More Subjects
_ 6bjbj,E,E 7N/N/u2 ttttt8L,Lhx TE,f)NtqqqttqttqVsvg0L) ))tqqqqqqq 2qqqLqqqq)qqqqqqqqq RUNNING HEAD IT
Thesis
Name of the writer
Name of the institution
TABLE OF CONTENTS
TOC o 1-3 h z u HYPERLINK l _Toc20637220 Abstract PAGEREF _Toc20637220 h 3
HYPERLINK l _Toc20637221 Introduction PAGEREF _Toc20637221 h 4
HYPERLINK l _Toc20637222 An introduction to cryptocurrency PAGEREF _Toc20637222 h 5
HYPERLINK l _Toc20637223 Why cryptocurrency hold so much value PAGEREF _Toc20637223 h 8
HYPERLINK l _Toc20637224 The vulnerabilities of cryptocurrencies PAGEREF _Toc20637224 h 10
HYPERLINK l _Toc20637225 Using cryptocurrency in the corporate world PAGEREF _Toc20637225 h 11
HYPERLINK l _Toc20637226 Regulating cryptocurrency PAGEREF _Toc20637226 h 13
HYPERLINK l _Toc20637227 The future of cryptocurrency PAGEREF _Toc20637227 h 14
HYPERLINK l _Toc20637228 Conclusion PAGEREF _Toc20637228 h 15
HYPERLINK l _Toc20637229 References PAGEREF _Toc20637229 h 18
Thesis
Abstract
The aim of this paper is to investigate about cryptocurrency. Moreover, it will be investigated why cryptocurrency holds so much value. Additionally, the future of cryptocurrency will also be evaluated. Cryptocurrency holds value because of its decentralized nature and limited supply against a huge demand. However, despite its huge demand, the future of cryptocurrency is questionable due to certain drawbacks. This is because cryptocurrency is always at the mercy of the hackers, has no protection from any banks and very little consumer protection. Hence, cryptocurrency will not be gaining the trust of consumers on a wide scale despite its two biggest strengths anonymity and meagre transactional costs.
Introduction
The most valuable commodity in the entire world is money. Whether an individual is going to a hairdresser or buying clothes, they will need it no matter what the situation is. In the modern economy, money is imperative to carry out transactions of goods of any sort. Citizens of modern society will need money in every situation of their lives in which they intend to complete a transaction (Stark, 2013). There have been numerous forms of money in human history. The oldest known form of money is bartering. In the old times when there was no concept of money, people used to exchange objects in order to pay for something. For instance, one would pay for a horse using a cow. Certainly, this form of money was highly inefficient. The inefficiency of the earlier system of money gave rise to the need for a more efficient system of exchange (Bradbury, 2013). Trading is made more efficient with intermediary instrument acting in between the exchange of goods. When bartering was used as a form of money, human traded goods using weapons or skins of different animals that would act as an intermediary (Christin, 2013). The traces of first minted currency are found in and around 600 B.C.
The minted currency was made from the combination of silver and gold. A picture was stamped with the aim to identify the value of any coin. King Alyattes of Lydia, modern-day Turkey, minted coins for initially for the first time. The stamped coins resulted in increasing the trade of the empire manifold and the empire became one of the affluent empires in the entire world (Dwyer, 2015). Some hundred years fast forward, paper money was developed for the first time by Chinese. The Chinese invention moved the currency system away from the coins. Europeans were quite late in adapting to the usage of paper money. Today, banks print notes for people to use and roam around carrying it in their pockets. The money in the banks has value backed in gold most of the times. The paper money that everyone uses today became the norm little by little.
This is a way in which bartering has been eliminated due to the problems it possessed and was replaced with paper money. When every person in a society accepts a uniform form of money, trading, pricing, and servicing become easier and convenient. Fiat money is the primary source of money in todays economy. Fiat money is granted protection by the governments using laws and regulations which subsequently foster peoples trust in money. The central bank of a country supplies the fiat money that ensures stability and a steady supply of currency using monetary policies. With so much technological advancements, the money of various kinds has been invented.
Cryptocurrency is the latest form of money that has been created using the latest technologies and innovations. More often than not, Cryptocurrency is referred to as digital money or cyber currency in the digital space. The most striking attribute of the cryptocurrency is that no bank issues it (ElBahrawy et.al, 2017). Moreover, it is not granted protection using laws and regulations of any sorts. This feature of cryptocurrency makes it immensely difficult for governments to intervene or interfere. There have been numerous forms of cryptocurrency that have been developed, Bitcoin is considered to be the most famous cryptocurrency around.
An introduction to cryptocurrency
With so many technological advancements, it has been made possible to carry out a transaction using digital currency, in which there is little interference from banks and governments and is not regulated or protected by any sorts of laws (Stark, 2013). The digital currency or cryptocurrency is redistributed using peer to peer networks and software that are readily available. An individual can edit the source of the software as per their liking and redistribute the digital currency.
Although the digital currency is almost identical to the regular debit card accounts stored electronically. However, the paramount dissimilarity is that cryptocurrency can be distributed with no interference from banks and other official authorities. Due to this dissimilarity, the digital currency is completely decentralized. Fiat money can be controlled and regulated by the government but cryptocurrency is free from any sort of control and regulation.
The first-ever digital currency that was created is Bitcoin. This digital currency was created by a team named Satoshi Nakamoto. US National Security Agency created a cryptographic system named SHA-256, which was used by this team. Bitcoin is the most widely known variant of cryptocurrency that has been created so far. Each digital coin of cryptocurrency is linked to a special key that makes it unique (Dwyer, 2015). The transaction of cryptocurrency takes place when one digital coin of cryptocurrency is moved from one address to another address. The records of every transaction are held in a database which is public. The database which holds the records of transactions is called blockchain. Every coin of cryptocurrency is stored in the database with not a single coin of cryptocurrency existing outside of it. The supply of any digital currency is dependent on mining. Using the process called mining, every single coin of a cryptocurrency is uploaded into the database which is public.
A cryptocurrency is developed using the process of mining and it is measured in hashed per second. Whenever a block is solved and a coined is mined successfully, a new hash gets created. Cryptocurrency is completely dependent on hash functions. Computers that mine cryptocurrency are significantly powerful in order to mine effectively (Thomas, 2013). However, due to the complex nature of algorithms involved in mining, the CPU of the computers consumes a lot of resources. With the passage of time, the algorithm gets more and more complex, bringing down the creation of digital coins significantly (Bradbury, 2013). The mining process will become increasingly troublesome with the data stored getting large in size. Since the data gets large in size, the processing capability of the computers is reduced and they start to use more resources. When cryptocurrency was launched initially, one could mine 50 digital coins using mining (Christin, 2013). However, it has been reduced to 25 digital coins of cryptocurrency today. The supply of most cryptocurrencies has been made constant with reward cutting to half after every four years using programming. Therefore, the process of mining used to create digital coins of cryptocurrency is getting less profitable and the available supply of digital coins is becoming less each day. Unless an individual has a computer that has been designed specifically for the purpose of mining, the average cost incurred in mining a hash will more than the price of a single digital coin of the cryptocurrency (ElBahrawy et.al, 2017). To put simply, mining is a contest. Numerous miners are working day and night simultaneously to find a hash. Miners that have efficiently mined a block of cryptocurrency is a testament to the fact that many people have solved computational problems with ease that resulted in them finding a hash. The total supply of cryptocurrency has been contained by putting a limit on it. For instance, the limit imposed on the most famous cryptocurrency- Bitcoin- is 21 million digital coins. A digital coin of cryptocurrency is added to the blockchain using the process of mining (Wu and Pandey, 2014). Therefore, blockchain can easily identify the owner of a cryptocurrency, as it is the database in which data about the cryptocurrencies are added. The owners of cryptocurrency keep their digital coins in a digital wallet. These digital wallets enable the owners of digital currency or cryptocurrency to track their remaining balance and carry out transactions (Thomas, 2013). An excel sheet can be linked to the digital wallet which records every single transaction of the person owning the digital currency. The digital coins are not placed in the excel spreadsheets. As previously described, every digital coin is linked with a unique address. This address is encrypted and decrypted to verify the transaction. Digital coins of a cryptocurrency are sent using the public address of an individual and they are stored in the private address of the owner. If a hacker ever gets its hands on to the public keys associated with the digital coins, he/she then can transfer digital coins to their private address without any trouble (Wu and Pandey, 2014). Since the person who lost their digital coins had the only link to the public address cannot recover the coins as they are now in the private address of the hacker. Therefore, it is recommended to keep the private key of digital coins encrypted which will restrict intruders from getting their hands on to the key.
Why cryptocurrency hold so much value
The primary problem that confronts the digital currency is that the bits that make up the digital currency can be replicated easily on computers with little difficulty. Any currency intended to be accepted by the public and authorities must be reproduced easily (Stark, 2013). Furthermore, a currency must have the protection of some sorts that prevents its multiple spending. Such as one person spending a single note of currency again and against meaning the currency shall be always in the flow. Digital currency gets created easily contrarily to the paper currency (Bradbury, 2013). This problem can be solved by creating a large central authority that holds a record of all the transactions that have taken place using the same currency apart from certifying each transaction. The largest and most famous cryptocurrency Bitcoin found a solution to this problem that is why cryptocurrency holds so much value.
Any transaction of Bitcoins is completed only through peer to peer networks of owners and sellers in which no authority controls and regulates the exchanges taking place (Christin, 2013). The owners and sellers in this peer to peer network are the personal computers which can easily interact with each other to carry out a transaction without every connecting to any third party server computer (Wu and Pandey, 2014). As it has been mentioned above, like all cryptocurrencies, Bitcoin also uses open-source software. Open-source software is the software which is readily available for everyone to change and use them according to their needs. Open-source software is essentially virtually equal to peer-to-peer networks as the change in it is carried out by the owners of cryptocurrencies, not a central figure or an authority. By employing the open-source software and peer to peer networks, Bitcoin successfully enforced authentication measures to put a curb on the issues of the reproduction of the digital currency. Other cryptocurrencies took the lead of Bitcoin and used the same methods (Dwyer, 2015). This is why cryptocurrencies hold so much value. As has been described above, every transaction of cryptocurrencies is stored in a database known as the blockchain. Different websites keep numerous copies of the block chain database which they continuously update. Since Bitcoin has successfully countered the reproduction problem it is able to create value. However, for a currency to have a specific value, it must have a certain amount of demand in the market.
For anyone finding a reason to use cryptocurrency is that it has very little cost of money transfer. Transferring money digitally can be completed in an instance with the involvement of physical money. Moreover, it is also difficult for owners of cryptocurrencies to bring in their wallets any other country and exchange local currency by trading digital currency. Thus, it gives rise to certain demand which arises from the possibility of avoiding controls or government interference over the currency. Any transaction done using this would have benefit higher than the cost incurred. Another possible reason behind the demand of cryptocurrency is that it is based on anonymity.
Therefore, cryptocurrencies have so much value because they deal in peer to peer networks with little interference from governments and regulating bodies that authenticate and validate the transactions and exchanges taking place. Moreover, cryptocurrencies have successfully tackled the issue of reproduction of digital currency which gives rise to its demand. Additionally, transferring cryptocurrency is cost-efficient and quick. Due to the volatile nature of the price of cryptocurrencies, it has caught the eyes of numerous investors (Thomas, 2013). Moreover, another reason for the cryptocurrencies to have so much value is that people intending to indulge in illicit trades can anonymously perform the transactions.
The vulnerabilities of cryptocurrencies
Cryptocurrencies are safe from attacks because of their decentralized nature. Although a decentralized currency system can fight remarkably with intruders and attacker, it is not completely safe (Stark, 2013). There are so many vulnerabilities of cryptocurrencies which can be easily exploited. According to different statistics, the miners of the cryptocurrencies have spent so much time, effort, and resources in the mining of the Bitcoins that the costs that go into the mining of the digital currency are significantly higher than the earnings made through it (Bradbury, 2013). The mining of digital currency is becoming less profitable with every passing day as it is becoming increasingly difficult to mine newer coins of digital currency. To tackle this, miners have put their heads together to come up with an idea. After much consideration, miners agreed upon the concept of pooling (Christin, 2013). Pooling is an idea of bringing the resources together to increase the power of computation significantly. To put it simply, bringing together resources would result in a centralized authority controlling most of the mining. AS a result, this authority takes control of the entire network and manipulate the blockchain afterwards easily, this is called a 51 attack. This will result in reversing transactions easily and spending the same digital coins several times. Bitcoin here took the lead as well and came up with a solution (Dwyer, 2015). The mining that has been done to create Bitcoins is done in a way it frequently switches between pools that prevents a single person to attain the 51 power. The network of the Bitcoin forces its owners to go through six-step verification requiring confirmation on a single transaction in one block. Therefore, reversing a transaction becomes more difficult and confirming the transaction is even more difficult. This problem has been faced by all other producers of cryptocurrencies and all of them have followed Bitcoin to provide their users with a safer environment (rnason, 2015). Although Bitcoin was successfully able to plug its vulnerabilities, the rapid pace at which technological advancements are taking place worries all the producers of the cryptocurrencies.
Using cryptocurrency in the corporate world
Many have been using different forms of virtual currencies for quite some time. Therefore, it would be naive to say that the concept of cryptocurrencies is entirely new for people (Stark, 2013). The examples of virtual currencies are credit card reward points, online currencies in video games, and miles given to an individual by an airline. The nature of decentralization peer to peer network of cryptocurrencies is what makes it stand out (Bradbury, 2013). Corporations are always in search of new and innovative ways to increase their sales in this cut-throat era of competition. Using cryptocurrency in the digital world has both benefits as well as drawbacks. For instance, cryptocurrencies are safe from the economic turbulence a country experiences (Christin, 2013). Although it is evident that cryptocurrencies are safe from political turmoil and economic instability, the price of cryptocurrencies is volatile due to the speculation, media coverage, uncertainties revolving around it. Business and corporations cannot afford this much volatility as it will affect their businesses significantly (Dwyer, 2015). Due to the fact that cryptocurrencies lack liquidity, businesses would always be reluctant to use cryptocurrency as an alternative to the fiat currency. Moreover, if the businesses and corporation ever decide to incorporate cryptocurrency in the corporate world, it would result in creating a significant imbalance in the supply and demand of the cryptocurrency (rnason, 2015). As a result, the price volatility of a cryptocurrency would increase further. However, this fact can draw the attention of those who are discontent with hiked inflation due to poor regulating policies enforced by central banks. Moreover, the supply which the miners of the cryptocurrency can add into the stream of cryptocurrency is not enough to allow the use of cryptocurrency at a large scale. Moreover, the fact that the cryptocurrency does not have a formal market increases the apprehensions of businesses to incorporate cryptocurrencies into the corporate world. Another reason businesses do not want to integrate the cryptocurrency in the corporate world is that it has decentralized nature. This would result in an increase in the cost incurred on a transaction because a large number of resources would be consumed. Decentralization accompanies a huge risk of lack of security that stops businesses to use cryptocurrency in the corporate world (rnason, 2015). Since cryptocurrencies are decentralized, businesses would not even have any single source of help in case something goes wrong. Moreover, it is a fact that any sort of cryptocurrency has not been adopted by any country all over the world as their primary source of currency. However, investors have complete freedom to purchase cryptocurrency in their domestic currency. Afterwards, the investors can sell their cryptocurrency in any other country against the exchange of domestic currency of that specific country. However, many European countries do not allow this method. Many European countries have banned transactions that involve sale and purchase using cryptocurrency. Moreover, the most famous cryptocurrency, Bitcoin, has been banned in many European states.
Regulating cryptocurrency
As the nature of the cryptocurrency is anonymous, it has the potential to be used in many types of illicit trades. For instance, cryptocurrency can assist criminals with activities involving theft, tax evasion, and money laundering (Stark, 2013). Only a handful of countries have enforced measures that prevent cryptocurrency to be used for illicit activities. Many central banks in many countries have warned their citizens about the risks that are attached to the usage of cryptocurrency (Bradbury, 2013). Moreover, there is a lack of data available on the nature and extent of fraudulent activities associated with the cryptocurrency because it has a feature of anonymity which makes it harder for the authorities to obtain accurate data. Moreover, it is even harder to locate traders of the currency because the transactions are completed without any banks interfering and any third party regulating body overlooking the operations. Opportunities for tax evasion are significantly high using cryptocurrency (Christin, 2013). However, those with malicious intentions are often kept at bay because of limited circulation and unpredictability in its prices. Many security agencies fear that drug cartels have been using cryptocurrency to launder profits made through the sales of illicit drugs (Dwyer, 2015). In 2014, strict guidelines were enforced in the US to put a curb on increased incidents of money laundering. In the same, an arrest was made and this arrest is known as the first arrest made after the enactment of laws that prevent money laundering using cryptocurrency (ElBahrawy et.al, 2017). The primary issue that arises with the regulation of cryptocurrency is that it can never be categorized as a legal financial commodity. Notably, Japan is one country which has categorized it as a financial commodity. The US and Germany treat cryptocurrency as property and private money respectively. The only countries that have strict restrictions against the use of cryptocurrency are China and Iceland. Moreover, the Chinese government has allowed its citizen to trade cryptocurrency freely but restricted its bank to be involved in transactions which involve cryptocurrency. The countries which allow trade of cryptocurrencies have imposed a tax on the profits made through the mining of cryptocurrencies. Moreover, profits made from the increase in the value of a cryptocurrency are also subjected to tax in those countries.
The future of cryptocurrency
The future of cryptocurrency has been widely debated on numerous platforms. In a time when people make transactions using credit and debit cards, the future of digital currency cannot be overshadowed (Stark, 2013). It is very convenient, rapid, and cost-effective to transfer money by employing digital means. However, cryptocurrency, sometimes prove to be way more complicated to be used by the mass population. The average consumer has rarely demanded a currency system that is decentralized (Bradbury, 2013). For the cryptocurrency to be used widely as a primary source of currency, it must come under strict regulation and monetary policies. Moreover, by coming under strict policies, the low costs of transaction and a high degree of anonymity must be changed (Christin, 2013). As a result, cryptocurrency will lose its two biggest appealing factors. The corporate world does not encourage the use of cryptocurrency as well. Moreover, if cryptocurrency gets decentralized, the risk of bankruptcy will increase manifold. Considering all these mentioned factors, it can be concluded that the demand for the cryptocurrency would not be increasing anytime soon (Dwyer, 2015). The only categories of people from where demand can come are the investors looking to increase their portfolio, people having strong interest to explore cryptocurrency, criminals with malicious intents to complete transactions on the dark web (ElBahrawy et.al, 2017). The lack of demand will only result in a decrease in the price of cryptocurrencies. However, there is a lot of room for the cryptocurrency to grow as a promising technology because of the underlying algorithms.
If the cryptocurrency is studied as merely a technological field, it can be very promising. For instance, if an individual is looking to attain the ownership of any asset to be represented by cryptocurrency, it can be achieved using the cryptographic technology that is central to the concept of cryptocurrency (Thomas, 2013). Cryptographic technology and cryptocurrencies would pave the way of people to easily attain ownership of any physical asset because everything would then be digital. Moreover, tokens of cryptocurrencies can be rented or sold by people. This kind of technological application of cryptocurrencies would transform the blockchain into a kind of registry that would contain information about the ownership of any kind of tangible asset. The technology, algorithms, and techniques that underlie the concept of cryptocurrency and resultant cryptography can have numerous applications. Moreover, central banks of many countries can work together with cryptocurrency producers to learn about the design and techniques that underpin cryptocurrency. As a result, banks would be enabled to move money more securely. Another application can be that the banks can use the leanings to create a cryptocurrency of their own (ElBahrawy et.al, 2017).
Conclusion
The most valuable commodity in the entire world is money. Whether an individual is going to buy a new phone or purchasing groceries, they will need it no matter what the situation is. In the modern economy, money is imperative to carry out transactions of goods of any sort. With so much technological advancements, numerous kinds of money have been created. Cryptocurrency has been the most questionable form of money made so. Cryptocurrency is that money that is not influenced by any regulating body and governmental regulations. The cryptocurrency is based on a completely decentralized system, unlike paper money which is made and issued by central banks. Therefore, the government and authorities have little control over the cryptocurrencies. The very first and most famous cryptocurrency developed is Bitcoin. A database is involved in cryptocurrency which is known as blockchain stores every cryptocurrency transaction that is completed. The records that are stored in the blockchain database keep the information of the users of the cryptocurrencies completely anonymous. The digital coins of cryptocurrency are created using a process called mining. Mining is a process which requires complex computational algorithms whose difficulty gets greater with the passage of time. Therefore, as time goes by, the process of mining becomes inefficient and starts to consume more resources than before. Therefore, the process of mining is increasingly becoming less profitable. There are certain factors that contribute to the demand for cryptocurrencies. The decentralized and anonymous nature of cryptocurrencies makes it appealing for some consumers. Moreover, low transactional cost of cryptocurrency draws significant attention from criminal quarters with malicious intentions to indulge in illicit trades. Although there are many appealing factors for some categories of consumers, there are ample disadvantages of cryptocurrencies as well. Due to the decentralized nature of cryptocurrency, it has no consumer protection. Any amounts of digital coins of any cryptocurrency which are lost or stolen are never recovered. Moreover, cryptocurrencies are always at the mercy of hackers because they are highly prone to cyber-attacks. Additionally, the cryptocurrencies are devoid of the liquidity feature that paper money has. The price of cryptocurrencies is always unpredictable and volatile, making it harder to hold on to large digital coins of a cryptocurrency. Many countries have placed measures to curb the transactions of cryptocurrencies. Moreover, numerous countries have imposed huge taxes on the profits made through mining, selling, and purchasing of cryptocurrency. Notably, China has recognized cryptocurrencies but placed restrictions on banks that intended to deal in cryptocurrency.
Taking into account the discussion above, it will take longer for cryptocurrency to earn the trust of the public due to the risks involved in it. For cryptocurrency to replace debit and credit cards, it must offer the consumers something that debit and credit cards have failed to provide so far. Cryptocurrency must become convenient and safer for people to use it all across the world without any qualms.
References
rnason, S.L., 2015.Cryptocurrency and Bitcoin. A possible foundation of future currency why it has value, what is its history and its future outlook(Doctoral dissertation).
Bradbury, D., 2013. The problem with Bitcoin.Computer Fraud Security,2013(11), pp.5-8.
Christin, N., 2013, May. Traveling the Silk Road A measurement analysis of a large anonymous online marketplace. InProceedings of the 22nd international conference on World Wide Web(pp. 213-224). ACM.
Dwyer, G.P., 2015. The economics of Bitcoin and similar private digital currencies.Journal of Financial Stability,17, pp.81-91.
ElBahrawy, A., Alessandretti, L., Kandler, A., Pastor-Satorras, R. and Baronchelli, A., 2017. Evolutionary dynamics of the cryptocurrency market.Royal Society open science,4(11), p.170623.
Stark, B., 2013. Is the corporate world ready for bitcoin.Risk Management,60(7), pp.6-9.
Thomas, B., 2013. Massive Bitcoin thefts and seizures leave many users nervous and poorer.Computer Fraud Security,12(3).
Wu, C.Y. and Pandey, V.K., 2014. The value of Bitcoin in enhancing the efficiency of an investors portfolio.Journal of financial planning,27(9), pp.44-52.
IT PAGE MERGEFORMAT 18
UVghijueuI1.hXFhXF0J6CJOJQJaJmHnHu7jhXFhXF0J6CJOJQJUaJmHnHuhXFhx6CJOJQJaJ(jhXFhx6CJOJQJUaJhjh5CJOJQJaJhx5CJOJQJaJhjhi5CJOJQJaJhjhx5CJOJQJaJhjh CJOJQJaJhjhxCJOJQJaJh CJOJQJaJhjhxCJOJQJaJ 5OPQRSTUhi z I dgddagd mpdgd mpdEdd-.hFhXF6CJOJPJQJaJmHnHujhXFhXF6CJOJQJUaJmHnHu6jhXFhXF6CJOJQJUaJmHnHu-hXFhXF6CJOJQJaJmHnHu7jhXFhXF0J6CJOJQJUaJmHnHujhXFhXF0J6CJOJQJUaJmHnHu.hXFhXF0J6CJOJQJaJmHnHuhXFhXF6CJOJQJaJmHnHu 5 6 zzzC-hXFhXF6CJOJQJaJmHnHu.hFhXF6CJOJPJQJaJmHnHujqhXFhXF6CJOJQJUaJmHnHu6jhXFhXF6CJOJQJUaJmHnHu-hXFhXF6CJOJQJaJmHnHu7jhXFhXF0J6CJOJQJUaJmHnHujhXFhXF0J6CJOJQJUaJmHnHu.hXFhXF0J6CJOJQJaJmHnHu6 7 8 Y Z t u v w x y z yZyyB,hXFhXF6CJOJQJaJmHnHu.hFhXF6CJOJPJQJaJmHnHujghXFhXF6CJOJQJUaJmHnHu6jhXFhXF6CJOJQJUaJmHnHu-hXFhXF6CJOJQJaJmHnHu.hXFhXF0J6CJOJQJaJmHnHu7jhXFhXF0J6CJOJQJUaJmHnHujhXFhXF0J6CJOJQJUaJmHnHu yZyyB,hXFhXF6CJOJQJaJmHnHu.hFhXF6CJOJPJQJaJmHnHujhXFhXF6CJOJQJUaJmHnHu6jhXFhXF6CJOJQJUaJmHnHu-hXFhXF6CJOJQJaJmHnHu.hXFhXF0J6CJOJQJaJmHnHu7jhXFhXF0J6CJOJQJUaJmHnHujhXFhXF0J6CJOJQJUaJmHnHu ( ) B C D F G H I J K f g yZyyB,hXFhXF6CJOJQJaJmHnHu.hFhXF6CJOJPJQJaJmHnHujShXFhXF6CJOJQJUaJmHnHu6jhXFhXF6CJOJQJUaJmHnHu-hXFhXF6CJOJQJaJmHnHu.hXFhXF0J6CJOJQJaJmHnHu7jhXFhXF0J6CJOJQJUaJmHnHujhXFhXF0J6CJOJQJUaJmHnHug h i yZyyB,hXFhXF6CJOJQJaJmHnHu.hFhXF6CJOJPJQJaJmHnHujIhXFhXF6CJOJQJUaJmHnHu6jhXFhXF6CJOJQJUaJmHnHu-hXFhXF6CJOJQJaJmHnHu.hXFhXF0J6CJOJQJaJmHnHu7jhXFhXF0J6CJOJQJUaJmHnHujhXFhXF0J6CJOJQJUaJmHnHuI o gddgd agd dagd mpdagd mpdgdmpdgd ./yZyyB,hXFhXF6CJOJQJaJmHnHu.hFhXF6CJOJPJQJaJmHnHujhXFhXF6CJOJQJUaJmHnHu6jhXFhXF6CJOJQJUaJmHnHu-hXFhXF6CJOJQJaJmHnHu.hXFhXF0J6CJOJQJaJmHnHu7jhXFhXF0J6CJOJQJUaJmHnHujhXFhXF0J6CJOJQJUaJmHnHu/01MNOhijlmnopqyZyyB,hXFhXF6CJOJQJaJmHnHu.hFhXF6CJOJPJQJaJmHnHuj5hXFhXF6CJOJQJUaJmHnHu6jhXFhXF6CJOJQJUaJmHnHu-hXFhXF6CJOJQJaJmHnHu.hXFhXF0J6CJOJQJaJmHnHu7jhXFhXF0J6CJOJQJUaJmHnHujhXFhXF0J6CJOJQJUaJmHnHuyZyyB,hXFhXF6CJOJQJaJmHnHu.hFhXF6CJOJPJQJaJmHnHujhXFhXF6CJOJQJUaJmHnHu6jhXFhXF6CJOJQJUaJmHnHu-hXFhXF6CJOJQJaJmHnHu.hXFhXF0J6CJOJQJaJmHnHu7jhXFhXF0J6CJOJQJUaJmHnHujhXFhXF0J6CJOJQJUaJmHnHuyZyyB-(jhXFhx6CJOJQJUaJ.hFhXF6CJOJPJQJaJmHnHuj hXFhXF6CJOJQJUaJmHnHu6jhXFhXF6CJOJQJUaJmHnHu-hXFhXF6CJOJQJaJmHnHu.hXFhXF0J6CJOJQJaJmHnHu7jhXFhXF0J6CJOJQJUaJmHnHujhXFhXF0J6CJOJQJUaJmHnHu
xyL@P
jxghx))),,5,tthZhZCJOJQJaJhZCJOJQJaJhHmhHmCJOJQJaJhHmCJOJQJaJh h h CJOJQJaJh h PJhjheCJOJQJaJh CJOJQJaJhjhx5CJOJQJaJhjhxCJOJQJaJ-5,---00Q01111222334556666995@6@D@@AAAAJCKCCDDDFFHIIIJJJKKKLLLINWNOOSSSVVWWhHmBCJOJQJaJphh h BCJOJQJaJphh h PJhHmhHmCJOJQJaJhHmCJOJQJaJh h CJOJQJaJ@11J5r@AIIVVDbfkkvcxdxexdgd d78Hgd
dgd d78Hgd gddgd WWXXXZZZDb)aa7aObPbbc_cocddeefhhhkkkkkkbxcxdxexyiyh h 5CJOJQJaJh h CJOJQJaJ(h h 5BCJOJQJaJphh h PJhZhZBCJOJQJaJphhZBCJOJQJaJphhHmBCJOJQJaJphh h BCJOJQJaJphhHmhHmBCJOJQJaJph)exfxqxrxx yyyQyjylypyyyy5zIzJzzzzzzzkVkkVkVkDhehDCJOJPJQJaJ)hhD6CJOJPJQJaJhhDCJOJPJQJaJ)hPhhD6CJOJPJQJaJhPhhDCJOJPJQJaJhDCJOJPJQJaJ)hhD6CJOJPJQJaJhhDCJOJPJQJaJhjhCJOJQJaJhjhx5aJhjhxaJexqxrxyyJzzd 34gdagdxdgd mp0d0gd mpgdagd mpxzB_cdiTiTiEhjhICJOJQJaJ)h1ShD6CJOJPJQJaJh1ShDCJOJPJQJaJ)h4hD6CJOJPJQJaJh4hDCJOJPJQJaJ)hPhhD6CJOJPJQJaJhPhhDCJOJPJQJaJhDCJOJPJQJaJhehDCJOJPJQJaJ)hehD6CJOJPJQJaJ
./123456hjhICJOJQJaJhhDCJOJQJaJmHnHuhhxCJOJQJaJjhhxCJOJQJUaJhh)CJOJQJaJh CJOJQJaJhFjhFU456dgd mp5 01hpj/ DyK
_Toc20637220DyK
_Toc20637220DyK
_Toc20637221DyK
_Toc20637221DyK
_Toc20637222DyK
_Toc20637222DyK
_Toc20637223DyK
_Toc20637223DyK
_Toc20637224DyK
_Toc20637224DyK
_Toc20637225DyK
_Toc20637225DyK
_Toc20637226DyK
_Toc20637226DyK
_Toc20637227DyK
_Toc20637227DyK
_Toc20637228DyK
_Toc20637228DyK
_Toc20637229DyK
_Toc20637229j666666666vvvvvvvvv6666666666666666666666666666666666666666666666666666666hH6666666666666666666666666666666666666666666666666666666666666666662 0@Pp2( 0@Pp 0@Pp 0@Pp 0@Pp 0@Pp 0@Pp8XV OJPJQJ_HmH nH sH tH JJNormaldCJ_HaJmH sH tH dd Heading 1d@56CJKH OJPJQJaJ Z@Zx Heading 3@5CJOJPJQJJaJDADDefault Paragraph FontRiR0Table Normal4 l4a(k (
0No List4@4xHeader
4 4xFooter
RoRxHeader CharCJOJPJQJ_HaJmH sH tH VoVHeading 1 Char56CJKH OJPJQJaJ Ro1RxHeading 3 Char5CJOJPJQJJaJV AVxpTOC Heading@ BCJKHaJph6_@
ipTOC 1
dhmpFF
ipTOC 3
dhmp6Uq6x0 HyperlinkBphD@D
0Normal (Web)CJOJQJaJPKContent_Types.xmlN0EH-J@ULTB l,3rJBG7OVa(7IRpgLr85vuQ8CX6NJCFB..YTe55 _g -Yl6NPK6_rels/.relsj0Qv/C/(hO Chvxp_P1H0ORBdJE4bq_6LR70O,En7Lib/SePKkytheme/theme/themeManager.xmlM @w7c(EbCA7K
Y,
e.,H,lxIsQ ,jGW)E 8PK0C)theme/theme/theme1.xmlYOo6w tocvu-MniP@Iama4lGRX6)OrCy@/yH)UDbqJX)InEp)liV1MOP6rzgbIguSebORDqu gZolAplxpT0jzAV2Fi@qv5NleXdsjcs7f
W7gJjh(KD-
dXiJ(x(I_TS1EZBmU/xYy5g/GMGeD3Vqq8K)fw9 xrxwrTZaGy8IjbRcXI u3KGnD1NIBs RuKV.ELM2fiVvlu8zH (W
JTeOtHGHYKNPT9/A7qZcqUnwNOi43N)cbJ
uV4(Tn 7_m-UBww_8(/0hFL)7iAs),Qg20ppf
DU4p MDBJlC5 2FhsFYn3E6945Z5k8Fmw-dznZxJZp/P,)KQk5qpN8KGbe
Sd17 paSR
3K4rzQ TTIIvtKcKv5DO@w_nNL9KqgVhn RyUn/HrT
t.T S ZP9giC B,X,I2UWV9lkAjAP79sYMChfooY1kyVV5E8Vk80X4D)fv
uxA@T_q64)kuV7ti9s9x,-45xd8d/YtLILJ -Gt/PK
theme/theme/_rels/themeManager.xml.relsM 0woo5
6Q
,.aic21hqm@RNdo7gK(MR(.1rJT8VAHubP8g/QAs(LPK-Content_Types.xmlPK-60_rels/.relsPK-kytheme/theme/themeManager.xmlPK-0C)theme/theme/theme1.xmlPK-
theme/theme/_rels/themeManager.xml.relsPK xml version1.0 encodingUTF-8 standaloneyes
aclrMap xmlnsahttp//schemas.openxmlformats.org/drawingml/2006/main bg1lt1 tx1dk1 bg2lt2 tx2dk2 accent1accent1 accent2accent2 accent3accent3 accent4accent4 accent5accent5 accent6accent6 hlinkhlink folHlinkfolHlink/6u 1111146 g /5,Wex6ABCDEFHIJKLMOPRSI ex46@GNQTi7Zuwxz(CFGIh0Nilmo6u
XXXXXXXXXX.48@0( B S _Toc20637220_Toc20637221_Toc20637222_Toc20637223_Toc20637224_Toc20637225_Toc20637226_Toc20637227_Toc20637228_Toc20637229)8ANDXcfp7u )9ANXcpp7uAIiq(.BLD(J(--..2D2AADDGGKKRRTTh_aiaccBgLgggrpypqqrrrrrrs sssssqtwtuuuu uuuuu4u7u3((.._AAKKTTccpppp7qPqQqqqqqqqDrErIrrrrrr)sssssssssBtcttttuuuuu uuuuu4u7u33333333333333333333333333333i5(Q())J-J-..6658D8NNNNTUbXbXccrprpqqrrssssdtdtuuuuuuuu uuuuuuu4u7ui67gh/05(Q())J-J-..6658D8NNNNTUbXbXccrprpqqrrssssdtdtuuuuuuuuu uuuuuu3u3u4u7ueii-ke1ilx2J5AtjAtJRKetvetfbkketAtQ620 Fb-,4w64XFL1SUiPhJkOtwx DuZ(lRgZm)h5Hm8Xedzxwdmeyj
Iuu@uuuu6u@UnknownGAx Times New Roman5Symbol3.Cx Arial7.@ Calibri7@CambriaABCambria Mathqh3Xryvcvcn24tt3QHP PgZ2xxmuhammadtehreemXYZOh0l (4
@LTdmuhammadtehreemNormalXYZ23Microsoft Office Word@
@@y@svvc.,D.,,hp
tTitlel 8@_PID_HLINKSA18
_Toc2063722912
_Toc206372281,
_Toc206372271
_Toc206372261
_Toc206372251
_Toc206372241
_Toc206372231
_Toc206372221
_Toc206372211
_Toc20637220
(),-./0123456789@ABCDEFGHIJKLMNOPQRSTUWXYZ_abcdefghijklmnopqrtuvwxyzRoot Entry FYsvData V1Table)WordDocument 7SummaryInformation(sDocumentSummaryInformation8MsoDataStorep.AsvVsvKSQEKB5OZTJQ2p.AsvVsvItem PropertiesUCompObj r bSources SelectedStyleAPA.XSL StyleNameAPA xmlnsbhttp//schemas.openxmlformats.org/officeDocument/2006/bibliography xmlnshttp//schemas.openxmlformats.org/officeDocument/2006/bibliography/bSources
xml version1.0 encodingUTF-8 standaloneno
dsdatastoreItem dsitemIDDDAEA488-2101-4B8A-8A06-F7CEBD94C9A1 xmlnsdshttp//schemas.openxmlformats.org/officeDocument/2006/customXmldsschemaRefsdsschemaRef dsurihttp//schemas.openxmlformats.org/officeDocument/2006/bibliography//dsschemaRefs/dsdatastoreItem F Microsoft Word 97-2003 Document MSWordDocWord.Document.89q
More Subjects
Join our mailing list
© All Rights Reserved 2024