On Strategies of Personal Information Protection in the Personalized Information Service in Big Data Times

Size: px
Start display at page:

Download "On Strategies of Personal Information Protection in the Personalized Information Service in Big Data Times"

Transcription

1 ITM Web Conferences 47 7, (2016) On Strategies Personal Information Protection in Personalized Information Service in Big Data Times Li-Ping ZHANG Library Shanghai Dianji University, Shanghai, China Abstract: Obtaining personalized service library must inevitably involve readers personal. In Big Data times, readers personal is ten leaked out, which will directly influence readers satisfaction and trust for personalized service library. This article aims discuss sorts potential security risks by using descriptive method and analytical method, and list effective strategies for defense readers personal. The outcome is that only by working out effective strategies protection can we strengn protection readers personal, and eliminate possible potential safety risks, and ensure smooth development personalized service library. 1. Introduction In Big Data times, library is facing choice tackle Big Data challenge, such as collecting, integrating and researching structural and nonstructural data, which is explicated and implicated in readers havior. Under this situation, in process personalized service library, collecting, handling and sharing readers data will tend opened and exposed outside world and it is obviously increasing that readers privacy threatened and invaded. Thus, protecting readers privacy is an inevitably important project solve in personalized service library in Big Data times. Therefore, only by working out effective strategies for protection can we strengn defense readers personal, eliminate possible potential safety risks, and ensure smooth development personalized service library (PISL). 2. The meaning in PISL personal On meaning personal in PISL, it has not come an agreement. The academia consistently holds that personal should have an important feature: recognition. There exists a certain objectively determined relevance tween recognized and subject, through which subject can recognized directly or indirectly by personal. [1] Therefore, personal can regarded as a summary all direct/ indirect identification individual a natural person. PISL refers individual needs based on specific readers, which is characterized by using a variety technical means track and analyze readers habit havior and interest using, and it is also a kind service that provides readers with specific informative content and systematic functions, such as cusmized service, push service and reference service. In process PISL, maximally meet individual needs, library must collect as much personal readers as possible identify personal characteristics, and infer potential individual demand. PISL includes following personal : active that readers provide directly, aumatic that records readers haviors and interactive in process reference services. The active refers personal data and demand when y apply for PISL, among which lots contents that can directly recognize readers identity and features are involved; aumatic is personalized service system aumatically captures and records all kinds activities personal log files every time y enter website, apply for service and transfer, etc. Such personal can aumatically preserved by server in a long-term and successive way and it is a basis for PISL; interactive refers response-answer when readers get involved in it, and usually it is carried out in forms using virtual chat stware or s put forward question that y want consult and get corresponding answer. Such is usually related field scientific research, and has certain creativity, advancement and potential economic value. The Authors, published by EDP Sciences. This is an open access article distributed under terms Creative Commons Attribution License 4.0 (

2 ITM Web Conferences 47 7, (2016) 3. The Potential Security Risks Personal Information In Pisl risks include following: (1) readers database directly gets malicious attacks and intrusion, resulting in personal ing illegally read, tampered, downloaded, and spread. (2) Because imperfect network technology, readers personal will illegally downloaded in aumatic transmit system and sharing with or websites.(3) As readers input user s name and password, y are tracked and slen by illegal stware, resulting in leakage readers individual. (4) When cusmers are ready utilize cusmized service functions, readers personal or cusmized may seen by ors cause y do not exit ir personal interface in time, or enter a search term but do not clear it in time. (5) The leak personal may caused by analysis and research from library, such as improper srage, unawareness importance for keeping individual, disclosing personal without any permission. Of 3.1 Security risks personal in Reference Service Reference Service is a kind academic, knowledge-based service that librarian reference puts mutual exchange shared with readers by aid network interactive ols, which can have a discussion on a specific issue, and help readers with answers or solutions problem, or making decisions. The security risks personal also exist in process reference service: (1) in real time reference consulting, virtual chat stware is generally used for text or video communication. If tracking device is artificially installed, n, recorded may exposed third party without readers awareness. Typically, conversational record will reserved in system for a period time. The longer it is kept in system, more dangerous it is. (2) ing reference service involves personal addresses. If consultant discloses personal address without permission, it may cause network space readers filled with a large numr spam s or ft emzzlement. (3) web form reference may have readers chose wher or not disclose personal in network discussing forum. If reader lacks awareness self-protection or improper operation librarian, it may cause reader s personal disclosed public. (4) From contents reference, we can see that in services Selective Dissemination Information (SDI) and Novelty Retrieval Sci Tech, readers research direction and research progress are involved. In order ensure originality, uniqueness and advancement research, readers are reluctant disclose related in advance. If librarian takes discussed in public platform as common problems, it will cause certain damage readers, cause lack protective awareness personal, (5) in reference service, re are some items for fees and it requires readers provide a bank account. If slen, it may cause readers certain economic losses. 3.3 Security risks personal in Information Push Service Information Push Service is informative havior that librarian analyzes readers through personal log stware, such as types resources, access mode, access frequency, access length time that readers regularly visit, selective latest through matching algorithm for readers, and regular taking initiative send readers using a certain push technique and push mode. Most readers individual and interests are involved in personal logs, in which individual in process Information Push Service may exist some security risks: (1) cause use Cookie tech, many varieties that readers input is allowed remained, and sred in a unified way in readers PC hard drive for next recognition reader, including registering, credit card numr, etc. If reader s computer card numr is used by ors, in Cookie may seen by ors. This will cause leakage personal. (2) If server with record personal log files is illegally invaded by third party (such as hackers), readers search habits, research field, demand tendency and or important may deduced after received data. This will put readers individual in risk infringement. (3) Without permission readers, in readers log is processed, transmitted, sred, computed, and reutilized by librarian. 3.2 Potential security risks in personal in Cusmized Information Service Cusmized service is a kind service specific systematic function, in which readers cusmize resource and ir service forms, in accordance with ir wishes and needs. It usually includes ordering readers interface, readers navigation interface, readers retrieval function, system resources, and specific service functions, etc. Among personal, basic personal, service demand and received content cusmized are included. [2] In service process, main security potential 4. Strategy for removing security risks From status quo present literature review, research protection personal has 2

3 ITM Web Conferences 47 7, (2016) So, relevant departments should speed up legislative work Library Law, determine rights and obligations for both library and readers in process PISL, restraint, limit or ban use technology with a higher rational standard value judgment, and clearly define scope its application and responsibility. [5] en done separately on a single perspective, such as legal protection, industrial policy, technology innovation etc. Therefore, a systematic ory framework for guidance is needed. The author is attempting set up a scientific system for protection personal, using principles framework, make an overall protection personal and let readers enjoy PISL without fear. 4.1 Legal system as fundamental guarantee 4.2 Industrial guarantee Establishment right personal Perfecting rules and regulations, and formulating industrial service guide At present, when we say protection personal, we ten refer equivalence protection right reputation in scope traditional right privacy and personal right. However, due development times, scope personal continues expand, contents continue increase, and forms continue update. Private contents have en unable fully cover privacy personal. The protection personal is not just same privacy protection, which is a passive removal use by ors, but, in most cases, it is a right for an aunomous control and for appropriate communication. In addition, Right Reputation in human right can not reflect full respect for personal control. [3] So, each individual must given right control its own, that is, right personal. The violation right readers personal by library is related lack perfect system and effective implementation industrial guide. Aiming at problem protecting readers personal, library should formulate specific rules and regulations regulate haviors when each department library and librarians deal with readers personal, and clearly define responsibilities and obligations librarians in aspect protecting readers personal, so as eliminate problems invading personal through internal management mechanism when library deals with readers. legislative basic Because imperfect aspects laws, libraries with different systems have ir own rules and regulations. This will make it difficult for readers understand all rules and regulations and details for protection personal in each library. If library really wants protect readers personal in PISL and let readers have a sense security, declaration system personal protection must established. The declaration bulletin board personal protection should placed in a conspicuous place, with clear and detailed contents. The importance protection for personal has en recognized by every country and many have issued special laws for protection personal. At present, more than 50 countries or regions have formulated laws for personal protection.[4] In China, legislation personal protection started late until in 2008 did draft Law Personal Information Protection submit State Council, but when put it in practice has not decided yet. Therefore, China should learn from successful experience foreign relevant legislation, and speed up formulation Law Personal Information Protection so as protect personal effectively from a legal point view. up as a Declaration and conformation protection statement personal Speeding up process legislation for laws personal protection Speeding Library Law self-discipline Improving quality Librarians Now, many countries over world have regulated occupational moral principles library practitioners, which focus on protection security readers personal. China s Librarians Occupational Moral Maxims issued in 2003 writes that librarians should maintain readers rights and interests and protect readers secrets. In order accomplish this mission, all kinds libraries must take various measures improve quality librarians: First, it should strengn education librarians legal sense and strengn study related legal knowledge; Second, it should strengn construction librarian s pressional ethics, make librarians respect readers personal process A sound legal protection system needs not only a unified Law Personal Information Protection but some relevant laws for specific industries. Obviously, in domain library, Library Law has seriously take hisrical responsibility protect readers personal. 3

4 ITM Web Conferences 47 7, (2016) Developing simple and easy--operate technology for protection personal protection, and make librarians protect personal for readers; Third, it should strengn training librarians for ir security technology, and make librarians have a good master relevant skills for protection personal ; Fourth, regular evaluation takes ability for protecting personal as one evaluation contents for librarians. Fifth, a full-time supervision post should set up for personal safety. This will require that librarians grasp in time new trend threat personal security. It should ten assess potential safety risks PISL system and should improve ability individual protection, using various technical means. Library readers are from all walks life, with different ages, different educational levels. It is obviously o harsh ask every reader skillfully master computer tech and it is also not realistic. So, our country should support and encourage tech industries develop some simple and easy--operate st ware for protection, which may allow readers self-protect ir own personal by using this stware technology Different technology projects personal protection for readers 4.3 The self-protection as inner motivation Because every reader has different degrees sensitivity personal, degree selection service protection and degree for ir personalized service are different. Therefore, appropriate protective scheme for personal should well dynamically formulated for each reader. Because no unified policies and regulations for protection is promulgated, P3P platform can used help readers identify policy and regulation items for personal protection let readers make decision aumatically or semi-aumatically wher or not accept m.[8] The national legislation and industrial self-discipline are a public protection device or a system protect readers personal with aid outside forces. The readers own protective consciousness cannot ignored. As what Charles Fried pointed out, protection personal does not seem limited not let ors get our personal, but should extended that we ourselves control use and flow personal.[6] Librarians also put forward certain demands readers on ir quality, which is usually stressed in PISL statement that if cause readers own reasons for leakage personal, resulting in personal loss, library will not ar legal responsibility. This requires that readers must have ability self-protection. The improvement competence readers self-protection can carried out from following three aspects: (1) enhance readers awareness self-protection through education and study relevant laws and regulations; (2) improve self-protection skills, and build up a Trinity---an overall system self-protection, which includes self-control, self-selection, and self-defense;[7] (3) library should take task educate readers ability self-protection, and it will incorporated in readers education content. 5. Conclusion At present, one main causes less quality PISL is that users have ir worries in use PISL, that is, y are not willing fill out in details or truthfully ir personal, and thus it will cause deviation analysis users needs. Therefore, only dramatic protective strategies are worked out can protection readers personal strengned, and can hidden safety risks eliminated, can we have chance ensure smooth development PISL. References 4.4 Safety Technology as main ol Maintaining environment security internet 2. Network moral loss and temptation economic interests can make some companies or some bad haviorists stall a certain specific network program technologically stalk in library s website in order copy, record readers personal data. Therefore, we must use a variety new and high technology network security measures prevent personal security risks cause loopholes or defect in system LIU Qing, Yuan-yuan, HUANG Effects and Solutions Law Personal Information Protection Information Service Library [J]. Journal Academic Libraries. (3): Jing-cheng LI, Chang-ping WENG On protection users privacy in personalized service library [J]. Journal Academic Library and Information Science, (3): Li-ming WANG Individual Information Right: an Independent Right [N]. Beijing Daily, July 9, 18. XIE Jun Obligations Personal Information Protection and Completion Legislation Library [J]. Library Construction, (8): 1-5. Song-lin JIA Comparison and Consideration

5 ITM Web Conferences 47 7, (2016) on Privacy Protection Policy Library in China and in Foreign Countries [J]. Library Tribune, (3): Shoeman, F. D Philosophical Dimensions Privacy: An Anthology [M]. New York: Cambridge University Press. Faison, D Privacy in Internet Age [J]. Commercial Law Bulletin, (6): LIU Ying on Personal Privacy Protection in Personalized Information Service [J]. Information Science, (12):

Analysis and design on airport safety information management system

Analysis and design on airport safety information management system Analysis and design on airport system Lin Yan School of Air Transportation, Shanghai University of Engineering Science, China Abstract. Airport system is the foundation of implementing safety operation,

More information

Research on Internal Control of Accounting Information System under Network Environment. Qing Xie 1,a

Research on Internal Control of Accounting Information System under Network Environment. Qing Xie 1,a Advanced Materials Research Online: 2014-05-23 ISSN: 1662-8985, Vols. 926-930, pp 2026-2029 doi:10.4028/www.scientific.net/amr.926-930.2026 2014 Trans Tech Publications, Switzerland Research on Internal

More information

STUDY ON EVALUATION OF INTERNATIONAL SCIENCE AND TECHNOLOGY COOPERATION PROJECT (ISTCP) IN CHINA

STUDY ON EVALUATION OF INTERNATIONAL SCIENCE AND TECHNOLOGY COOPERATION PROJECT (ISTCP) IN CHINA STUDY ON EVALUATION OF INTERNATIONAL SCIENCE AND TECHNOLOGY COOPERATION PROJECT (ISTCP) IN CHINA SU CHENG, GUO HONG, MA ZHENG, YU ZHENGLU, PAN YUNTAO Institute of Scientific and Technical Information of

More information

The Evaluation Research of Corporate Brand Competitiveness in Web2.0 Environment

The Evaluation Research of Corporate Brand Competitiveness in Web2.0 Environment Send Orders for Reprints to reprints@benthamscience.ae The Open Cybernetics & Systemics Journal, 2014, 8, 1047-1051 1047 Open Access The Evaluation Research of Corporate Brand Competitiveness in Web2.0

More information

Mechanism Study for E-commerce Affecting China's Future Marketing Mode. Zhenzhen Wang

Mechanism Study for E-commerce Affecting China's Future Marketing Mode. Zhenzhen Wang 2nd International Conference on Economy, Management and Education Technology (ICEMET 2016) Mechanism Study for E-commerce Affecting China's Future Marketing Mode Zhenzhen Wang Sichuan Tourism University,

More information

The risks and legal advice of NFC payment Xiaoyu Zou1, a

The risks and legal advice of NFC payment Xiaoyu Zou1, a 3rd International Conference on Management, Education Technology and Sports Science (METSS 2016) The risks and legal advice of NFC payment Xiaoyu Zou1, a 1 School of Yantai University, Yantai 264005, China.

More information

Research on the Construction of Agricultural Product Virtual Logistics Enterprise

Research on the Construction of Agricultural Product Virtual Logistics Enterprise Research on the Construction of Agricultural Product Virtual Logistics Enterprise Fan Liu Abstract With the development that the demand for agricultural products consumer market is gradually toward to

More information

Management Strategies of Enterprise Mobile Application in Mobile Internet Environment

Management Strategies of Enterprise Mobile Application in Mobile Internet Environment 5th International Conference on Measurement, Instrumentation and Automation (ICMIA 2016) Management Strategies of Enterprise Mobile Application in Mobile Internet Environment Mengli Li1, a, Xumei Zhang1,

More information

Looking at the Future Development of Internet Finance from the Third party Payment Industry

Looking at the Future Development of Internet Finance from the Third party Payment Industry Looking at the Future Development of Internet Finance from the Third party Payment Industry Abstract Yahan Yang 1, a 1 Shandong University of Science and Technology, Qingdao 266590, China. a 524414936@qq.com

More information

Research on Comprehensive Evaluation Index System of Software Outsourcing Personnel Training Jingxian Wang

Research on Comprehensive Evaluation Index System of Software Outsourcing Personnel Training Jingxian Wang 2nd International Conference on Education, Management and Information Technology (ICEMIT 2015) Research on Comprehensive Evaluation Index System of Software Outsourcing Personnel Training Jingxian Wang

More information

Initial Analysis on the Development of Cloud Logistics Model in China Quan YUAN

Initial Analysis on the Development of Cloud Logistics Model in China Quan YUAN 2017 3rd International Conference on Education and Social Development (ICESD 2017) ISBN: 978-1-60595-444-8 Initial Analysis on the Development of Cloud Logistics Model in China Quan YUAN Bohai University,

More information

Research on e-commerce logistics system informationization in Chain

Research on e-commerce logistics system informationization in Chain Available online at www.sciencedirect.com ScienceDirect Procedia - Social and Behavioral Scien ce s 96 ( 2013 ) 838 843 13th COTA International Conference of Transportation Professionals (CICTP 2013) Research

More information

The Impact of Risk Attitude on the Network Purchasing Decision. Xiaolin Zhu

The Impact of Risk Attitude on the Network Purchasing Decision. Xiaolin Zhu International Forum on Management, Education and Information Technology Application (IFMEITA 2016) The Impact of Risk Attitude on the Network Purchasing Decision Xiaolin Zhu Liberal Arts and Sciences Faculty,

More information

POSITION DETAILS. Principal Archivist : Primary Collections. UCT Libraries Information Systems and Resources Special Collections

POSITION DETAILS. Principal Archivist : Primary Collections. UCT Libraries Information Systems and Resources Special Collections HR191 JOB DESCRIPTION NOTES Forms must be downloaded from the UCT website: http://www.uct.ac.za/depts/sapweb/forms/forms.htm This form serves as a template for the writing of job descriptions. A copy of

More information

Analysis of Management Fraud in Listed Companies Based on Fraud Triangle Theory. Jing YAO *

Analysis of Management Fraud in Listed Companies Based on Fraud Triangle Theory. Jing YAO * 2017 4th International Conference on Advanced Education Technology and Management Science (AETMS 2017) ISBN: 978-1-60595-489-9 Analysis of Management Fraud in Listed Companies Based on Fraud Triangle Theory

More information

Research on the Impact of Big Data on Logistics

Research on the Impact of Big Data on Logistics Research on the Impact of Big Data on Logistics Yaxing Wang 1,*, Lijie Feng 1, Heyu Chang 1 and Min Wu 1 1 School of management and engineering, Zhengzhou University, China Corresponding Email:615871159@qq.com

More information

Problems and Countermeasures in Construction Quality Management of House Building Engineering

Problems and Countermeasures in Construction Quality Management of House Building Engineering RESEARCH ARTICLE Problems and Countermeasures in Construction Quality Management of House Building Engineering Cuigang Song, Yang Liu, Changqing Zhou, Long Wen, Yunfei Zhao Chang'an University, Shijiazhuang

More information

Exploration and Reflection on the Practical Teaching of Advertising Creative Curriculum under the Context of Information Exchange.

Exploration and Reflection on the Practical Teaching of Advertising Creative Curriculum under the Context of Information Exchange. International Conference on Education, Sports, Arts and Management Engineering (ICESAME 2016) Exploration and Reflection on the Practical Teaching of Advertising Creative Curriculum under the Context of

More information

Innovative Methods of Strengthening the Construction Quality of Mechanical and Electrical Engineering

Innovative Methods of Strengthening the Construction Quality of Mechanical and Electrical Engineering RESEARCH ARTICLE Innovative Methods of Strengthening the Construction Quality of Mechanical and Electrical Engineering Xianghui Zhang 1, Weiming Ji 2, Yan Qi 3, Liguang Li 4, Mazhi Shi 5 1 Zhongyuan University

More information

Design of fresh food sensory perceptual system for cold chain logistics

Design of fresh food sensory perceptual system for cold chain logistics Design of fresh food sensory perceptual system for cold chain logistics Ying Zhang 1,*, Ruqi Cheng 1, and Shaohui Chen 2 1 College of Electronic Information and Optical Engineering, Tianjin, 300071,China,

More information

Analysis of Multi-Financing Channels of Mediumsized and Small Enterprises

Analysis of Multi-Financing Channels of Mediumsized and Small Enterprises Association for Information Systems AIS Electronic Library (AISeL) WHICEB 2014 Proceedings Wuhan International Conference on e-business Summer 6-1-2014 Analysis of Multi-Financing Channels of Mediumsized

More information

3rd International Conference on Science and Social Research (ICSSR 2014)

3rd International Conference on Science and Social Research (ICSSR 2014) 3rd International Conference on Science and Social Research (ICSSR 2014) On Difference between Administrative Penalty and Administrative Coercive Measures-Analysis on Prosecution of East Star Against CAAC

More information

PROFESSIONAL ETHICS IN VOLUNTEER ADMINISTRATION

PROFESSIONAL ETHICS IN VOLUNTEER ADMINISTRATION PROFESSIONAL ETHICS IN VOLUNTEER ADMINISTRATION Developed by the Association for Volunteer Administration (2005) Council for Certification in Volunteer Administration P.O. Box 467 Midlothian, VA 23113

More information

The Impact of Big Data and Cloud Computing on Traditional Accounting Industry. Xiao-ting LI * and Jian XU

The Impact of Big Data and Cloud Computing on Traditional Accounting Industry. Xiao-ting LI * and Jian XU 2018 2nd International Conference on Advances in Management Science and Engineering (AMSE 2018) ISBN: 978-1-60595-566-7 The Impact of Big Data and Cloud Computing on Traditional Accounting Industry Xiao-ting

More information

Corporate Social Responsibility Best Practice Principles of ASPEED Technology

Corporate Social Responsibility Best Practice Principles of ASPEED Technology Corporate Social Responsibility Best Practice Principles of ASPEED Technology Date:2015.06.03 ( Amended ) Chapter I General Principles Article 1 These Principles are adopted to assist the Company and its

More information

Food Cold Chain Logistics Based on Internet of Things Technology

Food Cold Chain Logistics Based on Internet of Things Technology Food Cold Chain Logistics Based on Internet of Things Technology Xiao-guo Liu 1,a, Min-hua Xu 1,Chen Yu 1 1 Jilin Agricultural University, Changchun, 130118, China a liuxiaoguo@jlau.edu.cn Keywords: Internet

More information

Recruitment Privacy Notice

Recruitment Privacy Notice Rev. A December, 2018 Contents 1. About Us... 2 2. Collection... 2 3. Use of Personal Data... 3 4. Legal Basis... 3 5. Sharing of Personal Data... 4 5.1 Within Jacobs... 4 5.2 With Third Parties... 4 6.

More information

Analysis on Psychology of Contemporary College Students Shopping Online Wei YAO

Analysis on Psychology of Contemporary College Students Shopping Online Wei YAO 2016 3rd International Conference on Advanced Education and Management (ICAEM 2016) ISBN: 978-1-60595-380-9 Analysis on Psychology of Contemporary College Students Shopping Online Wei YAO Commerce and

More information

Current Situation of Highway Daily Maintenance Management in Beijing

Current Situation of Highway Daily Maintenance Management in Beijing Current Situation of Highway Daily Maintenance Management in Beijing Feng Ming PAN, Bao Lin ZHU, Jia HUI, Rui Nan JIANG, Tong WANG China Academy of Transportation Sciences, Beijing 100029, China Abstract:

More information

Research on the Development of Network Video Advertisement in Micro Video Times

Research on the Development of Network Video Advertisement in Micro Video Times 2017 3rd International Conference on Management Science and Innovative Education (MSIE 2017) ISBN: 978-1-60595-488-2 Research on the Development of Network Video Advertisement in Micro Video Times YANG

More information

The Application of Agile Management in Software Project

The Application of Agile Management in Software Project 2017 2 nd International Conference on Computer Science and Technology (CST 2017) ISBN: 978-1-60595-461-5 The Application of Agile Management in Software Project Zheng HAN a* and Zhong YAO School of Economics

More information

Cloud Services Platform based on Big Data Analytics and its Application in Livestock Management and Marketing

Cloud Services Platform based on Big Data Analytics and its Application in Livestock Management and Marketing Cloud Services Platform based on Big Data Analytics and its Application in Livestock Management and Marketing 1 Guangdong Institute of Modern Agricultural Equipment, Guangzhou, 510630, China E-mail: huangjy@e-jiankun.com

More information

Analysis on the Effective Integration of Information Technology and Personnel Management in Colleges and Universities

Analysis on the Effective Integration of Information Technology and Personnel Management in Colleges and Universities Creative Education, 2015, 6, 785-789 Published Online May 2015 in SciRes. http://www.scirp.org/journal/ce http://dx.doi.org/10.4236/ce.2015.68081 Analysis on the Effective Integration of Information Technology

More information

Application of Information System in Warehouse Management

Application of Information System in Warehouse Management 2017 2 nd International Conference on Computer Engineering, Information Science and Internet Technology (CII 2017) ISBN: 978-1-60595-504-9 Application of Information System in Warehouse Management YAOQIN

More information

G U I D E B O O K TENSORFLOW ON AWS. P R O G R A M : D A T A A N A L Y T I C S D O C U M E N T R D e c e m b e r

G U I D E B O O K TENSORFLOW ON AWS. P R O G R A M : D A T A A N A L Y T I C S D O C U M E N T R D e c e m b e r G U I D E B O O K TENSORFLOW ON AWS P R O G R A M : D A T A A N A L Y T I C S D O C U M E N T R 2 0 6 D e c e m b e r 2 0 1 7 A N A L Y S T S Rebecca Wettemann, Barbara Peck Nucleus Research Inc. 100 State

More information

The Crown & Cushion Privacy Notice

The Crown & Cushion Privacy Notice & Cushion The Crown & Cushion Privacy Notice Last updated on May 22 nd 2018 Introduction This privacy notice covers the actions of The Crown & Cushion ( The Crown & Cushion or We ). The Crown & Cushion

More information

*Corresponding author. Keywords: Logistics management specialty, Experimental course system, Local colleges and universities in Guangxi.

*Corresponding author. Keywords: Logistics management specialty, Experimental course system, Local colleges and universities in Guangxi. 2016 International Conference on Education, and Applied Social Science (EMASS 2016) ISBN: 978-1-60595-400-4 Construction of Training Course System of Logistics Specialty of Guangxi Local Colleges and Universities

More information

Study on the Governance Mechanism of Technology Enterprise Based on the Improvement of Independent Innovation Ability

Study on the Governance Mechanism of Technology Enterprise Based on the Improvement of Independent Innovation Ability MANAGEMENT SCIENCE AND ENGINEERING Vol. 4, No. 4, 2010, pp. 106-112 www.cscanada.org ISSN 1913-0341 [Print] ISSN 1913-035X [Online] www.cscanada.net Study on the Governance Mechanism of Technology Enterprise

More information

International Conference on Management Science and Management Innovation (MSMI 2015)

International Conference on Management Science and Management Innovation (MSMI 2015) International Conference on Management Science and Management Innovation (MSMI 2015) The Design of Supply Chain Logistics Information Integration Platform for Auto Parts Enterprises Based on Multi-agent

More information

The Research of the Project Proprietor s Management Control of Engineering Change

The Research of the Project Proprietor s Management Control of Engineering Change SHS Web of Conferences 17, 02011 (2015 ) DOI: 10.1051/ shsconf/20151702011 C Owned by the authors, published by EDP Sciences, 2015 The Research of the Project Proprietor s Management Control of Engineering

More information

Construction of Supply Chain of Fresh Agricultural Products of CR Vanguard Supermarket Based on Computer Information Platform Zhang Peng, Kang Jian

Construction of Supply Chain of Fresh Agricultural Products of CR Vanguard Supermarket Based on Computer Information Platform Zhang Peng, Kang Jian 3rd International Conference on Materials Engineering, Manufacturing Technology and Control (ICMEMTC 2016) Construction of Supply Chain of Fresh Agricultural Products of CR Vanguard Supermarket Based on

More information

Analysis of Problems Existing in the Financial Management in Construction Enterprises

Analysis of Problems Existing in the Financial Management in Construction Enterprises Send Orders for Reprints to reprints@benthamscience.ae 3024 The Open Cybernetics & Systemics Journal, 2015, 9, 3024-3030 Open Access Analysis of Problems Existing in the Financial Management in Construction

More information

BIG DATA TECHNOLOGY IN ESTABLISHMENT AND AMENDMENT OF WATER MANAGEMENT STANDARD

BIG DATA TECHNOLOGY IN ESTABLISHMENT AND AMENDMENT OF WATER MANAGEMENT STANDARD - 263 - BIG DATA TECHNOLOGY IN ESTABLISHMENT AND AMENDMENT OF WATER MANAGEMENT STANDARD BAI, Y. 1,2 BAI, X. 1* LIN, L. 1 HUANG, J. 1 FANG, H. W. 2 CAI, K. 1 1 Resource and Environment Branch, China National

More information

Master's Degree Program in Technical and Scientific Communication (MTSC)

Master's Degree Program in Technical and Scientific Communication (MTSC) Master's Degree Program in Technical and Scientific Communication (MTSC) Regulations Governing Internships FOR MTSC STUDENTS Department of English Miami University Oxford, OH 45056 Revised November 2004

More information

Construction Project Management and its Control Measures

Construction Project Management and its Control Measures Abstract Construction Project Management and its Control Measures Jing Peng Chongqing City Vocational College, Chongqing, China, 402160 With the rapid growth of China's economy, people's living standard

More information

HERMES MICROVISION, INC. Corporate Social Responsibility Best Practice Principles

HERMES MICROVISION, INC. Corporate Social Responsibility Best Practice Principles HERMES MICROVISION, INC. Corporate Social Responsibility Best Practice Principles 1 Purpose 1.1 In order to fulfill the corporate social responsibility initiatives and to promote economic, environmental,

More information

Research on Construction Projects Cost Management

Research on Construction Projects Cost Management IOP Conference Series: Materials Science and Engineering PAPER OPEN ACCESS Research on Construction Projects Cost Management To cite this article: Youlin Li 2018 IOP Conf. Ser.: Mater. Sci. Eng. 394 032057

More information

Analysis on Factors to Cause the Price Change of Building Materials

Analysis on Factors to Cause the Price Change of Building Materials Advanced Materials Research Online: 2013-04-24 ISSN: 1662-8985, Vol. 683, pp 668-671 doi:10.4028/www.scientific.net/amr.683.668 2013 Trans Tech Publications, Switzerland Analysis on Factors to Cause the

More information

WeChat The WeChat guide for B2B marketing in China

WeChat The WeChat guide for B2B marketing in China WeChat The WeChat guide for B2B marketing in China WeChat Ecosystem Target Customer scans the QR code Follower! WELCOME Allows new people to follow! Company Account Text Link to H5 MENU Push Post Web page

More information

Financial Performance Evaluation of Grid Enterprises Based on IPA Model -- Taking XX Power Supply Bureau as an Example

Financial Performance Evaluation of Grid Enterprises Based on IPA Model -- Taking XX Power Supply Bureau as an Example Financial Performance Evaluation of Grid Enterprises Based on IPA Model -- Taking XX Power Supply Bureau as an Example Junda Yang Finance of International Business School, Jinan University, China Yun Xia

More information

Research on the Digital Transformation of China s Traditional Publishing Industry Based on an International Perspective Bao-Ling LI

Research on the Digital Transformation of China s Traditional Publishing Industry Based on an International Perspective Bao-Ling LI 2016 3 rd International Conference on Social Science (ICSS 2016) ISBN: 978-1-60595-410-3 Research on the Digital Transformation of China s Traditional Publishing Industry Based on an International Perspective

More information

Cost Management of Mechanical and Electrical Engineering Project Based on Bim Technology

Cost Management of Mechanical and Electrical Engineering Project Based on Bim Technology RESEARCH ARTICLE Cost Management of Mechanical and Electrical Engineering Project Based on Bim Technology Lifa Zhang, Zhibo Dong, Lizhuang Zhang, Aiping Zu, Liang Yang Jiangsu University of Science and

More information

Other legal considerations for your website content can include: Using proper company logos and listing trademarks and registered trademarks

Other legal considerations for your website content can include: Using proper company logos and listing trademarks and registered trademarks CONTENT: in media production, publishing, and art, content is information and experiences that provides value for an end-user or audience. Content As an e-commerce entrepreneur, you need to arm yourself

More information

Pegatron Corporation Corporate Social Responsibility Practice Principles

Pegatron Corporation Corporate Social Responsibility Practice Principles Pegatron Corporation Corporate Social Responsibility Practice Principles Chapter I General Principles Article 1 In order to fulfill the corporate social responsibility initiatives and to promote economic,

More information

Research on Comparative Analysis of Regional Logistics Information Platform Operation Mode Based on Cloud Computing 1

Research on Comparative Analysis of Regional Logistics Information Platform Operation Mode Based on Cloud Computing 1 , pp.73-80 http://dx.doi.org/10.14257/ijfgcn.2014.7.2.08 Research on Comparative Analysis of Regional Logistics Information Platform Operation Mode Based on Cloud Computing 1 Changming Li, Xiangdong Zhang

More information

Contents 5. Building and Maintaining an Effective Team 6. An Overview of Planning and Estimating

Contents 5. Building and Maintaining an Effective Team 6. An Overview of Planning and Estimating TEAMFLY vi Contents 5. Building and Maintaining an Effective Team 77 The Mechanics of Building a Team 78 Team Leadership Starts on Day One! 83 Fostering Teamwork and Synergism 88 Getting the Most from

More information

Research on the Platform Construction of Road Freight Market in China

Research on the Platform Construction of Road Freight Market in China Open Journal of Business and Management, 2015, 3, 243-249 Published Online July 2015 in SciRes. http://www.scirp.org/journal/ojbm http://dx.doi.org/10.4236/ojbm.2015.33024 Research on the Platform Construction

More information

Privacy Policy - RevTech Media Pty Ltd ABN Who we are

Privacy Policy - RevTech Media Pty Ltd ABN Who we are Privacy Policy - RevTech Media Pty Ltd ABN 75 150 963 474 1. Who we are RevTech Media Pty Ltd ( RevTech Media, we, our, us) (ABN 75 150 963 474) (AFSL 455982) (ACL 405918) (RevTech Media) is a media and

More information

Study on Promoting Significance of Big Data Analysis for E-commerce Marketing

Study on Promoting Significance of Big Data Analysis for E-commerce Marketing 2017 4th International Conference on Business, Economics and Management (BUSEM 2017) Study on Promoting Significance of Big Data Analysis for E-commerce Marketing Xiaoming Lou Jinhua Polylechnic, Jinhua

More information

The 6 th International Scientific Conference DEFENSE RESOURCES MANAGEMENT IN THE 21st CENTURY Braşov, December 02-03, 2011

The 6 th International Scientific Conference DEFENSE RESOURCES MANAGEMENT IN THE 21st CENTURY Braşov, December 02-03, 2011 DEFENSE RESOURCES MANAGEMENT IN THE 21st CENTURY Braşov, December 02-03, 2011 THE INFLUENCE OF MOTIVATION TO ACHIEVE PERFORMANCE LTC. Lâsenko Antonela - Elena Romanian Intelligence Service, Romania Abstract:

More information

Strengthening Public Affairs through Project Financing of the Franchise Contract Foreign Intervention

Strengthening Public Affairs through Project Financing of the Franchise Contract Foreign Intervention International Integration for Regional Public Management (ICPM 2014) Strengthening Public Affairs through Project Financing of the Franchise Contract Foreign Intervention Guo Xinyu1 School of Public Management,

More information

SOCIAL MEDIA - POLICIES AND PROCEDURES

SOCIAL MEDIA - POLICIES AND PROCEDURES Network of Community Options, Inc. SOCIAL MEDIA - POLICIES AND PROCEDURES Effective Date July 1, 2012 Implementation Date July 1, 2012 Social Media / Electronic Media Introduction NCO, Inc. maintains and

More information

Dynamic management and cost optimization control of construction project cost

Dynamic management and cost optimization control of construction project cost RESEARCH ARTICLE Dynamic management and cost optimization control of construction project cost Hongyan Jin 1, Jing Zhang 2, Fei Xu 3, Rongliang Ji 3, Zhilei Liu 4 1 Shanxi University, Shijiazhuang 050000,

More information

The impact analysis of new auditing standards on audit risk Hu Xiaoqing

The impact analysis of new auditing standards on audit risk Hu Xiaoqing 2nd International Conference on Education Technology and Information System (ICETIS 2014) The impact analysis of new auditing standards on audit risk Hu Xiaoqing Shandong University of Science and Technology

More information

How to Secure Your Healthcare Communications in a World of Security and Compliance Threats

How to Secure Your Healthcare Communications in a World of Security and Compliance Threats How to Secure Your Healthcare Communications in a World of Security and Compliance Threats Time to Secure Your Communications At present, most healthcare organizations allocate only three percent of their

More information

ARE YOU SICK OF HEARING OVER QUALIFIED?

ARE YOU SICK OF HEARING OVER QUALIFIED? ARE YOU SICK OF HEARING OVER QUALIFIED? Do you have critical facility design and consulting experience? Do you want to elevate your career in the critical facilities field? Make your contributions count

More information

Research on Intelligent Logistics Development Model Based on Internet of Things and Cloud Computing in Big Data Age

Research on Intelligent Logistics Development Model Based on Internet of Things and Cloud Computing in Big Data Age Research on Intelligent Logistics Development Model Based on Internet of Things and Cloud Computing in Big Data Age Tao Zhang 1, Xiaoxia Wu 2 1 Hebei Professional College of Political Science and Law;

More information

5 Technology Trends Construction Contractors Can t Afford To Ignore

5 Technology Trends Construction Contractors Can t Afford To Ignore 5 Technology Trends Construction Contractors Can t Afford To Ignore Bill Walter, MCP, MCSE, PMP Principal with Gross Mendelsohn s Technology Solutions Group What We ll Cover 1. How to use mobile technology

More information

Research of the Social Media Data Analyzing Platform Based on Cloud Mining Yi-Tang ZENG, Yu-Feng ZHANG, Sheng CAO, Li LI, Cheng-Wei ZHANG *

Research of the Social Media Data Analyzing Platform Based on Cloud Mining Yi-Tang ZENG, Yu-Feng ZHANG, Sheng CAO, Li LI, Cheng-Wei ZHANG * 2016 3 rd International Conference on Social Science (ICSS 2016) ISBN: 978-1-60595-410-3 Research of the Social Media Data Analyzing Platform Based on Cloud Mining Yi-Tang ZENG, Yu-Feng ZHANG, Sheng CAO,

More information

Key words: E-commerce Service Model, Management Performance, B2C platform, Empirical Study

Key words: E-commerce Service Model, Management Performance, B2C platform, Empirical Study doi:10.21311/001.39.12.19 An Empirical Study on B2C E-commerce Service Model and Management Performance in Small and Medium Sized Enterprises Haiyong Yu * School of Business Administration, University

More information

HOW TO BECOME A PROFITABLE AFFILIATE MARKETER. Expert-made 1 Step by Step Guide

HOW TO BECOME A PROFITABLE AFFILIATE MARKETER. Expert-made 1 Step by Step Guide HOW TO BECOME A PROFITABLE AFFILIATE MARKETER Expert-made 1 Step by Step Guide INTRODUCTION Affiliate marketing is becoming more and more popular as a great way of making money online. Many people who

More information

Research on the Social Responsibility of Corporations in China

Research on the Social Responsibility of Corporations in China Asian Social Science; Vol. 8, No. 15; 2012 ISSN 1911-2017 E-ISSN 1911-2025 Published by Canadian Center of Science and Education Research on the Social Responsibility of Corporations in China Dianwei Qi

More information

Analysis on the Logistics Cost Control of Self-Logistics System in the Electric Business Enterprise

Analysis on the Logistics Cost Control of Self-Logistics System in the Electric Business Enterprise American Journal of Industrial and Business Management, 2016, 6, 1113-1121 http://www.scirp.org/journal/ajibm ISSN Online: 2164-5175 ISSN Print: 2164-5167 Analysis on the Logistics Cost Control of Self-Logistics

More information

The Development Status Quo and Counter measures of Logistics Informationization Standards of China

The Development Status Quo and Counter measures of Logistics Informationization Standards of China Management Science and Engineering Vol. 5, No. 3, 2011, pp. 77-82 DOI:10.3968/j.mse.1913035X20110503.1z184 ISSN 1913-0341[Print] ISSN 1913-035X[Online] www.cscanada.net www.cscanada.org The Development

More information

Study on Patent Strategy of High & New Technology Enterprises Cluster

Study on Patent Strategy of High & New Technology Enterprises Cluster International Academic Workshop on Social Science (IAW-SC 2013) Study on Patent Strategy of High & New Technology Enterprises Cluster Jianlong Wu wujl1981@sohu.com Li Tian tian.li418@163.com Hongqi Wang

More information

On Low-Carbon Technology

On Low-Carbon Technology Low Carbon Economy, 2016, 7, 107-115 http://www.scirp.org/journal/lce ISSN Online: 2158-7019 ISSN Print: 2158-7000 On Low-Carbon Technology Jinfang Lv, Shusheng Qin Marx School of Northeastern University,

More information

Personalized Recommendation-based Partner Selection for SDN

Personalized Recommendation-based Partner Selection for SDN International Business Research; Vol. 5, No. 12; 2012 ISSN 1913-9004 E-ISSN 1913-9012 Published by Canadian Center of Science and Education Personalized Recommendation-based Partner Selection for SDN Ying

More information

Result 14 Definition of new Learning Outcomes

Result 14 Definition of new Learning Outcomes Result 14 Definition of new Learning Outcomes Elaborated by ANQEP and nowa Based on the defined Functional Areas and Units of Competence of Spain Portugal Austria 1 December 2016 1. Functional Areas and

More information

Research on Human Genetic Resources Sharing Mechanism Qi CAO 1,a, Wei ZHAO 2,b,* and Xiang-long WANG 3,c

Research on Human Genetic Resources Sharing Mechanism Qi CAO 1,a, Wei ZHAO 2,b,* and Xiang-long WANG 3,c 2017 4th International Conference on Economics and Management (ICEM 2017) ISBN: 978-1-60595-467-7 Research on Human Genetic Resources Sharing Mechanism Qi CAO 1,a, Wei ZHAO 2,b,* and Xiang-long WANG 3,c

More information

2018 Supervisor s Guide to Performance Evaluation

2018 Supervisor s Guide to Performance Evaluation 2018 Supervisor s Guide to Performance Evaluation h t t p s : / / p e d i. n n g o v. c o m Page 1 Table of Contents Introduction 3 The Objectives of the Performance Evaluation 3 Core Values 3 Core Competencies

More information

Principles of Personal Data Protection

Principles of Personal Data Protection Principles of Personal Data Protection Company MonkeyData s.r.o., Business ID: 02731452, Registered seat: Hladnovská 1255/23, Slezská Ostrava, 710 00 Ostrava, Czech Republic, Section and file number: C

More information

Social media and user-generated content: the key roles of publishers and libraries in the future.

Social media and user-generated content: the key roles of publishers and libraries in the future. Social media and user-generated content: the key roles of publishers and libraries in the future. Apantree Kandet* Librarian Practitioner Academic Resource Center The changes from the information society

More information

User s Guide WELCOME TO SIGI 3

User s Guide WELCOME TO SIGI 3 User s Guide WELCOME TO SIGI 3 What is SIGI 3? SIGI 3 pronounced siggy three is a special tool that can help you to plan your career. It was developed by a team of researchers and specialists at Educational

More information

THE APPLICATION OF INFORMATION TECHNOLOGY IN THE LIBRARY SYSTEM

THE APPLICATION OF INFORMATION TECHNOLOGY IN THE LIBRARY SYSTEM THE APPLICATION OF INFORMATION TECHNOLOGY IN THE LIBRARY SYSTEM 1 JING ZHAO, 1 HAIBIN ZHANG, 1 JIE YU 1 Handan College Library, Handan 056005, CHINA E-mail: 1 liyuxuanmama@163.com ABSTRACT With the development

More information

Laboratory Management Based on Internet of Things. Jianming Huang

Laboratory Management Based on Internet of Things. Jianming Huang Advanced Materials Research Online: 2013-06-27 ISSN: 1662-8985, Vol. 711, pp 665-669 doi:10.4028/www.scientific.net/amr.711.665 2013 Trans Tech Publications, Switzerland Laboratory Management Based on

More information

Analysis and Evaluation of Chinese Cross-Border Electricity Supplier Logistics

Analysis and Evaluation of Chinese Cross-Border Electricity Supplier Logistics Open Journal of Business and Management, 2016, 4, 500-504 Published Online July 2016 in SciRes. http://www.scirp.org/journal/ojbm http://dx.doi.org/10.4236/ojbm.2016.43053 Analysis and Evaluation of Chinese

More information

Research on Mixed Ownership Economy Development in Hubei Province

Research on Mixed Ownership Economy Development in Hubei Province International Conference on Social Science and Technology Education (ICSSTE 2015) Research on Mixed Ownership Economy Development in Hubei Province Li Xiuping Wuhan Donghu University, Wuhan, Hubei, China,

More information

JOB DESCRIPTION. Nadi Head Of ICT As follows

JOB DESCRIPTION. Nadi Head Of ICT As follows JOB DESCRIPTION Position: Location of position: Reporting to: Specific accountabilities: ICT Support Officer Nadi Head Of ICT As follows Objective The ICT Support Officer position will ensure that the

More information

The Research of Environmental Costs Based On Activity Based Cost

The Research of Environmental Costs Based On Activity Based Cost Available online at www.sciencedirect.com Procedia Environmental Sciences 10 (2011 ) 147 151 2011 3rd International Conference on Environmental www.elsevier.com/locate/procedia Science and Information

More information

The research of intelligent substation project management mode based on RFID

The research of intelligent substation project management mode based on RFID 2nd International Conference on Automation, Mechanical Control and Computational Engineering (AMCCE 207) The research of intelligent substation project mode based on RFID Chenglei Sun, 2, a, Ke Zhang,

More information

The Problems and Countermeasures of the E-commerce Enterprise Internal Audit Informationization Hu Xiaoqing, Zhang Chengqian

The Problems and Countermeasures of the E-commerce Enterprise Internal Audit Informationization Hu Xiaoqing, Zhang Chengqian International Conference on Applied Science and Engineering Innovation (ASEI 2015) The Problems and Countermeasures of the E-commerce Enterprise Internal Audit Informationization Hu Xiaoqing, Zhang Chengqian

More information

Study on the Construction of Enterprise Quality Culture for Brand Strategy

Study on the Construction of Enterprise Quality Culture for Brand Strategy ibusiness, 2012, 4, 260-264 http://dx.doi.org/10.4236/ib.2012.43033 Published Online September 2012 (http://www.scirp.org/journal/ib) Study on the Construction of Enterprise Quality Culture for Brand Strategy

More information

Design of Crane Safety Monitoring System Based on Big Data Analysis

Design of Crane Safety Monitoring System Based on Big Data Analysis 2nd International Conference on Advances in Mechanical Engineering and Industrial Informatics (AMEII 2016) Design of Crane Safety Monitoring System Based on Big Data Analysis Wang Guo liang1.a,cheng Xian-yi1,b,Li

More information

On the Principles and Target Mode of Overall Planning for the China Public Goods Supply

On the Principles and Target Mode of Overall Planning for the China Public Goods Supply On the Principles and Target Mode of Overall Planning for the China Public Goods Supply Meiying Yang College of Economic and Management, Changchun University of Science and Technology Changchun 130022,

More information

Function Design of Township Enterprise Online Approval System

Function Design of Township Enterprise Online Approval System Function Design of Township Enterprise Online Approval System Peng Lu 1, Gang Lu 2, and Chao Ding 2 1 Tourism Department, Hebei Normal University, Shijiazhuang, Hebei, China 2 School of Management and

More information

Financial Advisors: How to Optimize your LinkedIn Profile

Financial Advisors: How to Optimize your LinkedIn Profile + Financial Advisors: How to Optimize your LinkedIn Profile A Publication of TABLE OF CONTENTS Introduction - The Case for LinkedIn 1. 5 Quick Ways to Optimize Advisor s LinkedIn Profiles pg. 1 2. A Daily

More information

Tourism Informatization Research under the Mode of Internet of Things. Gangzhi Guo

Tourism Informatization Research under the Mode of Internet of Things. Gangzhi Guo 6th International Conference on Machinery, Materials, Environment, Biotechnology and Computer (MMEBC 2016) Tourism Informatization Research under the Mode of Internet of Things Gangzhi Guo School of Culture

More information

E-Commerce Law of the People s Republic of China (Draft for Comments)

E-Commerce Law of the People s Republic of China (Draft for Comments) E-Commerce Law of the People s Republic of China (Draft for Comments) 1 Table of Contents Chapter I General Provisions Chapter II E-commerce Business Entities Section 1General Provisions Section 2Third-party

More information

Based on the coal mine's essential safety management system of safety accident cause analysis

Based on the coal mine's essential safety management system of safety accident cause analysis Research article Based on the coal mine's essential safety management system of safety accident cause analysis Ping Wang Chenxin Guo Affiliation: Ping Wang, professor and master tutor of Xi'an University

More information

Application Research on Monitoring Cloud Platform of Bridge Construction Based on BIM ZHI Peng1, a, SHI Tianyun2, b, WANG Wanqi3, c, WANG Huilin4, d

Application Research on Monitoring Cloud Platform of Bridge Construction Based on BIM ZHI Peng1, a, SHI Tianyun2, b, WANG Wanqi3, c, WANG Huilin4, d 6th International Conference on Energy, Environment and Sustainable Development (ICEESD 2017) Application Research on Monitoring Cloud Platform of Bridge Construction Based on BIM ZHI Peng1, a, SHI Tianyun2,

More information