Use Style: Paper Title

Total Page:16

File Type:pdf, Size:1020Kb

Use Style: Paper Title International Journal of Network Security, Vol.16, No.3, PP.161-167, May 2014 161 Critical Factors of Educational Institutions Adoption for BS 10012: Persional Information Management System Cheng-Yi Liu1, Shan-Shan Yang2, and Iuon-Chang Lin2,3 (Corresponding author: Iuon-Chang Lin) Department of Information Management, TransWorld University1 Yunlin, Taiwan Department of Management Information Systems, National Chung Hsing University2 Department of Photonics and Communication Engineering, Asia University3 Taichung, Taiwan (Email: [email protected]) (Invited Paper) Abstract of sustainable management. Computer Processing of the Personal Data Protection Personal Information Protection Act has passed in Taiwan Act has been implemented in Taiwan in 1995, but it has a in May, 2010 and relevant policy has been implemented in lot of disadvantage and the protection scope is very narrow, October, 2012. Most of the domestic educational so effectiveness was not as expected. As such the new institutions concentrated on constructing the personal Personal Information Protection Act (PIPA) has passed in information management system and reduced the risk of 2010 which removes restriction and includes the reverse personal information leakage. In this study, diffusion of burden of proof so that the public can supervise innovation theory and TOE framework are proposed to government and enterprises to follow PIPA [4]. BS 10012 evaluate the critical factor that influences the adaption of certification was released by British Standards Institution BS 10012 certification. The key factors, which includes (BSI) in 2009 which provides the standards of personal characteristics of environment, educational institution, information management system (PIMS). This certification personal information management system and etc., are used follows Plan-Do-Check-Act (PDCA) mechanism to provide to determine whether the educational institution has protection of personal information [5, 6]. adopted BS 10012 certification or not. Questionnaire survey is applied to the staff that works in educational In recent year in Taiwan, many organizations consider institution and the analysis result indicates that the adoption of the BS 10012 certification which could help reputation of school, the support of senior staff and the them with compliance of PIPA. However, to introduce a comparative advantage will have more influence on the certification is not a simple thing because it needs a whole adaption of BS 10012 certification. scope of evaluation and consideration. Thus, this study tried to find out the critical factors of consideration for Keywords: BS 10012 certification, diffusion of innovation educational institution before adopting the BS 10012 theory, personal information management system (PIMS), certification and expected that the results could provide personal information protection Act, TOE framework some advice for follow-up study and give decision makers as the guidance. 1 Introduction According to the DataLossDB website 2 Literature Review (http://datalossdb.org/) which aggregates the major leak of data in the world, data leakage incidents have been increasing year by year and 15% of them happened inside 2.1 Personal Information Protection Act (PIPA) the educational institutions [1]. Threat Report of Trend Micro in the first half of 2010 also pointed out that the 50% Personal Information Protection Act has passed in Taiwan of malware-attack targeted on educational institutions [2]. in May, 2010 composed of 6 chapters and 56 clauses. It However, because of the environment diversification, the ameliorates all disadvantages of the old PIPA and the campus cannot restrict all users using Internet which causes improvement is summarized as follows: the leakage awareness of information security [3]. 1) Expand the protection scope: PIPA gets rid of Therefore, educational institutions should construct the “computer-processing” restriction and any types of data protection of personal information, reduce the risk of data should comply with PIPA if it is identified as personal leakage, protect the rights of staff, and achieve the purpose information; International Journal of Network Security, Vol.16, No.3, PP.161-167, May 2014 162 2) Protect all subjects: in the old PIPA the protection 2.3 Diffusion of Innovation Theory subject only targets on the government and special Rogers proposed the diffusion of innovation theory in 1962 industries, while the new PIPA doesn’t have the restriction which defined innovation as “an individual or unit adopts a of protection subject. In other words, any subject in Taiwan, new concept, object or technology” [9]. This theory is used whether individuals or groups, could be protected by PIPA; to explain and predict the decision or adoption of 3) Strengthen the Code of Conduct: PIPA defines special innovative things in the organization or community [10]. personal information and specifies the restriction. If data Rogers proposed that an innovation includes 5 intrinsic leakage happens, organization should notify spontaneously factors which influence the decision of adoption. These the parties at first time. Also organization should obtain the factors are: written consent of the parties if the personal information is used in additional purpose. Whether obtaining personal 1) Relative advantage: According to the comparison of the innovation and previous generation, the innovation owns information directly or indirectly, organization has the the advantage; obligation to notify the parties before use; 4) Promote public participation: PIPA formulates “class 2) Complexity: Whether the innovation could be easily action” mechanism so that victims could entrust foundation assimilated or not; or corporation by written authorization for litigation to 3) Compatibility: Whether the innovation could match with perform relative action; previous generation or not; 5) Improve liability connotation: The compensation and penalties of data leakage are increased more than the old 4) Trialability: Whether the innovation could be easily PIPA. In addition, PIPA includes the reverse burden of experimented or not; proof which specifies that unintended data leakage should 5) Observability: Whether the innovation could be easily be provided by the organization; observed, discussed, and represented or not [11,12]. 6) Upgrade administrative supervision: The central or municipal government owns administrative competence, such as inspection, sanction, penalties and so on, to 2.4 Technology-Organization-Environment Framework supervise different kinds of industries to draft relevant Tornatzky and Fleischer proposed the TOE framework in plans and specification [7]. 1990, and defined 3 characteristics of innovation adoption [13,14]. The characteristics are: 2.2 BS 10012 Certification 1) Technology: The level of technology owned by the BSI released the BS 10012 certification in May, 2009. The organization, such as the ability of the IT department, the full name of BS 10012 certification is “Data protection - stability of information system, and the fluency of Specification for a personal information management operation and so on [15]; system”, and it provides a specific PIMS to assist 2) Organization: The intrinsic characteristics of the organizations with constructing a perfect protection organization, such as the size of the organization, the extent mechanism. As developed by experts in various fields, it of professionalizing, and the quantity of available resource could be suitable for any institutions and therefore, it is and so on [16]; famous and popular all over the world [8]. BS 10012 certification has 7 chapters. 0 to 2 chapters are standard 3) Environment: The overall surroundings of the description, nouns definition, and scope, while chapter 3 to organization including the parties such as competitors, 6 illustrates PIMS following PDCA mechanism explained suppliers, government, and so on [17]. as follows: 1) Plan: How to plan the PIMS, formulate the policy, and 3 Research Methodology allocate the authority in detail; 2) Do: This is the critical part in BS 10012 certification 3.1 Research Model whish states how to implement and operate the PIMS, such as responsibility assignment, risk assessment, assets According to the literature review, this proposed model measurement and so on; refers to the TOE framework and the innovation characteristics of the diffusion of innovation theory. It 3) Check: How to control and review the PIMS, audit the summarized 6 critical factors on 3 characteristics which implementation and effectiveness, and monitor the process could influence educational institution about the adoption by supervisors; of BS 10012 certification. The proposed model is shown in 4) Act: How to improve the PIMS in order to prevent the Figure 1. incident of data leakage, and keep the PIMS in the up-to- date situation [5]. International Journal of Network Security, Vol.16, No.3, PP.161-167, May 2014 163 H4. Information security awareness could promote more willingness of BS 10012 certification adoption for educational institution. 3.2.3 PIMS Characteristic Rogers pointed out that the relative advantage of the innovation could facilitate the adoption [30,31]. As BSI Figure 1: Research model points out that BS 10012 certification could contribute 6 advantages: the confirmation of risk control, the 3.2 Research hypotheses accomplishment of PIPA clause, the promotion of competitive advantage, the implementation of the PIMS, the commitment of top management, and the
Recommended publications
  • Page 1 PROGRAM (Finalized Version) DAY 1 (July 7Th, 2016
    PROGRAM (Finalized Version) DAY 1 (July 7th, 2016) DAY 2 (July 8th, 2016) Registration 8: Registration 9:00-10:30 Sessions A1, B1 9:00-10:15 Sessions A2, B2, C2 9:00-10:15 Session C1 (Days 1 10:30-10:50 Opening Address* & Tea reception 10:15-10:35 Tea break 10:50-11:50 Sessions D1, E1, F1, Poster 1 10:35-11:50 Sessions D2, E2, F2 - 3 2) 11:50-13:00 Lunch (Restaurant on 2/F) 11:50-13:00 Lunch (Restaurant on 2/F) 0 - 16: 13:00-15:15 Sessions G1, H1, J1 13:00-15:15 Sessions G2, H2, J2 00 15:15-15:35 Tea break 15:15-15:35 Tea break 15:35-17:45 Sessions K1, L1, M1 15:35-17:15 Sessions K2, L2 * Opening Address: Associate Professor Dr. Tanida Phatisena, Director of Research and Development Institute, Nakhon Ratchasima Rajabhat University, Thailand (venue: Kujyaku, 2/F). Session A1: INTERNATIONAL TRADE & FINANCE (venue: Kaede, 2/F) Chair: Grzegorz Mazur (Poznan University of Economics and Business) The Impact of NAFTA on the Trade with Non-member Countries: the Case of Canadian Chinese Trade (s16-060) *Best Paper Award* Speaker: Ying Kong (York University, Canada & Tsinghua University, China) The Impact of Financial and Trade Integration on Business Cycles in Emerging Markets (s16-093) Speaker: Lathaporn Ratanavararak (Chulalongkorn University) The Process of Banking Expansion in Asian Developing Countries: The Case of Nepal in Comparison with Japan (s16-114) Speaker: Shinichiro Maeda (Meijo University) Effects of Foreign Direct Investment on GDP Growth of Myanmar: Analysis for the Year of 1989-2014 (s16-170) Speaker: Ei Ei Phyu (Thammasat University)
    [Show full text]
  • White Page Construction from Web Pages for Finding People on the Internet
    Computational Linguistics and Chinese Language Processing 75 vol. 3, no. 1, February 1998, pp. 75-100 ­Computational Linguistics Society of R.O.C. White Page Construction from Web Pages for Finding People on the Internet Hsin-Hsi Chen* and Guo-Wei Bian* Abstract This paper proposes a method to extract proper names and their associated information from web pages for Internet/Intranet users automatically. The information extracted from World Wide Web documents includes proper nouns, E-mail addresses and home page URLs. Natural language processing techniques are employed to identify and classify proper nouns, which are usually unknown words. The information (i.e., home pages' URLs or e-mail addresses) for those proper nouns appearing in the anchor parts can be easily extracted using the associated anchor tags. For those proper nouns in the non-anchor part of a web page, different kinds of clues, such as the spelling method, adjacency principle and HTML tags, are used to relate proper nouns to their corresponding E-mail addresses and/or URLs. Based on the semantics of content and HTML tags, the extracted information is more accurate than the results obtained using traditional search engines. The results can be used to con- struct white pages for Internet/Intranet users or to build databases for finding people and organizations on the Internet. Such searching services are very useful for human communication and dissemination of information. Keywords: proper name identification, information extraction, white pages, World Wide Web 1. Introduction With the rapid growth of the Internet in recent years, the World Wide Web (WWW) has become a powerful medium for human communication and dissemination of information.
    [Show full text]
  • Hapter 5. Other University Facilities
    Chapter Visa, ARC, and 4. Work Permit Information (2) Filing procedure: Must be processed in person (online filing or QR code filing not hapter permitted) 5. Other University Facilities (3) Fill out the required form: Forms can be obtained at the Taipei National Tax Administration Office, Foreign Taxpayers Section (see address below) 5.1. Sports Facilities (4) Submit supporting documents: income tax withholding statement, original passport, original Alien Resident Certificate, student ID. Sat.~ Sun. & Place Mon.~Fri. Notes Holidays (5) Where to file: If your ARC was issued in Taipei City, you can go to the first floor of the Taipei National Tax Administration, where you will find the Foreign Taxpayers Section. The Tennis Courts 08:30~18:00 09:00~18:00 address is No. 2 Jhonghua Road, Sec. 1, Taipei. Badminton 08:30~18:00 09:00~16:00 If your ARC was not issued in Taipei City, you must go to the National Tax Administration indoor Courts office for the city or county where the ARC was issued. 1. The facilities will be closed Table Tennis/ 10. Q: If the tax withheld is more than the tax owed, how do I apply for a refund? 08:30~18:00 closed during P.E. classes and Billiards the practice of the school A: If the income recipient exceeds 183 days of residence during the tax year, this may result in teams. the amount of tax withheld exceeding the amount of tax owed. When the recipient files their Fitness/Gym Regular semesters: closed 2. If the facilities are closed income tax forms in May of the following year, the tax calculation may show that a refund is for other purposes, official due.
    [Show full text]
  • Increasing the Lifetime of Ad Hoc Networks Using Hierarchical Cluster-Based Power Management
    KSII TRANSACTIONS ON INTERNET AND INFORMATION SYSTEMS VOL. 5, NO. 1, January 2011 5 Copyright ⓒ 2011 KSII Increasing the Lifetime of Ad Hoc Networks Using Hierarchical Cluster-based Power Management Tin-Yu Wu1, Kai-Hua Kuo1, Hua-Pu Cheng1, Jen-Wen Ding2 and Wei-Tsong Lee3 1 Department of Electrical Engineering, Tamkang University Taipei county, 25137 - Taiwan, R.O.C. [e-mail: [email protected], [email protected], [email protected]] 2 Department of Information Management, National Kaohsiung University of Applied Sciences Kaohsiung City, 807 - Taiwan, R.O.C. [e-mail: [email protected]] 3 Department of Electrical Engineering, Tamkang University Taipei county, 25137 - Taiwan, R.O.C. [e-mail: [email protected]] *Corresponding author: Tin-Yu Wu Received September 9, 2010; revised October 25, 2010; accepted November 2, 2010; published January 31, 2011 Abstract One inevitable problem in Ad Hoc networks is the limited battery capacity, which explains why portable devices might shut down suddenly when the power of hardware is depleted. Hence, how to decrease the power consumption is an important issue in ad hoc networks. With the development of wireless technology, mobile devices can transmit voices, surf the Internet, download entertaining stuffs, and even support some P2P applications, like sharing real-time streaming. In order to keep the quality stable, the transmission must be continuous and it is thus necessary to select some managers to coordinate all nodes in a P2P community. In addition to assigning jobs to the staffs (children) when needed, these managers (ancestors) are able to reappoint jobs in advance when employees retire.
    [Show full text]
  • National Taiwan Normal University Strategic Plan for 2010-2014
    National Taiwan Normal University Strategic Plan for 2010 -2014 August, 2010 Approved, the 129 th Meeting of Committee for NTNU University Affairs Research and Development, 2 June 2010. Approved, the 104 th Meeting of University Affairs, 23 June 2010. NTNU Strategic Plan Aug.2010 National Taiwan Normal University Roadmap of Strategic Plan 2010-2014 Goal: A comprehensive university modeled on the spirit of being teachers’ teachers, standing out with the integrated development in humanities, arts, and science. Mission: NTNU is a comprehensive university built on the core values of sincerity, integrity, diligence, and modesty. It is our deep belief that knowledge and educat ion are conducive to the wellbeing of mankind. We are also committed to meet the needs for the nation’s development and to serve the society. We are dedicated to knowledge innovation and holistic education in a comprehensive and diverse learning and research environment for science, education, art, and culture. Vision: Cultivating future leaders with a holistic approach and multi-disciplinary competence A distinguished university celebrating diverse academic values An exemplar in university education innovations A stronghold to nurture future academic and research talents Focus 1: Promote holistic education education holistic Promote Focus 1: competitiveness better for education interdisciplinary Foster Focus 2: and character quality of teachers professional Nurture Focus 3: professionalism spur to mechanism incentive and feedback, evaluation, performance Implement
    [Show full text]
  • July 8Th, 2016)
    PROGRAM (First Version) DAY 1 (July 7th, 2016) DAY 2 (July 8th, 2016) Registration 8: Registration 9:00-10:30 Session A1, B1 9:00-10:15 Sessions A2, B2, C2, Poster 2 9:00-10:15 Session C1 (Day 10:30-10:50 Opening Address* & Tea reception 10:15-10:35 Tea break s 10:50-11:50 D1, E1, F1, Poster 1 10:35-11:50 Sessions D2, E2, F2 1 - 3 2 11:50-13:00 Lunch (Restaurant on 2/F) 11:50-13:00 Lunch (Restaurant on 2/F) 0 ) - 16: 13:00-15:15 Sessions G1, H1, J1 13:00-15:15 Sessions G2, H2, J2 00 15:15-15:35 Tea break 15:15-15:35 Tea break 15:35-17:45 Sessions K1, L1, M1 15:35-17:45 T.B.A. * Opening Address: Associate Professor Dr. Tanida Phatisena, Director of Research and Development Institute, Nakhon Rajasima Rajabhat University, Thailand (venue: Kujyaku, 2/F). Session A1: INTERNATIONAL TRADE & FINANCE (venue: Kaede, 2/F) Chair: Grzegorz Mazur (Poznan University of Economics and Business) The Impact of NAFTA on the Trade with Non-member Countries: the Case of Canadian Chinese Trade (s16-060) Speaker: Ying Kong (York University, Canada & Tsinghua University, China) The Impact of Financial and Trade Integration on Business Cycles in Emerging Markets (s16-093) Speaker: Lathaporn Ratanavararak (Chulalongkorn University) The Process of Banking Expansion in Asian Developing Countries: The Case of Nepal in Comparison with Japan (s16-114) Speaker: Shinichiro Maeda (Meijo University) Effects of Foreign Direct Investment on GDP Growth of Myanmar: Analysis for the Year of 1989-2014 (s16-170) Speaker: Ei Ei Phyu (Thammasat University) The European Union – Japan
    [Show full text]
  • Event Report
    EVENT REPORT EVENT REPORT IEEE CIS Summer School, Kaohsiung, Taiwan, Aug. 21-24, 2018. 2018, Copyright Reserved, IEEE. 1 EVENT REPORT IEEE CIS Summer School, Kaohsiung, Taiwan, Aug. 21-24, 2018. 2018, Copyright Reserved, IEEE. 2 EVENT REPORT Table of Contents Objectives ...................................................................................................................................4 Message from General Chair ......................................................................................................5 Organizers ..................................................................................................................................6 Organization ...............................................................................................................................7 Program ......................................................................................................................................8 Plenary Talk 1 ............................................................................................................................9 Plenary Talk 2a: Industry 3.5” Disruptive Innovations via Artificial Intelligence and Big Data Analytics to Empower Intelligent Manufacturing..................................................................... 10 Plenary Talk 2b: Deep Learning and Medical Image Analysis ................................................. 12 Lecture 1: Trend of AI in IoT ..................................................................................................
    [Show full text]
  • CHIH-CHING EMILY YANG (楊智晶) Education Area of Specialty
    CHIH-CHING EMILY YANG (楊智晶) Department of Leisure, Recreation, and Tourism Management Southern Taiwan University of Science TEL: 886-6-2533131 ext.2500 and Technology FAX: 886-6-2537114 No. 1, Nan-Tai Street, Yongkang Dist., EMAIL: Tainan 71005, Taiwan [email protected] Education ■ M.L.S., Master of Library and Information Science, Dominican University, U.S.A.,1989/01 ■ BA, Department of Library and Material Science, Shih Hsin University, Taiwan, 1984/06 Area of Specialty Library and Information Science, Information Management, Conference and Convention Management , Advanced Internet Applications Academic Experience ■ Associate Professor, Department of leisure, recreation, and management, Southern Taiwan University of Science and Technology, 1993/08/01 to Present. ■ Library Director, Southern Taiwan University of Science and Technology Library , 1993/08/01 to Present. ■ Instructor, Department of Library and Material Science, Shih Hsin University, 1990/09/25 ~1993/07/31 Working Experience ■ Assistant Researcher, Computer Center, National Central Library , Taipei, Taiwan, 1990/09/25 ~1993/07/31 ■ Assistant Librarian , Technologic Department, Library of the School of the Art Institute of Chicago, U.S.A., 1989/01~1990/09/24. ■ Cataloging Assistant, Library, Dominican University, U.S.A., 1988/05~1989/12 ■ Computer Center T.A., Computer Center, Dominican University, U.S.A., 1988/09~1989/12 ■ Employee continue education trainer, M & M Chocolate Company, U.S.A., 1989/01~1989/12 Curriculum Vitae, Chih-Ching Emily Yang, 1/23 Awards ■. The Ministry of Education of Appreciation, for helping public libraries in Taiwan in promoting the "Reading and space transformation: 2013- 2016 years of innovative services Library Development Plan", 2014/12/07.
    [Show full text]
  • Curriculum Vitae
    Curriculum Vitae Pao-Ann Hsiung April 22, 2020 Contents 1 Short Biography 1 2 Personal Information 2 3 Education 2 4 Professional Memberships 2 5 Professional Listings 3 6 Employment 4 7 Courses Taught 5 8 Research Interests 5 9 Honors and Awards 6 10 Publication List 8 (A) International Journal Papers . 8 (B) Books and Chapters . 13 (C) International Conference Papers . 14 (D) Local Conference Papers . 28 (E) Technical Reports and Others . 31 11 Tool and Software Developments 33 12 Invited Tutorials and Short Courses 34 13 Invited Talks 35 14 Journal Editorships 39 14.1 Editorial Board Member of several journals . 39 14.2 Guest Editing Journal Special Issues . 40 15 Conference Program Committee Member 41 16 Conference Organization and Chairing 54 17 Students Advised 57 17.1 Doctoral Students . 57 17.2 Master Students . 58 18 Research Grants 66 18.1 Research Project Grants . 66 18.2 Construction Project Grants . 68 18.3 Educational Reform Project Grants . 68 i 18.4 Workshop Organization Grant . 69 18.5 Travel Grants . 69 18.6 Speaker Grants . 70 19 Paper Refereeing 70 19.1 International Conferences . 70 19.2 International Journals . 71 ii 1 Short Biography Pao-Ann Hsiung, Ph.D., received his B.S. in Mathematics and his Ph.D. in Electrical Engineering from the National Taiwan University, Taipei, Taiwan, ROC, in 1991 and 1996, respectively. From 1996 to 2000, he was a post-doctoral researcher at the Institute of Information Science, Academia Sinica, Taipei, Taiwan, ROC. From February 2001 to July 2002, he was an assistant professor and from August 2002 to July 2007 he was an associate professor in the Department of Computer Science and Information Engineering, National Chung Cheng University, Chiayi, Taiwan, ROC.
    [Show full text]
  • 2020 IEEE CIS Online Summer School on Computational Intelligence for Human and Robot Co-Learning
    - Report - 2020 IEEE CIS Online Summer School on Computational Intelligence for Human and Robot Co-learning Aug. 21-23, 2020 Tokyo Metropolitan University, Tokyo, Japan Taiwan AI Academy, Taiwan 2020 IEEE CIS Online Summer School on Computational Intelligence for Human and Robot Co-learning Aug. 21-23, 2020 Tokyo Metropolitan University, Tokyo, Japan Taiwan AI Academy, Taiwan Learning has become a very popular approach for cybernetics systems. This topic has always been considered a research in the Computational Intelligence (CI) area. With the recent success of AlphaGo, there has been a lot of interest among students and professionals to apply machine learning to gaming and in particular to the game of Go. Several conferences have held competitions human vs. computer programs or computer programs against each other. While computer programs are already better than humans (even high level professionals), machine learning still offers interesting prospects, both from the fundamental points of view (1) to even further the limits of game playing (having programs playing against each other), (2) to better understand machine intelligence and compare it to human intelligence, and from the practical point of view of enhancing the human playing experience by coaching professionals to play better or training beginners. Hence, in 2018 and 2019, we proposed a summer school on “Computational Intelligence for Human and Robot Co-learning” in Taiwan. In addition, we also set up an AI-FML International Academy (https://sites.google.com/asap.nutn.edu.tw/ai-fml-international-academy/home) in 2020, including the IEEE CIS members from Japan, Canada, Taiwan, Italy, Spain and UK.
    [Show full text]
  • The Integration of Information Technology in Music Teacher Education and School Music Education in Taiwan: a Conceptual Framework
    The integration of information technology in music teacher education and school music education in Taiwan Hung Pai Chen B. Ed., M. Ed. School of Education RMIT University December 2012 Declaration I certify that except where due acknowledgement has Been made, the work is that of the author alone; the work has not Been suBmitted previously, in whole or in part, to qualify for any other academic award; the content of the thesis is the result of work which has Been carried out since the official commencement date of the approved research program; any editorial work, paid or unpaid, carried out By a third party is acknowledged; and, ethics procedures and guidelines have Been followed. Hung Pai Chen 18/12/2012 ii Acknowledgement I would like to present my deep thanks to those who have helped me during the journey of my PhD study. Without their help, the completion of this research would not Be possiBle. Firstly, great thanks to my supervisor, Professor David Forrest. During the years of my doctoral study he has given me not only advice on my research work But also care in various aspects of my overseas years. His kindness has opened up my views and found the new possiBilities for my academic life. He has always Been thoughtful and considerate in helping me in my study. I owe a great deal to him and could not find the words to express my gratitude. I would like to thank another important mentor in helping my research work, Emeritus Professor Martin Comte, who has always offered valuable advice on my writing and learning in English, while providing insightful suggestions on my study.
    [Show full text]