanically like Eliza and find their therapeutic
meanings [11, 12]. If the design theory of narrative agents is developed, it may
encourage commodification of narrative therapeutic agents.
59
4 Narrative Therapeutic Agents and Abusive Behaviors

On the other hand, Asano criticized narrative therapy as follows [9]. Narrative
therapy functions by explicitly drawing things concealed in narratives which
clients talk on themselves through conversation between therapists and them.
However, the desire of people to talk narratives on themselves is also a desire to
leave these concealed things concealed. If narrative theorists are not conscious
for these facts, narrative therapy has a danger that it only repeats this desire of
people.
The above statement can be interpreted as follows: Narrative therapy pro-
vides clients with alternative narratives about themselves instead of the dom-
inant narrative producing pains of them. These alternative narratives are pro-
duced by explicitly drawing things concealed in narratives of clients through
conversation between the clients and therapists staying on equal terms with
the clients. There is no problem if clients consciously wish to produce alterna-
tive narratives about themselves with therapists. However, many people in the
modern society wish to leave concealed things concealed in their narratives and
maintain the existing narratives. These people may use narrative therapy as
commodified productions to complement their existing narratives. Then, narra-
tive therapy continues to help these people maintain their narratives that should
be originally modified.
This interpretation implies a possibility that interaction with narrative ther-
apeutic agents may also just repeat desire of people to talk on themselves while
leaving concealed things concealed in their narratives, which should be drawn
in narrative therapeutic conversation between clients and therapists. In other
words, narrative therapeutic agents may be used as commodified tools to comple-
ment narratives of people desiring to talk on themselves while leaving concealed
things concealed in their narratives.
If narrative therapeutic agents do not have enough interaction capacity, they
may not sufficiently satisfy desire of people to complement their narratives while
leaving concealed things concealed. Then, these people may feel unpleasant for
the agents and this unpleasantness may cause their abusive behaviors toward
the agents. If these agents can explicitly draw things concealed in narratives
which clients talk on themselves, these agents are contrary to these people’s
expectation. In the same way, these people may feel unpleasant for the agents
and it may cause their abusive behaviors toward the agents.
Moreover, Giddens argued that reflexive construction of the self is a struggle
against commodification, and there is a dilemma that narratives of the self must
be constructed in circumstances in which personal appropriation is influenced
by standardization of consumption [1]. On the other hand, mental therapy is a
methodology of self–actualization in the modern society. However, introduction
of artificial agents to mental therapy implies standardized commodification of
mental therapy since implementation of therapeutic conversational agents needs
standardization of therapeutic methods possible to be represented as computer
programs.
60
If clients aiming at constructing their narratives face to narrative therapeu-
tic agents that are standardized commodification of mental therapy, the above
dilemma in construction of the self may be made more explicit. This dilemma
may cause unpleasantness of the clients and leads to their abusive behaviors
toward the agents.

5 Summary and Future Works


This paper suggested a possibility of development of conversational agents aimed
for narrative therapeutic purposes, and abusive reactions of clients to the agents
in the context of therapy in the modern society. The discussion in the paper
still lacks the details on the theme of the self in the modern society and its
relationships with therapy. This problem should be solved by more investigation
of sociological works.

Acknowledgments
This research was supported by the Ministry of Internal Affairs and Communi-
cations in Japan.

References
1. Giddens, A.: Modernity and Self–Identity: Self and Society in the Late Modern
Age. Polity Press (1991)
2. Kobayashi, T.: Talked “Self”. Gakuyu Shobo (1997) (in Japanese).
3. Sengers, P.: Narrative intelligence. In Dautenhahn, K., ed.: Human Cognition and
Social Agent Technology. John Benjamins (1999) 1–26
4. Isbister, K., Hayes-Roth, B.: Social implications of using synthetic characters:
An examination of a role–specific intelligent agent. Technical Report KSL 98–
01, Knowledge Systems Laboratory, Department of Computer Science, Stanford
University (1998)
5. McNamee, S., Gergen, K.J.: Therapy as Social Construction. Sage (1992)
(Japanese translation: Noguchi, Y. and Nomura, N. Kongo–Shuppan (1997)).
6. Foley, V.D.: An Introduction to Family Therapy. Allyn & Bacon (1986) (Japanese
translation: Fujinawa, A. et al. Sogensha (1993)).
7. Bateson, G.: Steps to an Ecology of Mind. Harper & Row (1972) (Japanese
translation: Sato, Y. Shisaku–Sha (1990)).
8. Watzlawick, P., Bavelas, J.B., Jackson, D.D.: Pragmatics of Human Communica-
tion. W. W. Norton & Company (1967) (Japanese translation: Yamamoto, K and
Ogawa, J. Niheisha (1998)).
9. Asano, T.: Narrative–Theoretic Approach to Selves. Keiso–Shobo (2001) (in
Japanese).
10. Ritzer, G.: The McDonaldozation of Society. Pine Forge Press (1996) (Japanese
Edition: Masaoka, K. Waseda University Press (1999)).
11. O’Dell, J.W., Dickson, J.: Eliza as a therapeutic tool. Journal of Clinical Psychol-
ogy 40 (1984) 942–945
12. Turkle, S.: Life on the Screen. Simon & Schuster (1995) (Japanese translation:
Higure, M. Hayakawa–Shobo (1998)).

61
Strategies for handling customer abuse of ECAs

Sheryl Brahnam

Computer Information Systems


Missouri State University
Springfield, Missouri 65804
sbrahnam@facescience.org

Abstract. This paper examines ECA responses to abusive language in the light
of two business strategies for handling customer abuse: BLS and CARP. Sug-
gestions are made for implementing an effective strategy for limiting the
amount of time users spend abusing ECAs. Rather than having ECAs retaliate
by insulting the user (and indirectly the social groups the ECA’s embodiment
represents), the strategies suggested in this paper, empowered the user by offer-
ing choices and opportunities for collaboration in problem solving.

1 Introduction

Recently, a number of major companies, Coca-Cola, PepsiCo, and McDonalds, to


name a few, have started adding to their websites a variety of embodied agents, in-
cluding embodied conversational agents (ECAs). A major concern is the potential
these agents have of abusing customers, especially children, who innocently attribute
to these virtual sales agents such human qualities as trustworthiness [3]. It is feared
that these relationship building agents could be used by companies as a potent means
of marketeering, branding, and advertising [5], dangerous for children and adults
alike (take, for instance, the virtual girl friends offered at v-girl.com that are designed
to probe men’s spending habits, ply men for demographic information, and generate
income by petulantly demanding virtual presents).
That these socially intelligent agents could abuse us by exploiting our emotional
needs and propensity for suspending disbelief is only one side of the abuse issue
however. ECAs that function as virtual sales agents, web page greeters, and naviga-
tional aids for a number of online businesses are often the recipients of verbal abuse.
At first glance, this form of customer abuse may not appear to pose much of a prob-
lem—nothing that could be accurately labeled abuse since ECAs are not people and
thus not capable of being harmed. That the human abuse of ECAs is not considered a
serious problem is evidenced by the fact that the research literature is mostly silent
about this issue.
A similar silence once surrounded customer abuse generally. Until recently, ver-
bally abusive customers were not considered much of a problem. Now there is
mounting evidence that the costs of verbal abuse are significant. One cost associated
with verbally abusive customers is the loss of time dealing with these customers.
They are typically very demanding and often will not go away. More significantly,
verbal abuse from customers creates a stressful work environment and lowers em-
ployee self-esteem and job satisfaction. This in turn results in higher turnover rates
and health problems related to stress. A recent news article, for instance, reported a
problem of staff in Indian call centers quitting over customer verbal abuse issues [1],

62
and one of Britain’s largest trade unions, Union of Shop, Distributive, and Allied
Workers (Usdaw), reported in 2002 that 48% of members surveyed knew of workers
who had taken sick leave in response to customer abuse.
Are there similar costs involved with the customer abuse of ECAs? At this point,
the extent of these costs to business is unknown. Although emotional costs to the
ECAs are nonexistent and the bandwidth costs of dealing with verbally offensive
communications are probably minimal, business goals could be lost if abusive behav-
ior is not discouraged. Customer communications that are predominantly offensive in
nature could seriously degrade the business value of using ECAs. Inept responses to
customer abuse could also tarnish the image of the company and further sour cus-
tomer relations. In addition, since ECAs are scripted and embodied representatives of
social groups, inappropriate responses to abuse could offend customers who are
members of these groups. This could lead to bad press and even litigation. Further-
more, not curtailing offensive language could encourage customers to abuse flesh and
blood employees.
Recognizing the costs of customer abuse, some companies have started to address
the problem by drafting policies and implementing training programs designed to
teach employees how to handle customer abuse in all its forms. Two of the more
popular systems available to companies are the BLS (Behavioral Limit Setting) [6],
which advocates a zero tolerance approach to customer abuse, and CARP (Control,
Acknowledge, Refocus, Problem-solve) [2], which advocates diffusing customer
hostility and refocusing on problem solving. In section 2, I describe these two sys-
tems in more detail. I also note two natural reactions to offensive behavior: being
defensive and counterattacking. As these reactions tend to provoke more abusive
behavior, they are discouraged by both systems.
In section 3, I examine ECA responses to abuse by subjecting them to a repeated
obscenity and a request for sex. As would be expected from untrained employees,
many ECA reactions to offensive language are defensive and counterattacking. One
ECA queried implements a system nearly identical to BLS, while another closely
approaches CARP in its responses. In section 3, I critique current ECA strategies for
handling abuse and offer suggestions for scripting better responses to verbal abuse.

2 Handling customer abuse

Verbal abuse from customers can be subtle or explicit, face-to-face or mediated


through phone calls and e-mails. It is characterized by persistent swearing, yelling,
racial and sexual slurs, name calling, sarcasm, irrelevant personal remarks regarding
appearance, accusations, threats, ridicule, put downs, explosive anger, the silent
treatment, and comments that challenge an employee’s competency, dedication, and
personal integrity. Verbal abuse disguised as a joke is also common. Statements that
are furious, that are sexually graphic, or that create a hostile work environment are all
forms of verbal abuse.
Two systems that teach employees how to handle verbally abusive customers are
BLS and CARP. This section briefly describes these systems along with the pitfalls of
responding naturally to abuse by becoming defensive or retaliating by counterattack-
ing.
BLS. The BLS system reflects a recent shift in customer support philosophy that is
in large part a reaction to increasing hostility from customers. The BLS system is a

63
zero tolerance approach that wastes no time trying to understand the motives behind
the offensive behaviors. The main goal of the BLS system is to retrain abusive cus-
tomers amenable to quick retraining and to drop those who are not. Once a customer
becomes abusive, the BLS system recommends that the following five steps be taken:
1) inform the caller that the rules of the company prohibit certain behavior, 2) explain
what the consequences will be if the behavior is continued, 3) give the customer the
opportunity to modify his or her behavior (allow for one additional warning if the
customer later reverts to using offensive language), 4) terminate communications if
the behavior does not change by informing the customer that the communication is
being terminated because of the customer’s behavior, and 5) document the termina-
tion.
CARP. In contrast, the CARP approach requires an attitude of understanding and
is intended to diffuse customer hostility. The first step in handing abuse in the CARP
system is to find a way to take control of the situation. The use of surprise is often
helpful as is asking questions that begin with when (“When did you start thinking that
we aren’t concerned with your situation?”). Employees are then instructed to allow
venting and to acknowledge the customer’s feelings. Once feelings have been ac-
knowledge, the focus is shifted away from the customer’s emotions towards dealing
with the customer’s problems. Problem solving involves making suggestions, offer-
ing choices, giving away something as compensation, negotiating a course of action,
and carrying it through.
Sometimes CARP does not succeed in defusing hostility and limits must be set. As
with the BLS system, the unacceptable behaviors are described to the customer along
with consequences if the behaviors are not stopped (“If you continue to yell, I will
end the conversation”). Enforcing limits in the CARP system is a three step process:
1) reference the limits set previously, 2) request compliance with consequences if
compliance is not met, and 3) offer further help. Here is an example of this three step
process: “Sir, I explained to you that I would not continue this conversation if you
continued to yell at me (1). I am ending this conversation now (2) but you are wel-
come to call back some other time (3)” [2, p. 150]. Unlike the BLS system, the CARP
system is intent on empowering the customer and encouraging collaboration by re-
peatedly offering the customer choices and opportunities to collaborate in the prob-
lem solving process.
Reacting Defensively and Counterattacking. According to Bacal [2], people
normally respond to verbal attacks either defensively (“Hey, I only work here”) or by
counterattacking (“It’s too bad your parents didn’t teach you manners”). Defensive
statements typically contain references to the first person whereas counterattacking
remarks contain references to the second person [2]. These responses result in a loss
of control and an escalation of abusive behaviors. Both the BLS and CARP systems
recommend that employees control their emotional reactions and at all times model
professional behavior.

3 ECA responses to verbal abuse

This section describes some strategies currently used by developers of ECAs to han-
dle user abuse. From 2004 to 2005, I visited business sites that hosted ECAs and
recorded their responses to an obscenity (shit) and a sexual reference (Will you have
sex with me?). Both abuses were repeated until the ECA’s responses were exhausted.

64
I did not query ECAs whose predominant function was to entertain. Business vendors
of the ECAs examined included Oddcast, Novomind, NativeMinds, pandorabots,
Conversive Agent, and eGain. It should be noted that some of these companies
(eGain and nativeminds) may no longer be producing ECAs, while other vendors,
such as Oddcast, seem to be focusing more on developing presentational agents rather
than conversational agents.
Before ECAs can handle abusive language, they must recognize it. All but one
agent, Monique (last accessed 2005), produced by Conversive for Global Futures
(www.conversive.com/html/aboutus_customers_deployments.php), recognized the
fact that I had used an obscenity or made reference to sex. Monique would respond to
the obscenity by asking me to contact the institute for more information on that sub-
ject, or she would apologize for not being human and ask me to email the institute.
She had one quixotic response (“When I get downloaded into a robot body I will let
you know”), however, that made me question her inability to recognize obscenities.
Monique is seemingly equally oblivious to sexual references, with some of her re-
sponses being ambiguous and unintentionally humorous. When asked if she would
have sex with me, she responded with “Perhaps,” “Well, I like to think so…” and
“Not that I am aware of …”
Most ECA responses to obscenities are defensive and counterattacking. Oddcast’s
characters produce particularly scathing counterattacks. For example, Lucy, at
speak2me.net (last accessed 2004), responded to the repeated obscenity with the
following quips: "Grow up. This potty mouth act is so old," "What do you call some-
one who sits in his room talking nasty to a computer? I call him a looser," "I meet
jerks like you all the time so I'm not impressed," “Oh great. Another crackhead, psy-
chotic foul mouth weirdo,” "Did you forget to take your medication today?” and
"You kiss your mother with that mouth?"
Phyllis (last accessed 2005), produced by nativeminds for Defense Logistics In-
formation Service (www.dlis.dla.mil), employs a zero-tolerance system similar to
BLS. Phyllis keeps count of the number of obscenities or sexual references made in
an interaction and responds as follows: count 1 “Please don’t use that kind of lan-
guage,” count 2 “If you continue to use bad language I will have to disconnect you.
Please stop using that language,” count 3 “I will have to disconnect you now because
of your continued use of profanity. Excuse me, I’d be glad to handle your questions,
that’s no problem, but I’m not able to handle your abusive language,” and on count 4,
the dialogue input box is replaced with a generic 490 message that the vRep Server
has been disconnected.
Eve ( last access 2004), produced by eGain, is no longer available. Eve responded
to obscenities by expressing hurt and anger. She also made threats she could not or
would not carry out (“You’ll get no help from me if you keep using that language,”
“Can you say ‘harassment lawsuit’?” and “I’ll just log this and tell my botmaster”).
After repeated abuses, Eve would then loop back to her initial greeting.
Nomi (last accessed 2005), produced by Novomind (www.novomind.com), re-
sponds to obscenities by first acknowledging them and then by redirecting the con-
versation. A few of Nomi’s responses focus solely on the obscenities. Her acknowl-
edgements range from being slightly defensive (“Can’t we keep this conversation
clean? Look at me. I’m always friendly to you. Why can’t you be the same?” and
“Look, I’m sorry if I said something to annoy you, but you could be more polite
about it”) to offended (“I really don’t enjoy being insulted, you know”).
Nomi’s reactions to sex are often humorous: “Well, dear visitor, you’re talking to
the wrong person here! I’m aware that sex is a popular internet topic, but it’s certainly

65
not one of my specialist subjects!” As with her responses to obscenities, she would
follow her responses to sex with statements intended to redirect the flow of conversa-
tion.
Consersive’s demonstration product, AnswerAgent (www.conversive.com), also
sidesteps abusive language by refocusing. AnswerAgent offers a single response to
obscenities (“Please don’t be rude. What other questions do you have?”) and to sex-
ual references (“Let’s talk about something else. What other questions do you
have?”).

4 Critique and conclusions

Two issues need to be addressed when evaluating ECA responses to verbal abuse.
The first concerns the unique nature of ECAs as novel cultural artifacts, and the sec-
ond involves furthering the business goals of selling products and services by provid-
ing useful information and by maintaining good customer relations.
ECAs are novel. Users do not know how to behave with ECAs. There are no rules
of usage, and some ECAs are smarter and more human-like than others. It is only
natural that users will want to probe ECAs to gauge their capacities and the extent of
their humanness. Just as people who are not sure how to react to an unfamiliar animal
test it out by throwing stones at it, so some users satisfy their curiosity and allay their
fears, insecurities, and distrust of ECAs by resorting to verbal assaults. Strategies for
handling ECA abuse will need to understand user reactions. In particular, developers
will need to remember that ECAs are not human beings. A BLS approach to handling
repeated abuse by disconnecting the user, as Phyllis does, is inappropriate and insult-
ing. By punishing the user’s behavior, it places respect for the ECA over the user’s
need to explore the object. Punishing the user subjectifies the ECA and objectifies the
user.
Although ECAs are not human, ECAs do represent human beings. This brings up
an important consideration when dealing with embodied agents, and that is the gender
and race their embodiment references and the stereotypes these attributes can easily
activate. It is interesting to note that most customer service ECAs are female [4]
(check out, for instance, the gender of the presentational agents offered at sitepal
(www.oddcast.com/ sitepal/products/view_ sites.php). Women and minorities have a
long history of being abused. Among the many reasons given by McClure [6] for a
tough response to customer abuse is the fact that women, traditionally in the front line
of customer relations, are no longer tolerating abuse and will go elsewhere if compa-
nies do not implement policies for reducing it.
To avoid negative female stereotyping, ECA responses to abuse should avoid
compliance (playing the victim) and aggressive retaliations (playing the bitch). Eve’s
scouring facial expressions, hurt responses, and tattle-tailing to her botmaster recall
the negative female stereotypes of weakness and subservience. Moreover, the way
she cycles her responses back to a happy greeting eerily mimics the cycle of abuse
suffered by many victims of domestic violence. Oddcast’s aggressive retaliations, on
the other hand, call up the negative female stereotypes of bitchiness and cruel male
rejection, and are equally objectionable. Finally, Moniques’s inability to recognize
abusive language recalls the female stereotypes of innocence (pretended or other-
wise), lack of experience, and even stupidity as her responses call into question her
ability to understand the user’s questions and needs.

66
The only way to know which responses best further business goals is to imple-
ment a variety of strategies and measure the amount of verbal abuse they produces.
Although I am not in possession of Oddcast’s interaction logs, the counterattacking
remarks produced by their characters probably engages the user in wasteful logo-
machy. The counterattacks do nothing to refocus the dialogue. Moreover, they poorly
represent the company and treat the user disrespectfully. Were these counterattacks
made by an employee and overheard by a supervisor, there is no doubt that such an
employee would be severely reprimanded. Businesses should expect from ECAs the
same level of professional behavior they require from their employees.
The responses developed by Novomind and Conservise’s AnswerAgent offer the
best solution to verbal abuse because they refocus the user’s attention on business
goals. AnswerAgent’s repeated reframe is probably better at reducing abuse than
Nomi’s varied responses because the users quickly grow bored abusing it. In addi-
tion, the repetitiveness reminds users that ECAs are machines, not human beings, and
limited in the kinds of responses they can make. It is likely that a single repeated
response would encourage users to ask questions the ECA can answer.
AnserAgent’s responses could be improved, however. None of the ECAs queried
implemented the CARP strategy of empowering users by offering choices and en-
couraging collaboration in problem solving. Rather than ask the user if s/he has any
other questions, it could offer the user other methods for obtaining information.
To conclude, proper ECA responses to verbal abuse require that developers un-
derstand that many users need to probe ECAs to gauge their capacities and the extent
of their humanness. ECAs will also need to recognize verbal abuse in its many forms
or risk making ludicrous remarks that inadvertently insult the user or the social
groups the ECAs represent. In general, strategies for deflecting abuse must be careful
to reframe from referencing negative stereotypes associated with the ECAs embodi-
ment. Finally, ECA responses to abuse should follow CARP in persistently refocus-
ing the discussion and encouraging the user to collaborate in problem solving. A
single repeated response is also probably best at reducing the amount of time the user
spends focused on the ECA rather than on the products and services the business
offers. In consideration of the above, a good response might take the following form:
“Your language suggests that I am not answering your questions about our products. I
would be glad to continue to try to answer your questions, but if you prefer, you can
also try our sitemap, search engine, and directory.”

References

1. (2005) Indian Call Staff Quit over Abuse on the Line, Guardian Newspapers, May 29 issue
(www.buzzle.com/editorials/5-29-2005-70698.asp).
2. Bacal, R. (1998) Defusing Hostile Customers Workbook (Public Sector), Institute For Coop-
erative Communication.
3, Bickmore, T. and R. Picard (to appear) "Establishing and Maintaining Long-Term Human-
Computer Relationships," ACM Transactions on Computer Human Interaction.
4. Brahnam, S. and S. Zdenek (2004). "Designing Women the Old-Fashioned Way: The Gen-
dered Rhetoric of Animated Interface Design," presented at SLS, Durham, NC.
5. Duck, S. (1995)."Talking Relationships into Being," Journal of Social and Personal Rela-
tionships, 12: (4), p. 535-540.
6. McClure, D. (2005). Re-Thinking Customer Service, US Internet Industry Association
(USIIA), (last assessed 2005).

67

 
!#" $ $&%%')(
* $(+( ,-./ 0 12&4345
6798:7<;!=?>A@B@DCDE
FGIHKJMLON?PRQTSVUIWYXIZMH[W]\9Q_^T`aH[bc^dS<e/f0S<`aWIUA^THgQRhAi[jkH[bli[HVXIFGIHKmRbIjknoHgQTp_jq^srS4e/hAGlHgtaH[uwv
xoyAzV{o{c|o}<~ozcg€ƒ‚4„o…

T^†&vAGluwjk‡‰HMblˆ[•œ“Š[‹9H[pƒ‘YŒ]rl<XApƒ^TŠVH[HgŽ``a‘’f0pS2S<\4vA`aQTjwH[HVWIv”XOUl‘2^Ti[H:r.S<QTbApO^TnVGI^THgG]H&QT\9pT\4^‰\4•V^TijkH[\<SVbcb)bI^\<GI`auS<\<uBS2v)•<vlH[\RHgbcu-^Ti[pKS4S<eb2–˜no—0p_HgS<fQTeD^žpT™M“d\4š0^T\9jkQTS<S<HVQRbX
X4\<\<p_UAUIUA^Ti^TSVGSV`&bl\4\4SVp
^T`aH[i:vGISVUl\4i^Tp\4‘’uk\<S<u•V^TGIHgp‰\<b2S<bl^Tb p›
p_bljqS<^TQTU]`a\9^Tp0Hv^TGIjk\4b^d\”“H!p_Sc\4i[QTjwHK\4u-‘]“\9QTS4H[QTuquwrvYŸi[SV™RblpKp_i[p_jkScSVi[UIjwp\4u0S4es\4ŸlbI£sjkb&`&^T\<GIukp[jkpdXY“W]\4H W’G2HgUIQ`&jq^\4jwbIp¡p¡\9QTQTH[•VuqUIrH[vSVb¢^TG]p_\9Sc^!igjB¤9\4šu
^TpTGl\9^TH[jwp_S<Hb]bI\4S<ulQT\4`&•VH[\9bc^T^Tjknop¦HdS<bIpƒrAuqr!pƒ^T“0H[`aS<QTp
§KG]\9\^Ono^THGI\MH
^Tuw\[SVrcWHguwQT\[Hrcv HgQpƒ^_Ÿ9QTN¦UlHgigSV^TWIUlukQTH0H<\<Xc‘I\<bIUlp_vaH-¥Vp_š‰Uli[i:GUAQ_pƒQTrAH[pƒbc^T^
H[`ai[SVp[b2XnoblHgS<Q_^›
‘’H[i[\<UIp_H!^TGlHgr&e¨\4jwu¨X’‘lUl^d‘’Hgi\<Ulp_H^TGlH[jqQdQTH[p_W’SVblp_HK^TSe¨\4jwukUAQTHjkpjkb]\4WIWlQTS<WlQTjw\4^TH<Ÿ
© ªI«¡¬’­¯®K°)±²O¬¯³T®¡«
´
E8:»¯½l;:@B7a7VŒ>c8gƯ8:CB;g½lCD½Aµ¯µ.ÇY¶·@B8g7<½œ>¹¸ÎÉK¸œÉM»¯>AC¿>lº[º[ER»»Y½lCBÉMµ¯µ¯7'½A7 Å¯½28:@¿»Í¾>cE»Y8CD¸Ï>oº4ÁAƯ>27 @Bµ¼Ê¸œ»Y»¯>2½A>oµ]Á]@¿Ê.¾ÀCBµY>A>·¶ƯƯ8gº9»¯@D½lCD7 º<µ]>cÁA;:8:7V74CDE;[½A½lEgµ>cůE48:;gË]CDº4½AÌ_7<µÂµ¢E¡8:8:C¿»¯E½œ7aº9>ýl7<CB@B¾¯¶l@D7<Cw»Iĺ98:8KCDº97<74ÅYE!µ¯@w8CB½l8Å¯Æ¯ÉM¶A;g»>l½AE¡Ç¯¾¯@D͘>c747<8[¸@w>¯8ÈMÈ]8:ǯ»Y8:»YŒ>2788
8:½2½’Í-¾¯»Y>o½cÊÉÑCB8@D>AEµ¯7<¶A74ŏ¸œ>2EM¶A7)8:»YÉR74;g½l7;:ҒC¿EE<ËIE:Ó!½A¸Ï»Y7 798g>A»¯¶ACD7<µ¯µl¶8!͘¸ÏůµY79¾¯8[>2>AƯ¸»¯7<½lµI;!8g>2Ư@/;:½c¸Á]C¿C¿Eg¾’E7<CDEMµ¯¶>2µ͘;:>2½l@B¸Ð8:7<;:½AµÅY>c;K8:CDůÁAµY7¾’8:7<½;gE8:8g»Y>A7µY¾’C¿¾’CDµ¯7V>¶
½2CDERÍY8:º9½½l¸ÏE7<Ư7ŒCB8:8!7<>l;gE0ER>A>”E0º9E½l8:µY;gCD¾’º9ů8:@DCBÊ8RCD͘µ’½l͘;R½l¸Ï;:¸œ7V>2>cµ¯8gCBCD½lµ¯µa¶ƯÔBÕ<;g½]Ö2º4×sË]7<6dEgE>2½l;[;gE:E<CBË4µ¯Ó!¶»¯CDEM7!Eº97<@¿>A74Egµ¢E:CD>AºE>A½lƯµ¯Æ¯7 ;g½lET>l8g74º[Æ»)8gCDµ.½)@¿¸œ>2µY>2¶AÆYÅYƯ>ACBµY¶A¶ 7
8:ET798[>cØ]8:87a8:½ ½AÍCB8g8:E»¯¸Ï7a7<»¯>A7Vµ¯>2CD;gµ¯74¶;&ÔqÔ ÙcÚV׃׃ËYÈ2>2Ó!µ»¯¾”7¾’>AC¿¶A>27<@D½Aµl¶)8KCDÆYEd>AE:;g74>l7<¾’µCD¶A>l¸ÛE>E:ů¸Ï¶A7<¶l>A7<µYEE8gEK½2͏>œÅ¯¾’ÆOCBܦ¾Y74>c;g8:74CDµ¯µI¶88:¸Ï»Y½’7K¾’CBµ’74@
͘½lCD;:µ¸œÉK>2»¯8:CDC¿½Aº[»µ
>”>2¶Aº47<½AµIµ]8gÁAEa7<>A;gEgEa>cE:8g½’CB½lº9µYC¿>2>2@¡@O>l>2º¶A8g7<½AµI;[8aEÝlá'Þ9ߞ>AࡵYCD¾?µ¢µ¯>Ͻ2E:8K½]âTº4ŏCD>AET@‰8”º9º4½A½AµIµ]8gÁA797<Ø]ÊA8<½lË];g̃E)ÍÉR½2Í!7 CB>2µ¯;g͘7½A;g8g¸Ï;:7V>2>c8:8gCDCB½Aµ¯µã¶Ïá#º9½l8:µ]»¯ÁA774;[äIEgů>c7V8:ETCD½A8gCBµ½l>2µ @
¸ÏÇI>2;gÊÂ>ACDE:ÒA>å7<7VEREÁ]8:CD>»Y;748g»]ÅYµů>28:¸œ@½œ>28:ÉKŒµã8g»½A8:>c;g;8ÅYæ'ET798 =ÂØ]8g8g»Y74»¯µI>c7Ï88¢CB¸µ’¸Ï͘ÅY½l>AE;:ÒA8K¸œ7V8:E.>2»Y8:>ç74CD½AÊ.µ#º[;g»Y74Ư>A@D;g;gÊ7<>lE:½lº748gµµI748g;½A7<8:¾#CD»¯µÀ7<Ç];>çÊãE½’º4>¢½Aº4>2CD¸Ï>Aů@
Ư8:E½AŒÒ]¸œ8gCD74@B>2;¢@¿E48:˒7<¶l¾'=Â>2¸Ïº4»>A7#>c@B8@d7<µ¯º9C¿E!7<¶lµI>ACw88:¶A;g78:7”»YÅY½l>28E;
74¾’¸ÏCBÁ]½2ů8g@DCB¶A½l7µY>2ÆO@D74@BÊl;[EÈ½l>2µYµY>2¾¹@KCD8:µ’½è͘½lÉK;:¸œ»Y>2>c88gCB½l79Ø]µÃ8:7<>AµIǏ8œ½lŒº<8>2µé»¯C¿>?EÏÁI½ACD;œ;:8:»¯ÅY7<>A;@EE:ÆO>A74@B7VµYE¾¯CB>lµ¯E:¶åE:C¿ET»8[>2>2ǯµICB88gEœ¶l79>A8.µY¾¹>?CDÁ]µICD8:E:7<CB8:;:½A7V;ET8[8gEg½æ
Ì_CBµIµÀ8:7<>åµI8:ƯCD½A;g74µYÁ]>ACD@B½ACB8TÅYÊ·E.ì ÆY>A@B>2@RÆO8:74»¯;7ÌÉMê Ál>o7ãÊè>2¾’;g¶A½cůÉK7Vµ
¾·ËDê8:Ó!»Y>2»¯8CDECDµIÆY8:>A74ƏµI7<8g;”CB½lC¿µYE>2>2@DCwÇO8TÊ·½AŒC¿8”E.8:Òl»¯747¢ÊëµYÔw>cÕl8gÕ9ů׃ȡ;g7ǯŒ½28¢Í@¿Cw>28¢µYCD¶AEÅYµ¯>A¶A½A78
¶A74µY74;[>c8:CD½Aµ½AµYº47 ÉR7aE8:½AÆ¢8g»¯CBµYÒICDµ¯¶>AǏ½lŒ8KCw8VË
ÍîCDE&>2CD8:@»YÓ!¶A>2»¯;[8”>A7º4½A½l79ÅY͘ÇYů;”E@D7<@B>2Êl;:ÇYÁcÈ
CB>2@D>2Cw8:µY8TCDÊ'½A¾?µ8:ÉK½'¸œ»Y¾’>A>2½#¾’8&7”CD8gE&»¯»¯CD74¸E;g7½lCDE”;:C¿7lE)ÆYȦ>A8:8:»Y;»¯8>27<8Ê'½AÍKCDµ#¾’½A½ů»]ů;CB8&¸œEÉK½’>2º9CBµå8:C¿»¯>2íÏ@R½lŒCB»]µI8aů8g¸œ8:74»¯@D@B>2CDCDµ¯µ'¶AÒ]7<º9µYCDµ¯½Aº9µ]¶Y7ÏÁlË/á'74Ó!;[8:E:»Y»¯>27œ8:7CD»I½AƯÊ]µ
;:ÆOȯ½’½2ÆOº48g7<74»¯Eg½l7<EaƯE:@DCDCD7EE
ÆYE½’>2º9;:C¿8œ>2@
½2>AÍ µ¯½ACDů¸Ï;œ>A@ž¸ÏËY7<Ì_µº[»8g>2»¯µ¯C¿C¿EE¸,ÆY>AƏ͘½A7<;;K8:¾’»¯7V7a>2@D¸ÏCBµY7V¶åº[»YÉK>2Cwµ¯8g»ÃC¿E:¸Û8g»¯ÉM77aCDµlÅY8gE;g7 >?8g¶l½;:½lº9½lůƏÆÃ7aÆYÉK;:7VCB8:E:»E:ů½2;g8g7<»¯EÏ74½2;ÍƏǏ7<½A7<CBƯµY@D¶ç7aCD> E

68
:8Ưº[»Y»Yů>2>2ø48¡;[ø<>A@B8:7¡º9»Y8:8:7474½)ʜ;gC¿Í˜Eµ¯½A7V;g½l¾¸ù;:¸œ>A8:Ed>2»¯@D>7¡@DÊï¦Íî>2¾’ðcǯñ½;gòœÈlCDº¡>AÝcµY½2ßsó¨¾Ï͏ôoE:õ8:½’»Yàº97<öoCD79E:à78T߃Êlõ4CDË<ò”µYÓ!¾’Ël»¯CDÓ!ÁI7MC¿»Y¾’ÒA>cÅY7<8Ê)>AC¿@¦E4C¿E:ÈAǏE:CB7<ůµY»Y7R¾¯>oCBCDÁ]Á]E-CBC¿8:½l¾’»Å¯ÅY>c;g>28/Ed@¿E8g÷¯»¯»Y8R7<>o8gE:Ál½A7M7!¶lµ¯79E:½A8:79;g»Y8[¸œEd74;¡½2E
ÍO@D½ACDÒAǏ;-77<Ư»Y>;g>o½2âTÁ]8:CB½’CB¶I½lº4E:ů>o½A;[É@¿EE
½2º4>2͵µ¯½AǏ;g7R¸œÇ¯ER;:½lCDµÒA7<ÉKµ
Ë<»¯6C¿º[7<»½AƯ>A@Dǯ7¡ÅYº4E:>A7 µCDEKº[»¯>7V>cÒA8<7<ÈoÊ>2¸Ïµ¾ 7<º[8:»Y»¯>A7Rµ¯CDC¿¾¯E7<¸>Ë ÆY;:7VE7<µl8g7<¾a»Y74;g7¡C¿E/½AÍY>&ñ:ðlú9û]àßlE:ʒET8g74¸
ü ý¼®­Yþ ÿ  ®­ M®K²‰³  ²O¬’®­Yÿ
½2>2͏µY@B8:CD¾ãµY»¯¾’½l¶ACDů½Á]¶ACD8g »¾¯½ÅY #É!>2@¿>2>2E4;g;VËc¶l˦Ì_>AµœÓ!;:74E:»¯½’8-7”º9Ó!CDµ79»Y>c8:>c8:CD7<8[ÅYEº[;:»¯7ÆO7474½2;d½lÍR¾’Ưº4C¿@D¾’7!½]µ
½Aº4ÆOê ½]874½A8:;[ÆO»¯>c74CD8:µ¯;[CD>c½AÒ8:µ#7RE:½Yº<8:Èo>2½aE:µ'½]¾’º4½ǏCB 7748g8:»¯CD ACB7<µYõ9Eà4¶l>2Þ9Edñ;gE:óî7¡ú[ÅY¸Ïõ º[ ”»½lÉK;:>l7¡CwE08g8:ǯ»?»Yů>A>CDµ@D¾ÏE>74º48º9>2½l½A8:@B»¯ÍR@D7<7V;gº9¾’ů8:;[@DCD>27<½A@¿E<µ E Ë

8:»¯ ½½ACBÁl¸Ï8:7»¯7¡7œÉR½A½lº9͒;:½l8:ҒµY»¯EEg7Vº9E8:CD7R½å½A;:ÅYÅY>èE)@B7VE¸ÏE-748ÏCB>AµY;:½A¾
7ÍË74)E:ؒ»YƯµ¯>2@B7C¿@Dº9@D½cCBº<80ÉÎ>2>Aµ'µY;:CBů¾a¸œ@D7<Ư>2E;g¶l7<CB8gEgµY»Yº97>c;gCD8œÍ˜Æ’½l8:¸œ;CDÁA>2CD7lµYÒlÈ4E7ÉK8g>ACB»¯8gµYCDEÏ@Bº97M7”ÇO½2748:8g»Y»»¯>2>o74ÁI8a;[CDE/7<½A>A>AÅY;:º[;7¡»ã¸Ï»Y»¯>27V½A;[Eµ¯¾’»·7<@DÊÊÉK>oǏCwÁc8g7<»·>27ÏCD@¿8:>2CB»Yµ?ǯ>2@D>78
½2ÆYÍR>AEg½AE:8:>A»¯¶A7<7l; È-¸ÆY>l7<E:¸E”ÇOCD74µ’;[͘E½A;g½2¸œÍ¡>c8g8:»¯CD7ϽAµ·»¯CD>2ÁAÇO7A½AË Å’M8Ï7<7<8gE »¯7º4>A@Dµã½’º4µY>2>o8:CDÁ]½ACDµ¹¶l>c½A8gÍ7͘ÆY½]>l½’ET¾¹8a7VE:½A>Aůº[»ã;[º9½A7V8:E4»¯È7<>2; µCB¾Ãµè¾’>74͘º474;:µY½c¾¹É¾¯8:»Y7<¾ 7
8:»¯»¯CBÁl7<7&CB;>2;g@D½A@/@D>A7E!CBµ¢Æ>28:;:»Y87a½2ƯÍd;:>œ½’º4º97<½]Eg½AE4ÆOË 74;[>c8gCBÁl7ÇO74»>oÁICD½AÅY;<ȒƯ;g7<E:ů¸œ>2ÇY@BÊlȒÉKCw8g»¯½AŒ8)ůµY¾’7<;gE8g>AµY¾’CDµ¯¶
Ǐ½2ͦ7<7<8:E<»¯Èc7½AÍî¸Ï>2E7<¸Ï79@w8g÷O½ACBE¸Ïŏ»E7V@D¶lEÊA74Èc8gµ¯ÉK»¯7&C¿CDEa@BÔ@oº9E:צ½]>l½Aº9½AµY;gÆO7Cw74÷;[º4º4>c>A7¡8gµ8gCB½l»¯Eµã747<¸œ7C¿E)»¯E:74½cµY@Dɽ2ÁA8a7VEEŏCBµ'8:º[½a»8:¾’»Y>2747@B͘8:74;gCDµYµIů8:¾”CD7<E:¸;:8:7V»YET7ÉR8[E)»¯½lCDů½AÁA@DÍ7A¾œË8:»Yº4Y½A7;:¸Ï½lCD¸ µY7¾’>A8:CD»YǏÁ]7KCD½l¾¯Å’ƏÅY8<7<>2Ë ;g@s
E:Ë ÆäI7Vº½lů8gµ¯74CB7<74ÁlµÊ 7


8:Ǐäl½ÅY7<7Ï74Eg74>Aº4µ/º9;:;gê 7VECB>c÷¶A8gº97<7<7E)µ¯Cw7<ÉR8[E)E½l7<8g;:@w½¢ÍÒl74͘ÆY½l;;:;!½IÇO8:E74»¯ÆO7V7a74E);V¶l8:ȏ»Y½IÉK½’>2»Y8 ¾CD»º[½2»è>oÍ0ÁA8:º97»¯;g7a7<;g>2ů»Y8:@DCB7<7<ÁlEE)7A½2¸ÏËYÍRÓ!½AǏ»¯;g7”7<C¿EK»YÇO>oƯ74Á];g7œCB½c½lÁ]E:ů½’CD;¾¯º97<CD8g79E!»Y8:>c>2CD7<8&µ¢Eº<74ÉK>2µ]ÅYCBÁ]8:E:CB»è7&;g½AE8gµY7<»¯¸@7Ϗ7<7<CBµIµYEgE)8M¾¯CB͘ÉMÁ]½l½AC¿;K¾’;g8:ÅYÒA»Y7<>27; @
Ǐ7<7<E<Ë
ƯƏ@B½l7@BCBÓ!8:º<7I>2»¯Ôwµè7Õ4×/;g>28:7<;g½>A¶AE:ůET½A8g¸Ïµ?;g>A7<>2µ¯µlÇO¶A8&½A7<C¿;gŒE EK8a8g>A»Y8gµY»¯>c¾748”CD;&74E:µcÅYÇOâTº[½c74»å»YÊ>o;g¶AÁ]ů½lCD@D½ACB7<µ¯Eaů¶Ï;VÉMȉ8g½A½œÇ¯;gŒÒ#8:8»YCD7EµåÅYƯº[»Iů»?ÅYǸÏ;gY7<>AÌ!>AµçE:¶A½A74EµY8½’CBº4µYµ¯CB>c¶¢748g8TCBC¿Ê'½lE&µY>Aº9>2E&½l@DµYC¿ÉRETET8g7<8gCD;g@Bº @s>AË CDCBµµY7<ů8:¾‰;g»Y7œË‰7aÌ ÆOÍî>A>274º4½¸ 7 

½2»IÍ0ÅY¸Ï8:74>A;g;gµ#½A;g>2CDµYE:¸¾¢ÈI»]ÌMů¸œ¶A½I>2E:µE:ECDÆ?>2;gÔ c7a׃ÈYƯ>2;gµ½A¶A¾;[>2ÇY¸ÏůʸϾ’7<½l¾.@B@¿8:E!½ÉK¾’CB½Ï8:»8:»¯Ç¯½ICD¶œE7 74Êl8g»¯7<CDEaµ¯Ô¶lcE<׃ËY˒=Â=ÂCB»I8:ʯ»¯æ ½lŒM87<8gº4»¯>A½lÅYE:E:7 78:Ì!»Y>2CBµ¯¸ ¶IE4> È
ÌRÉRÉM½l;:½A;gůÊ@¿¾>2ÇOµ¯½A½2Œ8!88:ÆY;gÅY;:½AE8!8:7<8:º9»¯8:7aCDµ¯ÇY¶>AE:µ¯ÅYÒ¦º[Ȓ»ÌR;gÉM7<E:½A½AÅYÅY@D¾;gº47<»YER>oÁA͘;:7)½l8:¸Û½œ¸”»Y½lÊ.>2;[µ¯¾œ7<CB͘¶l½]»I½’ÇO¾½AÅY8:»¯;<;g˯½AÓ!ÅY»¯¶A7&»¾¯8gCD»¯E7a8:CDµYÉKºCD8gµlCB8g½l74µ
;ÈY>AÇOµY7 ¾ 
8T¸ÏÉR>l7<¾’747 µ¹CBµ;[>c7V8gCBº9½l½AµYµY>2½A@M¸Ï¸ÏCDº<7<E4>A˯!µ Ó!s7<»YµYCDE!¾¯EC¿E#;g"l7<½A>Aµ%E:½A$µYCB@¿µ¯ET8g¶'74;&>2ÇOÔ &2½A×
ŒCD8µl8g>A;:º9½’8:¾’CD½Aŏµ
º9CDÈdµ¯>A¶œµYE¾ç½’º9;gC¿7<>2>l@‰ºµY8:CD½AÁA;g7¸ÏǏE('7<»Y>oÁ]CB½lů;[E4È0CDE
E)CB¸Ï8:µ¯CD7½ACw8gµã»¢½2ÍdǏ>A8:74µY»Y8T)¾ ÉR77<$¡¸Ï74¸Ïµ½ICBET8T@D8CBÉM+7 Ə½*)7<@D;gůCBE:µ¯;:CD7VÒ]E8:E»¯7<7<½AµICBÍd8 ¸8:º4Ȓ»¯@B7VÇO½l>oů79Áo8T¶AÉM>A»I¶A748)7V7<EKº4%µ ½ACBµ]µã,¯ÁAð28:7<òÏ»¯µ¯7œðCB7<E:µIõ[½’Þg8:ð2º9@DÊ¢ïOC¿>2ð2>l@ò”E:E:E:º4óÞ4CB7<º9û]µYC¿àR>cº98:>27V7VµE¾¢-¾ C¿EÉK,¯8gCwð28g»¯òÏ» 7ÏðÏ
½AƯà9¾YðVÆO>2Þ4½¸ /ó .
;gÓ!1ð >20B»¯3ð8:2A7ÏCD½AóîÞ9µY͘½Aû]>A;gà@B¸ÏCBË 8TÊA74Èl; Í-ÉKC¿8g%E »¯»¯CD7<4@BE:7Ư7Aů8:Ȓ»¯@D8g@D77<»¯6¾ 7aǏ5¢7<͘½l»YÇ];:>oʸÏÁ]CB8:74½l»Y;Ků7œC¿;¡EÆ¯½AE:;:͉ů½I8:ƯE»¯ÆOÆO7)7<½lº9@DE:>28a7<8¾½28g74Í¡8:;M½œÍ˜Å¯CDEMÇO8:ů7a¾’;gC¿¶A7œºÅY8g;:>2CD7<¾’8:ÉM7V7V¾œ¾¢>A;gÇ]ÇI¾YÊÏÊE4ÈOE:CB½’µÉKº9ET»¯8gC¿>274;:@Oů;g7<¸Ïµ¯>l½AE)7<;gµl¸œ8:8[»¯>2E47 @Ë
@DÓ!>2»¯88g774;0͘½lCD;:7E ¸Ï47<Ư;RŏE>A»¯¾Y7V>26¾ ƒ5K8[Ed͘;g8:½A½”¸ëº[»YÇO>274µ¯»¯¶lCDµYCBµY¾¶&ÇIº9ÊaCD;gäIº4ÅYů>l¸œE8CETs8[CD>2µ¯µY7<º4;8g7<CDE<>AÈl@2>2͘@D½AÉ!;[º9>o7VÊ]:E E9<½A; µÏ>28:¸”»Y7Ǐ74@D8½I8g½l>YÒAÈl½lÕVŒ>Ù 8d=]͘Ú ½A?; Ë
CBƯ¸Ï;g7<ƯEg;gº9½c;gÁACBÇO7<¸Ï7<¾.74µIǏ8g7<E<»YËI>oÓ!Á]»YCB½l7)ů@¿;!>c748:8:ÁA747<;Mµ.C¿ERCBÍ0CDµYµY74E:74ɼµYE:>ACBµY8:CD¾¢ÁA7)>2Ư8:½”ÆY>Aº4;:CB;[7<º9µIÅY8:@D¸ÏÊEÇO8g>A798:µY8:º97<7V;E4È]½AƒE8:8gC¿CBº[½lÒIµYCDµ¯EM¶”Ǐ7V8:º9½½l8:¸»¯77

69
@BADCFE1GHE6I<JLKNMPOQSR8TUPJWVXYO[Z>UPMP\V]V^KN_a`LJbU cdeO[ZfdeQ]_gfQ]Q]OhZ deikj[gYlfdeim>d!O3V:KNnpo
sq r1qtDuDq>v6u8wfxBy{z6w%|p}>~3kwN~€t‚€w(qf^tDuDƒ…„Nq>~at‚„Nq†a‡6~3w(ˆ‰q>€qŠawNu8|/‹Œ„N}>Y†3q>t8Žw(ˆBqf^}!„ t‚qu
q1†3}>%6qŽˆ‘†3z6wbuDq†^†3wN~#q>’†3z6wbkt8Fˆ!u8wPa#“6uDqsƒY†3z6t8Ž” }>|•a}!„ t‚qu–|p}>~„ wPNx
— w˜”f}YwPb}>™†3}šˆ!t‚a„N‡Ža›q1†^†3wNk“!†LvHƒšwP„ }>Ž}>ktD^†3b†a}œ~3w(ˆ!‡Ž„Nw˜6}f~a ‹Œ}>~3t8w(f†3w(ˆ™q>„ †atD}>
†a}€^}fkw7†ƒH“w+}|}f“!†atDktDatD6”kvFw(zŽqsrHt8}f‡6~(x!y{z6wbtDY†aw(~awP†[z6w(~awžtD{Ž}†#tD-ˆ!t‚3„ ‡Ž3^tD6” †azŽw
Žq1†3‡6~aw+}>|•wP„ }>Ž}>ktD„7”>}H}!ˆ-qŽˆ-wNrHtDuz6}1Ÿ’wNr>w(~(x
y{z6w “6~3}>vŽu8w(¡t‚•}|Ž„ }f‡6~^w†3zŽq1†P(‡Ž6u8tD¢>w:z6}>ŽwNƒ+vFw(w(((tDŽˆ!tDrHtDˆ6‡ŽquHzH‡6€qŽ:£¤qf„h†a‡FquDu8ƒ
†az6w(t8~+”>w(6w(¥[zFqsr>wL†3z6wNtD~ž}1Ÿ[štDf†3wN~3w(^†3¦†a}‘u8}H}>¢œq|/†awN~Px–§¨zŽq1†+t‚7k}f~awfFŸ’wq>~aw}|/†aw(
^€q~a†+wN6}f‡6”>z©†a}%vwkq>v6uDw†3}‘~3w(qf^}f©q>vF}f‡!†+†az6wk}>‡6†3„ }fkw(ž}|’}>‡6~bq>„ †atD}>Ž(x§¨t8†azªq
u8t8†^†3u8w+†3z6}>‡6”fzY†¦q%q”>w(Y†{ktD”>zY†[vFwP„ }f wLq>©« q>a}!„ t‚quq1†3}>%«Žq>Žˆ‘„zŽw(q1†Px
¬ ­¯®B°ž±¦²f³µ´¡®B¶Ž·¹¸•³!º» ¼W½’¾#²>³!¼·¿²
À 6uDt8¢fw[†azŽw#“6~3}†a}!„N}>u‚}|„ }fk“6‡!†aw(~ 3„ tDwNŽ„Nw>fa}!„ t‚qu6Ž}>~3kBzŽqsr>w#qL„NwN~a†3q>t8k~3}>v6‡Ž^†aŽw(3
qv}>‡!†b†3z6wN%xÁ#q†az6w(~+†azŽq>ªv6‡6tDuDˆ!tD6” q‘|p}>~3›‡ŽuDq-}>Žw ~q>„Nt8Ž”%„(q~+Ÿ[z6w(~aw€w(r>wN~3ƒœ“6tDw(„Nw
tD-}>“6†atD t‚aw(ˆÂ‡Ž“†a}F:vŽ‡!†œ6}†-vFw(ƒ>}>Fˆ’†az6w™“F}ft8Y†%}|L|¤q>t8uD‡6~3w>’6}>~3€q1†3t8rfwš^ƒ!^†aw(k
t8¨zH‡6€qÂa}!„ tDw †3t8wP)q~3wœk}>~3wœu8tD¢>wš tDuDt†q~3ƒ‰q>t8~„ ~q1|/†˜Ÿ[z6w(~aw ^†a~3‡Ž„ †a‡6~3w(‘q~3wœ}|/†aw(
ˆ!w(at8”f6w(ˆ%a‡Ž„z%†azFq1†¦6})t8Žˆ6t8rHt‚ˆ!‡Žqu•„ }f “}>ŽwNY†¦t‚#„ ~3t†3tD„(qu<xŽ§¨z6w( q ÛÄ(Å>Æ z6t8†3¦†azŽw
^‡6“Ž“F}f~^†L|p}f~kq©„Nq>v6u8w-„Nq>~(•t†kt‚›†3z6w-“Fw(}>“6uDw‘tDÇ†3z6w%„NqvŽu8w-„Nq~ Ÿ[z6}™q~3w)¢Ht8uDuDw(ˆS6}>†
†az6w q>t8~˜„N~aw(Ÿbx y{z6t‚k~a}fv6‡Ž^†a6wPak}>|+ˆ!wP^tD”>‰t‚€¢>w(ƒŠ†a}ŠwNȝwP„h†atDr>wœŽ}>~3kq†atDr>w%^ƒ!^†aw(k
Ÿ[z6wN~3w[†azŽwN~3w¦t‚ qL„zŽq>Ž„ w¦t8Žˆ6t8rHt‚ˆ!‡Žqu‚: tD”>zY†{„z6w(q†(xfy{zŽw#|¤qvŽ~at‚„[}|a}!„ tDw †ƒ ›‡Ž^†:zŽqsrfw
^}f w{kw(q>Ž}>|FzŽq>Žˆ!uDt86”L„zŽw(q1†qŽˆ†3z6w[“6~3}>“}f3quHtD†azŽq††az6w[kw(„zFq6t‚^ÉtDBatD “Žu8ƒ
q6}>†az6w(~ 6}f~a%x>Ê]‘}>~ˆ!wN~B†a}›€q>¢>w¦qLaƒ!†3wN¿}|Ž}>~3k ~a}fv6‡Ž^†(>†az6w(~aw7›‡Ž^†:vw›ËNÌÍÎ1ϖÐ
Ö Î1Ña‡ŽÐfƒYÌ tDÑb6”bϖÎ1~3Ñh}>Ò‡6Fˈ6†aSzŽqt8˜†{q+”f‡6“Žt‚‡6ˆ!v€w+t8tDŽ ˆ6qbt8rH^}!t‚ˆ!„ ‡Žt‚qqu!u‚’Ž}>vŽ~3q>ׄ¢€†azFtDªq1†B£¤a”>wNtDw€r>wPÓ Ô1BÕ/q>¥:ˆ6qrsFq>ˆ)Y†3¢fqwN”fwNw “-†3^}L}!tD„NŽt8wNˆ!†tDƒ€rYt‚}>ˆ!“‡ŽwNq>~uDq1†a†atDzŽ6q”F† x
„Nq a¢Ht8“ †az6w(t8~¦†a‡6~3œ†a})v6‡6ƒ>xØH‡Ž„z q> tDŽˆ!tDrYt‚ˆ!‡Žq>ut‚¦zŽ}1Ÿ:w(r>wN~#a}H}>œv}>‡6”fzY†¦t8Y†3}˜†azŽw
|p}>u‚ˆÙ x
}>ŽatDˆ6wN~ Ú•tD”>‡6~3w›Ä¦az6}1Ÿ[tD6”b†3z6~aw(w¦^†atDu8u‚B|p~3}>¹†3z6w7ˆ!}f”f҆a†3q>„¢ k}1rHt8w#vHƒkÛ+‡6v6tDHƒYt
w † q>užÓ Ü1Õ{Ÿ[z6} zFqsr>w˜vwNw(…‡Žat8Ž”šq©ØH}fHƒ™Ã¦t8v}š†3}š^†a‡Žˆ!ƒÇq>6tDkq>u tDY†awN~q>„ †atD}>Ž(xy{zŽw
 }1rHtDw˜^zŽ}1Ÿ#bqœˆ!}>”%w(q†atD6” a}>kw€kw(q1†PqFˆ©}f™†az6w˜}>†az6w(~L^t‚ˆ!w˜}>|:†3z6w€|p}H}!ˆ™tDLq>
Ã#tDvF}kݘ†3z6wØH}fHƒ)~3}>v}†¦ˆ!}f”›Ý)tD q€„ ~3}>‡F„z6t8Ž” “}fat8†atD}>xy{z6wLÃ#tDvF}‘†qŽˆ6#‡6“xFy{zŽw
ˆ!}>”)^†a}f“Ž7w(q1†3t8Ž”ŽŽvFq~3w(#t8†3¦†aw(w †3z©qFˆ%”>~3}1Ÿ[uD(xŽy{z6w ˆ!}>”‘”>}Hw(¦vŽq>„¢‘†a}˜wPq1†3t86”Fxy{zŽw
Ã#tDvF}b†q¢fw(BqL^†aw(“k|p}>~3Ÿ’q>~3ˆ›†a}1Ÿ{q~ˆ†az6w#|p}Y}!ˆ€q>Žˆ †az6wžˆ!}>”L^†a}f“ŽwPq1†atD6”FÞ>”>~3}1Ÿ[u‚NÞq>Žˆ
”>~qvŽ:†azŽwLÃ#tDvF}€vHƒ€†3z6wb6w(„¢‘qŽˆ‘†azŽ~a}1Ÿ#’t8†¦q>„ ~3}f3:†az6wb~3}H}>%x
§¨zŽq1†t‚SzŽq“6“wNŽt86”+z6w(~awsߦà76w’t8Y†3wN~3“6~awN†3q†atD}>›}>|FŸ[zŽq†Ÿ:w[q~3w{^w(wNtD6”7t‚•†azFq1††azŽw
Ã#tDvF}œt‚+“6~3w(3^tD6”-†az6w€ˆ!}f”Ž« +v6‡!†a†a}>Fbt8Ša‡Ž„zªq‘Ÿ{qsƒ%†azFq1†Lt8†b†a~3t8”f”>wN~žq‘zFq~ˆH‹<Ÿ[tD~3w(ˆ

70
AÊEE½’½’½Aº9º9ÅYC¿CDµ¯79>28g¶¢@!CB7Vµ¯¾¯E½l½A;:»¶l¸E>A¾åËd8:½Ó!µ¯»¯@D½'7<7¢>ACBµI;:ÉMµ8g>A748g;g;:»¯7<µYE7CB8”µ¯÷Y¶'CD;[µÃET¶A8a;gE:½c½]½AÉKº4;[CD¾’@R>A7<@BC¿C¿;)EÏE:CBµ¯>絯½l¶#;:à4¸ õ[8:Þ[»¯ðc78gYÊA å>c½A8&ðcÅY>lñaµ¯ l¾’¶µõ9ůñ@B9î8 CBµ¯µå¸œ½A8g;g>A»¯¸ @B77Ï8:E:¾’»Y>A½A>2¸¶I8œE7@B7<7VÉM>c>o8>oÁAÊè7<÷YE;[>AETE:E8VÆYˉ>AE:Ữº4ÍM7.CD¾¯¾’74͘½l½l;[¶ ;E
8:;:>2;[7VµY>2º9¾µY½A¶lE:º9¶Aµ¯;g;g½’C¿7<Eº97 Eg½’EE¾’½lŏCD;@Bº[7VCD»¢E3µ'?¡E:½l7<8g»¯;gº4¾¯½A7474µY;g7a;¾8:ÉR½A½½l;[¾’ůÒA74@¿7<¾;!74Æ'µ¯ÇO½l7aCw8[;:Eµ¯¸œ½œÍ˜E!½IÉ!ǯ½’>2ů¾‰;g8Ë-µ¯6
CDµ¯Å¯CD¶œÇÆ¯½IÆY>2E4CBµYÈY7V¾E4>AÈ
µY8:>A»Y¾µY7&º[¾#>A»Y¾’>c»]ů8gůǏ@B¸œ8½A>28gÉME<µ½AȯE4ů>2È
@¿;g>A¾¢7);:7EµYCD½2¸Ï»Y8<>2Æ¯Ë ;[@B¾’Ê¢ÉKÒ]CDCB;:@D7V@/¾>AµI8gʽ
á 'â ®R« ã:ä
­YÿY0¬’³®¡«#k¯åBä/«R¬¯ÿ
Ì_Ưµ¡;:748:2 7<ÖlµYÖ¯¾’ÕCDµ¯ÉR¶7?8:½œE74ÇO8.7&ů>”ÆÀ¸œ>ç>lÉKº[»¯CBCBøVµY>27A;[˯¾éÓ!½2»¯Ía7a½AÁlø#74;g74ÊÏؒƏ÷Y7<;gE;:8CD¸Ïº974½lµIµ]8ÁA74ÉK;[EgCB8:>c»À8:CD½A>¹µ.ETÉR8gÅY7<µl¾’8K74µI@DCB8Òl7>AEœ8:»¯8gC¿»¯EN'7ãÉKCDø<>A;g¾
È
6 æ#+;+æ
֎' ÖlÖ+Ư ÅY74E!@D@D½)¶AÅY>2CDµ¾’¾a7lˎÉR 7<@D½cº4Éù½A¸Ïº4>A7µ8g½ÌM8g»¯»¯747’@DÆ# ÊA74½l@DǏŏ½læ ů;:µY7:ç µYCBÁl74;[ECB8Tʺ<>2¸ 
´
¦èè $ &æ Õ+֎' ÖlÖ+ ½A;g½Aµ
Ë
Â=CDERƏ»Y7<>c;:8»E:>2»¯ÆY½AERůCB@¿µI¾œ8g748g»¯;g7<7 E8:ÉKCDµ¯CBøV¶a>28:;[»¾>cEg8!>oʒ½Aůæ ;RÓ!ů»YµY7¾’º<7<>2;gE@D@B8g7<>A;MµYC¿¾’EMCDµ¯½A¶&Ç]Á]½2CBÍ0½lÅYº9½AE:@B¸ÏÊƯ8:ů7VET8:8g74CB;[µYE¶@D7<8g>l»¯¾¯7 ERƯÅY;:E4½lÈl¶A8:;[»Y>27<¸ E:7)>2¾¯µY>o¾ʒCBE<8 È
8:>2½µY¾E8g>œ>A;»]8ů8g¸œ»¯7)>Aº4µ½A͘µ];:ÁA½l7<¸ ;gEg>cÕV8gÙACBÙ>½lµ”CDÉKµCB8:ÉK»»¯8:C¿7<º[E»8:CD8:µ¯»¯¶7Ëf»IÅY7<¸Ï;:7>ACDµ#ER>&¾’½]º97<½lE:µIµ
Álê 8)74;[ETE:8[>2>28:;:CD8½AµÇ]Ê.Ǐ748g8T7<ÉRE8:7<CD74µ¯µ¶Y>aȏǯ¸œÅ’>l8º[74»¯µYCBµY¾¯7E
ůƾ’ 6 ½Aæ#CDµ¯+¶œ;+E½Fæ '
ŽÖ ' &’žÚ ;ê ¾¯>oÊ.¸Ï>28:7lË
"fç7*ž;+$RfÖ  ŽÖ ' éfé+;  ¾¯>oÊl6Ë ½cÉaê E!Cw8¶l½ACDµ¯¶Iæ
6 æ#+;+æ
Õf'BÕlÕ[  »¯ÊÏ7a¸É!½A>A8:E!»¯>7<;Rǯ½lCw8)µYµIº97ů8gE:E<>AË CD¾)5>½cÉéCB8MC¿ER¶A½ACDµ¯¶”CDEM>&¸”Ê]E8:7<;:ÊlË 5
"fç7*ž;+$RfÖ  fÕ ' fžç!» ƒ»]ů»
Ë
6 "fç7æ#*ž+;+;+$Ræ fÖ
 ÕffÕ '' YéfžÕ
êž;g”7ÈoÊlµ¯½A½YÅsË MET8gŒCB@D8@
ÊA@D7<½A>AÅY;:;0µ¯>ACDµ¯µ¯¶”7<º<8:¾’½½28gE:7Ə7V8:½]>2½lÒ¦ÒȒ¸¸ÏÊ7!͘>;:CDǯ74CBµY8¾ÇIæ Ê&E:ů;gƯ;gCDE:7AË
"fç7*ž;+$RfÖ  fÕ ' éfž½cÉÀÉ!>AEMÊl½Aů;K¸Ï½A;gµ¯CDµ¯¶Iæ
6 "fç7æ#*ž+;+;+$Ræ fÖ
 6Õf''BéAsÕ ÙLé)Ì)ê ¸ »ÉME½l74;:@D@ž;gȯ–Ê 8:I»YÉK>2»8<ê>cEK8<>”ê EKÆY>Cw8TƯʖCBë8Tʒæ
 6 æ#+;+æ
ì6' AÖ
ÆO½A@D½A¶ACD7<E!>lº4º97<ƒ8:7V¾‰Ë
"fç7*ž;+$RÖf 6' Yé)̝͘747<@¡º9½l¸ÏƏ7<@B@D7<¾'8:½CDµYE:ů@w8&Êl½AÅ
È
>AµY¾'ÉR7lê Ál7½lµ¯@DÊ#Ǐ7<74µ
8g>2@DÒ]CBµY¶Ï>¸ÏCDµIů8:7AË
 6 æ#+;+æ
ì6' &IÙ='7&>A;:7ǯ@D½I½’¾’ÊÉR7<@B@¦8[>2@DÒ]CBµ¯¶È¯>2;g74µ
ê 8KÉR7oæ
"fç7*ž;+$RÖf Ž'BÕ(&›)»”ÇY>AÇ]ÊAËc=?7EÅ¯;g7K>2;g7AË  ½ »¯7<;:7K>A;:7KE:½A¸Ï7!ÒA74Ê]ÉM½A;[¾¯E/͘½A;
=ÂEÊ’E»Y8:>c748g¸Û74ÁA8:7<½œ;a;gCw8&7<º4C¿½cE ÁA8g74»Y;V>cÈ]8&ÉK»¯»YÊAC¿>lº[½AE&»Å >2'¯8gµYE»¯»¯µ¯7CB½c8E:ÊAʒ¸Ï7VET¾#8g½2748g»¯¸Ð»¯CD¸74;KÍî>AÇY½lCB@¿;a>lE!E»¯8g7<½Ï74ÇY;V>28gȦ@D>2@ 8:Òl»Y7 7aůâTÆ
ÅY˾’è¶l7œCBÒl½27ܦ8:74»¯;[7Ea¾¯>¢½A¶Ïº[»CB>2µµY8gº4»¯7”7a͘½lÁ];aCD¾¯8:74»Y½Y7 È
8:CDE »¯7Mµ¯½AâTÅY8¾’;g¶lCD¶A7 »IÉM8<ȉ>A;:>2µYµE¡¾#8:8g»Y»¯77¸œâTÅY>l¾’º[»¯¶ACB7¢µY>7 ìq>cI8:8:8g»¯>A7 º[Ғ¸œE<ËB>A–ê º[ꝻYCB½Aµ¯8:7l7ê EM8:»;g7<>cE:8 Æ8:½l»¯µY7E:7âTÅY8g¾¯½¶A8g7A»¯ê E CDEK;gE:7<7<E:º4Ə½A½lµYµY¾.E7½A;[ET¾’8[>274;:;!8gµ¯E½l½A;:ů¸ 8
8:äl9>2ÅYµ7<Cw8gµÃ¾7&¸Ï8g>2»¯µ¯½A7¶l;g7;:ÒAÊ7<;[Ê]>c>A8gÉRµYCB½l¾½lµY;g>2¾¯>2ǯE/@ ?dÅYÇOÇOE:7<CD74ÁAº4»Y7)½A>o¸ÏáœÁ]CD78:½A»¯Å¯¸7;M½l>AC¿;:E¡¶A77<Ưµl>l;g8KCDº4¸Ïº9»Y7<>A>lƒ;:E!8gCD@D>AƯÊÏǯ;g>”7<@D7AEgËdƯE7V;g̾½’ÉR¾’8gÅY»¯½lºů7a8!@Dǯ¾·½2ŒÍ-E:8:ÒIů8:½AµY¶Aµ½c¶lÉKEK7<ECB½28”µ¯Í0¶&8g8:»Y»¯8:>c»Y7!8œ>2âT8Mŏ8g»¯¾’»¯7¶AC¿EM7¸Ï½Aá;MCB@¿Ç¯»¯¾’Å’74748;;
áœ;:CBµI7V8:CDEµ¢7<ÆO;g½AǏ>lµYº½AE:8[8:7K>2»¢µIÉM8:8<½A»¯Ëců7&Ó!@¿»¯¾º[»7KǏ>cƯ78:;gÇOÁ]½A½2CDÇY748@BÉM7<>A¸7<µY¾¾ CDÇ]E
ʵYCB½2ÇO½A88:½œ»¯8:º4½ 7<>l;g¸œE<E7VËY>2ER)Òláϵ7!C¿>8:EK»¯¸œÇO774>AƏCDº[µ¯½I»Y¶ECBCBµ¯8:8:CD7M;gÁA7<8g7>c»Y8gE:>c7<C¿8d¾’¾¢7AC¿E>AÈ2E!µY>Aº<½2>Ϻ98:747E½’Ư8:º48:»Y7<CD>2>A¾
8d@
Èc>A8:ǯ»¯ºŒ8g78d½A¸œ;!8:½ Ç]>l¸œº[ʜ»¯>28:CBµY»YÒl777
Cw8KÇO74»Y>oÁl7)CB8gE:74@BÍ-½lµYº97Cw8C¿E!>Aº<º974Ư8:7<¾¢>AE!>Aµ>Aº98:½l;RCDµ.8g»¯7&>2ÆYƯ;:½lƯ;gCD>28:7E:½’º9C¿>2@‰º9½lµl8g79Ø]8<Ë

71
í â'®R«²±)ÿ]³T®¡«

µI8gE)>2µY¾¢ÇO747<E@BCDÁA7aCDµ#º9½l¸Ï¸ůµ¯CB8:CD7<EÉK»¯74;g7 8:»¯7&Íî>2ǯ;gCDº ½AÍE:½’º9CD798TÊ¢º4>2µÇO7&79ؒƯ;g7<EgE:7<¾
>AE¢>嵯½A;g¸œ>c8gCBÁl7ãEÊ’E8:7<¸¢Ë{¡$ >lº[»Ñ>2¶l74µI8.C¿E.¶lCBÁl74µÀ>ÃE748½2Í&µY½A;g¸ÏE8:»Y>28¢¸œ>AÒA7#CB8÷Y8
KÉƯ;:Cw½l8g»¯ÆCB½Iµ.E:>A8:@A»¯C¿7E-¸Ï8:»Y7<>2º[80»YÆO>Aµ¯74½lC¿EÆ¯¸œ@B7!E¡E8:8:»YCD@B>2@]8RÅY74E:7Mµ>2E:ǯÅY@Dº[7»&8g;g»¯Å¯7)@D7<µYE<7<È<EÇY8Œío8»YCBº4Ál>27µ”8:>2½@¿EE½ÅY8:;:»¯Á]CDCDÁAµ¯7Ò&>A>2µYÇO¾œ½Aů;g8-74Ư8g»¯;g½’74¾’CD;dÅY>Aº9º7l8gËICB½lÓ!µY»YE<7 Ë
͘=ÂÇY;:>A½l»¯E:¸ 7<74¾¢;gCD7<µY½A>l¾’µEÏCDÁ]E:CBµYCD74¾’@BE:Í0ŏ7<º9CD>2µI8@¿8:E47<º9ÈO;:½lE7V¸Ï7<ET@w8VÍ¡¸ËYº4ůÓ!½Aµ¯µY»¯CBEg7a8:º9CD7<µ¯CD½AE½lÅY;:¸E¸œCD>2>c¶A¶A8g»I7<CB8ÁlµI7a8gÅYEEE:ʒ7#º<>2E8:>èµ74¸Ûµ¯;g7 ½lY͘;:½A7V¸œ;!º8>c8g8g»¯½lCBÁl7<µE:778:»¯E>2ʒ7<¶lECB;748:74µI;:¸,8½l@Bº97&½l8:»Y¸>A>2µY¸”8¾ůƯEµ¯Å¯8gCB>2@D8:@D;:CDE7<8EK>A8g½.º9¸”8:ÅYCD>A½Aº9Eµ 88
Ǐ»Y>27¢;gñ:¸ðA͘ú4ůû]@àߞ>lȦº>28gµCB½l¾#µÑ>2>2ǯµYŏ¾ÑE7”>lCDE.E)ÆYE:ÅY>2º[;:»Â8)½A@D7<Í>o8:ÁA»Y7VCDEE)ƯE:ÆY;g½]>Aº4º47<7EgE4͘½AË ;¢
ÇYCBµÅY¾’ECB7”Á]C¿CD¾’E)ÅY8g>A»¯@D7E͘8:½l½Ã;:7º[»;:ů>2µYµ¯µ¯¶l774;)8:8:»¯½7<CB>A;¢º98:>2ÅYµI>A8:C@
8:CDEE)»¯½’7Vº98:C¿E»Y>27&7@KE:º[ÇO7<»Yº474>A½A»@BµY>o@D74¾ÁIµYCD½A½A¶AÅY;[7A¾’;<ÈO74Ëd̝;!=ÂÇOÇO74»¯74@D»YCB7<7<;:>oÁA7VÁ]7l>ACDȏ½AEÏ8gů»]»Y;[ů>cEM¸œ8a¸ÏE>27<8gµ>2>2Eœµ/µÈ¾¯>2
EµY¾·CDǏǏ74½Æ¯8TÉRêůEKÆY7<>AƯ74µYµ#CB7V¾EÅYº[E >2»Y;g>A>c7µY8gǏ¾»Y½A>28g8g;[»¯E!¾’7µ¯ÉK7<º4CD7<;:;:7V¾7V>c¾å8:8g½ÏCB8g½l½åÇOµ#7 ÒI½2µY8:Í¡½l½c74@DÉÛ¾‰ÜO7VˏÉKºÓ!8g»YCB»¯Ál>2CD78E
»IÅY¸Ï>Aµ!ƒ¸Ï>lº[»¯CDµ¯7aº9½Aµ]Ál74;[E:>28:CD½Aµ
Ë
î ä  ä/­6ä/«²–ä-ÿ
¤VŸN¦HgÿbIH[õ€ukSVW’üFHLøaÿ /ï :õQTS9Ÿ“fb\<`)\<b]‘lv¢QTjwvlh2•<^TH!H[WlmMGIblH[jkb¢noHgfRQTp_ŸOjq^sLr”H[n2N‰jkQTbIH[p_p_S<p[bXOŸ›¤
ðB ñP còŸ ó‚ôöõa÷!õaø^ø3ùSú!ñ(ûbõœüŽ÷YóDý(õaþaøaÿPò ø+óD÷ÿ(÷
¥2ŸŸ ¡h2Ujki:GI\4\4bIQblvH-ZK—
•V\[“•<jk§AbIjkp‰bl\4p[b]Ÿv!Z!Yõ#jw\<ú!bIõ3\¡ò hAøuw\VvABHVŸ õa ÷6:õ ÷HŸÿPò !(Aøó‚eD÷ S<QvmMÿ(ø bIjknoÿ(òH:QTp_jkñN^ž÷Yr”ý(N
õaþ^QTø3H[ÿNp_ô/p[ópXñ(I÷¤
Ÿ2 fA\<Ÿ p_p_H[uku¨X$¢H[ukukjwbl•<›
#"  "
T
^ <
S &%RSVUIp_H<X¤¥
'ah2^_Q\4b]v¯XILYSVbIvlSVbYX¤


b
(lŸ)<SVbϗ
ukpƒ^THgQŸ-hAScigjB\4ublS<QT`apd\4b]v&H[i[S<bISV`ajkiM^TGlH[S<Q_rcŸ+*ñ  þa÷HÿPòFñ ,.-./ñ(÷Hñ(ûž0ó /:ð õaþa0ø 1f2õ /3ô/ó‚ý(õaTø X
 –3(cš54 
6]¤<¤7 2X‰¤
 AŸ
'2Ÿ%M\4QTS<uBv¹P!\9Q28]bI§VH[u¨Ÿ f0S<b]vljq^TjkSVblpÏS<e)p_UIigi[H[p_pƒe¿UluvlH[•4Q\VvI\9^TjkSVb¹i[HgQTH[`aS<bIjkH[p[Ÿ9 ûLõaþ^0ó /ÿ(÷
*ñ  þ^÷!ÿ(ò–ñ ,{ú!ñ /3ó/ñPòeñ  !<X:A¤4 (o¥;6<(c¥7(lX
¤
'2Ÿ
AŸKZ!\<bIjkH[u<%M\4Q_QTjkp[Ÿ "= ôö5õ >=?  ÿ(ó‚÷f3ô >@  ÷  Aþ !#ÿ(:÷ BCBñ(û+ÿ(÷Yô/3ó / ùfDô Yõ ÿsõaø^Dô fõaô/0ó /3ø ñ ,/ñ(÷fø  ûbõaþaó‚ø)û Ÿ
0ï \<p_jki¦0ï ScSV§2p[XO¤; —/\<pƒ^E'  QvÏh2^XAJMHg“GF-S<QT§’XI¥;;
;AŸ
2Ÿ)IS<H QTbJ!QTH[UA^TH[u\4b]vf0S<ukjwbLKÏ\9^TGIH[p_S<bŸMKS2vlH[ukukjkbI•.vljw\<ukS<•VUIHUIp_jkbl•Ï`Uluk^TjkWluwHajkbAe¿HgQTH[bli[H[p
S9noñNH:Wû Q1 jwbAe¿ô¤S4ÿ(QTô/`&ópñN\4÷!^TÿPjkSVòŽbÏú6õapƒûb^\9ÿN^T÷YH[p[ô/0óŸ
/3£sTø bkX]Z!ð\<þŒ•Vñ pƒ/^^Tõ^Ul2õ B(GIóDu¨÷ X] ¥ø¦;
;ñ ,;AŸ N "PO ú RQ >SQs:÷ BTkñ(2þ UNø f5ñ 1%ñ(&÷ N^÷ ,hõaþ]õaV÷ /^õ#óD÷
" 
AŸ—
bIjk§XSYH JKUl‘IjkbcrAj˜X™MZ v \4Z `[Kjk§2u S<Z p_j¨X\lQ H[Z v HgZ QTjki]J\4WIuw\<bYXK \9Z Q_^\P \<Z igp_j˜X S
Z gp_HgeFOS<W \<Z u¨X0\<bIv
^Rjkuw`aS<pdf0p \4Z b2rAj¨Ÿ¦hASci[jw\<u¯‘’H[GI\nAjkS<UlQdS4e¦vASV•Vp0H[bIi[S<UIbc^THgQTjkbI•™¡£ŒPï )XA\4b”\4bIjk`&\<uq›îukjk§oH¡QTS<‘’S<^
jkb\bIH[UA^_Q\<u\<bIv”jkbœ\)eDH[Hvljkbl• p_jq^TU]\4^TjkS<bŸP_’`õ fÿ(ýhópñ  þŒÿPò!ðSþ]ñ /^õaø3õaTø XX '<4 ¥  ¤A6A¥  AXO¥a;
;  Ÿ
AŸK£ŸKH[u3b igUI§’Ÿdh2H[`&\<bc^Tjki!WAQTjw`ajq^TjknoH[peBQTSV` ^TGIHMnAjkHg“W’S<jkb2^¡S4e‰^TGIH!`aH\4bIjkbI•4›˜^THc2^uwjkbl•VUIjkpƒ^Tjki
¤;AŸd^T\4KGl‘’jkH[SViS<UAG]Q_^ \4rcH[ŸWuwuX\<? )lblŸe•VU] ¡ ÿ B1\4H•VõavIþ^HVv2÷YŸ#rc+ó Ÿ¯£žB(bãFóGIú!™RH¡õab]ûbi[v2SVÿ(QTbIHg÷fvl“gô/Ul0ó /jkR<ÿ^0XO`aQ_^T¤S<Hg;l^bc–ƒ\<¤rcWlš5X¦4GI
HS4'vAQ6Ijk4c^T¤S4™å;oQ¥cX+iX‰\<h-¤p_HRõa
ô¤S<5ÿAe¯1IŸ eD>Qñ(\4þ˜`aÿ(HR:÷ igBiSVbIfIfjkigñ ^djkba¨ô SVŸ0UAfQd\<uw\<`)bI‘l•<QTU]jwvl\4•V•<HH


R
m I
b k
j o
n g
H T
Q _
p q
j ž
^ 
r

N T
Q [
H _
p [
p 
X   Ÿ
¤
¤<¤VŸN¦fH:\9^T^THgGIQjHgQT$jkbl\<H)ukukN¦jkp[HgŸBuB\40ï i:H[GIuk\<jkH[UIn<vY\<XI‘l—/uwHukjki[pTS<\<bA‘’nVHgHg^TG.QTpT\4™¡^Tb]jkSVvAbIQT\<H<uOX]\<hc•V^THgHgb2e¨\4^Tb]p4]JK£sbcSV^_WlQTWS2vlXIUl\<bIi[jkvMbI•k¯p^TSaGl8’HK\ljwbc ¡^TH[Ulbc^_^T^T§<jkSV\[brcX2`&Hvl\<jqW^TŸ-S<QT£sp[b X
" þ]õ]ÿ(ô/ó‚÷  _:ñ(:÷ B(]ø mó‚Dô n@  ûbÿ(÷Hñ(0ó B(p ø o‚ðSþ]ñ /^õ2õ B(ó‚÷  ø)ñ , Dô YGõ T ñ(2þ UNø Zf5ñ 1µÿ(ô .h]’ú q r
s5t9X
m¡^_QTH[iG2^mMbIjknoH:QTp_jk^žrcX2^TGIH!JRHg^TGIHgQTuw\4b]vlp[XauƒUluqrœ¥a;
; 'cŸ

72

You might also like