ࡱ>  ` lbjbj ?$>t*"8Ҷ:lhμ TTLkkkkkkk$nh qhkwwwkTTk)))wTN8Tf)wk)).OAHSGT¼ _,a C@m\ l0:lC|rr'trrSGkGbrrHdB )Ndddkkddd:lwwwwZVlDJVl Information Disasters and Disaster Information: Where Information Science Meets Emergency Management Tisha Slagle Pipes University of North Texas School of Library and Information Sciences P.O. Box 311068 Denton, Texas 76203-1068  HYPERLINK "mailto:tpipes@lis.admin.unt.edu" tpipes@lis.admin.unt.edu Abstract Information moves societyand with the flow of electronic information, the interfaces for information sharing are continuously becoming more diverse. Information Science offers systems and technologies to connect people worldwide while Emergency Management proffers methods to secure information that has become increasingly more vulnerable to destruction. This exacerbated vulnerability of information to disasters, combined with societys dependence on information, warrants the integration of the disciplines of Information Science and Emergency Management. Together these disciplines can improve existing practices to prevent and mitigate information disasters. They can also ensure the usefulness of the information that flows among victims, responders, and members of emergency management organizations before, during, and after disasters. Introduction Information flows across space and time in unpredictable ways, creating new structures and forms as the situation requires  ADDIN EN.CITE McDaniel199774774717R. McDanielStrategic leadership: a view from quantum and chaos theoriesHealth Care Management ReviewHealth Care Management Review21-372211997McDaniel199774774717R. McDanielStrategic leadership: a view from quantum and chaos theoriesHealth Care Management ReviewHealth Care Management Review21-372211997(McDaniel, 1997). Unprocessed information is intangible and non-consumable, yet a plentiful resource that can be refined and used as a public or private good. Information is inherently more abundant than most resources because it is found in every person, place, and thingit is the entirety of known data, facts and ideas. Information, in my opinion, is any meme, message, or meaning that influences, directly or indirectly, how persons understand their situations. It is the principle element of omniscience, and therefore the resource from which all knowledge is extracted. Knowledge includes units of systematic subjects, noted for their oneness, objectivity, respected social implications, usefulness, and resistance to obsolescence. Knowledge is mined and refined into the integrated disciplines the world calls wisdomvalued public goods like anthropology, information technology (IT), medical research, and universal religion  ADDIN EN.CITE Cleveland1982252517Harlan ClevelandInformation as a resourceThe FuturistThe Futurist34-3916December1982(Cleveland, 1982). As unprocessed public goods, information flows between and among people and groups in the form of verbal, non-verbal, or written interactionswhether memes, messages, or meaningsthat serve as precursors to problem-solving and decision-making. Interactions instigated directly or indirectly by a disaster could be deemed disaster information. Table 1 Categories of Hazards to InformationTechnologicalNatural Civilchemical, electrical, nuclearearthquake, flood, hurricanecold war, cyberterrorism, information warfare, terrorism, warAs processed public goods, informationwhether a meme, message, or meaninginfluences the lives of those who experience it. When life-sustaining or life-fulfilling information is absent, inaccessible, or useless because it is inaccurate or interrupted as the result of a hazardnatural, civil, or technological (Table 1), the persons affected may be said to be experiencing an information disaster. An information disaster hinders the access to or effective use of disaster information. Information is a vital public good whether processed or unprocessed. How people encounter information, a phenomenon called information-seeking behavior or information behavior by information scientists, is the subject of extensive research  ADDIN EN.CITE Case20025635636Donald O. CaseLooking for informaton: A survey of research on information seeking, needs, and behavior2002LondonAcademic Press(Case, 2002). The study of disaster information behaviorthe actions or attitudes that affect encountering, needing, finding, choosing, or using disaster informationappears to be scant or absent in the literature. This deficiency in the study of disaster information behavior may exist because studying information behavior involves field studyan option not always available to researchers in times of disaster. In addition, many researchers cannot afford the time and expense demanded by qualitative research, the preferred approach to effective information behavior studies. A further challenge for researchers is the inherent elusiveness of information itself. The form it assumes or the direction it will flow is not always apparent  ADDIN EN.CITE Burlando199474874817T. BurlandoChaos and risk managementRisk ManagementRisk Management54-6141994Burlando199474874817T. BurlandoChaos and risk managementRisk ManagementRisk Management54-6141994(Burlando, 1994). What is apparent, however, is that information, as the essence of all knowledge, and subsequently the essence all wisdomis the basis for all disciplines of study, including information science and emergency management. Its pervasiveness alone demands interdisciplinary observation. Information Disasters and Disaster Information The Study of Information Disasters Table 2 Common representations of informationartifact code calculation datum diagram email film fingerprintfootprint hyperlink maps model photo/image recording replica secretsign signal summary synonym text thoughts title/name voiceUnprocessed information is impervious. It does not deplete with use or corrode with time. However, people can forget it or disregard it, and representations (Table 2) of it can be easily lost or destroyed. These intangible or tangible surrogates that hold and/or display information are quite vulnerable to disaster. Hazardsin the form of terrorism, vandalism, heating/air conditioning failure, user error, computer viruses, hackers, power failures, cyberterrorism, information warfare, cultural power struggles, or even careless or impulsive law-making/enforcementall threaten the security and effectiveness of information. Because all organizations house information, it is imperative that all organizations implement disaster recovery plans that include recovery of information vital to the existence of the organization. Studies that focus on the disruption and destruction of information have become more prevalent, especially in the management fields where chronicled information is vital to management operations. Useful human and/or artificially transmitted messages were recorded as early as 3000 B.C.E. when the Sumerians created and stored common cuneiform symbols by inscribing them into soft clay with a stylus. The Sumerians, as have societies since, used common symbols with technology to transfer information  ADDIN EN.CITE Drucker199567967910Johanna DruckerThe alphabetic labyrinth: The letters in history and imagination1995LondonThames and Hudson Ltd(Drucker, 1995). Information Science (IS) studies have shown that for information to be managed effectively, people must employ a premise from sociologyfor example, culturally accepted standards and symbolswith technologyfor example, stylus and clay or keyboard and computer. Otherwise, information cannot be physically or electronically organized, stored, processed, recorded, disseminated, preserved, or retrieved. Because of the urgency to preserve and retrieve informational records, organizations are incorporating information preservation into their business continuity plans  ADDIN EN.CITE Shaw200567675Gregory L. ShawDavid A. McEntireBusiness crisis and continuity managementDisciplines and Disasters2005Emmitsburg, MDEmergency Management Institutehttp://training.fema.gov/emiweb/downloads/ShawTextbook011105.pdfShaw200567675Gregory L. ShawDavid A. McEntireBusiness crisis and continuity managementDisciplines and Disasters2005Emmitsburg, MDEmergency Management Institutehttp://training.fema.gov/emiweb/downloads/ShawTextbook011105.pdf(Shaw, 2005). A sub-discipline of IS, librarianship, has long implemented these disaster recovery plans,  ADDIN EN.CITE Ruyle1997686817Ruyle, C. J.Schobernd, E. M.Anonymous,Disaster recovery without the disasterTechnical Services QuarterlyTechnical Services Quarterly13144Library staffTrainingDisaster planningUniversity librariesIllinois State UniversityMilner Library1997DiMattia2001696917DiMattia, S. S.Anonymous,Planning for continuityLibrary JournalLibrary Journal3212619Library managementDisaster recoveryTerrorismCompany librariesSpecial librariesWashingtonNew York2001Muir2002707017Muir, A.Shenton, S.Anonymous,If the worst happens: the use and effectiveness of disaster plans in libraries and archivesLibrary ManagementLibrary Management115233Library managementDisaster recoveryPlanning2002Tennant2001717117Tennant, R.Anonymous,Coping with disastersLibrary JournalLibrary Journal12619Library materialsElectronic mediaPreservationDisaster recoveryDisaster preventionDigital libraries2001Ruyle1997686817Ruyle, C. J.Schobernd, E. M.Anonymous,Disaster recovery without the disasterTechnical Services QuarterlyTechnical Services Quarterly13144Library staffTrainingDisaster planningUniversity librariesIllinois State UniversityMilner Library1997DiMattia2001696917DiMattia, S. S.Anonymous,Planning for continuityLibrary JournalLibrary Journal3212619Library managementDisaster recoveryTerrorismCompany librariesSpecial librariesWashingtonNew York2001Muir2002707017Muir, A.Shenton, S.Anonymous,If the worst happens: the use and effectiveness of disaster plans in libraries and archivesLibrary ManagementLibrary Management115233Library managementDisaster recoveryPlanning2002Tennant2001717117Tennant, R.Anonymous,Coping with disastersLibrary JournalLibrary Journal12619Library materialsElectronic mediaPreservationDisaster recoveryDisaster preventionDigital libraries2001(DiMattia, 2001; Muir and Shenton, 2002; Ruyle and Schobernd, 1997; Tennant, 2001) to protect and preserve the physical and electronic representations of information in library holdings. The Study of Disaster Information Flow Determining how information flows among organizations before, during, and after disasters can lead to new models of sound practice for Emergency Management (EM) practice to adopt. The continued omission of the study of information flow may allow the implementation of unsound practices and hastily enacted policies and decisions. IS methods from information flow research, including systems theory and small group interaction, may hold particular application for further study of information flow in EM. The study of disaster information flow has been virtually ignored by IS researchers, despite its importance in EM and society. Research regarding information flowthe human and/or artificial information transactions that affect decisionsis of especial interest to EM where decisions affect the well-being of whole communities. EM decision-makers determine who is heard or not heard and what is done or not done regarding disaster planning and responsea vital public service that impacts communities socially, economically, and legally. People reach decisions through the processes of information flow during formal or informal meetings. Information flow in meetings of EM organizations may or may not be conducive to optimal disaster management; and researchers have not provided conclusive evidence either way. It is imperative that EM researchers know if methods employed in decision-makingthe result of the information floware increasing or decreasing the vulnerability of a community to disasters. EM concentrates on the preparedness, response, recovery, and mitigation of disasters. McEntire  ADDIN EN.CITE McEntire2004636310McEntire, D. A.The status of emergency management theory: Issues, barriers, and recommendations for improved scholarshipFEMA Higher Education ConferenceEmmitsburg, MDMcEntire2004636310McEntire, D. A.The status of emergency management theory: Issues, barriers, and recommendations for improved scholarshipFEMA Higher Education ConferenceEmmitsburg, MD(2004b) defines disasters as the disruptive and/or deadly and destructive outcome or result of physical or human-induced triggering agents when they interact with and are exacerbated by vulnerabilities from diverse but overlapping environments. Teams within EM organizations may struggle for long periodsor be forced to decide quickly how best to approach disasters. During these times of decision-making, the members of a team participate, either consciously or unconsciously, in creating and modifying information flow. Productive information flow is vital to ensure that EM teams reach sensible decisions. Sensible decisions aid in the prevention and mitigation of disasters. History of IS Information scientists historically seek solutions to problems regarding information in the broad disciplines of technology and sociology. The birth of this blend of technology and sociology in IS can be attributed to inspiration from As We May Think, an article written by Vannevar Bush at the close of the second World War. Bush, a respected MIT scientist and director of the United States (U.S.) Wartime Office of Scientific Research and Development, believed that the scientists who had been busy devising methods to defeat U.S. enemies would now have time to devise methods to mitigate the chaos already evidenced by the explosion of information. He predicted scientific and social disaster if scientists did not address the massive task of making more accessible a bewildering store of knowledge  ADDIN EN.CITE Bush1945424217Vannevar BushAs we may thinkAtlantic MonthlyAtlantic Monthly101-108176July1945Bush1945424217Vannevar BushAs we may thinkAtlantic MonthlyAtlantic Monthly101-108176July1945(Bush, V., 1945a). Bush had a suggestiona technological knowledge management system in the form of a machine that would emulate human thought using association of ideas. The Memex would link thoughts in accordance with some intricate web of trails carried by the cells of the braina concept remarkably similar to contemporary hypertext  ADDIN EN.CITE Bush1945424217Vannevar BushAs we may thinkAtlantic MonthlyAtlantic Monthly101-108176July1945Bush1945424217Vannevar BushAs we may thinkAtlantic MonthlyAtlantic Monthly101-108176July1945(1945a)! The postwar scientists were unsurprisingly fascinated with Bushs proposal and accepted the technological challenge. Fortunately, Congress funded the scientists, with incentive from President Theodore Roosevelt who enlisted Bush to write a report to justify the financial support. Bushs report to Roosevelt, Science the Endless Frontier  ADDIN EN.CITE Bush1945585846Vannevar BushScience the endless frontier1945http://www.nsf.gov/about/history/vbush1945.htmBush1945585846Vannevar BushScience the endless frontier1945http://www.nsf.gov/about/history/vbush1945.htm(1945b), provided the basis for the creation of the National Science Foundation (NSF) by means of the NSF Act of 1950. One of the Acts mandates was to further the full dissemination of information of scientific value consistent with the national interest (P.L. 81-507), a plan that eventually led to the study of information flow that generates important decisions. IS: Technology and Sociology NSF scientists quickly developed two major IS directionstechnologically-based information retrieval and sociologically-based human information behaviorand by the 1960s, a few researchers were defining the term IS. When the American Documentation Institute, founded in 1937, decided to change its name to the American Society for Information Science, definitions abounded. Borko  ADDIN EN.CITE Borko1968262617Harold BorkoInformation Science: What Is It?American Documentation (pre-1986)American Documentation (pre-1986)31911968http://proquest.umi.com/pqdweb?did=640632731&Fmt=7&clientId=87&RQT=309&VName=PQD Borko1968262617Harold BorkoInformation Science: What Is It?American Documentation (pre-1986)American Documentation (pre-1986)31911968http://proquest.umi.com/pqdweb?did=640632731&Fmt=7&clientId=87&RQT=309&VName=PQD (1968) wrote one of the most enduring definitions, one that roots IS firmly in technology by stating that it is an interdisciplinary science that investigates the properties and behavior of information, the forces that govern the flow and use of information, and the techniques, both manual and mechanical, of processing information for optimal storage, retrieval and dissemination  ADDIN EN.CITE Borko1968262617Harold BorkoInformation Science: What Is It?American Documentation (pre-1986)American Documentation (pre-1986)31911968http://proquest.umi.com/pqdweb?did=640632731&Fmt=7&clientId=87&RQT=309&VName=PQD Borko1968262617Harold BorkoInformation Science: What Is It?American Documentation (pre-1986)American Documentation (pre-1986)31911968http://proquest.umi.com/pqdweb?did=640632731&Fmt=7&clientId=87&RQT=309&VName=PQD (Borko, 1968). Researchers gradually revised the more technologically-based definitions to reflect IS roots in sociology. The IS scope would be defined by Wersig and Nevelling who wrote that transmitting knowledge to those who need it is a social responsibility  ADDIN EN.CITE Wersig1975474717G WersigU NevellingThe phenomena of interest to information scienceInformation ScientistInformation Scientist127-14091975Wersig1975474717G WersigU NevellingThe phenomena of interest to information scienceInformation ScientistInformation Scientist127-14091975(1975). Belkin and Robertson would continue the technology-sociology theme by stating that the purpose of IS is to facilitate communication of information between humans  ADDIN EN.CITE Belkin1976353517Nicholas J. BelkinStephen E. RobertsonInformation science and the phenomenon of informationJournal of the American Society for Information Science (pre-1986)Journal of the American Society for Information Science (pre-1986)197-2042741976http://proquest.umi.com/pqdweb?did=639243451&Fmt=7&clientId=87&RQT=309&VName=PQD Belkin1976353517Nicholas J. BelkinStephen E. RobertsonInformation science and the phenomenon of informationJournal of the American Society for Information Science (pre-1986)Journal of the American Society for Information Science (pre-1986)197-2042741976http://proquest.umi.com/pqdweb?did=639243451&Fmt=7&clientId=87&RQT=309&VName=PQD (Belkin and Robertson, 1976). Eleven years later, Vickery and Vickery  ADDIN EN.CITE Vickery198741416B.C. VickeryA. VickeryInformation Science in Theory and Practice1987LondonButterworthsVickery198741416B.C. VickeryA. VickeryInformation Science in Theory and Practice1987LondonButterworths(1987) emphasized the role of sociology in IS by identifying IS as the study of the communication of information in society. Buckland and Liu would once again combine technology and sociology when they asserted that IS is centered on the representation, storage, transmission, selection (filtering, retrieval), and the use of documents and messages, where documents and messages are created for use by humans  ADDIN EN.CITE Buckland199840405Michael BucklandZiming LiuTrudi Bellardo HahnMichael K. BucklandAmerican Society for Information ScienceHistory of Information ScienceHistorical Studies in Information ScienceASIS Monograph272-2951998Medford, NJInformation Today, Inc.Buckland199840405Michael BucklandZiming LiuTrudi Bellardo HahnMichael K. BucklandAmerican Society for Information ScienceHistory of Information ScienceHistorical Studies in Information ScienceASIS Monograph272-2951998Medford, NJInformation Today, Inc.(1998). Bates clarified, however, by writing that IS is primarily, but not solely focused, on recorded information and peoples relationship to it  ADDIN EN.CITE Bates1999242417Bates, Marcia J.The invisible substrate of information scienceJournal of the American Society for Information ScienceJournal of the American Society for Information Science10435012Library scienceStudies1999http://proquest.umi.com/pqdweb?did=45497400&Fmt=7&clientId=87&RQT=309&VName=PQD Bates1999242417Bates, Marcia J.The invisible substrate of information scienceJournal of the American Society for Information ScienceJournal of the American Society for Information Science10435012Library scienceStudies1999http://proquest.umi.com/pqdweb?did=45497400&Fmt=7&clientId=87&RQT=309&VName=PQD (Bates, 1999). With all the progress in determining the definition of IS, however, the definition of informationthe focus of ISremained somewhat elusive. What is information? Information theorists Shannon and Weaver  ADDIN EN.CITE Shannon194823236Claude ShannonWarren WeaverThe mathematical theory of communication1948ChicagoUniversity of Illinois Press(1948) believed that information is the reduction of uncertainty, and yet, ironically, finding a clear definition of information still seems to stump both researchers and readers of IS. Information has been defined within many disciplines by those who sometimes over-simplify or over-complicate its meaningnevertheless, IS researchers agree that information is fundamental to all disciplines for communication, and it must therefore be preserved, organized, and easily retrieved  ADDIN EN.CITE Ratzan200424246Lee RatzanUnderstanding information systems: what they do and why we need them2004ChicagoAmerican Library AssociationRatzan200424246Lee RatzanUnderstanding information systems: what they do and why we need them2004ChicagoAmerican Library AssociationBuckland1991282817Michael BucklandInformation as ThingJournal of the American Society for Information Science (1986-1998)Journal of the American Society for Information Science (1986-1998)3514251991http://proquest.umi.com/pqdweb?did=639272681&Fmt=7&clientId=87&RQT=309&VName=PQD (Buckland, 1991; Ratzan, 2004). Information may be described as a representation of a message that is processed into something valuable so that it may be applied in a practical context. This description, however, suggests that the value of information has somehow been previously established. So, how, then, is the value of information determined? The Value of Information The value of information is best determined by what Repo calls value-in-usea benefit the user obtains from the use and the effect of the use  ADDIN EN.CITE Repo19832EndNote017<style face='normal' font='default' size='100%'>The dual approach to the value of information: An appraisal of use and exchange values</style>(1983). Value-in-use is subjective and specific to a userso the value of information could be defined simply as contingent upon its usefulness to an individual. The value of information therefore is relative to the level of satisfaction directly or indirectly received from an information good, service, or resource. Consider, for instance, contrasting views of those who receive a stack of 1820s newspapers from a ghost town. The litterbug casually tosses the papers outsideto the litterbug, the papers are trash to be burned. The recycler carefully collects the papers in a bagto the recycler, the papers are cash to be earned. The librarian gladly accepts the papers from the recycle shopto the librarian, the papers are documents that must be sorted. The professor delightedly inquires about the papers from the libraryto the professor, the papers are history to be reported. The value of information is therefore determined by its user and its intended application. The Sciences of Information How, why, what, and where information is applied are questions investigated within the framework of several information studies a truth that often identifies information science as information sciences. Whether it is appropriate to label the field of IS as singular or plural is another argument  ADDIN EN.CITE Webber2003292917Webber, SheilaInformation Science in 2003: A CritiqueJournal of Information ScienceJournal of Information Science311-3302942003016555150165-5515(20030101)29:4L.311_1-7 Provider: OCLCView Full Text in PDF format (ECO)Availability: FirstSearch indicates your institution subscribes to this publication. Libraries worldwide that own item: 229 UNIV OF N TEXAS Search the catalog at UNT LibrariesLocal HoldingsInformation: vol: 1- 1979- Webber2003292917Webber, SheilaInformation Science in 2003: A CritiqueJournal of Information ScienceJournal of Information Science311-3302942003016555150165-5515(20030101)29:4L.311_1-7 Provider: OCLCView Full Text in PDF format (ECO)Availability: FirstSearch indicates your institution subscribes to this publication. Libraries worldwide that own item: 229 UNIV OF N TEXAS Search the catalog at UNT LibrariesLocal HoldingsInformation: vol: 1- 1979- (Webber, 2003), however; IS is undeniably interdisciplinary  ADDIN EN.CITE Machlup198331316Fritz MachlupUna MansfieldThe Study of Information: Interdisciplinary Messages1983New YorkJohn Wiley & SonsMachlup198331316Fritz MachlupUna MansfieldThe Study of Information: Interdisciplinary Messages1983New YorkJohn Wiley & Sons(Machlup and Mansfield, 1983) with problems studied through four major interdisciplinary relations including: cognitive science, communications. computer science, and librarianship (Appendix A)  ADDIN EN.CITE Saracevic1999 333317Tefko SaracevicInformation scienceJournal of the American Society for Information ScienceJournal of the American Society for Information Science1051-10635012information scienceinformation science historyinformation science educationinformation retrievaltrendsinformation explosion1999 Saracevic1999 333317Tefko SaracevicInformation scienceJournal of the American Society for Information ScienceJournal of the American Society for Information Science1051-10635012information scienceinformation science historyinformation science educationinformation retrievaltrendsinformation explosion1999 (Saracevic, 1999). IS as a Meta-discipline IS enables people to find informationa need based on psychological needs for survival and fulfillment. Finding sought-after information can change human perception by relieving anxiety, fulfilling a goal, realizing a need, or actualizing a concept. IS has dedicated years of research to training people how to find information and thereby enhance problem-solving and decision-makinghelping to reduce uncertainty and change an individuals image of reality  ADDIN EN.CITE Case20025635636Donald O. CaseLooking for informaton: A survey of research on information seeking, needs, and behavior2002LondonAcademic PressCase20025635636Donald O. CaseLooking for informaton: A survey of research on information seeking, needs, and behavior2002LondonAcademic Press(Case, 2002). Education, mass communications, and philosophy/theology also have distinctive relationships with information. Education is the teaching and learning of information; mass communications is the discovery and transmission of information; philosophy/theology is the search for true information. In fact, IS has application to all disciplines and is therefore more appropriately defined as a meta-disciplinary science  ADDIN EN.CITE Bates1999242417Bates, Marcia J.The invisible substrate of information scienceJournal of the American Society for Information ScienceJournal of the American Society for Information Science10435012Library scienceStudies1999http://proquest.umi.com/pqdweb?did=45497400&Fmt=7&clientId=87&RQT=309&VName=PQD Bates1999242417Bates, Marcia J.The invisible substrate of information scienceJournal of the American Society for Information ScienceJournal of the American Society for Information Science10435012Library scienceStudies1999http://proquest.umi.com/pqdweb?did=45497400&Fmt=7&clientId=87&RQT=309&VName=PQD (Bates, 1999). After all, IS is concerned with information, a resource  ADDIN EN.CITE Cleveland1982252517Harlan ClevelandInformation as a resourceThe FuturistThe Futurist34-3916December1982Cleveland1982252517Harlan ClevelandInformation as a resourceThe FuturistThe Futurist34-3916December1982(Cleveland, 1982) common to all disciplines and coincidentally, responsible for the creation of bibliometrics, the major quantitative method used to analyze interdisciplinarity among fields  ADDIN EN.CITE Morillo2003373717Fernanda MorilloMara Bordons Isabel GmezCentro de Informacin y Documentacin Cientfica (CINDOC), Consejo Superior de Investigaciones Cientficas (CSIC), Joaqun Costa, 22, 28002 Madrid, SpainInterdisciplinarity in science: A tentative typology of disciplines and research areasJournal of the American Society for Information Science and TechnologyJournal of the American Society for Information Science and Technology1237-1249541320031532-2890http://dx.doi.org/10.1002/asi.10326 Morillo2003373717Fernanda MorilloMara Bordons Isabel GmezCentro de Informacin y Documentacin Cientfica (CINDOC), Consejo Superior de Investigaciones Cientficas (CSIC), Joaqun Costa, 22, 28002 Madrid, SpainInterdisciplinarity in science: A tentative typology of disciplines and research areasJournal of the American Society for Information Science and TechnologyJournal of the American Society for Information Science and Technology1237-1249541320031532-2890http://dx.doi.org/10.1002/asi.10326 (Morillo and Gmez, 2003). Bibliometrics uses content analysis, a method that includes comparing the frequency (F) of terms between disciplines, for example IS and EM. Content analysis, in this case, becomes a preliminary survey to determine whether researchers have initiated integration within disciplines  ADDIN EN.CITE Ruben1992222217Brent D. RubenThe communication-information relationship in system-theoretic perspectiveJournal of the American Society for Information Science (1986-1998)Journal of the American Society for Information Science (1986-1998)154311992http://proquest.umi.com/pqdweb?did=640588371&Fmt=7&clientId=87&RQT=309&VName=PQD Ruben1992222217Brent D. RubenThe communication-information relationship in system-theoretic perspectiveJournal of the American Society for Information Science (1986-1998)Journal of the American Society for Information Science (1986-1998)154311992http://proquest.umi.com/pqdweb?did=640588371&Fmt=7&clientId=87&RQT=309&VName=PQD (Ruben, 1992). A cursory examination of IS and EM journals identifies major terms commonly found in titles of articles in IS and EM from 2002 through July 2005. The IS journals are African Journal of Library, Archives and Information Science, Journal of Human-Computer Studies, Journal of Librarianship and Information Science, Journal of the Society of Archivists, Library & Information Science Research, and International Journal of Human-Computer Studies. The EM journals are Disaster Prevention and Management, Disasters, International Journal of Emergency Management, Journal of Contingencies & Crisis Management, and Natural Hazards Review (Table 3). Table 3 Frequency (F) of IS/EM Terms in EM/IS Journal Titles 2002-2005IS terms found in EM Journal TitlesFEM Terms found in IS Journal TitlesFinformation (sharing, system, technology)11disaster5communication (or coordination or collaboration or interaction)4emergency or hazard(s)2Total15Total7 The infrequency of terms within journal titles indicates that studies of IS and EM have experienced little integration. IS and EM do however, share a substantial interest in the study of disasters in at least two distinct aspects: information disasters and disaster information flow. EM theories may be used to frame information disasters and vulnerabilities while IS theories may be used to study collaborative decisions by identifying patterns of information flow during the phases of a disaster. EM Theory, Information, and Disasters The purpose of EM is to minimize vulnerabilities to hazards that cause disasters. Vulnerabilities, according to McEntire, are high levels of risk and susceptibility coupled with a low degree of resistance and resilience that exacerbate potential hazardstriggering agents that cause disasters  ADDIN EN.CITE McEntire2004636310McEntire, D. A.The status of emergency management theory: Issues, barriers, and recommendations for improved scholarshipFEMA Higher Education ConferenceEmmitsburg, MD(2004b). Although it may be impossible to prevent or diminish hazards, it is possible to reduce the vulnerability to hazards that lead to technological, natural, or civil disasters (Table 3). For example, government officials may be able to reduce the vulnerability to terrorism through heightened protection of borders and infrastructures or improvement in the prevention of weapons of mass destruction  ADDIN EN.CITE McEntire2004636310McEntire, D. A.The status of emergency management theory: Issues, barriers, and recommendations for improved scholarshipFEMA Higher Education ConferenceEmmitsburg, MD(McEntire, 2004b). Information and Technological Disasters Disasters caused by technology are the most difficult to predict and are largely unforeseeable  ADDIN EN.CITE Chapman2005742096535620965-3562(20050301)14:3L.343_1-2 Provider: OCLC74217Chapman, JudithPredicting technological disasters: mission impossible?Disaster Prevention and Management: An International Journal 14, no. 3Disaster Prevention and Management: An International Journal 14, no. 32005096535620965-3562(20050301)14:3L.343_1-2 Provider: OCLC(Chapman, 2005). Tragically, many technological disasters result from seldom-inspected or outdated technology. A faulty computer surge protector is blamed for a fire that swept through Minnesotas Hastings County Library in 1993, destroying 80% of the librarys hard-copy and electronic documents. The flames demolished the building and left the remaining documents damaged by soot, smoke, and water  ADDIN EN.CITE Bolger200374474417Bolger, LaurieScared or prepared? Disaster planning makes the differenceInformation OutlookInformation Outlook25-31772003(Bolger, 2003). Since then, Hastings County has implemented disaster recovery plans to prevent and/or prepare for disasters. Information and Natural Disasters Reducing vulnerability to natural disasters may be more challenging. During the 1997 renovation of the Colorado State University Library (CSUL), library administrators stored approximately 462,000 volumes in the basement. During this temporary storage period, a flash flood enveloped the 77,000 square foot basement with 10 feet of water. Approximately 450,000 itemsone-fourth of the librarys holdingswere damaged or destroyed, including the librarys vast newspaper collection. Although the flood was the worlds fourth largest library disaster in the 20th century, there was at least one positive consequence. Camila Alire, CSUL librarian, and other CSUL staff wrote Library Disaster Planning and Recovery Handbook, considered by critics to be a valuable disaster practitioners guide  ADDIN EN.CITE Dugan200174574517Dugan, Robert E.Book ReviewsJournal of Academic LibrarianshipJournal of Academic Librarianship61271BOOKSLIBRARY Disaster Planning & Recovery Handbook (Book)2001Elsevier Science Publishing Company, Inc.http://search.epnet.com/login.aspx?direct=true&db=buh&an=4112974 Williams200074674617Williams, Wilda W.Library Disaster Planning and Recovery Handbook (Book Review)Library JournalLibrary Journal12312511BOOKSLIBRARY Disaster Planning & Recovery Handbook (Book)2000Reed Business Information / Reviewshttp://search.epnet.com/login.aspx?direct=true&db=buh&an=3218137 (Dugan, 2001; Williams, 2000). Information and Civil Disasters Unfortunately, civil disasters are prevalent throughout human history. At least three versions of the destruction of the ancient Library of Alexandria may be found in Egyptian history, however all versions attribute the great Librarys demise to civil disaster  ADDIN EN.CITE Chesser200575275212Preston Chesser<style face="normal" font="Times New Roman" size="100%">eHistory.com</style>2005July 312005Ohio State University Web sitehttp://ehistory.osu.edu/world/articles/ArticleView.cfm?AID=9(Chesser, 2005). Ptolomy II Soter, successor to Alexandria the Great, built the Library in 283 B.C. and vowed to use any means to amass all the books of the world  ADDIN EN.CITE Heller-Roazen200275075017Heller-Roazen, DanielTradition's Destruction: On the Library of AlexandriaOctoberOctober133100LIBRARIESMUSEUMSALEXANDRIA Library (Alexandria, Egypt)EGYPTALEXANDRIA (Egypt)2002MIT Presshttp://search.epnet.com/login.aspx?direct=true&db=aph&an=6759299 (Heller-Roazen, 2002). The Library did acquire nearly one-half million booksan unequaled collection for its erabefore its ruin in the 1st century  ADDIN EN.CITE Erskine199575175117Andrew ErskineCulture and Power in Ptolemaic Egypt: The Museum and Library of AlexandriaGreece & RomeGreece & Rome38-484211995Erskine199575175117Andrew ErskineCulture and Power in Ptolemaic Egypt: The Museum and Library of AlexandriaGreece & RomeGreece & Rome38-484211995(Erskine, 1995). The threat of modern civil disasters has increased since the September 11, 2001 terrorist attacks (9/11)a fact that makes tangible and intangible (electronic or human) information and information issues considerably more vulnerable to disaster  ADDIN EN.CITE Comfort200568968917Comfort, Louise K.Risk, Security, and Disaster ManagementAnnual Review of Political ScienceAnnual Review of Political Science335-35681disaster managementnetwork anaylsis2005http://arjournals.annualreviews.org/loi/polisci Dory2003-0469369317Dory, Amanda J.American Civil Society: The U.S. Public and Homeland SecurityThe Washington QuarterlyThe Washington Quarterly37-52271Civil defense -- United StatesTerrorism -- United States -- PreventionNational security -- United States2003-04The 9/11 Commission200473873827The 9/11 Commission,Final report of the National Commission on Terrorist Attacks upon the United StatesExecutive Summary5852004August 21, 2004Washington, D.C.US Governmenthttp://a257.g.akamaitech.net/7/257/2422/22jul20041147/www.gpoaccess.gov/911/pdf/execsummary.pdf(Comfort, 2005; Dory, 2003-04; The 9/11 Commission, 2004). Lawmakers have since enacted grave changes to the tenets of the U.S. Constitution (USA PATRIOT Act) regarding access to information  ADDIN EN.CITE Jaeger200367867817Jaeger, Paul T.Bertot, John CarloMcClure, Charles R.The impact of the USA PATRIOT Act on collection and analysis of personal information under the Foreign Intelligence Surveillance ActGovernment Information QuarterlyGovernment Information Quarterly2952032003http://www.sciencedirect.com/science/article/B6W4G-48TK9F4-3/2/30777dce1317d4b7bb3b9ea60cf7bb8e (Jaeger, Bertot and McClure, 2003). Both lawmakers and private citizens have made public information less accessibleso terrorists cannot access itand private information more accessiblein case the information belongs to terrorists. The threat to public information and information privacy is an ongoing hazard, one that librarianship has struggled to mitigate (Appendix B). Information in the Equation for Disasters Librarians and library educators hold the preservation of information sacred and consider librariesthe primary keepers of recorded informationto be the last visage of a free public education for all citizens  ADDIN EN.CITE Totten200556256226Herman L. TottenTisha PipesLibraries and Education2005March 5, 2004Denton, TXTotten200556256226Herman L. TottenTisha PipesLibraries and Education2005March 5, 2004Denton, TX(Totten, 2005). Clearly, all disciplines benefit from the preservation and access to information, a sound reason for investigating information disasters. The study of vulnerability provides an excellent basis for future research in information disasters (as well as information flow regarding disasters). Information disasters may be portrayed using McEntires equation for disasters: vulnerability + hazard (triggering agent) = disaster  ADDIN EN.CITE McEntire2004197096535620965-3562(20040301)13:3L.193_1-1 Provider: OCLC19717McEntire, D. A.Development, disasters and vulnerability: a discussion of divergent theories and the need for their integrationDisaster Prevention and Management: An International Journal 13, no. 3Disaster Prevention and Management: An International Journal 13, no. 32004096535620965-3562(20040301)13:3L.193_1-1 Provider: OCLCView Full Text on remote site (ECO)Availability: FirstSearch indicates your institution subscribes to this publication. Libraries worldwide that own item: 42 UNIV OF N TEXAS Search the catalog at UNT LibrariesLocal HoldingsInformation: vol: 1- 1992- McEntire2004197096535620965-3562(20040301)13:3L.193_1-1 Provider: OCLC19717McEntire, D. A.Development, disasters and vulnerability: a discussion of divergent theories and the need for their integrationDisaster Prevention and Management: An International Journal 13, no. 3Disaster Prevention and Management: An International Journal 13, no. 32004096535620965-3562(20040301)13:3L.193_1-1 Provider: OCLCView Full Text on remote site (ECO)Availability: FirstSearch indicates your institution subscribes to this publication. Libraries worldwide that own item: 42 UNIV OF N TEXAS Search the catalog at UNT LibrariesLocal HoldingsInformation: vol: 1- 1992- (2004a) (Appendix C). IS Theory, Information, and Disasters The flow of information within the management of disasters can be investigated using several methods found in the interdisciplinary domains of IS. Many theories have evolved including theories of individual and collective information behavior (information seeking and processing). Collective information behavior has been studied in the context of group research (information flow in both task and emergent groups). Task groupsindividuals who accept a collective charge to form decisions and/or solve problemsdominate research of information flow in groups. Emergent groupsindividuals that meet incidentally and collaboratehave appeared in recent IS research with an emphasis on conversational problem-solving  ADDIN EN.CITE O'Connor200365656Brian O'ConnorJud CopelandJodi KearnsHunting and gathering on the information savanna: Conversations on modeling human search abilities2003Lanham, MDScarecrow Press, Inc.O'Connor200365656Brian O'ConnorJud CopelandJodi KearnsHunting and gathering on the information savanna: Conversations on modeling human search abilities2003Lanham, MDScarecrow Press, Inc.(O'Connor, Copeland and Kearns, 2003). Emergent behaviora more intense form of problem-solvinghas been the subject of some EM studies within the context of disaster scenes  ADDIN EN.CITE Drabek2003177096535620965-3562(2003)12:2L.97_1-3 Provider: OCLC17717Drabek, Thomas E.McEntire, D. A.Emergent phenomena and the sociology of disaster: lessons, trends and opportunities from the research literatureDisaster Prevention and Management: An International Journal 12, no. 2Disaster Prevention and Management: An International Journal 12, no. 22003096535620965-3562(2003)12:2L.97_1-3 Provider: OCLCView Full Text on remote site (ECO)Availability: FirstSearch indicates your institution subscribes to this publication. Libraries worldwide that own item: 42 UNIV OF N TEXAS Search the catalog at UNT LibrariesLocal HoldingsInformation: vol: 1- 1992- Drabek2003177096535620965-3562(2003)12:2L.97_1-3 Provider: OCLC17717Drabek, Thomas E.McEntire, D. A.Emergent phenomena and the sociology of disaster: lessons, trends and opportunities from the research literatureDisaster Prevention and Management: An International Journal 12, no. 2Disaster Prevention and Management: An International Journal 12, no. 22003096535620965-3562(2003)12:2L.97_1-3 Provider: OCLCView Full Text on remote site (ECO)Availability: FirstSearch indicates your institution subscribes to this publication. Libraries worldwide that own item: 42 UNIV OF N TEXAS Search the catalog at UNT LibrariesLocal HoldingsInformation: vol: 1- 1992- (Drabek and McEntire, 2003). Information Flow and Small Group Studies Knowing and testing the varying properties of information flow in groups may be vital to the success of EM teams at the local, state, and national level, within all the disaster phases (preparedness, response, recovery, and mitigation) identified by Drabek  ADDIN EN.CITE Drabek198664646Thomas E. DrabekRobert S. DeSantoHuman system responses to disaster: An inventory of sociological findingsSpringer Series on Environmental Management1986New YorkSpringer-VerlagDrabek198664646Thomas E. DrabekRobert S. DeSantoHuman system responses to disaster: An inventory of sociological findingsSpringer Series on Environmental Management1986New YorkSpringer-Verlag(1986). Emergent groups that exist at disaster scenes warrant study, as do EM decision-making groups that contribute to the future health and survival of our governments, communities, and citizens. Within the last decade, the Communications discipline has introduced several ethnographic studies of group information flow, although the study of groups has traditionally been performed in laboratory settings. These contrived experiments cannot reveal the properties of real group information flow. Although the small group remains the oldest and most prevalent of the concepts in all social organization  ADDIN EN.CITE Fisher197445EndNote06<style face='normal' font='default' size='100%'>Small Group Decision Making</style>(Fisher, A., 1974), the disciplines that study information flow in small groups are diverse and disconnected. Research of information flow in groups has matured despite independent studies by scholars in psychology, sociology, management, communication, education, social work, political science, public policy, urban planning, and IS. The absence of convergence within the fields, however, has not prevented small group research from accumulating enough solid theory in the past 50 years to establish its own discipline of study  ADDIN EN.CITE Poole200463863817M. PooleInterdisciplinary perspectives on small groupsSmall Group ResearchSmall Group Research3-163512004Poole200463863817M. PooleInterdisciplinary perspectives on small groupsSmall Group ResearchSmall Group Research3-163512004Poole200463863817M. PooleInterdisciplinary perspectives on small groupsSmall Group ResearchSmall Group Research3-163512004(Poole, M., 2004) The formal study of information flow in groups can be traced to 1898 when psychologist Norman Triplett tested the hypothesis that the presence of others in a group would facilitate the problem solving of an individual  ADDIN EN.CITE Hare196238EndNote06<style face='normal' font='default' size='100%'>Handbook of Small Group Research</style>(Hare, A. Paul, 1962). By studying group behavior, educators and politicians believe people can collectively solve common problems in the communities  ADDIN EN.CITE Gouran20036016015Dennis GouranJohn O. GreeneBrant R. BurlesonJennings BryantDoolf ZillmanCommunication Skills for Group Decision MakingHandbook of Communication and Social Interaction SkillsLEA's Communication Series2003Mahwah, NJLawrence Erlbaum Associates(Gouran, D., 2003a). Group Decision-Making A major influence in 1910 on the study of group discussion and decision-making was the well-known book How We Think by the distinguished philosopher, John Dewey. Deweys model is still the most widely-used model for directing the information flow toward problem solving and decision-making in IS studies of groups (Table 4). Table 4 Deweys Reflective Thinking ModelDetermine what information is needed for understanding the issue at hand. Access and gather the available information. Gather the opinions of reliable sources in related fields. Synthesize the information and opinions. Consider the synthesis from all perspectives and frames of reference. Finally, create some plausible temporary meaning that may be reconsidered and modified as more relevant information and opinions are learned. ADDIN EN.CITE Dewey191066666John DeweyHow We Think1910BostonHoughton Miflin CompanyDewey191066666John DeweyHow We Think1910BostonHoughton Miflin Company(Dewey, 1910)Group Properties Small group research became recognized in the late 1940s and early 1950s by an increasing number of references in the social science literature  ADDIN EN.CITE Ellis19948EndNote06<style face='normal' font='default' size='100%'>Small Group Decision Making: Communication and the Group Process</style>Fisher197445EndNote06<style face='normal' font='default' size='100%'>Small Group Decision Making</style>Gouran199936EndNote05<style face='normal' font='default' size='100%'>Communication in Groups: The Emergence and Evolution of a Field of Study</style>Hare196238EndNote06<style face='normal' font='default' size='100%'>Handbook of Small Group Research</style>Hartley19977EndNote06<style face='normal' font='default' size='100%'>Group Communication</style>Harris200234EndNote06<style face='normal' font='default' size='100%'>Small Group and Team Communication</style>(Ellis and Fisher, 1994; Fisher, A., 1974; Gouran, D., 1999; Hare, A. Paul, 1962; Harris and Sherblom, 2002; Hartley, 1997). Although there are many more, 13 major properties, identified through theoretical studies and worthy of further study, may be depicted as an acronym, G.R.O.U.P. D.Y.N.A.M.I.C.S. (Appendix D) Understanding these properties of real groups in action provides descriptive and prescriptive methods that may enhance decision-making capabilities in EM organizations. The G.R.O.U.P. D.Y.N.A.M.I.C.S. properties emerged because of studying the information flow in groups as a process. The group as a process led to groups being studied from the systems approach  ADDIN EN.CITE Harris200234EndNote06<style face='normal' font='default' size='100%'>Small Group and Team Communication</style>Gouran20039EndNote05<style face='normal' font='default' size='100%'>Communication Skills for Group Decision Making</style>Bales199946EndNote06<style face='normal' font='default' size='100%'>Social interaction systems : Theory and measurement</style>(Bales, 1999; Gouran, D. S., 2003b; Harris and Sherblom, 2002). Information Flow and Systems Theory Open systems of interaction, originally applied to biological systems, provides a compelling symbolic foundation for an IS study of EM decision-making. Many IS studies found basis for systems of information flow using Shannon and Weavers 1947 communications / information systems model (Figure 1) to describe group communication systems. Figure 1Lewin, Lippitt, and White  ADDIN EN.CITE Lewin193966666617Kurt LewinR. LippittR. WhitePatterns of aggressive behavior in experimentally created "social climates"Journal of Social PsychologyJournal of Social Psychology271-299101939Lewin193966666617Kurt LewinR. LippittR. WhitePatterns of aggressive behavior in experimentally created "social climates"Journal of Social PsychologyJournal of Social Psychology271-299101939(1939) introduced the systems approach to studying the group information process; however, scholars did not embrace the theory until Bales  ADDIN EN.CITE Bales195055EndNote06<style face='normal' font='default' size='100%'>Interaction process analysis: A method for the study of small groups</style>(1950) enhanced it. Bales compared groupslike those found in EMto an open system that is, from inception to outcome, a cyclical processdynamic, continuous, and evolving  ADDIN EN.CITE Hare196238EndNote06<style face='normal' font='default' size='100%'>Handbook of Small Group Research</style>Harris200234EndNote06<style face='normal' font='default' size='100%'>Small Group and Team Communication</style>(Hare, A. Paul, 1962; Harris and Sherblom, 2002). EM organizations can be viewed as a subsystem within the larger social systeman open system. An open system is a set of interrelated components that operate together as a whole with three major elements: input, process, and output. Multiple subsystems of transactions, called processes, characterize a system of interaction, called information flow. These processes are between and among people, components who continually and simultaneously send output and receive input. The purpose of these transactions is to achieve a mutual goal, a successful outcome  ADDIN EN.CITE Bales195055EndNote06<style face='normal' font='default' size='100%'>Interaction process analysis: A method for the study of small groups</style>(Bales, 1950) (Table 5). Table 5 Information Flow Systems System elementsExample in EMprocesspreparation, response, recovery, mitigation componentpolice, firefighters, emergency medical technicians, meteorologists, volunteer groups, building inspectors, politicians. local/state/federal officials, businesses, nearby jurisdictionsoutcomedisaster prevention, disaster mitigation The Communications discipline investigates face-to-face and virtual systems of information flow and decisions. It has provided group information flow with a respectable position in formal research  ADDIN EN.CITE Poole200463863817M. PooleInterdisciplinary perspectives on small groupsSmall Group ResearchSmall Group Research3-163512004(Poole, M., 2004). Studies include groups as systems  ADDIN EN.CITE Hare20031EndNote017<style face='normal' font='default' size='100%'>Roles, relationships, and groups in organizations: Some conclusions and recommendations</style>Lester200311EndNote017<style face='normal' font='default' size='100%'>The Human Side of Group Support Systems: Influences on Satisfaction and Effectiveness</style>Mabry199912EndNote05<style face='normal' font='default' size='100%'>The systems metaphor in group communication</style>McGrath20007EndNote017<style face='normal' font='default' size='100%'>The Study of Groups: Past, Present, and Future</style>Moon200313EndNote017<style face='normal' font='default' size='100%'>Group decision process and incrementalism in organizational decision making</style>Prekop200214EndNote017<style face='normal' font='default' size='100%'>A Qualitative Study of Collaborative Information Seeking</style>Hare20031EndNote017<style face='normal' font='default' size='100%'>Roles, relationships, and groups in organizations: Some conclusions and recommendations</style>Lester200311EndNote017<style face='normal' font='default' size='100%'>The Human Side of Group Support Systems: Influences on Satisfaction and Effectiveness</style>Mabry199912EndNote05<style face='normal' font='default' size='100%'>The systems metaphor in group communication</style>McGrath20007EndNote017<style face='normal' font='default' size='100%'>The Study of Groups: Past, Present, and Future</style>Moon200313EndNote017<style face='normal' font='default' size='100%'>Group decision process and incrementalism in organizational decision making</style>Prekop200214EndNote017<style face='normal' font='default' size='100%'>A Qualitative Study of Collaborative Information Seeking</style>(Hare, A Paul, 2003; Lester, Ready, Hostager and Bergmann, 2003; Mabry, 1999; McGrath, Arrow and Berdahl, 2000; Moon et al., 2003; Prekop, 2002), group interaction (information flow)  ADDIN EN.CITE Wittenbaum20047EndNote017<style face='normal' font='default' size='100%'>The functional perspective as a lens for understanding groups</style>Chernyshenko20034EndNote017<style face='normal' font='default' size='100%'>The impact of information distribution, ownership, and discussion on group member judgment: The differential cue weighting model</style>Kelly20046EndNote017<style face='normal' font='default' size='100%'>Time pressure and group performance: Exploring underlying processes in the Attentional Focus Model</style>Wilkinson20021EndNote017<style face='normal' font='default' size='100%'>Small-group composition and peer effects</style>(Chernyshenko, Miner, Baumann and Sniezek, 2003; Kelly and Loving, 2004; Wilkinson and Fung, 2002; Wittenbaum et al., 2004), virtual group interaction  ADDIN EN.CITE Dasgupta20033EndNote017<style face='normal' font='default' size='100%'>The role of controlled and dynamic process environments in group decision making: An exploratory study</style>Balthazard20042EndNote017<style face='normal' font='default' size='100%'>Expertise, extraversion and group interaction styles as performance indicators in virtual teams: how do perceptions of IT's performance get formed?</style>Benbunan-Ficha20031EndNote017<style face='normal' font='default' size='100%'>A comparative content analysis of face-to-face vs. asynchronous group decision making</style>(Balthazard, Potter and Warren, 2004; Benbunan-Ficha, Hiltz and Turoff, 2003; Dasgupta, 2003), group decisions  ADDIN EN.CITE Condon20032EndNote017<style face='normal' font='default' size='100%'>Visualizing Group Decisions in the Analytic Hierarchy Process</style>Ellis199413EndNote06<style face='normal' font='default' size='100%'>Small Group Decision Making: Communication and the Group Process</style>Poole19857EndNote017<style face='normal' font='default' size='100%'>Group decision-making as a structurational process</style>Slezak20009EndNote017<style face='normal' font='default' size='100%'>The Effect of Organizational Form on Information Flow and Decision Quality: Informational Cascades in Group Decision Making</style>Sunwolf199910EndNote05<style face='normal' font='default' size='100%'>The impact of formal procedures on group processes, members, and task outcomes</style>(Condon, Golden and Wasil, 2003; Ellis and Fisher, 1994; Poole, Marshall, 1985; Slezak, 2000; Sunwolf and Seibold, 1999), and virtual group decisions  ADDIN EN.CITE Burkhalter20025EndNote017<style face='normal' font='default' size='100%'>A Conceptual Definition and Theoretical Model of Public Deliberation in Small Face-to-Face Groups</style>Alge20031EndNote017<style face='normal' font='default' size='100%'>When does the medium matter? Knowledge-building experiences and opportunities in decision-making teams</style>Benbunan-Ficha20034EndNote017<style face='normal' font='default' size='100%'>A comparative content analysis of face-to-face vs. asynchronous group decision making</style>Burkhalter20025EndNote017<style face='normal' font='default' size='100%'>A Conceptual Definition and Theoretical Model of Public Deliberation in Small Face-to-Face Groups</style>Alge20031EndNote017<style face='normal' font='default' size='100%'>When does the medium matter? Knowledge-building experiences and opportunities in decision-making teams</style>Benbunan-Ficha20034EndNote017<style face='normal' font='default' size='100%'>A comparative content analysis of face-to-face vs. asynchronous group decision making</style>(Alge, Wiethoff and Klein, 2003; Benbunan-Ficha, Hiltz and Turoff, 2003; Burkhalter, Gastil and Kelshaw, 2002). IS studies of information behavior, flow, and processes as systems could contribute to the success of EM organizations, who interact by consulting and researching national organizationsfor example, the Federal Emergency Management Agency (FEMA)to gain information (input), and then make suggestions (output) to local EM members and EM researchers to solicit feedback. The feedback then becomes further input and shapes the subsequent suggestions made by all EM information contributors until a decision is reached. Systems theory is also the framework for a newer theory, the Bona Fide Group Perspective (BFGP) that can be used to demonstrate the relationship of EM as a whole to information flow. BFGP is one of four contemporary theories that describe information flow (Table 6). Table 6 Four Major Contemporary Theories Of Information Flow In GroupsFunctionalFunctional Theory is a normative approach to explaining group information flow. The focus of functional theory are inputs and processes, elements grounded in systems theory  ADDIN EN.CITE Wittenbaum200473EndNote017<style face='normal' font='default' size='100%'>The functional perspective as a lens for understanding groups</style>(Wittenbaum et al., 2004) and Deweys reflective thinking model. StructurationStructuration Theory is a way to explain the pattern of relationship between the group system of information flow and the group structure, the rules and resources members use to maintain the group system  ADDIN EN.CITE Poole198563EndNote017<style face='normal' font='default' size='100%'>Group decision-making as a structurational process</style>(Poole, Marshall, 1985). Symbolic Convergence Theory (SCT)Symbolic Convergence Theory (SCT) explains the information flow process of group members as they form group identity. The group assuming its own identity significantly improves decision-making  ADDIN EN.CITE Bormann198264EndNote017<style face='normal' font='default' size='100%'>The symbolic convergence theory of communication: Applications and implications for teachers and consultants</style>(Bormann, 1982).BFGPBFGP is a theory created by Putnam and Stohl  ADDIN EN.CITE Putnam1990636317Putnam, L.Stohl, C.Bona fide groups: A reconceptualization of groups in contextCommunication StudiesCommunication Studies248-265411990(1990) that embraces the relationship between groups and their larger social systems. BFGP proposes two major ideas: 1) groups have permeable and fluid boundaries with shifting borders and 2) groups are embedded in and interdependent with their environment, their larger system. The systems metaphor (Appendix E), however, remains the basis for textbook study of group information flow ADDIN EN.CITE Arrow200457057017Holly ArrowMarshall PooleKelly Bouas HenrySusan WheelanRichard MorelandTime, change, and development the temporal perspective on groupsSmall Group ResearchSmall Group Research73-105351small groupsgroup developmentcomplex systemstimechangeGROUP DECISION - MAKINGADAPTIVE STRUCTURATION THEORYCOMMUNICATIONPERFORMANCEWORKPERCEPTIONSCOMPLEXITYSTABILITYEMERGENCEEFFICACY2004Bales19995745746Robert BalesSocial interaction systems : Theory and measurement1999New Brunswick, NJTransaction PublishersArrow200457057017Holly ArrowMarshall PooleKelly Bouas HenrySusan WheelanRichard MorelandTime, change, and development the temporal perspective on groupsSmall Group ResearchSmall Group Research73-105351small groupsgroup developmentcomplex systemstimechangeGROUP DECISION - MAKINGADAPTIVE STRUCTURATION THEORYCOMMUNICATIONPERFORMANCEWORKPERCEPTIONSCOMPLEXITYSTABILITYEMERGENCEEFFICACY2004Bales19995745746Robert BalesSocial interaction systems : Theory and measurement1999New Brunswick, NJTransaction Publishers(Arrow, Poole, Henry, Wheelan and Moreland, 2004; Bales, 1999). The IS application of systems theory overlaps with communications, cognition, small group research, management, and therefore demonstrates the potential for integration into EM research. Current Research Interestingly, the very nature of information prompts integration among ALL disciplinesespecially information management and technologyto produce knowledge using libraries, computers, email, and software for statistical analysis, database creation, and all information systems. The events of the September, 2001 terrorist attacks, however, have initiated current research in IT to improve information sharing among governmental organizations and enable efficient communications interoperability among emergency response organizations. Decision Aids Several decision aids (Appendix A) have been developed for the management of disasters including: CAMEO (Computer-Aided Management of Emergency Operations), ALOHA (Area Location of Hazardous Atmospheres), ETeam (created to manage every phase of a crisis), GIS (geographic information systems). However, there is the need for new or the extension of existing theories that might enable information technologists to anticipate more fully the needs addressed by disaster management software. Information Sharing The Intelligence Reform and Terrorism Prevention Act of 2004 was intended to mobilize IT for counterterrorism information sharing  ADDIN EN.CITE Dizard2004464641Dizard, Wilson P.Final intelligence reform bill stresses data sharingGovernment Computer News23April 14, 2005200412/13/04http://www.gcn.com/23_34/news/28097-1.html(Dizard, 2004). The law created two influential positions: Director of National Intelligence and Director of the National Counterterrorism Centerboth entrusted with the task of increasing information sharing  ADDIN EN.CITE Office of the Press Secretary2004454540Office of the Press Secretary,The White HousePresident Signs Intelligence Reform and Terrorism Prevention ActApril 10, 200520042004 December 17http://www.whitehouse.gov/news/releases/2004/12/20041217-1.html(Office of the Press Secretary, 2004). Senator Susan Collins introduced the final version of the bill. She said the Commission found that "various agencies had pieces of the puzzle that [if assembled] might have allowed them to prevent the attacks the bill will foster a new culture of information sharing in the intelligence community  ADDIN EN.CITE Dizard2004464641Dizard, Wilson P.Final intelligence reform bill stresses data sharingGovernment Computer News23April 14, 2005200412/13/04http://www.gcn.com/23_34/news/28097-1.html(Dizard, 2004). Information sharing is also being addressed by a few individual efforts including the March 2004 introduction of OSIS (Open Specification for Sensitive Information Sharing) by RAINS (Regional Alliances for Infrastructure and Network Security). RAINS, a not-for-profit public/private partnership that has promised to advance ground-breaking technology for homeland security, created OSIS for the safe sharing of sensitive information across state, local and national security systems (Appendix F). Unfortunately, the nation has not introduced a consistent strategy to address information sharing nation-wide. The U.S. National Commission on Libraries and Information Science (NCLIS), however, has proposed an unusual solution to President George W. Bush and Congress. Trust and Terror is an NCLIS proposal that envisions public libraries as an information center for crisis information dissemination and management. NCLIS claims that public libraries provide an appropriate forum for crisis information dissemination because the public considers libraries trustworthy sources that are already efficiently structured, aware of cultural diversity, many times employ multi-lingual staff, and accessible to local communities. Although libraries also can offer the information from anywhere in the world in real time in numerous formats  ADDIN EN.CITE NCLIS200256456446NCLISTrust and Terror: A proposal of the National Commission on Libraries and Information Science (NCLIS) to expand the role of U.S. libraries in crisis Information dissemination and management 2002http://www.nclis.gov/info/trust/TrustandTerror.brochure.English.IFLA.pdfJuly 29, 2005NCLIS200256456446NCLISTrust and Terror: A proposal of the National Commission on Libraries and Information Science (NCLIS) to expand the role of U.S. libraries in crisis Information dissemination and management 2002http://www.nclis.gov/info/trust/TrustandTerror.brochure.English.IFLA.pdfJuly 29, 2005(NCLIS, 2002), new law would be needed to authorize and equip libraries for access to secure information related to terrorismthe most prominent civil hazard currently threatening the security of information. Communications Interoperability Failed communications interoperability contributed to Americas complacency during the 9/11 terrorist attacks. Consequently, thousands of civilians died alongside hundreds of first responders: emergency personnel including police, emergency medical technicians, and firefighters, who were trained and willing to save lives. Don Eddington, chief of the Center for IT Integration at the Defense Information Systems Agency admitted that "DOD (the Department of Defense) couldn't talk to state officials; state officials couldn't talk to city officials"  ADDIN EN.CITE Onley2002323241Dawn S. OnleyBetter communications could have saved lives, homeland official says,Government Computer NewsApril 3, 200220022002 September 11http://www.gcn.com/vol1_no1/daily-updates/19977-1.html(Onley, 2002). Unfortunately, first and second responder organizations had adopted many different information systems for their specific information sharing needsand some that were ready to use were never implemented. Firefighters, police, and other emergency personnel at the Pentagon and in New York City could not find common radio frequencies to communicatecell phone networks flooded frequencies and further hindered information flow in the hours following the attacks  ADDIN EN.CITE Riley2003363641Benjamin RileyInformation Sharing in Homeland Security and Homeland Defense: How the Department of Defense Is HelpingJournal of Homeland SecurityApril 4, 200520039/10/2003http://www.homelandsecurity.org/journal/articles/displayArticle.asp?article=97Riley2003363641Benjamin RileyInformation Sharing in Homeland Security and Homeland Defense: How the Department of Defense Is HelpingJournal of Homeland SecurityApril 4, 200520039/10/2003http://www.homelandsecurity.org/journal/articles/displayArticle.asp?article=97(Riley, 2003). The 9/11 Commission was enlisted to research and report the situations and events surrounding the attacks. The Commission found that civilians, firefighters, police officers, emergency medical technicians, and emergency management professionals demonstrated steady determination and resolve under horrifying, overwhelming conditions Their actions saved lives and inspired a nation ... However, the Commission also found that the Port Authority's response was hampered by the lack of standard operating procedures and radios capable of enabling multiple commands to respond to an incident in unified fashion. The Commission made the following recommendation: Make homeland security funding contingent on the adoption of an incident command system to strengthen teamwork in a crisis, including a regional approach. Allocate more radio spectrum and improve connectivity for public safety communications, and encourage widespread adoption of newly developed standards for private-sector emergency preparednesssince the private sector controls 85 percent of the nation's critical infrastructure  ADDIN EN.CITE The 9/11 Commission2004333327The 9/11 Commission,Final report of the National Commission on Terrorist Attacks upon the United StatesExecutive Summary5852004August 21, 2004Washington, D.C.US Governmenthttp://a257.g.akamaitech.net/7/257/2422/22jul20041147/www.gpoaccess.gov/911/pdf/execsummary.pdfThe 9/11 Commission2004333327The 9/11 Commission,Final report of the National Commission on Terrorist Attacks upon the United StatesExecutive Summary5852004August 21, 2004Washington, D.C.US Governmenthttp://a257.g.akamaitech.net/7/257/2422/22jul20041147/www.gpoaccess.gov/911/pdf/execsummary.pdf(The 9/11 Commission, 2004). Communications interoperability among officials from community first responders to high-level information security officers within the federal government is a major concern with the growing threats of terrorism and cyberterrorism. Recommendations for the development of shareable information systems have emerged from both public and private institutions. Creative solutions for integrating information technologies provide U.S. leaders with choices and challengesfor instance, what do they choose and how do they choose it? Congress passed the Homeland Security Act in November 2002 specifically to address these and other questions about shareable information (Appendix G). Private and public sectors are busy introducing a mishmash of information sharing products including software for: three-dimensional mapping of cities; disaster management simulations analysis of phone calls and other communications to help first responders make better decisions in emergencies; interpretation of garbled speech recordings; extraction of unstructured text; discovery of non-obvious relationships (background checks deluxe); and disparate systems queries (police, courthouse, homegrown databases, etc.)  ADDIN EN.CITE Mena2004262613Mena, JesúsHOMELAND SECURITY AS CATALYST.Intelligent Enterprise28-33711COMPUTER softwareHOMELAND securityKNOWLEDGE Computing Corp.INFOGLIDE Corp.SEARCHSPACE Corp.ATTENSITY Corp.LANGUAGE Analysis Systems Inc.20042004/07/10/CMP Media LLC15243621Articlehttp://search.epnet.com/login.aspx?direct=true&db=buh&an=13723545Batzler2002373741Batzler, LloydIndustry's Emerging Role in Homeland DefenseGovernment Computer NewsApril 10, 200520022002 November 3http://www.gcn.com/vol1_no1/daily-updates/20485-1.html(Batzler, 2002; Mena, 2004). Serious submissions are subject to SAFETY (Support Anti-Terrorism by Fostering Effective Technologies Act of 2002) guidelines  ADDIN EN.CITE DHS Press Office2003474740DHS Press Office,Department of Homeland SecurityFact Sheet: Safety Act - Partnering With American Entrepreneurs in Developing New Technologies to Protect the HomelandApril 15, 200520032003 October 10http://www.dhs.gov/dhspublic/interapp/press_release/press_release_0439.xml(DHS Press Office, 2003). IS should collaborate with EM to further these goals. Recommendations for Future Research IS researchers should consider studying disasters in the light of information and communication systems theory, collective information processing (Appendix D), knowledge management, decision-making and chaos theory. Chaos theory would provide a fitting foundation for the study of information flow in disasters. Disasters appear chaotic, yet chaos theory argues that there is order in chaosthe order is just not apparent because it is so complex. Researchers might also consider more ethnographic studies of disaster information flow at the scene of real disasters. Field studies could greatly enhance the information behavior theory of emergent groups, information sharing among first, second and third responders, and governmental agencies at all levels. Developing and testing information sharing network structures for disaster management would be instrumental in helping all involved in EM understand the routes of disaster information. EM could learn from whom, to whom, and how members can change those routes to enhance and expedite their important interactions. A sensitive information exchange technology that allows the display of information on heterogeneous networks across the world could eventually enable EM to send disaster information to all personal digital assistants or cell phones. Information sharing technology has the potential to make people safer, healthier, and more knowledgeablechief rationales for expanding IT. More technology, however, would bring more work to EM teams. Learning new systems and software and being better connected means more communicationall time-consuming activities to implement programs that may or may not be more efficient. The vulnerability of complex networked systems, together with potential ways of using data resources to speed up recovery almost certainly will increasingly preoccupy emergency planning staff in some areas."  ADDIN EN.CITE Stephenson199745803613666065 Provider: OCLC45817Stephenson, RobinAnderson, Peter S.Independent Consultant; Simon Fraser UniversityDisasters and the Information Technology RevolutionDisastersDisasters305-334214199703613666065 Provider: OCLCView Full Text in PDF format (ECO)Availability: FirstSearch indicates your institution subscribes to this publication. Libraries worldwide that own item: 190 UNIV OF N TEXAS Search the catalog at UNT LibrariesLocal HoldingsInformation: vol: 1- 1977- Stephenson199745803613666065 Provider: OCLC45817Stephenson, RobinAnderson, Peter S.Independent Consultant; Simon Fraser UniversityDisasters and the Information Technology RevolutionDisastersDisasters305-334214199703613666065 Provider: OCLCView Full Text in PDF format (ECO)Availability: FirstSearch indicates your institution subscribes to this publication. Libraries worldwide that own item: 190 UNIV OF N TEXAS Search the catalog at UNT LibrariesLocal HoldingsInformation: vol: 1- 1977- (Stephenson and Anderson, 1997). IS should therefore more aggressively address the possible negative impacts of the IT on disaster planning and research. Joys speculations that humans may fall victim to their own technology  ADDIN EN.CITE Joy200066766717Joy, BillWhy the future doesn't need usWiredWired842000Joy200066766717Joy, BillWhy the future doesn't need usWiredWired842000(2000) is worthy of deeper investigation, as is Mesthenes opinion that humans technical prowess always seems to run ahead of his ability to deal with and profit from it. EM researcher, Quarantelli  ADDIN EN.CITE Quarantelli19977250965356207306bc1 Provider: OCLC72517E. L. QuarantelliResearch Professor in the Disaster Research Center, University of Delaware, Newark, Delaware, USAProblematical aspects of the information\ communication revolution for disaster planning and research: ten non-technical issues and questionsDisaster Prevention and ManagementDisaster Prevention and Management9462Computer disastersDisaster managementInformation systemsInformation technologycoordination19970965356207306bc1 Provider: OCLCView Full Text in PDF format (ECO)Availability: FirstSearch indicates your institution subscribes to this publication. Libraries worldwide that own item: 42 UNIV OF N TEXAS Search the catalog at UNT LibrariesLocal HoldingsInformation: vol: 1- 1992-Quarantelli19977250965356207306bc1 Provider: OCLC72517E. L. QuarantelliResearch Professor in the Disaster Research Center, University of Delaware, Newark, Delaware, USAProblematical aspects of the information\ communication revolution for disaster planning and research: ten non-technical issues and questionsDisaster Prevention and ManagementDisaster Prevention and Management9462Computer disastersDisaster managementInformation systemsInformation technologycoordination19970965356207306bc1 Provider: OCLCView Full Text in PDF format (ECO)Availability: FirstSearch indicates your institution subscribes to this publication. Libraries worldwide that own item: 42 UNIV OF N TEXAS Search the catalog at UNT LibrariesLocal HoldingsInformation: vol: 1- 1992-(1997) raises provocative questions addressing the implementation of IT without preliminary, robust testing. He asserts that the information/communication revolution has at least ten inadvertent liabilities for disaster planning and management. These areas warrant intensive attention. How can we claim to mitigate disasters if the very methods we use exacerbate them? Quarantelli inspires many information-related suspicions. If IT provides all persons possible with IT that connects them to disasters, will they be helpful or, as untrained professionals, become additional hazards preventing the trained professionals from doing their jobs? Will the new IT provide too many choices for technology? or too much information? or lose information or be so dynamic that the information is outdated the second it is transferred? Will the hackers and cyber-terrorists be as updated as the legitimate IT providers? Will messages lose the richness only found in face-to-face communication? Will the addition of Web-like platforms impede typically hierarchical information flow? Will fad-like methods for dealing with disasters spread across the Internet before they can be tested? Will safety and ergonomic guidelines be realized before possibly hazardous IT is implemented? Will the increase of IT, and its computer representations, increase the likelihood of even more computer-system related disasters? These questions emphasize the need for more research regarding new technology use with information disasters and disaster information. Studies should focus on disaster warning communication systems, disaster mitigation for information systems, and knowledge management for information disaster preparedness. 9/11 left many businesses devoid of information that was critical to their daily operations. Massive destruction obliterated electronic and hard copy client lists, sales records, billing information, and contracts. Neither sophisticated IT nor well-developed disaster recovery plans could prepare organizations for the permanent loss of knowledgeknowledge recorded on paper, electronically, and in the minds of the victims who lost their lives. IS/EM collaboration should thus focus on several aspects of disaster information flow including EM team problem-solving and decision-making; communications interoperabilityboth humanly and artificially produced at the local, state, national, and international levels; sensitive and/or vital information sharing among governmental entities, and the problematic aspects of the information/communication revolution as introduced by Quarantelli  ADDIN EN.CITE Quarantelli19977250965356207306bc1 Provider: OCLC72517E. L. QuarantelliResearch Professor in the Disaster Research Center, University of Delaware, Newark, Delaware, USAProblematical aspects of the information\ communication revolution for disaster planning and research: ten non-technical issues and questionsDisaster Prevention and ManagementDisaster Prevention and Management9462Computer disastersDisaster managementInformation systemsInformation technologycoordination19970965356207306bc1 Provider: OCLCView Full Text in PDF format (ECO)Availability: FirstSearch indicates your institution subscribes to this publication. Libraries worldwide that own item: 42 UNIV OF N TEXAS Search the catalog at UNT LibrariesLocal HoldingsInformation: vol: 1- 1992-Quarantelli19977250965356207306bc1 Provider: OCLC72517E. L. QuarantelliResearch Professor in the Disaster Research Center, University of Delaware, Newark, Delaware, USAProblematical aspects of the information\ communication revolution for disaster planning and research: ten non-technical issues and questionsDisaster Prevention and ManagementDisaster Prevention and Management9462Computer disastersDisaster managementInformation systemsInformation technologycoordination19970965356207306bc1 Provider: OCLCView Full Text in PDF format (ECO)Availability: FirstSearch indicates your institution subscribes to this publication. Libraries worldwide that own item: 42 UNIV OF N TEXAS Search the catalog at UNT LibrariesLocal HoldingsInformation: vol: 1- 1992-(1997). Also imperative is the convergence of disciplines in the research of the elusive concept of vulnerability (McEntire, David A., 2004). Theoretical integration of IS and EM in these and other areas can only serve to improve all phases of disaster management from preparedness to response to recovery to mitigation. Conclusion Two distinct problems are evident in both IS and EM researchinformation disasters and the flow of disaster information. The impact of these problems demands extensive studies, however, the duality of the problemsinformation and disastersdemands integrated studies. Vannevar Bush emphasized the need for integration among disciplines when he bemoaned the growing mountain of research as studies became more diverse. He also felt that investigators were staggered by the findings and conclusions of thousands of other workers with no time to grasp, much less to remember other researchers contributions. The events of 9/11 instigated a revival of Vannevar Bushs challenge to launch the massive task of making more accessible a bewildering store of knowledge  ADDIN EN.CITE Bush1945424217Vannevar BushAs we may thinkAtlantic MonthlyAtlantic Monthly101-108176July1945(Bush, V., 1945a). Bushs 60-year-old recommendation is surprisingly similar to a recommendation by the 9/11 Commission in its 2004 report to the nation. The U.S. government has access to a vast amount of information. But it has a weak system for processing and using what it has. The system of need to know should be replaced by a system of need to share"  ADDIN EN.CITE The 9/11 Commission200473873827The 9/11 Commission,Final report of the National Commission on Terrorist Attacks upon the United StatesExecutive Summary5852004August 21, 2004Washington, D.C.US Governmenthttp://a257.g.akamaitech.net/7/257/2422/22jul20041147/www.gpoaccess.gov/911/pdf/execsummary.pdfThe 9/11 Commission200473873827The 9/11 Commission,Final report of the National Commission on Terrorist Attacks upon the United StatesExecutive Summary5852004August 21, 2004Washington, D.C.US Governmenthttp://a257.g.akamaitech.net/7/257/2422/22jul20041147/www.gpoaccess.gov/911/pdf/execsummary.pdf(The 9/11 Commission, 2004). The need to share information among disciplines and governments cannot be met by IS or EM alone. Integrated research is vital to minimize the vulnerabilities to information disasters and consequently diminish disasters inherent disruptions to life. Integrated research is also vital to maximize the effectiveness of disaster information flow among EM organizations and thereby facilitate the preservation of life. Possible repercussions from information disasters and ineffective disaster information flow necessitate the integration of IS and EM. The stability and survival of lives may depend on it. References  ADDIN EN.REFLIST Alge, B.J., C. Wiethoff, and H.J. Klein. (2003). When does the medium matter? Knowledge-building experiences and opportunities in decision-making teams. Organizational Behavior and Human Decision Processes, 91(1), 26-37. Allen, N. and J. Meyer. (1990). Organizational socialization tactics: A longitudinal analysis of links to newcomer's commitment and role orientation. Academy of Management Journal, 33(4), 847-858. Anderson, C., B. Riddle, and M. Martin. (1999). Socialization processes in groups. In L. Frey (Ed.), The handbook of group communication theory & research (pp. 139-163). Arrow, H., M. Poole, K.B. Henry, S. Wheelan, and R. Moreland. (2004). Time, change, and development the temporal perspective on groups. Small Group Research, 35(1), 73-105. Bales, R. (1950). Interaction process analysis: A method for the study of small groups. Cambridge, MA: Addison-Wesley. Bales, R. (1999). Social interaction systems: Theory and measurement. New Brunswick, NJ: Transaction Publishers. Balthazard, P., R.E. Potter, and J. Warren. (2004). Expertise, extraversion and group interaction styles as performance indicators in virtual teams: How do perceptions of it's performance get formed? ACM SIGMIS Database, 35(1), 41-64. Bates, M.J. (1999). The invisible substrate of information science. Journal of the American Society for Information Science, 50(12), 1043. Batzler, L. (2002 November 3). Industry's emerging role in homeland defense. Government Computer News. Retrieved April 10, 2005 from  HYPERLINK "http://www.gcn.com/vol1_no1/daily-updates/20485-1.html" http://www.gcn.com/vol1_no1/daily-updates/20485-1.html Belkin, N.J. and S.E. Robertson. (1976). Information science and the phenomenon of information. Journal of the American Society for Information Science (pre-1986), 27(4), 197-204. Benbunan-Ficha, R., S.R. Hiltz, and M. Turoff. (2003). A comparative content analysis of face-to-face vs. Asynchronous group decision making. Decision Support Systems, 34(4), 457-469. Bolger, L. (2003). Scared or prepared? Disaster planning makes the difference. Information Outlook, 7(7), 25-31. Bonito, J. (2002). The analysis of participation in small groups: Methodological and conceptual issues related to interdependence. Small Group Research, 33(4), 412-438. Borko, H. (1968). Information science: What is it? American Documentation (pre-1986), 19(1), 3. Bormann, E. (1982). The symbolic convergence theory of communication: Applications and implications for teachers and consultants. Journal of Applied Communication Research, 10(1), 50-61. Brilhart, J. (1978). Effective group discussion. Dubuque, IA: Brown. Brown, T. and C. Miller. (2000). Communication networks in task-performing groups: Effects of task complexity, time pressure, and interpersonal dominance. Small Group Research, 31(2), 131-157. Buckland, M. (1991). Information as thing. Journal of the American Society for Information Science (1986-1998), 42(5), 351. Buckland, M. and Z. Liu. (1998). History of information science. In T. B. Hahn & M. K. Buckland (Eds.), Historical studies in information science (pp. 272-295). Medford, NJ: Information Today, Inc. Burkhalter, S., J. Gastil, and T. Kelshaw. (2002). A conceptual definition and theoretical model of public deliberation in small face-to-face groups. Communication Theory, 12(4), 398-422. Burlando, T. (1994). Chaos and risk management. Risk Management, 4, 54-61. Bush, G.W. (2002). Department of homeland security. Washington, D.C.: The White House. Bush, V. (1945a). As we may think. Atlantic Monthly, 176(July), 101-108. Bush, V. (1945b). Science the endless frontier. Retrieved from  HYPERLINK "http://www.nsf.gov/about/history/vbush1945.htm" http://www.nsf.gov/about/history/vbush1945.htm Case, D.O. (2002). Looking for informaton: A survey of research on information seeking, needs, and behavior. London: Academic Press. Chapman, J. (2005). Predicting technological disasters: Mission impossible? Disaster Prevention and Management: An International Journal 14, no. 3. Chen, Z. and R. Lawson. (1996). Groupthink: Deciding with the leader and the devil. Psychological Record, 46(4), 581-591. Chernyshenko, O.S., A.G. Miner, M.R. Baumann, and J.A. Sniezek. (2003). The impact of information distribution, ownership, and discussion on group member judgment: The differential cue weighting model. Organizational Behavior and Human Decision Processes, 91(1), 12-25. Chesser, P. (2005). eHistory.com. Retrieved July 31, 2005, from Ohio State University Web site:  HYPERLINK "http://ehistory.osu.edu/world/articles/ArticleView.cfm?AID=9" http://ehistory.osu.edu/world/articles/ArticleView.cfm?AID=9 Cleveland, H. (1982). Information as a resource. The Futurist, 16(December), 34-39. Comfort, L.K. (2005). Risk, security, and disaster management. Annual Review of Political Science, 8(1), 335-356. Condon, E., B. Golden, and E. Wasil. (2003). Visualizing group decisions in the analytic hierarchy process. Computers & Operations Research, 30(10), 1435-1445. Dasgupta, S. (2003). The role of controlled and dynamic process environments in group decision making: An exploratory study. Simulation & Gaming, 34(54-69). Dewey, J. (1910). How we think. Boston: Houghton Miflin Company. DHS Press Office. (2003). Department of homeland security. Fact Sheet: Safety Act - Partnering With American Entrepreneurs in Developing New Technologies to Protect the Homeland. Retrieved from  HYPERLINK "http://www.dhs.gov/dhspublic/interapp/press_release/press_release_0439.xml" http://www.dhs.gov/dhspublic/interapp/press_release/press_release_0439.xml DHS Press Office. (2004). Department of homeland security. Department of Homeland Security Implements Information Exchange System for G-8 Summit Events. Retrieved from  HYPERLINK "http://www.dhs.gov/dhspublic/display?content=3649" http://www.dhs.gov/dhspublic/display?content=3649 DiMattia, S.S. (2001). Planning for continuity. Library Journal, 126(19), 32. Dizard, W.P. (12/13/04). Final intelligence reform bill stresses data sharing. Government Computer News. Retrieved April 14, 2005 from  HYPERLINK "http://www.gcn.com/23_34/news/28097-1.html" http://www.gcn.com/23_34/news/28097-1.html Dory, A.J. (2003-04). American civil society: The U.S. Public and homeland security. The Washington Quarterly, 27(1), 37-52. Drabek, T.E. (1986). Human system responses to disaster: An inventory of sociological findings. New York: Springer-Verlag. Drabek, T.E. and D.A. McEntire. (2003). Emergent phenomena and the sociology of disaster: Lessons, trends and opportunities from the research literature. Disaster Prevention and Management: An International Journal 12, no. 2. Drucker, J. (1995). The alphabetic labyrinth: The letters in history and imagination, London. Dugan, R.E. (2001). Book reviews. Journal of Academic Librarianship, 27(1), 61. Ellis, D.G. and B.A. Fisher. (1994). Small group decision making: Communication and the group process (4th ed.). New York: McGraw-Hill. Erskine, A. (1995). Culture and power in ptolemaic Egypt: The museum and Library of Alexandria. Greece & Rome, 42(1), 38-48. ESRI. (2004). Environmental systems research institute news release. RAINS announces open specification for sensitive information sharing across state/local/national homeland security systems. Retrieved from  HYPERLINK "http://www.esri.com/common/rains/news.html" http://www.esri.com/common/rains/news.html Fisher, A. (1974). Small group decision making. New York: McGraw-Hill. Fisher, D. (2004, March 29). National security spec advances. eWeek. Retrieved November 4, 2004 from  HYPERLINK "http://www.eweek.com/article2/0,1759,1555316,00.asp" http://www.eweek.com/article2/0,1759,1555316,00.asp Gouran, D. (1999). Communication in groups: The emergence and evolution of a field of study. In L. Frey (Ed.), The handbook of group communication theory & research (pp. 3-36). Thousands Oaks, CA: Sage. Gouran, D. (2003a). Communication skills for group decision making. In J. O. Greene & B. R. Burleson (Eds.), Handbook of communication and social interaction skills. Mahwah, NJ: Lawrence Erlbaum Associates. Gouran, D.S. (2003b). Communication skills for group decision making. In J. O. Greene & B. R. Burleson (Eds.), Handbook of communication and social interaction skills. Mahwah, NJ: Lawrence Erlbaum Associates. Hare, A.P. (1962). Handbook of small group research (2nd ed.). New York: Collier Macmillan. Hare, A.P. (2003). Roles, relationships, and groups in organizations: Some conclusions and recommendations. Small Group Research, 34(2), 123-154. Harris, T. and J. Sherblom. (2002). Small group and team communication (2nd ed.). Boston: Allyn & Bacon. Hartley, P. (1997). Group communication. London and New York: Routledge. Heller-Roazen, D. (2002). Tradition's destruction: On the Library of Alexandria. October(100), 133. Jackson, W. (2004, March 29). Coalition has specs for secure data-sharing. Washington Technology. Retrieved November 6, 2004 from  HYPERLINK "http://www.wtonline.com/news/1_1/state/23116-1.html" http://www.wtonline.com/news/1_1/state/23116-1.html Jaeger, P.T., J.C. Bertot, and C.R. McClure. (2003). The impact of the USA patriot act on collection and analysis of personal information under the foreign intelligence surveillance act. Government Information Quarterly, 20(3), 295. Janis, I.L. (1982). Groupthink: Psychological studies of policy decisions and fiascoes (2nd ed.). Boston: Houghton Mifflin. Jetten, J., t. Postmes, and B. McAuliffe. (2002). 'we're all individuals': Group norms of individualism and collectivism, levels of identification and identity threat. European Journal of Social Psychology, 32, 189-207. Joy, B. (2000). Why the future doesn't need us. Wired, 8(4). Kelly, J.R. and T.J. Loving. (2004). Time pressure and group performance: Exploring underlying processes in the attentional focus model. of Experimental Social Psychology, 40(2), 185-198. Keyton, J. (1999). Relational communication in groups. In L. Frey (Ed.), The handbook of group communication theory & research (pp. 192-224). Thousand Oaks, CA: Sage. Lester, S.W., K.J. Ready, T.J. Hostager, and M. Bergmann. (2003). The human side of group support systems: Influences on satisfaction and effectiveness. Journal of Managerial Issues, 15(3), 317-337. Lewin, K., R. Lippitt, and R. White. (1939). Patterns of aggressive behavior in experimentally created "social climates". Journal of Social Psychology, 10, 271-299. Mabry, E. (1999). The systems metaphor in group communication. In L. Frey (Ed.), The handbook of group communication theory & research (pp. 71-91). Thousand Oaks, CA: Sage. Machlup, F. and U. Mansfield. (1983). The study of information: Interdisciplinary messages. New York: John Wiley & Sons. Martin, R., A. Gardikiotis, and M. Hewstone. (2002). Level of consensus and majority and minority influence. European Journal of Social Psychology, 32, 645-665. McDaniel, R. (1997). Strategic leadership: A view from quantum and chaos theories. Health Care Management Review, 22(1), 21-37. McEntire, D.A. (2004a). Development, disasters and vulnerability: A discussion of divergent theories and the need for their integration. Disaster Prevention and Management: An International Journal 13, no. 3. McEntire, D.A. (2004b). The status of emergency management theory: Issues, barriers, and recommendations for improved scholarship. Paper presented at the FEMA Higher Education Conference, Emmitsburg, MD. McGrath, J.E., H. Arrow, and J.L. Berdahl. (2000). The study of groups: Past, present, and future. Personality and Social Psychology Review, 4(1), 95-105. Mena, J.s. (2004). Homeland security as catalyst., Intelligent Enterprise (Vol. 7, pp. 28-33): CMP Media LLC. Meyers, R. and D. Brashers. (1999). Influence processes in group interaction. In L. Frey (Ed) (Ed.), The handbook of group communication theory & research. Thousand Oaks, CA: Sage. Moon, H., D.E. Conlonb, S.E. Humphrey, N. Quigley, C.E. Devers, and J.M. Nowakowski. (2003). Group decision process and incrementalism in organizational decision making. Organizational Behavior and Human Decision Processes, 92(1-2), 67-79. Morillo, F. and M.B.I. Gmez. (2003). Interdisciplinarity in science: A tentative typology of disciplines and research areas. Journal of the American Society for Information Science and Technology, 54(13), 1237-1249. Muir, A. and S. Shenton. (2002). If the worst happens: The use and effectiveness of disaster plans in libraries and archives. Library Management, 23(3), 115. NCLIS. (2002). Trust and terror: A proposal of the national commission on libraries and information science (nclis) to expand the role of U.S. Libraries in crisis information dissemination and management. Retrieved July 29, 2005 from  HYPERLINK "http://www.nclis.gov/info/trust/TrustandTerror.brochure.English.IFLA.pdf" http://www.nclis.gov/info/trust/TrustandTerror.brochure.English.IFLA.pdf O'Connor, B., J. Copeland, and J. Kearns. (2003). Hunting and gathering on the information savanna: Conversations on modeling human search abilities. Lanham, MD: Scarecrow Press, Inc. Oetzel, J. (2001). Self-construals, communication processes, and group outcomes in homogenous and heterogeneous groups. Small Group Research, 32(1), 19-54. Office of the Press Secretary. (2004). The white house. President Signs Intelligence Reform and Terrorism Prevention Act. Retrieved from  HYPERLINK "http://www.whitehouse.gov/news/releases/2004/12/20041217-1.html" http://www.whitehouse.gov/news/releases/2004/12/20041217-1.html Onley, D.S. (2002 September 11). Better communications could have saved lives, homeland official says. Government Computer News. Retrieved April 3, 2002 from  HYPERLINK "http://www.gcn.com/vol1_no1/daily-updates/19977-1.html" http://www.gcn.com/vol1_no1/daily-updates/19977-1.html Park, W.-W. (2000). A comprehensive empirical investigation of the relationships among variables of the groupthink model. Journal of Organizational Behavior, 21, 873-887. Poole, M. (1985). Group decision-making as a structurational process. Quarterly Journal of Speech, 71(1), 74-102. Poole, M. (1991). Procedures for managing meetings: Social and technological innovation. In R. A. Swanson & B. O. Knap (Eds.), Innovative meeting management (pp. 53-109). Austin, TX: 3M Meeting Management Institute. Poole, M. (2004). Interdisciplinary perspectives on small groups. Small Group Research, 35(1), 3-16. Prekop, P. (2002). A qualitative study of collaborative information seeking. Journal of Documentation, 58(5), 533-547. Propp, K. (1999). Collective information processing. In L. Frey (Ed.), The handbook of group communication theory & research (pp. 225-250). Thousand Oaks, CA: Sage. Putnam, L. and C. Stohl. (1990). Bona fide groups: A reconceptualization of groups in context. Communication Studies, 41, 248-265. Quarantelli, E.L. (1997). Problematical aspects of the information\ communication revolution for disaster planning and research: Ten non-technical issues and questions. Disaster Prevention and Management, 6(2), 94. RAINS-Gauge. (2004, April 8). Spotlight on rains open specification. The RAINS-Gauge. Retrieved November 5, 2004 from  HYPERLINK "http://www.rainsnet.org/press/newsletter_vol2_special.asp" http://www.rainsnet.org/press/newsletter_vol2_special.asp RAINS. (2004). Open specification. Open spec based on proven program. Regional Alliances for Infrastructure and Network Security (RAINS). Retrieved from  HYPERLINK "http://www.rainsnet.org/programs/open_spec.asp" http://www.rainsnet.org/programs/open_spec.asp Ratzan, L. (2004). Understanding information systems: What they do and why we need them. Chicago: American Library Association. Repo, A. (1983). The dual approach to the value of information: An appraisal of use and exchange values. Information Processing and Management, 22(5), 373-383. Riley, B. (9/10/2003). Information sharing in homeland security and homeland defense: How the department of defense is helping. Journal of Homeland Security. Retrieved April 4, 2005 from  HYPERLINK "http://www.homelandsecurity.org/journal/articles/displayArticle.asp?article=97" http://www.homelandsecurity.org/journal/articles/displayArticle.asp?article=97 Robinson, B. (2003, April 2). Rains showcases secure info. FCW.com. Retrieved November 12, 2004 from  HYPERLINK "http://www.fcw.com/geb/articles/2003/0331/web-oregon-04-02-03.asp" http://www.fcw.com/geb/articles/2003/0331/web-oregon-04-02-03.asp Robinson, B. (2004, October 7). Oregon pushes for dhs dollars. FCW.com. Retrieved November 12, 2004 from  HYPERLINK "http://www.fcw.com/geb/articles/2003/1006/web-rains-10-07-03.asp" http://www.fcw.com/geb/articles/2003/1006/web-rains-10-07-03.asp Ruben, B.D. (1992). The communication-information relationship in system-theoretic perspective. Journal of the American Society for Information Science (1986-1998), 43(1), 15. Ruyle, C.J. and E.M. Schobernd. (1997). Disaster recovery without the disaster. Technical Services Quarterly, 14(4), 13. Saracevic, T. (1999). Information science. Journal of the American Society for Information Science, 50(12), 1051-1063. Sell, J., M. Lovaglia, E. Mannix, C. Samuelson, and R. Wilson. (2004). Investigating conflict, power, and status within and among groups. Small Group Research, 35(1), 44-72. Shannon, C. and W. Weaver. (1948). The mathematical theory of communication. Chicago: University of Illinois Press. Shaw, G.L. (2005). Business crisis and continuity management. In D. A. McEntire (Ed.), Disciplines and disasters. Emmitsburg, MD: Emergency Management Institute. Sillince, J.A. (2000). Rhetorical power, accountability and conflict in committees: An argumentation approach. Journal of Management Studies, 37(8), 1125-1156. Slezak, S.L.K., Naveen. (2000). The effect of organizational form on information flow and decision quality: Informational cascades in group decision making. Journal of Economics & Management Strategy, 9(1), 115-156. Sosik, J. and D. Jung. (2002). Work-group characteristics and performance in collectivistic and individualistic cultures. The Journal of Social Psychology, 142(1), 5-23. Stephenson, R. and P.S. Anderson. (1997). Disasters and the information technology revolution. Disasters, 21(4), 305-334. Sunwolf and D. Seibold. (1999). The impact of formal procedures on group processes, members, and task outcomes. In L. Frey (Ed) (Ed.), The handbook of group communication theory & research. Tennant, R. (2001). Coping with disasters. Library Journal, 126(19). The 9/11 Commission. (2004). Final report of the national commission on terrorist attacks upon the United States. Washington, D.C.: US Government. Totten, H.L. (2005). Libraries and education. In T. Pipes (Ed.). Denton, TX. United States Department of Homeland Security. (2005). Dhs organization. Priorities for Second Year. Retrieved from  HYPERLINK "http://www.dhs.gov/dhspublic/display?theme=10&content=3240" http://www.dhs.gov/dhspublic/display?theme=10&content=3240 Vickery, B.C. and A. Vickery. (1987). Information science in theory and practice. London: Butterworths. Webber, S. (2003). Information science in 2003: A critique. Journal of Information Science, 29(4), 311-330. Weitzel, A. and P. Geist. (1998). Parliamentary procedure in a community group: Communication and vigilant decision making. Communication Monographs, 65(9), 244-259. Wersig, G. and U. Nevelling. (1975). The phenomena of interest to information science. Information Scientist, 9, 127-140. What's next? (2004). New security specification targets government. Processor, 26(17), 23. Wilkinson, I.A.G. and I.Y.Y. Fung. (2002). Small-group composition and peer effects. International Journal of Educational Research, 37, 425447. Williams, W.W. (2000). Library disaster planning and recovery handbook (book review). Library Journal, 125(11), 123. Wittenbaum, G., A. Hollingshead, P. Paulus, R. Hirokawa, D. Ancona, R. Peterson, et al. (2004). The functional perspective as a lens for understanding groups. Small Group Research, 35(1), 17-43.  Appendix A Some Problems Studied Within Information SciencesSubject Area and ProblemsContributions to Research with Applications to EMCognitive Science: expert systems; knowledge bases; hypertext; human-computer interaction Artificial Intelligence: software to emulate human intelligence Semiotics: Signs, both individually and grouped in sign systems, and includes the study of how meaning is transmitted and understoodhuman factors (ergonomics); robot studies vulnerability analysis intelligence agency communications interoperability; cyber-terrorism; information warfareCommunications: Information flow (information sending, receiving), and information sharing Cybernetics: communication, feedback, and control mechanisms in living systems and machines Telecommunications: Distance electronic information exchange Systemics: Relationships of systemstransactions, processes, inputs, outputs, especially information/communication systemsdefense simulation; telemedicine decision systems; online database systems and related telecommunications and networking technologies; specialized search functionalities; large machine-readable databases for the dissemination and graphic representation of disaster-related information; GIS (Geographical Information Systems); CAMEO (Computer-Aided Management of Emergency Operations) ALOHA (Area Location of Hazardous Atmospheres); ETeam (manages every phase of a crisis) Computer Science: manipulation and storage of document records in electronic information storage, processing, and retrieval systems; information management; databasescomputer hardware and software to manipulate documents and document records for emergency, disaster, and crisis information storage and retrieval systemsInformation Science: information behavior, information processing, information retrieval, information storage, information dissemination user information seeking, needs, preferencesrelevance and utility assessment development of standards for processing and communication of information; monitoring of the national information infrastructure (human, technological, materials and financial) to ensure maintenance of information systems and services related to the public interest protocols (procedures) for informationLibrary Science: Acquisition, cataloging, classification, and preservation of information Bibliometrics: All quantitative aspects and models of communication, storage, dissemination and retrieval of scientific information Citation analysis: Citation frequency and patterns in scientific journals article citations; implications for how and where an authors work is subsequently cited Co-citation analysis: Literature coherence and changes over a period of time; maps oeuvres and their authors relationship to other oeuvres and authors Content analysis: Thesauri and frequency of terms, co-word/co-authorship/co-citation analysis for interdisciplinarity purposes Cybermetrics: Quantitative aspects of the construction and use of information resources, structures and technologies on the whole Internet drawing on bibliometric and informetric approaches Informetrics: Quantitative aspects of information in any form, not just records or bibliographies, and in any social group, not just scientists Webometrics: Quantitative aspects of the construction and use of information resources, structures and technologies on the Web draws on bibliometric and informetric approaches holdings of past research study of all published literature and its usage in all disciplines to ensure scholarly productivity and communication in disaster research indexing, citation indexing, keyword indexing, text analysis and natural language searching systems to aid researchers and practitioners in the finding of information vital to disaster situations extensive development of these sub-disciplines and specialties to aid researchers interested in investigating interdisciplinarity formal logic (Boolean operators AND, OR, and NOT) to improve database searching formulation of national information policies related to issues of privacy, security, regulating dissemination, access, intellectual property, acceptable use concept of library as an unbiased holder of all information regardless of content, political or moral implications Appendix B Librarianship and Information Librarianship typically protects and preserves recorded information, as well as advocates the rights and privacy of the information of American citizens. Public libraries and universities lobby for changes in law to benefit personal information rights of individuals. Librarians and educatorsmany who consider the violation of privacy of information rights to be disastroushave been at the forefront of the fight for information privacy for a couple of centuries. Many support the First, Fourth, and Fifth Amendments from the 1791 Bill of Rights, quote Warren and Brandeis renowned 1890 article, The Right to Privacy and uphold the Freedom of Information Act (1966), the Federal Privacy Act of 1974, and the Electronic Privacy Act of 1986 where Congress realized the need to protect private citizen records collected by the government. The Bill of Rights The  HYPERLINK "javascript:doWindowOpen('http://www.law.cornell.edu/constitution/constitution.billofrights.html','new_frame','width=600,height=420,menubar=1,toolbar=1,scrollbars=1,status=1,location=1,resizable=1,resizable=1',0)" Bill of Rights was passed by the United States Congress on September 25, 1789. However more than a century would pass before the judicial branch recognized and implemented the right to privacy implications stated in the  HYPERLINK "javascript:doWindowOpen('/SCRIPT/SLIS_LIBRARY_PRIVACY/scripts/student/serve_page.pl?1050598725+History/History.htm+OFF+Glossary/first.htm+','new_frame','width=600,height=420,menubar=1,toolbar=1,scrollbars=1,status=1,location=1,resizable=1,resizable=1',0)" First,  HYPERLINK "javascript:doWindowOpen('/SCRIPT/SLIS_LIBRARY_PRIVACY/scripts/student/serve_page.pl?1050598725+History/History.htm+OFF+Glossary/fourth.htm+','new_frame','width=600,height=420,menubar=1,toolbar=1,scrollbars=1,status=1,location=1,resizable=1,resizable=1',0)" Fourth, and  HYPERLINK "javascript:doWindowOpen('/SCRIPT/SLIS_LIBRARY_PRIVACY/scripts/student/serve_page.pl?1050598725+History/History.htm+OFF+Glossary/fifth.htm+','new_frame','width=600,height=420,menubar=1,toolbar=1,scrollbars=1,status=1,location=1,resizable=1,resizable=1',0)" Fifth Amendments. The First amendment addresses the right to privacy by giving citizens the freedom of speech, interpreted by law to mean that citizens have the freedom to express their thoughts, views, and preferences without fear of retribution. The Fourth Amendment protects citizens privacy by ensuring that their personal possessions are not searched or seized without warning and without probable cause. The Fifth Amendment protects citizens private property from seizure for public use. The Right to Privacy Warren and Brandeis introduced the idea that people have the freedom and right, as American citizens, to expect that not only their tangible possessions, but also their  HYPERLINK "javascript:doWindowOpen('/SCRIPT/SLIS_LIBRARY_PRIVACY/scripts/student/serve_page.pl?1050598725+History/History.htm+OFF+Glossary/intangible.htm+','new_frame','width=600,height=420,menubar=1,toolbar=1,scrollbars=1,status=1,location=1,resizable=1,resizable=1',0)" intangible personal informationwhat they think, believe, say, and readto be safe from public intrusion. If citizens disclose their thoughts in a private place, they have the expectation that their private thoughts, their private information remains in that private place. Freedom of Information Act (1966) The FOIA was enacted to allow persons to request access to federal agency records or information. In response to the FOIA, states adopted their own open records acts governing public access to state and local records. However, exceptions were made in most states, including Texas, to protect the confidentiality of library user records. In 1973, Texas enacted the Texas Open Records Act, later to be revised as the Texas Public Information Act of 1995 (The Act). The Act allowed the public access to all government entity records, except for records containing personal information about individuals. Library recordswhich includes database search records; circulation records; interlibrary loan records; other personally identifiable uses of library materials, facilities, programs or services; and information obtained in reference interviewswere exempt from disclosure except under certain circumstances.Before the USA PATRIOT Act, American citizens were free to walk into a library, pick out a magazine, sit down and read, and walk out again without anyone knowing who they are, where they live, or what they chose to read. These freedoms were understood unless a court issued a subpoena showing probable cause that the disclosure of their records was necessary to protect the public safety; the record was evidence of a crime; or the record was evidence against a particular person who committed a crime. Federal Privacy Act of 1974 The FOIA allowed access to government-held records. Some government-held records contained confidential information about individuals. Congress passed the Privacy Act in 1974 to ensure the protection of individual privacy from data collected by the government. The law allows individuals to view, copy, and correct their own records. It also prevents agencies from sharing data. Electronic Privacy Act of 1986 The Electronic Communications Privacy Act of 1986 (ECPA) updated wiretapping laws for digital communications. It banned the capture of communications between network points -- it protected electronic communications while they are en route. However, in 1996, the FBI urged Congress to pass the Communications Assistance for Law Enforcement Act of 1994 (Digital Telephony Act), a law that forces telecommunications carriers to design their systems so that law enforcement agencies can tap into them if necessary. Librarianship and Online Information Librarians also face decisions regarding library patrons information privacy on the Internet. Threats to online information include the USA PATRIOT Act, NOTEREF _Ref112405872 \h  \* MERGEFORMAT 3 cookies, COPPA, and CIPA. Cookies Library users activities can be tracked using tiny text files, called cookies. Because cookies reveal where users visit, when they visit, how long they stay, what links they click, what purchases they make, and any preferences they may have set during the session, most libraries find it unethical to retain permanently the information saved in cookies. Children's Online Privacy Protection Act (COPPA) (2000) The Children's Online Privacy Protection Act (COPPA), went into effect April 21, 2000 (Federal 1999). COPPA requires that commercial Web sites must have documented parental consent to collect personally identifiable information (including an e-mail address) from children (COPPA 2002). However, this law does not mean that librarians must reveal to a parent what a child views on the Internet, or even what a child reads. Children's Internet Protection Act (CIPA) (2000) The Children's Internet Protection Act (CIPA) is a law passed by the federal government in December, 2000 to speak to concerns regarding children's access to the Internet from schools and libraries. CIPA requires that institutions that receive federal E-Rate or Library Services and Technology Act (LSTA) funds) filter all of its Internet terminals to block access to sites defined as obscene, child pornography, or harmful to minors. The American Library Association challenged the law in a Philadelphia district court in May 2002. The court ruled that CIPA violated first amendment rights of library users, however, the government appealed the decision. On June 23, 2003, the U.S. Supreme Court reversed the lower court decision and upheld CIPA ruling that CIPA does not violate the First Amendment. Appendix C McEntires disaster equation for informationExample problemsVulnerability+Hazard (Triggering Agent)=DisasterUnsealed storage roomUncovered, unwrapped physical archives +Terrorism/Vandalism=Damaged or destroyed books, artifacts, other historically significant objectsHeating/air conditioning failureFlood, tornado, hurricane, earthquake, etc.Novice userUnprotected or unduplicated files+User error: unintentional pressing of delete key=Loss or change of important document(s), No virus protectionVirus attack=Loss or damage of important documentsVague file security policyUnauthorized user access=information leakage, theft of sensitive or private informationNo/inferior firewallHacking=Stolen identity, credit information theft Faulty wiringPower failure/surge=Loss or damage of important documentsPoor ventilationHeating/ air conditioning/ failure=Loss or damage to: documents; software; hardwareHaphazard attitude toward warning systemsFailed/thwarted warning system +Cyberterrorism (using computer networks in the service of terrorism)=Destruction and death from terrorist actsAdversaries to information holdersSystems holding sensitive information+Information warfare=Propaganda causing destruction: denial of vital information; reception of false informationAmbiguous Information/knowledge policies/lawsCultural differences +Cultural power struggles=Limitation of human and/or artificial knowledge (databases); inventory listsAmbiguous/absent document/information sharing standards Communication inoperability+Power failure/surge as a result natural hazard; terrorism; information security regulations=Missing, inaccurate withheld, or selective informationInformation scarcity (i.e., Digital Divide)No/limited access to information warning systemsSections 215 and 216 of the USA PATRIOT ActAccessible sensitive private information+Careless or impulsive law enforcement=Breach of anonymity, autonomy, privacy rights Appendix D G.R.O.U.P. D.Y.N.A.M.I.C.S.: Major Properties of Task GroupsGoalsGroups in EM organizations are impacted by the goals throughout every phase of the disaster managements decision process. A goal is the desired final status of the situation, the consensus opinion, recommendation, or mandate  ADDIN EN.CITE Schultz199950EndNote05<style face='normal' font='default' size='100%'>Socialization processes in groups</style>(Anderson, Riddle and Martin, 1999). The intensity of an individuals commitment to the groups goal is dependent upon the ability of the members to give and receive information that will help them attain the groups goal  ADDIN EN.CITE Allen199068EndNote017<style face='normal' font='default' size='100%'>Organizational socialization tactics: A longitudinal analysis of links to newcomer's commitment and role orientation</style>(Allen and Meyer, 1990). RolesA role is a set of communicative behaviors performed by an individual and involves the behaviors performed by one member in light of the expectations that other members hold toward these behaviors  ADDIN EN.CITE Ellis19948, p. 114EndNote06<style face='normal' font='default' size='100%'>Small Group Decision Making: Communication and the Group Process</style>(Ellis and Fisher, 1994). As EM groups work out their own roles in cooperation with other team members, each member takes on a role that differentiates him or her from the other group members. A major influence on role development is the openness of the group to outside advice. Group roles form because of intergroup interaction, but more quickly identified through outside input. As open systems, outside influences not only impact the shaping of the roles, but also the shaping of the incoming and outgoing information.OpennessAlthough EM organizations are open systems, they must also draw on their systems ability to consider the integrity of the input. Propp  ADDIN EN.CITE Propp199972EndNote05<style face='normal' font='default' size='100%'>Collective Information Processing</style>(1999) sets forth this filtered input and coordinated output of information in her Distillation Model of CIP (collective information processing). CIP is a distillation process that progresses from a substantial collective knowledge base to a distilled information base that is purged of irrelevant or unsound information. A decision is then brought forth based on the final collective information. Propp describes four developmental stages in the Model: 1) individual knowledge baseknowledge that each member brings to the group concerning the task; 2) group knowledge basecollective knowledge available to a group as a whole; 3) communicated information baseinformation exchanged and shaped through group discussion; 4) final collective information baseinformation accepted and utilized by a group to come to a decision  ADDIN EN.CITE Propp199972, p. 232EndNote05<style face='normal' font='default' size='100%'>Collective Information Processing</style>(Propp, 1999).UnityThis separate identitya group within an EM organization for instance, assumes the qualities of a system. Groups, as systems, demonstrate unity in three ways: wholeness (Appendix E) , groupness, and synergy  ADDIN EN.CITE Mabry199947EndNote05<style face='normal' font='default' size='100%'>The systems metaphor in group communication</style>(Mabry, 1999) . Groupness was mentioned for the first time in 1967 by John Brilhart. Brilhart described groupness as a property only found in real groupsgroups of individuals who perceive themselves as a group. According to Brilhart, groupness evolves slowlyand is developed as the group becomes cohesive  ADDIN EN.CITE Ellis19948EndNote06<style face='normal' font='default' size='100%'>Small Group Decision Making: Communication and the Group Process</style>(Ellis and Fisher, 1994). More research could show what events or situations accelerate or decelerate the development of unity. The other aspect of unity is found in synergyfrom the Greek word sunergos, which means working together. Synergy empowers groups to make better decisions. The combination of ideas generated by brainstorming is an example of synergythe outcome is usually greater than a simple summation of individual ideas  ADDIN EN.CITE Harris200234EndNote06<style face='normal' font='default' size='100%'>Small Group and Team Communication</style>(Harris and Sherblom, 2002). Unity fosters compromise, cooperation, and consensus. Unified groups begin to adopt methods to facilitate their performance as a group: they adopt procedures to facilitate discussion, analyses, creativity, and agreement.Procedures Although formal procedures are time-consuming, there is sufficient evidence to suggest that formal discussion and problem-solving procedures improve group performance  ADDIN EN.CITE Poole19916376375M. PooleR.A. SwansonB.O. KnapProcedures for managing meetings: Social and technological innovationInnovative meeting management53-1091991Austin, TX3M Meeting Management Institute(Poole, M., 1991). Further in-depth study could determine what procedures to use for specific situations. One assumption is that the choices are largely dependent upon how culturally diverse the members are. The philosophical approach to group formation and problem solving varies between culturesand task groups like those found in EM organizations, are becoming more and more culturally diverse with the increased participation of ethnic minorities. Diversity The most significant difference among cultures is attributed to value differences between individualistic and collectivistic cultures. When working in task groups, people from individualistic Western cultures, like the United States, tend to concentrate primarily on the task dimension and secondarily on the social dimension. Conversely, people from collectivist culturesEast Asia, Latin America, and Africatend to concentrate primarily on the social dimension and secondarily on the task dimension  ADDIN EN.CITE Jetten200295EndNote017<style face='normal' font='default' size='100%'>'We're </style><style face='italic' font='default' size='100%'>all</style><style face='normal' font='default' size='100%'> individuals': group norms of individualism and collectivism, levels of identification and identity threat</style>Sosik200292EndNote017<style face='normal' font='default' size='100%'>Work-group characteristics and performance in collectivistic and individualistic cultures</style>(Jetten, Postmes and McAuliffe, 2002; Sosik and Jung, 2002). Individualistic and collectivistic values also affect group interactions and consequently, group outcomes. Individualistic members cultivate task roles early on whereas collectivistic members cultivate social roles first, however Oetzel  ADDIN EN.CITE Oetzel200193EndNote017<style face='normal' font='default' size='100%'>Self-construals, communication processes, and group outcomes in homogenous and heterogeneous groups</style>(2001) did not find that groups composed of both individualistic and collectivistic members had communication problems. Surprisingly, even in individualistic cultures like the United States, EM team members can become unusually devoted to the social dimension, particularly groups with a highly powerful or persuasive leader who encourages yea-sayingblind support of the members to every view or suggestion of the leader.Yea-sayingYea-saying, also called groupthink was outlined by Janis  ADDIN EN.CITE Janis19826136136Irving L. JanisGroupthink: Psychological studies of policy decisions and fiascoes2nd1982BostonHoughton Mifflin(1982) who believed that certain conditions were indicative of a tendency to promote the urgency of a quick consensus. Janis conditions for groupthink to occur are: cohesive decision-makers; isolated/insulated groupno external influences; members with similar backgrounds and attitudes; provocative, stressful situations and outside pressures. Although the groupthink theory has been said to lack generalizability  ADDIN EN.CITE Chen199676EndNote017<style face='normal' font='default' size='100%'>Groupthink: Deciding with the leader and the devil</style>Park200078EndNote017<style face='normal' font='default' size='100%'>A comprehensive empirical investigation of the relationships among variables of the groupthink model</style>(Chen and Lawson, 1996; Park, 2000), Janis theory has been used to entertainingly describe many U.S. presidential decision fiascoes including Roosevelts complacency before Pearl Harbor, Trumans invasion of North Korea, Kennedys Bay of Pigs failure, Johnsons escalation of the Vietnam War, and Nixons Watergate ignominy. (If Janis updated his presidential study, he might include Carters political asylum for the Shah of Iran, Reagans Iran Contra affair, Fords pardon of Nixon, George Bushs leadership in the Gulf War, Clintons approval of the Branch Davidian raid, and George W. Bushs rush into Iraq.) Now that groupthink is a relatively known term, a current study of high-profile leaders could be very enlightening. Groupthink is highly observable in EM, especially when the decisions impact nations. Equally as powerful, yet nearly invisible, are social norms, the most influential form of group control.NormsNorms are regular patterns of behavior or thinking that come to be accepted in a group as the usual way of doing things  ADDIN EN.CITE Keyton199952EndNote05<style face='normal' font='default' size='100%'>Relational communication in groups</style>(Keyton, 1999) Unlike rules, which are explicit guidelines of behavior, norms are implicit guidelines of behavior that emerge as the group evolves. These conventions, though unsaid, are powerful enough to shape group members conduct, viewpoints, and interaction. Norms become apparent early in the groups formation. They are typically developed as members observe each other and become cohesive. What is acceptable and not acceptable is just understood as group members come to know each other. Norms and rules determine how, when, and why decisions are made; they also are instrumental in whether a leader emerges from the membership or if the group members maintain equal status. The understood rules dictate how an EM team evaluates and allocates authoritya concept that suggests leadership, as well as power. AuthorityStudies show that most groups need a leader to plan meetings and empower members to carry out tasks. Leaders are also ultimately responsible for the management of conflict. So called leaderless groups usually have an unofficial leader that gradually assumes the leadership role  ADDIN EN.CITE Brown200080EndNote017<style face='normal' font='default' size='100%'>Communication networks in task-performing groups: Effects of task complexity, time pressure, and interpersonal dominance</style>Ellis19948EndNote06<style face='normal' font='default' size='100%'>Small Group Decision Making: Communication and the Group Process</style>(Brown and Miller, 2000; Ellis and Fisher, 1994) This leader emergence is evident in many groups, especially groups that must make critical decisions. Leader emergence is found to be common in emergent groups at disaster scenes. Some outstanding leaders are faced with contentious groups: groups composed of dominators, aggressors, conformists, or naysayers. Most leaders, however, find that their greatest challenge is managing members who consistently conform to majority or minority influence.Majority/minorityThe majority/minority concept discussed here does not relate to consensusit instead refers to tendencies of task group members to be influenced to conform to a majority opinion or minority opinion. Little research has been done in this area, however, studies have shown that minority dissent is many times as powerful in swaying group decision as is majority consent  ADDIN EN.CITE Hartley19977EndNote06<style face='normal' font='default' size='100%'>Group Communication</style>(Hartley, 1997). Interactions among group members and members of majority and minority subgroups should be examined to determine the communication similarities and dissimilarities. Recent research shows that having a small majority consensus52% to 48%sways the undecided members toward the majority view as much as having a large majority consensus82% to 18%  ADDIN EN.CITE Martin200284EndNote017<style face='normal' font='default' size='100%'>Level of consensus and majority and minority influence</style>(Martin, Gardikiotis and Hewstone, 2002). Interestingly, minority influences were posited to be stronger, regardless of the consensus size, if their views were highly distinctive from the majority views. A markedly atypical view is given even greater consideration by group members  ADDIN EN.CITE Hartley19977EndNote06<style face='normal' font='default' size='100%'>Group Communication</style>(Hartley, 1997). Interdependence Interdependence is apparent in the group system as members interact and respond to each other. The attributes of the memberspersonality, skills, attitudesaffect the experiences of all of the other members in the group. These attributes of all of the members also affect cohesiveness, relationships, and member satisfaction. Conversely, cohesiveness, relationships, and member satisfaction affect the behaviors and attitudes of all of group members. The output of the task dimension is productivity; the output of the social dimension is cohesivenesswhich are also interdependent. The more productive the group is, the more cohesive it is. The more cohesive the group is, the more productive it is  ADDIN EN.CITE Bonito200285EndNote017<style face='normal' font='default' size='100%'>The analysis of participation in small groups: Methodological and conceptual issues related to interdependence</style>Harris200234EndNote06<style face='normal' font='default' size='100%'>Small Group and Team Communication</style>Keyton199952EndNote05<style face='normal' font='default' size='100%'>Relational communication in groups</style>Mabry199947EndNote05<style face='normal' font='default' size='100%'>The systems metaphor in group communication</style>Meyers199982EndNote05<style face='normal' font='default' size='100%'>Influence processes in group interaction</style>Ellis19948EndNote06<style face='normal' font='default' size='100%'>Small Group Decision Making: Communication and the Group Process</style>(Bonito, 2002; Ellis and Fisher, 1994; Harris and Sherblom, 2002; Keyton, 1999; Mabry, 1999; Meyers and Brashers, 1999)Conflict Conflict can be defined as recognition by all group members that there are differences, disagreements, contradictory or irreconcilable desires among group members  ADDIN EN.CITE Sell200475EndNote017<style face='normal' font='default' size='100%'>Investigating Conflict, Power, and Status Within and Among Groups</style>(Sell, Lovaglia, Mannix, Samuelson and Wilson, 2004). Conflict can be exacerbated or diminished based on group behaviors during a heated discussion  ADDIN EN.CITE Sillince200070EndNote017<style face='normal' font='default' size='100%'>Rhetorical power, accountability and conflict in committees: An argumentation approach</style>(Sillince, 2000). Conflict can be described as either affective or substantive. Affective conflict involves an emotional conflict or struggle that is usually based on selfish or personal issues. It may involve differences of opinions, interpretation of rules, or attitudes toward established norms. Substantive conflict involves intellectual opposition to the content of ideas or issues pertinent to the decision. It may involve bargaining, negotiations, or intellectual evaluation. The advantages to conflict outnumber the disadvantages.Structure Interdependence also exists in the flow of information between and among EM team members. As the members sharing of information becomes more organized, a structure becomes evident. This structure includes both intangible and tangible frameworks that organize group interaction. Two forms of group structure are networks and proxemics. Networks are links between and among members that develop into recurrent patterns for the exchange of information. Proxemics, sometimes called group ecology, is concerned with how group members arrange, use and are affected by physical space in their interaction with others. Appendix E Groups as open systems System conceptsSystemEM organizationWholeness Every component of a system affects and is affected by every other component.Every member affects and is affected by every other member.The system, though it has many components, assumes an identity as a unit.The organization, though it has many members, assumes an identity as a unit.A change in one component effects changes in all other componentsA change in one member effects changes in all other membersThe whole is different from the sum of the partsThe outcome of collaboration is different from the combined outcomes of the same people working alone.OpennessAn open system self-regulates: it receives processes new information, then discards what it does not need to survive.A group self-regulates: it receives and examines new information for relevance and reliability, then discards the irrelevant and unreliable.It freely exchanges information with the environment.Group members interact outside the group, freely exchanging ideas.StructureAll systems have spatial relationships: components that are above, below, beside, behind, or facing.Group members have spatial relationships as explained by positions within a communication network.FunctionEach component of a system has a function that complements the other components.Each member in a group has a role that complements other group roles.EvolutionSystems continuously transform through interactive processes.Groups continuously transform as they interact.InterdependenceSystem components depend on other components for proper functioning and replenishing.Group members depend on other group members to fulfill their goals.FeedbackA system sustains and adapts through feedback: responses to input and output.A group sustains and adapts through the cycle of interaction and feedback among its members. ADDIN EN.CITE Bales199946EndNote06<style face='normal' font='default' size='100%'>Social interaction systems : Theory and measurement</style>Mabry199947EndNote05<style face='normal' font='default' size='100%'>The systems metaphor in group communication</style>Fisher197445EndNote06<style face='normal' font='default' size='100%'>Small Group Decision Making</style>Hare196238EndNote06<style face='normal' font='default' size='100%'>Handbook of Small Group Research</style>(Bales, 1999; Fisher, A., 1974; Hare, A. Paul, 1962; Mabry, 1999) Appendix F OSIS/RAINS BackgroundOSIS is based on RAINS established Connect & Protect program, a wide area network project that connects schools, government agencies and other organizations in Portland, Oregon  ADDIN EN.CITE Fisher20043EndNote041<style face='normal' font='default' size='100%'>National security spec advances</style>(Fisher, D., 2004). Connect & Protect program a cooperative effort between RAINS and the City of Portland's Bureau of Emergency Communications (BOEC) allows the conveyance of real-time emergency information among more than 60 local public safety stakeholders including 911 centers, schools, hospitals, hotels, and banks. Alerts can be received through PCs, personal digital assistants or cellular phones  ADDIN EN.CITE RAINS Programs200410EndNote040<style face='normal' font='default' size='100%'>Open Specification</style>RAINS Programs200410EndNote040<style face='normal' font='default' size='100%'>Open Specification</style>(RAINS, 2004). BOEC was the first 9-1-1 Dispatch Center in the country to participate in this program. Oregons 9-1-1 center simultaneously implemented Connect & Protect with RAINS-Net in Portland, in August 2003. RAINS designed the program to be a scalable, affordable model (below) and therefore usable anywhere locally or nationally in cities and rural areas.  RAINS began as a result of 9/11, 2001. Several Oregon companies united as Oregon RAINS, a regional emergency response network. RAINS grew to include more than 60 companies and six research universities by the time it deployed RAINS-Net in 2003  ADDIN EN.CITE Jackson200415EndNote041<style face='normal' font='default' size='100%'>Coalition has specs for secure data-sharing</style>(Jackson, 2004). Since then it has recruited agencies in two states, Virginia and Washington RAINS is optimistic that OSIS will attract at least 10 states in the near future. Already it is the first statewide system in the country that will be able to send emergency alerts securely online  ADDIN EN.CITE Robinson200323EndNote041<style face='normal' font='default' size='100%'>RAINS showcases secure info</style>(Robinson, 2003). RAINS hopes that OSIS can become the nations prototype for sensitive information exchange  ADDIN EN.CITE Robinson200320EndNote041<style face='normal' font='default' size='100%'>Oregon pushes for DHS dollars</style>(Robinson, 2004). Wyatt Starnes, co-founder of RAINS, confirmed that OSIS encourages the use of specialized Web Services and additional standards including XML, Common Alert Protocol, WS-Security, WS-Security Policy, WS-Trust, SAML but it does not force users to follow specific form when implementing these services  ADDIN EN.CITE What's next?20044EndNote017<style face='normal' font='default' size='100%'>New security specification targets government</style>(What's next? 2004). RAINS believes its major advantage of OSIS is its non-proprietary approach it can be used by both government and private organizations who need to share sensitive information without forgoing free market competition  ADDIN EN.CITE ESRI20049EndNote040<style face='normal' font='default' size='100%'>Environmental Systems Research Institute News Release</style>RAINS-Gauge200412EndNote041<style face='normal' font='default' size='100%'>Spotlight on RAINS open specification</style>ESRI20049EndNote040<style face='normal' font='default' size='100%'>Environmental Systems Research Institute News Release</style>RAINS-Gauge200412EndNote041<style face='normal' font='default' size='100%'>Spotlight on RAINS open specification</style>(ESRI, 2004; RAINS-Gauge, 2004). Currently, all government and first responder organizations using the RAINS-Net system are employing OSIS  ADDIN EN.CITE What's next?20044EndNote017<style face='normal' font='default' size='100%'>New security specification targets government</style>What's next?20044EndNote017<style face='normal' font='default' size='100%'>New security specification targets government</style>(What's next? 2004).  Appendix G Homeland Security Act (2002) Section 201: Directorate for Information Analysis and Infrastructure Protection To review, analyze, and make recommendations for improvements in the policies and procedures governing the sharing of law enforcement information, intelligence information, intelligence-related information, and other information relating to homeland security within the Federal Government and between the Federal Government and State and local government agencies and authorities. The major purpose of the Act was to establish the U.S. Department of Homeland Security (DHS) whose primary mission is to protect our Homeland  ADDIN EN.CITE Bush2002424227George W. BushDepartment of Homeland Security2002Washington, D.C.The White Househttp://www.dhs.gov/interweb/assetlibrary/book.pdf(Bush, G. W., 2002). The DHS outlined seven priorities for completion in 2005. Priorities 1, 2, and 5 specifically address tactics to develop shareable information systems. Priority 1 The DHS intends to establish a Homeland Security Information Network (HSIN), a computer-based counterterrorism communications network designed to strengthen the two-way flow of threat information that will be available to all 50 states, 5 territories, Washington, D.C., and 50 other major urban areas. Its major function will be to prevent terrorist attacks, but it may also serve as a tool during crisis management.  ADDIN EN.CITE DHS Press Office2004444440DHS Press Office,Department of Homeland SecurityDepartment of Homeland Security Implements Information Exchange System for G-8 Summit EventsApril 5, 200520042004 May 28http://www.dhs.gov/dhspublic/display?content=3649DHS Press Office2004444440DHS Press Office,Department of Homeland SecurityDepartment of Homeland Security Implements Information Exchange System for G-8 Summit EventsApril 5, 200520042004 May 28http://www.dhs.gov/dhspublic/display?content=3649(DHS Press Office, 2004). Priority 2 The DHS intends to initiate measures that will significantly improve interoperability among firefighters, police officers and other emergency personnel who need to be in contact and share equipment during catastrophes. Priority 5 The DHS intends to implement the National Incident Management System (NIMS). NIMS will offer a consistent nationwide template to enable federal, state, local and tribal governments and private-sector organizations to work together effectively to prepare for, prevent, respond to, and recover from a terrorist attack or other major disaster  ADDIN EN.CITE United States Department of Homeland Security2005434340United States Department of Homeland Security,DHS OrganizationPriorities for Second YearApril 10, 20052005http://www.dhs.gov/dhspublic/display?theme=10&content=3240(United States Department of Homeland Security, 2005).  Interestingly, there are 1.375 million nonprofit organizations in the U.S. with 11 million meetings being held daily  ADDIN EN.CITE Weitzel1998303017Al WeitzelPatricia GeistParliamentary procedure in a community group: communication and vigilant decision makingCommunication MonographsCommunication Monographs244-2596591998Weitzel1998303017Al WeitzelPatricia GeistParliamentary procedure in a community group: communication and vigilant decision makingCommunication MonographsCommunication Monographs244-2596591998(Weitzel and Geist, 1998). In spite of this incredible number of meetingsand the importance of smooth information flow in and among EM organizationspublic management organizations conduct few field studies in information flow.  Some historical accounts attribute the Librarys obliteration to Julius Caesar during the Roman civil war. While chasing the mutinous General Pompey, Caesar ordered his soldiers to burn the Egyptian fleet. Some accounts report that the fire spread into Alexandria and into the Library. Other accounts blame the destruction on a religious dispute around 391 A.D. Alexandrian Jews were attempting to burn down a Christian church when flames engulfed the nearby Library. The third rendition of the loss of the Library involves the Moslems who seized Alexandria in 640 A.D. Accusers blame the Moslem leader, Caliph Omar for burning all the books upon hearing that the Library contained all the knowledge of the world. Caliph Omar supposedly said about the Librarys holdings that they will either contradict the Koran, in which case they are heresy, or they will agree with it, so they are superfluous  ADDIN EN.CITE Chesser200575275212Preston Chesser<style face="normal" font="Times New Roman" size="100%">eHistory.com</style>2005July 312005Ohio State University Web sitehttp://ehistory.osu.edu/world/articles/ArticleView.cfm?AID=9(Chesser, 2005).  Attorney General John Ashcroft, who urged Congress during the aftermath of the 9/11 to expand governmental powers in order to fight terrorism more aggressively, instigated the legislation leading to the PATRIOT Act. The PATRIOT Act quickly became law October 21, 2001 without the customary consultation and hearings of Congressional committees. The PATRIOT Act expanded the authority of law enforcement agencies to allow access to records previously protected by open records laws. The PATRIOT Act, up for reenactment in 2005, made changes to many laws that can apply to library records and confidentiality. The amendments expanded the authority of law enforcement agencies. Agents can use wiretaps without making sure the target is actually using the phone to be tapped ( HYPERLINK "javascript:doWindowOpen('/SCRIPT/SLIS_LIBRARY_PRIVACY/scripts/student/serve_page.pl?1050598725+Current/effect.htm+OFF+Current/206roving.htm+','new_frame','width=600,height=420,menubar=1,toolbar=1,scrollbars=1,status=1,location=1,resizable=1,resizable=1',0)" Section 206). They can also access library circulation records, Internet use records, and registration information (electronic or printed) using  HYPERLINK "javascript:doWindowOpen('/SCRIPT/SLIS_LIBRARY_PRIVACY/scripts/student/serve_page.pl?1050598725+Current/effect.htm+OFF+Glossary/gagorders.htm+','new_frame','width=600,height=420,menubar=1,toolbar=1,scrollbars=1,status=1,location=1,resizable=1,resizable=1',0)" gag orders and without demonstrating  HYPERLINK "javascript:doWindowOpen('/SCRIPT/SLIS_LIBRARY_PRIVACY/scripts/student/serve_page.pl?1050598725+Current/effect.htm+OFF+Glossary/probable.htm+','new_frame','width=600,height=420,menubar=1,toolbar=1,scrollbars=1,status=1,location=1,resizable=1,resizable=1',0)" probable cause ( HYPERLINK "javascript:doWindowOpen('/SCRIPT/SLIS_LIBRARY_PRIVACY/scripts/student/serve_page.pl?1050598725+Current/effect.htm+OFF+Current/215accessFISA.htm+','new_frame','width=600,height=420,menubar=1,toolbar=1,scrollbars=1,status=1,location=1,resizable=1,resizable=1',0)" Section 215). They can also monitor library computer use including Internet, email, IP addresses and Web page URLs ( HYPERLINK "javascript:doWindowOpen('/SCRIPT/SLIS_LIBRARY_PRIVACY/scripts/student/serve_page.pl?1050598725+Current/effect.htm+OFF+Current/216pentrap.htm+','new_frame','width=600,height=420,menubar=1,toolbar=1,scrollbars=1,status=1,location=1,resizable=1,resizable=1',0)" Section 216).  A group is a collection of at least three people who interact with each other, display interdependence, establish roles within an open communication system, have a sense of unity and identity, maintain norms, and share common motives or goals with the intention of making a decision  ADDIN EN.CITE Brilhart197835EndNote06<style face='normal' font='default' size='100%'>Effective Group Discussion</style>Brilhart197835EndNote06<style face='normal' font='default' size='100%'>Effective Group Discussion</style>Ellis19948EndNote06<style face='normal' font='default' size='100%'>Small Group Decision Making: Communication and the Group Process</style>Hare196238EndNote06<style face='normal' font='default' size='100%'>Handbook of Small Group Research</style>Harris200234EndNote06<style face='normal' font='default' size='100%'>Small Group and Team Communication</style>(Brilhart, 1978; Ellis and Fisher, 1994; Hare, A. Paul, 1962; Harris and Sherblom, 2002).  Shannon & Weaver, 1947, Modified. Claude Shannon, a research scientist at Bell Telephone Company, attempted to maximize telephone line capacity with minimal distortion. He probably intended his mathematical theory of signal transmission for use with telephone technology only.      PAGE 1 giouv   3 4 5 6 7 ? @ K P Q Y Z ] ^ f k z  ä➘zztztztzzznztzhth haJ h caJ hkHaJhp@h$aJ hE~aJ h4Zh4Zh4ZhA\ hD0J. h{<0J.hDhrx0J^JaJ#jhDhrxU^JaJjhDhrxU^JaJhi^JaJh@^JaJhDhrx^JaJhrx^JaJhDhrx^JaJ&hi|5 7 @ gd $da$gd*?$d`a$gd~ $a$gd*? d`gdq $`a$gd4Z i`gd{<$ !$d`a$gdrx>|=Yik $ J Q   3 4     " ) * 7 : ; F Z q y   ӻӲ h6 h*?6h*?h*?6h*? hL5hA hDh;uhp@hPraJhp@hqaJ hUraJ hOaJ h[~aJ h$aJhp@h$aJ h caJ h.{aJ hSVqaJ hkHaJ haJ haJ2  do  '),2;=!-45AF]fyz{¾ͺŸɗɓ͌h7 hL{hRbhhh2hRb6h(hhKhHh4Z hHhHh'{hL{ hRbhRbhRbh2 h h2h2h26hf. h*?6h*?h*?6 h6jh6U5#%1;@BJXbjkl:C_`de  3hwJh;.6CJOJQJaJh;.CJOJQJaJhKh;.CJOJQJaJ hkQ+6hGhkQ+ hhkQ+hjhpUh< hz hph2hL{6hL{h2hhh7h`h6 34BK;ykd$$IflBX t 6P|0[ 6044 lap "d$|&P#$/If`gdk=rl&d$|&P#$/If`gdk=rl34ABIJKPQRShiqr#$GIJP~H\^v1³³³}h;. hNhNh^h_lh_l6 h_lh_lh_lhKhNhkQ+hmhhKh;.CJOJQJaJh;.CJOJQJaJhmh;.5aJhmh;.5CJOJQJaJht h;.CJOJQJaJhKh;.aJ1KQRq2kdu$$IflFF (+ t 6P|0[ 6    44 lap"d$|&P#$/If`gdk=rlU2"d$|&P#$/If`gdk=rlkdC$$IflBF (+ t 6P|0[ 6    44 lapt&&''{v]d$&P#$/If`gd;.gd4Zgd5cKgdykd$$IflB( t 6P|0[ 644 lap 1NQeBCJKsvx; F Y _ o ! !!.!5!7!J!\!^!!˿˃hzr{hBhK6hPjhHFhaw h `hl.hhf(h hzphkhzhBhqh"h6fhp hk=rhk=r hk=rh;.h.V' h.V'6h;.h;.6jh;.Uh;. h;.60!!%%%%%%%%%%%%%&t&&&&&' ' ''3'4'5'C'O'R'T'''''''''''''''((((( (&(*(ÿ÷îÿÿÿÿÿÿÿîhP:hj'C'O'U']'c'h'lOOOOOOOd(($&P#$/If`gd;.vkd$$Ifs4 t 6P0644 saf4d($&P#$/If`gd;. h't'~''''''''''''''''d(($&P#$/If`gd;.'''cFd(($&P#$/If`gd;.kdO$$Ifs4F c! t 6P06    44 saf4''4+Q RTW__HgzupkY`gdDlgd5cKgdB*gd$ gd4Zgdm/gd%vkd+$$Ifs4F t 6P0644 saf4 *(P(((((((((((((())M)n)z).*/*2*3*i*j*t***3+4+K+l+w+x+z+|+}+++++++++++.,2,=,>,?,S,X,Y,e,h= h h=h^znhChGh h hd h2B6 h2Bh h h2B h`aJ hz aJhp@ho}\aJhp@ho}aJhz h;.hXy[hjTXTķ hHn^J hU^Jh hR^J hs$^Jh~hHn^J hp^J hdaJ h%aJhp@h%aJhKh~hzr{hZ)h hs$ h h; h hdhE;hY'jh hRU h hR0XToTTTTTTTTTTT UUUU U'U9U_UyU}UUUUUUUUUUUV VVVVVVVV}n}jhf.0J%U\]^Jhf.\]^Jhq\]^Jhd\]^Jh$ \]^Jh9\]^Jh hs \]^Jh h;^Jh hC0\]^J hd^Jh~hs$^J hs$^JhB*h96^JhB*h$ 6^J hHn^J h9^J(VVVVVVVVVVVVWtWWWHXRXSXTX0]1]2]7]8]9]R]S]T]]&^'^)^F^G^S^d^^^^^^^^-_=_?_L_Z_______蒋 hp@h7]h7] h7]6^JhB*h7]^Jh7]^JmH sH h h7]^JmH sH hd\h7]CJ^Jjh h7]U^Jhh7]^JhM ^h7]6^J h7]^Jh h7]^Jh7]\]^J6___F`t`u`v```xayaza{aaaab`bmbxb}bbbbccc2g3gDgEgFg]g^g_g`gggggRh^hhhihlhhhlllllllmmѹѯѯȟȟђђђȌ h^^Jjh h7]U^Jh h7]6^J h`^Jjh7]U^Jhomh7]^J hM ^^Jh h7]^J h7]^J h h7]h7]h| h7]0J CJOJQJhh7]0J CJOJQJ7Hg;m6sSsy9Oc|S\]vgdo)gdDgdz`gd0/gdKlgds?gdgd4Zgd\lgd4ZlgdDlmmmnnqqqqqrrr5s6sSsss~ssssssssssssttttttbzczizjzzz{{ghuvفtuDJils@A]^h h7]6^J h6N^Jhpch7]^Jh7] h7]^Jjh h7]U^Jh h7]^J h^^Jh^h^^JH^`flr34:;<FŒݒғӓ[\bcktĚ $&9MOPxy{|Ȥդ ۥJN^_`$%h{ h7]^Jh7] h h7]h\h7]^J h7]6^Jh\h7]6^Jh h7]6^Jjh h7]U^J h7]^Jh h7]^JD%'[dmwcȮ ")6;<HQRŴδ'+3{ rھڷڷڷڷڷڳڳګګڣګڛګՔ hWhh7]hWhh7]6hJOh7]6hs?h7]6hA$Y h4ph7]hemh7]6jh7]U h-k5h7] h7]6h7]he2h7]6^Jh DRh7]^J h7]^Jh h7]^J:1ķ̷+,޿߿,-;<>PabcmnopFGXY\]eftuvſſܿܿܿ h h7] h DRh7]h0/h7]CJaJ h7]\^Jjh7]U\^JhKh7]\^JhKh7]^J h7]^Jjh h7]U^Jh h7]6^Jh h7]^Jh DRh7]^J hd5h7] hh7]h7]1vVY@A7;NOy[\ijm ;HIx߿嵥h)h7]6^J h7]6^JhM|h7]^Jh h7]6^Jhdh7]^Jhh7]5^Jjh h7]U^J h7]^Jh h7]^Jhodh7]^Jhzh7]^J9-4?@BMPTWXiJKXYw'+NOYZƾƾƾƾƾƾh h7]]^JaJh7]6^JaJh h7]6^JaJh7]6]^JaJh h7]6]^JaJh7]^JaJh h7]^JaJjh h7]U^J h7]^Jhh7]6^Jh h7]^Jh DRh7]^J4#%HKnqrƷym^m^UF^UF^h1Ah7]CJOJQJaJhKh7]aJhKh7]CJOJQJaJh7]CJOJQJaJhKhOaJhO6CJOJQJaJhnhO6CJOJQJaJhK#CJOJQJaJhOCJOJQJaJhKhOCJOJQJaJhPeh7]^Jh7]6]^JaJhk=r^JaJh7]^JaJh7ph7]^JaJh h7]^JaJ$%Fskd$$Ifsk$ t 6`s0V644 sa"d$s&`#$/If`gdOl"dh$s&`#$/If`gdOl%IKoq)$d$s&`#$/If`a$gdOl&d$s&`#$/If`gdOlqrS0"d$s&`#$/If`gdOlkd$$Ifsk\o"$yD* t 6`s0V644 sa"d$s&`#$/If`gdOl%$d$s&`#$/If`a$gdOlS0"d$s&`#$/If`gdOlkd$$Ifs\o"$yD* t 6`s0V644 sa"d$s&`#$/If`gdOl%$d$s&`#$/If`a$gdOlU2"d$s&`#$/If`gdOlkd$$Ifs\o"$yD* t 6`s0V644 saYcn5CFd56e#4S]^_LNS^~⴩hG)^JaJh ^JaJh4hM ^^JaJ hM ^^J hz^Jhd\h7]CJ^Jjh7]U^Jh7]h h7]^J h7]^JhKh7]CJOJQJaJhKh7]aJ7"d$s&`#$/If`gdOl%$d$s&`#$/If`a$gdOl5UGG9gd5cKlgd :lkd $$Ifs\o"$yD* t 6`s0V644 sa~ 3#CCD4@TgoqJK !#Cľľȗȗwwwq h7]aJjh4h7]UaJh4h7]aJh4h7]6aJh4h7]^JaJh-2 h7]^Jh\,h7]^Jjh7]U^J h7]^Jh7]h7]^JaJhd\hM ^CJ^JaJhM ^^JaJh4hM ^^JaJjh4hM ^U^JaJ,5 34#Cm+++;Q;\LLlT`h`gdDlgdDgd gd5cKgd7gd%lgd_glgd4Zlgdm:gd4ZgdDlCIJMN]^`prxy #$ph7]^JaJh4h7]^Jh$^JaJh4h7]^JaJ h%h7]jhoUhohfhfH*h9hD^.jh9h7]U h9h7] h9hfjh7]Ujhf0J%Uh7]hf4%%%%% & &&;&L&M&N&Y&c&n&o&p&))***F*Y*^**********++^+k+l+m+++',),*,i,j,000ļޡjh h7]U^J h7]^Jh h7]^Jh7]hH;hH;^JaJh4h7]5^JaJhj[^JaJjh7]U^JaJjh7]0J%U^JaJh7]^JaJjh4h7]U^JaJh4h7]^JaJ400000l11111222222'2(2-2.2/21292:2;2;;;;;*;+;Q;;<<<<<<<= = ==O=P=X=====ƿ㲩㠜钌h hf.^J hf.^Jhd\hf.6^Jh7]h4h7]aJhh7]^Jjhd\h7]U^J h7]6^Jh h7]6^Jhd5h7]6^Jhd5h7]^J h7]^Jh h7]^Jjh h7]U^J3===>>>BBBBBBFCGC=L>LYLZL[L\LLLLLLLMMwRxR~RRRRRRRRR>SSSSYTiTkTyTTTTTTTWWWWX h`^Jjh h7]0J%U^Jhv,h7]^Jjh h7]U^Jh7]h h7]^Jjh7]U^J h7]^Jhd\h7]6^Jjh hf.U^Jh hf.^J hf.^J9X&X1X2XQXwXXX3Y_YjYYYl`m`~`````Za[addddeeReSehhhhhhh1i>iiiiiiij jjjjh h7]CJOJQJaJh h7]6^JaJh7]h`^JaJjh h7]U^JaJh7]^JaJh h7]^JaJ hI^J h^Jjh7]U^Jh hf.^J hf.^Jh h7]^J h7]^J1hhjj:j;jjZ= & F hd$Ifgd xlikd- $$Ifs# t0644 sa$dh$If`gd :l`gdDlgd%-Eljjj:j;jkkkk&o'o4o5o6o7oHooooo"JfhƇ·3:sˆ̝̙̽}}w}q}}w hf.^J h`^Jjh h7]U^J h7]^Jh h7]^Jh7]%jh xh7]CJOJQJUaJh xh7]CJ^JaJh xh7]CJOJQJaJh h7]aJhh7]6CJOJQJaJh h7]CJOJQJaJh7]CJOJQJaJ,jjjk`kkk6oxW $dh$If`a$gd :likd $$IfsF# t0644 sa & F hd$Ifgd xl6o7oHo aj|Y"d$}&P#$/If`gd,lgd|gd4ZgdDgdZ?\gd%-Eikd? $$IfsF# t0644 sa )QS(*45^_ajklmns<=ȼȭ·܇܇܀uujh|h7]U h|h7]jh7]U(jW hAh,5CJOJQJUaJhAh,aJhAh,CJOJQJaJjh7]0J%U^J h7]^J hgh7] h h7]h7]h|h7]^Jh h7]^Jjh h7]U^J.jkmn0F=`gd(CILkd_$$IflX t 6P}644 la"d$}&P#$/If`gd,lJkd $$IflX t 6P}644 laɡˡ̡ڡۡ45xy2<yʫګ۫ܫ  79CDkýڳଙwp h7]6^Jh h7]6^Jh(CIh7]6]^Jh(CIh(CI6]^J h(CI]^Jh h7]6]^J h7]]^Jh h7]]^J h`^Jjh h7]U^Jh h7]5^J h7]^Jh h7]^Jh7] h|h7]jh|h7]U,klrs~Ҭ٬ڬ۬!"/08RSqrslmnͱα!(*8hiĴīīēīī} h^JjhU^J h^Jh{xnCJOJQJaJhW.CJOJQJaJhk-{h{xnaJh%-Eh{xn6CJOJQJaJhk-{h{xnCJOJQJaJjh h7]U^Jh h7]^J h7]6^Jh h7]6^J h7]^J/08RScq`>>"d$&P#$/If`b$gd{xnlykd`$$IflB$ t 6P0644 lae4p &dh$&P#$/If`b$gd{xnlqrznL*! & Fd$&P#$/Ifb$gd{xnl"d$&P#$/If`b$gd{xnlkda$$IflB07$ t 6P0644 lae4plnL*! & Fd$&P#$/Ifb$gd{xnl"d$&P#$/If`b$gd{xnlkda$$IflB07$ t 6P0644 lae4plmunL*! & Fd$&P#$/Ifb$gd{xnl"d$&P#$/If`b$gd{xnlkddb$$IflB07$ t 6P0644 lae4pnL*! & Fd$&P#$/Ifb$gd{xnl"d$&P#$/If`b$gd{xnlkd c$$IflB07$ t 6P0644 lae4p>AA5Bne`EE$d$If`gdCvlgdD`gd,kdc$$IflB07$ t 6P0644 lae4pݴ޴ߴ]^z{p q        2!3!P!Q!R!j>k>>>>>> ?&?C?U?????@@'@:@@@@@yAAAAѼѼѳѭѳѭѳѭh2yh7]^Jh h7]^J hxm|aJh :hxm|aJ h0 aJhxm|hxm|aJ hIaJjh :hxm|UaJ hxm|^J h7]^J h^JjhU^J hI^J=AAAAAAAAAAA5B6BBBBB I!I:I;IdIeI?J@J NN%N&N)N*N OO$S%S4S5S7S8SjSkSUUUUVVVWܴܘܘܘ܎ܘܘ܎ܘܘܘ܎ܘܘܘܫ{ h h7]h`CJOJQJaJh :h7]]aJ%jh :h7]CJOJQJUaJh :h7]aJhjh7]6CJOJQJaJh7]CJOJQJaJhCCJOJQJaJh :h7]CJOJQJaJ hC^J h7]^Jh h7]^J05B6BABdIss$d$If`gdCvlqkd\d$$Ifl4$$ t0$62 s44 lasf4dIeIsI)NmSSd$If`gdCvlkdd$$Ifl40$ t0$62 s2 s44 lasf4p)N*NLN7SmSSd$If`gdCvlkde$$Ifl40$ t0$62 s2 s44 lasf4p7S8S=SVmSSd$If`gdCvlkdf$$Ifl40$ t0$62 s2 s44 lasf4pVVV-e>eWgfggme`[VQLgd`gd4Zgdkgd5cKgdtsdgd/ekdzg$$Ifl40$ t0$62 s2 s44 lasf4pWWJWZW[W/d0dndodudxddddddddd+e>eQeVekeleseteeeeeeUfWgXg`gagegfg|gghhhii)i6iAiRiSiTihióêh&@h7]5^J hf.5^JhThf.5^Jh&@hf.5^Jh`hq<^Jh`h7]^J hKh7] h7]^J hN[^Jh h7]^JhMj h7]aJ hd5h7]h0 jh0 U h h7]h7]4gh5hjhhhTihis=v8XXטgd4d^`gdq<gdCIgd `gd`gdkgd4Z*gd&@d^`gdq< & Fdgdq<hiyiiiiiiglhlvlwlllm:m;moopp!p_ppLqMqssssssuu=v@vvvwwwpwxyye~f~s~t~8GHXÿôôôխ h `h7]jh7]U h7]5 h-h7] hBqh7]h7] h`h7]jhkhf.Uhf. hkhf.jhkh7]U hkh7]jhkh7]U\ h7]\hkh7]^Jhkh7]\3X-6Āƀ~  tFGTUXx|݋M[ڌ <?LMRSξƵƪƪƞƞƞjh7]U^JaJhO!lh7]^JaJh7]mHnHuhq<^JaJh7]^JaJh5h7]^JaJhBqh7]^JaJjhh7]U^Jhh7]^J h7]^J;ݕWYfÖǖȖ˖eiw~˗78>Sjؘ֘Z[ٙżŶŶŶŶh!Bh7]^JaJh7]^JaJhf.^JaJhJhf.5^JaJh `hf.^JaJ hf.^JhThf.^Jhhf.^Jh9{hf.^J hM ^^J h7]^Jhh7]^Jhh7]^Jh5hq<^JaJ4טۙ"ޤ֧gd}Mgd":xgdCIgdVgd5cKgdkd7$8$H$^`gdH;l & Fd7$8$H$gdH;l & Fd((7$8$H$gdH;lٙڙۙܙ!"#lm֠נ!tuhiޤ 0=LNo~>SYlϵϧϧϝuhYh7]B*phh h7]^J h7]^J h7]\^J hcvh7]h h7]\^J hJh7] h4h7] hCIh7]hdh7]^JaJjh7]Uh7]h!BhH;^JaJjh!Bh7]U^JaJh!Bh7]^JaJh7]^JaJ.ln֧kyGVȩɩOTabghwªêʪ˪CQT_bckrstwD»귰Ƭ hph7] hphf.h9n h9hf.hf. h9h7]htI<hr h}h7]hM hRxh7]h2qhCIh7]\^Jh7]h h7]\^J h7]\^J>DEڴ&mn\]cd'(TU[\zJP *+r鹱~x h~^J hr^J h!^J h7]^Jh hH;^JmH sH hf.^JmH sH h7]^JmH sH h7]mH sH h h7]mH sH jh7]Uh2q h h7]hr hh7] h9h7]h7] hph7]jhph7]U.02P i  d^gd)@gd5cKgdO;gd"gd5cKgdd^`gdH;l & F dgdH;lr  "#ACDHcn@<Qbv|    2=>Pʾʾʾʶʾʩʣ h0 ^J hs^J h7]^Jh~h~^Jhch$ h$ 6h$ h"0J)^Jh"hCJOJQJ^JjhU^J h^J hKhhh~ hKhN9$'hi'(9:;DFOavӾ{wh4ZhJh(Zhn&h7]hDx h)@^Jhv-hs^JjhsU^J hs^J h4Z^Jjhn&U^J h(Z^Jh hv-^J hD^J hIY^J hBC1^J hc^J hv-^JhThf.^J hf.^J hn&^J. $/09=ILQ\efv ENOVWjk ̸̣h ~h2qhk he he h7h I h7h5sh5sh h,h{h{Che h,h~hMhzh.h Ih{0h)@hKChh7]hDx9   *+LMNVWOPWX)*+ɻɭɟɑɃujlh5cKhl]Ujkh5cKhl]Ujjh5cKhl]Ujih5cKhl]Uj-ih5cKhl]UjNhh5cKhl]Uh5cKjh5cKU h5cKh5cK hZ.h7]jhZ.h7]U h h7]h'g h}h}. w$ :c l'l-o+vJX/gd5cK+gd5cKXfQTiWO1gb@       K  /gd5cK+UV   > ? 12stuABCjk     !!^&_&&&&&&|'}''jrh5cKhl]Ujqh5cKhl]Ujqh5cKhl]Ujph5cKhl]Uj*oh5cKhl]UjQnh5cKhl]Ujmh5cKhl]Uh5cKjh5cKU h5cKh5cK6 (R>vbE!!5" #/gd5cK #r##$%%&'k( )u*o+k,-- ..-//o0G11k2)3n34N4I556/gd5cK'''''))#*$*%*s*t****+++,+m+n+++',(,),i,j,44 5 5 5G5H5b9c9d9l9n9o999޴ަ⛗ylhQh7]6:\aJhQh7]6CJOJQJaJ h)8gh7] h6h7]h7]jhZ.h7]Ujwh5cKhl]Ujvh5cKhl]Ujuh5cKhl]Ujth5cKhl]Uh5cK h5cKh5cKjh5cKUjsh5cKhl]U(66=77)88a9b9o999jikdhx$$Ifl4% t0644 la"d$7$8$H$If`gdQl"+gd5cK/gd5cK 999999::I:`:c::::;;';(;9;O;P;Q;;;;;;;<<<a<b<t<v<<<<====>=>>? ???@7@8@9@L@N@@@AAABBBABBBQBSBB仩仩仩"h%&h7]5CJOJQJ\aJh)8gh7]\aJ"h)8gh7]5CJOJQJ\aJh7]CJOJQJ\aJh)8gh7]CJOJQJ\aJh)8gh7]6\aJB99997|kdx$$Ifl409% t0644 la"d$7$8$H$If`gd"Dl"* pHpd$7$8$H$If^p`gd"Dl"9I::;9;P;;YY* & F d$7$8$H$If^gd"Dl"* & F d<$7$8$H$If^gd"Dl"&\d$7$8$H$If^`\gd"Dl"* H\d<$7$8$H$If^`\gd"Dl";;<b<<=X222&\d$7$8$H$If^`\gd"Dl"* H\d<$7$8$H$If^`\gd"Dl"|kd|y$$Ifl09% t0644 la===>>,|kdz$$Ifld09% t0644 la* & F d$7$8$H$If^gd"Dl"* & F d<$7$8$H$If^gd"Dl">?8@9@@A-|kdz$$Ifl09% t0644 la* & F d<$7$8$H$If^gd"Dl"* H\d<$7$8$H$If^`\gd"Dl"ABABBB.zkdP{$$Ifl09%  t0644 la* & F d$7$8$H$If^gd"Dl"* & F d$7$8$H$If^gd"Dl"BBB!CC]DDE+FFF[* & F d$7$8$H$If^gd l")$$^d$7$8$H$If^`^gd"Dl"&\d$7$8$H$If^`\gd"Dl"* H\d<$7$8$H$If^`\gd"Dl" BBB C!C2C4CCCC\D]DmDoDDDDEEEE+F6F8FFFFFFF%G&G9GBG_GGGGGGGG&HDHHHHH I&I*J+J8J(L,LLL;M\K\L\\\1]2]M]N]_]e]^^^^^_``maaaaaaaaaaaaaɺ ha[H*aJ hIdeH*aJ"j|hIdehIdeH*UaJhIdehIdeH*aJjhIdehIdeH*UaJhIde h.h7]hshC h.hC hCaJhhC\]^JaJhs$hCaJ7N]^^`aaa]ccjojqjj!d00$IfXDYD`gda&ljjkd;$$IfTl4ֈG *)&``/p{ t0~644 lap<Tjjjjjjj$$d00$IfXDYD`a$gda&l!d00$IfXDYD`gda&ljjkdp$$IfTl4"ֈG *)&/p{ t0~644 lap<Tjkkkk k_k$$d00$IfXDYD`a$gda&l!d00$IfXDYD`gda&l_k`kkd$$IfTl4ֈG *)& /p{ t0~644 lap<T`kukvkwkkkk$$d00$IfXDYD`a$gda&l!d00$IfXDYD`gda&lkkkd$$IfTl4"ֈG *)& /p{ t0~644 lap<Tkkkkkkk$$d00$IfXDYD`a$gda&l!d00$IfXDYD`gda&lkkkd'$$IfTl4ֈG *)& /p{ t0~644 lap<Tk l l l0l2lcl%:d00$IfXDYD^`:gda&l$$d00$IfXDYD`a$gda&l!d00$IfXDYD`gda&lcldlkd^$$IfTl4ֈG *)& /p{ t0~644 lap<Tdllllll!m$$d00$IfXDYD`a$gdyl$$d00$IfXDYD`a$gda&l!d00$IfXDYD`gda&l!m"mkd$$IfTlֈG *)&/p{ t0~644 lap<T"mEmkmmmmmm!d00$IfXDYD`gdk=rl$$d00$IfXDYD`a$gda&l!d00$IfXDYD`gda&lmmmm#nAnnnnnnno"oYozo{o|oooooooo pppppppppppp̿ܯxi]ihm|CJOJQJaJh hKcCJOJQJaJhQhKc6aJh|Dh/jn^Jhy6CJOJQJaJhQh|D6CJOJQJaJ h/jnh.2h.2h5cKCJOJQJaJhyCJOJQJ\aJh h.2CJOJQJ\aJh h.2aJh h.2CJOJQJaJhk=rCJOJQJaJ$mm.kdNJ$$IfTlֈG *)&/p{ t0~644 lap Tmn#n$n&n?nAnn#$d00$IfXDYD`gdk=rl$$d00$IfXDYD`a$gda&l!d00$IfXDYD`gda&lnn+kd$$IfTl4ֈG *)&/p{ t0~644 laf4p TnnnnBoDo{o$$d00$IfXDYD`a$gda&l!d00$IfXDYD`gda&l{o|o,kd$$IfTl4ֈG *)&/`p`{ t0~644 lap T|ooooooo$$d00$IfXDYD`a$gda&l!d00$IfXDYD`gda&loo,kd$$IfTl4ֈG *)&/ p { t0~644 lap To p3p5p[p]pp$$d00$IfXDYD`a$gda&l!d00$IfXDYD`gda&lppp.)+gd5cKkdk$$IfTlֈG *)&/p{ t0~644 lap Tpppp{wYYd(($If`gd"Dl"ikd$$Ifl4I-' t044 lad(($If`gd/jnl"pppp/qEqqqqq.v/vRvSvfvuvvvwwo{p{{{{{Y|Z|HIabjpamqȁUVkxpqwx=>KLNOV塛 hqaJh hqCJOJQJaJh,CJOJQJaJh hKc]aJhj[CJOJQJaJ%jh hKcCJOJQJUaJh hKcCJOJQJaJhm|CJOJQJaJ8{{{Uhhd(($If`gd"Dl"ykd$$Ifl0-' t044 laUV_Nhhd(($If`gd"Dl"ykd$$Ifl0-' t044 laNOU1jhhhhhd(($If`gd"Dl"ykd1$$Ifl0-' t044 laVlm|   #$%ٕڕșəW^ghnojkȹ՞uh hKc]aJh,CJOJQJaJ%jh hKcCJOJQJUaJh,hKcCJOJQJaJhTCJOJQJaJh,h,CJOJQJaJh,6CJOJQJaJh,hKc6CJOJQJaJh hKcCJOJQJaJhUjCJOJQJaJ.jkvwhhhd(($If`gd"Dl"ykdƒ$$Ifl0-' t044 laˤ̤ݤޤ 67+,-89=>ϷϷիիՕՉՉՉՉvvjvhj[CJOJQJaJ%jh hKcCJOJQJUaJh,CJOJQJaJh hKc]aJhCJOJQJaJhUjCJOJQJaJh hqCJOJQJaJhThqaJ hqaJh hKcCJOJQJaJjhCJOJQJUaJhCJOJQJaJ&hhhNhd$If`gdGl"d(($If`gd"Dl"ykd[$$Ifl0-' t044 la¸ظٸڸFJT[56YZ,3stǴǴǴǪǚǎ~~~rrǴffrWhhCJOJQJaJhGv_CJOJQJaJhCJOJQJaJjh,CJOJQJUaJh,CJOJQJaJh,hKc6CJOJQJaJh hKc]aJ%jh hKcCJOJQJUaJh hKcCJOJQJaJhGhycCJ OJQJaJ hGhKcCJ OJQJaJ hGCJOJQJaJ"=hhhhd(($If`gd"Dl"ykd$$Ifl0-' t044 lat|~PQ"#89ij-.'(lm 引冀 hqaJh hqCJOJQJaJhj[CJOJQJaJhXLCJOJQJaJh hXLCJOJQJaJ%jh hKcCJOJQJUaJh hKc]aJhCJOJQJaJh hKcCJOJQJaJhCJOJQJaJ2hhd(($If`gd"Dl"ykd$$Ifl0-' t044 la !-hJhd(($If`gd"Dl"d(($If`gd"Dl"ykd$$Ifl0-' t044 la-.@hJd(($If`gd"Dl"d(($If`gd"Dl"ykd$$Ifl0-' t044 la}hJhhd(($If`gd"Dl"d(($If`gd"Dl"ykdD$$Ifl0-' t044 la ns|vw./VW      ()CD45@Ar{ܿܭɡܕܿܕܿ|xq hRh.2h.2h9{ hv?h#hO;CJOJQJ^JaJhyCJOJQJaJhj[CJOJQJaJ"h hKc5CJOJQJ\aJh hKc]aJ%jh hKcCJOJQJUaJh hKcCJOJQJaJ hqaJh hqCJOJQJaJ)D4hJJJd(($If`gd"Dl"d(($If`gd"Dl"ykdٖ$$Ifl0-' t044 la45?@hJhd(($If`gd"Dl"d(($If`gd"Dl"ykdn$$Ifl0-' t044 la|h$@&Ifgd4Zlgd5cKgdO;ykd$$Ifl0-' t044 laiDD$$d``$IfXD(YD(`a$gda&l$$d``$IfXD(YD(`a$gda&lpkd$$IfTl4l%% t0%644 laf4TKM!"#$ef;<=IJK89\]̽{{h$$IfTl4gF l%  t0%6    44 laf4pTM.kd#$$IfTl4cF l%`  t0%6    44 laf4pT* & F d$If^`gd|?|@|X|||vv!jhs$hk=rCJU^JaJhs$hk=rCJ^JaJhs$hk=rCJ\]^JaJhs$hk=rCJaJ!jhs$hk=r0J%CJUaJhc hjh9{Uh'Jh9{h9{5 h'Jh9{ hIh'Jh9{jhIh9{U hIh9{.x*x=|>|B%<=?@BCEFHIJU$ !`a$gd $ !d`a$gde< $d`gd\L"$dgd\L" $d`gd6Ngd5cKdgd,gd'JցׁTZ[st{9;J_s /߄ )+,/0?@ABCDщ҉׉*2Hjhk=rCJUaJhThk=rCJaJhk=rCJaJhzhk=rCJaJhk=rjhk=r0J%Uhs$hk=rCJaJhThk=rCJ^JaJhk=rCJ^JaJ!jhs$hk=rCJU^JaJhs$hk=rCJ^JaJ2HIWXcdev!"01?@BCUVabctˑ̑ےܒ ɥʥ"#%&;<=>@ACDFGIJϴݴ hk=r0Jjh~P(Uh~P(h :hk=rCJaJhhk=rCJ\]^JaJjhk=r0J%Uhk=rhk=rCJaJhs$hk=rCJaJjhs$hk=rCJUaJ=JKQRSTVWXYhijklhc h| h@uh~P(hk=rCJ^JaJhk=rheNp0JmHnHu hk=r0Jjhk=r0JUUVWXYZ[\]^_`abcdefghijklgd5cK`gdTh !$d`gdB= 0&P1}:p BP/ =!"#$% DyK tpipes@lis.admin.unt.eduyK @mailto:tpipes@lis.admin.unt.edu$$If!vh5#v:VlB t 6P|[ 605X/  / p $$If!vh555{ #v#v#v{ :VlF t 6P|[ 65+55/ /  p$$If!vh555{ #v#v#v{ :VlB t 6P|[ 65+55/ /  p$$If!vh5#v:VlB t 6P|[ 65/ / p $$If!vh5v#vv:Vs4 t 6P065/ 4 sf4$$If!vh5b55#vb#v#v:Vs4 t 6P065c5!5/ 4 sf4$$If!vh5v#vv:Vs4F t 6P065/ / 4 sf4$$If!vh5%#v%:Vsk t 6`s0V6,5/ 4 s($$If!vh55554#v#v#v#v4:Vsk t 6`s0V6,5y55D5*/ / / / / 4 s"$$If!vh55554#v#v#v#v4:Vs t 6`s0V65y55D5*/ / / / / 4 s$$If!vh55554#v#v#v#v4:Vs t 6`s0V65y55D5*/ / / / / 4 s$$$If!vh55554#v#v#v#v4:Vs t 6`s0V6,5y55D5*/ / / / / 4 s$$If!vh5`$#v`$:Vs t0654 s$$If!vh5`$#v`$:VsF t0654 s$$If!vh5`$#v`$:VsF t0654 s$$If!vh5#v:Vl t 6P}065RDd U#:x6  3 URAbRMi\`:Q F nQMi\`:PNG  IHDR[&¤sRGBQIDATx^y]EMPI(&a ("QJbV0hJd(AA2*@F@aMId 2l@`iι{{}z}O?v_vF4^zi„ +m 0֨#LSO=;lf]k#Њѽ4[ne=n( 0#;&"O3~fm+}>lp@#?"\8iҤ;2wa7޸hF@XFtO0CK:5 a_?~'m%KOqG2b㻀h(H!H_xᅋ-j0xeDw#,:h]wFR\lٞ{BY F2bUo${!lᆓ'O>3ѣ6'Wsc@_~;ӕW^i jc;L*nFlZF]!@e )"&^tEş7(fĊ6m2#vgi jVز b$vg`θ:ujָo*eJ4 iEuW~A͊Wˈk2@]Yc… kN&F$XF,ICF@ϚmP"UA2bUZ4#rW~ ?+b_r,#\<#)wg6Ys#`F,yxF`P2Ϛ5Ys2#`F,slF ϚlP7k\7BXpa@+?S9xZkˁ@0#E\#'԰>[҂ǎ;mڴBsqF`0A`]=m: TᄄPcF 9o0[{8tX&r@_+þőJXxqKo~{s"`F,mӸ`F`  ڕOmf|lʇ|m(nW-n"'PF̈el @AM3b3(hW0sK8B0#V\^# _|^ִWIt,2ޏXsٍ@ lM? p]v<KFḧE#h~{[n{ !:>}:w\c !`FPcF 3[eU؛h: #T#V]|#'})ݳ*7Fwel:kMkӔhE]4yL>,zXFl`MA;\n!̘1#Sz3b[k*Kf.:g?;a„z73bߕ1ϴ|~waqՌ@̈F/ MSt(7fzkD+KMM%s;̈Fnx㍛niz''ڼb݀p}@F̈sp#Pn8GI/6p'"VbVSʹtFXX|&K>l-6mڴay `F,O[$F`P8{V?NoF#ߙ`!pŃ!e@W^+S2@Xvr)@O~_mv= zw֦'VP3̈5kPW,Z}{_ &P7#9>.hhڵ@눵hFWL|殻bxG?'>r#5rH(j<0#tgiA_WI2D\p 8Ghن_{^v'O2eƇA Fj.s` 뮻.`kG d}GE"DDq eroԽKS3f̸qx>3r \ vZEH^KuM~!͈kSרn fİ.Ei؃LoЬ;~LL1 8_3f0(>n>x(+fĬ9=>S_h?O~h: 0_$pP#vm7<~5kc=6zVTv<+0Y-a]x)\0tJT x =tQ< @0Ǹ0!Xu /#P9ӗ,Y©m>H{<0 xN %nM' M>AedTsp ks%c XEO)4+ Y+*Lp3$?/ Tjd4w4wgn@+y~_s_Ȏbt/|韐5aGDt|#ʈH4Ct(a^X31"X0 b%B&/ّv D gDkM㹔@6l/V<.I0G؉tV+~D PYSqvYg}F!bxĈ=tMy7>Vr!&T$Oo֐;툂I*/OI#03gR0Y[fĴmEX=YdOv{;R0}YN FL;v,[,|WkipγVFǏO5~4e /n&La'G3bma`o{H ķ/؜XaÃFKӚb@p7O5]qrQ`b?,wBZphw)0N`"|tկ\[s2= k4lҺ,HP3XjB}FƗѱem/X߶낭EMRCy 0$#k(;JC!~g}/o;pkz9(0RD.BYjwu)kk;`V6(\ #풾8K?t?^\N-3" V>NtҤI쀁}C|eaiHXr AvН컺tD-sBNdck` |g\@CKJ^ƈ!'V,=︧4qp2K.V[m";wulNd=3gc\r/+ȱkU"~; a%҅, 90"b7nD8#(j<쳑SP%k<f/ρݏa4ã:" q8s90nWKҽ\oh\xͷFJ@iL("\ۨn8ef)[XZXdBe߈<Rj]uW$Xׁ^ ։̰9 ?y(eB-OTPRW`=zw>\1^=A۱u XO'uw'V]t-<ŏWCpLzEPw]4ƻ᜹̌X!.lˋjWNtA )*G1msD fDv - J]7ktRFZȌAd>s{DO^{9* _6FĘY*4={ۀ,\KSQ!I@ "smjZhÉ 9yCY2@>AFd|!z~b.QW]uzWd#L"`S#tjW|c K$aNLxY )h .`ݧ6\РOm4?S8rM6]HkYC90T죨(`GgP٧_p"\6 e>AxȈY#:|2Nga{ol+14Nl)"K/O~!<7joXio n֬Y$?fr0ŋ ̳شm}T-(JoĸB䅼AtHh8^{ V悼R1"zȿp@ċN7q̣7, QYG~*B['N\Bap>bϚ"tQnÓWlٲCş ޒ',D!E(V|xwLF\n7bKji 56D7#R+akiHY@D+ĉL8[QʺYr(ҎE[ّNd'5,ԐoLQ1A,{޲&oxc;9 EFd3?ծԒ(͆-.I5;SsYg8r4ĴjpTL VKRl8qѐː(~I0 jP#pE&2>@CYHdY#0Ag n|bb7F*򗿐GJ4-/~jhYËa^Vʺ `A5|tk &I VՂґ$'i2_+h;9Ae MA~u ѬΞ=;ܴɠ%lgT6͖M76Ӕ5Br8 v/3:^7Qt8r8e  e4ҐTqB&n yV4+7v: O~.GDǟ$F:8 m3ER_G}OhʀIVQsR- /OgVQ"9u5o޼Pȶ>G֜%\XD9嘈\x,x3bsPe4~ fj583fh}3(Nve'k2BD+++.m={!R묳 ǯBɠE6gFaOwA}0-z{x.m: ncfmh>i\?œo)r!UHA1C%$zWR #C'q9Z_j`LW! /6 \eӑi8 hrgJa~D_nt;O~Xk.0I(7ӈ~@O!oo, Z |6!ql7KzV$~U:B~mL3tAM |ZOH%^KslSB ۵#i2*"Dc8OkbS6 \Â#S]bd*0@bTƞ$"Y*Jmg!RN$QVXa!!pu1#2! N`NYFd.Qjh"]ƜCy-( 9^тi橕4]u)FݯJiL`rKZͤ3eǒ!zaxBƈ|rh]SC3[,.e#p\@!>a/nk8(pL`iG/؋ؚipӻᄏz=ދHuS.Z5SDZD ˈ@F:ΑRˆDz/n2U/Kkq!եAdsU̞Yj?aJ3ƈ}|f%N`a6녨UQ~"|0UgFć8x ߜD՜.ִm _I&64ǃ>HUZjXK|1#1f \fjd z&~Iq& kϥm *-kd5$>U՚7 CbS:M+͈oi9{':5ka8TU,pԈن'tX* @tʃ*<[] M) jUN"iTRֺZIns:ိ<rx(ø3+ FDsbm6I3 mBIg -2|i0g YD5M Eu|S@u}k_C}9)8׿_^#U~L?`) F^hh`ԧž<0 T(k:*X(F`gEY%<36B;HaQZĪ!s+yI'f/: ]YD0nˈ1s̾BHta14`[waD_0w]"> Jo~T0q>J)`( *f0%חPxk- S idz8.Vx4ye ̖]:͚)D`#4%6)$2 DG< s4xCfޜxGEޕWChCeCsP뮻9JF!D$RĘ@AR4ktچd5hsID8+OR_7;y2[,.$OBlK˥z5ğ7z,*s"wтo&) ך";䢎?68<X[5QNp!+hr ,o7ʿdDIڶTi|)VG m}.@=2T]Kth)pmQ3Z/x01vE N-NǝW`\w^JVxz57 Yqg k\b ̈́N_q 2.|k]#g')3c"TbL Bi{,Zk|'HŸ ,ks|fXgw L,&L=Ȏ 6"X^a쪲*SO q{0IoHVpx"Ӿj\9#$7{(<{C@`fa!.d& C!4+kpOfD!;#Ƭ%`2N,ьu#qS PhV?SPr4U^J-ҟֆ~(֍ȋ@ѩ2 iY3WeU%q ::g̑3yVpt-зvbI1=wSr$2^<ŔJqA]<5> R)%r$-%,yfǔtWi xLHҁG95:*fOCy~iǢGS=c1HE c %Vh E[54qdnhh2;,@?}wk@&/=u.k|(CDhFCDx8OҗC+L p^AD$uasVP,"} 3Jc{f}ҺuZN\pn;m<@$PVA|g۱i G__N]]1 A@'ɝq!ʈA#wPGSѵ4h*k9$U Ȋ )>jѶ9Q)w i)QCHi}hPQJòRSkdkmk-{wki 0BQ7Q<`JC'V?5ø(aPf(7]^R`SdML%B͋`DF:ݶGgNmLtEY0&Ը5AZ)VՔ V2t \hDȞdr&e;IwQYP D S]>2c)C|P c[@W0}/+Oȋ^ʠ1W*]WvN;x>"(P0g̘5+) *N͡oG],B0kWðrꫯNq:,h[J'>er-OԻg )EYSM8.p֨Xˆ=[S4Fa<׆%sh f.EHN9j-;/CC"oڴirz1ETBd"RK~5Ǘ yUyΦQ4z0&%4N/ZVﲤ: Lўʢ(I]bA+KC`r1R$iZ^%jdtIAJt t.9foRy@.#Sʳ1d%pкB8u%g-N'?w a dBƆeoqahahXNc"ʴ IntZ25frtth kjvbb)#J K <Π$|S'<_8>͑ LlwI?q1AoՂ@.2gd5IRfjFaRCƙ9L9zWV)3AbVf;k /}K%JKjvMcWF?Z8|kq0 u:He ҧLG: SI@ vg(VM01M &ښ`HC2uQj>>d?mCKf+ќ5<VzkAD}057$Ƅ8. 1Ag 2IGuMAߐǾ6c:b,2 a `V:: >ZHO1͛Wak L6=qf[/Z[<1;=6*{afz/{wּFm68.mX& uoucB"~LZ  `JZp}ἻX\F0bqZt2_,[Eg~wyLӛ{QwN PDP}q*Ux7 *]| |{=0_d*XwYuC, ؤ;6ɱU`ZvXG':dZ%a|xhhB{sWZvTN6X0!xX2Ig#b|K 9`TRlf5wt=Gv[BaU譓鬘VuuB&X\TɱBd{H 1l/F+Hx  nGON ͈(=K-ڎ<_e! A#bEXLg Zif謩q AfHa64_k*;餓$/r@% U CêԙPbLG''. žR_ u.x`0ׂbѸ)BI ×!8 J 6w4Sp:0v?"Jnw0T7/漜nZ*S Fm9`/!$HqwƓ-Y:3iI EtH}ADewa|:~ŗa)oJF\VJ@`,Ns<*g MC EK"hTYcO,V@dVuj¼=I=֬#"0..@JC~=}p^ttoU#0%y:erryީVYw_=BBѦ$VUsZEӄh1Zν9a"@;raf: à@."G-%⣛;id5ndNCa!%Vj/r¡&)uDN)0P財a2d2eB,t*m@9GRR:YaaT:2w#׸;0H,% VP1 ‰ۈw, '쥍PZS~-qFM/8",J씑3gCȔ:2eJC3Y!Ǝ!p#;3"R4frJ5>Ok '.A[(B 4%';bP+uK}ĕUjXeM)eS#6#U%s5h8cqi ֠MQOzEjjIi7tYxR.jdzĂ@,>FH/SIt^GR*F$oLKAsTC#rIm80E{Cxq-P>'\/'Xi !X1񩽦+n@^HPdʍ ,AJJYle˖DUgMi 0F .Xd۠&e-n9)ӀrM7T ^4î72Sm3E ,^!8tOs}ɈEss&lg`8g ˞CM/)um5`k^<[DFI&TE1|.4ı(u~1bE)Gy0v:E2|8CjCɯꪜwHu8Ȱk)Z#3[9‹ws bЊ B@ 1s`DU؇zF2}x.8NB'>ZPr r.`=StZ)YD 9 Kz@% ;bn}~Dv.s *}D#h5#K;,\6?0ergggeύCkj|嗙 ݥ?s BTPE*' 9t׎Ϭ1p: UO1~Uo%b*`C= BՐ ]hĊ12!ӵ|j Cl{ȹn +pwr^|>hP 2G mBB%Ca;&風1pVõ^ǚP[Xĉ`|2a$ !\=k,Fc vzLހјQi2 LtH9;UZ=3\RxDj'm"w_ꫯN <g^+Qr"N2"=͢#/r'\,#KքJ.첄Li˚t|N>CRqx$R訯oxre]z3?hs68r8cp|lGn09~EȑЙ"@O%A/\5xM蠫N_Zd\!#@gK#:1aǺx*e_k~~?f^s*%sH#P~: X;PQJ`]y<åwRvwY@Z c>O9)nZ}gyftzFn{VX>&.\j `80)`lH@ (#h>S5U0!+>؎BzˁcYg+}\3gYw]b#{r#PgY,g&`|~z(`Nqt 0ͻ3d[tV}2{WPNhSl \YQۍc@/qW m[Dt8w\r`Nbn5_aѥeCvD gd0!`?#`@y(ִdF# ̈hg#`z!`F셐#`@30#6]K#`腀B~o0@،vv-0Ff^0F43b3ٵ4F^{!F# ̈hg#`z!`F셐#`@30#6]K#`腀B~o0@،vv-0Ff^0F43b3ٵ4F^{!F# ̈hg#`z!`F셐#`@30#6]K#`腀B~o0@،vv-0"p;ꨣp3#tgi:{G\:h7z̈UoA#0V\qk&d|衇ygYvFD G6ϻN#~^zUW]U މW 뭷qQ1 !Ʌ+nvZxR]z饭c `FO[&@^ nWD4j/BFXWYeAiJ`A~-[Ynꫯ!3bx:#5{ ?Р!2"#f/f"ϛn)Ν))D$W_~9d3lA0g뭷wH ,5=6m4,tН0[-;.R:_#P(H[@A O8oWr#5`HGIŁB;7]:Mo\NRk h"69}&E8c _8"P$?)Q!<QXx+NJL0aԩAE\~ ԸtR^mFңtobu(3b;}#`^GF;F#P4fĢvF#P ̈h'#`FX4N#`R#`@F#`@50#V\J#`(3b;}#`fjKi0E#`F,ao0@Xvr)0FḧE#0FN.0Fh0FT3b5ɥ4F0#7Fj `FF;F#P4fĢvF#P ̈h'#`FX4N#`R#`@F#`@50#V\J#`(3b;}#`fjKi0E#`F,ao0@Xvr)0FḧE#0FN.0Fh0FT3b5ɥ4F0#7Fj `FF;F#P4fĢvF#P ̈h'#`FX4N#`R#`@F#`@50#V\J#`(3b;}#`fjKi0E#`F,ao0@Xvr)0FḧE#0FN.0Fh0FT3b5ɥ4F0#7Fj `FF;F#P4fĢvF#P ̈h'#`FX4N#`R#`@F#`@50#V\J#`(3b;}#`fjKi0E#`F,ao0@Xvr)0FḧE#0Fy׫QR zWT瞥K*|^~ꫯ>'N >+[)V[m'V[-+Z'I= 2hAI]i:}DkUD2b[ef<#ƍ1p o7^{~ t8yd~Q3_\p3D~ w-@ ߟ&Ÿvizj٪Lw%Pq'HbΘ1c#gfpǖ.O0#6;( 租~ȿjb-$TAp '0gΜ5X/nlgL~HW_}5@qo68㌸T^{oftK=~D/-CxLi.QNPrQ;m=Os$*EcOK?xcu0#͛7蔍@ ['LB S"a%%y̐ͫ R I ) =_F je ?Xػ nWTpmXm;]L.I%Q_Mus=/2%pB ^Hf{OH0A&&:YPwQd$.aadɎT0pFCĩS*u`wܹAl袋BPH. &RA:G?9p]QNC3bۨz%-%xQ~5 40vzH ˀ25]y{Q}ӟP-r!؆Ȣ2$%/G?)5pI쫭)]DՉO`nX|0*T'q|H-{/ϱ'[dBe[pheUP8]v٥L;{v$0!`F,[&ElO5"0z+Ke"P7 iG-Z~P *ԋÿ묳Nk٨)dgF *LL.eQF:R$)S`ةڤ&IB.Ȉ $o}KsI&V &"`%q;艀'D &'T{g"DB뭷^Ϥٖ F觓3du"' 'Oᥗ^#R<py`9VSw=@ Yj2.)j;T|d9R,#1(N5\mr#V'$B0!h82nB5G:b妛nښݲeF G̈9D@j 0^CF3BDO'rsОg}s (FI4%4y>}XD̕23mXxqPS y_YĹߠ8 *ST#RPg`f+芩udm`F _̈@@*xo&l>: t&b!m&ľo1Na+aL+j!6&R5EX`c} L^()T릡xą6H_ Rlȅ|'0Rh S4 CU1($I͞=;M[w}k{LI(dD5-ᆦv4q42Ve*sMAy֖>3X$j= ufW*NXM#q iVázËmeRn=˔(mIm$D):[LQme+>KJ#v x$iBӚ~[(eĆ%d R0n"zJuqJKт ȻG50#, 1̜`XÿyClɤm!`Ft(B@G[e7#ֳ]]+#`ȊmM"F#PÖlW#`"`F̊#`@=0#ֳ]]A`s[u$w"Azw|6>gg PPr*3f-U\3b׵ˌmFɶzL8 49)p[$3̝Ր7]j8͑li 0FQܮlo~w7qKPulwﴺtC":=#7# q.WQ@0#6oC(rFv )&FDiI=>uɢH|"kКQJ kS IT8d/]֝s"uF('h'NoE88;%\ 'gDr[n?o>4p'."|`5s_I,w4 DFw3#Kk\҄ʔ>.mM">J ;~y$+>CU8q>e4F-fDw # nYMD `1 ϩi U,z;qY80B`B/AE* *H@UcTV M7ݔn,n T! *Ѧqǖ5QĉgF[l6 .l ֵ@DF4;H cT6E{9xeYs1PwKUl}衇`w;j4` 7@_̿)*<{3gBQ"-Pϰ,"$H\3{,Y{8r6mSL zٳ5F 1\\0Ys5wVnmA|TXk:*oI5kV%-nb͙3mVV\Ԓ `F,ICeA}6;R(c9,XOPfFXkw區0F `ѝ#`0F0F0FD,YVzp@IENDB`$$If!vh5#v:Vl t 6P}065$$If!vh5h%#vh%:VlB t 6P65/  / e4p $$If!vh55#v#v:VlB t 6P655/ /  e4p$$If!vh55#v#v:VlB t 6P655/ /  e4p$$If!vh55#v#v:VlB t 6P655/ /  e4p$$If!vh55#v#v:VlB t 6P655/ /  e4p$$If!vh55#v#v:VlB t 6P655/ / e4p$$Ifl!vh5$#v$:Vl4 t0$65$/ 2 sasf4$$Ifl!vh55#v#v:Vl4 t0$655/ 2 s2 sasf4p$$Ifl!vh55#v#v:Vl4 t0$655/ 2 s2 sasf4p$$Ifl!vh55#v#v:Vl4 t0$655/ 2 s2 sasf4p$$Ifl!vh55#v#v:Vl4 t0$655/ 2 s2 sasf4pDyK yK nhttp://www.gcn.com/vol1_no1/daily-updates/20485-1.htmlDyK yK ^http://www.nsf.gov/about/history/vbush1945.htmDyK yK zhttp://ehistory.osu.edu/world/articles/ArticleView.cfm?AID=9DyK yK http://www.dhs.gov/dhspublic/interapp/press_release/press_release_0439.xmlDyK yK dhttp://www.dhs.gov/dhspublic/display?content=3649DyK yK Vhttp://www.gcn.com/23_34/news/28097-1.htmlDyK yK Vhttp://www.esri.com/common/rains/news.htmlDyK yK hhttp://www.eweek.com/article2/0,1759,1555316,00.aspDyK yK hhttp://www.wtonline.com/news/1_1/state/23116-1.htmlDyK yK http://www.nclis.gov/info/trust/TrustandTerror.brochure.English.IFLA.pdfDyK yK http://www.whitehouse.gov/news/releases/2004/12/20041217-1.htmlDyK yK nhttp://www.gcn.com/vol1_no1/daily-updates/19977-1.htmlDyK yK thttp://www.rainsnet.org/press/newsletter_vol2_special.aspDyK yK ^http://www.rainsnet.org/programs/open_spec.aspDyK yK http://www.homelandsecurity.org/journal/articles/displayArticle.asp?article=97DyK yK http://www.fcw.com/geb/articles/2003/0331/web-oregon-04-02-03.aspDyK yK http://www.fcw.com/geb/articles/2003/1006/web-rains-10-07-03.aspDyK yK vhttp://www.dhs.gov/dhspublic/display?theme=10&content=3240}$$If!vh5T&#vT&:V"l4 t065$$If!vh55#v#v:V"l4 t0655 $$If!vh55#v#v:V"l t06,55 $$If!vh55#v#v:V"ld t06,55 $$If!vh55#v#v:V"l t06,55 $$If!vh55#v#v:V"l t06,55 / $$If!vh55#v#v:V"l4U t06,55 / f4}DyK _Ref112405872}$$If!vh5?'#v?':Vl4 t~6,5/ /  p T$$If!vh5 5555`5#v #v#v#v#v`#v:Vl4 t~6,555/5p55{/ / /  p T:$$If!vh5 5555`5#v #v#v#v#v`#v:Vl4 t~6+++++555/5p55{/ / / / /  / p T*$$If!vh5 5555`5#v #v#v#v#v`#v:Vl4 t~6+++++,,555/5p55{/ / / /  p T4$$If!vh5 5555`5#v #v#v#v#v`#v:Vl4 t~6+++++,,555/5p55{/  / / /  / p T3$$If!vh5 5555`5#v #v#v#v#v`#v:Vl4 t~6++555/5p55{/ /  / p<T?$$If!vh5 5555`5#v #v#v#v#v`#v:Vl4" t~6++,,555/5p55{/ / /  p<T9$$If!vh5 5555`5#v #v#v#v#v`#v:Vl4 t~6++,555/5p55{/ / /  p<T9$$If!vh5 5555`5#v #v#v#v#v`#v:Vl4" t~6++,555/5p55{/ / /  p<T5$$If!vh5 5555`5#v #v#v#v#v`#v:Vl4 t~6++,555/5p55{/ / /  p<T5$$If!vh5 5555`5#v #v#v#v#v`#v:Vl4 t~6++,555/5p55{/ / /  p<T0$$If!vh5 5555`5#v #v#v#v#v`#v:Vl t~6555/5p55{/ / / /  p<T$$If!vh5 5555`5#v #v#v#v#v`#v:Vl t~6555/5p55{/ /  p T$$If!vh5 5555`5#v #v#v#v#v`#v:Vl4 t~6555/5p55{/  / f4p T_$$If!vh5 5555`5#v #v#v#v#v`#v:Vl4 t~6++555/5p55{/ / / / / / / / /  / p Ts$$If!vh5 5555`5#v #v#v#v#v`#v:Vl4 t~6++,555/5p55{/ / / / / /  / / / / /  p T$$If!vh5 5555`5#v #v#v#v#v`#v:Vl t~6555/5p55{/ /  / / / /  p T~$$If!vh5'#v':V"l4I t05$$If!vh55#v#v:V"l t0,55$$If!vh55#v#v:V"l t0,55$$If!vh55#v#v:V"l t0,55$$If!vh55#v#v:V"l t0,55$$If!vh55#v#v:V"l t0,55$$If!vh55#v#v:V"l t0,55$$If!vh55#v#v:V"l t0,55$$If!vh55#v#v:V"l t0,55$$If!vh55#v#v:V"l t0,55$$If!vh55#v#v:V"l t0,55$$If!vh55#v#v:V"l t0,55$$If!vh55#v#v:V"l t0,55/ $$If!vh55#v#v:V"l t0,55/ $$If!vh5%#v%:Vl4 t0%65%f4T$$If!vh55 5#v#v #v:Vl4g t0%655 5/ f4pT$$If!vh55 5#v#v #v:Vl4c t0%6+55 5/ / f4pT$$If!vh55 5#v#v #v:Vl4 t0%6+55 5/ f4pT$$If!vh55 5#v#v #v:Vl4F t0%6+55 5/ f4pT$$If!vh55 5#v#v #v:Vl4 t0%6+55 5/ / f4pT$$If!vh55 5#v#v #v:Vl4 t0%6+55 5/ / f4pT$$If!vh55 5#v#v #v:Vl4 t0%6+55 5/ f4pT$$If!vh55 5#v#v #v:Vl4 t0%655 5/ f4pT$$If!vh55 5#v#v #v:Vl4 t0%655 5/ f4pT$$If!vh55 5#v#v #v:Vl4 t0%655 5/ / f4pT$$If!vh55 5#v#v #v:Vl4 t0%655 5/ f4pT$$If!vh55 5#v#v #v:Vl4 t0%655 5/ f4pT$$If!vh5%#v%:Vl4 t0%65%/ / f4p T$$If!vh5v%#vv%:Vs t065/ 4 sDd `  C <A$connectAndProtectbjD!"¥LnjD!"PNG  IHDR-5Z +PLTEN-,/JtJrpUI(8*։.fPgsmghR%OѲ٘wxwxK+.Oj"4Kgfgʉjz42ERuG{ulݴάVVWDpʵǽEEF{ϷJXifʔϱ3xt͗EwuhrRKڈ3nFqrJcp뫑qӈqqiI$H-݋1qpwYhX>8;׭qh懹yԓ@sԔJ #P%#0nKċ믎MMnPBr̊RHt0*ZHOpKygcu{cZc2AZR@uhcjwEIVř:bva9:DSZ׵ֺXRai;^Ħy- Riәytjsxآ[{zyvbdwdXc.[E@{fdOzXUF]oñ㙶7&銲SJS8aJ^RɆyGAV@@[_{jЋ㗭F_{{Y cbKGDH cmPPJCmp0712Hs\IDATx^ @>t PAh$QJ+F[5A*Z[iDH),5 *,Q YEGk+jK:sO]_AX.|{@E-~o9s}qtzh-?{G|_#z~DKՏ-?b{G|_#z~DKՏ-?b{G|_# \dhhp㏝,{7ҭ[G|ǃ 2%х>RK^ ܹ6g[}S(+/ה//?_R"S-Ώji9?Zs#Zno.WEѝ2*00::ZX9 jkF>QSr1{\ _ivN7Ųߘ6Iu9+<aX>ze{h<߂/;/AAO[+ջJv)?0S7gȑ B$Rjd.%dojy*kr]&㹽։eK.V>tK/ Ȇ@U裩)S̙3R-- +[--@Ӓa j,tp N^K$sVzҽkzz__/_;Kk\ WXx0<9ټlE1r8ׯ_HȌ뇥Co7W+u2v`U .CY]v\cw~3trX8?1?_%U~uvM4}92*%xȑGlqp[waz(XX&'\jYI! scoBYk5F \)rڕ:QV-}tOڛ|Tm2%^a^sH aߟsk[_pYSΟ5g#FI[tد ^< "]ȬϯJѨ5jD o9JEUpЂW:vHxy%ц+a0D"0e~Ŭ*zv]xO߶?$ܙ7ֈ6nQ5k8`QSH~ ,.* 4:@[)u2@d ),UNR*"Fƾ#{A z^ I"@^ 4/]p3ȳK5%fdd`F?xГZŔK>Xc많7@DHӘ+5FmjBF-tfZ7*eJY-BiqGق]$WEK U4麮+_\ռXEKT*>_zGWh4 ZE+D -ÆPC]lwVZiU(5h:V䫍JE}9k=Mv+bI7RtmX1ȼ@#H3;_2=+~`9тn֑#4Zf͚"%ZBf@<=alYЏhYW G:Ph%4_1k2RT R響O{Nl3d$2Tؚ~\R>_rիg͚3kΜYg͟dؒ󧎛8nqƍa*uV6Sc@ ]RD7hD N;V'kk "RW6+Nh` J.{E7\Ned,B0`&xT! q"̭Y-]Gu,_{ZH;H 8וY[T>힐-C&4pJ M*Jbrrr{rc١hx% 3 Ȅ5/)mox=>۵u7{;}cDIUQ)"]hfcʉa:I6ݵX s&nXBXahn] -Xw;]# [#?Bn9tnE|$*9q2FUc7UŰ{ѹ˕%2&֓1eGWQ9`5k ݏ|UQX.Yh#y,땛Xle+pχ|SM|[ç wsغzށ>\GGJ+6l^ Sښ2sV ۫gϠu8 շR[Y19JL{ ݎ`9x0AU-MRE襅16%ĜJf1cIo=K^w+$ZJVRyמA'=ƻϢu~LX-_b+Ӣ~`&X9XDE@>Υ ENG!Wi|U=˓x9zļgϔAK%^TlWwgтŽ&&0Ã% &K] 9D\n -Cc55mczZbiI6I׷E@#R!%<.Tv.Vr0j`aۦ-M+PTz:Pf?3qIgi7nwт+\"xEŢ  Ӵa椙gN).+S,>/G&'P#(ꠟߎȝ_P^ꫯTyguiѝvOąz._.ZP'4IBR)cjj24`& 5ßi{eycz_p?UKtA:P$$_rU؀eB9UںW/^꫋V SSH-t&-w=@/wR3lёC&DMM J7-~*sUh%<%.m `B;x8p7klZ__<W,8&Nnu Dq&9i"ogR_'fFbbb`BN7A=6i'$BzOOS]|L-2\O:)6: @ J׹.ŢcCX枑i;{{~UԷ'p`9$(rB7QO,NC' q/~iiDXόCmylfF`* rFH2N;=>>>%m-0Q'jשvdk5k:B>v_=k1 oRC!s?e`9ؖ4zOa>x|g`7Gҫ\ol9h)jw|ppX-洝7z{KЧΛZRMJS$RxCMN)ejfiKD4ϣ)s%'qӣ]C{1ɹB %Wu>) ]VͺIX ٹxOx2"LN]w:OʓNN?sB)^ Ivyf|LO> <17*tަyXAG+JU].`hPFAX'3ÝSD}SȏQL%&AlC jE~U GB7Yxڝ"a!xH;:1&?'OFF*@%yaMn45ީf5/;:0[xeZwk? $>'SG|}$ VߡqW|$cW 8Av]i"ɢ d; $Z(|HV`76Z`I jnkӋF" h;*xGN 9Sg- Ɏ$3I:bs Y4ȸçX,GGl$*M;9h3tor-!/G+<ZNEWvрn?-MpI!ZRchp6MRXTښf[^Z~BFP3sRB & ?Aʓy`_R3J@ESZxѫ^)ɳX;)W/f&x:"SS+Se)|̡aU讇Yd~vG{yX}-H ( e׺`Z4hДqk|^ -Go}=yǡ4zl,U2sdQ\h<$0\Kl%ߊ9x'Ӯ6Y%Bfuhw]]^@W:3@n$Uls?%Bf[gCfVϙh7NEKI(7هvꛮ-d~ODrȉK-]:mH,[GC߼Dhly||ر6n,R(mSߍn,>ewӅla/8+&q+ݱG8BX^D#+um6cߔYv'wj%G8!PCgHf2ZV6[$eIfndnw镱u2M&R:M%LCKo(=#93exqSעm0¤ *d`qQƙ5>w{EȓW@2[!\x1ClZ=K Z8qϳ駟",B<>p?O!]5[51gOGk^<.<YY -^t<\dۇ u|ee}<9) z\{4hwuGRckdyQ!h|`!/jZpLbF14Y$ɒ7DWxT729XANWD Tr1nϔ)Sl?/D`!<8Gx ymeرkF, /;EygI] "ΐ!ļ؁Az]KECA`UJ43s~?x<4М4Xi ,VYZa!)uUjK#xtfPց[gZ-E8 B}-RTU ?urW(m)K\l 2n~+,LN*Jޔ|_IrN8|! ᇭnC9=s=xAM]B\ix`wlԾGz˫![ğZ"μ-[ֈ?ޟ/<_O0piORU̕U֨(Mj Hd(6kԍUF̨@@-Y2U `wҥ\RE> ]n!RD.X6NP)G6&0$hM';tEZܦ.N,2bGʽQN\n{-މ|r8Ka7U-@8P8!Au-@ 53Dʂ!! 3a* ]ாI7aXJQl2VSwHg5FЧV"Ef I- _CǁK#PCyfޥ.?&[W2zo5$K|aa*D*BL$ln,@F> tfyw/k $vL޺-]Z yމ ۗ~Z]w8"r$*GK2-Y3%K??zb($RS&,(S |AF'pBQ#,RZf-8TYAkV$z2lp.Ul]ԪR]TێE@~Dyڑ O2**QaQGŹg}&4T,nӖpe- u;e15Xڻ<[c ^aZFh Lh23T~*B <^PQ1N`VjӥH)?Y42䐪EanQ:YVV7郲EZp![`,jEI*XU LxK$\ȃ沊,f}]Q(8&Q|'=nb.^ٳTƀsP@p9 c ]R#{L k4$)xnc$Hox4QF$Y[r0V/RR~<d8W3dʵqj$g$WuȬT(٭+:E oHZ 2kA믞*b- ΑSJHd Z)PC,yp.FN?z=S([D7\0 @fFi/OzTI噅Ih%ZST򃆈*-LIIljK:Հ8D9]-PoG@ӎg-*%jQkhj+pAxt7ʞ-wݽXB$[yMTp&`@Pj)bѹ'/ՕƣL:9y5rys-\(r P~W,)jV ߏJ@(OI vW˥fRm+Ô $}}Arjŕ/ R>l^R8i˗Muo 2S~2=gnoy7C +(çF(ASF 95GsPbxh"NyTF Ŭf)4>nu+\ "G9R ˀI &N_j7FN+Q.J0YRFniE@ dK14#:;U!!#.9yC*87C zV5L.[|BɡŦlU8%B`Plǹ<ѧ,ȁeX4C'`!BPA.$Em3%(ZVZ;iÔZZ"7^"=p ˯y6r Z\mԺl y$d*>:Gj^Rj^A`f(wE2 -n@1+[[1p'&RHe"a86IzZ7q,oPNASW3R|}'d8n$!fҔ..@P~ @uE5I"`<0]z~T7{v H{{IsĻ(UfFo1yVOBf-4Qevü@8a c%N:`| =: 0O\KK1YM@k,hxQ2n1.3N`1G,bVRl5Q-Y;|%ʈ2kZD׫;4% ɼJޗKz1"祦 aӤͰnzږ~ }4.&hg^H#duرC(fFUR(߻iyyy`*:;Q5""2H81RZ,*!eQm5/Qt Z-'Aa6RkZA",s+G;Ej8ry+ra驹] ̂e֐ c+"QՆp?E| jT%y!/^8m }2@U?mDo,/ۍ#~j~@ CQwǑ&mUKyBn4d)& =diKUD'WO( ߿sڐqw)K|ߝ.LF%#BXiB̖!lXT $r-P4 ,$i".TIfV)%Q"V9oItv"$o[^s'{'+bH̖Z2%J6lzGZ?3Yzw.TRX TQ %пN6&08O.)>(eYHD8 8( c40`9X(TXlϱsl8W@lD$WW;.[oҥ;PeJ-?" -bPxDfh\4WVP6Nz'bCTU .q\%X{JQ"7((NqH:ҕǭ ٪ʣ+rBşHaEߵ dK "[dJRx.P 1p+""w;@YD ^KuudK{ST],'*rc޲@t}Kw3P&4hgK1ii-|KjULQ(py +;g a)?]qѣ |ckY;Q-|GPG#2nzBiKtd(c`!™)υ&.QZ|dK:7!:ߛU]=p[ 1ʣHٚҪ+hK -6zn?Xo`w!wuWw DO8.%ZļѻM?O#&@X(*GVǜ,쓌Y~p{-Q)3DO?ϱ[vl0蜝OV$Ex$+Av~/$y%"O]RZh朡X޳OMZTL ~2 =rwۏ8  =?޷e M/b ,~?oX-lٳ;'lGS*)Tlĉ'i" bȣ KT@Pnj 1NQ=ʃWv  Θ"F\bC3V|҅^^Gp E5Bu$;;GFh!+QF [ӏ'>"0^1 Eq|/i< b/8US\xNlBө@夭>Do*P%gml*`dBkE澁C.I _q(ܤ^\>vG-Z\?T>Md U #т6QSK;kX8DI$:eX%.8 Y/.>S}7A@@7FI,`Z -`r82m9c ʃB]W*=r!a/D-TD{ub7 4q+K<%%xZav% qhM$_(O٠p]e5Dܡ#ag&J,0̳dKtb)P)nvH0|H `D qׇBHw0RtEagi PV,m%R4I<v曣xRb­ /J9TlpA$|8οPSY*lwq1Oj5ef!B!U^y@y( + /Lj*?8F9 UԻlÍB2Fx1FU9H@vȢO/~|ZM{T"D7+khnE BgA\’<3;q K($6}̻ 8b*9S>pubS|aDzs I6ᕗk˞^(%RHcj.($@rLJ~CfZ=fpD|h]2*dL\Ͱmg"BB$4a&f* cԬXN˼hвc(,B&Kqd 8Q(Gڜ"JP:,b= ĜW05 @¶Mxe܉nġt/:BnHV4Og2X CH);VۿFҸ,$!!8\BR #ӀV7%T. D1d-Ռ7P%M Oyw}5G1\Hy\‘xv,wuCYW`Q2s=O`!l=$ %:kEوDUKF38p+~nv#[ڟ!<6Tnٲ`k6 K}O*A FSXVG- ԰!7eFcHo^ЂA"eFs66zJAߦhmO ɿuPe#,cM`RØwDqKR`FQ/:,5ݽC1Co)dJ2lɴ< >hAZ;<Э`şsYc+-ͨ ӷq.R(X3_ig)- ZUv` ɖ &b;*(V--Q |e] y0 ѱW>`apY1HES!\ 8@hvj riW9b* +2Ne) D6)Lnd.q'ݡe^[CȂ/@ V<%KJ_ +mXb:em2~e[_3n|iqzd( jI  \^<,Lc")O@- .-M+HR¤oN I<#tY..d e%Z}WWŏ T-u:蟓ң7%?{`x7eo{ZZ[Vd\&xႺ+,Vj`#$oq09<*HlY;}3‡9懬ڼ#ݻ8x޼sm PBOV˓OFsh EirnΪop` CY0z_,ObEҖ5x~f9IIECdչ7m:~w_$1FK ^Y0pbB+XPqh*].%8pMB2:訨;; fRW?*,[ H@w-'0S)!ؕ&[_!ע.,SvhΌ\v"#'_YGBeel.#aK֐|c@_p- z={h3Ng)7 V#1Hy^~ TDI!YV.D̪e C~Xyàed\Cؿ j_Pwq RcS(Fio_oN2VzpE2~Ƭ_Q:e?Se>ヒ9rs9YEIM mZMdyhGbc@K5sDV(\|!BJSZZh:u㊌[`Ï'L=\9pS 6Nd`G5h!Zr_2\쉇ti 9-<37=Ͱ1 2r򌹀 AP]fZU&LV횭RQ))eZgO~kNnFfE„l oB˟B=|\bK&j#V-`91>ҏVƶ?F:nXj̨.—%QMya_Eΐ6``F/.HdUaNV^o[/?.aS`zo{NٻE{~>K|/ܪ֔.[VD\gfya#&N;of@""`=M@ʁ[rJϖ:h||bՋ%hj8WBaeV, >5@[IV$Qe *xX ]dXA~4 c0VȬh5"%OtdzwpAsșgY9gB"EPv"tR&c7-G)9;-G]-Dv@ N8]nb_#[2K# c@eYRa,4 X՚j+pP_`rOM`<0q]r bϋ'V$P``?j"&;aψ'"xQ`)0 5!K)dK`VVٹ}AX'ePNq&3AR }%Ce4TQv ES {_\|@4%.PΓ5t3L4"-rbGBqs8D놆/HYWšɡ: lU̾?r $Ki~ll^zy(yQ zYg=/3bA}B+ QS A=YFHC3 L BK ) ~ӟ~h>|"#*peJ cR,تZ{E-l8^h&ge..%K]fѨmK 6 5}WyNN` \yM~dMyP|e3x+̕,2L9ЂR IYeAMٝeVN$ *. <0![,JM/?N`2+*} WpWjRCsBU"g R_B~܄&4΍qݓ<0]B5=uVV)F個 Xp!D*^[@Z!ZZ)3~/)!Ӷr@f@~ -;lC"Qx>d-1 F^0.5 (VD} @HpRlM[q0xOd@|y A\@w"tidi,moRȽsv,T$ X`;zGri^tnp&13SZhEtqPK=QU wGwJGNwL`:Z ZxH`+ŒS%`/3 ,g(q1Q:Zuj#Fz#bcQmBh>e |'xYݿ %^z ,9ҥ\1&%rUڈ S@vF (Otʖ D&쓑'ȅl!![%CA`.@ Jc/Mg !E7A.E&dŔd$=~0t0xڦ ȟ TyPl.tIK 0 ^r)-Jh\2tDм_Ce+{':rԇLmm`S38I[T@`ʉ.lmXPY`&ZZ,N42mRWh=6 6lؒK] x1]EPFヒwk|⩠Wp?{賠 +w|? z܇Zl~ӟgޝ%)V9ɖ?&XRokxN>19f&]8x4 U+FA4M&HF Roop8%D (N1s업ف 3]RHep诜LF4%.*CC7o8=sBg2 w^8Z=pt!%B?RCaRC … D8a`ad-/;W(d*nc [(VXULDBazn}YfdBg1\mUUWGUEa]5n8UUbUm*8F7WfMzc J%q`?gPĐ8 NTVN_![ "~%Fi;vFe)lq(q0D>} pW|`y` -V0""؆h,VGTQS,vz`-YN-M* JoɬW_@q[l:y( vX%#NPXJHzw'X~9DAHpʂ'evKN`P%f1A¿+qqOahHg\Bۖ-o{K. xhTe!{j`-[g (^;w]\?u%οjWZ6oa9bs>3R9npB5q͟G+m:;?e3`rp:ֲ^jFGB+kW/kVgPh&I)[\ BQK9nU['~ټ\ Z=ݜ'RNl92S7wMi.  cs_ZtïJQ$"B}&B07lsf鷾Ww| |@a )DL!n/Aϭx`=jQ塿R@UU X S~D .\;ʇޏ#H!_J n4!-@ lVxA}p=;3:}N@ N?oG𕷨#[\9r#9ms:g s"8j|ZI; &/дΨ zoܠ&H,>2Bx1Á)'<%8 (&]^2DÜ"B j I\8>? ¶s0-AQ@ 4Qge݆5w#[hA#&u[$Ȧ<eszʹuƹ XlqV u;Z;swŔelm+K/I@ Âظ6˯#[:v [b?S!'28; @ q6A̟hYYgAL1czx΄BLgS8ث& ݁ٲoo}vp$<\2w4r,TF`ABlD0]r%P~@WeC얁0`@0`0p ?f-BR6EdRklyqKpb+M>H"K./wS1PŃC y'IpB8-Ch:[XxO'fAhdg.oY3`! V̇&*{k&?W_\ܿ=t\/*b1JCG1eD),T㯡_#sODB v~= ۅl 9E΂-9s>3|Tٰaʕ$/#ܵrG y8-66I*YA^.hl@!Q$ZoNOOG(pW`MN9 \ [Hq;Ε l=zcb32@얅Ϛ%BD[rKd` FSsQW"ƚXO@6 w|d>D><3܊cZ@ H0K-Vʊ!,1] ȧmn+lXD[,>Ot Yz~45xf8<_M ,9W ʷwwظ ]"W@p ;p+p9SX ,,MfKt--9,n,'̀B^@ٸCIQ)~E%lAe?Ȗ%sV7 р|".h-2d*Es_O,Ol!h*诱I gS?%C9#O#"Y``G*@gd* 5 :~ Hw`ctCann|\"UAwɰG,fւ.`ϙ2 S7wxj"BW"6tm, q#Ãޏ@ %dԮRDFcy4zW 1w \A[\8f ?F!(آ87s! N((ʓ`rd U&BeHBdY pKf"F ϨE@Tb)? 69va@N\ δ"Y<dRꈒInt- /AKEK^@, ~qKQJy/mta%n(n;$@aq[wNptG?הmذfƑW~nmC*nsMD]@E-9k_k7nB[K:r$T~x? D {yC}wzW?} ԓ-*(+<6K(aYMЃ^ZfhA\[9@Je>>~d!ERsoL9f.Rc L|Z\T]P0ҁW[4ClyVt"UNsە" `Ჲ|Tͬ۰n\iL eiBȍo3+WNALMz<.!bH-݂rpZk2B>Qkwă@CܝȖ)Dzd12k?}6h SE[+5lTpAq\*o=I᪶\ϘH="z̜RF'bXALwf܁uֶEn<hxW+-bjxhOQWEČ\$!ZJT$I79*wOhG̶gsFzڠdWBx9+yGW-N3sRMe1YN*겔Z;6n Dil9A @xCG(h7r@w ܏?BoēْAuZ4a`P d˼}~򗿒۟BAw'L'\dٳsroknd.9|">cfDIF@'[]VTQ_4,>7(&m@ gD'pBhY=`'?[u9tV IDyy ?SK뀅at D4g-g d4O<~.Ӄ\b'naqR'Fs1I\2󊨀-[]$c*Q:nVX ߁+#}c5 1X ^ri"X7pGoZ]<lnnipZ9y~SaˀAWA(Z(f@ = .Y^X7! +?IЈD5rPs!PV[k3W,6&Y2b#B̖l~ljs^f[mr;˿&j27UA z>;D&Wpᴕoؾf%ღ-.Z9coWweeIbq^v R^E4ed,kkt 2-[t !7bJ-'spъZtyr3߻g&FX-=#é 30{𭿼jqݪ;yj׀rsіXyqQo3`S:&N{\ƠAKIGUѬK]|n =i-ZO,{k(?ʖZ|H)?/ÿD.)f\ TnF|i̖M-9{~hZ6siFرczqR g^f]M?eFgjkPњ &[TB=hL+2dHp#[8TXP 9J ¤6\H-|3엿\leb 9*tygVneՉoډ-5u+]9-)mM|yx< 1ŧ$"ü#Roۤ^FR2-ԈLF.)")PE!SqX4 `?*֓!Ĭ^aS_tqhb#9ߟP$ O.B4!'|oAS;Bn0P Pq[2n+W@?tGM!B%.bZQH7aߦڱq2^[..ZtW_]6h  V=W_Kth[4 sVقvVS öͩt^.:%xpy Ć!gYw-O%H"  $ V E<5J몪d2rHEZ, 44EըE 1l4k&0 * *h}O&;ǥHp J,UW)sxD/#)""oEz:꺩7#g*k{gi-^6mٲWֽYt}bЉA=w7v-}tZhd@Q|YX,0W(8Βu)Jy!Xrٸ"~s/GDSoLcO' t6ALa\J㈑!fx_RsH wrǞD!6e̳y$kR^zzqzjDM?3,8M9Ӊp64(r"7NP8D_/m$WTZ{_F6пze.[6}wh3fBN8 E5wWFV甆j 7W9@ m>'b#$Z0yY-iɾNJJ"Hr J)- X ug a>17Spj67oۺu+&ul:lhMچhm߆Kce&Wdv5lx#B>Zh$n671] Q um'}^{m߽YwݛӀ8ǁug,oڒ,s9Y_|`e 8[|: 2!\'ƴhlȖӉC%GrN49PIS!9b@R -u&m椙gʤ֙е=m⚴n6$u2M'.v.䢂bHȳl1諱*`FpIp:̡8nhAFp$e^ǎT-|`hͺ|MxHm (+F`1yU0nl!#Ih"jp:E$\1pm( ag|0ϱ"˲ö˞ee4, Vm_emL.5>16m?HM]W X,])6bh= p˜,rkOX{׭ء/8ѶLDZ^^sKlW2&)"X> {O𛱈idrDE-{ 2e?.Wm\Kmd,J(}dpF0׶ Ir*<8\Dz u|YնFCl"hRı.dJ!/1Fnk}u>?)i,[ǎ O!Ak'ʞnr*BYFP:YO"+~rBzH^B{÷cWrɊ4l9r( &nX2|fҠ{<, - q`A}x18Uy8k~v)0g \ ^;5}RppW*W_0i"J8s/lgk AjKY1RLBzͅŬ;Z޿tڴisEp6JqS C8YcŽ`B V18eH dii( ֆu2Nr]U= RQLH9#fR=;ADV "IV-/eK0IӬzJmy_ͱj ]بd:lM#%Ѓ!נݐNԦPBK$G OEh1AGڸjIaG↓ڑ$OaT_{2E|Ҽ_)ēXp4h&`N9L\ sJ ^E fjS wwbҮ)UUOWlv_k_ΡR] C-[:XejuSR:sRD7K#= U"FKJpFUL$I*"0qCbtVK"/cӽ <ȸኈvyϷwg#O(]bsPθ) QBXrYȃD=vٽW?.#s6ݩMu_݀rq7^-xE*R ` "u@,PA ,dxLq !s˟,k1Y1zi)R-d+9*IJ)YX\6͗1cw J(B/LQ?G h []5qPFc#@3в.O-u|U"_"ʹ= Fԭ=66puV LږFMu4 sȳqQ{i>y6ntE tNpɠ\g&Y}C. Yuܟ(A Å"qyY`;71XtSQ+3|bfDs©PަjMHX)V-lrMV3íۿy}ٕ\32Nr"!Uc*Ѹ+w1.g,2y# Z] ̓CER[ƒY 9^MK}vwt^3b:!v>Q񊉹G'_! KEϤ%'b/F9̈00"/<=55u/6t( U0[@6eˎ֥@Pw׎KkFSX} ZE-dR.O^=^ڟƆ D٢G)W2EYʖz_*5cKJl2y~#- }OnTm0 ):͊:eE d۷#\Dj NS^+R(t9g͸_*W߭KtLl%˘uJ=ڲgwA ,d(1rѕѢ2#][y7!04<8GɎ)7_vSFBH˷XEF"t"At6D]A }ZU3/C3R-B- pPͿG8e[ L"BnDb8LO_<5)1=]Jpq@TWY.I1_gZyėm 5_A!3N\.ÇoH rPXu=EhV5ՎV%t um˖q,s+Bc#@S6$G^D_omO~r9`Lu!IeIM \X蘟?? c[h{/6ҤBhT8ՕZEQ6*U(Gn&[ܟڴQym;A|b @B4\}0eG~6RX/6aQO3G__c1|J G7hRF nMېBj/3|䪖KZK[Ե_4 )@e(l ̾eeBgKBm%E$Zr%z:pŏP-$ld.wS zX4u gr:(s4@ڪQZ: dUt`ʢ7b֦|J!!MܼSh Fx*GeYt^"nOڼq ;y7y'd'-:u "ssh N;2nAkχ{)xyå#Gd53]y`h P"5VZTRX!嬖[`woq_~ C$Ycjh`Ÿ k:Ky~8/5#8Sd<(_P#o)T4ɢMՂERݣGC,oTa" J<\*sU{WcNʓfxTHTTabD槾 (gQ'IM3&{}<ܹGI Ԗq&߄E ~?\9gp#FbXL\[#w.C31F-/ ڃ;D(, ~{nwѹr" ѰkLxIlP [)p@@t8wڌlyf7?0ZzX,j-o.(RTk ޿ 7٦؜yLj/d˗y"2f]`]"f;MgnZ,]O"χY89:e @ϢE.ف +|QX?=ZDC^$Ͻϧv+[%`Dۇm=NI6^^E`ߎ\w]ڇ\Wg8X(8anˆ[hׁpj-:pB+`Vn`E~ҪqI[7 6vBk T1;_ŎoE{5GUF$$/.H3L6 6çMIch4 /`Q,2smv%%H1J% Bwhi.*xh Tb~$eئ%Y=Ojd#I@=C79C@ Q$y[ r}G#F n?O0}۞ھf>f(g1Ca L?:w2̠G20o^%xH  vJYLBf 5h=~jhvו"BI͡׫"/Ez T h:%ŧzfJ@#  q M4[@$jrufP[B$W\YU#f'OG8SYC1u#e'т4*?뽰WQeٷ HlS} С#q76N۞/<̯79_"Z~<:>*O՚bY,{zѱ'['"ٲlrCF XB~6 d!ԗ>3 h*C=`?7Bn/UUU C1czjV[$Bh QyJBXUJZdU~zy3]Z"?5?_?5t(SO=u#4ƭf72CJBhe7+^<9=T F(VZMKK#ٲ엠z|uىٳO>GǡksJ3ZјIri[XW$pyU,HhRW+JuNd"PjZQJZ*BU]=;M` "bp’B/#E|ᑡ/|@Vv ˁ K1d;&RJ:nєDd @ K@e㈍cP>عnx,8k-%ْCxIZEYqj*Ud7!-x̒L-RBS19xj?`j JӴl-RNW]eڨ|TP9FXEf#ʪ-Zc%CKu}-``ŗiX(`we'[y~ᅡ ېcJ`鲔C $ /3btH%EacFo<^{;!emjdHqys4=%|B%Ĭ:g݉1(\E h(,.>Tz~@˂~SDt :SlU+M:KSWtZ,Y4ePm]lH1"4V*|ɖDN2ٸfU'*5t((_)8-,laYxx2 $alO6zص6=b{ѓPcJR@L4 ,.@dJ:Uv aI KA!%lHRn JZef~ saK0?X2tKYRQsί(u|Ңl1E ڪ "]u jUre j r+~Bγ-dpb,g̀ _CׯݪX.ea.2u>'O^|EP ,bJڮªHTsXr!Yh:7?4bjMd16{%- tՂRe%>AXF ]O!/eFT$B0 #N3 B -jQ*6S4[N͵|ZoVT:pE-nl$*J2]gU$Ď() Q7d0 } +"UDcvmٶJ/e/r eӦG#$Ec h: FQ;T9 ^o[i7!?55 5tLB`jJd) QA.0@`B*4͛n!3o0`uFK2qhG@po: A0ހIINƺJ0(KyyC&k:TR.#/iaAYI~sLH@ BSnz]T$Ԩ#\QS\5#ȯSle)+7AT@WX-mOec:=O08=PZl.ѹuTRG ƨ.``9_AUkmM_ay*+ӃN$,)IZ_]ۺa kn=m;7\BciR]^38 5IBMb:WtL]-4!`YfR)ꔺ)1D,hE*Qz$TW1 e1OQpPDoMߩ"[K =g; Pc:$ $I*IU}KϔIʎiv?Ӟy~;_z34>;L [t"Qi1oWeB(&Rj XY4{!'&;K)r XM"N݌mTι\;kGxk-[3u# X:d fs4g=<&)ǯ"_t N+#*ehwFu6$YPOpKB-ǮZռʼ_j=irp?OgNLۘrn'_ ~/ma7 f׹h?P''溇 n4XMQqNG6l|qA4ݦ7Z%WWM96O/k҂'-?o>2~q{aet"s=n[ ^ yyv 4bͩ.;bq,%#uA~ݡ( Mu2[:t)Ss~Kfv+uZn9ix%퐙5sQo;#t%^vyBy%=׹"[N1f  'P dy8K2r.TECwҧxϩy@f?<& FwmF K(~Ƶ6B&Irr%eIkCp 9dGv矟83m9np**/te&jC{-H .B7JۆB9ɣ*).@dYXX}}&{~Wma ]*]lٽXS%XTw DԈ 'w#siʹ 3![N".oC MjTl2]]-]z&?Ʊ\Ɋ\smǸ"2.O i'PE0G^dQ`'|u<dwb#ոt)qA?c,jGq?Lw5m/m5 v'Ps8P\Zw8._HnUR/),=RC]|wNW/ӇeK=) 10Z\yہnY.S#߀" 갘g t}B?9יOUH0ɓgPW-ЩfK!WXOV԰bi. Y`6'_Ib 5;F'el]/w<=/ͅ*)<X21#nNheј zqtGއh '4jQͱӡ tix^X*lNP^K, '9D- On,$Z&C`apZǤ4m ,!oQizUe="ȘJ`: elj;9sʻ}m"@HEӜΰo>UX#\,)Zcf8J7\A~6MKE_NvPd$4u5[QNJKvlHp0a0A?4TBhi `ˉ(ωփf;??ú7 Z8BScv U-Ts#Lu.-RFKA^ 0n A BfT2A]뛨 6[9iVV)e^d??z?VƍOE'0sw`Pyj NPeĈ1RBh)F>>y9)49I @IyG +^^a -tŘ[ZN -s9?Bu[5B+ZX˭}V_D%}AZxQ J9k:ɕ1ӡegxedSa`Y[ƌ<@kmci V"nZbXaXqBlCr[VGYoou466"*C_('b/eOp'57}. /Che/cf/ Z \3Y_rl)h8!I" ɺj;u\+ٸ'KVhʱ+(<16JKQirY*B9UtӀ3:- \}]cP0b7-OOY3{ha#:ib D_p"0VT*iN8eV #ڮ$J!֩j[1΀^Js bDANwhw8˖W]_'$nfg"X|ŧ Ql , ?9$ʸaq1$ ŔǣrTHVTІHfi12vcOw} ouBGx 73Ǽc.ZHÉND":111R!L.',<^-J3ض\.偌9<N-CYh;R(d̝@0A: ^Xj]D /BPt6l\[tꤎw]s,Z؇ BCPXY,;ҽJZd"/ÿĄzWf(!y3&傲EX17=n XQK:k |e%ܨ uA^KAO Nt$%' eַELK.&\' >W衄 1$,!61%Si#t9A!P@PWn 4A`:M . c"lhZk {Z-ehiWBѢ z9%4 07YJœ9D`#i0_J3-شҹ, RILѱzt<+3hz Ԅ\"3pkV:\ 75߿@YCcq58١Z-Pv4P@4R.{\g]LFKpT^`j?Di.M뎬С MD`qO0"`9ɸO!Z(E߸WP9FPa4AsJ\qA-<﷾O5ed_4L"`jpVg0R+eBR}];M2tlt)Ka:w߾ ?AxWM+>eDA0ZP4/Hah'ef؂v3BkcNt);t87PoYɴzVpomj0j4W-H6jhRFSU-U\$Gp+"̝.xp3wL?xSvwt+1t|$)c1A2"HV(q ҈Y`fpl\0,^B't Ww =Z]Y[sFӪZ\ՙd8INmҷe }&X hKT}erqFa}(O'ʡ-(&ŕ4VS(ɦ(mRۡq OJhAքV+(X;ެfP~S5d-1_fȨO{!(U"R4VbZȢTTf%7ŅK.H!*l K#Y2Z$%fG"_ dnV~:%bkTZ1x {Xֱ8(haQ:SDq3('[ tfZ rhހjSaoւ4@j ` \a m)u.R4JQ4+Vn 2UXE]eQ:Zk}ۃޘ3m䍴68xa[n*-,:!YEL]dP\u|>(\gR^YgH1nf/" { Oy 2tۨfUJX>„&&H:^&*cs`D;)Eu6B'\tC`dӸ`=7텳v:,%Ra[}L1E6o[}n 0E Vc r ]0 [LP79C?̦fDe[W3D ϔNh`5\ׂP5*N ocؓ20 Pc|gsa첩Ro. e ]L.bwqAm'XoH6([]r]^ttW@@a{Eljٍrbs(C6fCIvZOSE$^bim! V ֋#8l/x SgK;hJ ۋt:Â3E ])cBKXSYө2As\VD`\լ/yܽ(#qersnyJ>JG3'3P͈#1a,gHS#{m쨘#B>4MV]`@n-Q=bd5{J XtJ 3c"rJ jP*M$3ʌjGC߬4R'UbHOb43hA!8EOhAn[z6ЇX+OT bd$WP(@*\mk32z/`~(K77~@nQ-@9QMD -E "2Z0 ) Ԛ*΂yCU2FQTC0 -$fGHYk > jY#T&J+OS )#2^r17=0'G11dY9F UR53*;"jnmPy",%IBrX^$tCh`xQk?pYʀËv*S)PD`R~NQՐ-jVhhG-BpW)/k*Z߮UUkLe;9?TuS%̋筌`q"ߧ7P)-TV0Mr5O;jYOQKIPi@^Υqs֯rnzaڄu,EFLK%(v:]![.B(O$dO\Ɲb1H enkKhAs/q) & * l8*Mb'X{+ocr.ES#EVE΁0by\Z0\f?5vTU+Ot8-4[{ -c`/vb$ȰlVtTUȁ'PtgY^ <kBc " ZknH*^LKL¹]h>\ܫݦ<Z<_3pE/,BM:QGGea=H#~_QkNQ (6wS]u=%;[׉!WJ0IY=np;wgM؁MBhN6+>2԰Xng?J\`T_ЇQO͍w"nBU5qW!s_W &n:2a(B{1tߑukC0'sz ۯ=䝯*uW~$Z(Ԛp00%: cL ]-3:zW_euH.95Nw*>{MЎq !#0(4_[?woo9*ZH7cAp`1q WbMv-j@V^ҧtI(~4] EA0;-}H~F t55HPE6;]`r;R#8w=ex L*G\"8Z&w6%IM{+hyT]?C]S?=V>{pGzrOSo#Z{D=u~{Z\w8hZ.B_y{uQ뾝C:3kghp GP}9Tv}K;V.V:kx_fHMdiV\w&4eG4xʕ;]F*^]it22nsPH1UO$CqsDKYn`C*HȵJd ;Ms:];ja8ψ7tyhD!X  s(2(mN .auMQܿLf҂]K-h0єVSQGuԉdp8lόom]{̦nk2h^eFaLQ :VDìZ)+ [\PBDNPQcā h1VgU G7U)PsKcUk ,n^R&e@V 2! tOCX]YLv+brZ [ ȭܟUlh2ho),&P7DwӃw\DũYr6PlvP)݅m~~ܸY0Yط\&߃74A,%D5-h3Pg7L2Ȳs]Gq͍25L5|:L&&Z"`:28S(k+ΞU%[AU19rBo yID,8)pY-9AgϏdp2ݽwz4j{i(]Z=F[ķn]Lz^XGE+Ϫ2n"mwyYWUSƭ2o\DBk gP YTY-uzͮ# W_ևgǿŝ{EhLxl(B,I8O5TfāŹz[F+XjΰmUڝFDZH9˘8>+ 19hzC!6Il-e)&E~8t!ǃZ+REP ?ݶ 6o@NU9H.+yhcRWymfC;CR._&qOp0GdζZoF;7*Ez[Ba@;!D{ݒ|pI+H =hұx0}8 ZCg'r>tN-PAaƜGmѲi]7nP^I; Z>ǔV3 - Lѻ29SB7ʏNkcutE[TIde&jW YDƱ ϘN3hA0IPO&_n}0gΧDxj a#"sG'j 4ȼ|8RZy(eX؉` gQOwk^BړTe&bՌ,hpٶE1l Ɵs/r@%$o"V7~!0|*ܪ `}nI2bnt#mnäN"E;WOn&ݲ-Da}W2v/8(=c:YR~Z.ZsB߄{b(ߣOnIuC?ulndv /-D}&)"|xiFmnE>/>~Awn՝^+5-]?TTՖe2gg(\Nc +ȳ;3,ڀHU:\UM1<.tXzr]{f-I:@ϳ*|"| v3`b!'3 -4am*6>L-s 6(;9|㻜IK7Db\ "?llw>{x lɆȊfVbMtUӇ#kR&,ABxjŢDKLh0|D,0p(D+b9oIfApDBIi>0</`xy`Rv#:!"~+^.uq \hF?_<-uT@36)UAfEvZYny.[c.i}f5;h g7q +~[+V5iğɉ7tm+AbDdQlD,3#\܍ߡH)Y1[%Omyzc#VoȐNo1+ggs;CzY ZH| R3'o+-[eXX*ϴ()VL,2it*qPK:LfOMP<1{JMſ{i7īUGëJ?o??:?OλhyW't9'RK<įͦ rՂODoF9TVˋ9*oVh~ ;^ix=3Sep#3ʚ}Tc_ghyv?jf/늋 Yvptk0?%~h~_]M)W~`oLƙ#%T_e#~U\?d{\w=ĉKPAOz.Çˈ(qb>->9~N2]RJx574 B/*u>iz`Y~nNac{AK{6?nQz-;!-Ek%7 {%+/ {~VмNs,>$dS{JȒzo9:2&4EiBmLns-K987^۱v~-B0d>:y>vt)_Ӿߩ_ԉLѕzr4]8/&]#hٕt 9~:/ۺ@(/űK9h RpBga 6Gy>O= XU?- lKgu2 {ҳ[q>+?e1hhz.WA|fKHn٥"tǨdQ3>"t ;!cN ] .hIBNQB*Zh^L˽{vK&b6KH JV"z @bwh15eHe Du_"hIPܐ$J8b(ơPpshT+G˚\"럸iṆN7:Ա&GH&nJqvQf Bb+9pp3$SCETTؐM Z6w$rX%ܪ4V R7LY)"Tz4V>C`"*ue,K> PWEH7t2B{] ?ˠF t6CHM)nB5Đ·:b"X2luaqt$PRSנ{iN"`Ñ j*,0< G4N]Ezʫh_3zCǏ- ɵ\ͥ|7WHPVk_]15אF&" tM-04nh`4h- ]Bek/DPt'JA2?|y-ZVD.L.ᙆoݐLpE j -yQ=nը얆̈pSDFP=XNh Т,>9GKE93A~=oD:\ Wņ(@K.;!@p/lO 9"i5V\e#E){X~-QM*Wp֮Ta')LLm9%fX*Bq+Q ZmRl@ P)Avɴb.i&zsT_T0B-[鷠"(\%h\EAK0`[Ctua =w*~.텒9`;ϹOԃ:Yn]RٙH6|uۙGXR6OSRB?D#(X#ZaWH1x`" Qh9 _HEzmHxq:"L$es&'# b>fIQ~YFEMDBK +FzE 'P+p0"$Eeέr5xػ M!AWّN&ޮ3Qbu d ]'%FB7'{u(09V.hb9ܹ'aXHT8 8Y/h^Lt%6)rQ$Smkyƭv rRz#G+r@'[ ݲE-A1%l)}ąRv-kfB\тE*˹ʗ+Wkb(&0٦cF")R| ?(+oCf@JmKB< iU?t'Dl@fD7 ܺb J)1(Y݂&TIDz -[LI-%0P*UYebϐgw, ϩ~\TTMaBr6 9^d`Dzr(v@ ʞI[Xe2ecO"?[^S DSHy]d.Ntc&ҔiM.7;l=wdKҷ\' - 9w))t`"4g8Έ\F:/rUdވ?w(0OBPƣ4WZu{]QI 'w-wHOH-aү,/ d 0txT婈,U% FZ1 5mb>e##)#,<a[}SzH{X[(jz1a6o ,q!'=c5J~xIpy7vW1`ủً~ccƼ+S|)RőAŎT$Klq"K`O@ KѷcX}_njKjyyIvw=D[LwiWQ#TB+E;*BP}<,8>qsAXL?8#t031Pcïv S\JٺCO=sMXg0/)qw OtҋJ D@FAO]蓏ӿ>nxU@^J3|ӠuY]k:Ǻ_ȆO,T=ˋc|ڧ{i1xq$˹C /ny?Uo˷ ˎ%*ph4@4 OF|Header  !4 @4 OF|Footer  !J'!J QSComment ReferenceCJOJQJaJ@2@ QS Comment Text CJOJQJ@j12@ QSComment Subject5\HRH QS Balloon TextCJOJQJ^JaJ.)@a. 74a Page NumberHOrH UDisciplinesDisastersaJ@ [ Table Grid7:V0 ((CJOJPJQJ FaBStyle 8 pt First line: 0" Before: 2 pt After: 2 pt Line spac... ((CJOJPJQJnHtHP^P b Normal (Web)dd[$\$ B*aJphNN ,; Normal Indent ^CJOJQJaJbb rTableText Char Char CJOJPJQJnHtHll rTableText Char Char Char$CJOJPJQJ_HmH nHsH tHxqrx 7T(Style DisciplinesDisasters + Arial 10 pt CJOJQJjOj UDisciplinesDisasters Char CJOJQJ_HaJmH sH tH zOz 7T-Style DisciplinesDisasters + Arial 10 pt CharOJQJVV Default !7$8$H$!B*CJ_HaJmH phsH tH DO#D .n TableText:V"|4" CJOJQJFV1F y7,FollowedHyperlink >*B* phF@BF #e Footnote Text$CJPJnHtH@&@Q@ #eFootnote ReferenceH*<b< citation&1$ OJQJaJ"q" x{storyNR@N b4Body Text Indent 2($a$^JaJ.X@. O;Emphasis6]<O< d5Heading2 *`5^J2O2 Z.Heading1+$a$8+8 z Endnote Text,CJ>*> zEndnote ReferenceH*HOH p@Style 14 pt BoldCJOJQJ\JOJ 5cK Bibliography/0d^`0NLL^le )*+ l              ll$hi|57@  34BKQRqt45>COU]cht~4#I JLOWWH_;e6kSkyy9Oc|S\]v$%IKoqr5 34#Cm##+3Q3\DDlLX``bb:b;bbbbc`ccc6g7gHg ajkmn08RScqrzlmu6995:6:A:dAeAsA)F*FLF7K8K=KNNN-]>]W_f__`5`j```Tahak=n8wXwxXאۑ"ޜ֟ۿ02P i w$ :c l'l-o+vJXfQTiWO1gb@ K(   R     >vbE5 rk  !u"o#k$%% &&-''o(G))k*)+n+,N,I--..=//)00a1b1o111111I22393P3334b445=5667889889:A:B::!;;]<<=+>>>?E@@AA*B+B,B8BVBEELLOO2UNUVVXYYY][[<]m] _``````aaaa&aNaPadafaaaaaaaaaaaaa b b bbbbobqbbbbbbbbbbcccc c_c`cucvcwcccccccccccc d d d0d2dcdddddddd!e"eEekemeeeeef#f$f&f?fAffffffBgDg{g|gggggggg h3h5h[h]hhhhhhhsssUzVz_zNOU1jkvw=пѿ׿ !-.@}D 4 5 ? @             M"#$f<=FIJK489C\]f # ##.#/#4490?bbbb8cdhh#h6o7oBopp*p=t>tzB%<=?@BCEFHIJUVWXYZ[\]^_`abcdefghijm00000000000000000 0 0 0 0 0 0 0 0 0 0 0 0000000 0 00000000 00000000 00000000 0 0 0 0000I0I0I00W0W0W0W06k06k0W090W0c0c0W000W0]0]0]0]0] 0] 0] 0] 0] 0] 0] 0] 0] 0] 0] 0] 0] 0] 0] 0] 0] 0] 0] 0] 0] 0] 0]0]0000 0000#0#00m#00+30+30\D0\D0\D(0\D0`0`0` 0`  0` 0` 0` 0` 0` 0` 0` 0` 0` (0\D07g07g0+300 0 0 0 000 0 0 0 0 0  0 0 0  0 0 0  0 0 0  0 0 0000 0 0 0 0 0 0 0 0 0 0 0 0 0 0000-]0-]0W_ 0W_ 0W_ 0W_ 0W_0W_*0W_0-]0Ta0Ta0Ta0-]08w08w08w08w08w08w 08w 08w 08w 08w 08w 08w 08w08w08w000000 0 0 0 0 0 0 0 0 0 0 0000000000+0/0/0/0/0/0/0/0/0/0/0/0/0/0/0/0/0/0/0/0/0/0/0/0/0/0/0/0/0/0/0/0/0/0/0/0/0/0/0/0/0/0/0/0/0/0/0/0/0/0/0/0/0/0/0/0/0/0/0/0/0/0/0/0/0/0/0/0/0/0/0/0/0/0/0/0/0/0/0/0/0/0/0/0/0/0/0/0/0/0/0/0/0/0/0/0/0/0/0/0/0/0/0/0/0/0/0/0/0/0/0/0/0/0/0/0/0/0/0/0/0/0+00H1 0H1 0H1 0H1 0H1 0H10H10H1  0H1 0H1 0H1 0H1 0H10H10H10H1  0H1 0H1 0H1 0H1  0H1 0H1 0H1  0H1 0H1 0H1 0H1 0H10H10H10H10H10H10H10H1  0 H1 0 H1 0 H1 0 H1 0 H1 0H1 0H1 0H1 000B0B(0B0E(0B0L(0B0qO(0B0U(0B0V0B0X(0X0Y(0X0C[(0X0"]0_ 0_ _ _ _ _ _ _ 0_ _ _ _ _ _ _ 0_ _ _ _ _ _ _ 0_ _ _ _ _ _ _ 0_ _ _ _ _ _ _ 0_ _ _ _ _ _ _ 0_ _ _ _ _ _ _ 0_ _ _ _ _ _ _ 0_ _ _ _ _ _ _ 0_ _ _ _ _ _ _ 0_ _ _ _ _ _ _ 0_ _ _ _ _ _ _ 0_ _ __ _ _ _ _ 0_ _ _ _ _ _ _ 0_ _ _ _ _ _ _ 0_ _ _ _ _ _ _ 0_ +00rh 0rh 0rh 0rh 0rh 0rh 0rh 0rh 0rh 0rh 0rh 0rh 0rh0rh0rh0rh 0rh 0rh0rh 0rh 0rh 0rh0rh 0rh0rh0rh 0rh 0rh 0rh0rh0rh 0rh 0rh 0rh 0rh 0rh 0rh0rh 0rh 0rh 0rh 0rh 0rh0rh 0rh0rh 0rh 0rh0rh 0rh0rh 0rh 0rh0rh 0rh 0rh 0rh00  0     0  0 0   0   0  0  0   0   0  0  0   0   0  0  0   0   0  0  0   0   0  0  0   0   0  0  0   0   0  0  0   0   0  0  0   0   0  0  0   0   0  0  0   0   0  0  0  0  00" 0" (0"(0"(0"(0"(0" 0" 00b(0b0b0b0b(0b0g0g(0b0o0o(0b0ph05@$0@$0@$0@$0@$000*@0y00@0y00@0y00@0y00@0@0@0@0@0y00&00000000000000000y0-hi|57@  34BKQRqt45>COU]cht~4#I JLOWWH_;e6kSkyy9Oc|S\]v$%IKoqr5 34#Cm##+3Q3\DDlLX``bb:b;bbbbc`ccc6g7gHg ajkmn08RScqrzlmu6995:6:A:dAeAsA)F*FLF7K8K=KNNN-]>]W_f__`5`j```Tahak=n8wXwxXאۑ"ޜ֟ۿ02P i o111111I22393P3334b445=5667889889:A:B::!;;]<<=+>>>?E@@AA*B+B,B8BVBEELLOO2UNUVVXYYY][[<]m] _``````aaaa&aNaPadafaaaaaaaaaaaaa b b bbbbobqbbbbbbbbbbcccc c_c`cucvcwcccccccccccc d d d0d2dcdddddddd!e"eEekemeeeeef#f$f&f?fAffffffBgDg{g|gggggggg h3h5h[h]hhhhhhhsssUzVz_zNOU1jkvw=пѿ׿ !-.@}D 4 5 ? @             M"#$f<=FIJK489C\]f # ##.#/#4490?bbbb8cdhh#h6o7oBopp*p=t>tzB%<=?BEHWXYZ[\]^_`abcdefgm0000000 00/0/0/0/00000 0 0 0 0 0 0 0 0 0 0 0 000 0000 0 00000000 00000000 00000000 0 0 0 000000 000000000000000000000 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 00 00000000000 000000*0000 0  0 0 0 0 0 0 0 0 0 *000000 0 0 0 000 0 0 0 0 0  0 0 0  0 0 0  0 0 0  0 0 0000 0 0 0 0 0 0 0 0 0 0 0 0 0 00 0000 0 0 0 00*000000000000 0 0 0 0 0 0 000 000000 0 0 0 0 0 0 0 0 0 0000 000000 +0 +0 00 0 0 0 0 000  0 0 0 0 0000  0 0 0 0  0 0 0  0 0 0 0 00000000  0 0 0 0 0 0 0 0  0 000*00*00*00*00*0000*00*00*000 0       0       0            0            0       0         0         0         0         0         0       0       0       0       0         0       0  +00 0 0 0 0 0 0 0 0 0 0 0 0000 0 00 0 0 00 000 0 0 000 0 0 0 0 0 00 0 0 0 0 00 00 0 00 00 0 00 0 0 0 00 0    0 00  0  0 0  0  0  0 0  0  0  0 0  0  0  0 0 0  0  0 0  0  0  0 0 0  0  0 0 0  0  0 0 0  0  0 0 0  0  0 0 0  0  0 0 0 0  00 0 (0(0(0(0(0 0  00*0000*000*000*00@$0@$0@$0@$0@$0 00*@0@0@0@0@0@0 0000ۊ00ۊ0 0 Lۊ0 0 ۊ00lۊ00Llۊ000Bۊ00$(ۊ00\(ۊ00(ۊ00Cۊ0 0!Cۊ0"0#$DDw   31!*(e,n1XTV_m^%v~C0=XjkAWhiXٙlDr +'9BMWahmpVt <PwHJlTWXY[_`efghijlmnopqrz}   K'h'''Hg%q5hj6oj0ql5BdI)N7SVgט X  #699;=>ABBF*JN]hiiiiii jjjjjj_k`kkkkkcldl!m"mmmnn{o|ooopp{UNj-4"$<FJ8C\f.+jxUlUZ\]^abcdkstuvwxy{|~  kV3 k (%#'3'o)..[/&IyISP0U8U[2_D_`ddfiilbrirsgyuytz~@]3:ҋ[bx{_$ +޷ɻoFX@[iJX^~CJ IM ]  xo!"i$((:*336::F;=DYDEwJ~JLOOQlX~XZY\\R]``c&g4gg~~<4xڤ!hެ]zp2Qj66: A:A?B F%F G$K4KjKMMZO/\n\agdvd:eghLikkqevsvy ||}FTl֘thDm\c'T['9*MVOW*U >1tBj^|!$"s""+#m##($i$, -G-b1EFFtGHHHIIIJJeMwNNYYYi.nRnoossYtHxaxzpw=K$ٍȑgn˜ݜٰ5YP"8i'lv.V ( "##V(i()63D3599:?,??CCDHHIZZC[bbFegg{gio2oqt:tlXQQQQQQQQQQQQQQQQQQQQQQQQQQQQQQQQQQQQQQQQQQQQQQQQQQQQQQQQQQQQQQQQQQQQQQQQQQQQQQQQQQXXXXXXXXXXXXXXXXXXĕXXXXXHQQQQQQQQQQQQQQQQQQQQQQQQQQQQQQQQQ !w~  %#))+QQXXXXXQ  `_/Xb$%[.Ag5:b$Q6~ @H 0(  ^ 0(  B S  ?lTable3Table1 Table1Text Table2Text _Hlt110415335 _Hlt110836090 _Hlt111455346 Table3Text _Ref112405872 Table5TextTable5 Figure1TextFigure1 Table8TextTable8 Table10Text OLE_LINK1 OLE_LINK2IcLbb+a99mm@@@  IcMbb+n99mm4S1SxS"SS6!SiS ϮS"!ST!Sl!S SlST#S!S!SrSDnSnSmSD"SS]SsSrSdrSTtStSbSdCSS#SS\ݺSZStS!SStSl@SlTSVS`SD`SWScSLmSTSSSS US߹||YYllwwPPQQY_Y_ggzz`3`3i333344:%:%:ii+i{{||m      !"#$%&'()*+,-./0123ZZuuwwPP Q Qe_e_ggh3o3o333344 :/:/:)i/i/i{{||m   !"#$%&'()*+,-./0123 :-*urn:schemas-microsoft-com:office:smarttagsStreetB)*urn:schemas-microsoft-com:office:smarttagscountry-region;.*urn:schemas-microsoft-com:office:smarttagsaddress=/*urn:schemas-microsoft-com:office:smarttags PlaceName=1*urn:schemas-microsoft-com:office:smarttags PlaceType93*urn:schemas-microsoft-com:office:smarttagsplace84*urn:schemas-microsoft-com:office:smarttagsCity92*urn:schemas-microsoft-com:office:smarttagsState>**urn:schemas-microsoft-com:office:smarttags PostalCode 43213/.-42*)323/31)3)3232343)3)3)3/31243232234324343%','(I0IAIHIPIUIZIcIlnz|!"?DEDEEu||r| l6p6r6z6666666dKiKidodkk ||ؘߘ+/:B oy+3Xd5:#ioGMOU18@IRX  ` g   vz|rymr]g##% %0%9%& &%&+&''''o(u(((,,0000YYYYYY>t<==??@@BCEFHIJTXYijm  |J&1 .$;$LLXXkkyy.3C*k{% }3344KK8aAaaaVb_b)k6688G9R9h^r^__j``kl m/mlxАӐט04  +Sy25w$56{  7  :;9:hicu?k<WXkl-ABWXo+?@Z'(EFU1^Xfyzg; 892JKhm3On0EFI()8.JS>MO r*+JKdee8   ' ( D     - 0 r      R v w   & H K          I J   V'$IL2Abz Zb{#$5FG N03u+,-=)lD j k { |  !!$$$%%:%;%j%k%%%%%% &&J&&&&&&@'j'k'''=(((G)])^)))**O*k******=+S+T+m+n+++++,,.,N,|,},,,,I-f-g--------.6.......=/C///////@0~0000<1FF LQLOOPP;QEQR.R'T6TkXsXmYY>t<==??@@BCEFHIJTXYijm333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333  ^5!4#$LLMW4YSk+lyy1`eA9O,|S73Q34DL`b;bbm[09>]W_f__j``kmXÃא"טۿ0 fCT\y  $|8@iqcv '-o+[v2JXf<4H9W4Oowg)Kb@ se9  R w      J R  >v2b{[b|, 5 Oru->)m  !!!k$;%C%k%% &J&R&&&&-'''>(o(((G)^)f))**k***T+++/,N,},,,,I-g-o---.7.?....=/R////)000=1ERLO2UVXYY=t>ttz{zz{s{x{{{{{y||q})~ADgrsО;==??@@BCEFHJTVXYimYYY=t>t<==??@@BCEFHIXYijm_#}.O\jc(H -e o>1M:U \`&Ljlܹ~&PIf625\L8e8-:;2A@dW$UA*8GKT^K-,*L.tyMxhvpY-s\(#ua\bt )fB4?{koNS}.\S^`SB*OJQJo(phhH^`OJ QJ ^J o(hHo^`OJQJo(hH] ] ^] `OJQJo(hH--^-`OJ QJ ^J o(hHo^`OJQJo(hH^`OJQJo(hH^`OJ QJ ^J o(hHomm^m`OJQJo(hHS^`SB*OJQJo(phhH^`OJ QJ ^J o(hHo  ^ `OJQJo(hH^`OJQJo(hHXX^X`OJ QJ ^J o(hHo((^(`OJQJo(hH^`OJQJo(hH^`OJ QJ ^J o(hHo^`OJQJo(hH}S}^}`SB*OJQJo(phhHpp^p`OJ QJ ^J o(hHo@ @ ^@ `OJQJo(hH^`OJQJo(hH^`OJ QJ ^J o(hHo^`OJQJo(hH^`OJQJo(hHPP^P`OJ QJ ^J o(hHo  ^ `OJQJo(hH P^`Po(hH. `^`o(hH.P^`PCJaJo(hH) P^`Po(hH)  ^ `B*OJQJo(phhH  ^ `B*OJQJo(phhH 00^0`o(hH. ^`o(hH. L^`Lo(hH.`P`^``PB*OJQJo(phhHPP^P`OJ QJ ^J o(hHo  ^ `OJQJo(hH  ^ `OJQJo(hH^`OJ QJ ^J o(hHo^`OJQJo(hH``^``OJQJo(hH00^0`OJ QJ ^J o(hHo^`OJQJo(hH $$^$`o(hH) \\^\`hH. , L, ^, `LhH.   ^ `hH. ^`hH. L^`LhH. ll^l`hH. <<^<`hH.  L ^ `LhH.S^`SB*OJQJo(phhH^`OJ QJ ^J o(hHo^`OJQJo(hH] ] ^] `OJQJo(hH--^-`OJ QJ ^J o(hHo^`OJQJo(hH^`OJQJo(hH^`OJ QJ ^J o(hHomm^m`OJQJo(hH^`.^`.^`.pp^p`.@ @ ^@ `.^`.^`.^`.^`.}S}^}`SB*OJQJo(phhHpp^p`OJ QJ ^J o(hHo@ @ ^@ `OJQJo(hH^`OJQJo(hH^`OJ QJ ^J o(hHo^`OJQJo(hH^`OJQJo(hHPP^P`OJ QJ ^J o(hHo  ^ `OJQJo(hH^`CJOJQJaJo(hH88^8`OJ QJ ^J o(hHo^`OJQJo(hH  ^ `OJQJo(hH  ^ `OJ QJ ^J o(hHoxx^x`OJQJo(hHHH^H`OJQJo(hH^`OJ QJ ^J o(hHo^`OJQJo(hH P^`Po(hH. `^`o(hH.P^`PCJaJo(hH) P^`Po(hH)  ^ `B*OJQJo(phhH  ^ `B*OJQJo(phhH 00^0`o(hH. ^`o(hH. L^`Lo(hH.h^`.h ^`hH.h pLp^p`LhH.h @ @ ^@ `hH.h ^`hH.h L^`LhH.h ^`hH.h ^`hH.h PLP^P`LhH.' 1' ^' `1o()   ^ `hH. `L`^``LhH. 00^0`hH. ^`hH. L^`LhH. ^`hH. pp^p`hH. @!L@!^@!`LhH.S^`SB*OJQJo(phhH^`OJ QJ ^J o(hHopp^p`OJQJo(hH@ @ ^@ `OJQJo(hH^`OJ QJ ^J o(hHo^`OJQJo(hH^`OJQJo(hH^`OJ QJ ^J o(hHoPP^P`OJQJo(hH P^`Po(hH. `^`o(hH.P^`PCJaJo(hH) P^`Po(hH)  ^ `B*OJQJo(phhH  ^ `B*OJQJo(phhH 00^0`o(hH. ^`o(hH. L^`Lo(hH.h ^`hH.h pp^p`hH.h @ L@ ^@ `LhH.h ^`hH.h ^`hH.h L^`LhH.h ^`hH.h PP^P`hH.h  L ^ `LhH.h ^`o(hH)h pp^p`hH.h @ L@ ^@ `LhH.h ^`hH.h ^`hH.h L^`LhH.h ^`hH.h PP^P`hH.h  L ^ `LhH.^`CJOJQJaJo(hH^`OJ QJ ^J o(hHopp^p`OJQJo(hH@ @ ^@ `OJQJo(hH^`OJ QJ ^J o(hHo^`OJQJo(hH^`OJQJo(hH^`OJ QJ ^J o(hHoPP^P`OJQJo(hHS^`SB*OJQJo(phhH^`OJ QJ ^J o(hHopp^p`OJQJo(hH@ @ ^@ `OJQJo(hH^`OJ QJ ^J o(hHo^`OJQJo(hH^`OJQJo(hH^`OJ QJ ^J o(hHoPP^P`OJQJo(hH P^`Po(hH. `^`o(hH.P^`PCJaJo(hH) P^`Po(hH)  ^ `B*OJQJo(phhH  ^ `B*OJQJo(phhH 00^0`o(hH. ^`o(hH. L^`Lo(hH.}S}^}`SB*OJQJo(phhHpp^p`OJ QJ ^J o(hHo@ @ ^@ `OJQJo(hH^`OJQJo(hH^`OJ QJ ^J o(hHo^`OJQJo(hH^`OJQJo(hHPP^P`OJ QJ ^J o(hHo  ^ `OJQJo(hH}S}^}`SB*OJQJo(phhHpp^p`OJ QJ ^J o(hHo@ @ ^@ `OJQJo(hH^`OJQJo(hH^`OJ QJ ^J o(hHo^`OJQJo(hH^`OJQJo(hHPP^P`OJ QJ ^J o(hHo  ^ `OJQJo(hH P^`Po(hH. `^`o(hH.P^`PCJaJo(hH) P^`Po(hH)  ^ `B*OJQJo(phhH  ^ `B*OJQJo(phhH 00^0`o(hH. ^`o(hH. L^`Lo(hH.S^`SB*OJQJo(phhH^`OJ QJ ^J o(hHopp^p`OJQJo(hH@ @ ^@ `OJQJo(hH^`OJ QJ ^J o(hHo^`OJQJo(hH^`OJQJo(hH^`OJ QJ ^J o(hHoPP^P`OJQJo(hHS^`SB*OJQJo(phhH^`OJ QJ ^J o(hHopp^p`OJQJo(hH@ @ ^@ `OJQJo(hH^`OJ QJ ^J o(hHo^`OJQJo(hH^`OJQJo(hH^`OJ QJ ^J o(hHoPP^P`OJQJo(hH}S}^}`SB*OJQJo(phhHpp^p`OJ QJ ^J o(hHo@ @ ^@ `OJQJo(hH^`OJQJo(hH^`OJ QJ ^J o(hHo^`OJQJo(hH^`OJQJo(hHPP^P`OJ QJ ^J o(hHo  ^ `OJQJo(hHh hh^h`hH.h 88^8`hH.h L^`LhH.h   ^ `hH.h   ^ `hH.h xLx^x`LhH.h HH^H`hH.h ^`hH.h L^`LhH.}S}^}`SB*OJQJo(phhHpp^p`OJ QJ ^J o(hHo@ @ ^@ `OJQJo(hH^`OJQJo(hH^`OJ QJ ^J o(hHo^`OJQJo(hH^`OJQJo(hHPP^P`OJ QJ ^J o(hHo  ^ `OJQJo(hHS^`SB*OJQJo(phhH^`OJ QJ ^J o(hHopp^p`OJQJo(hH@ @ ^@ `OJQJo(hH^`OJ QJ ^J o(hHo^`OJQJo(hH^`OJQJo(hH^`OJ QJ ^J o(hHoPP^P`OJQJo(hHvpYH ^;BuL^;eP^\QUa(^8887`Zr}  Thez  DvQ:R ~6G7DqYQSEYz| u*6y|b\d9noW4DOrd / K :S [ A_ e C < O z  $ $ %F W s aw { ) * 0 m c"FTk~CH;*?ekpy~+L3NV{ -2 6 T ll 7" " "\L"e"l"-#K#O$3$k$s$z$% &4&R.&:&a&tb&%u&5'IN'.V'Y'((oA(A(~P(_(Pa(f(s(~)%)A)G)Z)**`4*7*B*Ix*kQ+,,,y7,?,C,VQ,?U,X,\,wc,rs,v,R-M..}2.K.jP.D^.f.m// /i/P#/0/V5/%Z/B0e0p0{09|0~ 191=1BC1?V1a1x12_ 2 2.2A2C2W2e2?3b03T3a4y450.5G5L5d5Jz5K6%6:7<7+G7"8x 8V68n89e99+91:Cb:jm:m:>s:D;z;<<<u(<*;<tI<{<s~<S=N==WI=~/>F>d>-r>3?mJ?MM?@#@&@A@~1A1AGAB!B!B[BbBCn"CgmD|DE%-E`NEXEsEe}EMFFuFGG*HHHI I|@I(CICI8:J~]JwJgK5cKdKL ]L MM}bMeMfM}M6N?7NUyNO>O#OsO2xODPlPgOPTP!ZPq5QEQUKQSQXQW>R DRx^RcRsR4yRS$S7Tl>TPTXTU*hU4V\{VV%WFWMW&Xo\X`XyXdzXA$YSYiY,yY Z1Z(Z4Z4Z7Z6IZ:eZkZa[Xy[\*\Z?\d\Iy\]1T]l](r]M ^^v^3c^,4_7_rP_f_p_r_Gv_h)`I` #a$a74a9aS\ab.b7b@bFBb[db;c c ccMcRcpc}cd dAdodUee/et7e:PePeIdefB"f\f_fif|f'g)8g_g*hV\hw^h^h iiiIiMi]di#j*jGjPjUjej!jj|kjvjk+kQkakfk}kl$lf'lEl,Gl_l`b x}+ 7xUG .s+XLUo[9 9O;)@xjpVE(*A5-06`mqD2L"NswS`jyr*1DHZl-mb ;mDnX `r/ 5SAhsz$N [?5`)e<?m),Qs})Tm&GNOU+WQvxzd!0"DUFa l-~cC9^dn&X_"|&-L)fV_.'J 0IT^ n7p :uAiKN['2vz4j d..LKN9do,{?~~B~{|*w4@HKRVp;.:)dkmCvZxz9{ 9b4LOV_q9'a  'OQ_.CvI9Yqw2]YRbw+1s? 7lq ELi n V}6 h@Gr$&hq79Zw g %?E]Pri,5n_Zee,2j[p.t7K\#6ZM@Wan2q[ +P:BLj 1>]%x7<CQ_l'v?@ex'$Z.o2yb9{!+3MD{{DEUt\3ct .C0=B X Nio:p:#'JT]u.{CWJi34BKQRq45t$%IKoqrb:b;bcc6g7gajkmn0RScqrzlmu95:6:A:dAeAsA)F*FLF7K8K=KNNo111111333566788988A:B:>*B+B``````aaaa&aNaPadafaaaaaaaaaaaaa b b bbbbobqbbbbbbbbbbcccc c_c`cucvcwcccccccccccc d d d0d2dcdddddddd!e"eEekemeeeeef$f&f?fAffffffBgDg{g|gggggggg h3h5h[h]hhhhhhhsssUzVz_zNOUjkwпѿ׿ -.@4 5 @            M"#$f<=FIJK489C\]f # ##.#/#bbp=?BEHY\m/VVs0s0s0s0i2EN.InstantFormat EN.Layout EN.Librariesw<ENInstantFormat><Enabled>1</Enabled><ScanUnformatted>1</ScanUnformatted><ScanChanges>0</ScanChanges></ENInstantFormat>X<ENLayout><Style>APA 5th Tish</Style><LeftDelim>{</LeftDelim><RightDelim>}</RightDelim><FontName>Times New Roman</FontName><FontSize>12</FontSize><ReflistTitle></ReflistTitle><StartingRefnum>1</StartingRefnum><FirstLineIndent>0</FirstLineIndent><HangingIndent>720</HangingIndent><LineSpacing>0</LineSpacing><SpaceAfter>0</SpaceAfter></ENLayout>]<ENLibraries><Libraries><item>Q1-DisciplinesAndDisasters.enl</item></Libraries></ENLibraries>@,&lP@Unknown Gz Times New Roman5Symbol3& z ArialI& ??Arial Unicode MS5& zaTahoma71 Courier; BatangA& Trebuchet MS;Wingdings?5 z Courier New"1ha;Fa;F&5/F/F!}4dqq >qXZ ?]di2 dInformation Disasters and Disaster Information: Where Information Science Meets Emergency Management,Book Section for "Disciplines and Disasters" Tisha PipesFEMA                        Oh+'0H\ht      hInformation Disasters and Disaster Information: Where Information Science Meets Emergency Management0Book Section for "Disciplines and Disasters" Tisha Pipes Normal.dotFEMA2Microsoft Office Word@F#@$*@V-,@V-,/՜.+,D՜.+,x px  YUniversity of North TexasFq eInformation Disasters and Disaster Information: Where Information Science Meets Emergency Management Title|" 8@ _PID_HLINKSA4"i,;javascript:doWindowOpen('/SCRIPT/SLIS_LIBRARY_PRIVACY/scripts/student/serve_page.pl?1050598725+History/History.htm+OFF+Glossary/intangible.htm+','new_frame','width=600,height=420,menubar=1,toolbar=1,scrollbars=1,status=1,location=1,resizable=1,resizable=1',0) 8javascript:doWindowOpen('/SCRIPT/SLIS_LIBRARY_PRIVACY/scripts/student/serve_page.pl?1050598725+History/History.htm+OFF+Glossary/fifth.htm+','new_frame','width=600,height=420,menubar=1,toolbar=1,scrollbars=1,status=1,location=1,resizable=1,resizable=1',0)e!5javascript:doWindowOpen('/SCRIPT/SLIS_LIBRARY_PRIVACY/scripts/student/serve_page.pl?1050598725+History/History.htm+OFF+Glossary/fourth.htm+','new_frame','width=600,height=420,menubar=1,toolbar=1,scrollbars=1,status=1,location=1,resizable=1,resizable=1',0) 2javascript:doWindowOpen('/SCRIPT/SLIS_LIBRARY_PRIVACY/scripts/student/serve_page.pl?1050598725+History/History.htm+OFF+Glossary/first.htm+','new_frame','width=600,height=420,menubar=1,toolbar=1,scrollbars=1,status=1,location=1,resizable=1,resizable=1',0)5/javascript:doWindowOpen('http://www.law.cornell.edu/constitution/constitution.billofrights.html','new_frame','width=600,height=420,menubar=1,toolbar=1,scrollbars=1,status=1,location=1,resizable=1,resizable=1',0)>k+;http://www.dhs.gov/dhspublic/display?theme=10&content=3240E(Ahttp://www.fcw.com/geb/articles/2003/1006/web-rains-10-07-03.aspS%Bhttp://www.fcw.com/geb/articles/2003/0331/web-oregon-04-02-03.asp&t"Ohttp://www.homelandsecurity.org/journal/articles/displayArticle.asp?article=977/http://www.rainsnet.org/programs/open_spec.asp?d:http://www.rainsnet.org/press/newsletter_vol2_special.asp5G7http://www.gcn.com/vol1_no1/daily-updates/19977-1.htmly.@http://www.whitehouse.gov/news/releases/2004/12/20041217-1.htmlQSIhttp://www.nclis.gov/info/trust/TrustandTerror.brochure.English.IFLA.pdfT?4http://www.wtonline.com/news/1_1/state/23116-1.html=< 4http://www.eweek.com/article2/0,1759,1555316,00.asp9y +http://www.esri.com/common/rains/news.htmleY+http://www.gcn.com/23_34/news/28097-1.htmlSY2http://www.dhs.gov/dhspublic/display?content=36490Khttp://www.dhs.gov/dhspublic/interapp/press_release/press_release_0439.xml=http://ehistory.osu.edu/world/articles/ArticleView.cfm?AID=9{'/http://www.nsf.gov/about/history/vbush1945.htm9A7http://www.gcn.com/vol1_no1/daily-updates/20485-1.html  mailto:tpipes@lis.admin.unt.edusyjavascript:doWindowOpen('/SCRIPT/SLIS_LIBRARY_PRIVACY/scripts/student/serve_page.pl?1050598725+Current/effect.htm+OFF+Current/216pentrap.htm+','new_frame','width=600,height=420,menubar=1,toolbar=1,scrollbars=1,status=1,location=1,resizable=1,resizable=1',0)Ejavascript:doWindowOpen('/SCRIPT/SLIS_LIBRARY_PRIVACY/scripts/student/serve_page.pl?1050598725+Current/effect.htm+OFF+Current/215accessFISA.htm+','new_frame','width=600,height=420,menubar=1,toolbar=1,scrollbars=1,status=1,location=1,resizable=1,resizable=1',0)C^ javascript:doWindowOpen('/SCRIPT/SLIS_LIBRARY_PRIVACY/scripts/student/serve_page.pl?1050598725+Current/effect.htm+OFF+Glossary/probable.htm+','new_frame','width=600,height=420,menubar=1,toolbar=1,scrollbars=1,status=1,location=1,resizable=1,resizable=1',0)9q javascript:doWindowOpen('/SCRIPT/SLIS_LIBRARY_PRIVACY/scripts/student/serve_page.pl?1050598725+Current/effect.htm+OFF+Glossary/gagorders.htm+','new_frame','width=600,height=420,menubar=1,toolbar=1,scrollbars=1,status=1,location=1,resizable=1,resizable=1',0)Wjavascript:doWindowOpen('/SCRIPT/SLIS_LIBRARY_PRIVACY/scripts/student/serve_page.pl?1050598725+Current/effect.htm+OFF+Current/206roving.htm+','new_frame','width=600,height=420,menubar=1,toolbar=1,scrollbars=1,status=1,location=1,resizable=1,resizable=1',0)  !"#$%&'()*+,-./0123456789:;<=>?@ABCDEFGHIJKLMNOPQRSTUVWXYZ[\]^_`abcdefghijklmnopqrstuvwxyz{|}~      !"#$%&'()*+,-./0123456789:;<=>?@ABCDEFGHIJKLMNOPQRSTUVWXYZ[\]^_`abcdefghijklmnopqrstuvwxyz{|}~      !"#$%&'()*+,-./0123456789:;<=>?@ABCDEFGHIJKLMNOPQRSTUVWXYZ[\]^_`abcdefghijklmnopqrstuvwxyz{|}~      !"#$%&'()*+,-./0123456789:;<=>?@ABCDEFGHIJKLMNOPQRSTUVWXYZ[\]^_`abcdefghijklmnopqrstuvwxyz{|}~      !"#$%&'()*+,-./0123456789:;<=>?@ABCDEFGHIJKLMNOPQRSTUVWXYZ[\]^_`abcdefghijklmnopqrstuvwxyz{|}~Root Entry F0,Data }1TablerWordDocument?$SummaryInformation(DocumentSummaryInformation88$CompObjq  FMicrosoft Office Word Document MSWordDocWord.Document.89q