Internet of Torment: the Governance of Smart Home Technologies Against Technology-Facilitated Violence

Total Page:16

File Type:pdf, Size:1020Kb

Internet of Torment: the Governance of Smart Home Technologies Against Technology-Facilitated Violence Internet of Torment: The Governance of Smart Home Technologies against Technology-Facilitated Violence by Olivia Faria A thesis submitted to the Faculty of Graduate and Postdoctoral Affairs in partial fulfillment of the requirements for the degree of Master of Arts in Communication with specialization in Data Science Carleton University Ottawa, Ontario September 2020, Olivia Faria Abstract While smart home technologies (SHTs) such as smart speakers are often marketed as solutions to automate daily household activities and chores, such as managing calendars, ordering food, playing music or locking the doors, these same technologies can be used to cause harm. This thesis examines the emergence of smart home technology- facilitated violence (smart home TFV) in Canada to assess 1) how these Internet of Things (IoT) devices can be misused as technologies of torment and 2) how and why we may want to examine this phenomenon as part of a wider sociotechnical system of human and non-human actors. First, smart home technologies are situated in the history of home automation and gendered design, conceptually in the research of technology facilitated violence, within a Canadian policy and legal environment and as part of technical research on smart home technology safety by way of an interdisciplinary literature review. Secondly, a modified Walkthrough Method (Light, Burgess and Duguay, 2018) was applied to study the popular Google Nest Mini smart speaker to identify how this device may be misused, which features enable potential misuse and to better understand how the device is reflective of broader corporate values, visions and operating models. Thirdly, a hybrid theoretical framework combining assemblage theory (Kitchin, 2014), actor-network theory (Latour, 1988; Latour, 2005) and multi-scalar analysis (Edwards, 2003) was developed and applied to frame the study of this complex technological system and to structure the collection of observations and analyze results arranged into micro, meso and macro scales. This approach illuminates what may initially be misconstrued as an isolated, one-on-one dispute as a practice that is enabled, mitigated, and ultimately shaped by a variety of contexts and interactions with other components within a complex and heterogeneous sociotechnical assemblage (Kitchin, 2014). This thesis argues that conceptualizing the issue in this way is effective as an interdisciplinary approach, foregrounds the mutually shaping relationship between technology and society and how these issues are reproduced across different scales, which informs and facilitates remedial actions. The thesis concludes with recommendations and reflections on the strengths and limitations of this research. ii Acknowledgements Para minha querida família, sou grato por seus sacrifícios e amor incondicional. Nenhuma outra alegria se compara a ver todos vocês orgulhosos de mim. Thank you to Dr. Tracey Lauriault, my mentor and thesis supervisor, who has guided and supported me through my academic journey over the past four years. She has provided me several academic opportunities, encouraged me to pursue a master’s degree, taught me so many things about becoming a scholar and I will always cherish my time working with her. I will miss sitting in her comfy visitor’s chair and seeing the stack of books from the Lauriault Library pile up on the ottoman as we brainstormed ideas. Thank you to my committee of Dr. Rena Bivens and Dr. Stephen Fai for your insightful feedback and diverse perspectives that ultimately enhanced this work. I would also like to thank the Department of Communication and Media Studies as a whole. As an undergrad from a different department, I always felt so welcomed by the wonderful faculty and staff of this department. It has been an honour and privilege to do my master’s degree there. I would like to extend an extra thank you to Dr. Liam Young and Dr. Dwayne Winseck who saw potential in me during my undergrad and encouraged me to pursue graduate studies, something I never thought possible at the time. To my friends, near and far, thank you for always putting a smile on my face and getting me through this gruelling yet rewarding process. Special thanks to Maya (for always being the supportive voice of reason), Magda (for always making me laugh even at the lowest points) and Kalila (for letting me vent and ramble whenever and always cheering me on from across the pond). Last but certainly not least, I am grateful for the financial support from the Social Science and Humanities Research Council (SSHRC) and the Federation of Portuguese-Canadian Business & Professionals (FPCBP) Antonio Sousa Community Pioneer Award. iii Table of Contents Abstract ......................................................................................................................... ii Acknowledgements ...................................................................................................... iii Table of Contents ......................................................................................................... iv List of Tables ............................................................................................................... vi List of Figures .............................................................................................................. vi List of Appendices ..................................................................................................... viii Chapter 1: Introduction and Thesis Question .............................................................9 1.1 Introduction ............................................................................................................... 9 1.2 Thesis Questions and Roadmap ................................................................................ 13 Chapter 2: Literature Review .................................................................................... 15 2.1 History of Home Automation and Gendered Design ................................................. 16 2.2 The State of Technology Facilitated Violence (TFV) Research ................................. 23 2.3 Canadian Policy and Legal Environment .................................................................. 31 2.4 Technical Research on Smart Home Technology Safety ........................................... 44 2.5 Summary.................................................................................................................. 56 Chapter 3: Theoretical Framework ........................................................................... 58 3.1 Assemblage Theory .................................................................................................. 59 3.2 Actor-Network Theory (ANT) .................................................................................. 63 3.3 Multi-Scalar Approach to Sociotechnical Systems (Edwards) ................................... 65 3.4 Hybrid Theoretical Framework ................................................................................. 67 Chapter 4: Methodology ............................................................................................. 68 Chapter 5: Observations from the Walkthrough Method ........................................ 75 5.1 Environment of Expected Use .................................................................................. 75 5.1.1 Vision .................................................................................................................. 76 5.1.2 Operating Model .................................................................................................. 86 5.1.3 Governance .......................................................................................................... 90 iv 5.1.4 Technical Walkthrough ........................................................................................ 92 5.2 Modifications to the Walkthrough Method ............................................................... 98 5.2.1 Unintended Uses .................................................................................................. 98 5.2.2 Data ................................................................................................................... 102 5.3 Summary................................................................................................................ 109 Chapter 6: Discussion ............................................................................................... 110 6.1 Micro Scale Analysis ............................................................................................. 111 6.2 Meso Scale Analysis .............................................................................................. 117 6.3 Macro Scale Analysis ............................................................................................. 129 6.4 Summary................................................................................................................ 136 Chapter 7: Conclusion .............................................................................................. 138 7.1 Limitations, Future Work and Final Thoughts......................................................... 143 Appendices ................................................................................................................. 146 Appendix A : Charlevoix Commitment (G7 Nations, 2018)................................................. 146 Appendix B : Funded Initiatives under the Strategy to Prevent Gender-Based Violence (derived from
Recommended publications
  • Large-Scale, Automatic XSS Detection Using Google Dorks
    Large-Scale, Automatic XSS Detection using Google Dorks Riccardo Pelizzi Tung Tran Alireza Saberi Abstract XSS Attacks continue to be prevalent today, not only because XSS sanitization is a hard problem in rich- formatting contexts, but also because there are so many potential avenues and so many uneducated developers who forget to sanitize reflected content altogether. In this paper, we present Gd0rk, a tool which em- ploys Google’s advanced search capabilities to scan for websites vulnerable to XSS. It automatically generates Figure 1: CVE vulnerabilities for 2010 and maintains a database of parameters to search, and uses heuristics to prioritize scanning hosts which are degrees of client-side support with a primarily server- more likely to be vulnerable. Gd0rk includes a high- side XSS defense [37, 23, 31]. However, the diffusion of throughput XSS scanner which reverse engineers and ap- such methods remains limited: hybrid methods require proximates XSS filters using a limited number of web re- support from both clients and servers. Since the party quests and generates working exploits using HTML and that is most directly affected by an XSS attack is the user JavaScript context-aware rules. who accesses a vulnerable server, client-side protections The output produced by the tool is not only a remark- are thus desirable (despite their limitation to so-called re- ably vast database of vulnerable websites along with flected XSS) and have been developed [29,4, 17, 11]. working XSS exploits, but also a more compact repre- However, client-side defenses are no definitive solution sentation of the list in the form of google search terms, either: IE8 regular-expression based approach is easy whose effectiveness has been tested during the search.
    [Show full text]
  • Recent Developments in Cybersecurity Melanie J
    American University Business Law Review Volume 2 | Issue 2 Article 1 2013 Fiddling on the Roof: Recent Developments in Cybersecurity Melanie J. Teplinsky Follow this and additional works at: http://digitalcommons.wcl.american.edu/aublr Part of the Law Commons Recommended Citation Teplinsky, Melanie J. "Fiddling on the Roof: Recent Developments in Cybersecurity." American University Business Law Review 2, no. 2 (2013): 225-322. This Article is brought to you for free and open access by the Washington College of Law Journals & Law Reviews at Digital Commons @ American University Washington College of Law. It has been accepted for inclusion in American University Business Law Review by an authorized administrator of Digital Commons @ American University Washington College of Law. For more information, please contact [email protected]. ARTICLES FIDDLING ON THE ROOF: RECENT DEVELOPMENTS IN CYBERSECURITY MELANIE J. TEPLINSKY* TABLE OF CONTENTS Introduction .......................................... ..... 227 I. The Promise and Peril of Cyberspace .............. ........ 227 II. Self-Regulation and the Challenge of Critical Infrastructure ......... 232 III. The Changing Face of Cybersecurity: Technology Trends ............ 233 A. Mobile Technology ......................... 233 B. Cloud Computing ........................... ...... 237 C. Social Networking ................................. 241 IV. The Changing Face of Cybersecurity: Cyberthreat Trends ............ 244 A. Cybercrime ................................. ..... 249 1. Costs of Cybercrime
    [Show full text]
  • Hacking the Master Switch? the Role of Infrastructure in Google's
    Hacking the Master Switch? The Role of Infrastructure in Google’s Network Neutrality Strategy in the 2000s by John Harris Stevenson A thesis submitteD in conformity with the requirements for the Degree of Doctor of Philosophy Faculty of Information University of Toronto © Copyright by John Harris Stevenson 2017 Hacking the Master Switch? The Role of Infrastructure in Google’s Network Neutrality Strategy in the 2000s John Harris Stevenson Doctor of Philosophy Faculty of Information University of Toronto 2017 Abstract During most of the decade of the 2000s, global Internet company Google Inc. was one of the most prominent public champions of the notion of network neutrality, the network design principle conceived by Tim Wu that all Internet traffic should be treated equally by network operators. However, in 2010, following a series of joint policy statements on network neutrality with telecommunications giant Verizon, Google fell nearly silent on the issue, despite Wu arguing that a neutral Internet was vital to Google’s survival. During this period, Google engaged in a massive expansion of its services and technical infrastructure. My research examines the influence of Google’s systems and service offerings on the company’s approach to network neutrality policy making. Drawing on documentary evidence and network analysis data, I identify Google’s global proprietary networks and server locations worldwide, including over 1500 Google edge caching servers located at Internet service providers. ii I argue that the affordances provided by its systems allowed Google to mitigate potential retail and transit ISP gatekeeping. Drawing on the work of Latour and Callon in Actor– network theory, I posit the existence of at least one actor-network formed among Google and ISPs, centred on an interest in the utility of Google’s edge caching servers and the success of the Android operating system.
    [Show full text]
  • Google Dorks: Use Cases and Adaption Study
    Google dorks: Use cases and Adaption study UNIVERSITY OF TURKU Department of Future Technologies Master of Science in Technology Thesis Networked Systems Security October 2020 Reza Abasi Supervisors: Dr. Ali Farooq Dr. Antti Hakkala The originality of this thesis has been checked in accordance with the University of Turku quality assurance system using the Turnitin OriginalityCheck service. i UNIVERSITY OF TURKU Department of Future Technologies Reza Abasi: Google dorks: Use cases and adaption study Master of Science in Technology Thesis, 93 pages. Networked Systems Security October 2020 The information age brought about radical changes in our lives. More and more assets are getting connected to the Internet. On the one hand, the connectivity to this ever-growing network of connected devices and assets (the Internet) precipitates more convenience and access to various resources. However, on the downside, the Internet could be the hotbed for malicious actors like hackers, attackers, and cybercriminals’ communities. Continuous Penetration testing and monitoring of the sites, and forums providing illicit digital products and services is a must-do task nowadays. Advanced searching techniques could be employed for discovering such forums and sites. Google dorks that are utilizing Google’s advanced searching techniques could be applied for such purpose. Google dorks could be used for other areas that we will explain during this thesis in more detail like information gathering, vulnerability detection, etc. The purpose of this thesis is to propose advanced searching techniques that will help cybersecurity professionals in information gathering, reconnaissance, vulnerability detection as well as cyber criminal investigative tasks. Further, a usability study has been conducted to examine the acceptance of these techniques among a group of cybersecurity professionals.
    [Show full text]
  • Google Hacking 101
    Google Hacking 101 Edited by Matt Payne, CISSP 15 June 2005 http://MattPayne.org/talks/gh 1 Outline • Google Bombing • Schneier in Secrets and Lies – Attack at a distance – Emergent behavior – Automation • Google as a mirror • “Interesting Searches” – Software versions – Passwords, credit card numbers, ISOs • CGI Scanning – Vulnerable software • Defense against Google Hacking 2 Google Bombing != Google Hacking • http://en.wikipedia.org/wiki/Google_bomb • A Google bomb or Google wash is an attempt to influence the ranking of a given site in results returned by the Google search engine. Due to the way that Google's Page Rank algorithm works, a website will be ranked higher if the sites that link to that page all use consistent anchor text. 3 So What Determines Page Relevance and Rating? • Exact Phrase: are your keywords found as an exact phrase in any pages? • Adjacency: how close are your keywords to each other? • Weighting: how many times do the keywords appear in the page? • PageRank/Links: How many links point to the page? How many links are actually in the page? Equation: (Exact Phrase Hit)+(AdjacencyFactor)+(Weight) * (PageRank/Links) 4 From: Google 201, Advanced Googology - Patrick Crispen, CSU Simply Put • “Google allows for a great deal of target reconnaissance that results in little or no exposure for the attacker.” – Johnny Long • Using Google as a “mirror” searches find: – Google searches for Credit Card and SS #s – Google searches for passwords – CGI (active content) scanning 5 Anatomy of a Search Server Side Client Side http://computer.howstuffworks.com/search-engine1.htm 6 How Google Finds Pages • Are only connected web pages indexed? • NO! – Opera submits every URL viewed to Google for later indexing….
    [Show full text]
  • Limited Consumer Privacy Protections Against the Layers of Big Data Andrew W
    Santa Clara High Technology Law Journal Volume 31 Article 4 Issue 3 01/01/2015 January 2015 Limited Consumer Privacy Protections Against the Layers of Big Data Andrew W. Bagley Justin S. Brown Follow this and additional works at: http://digitalcommons.law.scu.edu/chtlj Part of the Intellectual Property Law Commons, and the Science and Technology Law Commons Recommended Citation Andrew W. Bagley and Justin S. Brown, Limited Consumer Privacy Protections Against the Layers of Big Data, 31 Santa Clara High Tech. L.J. 483 (2015). Available at: http://digitalcommons.law.scu.edu/chtlj/vol31/iss3/4 This Article is brought to you for free and open access by the Journals at Santa Clara Law Digital Commons. It has been accepted for inclusion in Santa Clara High Technology Law Journal by an authorized administrator of Santa Clara Law Digital Commons. For more information, please contact [email protected]. V31_BAGLEY & BROWN_FINAL CORRECTIONS (DO NOT DELETE) 6/12/2015 8:25 PM LIMITED CONSUMER PRIVACY PROTECTIONS AGAINST THE LAYERS OF BIG DATA Andrew W. Bagley† & Justin S. Brown†† Consumers give away their data voluntarily and involuntary through their everyday online interactions. Many of these interactions are governed by “click-wrap” agreements in which consumers agree to data use terms with their Internet service provider (ISP), content provider, or an entire computing ecosystem through various layers of the Internet. This phenomenon effectively means that consumers lose control of their data to an endless web of third party big-data brokers unaccountable to the user. All the while, the increasingly dynamic and valuable nature of datasets makes it difficult to predict how data collected today will be used in the future.
    [Show full text]
  • “Over-The-Top” Television: Circuits of Media Distribution Since the Internet
    BEYOND “OVER-THE-TOP” TELEVISION: CIRCUITS OF MEDIA DISTRIBUTION SINCE THE INTERNET Ian Murphy A dissertation submitted to the faculty at the University of North Carolina at Chapel Hill in partial fulfillment of the requirements for the degree of Doctor of Philosophy in the Department of Communication. Chapel Hill 2018 Approved by: Richard Cante Michael Palm Victoria Ekstrand Jennifer Holt Daniel Kreiss Alice Marwick Neal Thomas © 2018 Ian Murphy ALL RIGHTS RESERVED ii ABSTRACT Ian Murphy: Beyond “Over-the-Top” Television: Circuits of Media Distribution Since the Internet (Under the direction of Richard Cante and Michael Palm) My dissertation analyzes the evolution of contemporary, cross-platform and international circuits of media distribution. A circuit of media distribution refers to both the circulation of media content as well as the underlying ecosystem that facilitates that circulation. In particular, I focus on the development of services for streaming television over the internet. I examine the circulation paths that either opened up or were foreclosed by companies that have been pivotal in shaping streaming economies: Aereo, Netflix, Twitter, Google, and Amazon. I identify the power brokers of contemporary media distribution, ranging from sectors of legacy television— for instance, broadcast networks, cable companies, and production studios—to a variety of new media and technology industries, including social media, e-commerce, internet search, and artificial intelligence. In addition, I analyze the ways in which these power brokers are reconfiguring content access. I highlight a series of technological, financial, geographic, and regulatory factors that authorize or facilitate access, in order to better understand how contemporary circuits of media distribution are constituted.
    [Show full text]
  • Introduction
    INTRODUCTION THE GOSPEL OF GOOGLE In the beginning, the World Wide Web was an intimidating collection, interlinked yet unindexed. Clutter and confusion reigned. It was impos- sible to sift the valuable from the trashy, the reliable from the exploitative, and the true from the false. The Web was exciting and democratic—to the point of anarchy. As it expanded and became unimaginably vast, its darker corners grew more remote and more obscure. Some had tried to map its most useful features to guide searchers through the maelstrom. But their services were unwieldy and incomplete, and some early guides even accepted bribes for favoring one source over another. It all seemed so hopeless and seedy. Too much that was precious but subtle and fresh was getting lost. Then came Google. Google was clean. It was pure. It was simple. It accepted no money for ranking one page higher in a search than another. 1 2 INTRODUCTION And it offered what seemed to be neutral, democratic rankings: if one site was referred to more than another, it was deemed more relevant to users and would be listed above the rest. And so the biggest, if not the best, search engine was created. This, in brief, was the genesis of the enterprise known as Google Inc. Like all theological texts, the Book of Google contains contradictions that leave us baffl ed, pondering whether we mere mortals are capable of understanding the nature of the system itself. Perhaps our role is not to doubt, but to believe. Perhaps we should just surf along in awe of the system that gives us such beautiful sunrises—or at least easily fi nds us digital images of sunrises with just a few keystrokes.
    [Show full text]
  • Don't Be Evil
    220 Chapter 13 “Don’t Be Evil” and Beyond for High Tech Organizations: Ethical Statements and Mottos (and Responsibility) Jo Ann Oravec University of Wisconsin – Whitewater, USA ABSTRACT Societal pressures on high tech organizations to define and disseminate their ethical stances are increasing as the influences of the technologies involved expand. Many Internet-based businesses have emerged in the past decades; growing numbers of them have developed some kind of moral declaration in the form of mottos or ethical statements. For example, the corporate motto “don’t be evil” (often linked with Google/ Alphabet) has generated considerable controversy about social and cultural impacts of search engines. After addressing the origins of these mottos and statements, this chapter projects the future of such ethi- cal manifestations in the context of critically-important privacy, security, and economic concerns. The chapter analyzes potential influences of the ethical expressions on corporate social responsibility (CSR) initiatives. The chapter analyzes issues of whether “large-grained” corporate mottos can indeed serve to supply social and ethical guidance for organizations as opposed to more complex, detailed codes of ethics or comparable attempts at moral clarification. INTRODUCTION Evil is whatever Sergey [Brin] says is evil. - Eric Schmidt, former Executive Chairman of Google, as quoted in Vise and Malseed (2005) How do organizations make sense of the panoply of ethical issues they face, especially in rapidly-changing technological and social environments? Challenges are expanding for high tech research and development organizations as their technologies grow in societal impact (Broeders & Taylor, 2017), from consider- ing the problems of young people confronting cyberbullies (Oravec, 2012) to the use of social media DOI: 10.4018/978-1-5225-4197-4.ch013 Copyright © 2018, IGI Global.
    [Show full text]
  • The Unregulated Wild, Wild, Digital West
    Media Industries Journal 1.2 (2014), ISSN 2373-9037 Welcome to the Unregulated, Wild, Wild, Digital West – Mann Welcome to the Unregulated Wild, Wild, Digital West Denise Mann1 University of California, Los Angeles Dmann [AT] tft.ucla.edu Abstract: An impasse between Hollywood and Silicon Valley over streaming rights to home entertainment has created a power vacuum, prompting a number of virtual entrepreneurs to look for alternative ways to monetize online media. This essay examines the "transmedia" industries and multichannel networks as transitional workspaces—innovative new forms of industrial organization, emerging forms of creative work, new technologies and economic models, and creative relations among consumers, marketers, and producers. A number of cultural industries scholars are engaged in productive critiques of digital media labor practices.2 In contrast, humanities-based critical and cultural studies scholars tend to ignore the economic realities of web-based production, focusing instead on the unpaid (albeit volunteer) labor of fans. Far fewer consider the more widespread, invisible labor associated with the wholesale data mining of consumer preferences that are being sold en masse to advertisers by major internet technology companies like Google and Facebook. Even fewer explore the paradox of YouTube talent partners, who eschew deals with Hollywood to avoid creative interference but tolerate Faustian deals with Google to profit from surveillance-based advertising. Keywords: Advertising, Hollywood, Labor, Marketing, Social Media Google, Microsoft, Apple, and the other internet technology giants desperately want to control Hollywood’s premium content, seeing it as the crown jewel in their massive marketing infrastructure via a vast array of smart, mobile technologies and social networking capabilities.
    [Show full text]
  • Siva Vaidhyanathan, the Googlization of Everything (And Why We Should Worry), Berkeley, CA, University of California Press, 2011, 280 Pp., $24.26 (Hardcover)
    International Journal of Communication 7 (2013), Book Review 1745–11749 1932–8036/2013BKR0009 Siva Vaidhyanathan, The Googlization of Everything (And Why We Should Worry), Berkeley, CA, University of California Press, 2011, 280 pp., $24.26 (hardcover). Reviewed by Javier de Rivera University Complutense of Madrid, Spain The basic thesis of this book is that Google assumes roles and projects that, because of their central importance in society, should be carried out and led by public institutions, or at least subjected to regulations that assure the interests of the public. The main threat represented by a private company overseeing a function as important as “organizing the world’s information and making it universally accessible and useful” (Google, n.d.) is the commercial nature of the enterprise, which in the long run will enforce the commoditization of knowledge. Consequently, the democratic values governing society will be displaced as commercial values increasingly inform the challenge of digitalizing and processing human knowledge. One of the most relevant commercial biases here is adapting search results to geographic and individualized data. In trying to reflect the preferences of the user, Google prevents the World Wide Web from becoming a global public sphere for consensus building and exchanging opinions. This adaptation is known as filter bubble (Pariser, 2011): the filtering of results according to the customs and opinions of the user reinforces those opinions, offering the user a personalized perspective of the world, specially designed to suit the user’s likes. In The Googlization of Everything (And Why We Should Worry), Siva Vaidhyanathan, a media scholar and professor at the University of Virginia, makes the point that this feature can be highly useful for shopping, but not for learning and obtaining relevant information about what is happening in the world.
    [Show full text]
  • Search, Antitrust, and the Economics of the Control of User Data
    Search, Antitrust, and the Economics of the Control of User Data Nathan Newmant This Article argues for reorienting many antitrust investigations-and more generally regulatory approaches-tofocus on how control of personal data by corporations can entrench monopoly power in an economy shaped increasingly by the power of "big data." What is largely missed in analyses defending Google from antitrust action is how Google's ever expanding control of user personal data and its critical value to online advertisers creates an insurmountable barrierto entry for new competition. Moreover, Google did not just inherit that business advantage through its innovation in search engine technology. Rather, Google has aggressively expanded its control of user data both by moving into new product sectors to collect additionaluser data and by invading users'privacy. Introduction: The Undermining of Competition in Online Markets...............402 A. How Google Uses Controlof User Information to Strengthen its Monopoly........... ................... ............. 405 B. The Antitrust Case Against Google ........................... 407 C. Remedies and the Argumentfor Aggressive and Earlier Regulatory Intervention.......................... 411 I. How Google Dominates the Search Advertising Market.. ............. 412 A. How the Search Advertising Market Works ......... ........ 413 B. Measuring Google's Dominance.....................414 C. Why Search Advertising is the Relevant Marketfor Antitrust Analysis ......................................... 416 D. Google's
    [Show full text]