Illustrative embodiments of the present invention are described below. In various embodiments, the present invention may be implemented in part using program source code, using graphical interfaces, or using written tables, manuals, or other instructions. Thus, portions of material included in this submission is copyrightable and copyright is claimed by the inventor. Permission is granted to make copies of the figures, appendix, and any other copyrightable work solely in connection with the making of facsimile copies of this patent document in accordance with applicable law; all other rights are reserved, and all other reproduction, distribution, creation of derivative works based on the contents, public display, and public performance of the application or any part thereof are prohibited by the copyright laws.
This application is being filed with a source code appendix on compact disc comprising example computer program source code listings according to specific embodiments of the present invention. The entire contents of this appendix is incorporated herein by reference.
This application is being filed with or a priority application was filed with an appendix on compact disc comprising computer program source code listing according to specific embodiments of the present invention. The entire contents of this disc is incorporated herein by reference. The compact disc was created with the Windows operating system and contains the ASCII files:
The present invention relates to methods and/or systems involving strategies for influencing actors (generally, individuals or groups) in a given situation towards a desired outcome. In specific embodiments, the invention has applications in the field of information processing methods and/or information systems and/or games and entertainments. More specifically, the present invention in various aspects is directed to methods and/or systems that provide advice and other judgments or evaluations related to the use of influence methods in social situations.
The invention in its various specific aspects and embodiments involves methods and/or systems and/or modules that provide a variety of different functions relating to influencing actors. In various embodiments, the invention provides novel methods and/or modules useful in influencing groups and individuals by applying results of social science and other research as may exist now or in the future in a systematic and practical manner so as to guide, instruct, or otherwise provide information about how to influence actors in order to achieve objectives.
According to specific embodiments, methods of the invention can include one or more of: providing advice to a user of the method for influencing individuals or groups; providing an entertaining and/or educational environment for one or more users or players to learn about methods and effectiveness of influence methods; provide entertainment relating to the influence of individuals or groups; and tracking progress in sets of efforts to influence individuals or groups over time, e.g., for the purpose of evaluating particular influence strategies, evaluating a user's performance, performing simulations, or keeping score in a entertainment or educational game setting.
In specific embodiments, the invention involves methods and/or systems and/or modules that provide a way to apply the social science results and other results as may exist now or from time to time in a systematic and practical manner so as to instruct students or entertain individuals and groups about how to influence groups in order to achieve objectives.
Tracking Progress
In specific embodiments, the invention involves methods and/or systems and/or modules that provide a way to track status and/or progress over time so as to guide, instruct, or otherwise assist individuals or groups about how to influence other individuals or groups in order to achieve objectives.
One example implementation of the invention is provided in the Source Code Appendix submitted with this specification. This example provides a logic processing system that receives as inputs information about situations and actors, in this example using a graphical user interface, and uses a rules set and a rules engine, developed from various research in the field of influencing actors as described herein to provide outputs, which in this example is primarily various pieces of textual advice such as illustrated in the figures provided herein and in the Source Code Appendix. Other optional features illustrated by example in the Appendix or included in alternative embodiments of the invention include storing of situations and data sets for later simulation or evaluation, performing a scoring function for a user or multiple users, providing means for weighting or valuing various data elements, etc.
A further understanding of the invention can be had from the detailed discussion of specific embodiments below. For purposes of clarity, this discussion may refer to devices, methods, and concepts in terms of specific examples. However, the method of the present invention may operate with a wide variety of types of devices. It is therefore intended that the invention not be limited except as provided in the attached claims.
Furthermore, it is well known in the art that logic or software systems or systematized methods can include a wide variety of different components and different functions in a modular fashion. Different embodiments of a system can include different mixtures of elements and functions and may group various functions as parts of various elements. For purposes of clarity, the invention is described in terms of systems that include many different innovative components and innovative combinations of components. No inference should be taken to limit the invention to combinations containing all of the innovative components listed in any illustrative embodiment in the specification, and the invention should not be limited except as provided in the embodiments described in the attached claims.
Various aspects of the present invention are described and illustrated in terms of graphical interfaces and/or displays that user will use in working with the systems and methods according to the invention. The invention encompasses the general software steps that will be understood to those of skill in the art as underlying and supporting the functional prompts and results illustrated.
All publications cited herein are hereby incorporated by reference in their entirety for all purposes. The invention will be better understood with reference to the following drawings and detailed description.
The discussion of any work, publications, sales, or activity anywhere in this submission, including any documents submitted with this application, shall not be taken as an admission that any such work constitutes prior art. The discussion of any activity, work, or publication herein is not an admission that such activity, work, or publication existed or was known in any prior jurisdiction.
The file of this patent contains a least one drawing executed in color. Copies of this patent with color drawings will be provided by the United States Patent and Trademark Office upon request and payment of the necessary fee.
Overview of Social Research Regarding Influence
Many authors and researchers have examined various facets related to influencing a human organization from experiential and cognitive perspectives. While these studies and in some cases practical applications thereof have been described in both scholarly and popular literature, there has been no method or system developed that the inventor is aware of for practically applying the results of such studies to simple or complex real-world situations or educational or entertainment simulations.
Chuck Whitlock
For example, Chuck Whitlock has done extensive work identifying and demonstrating deceptive influences. [1] His book includes detailed descriptions and examples of many common street deceptions. Fay Faron points out that most such confidence efforts are carried out as specific ‘plays’ and details the anatomy of a ‘con’ [2]. She provides seven ingredients for a con (too good to be true, nothing to lose, out of their element, limited time offer, references, pack mentality, and no consequence to actions). The anatomy of the confidence game is said to involve (1) a motivation (e.g., greed), (2) the come-on (e.g., opportunity to get rich), (3) the shill (e.g., a supposedly independent third party), (4) the swap (e.g., take the victim's money while making them think they have it), (5) the stress (e.g., time pressure), and (6) the block (e.g., a reason the victim will not report the crime). Her work includes a 10-step play that makes up the big con.
Bob Fellows
Bob Fellows [3] examines how ‘magic’ and similar techniques exploit human fallibility and cognitive limits to deceive people. According to Bob Fellows [3] (p 14) the following characteristics improve the chances of being fooled: (1) under stress, (2) naivety, (3) in life transitions, (4) unfulfilled desire for spiritual meaning, (5) tend toward dependency, (6) attracted to trance-like states of mind, (7) unassertive, (8) unaware of how groups can manipulate people, (9) gullible, (10) have had a recent traumatic experience, (11) want simple answers to complex questions, (12) unaware of how the mind and body affect each other, (13) idealistic, (14) lack critical thinking skills, (15) disillusioned with the world or their culture, and (16) lack knowledge of deception methods.
Fellows also identifies a set of methods used to manipulate people. The illusion of free choice is an example where the victim has choice but no matter what choice is made, as long as it fits the constraints of the person carrying out the deception, the victim will appear to have had their mind read. This is an example of a posteriori proof. The deception involves a different path to the desired solution depending on the solution required by the ‘free choice’ of the victim. Mind control is exerted through social influence that restricts freedom of choice. It consists of psychological manipulation, deception, and the use of ‘demand characteristics’. Demand characteristics are based on social conditioning that put pressure on the individual to act in predictable ways in properly constrained situations. For example, in a stage trick, when you ask the person to make a choice between one of two things, they are socially constrained not to choose a third option. A theater setting causes people to sit and listen while a speaker talks. Guests generally try not to complain, so by treating people as guests, a person is more likely to influence them to sit and listen to that person's political views. Hypnosis, suggestion, absorption, fatigue, and social influence are also identified as control methods. In hypnosis, a hypnotic state is induced, while in suggestion uncritical acceptance and sometimes response to an idea is involved, while in absorption, the individual's attention is focused on an activity so that it is hard to distract them from it.
In his examination of manipulation techniques, Fellows includes: (1) vague or tailored standard of success, (2) observation of human nature, (3) situational observation, (4) specific vs. ambiguous information, (5) information control, (6) pseudo-scientific or spiritual theories, (7) confusing normal experiences with extrasensory perception, (8) skeptical stance, (9) fishing (deception), (10) authority, charisma, and appearance, (11) misdirection, (12) humor, (13) limited paranormal claims, (14) mind body connection demonstrations, (15) selective subject responsibility, (16) probability, (17) individual tailoring, (18) dissonance reduction and self-perception, (19) compliance and suggestibility, (20) shaping behavior, and (21) selective perception and recall. These are combined in a script to make a convincing case to an audience.
Thomas Gilovich
Thomas Gilovich [4] provides in-depth analysis of human reasoning fallibility by presenting evidence from psychological studies that demonstrate a number of human reasoning mechanisms resulting in erroneous conclusions. This includes the general notions that people (erroneously) (1) believe that effects should resemble their causes, (2) misperceive random events, (3) misinterpret incomplete or unrepresentative data, (4) form biased evaluations of ambiguous and inconsistent data, (5) have motivational determinants of belief, (6) bias second hand information, and (7) have exaggerated impressions of social support.
The table below illustrates examples of specific common syndromes and circumstances associated with them. These mechanisms are detailed and supported by substantial evidence and most of them are believed to be common to most individuals in all human societies.
Charles West
Charles K. West describes the steps in psychological and social distortion of information and provides detailed support for cognitive limits leading to deception. Distortion comes from the fact of an unlimited number of problems and events in reality, while human sensation can only sense certain types of events in limited ways: (1) A person can only perceive a limited number of those events at any moment (2) A person's knowledge and emotions partially determine which of the events are noted and interpretations are made in terms of knowledge and emotion (3) Intentional bias occurs as a person consciously selects what will be communicated to others, and (4) the receiver of information provided by others will have the same set of interpretations and sensory limitations.
Chester Karrass
Karrass [7] provided summaries of negotiation strategies and the use of influence to gain advantage. He also explain how to defend against influence tactics. He identified (1) credibility of the presenter, (2) message content and appeal, (3) situation setting and rewards, and (4) media choice for messages as critical components of persuasion. He also identifies goals, needs, and perceptions as three dimensions of persuasion and lists scores of tactics categorized into types including (1) timing, (2) inspection, (3) authority, (4) association, (5) amount, (6) brotherhood, and (7) detour. Karrass also provides a list of negotiating techniques including: (1) agendas, (2) questions, (3) statements, (4) concessions, (5) commitments, (6) moves, (7) threats, (8) promises, (9) recess, (10) delays, (11) deadlock, (12) focal points, (13) standards, (14) secrecy measures, (15) nonverbal communications, (16) media choices, (17) listening, (18) caucus, (19) formal and informal memorandum, (20) informal discussions, (21) trial balloons and leaks, (22) hostility relievers, (23) temporary intermediaries, (24) location of negotiation, and (25) technique of time.
Karrass explains that change comes from learning and acceptance. Learning comes from hearing and understanding, while acceptance comes from comfort with the message, relevance, and good feelings toward the underlying idea. These are both affected by audience motives and values, the information and language used for presentation, audience attitudes and emotions, and the audience's perception and role in the negotiation. By controlling these factors, advantages can be gained in negotiations.
Additional factors include:
(1) Credibility of the presenter helps gain advantage and it attained by suitable introduction and historical behavior;
(2) Message content and appeal are gained by (a) presenting both sides with the favored viewpoint at the start and end, (b) repetition of the points to be made, (c) stating conclusions, (d) arousing a need and then fulfilling it, (e) avoiding threats, which tend to be rejected (f) asking for more, which tends to get you more, (g) stressing similarities, (h) tying hard issues to easier ones, (i) not creating defensive situations, (j) not belittling other views, (k) being friendly and sympathetic, (l) asking for advice, and (m) appealing to self worth, fairness, and excellence;
(3) Situation setting and rewards also play important factors and can be enhanced by (a) making the audience feel worthwhile, (b) reinforcing pre-existing opinions, (c) presenting a balance of ideas, (d) avoiding or offering to remove ambiguity, (e) using social pressures to your advantage, (f) accounting for audience facts, methods, goals, and values, and (g) understanding and dealing with issues of power and influence.
(4) Media choice for messages can also be important. (a) Letters are good when establishing justification, for getting letters back, for establishing justification, and when interruption is dangerous, (b) face to face is better when personal presence brings regard or respect, when visual indicators will help, or when more or less information may be desirable. (Karrass was writing before FAXes and Email were widely available).
Karrass provides a three dimensional depiction of goals, needs, and perceptions and asserts that people are predictable. The three dimensions he identified are:
Goals: (1) money, (2) power and competence, (3) knowledge, (4) achievement, (5) excitement and curiosity, (6) social, (7) recognition and status, (8) security and risk avoidance, and (9) congruence.
Needs: Maslow's Needs Hierarchy includes (1) basic survival, (2) safety, (3) love, (4) self worth, and (5) self-actualization.
Perception: Perception of goals include: (1) how do you want opponents to see you, (2) how do opponents see their goals, (3) how do you see opponent goals, (4) how do you want opponents to see your goals, (5) how do you think opponents see your goals, and (6) how do you see your goals.
The object of a successful negotiation is to optimize how everyone sees their goals. Karrass also lists a series of specific negotiation techniques and countermeasures, and his work has been widely hailed as seminal in the field. Millions of people have now been exposed to his work. Some of the specific tactics he describes include:
Karrass also provides a list of negotiating techniques including: (1) agendas, (2) questions, (3) statements, (4) concessions, (5) commitments, (6) moves, (7) threats, (8) promises, (9) recess, (10) delays, (11) deadlock, (12) focal points, (13) standards, (14) secrecy measures, (15) nonverbal communications, (16) media choices, (17) listening, (18) caucus, (19) formal and informal memorandum, (20) informal discussions, (21) trial balloons and leaks, (22) hostility relievers, (23) temporary intermediaries, (24) location of negotiation, and (25) technique of time.
Cialdini
Cialdini [8] provides a simple structure for influence and asserts that much of the effect of influence techniques is built-in below the conscious level of most people. Some factors cross all human societies, while others may be more affected by social norms and culture. Cialdini discusses both the benefits of these natural tendencies and their exploitation by professionals for gaining compliance to desired behaviors. Regardless of how they are created, these techniques are apparently pattern matching phenomena that operate without regard to deep logical thought processes:
While Cialdini backs up this information with numerous studies, his work is largely done and largely cites western culture. Some of these elements are apparently culturally driven and care must be taken to assure that they are used in context. Similar studies for people interacting with and through computers have not been completed at this time as far as is known but they would clearly be helpful in understanding how people interact through and with computers.
Cialdini [8] provides a simple structure for influence and asserts that much of the effect of influence techniques is built-in and occurs below the conscious level for most people. His structure consists of reciprocation, contrast, authority, commitment and consistency, automaticity, social proof, liking, and scarcity. He cites a substantial series of psychological experiments that demonstrate quite clearly how people react to situations without a high level of reasoning and explains how this is both critical to being effective decision makers and results in exploitation through the use of compliance tactics. While Cialdini backs up this information with numerous studies, his work is largely based on and largely cites western culture. Some of these elements are apparently culturally driven and care must be taken to assure that they are used in context.
Charles Handy
Charles Handy [10] discusses organizational structures and behaviors and the roles of power and influence within organizations. The National Research Council [11] discusses models of human and organizational behavior and how automation has been applied in this area. Handy models organizations in terms of their structure and the effects of power and influence. Influence mechanisms are described in terms of who can apply them in what circumstances. Power is derived from physicality, resources, position (which yields information, access, and right to organize), expertise, personal charisma, and emotion.
MKULTRA
Closely related to the subject of deception is the work done by the CIA on the MKULTRA project. [13] In June 1977, a set of MKULTRA documents were discovered, which had escaped destruction by the CIA. The Senate Select Committee on Intelligence held a hearing on Aug. 3, 1977 to question CIA officials on the newly-discovered documents.
The net effect of efforts to reveal information about this project was a set of released information on the use of sonic waves, electroshock, and other similar methods for altering peoples' perception. Included in this are such items as sound frequencies that make people fearful, sleepy, uncomfortable, and sexually aroused; results on hypnosis, truth drugs, psychic powers, and subliminal persuasion; LSD-related and other drug experiments on unwitting subjects; the CIA's “manual on trickery”; and so forth.
One 1955 MKULTRA document gives an indication of the size and range of the effort; the memo refers to the study of an assortment of mind-altering substances which would: (1) “promote illogical thinking and impulsiveness to the point where the recipient would be discredited in public”, (2) “increase the efficiency of mentation and perception”, (3) “prevent or counteract the intoxicating effect of alcohol” (4) “promote the intoxicating effect of alcohol”, (5) “produce the signs and symptoms of recognized diseases in a reversible way so that they may be used for malingering, etc.” (6) “render the indication of hypnosis easier or otherwise enhance its usefulness” (7) “enhance the ability of individuals to withstand privation, torture and coercion during interrogation and so-called ‘brainwashing’, (8) “produce amnesia for events preceding and during their use”, (9) “produce shock and confusion over extended periods of time and capable of surreptitious use”, (10) “produce physical disablement such as paralysis of the legs, acute anemia, etc.”, (11) “produce ‘pure’ euphoria with no subsequent let-down”, (12) “alter personality structure in such a way that the tendency of the recipient to become dependent upon another person is enhanced”, (13) “cause mental confusion of such a type that the individual under its influence will find it difficult to maintain a fabrication under questioning”, (14) “lower the ambition and general working efficiency of men when administered in undetectable amounts”, and (15) “promote weakness or distortion of the eyesight or hearing faculties, preferably without permanent effects”.
Greene
Greene [12] describes the 48 laws of power and, along the way, demonstrates 48 methods that exert compliance forces in an organization. These can be traced to cognitive influences and mapped out using models like Lambert's, Caldini's, and the model created for this effort.
Even with the summary of relevant research and findings given above, the problem remains for an interested reader how to incorporate all or a subset of these, or similar studies, into simulated or real-world applications. The present invention, in specific embodiments, involves crafting a rule-set and data analysis method for applying these studies to real world problems. This aspect of the invention can be embodied in one or more logic processes running on a computer system, or in a kit or set of graphical and textual materials that provide users with advice and other results based on inputs related to situations and actors.
The present invention will be further understood with reference to
Collecting Data Provided about a Situation
In general, the present invention uses data collected about actors and/or situations to provide advice regarding influence strategies. According to specific embodiments, as illustrated in
Data entry in this embodiment indicates the position, charisma, money, expertise, force, friendliness, and adoption characteristics of each individual or group (represent by the named boxes) which is combined with the location in the space to provide a variety of indicators of the situation at present and how it can be altered by actions. Output consisting of colors, numbers, listings of elements of advice, and other relevant information and factors are provided and updated as the user alters information about the individual or group or moves that individual or group around the screen to indicate a different location in the two dimensions identified.
One example method that can be used in this embodiment includes the use of a series of indicators that identify options that are available for use as indicated by the analysis of Handy [10] and the National Research Council [11].
As an example, based on the position or title of a user relative to the position or title of an actor that is the subject of potential influence as entered through the data entry process, a determination per the “Power produces influence” chart is made as to which forms of overt, covert, and bridging influence are available to be applied. This list is then presented as a set of options.
Potential threats to action (in this particular depiction no threats are identified) are generated based on the combination of opposition and relative power level as well, so that the influences that an actor can have on a user and that are potentially serious enough to warrant being called threats are derived using the same basic mechanisms as used to identify influence methods.
In this example, the criticality of the situation is based on adoption phase and friendliness, and potential mechanisms of action, for example, as discussed in Cialdini [8], Karrass [7], and others are used to generate information that limits the strategies that can be used. For example, social proof is used as a strategy in suggesting that a project that others have already adopted should be presented to someone who normally adopts projects at the current phase. This is weighted by the result that social proof works better for those who like the person communicating it to them.
Other related research and expert opinions are also used to impact the advice provided. For example, if a target of influence that has historically been receptive to ideas has become hardened against the particular issues at hand, and if they normally adopt new ideas early but their adoption of this one is later than usual, then this is more important as an issue to address than a condition in which an individual or group that historically adopts an idea later than others and has a historic dislike for those undertaking to create the influences who is opposed to the idea early in its introduction.
The example embodiment illustrated in
This example embodiment also provides scoring information on how much overall effect movement of this actor (individual or group) through the space will have on the overall metric provided for assessing the current likelihood of project success. This is done by rating some of the input elements and derived values according to a common scale, in this case 1 through 5, and multiplying each by a factor that associates the relative weight of that factor in influencing change in the particular organization being influenced. The combined weights are then normalized relative to the maximum possible total weight to give a measurement of the relative import of movements of this individual or group in the space. Analysis of differences for movements in different directions and movements of different individuals and groups are then used to determine the most efficient ordering of which individual in which direction for improving the overall total rating of the situation and the overall total current rating of the situation is displayed relative to a maximum rating of 100. This particular embodiment also provides comment information putting this data into linguistic terms.
This embodiment further optionally provides for a file name that is used to store and subsequently retrieve the current situation for future use and the capacity to store, retrieve, and analyze, and present results for an unlimited number of these situations.
This particular embodiment also provides a capacity to alter values and locations of individuals and groups through the user interface, and to create or delete individuals or groups for analysis.
This particular embodiment also provides output in written form that consolidates all actions advices for all individuals and groups and sorts those results from most important to least important according to the metrics used to determine effects of movement in the space.
The present invention can be implemented as a computer program running on an information appliance, such as a computer, or on several computers using a network. The invention may also be embodied in other forms such as a board game using tables and charts to judge player moves and dice or similar random selection methods to cause results of efforts to be generated for the situation. In one embodiment, a network may include connections via the Internet, a Local Area Network, subscriber networks, etc. Among other possible user interfaces, the invention may be embodied in a system of GUIs. General methods for construction and operation of such systems is well known in the art, and the present invention can be understood as operating in a way roughly similar to other systems used in similar environments, except as specified herein.
A specific example embodiment is presented in the Source Code Appendix, which presents a logic module system, written in PERL, for creating the interactive graphical display as shown in
The present invention can also be implemented using a series of charts, tables, cards, etc., that systematize a set of rules related to influence and provide advice and/or scoring related to strategies for one or more users. Such an implementation may be particularly suited to embodiments in various strategy games for educational or entertainment.
Embodiment in a Programmed Digital Apparatus
The invention may be embodied in a fixed media or transmissible program component containing logic instructions and/or data that when loaded into an appropriately configured computing device cause that device to perform in accordance with the invention.
As will be understood to practitioners in the art from the teachings provided herein, the invention can be implemented in hardware and/or software. In some embodiments of the invention, different aspects of the invention can be implemented in either client-side logic or server-side logic. As will be understood in the art, the invention or components thereof may be embodied in a fixed media program component containing logic instructions and/or data that when loaded into an appropriately configured computing device cause that device to perform according to the invention. As will be understood in the art, a fixed media containing logic instructions may be delivered to a user on a fixed media for physically loading into a user's computer or a fixed media containing logic instructions may reside on a remote server that a viewer accesses through a communication medium in order to download a program component.
The invention also may be embodied in whole or in part within the circuitry of an application specific integrated circuit (ASIC) or a programmable logic device (PLD). In such a case, the invention may be embodied in a computer understandable descriptor language that may be used to create an ASIC or PLD that operates as herein described.
Example Embodiment as a Kit or Board Game
For example, of a token indicating the CEO is in square G6, and the player selects a strategy consisting of “ignore the CEO” for now as a move, the player then looks up the move for the CEO in that square and based on their selection, gets a score as indicated in the game scoring booklet. In this case, as an example, but not necessarily indicating the actual score, the player might get a 6 out of 10 as their score for that move. They then add 6 to their current score to get their new score and the next player makes their move. The game ends when all of the players decide not to move any more, or when a player reaches a certain number of points, perhaps 100 for this scoring system. In this embodiment, individual scores for moves can range from −10 to 10 and are based on the same information contained in the software embodiment identified herein.
Example Game instructions
As a further example, a game or simulation kit as depicted herein can proceed as follows:
The invention has now been described with reference to specific embodiments. Other embodiments will be apparent to those of skill in the art. In particular, a user digital information appliance has generally been illustrated or described as a personal computer. However, the digital computing device is meant to be any device for handling information could include such devices as a digitally enabled television, cell phone, personal digital assistant, etc.
It is understood that the examples and embodiments described herein are for illustrative purposes only and that various modifications or changes in light thereof will be suggested by the teachings herein to persons skilled in the art and are to be included within the spirit and purview of this application and scope of the claims. All publications, patents, and patent applications cited herein are hereby incorporated by reference in their entirety for all purposes.
This application claims priority from provisional patent application 60/755,238 filed 30 Dec. 2005 and incorporated herein by reference.
| Number | Name | Date | Kind |
|---|---|---|---|
| 4803642 | Muranaga | Feb 1989 | A |
| 20040102940 | Lendermann et al. | May 2004 | A1 |
| 20060106570 | Feldman | May 2006 | A1 |
| Number | Date | Country | |
|---|---|---|---|
| 20070156814 A1 | Jul 2007 | US |
| Number | Date | Country | |
|---|---|---|---|
| 60755238 | Dec 2005 | US |