Post on 15-Jan-2022
Major Information Systems Concepts
Lecture 1
Dr. Raimundas Matulevi!ius University of Tartu, Estonia
1
Lecture 13
!"#$%&%'(&)*&+#$,-(&• .#$,-(&/("-0%(&
– '12344+#$,-(-5+-5$%5((4678740-4&• 9(+%$,(&:#%(-&;<=<0><">(&#:&/("-0%(?&
– *>0@(-&– *(>A&-%$@B&
• C0>>&"(&$-(@&<%&%'(&+#$,-(&>(+%$,(-&• C0>>&"(&$-(@&0:&%'(&(D(,+0-(&&
• E#@<>0F(-&<:@&<--(--G(:%&– !+%$<>&2<,F+02<F#:&0-&A$:@<G(:%<>&– HD<G&;I7&J&#A&%'(&K:<>&<--(--G(:%?&
– HD(,+0-(-&;I7&J&#A&%'(&K:<>&<--(--G(:%?& 2
*+'(@$>(&
• !"#$%&"'())– E#:@<B&8638IL8M377N&&– O##G&M7I&
• *&+#,#+-)-"+&./.0()– P,#$2&83&&
• C(@:(-@<B&8M38IL8Q377&
• O##G&R8I&
– P,#$2&63&&• S'$,-@<B&8738IL86377&• O##G&67Q&
– P,#$2&R3&&• T,0@<B&8638IL8M377&• O##G&R8I&
3
.#$,-(&#"U(+F=(-&
• HD<G0:(&%'(&-%<%(&#A&%'(&<,%&#A&)*&,(-(<,+'&<:@&2,<+F+(&– Introduce the major IS types and principles – Learn the principles of IS development – Master essential techniques to develop IS system
requirements with an emphasis on security requirements
4
.#$,-(&#$%>0:(&I PART: Introduction to IS
1. Major IS concepts 2. IS infrastructure 3. Enterprise systems 4. Knowledge management and decision support systems 5. Economics and acquisition of IS
II PART: IS modelling 6. IS modelling methodologies and perspectives 7. Process- and object-oriented methodologies 8. Holistic, data and process modelling 9. Project and organisational management 10. IS requirements engineering 11. IS quality 12. IS in practice
III PART: Secure IS Development 13. Introduction to IS security 14. Organisational and regulation modelling 15. UML and Security 5
E<%(,0<>&
• Main books of the course: – Turban E., Volonino L., Information Technology for Management:
Transforming Organisations in the Digital Economy, the seventh International student edition, 2010
– Avison D., Fitzgeral G., Information Systems Development. Methodologies, Techniques and Tools, the fourth edition, McGraw Hill Education, 2006
• Selected chapters of – Krogstie J., Solvberg A., Information Systems Engineering. Conceptual
Modeling in a Quality Perspective, unpublished, 2000. – Loucopoulos P., Karakostas, System Requirements Engineering,
McGraw-Hill Book Company, 1995 – Kotonya G. & Sommerville I. (1998). Requirements Engineering.
Processes and Techniques. John Wiley & Sons&
6
E<%(,0<>&
• Collection of the articles – V#'>&W5&;8XXQ?5&!"#$%&&'(%)*"%+',%-./"%0%)*&'1)2/)%%"/)23',%&%4"$5'!"%&&'6*78'9#5)':/;%<'='>#)&'?)$'– T0,(-G0%'&Y5&P53&.#GG#:&.#:+(2%-&Z:@(,>B0:[&*<A(%BN&*(+$,0%BN&<:@&*$,=0=<"0>0%B&H:[0:((,0:[N&
S(+':0+<>&\#%(&.EZ4*H)L677RLS\L7RR&&– Y$"#0-&H5N&](BG<:-&V5N&E<B(,&\5N&E<%$>(=0^0$-&O5N&!&*B-%(G<F+&!22,#<+'&%#&Y(K:(&%'(&Y#G<0:&#A&
):A#,G<F#:&*B-%(G&*(+$,0%B&O0-_&E<:<[(G(:%N&@$$%A*%+'4*'*5%'B##C'+%+/$4*%+'*#'(3',#;4)+N&6787N&*2,0:[(,5&&
– Mouratidis, H., Giorgini, P., Manson, G.A.: When Security Meets Software Engineering: a Case of Modelling Secure Information Systems. Information Systems 30(8) (2005) 609-629
– van Lamsweerde, A.: Elaborating Security Requirements by Construction of Intentional Anti-models. Proceedings of the 26th International Conference ICSE’04, (2004) 148-157
– Sindre, G., Opdahl, A.L.: Eliciting Security Requirements with Misuse Cases. Requirements Engineering Journal 10(1), 2005, 34-44
– Sindre, G.: Mal-activity Diagrams for Capturing Attacks on Business Processes, Proceedings of the Working Conference REFSQ’07, 2007, 355-366
– Lodderstedt, T., Basin, D.A., Doser, J.: SecureUML: A UML-based Modeling Language for Model-driven Security, Proceedings of the 5th International Conference UML’02, 2002, 426-441
– Jurjens, J.: UMLsec: Extending UML for Secure Systems Development, Proceedings of the 5th International Conference UML’02, 2002, 412-425
7
HD(,+0-(-&
• 12"&#/'")3&;6IJ?3&– *(>AL-%$@B&<:@&2,(-(:%<F#:&
• 12"&#/'")4);R7J?3&– )*&@<%<&<:@&2,#+(--&G#@(>>0:[&
• 12"&#/'")5);87J?3&– E#@(>&`$<>0%B&(=<>$<F#:&
• 12"&#/'")6&;RIJ?3&– E#@(>>0:[&)*&*(+$,0%B&
– V,(-(:%<F#:&#A&%'(&-#>$F#:&&
8
!"#$%&")3(&E<U#,&)*&+#:+(2%-)
!"#$%&")7+$"&/+-)
• 8&%9+.)+.:);<-<./.<)=4>3>?, Information Technology for Management: Transforming Organizations in the Digital Economy. The 7th International student edition, Chapter 2.
9
9(+%$,(&#$%>0:(&
• C'<%&0-&)*a&&– b<-0+&%(,G0:#>#[B&
• )*&+><--0K+<F#:&<:@&%B2(-&• )*&A#,&2(#2>(&• ):A,<-%,$+%$,(N&<,+'0%(+%$,(&<:@&+#G2$F:[&(:=0,#:G(:%-&
10
E<U#,&+#:+(2%-&;8?&
• *@".<7".<.)– *#G(%'0:[&<-&0%&<22(<,-&0:&%'(&G0:@&#A&<&2(,-#:&
• AB'$"7))– !&-(%&#A&+#,,(><%(@&2'(:#G(:#:&
11
E<U#,&+#:+(2%-&;6?&
• C.<D-":0")– S'(&U$-FK(@&%,$(&"(>0(A&#A&<&2(,-#:5&W:#/>(@[(&0-&>0:_(@&%#&%'(&0:@0=0@$<>&2(,-#:&
• E.F<&7+,<.)– HD%(,:<>0-(@&(D2>0+0%&C)#D;%+2%&/'0+'&<,(&:#%&_:#/:&"B&%'(&2(,-#:&/'#&,(+(0=(-&0%&
• G+$+&&– *BG"#>-&%'<%&+<:&"(&2,(-(,=(@N&%,<:-A#,G(@&<:@&%,<:-2#,%(@&"B&<&+#G2$%(,5&Y<%<&+<:&"(&0:%(,:<>0-(@&<-&C)#D;%+2%'
12
O(><F#:-'02&<G#:[&&
Y<%<N&):A#,G<F#:&<:@&W:#/>(@[(&
13
Raw data Information New data
Knowledge
processing
processing processing
processing
processing
processing
*#+0<>&.#:-%,$+F#:&
14
E<U#,&+#:+(2%-&;R?&
• E.F<&7+,<.)'B'$"7)=EA?)– !&-B-%(G&A#,&@0--(G0:<F#:&#A&@<%<&"(%/((:&2(,-#:-&c&2#%(:F<>>BN&%#&0:+,(<-(&%'(0,&_:#/>(@[(&
• H&0+./'+,<.))– !&:#:L(G2%B&-(%&#A&2(#2>(&<:@&#%'(,&2'(:#G(:#:&
• 2'(:#G(:#:&/'(,(&[#<>L#,0(:%(@&<:@&+##,@0:<%(@&<+F#:-&0-&<0G(@&<%&
• H&0+./'+,<.+-)/.F<&7+,<.)'B'$"7)– !:&)*&A#,&%'(&@0--(G0:<F#:&#A&@<%<&/0%'0:&#,[<:0-<F#:&
15
):A#,G<F#:&*B-%(G&
16
INPUT Business processes Data Information Instructions Opportunities
PROCESSING Programs People Equipment Storage
OUTPUT Solutions Reports Graphics Calculations Recommendations Tactics
CONTROL Decision makers Auto-control
17
.#G2$%(,0-(@&):A#,G<F#:&*B-%(G&
• I<7J%$"&/'":)/.F<&7+,<.)'B'$"7)– !:&)*&/'0+'&0-&"<-(@&#:&%'(&$-(&#A&+#G2$%(,-&A#,&@0--(G0:<F#:&#A&@<%<&
Information System
Hardware Software Data, Information Procedures
User interface
.><--0K+<F#:&#A&)*&
;"&B)!+&0")+.:)
AJ"#/+-)AB'$"7')
K-<9+-)AB'$"7')
E.$"&<&0+./'+,<.+-)AB'$"7')
1.$"&J&/'")AB'$"7')
L%.#,<.+-)+.:)M+.+0"7".$)EA)
8&+.'+#,<.)*&<#"''/.0)AB'$"7')
*"&'<.+-)+.:)*&<:%#,N/$B)AB'$"7')
18
)*&+><--0K+<F#:&"B&&
d,[<:0-<F#:<>&>(=(>-&;8?&
• *"&'<.+-)J&<:%#,N/$B)'B'$"7')– V(,-#:<>&@0[0%<>&<--0-%<:%&
• .<>(:@<,N&+<>+$><%#,N&-+'(@$>(,&
• 8&+.'+#,<.)J&<#"''/.0)'B'$"7')– V(,0#@0+&K:<:+0<>N&<++#$:F:[N&2$,+'<-(&#,@(,-&
• V#0:%&#A&-<>(-&;V#*?&%(,G0:<>-N&@(2#-0%-&<:@&,(L@,</<>-&
19
)*&+><--0K+<F#:&"B&&
d,[<:0-<F#:<>&>(=(>-&;6?&• L%.#,<.+-)+.:)M+.+0"7".$)EA)
– *$22#,%&/#,_&#A&0:@0=0@$<>&@(2<,%G(:%&0:&<:&#,[<:0-<F#:&
20
Marketing Finance Accounting
Human Resources Production Other
IT and Information Systems
Accounts Payment billing
Inventory
Reports Performance Records
Market Research
Advertisement Budget
information Investment
analysis
Budget Performance Reports
Training plans Labor Requirements
Quality Control plans
Labor scheduling Labor Performance
)*&+><--0K+<F#:&"B&&
d,[<:0-<F#:<>&>(=(>-&;R?&• M+.+0"7".$)EA)
– *$22#,%&A$:+F#:<>&G<:<[(,-&• V,#=0@(&2(,0#@0+<>&,(2#,%-N&-$GG<,0(-N&+#G2<,0-#:-N&#%'(,&-%<F-F+-&
• V><::0:[N&G#:0%#,0:[&<:@&+#:%,#>&
– ]$G<:&,(-#$,+(-&2><::0:[&)*&• V(,+(:%<[(&#A&2(#2>(&/'#&<,(&#:&=#+<F#:N&+<>>(@&A#,&-0+_&• V(#2>(&:((@(@&%#&@#&%'(&U#"&
21
)*&+><--0K+<F#:&"B&&
d,[<:0-<F#:<>&>(=(>-&;M?&• 1.$"&J&/'")EA)
– *$22#,%&"$-0:(--&2,#+(--(-&%'<%&<,(&2(,A#,G(@&"B&-(=(,<>&@(2<,%G(:%-&0:&<:&#,[<:0-<F#:&
• HOV&
22
Executive administrator Our supplier and our partners
Our customers
Finance Accounting
Marketing Other areas Production Human resources
Process A
Process B
Process C
Process D
)*&+><--0K+<F#:&"B&&
d,[<:0-<F#:<>&>(=(>-&;I?&• E.$"&<&0+./'+,<.+-)'B'$"7')
– )*&%'<%&+#::(+%&%/#&#,&G#,(&#,[<:0-<F#:-&• *(>>(,-&<:@&"$B(,-&c&(5[5N&(>(+%,#:0+&"0>>&
23
Corporate A
System
Corporate B
System
Corporate C
System
Electronic Market
Human Resources Accounting IS
Finance IS
Marketing IS
Production IS
Administrative IS
)*&+><--0K+<F#:&"B&&
d,[<:0-<F#:<>&>(=(>-&;Q?&
• K-<9+-)EA)– )*&%'<%&+#::(+%&+#G2<:0(-&0:&%/#&#,&G#,(&+#$:%,0(-&
• HL+#GG(,+(&-B-%(G-&
• *$22>0(-&#=(,-(<-&
• ;"&B)!+&0")+.:)AJ"#/+-)AB'$"7')– e(,B&><,[(&<:@&[>#"<>&"B&:<%$,(&
• !0,>0:(-&,(-(,=<F#:&-B-%(G&• Z:0=(,-0%B&<@G0:0-%,<F=(&-B-%(G&
• \<F#:<>&'(<>%'L+<,(&-B-%(G&
)*&+><--0K+<F#:&"B&%'(&&SB2(&#A&*$22#,%&
25
AB'$"7') 17J-<B""')'%JJ<&$":)
G"'#&/J,<.))
M+.+0"7".$)/.F<&7+,<.)'B'$"7')
E0@@>(&G<:<[(,-& O#$F:(&0:A#,G<F#:&A#,&2><::0:[N&#,[<:0-0:[N&<:@&+#:%,#>>0:[(,<F#:-&
I<77%./#+,<.)+.:)#<--+9<&+,<.)'B'$"7')
!>>&(G2>#B((-& H:<">(-&%#&0:%(,<+%&<:@&/#,_&%#[(%'(,&
G"'O$<J)J%9-/'@/.0)'B'$"7')
df+(&/#,_(,-& .#G"0:(-&%(D%N&2'#%#-N&[,<2'0+-&
G<#%7".$)7+.+0"7".$)'B'$"7')
df+(&/#,_(,-& !$%#G<%(-&g#/&#A&(>(+%,#:0+&@#+$G(:%-&
G"#/'/<.)'%JJ<&$)'B'$"7')
Y(+0-0#:&G<_(,-N&G<:<[(,-&
.#G"0:(-&G#@(>-&<:@&@<%<&%#&-#>=(&-(G0-%,$+%$,(@&2,#">(G-&/0%'&(D%(:-0=(&$-(,&0:=#>=(G(:%&
K&<%J)'%JJ<&$)'B'$"7') V(#2>(&/#,_0:[&0:&[,#$2-&
*$22#,%-&/#,_0:[&2,#+(--(-&#A&2(#2>(&#A&[,#$2-&0:+>$@0:[&%'(&#:(-&/#,_0:[&0:&@0h(,(:%&>#+<F#:-&
12J"&$)'B'$"7') W:#/>(@[(&/#,_(,-N&:#:(D2(,%-&
V,#=0@(-&-%#,(@&_:#/>(@[(&<:@&@(+0-0#:&,(+#GG(:@<F#:-&&
C.<D-":0")7+.+0"7".$)'B'$"7')
E<:<[(,-N&_:#/>(@[(&/#,_(,-&
*$22#,%-&[<%'(,0:[N&#,[<:0-0:[&<:@&$-(&#A&<:&#,[<:0-<F#:i-&_:#/>(@[(&
O(><F#:-'02&"(%/((:&-B-%(G-&
26
Transaction Processes
Internet and External
Information
Management ISX
Data Warehouses
Enterprise Systems
Business Intelligence
Inter-organisational
systems
Internet, Other
Computer Systems
Non-computer systems
d,[<:0-<F#:<>&<+F=0F(-&• HJ"&+,<.+-)+#,N/,"')
– Y<%<L%#L@<B&<+F=0F(-&• !--0[:&(G2>#B((-N&,(+#,@&%'(&:$G"(,&#A&'#$,-N&2><+(&<&2$,+'<-(&#,@(,&
– *'#,%&%(,G&0:&:<%$,(&– *$2(,=0-#,-N(,<%#,-N&K(>@&(G2>#B((-N&+>(,0+<>&(G2>#B((-&
• M+.+0"&/+-)+#,N/,"')– Y(+0-0#:-N&%<+F+<>&<+F=0F(-&
• *'#,%&%(,G&2><::0:[N&#,[<:0-0:[N&+#:%,#>&
– E0@@>(&G<:<[(G(:%&
• A$&+$"0/#)+#,N/,"')– Y(<>&/0%'&-0%$<F#:-&%'<%&G0['%&-0[:0K+<:%>B&+'<:[(&%'(&G<::(,&0:&/'0+'&
"$-0:(--&0-&@#:(&• <+`$0-0F#:&@(+0-0#:-N&#$%-#$,+0:[&-#>$F#:-&
– O(`$0,(&(><"#,<F=(&,(-(<,+'&– S#2&G<:<[(G(:%&
27
E<:<[(,0<>&!+F=0%B&*$22#,%&
8+'O) A%JJ<&$)
*%<F-F+<>&*$GG<,0(-& *$GG<,0(-&#A&:(/&@<%<&
HD+(2F#:&,(2#,%-& .#G2<,0-#:&#A&<+%$<>&2(,A#,G<:+(&%#&-%<:@<,@-5&]0['>0['%&#A&@(=0<F#:-&
V(,0#@0+&,(2#,%-& P(:(,<%(@&A#,&2,(@(K:(@&0:%(,=<>-&
!@L'#+&,(2#,%-& P(:(,<%(@&<-&:((@(@&#:&@(G<:@&
.#G2<,<F=(&<:<>B-0-& .#G2<,0-#:&#A&2(,A#,G<:+(&%#&G(%,0+-&#,&-%<:@<,@-5&!:<>B-0-N&-$+'&%,(:@-&<:@&(<,>B&@(%(+F#:&#A&+'<:[(-&
V,#U(+F#:N&A#,(+<-F:[& V,#U(+F#:&#A&A$%$,(&-<>(-N&+<-'&g#/-N&G<,_(%&-'<,(N&%,(:@&<:<>B-0-&
!$%#G<F#:&#A&,#$F:(&@(+0-0#:-&
*%<:@<,@&G#@(>>0:[&%(+':0`$(-&<22>0(@&%#&,#$F:(&@(+0-0#:-&-$+'&<-&/'(:&<:@&'#/&%#&#,@(,&#,&'#/&%#&-+'(@$>(&/#,_&
.#::(+F#:&<:@&+#>><"#,<F#:&
):%(,:<>&<:@&(D%(,:<>&C("L"<-(@&G(--<[0:[&-B-%(G-N&(LG<0>-N&=#0+(&G<0>-N&<:@&[,#$2/<,(&
28
)*&-$22#,%&A#,&2(#2>(&
29
):A,<-%,$+%$,(&
• *@B'/#+-)F+#/-/,"'P)'"&N/#"'P)+.:)7+.+0"7".$)'%JJ<&$3&– .#G2$%(,&'<,@/<,(&– *#j/<,(&– \(%/#,_-&<:@&+#GG$:0+<F#:&A<+0>0F(-&&
• ):%,<:(%&<:@&):%(,:(%&– Y<%<"<-(-&<:@&@<%<&/#,_(,-&– ):A#,G<F#:&G<:<[(G(:%&2(,-#::(>&
30
b$-0:(--&<:@&)S&<,+'0%(+%$,(&
• Q%'/."'')+&#@/$"#$%&")– d,[<:0-<F#:<>&2><:-N&=0-0#:-N&#"U(+F=(-N&<:@&2,#">(G-&<:@&%'(&0:A#,G<F#:&,(`$0,(@&%#&-$22#,%&%'(G&
• d:+(&0%&0-&K:0-'(@N&-%<,%&%'(&)S&<,+'0%(+%$,(&
• E8)+&#@/$"#$%&")– !&'0['&>(=(>&G<2&#,&2><:&#A&%'(&0:A#,G<F#:&<--(%-&0:&<:&#,[<:0-<F#:&0:+>$@0:[&2'B-0+<>&@(-0[:&#A&%'(&"$0>@0:[&%'<%&'#>@-&%'(&'<,@/<,(&
• C("3&– .#:%(:%&<:@&#,[<:0-<F#:&#A&%'(&-0%(&&– ):%(,A<+(&A#,&",#/-0:[&<:@&-(<,+'0:[&
31
C("L"<-(@&-B-%(G-&
• O(-0@(:%-&#:&<&-(,=(,&– !++(--0">(&$-0:[&C("&",#/-(,-&A,#G&<:B/'(,(&0:&%'(&/#,>@&• C("L"<-(@&(L+#GG(,+(&-B-%(G-&
• H>(+%,#:0+&G<,_(%-&
32
R"9)4S>)
• T>0+,_&• b0%S#,,(:%&• \<2-%(,&• C0_02(@0<&
• b>#[[0:[&• *(<,+'&H:[0:(&
#2FG0-<F#:&
• .#-%&2(,&+>0+_&• C("&-(,=0+(-&• V<,F+02<F#:&• C0_0-&
• S<[[0:[&
.#G2$F:[&(:=0,#:G(:%-&;8?&• A"&N/#"T<&/".$":)+&#@/$"#$%&")=AHU?)– *$22#,%&=<,0(%B&#A&"$-0:(--&:((@-&
– O($-(&<:@&,(+#::(+%&(D0-F:[&)S&<--(%-&
– b(:(K%-3&• O(@$+(@&0:%([,<F#:&+#-%&• )G2,#=(@&"$-0:(--4)S&<>0[:G(:%&
• T<-%(,&FG(&%#&<--(G">(&:(/&<22>0+<F#:-&
• 9#/(,&)S&G<0:%(:<:+(&+#-%&
• A<VD+&"T+'T+TA"&N/#")+.:)W,-/$B)#<7J%,.0)– ):-%(<@&#A&"$B0:[N&<++(--&<22>0+<F#:-&=0<&:(%/#,_&
• d:L@(G<:@&+#G2$F:[&• ZF>0%B&+#G2$F:[&
• ]#-%(@&-(,=0+(-&– ZF>0%B&+#G2$F:[&
• O(-#$,+(-&<=<0><">(&#:&@(G<:@&A,#G&2,#=0@(,-&<,#$:@&%'(&[>#"(&
• YB:<G0+<>>B&-+<><">(&
• *(>A&'(<>0:[&• H<-B&%#&G<:<[(& 33
.#G2$F:[&(:=0,#:G(:%-&;6?&• K&/:)#<7J%,.0&
– Z:$-(@&2,#+(--0:[&+<2<"0>0F(-&#A&<>>&+#G2$%(,-&0:&<&:(%/#,_&+<:&"(&$F>0-(@&%#&+,(<%(&2#/(,A$>&+#G2$F:[&+<2<"0>0%(-&
• I-<%:)#<7J%,.0)– ):+#,2#,<%(-&$-(&#A&*<<*&– )SL,(><%(@&+<2<"0>0F(-&2,#=0@(@&<-&-(,=0+(-&
– !++(--&%(+':#>#[BL(:<">(@&-(,=0+(-&%',#$['&):%(,:(%&/0%'#$%&_:#/>(@[(&#AN&(D2(,F-(&/0%'N&#,&+#:%,#>&#=(,&%'(&%(+':#>#[B&0:A,<-%,$+%$,(&
34
E<:<[(,0<>&0--$(-&
• 8@")$&+.'/,<.)$<)+):/0/$+-)".$"&J&/'")– .#G2>0+<%(@&2,#+(--&– S(+':#>#[0+<>&<:@&K:<:+0<>&
@(+0-0#:-&
• G"+-/.0)D/$@)<%$'<%&#/.0)+.:)%,-/$B)#<7J%,.0)
• 1$@/#+-)/''%"')– S,<0:0:[&#A&#>@(,&(G2>#B((-&
– T<0,&>##-0:[&%'(&U#"&
• X/'O)<F)/.$&<:%#/.0)."D)$"#@.<-<0B)– \(/&%(+':#>#[B&@#(-&:#%&
[$<,<:%B&-$++(--&
• E7J<&$+.#")<F)9%'/."'')/.$"--/0".#")– )A&B#$&,(<>>B&:((@&<&%##>&– C'0+'&2,#@$+%-&<:@&=(:@#,-&&– ]#/&%#&0:%([,<%(&%'(&%##>&/0%'&
%'(&(D0-F:[&-B-%(G&
– ]#/&%#&$F>0-(&%'(&%##>&0:&%'(&G#-%&<22,#2,0<%(&/<B&
35
New IS are constantly developed!
C'<%&@0@&/(&>(<,:&%#@<Ba&
• C'<%&0-&)*a&• )*&+><--0K+<F#:&<:@&%B2(-&• )*&A#,&2(#2>(&• ):A,<-%,$+%$,(N&<,+'0%(+%$,(&<:@&+#G2$F:[&(:=0,#:G(:%-&
36