-k8凯发天生赢家

��ࡱ�>�� }����|�����������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������u �r�wtbjbj�n�n2p��a��ail �������""������������8�tm��pliiiii����opppppp$�q��t<%p������%p��ii4:p999�z�i�i�o9��o999i�����l޷6<������9�opp0�p9�tf�t99�0�t��l$��9�����%p%py�����p�������������������������������������������������������������������������t���������"q s: risk analysis volume 42, issue 11, november 2022 1. title: strategies to be prepared for a risk communication crisis authors: michael greenberg abstract: this introductory article describes a multistep process for communicating complex information from the perspective of the communicator. as part of the introduction to a special issue, it suggests three premises grounded in the literature and practice. one is an organization cannot risk communicate its way out of problems created by poor risk assessment and risk management. second, poor risk communication can undermine satisfactory risk assessment and management. third, a proactive plan grounded in risk analysis is essential and implemented with periodic training exercises. the article presents a step-by-step communication planning process that has been used in the field. much of the special issue is devoted to the experiences of practitioners and communication experts in successfully communicating and listening to government and private organization representatives, media representatives, and the public about complex risk issues, focusing on nuclear-related ones. the goal is to add to our collective experience on practices that work and do not work under the many conditions that involve risk communications. the ground is changing under risk communication because of the rapid expansion of media sources and technologies. what worked a decade ago may no longer be best practice. common to success across media and audience is the need for a planning process that is adaptable to changing conditions. 2. title: trust and consequences: role of community science, perceptions, values, and environmental justice in risk communication authors: joanna burger abstract: risk communication is often viewed as imparting information and perhaps as a two-way dialogue. risk communication inadequacies on the part of both �communicator� and �community members� can lead to adverse consequences and amplify environmental justice disparities. the paper suggests a transformational approach where risk communicators must learn to trust community experts and their knowledge base (and act upon it), where risk information imparted by risk communicators addresses what communities are most concerned about (as well as risk from specific chemicals or radionuclides), and where risk information and assessments address underlying issues and disparities, as well as cultural traditions (among others). providing risk probabilities is no longer sufficient; western science may not be enough, and community and native scientific knowledge is needed. risk communication (or information transfer) for environmental risks that are ongoing usually applies to low-income, minority communities�people living in dense inner cities, rural communities, native american communities�or to people living near a risky facility. communication within this context requires mutual trust, listening and respect, as well as acceptance of indigenous and community knowledge as equally valuable. examples are given to illustrate a community perspective. 3. title: information needs, approaches, and case studies in human health risk communication authors: michael gochfeld abstract: this article uses ten case studies to illustrate the information needs, various communication approaches, and the communicator's role in explaining environmental health risks from a variety of hazards, to a variety of audiences, over time frames from days to years, using in person consultation, lectures, zooms, and email formats. events often had a long history before the communication began and may have had a long tail afterward. audiences may be public officials, companies, workers, communities, or individuals. each individual may have their own understanding or mental model regarding the hazard, exposure, and risk. the communicator's role or intention may be to reassure an audience that has unrealistic exaggerated concerns or fears or to protect a client if the fears are realistic. or it may be altruistic to inform a complacent audience to take the risks it faces more seriously. although risk assessment research has advanced the techniques for communicating abstruse probabilities to audiences with low numeracy, in my experience, audiences are unimpressed by precise-sounding probability numbers, and are more interested in whether exposure is occurring or may occur and how to stop it. often audiences have reason to be outraged and may be more concerned about punishing wrong doers than about the hazard itself, particularly when the exposure is past and cannot be undone. thus, there is a difference between discussing the riskiness of a situation (risk communication) and what you are going to do about the situation (risk management). risk communication is successful when the audience responds as intended, calming down or taking action. these case studies are drawn from a large number of risk communication experiences that i and my rutgers colleagues have engaged in over the past four decades. through the 20th century, new jersey was the most densely industrialized state in united states. new jersey experienced growth of the chemical and petrochemical industries and the unfortunately profligate disposal of toxic wastes. having the most superfund sites of any state is a dubious distinction, but new jersey also has the most experience in evaluating and responding to these hazards. 4. title: the dynamic nature of risk in doe facilities in the surveillance and maintenance program�with observations for risk communications authors: megan e. harkema, steven l. krahn, henry j. mayer abstract: we explore three case studies of facilities at two us department of energy (doe) former nuclear weapons research and production sites�the oak ridge national laboratory and the hanford site�whose risk profiles have changed during their long-term management under the doe's surveillance and maintenance (s&m) program. these case studies provide examples of the challenges faced in communicating to external stakeholders, such as federal and state regulators, local communities surrounding the site, as well as the general public, the circumstances surrounding unexpected events or the emergence/discovery of new risk-important information at historically high-risk sites. we identify common topics of importance from these case studies and suggest a taxonomy for risk communicators to use in informing the dialogues with individuals and organizations that may not be technically oriented or fully informed on the subject matter. the taxonomy is based on technical insights from the quintessential definition of risk known as the kaplan�garrick �risk triplet� as well as insights from regulatory guidance documents on risk communication with external stakeholders originally developed for the commercial nuclear power industry. 5. title: ecological information and approaches needed for risk communication dialogs for acute or chronic environmental crises authors: joanna burger abstract: scientists, social scientists, risk communicators, and many others are often thrust into a crisis situation where they need to interact with a range of stakeholders, including governmental personnel (tribal, u.s. federal, state, local), local residents, and other publics, as well as other scientists and other risk communicators in situations where information is incomplete and evolving. this paper provides: (1) an overall framework for thinking about communication during crises, from acute to chronic, and local to widespread, (2) a template for the types of ecological information needed to address public and environmental concerns, and (3) examples to illustrate how this information will aid risk communicators. the main goal is providing an approach to the knowledge needed by communicators to address the challenges of protecting ecological resources during an environmental crisis, or for an on-going, chronic environmental issue. to understand the risk to these ecological resources, it is important to identify the type of event, whether it is acute or chronic (or some combination of these), what receptors are at risk, and what stressors are involved (natural, biological, chemical, radiological). for ecological resources, the key information a communicator needs for a crisis is whether any of the following are present: threatened or endangered species, species of special concern, species groups of concern (e.g., neotropical bird migrants, breeding frogs in vernal ponds, rare plant assemblages), unique or rare habitats, species of commercial and recreational interest, and species/habitats of especial interest for medicinal, cultural, or religious activities. communication among stakeholders is complicated with respect to risk to ecological receptors because of differences in trust, credibility, empathy, perceptions, world view valuation of the resources, and in many cases, a history of misinformation, disinformation, or no information. exposure of salmon spawning in the columbia river to hexavalent chromium from the hanford site is used as an example of communication challenges with different stakeholders, including native americans with tribal treaty rights to the land. 6. title: a structural description of the evolution of stakeholders and risk communication in the department of energy's defense nuclear facilities: historical perspective, major stakeholders, and external events authors: steven l. krahn abstract: regulators and policymakers are routinely challenged with explaining complex concepts concerning risk. part of the challenge is helping external and internal stakeholders to understand the context behind risk-related information and decisions. this paper will describe the historical evolution of the safety and regulatory framework for an important category in the nuclear industry�defense nuclear facilities owned and operated by the us department of energy. in parallel with describing this evolution, three major events which occurred external to the complex of defense nuclear facilities will be summarized, and their impact on the maturation of the department's safety and regulatory framework will be discussed. finally, integrated with these two threads of discussion will be a chronicle of the changing set of involved organizations and the expanding set of external stakeholders involved in risk decisions�and therefore, the risk communications ecosystem surrounding defense nuclear facilities. it will be noted that this system was once describable as a classic �iron triangle,� but now has progressed to a complex network of federal and state organizations, numerous congressional committees, and expanding sets of external stakeholders. it is hoped that a comprehensive discussion of the context of risk assessment in the defense nuclear facilities complex�addressing historical insights, organizational evolution, and the maturing structure of regulation�will provide enhanced opportunities for building trust and understanding in this complex environment. 7. title: unpacking the realities and complexities of sensemaking: government practitioners� experiences of emergency risk communication authors: madeleine thomas, celine klemm, brett hutchins, stefan kaufman abstract: during public health emergencies, government practitioners must rapidly make sense of the risk to human health and the emergency risk communication (erc) options available. these practitioners determine what, how, and when information is communicated to the public. recurring criticism of erc indicates that the communication is not meeting the needs of the community. to improve erc practice, it is therefore critical to understand practitioners� sensemaking in these complex and time-critical settings. this article unpacks the realities and complexities of sensemaking, the process by which practitioners create meaning from the information they receive about an emergency as it unfolds. qualitative interviews gathered practitioners� lived experiences of public health emergencies, namely, smoke events (e.g., wildfires and industrial facility fires), and thematic analysis drew on sensemaking literature. the evidence shows that sensemaking is challenging, as practitioners experience pressure from the emergency context and organizational, political, and social expectations. sensemaking for erc comes with an underlying imperative to accurately make sense of the situation, in a timely manner and in a way that leads to the best health outcomes. practitioners must balance creating plausible meaning (sensemaking) with the accuracy expected by stakeholders. the analysis also highlights how sensemaking scope is delimited by professional expert identities and roles within the emergency management system; that is, practitioners� understanding of their expertise and role, and that of other practitioners. past lived experiences are viewed as key facilitators of both individual and collective sensemaking, and the history of similar public health events shapes sensemaking in this context. 8. title: are you prepared for the next storm? developing social norms messages to motivate community members to perform disaster risk mitigation behaviors authors: jungkyu rhys lim, brooke fisher liu, anita atwell seate abstract: preparing for natural disasters and adapting to climate change can save lives. yet, minimal research has examined how governments can motivate community members to prepare for disasters (e.g., purchasing flood insurance or installing water barriers in homes for floods and hurricanes). instead, studies have focused on how to communicate actions individuals should take during disasters, rather than before disasters. this study develops messages targeting social norms, which are promising approaches to motivate community members to adopt disaster risk preparedness and mitigation behaviors. specifically, we developed a variety of messages integrating descriptive norms (i.e., what others do), injunctive norms (i.e., what others believe should be done), and a social norms-based fear appeal, or social disapproval rationale (i.e., a negative social result of [not] taking behaviors). then, we tested these messages through two between-subject factorial online experiments in flood- and hurricane-prone u.s. states with adult samples (n = 2,286). in experiment 1 (i.e., purchasing flood insurance), the injunctive norms message using weather forecasters and the social disapproval rationale message significantly increased social norms perceptions, which in turn influenced behavioral intentions. in experiment 2 (i.e., installing water barriers), the injunctive norms message using weather forecasters, the injunctive norms message using neighbors, and the social disapproval rationale message significantly increased social norms perceptions, which in turn influenced mitigation intentions. however, the descriptive social norms message was not effective in increasing social norms perceptions. we provide some of the first empirical evidence on how organizations� risk communication can empower community members to prepare and mitigate the impact of disasters. 9. title: fake news, real risks: how online discussion and sources of fact-check influence public risk perceptions toward nuclear energy authors: shirley s. ho, agnes s. f. chuah, nuri kim, edson c. tandoc jr. abstract: this study seeks to understand how online discussion, fact-checking, and sources of fact-checks will influence individuals� risk perceptions toward nuclear energy when they are exposed to fake news. using a 2 � 3 experimental design, 320 participants were randomly assigned to one of the six experimental conditions. results showed an interaction effect between online discussion and exposure to fact-checking, in which online discussion lowered individuals� risk perception toward nuclear energy when a fact-check was unavailable. of those who participated in the online discussion, those who viewed a fact-check posted by traditional media have higher risk perception as compared to those who viewed a fact-check posted by a fact-check organization. our findings indicate that different fact-checking sources can have differential effects on public risk perceptions, depending on whether online discussion is involved. to curb the spread of fake news, different fact-checking strategies will need to be deployed depending on the situation. 10. title: strategic communication as planned behavior for science and risk communication: a theory-based approach to studying communicator choice authors: john c. besley, anthony dudo abstract: this essay argues that we should treat science and risk communicators� choices about tactics, objectives, and goals as behaviors to advance both research and practice. doing so allows for a discussion about how to use theories about behavior change and trust-building to help foster more strategic communication choices. the essay also seeks to anticipate and respond to potential arguments against using behavior change theories to encourage more strategic communication choices. we argue that it is possible to use behavior change tactics ethically if those tactics are aimed at increasing the likelihood that all participants in communication�including decisions makers like risk scientists�meaningfully engage with true, relevant information. under the right conditions, such engagement is what should allow for the development of new knowledge, as well as a range of evidence-based evaluative beliefs, feelings, and frames. being strategic when making choices about communication should also help with identifying situations in which justice, equity, diversity, or inclusion issues require additional attention. the essay concludes by noting that the difficulty of efficient and effective science and risk communication may require increased emphasis on getting experts such as scientists to collaborate with expert communication advisors. it may also be necessary to increase the capacity of science- and risk-focused communication practitioners. 11. title: risk-benefit perceptions, preferences for solutions, and gaining trust: listening to new jersey's atlantic ocean port communities authors: michael greenberg, diren kocakusak abstract: we designed a survey to measure public preferences for management actions at ports that would reduce negative risk perceptions, increase competence-based trust, and overall provide port managers with opportunities to build communication channels with surrounding populations. a total of 511 people who lived in a 45-square mile area of new jersey containing over 300,000 people and a dozen large and small ports responded to solutions that offered independent science support, provided ongoing public health surveillance, and economic assistance for local communities. environmental health concerns about air, noise, fires, port security, and protection against climate-related impacts were major correlates of these preferences. yet many residents recognized economic benefits associated with nearby ports and many either trusted port management or were neutral and felt not well informed. those who had a personal or family connection to the port were stronger port supporters. the most important finding and challenge for port managers is building ongoing relationships with the majority of nearby residents who are not aware of port activities, which presents an opportunity for increasing trust through proactive outreach and listening to nearby community representatives.      !# .0124=vw����ʻʻʩ���~qcuhc=uhicy5�ojqj^jhj�5�ojqj^jo(h�w�h�w�5�ojqj^jh�"�hu<�5�ojqj^jh�ud5�ojqj^jo(h�"�h�"�o(&h�"�h�"�5�cjojqj^jajo(h 2e5�cjojqj^jaj#h�w�h�w�5�cjojqj^jajh�w�5�cjojqj^jaj#h�"�h�"�5�cjojqj^jaj h$-�5�cjojqj^jajo(#h�w�h�w�5�cjojqj^jaj123w�%&��l�78��"�"t#k#,,������������������������gd�psgd)w�gd$?�gdto�gd�l$gd%j,gdu<�gd�"�$a$gdt4����$%&')/0�������� ���ʼ��喤�x���x�j]odh%j,5�ojqjo(hihu<�ojqj^jo(hy|hy|ojqj^jhih�l$ojqj^jo(hvi�h�l$5�ojqj^jo(hy|hy|5�ojqj^jh�l$h�l$5�ojqj^jh�l$5�ojqj^jo(hj�5�ojqjo(hiht4ojqj^jo(h�w�h�w�ojqj^jhihj�ojqj^jo(h�"�hu<�5�ojqj^jht45�ojqj^jo(kltu����6789;ab������²��²ф��rdvi;hdhd5�ojqj^jh$?�5�ojqj^jo(h$?�h$?�5�ojqj^jh�"�h%j,5�ojqj^jhs/�5�ojqj^jo(h%j,5�ojqjo(hihanojqj^jh�s�h�s�ojqj^jh� )hto�ojqj^jo(hvi�hto�5�ojqj^jo(h�s�h�s�5�ojqj^jhto�hto�5�ojqj^j hto�hto�h�"�h�`�5�ojqj^jhto�5�ojqj^jo(������  �"�"�"�"�"�"�"s#t#\#]#j#���ʼ�⮡��{m_{qc_{qhvi�h�ps5�ojqj^jh��h��5�ojqj^jh�psh�ps5�ojqj^jh�"�h)w�5�ojqj^jh�ps5�ojqj^jo(h)w�5�ojqjo(hvi�h%j,ojqj^jo(hdhdojqj^jh� )h$?�ojqj^jo(hdhd5�ojqj^jhd5�ojqj^jh$?�5�ojqj^jo(h$?�h$?�5�ojqj^jhvi�h$?�5�ojqj^jo(j#k#t#u#,,,,,,,�,�,�,�,-- - -/303132343���ǹ�����wi�[w���n��a�h|�5�ojqj^jo(h� �h� �ojqj^jhvi�hvi�5�ojqj^jhvi�hr7a5�ojqj^jh� �h� �5�ojqj^jhr7ahr7a5�ojqj^jh�"�h)w�5�ojqj^jhr7a5�ojqj^jo(h)w�5�ojqjo(hvi�h)w�ojqj^jo(h��h��ojqj^jh}onh)w�ojqj^jo(h$?�h)w�5�ojqj^jhvi�h)w�5�ojqj^jo(,�,-0313�34;;�;�;fcgc�cd5h6h�h�h�n�n4o`ohtitkt�������������������������gd�gd�s�gd�_gdlz�gd�)ggd|�gd)w�gdr7a43:3;3�3�3�3�344 4 4;;;;;;;�;������ְ���ynasea7h|= h|= 5�ojqj^jh�)gh�)g5�ojqj^jh�"�h)w�5�ojqj^jh�)g5�ojqj^jo(h)w�5�ojqjo(hvi�h)w�ojqj^jo(h1u�h1u�ojqj^jh}onh)w�ojqj^jo(h$?�h)w�5�ojqj^jhvi�h)w�5�ojqj^jo(h��5�ojqj^jh1u�5�ojqj^jh1u�h1u�5�ojqj^jh|�5�ojqj^jo(h|�h|�5�ojqj^j�;�;�;�;�;�;�;�;�;ecfcgchcjcpcqc���˽����vk^pb5hlz�5�ojqj^jo(hlz�hlz�5�ojqj^jh�"�h)w�5�ojqj^jhr5�ojqj^jo(h)w�5�ojqjo(hvi�h)w�ojqj^jo(h|= h|= ojqj^jhih)w�ojqj^jo(h$?�h)w�5�ojqj^jhvi�h)w�5�ojqj^jo(h|= h|= 5�ojqj^jh��5�ojqj^jh�)g5�ojqj^jo(h�)gh�)g5�ojqj^jhvi�h�)g5�ojqj^jqc�c�c�cddd"d#d4h5h6h8h:h@hah�h����񺬞��xk]ob4h��h��5�ojqj^jh�_5�ojqj^jo(h�_h�_5�ojqj^jh�"�h)w�5�ojqj^jhr5�ojqj^jo(h)w�5�ojqjo(hvi�h)w�ojqj^jo(h7<�h7<�ojqj^jhih)w�ojqj^jo(h$?�h)w�5�ojqj^jhvi�h)w�5�ojqj^jo(h��5�ojqj^jhlz�hlz�5�ojqj^jhvi�hlz�5�ojqj^jh7<�h7<�5�ojqj^j�h�h�h�h�h�h�h�h�n�n�n�n�n�n�n3o4o&��ŝ�]�6��ҩ��n=���in����a7���qb&>!"�h [�� �lx�z)��w�v�og�%�ţ|8mă#�/��8��'��=���q�u*��c�`c�w{�d6��/�[��yl���%�� ��n� {�\�o�sm�/�~��i�bcax���/=x e��'5��&\�h�4da���,ye\}�)�l�a�����r�^��*�z���y�v-wowz�n�]��:m�v�=t�c���w��r�b���*i�v�u�r��u����|�nc`�|����*^����pk! ѐ��'theme/theme/_rels/thememanager.xml.rels��m �0���wooӻ�&݈э���5 6?$q�� �,.�a��i����c2�1h�:�q��m��@rn��;d�`��o7�g�k(m&$r(.1�r'j��њt���8��v�"��aȼ�h�u}��|�$�b{��p����8�g/]�qasم(����#��l�[������pk-!����[content_types].xmlpk-!�֧��6 0_rels/.relspk-!ky���theme/theme/thememanager.xmlpk-!���f���theme/theme/theme1.xmlpk-! ѐ��'� theme/theme/_rels/thememanager.xml.relspk]� wlp���� ��j#43�;qc�h�u��`�1_%v��nh{��q��u�3�d]-�z:kkkkn;�q0�<�?*� 7��:a��^b� �l{��2h�(�#!�q��m4-cqrrs�4>�p]�sao-�?��yn�b~i�(��)ib��>!]�.�` rv:g&>!��}n!�l��2�"�0r��\�|�md-%;�blrbr]�a 6ji� ��vj�`�[jo 5j90�ry �:[� k 3q-r�jx 8i� tp� k�|�2~� ��y��k� ?i��� * �? = ��#? ?*� @�4le� dw" �� �z�g�kd �2�^e �-h�x �w��t� bs &�x� -z�y� �w� i�>�:-� �u kkkkdw" q�x�-h� k^r66� � �^�vxb� �=#�/y�pur ���� ��'ff�x-z�d�y�(��)fk{z��fv��-�p�'�e��4�!~q�2h`�?i��be��@��fk-<"��l�q�u��y/�x{��]^�~76=&����` [� ��rh&<�^��oc!��d{�/�"���[��h�2��d���t��w�8i� (f�tl(����}�t�a9�~�8� �7l��4�";�g)n��p7v}g�xd|��&�h�w�a�g�b�u�d\*�)#jb�l�d� )r�}��w�gl$l��r�qh� v���/xcz.�^m~;�|p%�fzps7l�ps�#���<>)��s��vj��h5h 5� a�l[�x� xcz�be�yfdxl�y��raj>�n�cr%v��h�a9�� !`��}<�q�}q =�7y]��r�-��.��zf�7�� �e �o[kh,~�hmpm~� mg�=�j��>m�?[%��'w�jo8�l�y2\gqwez ��p]74�`a��m�!�|z��z:�*��b!�g;cq�qq�h�nk^r a�x�t an�gap�y8��x� ��s��d���z��j�vzq��t\ ~��av'po�_m4�i�w��tke�pb�` rq1��yn�pur �p}��� urep�&>!�z[fxx)!�b!x{�ec!�t�k��oc!�v�>b(p!� ]!�3�l� �!nr�q�m�!�j#�g-�!�f�d�[z"�u&z�6'�"�zy�q �"ji�_��m�"� ]!�&�"�)��/�"|z�s\�"=v�g��~#�)9~��k#� � �i3#�#? �=#�i\;�j#p%�sh�#���2k�#�|�#ry �ps�#pb��9�#�sa�d $��yj!4$�`�%�qg$�ep$�"e<@v�$:*�$�[��p�$�]'��?[>�?z]%�`�%vd�i1�%�lyk-,�%�,�=��l�%�z�@�x�%�!0��e&poq�bs &�b*&t�(6=&�'w�rh&2\�qp&nyvc��t�&��&�]'�ep$�tw�'~d:(�r�'�kl��>�'��5�l�'�taz��w (r�@�~d:(� _(it~tl(�x�,�dm�(�t�(�pi�(��]�a#�(�j�`�<>)^e ��w)!,�f���)�l�%��)mq{�"*�^�i��le*^l�x�ne*n9��^�*�:8t��[? �v ��o�(s� qh� �`� q�f� � {p���c,@�i��#,�dq[mk, @p�qb,�d&d� �,�>m��x�,� {u�,�@�q>,-�m4-rt�h�fk-�r�-�j�n�2@�-�ggc���-x*�y���->o.-dt��t�.��z]�.�x��<}7/d|���y/ds}���/: o=tj�/0�u0{z�o�!0�ran 0gy|�5j90�$�}�;1�0��efw2 �z��>2"o�m�29!"e�c�2�w�2�f\�h�2n�~�w�3ui�� �3dj�u�3��x@�4�;�4�d5��p�4@l�5h 5�^b^� -a5�pv5�d5tw�'��5��5md-�b�5i�d��v�5 -a5�a 6�`d�#6ghch�81�6�&7��6�a�r!�6q1���@�6xx�6)1:t�&7�x�\�~74\�7bd9t=r�7��gr f8c�]��jo8�~�8�� �8��b��^�8n9?oi�q�9�a:�kx_�s�:kkkk�3�:�!�q�o";�4mjj o;�i\;�%�|c;�q��viu;�ru�;�~7�[u�u�`fr>�>�'i�>r]��v�>lrb�mt?<#iq!{�?p[5=�tf�?�t�&�?�*��o-�?�mt?�s�? u|3e�?�-x{�8�?c�?�@}��*.}@��)��-�@�t�`�r�@g��z�@z]%hag;��:a�s6ay8���doahu�(�a�le*�&e�ana��.�an��u �a�a�$,&d]�l�d|1�q�i�dbl#g�>e�\���ez�v�n�e�v ��'�e�#�c�hfs�]�=bdf�^^n��z[f�y� ��f�"�o w~g� l`�#�g�{9=��g=v�g�o�t�{s h�-h�pv5p@h�og�ghch'\l� mh�&�h�t�e�hoaq�!~q��y#%�q@gku�nr�q �q� �qqg$�r)b;r�,�q��0hr�l��zwr� {r;1�0��y{r�i�r�� �(u�r�$atxcs�#sw/�=fzps8ts)b;r��ts�#�g3%�s�{�s�;�4��g/t�4>�:8t�gn�bd9t]z[t� �m��td $�`�t�s��,!u�rdi�@gku�u0 g�u���uxcs>�uc;�rxyyv�d�^�v4�o�v�j$w�w�w�6�x�m�2:3�x�q�y���x�3�:��o�x�#s^l�x\<�jg�xq>,- q�x�}<��x_/,j�zy��t��`-y<myv ��q�yv^mc���y< z�&xfk{z�kd  �zhp�� [�enx�:[�=�^�` [�0�[(>y��f\�?\i�(��\�m��x�\~�f<1/�\�s���7y]�>aqs�]���c�]hv�i���]viu;�]^ph$^�^b^�`.�^�k�^�=�^�1_�kx_�a9�ji�_l{��k�_� !`�qb,�� l`�y`� ��t�`�=�}�j�`�qq��u�`�>�`_m�t a��&na[mk,�9a��q���a��5��>�asq�y�3j�a�zwr�a�t� 3b@�z��)ib�u~b1�h��u�b�~#�%;�b@v�$03cd.�b�ggcg-�!�va�c�^��i|�c��c(�a�u�c�0hr��#�c�j$wvd0q|�`d�d&d�@�m�f�d,-�zn�d�|�#�9!"e2k�#�g e�/e� * ^ee����l\e�>e��eme�hgqwe�u �t�edu�efd��&fji�,\f<}7/��zfs{tq�f3%�s!,�fqx{~�fxx�6�a�f6�f< z�bl#g�^blkqg�j9r��g8|k=�z�g�-9h�k?oi�u�<mebi�rdi�b*&��b~i�y{r4�i�`-y�^�ix�u�nf�i�~7djtj�/v,�j�8�?w�j�`�t�=�j�4�q\<�j�dk�g�tkz l!{�?�klv:g��3�l<|�<ie�lj l�^(m��k��.�mz*�ma�� �m�hn�y`�gn� �!�g)nfr>��^^nv��, mn�kj>�nh#�n�gv'po� ���"�o�"�o6gp�e �oh��.�o�r��v�o mg���o]z[thptf�?(ap(s� @p�[? bep=r�7�c�p�qp&��dq�vzq� �<#iq�!�q� ���qq =��,�q�w�#!�q{s h�4�q�a�f�l�q|1�q6s�~r�q}kr3q-rie�l��j9r �3�c;�rn[g� �r�-�@�y0�sb(p!��s{fm-dt�y�)1:to �v�$at�6�x� 0w?0w?0w?0w?�.�t�/e��t(ap�}�t�o�t�u2�&xph$^�enx� �x[�x, mnf�x&xn �x�0�<�=.y6�f�� oyrgox*�y�x�u��yd]-sq�y7���yxl�y�t�.��y];yw��y�w��u&z�*n{��tazr=��whkzjx �.tzji��z@�z�.�o���z�`�o��%�z�q�wv{�nh{$,&d�*n{�s�?mq{ hr{��6�jbs{�-x{qx{�@�6m�{�d��0q|�~�vgy|��s� u|�[|�w)�\�| w~g;�|�g ek�|�.�t�y>�|b�5�ds}xyyv�p}�r>�$�}dm�(�m�}j<�v��=�}jbs{�q�}\ ~ �=�h,~03c��)9~whkzit~�;�~j{�~0�n�n�~l�s{t�<(>y\*�4e�z �j�{p�4\�7��(k�i����x ��m�j�����[pzw�3`y|2 r� �p |= j^ �n�_ati�wb��.h j<sh�to>s�r#�l$�}&�m'�m(� )�g)1 %j,�p./�i/�2�z2'4t4.6�6*8;i8cj8�9�i;x<�e=k&>e!@jj@r7a�ecd�nd�udvf0 i4tj�kul%man�%s�tvmkxgy�py�^ro_5a�7ahc 2e�lf�qf�)gjmi�ckalthllmnnm}on�<����r�7<��c�7"����s�?5����"�gl���bj�h��-����� ��"�l%�w� p�2����y�� �k&����e�`-�|�ilkl�@�� � � � wl�@��unknown������������g��.�[x� �times new roman5��symbol3.� �.�[x� �arial7.� ��[ @�verdana;���(�[sosimsuna����$b�cambria math 1��h;"�f�j���fg a'�g a'�!-!),.:;?]}����    & 6"0000 0 0 00000��� � �����=�@�\�]�^���([{�  0 0 00000��;�[����������blbl 2�q��hp��?�����������������������"�2!xx�7�] ���userlib-x�� �����oh�� '��0t������� ��   (4<dl�usernormallib-x184microsoft office word@�2@�y��\�@fk�6<�g a�� ��՜.�� ,��0� x`t|�� ����� microsoft�'bl   !"#$%&'()* ,-./012345678����:;<=>?@����bcdefghijklmnopqrstuvwxyz[\]^_`abcdefghijk����mnopqrs����uvwxyz{��������~��������root entry�������� �f���6<���data ������������91table����a�tworddocument����2psummaryinformation(������������ldocumentsummaryinformation8��������tcompobj������������n�������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������� ���� �fmicrosoft word 97-2003 �ĵ� msworddocword.document.8�9�q
网站地图