ComputerScienceExpert

(11)

$18/per page/

About ComputerScienceExpert

Levels Tought:
Elementary,Middle School,High School,College,University,PHD

Expertise:
Applied Sciences,Calculus See all
Applied Sciences,Calculus,Chemistry,Computer Science,Environmental science,Information Systems,Science Hide all
Teaching Since: Apr 2017
Last Sign in: 103 Weeks Ago, 3 Days Ago
Questions Answered: 4870
Tutorials Posted: 4863

Education

  • MBA IT, Mater in Science and Technology
    Devry
    Jul-1996 - Jul-2000

Experience

  • Professor
    Devry University
    Mar-2010 - Oct-2016

Category > Programming Posted 25 May 2017 My Price 11.00

Boston, MA 02210

I need 1 essay

$50

5-7 page paper

double space

APA format

8 references

introduction to the conclusion must be 3-5 pages

Essay from one of the following:

Chapter 1 - Case 1 or Case 2 or Case 3, OR Chapter 2 - Case 1 or Case 2 or Case 3 OR Chapters 3 - Cases 1 or 2 or 3 OR Chapter 4 - Cases 1or 2 or 3

Chapter 5 - Cases 1 or 2 or 3 OR Chapter 6 - Cases 1 or 2 or 3 OR Chapter 7 - Cases 1 or 2 or 3 OR Chapter 8 - Cases 1 or 2 or 3, OR Chapter 9 - Cases 1 or 2 or 3, OR Chapter 10 - Cases 1 or 2 or 3.  

 

attached is the textbook                                                                                                                                       

 

 

ETHICS IN INFORMATION
TECHNOLOGY
Fifth Edition Copyright 2014 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. Due to electronic rights, some third party content may be suppressed from the eBook and/or eChapter(s).
Editorial review has deemed that any suppressed content does not materially affect the overall learning experience. Cengage Learning reserves the right to remove additional content at any time if subsequent rights restrictions require it. Copyright 2014 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. Due to electronic rights, some third party content may be suppressed from the eBook and/or eChapter(s).
Editorial review has deemed that any suppressed content does not materially affect the overall learning experience. Cengage Learning reserves the right to remove additional content at any time if subsequent rights restrictions require it. ETHICS IN INFORMATION
TECHNOLOGY
Fifth Edition George W. Reynolds
Strayer University Australia • Brazil • Mexico • Singapore • United Kingdom • United States Copyright 2014 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. Due to electronic rights, some third party content may be suppressed from the eBook and/or eChapter(s).
Editorial review has deemed that any suppressed content does not materially affect the overall learning experience. Cengage Learning reserves the right to remove additional content at any time if subsequent rights restrictions require it. This is an electronic version of the print textbook. Due to electronic rights restrictions,
some third party content may be suppressed. Editorial review has deemed that any suppressed
content does not materially affect the overall learning experience. The publisher reserves the right
to remove content from this title at any time if subsequent rights restrictions require it. For
valuable information on pricing, previous editions, changes to current editions, and alternate
formats, please visit www.cengage.com/highered to search by ISBN#, author, title, or keyword for
materials in your areas of interest. Copyright 2014 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. Due to electronic rights, some third party content may be suppressed from the eBook and/or eChapter(s).
Editorial review has deemed that any suppressed content does not materially affect the overall learning experience. Cengage Learning reserves the right to remove additional content at any time if subsequent rights restrictions require it. Ethics in Information Technology,
Fifth Edition
George W. Reynolds
Product Director: Joe Sabatino
Product Manager: Clara Goosman
Senior Content Developer: Kate Mason
Product Assistant: Brad Sullender
Senior Rights Acquisitions Specialist:
Christine Myaskovsky
Senior Brand Manager: Robin LeFevre
Art and Cover Direction, Production
Management, and Composition: PreMediaGlobal
Associate Market Development Manager:
Roy Rosa
Marketing Coordinator: Christopher Walz
Senior Media Developer: Mike Jackson
Manufacturing Planner: Ron Montgomery
Cover Images: © Paul Price/Ikon Images/
Getty Images. © 2015 Cengage Learning
WCN: 02-200-203 ALL RIGHTS RESERVED. No part of this work covered by the
copyright herein may be reproduced, transmitted, stored or used
in any form or by any means—graphic, electronic, or mechanical,
including but not limited to photocopying, recording, scanning,
digitizing, taping, Web distribution, information networks, or
information storage and retrieval systems, except as permitted under
Section 107 or 108 of the 1976 United States Copyright Act—without
the prior written permission of the publisher.
For product information and technology assistance, contact us at
Cengage Learning Customer & Sales Support, 1-800-354-9706.
For permission to use material from this text or product, submit all
requests online at www.cengage.com/permissions.
Further permissions questions can be e-mailed to
permissionrequest@cengage.com. Some of the product names and company names used in this
book have been used for identification purposes only and may
be trademarks or registered trademarks of their respective
manufacturers and sellers.
Library of Congress Control Number: 2013945101
ISBN-13: 978-1-285-19715-9
ISBN-10: 1-285-19715-1
Instructor Edition:
ISBN-13: 978-1-285-19718-0
ISBN-10: 1-285-19718-6
Cengage Learning
20 Channel Center Street
Boston, MA 02210
USA
Microsoft and the Office logo are either registered trademarks or trademarks of
Microsoft Corporation in the United States and/or other countries. Cengage
Learning is an independent entity from the Microsoft Corporation, and not
affiliated with Microsoft in any manner.
iPhone, iPad, and iPod are registered trademarks of Apple Inc.
Cengage Learning reserves the right to revise this publication and make changes
from time to time in its content without notice.
Cengage Learning is a leading provider of customized learning solutions with
office locations around the globe, including Singapore, the United Kingdom,
Australia, Mexico, Brazil, and Japan. Locate your local office at:
www.cengage.com/global
Cengage Learning products are represented in Canada by Nelson Education, Ltd.
To learn more about Cengage Learning, visit www.cengage.com
Purchase any of our products at your local college store or at our preferred
online store: www.cengagebrain.com Printed in the United States of America
1 2 3 4 5 6 7 17 16 15 14 13 Copyright 2014 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. Due to electronic rights, some third party content may be suppressed from the eBook and/or eChapter(s).
Editorial review has deemed that any suppressed content does not materially affect the overall learning experience. Cengage Learning reserves the right to remove additional content at any time if subsequent rights restrictions require it. BRIEF CONTENTS
Preface
Chapter 1 An Overview of Ethics xiii
1 Chapter 2 Ethics for IT Workers and IT Users 41 Chapter 3 Computer and Internet Crime 81 Chapter 4 Privacy 131 Chapter 5 Freedom of Expression 179 Chapter 6 Intellectual Property 217 Chapter 7 Software Development 261 Chapter 8 The Impact of Information Technology on Productivity
and Quality of Life 297 Social Networking 335 Chapter 10 Ethics of IT Organizations 369 Appendix A A Brief Introduction to Morality 411 Appendix B Answers to Self-Assessment Questions 427 Chapter 9 Glossary 429 Index 441 Copyright 2014 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. Due to electronic rights, some third party content may be suppressed from the eBook and/or eChapter(s).
Editorial review has deemed that any suppressed content does not materially affect the overall learning experience. Cengage Learning reserves the right to remove additional content at any time if subsequent rights restrictions require it. Copyright 2014 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. Due to electronic rights, some third party content may be suppressed from the eBook and/or eChapter(s).
Editorial review has deemed that any suppressed content does not materially affect the overall learning experience. Cengage Learning reserves the right to remove additional content at any time if subsequent rights restrictions require it. TABLE OF CONTENTS
Preface
Chapter 1 An Overview of Ethics
Vignette
Cisco Chairman and CEO Advocates Ethical Behavior
What Is Ethics?
Definition of Ethics
The Importance of Integrity
The Difference Between Morals, Ethics, and Laws
Ethics in the Business World
Corporate Social Responsibility
Why Fostering Corporate Social Responsibility
and Good Business Ethics Is Important
Improving Corporate Ethics
Creating an Ethical Work Environment
Including Ethical Considerations in Decision Making
Develop a Problem Statement
Identify Alternatives
Evaluate and Choose an Alternative
Implement the Decision
Evaluate the Results
Ethics in Information Technology
Summary
Key Terms
Self-Assessment Questions
Discussion Questions
What Would You Do?
Cases
End Notes Chapter 2 Ethics for IT Workers and IT Users
Vignette
New York City Payroll Project Riddled with Fraud
IT Professionals
Are IT Workers Professionals?
Professional Relationships That Must Be Managed
Professional Codes of Ethics
Professional Organizations
Certification xiii
1
1
1
3
3
4
5
5
8
8
12
18
20
21
21
22
24
24
24
26
27
27
28
29
31
35 41
41
41
43
44
44
54
55
57 Copyright 2014 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. Due to electronic rights, some third party content may be suppressed from the eBook and/or eChapter(s).
Editorial review has deemed that any suppressed content does not materially affect the overall learning experience. Cengage Learning reserves the right to remove additional content at any time if subsequent rights restrictions require it. Government Licensing
IT Professional Malpractice
IT Users
Common Ethical Issues for IT Users
Supporting the Ethical Practices of IT Users
Compliance
Summary
Key Terms
Self-Assessment Questions
Discussion Questions
What Would You Do?
Cases
End Notes Chapter 3 Computer and Internet Crime
Vignette
The Reveton Ransomware Attacks
IT Security Incidents: A Major Concern
Why Computer Incidents Are So Prevalent
Types of Exploits
Types of Perpetrators
Federal Laws for Prosecuting Computer Attacks
Implementing Trustworthy Computing
Risk Assessment
Establishing a Security Policy
Educating Employees and Contract Workers
Prevention
Detection
Response
Summary
Key Terms
Self-Assessment Questions
Discussion Questions
What Would You Do?
Cases
End Notes Chapter 4 Privacy
Vignette
What Is the National Security Agency (NSA) Up To?
Privacy Protection and the Law
Information Privacy
Privacy Laws, Applications, and Court Rulings
Key Privacy and Anonymity Issues
Data Breaches
Electronic Discovery
Consumer Profiling viii 58
60
61
61
63
64
67
68
68
69
70
72
76 81
81
81
84
84
88
95
99
100
102
104
105
105
110
110
115
116
116
118
118
120
125 131
131
131
133
135
135
151
151
153
154 Table of Contents Copyright 2014 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. Due to electronic rights, some third party content may be suppressed from the eBook and/or eChapter(s).
Editorial review has deemed that any suppressed content does not materially affect the overall learning experience. Cengage Learning reserves the right to remove additional content at any time if subsequent rights restrictions require it. Workplace Monitoring
Advanced Surveillance Technology
Summary
Key Terms
Self-Assessment Questions
Discussion Questions
What Would You Do?
Cases
End Notes Chapter 5 Freedom of Expression
Vignette
Reputation Changer, Online Reputation Management Company
First Amendment Rights
Obscene Speech
Defamation
Freedom of Expression: Key Issues
Controlling Access to Information on the Internet
Strategic Lawsuit Against Public Participation (SLAPP)
Anonymity on the Internet
Hate Speech
Pornography
Summary
Key Terms
Self-Assessment Questions
Discussion Questions
What Would You Do?
Cases
End Notes Chapter 6 Intellectual Property
Vignette
Sinovel Steals Millions in Trade Secrets from American Superconductor
What Is Intellectual Property?
Copyrights
Copyright Term
Eligible Works
Fair Use Doctrine
Software Copyright Protection
The Prioritizing Resources and Organization for Intellectual Property
(PRO-IP) Act of 2008
General Agreement on Tariffs and Trade (GATT)
The WTO and the WTO TRIPS Agreement (1994)
The World Intellectual Property Organization (WIPO) Copyright
Treaty (1996)
The Digital Millennium Copyright Act (1998) 155
157
160
162
163
164
165
167
171 179
179
179
181
183
183
184
184
189
190
193
194
199
200
201
202
203
205
209 217
217
217
220
221
221
222
222
223
224
224
224
225
225 Table of Contents
Copyright 2014 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. Due to electronic rights, some third party content may be suppressed from the eBook and/or eChapter(s).
Editorial review has deemed that any suppressed content does not materially affect the overall learning experience. Cengage Learning reserves the right to remove additional content at any time if subsequent rights restrictions require it. ix Patents
Leahy-Smith America Invents Act (2011)
Software Patents
Cross-Licensing Agreements
Trade Secrets
Trade Secret Laws
Employees and Trade Secrets
Key Intellectual Property Issues
Plagiarism
Reverse Engineering
Open Source Code
Competitive Intelligence
Trademark Infringement
Cybersquatting
Summary
Key Terms
Self-Assessment Questions
Discussion Questions
What Would You Do?
Cases
End Notes Chapter 7 Software Development
Vignette
Stock Markets Susceptible to Software Glitches
Strategies for Engineering Quality Software
The Importance of Software Quality
Software Product Liability
Software Development Process
Capability Maturity Model Integration
Key Issues in Software Development
Development of Safety-Critical Systems
Quality Management Standards
Summary
Key Terms
Self-Assessment Questions
Discussion Questions
What Would You Do?
Cases
End Notes x 228
230
230
231
231
232
233
234
234
236
238
239
242
243
244
246
247
248
249
250
255 261
261
261
264
267
268
270
273
275
275
279
282
283
284
285
286
288
292 Chapter 8 The Impact of Information Technology on Productivity
and Quality of Life 297 Vignette
Problems with the E-Rate Program
The Impact of IT on the Standard of Living and Worker Productivity
IT Investment and Productivity
The Digital Divide 297
297
301
301
306 Table of Contents
Copyright 2014 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. Due to electronic rights, some third party content may be suppressed from the eBook and/or eChapter(s).
Editorial review has deemed that any suppressed content does not materially affect the overall learning experience. Cengage Learning reserves the right to remove additional content at any time if subsequent rights restrictions require it. The Impact of IT on HealthCare Costs
Electronic Health Records
Use of Mobile and Wireless Technology in the Healthcare Industry
Telehealth
Medical Information Web Sites for Laypeople
Summary
Key Terms
Self-Assessment Questions
Discussion Questions
What Would You Do?
Cases
End Notes Chapter 9 Social Networking
Vignette
Wanelo: Social Shopping Web Site Headed for Success
What Is a Social Networking Web Site?
Business Applications of Online Social Networking
Social Network Advertising
The Use of Social Networks in the Hiring Process
The Use of Social Media to Improve Customer Service
Social Shopping Web Sites
Social Networking Ethical Issues
Cyberbullying
Cyberstalking
Encounters with Sexual Predators
Uploading of Inappropriate Material
Online Virtual Worlds
Crime in Virtual Worlds
Educational and Business Uses of Virtual Worlds
Summary
Key Terms
Self-Assessment Questions
Discussion Questions
What Would You Do?
Cases
End Notes Chapter 10 Ethics of IT Organizations
Vignette
HP Finds Autonomy a Tough Pill to Swallow
Key Ethical Issues for Organizations
The Need for Nontraditional Workers
Contingent Workers
Advantages of Using Contingent Workers
Disadvantages of Using Contingent Workers
Deciding When to Use Contingent Workers
H-1B Workers 310
310
314
315
317
319
320
320
322
322
324
328 335
335
335
337
338
339
342
343
344
345
346
347
348
350
351
352
353
354
355
355
356
357
358
362 369
369
369
371
372
374
375
375
376
377 Table of Contents
Copyright 2014 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. Due to electronic rights, some third party content may be suppressed from the eBook and/or eChapter(s).
Editorial review has deemed that any suppressed content does not materially affect the overall learning experience. Cengage Learning reserves the right to remove additional content at any time if subsequent rights restrictions require it. xi H-1B Application Process
Using H-1B Workers Instead of U.S. Workers
Potential Exploitation of H-1B Workers
Outsourcing
Offshore Outsourcing
Pros and Cons of Offshore Outsourcing
Strategies for Successful Offshore Outsourcing
Whistle-Blowing
Protection for Whistle-Blowers
Whistle-Blowing Protection for Private-Sector Workers
Dealing with a Whistle-Blowing Situation
Green Computing
ICT Industry Code of Conduct
Summary
Key Terms
Self-Assessment Questions
Discussion Questions
What Would You Do?
Cases
End Notes Appendix A A Brief Introduction to Morality
Introduction
The Knotty Question of Goodness
Relativism: Why “Common Sense” Won’t Work
Egoism vs. Altruism
Deontology, or The Ethics of Logical Consistency and Duty
Happy Consequences, or Utilitarianism
Promises and Contracts
A Return to The Greeks: The Good Life of Virtue
Feminism and the Ethics of Care
Pluralism
Summary xii 379
380
380
381
381
383
384
385
386
387
387
390
392
394
395
395
397
398
401
405 411
411
412
413
414
416
418
420
421
423
424
425 Appendix B Answers to Self-Assessment Questions 427 Glossary 429 Index 441 Table of Contents Copyright 2014 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. Due to electronic rights, some third party content may be suppressed from the eBook and/or eChapter(s).
Editorial review has deemed that any suppressed content does not materially affect the overall learning experience. Cengage Learning reserves the right to remove additional content at any time if subsequent rights restrictions require it. PREFACE
We are excited to publish the fifth edition of Ethics in Information Technology. This new
edition builds on the success of the previous editions and meets the need for a resource
that helps readers understand many of the legal, ethical, and societal issues associated
with information technology. We have responded to the feedback from our previous
edition adopters, students, and other reviewers to create an improved text. We think you
will be pleased with the results.
Ethics in Information Technology, Fifth Edition, fills a void of practical business
information for business managers and IT professionals. The typical introductory information systems book devotes one chapter to ethics and IT, which cannot possibly cover
the full scope of ethical issues related to IT. Such limited coverage does not meet the
needs of business managers and IT professionals—the people primarily responsible
for addressing ethical issues in the workplace. Missing is an examination of the different
ethical situations that arise in IT as well as practical advice for addressing these issues.
Ethics in Information Technology, Fifth Edition, has enough substance for an
instructor to use it in a full-semester course in computer ethics. Instructors can also
use the book as a reading supplement for such courses as Introduction to Management
Information Systems, Principles of Information Technology, Managerial Perspective of
Information Technology, Computer Security, E-Commerce, and so on. WHAT’S NEW
Ethics in Information Technology, Fifth Edition, has been updated and revised to incorporate the many new developments and ethical issues that have arisen since the last edition. There is new or expanded coverage of the following topics: the increased security
risks of bring your own device (BYOD) business policies, the role of the National Security
Agency in breaking of codes used to encrypt sensitive communications and for the interception of signals on behalf of the federal government, the ethics of using online reputation management companies, the use of strategic lawsuits against public participation
(SLAPP) and anti-SLAPP lawsuits, the theft by China of trade secrets from the United
States and Western Europe, and telehealth and telemedicine and their role in the delivery
of health care.
All opening vignettes and two-thirds of the end-of-chapter cases are new or extensively updated. Dozens of new real-world examples are presented in each chapter. At least
50 percent of the “Self-Assessment Questions,” “Discussion Questions,” and What Would
You Do?” exercises are new. Based on reviewer feedback, we have also increased the
number of “Discussion Questions” and “What Would You Do?” exercises. Instructors of
online courses frequently use these as the basis for discussion forums that allow online Copyright 2014 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. Due to electronic rights, some third party content may be suppressed from the eBook and/or eChapter(s).
Editorial review has deemed that any suppressed content does not materially affect the overall learning experience. Cengage Learning reserves the right to remove additional content at any time if subsequent rights restrictions require it. students to share a variety of perspectives and experiences and to create a learning community. Such discussions provide students the opportunity to more deeply understand the
material while challenging their critical thinking skills. ORGANIZATION
Each of the 10 chapters in this book addresses a different aspect of ethics in information
technology:
• • • xiv Chapter 1, “An Overview of Ethics,” provides an introduction to ethics,ethics
in business, and the relevance of discussing ethics in IT. The chapter defines
the distinction between morals, ethics, and laws. It identifies the most common forms of employee misconduct. The concept of corporate social responsibility is defined and discussed. It presents five reasons why practicing good
business ethics is important in business and provides a model for improving
corporate ethics. It examines the role of the chief ethics officer and board of
directors in establishing a strong organizational ethics program. The chapter
also outlines the need for an organizational code of ethics and describes key
steps in establishing a sound ethics program. It suggests a model for ethical
decision making and also discusses four commonly used philosophical
approaches to ethical decision making. The chapter ends with a discussion
of the role of ethics in IT.
Chapter 2, “Ethics for IT Workers and IT Users,” begins with a vignette that
illustrates major fraud on a real IT project involving the New York City
Payroll. This chapter explains the importance of ethics in the business
relationships of IT professionals, including those between IT workers and
employers, clients, suppliers, other professionals, IT users, and society. The
chapter also emphasizes the significance of IT professional organizations and
their codes of ethics, and it discusses the roles that certification and licensing
can play in legitimizing professional standards. The chapter also points out
the difficulties in licensing IT workers. The chapter touches on some ethical
issues faced by IT users—including software piracy, inappropriate use of
computing resources, and inappropriate sharing of information—and outlines
actions that can be taken to support the ethical practices of IT users. The
chapter introduces the topic of compliance and the role the audit committee
and members of the internal audit team have in ensuring that both the
IT organization and IT users are in compliance with organizational guidelines
and policies, as well as various legal and regulatory practices.
Chapter 3, “Computer and Internet Crime,” describes the types of ethical
decisions that IT professionals must make, as well as the business needs they
must balance when dealing with security issues. The chapter identifies the
most common computer-related security incidents and provides numerous
reasons why such incidents are increasing. Including the use of cloud computing, virtualization software, and bring your own device corporate business
policies. It describes some of the more common hacker attacks, including
viruses, worms, Trojan horses, distributed denial-of-service, rootkits, spam, Preface Copyright 2014 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. Due to electronic rights, some third party content may be suppressed from the eBook and/or eChapter(s).
Editorial review has deemed that any suppressed content does not materially affect the overall learning experience. Cengage Learning reserves the right to remove additional content at any time if subsequent rights restrictions require it. • • phishing, spear-phishing, smishing, vishing, and ransom ware. In addition to
providing a useful classification of computer crimes and their perpetrators,
the chapter summarizes the major federal laws that address computer crime.
The chapter outlines both how to implement trustworthy computing to manage security vulnerabilities and how to respond to specific security incide...

Answers

(11)
Status NEW Posted 25 May 2017 02:05 AM My Price 11.00

-----------

Attachments

file 1495680220-Solutions file 2.docx preview (51 words )
H-----------ell-----------o S-----------ir/-----------Mad-----------am ----------- Th-----------ank----------- yo-----------u f-----------or -----------you-----------r i-----------nte-----------res-----------t a-----------nd -----------buy-----------ing----------- my----------- po-----------ste-----------d s-----------olu-----------tio-----------n. -----------Ple-----------ase----------- pi-----------ng -----------me -----------on -----------cha-----------t I----------- am----------- on-----------lin-----------e o-----------r i-----------nbo-----------x m-----------e a----------- me-----------ssa-----------ge -----------I w-----------ill----------- be----------- qu-----------ick-----------ly -----------onl-----------ine----------- an-----------d g-----------ive----------- yo-----------u e-----------xac-----------t f-----------ile----------- an-----------d t-----------he -----------sam-----------e f-----------ile----------- is----------- al-----------so -----------sen-----------t t-----------o y-----------our----------- em-----------ail----------- th-----------at -----------is -----------reg-----------ist-----------ere-----------d o-----------n -----------THI-----------S W-----------EBS-----------ITE-----------. ----------- Th-----------ank----------- yo-----------u -----------
Not Rated(0)