• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • 6542
  • 1926
  • 919
  • 814
  • 686
  • 370
  • 179
  • 161
  • 154
  • 105
  • 93
  • 81
  • 79
  • 76
  • 76
  • Tagged with
  • 14798
  • 2965
  • 2025
  • 1872
  • 1447
  • 1375
  • 1343
  • 1298
  • 1259
  • 1163
  • 1153
  • 1145
  • 1073
  • 1030
  • 948
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
271

Moderators of the relationship between job insecurity and its consequences: a meta-analysis.

January 2004 (has links)
Cheng Hak Land Grand. / Thesis (M.Phil.)--Chinese University of Hong Kong, 2004. / Includes bibliographical references (leaves 36-58). / Abstracts in English and Chinese. / Chapter CHAPTER 1. --- INTRODUCTION --- p.1 / Review on Job Insecurity --- p.1 / Type of Sector as a Moderator --- p.4 / Career Stage as a Moderator --- p.5 / Organizational Tenure --- p.6 / Age --- p.7 / Gender as a Moderator --- p.8 / The Present Study --- p.9 / Chapter CHAPTER 2. --- METHOD --- p.11 / "Literature Search, Inclusion Criteria and Coding Procedure" --- p.11 / Meta-analytic Procedures --- p.14 / Chapter CHAPTER 3. --- RESULTS --- p.17 / Table 1 --- p.18 / Moderating Effects of the Relationship between Job Insecurity and Its Consequences --- p.19 / Type of Sector --- p.19 / Table 2 --- p.20 / Table 3 --- p.21 / Organizational Tenure --- p.22 / Table 4 --- p.23 / Age --- p.24 / Table 5 --- p.25 / Gender --- p.26 / Table 6 --- p.27 / Chapter CHAPTER 4. --- DISCUSSION --- p.28 / The Moderating Effect of Type of Sector --- p.28 / The Moderating Effect of Organizational Tenure --- p.29 / The Moderating Effect of Age --- p.30 / The Moderating Effect of Gender --- p.31 / Applied Implications --- p.31 / Limitations and Further Studies --- p.33 / Concluding Remarks --- p.34 / REFERENCES --- p.36
272

Spontaneous anonymous group cryptography. / CUHK electronic theses & dissertations collection

January 2004 (has links)
Liu Kai-Sui. / "May 2004." / Thesis (Ph.D.)--Chinese University of Hong Kong, 2004. / Includes bibliographical references (p. 107-116). / Electronic reproduction. Hong Kong : Chinese University of Hong Kong, [2012] System requirements: Adobe Acrobat Reader. Available via World Wide Web. / Mode of access: World Wide Web. / Abstracts in English and Chinese.
273

A new approach for improving transparency of audio watermarking.

January 2003 (has links)
Chen Benrong. / Thesis (M.Phil.)--Chinese University of Hong Kong, 2003. / Includes bibliographical references (leaves 125-130). / Abstracts in English and Chinese. / Chapter 1 --- Introduction --- p.1 / Chapter 1.1 --- What' s Watermarking --- p.1 / Chapter 1.2 --- "Information Hiding, Steganography, and Watermarking" --- p.3 / Chapter 1.3 --- History of Watermarking --- p.5 / Chapter 1.4 --- Importance of Digital Watermarking --- p.8 / Chapter 1.5 --- Objectives of the Thesis --- p.9 / Chapter 1.6 --- Thesis Outline --- p.10 / Chapter 2 --- Applications and Properties of Audio Watermarking --- p.12 / Chapter 2.1 --- Applications --- p.13 / Chapter 2.1.1 --- Ownership Identification and Proof --- p.13 / Chapter 2.1.2 --- Broadcast Monitoring --- p.16 / Chapter 2.1.3 --- Other Applications --- p.18 / Chapter 2.2 --- Properties --- p.19 / Chapter 2.2.1 --- Transparency --- p.20 / Chapter 2.2.2 --- Robustness --- p.20 / Chapter 2.2.3 --- Other Properties --- p.21 / Chapter 3 --- Possible Methods for Audio Watermarking --- p.24 / Chapter 3.1 --- Overview of Digital Audio Watermarking System --- p.25 / Chapter 3.2 --- Review of Current Methods --- p.27 / Chapter 3.2.1 --- Low Bit Coding --- p.27 / Chapter 3.2.2 --- Phase Coding --- p.28 / Chapter 3.2.3 --- Echo Coding --- p.29 / Chapter 3.2.4 --- Spread Spectrum Watermarking --- p.30 / Chapter 3.3 --- Other Related Approaches --- p.31 / Chapter 3.4 --- Outline of Proposed New Method --- p.33 / Chapter 4 --- Audio Watermarking System Based on Spread Spectrum --- p.36 / Chapter 4.1 --- Introduction --- p.36 / Chapter 4.2 --- Embedding and Detecting Information Bit --- p.39 / Chapter 4.2.1 --- General Embedding Process --- p.39 / Chapter 4.2.2 --- General Detection Process --- p.43 / Chapter 4.2.3 --- Pseudorandom Bit Sequences (PRBS) --- p.45 / Chapter 4.3 --- An Optimal Embedding Process --- p.48 / Chapter 4.3.1 --- Objective Metrics for Embedding Process --- p.48 / Chapter 4.3.2 --- Content Adaptive Embedding --- p.52 / Chapter 4.3.3 --- Determination of Frame Length L --- p.57 / Chapter 4.4 --- Requirement For Transparency Improvement --- p.58 / Chapter 5 --- Sample and Frame Selection For Transparency Improvement --- p.60 / Chapter 5.1 --- Introduction --- p.60 / Chapter 5.2 --- Sample Selection --- p.61 / Chapter 5.2.1 --- General Sample Selection --- p.62 / Chapter 5.2.2 --- Objective Evaluation Metrics --- p.65 / Chapter 5.2.3 --- Sample Selection For Transparency Improvement --- p.66 / Chapter 5.2.4 --- Theoretical Analysis of Sample Selection --- p.87 / Chapter 5.3 --- Frame Sclcction --- p.90 / Chapter 5.3.1 --- General Frame Selection --- p.91 / Chapter 5.3.2 --- Frame Selection For Transparency Improvement --- p.94 / Chapter 5.4 --- Watermark Information Retrieve --- p.103 / Chapter 6 --- Psychoacoustic Model For Robustness Verification --- p.105 / Chapter 6.1 --- Introduction of Human Auditory System --- p.106 / Chapter 6.1.1 --- Absolute Hearing Threshold --- p.106 / Chapter 6.1.2 --- Critical Bands --- p.108 / Chapter 6.1.3 --- Masking Effect --- p.111 / Chapter 6.2 --- Psychoacoustic Model of Human Auditory System --- p.112 / Chapter 6.3 --- Robustness Verification by Psychoacoustic Model Analysis --- p.117 / Chapter 7 --- Conclusions and Suggestions For Future Research --- p.121 / Chapter 7.1 --- Conclusions --- p.121 / Chapter 7.2 --- Suggestions For Future Research --- p.123 / Bibliography --- p.125
274

Stability and Security of ZlomekFS / Stability and Security of ZlomekFS

Záloha, Jan January 2012 (has links)
- english version ZlomekFS is a distributed filesystem which is able to share data among nodes. These nodes can cooperate in various modes. Modes differ in caching of local data at the client side and in the way how data is synchronized between the client and the server. This synchronization has been implemented by an unsecured and untrusted network connection until now. The current implementation uses FUSE interface for the communication between the kernel of the filesystem and the user. The synchronization is triggered when the user performs a specific operation above the filesystem. For well functionality in modern network environment it is necessary to both communicating partners to be sure about the identity of the second end of a communicating channel. This thesis implements trustworthy connection between the server and the client part of filesystem. In addition, it separates machine and user type of client. Next important part of the thesis is correct data synchronization and precise definition of sharing semantics.
275

The institutionalisation of an information security culture in a petroleum organisation in the Western Cape

Michiel, Michael January 2018 (has links)
Thesis (MTech (Information Technology))--Cape Peninsula University of Technology, 2018. / In today’s world, organisations cannot exist without having information readily available. The protection of information relies not only on technology but also on the behaviour of employees. The failure to institutionalise an information security culture inside an organisation will cause the continued occurrence of security breaches. The aim of the research is to explore how an information security culture can be institutionalised within a petroleum organisation in the Western Cape. The primary research question is posed as follows: “What are the factors affecting the institutionalisation of an information security culture?” To answer the research question, a study was conducted at a petroleum organisation in the Western Cape. A subjectivist ontological and interpretivist epistemological stance has been adopted and an inductive research approach was followed. The research strategy was a case study. Data for this study were gathered through interviews (12 in total) using semi-structured questionnaires. The data collected were transcribed, summarised, and categorised to provide a clear understanding of the data. For this study, twenty-four findings and seven themes were identified. The themes are: i) user awareness training and education; ii) user management; iii) compliance and monitoring; iv) change management; v) process simplification; vi) communication strategy; and vii) top management support. Guidelines are proposed, comprising four primary components. Ethical clearance to conduct the study was obtained from the Ethics committee of CPUT and permission to conduct the study was obtained from the Chief Information Officer (CIO) of the petroleum organisation. The findings point to collaboration between employees, the Information Security department, and management in order to institute a culture of security inside the organisation.
276

Privacy preserving data publishing: an expected gain model with negative association immunity. / CUHK electronic theses & dissertations collection

January 2012 (has links)
隱私保護是許多應用(特別是和人們有關的)要面對的重要問題。在隱私保護數據發布之研究中,我們探討如何在個人隱私不會被侵犯之情況下發布一個包含個人資料之數據庫,而此數據庫仍包含有用的信息以供研究或其他數據分析之用。 / 本論文著重於隱私保護數據發布之隱私模型及算法。我們首先提出一個預期收益模型,以確認發布一個數據庫會否侵犯個人隱私。預期收益模型符合我們在本論文中提出的六個關於量化私人信息之公理,而第六條公理還會以社會心理學之角度考慮人為因素。而且,這模型考慮敵意信息收集人在發布數據庫之中所得到的好處。所以這模型切實反映出敵意信息收集人利用這些好處而獲得利益,而其他隱私模型並沒有考慮這點。然後,我們還提出了一個算法來生成符合預期收益模型之發布數據庫。我們亦進行了一些包含現實數據庫之實驗來表示出這算法是現實可行的。在那之後,我們提出了一個敏感值抑制算法,使發布數據庫能對負向關聯免疫,而負向關聯是前景/背景知識攻擊之一種。我們亦進行了一些實驗來表示出我們只需要抑制平均數個百份比之敏感值就可以令一個發佈數據庫對負向關聯免疫。最後,我們探討在分散環境之下之隱私保護數據發布,這代表有兩個或以上的數據庫持有人分別生成不同但有關之發布數據庫。我們提出一個在分散環境下可用的相異L多樣性的隱私模型和一個算法來生成符合此模型之發布數據庫。我們亦進行了一些實驗來表示出這算法是現實可行的。 / Privacy preserving is an important issue in many applications, especially for the applications that involve human. In privacy preserving data publishing (PPDP), we study how to publish a database, which contains data records of some individuals, so that the privacy of the individuals is preserved while the published database still contains useful information for research or data analysis. / This thesis focuses on privacy models and algorithms in PPDP. We first propose an expected gain model to define whether privacy is preserved for publishing a database. The expected gain model satisfies the six axioms in quantifying private information proposed in this thesis, where the sixth axiom considers human factors in the view of social psychology. In addition, it considers the amount of advantage gained by an adversary by exploiting the private information deduced from a published database. Hence, the model reflects the reality that the adversary uses such an advantage to earn a profit, which is not conisidered by other existing privacy models. Then, we propose an algorithm to generate published databases that satisfy the expected gain model. Experiments on real datasets are conducted to show that the proposed algorithm is feasible to real applications. After that, we propose a value suppression framework to make the published databases immune to negative association, which is a kind of background / foreground knowledge attacks. Experiments are conducted to show that negative association immunity can be achieved by suppressing only a few percent of sensitive values on average. Finally, we investigate PPDP in a non-centralized environment, in which two or more data holders generate their own different but related published databases. We propose a non-centralized distinct l-diversity requirement as the privacy model and an algorithm to generate published databases for this requirement. Experiments are conducted to show that the proposed algorithm is feasible to real applications. / Detailed summary in vernacular field only. / Detailed summary in vernacular field only. / Cheong, Chi Hong. / Thesis (Ph.D.)--Chinese University of Hong Kong, 2012. / Includes bibliographical references (leaves 186-193). / Electronic reproduction. Hong Kong : Chinese University of Hong Kong, [2012] System requirements: Adobe Acrobat Reader. Available via World Wide Web. / Abstract also in Chinese. / Abstract --- p.i / Acknowledgement --- p.iv / Chapter 1 --- Introduction --- p.1 / Chapter 1.1 --- Background --- p.1 / Chapter 1.2 --- Thesis Contributions and Organization --- p.2 / Chapter 1.3 --- Other Related Areas --- p.5 / Chapter 1.3.1 --- Privacy Preserving Data Mining --- p.5 / Chapter 1.3.2 --- Partition-Based Approach vs. Differential Privacy Approach --- p.5 / Chapter 2 --- Expected Gain Model --- p.7 / Chapter 2.1 --- Introduction --- p.8 / Chapter 2.1.1 --- Background and Motivation --- p.8 / Chapter 2.1.2 --- Contributions --- p.11 / Chapter 2.2 --- Table Models --- p.12 / Chapter 2.2.1 --- Private Table --- p.12 / Chapter 2.2.2 --- Published Table --- p.13 / Chapter 2.3 --- Private Information Model --- p.14 / Chapter 2.3.1 --- Proposition --- p.14 / Chapter 2.3.2 --- Private Information and Private Probability --- p.15 / Chapter 2.3.3 --- Public Information and Public Probability --- p.18 / Chapter 2.3.4 --- Axioms in Quantifying Private Information --- p.20 / Chapter 2.4 --- Quantifying Private Information --- p.34 / Chapter 2.4.1 --- Expected Gain of a Fair Guessing Game --- p.34 / Chapter 2.4.2 --- Analysis --- p.41 / Chapter 2.5 --- Tuning the Importance of Opposite Information --- p.48 / Chapter 2.6 --- Conclusions --- p.53 / Chapter 3 --- Generalized Expected Gain Model --- p.56 / Chapter 3.1 --- Introduction --- p.58 / Chapter 3.2 --- Table Models --- p.60 / Chapter 3.2.1 --- Private Table --- p.62 / Chapter 3.2.2 --- Published Table --- p.62 / Chapter 3.3 --- Expected Gain Model --- p.63 / Chapter 3.3.1 --- Random Variable and Probability Distribution --- p.64 / Chapter 3.3.2 --- Public Information --- p.64 / Chapter 3.3.3 --- Private Information --- p.65 / Chapter 3.3.4 --- Expected Gain Model --- p.66 / Chapter 3.4 --- Generalization Algorithm --- p.75 / Chapter 3.4.1 --- Generalization Property and Subset Property --- p.75 / Chapter 3.4.2 --- Modified Version of Incognito --- p.78 / Chapter 3.5 --- Related Work --- p.80 / Chapter 3.5.1 --- k-Anonymity --- p.80 / Chapter 3.5.2 --- l-Diversity --- p.81 / Chapter 3.5.3 --- Confidence Bounding --- p.83 / Chapter 3.5.4 --- t-Closeness --- p.84 / Chapter 3.6 --- Experiments --- p.85 / Chapter 3.6.1 --- Experiment Set 1: Average/Max/Min Expected Gain --- p.85 / Chapter 3.6.2 --- Experiment Set 2: Expected Gain Distribution --- p.90 / Chapter 3.6.3 --- Experiment Set 3: Modified Version of Incognito --- p.95 / Chapter 3.7 --- Conclusions --- p.99 / Chapter 4 --- Negative Association Immunity --- p.100 / Chapter 4.1 --- Introduction --- p.100 / Chapter 4.2 --- Related Work --- p.104 / Chapter 4.3 --- Negative Association Immunity and Value Suppression --- p.107 / Chapter 4.3.1 --- Negative Association --- p.108 / Chapter 4.3.2 --- Negative Association Immunity --- p.111 / Chapter 4.3.3 --- Achieving Negative Association Immunity by Value Suppression --- p.114 / Chapter 4.4 --- Local Search Algorithm --- p.123 / Chapter 4.5 --- Experiments --- p.125 / Chapter 4.5.1 --- Settings --- p.125 / Chapter 4.5.2 --- Results and Discussions --- p.128 / Chapter 4.6 --- Conclusions --- p.129 / Chapter 5 --- Non-Centralized Distinct l-Diversity --- p.130 / Chapter 5.1 --- Introduction --- p.130 / Chapter 5.2 --- Related Work --- p.138 / Chapter 5.3 --- Table Models --- p.140 / Chapter 5.3.1 --- Private Tables --- p.140 / Chapter 5.3.2 --- Published Tables --- p.141 / Chapter 5.4 --- Private Information Deduced from Multiple Published Tables --- p.143 / Chapter 5.4.1 --- Private Information Deduced by Simple Counting on Each Published Tables --- p.143 / Chapter 5.4.2 --- Private Information Deduced from Multiple Published Tables --- p.145 / Chapter 5.4.3 --- Probabilistic Table --- p.156 / Chapter 5.5 --- Non-Centralized Distinct l-Diversity and Algorithm --- p.158 / Chapter 5.5.1 --- Non-centralized Distinct l-diversity --- p.159 / Chapter 5.5.2 --- Algorithm --- p.165 / Chapter 5.5.3 --- Theorems --- p.171 / Chapter 5.6 --- Experiments --- p.174 / Chapter 5.6.1 --- Settings --- p.174 / Chapter 5.6.2 --- Metrics --- p.176 / Chapter 5.6.3 --- Results and Discussions --- p.179 / Chapter 5.7 --- Conclusions --- p.181 / Chapter 6 --- Conclusions --- p.183 / Bibliography --- p.186
277

The global vulnerability discovery and disclosure system : a thematic system dynamics approach

Lewis, Paul Simon January 2017 (has links)
Vulnerabilities within software are the fundamental issue that provide both the means, and opportunity for malicious threat actors to compromise critical IT systems (Younis et al., 2016). Consequentially, the reduction of vulnerabilities within software should be of paramount importance, however, it is argued that software development practitioners have historically failed in reducing the risks associated with software vulnerabilities. This failure is illustrated in, and by the growth of software vulnerabilities over the past 20 years. This increase which is both unprecedented and unwelcome has led to an acknowledgement that novel and radical approaches to both understand the vulnerability discovery and disclosure system (VDDS) and to mitigate the risks associate with software vulnerability centred risk is needed (Bradbury, 2015; Marconato et al., 2012). The findings from this research show that whilst technological mitigations are vital, the social and economic features of the VDDS are of critical importance. For example, hitherto unknown systemic themes identified by this research are of key and include; Perception of Punishment; Vendor Interactions; Disclosure Stance; Ethical Considerations; Economic factors for Discovery and Disclosure and Emergence of New Vulnerability Markets. Each theme uniquely impacts the system, and ultimately the scale of vulnerability based risks. Within the research each theme within the VDDS is represented by several key variables which interact and shape the system. Specifically: Vender Sentiment; Vulnerability Removal Rate; Time to fix; Market Share; Participants within VDDS, Full and Coordinated Disclosure Ratio and Participant Activity. Each variable is quantified and explored, defining both the parameter space and progression over time. These variables are utilised within a system dynamic model to simulate differing policy strategies and assess the impact of these policies upon the VDDS. Three simulated vulnerability disclosure futures are hypothesised and are presented, characterised as depletion, steady and exponential with each scenario dependent upon the parameter space within the key variables.
278

Best Practices to Minimize Data Security Breaches for Increased Business Performance

Kongnso, Fedinand Jaiventume 01 January 2015 (has links)
In the United States, businesses have reported over 2,800 data compromises of an estimated 543 million records, with security breaches costing firms approximately $7.2 million annually. Scholars and industry practitioners have indicated a significant impact of security breaches on consumers and organizations. However, there are limited data on the best practices for minimizing the impact of security breaches on organizational performance. The purpose of this qualitative multicase study was to explore best practices technology leaders use to minimize data security breaches for increased business performance. Systems theory served as the conceptual framework for this study. Fourteen participants were interviewed, including 2 technology executives and 5 technical staff, each from a banking firm in the Northcentral United States and a local government agency in the Southcentral United States. Data from semistructured interviews, in addition to security and privacy policy statements, were analyzed for methodological triangulation. Four major themes emerged: a need for implementation of security awareness education and training to mitigate insider threats, the necessity of consistent organization security policies and procedures, an organizational culture promoting data security awareness, and an organizational commitment to adopt new technologies and innovative processes. The findings may contribute to the body of knowledge regarding best practices technology leaders can use for securing organizational data and contribute to social change since secure organizational data might reduce consumer identity theft.
279

Assessing The Potential Of Household Food Processing To Improve Zinc Nutrition In Malawi

January 2016 (has links)
Malawi is one of the least-developed countries in sub-Saharan Africa, with high rates of food insecurity, stunting, and micronutrient malnutrition. Zinc deficiency is associated with a number of health problems in Malawi, including diarrhea, pneumonia, stunting, and adverse pregnancy outcomes. Maize is the staple of the national diet, yet the zinc nutrition of maize-based diets is compromised by the presence of phytate, a potent inhibitor of zinc absorption. Phytate levels can be reduced by basic household processing methods such as soaking, germinating, and fermenting, thus increasing the rate of zinc absorption. Novel research on sustainable approaches to addressing malnutrition using these kinds of food-based methods is urgently needed. Using food consumption data from the Malawi Third Integrated Household Survey and the latest models to predict zinc absorption, this study estimates the proportion of the population at risk of zinc deficiency, with a focus on vulnerable sub-groups including women and children. Next, it uses a simulation model to estimate the effects of reducing dietary phytate through processing and compares those results to an alternative simulation based on biofortification. Finally, this study examines the practical considerations necessary to promote improved maize processing using a behavior change communication approach and estimates the cost-effectiveness of the intervention compared to alternatives. The study"'s findings indicate that the initially high proportion of people at risk of zinc deficiency in Malawi can be substantially reduced by processing maize to reduce phytate. Compared to biofortification, the impact of processing was greater for all regions and sub-groups, and the advantage of processing was more pronounced in the South and in rural areas. An intervention to promote these improved methods using behavior change communication and nutrition education compares favorably against alternatives on a cost-effectiveness basis. A thorough analysis of culture and gender norms, the decision-making context, and the drivers of food choice in Malawi suggest that an intervention to promote household-level maize processing can be culturally appropriate and scalable if the context is properly considered. Given these findings, food-based approaches such as household level food processing should be given greater attention in policy and practice to sustainably improve food security and health outcomes. / 1 / Gregory Sclama
280

Civil society and human security in Meghalaya: identity, power and inequalities

McDuie, Duncan, Social Sciences & International Studies, Faculty of Arts & Social Sciences, UNSW January 2007 (has links)
This thesis examines the role of civil society in addressing human security in the Indian state of Meghalaya. Civil society has been revived over the last two decades and is now one of the key concepts in the study of politics. Yet there are few detailed empirical studies of civil society at a local level examining the constraints on participation and the ways this affects what is contested. Human security has also gained prominence in the past decade as both a challenge to state-centric conceptions of security and as an alternative approach to development by focussing on the security and insecurity of groups and individuals. In order for those experiencing insecurity to identify and contest the causes of insecurity, participation in civil society is necessary. Yet there is very limited analysis on the ability of civil society actors to contest the causes of insecurity in particular local contexts. Meghalaya is part of the region know as Northeast India, one of the least researched regions in South Asia. Identity politics dominate civil society in Meghalaya, empowering particular actors and particular causes of insecurity and marginalising others. Furthermore the construction of Meghalaya in the Indian national context leaves it isolated from civil society actors in other parts of India, intensifying the impact of local circumstances. This thesis examines the responses of civil society actors to environmental insecurity and gender-based insecurity in Meghalaya and finds that participation is constrained by the dominance of identity politics, the power differentials between civil society actors, and existing inequalities within the local context. This thesis reaches three conclusions. First, civil society is constrained by both the state and the power of particular actors and ideas in civil society itself. Secondly, the relationship between civil society and human security is constitutive. Constraints on civil society affect which insecurities can be contested and the prevalence of particular forms of insecurity, especially identity insecurity, empower particular civil society actors and marginalise others. Thirdly, context is vital for understanding the constraints on civil society and the conditions under which these constraints may be transcended. This requires a deeper understanding of Meghalaya that goes beyond the reproduction of homogenous and unchanging ethnic categories.

Page generated in 0.0919 seconds