Professional Documents
Culture Documents
Full Chapter Conversational Artificial Intelligence 1St Edition Romil Rawat PDF
Full Chapter Conversational Artificial Intelligence 1St Edition Romil Rawat PDF
https://textbookfull.com/product/understanding-artificial-
intelligence-1st-edition-nicolas-sabouret/
https://textbookfull.com/product/artificial-intelligence-by-
example-develop-machine-intelligence-from-scratch-using-real-
artificial-intelligence-use-cases-denis-rothman/
https://textbookfull.com/product/playing-smart-on-games-
intelligence-and-artificial-intelligence-1st-edition-julian-
togelius/
https://textbookfull.com/product/ai-meets-bi-artificial-
intelligence-and-business-intelligence-1st-edition-lakshman-
bulusu/
Artificial Intelligence and Robotics 1st Edition Huimin
Lu
https://textbookfull.com/product/artificial-intelligence-and-
robotics-1st-edition-huimin-lu/
https://textbookfull.com/product/artificial-intelligence-and-
games-1st-edition-georgios-n-yannakakis/
https://textbookfull.com/product/artificial-intelligence-in-
healthcare-1st-edition-adam-bohr-editor/
https://textbookfull.com/product/the-psychoanalysis-of-
artificial-intelligence-1st-edition-isabel-millar/
https://textbookfull.com/product/artificial-intelligence-design-
law-and-fashion-1st-edition-yilmaztekin/
Downloaded from https://onlinelibrary.wiley.com/doi/ by University Of Wisconsin-Stout, Wiley Online Library on [19/02/2024]. See the Terms and Conditions (https://onlinelibrary.wiley.com/terms-and-conditions) on Wiley Online Library for rules of use; OA articles are governed by the applicable Creative Commons License
Conversational Artificial Intelligence
Downloaded from https://onlinelibrary.wiley.com/doi/ by University Of Wisconsin-Stout, Wiley Online Library on [19/02/2024]. See the Terms and Conditions (https://onlinelibrary.wiley.com/terms-and-conditions) on Wiley Online Library for rules of use; OA articles are governed by the applicable Creative Commons License
Phillip Carmical (pcarmical@scrivenerpublishing.com)
Martin Scrivener (martin@scrivenerpublishing.com)
100 Cummings Center, Suite 541J
Beverly, MA 01915-6106
Publishers at Scrivener
Scrivener Publishing
Downloaded from https://onlinelibrary.wiley.com/doi/ by University Of Wisconsin-Stout, Wiley Online Library on [19/02/2024]. See the Terms and Conditions (https://onlinelibrary.wiley.com/terms-and-conditions) on Wiley Online Library for rules of use; OA articles are governed by the applicable Creative Commons License
Conversational Artificial Intelligence
Kotagiri Srividya
Romil Rawat
Piyush Vyas
Edited by
and
Downloaded from https://onlinelibrary.wiley.com/doi/ by University Of Wisconsin-Stout, Wiley Online Library on [19/02/2024]. See the Terms and Conditions (https://onlinelibrary.wiley.com/terms-and-conditions) on Wiley Online Library for rules of use; OA articles are governed by the applicable Creative Commons License
This edition first published 2024 by John Wiley & Sons, Inc., 111 River Street, Hoboken, NJ 07030, USA and Scrivener
Publishing LLC, 100 Cummings Center, Suite 541J, Beverly, MA 01915, USA
© 2024 Scrivener Publishing LLC
For more information about Scrivener publications please visit www.scrivenerpublishing.com.
All rights reserved. No part of this publication may be reproduced, stored in a retrieval system, or transmitted, in any form or
by any means, electronic, mechanical, photocopying, recording, or otherwise, except as permitted by law. Advice on how to
obtain permission to reuse material from this title is available at http://www.wiley.com/go/permissions.
For details of our global editorial offices, customer services, and more information about Wiley products visit us at www.
wiley.com.
ISBN 9781394200566
Cover images: Machine Learning AI: Semisatch | Dreamstime.com, AI Chess: Maxuser2 | Dreamstime.com, AI Monitoring
MachineL Ekkasit919 | Dreamstime.com
Cover design by Kris Hackerott
Set in size of 11pt and Minion Pro by Manila Typesetting Company, Makati, Philippines
10 9 8 7 6 5 4 3 2 1
Downloaded from https://onlinelibrary.wiley.com/doi/ by University Of Wisconsin-Stout, Wiley Online Library on [19/02/2024]. See the Terms and Conditions (https://onlinelibrary.wiley.com/terms-and-conditions) on Wiley Online Library for rules of use; OA articles are governed by the applicable Creative Commons License
Contents
Preface xxiii
1 A Glance View on Cloud Infrastructures Security and Solutions 1
Srinivasa Rao Gundu, Charanarur Panem and J. Vijaylaxmi
1.1 Introduction 2
1.2 Methodology 4
1.3 Literature Review 5
1.4 Open Challenges 10
1.5 Recommendations 11
1.6 Conclusion 12
Acknowledgments 13
References 13
2 Artificial Intelligence Effectiveness for Conversational Agents
in Healthcare Security 17
Ahmad Mateen Buttar and Abdul Hyee
2.1 Introduction 17
2.2 Types of AI Relevance to Healthcare 18
2.2.1 Machine Learning (ML)—Neural Networks and Deep Learning 18
2.2.2 Rule-Based Expert System 18
2.2.3 Robotic Process Automation 18
2.3 The Future of AI in Healthcare 19
2.4 Ways of Artificial Intelligence that Will Impact Healthcare 19
2.4.1 Unifying Mind and Machine Using BCIs 19
2.4.2 Radiology’s Next Generation 19
2.4.3 Developing the Immunotherapy Treatment 19
2.4.4 Tracking Health with Personal and Portable Devices 20
2.5 AI Models 20
2.5.1 Artificial Neural Network 20
2.5.2 Zero Trust Technology Application for AI Medical Research 21
2.6 Compare E-Cohort Findings on Wearables and AI in Healthcare 23
2.6.1 Results 23
2.6.1.1 Participant Characteristics 23
2.7 Ethical Concerns of AI in Healthcare 25
2.8 Future in Healthcare 25
2.9 Conclusion 26
References 27
v
Downloaded from https://onlinelibrary.wiley.com/doi/ by University Of Wisconsin-Stout, Wiley Online Library on [19/02/2024]. See the Terms and Conditions (https://onlinelibrary.wiley.com/terms-and-conditions) on Wiley Online Library for rules of use; OA articles are governed by the applicable Creative Commons License
vi Contents
4.9 Conclusion 67
References 67
5 Extracting and Analyzing Factors to Identify the Malicious Conversational
AI Bots on Twitter 71
Gitika Vyas, Piyush Vyas, Prathamesh Muzumdar, Anitha Chennamaneni,
Anand Rajavat and Romil Rawat
5.1 Introduction 71
5.2 Literature Review 73
5.3 Methods 74
5.4 Results and Discussion 77
5.5 Conclusion and Future Direction 81
References 81
6 Evolution and Adoption of Conversational Artificial Intelligence
in the Banking Industry 85
Neha Aggarwal and Kriti Bhaswar Singh
6.1 Introduction 85
6.2 Significance of Artificial Intelligence 87
6.3 Conversational AI in the Indian Banking Industry 88
6.4 Conversational AI in Use in Various Companies 88
6.5 Conclusion 91
References 92
7 Chatbots: Meaning, History, Vulnerabilities, and Possible Defense 95
Divya Nair
7.1 Understanding Chatbots 95
7.2 History of Chatbots 97
7.3 Vulnerabilities and Security Concerns of Chatbots 100
7.4 Possible Defense Strategies 103
7.5 Conclusion 104
References 104
8 Conversational Chatbot-Based Security Threats for Business and Educational
Platforms and Their Counter Measures 107
Hriakumar Pallathadka, Domenic T. Sanchez, Larry B. Peconcillo, Jr.,
Malik Jawarneh, Julie Anne T. Godinez and John V. De Vera
8.1 Introduction 108
8.2 Chatbot Applications in Education, Business Management,
and Health Sector 110
8.2.1 Chatbots for Education 110
8.2.2 Healthcare Domain Chatbots 111
8.2.3 E-Commerce Applications 111
8.2.4 Customer Support 112
8.3 Security and Privacy in Chatbot 113
8.4 Related Work 114
8.5 Methodology 118
Downloaded from https://onlinelibrary.wiley.com/doi/ by University Of Wisconsin-Stout, Wiley Online Library on [19/02/2024]. See the Terms and Conditions (https://onlinelibrary.wiley.com/terms-and-conditions) on Wiley Online Library for rules of use; OA articles are governed by the applicable Creative Commons License
viii Contents
The book talks about how conversational artificial intelligence (AI) models, like chatbots,
may help IT departments work more efficiently by offering solutions like self-service chat-
bots that let users change their passwords and do other user identification procedures. The
use of chatbots, or artificial conversation systems, is growing, although not all of their secu-
rity issues have been resolved. The term “conversational AI” refers to a group of technol-
ogies that allow computers and other devices to create speech- and automated messaging
applications. This enables human-like interaction between humans and robots. One of the
many chatbots available today with speech recognition and the ability to respond to chal-
lenging inquiries is Alexa. As demand for AI assistants rises, voice recognition technologies
are becoming increasingly crucial. Hackers and other harmful software are naturally drawn
to chatbot technology since it is responsible for obtaining and safeguarding sensitive infor-
mation. Businesses have included conversational chatbots and automatic response software
on their websites and social media platforms despite the increased threat of cyberattacks.
Platforms like Facebook, WhatsApp, and WeChat frequently deploy chatbots in their cus-
tomer service operations. While conversational AI will probably improve company pro-
cesses, hackers may also use it to reroute their cyberattacks. AI systems already possess a
plethora of knowledge about people, which helps them better grasp the kinds of arguments
that each individual respond to, When coupled with extraordinary human-like conversa-
tional abilities, it is a recipe for disaster. Possible results include phishing attacks, spam
calls, and fraudulent endeavours. In order to serve clients via a spoken or written interface,
conversational AI integrates natural language processing with conventional software such
as chatbots, voice assistants, or an interactive speech recognition system. Customers are
helped by conversational chatbots, which are an intriguing development since they make
the customer service sector relatively self-sufficient and react to their inquiries quickly and
accurately. A well-automated chatbot may drastically reduce personnel demands, but build-
ing one takes time. The importance of voice recognition systems is increasing as AI assis-
tants like Alexa gain popularity. Thanks to advancements in artificial intelligence, chatbots
in the business sphere may now communicate with clients in a sophisticated and technical
way. Contrary to popular belief, the proliferation of sensitive data in these chatbots has led
to grave security problems. Threats are one-off occurrences like malware or DDOS attacks.
xxiii
Downloaded from https://onlinelibrary.wiley.com/doi/ by University Of Wisconsin-Stout, Wiley Online Library on [19/02/2024]. See the Terms and Conditions (https://onlinelibrary.wiley.com/terms-and-conditions) on Wiley Online Library for rules of use; OA articles are governed by the applicable Creative Commons License
1
A Glance View on Cloud Infrastructures
Security and Solutions
Srinivasa Rao Gundu1 , Charanarur Panem2* and J. Vijaylaxmi3
Abstract
Clients may benefit from cutting-edge cloud computing solutions created and offered in a cost-
effective way by firms. In terms of cloud computing, the most serious problem is security, which
serves as a significant disincentive to individuals from embracing the technology in the first place.
Making cloud computing secure, particularly when it comes to the underlying infrastructure, is
essential. The domain of cloud infrastructure security has been subjected to a number of different
research programs; nonetheless, certain gaps remain unresolved, and new challenges continue to
emerge. This article provides an in-depth analysis of security issues that might arise at various levels
of the cloud architecture hierarchy. Specifically, it focuses on the most significant infrastructure-
related challenges that might have an impact on the cloud computing business model in the near
future.
This chapter also discusses the several literature-based approaches to dealing with the different
security challenges at each level that are now accessible. To assist in the resolution of the challenges,
a list of the obstacles that have still to be conquered is presented. It has been discovered that numer-
ous cloud characteristics such as flexibility, elasticity, and multi-tenancy create new problems at
each infrastructure level after conducting an examination of the existing challenges. According to
research, a variety of security threats, including lack of availability, unauthorized usage, data loss, and
privacy violations, have the greatest effect across all levels of infrastructure. Multi-tenancy, in partic-
ular, has been proven to have the largest effect on infrastructure at all levels, even the most basic. The
study comes to a close with a number of suggestions for further research.
Keywords: Cloud computing, secure cloud infrastructure, application security, network security,
host security, data security
Romil Rawat, Rajesh Kumar Chakrawarti, Sanjaya Kumar Sarangi, Piyush Vyas, Mary Sowjanya Alamanda, Kotagiri Srividya
and Krishnan Sakthidasan Sankaran (eds.) Conversational Artificial Intelligence, (1–16) © 2024 Scrivener Publishing LLC
1
Downloaded from https://onlinelibrary.wiley.com/doi/ by University Of Wisconsin-Stout, Wiley Online Library on [19/02/2024]. See the Terms and Conditions (https://onlinelibrary.wiley.com/terms-and-conditions) on Wiley Online Library for rules of use; OA articles are governed by the applicable Creative Commons License
2 Conversational Artificial Intelligence
1.1 Introduction
Models for offering cloud computing services include the ones listed below as examples:
When it comes to providing cloud services, there are three fundamental models to con-
sider, each of which is becoming more established and common with each passing gen-
eration. For this, there are many various approaches to consider, including software as a
service, platform as a service, and infrastructure as a service (to name a few). A few of these
strategies include software development, platform and infrastructure as a service, and cloud
computing, among others (IaaS). In contrast to these three major models [1], an SPI model
is a combination of them and may be characterized as follows:
In order to get access to programs that are hosted on service provider infrastructure,
users must connect to them over the Internet. This is referred to as software as a service
(also known as SaaS for short) or cloud computing, depending on who you ask. These strat-
egies assist the customers of software offered under the SaaS business model, who are typi-
cally end users who subscribe to readily available programs. The SaaS model has also been
associated with a pay and use feature that would allow the end users to access software
through a web browser without having to deal with the headaches of installation, mainte-
nance, or making a significant upfront payment [2]. Some of the popular SaaS apps include
Sales force, Google Apps, and Google Docs.
User awareness is an important component of SaaS security from a security viewpoint.
However, the SaaS provider must hold on to a set of security conditions in order to ensure
that users adhere to the essential security protocols while using the service. Things like
multi-factor authentication, complicated passwords, and password retention are examples
of these requirements. An additional component that SaaS providers should have in place
is the adoption of security measures to secure customers’ data and to guarantee that it is
available for permitted usage at all times [3].
In computing, the phrase Platform as a Service refers to a collection of software and
development tools that are stored on the servers of a service provider and are available from
any location on the Internet. It provides developers with a platform on which they may
construct their apps without having to worry about the underlying mechanics of the service
they are relying on for support. It also makes it easier to manage the software development
life cycle, from planning to maintenance, in an efficient and effective way, thanks to the
PaaS architecture.
The platform also makes use of programming languages such as VC++, Python, Java,
etc. to allow users to construct their own apps on top of it. Many developers and program-
mers now depend on Platform as a Service (PaaS) firms such as WordPress, Go Daddy, and
Amazon Web Services to build their websites and host their online applications. Security,
according to the PaaS paradigm, is a shared responsibility that must be handled by both
developers and service providers in equal measure. Example: When developing applica-
tions, developers must follow security standards and best practices to guarantee that the
applications are safe and secure. A programmer, for example, must certify that the software
is free of flaws and vulnerabilities [4] before exposing it to the general public.
Aspects of this process that are equally important include the detection and correction of
any security flaws that attackers may exploit in order to get access to and compromise users’
data. For developers, the dependability of PaaS technology, on the other hand, is critical in
Downloaded from https://onlinelibrary.wiley.com/doi/ by University Of Wisconsin-Stout, Wiley Online Library on [19/02/2024]. See the Terms and Conditions (https://onlinelibrary.wiley.com/terms-and-conditions) on Wiley Online Library for rules of use; OA articles are governed by the applicable Creative Commons License
A Glance View on Cloud Infrastructures Security and Solutions 3
order to provide a safe and secure environment for application development. For example,
several programming environments, such as C++, are well-known for having poor memory
management, which enables attackers to conduct a variety of assaults against their victims,
including stack overflows.
A lack of sufficient authentication in some relational database management systems
(RDBMSs), such as Oracle, may also be exploited by attackers. Oracle, for example, allows
users who have been granted admin permissions at the operating system level to access the
database without the need for a username and password [5].
A kind of cloud computing paradigm in which a cloud computing service provider
keeps the resources that are only shared with contractual customers that pay a per-use
charge to the cloud computing service provider is known as Infrastructure as a Service
(IaaS). In particular, one of the key benefits of the Equipment as a Service model is that
it removes the need for a significant initial investment in computer infrastructure such
as networking devices, computer processors and storage capacity, and servers. The tech-
nology may also be used to quickly and cost-effectively increase or reduce the amount of
computer resources available to a user. In this day and age, with the proliferation of cloud
delivery systems, it may be challenging to determine the boundaries of one’s security
responsibilities. Security is the responsibility of both cloud service providers (CSPs) and
the clients that use their services. As seen in Illustration 5, the duties of cloud computing
service delivery models are outlined. Cloud computing services include infrastructure
as a service (IaaS) offerings such as Amazon Web Services, Cisco Meta-cloud, Microsoft
Azure, and Google Compute Engine (GCE). It is important to note that customer-facing
infrastructure is critical in terms of security since it acts as the first line of defense for the
system’s perimeter.
In this environment, attackers may use a variety of strategies to target the infrastructure,
including denial of service (DoS) attacks and malware distribution campaigns. The major-
ity of the time, the security of a PaaS solution is the responsibility of the service provider.
Cloud Models and Architectures: An introduction determining the kind of cloud
an institution should use is the first and most important stage in cloud deployment, as
this will allow for a more smooth installation process to take place. During the cloud
deployment process, the second and final step is known as deployment. According to
the authors, institutions who have failed to execute a deployment plan have done so as a
result of selecting the incorrect kind of cloud infrastructure. In order to prevent failure,
organizations must first assess their data before deciding on the kind of cloud infrastruc-
ture to use. While many consumers consider security when signing up for cloud services,
many do not because they have a misconception of the efficiency of the protection given
by cloud services in and of itself. When it comes to keeping their data secure, many
businesses that use cloud computing depend only on the security measures employed by
cloud service providers. This may provide hostile actors the ability to exploit client-side
vulnerabilities in order to attack the systems of one or more tenants as a result of the
situation [6].
To mention a few examples, public cloud, private cloud, community cloud, and hybrid
cloud are all concepts that are being explored.
Public cloud is often referred to as an external cloud in some areas, as is the case with
the Amazon Web Services (AWS) public cloud. This kind of cloud is accessible to all users
Downloaded from https://onlinelibrary.wiley.com/doi/ by University Of Wisconsin-Stout, Wiley Online Library on [19/02/2024]. See the Terms and Conditions (https://onlinelibrary.wiley.com/terms-and-conditions) on Wiley Online Library for rules of use; OA articles are governed by the applicable Creative Commons License
4 Conversational Artificial Intelligence
or large groups of users through the Internet, with cloud service providers retaining con-
trol over the environment. Customers may access any data that are made accessible on the
network using this service, which is managed by the service provider. A cost-effective and
scalable means of implementing information technology solutions is made feasible via the
usage of public cloud computing. Because of the Internet connection, a variety of security
dangers are introduced into the system, including denial-of-service (DoS) attacks, malware,
ransomware, and advanced persistent threat (APT) assaults [7, 8].
Cloud inside an organization: The private cloud, also known as the internal cloud, is
a kind of cloud that is used within an organization. This category’s emphasis is focused
on a single user, group, or institution at the time of writing. Although the cost of private
clouds is more than the cost of public clouds, they are more secure than public clouds.
The fact that a private cloud is housed behind an enterprise’s firewall allows users within
the organization to access it via the company’s intranet. Privatized clouds, in contrast to
public cloud computing, are less secure since less money and experience is directed on
the development of services and systems, much alone the protection of data in the private
cloud. Consequently, some components may become vulnerable, allowing hostile actors to
conduct attacks against these vulnerable components by exploiting the weaknesses of these
vulnerable components [8].
The community cloud provides assistance for a variety of communities with common
interests, such as missions, rules, security needs, and regulatory compliance difficulties,
among other things. Depending on the circumstances, institutions or a third party may
be in charge of managing it on-site or off-site. When compared to the standard cloud, the
community cloud offers stronger privacy, security, and policy compliance protections. The
degree of security in a community cloud environment is determined by the quantity of
security awareness present in the community, as well as the importance of security to the
activities of the community as a whole. The cloud storage of sensitive data from a govern-
ment agency may endanger national security if the material is made available to the public,
as has happened in the past. It follows as a result that security measures should be included
in cloud computing environments [9].
Hybrid Cloud: Due to the diverse variety of needs that an institution has, this kind of
cloud deployment is required. It combines two or more models in order to deliver cloud-
based computing services (public, private, or community). Enterprises may use private
clouds to store sensitive data or apps in a secure environment while hosting non-sensitive
data or applications in a public cloud environment. Because of the federation of clouds with
a diverse set of incompatible security measures, cloud hybridization, on the other hand, gen-
erates a host of security challenges. A consequence of this is that attackers uncover vulner-
abilities in one or more clouds with the intent of getting access to the whole infrastructure.
1.2 Methodology
In this research, the results were gathered through a review of the available literature. How
to Plan and Organize the Review Process: The following are the three sub-phases of this
phase: acquiring the research goals, establishing the research questions, and choosing the
search technique to be employed in the study are all included in this phase.
Downloaded from https://onlinelibrary.wiley.com/doi/ by University Of Wisconsin-Stout, Wiley Online Library on [19/02/2024]. See the Terms and Conditions (https://onlinelibrary.wiley.com/terms-and-conditions) on Wiley Online Library for rules of use; OA articles are governed by the applicable Creative Commons License
A Glance View on Cloud Infrastructures Security and Solutions 5
1. The goal of this project is to provide a new taxonomy for safe cloud architec-
ture based on the current state-of-the-art literature.
2. To provide an in-depth review of a wide range of issues and solutions that are
used in cloud infrastructure at various degrees of complexity.
3. To draw attention to the disadvantages and dangers of the presently available
solutions with respect to the research challenges and upcoming possibilities.
One such study looked at the most often found cloud security flaws and discovered a num-
ber of them. They also offered a number of additional solutions to security challenges that
arise in cloud architecture, each of which was meant to be sensitive to the personal data of
individual users. Data transfer through the cloud is subject to considerable security risks,
according to a research done. Participants in this survey were provided practical advice
on how to deal with potential dangers over the course of the survey. The results of a study
included a taxonomy and survey of cloud services, which were organized by cloud infra-
structure providers and revenue.
A service taxonomy was created, which encompasses themes such as computers, net-
working, databases, storage, analytics, and machine learning, among other things, as well as
additional topics. Regarding functionality, the computing, networking, and storage services
provided by all cloud suppliers are of a high quality, and they are commonly recognized as
the backbone of the cloud computing architecture.
According to a survey, cloud computing firms face a number of security issues. The cloud
client, the cloud service provider, and the owner of the data stored in the cloud were all
involved in this process. An investigation of various communication and storage options in
the crypto cloud was also conducted as part of the project. Researchers conducting studies
into the causes and consequences of different cyberattacks have access to the most up-to-
date information.
Many data protection issues that may develop in a multi-tenant cloud computing system
were examined and solutions were provided in a study published by the researchers. While
this poll focused more on data privacy than security, the prior survey was concerned with
both concerns at once.
A research gave a full definition of cloud computing, as well as the many different levels
of cloud architecture that can be found in the cloud computing environment. Part of the
research included a comparison of three service models (including SaaS, PaaS, and IaaS),
as well as three deployment methodologies, as part of the overall research design (private,
public, and community). It was determined that both private and public clouds have infor-
mation security needs; thus, the writers looked into it. A few of the most urgent difficulties
and restrictions related with cloud computing in terms of security were also covered during
this session.
According to a study published in the journal, one of the many different types of vul-
nerabilities that often occur in cloud computing systems is the inability to recognize the
flaws. To this research, the author’s contribution consisted in the categorization of different
sorts of threats in accordance with the accessibility of cloud-based service resources. It was
necessary to create this category in response to the extensive description and extent of the
multiple dangers that were faced.
There are several concerns about the security of cloud computing infrastructure. Four
critical levels of consideration should be taken into account while designing and executing
cloud infrastructure security: the data level, the application level, the network level, and the
host level (or the host itself) (or the physical location of the cloud infrastructure).
First and foremost, security refers to the protection of programs when they are using
hardware and software resources in order to prevent others from gaining control of them.
Among the most serious dangers at this level are distributed denial of service (DDoS)
assaults on software programs, which are becoming more common.
Another random document with
no related content on Scribd:
back
back
back
back
back
back
back
back
back
back
back
back