{"id":11446,"date":"2019-07-24T05:55:51","date_gmt":"2019-07-24T09:55:51","guid":{"rendered":"https:\/\/www.m2sys.com\/blog\/?p=11446"},"modified":"2022-06-20T02:37:52","modified_gmt":"2022-06-20T06:37:52","slug":"3-sign-your-are-following-wrong-student-identification-system","status":"publish","type":"post","link":"https:\/\/www.m2sys.com\/blog\/e-governance\/3-sign-your-are-following-wrong-student-identification-system\/","title":{"rendered":"3 Signs You Are Following the Wrong Student Identification System"},"content":{"rendered":"<p><span style=\"font-weight: 400;\">How do you identify your student? Is it the right way? Or it has loopholes that can easily be breached or manipulated. Here are the 3 signs which indicate that you are following the wrong student identification system. Let\u2019s check it out.<\/span><\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\" wp-image-11447 alignright\" src=\"https:\/\/www.m2sys.com\/blog\/wp-content\/uploads\/2019\/05\/3-Sign-You-Are-Following-the-Wrong-Student-Identification-System.jpeg\" alt=\"3 Sign You Are Following the Wrong Student Identification System\" width=\"319\" height=\"178\" \/><\/p>\n<h2><b>You are Following Manual Log Book for Student Identification<\/b><\/h2>\n<p><span style=\"font-weight: 400;\">Manual log book for student identification is not accurate and cannot give you authenticate result. A student can falsify their name and ID in the manual log book, and you have no option to cross check. Even if you do that it will be time-consuming. Additionally, manual log book can be manipulated when it comes to calling for attendance.<\/span><\/p>\n<h2><b>You are Using Plastic Id Card for Student Identification<\/b><\/h2>\n<p><span style=\"font-weight: 400;\">Plastic ID cards can be copied and manipulated. Anyone can make a duplicate plastic ID card and pretend to be your student. So, you will have little chance of detecting them if you use the plastic ID card for student identification. Besides this method is costly too. It incurs extra cost on making new ID card every time a new student admit<\/span><\/p>\n<h2><b>RFID Card<\/b><\/h2>\n<p><span style=\"font-weight: 400;\">RFID cards can be copied and manipulated too. Anyone can fool the system. <\/span>This system only identifies the card that is punched not the person who is punching.<span style=\"font-weight: 400;\"> As a result, the student can pass their card to others, or exchange their card to access your facility which required student identification. Besides, this technology can\u2019t create an audit trail, provides convenience and can\u2019t provide effective result. So, if you are still using this RFID system, you are following the wrong method in student identification.<\/span><\/p>\n<h2><b>Best Way to Identify Student <\/b><\/h2>\n<p><span style=\"font-weight: 400;\">Biometric technology is the best way to identify a student. This is the most robust technology right now available in the market. <\/span><a href=\"https:\/\/www.m2sys.com\/blog\/biometric-technology\/what-are-the-different-types-of-biometric-technology\/\"><b>Biometric is the unique attributes of human<\/b><\/a><span style=\"font-weight: 400;\"> which remain unchanged throughout life. Biometric technology uses <\/span><a href=\"https:\/\/www.m2sys.com\/easyscan-pro-fingerprint-device\/\"><b>fingerprint<\/b><\/a><span style=\"font-weight: 400;\">, <\/span><a href=\"https:\/\/www.m2sys.com\/finger-vein-reader\/\"><b>finger vein<\/b><\/a><span style=\"font-weight: 400;\">, <\/span><a href=\"https:\/\/www.m2sys.com\/next-generation-autotilt-desktop-iris-camera\/\"><b>iris recognition<\/b><\/a><span style=\"font-weight: 400;\"> for identification and authentication. This technology is nearly impossible to forge or manipulate.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Moreover, this technology is so efficient that it takes less than a minute to identify. This technology is also cost saving. It<\/span><a href=\"https:\/\/www.m2sys.com\/blog\/schools\/top-10-reasons-to-buy-biometric-based-school-visitor-management-software\/\"><b> saves the administrative cost <\/b><\/a><span style=\"font-weight: 400;\">of making a plastic ID. In a nutshell, adding biometric technology will create a robust student identification system that is cost saving, efficient, accurate and convenient. <\/span><\/p>\n<h2><b>Real Life Example <\/b><\/h2>\n<p><span style=\"font-weight: 400;\">Victory Lutheran College was established in 1992 by the Wodonga Lutheran Parish in partnership with parents, to promote individual growth and responsibility.<\/span><span style=\"font-weight: 400;\">The school authority was suffering from late and absenteeism issues. When students come to class late, it disrupts the flow of a lecture or discussion, distracting other students, impedes learning, and generally erode class morale. Moreover, if left unchecked, lateness usually become chronic and spread throughout the class. To address the problem of late arriving students, Victory Lutheran College selected <\/span><a href=\"https:\/\/www.m2sys.com\/biosnapon\/\"><b>Bio-SnapON<\/b><\/a><span style=\"font-weight: 400;\"> to work in tandem with their existing student attendance tracking software. The technology significantly reduced wait times streamlined the check-in process, and better-managed attendance tracking for their students. <\/span><a href=\"https:\/\/www.m2sys.com\/blog\/case-study-integrating-biometrics-to-track-tardy-students\/\"><b>Read the full case study of Victory Lutheran College<\/b><\/a><\/p>\n<p><span style=\"font-weight: 400;\">Are you facing the same problem as Victory Lutheran College? Do you want to be benefited like them? Contact us with your queries, with over 17 years of expertise in the field of identity management we will surely give you the best solution. <\/span><\/p>\n","protected":false},"excerpt":{"rendered":"<p>How do you identify your student? Is it the right way? Or it has loopholes that can easily be breached<\/p>\n","protected":false},"author":402,"featured_media":15285,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_yoast_wpseo_focuskw":"student identification system","_yoast_wpseo_title":"3 Signs You Are Following the Wrong Student Identification System","_yoast_wpseo_metadesc":"How do you identify your student? Is it the right way? Or it has loopholes that can easily be breached or manipulated. Read this article to know more.","_lmt_disableupdate":"no","_lmt_disable":"no","twitterCardType":"","cardImageID":0,"cardImage":"","cardTitle":"","cardDesc":"","cardImageAlt":"","cardPlayer":"","cardPlayerWidth":0,"cardPlayerHeight":0,"cardPlayerStream":"","cardPlayerCodec":"","footnotes":""},"categories":[1780],"tags":[1300,1299,1298],"class_list":["post-11446","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-e-governance","tag-student-identification","tag-student-identification-method","tag-student-identification-system"],"acf":{"_how_to_content":null,"_faq_content":null,"_structured_meta_data":null,"_tl_dr_content":null},"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v19.6.1 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>3 Signs You Are Following the Wrong Student Identification System<\/title>\n<meta name=\"description\" content=\"How do you identify your student? Is it the right way? Or it has loopholes that can easily be breached or manipulated. Read this article to know more.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.m2sys.com\/blog\/e-governance\/3-sign-your-are-following-wrong-student-identification-system\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"3 Signs You Are Following the Wrong Student Identification System\" \/>\n<meta property=\"og:description\" content=\"How do you identify your student? Is it the right way? Or it has loopholes that can easily be breached or manipulated. Read this article to know more.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.m2sys.com\/blog\/e-governance\/3-sign-your-are-following-wrong-student-identification-system\/\" \/>\n<meta property=\"og:site_name\" content=\"Digital Transformation of Government Services\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/m2sys\" \/>\n<meta property=\"article:published_time\" content=\"2019-07-24T09:55:51+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2022-06-20T06:37:52+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.m2sys.com\/blog\/wp-content\/uploads\/2019\/07\/3-Sign-You-Are-Following-the-Wrong-Student-Identification-System.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"800\" \/>\n\t<meta property=\"og:image:height\" content=\"533\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Fredric Hoffman\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@m2sys\" \/>\n<meta name=\"twitter:site\" content=\"@m2sys\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Fredric Hoffman\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.m2sys.com\/blog\/e-governance\/3-sign-your-are-following-wrong-student-identification-system\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.m2sys.com\/blog\/e-governance\/3-sign-your-are-following-wrong-student-identification-system\/\"},\"author\":{\"name\":\"Fredric Hoffman\",\"@id\":\"https:\/\/www.m2sys.com\/blog\/#\/schema\/person\/0504c34ceeb2808b2d4b2cbd6fb80714\"},\"headline\":\"3 Signs You Are Following the Wrong Student Identification System\",\"datePublished\":\"2019-07-24T09:55:51+00:00\",\"dateModified\":\"2022-06-20T06:37:52+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.m2sys.com\/blog\/e-governance\/3-sign-your-are-following-wrong-student-identification-system\/\"},\"wordCount\":554,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/www.m2sys.com\/blog\/#organization\"},\"keywords\":[\"student identification\",\"student identification method\",\"student identification system\"],\"articleSection\":[\"e-Governance\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/www.m2sys.com\/blog\/e-governance\/3-sign-your-are-following-wrong-student-identification-system\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.m2sys.com\/blog\/e-governance\/3-sign-your-are-following-wrong-student-identification-system\/\",\"url\":\"https:\/\/www.m2sys.com\/blog\/e-governance\/3-sign-your-are-following-wrong-student-identification-system\/\",\"name\":\"3 Signs You Are Following the Wrong Student Identification System\",\"isPartOf\":{\"@id\":\"https:\/\/www.m2sys.com\/blog\/#website\"},\"datePublished\":\"2019-07-24T09:55:51+00:00\",\"dateModified\":\"2022-06-20T06:37:52+00:00\",\"description\":\"How do you identify your student? Is it the right way? Or it has loopholes that can easily be breached or manipulated. Read this article to know more.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.m2sys.com\/blog\/e-governance\/3-sign-your-are-following-wrong-student-identification-system\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.m2sys.com\/blog\/e-governance\/3-sign-your-are-following-wrong-student-identification-system\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.m2sys.com\/blog\/e-governance\/3-sign-your-are-following-wrong-student-identification-system\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"3 Signs You Are Following the Wrong Student Identification System\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.m2sys.com\/blog\/#website\",\"url\":\"https:\/\/www.m2sys.com\/blog\/\",\"name\":\"Digital Transformation of Government Services\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\/\/www.m2sys.com\/blog\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.m2sys.com\/blog\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.m2sys.com\/blog\/#organization\",\"name\":\"Digital Transformation of Government Services\",\"url\":\"https:\/\/www.m2sys.com\/blog\/\",\"sameAs\":[\"https:\/\/instagram.com\/m2sys\",\"https:\/\/www.linkedin.com\/company\/m2sys-technology\",\"https:\/\/www.pinterest.com\/m2sys\/\",\"https:\/\/www.youtube.com\/user\/M2SYS\",\"https:\/\/www.facebook.com\/m2sys\",\"https:\/\/twitter.com\/m2sys\"],\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.m2sys.com\/blog\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.m2sys.com\/blog\/wp-content\/uploads\/2017\/12\/m2sys-blog.png\",\"contentUrl\":\"https:\/\/www.m2sys.com\/blog\/wp-content\/uploads\/2017\/12\/m2sys-blog.png\",\"width\":287,\"height\":48,\"caption\":\"Digital Transformation of Government Services\"},\"image\":{\"@id\":\"https:\/\/www.m2sys.com\/blog\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.m2sys.com\/blog\/#\/schema\/person\/0504c34ceeb2808b2d4b2cbd6fb80714\",\"name\":\"Fredric Hoffman\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.m2sys.com\/blog\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/58790a590d10ba7399cf28dd264668a0?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/58790a590d10ba7399cf28dd264668a0?s=96&d=mm&r=g\",\"caption\":\"Fredric Hoffman\"},\"description\":\"Fredric Hoffman Fredric Hoffman is a digital marketing analyst at M2SYS Technology and a tech enthusiast, he loves analyzing, researching and writing on technology. He believes that adaptation of cutting-edge technology can transform this world into a new shape and make it live worthy for all. View Profile\",\"url\":\"https:\/\/www.m2sys.com\/blog\/author\/noman\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"3 Signs You Are Following the Wrong Student Identification System","description":"How do you identify your student? Is it the right way? Or it has loopholes that can easily be breached or manipulated. Read this article to know more.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.m2sys.com\/blog\/e-governance\/3-sign-your-are-following-wrong-student-identification-system\/","og_locale":"en_US","og_type":"article","og_title":"3 Signs You Are Following the Wrong Student Identification System","og_description":"How do you identify your student? Is it the right way? Or it has loopholes that can easily be breached or manipulated. Read this article to know more.","og_url":"https:\/\/www.m2sys.com\/blog\/e-governance\/3-sign-your-are-following-wrong-student-identification-system\/","og_site_name":"Digital Transformation of Government Services","article_publisher":"https:\/\/www.facebook.com\/m2sys","article_published_time":"2019-07-24T09:55:51+00:00","article_modified_time":"2022-06-20T06:37:52+00:00","og_image":[{"width":800,"height":533,"url":"https:\/\/www.m2sys.com\/blog\/wp-content\/uploads\/2019\/07\/3-Sign-You-Are-Following-the-Wrong-Student-Identification-System.jpg","type":"image\/jpeg"}],"author":"Fredric Hoffman","twitter_card":"summary_large_image","twitter_creator":"@m2sys","twitter_site":"@m2sys","twitter_misc":{"Written by":"Fredric Hoffman","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.m2sys.com\/blog\/e-governance\/3-sign-your-are-following-wrong-student-identification-system\/#article","isPartOf":{"@id":"https:\/\/www.m2sys.com\/blog\/e-governance\/3-sign-your-are-following-wrong-student-identification-system\/"},"author":{"name":"Fredric Hoffman","@id":"https:\/\/www.m2sys.com\/blog\/#\/schema\/person\/0504c34ceeb2808b2d4b2cbd6fb80714"},"headline":"3 Signs You Are Following the Wrong Student Identification System","datePublished":"2019-07-24T09:55:51+00:00","dateModified":"2022-06-20T06:37:52+00:00","mainEntityOfPage":{"@id":"https:\/\/www.m2sys.com\/blog\/e-governance\/3-sign-your-are-following-wrong-student-identification-system\/"},"wordCount":554,"commentCount":0,"publisher":{"@id":"https:\/\/www.m2sys.com\/blog\/#organization"},"keywords":["student identification","student identification method","student identification system"],"articleSection":["e-Governance"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.m2sys.com\/blog\/e-governance\/3-sign-your-are-following-wrong-student-identification-system\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.m2sys.com\/blog\/e-governance\/3-sign-your-are-following-wrong-student-identification-system\/","url":"https:\/\/www.m2sys.com\/blog\/e-governance\/3-sign-your-are-following-wrong-student-identification-system\/","name":"3 Signs You Are Following the Wrong Student Identification System","isPartOf":{"@id":"https:\/\/www.m2sys.com\/blog\/#website"},"datePublished":"2019-07-24T09:55:51+00:00","dateModified":"2022-06-20T06:37:52+00:00","description":"How do you identify your student? Is it the right way? Or it has loopholes that can easily be breached or manipulated. Read this article to know more.","breadcrumb":{"@id":"https:\/\/www.m2sys.com\/blog\/e-governance\/3-sign-your-are-following-wrong-student-identification-system\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.m2sys.com\/blog\/e-governance\/3-sign-your-are-following-wrong-student-identification-system\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.m2sys.com\/blog\/e-governance\/3-sign-your-are-following-wrong-student-identification-system\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"3 Signs You Are Following the Wrong Student Identification System"}]},{"@type":"WebSite","@id":"https:\/\/www.m2sys.com\/blog\/#website","url":"https:\/\/www.m2sys.com\/blog\/","name":"Digital Transformation of Government Services","description":"","publisher":{"@id":"https:\/\/www.m2sys.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.m2sys.com\/blog\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.m2sys.com\/blog\/#organization","name":"Digital Transformation of Government Services","url":"https:\/\/www.m2sys.com\/blog\/","sameAs":["https:\/\/instagram.com\/m2sys","https:\/\/www.linkedin.com\/company\/m2sys-technology","https:\/\/www.pinterest.com\/m2sys\/","https:\/\/www.youtube.com\/user\/M2SYS","https:\/\/www.facebook.com\/m2sys","https:\/\/twitter.com\/m2sys"],"logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.m2sys.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.m2sys.com\/blog\/wp-content\/uploads\/2017\/12\/m2sys-blog.png","contentUrl":"https:\/\/www.m2sys.com\/blog\/wp-content\/uploads\/2017\/12\/m2sys-blog.png","width":287,"height":48,"caption":"Digital Transformation of Government Services"},"image":{"@id":"https:\/\/www.m2sys.com\/blog\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.m2sys.com\/blog\/#\/schema\/person\/0504c34ceeb2808b2d4b2cbd6fb80714","name":"Fredric Hoffman","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.m2sys.com\/blog\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/58790a590d10ba7399cf28dd264668a0?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/58790a590d10ba7399cf28dd264668a0?s=96&d=mm&r=g","caption":"Fredric Hoffman"},"description":"Fredric Hoffman Fredric Hoffman is a digital marketing analyst at M2SYS Technology and a tech enthusiast, he loves analyzing, researching and writing on technology. He believes that adaptation of cutting-edge technology can transform this world into a new shape and make it live worthy for all. View Profile","url":"https:\/\/www.m2sys.com\/blog\/author\/noman\/"}]}},"modified_by":"Collin Williams","post_mailing_queue_ids":[],"_links":{"self":[{"href":"https:\/\/www.m2sys.com\/blog\/wp-json\/wp\/v2\/posts\/11446"}],"collection":[{"href":"https:\/\/www.m2sys.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.m2sys.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.m2sys.com\/blog\/wp-json\/wp\/v2\/users\/402"}],"replies":[{"embeddable":true,"href":"https:\/\/www.m2sys.com\/blog\/wp-json\/wp\/v2\/comments?post=11446"}],"version-history":[{"count":6,"href":"https:\/\/www.m2sys.com\/blog\/wp-json\/wp\/v2\/posts\/11446\/revisions"}],"predecessor-version":[{"id":17773,"href":"https:\/\/www.m2sys.com\/blog\/wp-json\/wp\/v2\/posts\/11446\/revisions\/17773"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.m2sys.com\/blog\/wp-json\/wp\/v2\/media\/15285"}],"wp:attachment":[{"href":"https:\/\/www.m2sys.com\/blog\/wp-json\/wp\/v2\/media?parent=11446"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.m2sys.com\/blog\/wp-json\/wp\/v2\/categories?post=11446"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.m2sys.com\/blog\/wp-json\/wp\/v2\/tags?post=11446"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}