Access the full text.
Sign up today, get DeepDyve free for 14 days.
(2020)
Response to COVID-19 in TaiwanJAMA, 323
(2020)
Management support model for information technology outsourcingJ. Glob. Inf. Manag. (JGIM), 28
(Lioliou, E., Willcocks, L.P.: Exploring outsourcing, governance, and discourse. In: Global Outsourcing Discourse: Exploring Modes of IT Governance, pp. 1–19. Palgrave Macmillan, Cham. 10.1007/978-3-319-74045-4_1 (2019))
Lioliou, E., Willcocks, L.P.: Exploring outsourcing, governance, and discourse. In: Global Outsourcing Discourse: Exploring Modes of IT Governance, pp. 1–19. Palgrave Macmillan, Cham. 10.1007/978-3-319-74045-4_1 (2019)Lioliou, E., Willcocks, L.P.: Exploring outsourcing, governance, and discourse. In: Global Outsourcing Discourse: Exploring Modes of IT Governance, pp. 1–19. Palgrave Macmillan, Cham. 10.1007/978-3-319-74045-4_1 (2019), Lioliou, E., Willcocks, L.P.: Exploring outsourcing, governance, and discourse. In: Global Outsourcing Discourse: Exploring Modes of IT Governance, pp. 1–19. Palgrave Macmillan, Cham. 10.1007/978-3-319-74045-4_1 (2019)
(2012)
Security risks in service offshoring and outsourcingInd. Manag. Data Syst., 112
(2010)
Data leakage in ICT outsourcing: risks and countermeasuresJ. Inf. Commun. Technol., 9
(Chowdhary, K.R.: Natural language processing. In: Fundamentals of Artificial Intelligence, pp. 603–649. Springer, New Delhi. 10.1007/978-81-322-3972-7_19 (2020))
Chowdhary, K.R.: Natural language processing. In: Fundamentals of Artificial Intelligence, pp. 603–649. Springer, New Delhi. 10.1007/978-81-322-3972-7_19 (2020)Chowdhary, K.R.: Natural language processing. In: Fundamentals of Artificial Intelligence, pp. 603–649. Springer, New Delhi. 10.1007/978-81-322-3972-7_19 (2020), Chowdhary, K.R.: Natural language processing. In: Fundamentals of Artificial Intelligence, pp. 603–649. Springer, New Delhi. 10.1007/978-81-322-3972-7_19 (2020)
(2019)
A framework for cloud security risk management based on the business objectives of organisationsInt. J. Adv. Comput. Sci. Appl., 10
(Janssens, D.: Natural language processing in requirements elicitation and requirements analysis: a systematic literature review. Department of Information and Computing Sciences, Utrecht University (2019))
Janssens, D.: Natural language processing in requirements elicitation and requirements analysis: a systematic literature review. Department of Information and Computing Sciences, Utrecht University (2019)Janssens, D.: Natural language processing in requirements elicitation and requirements analysis: a systematic literature review. Department of Information and Computing Sciences, Utrecht University (2019), Janssens, D.: Natural language processing in requirements elicitation and requirements analysis: a systematic literature review. Department of Information and Computing Sciences, Utrecht University (2019)
(ISO: ISO 37500:2014 Guidance on outsourcing. International Organization for Standardization, Geneva, Switzerland (2014))
ISO: ISO 37500:2014 Guidance on outsourcing. International Organization for Standardization, Geneva, Switzerland (2014)ISO: ISO 37500:2014 Guidance on outsourcing. International Organization for Standardization, Geneva, Switzerland (2014), ISO: ISO 37500:2014 Guidance on outsourcing. International Organization for Standardization, Geneva, Switzerland (2014)
(Guion, L.A., Diehl, D.C., McDonald, D.: Triangulation: establishing the validity of qualitative studies. EDIS 2011(8), 3 (2011))
Guion, L.A., Diehl, D.C., McDonald, D.: Triangulation: establishing the validity of qualitative studies. EDIS 2011(8), 3 (2011)Guion, L.A., Diehl, D.C., McDonald, D.: Triangulation: establishing the validity of qualitative studies. EDIS 2011(8), 3 (2011), Guion, L.A., Diehl, D.C., McDonald, D.: Triangulation: establishing the validity of qualitative studies. EDIS 2011(8), 3 (2011)
(2019)
Foundations for measuring IT-outsourcing success and failureJ. Syst. Softw., 156
(Plotkin, D., Tweardy, R.J.: Global Outsourcing survey Deloitte, Online report (2018))
Plotkin, D., Tweardy, R.J.: Global Outsourcing survey Deloitte, Online report (2018)Plotkin, D., Tweardy, R.J.: Global Outsourcing survey Deloitte, Online report (2018), Plotkin, D., Tweardy, R.J.: Global Outsourcing survey Deloitte, Online report (2018)
(Qiu, S., Liu, Q., Zhou, S., Wu, C.: Review of artificial intelligence adversarial attack and defense technologies. Appl. Sci. 9(5), 909(2019))
Qiu, S., Liu, Q., Zhou, S., Wu, C.: Review of artificial intelligence adversarial attack and defense technologies. Appl. Sci. 9(5), 909(2019)Qiu, S., Liu, Q., Zhou, S., Wu, C.: Review of artificial intelligence adversarial attack and defense technologies. Appl. Sci. 9(5), 909(2019), Qiu, S., Liu, Q., Zhou, S., Wu, C.: Review of artificial intelligence adversarial attack and defense technologies. Appl. Sci. 9(5), 909(2019)
(2020)
The impact of transaction attributes on logistics outsourcing success: a moderated mediation modelInt. J. Prod. Econ., 219
(2012)
International R&D service outsourcing by technology-intensive firms: Whether and where?J. Int. Manag., 18
(2010)
Offshore supplier relations: knowledge integration among small businessesStrat. Outsourc. Int. J., 3
(2016)
Strategic outsourcing with technology transfer under price competitionInt. Rev. Econ. Finance, 44
(2019)
A privacy-preserving distributed filtering framework for NLP artifactsBMC Med. Inf. Decis. Mak., 19
(Zhang, N., Mi, X., Feng, X., Wang, X., Tian, Y., & Qian, F.: Dangerous skills: Understanding and mitigating security risks of voice-controlled third-party functions on virtual personal assistant systems. In: Symposium on Security and Privacy, IEEE, pp. 1381–1396 (2019))
Zhang, N., Mi, X., Feng, X., Wang, X., Tian, Y., & Qian, F.: Dangerous skills: Understanding and mitigating security risks of voice-controlled third-party functions on virtual personal assistant systems. In: Symposium on Security and Privacy, IEEE, pp. 1381–1396 (2019)Zhang, N., Mi, X., Feng, X., Wang, X., Tian, Y., & Qian, F.: Dangerous skills: Understanding and mitigating security risks of voice-controlled third-party functions on virtual personal assistant systems. In: Symposium on Security and Privacy, IEEE, pp. 1381–1396 (2019), Zhang, N., Mi, X., Feng, X., Wang, X., Tian, Y., & Qian, F.: Dangerous skills: Understanding and mitigating security risks of voice-controlled third-party functions on virtual personal assistant systems. In: Symposium on Security and Privacy, IEEE, pp. 1381–1396 (2019)
(2019)
How vendor capabilities impact IT outsourcing performanceJ. Enterp. Inf. Manag., 32
(2009)
Information systems outsourcing life cycle and risks analysisComput. Stand. Interfaces, 31
(Feyisetan, O., Ghanavati, S., Thaine, P.: Workshop on privacy in NLP. In: 13th International Conference on Web Search and Data Mining, ACM, pp. 903–904 (2020))
Feyisetan, O., Ghanavati, S., Thaine, P.: Workshop on privacy in NLP. In: 13th International Conference on Web Search and Data Mining, ACM, pp. 903–904 (2020)Feyisetan, O., Ghanavati, S., Thaine, P.: Workshop on privacy in NLP. In: 13th International Conference on Web Search and Data Mining, ACM, pp. 903–904 (2020), Feyisetan, O., Ghanavati, S., Thaine, P.: Workshop on privacy in NLP. In: 13th International Conference on Web Search and Data Mining, ACM, pp. 903–904 (2020)
(Shropshire, J.: Natural language processing as a weapon. In: Proceedings of the 13th Pre-ICIS Workshop on Information Security and Privacy, AIS Electronic Library (AISeL) (2018))
Shropshire, J.: Natural language processing as a weapon. In: Proceedings of the 13th Pre-ICIS Workshop on Information Security and Privacy, AIS Electronic Library (AISeL) (2018)Shropshire, J.: Natural language processing as a weapon. In: Proceedings of the 13th Pre-ICIS Workshop on Information Security and Privacy, AIS Electronic Library (AISeL) (2018), Shropshire, J.: Natural language processing as a weapon. In: Proceedings of the 13th Pre-ICIS Workshop on Information Security and Privacy, AIS Electronic Library (AISeL) (2018)
(Al-Hawari, F., Barham, H.: A machine learning based help desk system for IT service management’ J. King Saud Univ. Comput. Inf. Sci. 17. (2019) (Article in Press))
Al-Hawari, F., Barham, H.: A machine learning based help desk system for IT service management’ J. King Saud Univ. Comput. Inf. Sci. 17. (2019) (Article in Press)Al-Hawari, F., Barham, H.: A machine learning based help desk system for IT service management’ J. King Saud Univ. Comput. Inf. Sci. 17. (2019) (Article in Press), Al-Hawari, F., Barham, H.: A machine learning based help desk system for IT service management’ J. King Saud Univ. Comput. Inf. Sci. 17. (2019) (Article in Press)
(Chambers, N., Fry, B., McMasters, J.: Detecting denial-of-service attacks from social media text: applying nlp to computer security. In: Conference of the North American Chapter of the Association for Computational Linguistics: Human Language Technologies, pp. 1626–1635 (2018))
Chambers, N., Fry, B., McMasters, J.: Detecting denial-of-service attacks from social media text: applying nlp to computer security. In: Conference of the North American Chapter of the Association for Computational Linguistics: Human Language Technologies, pp. 1626–1635 (2018)Chambers, N., Fry, B., McMasters, J.: Detecting denial-of-service attacks from social media text: applying nlp to computer security. In: Conference of the North American Chapter of the Association for Computational Linguistics: Human Language Technologies, pp. 1626–1635 (2018), Chambers, N., Fry, B., McMasters, J.: Detecting denial-of-service attacks from social media text: applying nlp to computer security. In: Conference of the North American Chapter of the Association for Computational Linguistics: Human Language Technologies, pp. 1626–1635 (2018)
(2017)
Information security concerns in IT outsourcing: identifying (in) congruence between clients and vendorsInf. Manag., 54
(Creswell, J.W., Creswell, J.D.: Research Sesign: Qualitative, Quantitative, and Mixed Methods Approaches, 5h edn. SAGE Publications, Inc., Thousand Oaks (2018))
Creswell, J.W., Creswell, J.D.: Research Sesign: Qualitative, Quantitative, and Mixed Methods Approaches, 5h edn. SAGE Publications, Inc., Thousand Oaks (2018)Creswell, J.W., Creswell, J.D.: Research Sesign: Qualitative, Quantitative, and Mixed Methods Approaches, 5h edn. SAGE Publications, Inc., Thousand Oaks (2018), Creswell, J.W., Creswell, J.D.: Research Sesign: Qualitative, Quantitative, and Mixed Methods Approaches, 5h edn. SAGE Publications, Inc., Thousand Oaks (2018)
(2007)
The qualitative interview in IS research: examining the craftInf. Organ., 17
(Bhatti, B.M., Mubarak, S., Nagalingam, S.: A framework for information security risk management in IT outsourcing. In: Australasian Conference on Information Systems (ACIS) (2017))
Bhatti, B.M., Mubarak, S., Nagalingam, S.: A framework for information security risk management in IT outsourcing. In: Australasian Conference on Information Systems (ACIS) (2017)Bhatti, B.M., Mubarak, S., Nagalingam, S.: A framework for information security risk management in IT outsourcing. In: Australasian Conference on Information Systems (ACIS) (2017), Bhatti, B.M., Mubarak, S., Nagalingam, S.: A framework for information security risk management in IT outsourcing. In: Australasian Conference on Information Systems (ACIS) (2017)
(2013)
Disclosure of outsourcing in the annual report: causes and market returns effectsInt. J. Account. Inf. Syst., 13
(2020)
Artificial intelligence in the cyber domain: offense and defenseSymmetry, 12
(2016)
Determinant factors of cloud-sourcing decisions: reflecting on the IT outsourcing literature in the era of cloud computingJ Inf Technol, 31
S Kvale (2007)
10.4135/9781849208963Doing Interviews: The SAGE Qualitative Research Kit
(1991)
Comparative economic organization: the analysis of discreteAdm. Sci. Q., 36
(Bhatti, B.M., Mubarak, S., Nagalingam, S.: Information security implications of machine-learning-based automation in ITO service delivery—an agency theory perspective. In: International Conference on Neural Information Processing, pp. 487–498. Springer (2020))
Bhatti, B.M., Mubarak, S., Nagalingam, S.: Information security implications of machine-learning-based automation in ITO service delivery—an agency theory perspective. In: International Conference on Neural Information Processing, pp. 487–498. Springer (2020)Bhatti, B.M., Mubarak, S., Nagalingam, S.: Information security implications of machine-learning-based automation in ITO service delivery—an agency theory perspective. In: International Conference on Neural Information Processing, pp. 487–498. Springer (2020), Bhatti, B.M., Mubarak, S., Nagalingam, S.: Information security implications of machine-learning-based automation in ITO service delivery—an agency theory perspective. In: International Conference on Neural Information Processing, pp. 487–498. Springer (2020)
(Baldwin, R., Tomiura, E.: Thinking ahead about the trade impact of COVID-19. In: Economics in the Time of COVID-19, pp. 59–71. Centre for Economic Policy Research (CEPR) Press, London, UK, (2020))
Baldwin, R., Tomiura, E.: Thinking ahead about the trade impact of COVID-19. In: Economics in the Time of COVID-19, pp. 59–71. Centre for Economic Policy Research (CEPR) Press, London, UK, (2020)Baldwin, R., Tomiura, E.: Thinking ahead about the trade impact of COVID-19. In: Economics in the Time of COVID-19, pp. 59–71. Centre for Economic Policy Research (CEPR) Press, London, UK, (2020), Baldwin, R., Tomiura, E.: Thinking ahead about the trade impact of COVID-19. In: Economics in the Time of COVID-19, pp. 59–71. Centre for Economic Policy Research (CEPR) Press, London, UK, (2020)
(2018)
Reasons of using IT outsourcing (ITO)—polish-Spanish cross-cultural analysisFound. Manag., 10
(Winter, K., Rinderle-Ma, S.: Detecting constraints and their relations from regulatory documents using nlp techniques. In: OTM Confederated International Conferences “On the Move to Meaningful Internet Systems”, pp. 261–278. Springer (2018))
Winter, K., Rinderle-Ma, S.: Detecting constraints and their relations from regulatory documents using nlp techniques. In: OTM Confederated International Conferences “On the Move to Meaningful Internet Systems”, pp. 261–278. Springer (2018)Winter, K., Rinderle-Ma, S.: Detecting constraints and their relations from regulatory documents using nlp techniques. In: OTM Confederated International Conferences “On the Move to Meaningful Internet Systems”, pp. 261–278. Springer (2018), Winter, K., Rinderle-Ma, S.: Detecting constraints and their relations from regulatory documents using nlp techniques. In: OTM Confederated International Conferences “On the Move to Meaningful Internet Systems”, pp. 261–278. Springer (2018)
(2016)
Information systems outsourcing reasons and risks: review and evolutionJ. Glob. Inf. Technol. Manag., 19
(Mathews, S.M.: Explainable artificial intelligence applications in NLP, biomedical, and malware classification: a literature review. In: Arai, K., Bhatia, R., Kapoor, S. (eds.) Intelligent Computing, pp. 1269–1292. Springer (2019))
Mathews, S.M.: Explainable artificial intelligence applications in NLP, biomedical, and malware classification: a literature review. In: Arai, K., Bhatia, R., Kapoor, S. (eds.) Intelligent Computing, pp. 1269–1292. Springer (2019)Mathews, S.M.: Explainable artificial intelligence applications in NLP, biomedical, and malware classification: a literature review. In: Arai, K., Bhatia, R., Kapoor, S. (eds.) Intelligent Computing, pp. 1269–1292. Springer (2019), Mathews, S.M.: Explainable artificial intelligence applications in NLP, biomedical, and malware classification: a literature review. In: Arai, K., Bhatia, R., Kapoor, S. (eds.) Intelligent Computing, pp. 1269–1292. Springer (2019)
(Moiseev, A.: How Outsourcing Creates Cybersecurity Budget, Expertise Options. Channel Futures, channelfutures.com. viewed 21 February 2020 (2020))
Moiseev, A.: How Outsourcing Creates Cybersecurity Budget, Expertise Options. Channel Futures, channelfutures.com. viewed 21 February 2020 (2020)Moiseev, A.: How Outsourcing Creates Cybersecurity Budget, Expertise Options. Channel Futures, channelfutures.com. viewed 21 February 2020 (2020), Moiseev, A.: How Outsourcing Creates Cybersecurity Budget, Expertise Options. Channel Futures, channelfutures.com. viewed 21 February 2020 (2020)
(2020)
Improving the reliability of deep neural networks in NLP: a reviewKnowl. Based Syst., 191
(Buber, E., Diri, B., Sahingoz, O.K.: NLP based phishing attack detection from URLs. In: International Conference on Intelligent Systems Design and Applications, pp. 608–618. Springer (2017))
Buber, E., Diri, B., Sahingoz, O.K.: NLP based phishing attack detection from URLs. In: International Conference on Intelligent Systems Design and Applications, pp. 608–618. Springer (2017)Buber, E., Diri, B., Sahingoz, O.K.: NLP based phishing attack detection from URLs. In: International Conference on Intelligent Systems Design and Applications, pp. 608–618. Springer (2017), Buber, E., Diri, B., Sahingoz, O.K.: NLP based phishing attack detection from URLs. In: International Conference on Intelligent Systems Design and Applications, pp. 608–618. Springer (2017)
(Wulf, F., Strahringer, S., Westner, M.: Information security risks, benefits, and mitigation measures in cloud sourcing. In: 21st Conference on Business Informatics, IEEE, pp. 258–267 (2019))
Wulf, F., Strahringer, S., Westner, M.: Information security risks, benefits, and mitigation measures in cloud sourcing. In: 21st Conference on Business Informatics, IEEE, pp. 258–267 (2019)Wulf, F., Strahringer, S., Westner, M.: Information security risks, benefits, and mitigation measures in cloud sourcing. In: 21st Conference on Business Informatics, IEEE, pp. 258–267 (2019), Wulf, F., Strahringer, S., Westner, M.: Information security risks, benefits, and mitigation measures in cloud sourcing. In: 21st Conference on Business Informatics, IEEE, pp. 258–267 (2019)
(2017)
An investigation into the factors influencing the outsourcing decision of e-banking services. A multi-perspective frameworkJ. Glob. Oper. Strat. Sourc., 10
(2011)
The good aspects of managing an organization with an outsourcing and subcontracting strategyInt. J. Manag. Inf. Syst., 15
(2019)
A taxonomy and survey of attacks against machine learningComput. Sci. Rev., 34
(2021)
Rejecting the Transatlantic outsourcing of data protection in the face of unrestrained surveillanceCamb. Law J., 80
(Tarsh, S., Tweardy, R., Smith, J., Plotkin, D., D & Kinsella, D.: Global Outsourcing Survey. Deloitte, Online report (2016))
Tarsh, S., Tweardy, R., Smith, J., Plotkin, D., D & Kinsella, D.: Global Outsourcing Survey. Deloitte, Online report (2016)Tarsh, S., Tweardy, R., Smith, J., Plotkin, D., D & Kinsella, D.: Global Outsourcing Survey. Deloitte, Online report (2016), Tarsh, S., Tweardy, R., Smith, J., Plotkin, D., D & Kinsella, D.: Global Outsourcing Survey. Deloitte, Online report (2016)
(2019)
A framework for risk assessment, management and evaluation: Economic tool for quantifying risks in supply chainFuture Gener. Comput. Syst., 90
(Moradlou, H., Fratocchi, L., Skipworth, H., Ghadge, A.: Post-Brexit back-shoring strategies: What UK manufacturing companies could learn from the past? Prod. Plan. Control. 10.1080/09537287.2020.1863500 (2021))
Moradlou, H., Fratocchi, L., Skipworth, H., Ghadge, A.: Post-Brexit back-shoring strategies: What UK manufacturing companies could learn from the past? Prod. Plan. Control. 10.1080/09537287.2020.1863500 (2021)Moradlou, H., Fratocchi, L., Skipworth, H., Ghadge, A.: Post-Brexit back-shoring strategies: What UK manufacturing companies could learn from the past? Prod. Plan. Control. 10.1080/09537287.2020.1863500 (2021), Moradlou, H., Fratocchi, L., Skipworth, H., Ghadge, A.: Post-Brexit back-shoring strategies: What UK manufacturing companies could learn from the past? Prod. Plan. Control. 10.1080/09537287.2020.1863500 (2021)
V Braun, V Clarke, N Hayfield, G Terry (2019)
10.1007/978-981-10-5251-4_103Thematic Analysis
(Quaglietta, J., Alvord, D.: Coronavirus Impact on Service Delivery Continuity, Employees and Customers. Gartner Information Technology Research. viewed 12 March 2020 (2020))
Quaglietta, J., Alvord, D.: Coronavirus Impact on Service Delivery Continuity, Employees and Customers. Gartner Information Technology Research. viewed 12 March 2020 (2020)Quaglietta, J., Alvord, D.: Coronavirus Impact on Service Delivery Continuity, Employees and Customers. Gartner Information Technology Research. viewed 12 March 2020 (2020), Quaglietta, J., Alvord, D.: Coronavirus Impact on Service Delivery Continuity, Employees and Customers. Gartner Information Technology Research. viewed 12 March 2020 (2020)
(2020)
Natural language processing (NLP) in management research: a literature reviewJ. Manag. Anal., 7
(2010)
Sample size and saturation in PhD studies using qualitative interviewsForum Qual. Soc. Res., 11
(Russell, R., Kim, L., Hamilton, L., Lazovich, T., Harer, J., Ozdemir, O., Ellingwood, P., McConley, M.: Automated vulnerability detection in source code using deep representation learning. In: 17th International Conference on Machine Learning and Applications, IEEE, pp. 757–762 (2018))
Russell, R., Kim, L., Hamilton, L., Lazovich, T., Harer, J., Ozdemir, O., Ellingwood, P., McConley, M.: Automated vulnerability detection in source code using deep representation learning. In: 17th International Conference on Machine Learning and Applications, IEEE, pp. 757–762 (2018)Russell, R., Kim, L., Hamilton, L., Lazovich, T., Harer, J., Ozdemir, O., Ellingwood, P., McConley, M.: Automated vulnerability detection in source code using deep representation learning. In: 17th International Conference on Machine Learning and Applications, IEEE, pp. 757–762 (2018), Russell, R., Kim, L., Hamilton, L., Lazovich, T., Harer, J., Ozdemir, O., Ellingwood, P., McConley, M.: Automated vulnerability detection in source code using deep representation learning. In: 17th International Conference on Machine Learning and Applications, IEEE, pp. 757–762 (2018)
Information technology outsourcing (ITO) is a USD multi-trillion industry. There is growing competition among ITO service providers to improve their service deliveries. Natural language processing (NLP) is a technique, which can be leveraged to gain a competitive advantage in the ITO industry. This paper explores the information security implications of using NLP in ITO. First, it explores the use of NLP to enhance information security risk management (ISRM) in ITO. Then, it delves into the information security risks (ISRs) that may arise from the use of NLP in ITO. Finally, it proposes possible ISRM approaches to address those ISRs in ITO from the use of NLP. The study follows a qualitative approach using the case study method. Nine participants from three organisations (an ITO client, service provider and sub-contractor) engaged in an ITO relationship in the ICT industry were interviewed through a semi-structured questionnaire. The research findings were verified through a focus group. Case study scenarios are provided for a clear understanding of the findings. To the best of our knowledge, it is the first study to investigate the information security implications of the use of NLP in ITO.
Automated Software Engineering – Springer Journals
Published: Jul 16, 2021
Keywords: Information security risk (ISR); Information security risk management (ISRM); Information technology outsourcing (ITO); Natural language processing (NLP)
Read and print from thousands of top scholarly journals.
Already have an account? Log in
Bookmark this article. You can see your Bookmarks on your DeepDyve Library.
To save an article, log in first, or sign up for a DeepDyve account if you don’t already have one.
Copy and paste the desired citation format or use the link below to download a file formatted for EndNote
Access the full text.
Sign up today, get DeepDyve free for 14 days.
All DeepDyve websites use cookies to improve your online experience. They were placed on your computer when you launched this website. You can change your cookie settings through your browser.