Analyzing Local Information Policies

advertisement
Running Head: ANALYZING INFORMATION POLICIES
Problem One: Analyzing Local Information Policies
Kristina Olsen
Wayne State University
1
ANALYZING INFORMATION POLICIES
2
Problem One: Analyzing Local Information Policies
As a student in an information science graduate program, and as with many graduate and
undergraduate programs, there exists an information policy environment that affects one’s
academic progress. Information policies are developed to protect the student’s privacy as well as
promote the flow of information. Yet, it is difficult to clearly define what constitutes an
information policy.
The subject of information policy is wide-ranging and elicits many definitions from
different information professionals. For instance, Maxwell (2003) defines information policy as
“social, political, legal, economic and technological decisions about the role of information in
society. These decisions operate both at a societal level when applied to the national and
international policy, and at an instrumental level, as they impact the creation, dissemination, use
and preservation of information.” Information policies can be found at the local levels within the
Wayne State University Library System and the School of Library and Information Science.
They are also at the higher, institutional level and those even higher at outside institutions such
as the state and local government and third party network technologies.
Although Maxwell’s definition of information policy is comprehensive and depicts the
different levels of where information policies can reside, it is not wholly sufficient for the
intended purpose of evaluating Wayne State University’s information policy environment. The
definition leaves matters such as copyright, personal privacy, and plagiarism into question; are
these areas of information policy. The British Columbia Library Association helps answer this
question with a reconstructed definition:
“Information policy determines the kind of information collected, created, organized,
stored, accessed, disseminated and retained. Who can use the information, whether there
ANALYZING INFORMATION POLICIES
3
will be charges for access, and the amount charged, is also covered. Usually associated
with government information, information policy also established the rules within which
private information providers and the media operate” (What is Information Policy, 1998).
Therefore this definition allows for the consideration of Duff’s (2004) “Normative List of
Information Policy Issues”: freedom of information; privacy; data protection and security;
official secrets; libraries and archives; scientific, technical and medical documentation;
economics of government publications; copyright and intellectual property; national information
infrastructure; international information flows. Not all of these information policy issues will be
included in the evaluation of the information policy environment, but this allows for a more
accurate assembly of information policies.
Furthermore, an institution, such as Wayne State University, can use its information
policies to produce and better equip its students before sending them into the workforce. An
established information policy can “[…] enable effective decisions on resource allocation;
promote interaction, communication and mutual support between all parts of the organization,
and between it and its ‘customers’ or public […]” (Orna, 2008). Clear information policies
allow for the protection of students’ privacy, a concise understanding of what is expected of
them through course syllabi, access to course material and resources, and better communication
and use of technology.
Accordingly, Wayne State University’s information policy environment will be examined
by looking at the policies found on the institution’s web site and course syllabi and general
information policies affecting the graduate students in the library and information science
program will be identified. The relationships between local information policies and higher-level
ANALYZING INFORMATION POLICIES
4
policy making bodies will be studied. Lastly, a look at how these policies are integrated into the
graduate student’s courses and agenda as well as their affect on the student’s everyday life.
The information policies located on the university’s main web site and the school of
library and information science web site fell into six categories: funding, protection of personal
privacy, freedom of access, intellectual property rights, literacy/student support, and information
technology. The categories most lacking in polices are protection of personal privacy and
freedom of access; where as, information technology and literacy/student support have the most.
This gap in information policy is significant. There are many policies regarding information
technology and student services and literacy, but the absence of privacy protection policies will
soon pose a problem. However, one must consider that this deficiency maybe due to an
overarching policy, such as the Family Education Rights and Privacy Act (FERPA), limiting the
need for other protection policies. Some areas may need several policies due to inefficiencies
within the policies. Therefore, there will be overlaps of some information policies to fill the
missing links of others. See Appendix A for a diagram of general information policies.
After locating and distinguishing the missing areas of information policy, the relationship
between the local levels and the higher-level information policies was reviewed. In this instance,
the policies were divided into four categories: academic integrity and plagiarism, student privacy
and information security, student progress and grading, technology and information access.
These categories were chosen by the frequency of mentions between the course syllabi and the
web sites.
An illustration of a higher-level to local level relationship is the Student Code of
Conduct. The Student Code of Conduct is a higher-level Wayne State University policy, but is
referenced several times within local level web sites, WSU Library System and the School of
ANALYZING INFORMATION POLICIES
5
Library and Information Science and course syllabi. Another higher-level policy referenced
throughout the local level is the Acceptable Use of Technology Resources. However, there are
no local level policies that are also higher-level policies. For instance, the School of Library and
Information Science developed a plagiarism quiz to further educate its students about the topic.
This is a policy tool that should be incorporated into higher-level policies.
Another example where a local level policy should be referenced at another level is the
Copyright Guidelines for Posting to Blackboard. This is referenced on the WSU Library’s web
site. However, this could also be stated in the School of Library and Information Science
policies. Blackboard is a tool used by most everyone in the program and by including this policy
with other information technology policies, the student and faculty is allowed easy access for
reference.
In addition to including more policies within the local level for easy accessibility, it is
important to note three other policies developed by other institutions. First, the most significant
policy regarding student privacy and information security is the Family Education Rights and
Privacy Act (FERPA). This act was designed by the U.S. Department of Education, where the
School of Library and Information Science and Wayne State University abide by this law. This is
referenced in each syllabus as well as on WSU’s main web site. However, this is another policy
that should be accessible through the School of Library and Information School’s policies and
the WSU Library System policies.
The second policy is the Library Privacy Act and third is the Merit Acceptable Use
Policy. The Library Privacy Act is a law instituted from the state of Michigan regarding the
confidentiality of library materials and the patron. Where the Merit Acceptable Use policy is a
policy enacted by Wayne State University’s network provider. These policies are at the
ANALYZING INFORMATION POLICIES
6
appropriate levels and do not need to be placed elsewhere. See Appendix B for a table depicting
the policies between local level and higher-level policy making bodies.
After identifying the information policies and analyzing the relationships between local
level and higher-level policies, how the information policies affect the graduate student’s
everyday life will be examined. Information polices from the higher-level and local level
organizations influence the course syllabi. Of the syllabi considered, the topics of academic
integrity and plagiarism, communication, and student privacy and information security were the
most consistent throughout. Academic integrity and plagiarism policies referenced a mix of local
level and higher-level policies as well as there being no mention of them.
Policies regarding communication showed to be more informal, where student privacy
and information security were formal among the syllabi. The syllabi containing policies
concerning communication, whether it was between the instructor and student or through
Blackboard, did not reference any specific polices for Wayne State University, the School of
Library and Information Science, or the WSU Library System. Moreover, the syllabi containing
the subject of student privacy and information security referenced the Family Education Rights
and Privacy Act. Regardless of informal or formal policy structures, these information policies
affect flow of information, which thus affects the student’s academic progress. See Appendix C
for comparison between information policies among course syllabi.
Wayne State University and the School of Library and Information Science provide clear
and succinct policies to their students. However, improvements to course syllabi can be made to
better assist in the dissemination of information as well as the student’s understanding of
information policies. First, more can be done to include information about what instructors do
with the student’s information while the course is in session and when the course is completed.
ANALYZING INFORMATION POLICIES
7
The section pertaining to student privacy and information security should include an explanation
concerning this issue. Secondly, syllabi should also include policies regarding the use of
technology and resources obtained from the online databases. In particular, the syllabi should
reference the Acceptable Use of Technology Resources and the Acceptable Use of Electronic
Resources provided Wayne State University and the WSU Library System. It is important the
student know the protocol of using course material provided by the WSU Library System and
resources instructors post in Blackboard. Lastly, the syllabi should be congruent between the
different courses. Two of the twelve syllabi consulted listed no policies about academic integrity
and plagiarism, communication, and student privacy and information security. For instance, the
School of Library and Information Science could develop an information policy outlining the
requirements for what should be included in course syllabi. By considering these improvements
to course syllabi, the student can have more knowledge about his or her information security and
personal privacy as well as a better understanding of what is expected of them and of their
instructors and university.
In conclusion, the development of information policies is a vital, ongoing, and changing
process; and Wayne State University along with the WSU Library System and the School of
Library and Information Science have significant roles. Starting at the higher-level and flowing
through the local levels and finally ending in the course syllabi, information policies affect the
student and his or her academic progress through the flow of information. Illustrating this, Jaeger
(2007) states “information access is of utmost importance in democratic societies; without
sufficient access to information, political discourse and democratic dialogue are hampered.” By
establishing well-defined information policies, Wayne State University and its students are
presented with better access to networks of communication.
ANALYZING INFORMATION POLICIES
8
Appendix A: Information Policy Relational Diagram
*to view online (click)
ANALYZING INFORMATION POLICIES
9
Appendix B: Examples of Local Policies
The below table lists the policies referenced within the local levels such as WSU Library
System and the School of Library and Information Science and at the higher, university level.
Some policies given at the lower level may be higher-level policies. The higher-level policies
that are mentioned at the lower level are highlighted in blue. In addition, there are three policies
referenced that have been designed by other institutions such as government offices and thirdparty network technologies. These are highlighted in orange. Lastly, the missing relationships
between the local and higher levels are indicated in red.
Local level
Higher level
Policies
WSU Library System


Due Process Policy
(http://lib.wayne.edu/info/po
licies/due_process.php)
Code of Conduct
(http://www.doso.wayne.edu
/assets/codeofconduct.pdf)
Academic Integrity &
Plagiarism
Student Privacy and
Information Security
 Privacy Policy
(http://lib.wayne.edu/info/polici
es/privacy.php)
 The Library Privacy Act
(http://www.legislature.mi.gov)
 Family Education Rights and
Privacy Act (FERPA)
School of Library and
Information Science
 SLIS Policies
(http://students.slis.wayne.ed
u/policies/academic_integrity
.php)
 Graduate Bulletin
(http://www.bulletins.wayne.
edu/gbk-output/index.html)
 Code of Conduct
(http://www.doso.wayne.edu/
assets/codeofconduct.pdf)
 Plagiarism Quiz
(http://students.slis.wayne.ed
u/policies/plagiarismquiz.php)
 Family Education Rights
and Privacy Act (FERPA)
Wayne State University
 Policies
(http://www.doso.wayne.edu/
academic-integrity.html)
 Graduate Bulletin
(http://www.bulletins.wayne.
edu/gbk-output/index.html)
 Code of Conduct
(http://www.doso.wayne.edu/
assets/codeofconduct.pdf)
 Plagiarism Quiz
 Confidential Information
Policy
(http://fisopsprocs.wayne.edu
/policy/)
 Freedom of Information Act
(http://fisopsprocs.wayne.edu
/policy/)
 Privacy of Academic
Records
(http://reg.wayne.edu/faculty/
privacy.php)
 Family Education Rights
and Privacy Act (FERPA)
(http://www.ed.gov/policy/ge
n/guid/fpco/ferpa/index.html)
ANALYZING INFORMATION POLICIES
Student Progress and
Grading
Technology &
Information Access
 Acceptable Use of Electronic
Resources
(http://lib.wayne.edu/info/polici
es/eresources.php)
 Acceptable Use of Technology
Resources
(http://wayne.edu/policies/acce
ptable-use.php)
 Borrowing Privileges
(http://lib.wayne.edu/services/b
orrowing/)
 Digital Media Copyright
Guidelines for Faculty & Staff
(http://lib.wayne.edu/info/polici
es/copyright_guidelines.php)
 Copyright Guidelines for
Posting Documents to
Blackboard
(http://lib.wayne.edu/info/polici
es/copyright_blackboard.php)
10
 SLIS Polices – Withdrawal,
dismissal; Incomplete,
change, or appeal of grades
(http://students.slis.wayne.ed
u/policies/academic_progres
s.php)
 Code of Conduct
(http://www.doso.wayne.edu
/assets/codeofconduct.pdf)
 Readmission Policy
(http://students.slis.wayne.ed
u/policies/readmission.php)
 Student Academic Review
(http://students.slis.wayne.ed
u/policies/sar.php)
 Online Searching
(http://students.slis.wayne.ed
u/policies/online_searching.p
hp)
 Acceptable Use of
Technology Resources
(http://www.wayne.edu/polic
ies/acceptable-use.php)
 E-Portfolio Technology
Support
(http://students.slis.wayne.ed
u/eportfolios/technologysupport.php)
 Acceptable Use Policy
(http://students.slis.wayne.ed
u/technology/use-policy.php)
 Copyright Guidelines for
Posting Documents to
Blackboard
 Code of Conduct
(http://www.doso.wayne.edu
/assets/codeofconduct.pdf)
 Course Policy Notes
(http://reg.wayne.edu/student
s/policies.php)
 Acceptable Use of
Technology Resources
(http://www.wayne.edu/polic
ies/acceptable-use.php)
 Responsibility for WSU’s
Network Infrastructure
(http://fisopsprocs.wayne.edu
/policy/)
 Information Technology
System Policy
(http://fisopsprocs.wayne.edu
/policy/)
 Strong Password Standards
(http://www.computing.wayn
e.edu/about/strong-passwordstandard.php)
 Copying of Computer
Software Programs
(http://www.computing.wayn
e.edu/policies/copypolicy.ph
p)
 Merit Acceptable Use
Policy
(http://www.merit.edu/policie
s/acceptable_use.php)
 Wayne State HEOA
Copyright Protection Plan
(http://computing.wayne.edu/
policies/heoa_plan.php)
 Acceptable Use of
Electronic Resources
ANALYZING INFORMATION POLICIES
11
Appendix C: Examples of Information Policies within Course Syllabi
The examples of information policies are displayed several ways within the course
syllabi. Several syllabi reference policies of the School of Library and Information Science
(SLIS) and others reference policies of Wayne State University (WSU). Hyperlinks to these
policies are provided along with a summary describing the policy. Other instructors do not
reference policies from either the SLIS or WSU, but rather develop his or her own policy. These
differences were displayed among academic integrity and plagiarism, communication, ePortfolio, student privacy and information security, student responsibilities, student disabilities,
and student progress and grading policies. The example below demonstrates the differences
between academic integrity and plagiarism policies among course syllabi. Some reference and
include information policies of the School of Library and Information Science, Wayne State
University, and the instructor’s own creation.
Example 1a: Syllabus referencing both SLIS and WSU policies
Academic Integrity & Plagiarism
Plagiarism is considered scholastic dishonesty and is not tolerated by the School of Library and
Information Science or the University. Cutting and pasting information from electronic resources
without citing sources is plagiarism. Carefully quote your sources, giving the context of
statements and cite the source according to the APA style manual.
Plagiarized assignments will result in an “F” for the course and may be grounds for disciplinary
action. For more information, refer to the WSU SLIS website,
http://www.slis.wayne.edu/about/policies.php. Read the university’s statement on academic
integrity at: http://tinyurl.com/96aav43 and the underlying Code of Conduct
http://www.doso.wayne.edu/codeofconduct.pdf, so there is no doubt whatsoever in your mind
what academic integrity is. Under no circumstances will your ignorance of these standards,
policies and scholarly practices be accepted as a defense for cheating, falsification, fabrication,
or plagiarism.
Plagiarism Quiz
Plagiarism occurs, not only as a result of conscious cheating, but often because of
misunderstandings about what really constitutes plagiarism. Take the School quiz to learn more
about plagiarism and how to avoid it. Go to: http://slis.wayne.edu/plagiarism-quiz.phpto take the
quiz.
(Maatta-Smith, 2012)
ANALYZING INFORMATION POLICIES
12
Example 1b: Syllabus referencing SLIS policy
Academic Integrity
For explanations of academic issues such as attendance, plagiarism, incompletes, withdrawals,
please consult the SLIS Program Policies: http://slis.wayne.edu/policies.php
(Charbonneau, 2013 and Walter, 2013a)
Example 1c: Policy referencing WSU policy
Academic Integrity
Academic work submitted by a graduate student for graduate credit is assumed to be of her/his
own creation, and, if found not to be, will constitute cause for the student’s dismissal from the
School” (Wayne State University Graduate Bulletin). Plagiarism is generally defined as claiming
someone else’s ideas, words or information. It constitutes intellectual theft. Plagiarism can be
avoided by footnoting any data, language, or ideas not of one’s own creation. Paraphrasing or
rewording of another’s work without appropriate credit is also plagiarism. Similarly, plagiarism
violates a student’s responsibilities when a student purchases or otherwise acquires work done by
another and submits it as one’s own. Such behavior constitutes fraud, or cheating, and will result
in disciplinary action. A related issue arises when a student takes a previously submitted course
assignment and, making few or no changes, submits that assignment as part of the requirement
for another course. This ethical violation of the student’s responsibility to submit fresh, original
work for each assignment will also be construed as plagiarism. Discovery of any such practices
will result in disciplinary action.
(Lorenzen, 2013)
Example 1d: Instructor’s own creation
Academic Integrity
You are being encouraged to grow intellectually and to become responsible citizens in our
complex society. In order to develop your skills and talents, you will be asked to do research,
write papers, prepare presentations, and work individually as well as in teams. Academic
dishonesty undermines your intellectual growth. Therefore, violations of the code of academic
honesty will not be tolerated. Academic dishonesty is defined as “the giving, taking, or
presentation of information or material by a student with the intent of unethically or fraudulently
aiding oneself or another on any work which is to be considered in the determination of a grade
or the completion of academic requirements.” A student shall be in violation of the academic
honesty policy if he / she:
1. Presents the work of others as his / her own,
2. Does the work for another individual in a situation in which that the individual is expected to
perform his/her own work, or
3. Offers false data in support of required course work.
The act of submitting work for evaluation or to meet a requirement is regarded as assurance that
the work is the result of the student’s own thought and study, produced without assistance and
stated in that student’s own words (except where quotation, references, or footnotes acknowledge
the use of other sources). Students who are in doubt regarding any matter related to the standards
ANALYZING INFORMATION POLICIES
13
of academic integrity in this course should consult with the instructor before presenting work.
Submitting work that is not your own will result, at a minimum, in a zero score for the
assignment and a request to immediately drop the course.
(Heinrichs, 2013 and Zhang, 2013)
Another significant difference between course syllabi is the Communication and
Blackboard information policies. All mention a preferred method of contact the student should
use in communicating with the instructor as well as etiquette regarding commenting and posting
on discussion boards. Two syllabi reference an external link not associated with the university
for “netiquette” behaviors for posting online. These polices tend to be informal, where these may
not necessarily be directly stated. Below is an example between three syllabus communication
policies.
Example 2a:
Communication
Email: Email is the best way to contact me. I will check email Monday-Friday between 6:00 PM
and 9:00 PM. I can’t guarantee that I will check email on weekends.
You can email me at av8728@wayne.edu. If your email address does not contain your Access
ID, then please include it in your email. Please make subject lines specific, for instance “HTML
Assignment Question”, not just “HTML” or “Question”. If you change topics during a string of
emails, please indicate that in the Subject line “Lecture 2 Section 4 Question WAS Re: HTML
Assignment Question”.
Course announcements, changes and updates will be posted in Blackboard. I may also send out
important announcements through e-mail. You are expected to check, at least five times a week,
the course Website in Blackboard and your Wayne State e-mail account [you may have it
forwarded to another e-mail account that is checked regularly].
Phone: I will be receiving a phone number from the university and will post that when it is
available. That phone number will lead directly to voicemail and I will check those voicemails
Monday-Friday between 6:00 PM EST and 9:00 PM EST
Virtual Office Hours: I will post a link to our Adobe meeting space in Blackboard. Office hours
start at 7:30 PM EST on Wednesdays. If I do not have anyone in office hours by 8:00 PM EST, I
will leave for the evening. If you can’t make office hours, I’m happy to schedule an appointment.
(Ayar-Illichman, 2012)
ANALYZING INFORMATION POLICIES
14
Example 2b:
Blackboard Discussion Use Policies
Discussion boards will be available for general and specific topics. The discussion boards are
intended to be a place for questions and discussion in connection with this course and other
course-related topics. Above all else, posters are to conduct themselves in a civil manner, and
treat fellow students with respect. For more information on netiquette rules please visit:
http://www.albion.com/netiquette/.
I will answer your questions posted on the discussion board as often as I can. Since I travel
internationally, due to time zone difference and Internet availability, I might not be able to be
very prompt with my answers. This is an asynchronous class.
E-mail Communication
You must activate and use your Wayne State University account. I will not answer e-mails
received from private accounts such as “crazydog@yahoo.com.” Post your questions in the
Blackboard discussion board rather than sending them to me via e-mail. This way the entire
class will benefit from having your questions answered. If you need to contact your instructor
via e-mail, in the subject heading of your e-mail use LIS 6120—xxx (section number). Don’t
forget to sign your messages with your full name. Please make sure your WSU Inbox has
enough capacity to receive messages during the semester. One point will be deducted from the
final grade for each message sent by the instructor to your account that bounces back as
undeliverable because of ‘over quota.’ Please refrain from inviting faculty to join you on social
media networks.
(Anghelescu, 2012)
Example 2c:
(Walster, 2013b)
However different the representation and content of the information policies between the
course syllabi, the “Student Privacy and Information Security” policy is the most congruent
among them. Of the twelve syllabi consulted, only two did not include this section. The rest all
ANALYZING INFORMATION POLICIES
15
referenced the Family Educational Rights and Privacy Act (FERPA) and provided the same
information.
Example 3:
Student Privacy and Information Security
SLIS follows all WSU policies and procedures regarding student privacy and security as outlined
by the Family Educational Rights and Privacy Act (FERPA)--a federal mandate:
http://reg.wayne.edu/students/privacy.php
(Anghelescu, 2012; Ayar-Illichman, 2012; Biggers, 2013; Charbonneau, 2013; Heinrichs, 2013;
Lorenzen, 2013; Maatta-Smith, 2012; Walster 2013a, 2013b; and Zhang, 2013)
Lastly, there are information polices that are not included within certain syllabi but should
be. After reviewing the syllabi from previous classes, two syllabi lacked significant areas of
information policies. Those missing from the syllabi are:
1. Academic integrity and plagiarism,
2. Student privacy and information security,
3. Student progress and grading, and
4. Communication.
These four polices are essential to include in course syllabi.
ANALYZING INFORMATION POLICIES
16
References
Anghelescu, H. (2012). Syllabus for LIS 6120 Access to Information. (Available from the Wayne
State University School of Library and Information Science, 106 Kresge Library, Detroit,
MI 48202)
Ayar-Illichman, C. (2012). Syllabus for LIS 6080 Information Technology. (Available from the
Wayne State University School of Library and Information Science, 106 Kresge Library,
Detroit, MI 48202)
Biggers, A. (2013). Syllabus for LIS 7490 Competitive Intelligence and Data Analytics.
(Available from the Wayne State University School of Library and Information Science,
106 Kresge Library, Detroit, MI 48202)
Charbonneau, D. (2013). Syllabus for LIS 7620 Health Informatics and E-Science. (Available
from the Wayne State University School of Library and Information Science, 106 Kresge
Library, Detroit, MI 48202)
Heinrichs, J. (2013). Syllabus for LIS 7410 Software Productivity Tools for Information
Professionals. (Available from the Wayne State University School of Library and
Information Science, 106 Kresge Library, Detroit, MI 48202)
Jaeger, P. (2007). Information policy, information access, and democratic participation: The
national and international implications of the Bush administration’s information politics.
Government Information Quarterly, 24(4), 840-859. doi:10.1016/j.giq.2007.01.004
Lorenzen, M. (2013). Syllabus for LIS 7040 Library Administration and Management.
(Available from the Wayne State University School of Library and Information Science,
106 Kresge Library, Detroit, MI 48202)
ANALYZING INFORMATION POLICIES
17
Maatta-Smith, S. (2012). Syllabus for LIS 6010 Introduction to the Information Profession.
(Available from the Wayne State University School of Library and Information Science,
106 Kresge Library, Detroit, MI 48202)
Maxwell, T. A. (2003). Toward a model of information policy analysis: Speech as an illustrative
example. First Monday, 8 (6), n.p. Retrieved from
http://firstmonday.org/htbin/cgiwrap/bin/ojs/index.php/fm/article/view/1060/980
Orna, E. (2008). Information policies: Yesterday, today, tomorrow. Journal Of Information
Science, 34(4), 547-565. doi:10.1177/0165551508092256
Walster, D. (2013a). Syllabus for LIS 7996 Research in Library and Information Science.
(Available from the Wayne State University School of Library and Information Science,
106 Kresge Library, Detroit, MI 48202)
Walster, D. (2013b). Syllabus for LIS 8000 Information Policy. (Available from the Wayne State
University School of Library and Information Science, 106 Kresge Library, Detroit, MI
48202)
What is Information Policy?. (1998, February 1). Vancouver Community Network - The regional
free NET - Home. Retrieved from http://www.vcn.bc.ca/bcla-ip/committee/broch95.html
Zhang, X. (2013). Syllabus for LIS 7420 Client-Based Web Site Development. (Available from
the Wayne State University School of Library and Information Science, 106 Kresge
Library, Detroit, MI 48202)
Download