| A | B | C | D | E | F | G | H | I | J | K | L | M | N | O | P | Q | R | S | T | U | V | W | X | Y | Z | |
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
1 | date | topic | slides | required_reading | optional_reading | disc_leaders | table_class | |||||||||||||||||||
2 | Monday 1/8 | Why ethics in technology? | [<a href="https://docs.google.com/presentation/d/1lWNT3QD5rTTyV8WM7o9b3ANo7qL0HkPHb_mPnTEGKis/edit#slide=id.p">gdoc</a>] | None | Read on next entry what you need to do for Friday Watch an interesting video on the progression of information technologies. Do compare the <a href="http://www.youtube.com/watch?v=cL9Wu2kWwSY">Did you know? (2008)</a> version with the <a href="https://www.youtube.com/watch?annotation_id=annotation_1871640555&feature=iv&src_vid=XrJjfDUzD7M&v=uqZiIO0YI7Y">Did you know (2016)</a> version! | Sam | ||||||||||||||||||||
3 | Wednesday 1/10 | Discuss the Terrell Bynum paper | [<a href="https://docs.google.com/presentation/d/1LibEZ0uHQ5kHshhli3Em9VFTQL5cbeHie1wE3GyHki4/edit#slide=id.p">gdoc</a>] | Read the <a href="http://plato.stanford.edu/entries/ethics-computer/">History of Computer and Information Ethics</a> [<a href="/assets/ecs188/computer_and_information_ethics.pdf">pdf</a>] by Terrell Bynum | Additional reading material: <ul> <li><a href="http://plato.stanford.edu/entries/morality-definition/">The definition of morality</a> [<a href="/assets/ecs188/the_definition_of_morality.pdf">pdf</a>] for a philosophical definition of morality as a foundation to ethics.</li> <li><a href="http://stanford.library.usyd.edu.au/archives/spr2006/entries/ethics-computer/">Computer Ethics: Basic Concepts and Historical Overview</a> [<a href="/assets/ecs188/computer_ethics_basic_concepts.pdf">pdf</a>] for an older overview.</li> <li><a href="/assets/ecs188/weiner_humanuse.pdf">The human use of human beings (Weiner, 2nd edition)</a>.</li> </ul> | Sam | ||||||||||||||||||||
4 | Friday 1/12 | Discuss if we should allow students to take smart drugs | [<a href="https://docs.google.com/presentation/d/1KsiDlu1fJjKVv40v-JJq4XXmRzDbbYbfhUaO8SjqOYY/edit#slide=id.p">gdoc</a>] | Come to class prepared to debate both positions: <i>"Yes, students should be allowed"</i> and <i>"No, students should not be allowed"</i>. Read <a href="/assets/ecs188/Greely_08.pdf">Towards responsible use of cognitive-enhancing drugs by the healthy</a> (Greely et al, 2008). | Possible reading to support your arguments: <ul> <li><a href="http://www.mercurynews.com/2016/07/09/hacking-the-brain-silicon-valley-entrepreneurs-turn-to-fasting-and-smart-drugs/">Hacking the brain</a> [<a href="/assets/ecs188/hacking_the_brain.pdf">pdf</a>] ; an article in the Mercury news on smart drugs in Silicon Valley.</li> <li><a href="/assets/ecs188/Husain_2011.pdf">Cognitive enhancement by drugs in health and disease (a review)</a> (Husain and Mehta, 2011).</li> <li><a href="/assets/ecs188/Dubljevic_13.pdf">Regulation of Amphetamine and Methylphenidate for Enhancement Use by Healthy Adults</a> (Dubljevic, 2013).</li> <li><a href="/assets/ecs188/Greely_13.pdf">Some First Steps Toward Responsible Use of Cognitive-Enhancing Drugs by the Healthy</a> (Greely, 2013). A commentary on the paper by Dubljevic.</li> </ul> | Sam | ||||||||||||||||||||
5 | Monday 1/15 | No class, MLK Day | None | table-danger | ||||||||||||||||||||||
6 | Wednesday 1/17 | Discuss if Apple should comply to the FBI | [<a href="https://docs.google.com/presentation/d/1F1JQImkv6R65dhMyv0KsJLi3UuFXBzKbJ0QkDlyWNHs/edit#slide=id.p">gdoc</a>] | Read the <a href="http://www.apple.com/customer-letter/">Apple letter</a> to its customers about the case and the article from Wired magazine on <a href="http://www.wired.com/2016/02/apple-fbi-privacy-security/">The Apple-FBI fight is not about privacy versus security. Do not be misled.</a> <br><br> Come to class prepared to debate both positions: <i>"Yes, Apple should comply"</i> and <i>"No, Apple should not comply"</i> | Possible readings to support your arguments: <ul> <li>In support of the FBI: transcript of a NPR <a href="http://www.npr.org/2016/02/24/467711098/transcript-nprs-interview-with-cia-director-john-brennan">interview with CIA director John Brennan</a></li> <li>A view from our Canadian neighbours: <a href="http://www.cbc.ca/news/technology/apple-fbi-explainer-1.3459952">Apple's privacy fight with the FBI explained</a></li> </ul> | Sam | ||||||||||||||||||||
7 | Friday 1/19 | Gender and bias in tech | [<a href="https://docs.google.com/presentation/d/1PjQfiGojNg4Py3vLlv1q1aqWMygkFGbzHiiRMnDPkLs/edit#slide=id.p">gdoc</a>] | (a) Read <a href="https://www.theatlantic.com/magazine/archive/2017/04/why-is-silicon-valley-so-awful-to-women/517788/https://www.theatlantic.com/magazine/archive/2017/04/why-is-silicon-valley-so-awful-to-women/517788/">Why Is Silicon Valley So Awful to Women?</a> [<a href="/assets/ecs188/mundy.pdf">pdf</a>] by Lizy Mundy (2017). (b) Read <a href="/assets/ecs188/damore.pdf">Google’s Ideological Echo Chamber</a> by James Damore (2017). (c) spend an hour or so to research reaction to (b) and to form your own opinion on it. | Listen to <a href="https://www.npr.org/2017/10/09/556116385/nature-nurture-and-our-evolving-debates-about-gender">The Edge of Gender</a> by Shankar Vedantam (2017). | Sam | ||||||||||||||||||||
8 | Monday 1/22 | MQI | [<a href="https://docs.google.com/presentation/d/1mCSCetr2xBICBIua98WnVcTiMxHiwUHvhZ1KElcdBD0/edit#slide=id.p">gdoc</a>] | Read Dyson's <a href="/assets/ecs188/dyson.pdf">lecture on technology and social justice</a> (1997) | <b>Final paper Milestone 1 due</b> | Sam | table-warning | |||||||||||||||||||
9 | Wednesday 1/24 | Dangers of tech: television | [<a href="https://docs.google.com/presentation/d/1W0F04iTmdFpfubeuIaZfbBvNBYG4a7vs-dXlYYSpIP8/edit#slide=id.p">gdoc</a>] | Read <a href="/assets/ecs188/mander.pdf">How television dims the mind</a>, Chapter 10 of the book "Four arguments for the elimination of television by Jerry Mander, 1978. | Read <a href="https://www.huffingtonpost.com/melissa-chu/books-vs-tv-how-they-stac_b_10928340.html">Books vs. TV: How They Stack Up Against One Another</a> and <a href="https://www.theguardian.com/media/2007/jul/17/broadcastingethics.broadcasting1">Box of tricks </a> | Kendall Lui | ||||||||||||||||||||
10 | Friday 1/26 | Dangers of tech: Google | [<a href="https://docs.google.com/presentation/d/1SEx2fjNstj7OJOLB6i3byvqQQ8V7FdrgvukXD5dEO00/edit#slide=id.p">gdoc</a>] | Read the paper "<a href="/assets/ecs188/carr.pdf">Is Google making us stupid</a>?" by Nicholas Carr as well as the article: <a href="http://discovermagazine.com/2009/feb/15-how-google-is-making-us-smarter">How Google is making us smarter</a> by Carl Zimmer. <b>Write a summary report (max. one page)</b>. Turn it in via Canvas before lecture | Read <a href="http://www.iasc-culture.org/THR/THR_article_2012_Spring_Wellmon.php">Google Isn't Making Us stupid...Or Smart </a> and <a href="http://science.sciencemag.org/content/333/6043/776.full">Google Effects On Memory </a> | Nathalia Sandoval and Darick McBride | ||||||||||||||||||||
11 | Monday 1/29 | Dangers of tech: Social media | [<a href="https://docs.google.com/presentation/d/1vXYoNE8xngMZvHqVjzYH-Sxx-0r8DyCrSmuxKkq9Cfc/edit#slide=id.p">gdoc</a>] | Read report from the <a href="/assets/ecs188/social_media.pdf">World's Economic Forum on social media</a> (2016). | Read <a href="https://www.theatlantic.com/technology/archive/2014/06/everything-we-know-about-facebooks-secret-mood-manipulation-experiment/373648/">Everything We Know About Facebook's Secret Mood Manipulation Experiment</a> | Kim Dang and Jason Liang | ||||||||||||||||||||
12 | Wednesday 1/31 | Dangers of tech: smartphones | [<a href="https://docs.google.com/presentation/d/1Tj-G1pdiY7AT3smwljy-mA-TuU91R8NCFmEVWpS7Sj0/edit#slide=id.p">gdoc</a>] | Read: (a) <a href="/assets/ecs188/smartphone.pdf">Have Smartphones Destroyed a Generation?</a> by J. Twenge (2017); (b) <a href="https://www.vice.com/en_us/article/vv5jkb/the-secret-ways-social-media-is-built-for-addiction">Your Addiction to Social Media is No Accident</a> by J. Morgans (2017); (c) <a href="https://journal.thriveglobal.com/how-technology-hijacks-peoples-minds-from-a-magician-and-google-s-design-ethicist-56d62ef5edf3">How Technology is Hijacking Your Mind</a> by T. Harris (2016); and listen to the Fresh Air audio (d) <a href="http://www.npr.org/sections/alltechconsidered/2017/03/13/519977607/irresistible-by-design-its-no-accident-you-cant-stop-looking-at-the-screen">‘Irresistible’ by Design</a> (2017). | Read <a href="https://link.springer.com/article/10.1007%2Fs10964-014-0176-x">Adolescents’ Electronic Media Use at Night, Sleep Disturbance, and Depressive Symptoms in the Smartphone Age</a> and <a href="https://ai2-s2-pdfs.s3.amazonaws.com/83cf/ac5ff6c789089b852c11106eb44500567078.pdf">The dark side of smartphone usage: Psychological traits, compulsive behavior and technostress</a> | Nathan McCall and Max Nedorezov | ||||||||||||||||||||
13 | Friday 2/2 | AI | [<a href="https://docs.google.com/presentation/d/1o-qrFBCq71C_0D3busVXB6MtD4xJcrNMNhhVRNdidsM/edit#slide=id.g307f321b4c_0_49">gdoc</a>] | (a) <a href="/assets/ecs188/joy.pdf">Read Why the Future Doesn’t Need Us</a> (2000) by Bill Joy. (b) Read a response to this, <a href="/assets/ecs188/kurzweil.pdf">Promise and Peril</a> (2001) by Ray Kurzweil. | Read <a href="https://www.wired.com/story/artificial-intelligence-seeks-an-ethical-conscience/">ARTIFICIAL INTELLIGENCE SEEKS AN ETHICAL CONSCIENCE</a> and <a href="https://rightsinfo.org/rise-artificial-intelligence-threat-human-rights/">The Rise of Artificial Intelligence and the Threat to our Human Rights</a> | Mat Magno | ||||||||||||||||||||
14 | Monday 2/5 | Gig economy | [<a href="https://docs.google.com/presentation/d/1xUJZq1vrKrXpCjizxUrI_zfqUUBtqxXkxbnTWNresY0/edit#slide=id.p">gdoc</a>] | Read: <a href="https://www.newyorker.com/culture/jia-tolentino/the-gig-economy-celebrates-working-yourself-to-death">The Gig Economy Celebrates Working Yourself to Death</a> from The New Yorker | <a href="https://medium.com/@johnzimmer/the-third-transportation-revolution-27860f05fa91">The Road Ahead</a> from John Zimmer (Lyft Co-Founder) The Trolley problem | Ian Skebba, Margaret He | ||||||||||||||||||||
15 | Wednesday 2/7 | No class, spend time reading working on Milestone2 | table-danger | |||||||||||||||||||||||
16 | Friday 2/9 | Money and cryptocurrencies | [<a href="https://docs.google.com/presentation/d/1AaEn5Nv4IHVz82-D_SdcjkzEX1JKo-PeN5ZdoD35UCk/edit#slide=id.p">gdoc</a>] | Read <a href="https://www.theatlantic.com/technology/archive/2017/05/blockchain-of-command/528543/">Cryptocurrency Might be a Path to Authoritarianism</a> by Ian Bogost in The Atlantic | <a href="https://www.theatlantic.com/technology/archive/2016/04/cashless-society/477411/">How a Cashless Society Could Embolden Big Brother</a> and <a href="https://qz.com/863511/technology-obsessed-parents-will-create-a-dystopian-future-for-the-next-generation-of-children/">A glimpse into the dystopian future of technology-centered parenting</a> | Tristan Bala, Zhening Zhang | ||||||||||||||||||||
17 | Monday 2/12 | BlackMirror1 | [<a href="https://docs.google.com/presentation/d/1CAM3RBiQwFgMfjLPo49m5IuNzhEMVOsechezRJ-8RJg/edit#slide=id.p">pdf</a>] | S1E3 "The Entire History of You" | <a href="https://www.tictoctrack.com.au/helicopter-parenting-age-technology/> Helicopter Parenting In the Age of Technology </a> and <a href="https://www.nationalgeographic.com/magazine/2017/06/lying-hoax-false-fibs-science"> Why We Lie: The Science Behind Our Deceptive Ways </a> | Kris Quon, Andy Li | ||||||||||||||||||||
18 | Wednesday 2/14 | BlackMirror2 | [<a href="https://docs.google.com/presentation/d/1ovgCqwt5Pjdfz9QUQ2AGEhvGCBgqtB2tZ7fflMTVLzk/edit#slide=id.p">pdf</a>] | S4E2 "Arkangel" | <a href="http://theanarchistlibrary.org/library/chellis-glendinning-notes-toward-a-neo-luddite-manifesto.pdf"> Notes Toward a Neo-Luddite Manifesto </a> and <a href="https://www.nationalgeographic.com/magazine/2017/06/lying-hoax-false-fibs-science"> Why We Lie: The Science Behind Our Deceptive Ways </a> | Sven Olson, Aaron Parra | ||||||||||||||||||||
19 | Friday 2/16 | BlackMirror3 | [<a href="https://docs.google.com/presentation/d/1xGkt6tLPSdkX4d9yRIwX3qObIa659yAvpE1kbNJCe6c/edit#slide=id.p">gdoc</a>] | S4E1 "USS Callister" | <a href="http://www.slate.com/articles/technology/future_tense/2016/04/the_challenge_of_determining_whether_an_a_i_is_sentient.html">The Challenge of Determining Whether an A.I. Is Sentient </a> and <a href="https://gizmodo.com/when-will-robots-deserve-human-rights-1794599063"> When Will Robots Deserve Human Rights? </a> <b>Final paper Milestone 2 due</b> | Nicholas Ng Hannah Fong | table-warning | |||||||||||||||||||
20 | Monday 2/19 | No class, President's Day | table-danger | |||||||||||||||||||||||
21 | Wednesday 2/21 | Privacy | [<a href="https://docs.google.com/presentation/d/1vrOCMhwHWG9UR8Rl0KiSU0fungh-VNoHXq_Ek-Aq7kQ/edit#slide=id.p">gdoc</a>] | Read <a href="http://plato.stanford.edu/entries/it-privacy/">Privacy and Information Technology</a>, an article from the Stanford encyclopedia of phylosophy, 2014. | <a href="https://www.aclu.org/blog/privacy-technology/medical-and-genetic-privacy/proposal-expand-mandatory-dna-collection">ACLU report on DNA database expansion</a> and <a href="https://www.theatlantic.com/magazine/archive/2016/11/even-bugs-will-be-bugged/501113/?utm_source=twb">What the future of surveillance looks like </a> | Shrimathi Vetrivelan, David Tran | ||||||||||||||||||||
22 | Friday 2/23 | Big data | [<a href="https://docs.google.com/presentation/d/11X98da6Glc56rCXrVsDdx3x43eJ_ZTrERxtai7httvk/edit#slide=id.p">gdoc</a>] | (a) Watch <a href="https://www.youtube.com/watch?v=GAXLHM-1Psk">Haunted by Data</a> by Maciej Ceglowski (2015) (20 mins). (b) Watch <a href="https://www.ted.com/talks/cathy_o_neil_the_era_of_blind_faith_in_big_data_must_end#t-6134">The era of blind faith in big data must end</a> by Cathy O’Neil (2017) (13 mins). (c) Watch <a href="http://autonomousweapons.org/slaughterbots/">Slaughterbots</a> by Stuart Russell (2017) (8 mins) (fiction). (d) Read <a href="https://thenewinquiry.com/the-anxieties-of-big-data/">The Anxieties of Big Data</a> by Kate Crawford (2014). | https://rroyselaw.com/technology-transactions/agtech/legal-issues-big-data-2017/ | Jatin Gaba, Joshua Brown | ||||||||||||||||||||
23 | Monday 2/26 | Surveillance | [<a href="https://docs.google.com/presentation/d/10V1-OgzsPEu0C6f6vBgfBZuJ_ogmKsuT-4MNHvEhSZY/edit#slide=id.p">gdoc</a>] | (a) Read <a href="http://prospect.org/article/want-predict-future-surveillance-ask-poor-communities">Want to Predict the Future of Surveillance? Ask Poor Communities</a> by Virginia Eubanks (2014). | (b) Read <a href="/assets/ecs188/big-other.pdf">Big Other</a> by Shoshana Zuboff (2015) [Warning: difficult reading]. (c) <a href="https://www.engadget.com/2018/02/22/china-xinjiang-surveillance-tech-spread/">China's Xinjiang surveillance is the dystopian future nobody wants</a> by Nithin Coca (d) <a href="http://journals.sagepub.com/doi/abs/10.1177/0003122417725865">Big Data Surveillance: The Case of Policing</a> | Alex Derebenskiy, Andres Sanchez | ||||||||||||||||||||
24 | Wednesday 2/28 | Surveillance | [<a href="https://docs.google.com/presentation/d/1HbvtY5ZQybdIZH4tSExfX2288dcn43OrHX2mNARAkAk/edit#slide=id.p">gdoc</a>] | Read <a href="/assets/ecs188/moral-fn.pdf">The Moral Character of Cryptographic Work</a> (endnotes instead of footnotes) by Phillip Rogaway (2015) | Tanya Shelton and William Jackson | |||||||||||||||||||||
25 | Friday 3/2 | Aaron Swartz | [<a href="https://docs.google.com/presentation/d/15rGsRJg32S2qRvjZsUG5jQJHLCyrr88N75FOd6YNSos/edit#slide=id.p">gdoc</a>] | Prepare to discuss the life of <a href="http://en.wikipedia.org/wiki/Aaron_Swartz">Aaron Swartz</a>: <ul> <li>watch a <a href="http://www.youtube.com/watch?v=Fgh2dFngFsg">conference keynote</a></li> </ul> <b>Write a summary report (max 1 page)</b>. Turn it in via Canvas before lecture. | <ul> <li>Read Dotorow’s <a href="http://boingboing.net/2013/01/12/rip-aaron-swartz.html">blog</a></li> <li>Read Lessig’s <a href="http://lessig.tumblr.com/post/40347463044/prosecutor-as-bully">blog</a></li></ul> | Navid A Nadvi, Noa Shadmon | ||||||||||||||||||||
26 | Monday 3/5 | Bad company | (a) Read <a href="https://www.theatlantic.com/magazine/archive/2016/01/what-was-volkswagen-thinking/419127/">What was Volkswagen Thinking?</a> by Justin Renteria (2016). (b) Spend half an hour more to read something you find online about the Volkswagen emissions scandal. | (c) Some people do behave reasonably: read <a href="/assets/ecs188/fifty-nine.pdf">The Fifty-Nine-Story Crisis</a> by Joe Morgenstern (1995). (d) <a href = "https://mobile.reuters.com/article/amp/idUSKCN0S40MT20151010">Fear and Respect: VW's culture under Winterkorn</a> for personal accounts about working in Volkswagen before the scandal went public. (e) <a href = "https://ideas.darden.virginia.edu/2016/10/vw-emissions-and-the-3-factors-that-drive-ethical-breakdown/">VW Emissions and the Three Factors That Drive Ethical Breakdown</a> for a possible explanation for the scandal. (f) <a href = "http://amp.timeinc.net/fortune/2015/10/13/biggest-culprit-in-volkswagen-emissions-scandal">The Biggest Culprit in Volkswagen Emissions Scandal </a> for another explanation from perspective of an academic consultant | Cindy Peng | |||||||||||||||||||||
27 | Wednesday 3/7 | Bad company | Was Facebook unethical for publishing research without the consent of the users? Possible reading/links to support your arguments: <ul> <li>James Grimmelmann (Law professor, University of Maryland <a href="http://laboratorium.net/archive/2014/06/28/as_flies_to_wanton_boys">Blog post</a> about this subject.</li> <li><a href="http://www.universityworldnews.com/article.php?story=20150109205518594">Big data scientists face ethical challenges after Facebook study</a>, University World News, Jan. 2015.</li> </ul> | <b>Final paper due</b> <ul> <li>The PNAS <a href="/assets/ecs188/pnas.pdf">paper and comments from the editor</a> (PNAS, July 2014).</li> <li><a href="http://mprcenter.org/blog/2014/07/facebooks-research-dilemma-did-they-violate-ethical-or-social-contracts/?hvid=522n8B">Facebook's Research Dilemma: Did They Violate Ethical or Social Contracts?</a> Dr Pamela Rutledge, The media psychology blog (2015).</li> </ul> | Cynthia Lai, Kevin Chung | table-warning | ||||||||||||||||||||
28 | Friday 3/9 | No class, prep for presentations | table-danger | |||||||||||||||||||||||
29 | Monday 3/12 | Presentations | <ul><li>Group 8</li><li>Group 2</li><li>Group 11</li></ul>And in the discussion section:<ul><li>Artificial Unintelligence</li><li>Group 1</li><li>Group 3</li></ul> | None | table-info | |||||||||||||||||||||
30 | Wednesday 3/14 | Presentations | <ul><li>Group 10</li><li>Group 4</li><li>Group 9</li></ul> | None | table-info | |||||||||||||||||||||
31 | Friday 3/16 | Presentations | <ul><li>Ethics Explorers</li><li>Group 7</li><li>YAGroup2</li></ul> | None | table-info | |||||||||||||||||||||
32 | ||||||||||||||||||||||||||
33 | ||||||||||||||||||||||||||
34 | ||||||||||||||||||||||||||
35 | ||||||||||||||||||||||||||
36 | ||||||||||||||||||||||||||
37 | ||||||||||||||||||||||||||
38 | ||||||||||||||||||||||||||
39 | ||||||||||||||||||||||||||
40 | ||||||||||||||||||||||||||
41 | ||||||||||||||||||||||||||
42 | ||||||||||||||||||||||||||
43 | ||||||||||||||||||||||||||
44 | ||||||||||||||||||||||||||
45 | ||||||||||||||||||||||||||
46 | ||||||||||||||||||||||||||
47 | ||||||||||||||||||||||||||
48 | ||||||||||||||||||||||||||
49 | ||||||||||||||||||||||||||
50 | ||||||||||||||||||||||||||
51 | ||||||||||||||||||||||||||
52 | ||||||||||||||||||||||||||
53 | ||||||||||||||||||||||||||
54 | ||||||||||||||||||||||||||
55 | ||||||||||||||||||||||||||
56 | ||||||||||||||||||||||||||
57 | ||||||||||||||||||||||||||
58 | ||||||||||||||||||||||||||
59 | ||||||||||||||||||||||||||
60 | ||||||||||||||||||||||||||
61 | ||||||||||||||||||||||||||
62 | ||||||||||||||||||||||||||
63 | ||||||||||||||||||||||||||
64 | ||||||||||||||||||||||||||
65 | ||||||||||||||||||||||||||
66 | ||||||||||||||||||||||||||
67 | ||||||||||||||||||||||||||
68 | ||||||||||||||||||||||||||
69 | ||||||||||||||||||||||||||
70 | ||||||||||||||||||||||||||
71 | ||||||||||||||||||||||||||
72 | ||||||||||||||||||||||||||
73 | ||||||||||||||||||||||||||
74 | ||||||||||||||||||||||||||
75 | ||||||||||||||||||||||||||
76 | ||||||||||||||||||||||||||
77 | ||||||||||||||||||||||||||
78 | ||||||||||||||||||||||||||
79 | ||||||||||||||||||||||||||
80 | ||||||||||||||||||||||||||
81 | ||||||||||||||||||||||||||
82 | ||||||||||||||||||||||||||
83 | ||||||||||||||||||||||||||
84 | ||||||||||||||||||||||||||
85 | ||||||||||||||||||||||||||
86 | ||||||||||||||||||||||||||
87 | ||||||||||||||||||||||||||
88 | ||||||||||||||||||||||||||
89 | ||||||||||||||||||||||||||
90 | ||||||||||||||||||||||||||
91 | ||||||||||||||||||||||||||
92 | ||||||||||||||||||||||||||
93 | ||||||||||||||||||||||||||
94 | ||||||||||||||||||||||||||
95 | ||||||||||||||||||||||||||
96 | ||||||||||||||||||||||||||
97 | ||||||||||||||||||||||||||
98 | ||||||||||||||||||||||||||
99 | ||||||||||||||||||||||||||
100 |