ChapterPDF Available

Public Library Services to Children in the United Arab Emirates—A Study: IEREK Interdisciplinary Series for Sustainable Development

Authors:
  • Thiagarajar College of Preceptors (Aided)
Ahmed Al-Masri
Kevin Curran Editors
Advances in Science, Technology & Innovation
IEREK Interdisciplinary Series for Sustainable Development
Proceedings of the 1st American University in the Emirates
International Research Conference—Dubai, UAE 2017
Smart Technologies
and Innovation for
a Sustainable Future
Advances in Science, Technology & Innovation
IEREK Interdisciplinary Series for Sustainable
Development
Series editor
Mourad Amer
Editorial Board Members
Hassan Abdalla
Md. Abdul Mannan
Chaham Alalouch
Sahar Attia
Soa Natalia Boemi
Hocine Bougdah
Emmanuel Bozonnet
Luciano De Bonis
Dean Hawkes
Stella Kostopoulou
Yasser Mahgoub
Saleh Mesbah Elkaffas
Nabil Mohareb
Jennifer Nightingale
Iman O. Gawad
Mieke Oostra
Gloria Pignatta
Anna Laura Pisello
Biswajeet Pradhan
Federica Rosso
Advances in Science, Technology & Innovation (ASTI) is a series of peer-reviewed books
based on the best studies on emerging research that redefines existing disciplinary boundaries
in science, technology and innovation (STI) in order to develop integrated concepts for
sustainable development. The series is mainly based on the best research papers from various
IEREK and other international conferences, and is intended to promote the creation and
development of viable solutions for a sustainable future and a positive societal transformation
with the help of integrated and innovative science-based approaches. Offering interdisciplinary
coverage, the series presents innovative approaches and highlights how they can best support
both the economic and sustainable development for the welfare of all societies. In particular,
the series includes conceptual and empirical contributions from different interrelated fields of
science, technology and innovation that focus on providing practical solutions to ensure food,
water and energy security. It also presents new case studies offering concrete examples of how
to resolve sustainable urbanization and environmental issues. The series is addressed to
professionals in research and teaching, consultancies and industry, and government and
international organizations. Published in collaboration with IEREK, the ASTI series will
acquaint readers with essential new studies in STI for sustainable development.
More information about this series at http://www.springer.com/series/15883
Ahmed Al-Masri Kevin Curran
Editors
Smart Technologies
and Innovation
for a Sustainable Future
Proceedings of the 1st American University
in the Emirates International Research
ConferenceDubai, UAE 2017
123
Editors
Ahmed Al-Masri
College of Education
American University in the Emirates
Dubai, United Arab Emirates
Kevin Curran
Computer Science Research Institute, Magee Campus
University of Ulster
Londonderry, Northern Ireland, UK
ISSN 2522-8714 ISSN 2522-8722 (electronic)
Advances in Science, Technology & Innovation
IEREK Interdisciplinary Series for Sustainable Development
ISBN 978-3-030-01658-6 ISBN 978-3-030-01659-3 (eBook)
https://doi.org/10.1007/978-3-030-01659-3
Library of Congress Control Number: 2018957662
©Springer Nature Switzerland AG 2019
This work is subject to copyright. All rights are reserved by the Publisher, whether the whole or part of the material is
concerned, specically the rights of translation, reprinting, reuse of illustrations, recitation, broadcasting, reproduction
on microlms or in any other physical way, and transmission or information storage and retrieval, electronic
adaptation, computer software, or by similar or dissimilar methodology now known or hereafter developed.
The use of general descriptive names, registered names, trademarks, service marks, etc. in this publication does not
imply, even in the absence of a specic statement, that such names are exempt from the relevant protective laws and
regulations and therefore free for general use.
The publisher, the authors and the editors are safe to assume that the advice and information in this book are believed
to be true and accurate at the date of publication. Neither the publisher nor the authors or the editors give a warranty,
express or implied, with respect to the material contained herein or for any errors or omissions that may have been
made. The publisher remains neutral with regard to jurisdictional claims in published maps and institutional
afliations.
This Springer imprint is published by the registered company Springer Nature Switzerland AG
The registered company address is: Gewerbestrasse 11, 6330 Cham, Switzerland
Preface
The 1st American University in the Emirates International Research Conference (AUEIRC)
held on November 1516, 2017, has become one of the major events of the year in the eld of
creative business and social innovation. AUEIRC 2017 was organized under the patronage of
His Excellency Sultan bin Saeed Al Mansouri, Cabinet Member and Minister of Economy of
UAE and chaired by Prof. Muthanna Abdul Razzaq. This conference aims to provide a vibrant
platform for academicians, researchers, scientists, and industrial practitioners from all over the
world to meet, exchange ideas and network, and discuss the challenges and opportunities for
businesses in the contemporary world. The proceedings will be published in the Advances in
Science, Technology & Innovation series of Springer.
The general aim of AUEIRC 2017 is to promote international collaboration in education and
research in all elds of creative business and innovation that can scale for the benetof
communities. The International Scientic Committee comprises over 80 international experts in
various elds as per the themes of the conference. The conference keynote speakers include
Suzanne Trager Ortega, President of the Council of Graduate Schools (USA), Prof. Galal Hassan
Galal-Edeen (University of London, UK), and Prof. Ali Emrouznejad (Aston University, UK).
The scope of AUEIRC 2017 includes a broad range of topics on six areas namely Creative
Business and Social Innovation, Education and Social Innovation, Media for Smart Cities,
Creative Industries and Social Innovation, Governance and Legislation, and Smart Tech-
nologies and Innovation. The panels are divided based on tracks, and all papers are presented
in 24 sessions. Each session has a chairperson, while each paper has a discussant. A dou-
ble-blind peer-review process enabled 106 papers to be accepted for publication (in two edited
volumes) in Springer. On behalf of the AUEIRC 2017 Standing Committee, we would like to
thank all the referees, track chairs, discussants, and paper authors.
AUEIRC17 has been planned to enable postgraduate students from the American University
in the Emirates and other academic institutions to participate in the conference and share their
research experience with an international community of academics and industry experts. The
best paper (in terms of quality and practicality) presented at the conference was awarded
US$1000. The recipient of the Best Paper Award was the paper titled Optimizing Turbo Codes
for Secret Key Generation in Vehicular Ad Hoc Networks.This papers authors/co-authors are
Dr. Dhouha Kbaier Ben Ismail (University of Bedfordshire), Dr. Petros Karadimas (University
of Glasgow), Dr. Gregory Epiphaniou (University of Bedfordshire), and Dr. Haider Al-Khateeb
(University of Bedfordshire).
On behalf of the AUEIRC17 Standing Committee, we would like to thank everyone who
made the conference a reality. In particular, we would like to thank Prof. Muthanna (Con-
ference Chairperson), who contributed all resources at his disposal to ensure the high standard
of the conference. We also thank our Provost Prof. Abhilasha Singh for her contributions to
guarantee that the conference is on track. We likewise extend our gratitude to the entire AUE
Board of Trustees, who were present on campus during the conference, for their support. We
also thank the members of the conference steering committee for their hard work, dedication,
and continuous support throughout the preparation and implementation of the conferences
activities. Moreover, we are grateful to the event management, IT, auxiliary services, media,
v
security, PR, and protocol teams. We likewise extend our thanks to all faculty and staff
members from different committees for their support in organizing the conference and
ensuring its success.
Overall, we express our heartfelt thanks to the keynote speakers, who managed their busy
schedules and graciously agreed to deliver inspiring messages. We believe that AUEIRC17
was a high-quality event with remarkable success, although you must judge this matter for
yourselves. We are optimistic that you will enjoy reading the collection of papers included in
this book.
Dubai, United Arab Emirates Dr. Ahmed Al-Masri
Londonderry, Northern Ireland, UK Prof. Kevin Curran
vi Preface
Conference Steering Committee Members
Mahir Albanna
Arafat Al Naim
Konrad Gunesch
Anthony Ijeh
Golam Mustafa
Zaire Ruanto
Asma Salman
Assem Tharwat
vii
Contents
A Case Study of Pakistani News Channels: Media Education
and JournalistsTraining .............................................. 1
Asad Ullah Khalid
A Cooperative Classication System for Credit Scoring ..................... 11
Dalila Boughaci and Abdullah A. K. Alkhawaldeh
A Critical Evaluation of the Effects of Advertisements Targeted
to Children.......................................................... 21
Tarik Emre Yildirim and Asli Milla
A Gulf College Case Study: Technology Enhanced StudentsLearning
Geared with Mobile Devices ............................................ 29
Rowena Ocier Sibayan, Alrence S. Halibas, and Kenneth Ocier Sibayan
A Review Study on the Accuracy of Conversion Between IFPUG FPA
and COSMIC Function Points .......................................... 35
Abedallah Zaid Abualkishik
Analyzing the Role of Human Computer Interaction Principles
for E-Learning Solution Design ......................................... 41
Zahra Al Mahdi, Vikas Rao Naidu, and Preethy Kurian
Automatic Detection of Students Learning Style in Learning
Management System .................................................. 45
T. Sheeba and Reshmy Krishnan
Big Data Security and Privacy Concerns: A Review ........................ 55
Akbar Khanan, Salwani Abdullah, Abdul Hakim H. M. Mohamed, Amjad Mehmood,
and Khairul Akram Zainol Arifn
Chinas Relations with Arab Gulf States.................................. 63
Golam Mostafa
Citizen-Centric Approach in Delivery of Smart Government Services .......... 73
Ayman Ahmad Obedait, Mohamed Youssef, and Nikolina Ljepava
Cloud Concept for Implementing Multimedia Based Learning
in Higher Education .................................................. 81
Vikas Rao Naidu, Anjum Zameer Bhat, and Baldev Singh
Diplomacy in the Internet AgeChallenges and Opportunities for the UAE ..... 85
Melissa M. Cyrill and Aftab Kamal Pasha
Enterprise Product Management in the Digital World ....................... 95
Zornitsa Nikolova and Roumiana Antonova
ERP Security, Audit and Process Improvement ............................ 103
Roumiana Antonova and Georgi Georgiev
ix
Evaluating the Strength of Middle Eastern Monarchies and Republics ......... 111
Khulood Jamal
Exploring the Opportunities and Challenges of Open Source Software
and Its Economic Impact on the Cybersecurity Market ...................... 115
Ismail Alsharif and Adel Kheli
Feasibility Analysis of Blockchain for Donation-Based Crowdfunding
of Ethical Projects .................................................... 129
Nida Khan and Rachid Ouaich
Foreign Policy of the United Arab Emirates (UAE): Continuity
and Change ......................................................... 141
Mariam Alzaabi
Framing Natural Disaster, Terrorist Attack and Civil Unrest Crises
by Egyptian Journalist and Citizen Bloggers .............................. 149
Naheda Makhadmeh and Geri Zeldes
Humanities Scholar Information-Seeking Behavior: Quantitative Approach ..... 177
Mohammad Khaled Al Shboul, Othman A. Obeidat, and Natarajan Sundar
Hybrid Alliances: Efciency, Business Continuity and Future Foresight
in a World of Challenges .............................................. 187
Marios Panagiotis Efthymiopoulos
Impact of Corporate E-Learning Systems in Enhancing the Team
Performance in Virtual Software Teams .................................. 195
Rajalakshmi Subramaniam and Senthilkumar Nakkeeran
IoT Based Water Usage Monitoring System Using LabVIEW................. 205
P. Arun Mozhi Devan, K. Pooventhan, C. Mukesh Kumar, and R. Midhun Kumar
Learning Analytics: Developing a Data-Centric Teaching-Research Skill........ 213
Alrence S. Halibas, Bobby Sathyaseelan, and Muhammad Shahzad
Measuring Ciphertext Randmoness Using Die Hard Randomness Index ........ 221
Mohammed M. Alani
Medical Grade QoS Improvement Using IEEE802.11e WLAN Protocol ........ 229
LuaeA. Al-Tarawneh
Memristor-Based Tunable Analog Filter for Physiological Signal Acquisition
for Electrooculography ................................................ 237
Juhi Faridi and Mohd. Samar Ansari
Migration from the Arab Spring Countries to Europe:
Causes and Consequences.............................................. 243
Mohammed T. Bani Salameh
Multi-channel Buffer Enabled Technique for Video Streaming
in IEEE 802.15.4 ..................................................... 255
Razi Iqbal
Multimedia Applications in Education.................................... 263
Smilen Antonov Savov, Rumiana Antonova, and Kamen Spassov
Non-invasive Extremist Identication and Asset Maintenance................. 273
Vladimir Tomaševićand Stanko Bulajić
Open Platform for Network Functions Virtualization in the Digital Era ........ 279
Stela Ruseva, Rumyana Antonova, and Nikola Naidenov
x Contents
Optimizing Turbo Codes for Secret Key Generation in Vehicular
Ad Hoc Networks .................................................... 287
Dhouha Kbaier Ben Ismail, Petros Karadimas, Gregory Epiphaniou,
and Haider Al-Khateeb
PROBSOL: A Web-Based Application to Develop Problem-Solving Skills
in Introductory Programming .......................................... 295
Sohail I. Malik, Roy Mathew, and Maytham M. Hammood
Process Mining of Event Logs from Horde Helpdesk ........................ 303
Radim Dolak and Josef Botlik
Public Library Services to Children in the United Arab EmiratesA Study..... 311
Natarajan Sundar, N. Radhakrishnan, and Mohammad Khaled Issa Al-Shboul
Security and Privacy in Smart Cities: Issues and Current Solutions............ 317
Talal Ashraf Butt and Muhammad Afzaal
Smart City Framework Development: Challenges and Solutions............... 325
Ahmed N. AL-Masri, Anthony Ijeh, and Manal Nasir
Smart City Transportation Services, Customer Satisfaction and Impact
on the Quality of Life ................................................. 333
Aleksandar Aleksic, Nikolina Ljepava, and Marija Ristic
Smart Classrooms .................................................... 339
Zoltan Horvath and Donludee Jaisut
Social Media and Disaster Management in India: Scope and Limitations ....... 349
Dhanashree Giri and Aman Vats
Strengthening Your Social Media Marketing with Live Streaming Video ....... 357
Matthew A. Gilbert
The Complexity of Governing Smart CitiesAn Integrated Approach ......... 367
Geetha A. Rubasundram
The Impact of Smart Technology on Advertising: A Case Study
of Pepsi-Egypt ....................................................... 379
Bassant Eyada and Mai El Nawawy
The Onion Router: Is the Onion Network Suitable for Cloud Technologies...... 389
Galia Novakova Nedeltcheva, Elior Vila, and Marina Marinova
The Role of e-Governance in IoT Semantic Interoperability .................. 399
Lyubomir Blagoev and Kamen Spassov
The Role of the Roads and Transport Authority (RTA) in the Transformation
of Dubai into a Smart City ............................................. 403
Hatem Ahmed Adela
The Social Signicance of Corporate Security ............................. 413
Dusko Tomic and Eldar Saljic
The Value of Intelligent Cybersecurity Strategies for Dubai Smart City ........ 421
Khulood Ali Jumah AlJarman AlZaabi
User and Item Preference Learning for Hybrid Recommendation Systems ...... 447
Kaavya Prakash, Fayiz Asad, and Siddhaling Urolagin
Using a Simulation Game to Teach the Concept of ERP ..................... 457
Jennifer Nightingale
Contents xi
A Case Study of Pakistani News Channels:
Media Education and JournalistsTraining
Asad Ullah Khalid
Abstract
Journalism has witnessed revolutionary transformation in
Pakistan, since the turn of the millennium. The nation that
was exposed to only one government controlled news
channel and then suddenly was put in the whirlwind of
unltered ashing news channels, as it stepped in the 21st
century. With the launch of two private news channels,
the practice of journalism appeared as a war for ratings
rather than a medium of information. In the seventeen
years of the millennium, multiple news channels have
mushroomed in Pakistan but the quality of news still
suffers. Freedom and neutrality of the media, particularly
media outlets which broadcast national and international
news, are critical to the growth of any society. This paper
carries out an in-depth study to analyze the reasons for
declining quality of news on Pakistani news media. The
study begins with examining the relevance and suitability
of educational background of the journalists. The jour-
nalists on screen and in the eld do not go through the
appropriate training required to be eligible for news
media. The Pakistan Electronic Media Regulatory
Authority (PEMRA) is identied as one of the main
factors for this drawback. PEMRA has been observed to
be ineffective so far. This paper analyses the factors
leading to its unfortunate performance. The inappropriate
congeniality between media persons and political gures
also raises debate that media gets under political
inuence. This paper analyses the links between the
afore-mentioned factors in light of the crisis faced by
private news media in Pakistan. It analyzes the quality of
news churned by these media giants by conducting
interviews of leading journalists and media persons.
Keywords
Pakistan PEMRA Journalism Private news channels
1 Introduction
The social nature of this world is perpetual and it always
remains in the state of change. In such a state, a society can
remain cohesive and integrated only through the means of
communications. The level of national cohesion and inte-
gration is directly proportional to the quality of communi-
cation means in that nation and media unarguably is the
single most important mean of communication which keeps
society informed and integrated despite the existence of
countless divides on linguistic, ethnic, racial and sectarian
levels. A responsible and well-trained media empowers the
individuals in society through informing them about the
events. In a religious and political pluralistic society, like
Pakistan, the most important task of media is to make every
faction of the society cognizant about various
socio-economic issues and their different interpretations
which lead to a peaceful synthesis on those issues helping
out charting a national strategy. For the government alone
this task is beyond impossible in an era where information of
all sorts and sources ows unchecked through various
mediums including completely uncontrolled social media.
With this growing role of media, government and
nation-state are required to act as more transparent and
unbiased regulators with a closer look at issues pertaining to
quality of journalism and issues which usually lead to
journalistic biases.
Electronic media is the most robust form of media today.
But its scope is often misunderstood. A Large part of Pak-
istani society considers TV news channels as the only
incarnation of electronic media. It would be prudent to
dene the concept and scope of electronic media at this
juncture of discussion. Electronic media are those com-
munication mediums which are based on electronic or
electromechanical means of production and most often dis-
tinguished from print media[1]. Most commonly known
sources of electronic media include radio, television, audio
and video records and online live streaming services.
A. U. Khalid (&)
American University in the Emirates, Dubai, UAE
e-mail: asad.khalid@aue.ae
©Springer Nature Switzerland AG 2019
A. Al-Masri and K. Curran (eds.), Smart Technologies and Innovation for a Sustainable Future,
Advances in Science, Technology & Innovation, https://doi.org/10.1007/978-3-030-01659-3_1
1
Notwithstanding the growing internet culture, TV chan-
nels remain the main sources of information and entertain-
ment in Pakistan. Expansion of cable network services
throughout the country during the last decade or so has
rendered News Channels a primary source of information for
those who are literate but do not have access to print media.
And then there are some intrinsic limitations attached to
print media. It cannot compete with the live electronic media
and real-time analysis available through it. Print media has
limited coverage and scope. One newspaper is usually
published from multiple cities raising various local issues
while addressing few national level issues. On the other
hand, electronic media has no such limitations. Due to these
reasons, television news channels in Pakistan have emerged
as the only truly affordable and accessible means of news
and their implications. News Channels have now become an
inuential stakeholder in the Pakistani polity.
Due to the limited scope of this paper, the discussion will
focus primarily on the issues related to the quality and
authenticity of private news channels as, in Pakistani society,
these channels are the largest and most inuential stake-
holders in public opinion making. TV remains the biggest
and fastest growing news medium followed by Radio and
internet news portals [2].
2 Literature Review
Review of the existing body of literature is covering the
history and the transformations media has gone through
since the establishment of Pakistan. This is to develop an
understanding whether the quality of media content has
suffered or improved in its long journey from a single state
controlled channel to a list of comparatively free multiple
media channels.
2.1 Evolution/Metamorphosis of Pakistans
Media Industry
This is Radio Pakistan, these were the words which were
uttered by ZahoorAazar in English, and Mustafa Ali Ham-
dani in Urdu on the historic day of 14th August 1947. This
was the birth of electronic media of Pakistan. Just like many
developing and even developed countries, Radio became the
major source of news and entertainment programs. It was
established with the ofcial name of Pakistan Broadcasting
Service. 1973 constitution provided new guiding principles
and objectives to publish, circulate, distribute and regulate
(reliable and trusted) news and information in any part of the
world in any manner that may be deemed t[3]. The role of
Radio Pakistan is also important in national electronic media
evolution as its infrastructure and human resource provided
the basis of the TV industry in the country.
2.2 Genesis of TV Channels in Pakistan
Pakistan rst Television channel was a state-owned terres-
trial TV service named as Pakistan Televisionor PTV. It
was established in existing Radio Pakistans building in
Lahore in 1964 with transmission began on 26th November
same year. This state-owned channel was originally a private
venture which commenced around 1961 by few individuals.
The government of Pakistan took control over it and estab-
lished PTV as a joint venture as Nipon Electric Company
(NEC) [4]. In 1967, as a major business step, PTV was listed
in the stock market as a joint venture between the govern-
ment of Pakistan and private business entities. In 1984, the
government of Pakistan introduced Companies Ordinance
1984 to govern the companies working throughout the
country. Eventually, PTV was also converted into a corpo-
ration after the promulgation of this ordinance.
Despite major challenges, both technical and nancial,
PTV proved a great source of infotainment for Pakistani
society. It highlighted many social issues but complete
control over PTV by the government of Pakistan dictated its
editorial policies for decades. Nevertheless, following gov-
erning principles and goals for Pakistansrst TV channel
were laid out:
Education and insight.
Enhancement of knowledge and information.
Healthy entertainment service.
Preferment of national identity and enhancing national
integration.
Dissemination of news in a just, impartial, realistic
manner free from dishonesty by insinuation and exclu-
sion [5].
Last two objectives remained largely elusive as PTV as a
news medium only presented the states point of view on
every critical juncture of our national history. For example,
during the wars of 1965, 1971 and Kargil conict with India,
PTV presented the state of Pakistans view effectively but
seldom entertained any critical views regarding these con-
icts. Similarly, PTV would cover the debate on Pakistans
political and nancial progress over the years from only one
vantage point and thats of governments most of the times if
not always. There used to be a gap between PTVs coverage
of national issues and ones covered by print media of the
country. This would leave a big question mark on the
authenticity of these stories and analyses PTV would air.
The need of critical evaluation from a private and objective
2 A. U. Khalid
vantage point was almost palpable as media in the world
over and in the region was moving towards more openness
in analysis and debate on various issues.
By 1990s, Semi-private and private TV channels began to
emerge on the infotainment horizon. NTM (National Tele-
vision Marketing) was rst such endeavor undertaken by a
private company Interow. Channel-3 (later became ATV)
was a semi-private venture between PTV and private entities
and became the rst non-PTV channel to be aired on the
terrestrial network.
2.3 Media Boom
TV and News channel landscape changed completely within
next two decades when the government allowed rst full
private news channel as a result of deregulation of electronic
media in 2000. In 2002, an independent and fully autono-
mous regulatory body by the name Pakistan Electronic
Media Regulatory Authority (PEMRA) was established as a
regulator of privately owned electronic mass media.
PEMRA is ofcial license issuing federal authority which
authorizes channels and set up their infrastructure and starts
broadcasting.
Since then, a rapid development of news channels, mostly
owned by print media houses (Jang, Duniya, Express etc.)
Today, there are nearly 90 Satellite TV Channels in Pakistan
with around one third being a news channel. There are more
than 2000 cable operators which are the main source of
transmission of satellite broadcasts from these news chan-
nels to the local viewers. Many large new channels are being
operated from abroad.
Apart from these Pakistani private news channels, there
are more than 25 foreign channels are accessible as they
have landing rights. These include biggest names of inter-
national news like BBC, CNN, Sky, RT, Star etc. Billions of
dollars have been invested in Pakistani news channels and
thousands of jobs were created for journalists, correspon-
dents, news editors, copywriters, graphic designers and
much more. According to one estimate, the indirect
employment is more than 6.5 million.
It was believed that this rapid growth of mass electronic
media in Pakistan would play a constructive role in national
cohesion and integration by making available more knowl-
edge and up to date information which ofcial news chan-
nels like PTV would ignore.
Pakistans private media took birth in post 9/11 envi-
ronment when the entire region began to drift into a strategic
ux. Due to close proximity with Afghanistan where ISAF
forces led by the US would hunt Al-Qaeda and Taliban
ghters, Pakistan over the years earned reputed status of
being the eye of the global security storm[6] once Pakistan
decided to become part of the international coalition against
global terrorism. It became an insurmountable challenge for
electronic media to cover the war on terror in FATA and
large restive parts of KPK province. What role Pakistani
electronic media played in such restive security milieu for
national cohesion and integration by shaping public opinion?
How these events affected Pakistani electronic media and did
Pakistani media challenge the protracted nature of Afghan
conicthence did it challenge a narrative US media nur-
tured on the behalf of the US establishment? These are all
critical questions which are still relevant because the war in
Pakistan is far from over despite solid military gains during
the last 16 years. But before looking for answers to these
questions, it would be prudent to understand the signicance
of a free and natural media in the context of the societal,
regional and global scenario.
2.4 Significance of Free and Neutral Media
States can be developed and built by deliberate human
actions. Nations evolve almost always through a kaleido-
scopic, spontaneous, multi-layered natural process, not
subject to human will alone, except in some rare cases. The
distinction is necessary at the outset as we proceed to
examine how man-made factors such as media and others
can inuence the process of national as well as state
development[7].
In any democratic society, the foremost responsibility of
any media is to protect and present facts to its audience.
Objective reporting is meant to portray issues and events in a
neutral and unbiased manner, regardless of the writers
opinion or personal beliefs [8]. State own media can also act
as custodian of fact but in the peculiar case of Pakistan
especially and elsewhere generally, it always remains sus-
ceptible to pressures of all kinds from power echelons of
ruling elite. On the other hand, the real strength of privately
owned electronic media lies in its ability to withstand any
imposed censorship by government departments.
Electronic medias signicance adds value to any
democracy as it acts as a bridge between the democratic
regime and masses and its ability to transmit important
developments instantaneously plays a key role in dispelling
conspiracies and propaganda. This aspect of electronic
media (both TV and internet) is critical for fragile democ-
racies like Pakistan. Numerous studies have established that
a society remains deprived of progress and prosperity if it
constantly remains in the state of uncertainty about the
prospects of peace, stability, security, good governance and
impartial implementation of constitutional rights. Electronic
media through its vast and effective outreach can ensure that
society avoids this sort of deprivation and uncertainty. The
electronic media may pinpoint social surroundings that repel
transformation and become a reason of social fragmentation.
A Case Study of Pakistani News Channels: Media Education 3
Media all over the world established its signicance in the
areas pertaining to public affairs and national development
regardless of the specic type of governance and geography
of that state. In the context of national building and culti-
vation of national cohesion, media is a signicant force. It
motivates national unity and identity, and not always
because of the fact that it is owned by the state or controlled
by the government like PTV but to express its own vision
and agenda. In politics, Media has been playing an important
role in ushering democratic cultures in erstwhile since 2010
when the phenomenon of Arab Springhit many of the
authoritarian regimes in the Middle East and North Africa.
Interestingly, only one Arab news channel Al-Jazeera
became the spearhead of media coverage of this phe-
nomenon and its remained uncensored as its editorial con-
trol was located in Qatar.
Apart from strengthening democracy, the role of elec-
tronic media is signicant in keeping the society on the
correct intellectual and ideological trajectory. It is more
critical in a world where information ow has become
omnidirectional and it has become an impossible task for
any state to completely censor the content. Social media
revolution of the 21st century has reshaped the entire con-
cept of electronic media. In such a complex society, elec-
tronic media news channels are expected to provide only
authentic and factual reporting about issues related to com-
mon people like routine work, art, education, entertainment,
healthcare, tourism, fashion and anything else that we have
to do on daily basis.
Medias signicance in economic decision making has
also increased during the recent past. Media has made every
faction of society more aware about the requirements of
infrastructural development so that socio-economic uplift
can trickle down to individual level. It has become possible
as rapid technical evolution in communication devices has
enabled each individual to access the news content relevant
to his area of work. Time barrier of transmission used to be a
big hurdle in universal access of broadcasted news bulletin
in the past. It is no longer an issue when the live and
recorded news streams can be accessed by everyone at the
most convenient time. Apart from that, electronic media is
acting as powerful free market advocate. This stirs a lot of
economic activities as electronic media disseminates a large
amount of marketing and advertising content. By taking this
role, media acts as an extension of free market economy.
In the eld of education, media has emerged as the engine
behind the germination of new ideas. News about every
major breakthrough travels around the world breaking the
barriers of language and cultures. Media has introduced the
idea of cross pollination of cultures which has played a
signicant role in the advancement of sociology, psychol-
ogy, social studies and many more domains of knowledge.
Now young masses around the world are more aware of
different cultures and their value systems. In nutshell, the
effective strength of mass media can be summarized as:
attracting and directing public interest; persuasion in mat-
ters of opinion and belief; inuencing behavior; structuring
denitions and realities; conferring status and legitimacy and
informing quickly and extensively[9].
2.5 Electronic Media in Pakistan
Pakistani society witnessed a rapid and unprecedented
development and expansion of media TV Channels after
2002. Now, it has established itself as fourth pillar of the
Stateor simply as the fourth estateas was once recog-
nized by the nineteenth-century British politician Lord
Macaulay who coined this term in recognition of the sig-
nicance the mass media plays both as a social institution
and a political forum for debate[10]. It has assigned itself a
role of government critic and this is nothing different from
what electronic media practice elsewhere in the world. But,
in the peculiar political culture of Pakistan where
civil-military imbalance has remained a stumbling block for
democratic culture, this remains a trickery endeavor.
Former US Secretary of State, Hillary Clinton, in 2009,
described Pakistani media as increasingly, freewheeling
free, [and] quite inuential[11].
It is an undeniable fact that today electronic media has the
capability to form opinions and attitudes of masses either in
favor or against a particular topic or idea. From national
cohesion standpoint, this ability of electronic media can
generate a positive outcome for the state only if this power
of electronic media is channeled properly by the regulator
and everyone in the media industry is also equipped with
right kind of journalism training and knowledge especially
about journalistic ethics in conict zones. There is no doubt
that if applied positively, its contribution in achieving
national integration, socio-economic uplift and in building a
cohesive, tolerant and forward-looking society cannot be
overemphasized [12]. But this is theoretical aspects of
journalism and its practical implementation is only possible
in a media environment where each stakeholder like media
houses, journalists and regulator are well aware of their roles
and responsibilities.
2.6 Role and Responsibilities of Media
Persons/Journalists
The power of the journalist is great, but he is entitled nei-
ther to respect nor admiration because of that power unless it
is used aright. He can do and often does, great good. He can
do and often does, great mischiefOffenses against taste
and morals, which are bad enough in a private citizen, are
4 A. U. Khalid
innitely worse if made into instruments for debauching the
community through a newspaper[13].
This statement by former US president Theodore Roo-
sevelt succinctly summarizes the roles and responsibilities of
a journalist and provides guidelines for the community of
journalists. This statement contains in it the primary role (or
more appropriately responsibility) of a journalist which was
described as a gatekeeping role by J Singer in these words,
journalistic ethics, as they are codied and articulated by
both individual practitioners and journalism organizations or
institutions, can be seen as stemming from this perspective
of the journalist as gatekeeper[14].
Interestingly, journalists in the gatekeeping role in the
context of the ow of information have responsibilities to the
both sides of the gate. Journalists are responsible for the
propagation of information to the masses but at the same
time, they are also responsible for deciding what masses
must avoid due to reasons associated with quality and
authenticity of that particular information.
Journalists also have an obligation to present all sides of
any reported story. This falls in the category of the ethical
responsibility of journalist which is a fundamental demand
of objectivity. Journalists must avoid going with popular
opinion on sensitive subjects because that leads to sensa-
tionalism and jingoism. Following popular views, without
any empirical evidence, often hinders the need of doing
proper research through reading existing material and his-
torical records. Moral integrity of any journalist determines
who good gatekeeper he is in this age of information where
information ows on social media more quickly without
being authenticated or veried.
Journalists are also assumed to put public interest
supreme over the interest of their organization or personal
agendas. This critical role is the most challenging one in the
contemporary world. In this respect, there is a need to
redene the role of the journalist as a gatekeeper in infor-
mation ow. In todays interconnected world, providing
information to masses alone is not enough. It is also a
responsibility of modern age journalist to make people
understand, interpret, and use information, rather than
merely giving them access to it[15,16].
3 Methodology
In-depth interviews of leading media professionals and
journalists are conducted to get to know their opinion about
the practical steps taken by both the ofcial regulator and the
journalistic community in the country to ensure quality of
media content.
Interpretation and Analysis of Interview Data
Following are the themes developed after qualitatively ana-
lyzing the data collected by the in-depth interviews of
journalists.
Role of Electronic Media Persons and Situation in
Pakistan
Electronic media in Pakistan has suffered from the quality
crisis on more than one occasion and at times it has become
the cause of harm for national cohesion. This media
predicament is not the outcome of the failure of single
stakeholder. There has been a general lack of understanding
about the role and responsibilities of media persons, man-
agement, regulatory and individual journalists. This lack of
understanding is not limited to media persons alone. A Large
faction of public also considers the media a solution provider
for their socioeconomic qualms. This misplaced expectation
provides a wrong sense of responsibilities. This failure of
media naturally raises the need to investigate the core rea-
sons and issues behind medias inability to present an
informed and educated opinion about various issues per-
taining to Pakistani masses.
Factors Affecting/Impacting Media PersonsPerformance
Journalist community in Pakistani electronic media has
failed in playing the roles which has been discussed in the
previous section as Pakistani media today lacks in quality
and substance of its news stories and reports. As mentioned
in one of Media Watch columns, The lack of substance in
the Pakistani commentariat does not need any elaboration
because TV pundits would reveal that they spend almost no
time on research, following instead the park and bark
model of punditry[17]. This is why this community often
fails to correctly indicate the future directions of the current
events. To a large extent, journalist community of Pakistan is
to be blamed for this predicament but certainly, they are not
the only culprit here. This section highlights some key fac-
tors which can be described as the cause of lack of substance
and quality in Pakistani electronic media.
Policy Failure
The most important challenge for Pakistani news media
channels is the absence of any code of conduct for coverage
and reporting. This absence of a code of conduct is the
outcome of the inability of successive Pakistani governments
in forming a national electronic media policy. There is a
A Case Study of Pakistani News Channels: Media Education 5
need for the formation of a wide-ranging and inclusive
electronic media policy so that this media can play a con-
structive role in national cohesion and integration,
strengthening the democratic values and providing masses
with access to facts with more transparency. All these policy
objectives must act as broader contours of this media policy
which will eventually be able to set the intellectual direction
of national debate on the electronic media.
Business Interests Versus National Interests
A more recent phenomenon driving media houses is the role
of advertisers Media houses also failed to nurture a culture of
quality journalism. As electronic media has become an
industry in the country, the biggest driver behind its devel-
opment is the urge of making more money just like any other
business in the world. This pursues of monetary benets
often push media narrative which contradicts with national
interests. The state is criticized more for the failures of ruling
elite or government. Institutions are demonized by media
instead of individuals who breached the law.
It is noticed worthy fact that except one media house, in
Pakistan, all of the rests are family-owned business ventures.
Almost total control lies with few individuals with the power
to overrule any professional advice. This total control
enthralls these inuential individuals to push personal
agendas into the information mainstream for some monitory
gains.
It has been established in a commissions report that
today advertisers virtually dictate prime time content pref-
erences by using a narrow, relatively non-representative,
heavily urban and consumption oriented rating system to
pressurize channels into the cut-throat competition and to a
lowering of standards of content[18]. This commission was
constituted by Supreme Court of Pakistan.
Sensationalism Versus Facts
A natural outcome of the rst factor is the trend of reporting
controversial, sensational and negative news in breaking
news manner and that too without discussing the root causes
of those events. Pakistani electronic media has assigned
itself the role of interpreting good or bad for society. Failure
of the regulator is obvious in this predicament. This is per-
haps the biggest challenge media is faced with in playing its
due role in the socio-political development of the society.
Lack of Journalistic Training
Pakistans electronic media often confuse government with
the state in its coverage, criticism, and analysis. Government
due to owning all the political and administrative authority
can be criticized on bad governance but the state must not be
criticized. The need of keeping national interest supreme
over the media housesown interests is an important one.
Lack of proper training of journalists and anchorpersons is
highlighted during the debate on different national issues on
regular basis. The state is often criticized with zeal for the
government failure to perform. This trend has painted a
bleak picture of Pakistan as a nation state and national
harmony among vital institutions like parliament and armed
forces. In the debate of civil-military relations and history of
militarys role in national polity often leads to criticism of
the armed forces. Another disturbing aspect of this lack of
proper journaliststraining is a distortion of facts and
inability of avoiding favoritisms, predispositions and unde-
sirable perceptions. Last but not the least due to lack of
proper training, media often becomes a source of social and
political fragmentation of viewers as it tries to sensationalize
them by offering choices of opinion instead of the unied
presentation of content about sensitive national issues.
According to Media Commission Report 2013 released
by Supreme Court of Pakistan, the State-owned Pakistan
Broadcasting Corporation, larger media houses, as well as
smaller/private media organisations attempt to sustain a
protablebusiness; they often do not put a lot of effort and
money into building the capacity of their employees.
Training and professional development programmes are few
and even they are often avoided by the over-worked
employees themselves.
Absence of Code of Conduct
The biggest problem with PEMRA is its power of making
laws regarding electronic media on its own just by issuing
notices and press releases. This is against the spirit of the
constitution. Only elected legislators have the right to make
or amend any new laws. The government must restructure
the PEMRA with in comprehensive and unambiguous
manner. Vaguely dened clauses like reasonable restric-
tions imposed by law[19] must be eliminated from this
ordinance. Principally, Executive in the country must act
under the authority of legislation and constitution. The
biggest failure of PEMRA is its inability to introduce any
electronic media code of conduct. Political appointment at
the top post is another problem with PEMRA.
According to the Media Commission Report 2013, pub-
lished by the Supreme Court of Pakistan, 67.5% persons
who received training, undertook it with NGOs, followed by
37.5% with their employers. More women undertook their
training with NGOs and the IFJ, as compared to men.
But more men took their training with their employers and
with unions, compared to women respondents, the Report
states.
6 A. U. Khalid
Class-Based Representation
Among the various challenges faced by media is the social
evil of class based fragmentation of society. Electronic
media is to provide news and programming to post-colonial
and post-millennial Pakistan, where the enormous disparity
in education and wealth among its nearly 200 million citi-
zens manifests itself as severe barriers in accessing objective
journalism [6]. As a result of this, today, a large segment of
society read Urdu newspapers which publish relatively more
conservative views while covering certain societal issues.
Meanwhile, English press is read by ruling elite and often
offer a more secular view. This is a perilous situation from
the social point of view as it deepens the social divide and by
providing two different kinds of content to two different
classes, it is creating an intellectual fault line as well which
ultimately would pose a challenge to efforts for national
cohesion and integration.
Mushroom Growth of Media Channels
The uncontrolled and mushroom growth of media channels
in Pakistan has contributed towards abating quality and lack
of substance of news stories. The increase in the number of
mass media outlets in Pakistan over the last decade has never
managed to provide answers to the general publics concerns
that they only serve particular political or commercial
interests. Though the Pakistani mass media have become
more accessible to the citizenry and have also invested more
time and resources into enlightening the public on issues of
human rights, good governance, democracy, and
nation-building[20].
Lack of Training of Media Persons and Journalists
It is evident from the historical context of the discussion so
far that the quality of journalism in Pakistan suffered greatly
from policies of reining control over media by the successive
governments. Failure in providing an adequate level of basic
training to journalists and other media persons has also
complicated the situation. The impact of these failures was
apparent as soon as private electronic media channels were
allotted the license to put their news feeds on air. The risk of
poor quality was admitted by the senior journalists and their
ofcial bodies. Press clubsrepresentatives from across
Pakistan agreed that the rush for breaking news combined
with the unprofessional attitude of editors, newsroom staff,
and media houses leave journalists working in the eld
vulnerable and at risk[21].
Despite this clumsy beginning, today, a number of NGOs
and semi-private organizations are working for journalism
training in Pakistan. The most prominent is the Media
Housewhich was established in Pakistan with the purpose
to build the capacity of the working journalists in Khyber
Pakhtunkhwa (KP) and the Tribal Areas in particular,
Balochistan and the rest of Pakistan in general [22]. The
organization was established with conict transformation
and resolution as major goals particularly issues pertaining
to Pakistan-Afghanistan bilateral relations. Most recent
ventures of Media House include the development of uni-
versity curriculum of Media studies and journalism,
enhancing the professional capacity of existing journalists
with a specic focus in the areas of Conict Reporting.
Conict-sensitive Journalism is an area of special focus
along with physical and digital safety in conict reporting;
psychological risks; ethical standards in crisis reporting. The
role of journalism as a mean to achieve the national cohesion
and integration through the strengthening of local govern-
ment system is also among envisioned goals. Effective,
authentic and unbiased media coverage has been considered
as a most efcient way to meet these ends [22]. The NGO
has published a number of journalism manuals and guide-
lines on all above-mentioned topics.
Despite these sincere efforts by NGOs and some media
houses, the issue of poor or no training of young journalists
would remain unresolved unless government came up with a
robust media policy that can provide professional guidelines
for the electronic media.
4 Conclusions
The foregone analysis has established that electronic media
has a critical role in national cohesion and integration by
improving public understanding of the masses. This analysis
also dened the signicance of electronic media in a
democratic society. Finally, this discussion tried to answer
the fundamental question if currently Pakistani electronic
media is playing that role in Pakistani polity. It was found
that right now though Pakistani media has made masses
more knowledgeable about the events in Pakistan and region
but more than often media has suffered in presenting the
correct perspective of these developments. Hence there is a
lot of room for improvements.
The paper presented a historical perspective and it was
highlighted that electronic media in Pakistan remained under
the strict control of government and masses were bound to
listen and witness ofcial narrative about any issue. Electronic
media in Pakistan witnessed a rapid expansion and growth at
dawn of 21st century when licenses for private news channels
were rst awarded. PEMRA has established a regulator and
ofcial media watchdog under the PEMRA Ordinance 2002.
A Case Study of Pakistani News Channels: Media Education 7
Signicance of electronic media was studied in this paper
and it was found that electronic media has a multi-
dimensional impact on any society and in countries like
Pakistanits role becomes more signicant. It was learned that
being the most effective and fastest growing medium of
communication, electronic media has the ability to form
positive or negative opinion making and attitude building.
The strength of electronic media lies in its ability to cover
important issues pertaining to the socio-political and
socio-economic development and steer the collective con-
science towards the right direction.
Next, the paper debated if Pakistani electronic media is
playing this important role in the country which unfortu-
nately is not the case. Investigating and highlighting the
issues with electronic media which cause degradation of the
quality of electronic media in Pakistan was the next logical
step. It was found that like in many other developing
democracies, electronic media in Pakistan also suffers from
restraints like vested interests of media house owners,
nepotism, poor management, political motives and lack of
properly trained human resources in media houses. Specic
issues faced by Pakistani electronic media due to these
restraints were highlighted.
Lack of objectivity in respective editorial policies and lack
of understanding of the correct context of events were sighted
the two most important issues Pakistani electronic media is
faced with. The culture of ratings has also affected Pakistani
medias credibility in a negative way. Non-professional
approach by untrained journalists contributes towards the
propagation of unveried and scandalous news stories.
While investigating the root causes, it was established
that PEMRA has failed to act as an impartial and truly
independent media regulator. But a most strenuous issue is
the absence of any national media policy. The paper rec-
ommendations put it at topmost priority among other steps
which needs to be taken to made Pakistani electronic media
a vibrant force acting as custodian of fact, providing learned
opinions and analysis on current affairs, highlight gover-
nance issues, presenting Pakistans narrative on extremism
and terrorism and most importantly guiding the masses in
the right direction.
5 Recommendations and Way Forward
Formation of National Electronic Media Policy: The
problem of lack of national narrative on key issues like
terrorism and extremism can be catered effectively
through such well-dened national debate. Furthermore,
such a policy would eventually lead to strengthening the
state institutions and restoring public condence in
national institutions like parliament, judiciary, and armed
forces. A condent electronic media is a fundamental
requirement for a vibrant social structure. Pakistani
electronic media is missing its contribution to the
national effort because of this policy failure. This de-
ciency must be addressed on war footings.
Restructuring PEMRA: Current media predicament
demands a review of PEMRA Ordinance 2002 by the
parliament to make it more in line with Article 19 and 14
of the constitution of Pakistan. Most importantly,
PEMRA must work under a supervisory over watch of
legislators in a committee with a mandate to intervene
whenever PEMRA transgress its jurisdictions.
Providing Journalistic Education and Training
The government along with the cooperation of electronic
media should ensure the provision of adequate education
of journalism and training for buddingjournos in Pak-
istani media industry. Political mediocrity within the
national electronic media can be overcome only through
well-trained journalists and media persons. There is a big
vacuum in professional training in all the spheres of
journalism i.e. reporting, copy writing, investigative
journalism, editing, presentation etc.
Curbing Mushroom Growth of News Channels
One of the major reasons of poor quality of news content in
Pakistani electronic media is the uncontrolled mushroom
growth of news channels. The rule of supply and demand
was ignored initially by PEMRA and licenses for news
channels were issued without accessing the requirements
or putting in place measures to ensure that every new
license seeker has met certain criteria of trained human
resource including journalists, news editors, reporters,
correspondents etc. Consequently, the TV screens were
lled with sub-standard content and misplaced analysis on
vital issues. Channels indulged into a war of ratings
without improving internal structures, editorial policies,
and human resources development. This further compli-
cated the quality of news issues. In order to address this
issue, Pakistani government must ensure to declare a cri-
terion for media houses seeking new licenses. The growth
of electronic media must not go unrestrained.
Ensuring Wellbeing of Journalists/Media Persons
Media laws in Pakistan must be implemented in letter
and spirit to ensure that all the workers in electronic
media channels are getting their salaries and other dues
and rights properly. There have been issues of poor
nancial management on the part of higher management
in many channels due to which journalists and workers
there suffer from delayed salary payment and deduction
in other dues which are promised by these channels at the
time of signing the contract with specic individuals.
8 A. U. Khalid
References
1. Sharma, R.: Electronic Media: Issues and Innovations. Regal
Publications, New Delhi (2007)
2. Naseer, S.: The state of electronic media in Pakistan. Presentation
by Media Logic. http://www.umt.edu.pk/icobm/data/Presentation/
The%20State%20of%20Electronic%20Media%20in%20Pakistan.
pptx
3. E-Government: The PBC Act of 1973. Electronic Government of
Pakistan. Directorate for Public Relations and International Press
Release, PBC Law Ordnance
4. Pakistan Television Ofcial Website: www.ptv.gov.pk, Last
accessed 15 Nov 2017
5. Ali, Z.: Role of electronic media in changing value system in
Pakistan. Int. Asian Res. J. 1(1) (2016)
6. Khan, W.: The evolution of our media. The Express Tribune,
https://tribune.com.pk/story/6910/the-evolution-of-our-media,16
Apr 2010
7. Jabbar, J.: Role of media in national development in the 21st
century. Criterion Q. 2(2) (2013). http://www.criterion-quarterly.
com/role-of-media-in-national-development-in-the-21st-century/
8. Clark, R.: The Pyramid of journalism competence: what journalists
need to know. Poynter. http://www.poynter.org/2014/the-pyramid-
of-journalism-competence-what-journalists-need-to-know/251048/,
2014/5/12
9. Graeme, B.: Media and Society: Critical Perspectives, p. 25. Open,
Berkshire (2005)
10. Khokhar, A.: Freedom and Reform: The Political Power of Mass
Media. Institute of Strategic Studies Islamabad, http://www.issi.org.
pk/wp-content/uploads/2014/06/1299566802_38042370.pdf (2014)
11. Eleazar, S., Khan, A.: Pakistans media unraveled. Himal South
Asian, http://himalmag.com/pakistans-media-unraveled/, 26 Dec
2016
12. Khan, A.: Electronic media in Pakistan. Paper submitted to
National Management College, Lahore, Pakistan, 2010. Treasure
Chest Blog, https://zjeddy.wordpress.com/2010/07/28/electronic-
media-in-pakistan-by-azam-khan (2010)
13. Roosevelt, T.: The Man in the Arena. Speech, Paris (1910)
14. Singer, J.: The journalist in the network: a shifting rationale for
the gatekeeping role and objectivity norms. Tripodos 23,6176
(2008)
15. Schudson, M.: The Power of News. Harvard University Press,
Cambridge (1982)
16. Kovach, B., Rosenstiel, T.: The Elements of Journalism: What
News People Should Know and the Public Should Expect. Crown
Publishers, New York (2001)
17. Media watch: Shots in the dark. Pakistan Today, https://www.
pakistantoday.com.pk/2017/05/20/media-watch-shots-in-the-dark/,
20 May 2017
18. Iqbal, N.: Commission suggests review of media laws. Dawn,
https://www.dawn.com/news/1028857, 14 July 2013
19. Ministry of Information: Broadcasting, GoP, PEMRA Ordinance
2002. Government of Pakistan, Last accessed 21 May 2017
20. McQuail, D.: Mass Communication Theory. Thousand Oaks,
London (2000)
21. PPF: Rush for Breaking Newsputting journalists at risk: press
clubsreps. Pakistan Press Foundation, http://www.pakistan
pressfoundation.org/rush-for-breaking-news-putting-journalists-at-
risk-press-clubs-reps/. 23 Dec 2016
22. About US Page, Media House, http://mediahouse.com.pk/about-
us/, Last accessed 21 May 2017
A Case Study of Pakistani News Channels: Media Education 9
A Cooperative Classification System
for Credit Scoring
Dalila Boughaci and Abdullah A. K. Alkhawaldeh
Abstract
Credit scoring (CS) is an important process in both
banking and nance. CS is a score measure that helps
lenders and creditors to see how good the borrower is. It
indicates how likely the borrower is to pay back the owed
debt, based on its past borrowing behavior. For instance,
this score can be used to avoid risk and provide an
objective analysis of the applicants creditworthiness
which reduces credit risk. Also CS allows the automation
of the lending process which leads to increase the speed
and consistency of the borrowers application. In this
paper, we propose to use agentstechnology to develop a
cooperative classication system for credit scoring.
Empirical studies are conducted on ve well-known
nancial datasets. We distribute the complex classica-
tion problem on a set of intelligent and cooperative agents
where each agent evaluates a given machine learning
algorithm on the considered dataset. The use of agents in
the classication process provides a high degree of
exibility and allows for a faster time scale of data
analysis.
Keywords
Credit scoring Credit risk Machine learning
Cooperative agents Intelligent agents Financial
datasets
1 Introduction
Credit scoring (CS) is a crucial problem for banks and
nancial institutions especially after crisis 2006. The nan-
cial institutions have to nd good techniques to select
counterparties. A credit score is then an evaluation that helps
lenders and creditors to see how good the borrower is and
indicates how likely the borrower is to pay back the owed
debt, based on its past borrowing behavior [1].
Several studies in nance and banking have shown the
importance of CS. For in-stance, the credit score is one of
the most powerful predictor of risk [1]. It provides an
objective analysis and helps in the decision making whether
grant credit to client or not. CS helps in managing loan
portfolios and in reducing the cost of the credit evaluation.
The credit evaluation is the process that evaluates the cus-
tomers credit-worthy based on some related variables and
decides whether accepting or rejecting the customers
credit [2].
This importance of CS has led to the development of
various techniques for building models for CS. Almost of
them are based on statistical and machine learning tech-
niques [3,4]. Among the statistical methods studied for CS,
we give as examples: the linear regression [4], the discrim-
inant analysis and the logistic regression based methods
which are one of the most broadly established statistical
techniques used to classify clients as goodor bad[5].
Also, the decision trees [6], the classication and regression
trees (CART) [7], the neural networks [8], the support vector
machines (SVM) [9,10] and the Bayesian networks
(BN) [11] have been studied for CS. Some sophisticated
models based on computational intelligence are also studied
for developing credit scoring models. Among them, we give
for examples, the genetic programming [12], the k-Nearest
Neighbor (k-NN) classier [13], the evolution strategies [14]
and the ensemble classiers [15].
In this paper, we propose to use the agents technology to
develop a cooperative classication system. Our choice is
D. Boughaci (&)
Computer Science Department, LRIA-FEI- USTHB,
Algiers, Algeria
e-mail: dboughaci@usthb.dz
A. A. K. Alkhawaldeh
Department of Accounting, Faculty of Economics
and Administrative Sciences, The Hashemite University,
Zarqa, Jordan
e-mail: alkwaldhh@yahoo.com
©Springer Nature Switzerland AG 2019
A. Al-Masri and K. Curran (eds.), Smart Technologies and Innovation for a Sustainable Future,
Advances in Science, Technology & Innovation, https://doi.org/10.1007/978-3-030-01659-3_2
11
justied by the advantages of the cooperative work offered
by agents where the classication system can benet from
them.
An agent is a program or an autonomous entity, reactive
and able to communicate with others entities or systems. The
agents technology has been used with a great success in
different domains in particular in electronic Commerce,
telecommunications and computer security [16,17].
This work proposes an agent based system for CS. It uses
a range of machine learning algorithms. We consider six
classiers which are: Random Forest [18], Bayes Network
[11], Logistic classier [19], OneR [20], Logit Boost [21]
and AdaBoost [22]. We perform credit scoring task on some
well-known nancial datasets from UCI (University of
California at Irvine) [23]. We use also the huge Give Me
some creditdataset from Kaggle web site [24].
The rest of the paper is organized as follows: Sect. 2
presents the proposed classication system based on agents.
Some preliminary results are given in Sect. 3. Section 4
concludes and gives some future works.
2 Proposed System
The overall proposed system is depicted in Fig. 1where a
set of agents are used to handle the classication task. The
agents work in parallel and in a cooperative manner by using
several machine learning techniques.
We used two kinds of agents: agents classiers that
evaluate the machine learning technique on the considered
dataset. The coordinator agent distributes the work among
the agents participating in the classication task. Then it
receives the different classication results from the classiers
agents and selects the best one.
The technique used by each classier agent is mostly to run
an algorithm on some training data to get a model. Then, we
apply this model on new or test data to nd the appropriate
class. In our case, the example data are partitioned into
training and testing examples, approximately in the propor-
tion of 7030%, respectively. Credit scoring models are
constructed on the training example data by using the con-
sidered machine learning algorithms and validated on the
testing data.
2.1 The Classifiers Agents
We propose to use six types of classier agents. The
machine learning techniques considered in this study and
that may be used by the set of agents are as follows:
Random Forest (RF): which is a forest decision tree
classier based on a multitude of decision trees where each
tree gives a classication [18]. The RF agent chooses the
classication having the most votes over all the trees in the
forest.
Bayes Net (BN): which is a statistical model based on
combination of directed acyclic graph of nodes and link, and
a set of conditional probability table [11]. The BN agent uses
the probabilistic graphical model that represents a set of
random variables and their conditional dependencies via a
directed acyclic graph.
AdaBoost (AdaB): is an adaptive boosting machine
learning algorithm for increasing the performance of weak
learning algorithms [22]. It uses a set of learning algorithms.
Fig. 1 The proposed cooperative
classication system
12 D. Boughaci and A. A. K. Alkhawaldeh
The output of the other learning algorithms is combined into
a weighted sum that represents the nal output of the
boosted classier. The AdaB agent uses a combination of a
set of classiers produced by the learning algorithm over a
number of distributions of the training data.
Logistic regression (LR): is a regression model used to
estimate the probability of a qualitative response based on
one or more predictor or independent variables [19]. The LR
Agent evaluates the LR on the considered dataset.
OneR: is a classier based rules [20]. The Agent OneR
uses a decision tree that learns a one-level decision tree for
generating a set of rules that test one particular attribute.
Logit Boost (LB): is a boosting machine learning algo-
rithm [21] obtained by considering AdaBoost as a general-
ized additive model and applying the cost functional of
logistic regression. The LB Agent applies a boosting algo-
rithm that combines AdaBoost machine learning algorithm
with a logistic regression.
2.2 Some Variants of the Proposed System
Collaboration between agents is a key concept in a
multi-agent system. Collaborative agents work together and
interact between them in order to jointly solve tasks and
maximize their utility.
In a classication problem, there are some tasks that can
be handled in parallel such as: the variables selection, the
learning and the evaluation tasks. In order to coordinate their
activities, agents must communicate, learn from other agents
and share among them the most accurate models.
In the following, we give two variants of the proposed
system. First when we use agents in the variables selection.
Second, when we use agents to do the learning or the clas-
sication tasks in parallel.
Collaborative variable selection based on agents. The
variable selection is a preprocessing that can be launched
before the data classication. It is used for selecting a set of
relevant variables for the data classication task. It permits
to remove irrelevant variables and keeps only the signicant
ones which may enhance the performance.
Various variables selection methods have been devel-
oped. Among them, we cite the wrapper methods [25], the
ltering methods [26] and the principal component analysis
(PCA) [27]. The ltering methods remove the undesirable
variables before launching the classication task. The
wrapper methods use a machine learning algorithm where
the aim is to select the best variables with high classication
accuracy.
We note that the wrapper methods are time consuming
compared to ltering methods because they run iteratively
the machine learning for selecting variables. PCA is a sta-
tistical technique for feature construction. It can be used to
transform an n-dimensional space into a lower-dimensional
subspace, without losing much information [27]. It is a good
mechanism for reducing the dimensionality of the data. Such
reduction is achieved by transforming the number of inter-
related variables to a new set of variables called the principal
components (PCs), which are uncorrelated.
To explain the role of variable selection, we give an
example of variables that represented a real nancial dataset.
We take as an example the German credit dataset available
on UCI. The data consists of a set of 1000 applicants that can
be divided into two main classes: worthy class that consist of
700 applicants and unworthy class of 300 applicants. Each
applicant is characterized by 20 variables called also features
or attributes. Among the 20 variables, there are 7 numerical
and 13 categorical called also qualitative attributes.
The description of the different variables of the German
dataset is given as follows:
Attribute 1 (checking status): is qualitative. It is the status
of existing checking account.
Attribute 2 (duration): is numerical. It is the duration in
month.
Attribute 3 (credit history): is qualitative. It is the credit
history.
Attribute 4 (purpose): is qualitative. It indicates the
purpose that can be the following possibilities: a new car,
a used car, furniture/equipment, radio/television,
domestic appliances, repairs, education, vacation - does
not exist?, retraining, business, others.
Attribute 5 (credit amount): is numerical. It is the credit
amount.
Attribute 6 (savings status): is qualitative. It is the sav-
ings account/bonds.
Attribute 7 (employment): is qualitative. It is the present
employment since.
Attribute 8 (installment commitment): is numerical. It
gives the installment rate in percentage of disposable
income.
Attribute 9 (personal status): is qualitative. It is the
personal status and sex.
Attribute 10 (other parties): is qualitative. It represents
the other debtors/guarantors.
Attribute 11 (residence since): is numerical. It gives the
present residence.
Attribute 12 (property magnitude): is qualitative. It is the
property.
Attribute 13 (age): is numerical. It gives the Age in years.
Attribute 14 (other payment plans): is qualitative. It gives
the other installment plans.
A Cooperative Classification System for Credit Scoring 13
Attribute 15 (housing): is qualitative. It represents the
housing.
Attribute 16 (existing credits): is numerical. It gives the
number of existing credits at this bank.
Attribute 17 (job): is qualitative. It gives the job.
Attribute 18 (num dependents): is numerical. It is the
number of people being liable to provide maintenance
for.
Attribute 19 (own telephone): is qualitative. It represents
the telephone.
Attribute 20 (foreign worker): is qualitative. It gives the
foreign worker.
The aim of the variables selection method is to select only
a subset of variables from all variables of the considered data
to be classied. This subset is called signicant or relevant
variables. Only these selected variables are considered for
the classication task. This can reduce the data dimension-
ality, maximize the accuracy rate and reduce timing.
Figure 2gives a variant of cooperative classication
system where the variables selection is done in parallel by
using agents. Each agent applies a given method for vari-
ables selection. The latter is performed on the nancial
dataset to select the set of relevant variables. The best set of
variables with the best accuracy is sent to the next step of
data classication task.
Collaboration learning and classication based on
agents. The classication and the learning tasks can be done
in parallel by using a set of agents. In Fig. 3, we give a
variant of a cooperative classication system based on
agents for CS. As shown on Fig. 3, the initial example data
are partitioned in subsets of data. The latter are distributed
on a set of agents in order to do the learning task in parallel.
The collaborative agents work on different examples and
generate a model to be used in the evaluation task.
Further, the evaluation task can also be done in parallel
by using different agents. Each one applies its model on new
or test data to nd the appropriate class. Credit scoring
models are then validated on the testing data or new appli-
cants. Figure 4gives an example of a collaborative classi-
cation system. We use a set of agents where each agent
classies the applicant into a class. We obtain a set of
Fig. 2 Collaborative variable
selection based on agents
14 D. Boughaci and A. A. K. Alkhawaldeh
possible classes for this applicant. The resulting one is the
majority class.
3 Experiments
The code source is written in Java. We use Jade (Java Agent
DEvelopment Framework: Jade Site) [28] platform to exe-
cute our agents. We use some supervised machine learning
algorithms from weka (Waikato Environment for Knowl-
edge Analysis) [29]. An extensive experiment is done on the
ve real nancial datasets to evaluate the proposed system
depicted in Fig. 1. The other variants will be implemented in
future works.
All experiments were run on an Intel Core(TM) i5-2217U
CPU@1.70 GHz with 6 GB of RAM using Java program-
ming language under Windows 8 64 bits, processor 64.
3.1 Datasets Description
We perform credit scoring task on ve nancial datasets:
German, Australian, Polish, Japanese datasets available on
UCI and the huge Give Me some creditfrom Kaggle. The
description of the ve credit datasets is given in Table 1.
The Australian dataset consists of 690 instances of loan
applicants. There are two classes: class Good(worthy, 307
instances) and class Bad(unworthy, 383 instances). The
number of variables is equals to 14. There are 6 numerical
variables and 8 categorical variables.
The German credit dataset consists of 1000 instances.
There are two classes: class Good(worthy 700 instances) and
class Bad(unworthy, 300 instances). The original dataset of
german.datacontains categorical/symbolic attributes. The
number of variables is equals to 20 where 7 are numerical and
13 categorical variables called also qualitative variables.
Fig. 3 Collaboration learning
and classication based on agents
Fig. 4 Classication of a given
applicant
A Cooperative Classification System for Credit Scoring 15
The Japanese dataset consists of 690 instances of loan
applicants. There are two classes: class Good(worthy, 307
instances) and class Bad(unworthy, 383 instances). The
number of variables is equals to 15.
The Polish dataset consists of 5910 instances of loan
applicants. There are two classes: class Good(worthy, 410
instances) and class Bad(unworthy, 5500 instances). The
number of variables is equals to 64.
The Give Me Some Creditis a huge credit dataset
obtained from the competition titled Give Me some credit
in kaggle.com. The dataset contains about 150,000 instances
constructed from the credit history of 150,000 borrowers.
Each instance is formed of 10 independent variables. There
are two classes: class Good(worthy, 139,974 instances)
and class Bad(unworthy, 10,026 instances).
3.2 Performance Measures
We use a combination of several measures to evaluate the
predictive performance of credit scoring model. Table 2
gives the confusion matrix where True Positives (TP) indi-
cates the number of positive examples, labeled as such.
False Positives (FP): is the number of negative examples,
labeled as positive. True Negatives (TN): is the number of
negative examples, labeled as such. False Negatives (FN):
is the number of positive examples, labeled as negative
[30].
The best model is selected based on the validation results
using the performance indicators given as follows:
Precision = TP/(TP + FP)
Recall = TP/(TP + FN)
Accuracy (ACC) = (TP + TN)/(TP + FN + TN + FP)
PRC curves plot precision versus recall.
ROC plots the value of the Recall against that of the FP
Rate at each FP Rate considered.
We note that the area under the ROC Curve (AUC) or
ROC Area: is a common evaluation metric for binary clas-
sication problems. The principal benet of the AUC is that
it is more robust than Accuracy in imbalanced class case
because AUC is independent of the fraction of the test
population which is class 0 or class 1.
3.3 Numerical Results
Tables 3,4,5,6and 7give the numerical results found with
the six agents of the system depicted in Fig. 1. The overall
system selects the best one in term of ROC measure because
ROC is more robust than Accuracy in credit scoring related
datasets.
Tables 3,4,5,6and 7compare the results achieved
based on precision, recall, ROC and PRC. From these
results, we can see that RF succeeds in nding good results
for Australian with a ROC% value equal to 97.7%, German
with a ROC% value equal to 95.9%, Japanese with a ROC%
value equal to 98.2% and Give me some credit datasets with
a ROC % value equal to 91.3%. But RF fails on the Polish
dataset. RF gives a ROC % value equal to only 50.0%.
However, the overall system denoted AGENTS improves
this gap and succeeds in nding good results on all the
considered datasets in reasonable time. The agents are
launched in parallel so they collaborate and do the classi-
cation task more efciently.
The AGENTS system gives often the best results found
by the set of the considered agents. It gives a ROC % value
equal to 97.7% for Australian dataset, a ROC % value equal
to 95.9% for German dataset, a ROC % value equal to
98.2% for Japanese dataset and a ROC % value equal to
91.3% for Give me some credit dataset. Further it gives a
ROC % value equal to 82.8% for Polish dataset. This
superiority is due to the cooperation aspect of agents which
leads to good results.
Table 1 Description of the
datasets used in the study Dataset #Loans #Good loans #Bad loans #Variables
Australian 690 307 383 14
German 1000 700 300 20
Japanese 690 307 383 15
Polish 5910 410 5500 64
Give Me some credit150,000 139,974 10,026 10
Table 2 Confusion matrix Predicted class (%)
Real class (%) Good loans (1) Bad loans (0)
Good loans (1) TP FN
Bad loans (0) FP TN
16 D. Boughaci and A. A. K. Alkhawaldeh
To show clearly the performance of the proposed system
on the ve nancial datasets, we draw the Figs. 5,6,7,8and
9. When compared both ROC and PRC for the ve datasets,
we can say that the AGENTS system is able to nd good
results in term of ROC and PRC point of view for all the
considered nancial datasets. We can conclude that the
cooperation strategy used within agents improves the per-
formance and produces good results.
Table 3 Numerical results on
the Australian dataset Agent type Precision (%) Recall (%) PRC (%) ROC (%) Time CPU (s)
AGENT AdaBoot 86.6 85.5 91.3 92.9 1.288
AGENT BN 86.1 85.9 92.5 92.7 1.180
AGENT RF 94.1 94.1 97.4 97.7 2.067
AGENT Logistic 88.3 88.3 93.3 94.2 1.087
AGENT OneR 86.6 85.5 81.3 86.2 0.901
AGENT LB 86.8 86.8 93.3 93.8 1.223
Overall system (AGENTS) 94.1 94.1 97.4 97.7 2.067
Table 4 Numerical results on
the German dataset Agent type Precision (%) Recall (%) PRC (%) ROC (%) Time CPU (s)
AGENT AdaBoot 67.0 70.8 77.0 76.1 1.486
AGENT BN 75.5 76.1 81.4 80.9 1.079
AGENT RF 91.8 91.8 96.6 95.9 2.791
AGENT Logistic 76.2 77.1 83.1 82.1 2.083
AGENT OneR 68.9 71.7 61.5 56.3 1.393
AGENT LB 74.3 75.6 79.9 78.7 1.801
Overall system (AGENTS) 91.8 91.8 96.6 95.9 2.791
Table 5 Numerical results on
the Japanese dataset Agent type Precision (%) Recall (%) PRC (%) ROC (%) Time CPU (s)
AGENT AdaBoot 86.5 86.5 92.0 93.2 1.164
AGENT BN 86.7 86.7 92.3 92.5 1.076
AGENT RF 93.6 93.6 98.0 98.2 2.672
AGENT Logistic 87.6 87.5 92.7 93.8 1.653
AGENT OneR 86.6 85.5 86.2 81.3 0.899
AGENT LB 88.0 87.8 93.3 94.1 1.189
Overall system (AGENTS) 93.6 93.6 98.0 98.2 2.672
Table 6 Numerical results on
the Polish dataset Agent type Precision (%) Recall (%) PRC (%) ROC (%) Time CPU (s)
AGENT AdaBoot 86.6 93.1 87.1 50.0 3.915
AGENT BN 92.3 87.7 93.3 82.8 4.151
AGENT RF 86.6 93.1 87.1 50.0 4.126
AGENT Logistic 86.6 93.1 89.2 52.4 6.064
AGENT OneR 86.6 93.1 87.1 50.0 3.655
AGENT LB 86.6 93.1 87.6 51.3 4.663
Overall system (AGENTS) 92.3 87.7 93.3 82.8 4.151
A Cooperative Classification System for Credit Scoring 17
Table 7 Numerical results on
the Give Me some credit
dataset
Agent type Precision (%) Recall (%) PRC (%) ROC (%) Time CPU (s)
AGENT AdaBoot 91.3 93.4 93.6 82.7 14. 95
AGENT BN 92.4 92.4 94.5 85.8 4.03
AGENT RF 95.4 95.8 96.8 91.3 73.73
AGENT Logistic 92.0 93.7 94.6 86.1 56.05
AGENT OneR 91.6 93.5 88.4 54.4 11.931
AGENT LB 91.9 93.6 94.1 84.6 15.702
Overall system (AGENTS) 95.4 95.8 96.8 91.3 73.732
Fig. 5 ROC % versus PRC % on
the Australian dataset
Fig. 6 ROC % versus PRC % on
the German dataset
Fig. 7 ROC % versus PRC % on
the Japanese dataset
18 D. Boughaci and A. A. K. Alkhawaldeh
4 Conclusion
This work was focused on machine learning techniques for
credit scoring. Most of the existing classiers systems are
essentially based on only one unit that does the biggest part
classication and evaluation. To go beyond these limits, we
have proposed an agent-based system. The proposed system
uses autonomous for the data analysis and classication. We
presented some preliminary results and more improvements
are in progress. The use of agents in credit scoring can
provide many advantages. We are working on more tech-
niques for agentscooperation and coordination to enhance
the performance. We plan also to do the evaluation step in
parallel to enhance the computational time. It would be
interesting to implement a deep learning agents based sys-
tem to handle big data.
References
1. Miller, M.: Research conrms value of credit scoring. Nat.
Underwriter 107(42), 30 (2003)
2. Mester. L.J.: Whats the point of credit scoring? Business Review
(September), pp. 316 (1977)
3. Sousaa, M.R., Gamaa, J., Brand˜ao, E.: A new dynamic modeling
framework for credit risk assessment. Expert Syst. Appl. 16, 2015
(2015)
4. Hand, D.J., Henley, W.E.: Statistical classication methods in
consumer credit scoring. J. Roy. Stat. Soc. Ser. A (Stat. Soc.) 160,
523541 (1997)
5. Wiginton. J.C.: A note on the comparison of logit and discriminant
models of consumer credit behavior. J. Financ. Quantit. Anal. 15,
757770 (1980)
6. Quinlan. J.R.: Simplifying decision trees. Int. J. Man-Mach. Stud.
27, 221234 (Dec 1987)
7. Breiman, L., Friedman, J., Olshen, R., Stone, C.: Classication and
Regression Trees. Wadsworth, Belmont, CA (1984)
8. Desay, V., Crook, J.N., Overstreet, G.A.: A comparison of neural
networks and linear scoring models in the credit union environ-
ment. Eur. J. Oper. Res. 95,2437 (1996)
9. Bellotti, T., Crook, J.: Support vector machines for credit scoring
and discovery of signicant features. Expert Syst. Appl. 36, 3302
3308 (2009)
10. Huerta, E.B., Duval, B., Hao, J.K.: A hybrid GA/SVM approach
for gene selection and classication of microarray data. In:
Rothlanf et al. (eds.) EvoWorkshops 2006, LNCS 3907, pp. 3444
(2006)
11. Friedman, N., Geiger, D., Goldszmidt, M.: Bayesian network
classiers. Mach. Learn. 29, 131163 (1997)
12. Abdou, H.A.: Genetic programming for credit scoring: the case of
Egyptian public sector banks. Expert Syst. Appl. 36, 1140211417
(2009)
13. Henley, W.E., Hand, D.J.: A k-nearest neighbour classier for
assessing consumer credit risk. Statistician 45,7795 (1996)
14. Li, J., Wei, L., Li, G., Xu, W.: An evolution strategy-based
multiple kernels multi-criteria programming approach: the case of
credit decision making. Decis. Support Syst. 51, 292298 (2011)
15. Abelln, J., Mantas, C.J.: Improving experimental studies about
ensembles of classiers for bankruptcy prediction and credit
scoring. Expert Syst. Appl. 41, 38253830 (2014)
Fig. 8 ROC % versus PRC % on
the Polish dataset
Fig. 9 ROC % versus PRC % on
the Give Me some credit
dataset
A Cooperative Classification System for Credit Scoring 19
16. Boughaci, D., Ider, K., Yahiaou, S.: Design and implementation of
a misused intrusion detection system using autonomous and
mobile agents. EATIS 12 (2007)
17. Boughaci, D., Drias, H., Bendib, A., Bouznit, Y., Benhamou, B.:
Distributed intrusion detection framework based on autonomous
and mobile agents. In: 2006 International Conference on Depend-
ability of Computer Systems DepCoSRELCOMEX 2006, 2428
May 2006, Szklarska Poreba, Poland, pp: 248255 (2006)
18. Ho, T.K.: Random decision forests. In: Proceedings of the 3rd
International Conference on Document Analysis and Recognition,
Montreal, QC, 1416 Aug 1995, pp. 278282 (1995)
19. Cox, D.R.: The regression analysis of binary sequences (with
discussion). J. Roy. Stat. Soc. B. 20, 215242 (1958). (JSTOR)
20. Holte, R.C.: Very simple classication rules perform well on most
commonly used datasets. Mach. Learn. 11,6391 (1993)
21. Friedman, J., Hastie, T., Tibshirani, R.: Additive logistic regres-
sion: a statistical view of boosting. Ann. Stat. 28(2), 337407
(2000)
22. Freund, Y., Schapire, R.E.: A decision-theoretic generalization of
on-line learning and an application to boosting. J. Comput. Syst.
Sci. 55,119 (1997)
23. UCI (University of California at Irvine): https://archive.ics.uci.edu/
ml/datasets, Accessed Nov 2017
24. Kaggle website: https://www.kaggle.com/c/GiveMeSomeCredit,
Accessed Nov 2017
25. Kohavi, R., John, G.: Wrappers for feature subset selection. Artif.
Intell. Special issue on relevance, 273324 (1996)
26. Caruana, R., Freitag, D.: Greedy attribute selection. In: Proceed-
ings of the Eleventh International Conference on Machine
Learning, (ICML 1994, New Brunswick, New Jersey), Morgan
Kauffmann, pp. 2836 (1994)
27. Jolliffe, I.T.: Principal component analysis. Series: Springer Series
in Statistics, 2nd edn., Springer, NY, XXIX, 487, p. 28 illus.
ISBN: 978-0-387-95442-4 (2002)
28. Jade (Java Agent DEvelopment Framework): Jade Site: http://jade.
tilab.com/, Accessed Nov 2017
29. Waikato Environment for Knowledge Analysis (WEKA), Version 3.9.
The University of Waikato, Hamilton, New Zealand, Software available
at http://www.cs.waikato.ac.nz/ ml/weka/, Accessed Nov 2017
30. Powers, D.M.W.: Evaluation: from precision, recall and f-measure
to ROC, informedness, markedness & correlation. J. Mach. Learn.
Technol. 2(1), 3763 (2011)
20 D. Boughaci and A. A. K. Alkhawaldeh
A Critical Evaluation of the Effects
of Advertisements Targeted to Children
Tarik Emre Yildirim and Asli Milla
Abstract
Social media usage is growing immensely in the Arab
world. In addition to this, digital advertising is becoming
the new way of doing business in this region. There is
little effective regulation or control over of digital
marketing, children are often exposed to powerful and
targeted online marketing via digital platforms that collect
personal data. Children are exposed to millions of
user-generated content (UGC) each and every day.
Specialists have concluded, per previous research, that
children until the age of sixteen spend the same amount of
time in front of the television as the time spent at school if
not more, making television parallel with school as a tool
of persuasion, education and social development. Adver-
tisement agencies create hashtag campaigns to engage the
users whilst create user. According to a recent survey,
nearly half of young Emiratis are addicted to the internet
and spend nearly 10 h a day on social and another media.
This research aims to analyse the effects of social media
campaigns on children.
Keywords
Social media advertisements Children advertisements
Advertisement effect on children
1 Introduction
Many scholars argue, media, in general, and advertising, in
particular, have a great impact on societies with serious
consequences in terms of rapidly affecting, even
transforming traditional life stages by blurring the line
between childhood and adulthood [17].
Children are a particularly vulnerable group in the use
and purchase of both digital and non- digital content. The
risk of exposure to intrusive online marketing has become a
pressing concern in European consumer policy [8]. How-
ever, when compared with conventional media there is less
effective regulation or control over of digital marketing,
children are often exposed to powerful and targeted online
marketing via digital platforms that collect personal data in
the Middle East region. Specialists have concluded that
children until the age of sixteen spend the same amount of
time in front of the television as the time spent at school if
not more, making television parallel with school as a tool of
persuasion, education and social development. The authors
aim at analysing the effects of advertisement campaigns on
childrens behaviour and development process.
In this research, authors analysed 3 different categories of
advertisements: TV advertisements, advergames and
embedded ads in social networking sites. In this single case
study, we analysed two samples out of the selected group of
online advertisements without testing their effect on chil-
dren. A detailed list of advertisements can be found in
Table 1. The authorsobjective is to give a foundation for
the understanding of the psychology and the marketing of
the advertisements targeted to children.
2 Online and Offline Marketing
Communications to Children
Alongside media, some researchers have been questioning
the effect of targeting children by marketers both via online
and ofine marketing communications. With the advance-
ment of technology and access to internet, the young con-
sumers became target of digital marketers. Cheyne et al.
found out that websites with greater interactivity, multimedia
content and personalized interaction, create greater trafc
and keep children on the sites for longer periods of time [9].
T. E. Yildirim (&)A. Milla
American University in the Emirates, Dubai, UAE
e-mail: tarik.yildirim@aue.ae
A. Milla
e-mail: asli.milla@aue.ae
©Springer Nature Switzerland AG 2019
A. Al-Masri and K. Curran (eds.), Smart Technologies and Innovation for a Sustainable Future,
Advances in Science, Technology & Innovation, https://doi.org/10.1007/978-3-030-01659-3_3
21
2.1 TV Advertisements
Even if the advertised product is exposed to a dual audience
(meaning adult and child), the main target remains the adult
consumer for at least two reasons: his or her economic
resources, and the massive and growing presence of adults in
the total population. If advertising products are really aimed
directly at the intended buyer, this would be then, without
question, the adultand not the child.
2.2 Advergaming
Infantilization is an ideology which describes under the
mask of childrens culture the process and the culture we
now inhabit is characterized by a set of habits, preferences,
and attitudes that encourage and legitimate childishness and
youthfulness in adulthood. The studies conducted by Dias
and Redondo showed that young consumers exposed to
advergames and other website interactions with a brand,
show a marked preference for branded sweets compared to
those in a non-branded advergame [10,11].
According to Moore and Rideout, an advergame involves
a user playing with branded items. They also mention that
these games typically involve the child for longer period of
time than TV ads. [12].
European Commission carried out a study in 2015 on
advergames and found out that children are exposed to a
number of problematic marketing practices in online games,
mobile applications and social media sites, which are not
always understood by the child consumer [8].
2.3 Embedded Advertising
A methodology to measure the exposure to this kind of
advertising hasnt been agreed upon by researchers up to
now; answers to questions as Is it a matter of simply
counting the number of exposures to an image of the brands
logo or product itself? How important is the length of
exposure? Is a dialogue included? Is the story line or plot
of the episode is driven by the product?have not been
decided by researchers yet. It is also not easy to know how to
compare such exposure to a childs or teens exposure to
Table 1 Advertisement sampling
List of the 20 advertisements from various countries in Middle East used in the research. These ads are classied according to narration of the
product:
Under infantalisation advertisements selected display adults performing like a child such as screaming and crying or going into a wonderland of
candy.
In adultication section selected ads display children performing adult duties or getting into adult concerns such as telling their parents what
kind of engine type car they should buy or giving nancial advice to parents so that they can save money to buy a new bicycle.
Infantilization Adultication
Toyota HiLux: 2012
https://www.youtube.com/watch?time_continue=5&v=
GHcm8TBXZMo
McDonalds Family Time Forever: 2011
https://www.youtube.com/watch?v=pKlRR5_5oP4
Snickers Video Game Ad: 2017
https://www.youtube.com/watch?time_continue=26&v=
F7cB6TrrpNU
Johnsons Baby Ritual (Marias beauty ritual): 2017
https://www.youtube.com/watch?v=wAzAXZKjlOU
Pepsi Meal Made Excited: 2016
https://www.youtube.com/watch?v=y8MJvsjxLKU
Johnsons Baby Ritual (In Arabic): 2017
https://www.youtube.com/watch?v=GT9caPbV8Qc
Dominos Pizza: 2017
https://www.youtube.com/watch?v=wYu7Oc6rrmU
Killanan Adam ve GürbüzÇocuk (Sceptic Men and Robust Kid):
2017
https://www.youtube.com/watch?v=q3e2q1oM6Oc
Ulker Strawberry Milk: 2016
https://www.youtube.com/watch?v=oniOl3LUgWs
Ülker Yupo Çokojelo: 2017
https://www.youtube.com/watch?v=7Ev-hE-4EsM
Etisalat, Data Bonanza: 2017
https://www.youtube.com/watch?v=Mff-0VXubJI
Iklan Raya Eidul Fitr TVC Gulf Bank Kuwait: 2016
https://www.youtube.com/watch?v=LcjWPzdkW5k
118 80 (phone directory): 2015
https://www.youtube.com/watch?v=lM3N4jcUqxQ
Koton Kids: Bu benim Tarzim (This is My Style)
https://www.youtube.com/watch?v=hQ6Re4LGr1M
Almarai Cheese, What Love Tastes Like: 2017
https://www.youtube.com/watch?v=d2XzI4heDxI
Danone Karaoke: 2017
https://www.youtube.com/watch?v=1iXci-jH_yg
Alarko Kombi (Alarko Heater): 2016
https://www.youtube.com/watch?v=rRkafHmRP7U
Toyota Hybrid: 2017
https://www.youtube.com/watch?v=AsAHND-w0Xw
ING Bank: 2012
https://www.youtube.com/watch?v=3pt4-9NCzBE
Media Markt, I have a dream!: 2016
https://www.youtube.com/watch?v=LnaOiceAoIE
22 T. E. Yildirim and A. Milla
discrete, longer-form/Standard/familiar advertising. The
previous research indicates that children have a difcult time
identifying embeddedcontent as advertising, and under-
standing the intention to persuade them to buy that product
[13]. Currently, children and young people are vulnerable
towards such advertising and there are no precise measures
of the extend or effect of young peoples exposure to product
placements and other kinds of embedded advertising.
Another interesting observation is that product placements
seem to affect children but not to affect mothers. A closer
examination of the childrens top-ranked brands partially
explains why: companies place their products heavily on TV
shows that children mostly watch. Rather than mere expo-
sure, however, a more fundamental perhaps complementary
explanation is that children may be less able to detect per-
suasive intents of product placements, and thus more sus-
ceptible to product placement inuences.
There were 2 phases of these experiments that was con-
ducted by European Commission. At the rst experiment it
was found that embedded advertisements have a subliminal
effect on children. At the second experiment they found that
exposure to prompts to make in-app purchases has a sig-
nicant impact on childrens purchasing behaviour [8].
3 Data Collection: Analysis of Two Online
Ads
To present what is claimed in this paper the authors include
an analysis of two ads. These are two samples selected bulk
of ads, See Table 1, targeting adults by using either children
or childrens culture (kinderculture). The second group of
ads in the selection are those present children like tiny adults
acting like grownups presenting grownup experiences. For
this reason the rst ad chosen is Snickers Wrestler Video-
game and the second is McDonalds Family Time Forever.
For the analysis both Freudien (Psychoanalysis) and Jungien
(Analytical Psychology) will be used.
3.1 Snickers Wrestler Videogame: A Case
of Infantilization
In January 2017 Snickers Arabia introduced a video adver-
tisement titled as Snickers Wrestler Videogame on You-
Tube. The ad presents an over tempered bus driver because
he is hungry. The moment he grabs a snickers he gets back
to normal (Figs. 1and 2).
The hungry driver is portrayed as angry, aggressive and
noisy. In one scene he makes head banging listening to
heavy metal music and in another he screams as the bus
driver sees everything!. The teenage kind of action and
omnipotent mentality is observable. In addition to teen
acting when we see omnipotent mind set. The portrayed
character is having a deep regression to early childhood
period. The anal period of the child (ages 13) is a period
which child woks on being independent. This period is a
rebellious one. Still omnipotent mindset of the oral period is
there. Also a teenage kind of refusal attitude is accompanies.
The Snickers Wrestler Videogame advertisement char-
acter, Angry Bus Driver is and infantile gure. Displaying
qualities of a 2 or 3 year old child. Angry, noisy, uncom-
promising, claiming to be all mighty (omnipotence), cen-
tralizing infantile functions (such as eating or not eating. In
addition, although his face looks like a cave men in his
wrestler suit his body looks like an oversized baby. All these
indications tell us that we face with a baby/men.
A variety of advertising campaigns of adult-oriented
products today are designed with an infantile style [15].
Even if the advertised product is exposed to a dual audience,
the main target remains the adult consumer for at least two
reasons: his or her economic resources, and the massive and
growing presence of adults in the total population. If
advertising for adult products is really aimed directly at the
intended buyer, this would be then, without question, the
adultand not the child [16]. The Snickers Wrestler
Videogame advertisement is a typical sample of this kind.
3.2 McDonalds Family Time Forever: A Case
of Adultification
Here in McDonalds Family Time Forever advertisement we
see children aged 34 to 8th year olds claiming their ofce
working parents that they need to pay attention to family
values. Their work oriented life makes the family suffer so
they need a family time. For this reason an army of kids
invade the ofce place and grab their fathers to have family
time in McDonalds. The children are very clean and sharply
dressed. Cleanliness and tidiness conicts with childrens
usual being so much that we could even say that these kids
are formally dressed for the business place. As if little tiny
adults gong into parentskinder garden and grabbing them
from their ties or shutting their laptops. We witness that
parent role and child role is switched: kids lead parents to
McDonalds to have family time (Figs. 3and 4)
The role of the adult and child is switched. As mentioned
by Eric Berne in his Transactional analysis theory the ego
state of adult is activated in these children. In accordance
with that ego state of child is activated in their parents. The
result is we see adult like kids guiding and advising their
fathers about the importance of family timeas McDonalds
advertisement display. As mentioned above in adultication
children are out of the realm of childhood. Acting like adults
having adult ambitions with adult point of view. Interest-
ingly in McDonalds Family Time Forever advertisement we
A Critical Evaluation of the Effects of Advertisements Targeted 23
Fig. 1 Image of the bus driver when out of snickers. Snickers Arabia Advergame Ad, January 2017 [14]
Fig. 2 With snickers driver is back to human form. Snickers Arabia Advergame Ad, January 2017 [14]
24 T. E. Yildirim and A. Milla
Fig. 3 Kids in business place counseling parents: A father running after his business toy. McDonalds Family Time Forever Ad, 2011 [17]
Fig. 4 Adults act as naughty kids grabbed to be punished: Another father pulled from his tie. McDonalds Family Time Forever Ad, 2011 [17]
A Critical Evaluation of the Effects of Advertisements Targeted 25
dont see a frame these kids are grabbing the parents to play
of have fun or even to go to McDonalds. Such a section in
ad is not presented. We only see kids taming their parents
that they shouldnt spend so much time with their business
toys. This absence of fun puts the greatest sign that what we
see is adultication.
Children and teenagers represent an important demo-
graphic to marketers. They are now the epicenter of con-
sumer culture who command the attention, creativity and
spendings of advertisers; their tastes drive market trends and
their opinions shape brand strategies[18]. This has led to
the circumstance that their culture has become virtually
indistinguishable from adult consumer culture as it was
inuenced by it over the course of the last century [7,19].
The most crucial point is that advertisers are aware that
children inuence the purchase of not just childrens prod-
ucts anymore, but everything in the household and
elsewhere.
4 Results and Conclusions
Children are increasingly targeted in advertisements because
they have their own purchasing power and inuence their
parentsbuying decisions [7,20,21]. Furthermore, it is often
argued that companiesmain aim is to attract and reach
children in their early years in order to transform them in
later times to consumers of their own brands [15]. But the
most crucial point for this research is that advertisers are
aware that children inuence the purchase of not just chil-
drens products anymore, but everything in the household
and elsewhere. The consequence is that, apparently, many
advertisements seem to become (more) childish and juvenile
in their character to attract children even if the advertised
product is intended for adults as, for example, life insurances
and automobiles [20]. It can be observed that different
marketing methods are used to capture the attention of
children with the result that a variety of advertising cam-
paigns of adult-oriented products today are designed with an
infantile style, for example, with mere exposure effects or
spoken characters that have been shown to positively inu-
ence childrens recognition [15].
5 Limitations and Further Research
This research focuses on the part of childrens psychology
being affected by the advertisements. However, as an
extension of advertisements targeted to minors (which
includes the teenagers also) there are many ads threating
adults as children. For this reason one step forward to this
research is the adultication and infantilization processes in
advertisements. The rst one is making children adults
(adultication) uploading them the desires and ambitions of
adults and the latter one is reversing the maturity of an adult
back to the mentality of childhood by making adult purchases
and decisions in the mindset of a child. So if we only focus
about children being targeted by the ad industry and stop
there, than we will miss a great chunk of the phenomenon. In
the eld of advertisement it is the idea of childhood is being
used as a new strategy, rather than children. Brands make use
of certain components from childrens culture that are now
instrumentalized for adult purposes to reconstruct childhood
features in order to engender and enforce infantilizing
mechanisms in numerous different ways in adult-targeted
advertisementsa phenomenon that was named in the pre-
sent research as Kinderculture. So it is not just childrens
mind being targeted also keeping adults as children and/or
causing nostalgia to extent of causing a regression in the
pschosexual and psychosocial developments of adults is also
largely being practiced.
References
1. Postman, N.: The Disappearance of Childhood. Vintage Books,
New York (1982)
2. Meyrowitz, J.: No Sense of Place: The Impact of Electronic Media
on Social Behavior. Oxford University Press, New York (1985)
3. Dorfman, A.: The infantilizing of culture. In: Lazere, D. (ed.)
American Media Mass Culture, pp. 145157. University of
California Press, Berkley, Los Angeles (1987)
4. Bly, R.: The Sibling Society. Addison-Wesley Publishing Com-
pany, Boston (1996)
5. Epstein, J.: The Perpetual Adolescent. Wkly Stand. Retrieved from
http://www.weeklystandard.com/Content/Public/Articles/000/000/
003/825grtdi.asp (2003)
6. Mintz, S.: The social and cultural construction of American
childhood. In: Coleman, M., Ganong, L.H. (eds.) Handbook of
Contemporary Families: Considering the Past, Contemplating the
Future, pp. 3654. Sage, London (2004)
7. Barber, B.: Consumed: How Markets Corrupt Children, Infantilize
Adults, and Swallow Citizens Whole. W. W. Norton & Company,
New York (2007)
8. Lupiáñez-Villanueva, F., Gaskell, G., Veltri, G.A., Theben, A.,
Folkvord, F., Bonatti, L., Codagnone, C.: Study on the impact of
marketing through social media, online games and mobile
applications on childrens behaviour (2016)
9. Cheyne, A.D., Dorfman, L., Bukofzer, E., Harris, J.L.: Marketing
sugary cereals to children in the digital age: a content analysis of 17
child-targeted websites. J. Health Commun. 18(5), 563582 (2013)
10. Dias, M., Agante, L.: Can advergames boost childrens healthier
eating habits? a comparison between healthy and non-healthy
food. J. Consum. Behav. 10(3), 152160 (2011)
11. Redondo, I.: The effectiveness of casual advergames on adoles-
centsbrand attitudes. Eur. J. Mark. 46(11/12), 16711688 (2012)
12. Moore, E.S., Rideout, V.J.: The online marketing of food to
children: is it just fun and games? J. Publ. Policy Mark. 26(2),
202220 (2007)
13. Owen, L., Lewis, C., Auty, S., Buijzen, M.: Is childrens
understanding of nontraditional advertising comparable to their
understanding of television advertising? J. Publ. Policy Mark. 32
(2), 195206 (2013)
26 T. E. Yildirim and A. Milla
14. Snickers Video Game Ad. Retrieved from https://www.youtube.
com/watch?time_continue=26&v=F7cB6TrrpNU
15. Keillor, B.D. (ed.): Marketing in the 21st Century:
Integrated marketing communication, vol. 4, Praeger, Westport
(2007)
16. Başbuğ, B.: Ewige jugend: mythos in einer alternden gesellschaft.
Der Trend Des jungen Alterns’’ in Der Werbung. In: Schwender,
C., Hoffmann, D., Reißmann, W. (eds.), Screening Age
Medienbilder, Stereotype, Altersdiskriminierung, pp. 97113.
Munih, kopaed (2013)
17. McDonalds Arabia Family time together. Retrieved from https://
201www.youtube.com/watch?v=pKlRR5_5oP4
18. Schor, J.B.: Born to Buy: The Commercialized Child and the New
Consumer Cult. Simon and Schuster, New York (2014)
19. De Zengotita, T.: Mediated: How the Media Shape the World
Around You. Bloomsbury, London (2005)
20. McNeal, J.U.: The Kids Market: Myths and Realities. Paramount
Books, New York
21. Bridges, E., Briesch, R.A.: The nag factorand childrens product
categories. Int. J. Advertising 25(2), 157187 (2006)
A Critical Evaluation of the Effects of Advertisements Targeted 27
A Gulf College Case Study: Technology
Enhanced StudentsLearning Geared
with Mobile Devices
Rowena Ocier Sibayan , Alrence S. Halibas ,
and Kenneth Ocier Sibayan
Abstract
Over the decades, the world has become increasingly
hyper-connected. The people and businesses can com-
municate with each other instantly where machines are
equally interconnected. Through the help of the internet
and its associated services, information is accessible and
immediate for every-one. In education, the utilization of
information and communication technologies helps
improve teaching pedagogy and enhanced students
learning. The use of technology affects the quality of
education, and more specically it can result in better
student performance and enhance the student learning
experience. Today, mobile devices are widely used for
communication, education, entertainment, research col-
laboration and social interaction. Research issues and
challenges related to technology-enhanced learning are
discussed for classroom learning at a distance, digital
libraries, online learning, and collections of various
online information, and e-collaboration. Nowadays, the
learning world has used mobile devices intensively for
various day-to-day activities. However, some technology
developers, teaching pedagogical experts and teachers are
still tied to the old world of desktop computers for
software and application development. The proposed
research aims to investigate the various methodologies,
framework and approaches adopted to demonstrate the
role of technology in enhancing the studentslearning
experience in which enhancement is conceived and the
use of various technologies in empowering mobile
devices as an innovative tool to an effective learning
environment. The aim would be in developing a
framework (like teachers) to tailor their learning materials
and using different educational technologies in mobile
devices to substantiate claims about technology enhanced
learning. Qualitative and quantitative data analyses are
used to examine the relationships explored between the
aims of technology improved learning interventions. The
evidence presented, and the ways in which enhancement
is conceived and how large it has effects on the students
learning and teacher pedagogical approaches are
highlighted.
Keywords
Mobile Technology Education Learning
Enhancement
1 Introduction
Innovation is a major pillar of knowledge economy. Simi-
larly, innovation entails creation and exploitation of oppor-
tunities that will result in better services and the
development of new skills and competences. Education as
one of the building blocks in the innovation and
knowledge-based economy drives social change. The like-
wise, the learning institutions utilise technology to prepare
the students to think critically and develop innovative skills
to be globally competitive. The role of mobile devices in all
learning institutions is becoming progressively important to
support the use of these technologies for effective teaching
and learning that will transfer the needed workforce
knowledge and skills. There are some research issues and
challenges related to technology-enhanced learning studied
and discussed for classroom learning at a distance, online
learning, digital libraries, online resources, virtual laborato-
ries, e-collaboration, and virtual environments. Recognizing
the potential of small changes in technology, both positive
and negative will have tremendous effects on learning and
R. O. Sibayan (&)A. S. Halibas
Gulf College, Seeb, Sultanate of Oman
e-mail: rowena.sibayan@gulfcollege.edu.om
A. S. Halibas
e-mail: alrence@gulfcollege.edu.om
K. O. Sibayan
Trend Micro Inc., Manila, Philippines
e-mail: kensbyn@outlook.ph
©Springer Nature Switzerland AG 2019
A. Al-Masri and K. Curran (eds.), Smart Technologies and Innovation for a Sustainable Future,
Advances in Science, Technology & Innovation, https://doi.org/10.1007/978-3-030-01659-3_4
29
teaching pedagogy of many learning institutions which are
discussed in this research.
The mobile learning technologies have progressively
evolved globally. It offers teachers-students more exible
approach of learning. It also helps to improve the means of
communication, human daily activities and social interac-
tion. The increasing improvements in design, functionality,
reduced in size, improvements in storage capacity and the
reliability and ubiquity of the networks that supports mobile
technology devices are perceived by everyone as essential to
the behavior of peoples everyday activities [1]. In an edu-
cational context, ubiquitous connectivity and the portable
nature of mobile devices facilitate access to more collabo-
ration in learning experience which understands into greater
ownership of teaching-learning processes [2]. Furthermore,
another researchers [3] studied that potential advantages of
blended learning such as time exibility and meeting indi-
vidual learning styles are enhanced with the use of mobile
technologies. Most mobile learning tools should be sup-
ported by the institution in which the educational websites
like VLE should sustained by the institution once the project
administrator resigns the institution [4].
It was suggested that any theory of mobile learning must
embrace the considerable learning that occurs outside the
classroom and is personally initiated and structured. It must
also account for the dynamic trends of learning [5]. A rele-
vant theory of learning must embrace the contemporary
practices and the development of learning. It was added in
one research [6] that technology-enhanced learning spanning
a range, starting with basic brain research and ending with
the study of complex systems. Most learning institutions are
facing challenges in identifying strategic priorities for
investment in mobile learning capabilities to maximize the
students educational outcomes, but to minimize institutional
costs.
1.1 Mobile Learning Theories
There are many denitions of e-learning, distance learning
and online learning [7]. With the advent of the internet and
intent-save use of technology, those denitions lead to the
process of learning as an output of the use of the internet.
Some researchers discussed that the use of internet based on
Information and Communication Technology in teaching,
learning processes can be responsible for promoting lack of
leadership [8]; increasing drop-out rates [9]. On the contrary,
other researchers justied that the internet can also be an
enabling tool for an easy communication, accessibility to
multiple online resources, especially when comparing with
the traditional teaching and learning strategies. A theory of
mobile learning is essential when thinking of the role of
mobility and communication in learning environments [5].
Like a blended environment, mobile learning helps
learners move in and out of engagement with technology and
learn across both space and time and move from topic to
topic. A key point in mobile learning theory is that it is the
learner that is mobile, not the technology [10]. As devices
are ubiquitous, learning can be linked with everyday life
activities. Control of mobile learning environments can be
distributed, and context is constructed by learners through
their interaction with devices and with each other. Educators
and learners acknowledge that mobile learning can both
complement and conict with formal education and it raises
ethical issues both of privacy and ownership. However, a
researcher [11] believed that mobile learning interconnects
with e-learning and he considered learning to be facilitated
by a convergence of the internet, wireless networks, hand-
held devices connected to the internet and consider learning
to be distinctive characteristics of mobile learning and
e-learning.
It was reviewed in several literatures relating to mobile
learning and were identied that few studies have focused on
the development of specic frameworks to support the
design of mobile learning [12].
1.2 Teaching Pedagogical Considerations
Learning through mobile device requires extensive design
and pedagogical considerations. The traditional teaching
pedagogy theories are not suitable for mobile learning since
the main assumptions on teaching are in the classroom.
Some initiatives have already implemented for dening
distinctive today, technology emphasise the importance of
communication and collaboration in building of knowledge.
Furthermore, there are researchers who believe that tech-
nology can help students learn best when undertaking
authentic tasks within relevant and meaningful contexts [13].
It also emphasises the importance of enabling personalised
learning experiences, encouraging students to take owner-
ship of the learning process [14].
Distance learning has existed for the past decades. In this
era, modern technologies have allowed students and teachers
to connect directly, no matter where the locations are with
the use of internet and mobile devices. Mobile technology is
one of pedagogical tools that helps student learning and
teaching techniques that inuence educators to use wireless
applications and social networks to improve learning out-
comes and provide innovative ways to increase access to
vast educational resources. Technology experts have devel-
oped different mobile applications to help educators and
learners at every level optimise the use of mobile learning
resources that would effectively enhance educational expe-
rience and improve the learning process regard-less of
physical location.
30 R. O. Sibayan et al.
Since the competitiveness in higher education is
increasing, many learning institutions look for different ways
of managing and providing quality in teaching delivery, but
to some extent, this innovative way of teaching needs to
evaluate the impact of delivery to promote a better under-
standing of quality of teaching and learning and the
enhancement of its quality. Many learning institutions in the
Sultanate of Oman and even all over the world have started
to explore the capabilities of mobile handheld technologies
for teaching range of understandings and skills across the
curriculum. It is known that the traditional classroom
learning has already well dened pedagogical principles
which include good practices such as encourages students
through faculty contact, improve cooperation among stu-
dents, develop active learning and respects diverse talents
and ways of learning. Unlike mobile learning, nowadays is
often directed by pedagogy which is extended with new
dened principles specically for e-learning. E-learning
teaching methodology extends in creating institutional
environment that support and encourages inquiry and
e-collaboration, Hence, it was suggested [15] that the eval-
uation process must be structured that will align to the need
of different stakeholders and must comprise a set of criteria
for a clear assessment. It is important to understand the
following: (1) performance indicator, (2) stakeholders
expectations, (3) and measure to what extent these expec-
tations are considered and achievable [16].
1.3 Quality in E-Learning
Quality learning is not only essential for meeting peoples
educational basic needs, but is also fundamental in fostering
the conditions for global peace and sustainable development.
Learners should acquire attitudes, values and skills as well as
information and learn need to be active, collaborative and
self-directed ways to ourish and contribute to the com-
munity. Therefore, teachers, learners and learning institu-
tions should adapt to new demands of using technology in a
manner that enhances the learning experience of learners.
In education, the term quality is a client-oriented concept
in which quality requirements are dened through a partic-
ipation process between clients and providers. Their teach-
ers, peers, communities, curriculum and learning resources
must help prepare students to recognize and to value the
importance of acquiring relevant skills and competencies for
21st century employment opportunities.
In the US, mobile devices as teaching tools are becoming
a more common part of the education system experience in
classrooms, from preschool through graduate studies. The
teachers are building that tech-savvy learning environment
in their lesson plans by embracing bring-your-own-device
policies and leading the push for mobile devices every stu-
dent [17].
In the Sultanate of Oman, mobile learning has started to
emerge as supporting tool in the education process. Many
students are using mobile devices which are more advanced
nowadays. These devices provide opportunities to access to
vast of information that will help them to enhance learning
performance. This research is intended to nd out the
effectiveness of utilising mobile devices in the learning
process of Gulf College and to promote teachers-students
collaboration in their education activities.
Even though, the utilisation of mobile devices is being
considered as an enhanced teaching tool to the existing
e-learning platform and the content of e-learning is trans-
ferred to mobile devices, for some pedagogical researchers
considered this a relatively new. An investigation on how the
efcient the integration of mobile devices into existing
activities has resulted in a two-way process to support the
learning based on studying activity theory [18]. The design
of the mobile learning and the learning needs of connected
people. Mobile technology is not like the e-learning and it is
not focused just to the mobile phones which are always
connected [19].
2 Research Methodology and Respondents
The researchers administered a survey questionnaire to
undergraduate students and lecturers, IT staff for the Aca-
demic Year 20162017 of Gulf College (GC). The respon-
dentsage-range was 1850. The respondents consisted of
60 males and 43 females. The respondents were instructed in
the survey to offer information about their experiences in
collaborative learning and the impact of using mobile
devices in the learning process. A quantitative approach and
statistical data were used to analyse the collected data. In
addition to the questionnaire, the researchers compared the 2
Semesters for AY 20162017 module wise results for some
selected modules that require more usage of mobile devices.
The modules are Technical English for Computing
(TEC) which is 100% coursework that the students need to
do some research paper and portfolio planning and Intro-
ductory Business Concepts (IBC) which is 50% Exam and
50% coursework that requires research on the business plan
as a major concern.
The questionnaires were randomly distributed to the
respondents of the study. The instrument used for the study
was designed based on the objectives of the study. The
researchers applied a four-point Likert Scale (1 for strongly
disagree to 4 strongly agree) in the study. The questions
were easy to understand and the answers were divided into
four sections to make it clearer so that the researchers can get
A Gulf College Case Study: Technology Enhanced 31
respondentsopinions about the use of mobile devices for
academic activities and the result of enhanced learning is
achieved. Each participant was provided with a question-
naire and a brief background to the study.
3 Data Analysis and Findings
To determine if the studentsperformances in their educa-
tional activities enhanced by using mobile devices, 103
respondents were selected which involved 61 of
under-graduate students and 37 lecturers, and 5 IT staff. The
respondents were randomly chosen from different under-
graduate specialization offered by GC, three faculties of
studies.
Table 1shows that most of the mobile users are com-
puting sciences students and lecturers with 24.27 and
14.56% respectively as it also reects on their specialization.
Most mobile users were followed by business students and
lecturers with 19.42 and 12.62%, respectively, then followed
by foundation studies students and lecturers with 15.53 and
8.74% accordingly while IT staff who are managing the
college virtual learning with 4.85% participation were also
included.
Nowadays, mobile devices such laptops, Smartphone, etc.
are being utilized by different users to support their daily
activities. For GC students and lecturers, mobile devices are
very useful in their academic requirements and being used
for the following reasons shown in Fig. 1. It reveals that
72% of the respondents accessed huge information through
their mobile devices followed by 64% of the respondents
utilized mobile devices for educational purposes such as
collaboration with peers through social media apps and 47%
of the respondents used mobile devices to access entertain-
ment while 17% for other purposes.
In addition, Fig. 2reveals that 71.84% of the respondents
preferred to use WhatsApp for e-collaborative work com-
pared from the popularity of Facebook with 30.66% and
YouTube with 44.66% followed by Instagram. Seventeen
and forty-eight percent LinkedIn user while Twitter is also
popular, for educational activities, only 7.76% users.
The study also reveals that it is helpful for the respon-
dents to use mobile devices to improve their performance in
the class. Students are condent that with the use of mobile
devices, specically smart phones, they will not be left
behind and will be able to nd the right information faster
whenever they need. The students said that mobile devices
help them to do research and allows for immediate feedback
from their teachers and classmates. They added that they
dont even need to carry around their lecture materials
because virtual learning environment can be accessed
through their mobile phones. This means that students can
study anywhere, anytime and benet with the use of mobile
technology as making things easier, better, and faster.
Every semester, GC module leader submits Module
Monitoring Report (MMR) to determine the performance of
the students and if the module learning outcomes are
achieved. Based on the TEC and IBC MMR documents
submitted to the Faculty of Computing Sciences, the
researchers did the comparison of the 2-semester results for
the following modules shown in Table 2. The table shows
that the marks of the students increased when the students
used their mobile devices in their classroom activities. This
means that their classroom performance was enhanced
because the passing rate of the module increased
tremendously.
Enforcing the utilization of mobile devices in the class-
room requires proper monitoring and policy so as not to be
abused while students are in the classroom. The IT staff
agreed that mobile devices should be utilized because of its
effectiveness and helpful both for the students and lecturers
and strongly agreed that website restriction should be
implemented. It is essential to target the classroom experi-
ences that fundamentally shape student learning and
emphasize the range of skills required for lifelong well-being
and societal cohesion with proper IT management to maxi-
mize the full potential of mobile device technologies. The
researchers decided to triangulate the ndings of the study to
Table 1 Demographic prole of the respondents
Category Faculty of studies No. of respondents Percentage (%)
Students Foundation studies 16 15.53
Computing sciences 25 24.27
Business and management studies 20 19.42
Lecturers Foundation studies 9 8.74
Computing sciences 15 14.56
Business and management studies 13 12.62
Other IT staff 5 4.85
Total no. of respondents 103 100
32 R. O. Sibayan et al.
nd some similarities and in some way, to validate each
opinion. The ndings reveal that although the college has
included innovation within its vision and mission statement,
internal innovation should be strongly intensied.
4 Conclusion and Recommendations
The main purpose objective of this study has been to investi-
gate the effectiveness of using mobile device technologies in
educational activities, studentsaccessibility to GC VLE,
teaching methodology to tailor learning material using dif-
ferent educational technologies, and students academic
performance. It was found out the use of mobile devices as an
additional tool to provide students with an opportunity to
actively participate in the learning process by accessing online
discussion, searching additional educational learning materi-
als does motivate and encourage students to adopt a deep
learning approach that enhance their academic performance.
Some reviewed literature discussed that mobile devices have a
bad reputation in any learning institutions, but that is the
beginning to change. Instead, stakeholders should embrace
them because the study reveals that the students are more
engaged and motivated to learn when they use mobile phones.
With proper training and implementation to explore the full
potential of this high technology gadgets, teacher, learners and
other stakeholders will be able make paces to empower and
uplift students in their learning. This research will be a basis to
do an experimental research for AY 20172018.
References
1. Evans-Cowley, J.: Planning in the real-time city: the future of
mobile technology. J. Plan. Lit. (2011)
2. Graham, C.R., Woodeld, W., Harrison, J.B.: A framework for
institutional adoption and implementation of blended learning in
higher education. Internet High. Educ. (2013)
3. Ho, A., Lu, L., Thurmaier, K.: Testing the reluctant professor s
hypothesis: evaluating a blended-learning approach to distance
education. J. Public Aff. Educ. (2006)
4. Kember, D., McNaught, C., Chong, F.C.Y., Lam, P., Cheng, K.F.:
Understanding the ways in which design features of educational
websites impact upon student learning outcomes in blended
learning environments. Comput. Educ. (2010)
5. Sharples, M., Taylor, J., Vavoula, G.: A theory of learning for the
mobile age. Learning (2007)
6. Pachler, N., Bachmair, B., Cook, J.: Mobile Learning (2010)
7. Moore, J.L., Dickson-Deane, C., Galyen, K.: E-Learning, online
learning, and distance learning environments: are they the same?
Internet High. Educ. (2011)
8. Jara, M., Mellar, H.: Factors affecting quality enhancement
procedures for e-learning courses. Qual. Assur. Educ. (2009)
9. Parker, A.: A study of variables that predict dropout from distance
education. Int. J. Educ. Technol. (1999)
10. Vrasidas, C.: Issues of pedagogy and design in e-learning systems.
In: Proceedings of the 2004 ACM symposium on Applied
computingSAC04 (2004)
11. Motiwalla, L.F.: Mobile learning: a framework and evaluation.
Comput. Educ. (2007)
12. Cobcroft, R.: Literature review into mobile learning in the
university context. Control. 138 (2006)
13. Loyens, S.M.M., Gijbels, D.: Understanding the effects of
constructivist learning environments: introducing a
multi-directional approach. Instr. Sci. (2008)
14. Demian, P., Morrice, J.: The use of virtual learning environments
and their impact on academic performance. Eng. Educ. 7,1119
(2012)
Table 2 Comparison of module results for 2-semesters AY 2016
2017
Semester 1 Passing rate (%)
Technical English for computing 90
Introductory business concepts 74
Semester 2 Passing rate (%)
Technical English for computing 99
Introductory business concepts 86
18
17%
48
66
74
Fig. 1 Usage of mobile devices
Respondents
71.84%
17.48%
18
7.76%
27.18% 44.66%
Instagram Youtube
30.66%
28
32
46
74
Fig. 2 Purpose of using mobile device technologies
A Gulf College Case Study: Technology Enhanced 33
15. Pawlowski, J.M.: The quality adaptation model: adaptation and
adoption of the quality standard ISO/IEC 19796-1 for learning,
education, and training (2007)
16. Kirkwood, A., Price, L.: Learners and learning in the twenty-rst
century: what do we know about studentsattitudes towards and
experiences of information and communication technologies that
will help us design courses? (2005)
17. Lynch, M.: Do mobile devices in the classroom really improve
learning outcomes. Conversat. [Blog] (2015)
18. Waycott, J., Hall, W.: An investigation into the use of mobile
computing devices as tools for supporting learning and workplace
activities (2001)
19. Wagner, E.D.: Enabling mobile learning. Educ. Rev (2005)
34 R. O. Sibayan et al.
A Review Study on the Accuracy
of Conversion Between IFPUG FPA
and COSMIC Function Points
Abedallah Zaid Abualkishik
Abstract
Functional size measurement methods are widely used by
software project managers since it supports early estima-
tion. Function Point Analysis (FPA) was the rst method
proposed for the purpose of capturing functional size, but
unfortunately it is awed in some ways. A sec-
ond-generation method was COSMIC function points
that offered a novel design. However, since then, the
accuracy of convertibility between the two measures has
become an issue. This study aims to determine how
accurate are the conversion types featured in the literature
employing the ordinary least squares regression model by
examining the convertibility of Fetcke case study via the
leave one out cross validation. The ndings indicated that
the most commonly-used conversion type did not provide
the highest accuracy. Instead it was the transaction
function-based type that achieved best results. Therefore,
in order to obtain high accurate results, several conversion
types must be tested.
Keywords
IFPUG FPA function points COSMIC function points
Measures Conversion Accuracy
1 Introduction
Functional Size measurement (FSM) is a very useful method
for early estimation. It can be used for project management
functions such as effort estimation, pricing, bidding, and
contacting. Function Points Analysis (FPA) by Albrecht [1],
was a pioneering approach in effort estimation. After a
while, Albrecht and Gaffney [2] adjusted the method for
capturing the functional size. Despite the widespread use of
FPA there was still criticism about its limited ability to
capture only the size of some types of software [3,4].
Furthermore, the FPA method suffers many theoretical and
structural problems [5], for example, it contains some steps
that violate the principles of measurement theory such as
transforming measure of ordinal scale to ratio scale.
On the contrary, COSMIC function points [6] was pro-
posed to full software engineering and measurement theory
principles, and to tackle the limitations of FPA. The con-
vertibility between the two methods had been enhanced
since its initial proposal and several organizations have been
willing to convert the accumulated knowledge of functional
size measured in FPA to the corresponding COSMIC value.
Toward this end, many studies were published to address the
convertibility issues. The conversion between the two
methods can be classied into two main types as follows:
Statistical conversion: Converts the FPA measure or any
of its sub measures into the corresponding COSMIC
Function Points (CFP) statistically using regression
models [718],
Theoretical conversion: Converts the FPA size or any of
its sub measures into the corresponding CFP size using
proposed formulas derived through a deep study of the
similarities and correspondence between the two meth-
ods. Two studies were published in this regard [18,19].
Many studies were published in the literature that eval-
uated the conversion accuracy between the two methods
[2024]. Many conversion types were also proposed for the
purpose of estimating the CFP using different FPA measures
like the Unadjusted Function Points (UFP), Data Functions
(DF), Transaction Functions (TF) and the File Type Refer-
enced (FTRs). For example, it is possible to use the TF as an
independent variable to estimate the dependent variable, i.e.
CFP. This paper aims to examine the accuracy of these
conversion types using Fetcke case study [25]. In this con-
text, accuracy refers to the closeness of an estimated value to
the actual value.
A. Z. Abualkishik (&)
American University in the Emirates, Dubai,
United Arab Emirates
e-mail: abedallah.abualkishik@aue.ae
©Springer Nature Switzerland AG 2019
A. Al-Masri and K. Curran (eds.), Smart Technologies and Innovation for a Sustainable Future,
Advances in Science, Technology & Innovation, https://doi.org/10.1007/978-3-030-01659-3_5
35
This paper is structured in the following manner: Sect. 2
presents the background of FPA and COSMIC Function
Points, while Sect. 3describes the research methodology.
Section 4explores the analysis of Fetcke case study. Sec-
tion 5proceeds to describe the empirical evaluation of the
accuracy for the tested conversion types and Sect. 6presents
the discussion of the ndings. Section 7rounds up the study
and makes recommendations for future research.
2 Functional Size Measurement Methods
2.1 Function Point Analysis (FPA)
The FPA method [26] has ve Basic Functional Components
(BFCs) classied into two types: Data Functions (DF) deal-
ing with data inside and outside the system boundary, and
Transaction Functions (TF) which comprise processes that
facilitate the data exchange between the measured system
and the user in relation to the system boundary. DF is of two
main types: Internal Logical File (ILF), which is a user
recognizable and identiable group of logically related data
or control information that is within the system boundary
and maintained by the measured system, and External
Interface File (EIF), which is a user identiable group of data
or control information referenced by the measured applica-
tion but maintained by another application.
TF is classied into three types according to data ow in
respect of application boundary and the processing logic of
each transaction. External Input (EI) is an elementary process
that carries data from outside to inside the system. External
Output (EO) is an elementary process that carries derived data
from inside the system to outside. External Query (EQ) is an
elementary process that sends data from inside to outside the
system boundary with a primary logic to present retrieved
information to the user. IFPUG FPA has a weighting system
that assigns certain weights to each TF BFC according to the
referenced Data Elements Type (DETs) and FTRs. As for DF,
each le is evaluated according to the DETs and Record
Elements Type (RETs). More information can be found in the
IFPUG FPA counting practice manual.
2.2 COSMIC Function Point
COSMIC function points [6]denes the smallest unit of
functional user requirements as a functional process, which is
dened as: a set of data movements, representing an ele-
mentary part of the Functional User Requirements for the
software being measured[6]. A functional process comprises
a pair of sub-processes: Data manipulation type and/or data
movements types, the latter being COSMIC BFCs that move a
data group type. Four data movements are described in [6]:
Entry (E): A data movement that moves a data group
from a functional user across the boundary into the
functional process where it is required.
eXit (X): A data movement that moves a data group from
a functional process across the boundary to the functional
user that requires it.
Read (R): A data movement that moves a data group
from persistent storage into the functional process which
requires it.
Write (W): A data movement that moves a data group
lying inside a functional process to a persistent storage.
Each data movement type has one unit of the nal
CFP. The nal size of an application is the total of all data
movements dened in all functional processes.
3 Research Methodology
3.1 Regression Models
Shapiro Wilks test was used to measure the normality,
while Pearson test was used to measure the correlations
between the variables. The Ordinary Least Squares
(OLS) was used to obtain the conversion equations:
OLS: Is the most used regression model in convertibility
studies. It provides the estimation of the dependent variable
value through the independent variable value linearly. OLS
minimizes the sum of the squared residuals for the depen-
dent variable and the estimated value by the linear regres-
sion model [27]. The linear regression model looks like:
Y¼axþb
3.2 Accuracy of Predictive Models
Many tting measures that are typically used in empirical
software engineering studies involved in evaluating the
accuracy of the obtained models:
Magnitude of Relative Error (MRE): MRE measures the
difference between the actual value and the estimated
value divided by the actual value. The MRE measure is
computed using the formula:
MRE ¼Actual Estimated
jj
Actual
Mean of MRE (MMRE): Is the mean of all MRE values
of all the data points in the dataset. In software
36 A. Z. Abualkishik
engineering studies, an estimation that has MMRE
0:25 is considered reasonable and acceptable.
Pred (25): Represents the portion of the data points
estimate within MRE ±0.25% for the actual observa-
tions. According to Kitchenham et al. [28], MMRE and
Pred (25) are measures for spread and kurtosis. Addi-
tionally, we use Pred (10).
Median or MRE (MdMRE): Is the median of all MRE
values.
All the tting measures were obtained through the Leave
One Out Cross Validation (LOOCV). The LOOCV prevents
and alleviates over tting. For a dataset of size N, the
LOOCV uses (N 1) data points as a training data for the
construction of the model and then validates it against the
left data point to obtain the desired tting measures. The
regression model is constructed in each iteration. Finally, the
average is computed for all the desired measures. The
absolute residuals boxplots are used to compare the obtained
models equivalences as suggested by Kitchenham and
Mendes [29]. In addition, the Wilcoxon signed rank sum
test, also known as Mann-Whitney test, is used to compare
the signicance of the obtained models by comparing the
absolute residuals.
4 Fetcke Case Study
Fetcke et al. [25] case study is a warehouse Management
Information System. The case study includes four subsys-
tems: Warehouse operation application, Manufacturers
warehouse, Customer management application, and Large
warehouse operation. Table 1shows the dataset.
Based on the data availability, it is possible to perform the
following based conversion types: TF, DF, UFP, and FTRs.
Table 2shows the descriptive statistics of Fetcke case study
parameters.
Shapiro-Wilks test is used to test the normality of the
variables TF, DF, UFP, FTRs, and CFP and the reported
results are: 0.73, 0.36, 0.86, 0.74, and 0.59, respectively.
Table 3shows the correlation results using Pearson corre-
lation test.
It is of interest to note that the correlation values are quite
high, thus, it is expected to obtain good tted models.
Table 4shows the parameters of the conversion models
obtained by the OLS regression models.
In general, all the conversion types obtained good
adjusted R2value except for the DF based conversion type.
Therefore, this type is not expected to provide as accurate a
model as the other types.
5 Accuracy Measures Obtained with LOOCV
Table 5shows the accuracy measures obtained for the
conversion types reported in Table 4The accuracy measures
show that the best conversion type for this dataset is the
TF-based type with minimum MMRE, MdMRE and nar-
rower relative error. This is followed by the FTRs-based
type, which is the most common type used in the literature,
and nally the DF-based type. Figure 1shows the boxplots
of the absolute residuals. Figure 1conrms the results
reported in Table 5.
To statistically make sure that the reported values have
not been obtained by chance, the Wilcoxon signed rank sum
test is used to test whether the absolute residuals yielded by
Table 1 Fetcke dataset Application name TF DF UFP FTRs CFP
LS 19 12 31 9 29
LC 37 19 56 18 52
C3514491752
M2614401239
W5621772781
Table 2 Descriptive statistics of
Fetcke case study Application name TF DF UFP FTRs CFP
Mean 34.6 16 50.6 16.6 5.6
Median 35 14 49 17 52
Sdev 13.9 3.8 17.5 6.8 19.5
Range 1956 1221 3177 927 2981
Mean 34.6 16 50.6 16.6 5.6
A Review Study on the Accuracy of Conversion 37
the LOOCV of model 1 are either greater, or less, or equal to
model 2 absolute residuals as shown in Table 6, with the
following three null hypotheses:
1. Ho: The absolute residuals of model 1 are equal to the
mean absolute residuals of model 2.
2. Ho: The absolute residuals of model 1 are greater than
the absolute residuals of model 2.
3. Ho: The absolute residuals of model 1 are less than the
absolute residuals of model 2.
Table 6conrms the previously reported results. To
conclude, it is possible to state that the TF conversion type
produces the conversion with the highest accuracy for this
dataset followed by the FTRs, UFP, and DF.
6 Discussion
The published results in this paper conrm the results pub-
lished in the literature in which it is impossible to nd a
unique statistical model between the two measurement
methods, and so, it is needed to test the accuracy of various
conversion types to achieve the most accurate results.
Each conversion type is affected by certain factors that
increase the likelihood of achieving high accuracy in the
conversion process. For example, the TF-based type is
affected by factors as the size distribution of transaction
functions to data functions, the ratio between elementary
processes and functional processes. However, there are
common factors that affect any conversion type. For exam-
ple, the structure of FPA method that comprises ve different
BFCs is classied into two types, in addition to the FPA
weighting system that sums ordinal scales value which in
principle violates the measurement theory.
Moreover, it is due to the COSMIC data movements that
are dependent on the data group and object of interest
dened according to COSMIC method as well as the char-
acteristics and data intensity movements of the measured
Table 3 Correlations between
Fetcke case study variables Combination Pearson P-value
TF versus CFP 0.998
DF versus CFP 0.883
UFP versus CFP 0.989
FTRs versus CFP 0.996
TF versus CFP 0.998
Table 4 Conversion equations Conversion type Equation R2
TF CFP = 1.39 TF + 2.26 0.996
DF CFP = 4.53 DF 21.95 0.779
UFP CFP = 1.1 UFP 5.32 0.978
FTRs CFP = 2.28 FTRs + 3.55 0.993
Table 5 Accuracy measures of
conversion types obtained with
LOOCV
Conversion type MMRE MdMRE Pred (25) Pred (10) Relative error
TF 0.025 0.020 1 1 4.73 to 2.93
DF 0.242 0.258 0.4 0.2 36.3 to 27.5
UFP 0.052 0.065 1 0.8 11.31 to 7.63
FTRs 0.035 0.050 1 1 6.25 to 5.35
Fig. 1 Boxplots of relative residuals of all models
38 A. Z. Abualkishik
system. In addition to the subjectivity of measurement
between different measurers, the quality of documentation is
used to obtain the counts. Moreover, there is also the theo-
retical correspondence between the two methods. In addi-
tion, there are a number or applications used to derive the
regression model and the regression model type.
The FPA weighting system efciently trims large process
sizes. For example, an EI that references 3 FTRs or 7 FTRs
will be assigned the same weight. Moreover, the ratio of DF
to TF affects the accuracy of the tested conversion types. The
ratio of DF to TF for Fetcke case study ranges between (37.5
and 63.1%). This ratio shows differences in the distribution
of each application in this dataset, and consequently, dif-
ferent conversion equations with different accurate results.
This makes it necessary to apply a systematic conversion
approach that includes testing more than one conversion
type.
Abualkishik et al. [24] pointed out that several conversion
types must be tested to pick the most accurate type that
best-ts a certain dataset. They proposed a new conversion
type that is based on FTRs and found it the most accurate for
several datasets. However, this is not the case for this dataset
in which the TF-based type was found to be the best con-
version type. This can be justied by the lack of correlation
between the FTR and data movements that derived from
various reasons as mentioned previously. The results
reported in this paper coincided with the conclusion reported
in [24] in which more than one conversion type must be
tested to achieve best level of accuracy.
The results of this study are subject to internal threats, for
example, the quality of the experimental data and the sub-
jectivity of the measurements. It is noteworthy to mention
that the measurement of Fetcke case study was carried out
by experts in the eld. Moreover, the size of the dataset used
is critical to obtain representative and sound statistical
results. However, obtaining such a dataset is difcult due to
the high cost of FSM counting, for example, one hour of a
certied measurer could cost up to 200 euro/hour, and the
fact that any software organization usually uses one FSM
method for the sake of cost estimation.
The conclusion validity addresses the underlying statis-
tical methods used to obtain the results. In this paper, the
LOOCV was used to obtain the aggregated accuracy mea-
sures, thus preventing any over tting. Non-parametric tests
were used to test the null hypothesis that does not necessitate
the normality assumptions. Consequently, the error rang of
this study could be marginal.
7 Conclusion
The convertibility between FPA and COSMIC function
points has been increasing since the proposal of COSMIC
function points. The accuracy of several conversion types
was tested using Fetcke case study. The accuracy measures
were obtained via the LOOCV. The results showed that the
TF-based conversion type offers the highest accuracy for this
case study. Future work should consider applying the con-
version types into further datasets.
References
1. Albrecht, A.J.: Measuring application development productivity.
In: IBO Conference on Application Development, pp. 8392
(1979)
2. Albrecht, A.J., Gaffney, J.E.: Software function, source lines of
code, and development effort prediction: a software science
validation. IEEE Trans. Softw. Eng. SE-9(6), 639648 (1983)
3. Conte, S.D., Dunsmore, H.E., Shen, V.Y.: Software Engineering
Metrics and Models. Benjamin-Cummings Publishing Co, Red-
wood City (1986)
4. Grady, R.: Practical Software Metrics for Project Management and
Process Improvement. Prentice-Hall, Upper Saddle River, NJ,
USA (1992)
5. Abran, A., Robillard, P.N.: Function points analysis: an empirical
study of its measurement processes. IEEE Trans. Softw. Eng. 22
(12), 895910 (1996)
6. Abran, A., et al.: The COSMIC Functional Size Measurement
Method Measurement Manual, version 4.0.1 (2015)
7. Vogelezang, F., Lesterhuis, A.: Applicability of COSMIC full
function points in an administrative environment experiences of an
early adopter. In: Proceedings of the 13th International Workshop
on Software MeasurementIWSM 2003 (2003)
8. Cuadrado-Gallego, J.J., Buglione, L., Domínguez-Alda, M.J., de
Sevilla, M.F., de Mesa, J.A.G., Demirors, O.: An experimental
study on the conversion between IFPUG and COSMIC functional
size measurement units. Inf. Softw. Technol. 52(3), 347357
(2010)
Table 6 Wilcoxon signed rank
sum of LOOCV absolute
residuals
Conversion Type M1 = M2 M1 > M2 M1 < M2
TF versus DF ––1
TF versus UFP ––0.90
TF versus FTRs ––0.90
DF versus UFP 1
DF versus FTRs 1
UFP versus FTRs 0.90
A Review Study on the Accuracy of Conversion 39
9. Cuadrado-Gallego, J.J., Abran, A., Rodríguez-Soria, P., Lara, M.
A.: An experimental study on the conversion between IFPUG and
UCP functional size measurement units. J. Zhejiang Univ. Sci.
C15(3), 161173 (2014)
10. Ferrucci, F., Gravino, C., Sarro,. F.: A case study on the
conversion of function points into COSMIC. In: Proceedings of
the 2011 37th EUROMICRO Conference on Software Engineering
and Advanced Applications, pp. 461464 (2011)
11. Gencel, C., Bideau, C.: Exploring the convertibility between
IFPUG and COSMIC function points: preliminary ndings. In:
2012 Joint Conference of the 22nd International Workshop on
Software Measurement and the 2012 Seventh International Con-
ference on Software Process and Product Measurement
(IWSM-MENSURA), pp. 170177 (2012)
12. Abran, A., Desharnais, J.-M., Aziz, F.: Measurement convertibility
from function points to COSMIC-FFP. In: Proceeding of the
15th International Workshop on Software Measurement (IWSM),
pp. 227240 (2005)
13. Desharnais, J.-M., Abran, A., Cuadrado-Gallego, J.: Convertibility
of function points to COSMIC-FFP: identication and analysis of
functional outliers. In: International Conference on Software
Process and Product Measurement (MENSURA) (2006)
14. Heeringen, H.V.: Changing from FPA to COSMIC a transition
framework. In: Proceedings Software Measurement European
Forum (SMFE) (2007)
15. Cuadrado-Gallego, J.J., Buglione, L., Rejas-Muslera, R.J.,
Machado-Piriz, F.: IFPUG-COSMIC statistical conversion. In:
EUROMICRO 2008 - Proceedings of the 34th EUROMICRO
Conference on Software Engineering and Advanced Applications,
SEAA 2008, pp. 427432 (2008)
16. Abualkishik, A.Z., Ferrucci, F., Carmine, G., Lavazza, L., Liu, G.,
Meli, R., Robiolo, G.: A study on the statistical convertibility of
IFPUG function point, COSMIC function point and simple
function point. J. Inf. Softw. Technol. 86,119 (2017)
17. Abualkishik, A.Z., Selamat, M.H., Ghani, A.A.A., Atan, R.,
Desharnais, J.M., Kheli, A.: A convertibility study on the
conversion between FPA and COSMIC for real time systems. In:
Proceedings of the 2012 Joint Conference of the 22nd International
Workshop on Software Measurement and the 2012 7th Interna-
tional Conference on Software Process and Product Measurement,
IWSM-MENSURA 2012, pp. 143149 (2012)
18. Cuadrado-Gallego, J.J., Machado-Piriz, F., Aroba-Páez, J.: On the
conversion between IFPUG and COSMIC software functional size
units: a theoretical and empirical study. J. Syst. Softw. 81(5), 661
672 (2008)
19. Abualkishik, A.Z., Selamat, M.H., Ghani, A.A.A., Atan, R.,
Desharnais, J.M., Kheli, A.: Theoretical and probabilistic
conversion model between FPA and COSMIC measurement
method. In: 2012 Joint Conference of the 22nd International
Workshop on Software Measurement and the 2012 Seventh
International Conference on Software Process and Product Mea-
surement, pp. 150159 (2012)
20. Lavazza, L.: Convertibility of functional size measurements. In:
Proceedings of the 5th International Conference on Predictor
Models in Software Engineering - PROMISE 09, p. 1 (2009)
21. Lavazza, L., Morasca, S.: Convertibility of function points into
COSMIC function points: a study using piecewise linear regres-
sion. Inf. Softw. Technol. 53(8), 874884 (2011)
22. Lavazza, L.: A systematic approach to the analysis of function
point COSMIC convertibility. In: International Workshop on
Software Measurement, ICSM/Mensura (2010)
23. Lavazza, L., Morasca, S.: A study of non-linearity in the
statistical convertibility of function points into COSMIC function
points. In: Proceedings of the Workshop on Advances in
Functional Size Measurement and Effort Estimation - FSM 10,
pp. 18 (2010)
24. Abualkishik, A.Z., Desharnais, J.-M., Kheli, A., Ghani, A.A.A.,
Atan, R., Selamat, M.H.: An exploratory study on the accuracy of
FPA to COSMIC measurement method conversion types. Inf.
Softw. Technol. 54(11), 12501264 (Nov 2012)
25. Fetcke, T.: The warehouse software portfolio a case study in
functional size measurement, 1999/2000. Technical Report
No. 199920, Département dinformatique, Universitédu Quebec
àMontr éal, Canada
26. International Function Point User Group (IFPUG): Function Point
Counting Practices Manual, Release 4.3.1, ISBN:
978-0-9753783-4-2 (2010)
27. Miles, C., Shevlin, M.: Applying regression and correlation: a
guide for students and researchers. SAGE, London (2001)
28. Kitchenham, B., Pickard, L.M., MacDonell, S.G., Shepperd, M.J.:
What accuracy statistics really measure. IEE Proc. - Softw. 148(3),
81 (2001)
29. Kitchenham, B., Kitchenham, B., Mendes, E., Mendes, E.: Why
comparative effort prediction studies may be invalid. Proc. 5th Int.
Conf. Predict. Model. Softw. Eng. 1,15 (2009)
40 A. Z. Abualkishik
Analyzing the Role of Human Computer
Interaction Principles for E-Learning
Solution Design
Zahra Al Mahdi, Vikas Rao Naidu, and Preethy Kurian
Abstract
Education technology is one of the key application areas
of Multimedia. Interactive multimedia also called as
Hypermedia plays a vital role in enhancing the teaching
and learning experience in higher education sector.
Various e-learning solutions are already available in the
market and many of them are even available for free.
These solutions may include, E-books, interactive
lessons, video-based tutorials, interactive exercises for
revision, educational games, mobile-based educational
tools, and so on. The Higher education sector has students
of varying age groups. Therefore, in order to make sure
that appropriate e-learning solution is adapted with
suitable interface design, it is important to keep all the
principles of Human-Computer Interaction (HCI) in con-
sideration. This research paper analyzes the role of HCI in
the design of e-learning solution. Authors have performed
a thorough literature survey on various resources related
to this topic. The result of this research will provide
guidelines for better e-learning solution design, which
could be considered appropriate for respective users.
Keywords
Advanced Human-Computer interaction
Education technology E-learning HCI principles
Higher education Hypermedia Mobile learning
1 Introduction
Human computer interaction (HCI) plays a vital role in
designing effective e-learning solutions with key focus on
usability. The objective of this research paper is to review
the relationship between Human computer interaction and
e-learning. In order to achieve the objectives of this paper,
sufcient literature was reviewed to explore the potentials of
linking HCI in e-learning. As the technology is enhancing,
designers and developers need to recognize and apply the
right HCI principles to develop a best t e-learning appli-
cation for our learners. HCI principles are applicable to all
the interactive application design and hence e-learning
solution is no different. E-learning solutions need appropri-
ate user interface (UI) design for different level of users. For
basic users, which can be considered to be at the school
level, the design of UI can incorporate such screen interface
which is appropriate at that level, with respect to font or
color combination apart from graphics. Whereas, when it
comes to higher level of implementation, UI needs to be
analyzed for appropriate user such as elderly or other users.
Moreover, this differs from platform to platform. Hence, for
desktop it may differ and for mobile devices, it may differ.
To enhance the natural learning experience of user, designer
must carry out a deeper study to explore the possibilities of
HCI in e-learning and educational pedagogies. This will
assist in successful creation of an e-learning environment
contrary to traditional environment. The purpose of this
research is to analyze human computer interaction principles
and explore methods on integrating the identied principles
into the design model of e-learning application.
2 HCI Principles
The application of human computer interaction in e-learning
is a blend of art and science which requires a thorough study
on user characteristics and technology capabilities to
Z. Al Mahdi (&)
Centre for Academic Practices, Middle East College,
Seeb, Oman
e-mail: zahra.almehdi@gmail.com
V. Rao Naidu P. Kurian
Computing Department, Middle East College,
Seeb, Oman
e-mail: vikasrn@gmail.com
P. Kurian
e-mail: preethy@mec.edu.com
©Springer Nature Switzerland AG 2019
A. Al-Masri and K. Curran (eds.), Smart Technologies and Innovation for a Sustainable Future,
Advances in Science, Technology & Innovation, https://doi.org/10.1007/978-3-030-01659-3_6
41
develop appropriate graphical user interface. While design-
ing effective e-learning applications, HCI principles are
applied to explore the methods of mapping computing
functions to user capabilities effectively to satisfy users
within the context of its use [1].
It is the accountability of the designer of e-learning
applications to sightsee the user requirements and set prin-
ciples accurately to ensure that the nal artifact is not only
functioning but promote learning experience through effec-
tive design [2]. The Shneidermans eight golden rules [3]
supports for crafting human interactive systems to support
users learning experience. The rules must be accentuated on
the interface of e-learning application. Consistency is
essential for interface in terms of layout, command and
dialogue. The user must get proper feedback of their actions
which stimulate them to keep continuing their learning using
application. Facilities must be embedded in the interface to
practice shortcut for executing tasks which promote
e-learning. The user must also be communicated promptly
the status of task completion. The interface of e-learning
application must shield the users from errors and in case of
any fault; users must be given support to get rid of them.
E-learning application must have facilities in interface to
reverse users actions at any point of time. User is expected
to get a control of the system as if he is the master of whole
artifact which motivates him to keep continuing its use. The
application also possesses innovative design techniques in
display which facilitate time for the users to learn action
sequences [4]. The systems must support users task ef-
ciently and effectively and absolve the careless mistakes [1].
The above rules comprehend wholly requirements of an
interactive interface with prime focus on easing the usability
of the e-learning application.
3 HCI in E-Learning
Teaching and learning systems at education sector are
designed to produce employable graduates who are not only
knowledgeable in their own eld of study, but also forward
thinking, creative, and responsible members of society. In its
quest to achieve this objective, the institution has developed
a set of generic graduate attributes that are embedded in
program me and module learning outcomes. A wide spec-
trum of teaching methodologies is applied, including lec-
tures, practical work [5], and usage of different technology
moving from generic content and skill development. These
days, the huge demand of HCI is lying in the eld of edu-
cation for various e-learning resource developments with the
support of latest tools and technologies. E-learning using
interactive games motivate students for better knowledge
acquisition and develop a positive attitude among learners
[1].
Students are engaging in educational game by deploying
HCI evaluation methods. Those games craft a new learning
approach and enhance the learning process. The key objec-
tive of designing interactive games for educational purpose
is to engage students and motivate them to learn whilst
playing [6]. The developer can use HCI evaluation tech-
niques to develop and asses the educational Technology
tools and platforms to achieve an extremely productive
environment for learners. The rst step towards effective
engagement of students in educational Technology tool is to
examine the Human Computer Interaction facets in the
specic platform. User engagement is evaluated on how
close the interaction occurs between the learner and the tool.
To measure the level of user engagement by applying HCI
principles and evaluate the response of the user to see how
the learners are engaging with the tool and techniques.
However, there are some challenges in learning, such as lack
of engagement or the repetitive nature of tasks. In order to
overcome these challenges, designers need to strive towards
building interaction games [7] by establishing interactive
user interface is highly encouraged in educational institu-
tions. Implementing HCI in e-learning will sustain learning
opportunities and user interaction.
4 Design Approaches for E-Learning
The use of e-learning tools by deploying HCI principles and
applying pedagogical approaches is high in demand for
effective learning [8]. The e-learning becomes an integral part
of educational institutions which motivate learner and get
them engaged easily. E Learning enables the student to
understand fast and create a exible interaction between
student and learning resources. E-Learning also supports
disabled community to a great degree for achieving learning
objectives in a consistent and exible way. Also, its gives the
student freedom to learn and do whatever they need and to
learn at their own convenience. Designers must ensure that
e-learning design does not hindrance or stigmatize any group
of users but accommodate wide range of individual prefer-
ences and abilities [9]. The interface must support the learner
to retrieve information regardless of ambiguous conditions.
The learner must be facilitated ways to minimizes hazards in
the interface design and also minimize the consequences of
accidental or unintended actions. The interface of e-learning
application must aid the user to get the knowledge efciently
and comfortably [8], and with a minimum of fatigue [6]. The
42 Z. Al Mahdi et al.
design must satisfy the student and teachers expectations
and should meet the following criteria.
The visual appearance of subject matter must be
appealing.
Easy to use navigation structure.
Learning must be made fun using animations and
graphics.
Clear instructions on how to use the application.
The most important strategy deployed during the design
process is to use a collaborative approach by analyzing
expectations of: the learners, teachers and educational planners.
5 Proposed Methodology
The design process of e-learning solution or learning
resources by following HCI principles could be very effec-
tive once we implement a systematic approach. Authors
would recommend the methodology given in the Fig. 1that
makes the process clearer [9].
As we see from Fig. 1, the proposed methodology has
ve major stages.
5.1 Analysis of Subject Area
In this stage, the subject area is analyzed to identify which
topic needs the assistance of e-learning. In some cases, the
entire subject is identied to produce in interactive format
for better learning [10].
5.2 Identification of Appropriate Solution
Once the subject area is identied, appropriate solution is
adapted from the wide variety of choices [11]. Here the
developer faculty needs to decide if the subject could be well
presented in e-book or video based tutorial or any other
interactive media [12]. The type of learning resource is
decided at this stage.
5.3 E-Learning Solution Design
At this stage, the actual design process begins. This stage is
governed by HCI principles, to make sure the solution
design is as per recommended standard and guidelines [13].
Moreover, for the respective learners, such as elder people or
mid-level students or primary level students, corresponding
design strategy is adapted. This involves, design of layout,
choice of fonts and color, and many such accessibility
options.
5.4 Testing and Implementation
After the completion of design process, the learning resource
is tested for various technical and non-technical factors [9].
The testing stage is also governed by HCI principles, to
ensure all the guidelines are followed with respect to the
requirements. Once the testing phase is clear with positive
result, the solution is implemented for the end-users, i.e.,
students [7].
5.5 Feedback and Recommendations
At this stage, feedback is collected from the end-users in
order to measure the effectiveness. Based on the feedback,
recommendations are provided for further improvements and
hence this make the methodology cyclic [9].
6 Recommendation
The context of traditional classrooms always supports the
student for face to face interactions with the instructor.
However, in modern era students prefers e-learning envi-
ronment due to its exibility and ease of use. The emerging
technologies also supports better e-learning environment for
all learners. Efcient e-learning solution can be developed
using an integrated approach of collaborating HCI principles
and educational pedagogies. Emphasize must be given on
e-learning activities and interface must have essential fea-
tures for thoroughgoing interactions which can engage
HCI
Principles
Fig. 1 Proposed methodology
Analyzing the Role of Human Computer Interaction 43
e-learning users [11]. The designer must develop a learner
centric approach in planning, design and implementation of
e-learning platforms. A user centered framework can be
developed by exploring the context of use, analyzing the
tasks and environment and also exploring technology to be
used. A study of personal characteristics, aptitudes and
learning style of users also can contribute in [5] developing a
fruitful e-learning solution with preferences and interests for
the learners success. The research supports that interactive
e-learning application with games and animation can create a
positive impact in learners psychologically [7]. The
e-learning platform must facilitate dynamic learning envi-
ronment which must t with learners individual learning
style [10]. From the perspective of designing e-learning
applications, designers must create a meaningful design
blended with appealing visual design and user interaction to
make learners a comfortable learning environment.
Acknowledgements Authors would like to extend their sincere thanks
to the Management of Middle East College, for support and encour-
agement towards research.
References
1. Issa, T., Isaias, P.: Sustainable Design HCI, Usability and
Environmental Concerns (2015)
2. Terblanche, J.T.: Using HCI principles to design interactive
learning material. Mediterr. J. Soc. Sci. 5(21), 377380 (2014)
3. Karim, D.F., Kanti, U.: Usability guidelines for usable user
interface. Int. J. Res. Eng. Technol. 3(9), 7981 (2014)
4. Saini, R.: Graphical user interface design essentials & process. Int.
J. Adv. Res. Comput. Sci. Softw. Eng. 3(9), 482483 (2013)
5. Andrina Granic, M.C.: Universal design within the context of
e-Learning. In: Conference on Universal Access in
Human-Computer Interaction: Applications and Services, Berlin
(2007)
6. Blazanka Divjek, D.T.: The Impact of Game-Based Learning on
the achievement of learning goals and motivation for learning
mathematics-literature review. JIOS 35(1) (2011)
7. Zhan, L., Duanb, Y.: Evaluation of learning performance of
e-learning in China: a methodology based on change of internal
mental model of learners. Turk. Online J. Educ. Technol. 9(1)
(2010)
8. McKay, E.: Enhancing Learning Through Human Computer
Interaction, p. 290 (Jan 2007)
9. Mehlenbacher, B., Bennett, L., Bird, T., Lucas, J., Morton, J.:
Usable E-Learning: a conceptual model for evaluation and design.
In: 11th International Conference on Human-Computer, Las Vegas
(2005)
10. AL-Hunaiyyan, A., Al-Huwail N., Al-Sharhan, S.: Blended
e-learning design: discussion of cultural issues. Int. J. Cyber
Soc. Educ. 1(1), 1732 (Mar 2008)
11. Berry, M.: Enhancing Learning Through. In: Idea Group Inc
(2007)
12. Gross, T.: Human computer interaction education and diversity. In:
Human-Computer Interaction Group (2014)
13. Kurosu, M.: Human computer interaction theories, methods, and
tools, Greece (2014)
44 Z. Al Mahdi et al.
Automatic Detection of Students Learning
Style in Learning Management System
T. Sheeba and Reshmy Krishnan
Abstract
Learning style is one of the major factors of student
performance in any learning environment. Determining
the learning style of students enhances the performance of
learning process. This paper proposes an approach to
classify students learning style automatically based on
their learning behavior. One of the best widely used
classier algorithm is decision tree which is proposed in
this paper. The main concern in decision tree classier is
the construction of signicant rules which are required for
accurately identifying learning styles. Lack of signicant
rules would result in misclassication of learning style.
Hence, the main focus of this paper is to construct most
signicant rules which would strengthen the existing
decision tree classier to precisely and accurately detect
the learning style of students. The student behavior is
obtained from the web log les and then mapped with
three learning dimensions of standard Felder Silverman
learning style model. Subsequently, by employing sig-
nicant rules in decision tree classier, the student
behavior has been automatically classied with high
accuracy. This approach was experimented on 100
students for the online course created in Moodle Learning
Management System. The evaluation result is obtained
using inference engine with forward reasoning searches
of the rules until the correct learning style is determined.
The result is then analyzed with a confusion matrix of
actual class and predicted class which shows that
processing dimension shows variance whereas perception
and input dimension were detected correctly with an
average accuracy of 87%.
Keywords
Learning management system Weblog
Learning styles Felder-Silverman learning style
model Decision tree classier
1 Introduction
Learning style is typically dened as the best way the learner
prefers to learn. Everyone has his/her own style on learning
which helps them to learn better and can also vary from one
situation to another. The learning style of a learner determines
how learners learn and acquire knowledge in different ways in a
learning system. It is characterized by different types of factors
such as course contents i.e., notes, exams, assignments, tutorials
and exercises; the order in which course is organized and pre-
sented; how information is presented to the learners; the inter-
action mechanisms among learners such as discussion forums,
chat rooms, and email systems. The learning system is used by a
diverse variety of learners with different background, abilities,
preferences, skills, needs, interest and learning styles. The
problem of detecting how learners would learn and acquire new
knowledge and skills has been gained great interest of research
in the last decade. In order to achieve this goal, there is a need to
determine each learners learning style and adjust the courses or
assist the learner to best t each learner needs.
The rest of this paper is organized as follows: Sect. 2
gives the background work in the similar area. Section 3
describes the proposed approach. Section 4demonstrates the
experimental results and discussion. Finally, Sect. 5pro-
vides a conclusion.
2 Literature Review
The various studies in learning system have proved that the
learners learning have improved when the educators
teaching style match with the learners learning styles.
T. Sheeba (&)
Department of Computer Science and Engineering,
Karpagam University, Coimbatore, TamilNadu, 641021, India
e-mail: tsheebat2002@yahoo.co.in
R. Krishnan
Department of Computing, Muscat College, P.O. Box: 2910
P.C: 112, Ruwi, Sultanate of Oman
e-mail: reshmy_krishnan@yahoo.co.in
©Springer Nature Switzerland AG 2019
A. Al-Masri and K. Curran (eds.), Smart Technologies and Innovation for a Sustainable Future,
Advances in Science, Technology & Innovation, https://doi.org/10.1007/978-3-030-01659-3_7
45
In order to detect the learning style of learners and to reduce
the gap between educatorsand learnersstyle, there is a
need to discover each learners learning style and adapt the
courses or assist the learners to best t to it.
There are two ways to obtain learning style. The most
popular method is questionnaire which is a static approach
and time consuming and may not be accurate. After the
emergence of using Learning Management System (LMS) in
education, it become more appropriate to acquire the learn-
ing style dynamically and indirectly using automatic detec-
tion method. There were two approaches used for automatic
detection of learning styles: data-driven and literature-based
approach. The data-driven approach uses sample data to
build a classier that imitates a learning style instrument.
This approach mainly uses AI (Articial Intelligence) clas-
sication algorithm which takes the learner model as input
and returns learners learning style preferences as output [1].
This approach has the advantage of to be more accurate and
less error-prone, as it uses real data to detect students
learning styles. On the other hand, literature-based methods
uses simple rules to calculate learning style from number of
matching hints. The weakness in this approach is that there is
a possibility that some behavioral patterns of learning styles
may not be taken into account for the calculation of learning
style [2].
The proposed system employs data-driven approach
using AI classication algorithm to automatically detect
learning styles. Several models of learning styles have been
described for dening learning styles such as Kolbs,
Gardner, Felder and Silverman, Biggs and custom learning
style model [1]. Each model has its strength and weakness.
Among the proposed models, Felder and Silverman learning
style model (FSLSM) is chosen as it is the widely used
model proven to be suitable to use in educational systems
and tested in engineering education exhibiting a good degree
of reliability, validity and internal consistency. This model
describes the learning style of learners into four different
dimensions (active/reective, sensitive/intuitive,
visual/verbal, sequential/global) based on the behavior pat-
terns of learners using the system.
Depending on the FSLSM, various research works have
been proposed to detect learning styles on a data driven
approach using several AI classication algorithms. The
various AI techniques used are Bayesian network [3], Deci-
sion Tree [4], Genetic Algorithms [5,6], Neural Network [7],
Genetic algorithms with K-NN [1] etc. Comparison of these
algorithms in terms of four dimensions [Processing (Pr),
Perception (Pe), Input (In) and Understanding (Un)] of
FSLSM are shown in [8,9]. As each algorithm has its own
strength and weakness, the most widely used AI algorithms
for classication are Bayesian network, Neural Network and
Decision Tree. Bayesian network uses conditional probabil-
ities to represent uncertainty of data, but it has no universally
accepted standard for constructing this network from data.
Neural network shows good classication accuracy as it has
the learning capability from specic examples, whereas it has
the weakness of having high computational complexity; no
theoretical rule dened to determine the optimal number of
hidden neurons; complex to dene number of hidden layers;
lack of descriptive power and difcult to identify rules for
both inputs and outputs.
The decision tree is a widely used classication algorithm
which has proved to have high accuracy. This algorithm
requires signicant classication rules for identifying
learning styles. The previous studies reported in the decision
tree implementation does not show signicant rules for
identifying learning styles based on FSLSM. Hence, the
construction of most signicant rules would be the main
focus of the proposed system in order to strengthen the
existing classier to make accurate classication and pre-
diction of learning style of learners and to emphasis on the
automatic classication of learning styles when weblog les
are given as input to the classier which is not been previ-
ously done by other researchers in this area.
3 Methodology
3.1 Proposed Approach
The proposed architecture is shown in Fig. 1. The approach
starts with data collection which controls the process of
collecting web log les created automatically in
Moodle LMS based on the student actions. Then data pre-
processing is done to acquire learning style from web log
les. It includes weblog analysis in which studentsbehavior
is extracted and using signicant rules of decision tree,
learning style is extracted based on FSLSM.
3.1.1 Data Collection
Web log les contain all the behaviors that the learner per-
forms in Moodle LMS. These logs are automatically created
when the learners use the system. It records all the activities
in the form of chats, forums, quizzes, exercises, assignments,
exam delivery, frequency of accessing course materials etc.
Initially, the web log les of each learner are collected and
ltered out by the activities and their corresponding actions
as shown in Table 1.
3.1.2 Data Preprocessing
Data preprocessing includes web log analysis in which
learner actions are extracted based on the three dimensions
(processing, perception and input) of FSLSM. The fourth
dimension of FSLSM describes the sequential and global
learner is not considered for experimentation in the proposed
system, since most of the learning content used in
46 T. Sheeba and R. Krishnan
Moodle LMS is provided as a whole content instead of
sequential order.
Processing dimension: This dimension determines the
active and reective learners by their participation in doing
activity something physical or theoretical. Active learners
mainly prefer to work in groups and perform more number
of exercises whereas reective learners prefer to work alone
and perform less number of exercises. Based on this learning
behavior, the behavior patterns of learners such as forum
discussions, chats and assignments are investigated from
weblog le. For forum discussion, the actions such as add
post to start discussions,view & add post messages,only
view forums & discussionsand no participationare ana-
lyzed. For chats, the actions such as view & report,only
viewand no participationare analyzed and for the
assignments, the actions such as submitand view-submit
assign formare analyzed.
Perception dimension: This dimension determines the
sensitive and intuitive learners. The sensitive learners mainly
have more attentiveness, carefulness and low trial and high
Student
Learning Style Acquiring
WebLog
(Behavior)
Database
Decision Tree Classifier
based on FSLSM
Decision
Tree Rules
Data Preprocessing
Fig. 1 System architecture of
proposed approach
Table 1 Activities versus
actions of WebLog les Activities Actions
Quiz Quiz attempt
Quiz continue attempt
Quiz close attempt
Quiz review
Assignments Assign view
Assign submit
Assign view submit assignment form
Chats Chat view
Chat report
Chat talk
Chat add
Forums View forum
View discussion
Add discussion
Add post
Notes Resource view
Powerpoints Resource view
Hyperlinks URL view
Automatic Detection of Students Learning Style 47
completion towards the performance in exams and exercises
whereas intuitive learnersshow being bored by details,
carelessness and high trial and low completion in exams and
exercises. Based on this learning behavior, the behavior
patterns of learners such as exam and assignments are
investigated from weblog le. For exams, the actions such as
exam review,attempt and continue attempt,exam
delivery timeand exams doneare analyzed and for
assignments the actions such as submitand view-submit
assign formare analyzed to determine the number of times
the particular action is performed to determine the number of
times the particular action is performed.
Input dimension: This dimension determines the visual
and verbal learners by their preference over the learning
content and the participation in group activities. Based on
the characteristics of visual and verbal learners, behavior
patterns such as text, power point and hyperlinks are
investigated from weblog le. For these behavior patterns,
actions such as viewand no vieware analyzed to
determine the number of times the particular action is
performed.
3.1.3 Create Learning Style Model
The learning style model is created using decision tree
classier for classifying the learning styles based on
FSLSM. The decision tree is a ow chart like structure in
which internal node represent a test on the features to be
tracked that lead to those targeted learning style and the
leaves represent the target learning style to be inferred. The
nal structure of a decision tree consists of root nodes,
decision nodes, leaf nodes and branches. The root node
represents the base attribute used to build the tree. It is
divided into one or more decision nodes which represent the
test on an attribute that describe the inner part of the tree;
leaf nodes represent the class labels to infer, and the bran-
ches connecting the nodes represent the possible values that
the attribute of the branch initiates [1].
Figure 2shows the modelling of learnersbehavior in
Moodle LMS system in which internal nodes represent the
FSLSM dimensions and the action of the learner behaviors
accessing the system.
3.1.4 Classify and Predict Learning Style
The nal step is to classify and predict the learning style of
the learners based on their input behavior. The learners
behaviors extracted from the web log les are given as input
to the decision tree classier. Based on the signicant rules
of the decision tree classier, the classier accurately
determines the output which is the learning style of each
learner based on FSLSM. The classication process is
divided into two phases namely training phase and testing
phase. The training phase constructs a perfect tree by par-
titioning the data set recursively into smaller subsets until all
the records in a partition have the same class. In the testing
phase, the nodes are tested with test data set and iteratively
pruned to obtain a tree with higher accuracy. The classied
learning activities of each learner is then used for predict the
learning style of new learners based on the set of decision
rules (Table 2).
For example: The processing dimension (active/
reective) includes the group activities such as forum dis-
cussion, chats and assignments. For forum discussion, the
actions like add post to start discussionsor view and add
post messagesor only view forums and discussionsor no
Learning Style
Processing
(Active/Reflective)
Perception
(Sensory/Intuitive)
Input
(Visual/Verbal)
Forum
Chats
Assignment Exams Assignments
Exam Review
Exam Attempt Exam Delivery Time
Exams Done
Text
PPT
Hyperlink
Fig. 2 Modelling learners behavior with Moodle LMS
48 T. Sheeba and R. Krishnan
participationare processed. For chats, the actions like view
and reportor only viewor no participationare pro-
cessed. For assignments, the actions like submitand
view-submit assign formare processed. Based on the rules
applied to these actions, nal values are calculated (Table 2)
which are then used to calculate the nal category of
dimensions such as extremely reective, medium reective,
neutral, medium active and extremely active.
The perception dimension (sensitive/intuitive) includes
the activities such as exams and assignments. For exams, the
actions like Exam Reviewor Attempt & Continue
Attemptor Exam Delivery Timeor Exams doneare
processed. For assignments, the actions like submitand
view-submit assign formare processed. Based on the rules
applied to these actions, nal values are calculated (Table 2)
which are then used to calculate the nal category of
dimensions such as extremely intuitive, medium intuitive,
neutral, medium sensitive and extremely sensitive.
The input dimension (visual/verbal) includes the activities
such as text, ppt and hyperlinks. For all these activities, the
actions like Viewor No Vieware processed. Based on
the rules applied to these actions, nal values are calculated
(Table 2) which is then used to calculate the nal category
of dimensions such as extremely verbal, neutral and extre-
mely visual.
3.2 Algorithm of Extracting Learning Style
See Fig. 3.
Table 2 Decision tree rules
Automatic Detection of Students Learning Style 49
4 Experimental Results and Discussion
The proposed work is experimented on around 100 online
learners taking ve online computing courses created in
Moodle LMS. The learners registered for these ve online
courses had no previous knowledge on the topics taught in the
course, since all these courses are delivered as basic units.
These courses cover rich course topics represented in different
types of elements such as texts, hyperlinks, assignments and
quizzes etc. More number of assignments is presented to the
learners for each topic as per the requirement of the course and
the learners can access as many assignments based on their
need. Also, learners are given more number of quizzes
including formative and summative assessments, in which the
learners can participate themselves at any time. Any number of
quizzes can be attended by the learners whenever they want to
practice the questions to test their knowledge. Also, interac-
tion among learners and educators are provided with the help
of forum discussion and chat room facilities in order to discuss
and share the ideas and views about the topic by posting and
replying to others.
All the learner activities performed in Moodle LMS while
learning are stored automatically in the web log les. The
log les automatically record the learner activities such as
the type of learning content preferred (text, powerpoint,
hyperlinks), the number of assignments done, the number of
quizzes attended with number of revisions and delivery time
and participation in discussion forums and chat facilities etc.
which are used to detect each learners learning style auto-
matically. These actions are extracted from the log les and
then processed in terms of the category used in Table 2
using decision tree learning algorithm in order to detect each
learner learning style.
Algorithm
Input: Weblog files of each learner
Output: Learning style of each learner in three dimensions of FSLSM
1. Access the weblog files of each learner.
2. Preprocess weblog files
Filter the activities and their corresponding actions of each learner from weblog files
based on the three dimensions of FSLSM model.
3. Create learning style model
a. Determine the activities of learners in Moodle LMS
b. Build Tree using decision tree classifier
i. Initially Tree T is empty
ii. T = Create root node and its splitting attribute
iii. T = Add branch to the root node for each split attribute and label it with test
value
For each branch do
Move to the split attribute
Test on possible value of split attribute
Create a new branch below root based on the test result
If stopping point is reached for this branch, create leaf a node with
appropriate label.
4. Predict learning style model
a. Input is the learner activities
b. Start at the root node
c. Move to the decision node
d. Test on each possible value of decision node and descend the appropriate branch
e. Test repeated until a leaf node is reached
f. Return the classification of leaf node which is the learning style
Fig. 3 Algorithm of extracting
learning style
50 T. Sheeba and R. Krishnan
4.1 Evaluation and Analysis
Classication Accuracy. Evaluation is done by determining
the performance of decision tree classier for around 100
students using classication accuracy. The classication
accuracy determines the percentage of correct instances
placed in the correct category. Equation (1) gives the for-
mula used for calculating classication accuracy and error
rate for the three dimensions of FSLSM model:
Accuracy ¼Correct Predictions=Total Number of Predictions
Error Rate ¼Wron g Predictions=Total Number of Predictions
ð1Þ
The achieved experimental results shown in Table 3
ranges from 75 to 95% shows a high precision for the three
dimensions of FSLSM, thereby proving its suitability for
identifying the learning style of learners with an average
accuracy of 87% and a very less error rate of 13%.
By analyzing the evaluation results obtained, decision
tree classier is able to classify perception dimension with a
high precision of 95% as most learners did most of the
exams and exercises provided for the course and hence
signicant variance not found in this dimension. The input
dimension is classied with a precision of 90% as most of
the learners are interested in using the power point slides and
hyperlinks instead of using the theoretical notes for their
study and hence shown less variance in the predicted class.
The processing dimension is classied with precision of
75% as the learners found to use less use of forums and chats
facilities and hence variance found in this dimension. The
main reason for the variance is that most of the learners have
used the facilities such as chat, email and forum very less.
As a conclusion, learners should be encouraged to use the
facilities of forums, chat rooms, email etc. in order that the
active learners may be discovered and to use collaborative
tasks such as assignments and exercises. The number of
assignments and exams could also be increased for an
effective analysis of learning style.
Confusion Matrix. The evaluation of classication results
is done by a confusion matrix to illustrate the accuracy of
decision tree classier solution. The confusion matrix con-
tains information about actual and predicted classications
which is used to determine the performance of the decision
tree classier. In confusion matrix, for a single prediction,
there are four different outcomes: true positives (TP), true
negatives (TN), false positives (FP), and false negatives
(FN) for a two-class case with classes 1(yes) and 0
(no). A false positive is when the outcome is incorrectly
classied as yes(or positive), when it is in fact no(or
negative). A false negative is when the outcome is
incorrectly classied as negative when it is in fact positive.
True positives and true negatives are obviously correct
classications.
Input Dimension: Table 4shows the confusion matrix
obtained for the prediction of three different learning styles
(Neutral, Extremely_Visual and Extremely_Verbal) of input
dimension.
Processing Dimension: Table 5shows the confusion
matrix obtained for the prediction of ve different learning
styles (Extremely Reective, Medium Reective, Neutral,
Medium Active, Extremely Active) of processing dimen-
sion. The values in the diagonal of Table 5would always be
the true positives (TP).
Perception Dimension: Table 6shows the confusion
matrix obtained for the prediction of ve different learning
Table 3 Experimental results of decision tree classier
Performance Processing (%) Perception (%) Input (%) Overall (%)
Classication accuracy 75 95 90 87
Error rate 25 5 10 13
Table 4 Confusion matrix of input dimension
Actual
Input dimension Neutral Extremely_Visual Extremely_Verbal
Predicted Predicted_Neutral 70 15 15 Total
predicted = 100
Predicted_Extremely
Visual
15 80 15 Total
predicted = 110
Predicted_Extremely
Verbal
15 5 60 Total predicted = 80
Total
retrieved = 100
Total
retrieved = 100
Total
retrieved = 100
Automatic Detection of Students Learning Style 51
styles (Extremely Intuitive, Medium Intuitive, Neutral,
Medium Sensitive, Extremely Sensitive) of perception
dimension. The values in the diagonal of Table 6would
always be the true positives (TP).
The confusion matrix is used to compute the precision
and recall for each class. Precision is the fraction of retrieved
instances that are relevant, while recall is the fraction of
relevant instances that are retrieved using formula in Eq. (2).
Precision ¼True Positive=Total Predicted
Recall ¼True Positive=Total Retrieved ð2Þ
The plot obtained for the precision and recall values of
each dimension are shown in Fig. 4.
5 Conclusion
The paper proposes a method for the automatic classication
and prediction of student learning style related to FSLSM
using decision tree classier algorithm. From the experi-
ments conducted, it is concluded that signicant rules used
in decision tree is able to classify the learner characteristics
into learning style with an accuracy of 75% in the processing
dimension, 95% in the perception dimension, and 90% in the
input dimension based on three Felder Silverman learning
dimensions with an overall accuracy of 87%. It is evident
that learners learning style obtained are consistent with the
learners preferences based on FSLSM. The nal outcomes
Table 5 Confusion matrix of processing dimension
Actual
Input dimension Extremely_Reective Medium_Reective Neutral Medium_Active Extremely_Active
Predicted Predicted_Extremely
Reective
69 10 6 11 5 Total
predicted = 101
Predicted_Medium
Reective
975 5 9 10 Total
predicted = 108
Predicted_Neutral 11 9 80 3 10 Total
predicted = 113
Predicted_Medium
Active
44474 15 Total
predicted = 101
Predicted_Extremely
Active
725360 Total
predicted = 76
Total retrieved = 100 Total
retrieved = 100
Total
retrieved = 100
Total
retrieved = 100
Total
retrieved = 100
Table 6 Confusion matrix of perception dimension
Actual
Input Dimension Extremely_Intuitive Medium_Intuitive Neutral Medium_Sensitive Extremely_Sensitive
Predicted Predicted_Extremely
Intuitive
78 5 9 11 4 Total
predicted = 107
Predicted_Medium
Intuitive
690 6 9 8 Total
predicted = 119
Predicted_Neutral 9 2 76 4 6 Total
predicted = 97
Predicted_Medium
Sensitive
42472 7 Total
predicted = 89
Predicted_Extremely
Sensitive
315475 Total
predicted = 88
Total
retrieved = 100
Total
retrieved = 100
Total
retrieved = 100
Total
retrieved = 100
Total
retrieved = 100
52 T. Sheeba and R. Krishnan
would benet educators to incorporate various learning
materials based on the students learning style. The classi-
cation results are also used to cluster the learners based on
their learning style which would help the educators to design
the pedagogical structure of the courses.
The future research is to integrate the classier into the
Moodle LMS system in order to automatically detect the
learning style based on the studentsbehavior which would
help to design an effective adaptive system.
References
1. Feldman, J., Monteserin, A., Amandi, A.: Automatic detection of
learning styles: state of the art. Artif.Intell. Rev. 44(2), 157186(2015)
2. Ahmad, N., Tasir, Z., Kasim, J., Sahat, H.: Automatic detection of
learning styles in learning management systems by using literature
based method. In: 13th International Educational Technology
Conference, Vol. 103, pp. 181189, Procedia, Elsevier (2013)
3. Garcı´a, P., Amandi, A., Schiafno, S., Campo, M.: Evaluating
Bayesian networks precision for detecting students learning styles.
Comput. Educ. 49(3), 794808 (2007)
4. Abdullah, M.A.: Learning style classication based on students
behavior in Moodle learning management system. TAMLAI Trans.
Mach. Learn. Artif. Intell. 3(1) (2015)
5. Yannibelli, V., Godoy, D., Amandi, A.: A genetic algorithm
approach to recognize studentslearning styles. Interact. Learn.
Environ. 14(1), 5578 (2006)
6. Chang, Y.C., Kao, W.-Y., Chu, C.-P., Chiu, C.H.: A learning style
classication mechanism for e-learning. Comput Educ 53(2), 273
285 (2009)
7. Kolekar, S.V., Sanjeevi, S.G., Bormane, D.S.: Learning style
recognition using articial neural network for adaptive user interface
in e-learning. In: Computational Intelligence and Computing
Research, 2010 IEEE International Conference, pp. 15, IEEE (2011)
8. Al-Azawei, A., Badii, A.: State of the art of learning styles-based
adaptive educational hypermedia systems (LS-BAEHSS). Int.
J. Comput. Sci. Inf. Technol. (IJCSIT) 6(3), 119 (2014)
9. Villaverde, J.E., Godoy, D., Amandi, A.: Learning stylesrecog-
nition in e-learning environments with feed-forward neural net-
works. J. Comput. Assist. Learn. 22(3), 197206 (2006)
Fig. 4 Precision versus recall curve of FSLSM dimensions
Automatic Detection of Students Learning Style 53
Big Data Security and Privacy Concerns:
A Review
Akbar Khanan , Salwani Abdullah, Abdul Hakim H. M. Mohamed,
Amjad Mehmood, and Khairul Akram Zainol Ariffin
Abstract
The past few decades have recorded increases in the
development of new technologies. These technologies,
such as the smart phone, computers, and social network
sensors, have resulted in the production of a large amount
unstructured data from different formats ranging from
Tera Bytes (TB) to Peta Bytes (PB). This huge and
differently formatted data is known as big data. Big data
has a great potential for both the public and private sector.
The utilisation of big data can have a positive impact.
Different tools and techniques such as analytics and data
mining are being used to make the data useful. However,
big data is beset by security and privacy issues.
Researcher from different domain are trying to overcome
the issues in the big data, this paper will focus on the
applications and major security, and privacy issues of big
data.
Keywords
Big data Data analytics Privacy Security
1 Introduction
The past few decades have recorded increases in the
development of new technologies. These technologies, such
as the smart phone, computers, and social network sensors,
have resulted in the production of a large amount unstruc-
tured data from different formats ranging from Tera Bytes
(TB) to Peta Bytes (PB). This huge and differently formatted
data is known as big data. Big data has a great potential for
both the public and private sector. The utilisation of big data
can have a positive impact, for example, on health care.
A hospital will be able to store and analyse patient data to
prevent the outbreak of diseases. Business can also make use
of this data. A company can analyse its customer sales
record to determine customer choices and thereby make
informed decisions about the effective sourcing and distri-
bution of goods and services in a timely manner, and thus
increase prots and make customers happy.
Big data is already used by Google as a distributed
storage system called Bigtable that has been designed,
implemented, and deployed to manage structured data. This
system has the reliability to handle thousands of machines
and PBs of data, and has achieved several goals including
wide applicability, scalability, high performance, and high
availability. The system is also used in Google products [1].
Government can use big data for transparency in public
affairs for citizen engagement, to prevent fraud and crime, to
improve national security, and to comfort the common citi-
zen. The government sector deals in general issues (like data
from multiple sources with different formats or costs), spe-
cial issues (e.g., data from different sources of the govern-
ment), and sharing of the data with sources of big data [2]
(Fig. 1).
Some signicant and insightful studies have been done to
show the importance of big data, but there are still some
questions that need to be asked about what big data means,
how and which data to access [3], and what security and
privacy challenges big data faces. This article will contain
A. Khanan (&)S. Abdullah
Centre for Articial Intelligence Technology,
Universiti Kebangsaan Malaysia (UKM), Bangi, Malaysia
e-mail: P89401@siswa.ukm.edu.my
S. Abdullah
e-mail: salwani@uk.edu.my
A. Khanan A. H. H. M. Mohamed
Department of Management Information System,
ASharqiyah University, Ibra, Sultanate of Oman
e-mail: abdulhakim.mohamed@asu.edu.om
A. Mehmood
Institute of Information Technology, Kohat University
of Science & Technology, Kohat, Pakistan
e-mail: dramjad.mehmood@ieee.org
K. A. Z. Arifn
Research Centre for Software and Management,
Universiti Kebangsaan Malaysia (UKM), Bangi, Malaysia
e-mail: k.akram@ukm.edu.my
©Springer Nature Switzerland AG 2019
A. Al-Masri and K. Curran (eds.), Smart Technologies and Innovation for a Sustainable Future,
Advances in Science, Technology & Innovation, https://doi.org/10.1007/978-3-030-01659-3_8
55
ve sections. Section 2will be about the denition, sec-
tion 03 Applications of Big data and characteristics of big
data, and Sect. 3will be about security and privacy concerns
for big data, along with possible solutions.
1.1 Big Data Definition
Although there is no proper denition for the term, it is safe to
say that Big datacan be used for large data sets (unstructured,
different formats) that cannot be managed by traditional
database management systems. The processes for storing,
retrieving and managing the different types of data within a
suitable time frame can be difcult for traditional common
software. Daily datas size constantly increases by a few dozen
TBs to PBs in a single data set [4]. In todays world, people are
generating data through technology faster than before [5]. This
huge amount of data, which is mostly generated by social
media, cellular phones, and other digital communication
devices can be the true form of big data [6]. Due to its usage
and application in decision making, big data has become more
attractive and accessible to the public sector, the private sector,
and the eld of academia [6].
Big data and analytics can have a positive impact on
business and industry. Companies can invest in big data,
analytics, and other technology to track customer needs and
preferences, and to provide an easy access to goods and
services by various accommodating small markets. Big data
can also help nd problems on a societal level by using new
technology For example, big data can be used to identify
new trends in health care, prevent diseases, and much more.
If the data is managed well, it can also help nd new sources
of economic growth [7].
1.2 Characteristics of Big Data
Big data has been characterised by the 3Vs: Volume,
Velocity, and Variety, Simply put, volume refers to its huge
size, velocity to the speed of its creation, and variety to its
differentiated formats and sources. A later study suggests
that 3Vs are insufcient to describe big data, so more
components have been added to include Volume, Velocity,
Variety, Veracity, and Complexity [8] (Table 1).
1.3 Big Data Timeline
The concept of a Database Machineemerged in the 1970s.
The aim was to store and analyse data with the help of
technology, but due to huge increases in the demand for data
processing, the single machine was insufcient. Therefore, in
order to meet the requirement of share nothing, a parallel
system was proposed in 1980. The architecture of share
nothingwas based on the cluster that every machine has its
own processor, storage, and disk [14]. The availability of
the World Wide Web in 1991 opened the door to the
public, which later on in 1998 lead to the concept of IOT
[15].
It is predicted that the current volume of data will grow
from 130 Exabyte to 40,000 Exabyte between 2005 and
2020, which means that the growth of the data will be double
Big Data
Application
Government
Health
Banks
Telecom
Autom
Energy
Utility
Fig. 1 Big data applications
56 A. Khanan et al.
after every two years. This is why this huge amount of data
big datais attracting researchers to nd solutions for
various government and industrial problems [16].
2 Big Data Applications
The role of big data can be helpful for many public and
private sectors; some of the examples are listed below.
2.1 Big Data in Healthcare
According to history, most of the data [17], that has been
recorded is by the healthcare sector for record keeping, com-
pliance, and retention of patient care records; most of the data
recorded is in hard form [18]. Use of a proper system to collect
and analyse the data can help the healthcare industry to improve
the quality of life. The future of big data analytics predicts an
increase in epidemics, cures, and diseases [19]. Big data can
also assist the government sector by indicating areas where the
government can take action and save thousands of lives. Big
data in healthcare can be divided into different sub-categories
like bioinformatics, neuro-informatics,clinical informatics, and
public health informatics. Bioinformatics mainly focus on
molecular data; analytic tools can be used to know how the
body works by using molecular data. The main focus of
neuro-informatics is to know how the brain works and how the
data gather frombrain images and medical conditions can even
be associated. Research on clinical information helps GPsto
get better and more accurate decisions about their patients by
analysing their data. Public health informatics deal with public
data to analyse and get accurate medical information [20].
2.2 Big Data for Government
Big data can play a vital role in the government sector,
because this sector is always trying to improve quality of
life. The government only needs to have an advanced system
in order to collect and analyse data that can help them
identify areas they need to focus on. However, the govern-
ment needs to have a look at the data, and information
policies like privacy, data reuse, data accuracy, data access,
archiving, and preservation as play with data can have pri-
vacy and security issues [21].
2.3 Intelligent Transportation
The development in communication [22] and robotic tech-
nology had a good impact on the life of common people.
Advancements in these technologies have given rise to an
opportunity for the autonomous vehicle to be created. The
aim to introduce autonomous vehicles is to reduce costs and
increase transportation accessibility [23]. The sensor is
another important technology. Advancements in sensor
technology open the door for innovation. Transportation
includes sensor technology with the Global Position Satellite
(GPS) system and on-board cameras. GPS systems help
vehicles locate the required route, and sensor technology
enabled with trafc control systems help control the vehicle
[24]. One example of intelligent transportation and the
autonomous vehicle is the Google car; this car is enabled
with a camera, 3-D radar/range nder, and an articial
intelligence system that is use for calculation. A combination
of all these technologies and others has enabled the launch of
the self-driven car [25].
Table 1 Volume, velocity,
variety, veracity, and complexity Factor Identication References
Volume Volume is a huge amount of data that is created from different sources
(transactions, unstructured streaming from text, images, audio, VoIP,
video, TV, and other media, sensor, and machine-to-data)
[9]
Velocity Velocity refers to the rate of change of data or how often the data is created [10]
Variety Data variety is the measure of the variety of data (text, images, video, and
audio); one of the best challenges to the effective use of big data is data
variety for analytics, because of incompatible formats, lack of structure,
and inconsistencies
[11]
Complexity Complexity denotes the data that comes from multiple sources that needs
to be linked, matched, cleaned, and transformed
[12]
Veracity Veracity is the reliability of data linked with different types of data just like
correctness, truthfulness, and accuracy
[13]
Big Data Security and Privacy Concerns: A Review 57
3 Big Data Security and Privacy
Security and privacy are the big hurdles for users who have
to outsource their data. For sensitive and personal data,
specic laws need to be established. For example, data
protection and privacy concerns have been regulated in
different countries [26]. Databases related to the government
or people need a high level of security polices and mecha-
nisms to secure them against illegal and malicious use. That
big data technology such as Hadoop and Cassandra are
suffering from insufcient security is of serious concern [27]
Moreover, technologies and mechanisms like rewalls and
DMZs for security and privacy cannot be applied or used
for big data because of its vast border. Big data security
objectives are the same as other data types (e.g., conden-
tiality, integrity, and availability [28].
Cloud Secure Alliance (CSA) has classied four main
challenges for big data security: infrastructure security, data
privacy, data management, and integrity and reactive secu-
rity [29] (Fig. 2).
To provide security to the infrastructure, distribution
computations and data stores must be secured. To secure
data information distribution, privacy must be protected, and
the sensitive data must be secured with cryptography and
granular access control. Managing large volumes of data
requires scalable and distributed solutions to secure data
storage and to provide efcient audits and data sources. Data
integrity must be checked for data coming from diverse
sources and analytics for security can be performed to ensure
the health of the infrastructure [30].
3.1 Infrastructure Security
Modern science infrastructure is solving new large-scale
problems; these solutions were not possible before, as they
produce huge amounts of data capable of storing, distribut-
ing, and processing these data. This is referred to as scientic
data e-infrastructure. The scientic data is more complex and
interrelated with other objects. As things become new and
technology-driven, big data science requires solutions to a
number of components and challenges [31]. One of the basic
challenges is processing of huge data. The collection of data
is easier than the processing of it because the complete
behaviour of data (structure, value, format, etc.) needs to be
analysed and understood. For example, social media allows
any format of data by the user, but the volume can be
increased to a level that can be difcult to manage, because
the amount of data that a single processor can process is still
limited. In order to process this huge data, special algorithms
need to be designed [32].
3.2 Data Privacy
One of the sensitive problems that big data is facing is data
privacy. Manipulation of data can cause a privacy issue, like
information collected from the user and used for the business
purposes of an organisation about which the user is unaware,
or that user information is collected and combined with other
data to get certain results [33]. A lot of personal and private
information that can include health, medical, nancial, bank,
and much more can be accessed, which may be a violation of
a personal legal right for privacy. Therefore, the eld should
make sure that all the privacy policies are properly placed
[34]. Social media and health informatics are the biggest
sources of data collection. One of the threats to personal
security is the unregulated collection of data by different
organisations, especially by social media companies.
Developing an algorithm that can randomise the data among
other data sets is a major research problem [35].
3.3 Data Management
Management of data is another one of the difcult issues that
need to be addressed by big data. Although data is already
managed by traditional ways in the business world, it will
still be difcult if the data is distributed to different places
that are owned and managed by different entities, and
coming in at a large volume; hence, a big management
solution is required [36]. Dealing with big data is a difcult
task because of the huge amount of data with different for-
mats (picture, audio, video, etc.); yet, this can be handled.
The problem becomes worse if the data is stored in different
Big Data
Security
and Privacy
Data
Management
Integrity and
Reactive
Security
Data Privacy
Infrastructure
Security
Fig. 2 Big data privacy and security domain
58 A. Khanan et al.
geographical locations. In this case, it becomes impossible to
manage the data. Management of data plays a key role in
large organisations. Various technologies like Hadoop,
MapReduce, and Hive have been introduced to the market to
manage data. Hadoop data is broken down into several parts
that can be spread into a number of systems. In this process,
data is repeated many times on different nodes to provide a
security for any failure node [37].
3.4 Integrity and Reactive Security
It is difcult to check the trustworthiness of big datas dif-
ferentiated sources, but the data from varied sources can be
used by certain algorithms to produce accurate results.
Authenticity and integrity of data must be considered [38].
Data integrity is a key element for collaborative analysis
where analysts and decision makers use information within
organisations. Mostly, data mining approaches are being
applied to improve the efciency of decision making.
Integrity can also be affected by the quality and reliability of
data. Basically, integrity is the prevention of illegal and
unauthorised access to the data [39]. In the eld of infor-
mation security, data integritys main concern is maintaining
and assuring the accuracy and consistency of the data by
preventing unauthorised access. For maintaining integrity,
all the characteristics of data must be correct, including
business rules, relations, denitions, and so on [40].
Quality and Reliability of data. Quality of data has a
high importance for big data utilisation. Low quality of data
is just a waste of resources and transmission. A lot of factors
can be included to restrict the quality of data including
generation, acquisition, and transmission. Quality of data is
mainly important for accuracy, completeness, redundancy,
and consistency. The problems related to quality need to be
addressed; therefore, effective methods to detect the quality
of data automatically and repair the data need to be exam-
ined [41]. Reliability of datawhether or not we can trust
dataaccuracy, consistency, and completeness are all
essential [42].
4 Research Trend in Big Data
The author in the article [43], briey overview the issues
related to big data and email security. The analyses of the
data showed in the article, describe the threat related to big
data. According to author, different type of threat like mal-
ware can trap the data easily. The author proposes to have a
framework with having guidelines for the prevention big
data security.
The article [44], reviewed the primarily security issues
related to energy big data analytics and for internet of thing
based smart grid. According to author the smart grade can
benet from the IoT Technology, meanwhile the smart
devices are integrated with so huge number, that now they
are causing the main security for the internet based smart
grid. The data need to be kept save form intrusion and pri-
vacy, if we want to be beneted from the smart grid and big
data.
According to author [45], modernization in the technol-
ogy also arise the volume of big dat. A much more focus
need to be given to secure sensitive health care data from
adversaries and malicious software. That will help to
maintain integrity and privacy of sensitive information. The
security issues therefore must be dealt and new security need
to build in health care context. The availability and protec-
tion of data without having the privacy concern will deter-
mine the potential to adopt the health care data into the cloud
environment.
The author in the article [46], proposed solution in order
to overcome the issue associated with storage of big data
through could compute. As the adoption of cloud computing
services for storing big data is increasing with a rapid speed.
According to author there are still many open security risks
that need to be addressed in the cloud. The condential data
store at cloud could have a security risk on data le in one
place.
5 Open Security and Privacy Challenges
Big data is facing numerous challenges; some of the research
challenges identied by researchers of big data security and
privacy are as follows:
Scalable and compostable privacy preserving data min-
ing and analytics [47].
Risks in outsourcing and use of third-party tools [48].
Organisational learning culture and competencies [49].
Lack of infrastructure to insure the security of data (in-
tegrity, accountability, availability,) and become more
vulnerable if data is from different sources [50].
6 Conclusion
Indeed, big data can be a gold mine for both the public and
private sector, as it can be used for variety of purposes.
Business can boost and government can improve health
facilities by using this huge data. Yet, at the same time, big
data also faces a lot of challenges including data manage-
ment, infrastructure, and analytical issues, as well as security
and privacy issues and data visualisation. Therefore, big data
is the main focus of research for many researchers. This
Big Data Security and Privacy Concerns: A Review 59
paper discussed big data literature, security, and privacy
concerns, and listed current big data privacy and security
issues.
Acknowledgements This work was supported by the Universiti
Kebangsaan Malaysia (DIP-2016-024).
References
1. Chang, F., Dean, J., Ghemawat, S., Hsieh, W.C., Wallach, D.A.,
Burrows, M., Chandra, T., Fikes, A., Gruber, R.E.: Bigtable: a
distributed storage system for structured data. Google Inc. In:
Proceeding of the OSDI, 6 (2006)
2. Mehmood, A., Khanan, A., Umar, M.M., Abdullah, S., Arifn, K.
A.Z., Song, H.: Secure knowledge and cluster-based intrusion
detection mechanism for smart wireless sensor networks. IEEE
Access 6, 56885694 (2018). https://doi.org/10.1109/ACCESS.
2017.2770020
3. Boyd, D., Crawford, K.: Critical questions for big data. Inf.
Commun. Soc. 15, 662679 (2012)
4. Elragal, N., Elragal, A.: Big data analytics: a literature review
paper. In: Lecture Notes in Computer Science (2014)
5. Duan, L., Xiong, Y.: Big data analytics and business analytics.
J. Manag. Anal. 2(2015)
6. Kshetri, N.: The emerging role of big data in key development
issues: opportunities, challenges, and concerns. Big Data Soc. 1
(2014)
7. Abawajy, J.: Comprehensive analysis of big data variety land-
scape. Int. J. Parallel Emergent Distrib. Syst. 30,514 (2015)
8. Kuo, M.-H., Sahama, T., Kushniruk, A.W., Borycki, E.M.,
Grunwell, D.K.: Health big data analytics: current perspectives,
challenges, and potential solutions. Int. J. Big Data Intell. 1, 114
126 (2014)
9. Cardenas, A.A., Manadhata, P.K., Rajan, S.P.: Big data analytics
for security. IEEE Secur. Priv. 11(6), 7476 (2013)
10. Li, Y., Gai, K., Qiu, L., Qiu, M., Zhao, H.: Intelligent cryptog-
raphy approach for secure distributed big data storage in cloud
computing. Inf. Sci. 387, 103115 (2017)
11. Xu, L., Jiang, C., Wang, J., Yuan, J., Ren, Y.: Information security
in big data: privacy and data mining. IEEE Access 2, 11491176
(2014)
12. Kaisler, S., Armour, F., Espinosa, J.A., Money, W.: Big data:
issues and challenges moving forward. In: System Sciences
(HICSS), 46th Hawaii International Conference, IEEE, pp. 995
1004 (2013)
13. Wolfert, S., Ge, L., Verdouw, C., Bogaardt, M.J.: Big data in smart
farminga review. Agric. Syst. 153,6980 (2017)
14. Lukoianova, T., Rubin, V.L.: Veracity roadmap: is big data
objective, truthful, and credible? 12 (2014)
15. Chen, M., Mao, S., Liu, Y.: Big data: a survey. Mob. Netw. Appl.
19, 171209 (2014)
16. Herland, M., Khoshgoftaar, T.M., Wald, R.: A review of data
mining using big data in health informatics. J. Big Data 1,2
(2014). https://doi.org/10.1186/2196-1115-1-2
17. Plachkinova, M., Vo, A., Bhaskar, R., Hilton, B.: A conceptual
framework for quality healthcare accessibility: a scalable approach
for big data technologies. Inf. Syst. Front. 114 (2016)
18. Mehmood, A., Khanan, A., Mohamed, A.H.H.M., Mahfooz, S.,
Song, H., Abdullah, S.: ANTSC: an intelligent Naïve Bayesian
probabilistic estimation practice for trafcow to form stable
clustering in VANET. IEEE Access 6, 44524461 (2018). https://
doi.org/10.1109/ACCESS.2017.2732727
19. Fay Chang, J., Ghemawat, S., Wilson, C., Hsieh, D.A., Wallach,
M., Burrows, T., Fikes, A., Grube, R.E.: Bigtable: A Distributed
Storage System for Structured Data. Google Inc (2006)
20. Hashem, I.A.T., Yaqoob, I., Anuar, N.B., Mokhtar, S., Gani, A.,
Khan, S.U.: The rise of big dataon cloud computing: review and
open research issues. Inf. Syst. 47,98115 (2015)
21. Herland, M., Khoshgoftaar, T.M., Wald, R.: A review of data
mining using big data in health informatics. J. Big Data 1,2
(2014). https://doi.org/10.1186/2196-1115-1-2
22. Kim, G.-H., Trimi, S., Chung, J.-H.: Big-data applications in the
government sector. Commun. ACM 57,7885 (2014)
23. Manogaran, G., Thota, C., Lopez, D., Sundarasekar, R.: Big data
security intelligence for healthcare industry 4.0. In: Cybersecurity
for Industry 4.0, pp. 103126. Springer, Cham (2017)
24. Bagloee, S.A., Tavana, M., Asadi, M., Oliver, T.: Autonomous
vehicles: challenges, opportunities, and future implications for
transportation policies. J. Mod. Transp. 24, 284303 (2016)
25. Gupta, A.: Review on big data promises for information security.
J. Data Min. Manag. 1(2016)
26. Poczter, S.L., Jankovic, L.M.: The Google car: driving toward a
better future? J. Bus. Case Stud. (Online) 10, 7 (2014)
27. Thota, C., Manogaran, G., Lopez, D., Vijayakumar, V.: Big data
security framework for distributed cloud data centers. In: Cyber
Security and Threats: Concepts, Methodologies, Tools, and
Applications, pp. 589607, IGI Global (2018)
28. Moura, J., Serrao, C.: Security and privacy issues of big data.
arXiv preprint arXiv:1601.06206 (2016)
29. Eiman Al Nuaimi, H.A.N., Mohamed, N., Al-Jaroodi, J.: Appli-
cations of big data to smart cities. J. Internet Serv. Appl. (2005)
30. Chaulagain, R.S., Pandey, S., Basnet, S.R., Shakya, S.: Cloud
based web scraping for big data applications. In: 2017 IEEE
International Conference on Smart Cloud (SmartCloud), New
York, NY, pp. 138143 (2017) https://doi.org/10.1109/smartcloud.
2017.28
31. Demchenko, Y., Zhao, Z., Grosso, P., Wibisono, A., Laat, C.D.:
Addressing big data challenges for scientic data infrastructure. In:
Cloud Computing Technology and Science (CloudCom), IEEE 4th
International Conference on 36 Dec 2012, pp. 614617 (2012)
32. Sneha Gupta, M.S.C.: Big data issues and challenges. Recent
Innov. Trends Comput. Commun. 3(2015)
33. Katal, A., Wazid, M., Goudar, R.H.: Big data: issues, challenges,
tools, and good practices. In: Contemporary Computing (IC3),
2013 Sixth International Conference, 810 Aug 2013, pp. 404409
(2013)
34. Liu, Y.: Research on the application of big data in academic
libraries. In: 2018 International Conference on Intelligent Trans-
portation, Big Data & Smart City (ICITBS), Xiamen, pp. 364367
(2018) https://doi.org/10.1109/icitbs.2018.00099
35. Stahl, B.C., Wright, D.: Ethics and privacy in AI and big data:
implementing responsible research and innovation. IEEE Secur.
Priv. 16(3), 2633 (May/June 2018). https://doi.org/10.1109/msp.
2018.2701164
36. Gupta, A.: Analysis of real-time big data: its applications and
challenges. J. Data Min. Manag. 1(2016)
37. Kaur, P., Monga, A.A.: Big data management. Adv. Found. Res.
Sci. Eng., 1(2015)
38. Alvaro, A., Cardenas, P.K.M., Sreeranga, P., Rajan: Big data
analytics for security. IEEE Comput. Reliab. Soc. (2013)
39. Khan, N., Yaqoob, I., Hashem, I.A.T., Inayat, Z., Mahmoud A.W.
K., Alam, M., Shiraz, M., Gani, A.: Big data: survey, technologies,
opportunities, and challenges. Sci. World J. (2014)
40. Stahl, B.C., Wright, D.: Ethics and privacy in AI and big data:
implementing responsible research and innovation. IEEE Secur.
Priv. 16(3), 2633 (May/June 2018). https://doi.org/10.1109/msp.
2018.2701164
60 A. Khanan et al.
41. Jasim, A.C., Tapus, N., Hassoon, I.A.: Access control by
signature-keys to provide privacy for cloud and big data. In: 5th
International Conference on Control, Decision and Information
Technologies (CoDIT), Thessaloniki, Greece, pp. 978983 (2018)
https://doi.org/10.1109/codit.2018.8394916
42. Cai, L., Zhu, Y.: The challenges of data quality and data quality
assessment in the big data era. Data Sci. J. 14, 2 (2015)
43. Zaki, T., Uddin, M.S., Hasan, M.M., Islam, M.N.: Security threats
for big data: a study on Enron e-mail dataset. In: International
Conference on Research and Innovation in Information Systems
(ICRIIS), pp. 16. (2017)
44. Chin, W.L., Li, W., Chen, H.H.: Energy big data security threats in
IoT-based smart grid communications. In: IEEE Communications
Magazine, vol. 55, pp. 7075, Available: ISSN: 0163-6804 (Oct
2017)
45. Chandra, S., Ray, S., Goswami, R.T.: Big data security in healthcare:
survey on frameworks and algorithms. In: IEEE 7th International
Advance Computing Conference (IACC), pp. 8994 (2017)
46. Chin, W.L., Li, W., Chen, H.H.: Energy big data security threats in
IoT-based smart grid communications. In: IEEE Communications
Magazine, vol. 55, pp. 7075, Available: ISSN: 0163-6804 (Oct
2017)
47. Surbiryala, J.: Ph.D. Forum: improving the security for storing the
big data in cloud environment. In: IEEE International Conference
on Smart Computing (SMARTCOMP), pp. 12 (2017)
48. Salleh, K.A., Janczewski, L.: Technological, organizational, and
environmental security and privacy issues of big data: a literature
review. Procedia Comput. Sci. 100,1928 (2016)
49. Zaki, T., Uddin, M.S., Hasan, M.M., Islam, M.N.: Security threats
for big data: a study on Enron e-mail dataset. In: International
Conference on Research and Innovation in Information Systems
(ICRIIS), pp. 16 (2017)
50. Sivarajah, U., Kamal, M.M., Irani, Z., Weerakkody, V.: Critical
analysis of big data challenges and analytical methods. J. Bus. Res.
(2016)
Big Data Security and Privacy Concerns: A Review 61
Chinas Relations with Arab Gulf States
Golam Mostafa
Abstract
Arab Gulf states are important for China and play
signicant roles because of their geo-strategic location,
huge reserve of oil and gas, fast and steady growth of
economy with rapid expansion of market for consumer
and merchandise goods which China has a plenty of
them. The area was, however, out of the radar of Chinese
attention until recently as Beijing was preoccupied with
other parts of the world. The paper focuses on Chinas
multilevel interests in economic, trade and investments in
strategic sectors as well as steady and guaranteed supply
of oil and gas from the region. The ndings of the paper
are: Economic ties between China and GCC countries
have increased signicantly since the mid-1990s and are
expected to grow rapidly in future; Oil and gas dominate
Chinas import items from the Gulf and Saudi Arabia has
become the largest supplier and will remain so in near
future; As China intends to increase its inuence and play
an increasingly important strategic roles in the region
Beijing is focusing on getting involved in new and
strategic sectors like, nuclear energy, aerospace, commu-
nication, infrastructure building and so on; Chinas
ultimate politico-military and security goals and objec-
tives in the region are to be gradually involved in the
multi-billion dollar military, security and strategic sectors
of arms market not by challenging or going into direct
conict with the West, particularly to the US who are
currently dominating the market, rather by using the trust
and supports of the leaderships in the region.
Keywords
GCC Middle East OBOR Arab Gulf states
Free trade agreement
1 Introduction
China has become one of the fastest growing economies in
the world during the last four decades or so, a rising
superpower with rapid economic growth and expansion of
trade and investments all over the world and the Gulf region
is not an exception. Chinas relations with GCC countries
are not based on a long historical traditions and experiences
rather evolved to the current stage through many twists and
turns over the last few decades. China wants to establish and
improve relations with GCC countries both at institutional
frameworks as well as on individual basis, and, so far, the
later one has proved to be more effective and successful.
Chinese Foreign Minister Huang Hua sent a congratulatory
telegram to the Secretary General when the GCC was cre-
ated in 1981, and expressed interests in cooperating and
developing relations with the newly created organization but
there was no positive response and interests were shown in
developing links with the communist China [1].
Individual Gulf Arab states showed interests and took
initiatives in recognizing and establishing with China. In
1971, Kuwait became the rst Gulf country to establish
diplomatic relations with China and supported its entry into
the UN which was highly appreciated but no further devel-
opment took place until the mid-1990s. As China was
modernizing its foreign policy and opening to the outside
world through the policies of open doorand go broadin
the late 1970s, it was eager and interested in establishing
contacts with more Arab countries. Beijing established
diplomatic relations with the Sultanate of Oman in 1978, and
other GCC countries followed the suite. But despite formal
diplomatic relations, real communications and expansion of
trade, business, connections and linkages were not devel-
oped mainly because of the reminiscence of Cold War pol-
itics, division of the world among great powers for sphere of
inuence, control and domination, and Chinas own internal
power struggle. GCC countries were not considered as
strategically important in the Chinese eyes as it was
G. Mostafa (&)
American University in the Emirates, Dubai,
United Arab Emirates
e-mail: golam.mustafa@aue.ae
©Springer Nature Switzerland AG 2019
A. Al-Masri and K. Curran (eds.), Smart Technologies and Innovation for a Sustainable Future,
Advances in Science, Technology & Innovation, https://doi.org/10.1007/978-3-030-01659-3_9
63
overwhelmingly preoccupied in building relations with US,
ASEAN, South Asia and exploring Africa. But Chinas Gulf
policy got a renewed importance in 1993 when the countrys
demand exceeded its domestic supply of oil and started
looking for imports from stable and reliable sources, and
Gulf countries considered to be the obvious choice.
The study of Sino-GCC relations is important for many
reasons. From the Chinese perspective relations with the
GCC is important and crucial because; (a) China views the
GCC countries as the most reliable partner (more than 50%
of its oil consumption is supplied by Saudi Arabia) and
stable supplier of its energy needs for both oil and gas as
they have a huge reserve of it; (b) Saudi Arabia has the
largest economy in the Arab world with signicant inuence
in the Arab and Islamic world as well as it is a member of the
G20 and China considers the Kingdom politically and
strategically important to maintain close and friendly rela-
tions and gradually forming an alliance/partnership with it;
(c) Saudi Arabia as a founding and most inuential member
of the OPEC carries a lot of weight in deciding oil pro-
duction and price setting in global market, which is impor-
tant for China as a growing oil importing and consuming
nation; (d) GCC countries, along with the Arab League
members, recognize One Chinapolicy and practice it in
their foreign policy and diplomacy which is very important
for China; (e) Chinas Gulf policy also ts into its grand
project of One Belt One Road, (OBOR)project of linking
Asian trade and business with Europe [2]; (f) GCC countries
strongly support and actively participate in nancial insti-
tutions initiated and created by China for funding and sup-
porting OBOR and other projects for investment,
infrastructure building and development. For example, all
GCC countries (except Bahrain, a prospective member) are
members of Asia Infrastructure Investment Bank (AIIB)
created in 2016 and are heavily investing in it.
For GCC countries, China is important because; (a) It is
an emerging peaceful superpower with a very high and
steady economic growth and industrial development and a
continuous demand for imports of oil and gas; (b) Arab Gulf
states trust China, respect its policy of neutrality,
non-intervention and non-interference into domestic affairs
of others; (c) They also consider China as a distant Asian
neighbor with emerging global power and inuence and
consider it as a reliable and trustworthy partner and feel
comfortable in doing business with and dealing with it;
(d) China does not carry any past political, military or ide-
ological baggage in the Gulf and that make easier for it in
dealing with the countries in the region; (e) Recently, par-
ticularly after September 11, GCC countries are under
scrutiny/pressure and targets of criticism from US Admin-
istrations about their political systems, human rights, way of
life, roles, positions and actions on global war on terrorism
as well as on regional wars and conicts which offended and
irritated many leaders in the region but China never criti-
cized or raised those issues or put any pressure on them
which are highly welcomed by the leaders in the region.
Charles Freeman, former US Ambassador to Saudi Ara-
bia, characterized Chinas relations with the Arab countries
as, The Arabs see a partner who will buy their oil without
demanding that they accept a foreign ideology, abandon
their way of life or make other choices they would rather
avoid. The Arabs see China as a country that is far away and
has no imperial agenda in their region[3].
The paper is organized into several sections; In the
Introductory Section, the role and importance of the topic,
and a brief historical review of the establishment, evolution
and overtime growth of Sino-GCC relations are discussed
and analyzed; Sect. 2discusses the general trends and
overall growth of Chinas economic, trade and investment
relations with the GCC countries; Sect. 3provides a critical
analysis of Chinas relations with the Kingdom of Saudi
Arabia (KSA); Sect. 4concentrates on Chinas relations
with the United Arab Emirates (UAE); Sect. 5briey ana-
lyzes Sino-Kuwaiti relations; Sect. 6is about Sino-Qatari
relations; Sect. 7elaborates Chinas relations with Oman
and Bahrain; Sect. 8is the nal Concluding one that suc-
cinctly summarizes the ndings of the research and raises
some challenges and opportunities.
2 Trade, Economic, Investment
and Institutional Relations
Chinas primary interests in the Gulf are to promote trade,
increase exports of its consumer and manufacturer goods
into the markets of the Arab Gulf states which is important
and necessary for its economic growth and industrial
development. Beijing is now the number one exporter to all
GCC countries as well as many Arab states in broader
Middle East. Chinas relations with the GCC states repre-
sents one of the fastest growing trade relationships in the
worldand the trajectory is still moving upward. Chinas
trade with GCC countries was worth of more than $92 bil-
lion in 2010 that increased to $158 billion in 2014; exports
increased more than $56 billion in 2010 to $98.07 billion in
2014 [4].
Along with burgeoning trade relations China has been
steadily investing in important strategic sectors in GCC
countries, like transportation, communication, railway,
agriculture and so on. Hundreds of treaties, MoUs and
agreements are signed between China and individual GCC
member states during high level bilateral visits and meetings.
For example, in 2008 Chinas Sinopec signed a $350 million
oil drilling deal with Kuwait Petroleum Corporation (KPC);
China Railway Construction Corporation concluded a $5.5
billion agreement to build a rail network in Saudi Arabia;
64 G. Mostafa
Chinese National Petroleum Company (CNPC) started a $3
billion oil project in Iraq; and the CNPC won a bid to build a
$3.29 billion oil pipeline in the United Arab Emirates. In
between 2001 and 2009, Chinese companies signed about
3000 contracts worth approximately $2.7 billion in the Gulf
oil services sector alone [5].
Chinas interests in the Gulf go beyond the simple eco-
nomic, trade and investment relations with individual
countries but has also carefully orchestrated and focused on
institution building for cooperation in political, cultural and
strategic sectors. Thus, China established the China-Arab
States Cooperation Forum in 2004, representing 22 members
of the Arab League that meets in every two years. In the
sixth ministerial meeting in 2014, which was held in Beijing,
the Prime Ministers of Kuwait and ministers from 20 other
Arab states attended the Forum where three important doc-
uments—“Beijing Declaration,Action Plan for 201416
and the Development Plan for 201424”—were signed.
A comprehensive strategy known as 1+2+3proposed
by China meaning; cooperation in energy, improving trade
and investment, and cooperation in new sectors of nuclear
energy, aerospace technology, construction and job creation
[6]. Within the China-Arab Cooperation framework, China
was supposed to build Confucius institutes in the Arab world
for teaching and learning Chinese language, art, culture,
literature and translating important Chinese books on the
region into Arabic language but the progress is slow. In early
2013, there were only 7 Confucius Institutes in the Arab
World, and only 2 are in GCC countries; one in UAE and the
other in Bahrain [6]. China is also providing fellowships and
scholarships to students from GCC countries to study in
Chinese educational institutions, holding exhibitions and
regular exchange programs, cultural activities and so on for
promoting people-to-people diplomacy. But most of them
are done and organized on bilateral basis rather than on
institutional framework by involving all or most of the GCC
countries.
Another important area for institutional cooperation is the
signing of a Free Trade Agreement (FTA) between GCC and
China. In 2004 during a ministerial meeting, the decision
was made to sign a comprehensive FTA between China and
the GCC countries to boost and expediate trade, investment
and other economic ties. So far, 9 Round of Negotiations
took place where the parties worked hard to nalize the
agreement by 2017. During his historical visit to Saudi
Arabia in January 2016 Chinese President Xi Jinping met the
Secretary General of the GCC reviewed of progress of the
FTA and agreed to accelerate the pace of negotiations and
committed to work closely to conclude a comprehensive
FTA at the 10th Round of meeting scheduled to be held at
the end of March 2017. But it could not happen because of
the conict between Qatar and several other GCC countries
and the issue is uncertain and not clear when the nal FTA
can be signed [7].
Cooperation in banking and nancial sectors is also
another important aspect in China-GCC relations. GCC
funds in various member states are interested in and actively
invested in major Chinese bank IPOs, including China
Agriculture Bank and the Industrial and Commercial Bank
of China [8]. Chinese construction companies are also
actively engaged in trillion dollar-plus GCC construction
market.
To achieve its goals and objectives, China wants to
maintain; close friendly relations with all GCC countries;
promote multilevel cooperation and friendly relations with
the countries in the region; ensure stable and peaceful
growth and success of modernization process; rise as an
emerging superpower with enhanced power, international
status and inuence. But so far, it has been proved that
China has become more successful in bilateral relations in
dealing with individual GGC member states than those
dealing within institutional frameworks. The following sec-
tions analyze Chinas relations with individual GCC
countries.
3 China-Saudi Relations
Saudi Arabia, with its huge reserve of oil and gas, is not only
the most important country and largest economy in the Gulf
region but in the broader Middle East. Chinas trade rela-
tions with the Kingdom can be traced back to the era of the
ancient Silk Road and later some limited political and eco-
nomic ties were established during the 1930s and 1940s, but
all relations were cut after the communist revolution in
China in 1949. Some unofcial links were reestablished after
1979 even in the absence of diplomatic relations mainly in
three sectors; allowing Chinese Muslims to perform Hajj;
limited Chinese good could enter into Saudi market; and
limited military cooperation when China started providing
Saudi Arabia with long-range missiles [9].
Establishment of formal diplomatic relations in 1990
opened wide opportunities for developing trade and eco-
nomic relations but no visible progress appeared to have
made. Relations developed by leaps and bounds in the new
millennium and soon China became the top trading partner
for Saudi Arabia. Chinese leaders also highly valued their
relations with Saudi Arabia always expressed interests and
readiness to cement then further. By 2013 China became
Saudi Arabias number one trading partner in exports and
remains so. Bilateral trade between the two countries
reached to $69.1 billion in 2014.
Bilateral relations between the two countries were highly
valued and appreciated by top leadership of both the
Chinas Relations with Arab Gulf States 65
countries. During the high-prole visit of Chinese President
Xi Jinping to Saudi Arabia in January 2016 he characterized
China-Saudi relations as As Good Partners for Common
Development[9].
China has four major objectives in its economic relations
with Saudi Arabia; to build a long-term, stable and reliable
partnership in energy sector; to expand trade and investment
in infrastructure building and communication; to engage and
involve in new and strategic sectors of economy with pri-
orities in aerospace, peaceful use of nuclear energy and
renewable energy; to promote and enhance travel and tour-
ism between the two countries mainly the Saudi visitors to
China [5].
China imports about 40% of its domestic consumption of
oil and a major portion it comes from the Arab Gulf states.
Chinas energy consumption is increasing fast to meet its
rapid urbanization, infrastructure building, population
growth and industrialization with all probability these will
continue to grow. Eve with a slowdown of economy, in 2012
China imported 1.88 million barrels of oil per day (mb/d)
from the GCC countries which constituted 35% of its total
imports and out of that 1.08 million barrels were from Saudi
Arabia alone. According to US Energy Administration
forecast, the consumption of oil in China will increase sig-
nicantly from 13.2 million barrels per day (mb/d) in 2020
to 17.5 (mb/d) in 2040 [10].
Saudi Arabia signed hundreds of MoUs, agreements,
protocols and treaties for trade, investment and develop-
mental projects, joint ventures as well as new aspiring sci-
entic projects of national and strategic importance. These
documents are signed and negotiated during the frequent
bilateral visits of top leaders between the two countries
which has become a regular phenomenon. After ascending
the throne, King Abdullah visited China, and this was the
rst visit of a Saudi ruler to China followed by the visits of
President Hu Jintao (2 times) to Riyadh. The historical visit
of President Xi Jinping in January 2016 and the return visit
of King Salman to China in March 2017 further cemented
relations between the two countries.
During the visit of Xi Jinping in 2016, he proposed for
forging a strategic partnership of mutual support and form-
ing synergy between the two states for respective develop-
ment strategies, increase mutual understanding and support
each other on issues relating to respective core interests and
major concerns, and cement political mutual trust[7].
During a response visit of King Faisal to China in March
2017, 21 deals worth of US$65 billion were signed between
the two countries in the elds of energy, culture, education,
and technology. Saudi Basic Industries Corp (SABIC) and
Sinopec agreed to develop petrochemical projects in both
China and Saudi Arabia. Saudi and Chinese companies
signed deals, ranging from exploring investments in oil and
petrochemical plants to e-commerce and co-operation in
renewable energy markets. A MoU between the giant state
oil rm Saudi-Aramco and China North Industries Group
Corporation considering the building of reneries and
chemical plants in China. Another important MoU was
signed by the Kingdom to participate in Chinas Chang E-4
moon mission and partnership agreement for manufacturing
drones [11]. Other important projects are; Saudi-Aramco has
taken a 25% stake in a renery in Fujian and has formed a
joint venture with PetroChina for a 200,000-bpd renery in
the southwestern Chinese province of Yunnan. Saudi
investments also include downstream assets, including a
string of gas stations. Meanwhile, Chinas Sinopec took a
37.5% stake in Saudi Arabias Red Sea Rening Company
(YASREF) in the city of Yanbu [8].
During a recent meeting of Chinese Vice Premier Zhang
Gaoli and Khalid AlFalih, Minister of Energy, Industry and
Mineral Resources of Saudi Arabia, in Saudi-China Forum
held in Jeddah in August 2017, 60 agreements were signed
between the two countries worth of $70 billion which will
cover investment, trade, energy, postal service, communi-
cation and media [12]. It is also not only the one-way trafc
of Chinese investments in Saudi Arabia, but the Kingdom
also aspires to be the biggest investor in the sector of renery
and petrochemicals in the Chinese market. Saudi Arabia is
keen to develop its nuclear energy for peaceful commercial
use particularly to develop water desalination plants, and
signed a MoU with China as early as 2012 to cooperate on
the civilian use of nuclear energy. Recently the Kingdom
launched a renewable energy and other mega projects for
diversifying its economy, as a part of the Vision 2030and
China is in close cooperation in these efforts. Riyadh is in the
early stages of feasibility and design studies to build the rst
two commercial nuclear reactors which will produce
2.8 GW. China National Nuclear Corporation (CNNP) has
recently signed an MoU with the Saudi Geological Survey
(SGS) to promote further cooperation to explore and assess
uranium and thorium resources.
Military and security cooperation between the two part-
ners started as early as in 1985 when Saudi Arabia report-
edly purchased 36 CSS-2 East Wind intermediate range
ballistic and 9 missile launchers from China. Even some
Saudi ofcers were sent to China for training on how to use
Chinese weapons, but all these were kept obscured from the
US. Although economic, trade, investment relations and
Saudi oil exports to China were booming during the last two
decades or so, military and security cooperation lag far
behind as the Arab Gulf states were overwhelmingly
dependent on the West, particularly on the US for their
military and security needs. In contrast to multibillion dollar
security contract with the US, China sold only $700 million
in arms to Saudi Arabia during the period of 20082011
[13]. But recently there seems to have a surge in improving
and expanding military and security relations with China.
66 G. Mostafa
On November 7, 2016 King Salman met Meng Zhinazhu, a
special envoy of Chinese President Xi Jinping, in Riyadh
and signed a ve-year plan for security cooperation in the
elds of counterterrorism cooperation and joint military
drills. Saudi Arabia is intersected in purchasing high tech
and sophisticated Chinese military technology and arms and
China is willing to sell without any political and ideological
strings attached [13].
Nevertheless, a scrutiny will reveal that Chinas military
relations and arms sale to the Kingdom is still very low and
insignicant. There may be several reasons for this slow
growth; First, the GCC countries may not found the Chinese
military technology and arms as most appropriate and suit-
able for their needs and requirements; Second, political
reason; Saudi Arabia is not happy and satised with Chinas
close military ties with Iran and its roles and policies
regarding the crisis in Syria and Yemen; Third, the leader-
ship of the Kingdom may be worried and concerned that a
warm and close military relations with China may anger and
frustrate America, its traditional ally, that may jeopardize its
hope and aspiration in rebuilding the close traditional alli-
ance with US Administration.
Some political observers and experts of the region
express doubt and suspicion that whether the Kingdom is
genuinely interested in building a security and military
alliance with China or these strategic maneuverers are cre-
ated and orchestrated to convince (and use it a trump card)
Washington to get maximum strategic advantage and bene-
ts including the sale of most sophisticated arms to Riyadh.
4 China-UAE Relations
UAE has become one of the most important locations for
exporting and re-exporting of Chinas consumer and man-
ufactured goods and products to the neighboring countries as
well as to Africa. Trade between the two countries increased
from $2.1 billion in 2000 to $24 billion in 2008 and $37.1
billion in 2015, when UAE became the 15th largest importer
of Chinese goods, and Dubai played the crucial role. Trade
between UAE and China increased to $60 billion by the end
of 2016, compared to $54.8 billion in 2015 [14]. China
usually imports oil, natural gas, and chemical products from
the UAE and exports garments, textile fabrics, electronic,
telecommunication equipment and other consumer and
merchandise goods. UAE has become the second largest
trading partner of China among the GCC countries after
Saudi Arabia.
One of the symbols and success story of Chinas trading
culture in Dubai is the establishment of the Dragon Mart
which is the worlds largest Chinese trading center outside
the country. There are more than 5000 stores and about
one-third of them are run by Chinese retailers, and it can
welcome more than 120,000 visitors every day and with its
growing expansion and extension the capacity with certainly
grow further in future. Currently, more than 3000 Chinese
companies operate in Dubai compared to only 18 in 2005.
Similarly, the number of Chinese people living in Dubai
(currently 300,000) are also increasing rapidly [15]. A Dubai
consultancy rm, Falcon Associates, handles strategic ini-
tiatives of the Dubai government, has been tasked with
further strengthening relations with China. They recruit top
Chinese graduates to intern at top Dubai-based companies
and invites leaders from China to visit Dubai. Dubai has
become an attractive vacation destination for many Chinese
tourists, and it attracted more than 300,000 tourists in 2014,
and the number increased to 450,000 in 2015. Thirteen
Chinese cities, including Beijing, Guangzhou, Shanghai and
Shenzhen, as well as Hong Kong and Taipei, are connected
to Dubai with more than 100 weekly ights [16]. The recent
introduction of visa-on-arrival scheme for Chinese citizens
will certainly help to further increase the number of Chinese
visitors into the UAE. Organizing special trade, cultural and
educational events between the two countries have become a
common and regular phenomenon. In 2016 a Dubai Week
in Chinaexhibited in the heart of Beijing. Similarly, China
or Shanghai weekin Dubai are organized on regular basis
as part of cultural events and promotion of people-to-people
understanding [8].
Trade, economic and investment relations between the
two countries are very strong and based on solid founda-
tions. As early as 2008 during the visit of Sheikh Moham-
mad, the Vice President of UAE and Ruler of Dubai, to
Beijing and Shanghai, Emmar signed a MoU with Chinese
government to explore the use and development of property
and infrastructure in Chinese cities. Etisalat signed a similar
treaty with Huawei Technologies for further cooperation
among them. DP World signed an agreement to invest
$1.9 billion in ports at Tianjin and Quanzhou; Chinas Cosco
Shipping Ports invested US$400 million in building a con-
tainer terminal in Abu Dhabi, the capital of the UAE [1].
During a visit to UAE in 2012 Chinese Premier Wen
Jiabao emphasized the need and importance of further
improving and strengthening relations between the two
states and emphasized that China is willing to expand
cooperation with the UAE in trade and exploration of oil and
gas as well as in the eld of developing new energy
resources, with the aim to establish a long-term, stable and
comprehensive energy partnership between the two sides.
Leaders and ofcials from the UAE side expressed similar
views and expressed optimism for further growth and
development of Sino-UAE relations. According to Hani
Rashid Al-Hamli, Secretary-General of the Dubai Economic
Council Transforming Dubai into the biggest destination of
Chinese direct investment in this region is being driven by
directives from the wise leadership to bolster economic
Chinas Relations with Arab Gulf States 67
relations between the two countries and make China a
strategic partner in development projects[14]. In 2016
China Construction Bank, second largest in China terms in
of assets listed a $600 million bond on Nasdaq Dubai. All
major Chinese banks have their branches in Dubai, the
regions largest nancial free zone; Dubai International
Financial Centre (DIFC). Abu Dhabi Department of Eco-
nomic Development, Abu Dhabi Investment Authority
(ADIA), Abu Dhabi National Oil Company (ADNOC), DP
World, Etisalat and others are working with Chinese banks
and companies for joint projects and collaboration that will
further strengthen relations between the two countries [15].
Dubai has become an important nancial center in the
Gulf and Middle East for China because of its growth, sta-
bility, security and importance as trade and nancial hub in
the Arab world. The UAE has become the most important
country in the Middle East in using yuan for direct payments
to China and Hong Kong. In 2015, the Chinese currency was
used for 74% of payments by value from the UAE to China
and Hong Kong on the Swift international transactions net-
work. The UAE center will provide local Chinese rms,
UAE companies and those from other regions with renminbi
liquidity for trade settlement and investment. China wants
the UAE to be included in its Renminbi Qualied Foreign
Institutional Investor scheme with a 50-billion-yuan quota,
allowing the UAE-based institutions to channel offshore
yuan holdings into Chinese securities [4].
All these positive factors and developments will further
cement bilateral ties, economic, trade and investment rela-
tions between the two friendly states. Leaders of the two
countries are eager and interested in improving, expanding
multi-level relations and there are no serious issues of con-
ict and contention in bilateral relations between the two
countries.
5 Kuwait
As mentioned earlier, Kuwait established diplomatic rela-
tions with on March 22, 1971, being the rst Arab Gulf
country to do so and supported Chinas inclusion into the
UN which was highly appreciated by the Chinese leadership.
Traditionally, China was not a major trading partner for
Kuwait like Saudi Arabia and UAE; in 2008 only 4.4% of
Kuwaits exports went to China and 6.8% import items came
from China but that changed rapidly and soon China
became the largest trading partner in Kuwaits imports.
Kuwait-China trade increased from $8.5 billion in 2010 to
more than $10 billion in 2014. A series of high prole
bilateral visits resulted in signing treaties, agreements and
MoUs during the 1980s and 1990s for investment and
cooperation in various sectors of economy. As early as 1977
China and Kuwait signed an agreement on Economic and
Technical Cooperation which was revised and modied in
1989 to reect new developments and changes. A MoU on
military cooperation was signed at Beijing in March 1995
followed by a contract signed in Kuwait in December of the
same year worth of $400 million (Kuwait News, 2009, May
4). During the 1980s China and Kuwait signed three
important agreements; Agreement on Civil Aviation Trans-
portation (1980; Agreement on Cultural Cooperation
(1982),) and Agreement on Sports Cooperation (1992) [5].
In April 2009, Chinas Sinopec signed a $350 million oil
drilling deal with Kuwait Petroleum Corporation (KPC).
Kuwait Investment Authority (Kia) granted a $1 billion
license by Chinas Central Bank in 2012 to invest in its
domestic inter-bank bond market that has a stake in the
Agriculture Bank of China. Chinas foreign exchange reg-
ulator also awarded Kia a fresh quota of $700 million for
direct investment in the Chinese securities market in addition
to the $300 million granted earlier. Ten new agreements and
MoUs were signed to boost cooperation in the areas of
economy, investment, energy, culture, education and civil
aviation during the visit of Kuwaiti Prime Minister Sheikh
Jaber to China in June 2014 [9].
China and Kuwait share similar and identical views on
many major international and regional issues, events and
conicts and support and advocate their peaceful resolutions
through dialogue and negotiations. During the Gulf Crisis in
1990 when Iraq invaded Kuwait, China strongly opposed the
move and demanded that Iraq should withdraw its troops
from Kuwait and restore and respect its independence,
sovereignty and territorial integrity. On the other hand,
Kuwait recognizes and strictly follow the One China Pol-
icyin all diplomatic forums and activities.
Kuwait is interested in expanding and promoting relations
with China at multilevel, particularly in trade, investments,
travel and tourism, and keeping that in mind Kuwait opened
Consulate General ofces in various citiesGuangzhou and
Shanghaias well as in Hong Kong in addition to the main
Embassy in Beijing.
6 Qatar-China Relations
When Qatar achieved full independence from the United
Kingdom on September 3, 1971, China sent an ofcial
congratulation and expressed interests in developing rela-
tions between the two states but there was no response and
full diplomatic relations were established only in 1988.
Bilateral trade between China and Qatar increased by tree
times between 2008 and 2013 to $11.5 billion and that was
further increased to over $19 billion in 2015 [16].
Qatar is the largest natural gas supplier to China that
meets about 22% of its energy needs. In 2008 the China
National Offshore Oil Company (CNOOC) signed a 25-year
68 G. Mostafa
deal with Qatar for the annual supply of 2 million tons of
liqueed natural gas (LNG) starting from 2009. PetroChina
also signed a separate 25-year deal with Doha to purchase
three million tons of LNG per year [17]. Thus, Qatar became
Chinas second largest supplier of gas after Australia. In
2014 China signed agreements to participate in building $8
billion worth of infrastructure projects that include civil
construction works, road building, bridges, ports, telecom-
munications railways and building a new stadium for the
World Cup in 2022. Chinas direct investment in Qatar has
also increased rapidly; a 77.5% increase in 2015 compared
to 2014.
One of the most signicant developments took place in
nancial cooperation sector when China established a ren-
minbi clearing center in Qatar in April 2015; the rst in the
Middle East. The main objective was to offer nancial
institutions access to Chinese renminbi and foreign exchange
markets. The new center benets Qatar in strengthening its
links with China and bolster its image as regional nancial
center [18]. The Industrial and Commercial Bank of China
launched its rst Middle Eastern Chinese yuan-clearing
center in Qatar and the aim was to expand trade and
investment between Beijing, Doha, and the region. China
decided to establish the clearing center in Qatar not by
accident; at that time Doha had about $43 billion in net
foreign currency reserve and $200 billion in foreign assets in
its sovereign fund. Qatar National Bank raised a $1 billion
loan in the Asia bank market where the Agricultural Bank of
China had a leading role [19].
China-Qatar relations is not only one-way ties, Qatar is
also actively investing in China which is growing rapidly. In
2014 Qatars Sovereign Wealth Fund (QSWF) paid Hong
Kong $4.78 billion to secure 20% stake of Sogo department
store operator Lifestyle International Holdings. The Fund is
actively investing in banking and nancial sectors and
already bought a 22% stake in Citic Capital Holdings, one of
Chinas top investment funds.
The recent conict between Qatar and three of its fellow
GCC members (Saudi Arabia, UAE and Bahrain) and Egypt
made China worried and concerned about its future relations
with the Arab Gulf states (Wintour, 2017, June 5) although
policy differences and tension between Qatar and its Arab
neighbors are not new. As mentioned earlier, China has been
negotiating a free trade agreement with the GCC countries
since 2004 and a signicant progress is made but the rift
between Qatar and three other GCC members will certainly
make the process delayed and more complicated [20].
Chinese policy on this matter is neutral and
non-involvement, and Beijing considers it as an inter-GCC
problem that must be resolved diplomatically, and it does not
want to interfere and become involved into it although it is a
matter of concern and irritation because until the issue is
resolved there will be no progress in the FTA project
between China and the GCC countries.
7 Qatar-China Relations
China-Oman relations demonstrate Chinas opening to the
world and a new pragmatic change in its foreign policy
perceptions and orientations by moving away from its old
political, ideological supports to Marxist-Leninist rebels.
Contemporary Sino-Omani relations emerged out of some
mistrust, distrust and hostility during the period of domestic
unrest of an armed uprising in Omans southern Dhofar
Province in the 1960s. China provided moral, diplomatic,
nancial and military assistance to the rebels by providing
military training and deploying advisers to ght alongside
the rebels in the region. Despite these inauspicious begin-
nings, Oman established diplomatic relations in 1978.
Trade between the two countries increased from $10
billion in 2010 to $24 billion in 2014. Oman started
exporting oil to China as soon as Beijing started importing it
after 1993 and soon assumed the leading position. By 1997
China became the third largest recipient of Omani oil that
represented an estimated ten percent of Chinas total oil
imports [21].
China-Oman contacts date back to ancient Maritime Silk
Route that linked Asia with Europe. The two countries are
eager now to revive and further develop and expand these
links under the auspices of Chinas new 21st century project
of Maritime Silk Road (OBOR). Oman is an important
country for China as it is in the southeastern Arabian
Peninsula close to the Strait of Hormuz, the vital maritime
artery between the Arabian Gulf, Gulf of Oman, and the
Arabia Sea and wider Indian Ocean, and about 40% of the
worlds seaborne oil crosses this Strait.
China wants to get benet from Omans development and
expansion of infrastructure building; road and railway that
will integrate Sohar Port and Freezone to existing Omani and
GCC transportation corridors and further extending into the
UAE and Saudi Arabia [22], AIIB provided $300 million to
Oman to expand its Duqm port and to start the Sultanates
rst railway system. Ultimately, these transportation net-
works system will provide Oman a competitive advantage
over others to establish logistical and transportation hubs in
the region.
Despite all these positive and important factors Chinas
relations with Oman are somehow overlooked or did not get
proper attention. However, in recent years, contacts between
these two countries are expanded and diversied beyond the
energy sector, yielding notable developments on the diplo-
matic, military, and economic fronts. Peoples Liberation
Army Navy (PLAN) warships engaging in anti-piracy
Chinas Relations with Arab Gulf States 69
operations in the Gulf of Aden made over 20 port calls to
Omans Port Salalah for replenishment and supply, testa-
ment [23].
Oman has long charted and followed an independent
foreign policy based on the principles of neutrality, prag-
matism, moderation, non-involvement, negotiation and
compromise, and to maintain good and friendly relations
with all countries. Oman is the only Arab Gulf country that
maintains cordial diplomatic ties, robust social, economic
relations and holds regular military exercises with Iran
which has drawn the ire of most GCC countries but gets full
supports of China as Beijing also maintains a robust eco-
nomic, trade and military relations with Tehran.
Chinas relations with Bahrain started late as in the cases
of many Arab states and China never forged to have ofcial
ties with Manama mainly because of Cold War politics,
ideological and other military and security issues and con-
siderations. Bahrain formally established diplomatic rela-
tions late in 1989 and since then the two countries developed
modest but growing economic, trade and investment rela-
tions. According to Bahrain Chamber of Commerce and
Industry the total trade between China and Bahrain (imports,
exports and re-exports) was about $1.22 billion in 2015. The
relations boosted after the high-level visit of King Hamad
bin Isa al-Khalifa to China in 2013 when several important
agreements were signed on trade and investments [24].
To improve and strengthen economic, trade and invest-
ment ties, the rst China-Bahraini Committee for Economic,
Trade and Technological Cooperation was founded in 1990.
Several other important Forums and Councils were also
formed later. For example, the Bahrain-China Joint Invest-
ment Forum (BCJIF) was formed in 2010, co-organized by
the China Council for Promotion of International Trade
(CCPIT). Bahrain Chamber of Commerce and Industry
(BCCI) was created to promote trade and business with other
countries including China. The BCJIF seeks to promote
investment initiatives and advantages between the two
countries by identifying opportunities to enhance nancial
cooperation in nance, real estate and banking, and to open
new prospects about mutual advantage.
Bahrains trade with China is nominal but increasing
rapidly. On September 13, 2013, the trade volume between
Beijing and Manama reached more than $1.5 billion, which
exceeded US$1.22 billion in 2015, and the forecast is for
further growth [25].
China showed growing interests in investing in several of
Bahrains major construction and infrastructure projects. In
January 2014, Chinese construction companies signed
agreements with the Bahraini government to build 40,000
new residential units across the country. The same year,
Bahraini government announced a plan to open a vast,
China-themed mall like that of the Dragon Mart in Dubai
and calls it Dragon City. Bahrain also maintains close
cultural and educational ties with China. Chinese Govern-
ment provides regular scholarships and funding for Bahraini
students to study in higher educational institutions in China.
Another important aspect of China-Bahrain relation is
Beijings strong support for Bahrains sovereignty, territorial
integrity, stability and peace and Chinas position largely
corresponds to that of the Bahraini and Saudi ones. China
conveyed a message to Iran that it would not support any
instability in the Gulf, a stance that was highly appreciated
by Bahrain [18]. Despite the fact of Chinas declared support
of Bahrains independence and territorial integrity, Manama
is suspicious and concerned about the real Chinese role and
motivation because of its close and robust relations with
Shiite Iran that, Bahrain believes, is meddling and interfering
into its domestic affairs and fueling the tension and conict
by using and escalating the sectarian issue and supporting
the Shiia community who are ghting against the Sunni
Government.
8 Conclusion
A scrutiny of Chinas relations with the Arab Gulf states
demonstrates that Beijing has developed multilevel and
multidimensional relations with all of them without excep-
tion but at a different space and limit. Trade, investment and
nancial relations are developed much quicker and faster
with oil-rich, economically strong and more powerful Arab
states like, Saudi Arabia, UAE, Qatar and Kuwait than those
of othersOman and Bahrain. Another observation can be
drawn that relationships between China and individual GCC
member states grew faster and more rapidly than those at
institutional levels. Dozens of bilateral treaties, agreements
and MoUs worth of hundreds of billions of US dollars are
signed for cooperation in the elds agriculture, trade,
investment, oil sector, infrastructure building, railway, roads,
bridges and ports, telecommunication as well as in the new
sectors of economy like, aerospace, nuclear energy, devel-
oping alternative energy and diversication of economy.
Although Chinas military cooperation and arm sales to the
region is insignicant, it is gradually picking up and coun-
tries like Saudi Arabia, UAE, Kuwait and Oman are showing
interests and cooperating in this sector [13].
As mentioned earlier, ambitious, well organized and well
planned multilateral organizations and institutions were
created for stable and sustainable growth of relations
between the two dynamic regions of the emerging world.
The China-Arab Cooperation Forum established in 2004 was
supposed to be used as a forum for GCC countries to interact
and deal with China, especially on political and strategic
issues. It had several meetings but failed to achieve fruitful
results and remains as an inactive and dysfunctional body.
Similarly, the Free Trade Agreement (FTA) between GCC
70 G. Mostafa
and China was another high ambitious project for institu-
tional cooperation to boost and expediate trade, investment
and other economic ties but it also failed to achieve the
desired goals because intra-GCC conict [26].
There are number of issues and challenges behind the
lack of success through institutional framework; First, even
though GCC is functioning for more than 35 years, institu-
tions, negotiating, consensus building process and mecha-
nisms are still weak or absent. Often it has been suffering
from internal squabbles, tress, tensions and conicts and
failed to create a cohesive, integrated, strong institutional
framework, so that external countries can deal with it as a
single entity. Second, China has also failed (or did not try) to
build a positive image about its people, culture and society
to the Gulf states rather, for them, maintaining and growing
state-to-state relations is good enough for diplomacy and
trade.
There are both objective and subjective factors and con-
ditions for further growth and expansion of Chinas relations
with Arab Gulf states. China has a modern foreign policy of
growth, peaceful rise and going outfor its market needs
and exports. The Gulf states, on the other hand, want to
diversify and reorient their foreign policies and want to
look towards eastmainly as a response to the
pressure/criticism by their Western allies, particularly the
USA. But whether these are the sings for a long-term alli-
ance building or just a marriage of convenience is yet to be
seen in future.
China, as an emerging superpower depending and
deploying Soft Powerstrategy, wants to emerge as a
trusted, inuential, powerful strategic partner to the countries
in the region, reduce the US domination and inuence there
not by going into confrontation rather by working with its
allies in the region. China intends to play effective and
meaningful roles as a peace-maker and peace-broker to
resolve the local and regional conicts where others failed.
The Arab Gulf states understand, recognize and support
Chinas goals and ambitions in the region knowing fully of
Beijings own constraints and limitations.
References
1. Mei, Z.: Chinas Interests in the Gulf-Beyond Economic Relations,
Perspectives 004. Middle East Institute, Singapore (2009)
2. Lirong, M.A.: The one belt, one roadstrategy and the 321
cooperation mode between China and GCC. J. Sino-W. Commun.
7(1). Middle East Studies Institute, Shanghai International Studies
University, Shanghai, China (June 2015)
3. Bailey, R.: China and GCC: growing ties: is China set to become
the GCCs most important economic partner by 2020? And what
does this mean for the region? Gulf Business, Tuesday, 16 Apr
2013
4. Khaleej Times: Increased Yuan usage will catalyze GCC-China
trade. Retrieved 28 Aug 2017 from https://www.khaleejtimes.com/
business/increased-yuan-usage-will-catalyse-gcc-china-trade,5
Nov 2016
5. Niazi, K.: Kuwait looks towards the East: relations with China.
Middle East Institute. Retrieved 25 Sept 2017 from http://www.
mei.edu/content/kuwait-looks-towards-east-relations-china (2009)
6. Cheng, J.Y.S.: Chinas Relations with the Gulf Cooperation
Council States: Multilevel
7. Jinping, X.: Chinas President Xi visits Saudi Arabia to improve
ties, from https://www.bbc.com/news/world-middle-east-35351391
(2016)
8. Molavi, A.: Saudi-China the supply heavyweight meets the
demand heavyweight. The New Silk Road Minito. Retrieved 10
Aug 2017 from http://newsilkroadmonitor.com/china-and-the-gcc-
states-a-turbo-charged-trade-relationship/ (2015)
9. Al-Tamimi, N.: China-Saudi Arabia Relations, 19922012: Mar-
riage of Convenience or Strategic Alliance? Routledge, London
2(1), 1532 (2013)
10. U.S. Energy Information Administration: Annual Energy Outlook
2013, p. 159
11. Blanchard, B.: China, Saudi Arabia eye $65 billion in deals as king
visits. Retrieved on 12 Mar 2017 from http://www.reuters.com/
article/us-saudi-asia-china-idUSKBN16N0G9?il = 0 (2017)
12. Gao, C.: Closer ties: China and Saudi Arabia sign $70 billion in
new deals: China says its bilateral relations with Saudi Arabia have
entered a new era, Diploma. Retrieved 17 Sept 2017 from http://
thediplomat.com/2017/08/closer-ties-china-and-saudi-arabia-sign-
70-billion-in-new-deals/ (2017)
13. Ramani, S.: China and Saudi Arabias burgeoning defense ties:
tensions in the U.S.-Saudi alliance have China poised to expand its
defense ties with Riyadh. Retrieved 18 Sept 2017 from http://
thediplomat.com/2016/11/china-and-saudi-arabias-burgeoning-
defense-ties/ (2016)
14. China Daily: Retrieved 3 Sept 2017 from http://www.chinadaily.
com.cn/business/2016-12/, 12 Dec 2016
15. Al-Fil, G.: UAE China relations to see strong growth in 2017,
Trends. Retrieved 8 Oct 2017 from https://trendsmena.com/global/
oriental-march, 13 Mar 2017
16. Global Edge: Retrieved 5 Oct 2017 from https://globaledge.msu.
edu/countries/qatar/tradestats (2016)
17. Qatar-China signs 25-year gas deal, Peninsula (Doha), 8 Mar 2009
18. Rakhmat, M.Z.: China, Qatar and RMB internationalization: with
a new renminbi clearing center, Beijing takes an important step
forward. Retrieved 10 Sept 2017 from http://thediplomat.com/
2015/06/china-qatar-and-rmb-internationalization, 6 June 2015
19. Hollingsworth, J.: Why Qatar matters to China, in spite of Gulf
isolation, South China monitoring post. Retrieved 15 Sept 2017 from
http://www.scmp.com/news/china/diplomacy-defence/article/
2097206/why-qatar-matters-china-spite-gulf-isolation, 7 June 2017
20. South China Monitoring Post: Gulf split: Qatar isolated after seven
countries cut diplomatic ties over accusations of support for
extremists. Retrieved 21 Sept 2017 from http://www.scmp.com/
news/world/middle-east/article/2096889/gulf-split-qatar-isolated-
after-seven-countries-cut, 5 June 2017
21. Muscat daily: Retrieved 10 Sept 2017 from http://www.muscatdaily.
com/Archive/Business/Oman-s-oil-production-reaches-990-030-
bpd-in-September-4czb, 14 Oct 2015
22. Zambelis, C.: China and the quiet kingdom: as assessment of
China-Oman relations. China Brief 15(22) (2015)
Chinas Relations with Arab Gulf States 71
23. Kostecka, D.: The Chinese navys emerging support network
in the Indian Ocean. China Brief 10(15). Retrieved 23 Sept 2017
from https://mg.mail.yahoo.com/d/compose/6167472330 (22 July
2010)
24. Bahrain Chamber of Commerce and Industries: Retrieved 28 Sept
2017 from http://www.bcci.bh/sites/default/les/library/Bah-China
%20Executive%20Report%2020
25. Bahrain News Agency: Retrieved 2 Oct 2017 from http://www.
bna.bh/portal/en/news/724865 (28 Apr 2016)
26. China FTA Network. Retrieved 5 Oct 2017 from http://fta.
mofcom.gov.cn/enarticle/engcc/engccnews/201612/33922_1.html
(2016)
72 G. Mostafa
Citizen-Centric Approach in Delivery
of Smart Government Services
Ayman Ahmad Obedait, Mohamed Youssef, and Nikolina Ljepava
Abstract
Urban centers and cities across the world are increasing.
As per Population Reference Bureau, 70% of world
population will live in cities by 2050. This will lead to
increasing pressure on city resources, congestion, water
and sanitation problems and many other challenges.
Governments across nations realize this and are working
towards making cities Smarter and governance citizen
centric which will help to improve the quality of life of
city residents and deliver government services in the most
efcient manner. This paper provides a detailed literature
review of the existing research on Smart Cities and citizen
centric governance. First the role ICT plays in governance
is explained and the key trends in ICT which are affecting
governance explored. Moreover, the denitions of Smart
City are provided, along with an explanation of various
dimensions in a Smart City and capabilities required to
implement Smart City initiatives. The paper also provides
an overview of the key benets derived once a city
transitions to a Smart City. Various challenges faced in
delivering citizen centric governance has been reviewed
and a case has been made on how Smart
governance/e-governance can address these challenged.
Additionally, the state of Smart City implementation in
Dubai and UAE has been reviewed. The paper is
concluded by providing an overview of the various ways
in which customer centricity can be embedded into
Governance through the application of technology.
Keywords
Smart city Smart city dimensions Smart city
capabilities Governance Citizen-centric
ICT Technology
1 Introduction
Newtonian physics suggests that the biggest task is con-
verting potential energy into a useful reality. Today, we are
faced with a similar issue wherein the biggest task at hand is
to harness the latent potential in technology to simplify the
life of citizens and improve quality of life rather than com-
plicate it by providing them more tools and processes to
follow. The spectacle of new trends and technologies and
latest breakthroughs is unyielding and is telling on many
fronts. The list of technology of the future is ever increasing,
and technology has become the inseparable part of everyday
life; yet, only few technologies have the potential and ability
to alter ones way of living. However, organizations cannot
wait till the efcacy of each of these are proven before
developing solutions and implementing in their organization
as they would be left behind the curve.
Technology impacts the daily lives of people, in their
homes, ofces and while interacting with the government.
Today with Mobile, internet, social media, video confer-
encing tools and mobile apps, communication has become
smooth, quick and easy. These tools have been used to
spread knowledge, education and awareness which has led
to multifold changes. Knowledge in one country has spread
to another leading to quickening of development. Awareness
about rights has led to human right movements across the
globe. Quality education has made available in remote pla-
ces through the use of internet. Governments have utilized
technology to improve lives of citizens and provide better
services. For e.g. a lot of information about government
benets and services is provided on website, appointments
can be booked on internet and grievances can be addressed
A. A. Obedait (&)
RTA, Dubai, United Arab Emirates
e-mail: Ayman.obeidat@gmail.com
M. Youssef N. Ljepava
American University in the Emirates, Dubai,
United Arab Emirates
e-mail: mohamed.youssef@aue.ae
N. Ljepava
e-mail: nikolina.ljepava@aue.ae
©Springer Nature Switzerland AG 2019
A. Al-Masri and K. Curran (eds.), Smart Technologies and Innovation for a Sustainable Future,
Advances in Science, Technology & Innovation, https://doi.org/10.1007/978-3-030-01659-3_10
73
through video conferencing. This has led to reduction in the
time and effort required to access government services by
citizens and at the same time reduces the transaction cost for
the governments.
2 ICT and Its Role in the Society
Information and Communication Technology (ICT) has
advanced at a rapid pace over the last ten years, more so
recently in the streams of data analytics, cloud computing,
core system transformation, digital technology and the
ever-evolving role of IT within the enterprise [1]. The goal
of implementing these technologies in business and gov-
ernment sectors has been to either improve overall customer
experience, operational efciency or both [2]. ICT has had
far-reaching benets beyond the ones mentioned earlier,
however they would need to satiate a few hygiene factors
before they could revolutionize the world:
1. Mass adoptionICTs are vectors of social and economic
transformation globally [3]. By enhancing the overall
connectivity and altering the way people communicate
with each other and with organizations, ICT would
transform the world. However, this transformation would
require a mass and systematic adoption of technology;
else, it would remain as pocketed initiatives with no
tangible impact to the society. Per McKinsey et al. [4],
2013 there is a strong correlation between the adoption of
ICT and the country overall economic and social
indicators.
2. Pervasive ubiquityWhile technology is expanding
around globally at a pace swifter than ever before, it still
has not had the reach required to meet the global need,
despite efforts by several initiatives such as internet.org
by Facebook. Internet.org is a partnership between
Facebook and six companies (Samsung, Ericsson, Med-
iaTek, Opera Software, Nokia and Qualcomm) that aims
to make internet accessible to people in developing and
least developed countries by increasing efciency and
facilitating development of new business models. There
still is a huge digital divide that exists between devel-
oping countries and developed countries in terms of the
reach of ICT, which undermines the efforts of digitally
prone organizations. Highly populated regions of the
world such as India, China, Indonesia, Brazil, Pakistan
and Nigeria are still evolving their readiness for ICT
revolution and are yet to fully harness the capabilities of
ICT. This is reected from their rankings in the Network
Readiness Index, 2015 wherein according to the Global
Information Technology Report all of them are ranked
lower than 55 (China59, India91, Indonesia73,
Brazil72, Pakistan110 and Nigeria119) in a list of
139 countries. Network Readiness Index framework
assesses a country on six principles to evaluate a coun-
trys capability to utilize ICT for benet of the people.
If channeled properly, ICT has the capability to create
new economic opportunities and help nurture better political
and social inclusion, which would ultimately lead to the
overall uplift of the society. ICT supports and fosters
entrepreneurship and provides new tools to the organizations
that help improve overall levels of productivity and ef-
ciency [5]. More importantly, this enables and provides
better access to the wider population to essential services,
education and nancial services, which also acts as a direct
channel for an uninterrupted interaction between the
Government and its citizens. This improved presence of the
Government leads to efcient public administration [6], and
improves the participation of the citizens in policy making
and decision making through open data initiatives.
Top trends in ICT
The following top trends in information and communication
technology that have the potential to alter the future and
strongly inuence the quality of life and the citizens
well-being have been identied:
1. Internet of Things (IOT)Internet of Things which
means inter-linking of physical devices, buildings and
other electronic items which enables these objects to
collect and exchange data, which can be used to provide
a seamless, connected experience to the user. It has
multiple potential applications across various industries
including the public sectorsmart cities, smart gover-
nance, military etc. have been capitalizing on the benets
of connected things. This technology could prove to be
transformative once the potential of data is converted into
actionable insights [7].
2. Augmented Reality (AR) and Virtual Reality (VR)AR
and VR have been adopted effectively by the retail and
real estate industry and is gradually pervading through
other allied industries. This has the potential to redene
business processes in the government [8], the roles and
responsibilities of eld workers, improve the way we
communicate with citizens and reform the training
environments.
3. Big datarefers to data sets that are large, complex and
require advanced processing software to utilize them. Big
data have applications in predictive analytics and user
behavior analytics which can be used to predict diseases,
crime, business trends etc. The public sector has been
using and harnessing data for enabling better decision
74 A. A. Obedait et al.
and policy making to help reduce the cost of governance
and improve overall citizen happiness [9]. However, with
the ability to capture data at multiple touch points from
all citizens and the capability to churn the data has pro-
vided the government a remarkable opportunity to
transform large scale data resulting in scalable and
repeatable revolutionary results.
4. BlockchainBlockchain uses cryptography (like Bit-
coin) in order to store and verify data in a safe and secure
environment as part of shared ledgers. This technology
has the potential to redene how transactions are con-
ducted between governments and citizensincluding but
not limited to licensing, contracting and payments [10].
While, the adoption of this technology is fairly in its
nascent stages, it needs to be adopted fairly soon and
harnessed in order to reap the cost benets of this
technology.
5. Articial intelligence (AI)AI has the potential to help
improve overall customer satisfaction and help reduce
costs through continuous machine learning [11] that
would enable governments to provide better and con-
sistent service by studying citizen behavior and transac-
tions continually.
3 Smart CitiesThe Role of ICT in Smart
Cities
3.1 Definition of Smart Cities
Smart Cities have been dened in various manner by
researchers covering the aspects of IT education and
infrastructure [12], economy and mobility [9], quality of life
and management of natural resources [13]. It can be argued
that a city can be classied as smartwhen the Government
and organizations invest in social and human capital,
infrastructure and disruptive technologies which helps foster
sustainable economic growth and improve the overall quality
of life, through contributory and inclusive governance with a
prudent management of all resources. The key goals of a
Smart City are economic growth, quality of life and eco-
logical footprint which is aligned to the concept of triple
bottom line [2].
3.2 Key Dimensions of Smart Cities
Based on the denition above, and the literature ndings the
author considers ve key dimensions to a Smart City
economy, people, governance, mobility, environment lead-
ing to better quality of life:
1. EconomyThis dimension covers the aspects of pro-
ductivity, entrepreneurship, innovation and industrial
coverage [14]. This is one of the key dimensions as it
would ensure employment and overall growth in
infrastructure.
2. PeopleThey form the fundamental basis to any Smart
City as contributors to growth and consumers of the
services. The key features of this dimension are afnity to
learning, qualication, skills, creativity and open mind-
edness [15].
3. GovernanceGovernance forms the outer
all-encompassing layer of a Smart City covering the
aspects of regulation and enablement of decision-making
through participation of all stakeholders [10].
4. MobilityThis is the key enabler and forms the back-
bone of the city providing easy accessibility to amenities
and services. This covers communication, smart and
sustainable infrastructure, local and national accessibility
[15,16].
5. EnvironmentSusceptibility to natural resources is a
major factor that needs to be managed, by harnessing
non-conventional sources of energy. Overall environ-
mental protection is key to the success of Smart City and
pollution is a major deterrent that needs address [17].
4 Smart CitiesThe Role of ICT in Smart
Cities
4.1 Challenges Associated with Implementation
of Smart Governance
A cornerstone of Smart Cities is Smart Governance, which
includes involvement of various stakeholders (especially
citizens) engagement in decision making and public ser-
vices. ICT infrastructure is utmost important to implement
Smart Governance, it helps to bring various stakeholders
together and implement a smooth and transparent process
[18]. But, implementation of Smart Governance faces below
challenges:
1. Data security in a digital environment The main char-
acteristic of a Smart City is the amount of data that is
generated, stored and harvested. While the objective and
intent of data gathering by connecting objects and people
is positive, there is a risk of it being used by businesses
and individual with malicious and selsh motives [13,
18].
2. Inclusiveness and social cohesionAccording to
Hoevenaars [19], the issues related to inclusiveness and
social cohesion are one of the biggest challenges that
Citizen-Centric Approach in Delivery of Smart Government Services 75
might be faced by governments. While smart technolo-
gies can bring people together and create social cohesion,
there is a major risk on the lack of digital savviness
amongst the citizens, leading to a lower adoption of these
new technologies. Businesses and citizen communities
need to be made more responsible to address this social
problem through improved education and awareness.
3. Disruption of labor market owing to automationThe
labor market will be transformed drastically as a result of
automation. Robotics and AI leading to an increase in the
unemployment rates and requiring people to be retrained
on new skills, which would be relevant for the new
markets, will replace many traditional jobs. The key
challenge for the city would be to smoothen and expedite
this transition while ensuring that there is no impact on
employment and other key social indicators [8,16].
4. Need for talentThis is very closely related to the
challenge on the disruption to the labor market, however,
it covers the other aspect of the disruption, wherein, the
city would need to attract and retain the relevant
resources with a creative and technological bent of mind.
5. Reliability of infrastructureSmart cities are notorious
for creating single points of failure due to the increased
dependency on digital technologies. If critical digital
infrastructure fails or is attacked, then there is a risk of
the city coming to a standstill. The challenge is to make
the entire system and infrastructure resilient to such
threats [20].
4.2 Governance and Its Challenges
Governance refers to the incentives, arrangements for
accountability, rules and regulations that affect the way key
agencies in government including politicians and other
constitutional bodies interact with citizens to deliver public
services. Governance also includes the ways in which ser-
vice providers could be held accountable for their efciency
and responsiveness in providing the services. Considering
this, governance in a nutshell is a set of principle-agent
relations dened by the rules, regulations, accountability
mechanisms and incentives to act in a certain way.
Governance involves interactions between multiple
stakeholders: First interaction is between government, politi-
cians and citizens. The quality and depth of this interaction
depends largely on the strength of government institutions,
rules, regulations and monetary motivation arrangements.
Civil service organization, policies for HR management,
resource allocations, public nancial probity and information
availability also affects the interaction in a big way. Second
interactions of citizens and policy makers take place through
channels for expressing voice, including votes, taxes, and
representation in parliament and other political bodies. Third
interaction is between citizens and actual service providers or
the government organizations. Citizens can improve this
interaction by proactively participating and assuming key
responsibilities in actual service delivery. They can also be a
key part of feedback mechanism and institutionalizing favor-
able changes by putting social pressures.
According to Wild et al. [21], four common constraints
have been found which leads to dysfunctions in the three
interactions and ineffective public service delivery:
Imperfection in politician citizen interactions
Those are the imperfections resulting from disturbances in
the interactions between government and politicians and
common citizens. Three types of imperfections in
politician-citizen interactions are possible:
1. Reduced trust due to low credibility of the promises
made by politicians.
2. Limited information availability with citizens about
politiciansperformance.
3. Social fragmentation among citizens that can take form
of identity politics.
For example, in Malawi, entrenched state parties have
been using state resources for political gains. Water
resources have been given to ruling party aligned groups
who have used them in an unsustainable manner for
short-term gains, rather than using it for the larger benetof
population. Similar is the case with Nepal, where parties
compete to gain access to state resources and provide dismal
services [13]. The presence and extent of imperfect infor-
mation can have multitude effects on the quality of service
delivery outcomes, and this will affect government agencys
incentives to improve these services in different ways. Thus,
access to information and the ability of the populace to
understand it is critical [13].
Policy incoherence
This constraint relates to the poor coordination and capability
gaps between design of policies, thought process on imple-
mentation, structure of policy and roles to be played by
different stakeholders in governance leading to poor imple-
mentation. There are two types of policy incoherence
HorizontalNon-exclusive roles/duties and unclear respon-
sibilities among co-providers and other public bodies and
Verticalno capability with the implementation agencies.
76 A. A. Obedait et al.
For example, in the Kenyan water sector, coordination
was reportedly very weak, with 11 ministries sharing some
responsibility for water [22]. They neither had coordination
amongst the 11 ministries nor capability (vertical
incoherence).
Inefciencies in monitoring performance
This is present in cases where regularized formal processes
for project management, monitoring and supervision are
poorly enforced and usually not followed. Informal pro-
cesses though exists are not sufcient for proper execution of
project. This can take two formstop down and bottom
up. Lack of performance oversight can result in dissatis-
faction leading to users opting out of the government pro-
vided services [18].
For example, in Uganda formal processes for monitoring
and supervision were not followed across the chain of
responsibilities in the health sector [23]. This mean that
health units and staff have not been subjected to active
oversight, leading to public facilities often being closed and
high level of absenteeism amongst the health centre staff,
diversion of funds leading to shortages of public medical
supplies and essential equipment.
Collective action challenges and Moral Hazard
Collective action from citizens is essential to enforce
accountability amongst public service provider. However, it
is not always possible to organize collective actions that
would lead to decrease in inefciencies in governance. Even
if, citizen groups are formed, it is not necessary that they act
in the interest of the collective group although individual
members may benet on achievement of group objectives.
This is particularly relevant in the case of delivery of citizen
services, which often need participation from multiple
stakeholdersservice providers, local authorities and
citizens.
Moral Hazard refers to the cases in which public services
providers are protected irrespective of their efciency in
delivering citizen services [6]. This can result in a wide
variety of dysfunctional behaviours on the part of those
actors insulated from the risks associated with their decisions
(whether they be a part of the state, service users or service
providers), such as an unwillingness to put the sector on a
sustainable nancial footing (whether through user fees or,
in the case of public providers, through raising sufcient
own revenues) or to invest resources that are available.
Where such dynamics are prevalent, service delivery is
likely to continue to be short term oriented and dismal.
GCC countries have faced all constraints identied above
at some time in the past. For countries in the GCC such as
UAE, the foremost challenge in delivering government ser-
vices lies in the characteristics of the country demographics.
Population is an amalgamation of different nationalities with
dynamic and often changing expatriate population, which
accounts for 88% of the total UAE population, a large per-
centage of which is young. Countries in GCC face multitude
society related challenges as well due to increasing share of
foreign nationals, demand from populace for participation in
governance and environmental pressure [24].
4.3 How Do E-Governance and Smart
Governance Help Overcome These
Challenges?
Governments have been using technology to improve ef-
ciency and productivity for long time. For example, gov-
ernment in South Korea used computerization in the 80s and
90s to save information and data related to the Government.
However, this use of technology in governance has evolved
especially with the rapid development of ICTs.
E-governance is very fundamentally the use of information
technology to help deliver government services in an ef-
cient manner thereby enabling a good citizen experience.
As can be seen historically and from the example of
South Korea, e-government has been evolving through
various stages. Several models have been dened by
researchers to explain these stages of e-governance:
1. Hillersve stage model which starts from emerging web
presence and evolves to a fully integrated web presence
[22].
2. United Nations and American Society for Public
Administration describe the stages from emerging pres-
ence to seamless and fully integrated presence.
3. Layne and Lee [25] have a four-stage model which
begins from cataloguing to transactions to vertical and
horizontal integration across various government entities
and services and customer interaction channels.
4. Moon [26] proposed a model with ve stages from
information distribution to integrated political
participation.
These models can be further summarized into a ve-stage
model which is an amalgamation of these models given that
all the models are based on similar principles:
1. Digital presenceThis is a one-way communication to
merely provide information to the citizens through digital
channels.
2. CommunicationThis is a two-way communication
between the citizens and the Government, where the
Citizen-Centric Approach in Delivery of Smart Government Services 77
citizens and Governments can ask each other specic
questions.
3. TransactionIn this stage, the citizens can transact and
utilize Government services.
4. TransformationIn this stage there is complete integra-
tion of all Government institutions allowing citizens to
transparently interact and transact with all Government
agencies.
5. Smart GovernanceIntegration of information, com-
munication with citizens, organizations and government
agencies (G2C, G2B, G2G) [25] and deploy technologies
to plan and operate across all government agencies,
processes to help foster sustainable living [22].
In effect, based on the provided literature ndings, it can
be assumed that Smart Governance is the evolutionary nal
stage of e-governance. The drivers and elements for Smart
Governance are same as that dened by the author earlier in
the review, implying that Smart governance is the funda-
mental basis for the development of Smart Cities.
5 UAE and Smart Governance
Through its vision 2021, UAE wants to become a pioneer
and leader in providing best in class citizen services utilizing
technology. A strong effort has been made in order to
achieve this objective.
The challenge of delivering government services lies to
large part in the demographics of the country which is an
amalgamation of locals and non-residents, expatriate work-
ers from other countries. A large portion of the population is
consisted of younger generational cohort, individuals who
have come to UAE for work from other countries world-
wide. This social and age diversity complicates the provision
of governance and thus it is important that services are
provided in a way which easy to understand and navigate for
both locals and non-locals.
UAE has prepared an e-government strategic framework
which lists down the initiatives planned over a period of time
to improve governance. The framework leads to:
UAE Vision 2021making UAE one of the best coun-
tries in the world.
UAE Government Strategyput citizens rst, account-
able and innovative government.
E-Governance has been in the agenda of UAE since the
beginning of new century. The transformation towards
e-governance started with eDirham (2001) which was to
simplify collection of government service fees. The journey
has been continued with several other initiatives, leading to
UAE being considered one of the foremost countries in
utilizing ICT to improve governance.
5.1 Developments in UAE for E-Governance
E-government portal of Abu Dhabi provides a single shop
access to all government services. This portal is being used
by citizens, businesses, tourists, expats, efciently delivering
government services in a cost-effective manner. The portal
also answers queries and receives complaints and sugges-
tions through the Abu Dhabi Governments various
channels.
One of the notable developments in e-governance in UAE
has been the Abu Dhabi Systems and Information Centre
(ADSIC). This center has become key in developing, pilot
testing and supporting various initiatives with the vision to
transform government services. A key objective of the center
has been to establish a strong technology-led platform which
can act as a catalyst for e-governance transformation.
The e-government strategy developed for Abu Dhabi has
a twofold approach, to develop a world-class customer
experience for users of government services and drive
government modernization through positioning the govern-
ment as a customer focused service provider.
Few other initiatives stand out as well, for example:
1. The UAE national identity card which is a critical in the
successful execution of e-government and eServices.
2. Electronic Land Management System (eLMS) which has
simplied and optimized land services through the use of
technology.
3. Happiness meterTo measure the overall impact of all
the initiatives undertaken by the Dubai Government,
there have been happiness meters installed across the city
to help measure citizen happiness with the Government
and its services. These meters are now also being
extended to the private sector.
4. Smart District GuidelinesThese are guidelines that
have been provided to developers to help them build a
truly seamless city for the citizens of Dubai.
5. Smart Dubai IndexMeasurement is a critical factor for
implementation of smart governance to gauge the impact
of the e-government initiatives. The Dubai Government
has dened an index across six city dimensions across
twenty-three core areas of city development.
6. Dubai DataDubai is moving towards becoming an
Open Data Government wherein all key information will
be shared with citizens and other governments to help
form a participatory government.
7. Smart Dubai PlatformThis is Dubais initiative to
implement IoT citywide, wherein all critical
78 A. A. Obedait et al.
infrastructure would be mounted with sensors to capture
real time data on the city and report dashboards to the
citizens.
8. Dubai BlockchainThe Government is moving all its
services onto the blockchain to help improve the trans-
action time and reduce security threats.
5.2 Impact of Smart Governance Initiatives
Due to the efforts, UAE has been able to improve its rank in the
UN e-government surveys and improve the efciency and cost
of providing governanceservices. Rankin the UN e-government
survey improved to 8th position in 2016 from 28th in 2012 and
49th in 2010. They also have an ambitious target of moving 80%
of Government services to digital by 2018 [24], which would be
a huge step in ensuring the Smart Dubai agenda.
6 Conclusion
It can be argued that that a customer centric approach is
being adopted for governance through technology world-
wide. Governments across the world have begun to adopt
principles of e-governance and Smart governance while
building Smart Cities; this study attempted to look at various
examples and case studies addressing key issues using
technologies and systems that have been highlighted and
identied in the earlier sections:
1. Augmented Reality (AR) for planning cities and
infrastructureThe application of AR in real infras-
tructure and land end case uses, has the potential to help
governments and citizens to visualize and understand
the architecture and identify the issues in the early
stages of design [27].
Kamp tower in Jatkasaari, Helsinki, Finland was one
of the rst time in the world that AR was used to make
real time decisions on infrastructure [27].
2. Citizen interaction via Virtual model facilitatingVir-
tual modeling helps to engage with various stakeholders
within the government and with citizens who might not
be co-located to participate in governance and help
co-create their city.
Finland has a mandatory building act where inter-
action with the citizens is required before the setup of
any major infrastructure and virtual models are now
being used to enable this communication [28].
3. Social media to engage citizensSocial media has
helped transform the traditional communication
between citizens and citizen communities and
Governments. This is also aligned with the open data
concept of Governments, wherein the Government
shares facts and gures to engage with citizens and
form a participatory government [29].
4. Multiple countries across the world have resorted to
social media to engage with citizens.
5. Gamication to enable learningGamication can be
used as an effective tool to help motivate government
ofcials to provide better customer service and help
citizens learn more about the government through an
interactive and gamied system [29].
6. Public procurement via smart contractsBlockchain
enabled technology is being deployed by governments
to enable public procurement through secure and
dynamic smart contracts, wherein the time to procure
and pay has been reduced making the overall procure-
ment system efcient [10].
7. Emergency managementInternet of things is being
used through mounted sensors to detect public safety
threats in real-time and take appropriate action to
minimize public damage.
8. Congestion managementReduction in congestion
through smoothening of citizen and tourist movements
in busy areas. IoT is also being used to manage trafc
jams and parking lots. For example, in London, a trafc
management system utilizes sensors to optimize green
light time at trafc intersections and co-ordinates trafc
lights across the city to improve trafc throughput. This
leads to reduction in time spent in trafc and reduced
emissions from vehicles [7].
9. 3D printingThree-dimensional printing of building,
components to reduce carbon footprint and also reduce
lead time to procure and build [4].
10. Waste managementIoT is being used to manage
waste through segregation and measurement of wastes
and ensuring more waste is added to containers before
being emptied, therefore reducing the carbon emissions
from the waste collection trucks [30].
11. Smart meteringGovernments across the world have
adopted smart metering for utilities management across
the city. Enel SpA, Italy has deployed more than 30
million smart meters across its customer base.
References
1. Desouza, K.C., Swindell, D., Smith, K.L., Sutherland, A.,
Fedorschak, K., Coronel, C.: Local government 2035: strategic
trends and implications of new technologies. Issues Technol.
Innov. 27 (2015)
2. Howard, H., Cannon, B.M., Mendonsa T.R.: Predicts 2017:
government CIOs are caught between adversity and opportunity.
Gartner (2016)
Citizen-Centric Approach in Delivery of Smart Government Services 79
3. Hang, C., Kohlbacher, F.: Disruptive innovations and the greying
market. In: Proceedings of the 2007 IEEE IEEM, pp. 19151919
(2008)
4. Mckinsey Global Institute: Disruptive technologies: advances that
will transform life, business, and the global economy (2013)
5. Rokhman, Ali: E-government adoption in developing countries;
the case of Indonesia. J. Emerg. Trends Comput. Inf. Sci. 2(5),
228236 (2011)
6. Zouridis, S., Thaens, M.: E-government: towards a public
administration approach. Asian J. Public Adm. 25(2) (2003)
7. Madakam, S., Ramaswamy, R., Tripathi, S.: Internet of Things
(IoT): a literature review. J. Comput. Commun. 3, 164173 (2015).
https://doi.org/10.4236/jcc.2015.35021
8. Alkhamisi, A., Monowar, M.: Rise of augmented reality: current
and future application areas. Int. J. Internet Distrib. Syst. 1(4), 25
34 (2013). https://doi.org/10.4236/ijids.2013.14005
9. Mircea, R.T., Ivan, M.L.: Big data: present and future. Database
Syst. J. V1 (2014)
10. Lindman, J., Tuunainen, V.K., Rossi, M.: Opportunities and risks
of blockchain in payments. In: Proceedings of the 50th Hawaii
International Conference on System Sciences https://doi.org/10.
24251/hicss.2017.185 (2017)
11. de Montjoye, Y.A., Farzanehfar, A., Hendrickx, J. Rocher,
L.: «Solving articial intelligences privacy problem», Field
actions science reports [Online], Special Issue 17 | 2017, Online
since 31 Dec 2017, connection on 1 July 2018. URL: http://
journals.openedition.org/factsreports/4494
12. Hall, R.E.: The vision of a smart city. Presented at the second
international life extension technology workshop, Paris, France
(2000)
13. Thuzar, M.: Urbanization in South East Asia: developing smart
cities for the future? Regional Outlook, pp. 96100 (2011)
14. Bronstein, Z.: Industry and the smart city. Dissent 56(3) (2009)
15. Finnerty, B., Lacheca, D.: Government portals need to evolve now
or they wont satisfy anyone. Gartner Report (2017)
16. Deloitte: Smart cities: how rapid advances in technology are
reshaping our economy and society (2015)
17. Albino, V., Berardi, U., Dangelico, R.M.: Smart cities: denitions,
dimensions and performance. J. Urban Technol. (2015)
18. Gifnger, Fertner, C., Kramar, H., Kalasek, R., Pichler-Milanovic´,
N., Meijers, E.: Smart cities: ranking of European medium-sized
cities Vienna. Centre Reg. Sci. (2007)
19. Hoevenaars: The biggest challenge to develop a successful Smart
City project. Blog Smart City May 28 (2015)
20. Holland, G.: Will the real smart city please stand up? Cities 12(3),
303320 (2008)
21. Wild, L., Chambers, V., King, M., Harris, D.: Common constraints
and incentive problems in service delivery. Working paper 351,
ODI (2012)
22. Rampa, F.: Applying the ECsGovernance Analysis Framework
to the water sector in Kenya. European Centre of Development
Policy Management (2011)
23. Ntiro, S.: eGovernment in Eastern Africa. KPMG, Nairobi (2000)
24. Madichie, O.M., Al Athmay, A.A.: An initial assessment of
e-governance and public sector marketing in UAE. Int. J. Bus.
Emerg. Markets 5(3), 234253 (2013)
25. Layne, K., Lee, J.W.: Developing fully functional e-government: a
four stagemodel. Gov. Inf. Q. 18(2), 122136 (2001)
26. Moon, M.J.: The evolution of e-government among municipalities:
rhetoric or reality? Public Adm. Rev. 62(4), 424433 (2002)
27. Olsson, T., Savisalo, A., Hakkarainen, M., Woodward, C.: User
evaluation of mobile augmented reality in architectural planning.
In: Gudnason, G., Scherer, R., (eds.), pp. 733740, CRC Press,
Leiden, The Netherlands/Balkema (Taylor & Francis Group)
(2012)
28. Sanders, E.B.-N., Stappers, P.J.: Co-creation and the new
landscapes of design. CoDesign Int. J. CoCreation Des. Arts
(2008)
29. Deterding, S., Dixon, D., Khaled, R., Nacke, L.: From game
design elements to gamefulness: dening gamication. In:
Proceedings of the 15th International Academic MindTrek Con-
ference: Envisioning Future Media Environments, pp. 915 (2011)
30. TratzRyan: Smart city governance requires a sustainable strategy
with well-dened objectives. Gartner (2016)
80 A. A. Obedait et al.
Cloud Concept for Implementing Multimedia
Based Learning in Higher Education
Vikas Rao Naidu, Anjum Zameer Bhat, and Baldev Singh
Abstract
Education technology is rapidly adapting various revolu-
tionary approaches to providing an enhanced learning
environment to the students. In many educational insti-
tutions, cloud-based services are being implemented to
facilitate the enhanced e-learning solutions. Cloud imple-
mentation enables on-demand educational resources in
various format, which includes, e-books, audio, video and
other interactive materials to support enhanced learning.
Cloud concept can transform the traditional way of
teaching to engaging and interesting pieces of media to
support teaching which is more accessible, even outside
the classroom. This research paper highlights few similar
approaches which are adapted to provide enhanced
e-learning solutions by implementing some multimedia
tools, for educational resources development. The study
of the existing system will provide guidelines to incor-
porate changes, wherever required, to facilitate successful
implementation of cloud-based services to support edu-
cation technology.
Keywords
Cloud in education Education technology
E-learning Interactive media in education
Teaching and learning solutions
1 Introduction
Computing resources are being utilized in every sector
successfully enabling seamless working environment and
providing cutting edge to organizations in matching to per-
petually increasing competition. Although computerization
can exponentially increase the productivity, mobility and
benets of the organization however it does not come
without expenditure. Companies of late have been spending
huge amount of money on computing resources and devel-
opment of infrastructure that is essential for running infor-
mation systems, specialized applications, databases,
repositories and much more. Researchers some time back
perceived that computing resources can be provided as a
service (a utility) like any other service e.g. water, electricity,
internet etc. The biggest advantage in such an arrangement
would be the pay-as-you-go feature i.e. you need to pay
exactly for the computing resources you are availing and
second thing is, what one procures is exactly what is
required by him. Cloud computing a buzz word in modern
IT industry is on demand computing which provides com-
puting resources as a service. Various cloud service archi-
tectures are available however more prominent ones are
Infrastructure as a Service (IaaS), Platform as a Service
(PaaS) and Software as a Service (SaaS) [1]. These service
architecture and many other variants are being used by
various organizations and cloud service providers are pro-
viding appropriate computing resources to organizations
without any investment from the availing organization for
the infrastructure development, maintenance and
administration.
2 Cloud Computing in Education
Cloud computing in recent past has been adapted in various
organizations ranging from software development compa-
nies to automobile manufacturers, from broadcasting
V. R. Naidu (&)A. Z. Bhat
Middle East College, Muscat, Oman
e-mail: vikas@mec.edu.om
A. Z. Bhat
e-mail: azameer@mec.edu.om
B. Singh
Vivekananda Institute of Technology, Jaipur, India
e-mail: baldev.vit@gmail.com
©Springer Nature Switzerland AG 2019
A. Al-Masri and K. Curran (eds.), Smart Technologies and Innovation for a Sustainable Future,
Advances in Science, Technology & Innovation, https://doi.org/10.1007/978-3-030-01659-3_11
81
companies to higher education institutions and many more in
order to avail maximum computing resources with minimum
investment, no administrative overhead and no maintenance
with a exibility of enhancing or scaling up the resources in
future as demand may arise. Cloud computing in education
especially in higher education has been utilized and there are
various precedents where cloud resources have been used in
Universities, colleges and higher education institutions to
cater to the requirements of students.
The use of cloud computing is very much common in
multimedia where high end and expensive multimedia
computing resources are being provided on demand facili-
tating students with on disposal various expensive software
products which otherwise would be very difcult to procure
and access. Moreover cloud computing is also used in
teaching multimedia and assisting students in understanding
the concept of multimedia tools. Moreover cloud computing
can promote collaborative learning especially in multimedia
application enhancing the learning capability of students and
assisting teachers in effective lesson delivery [2]. The cloud
applications in (SaaS), users can exibly access their data via
a web browser from a computer system or a laptop in home,
at school or a library or any other convenient and appropriate
place, and achieve rapid and efcient communication, col-
laboration, exchange or share documents, contacts, notes,
audio/video and other data [3]. The e-learning solutions
through cloud computing can be very effective in reducing
the cost of multimedia tools as well as requiring no main-
tenance or update moreover providing high level of security,
privacy and compatibility to the end users [4]. The multi-
media applications which otherwise are expensive to be
procured by colleges and small institutions and hence
depriving students of their use and learning, cloud comput-
ing offers an affordable solutions for such institutions to
subscribe for on demand computing completely appropriate
to the requirements of that institutions and facilitating stu-
dents to utilize services which otherwise wont be feasible
and possible in normal circumstances due higher cost.
3 Cloud Concept for E-Learning
Cloud computing has been utilized in various sectors and
elds in the recent past and most of the organizations irre-
spective of scale and nature of work have benetted from the
implementation of cloud computing. On demand computing
resources leveraging the benets of the organization and at
the same time providing ease of administration, exibility,
scalability and manageability at an optimal cost. Cloud
computing has been utilized in education sector by many
reputed universities and institutions all over the world.
Cloud computing has been implemented in many higher
education institutions for providing the virtual lab environ-
ments to students of degree and diploma courses [5]. It has
also successfully been utilized by many higher education
establishments for e-learning and e-Resources. Many of the
educational establishments have implemented the learning
management systems on the cloud providing optimum fea-
tures of scalability, redundancy, fault tolerance and load
balancing yielding high performance without literally any
administrative overhead. Cloud services are also being uti-
lized in many higher educational institutions for providing
application services to the students and faculty members.
There are various examples of higher education establish-
ments availing SaaS (Software as a Service) for multimedia
application on pay-as-you-go basis which otherwise are very
expensive for educational establishments to purchase.
Cloud computing has certainly enhanced the capability of
educational institutions for providing e-learning resources
and enhancing e-learning in an educational setup. Cloud
computing has benetted higher education institutions in the
following manner.
1. IaaS (Infrastructure as a Service) has provided exibility
to educational establishments to avail a required hard-
ware resources at a considerably much lesser which
otherwise may not be monetarily feasible for the insti-
tution to procure. This has certainly enhanced capabilities
of educational establishments to implement e-learning
projects and services which require high end hardware
devices.
2. PaaS (platform as a Service) has given exibility in
choosing the appropriate systems software most suitable
and compatible for the organization.
3. SaaS (Software as a Service) has signicantly enhanced
the capability of educational establishments to provide
appropriate high-end application software to the students
at a never before price.
All the above factors have enabled higher educational
institutions implementing cloud services to enhance student
experience and provide better learning to students of various
courses.
Use of cloud computing in multimedia is not new, various
educational establishments all over the world are availing
different public cloud services to facilitate students of mul-
timedia with variety of application software for learning
multimedia concepts. As a matter of fact most of multimedia
high-end applications are very costly and could sometimes
be difcult even for many good and protable higher edu-
cation institutions to procure. Multimedia based cloud is an
excellent idea which leverages maximum services and
facilities to students however at a much lesser affordable
cost, without even requiring high conguration client
82 V. R. Naidu et al.
machines. As the applications are run on the cloud, any
machine which can run a compatible browser should be ne
to access the multimedia cloud services [6].
Cloud concept utilizes audio and video to present a
complex concept in simplied and visual form, which is
further stored on cloud for multiple access simultaneously.
This is meant only for the key concepts, and not for the
entire course materials. But based on the complexity of the
course materials, it can be further extended to entire course.
This can be used as the enhancement technique for providing
easy-to-learn solutions to the students. In another word,
cloud concept for e-learning is very helpful for engaging
students especially in activity based learning environment,
such as ipped classroom.
Few universities around the globe has successfully
implemented this concept in their campus for enhanced
learning experience among faculty and the students. As
shown in Fig. 1, the rst stage is to identify the key con-
cepts, for which audio-visual materials is to be developed.
These key concepts could be the complex ideas and for-
mulations, which cannot be explained using traditional
chalk-and-board method. In the next stage, media (learning
resource) is developed, to make these concepts, easy to
understand. Later the entire package of these learning
materials is uploaded on cloud by means of internet.
In order to make the session more engaging and inter-
esting, the developer or faculty has to make sure that these
audio-visual materials should be short and to-the-point.
Ideally it is recommended to have couple of short video
tutorial of 510 min duration, instead of having a longer
one. Moreover, it is important to note that implementation of
cloud concept involves some hardware and software
requirements at the campus, and hence it cannot be imple-
mented without the presence of this infrastructure.
Finally, it is important to design the assessments which
better suits such type of classroom. Activity based learning
requires specially designed assessments. These assessments
could be formative or summative in nature. The concepts
should be linked to the assessment tasks which is designed
in interactive platform. Some examples of such interactive
assessment includes, interactive quiz, online shared screen
such as Padlet, interactive videos etc.
4 Proposed Framework for Implementing
Cloud Concept
The cloud concept could be implemented in any educational
institution with a generic framework as suggested in Fig. 2.
Certain hardware and software infrastructure would be a
pre-requisite but it depends on the level of implementation.
The rst step in proposed framework is the analysis and
identication of key concepts on which the media based
elements need to be developed in order to facilitate activity
based learning for enhanced teaching and learning experi-
ence. This include identication of such topics or modules
which really need assistance of technology such as
e-learning resources which needs to be accessed even out-
side the campus.
The second step is the actual process of media produc-
tion, which involves development of audio-visual materials.
There are many free and open source tools which can sup-
port such e-learning resource development. Some tools such
as Screencast-o-matic can be used for developing video
tutorials of practical modules which involves usage of
toolsets. Other such free access tool includes VideoPad
video editor, Blender, Alice, Pencil2D etc.
The next stage in this process would be to transfer the
multimedia based services on the cloud. The optimal solu-
tion would be to avail a cloud services from a public cloud
service provider and take an appropriate subscription based
on the requirement of a particular educational establishment.
As the implementation of private cloud would result in huge
investment, most of the educational establishment would
prefer to go for cloud services that are provided by a public
cloud service provider. Moreover the security is not at all
any concern in this case as the student availing the service
would be working on their practicals and projects related to
multimedia and no condential information would be shared
Key
concepts
Audio /
Video
(Media)
Internet
Cloud
Concept
for e -
learning
Fig. 1 Basic structure of cloud concept for e-learning
Analysis and
Identification of
Key Concepts
Media Production
(Audio / Video)
Publish on
Cloud
Implementation in
Activity based
teaching
Assessment,
Feedback &
Reflections
Fig. 2 Proposed framework
Cloud Concept for Implementing Multimedia Based Learning 83
on the cloud. The data of multimedia applications in case of
students is always a dummy data that does not belong to any
organization and has no signicance as far privacy and
condentiality is concerned.
Once the media is published on cloud, the access could be
provided to the students by sharing the hyperlink in their
module notes. Students can access these video resources in
the form of Video-on-Demand (VOD) service at their own
convenience and pace. The exibility of access is the key
factor, which denes the scope and level of implementation.
The e-learning resources must be accessed without any
glitches and to ensure this, the developer must take care of
multiple optimization factors of the media. Appropriate
activities such as interactive quiz, or games could be con-
ducted during the class sessions to access the students
learning. Interactive video based applications such as Vizia,
allows students to answer quiz even during the video play-
back, based on the part of the video they have watched so
far. Apart from quizzes, it also allows students to cast polls
for some activities such as critical evaluations.
The assessment results and feedback provide a way to
draw recommendations on the practical implementation of
cloud concepts in e-learning which allows the faculty or
developer to further improve the learning resources at the
next level. It also enables the faculty member to identify the
potential areas of improvement in order to provide the best
possible learning resources to the students.
5 Conclusion
Implementation of cloud services in education in general and
multimedia applications in particular is a revolutionary
change which is yet to yield its full potential and benets.
The cloud implementations specic for education and min-
utely specic for areas in education like multimedia are
going to be very common in next few years. The appropriate
architecture, methodology and framework for implementa-
tion of cloud services in multimedia is the need of the hour
as this area still demands a lot of exploration and research
and certainly the scope of improvement is very vast. Cloud
services can certainly yield vast benets for multimedia
students by providing them infrastructure, applications and
services through cloud that are relevant to the multimedia
specialization and cannot be easily procured because of high
cost. Many of the students from various higher education
institutions from multimedia specialization are not able
comprehend essential concepts related to multimedia
because of lack of resources and infrastructure, being fair
enough to higher education institutions multimedia appli-
cations are very costly as well. However, students in these
educational establishments are deprived from the learning
because of lack of enough resources and infrastructure.
Implementation of cloud computing services for multimedia
applications can bridge the gap and may result in improved
student experience and learning. This paper is a mere effort
in the direction of facilitating better learning resources for
students of higher education institutions especially from
multimedia specialization.
Acknowledgements Authors extend their sincere thanks to the Man-
agement of Middle East College, Oman, for support. Special thanks to the
management of Vivekananda Global University, Jaipur, India for pro-
viding all possible guidance and support to pursue this research work.
References
1. Zameer, A., Khalfan, D., Vikram, A.: Virtual private network as a
serviceA need for discrete cloud architecture. In: IEEE Explore,
Noida (2016)
2. Zeng, Z.: Design of a cloud services platform for a multimedia
teaching environment. In: World Transactions on Engineering and
Technology Education, Guangzhou (2016)
3. Kurelovic, E.K., Rako, S., Tomljanovic, J.: Cloud computing in
education and students needs. In: 36th International Convention
on Information & Communication Technology Electronics &
Microelectronics (MIPRO) (2013)
4. Karim, I., Goodwin, D.R.: Using cloud computing in e-learning
systems. Int. J. Adv. Res. Comput. Sci. Technol. (IJARCST)
(2013)
5. Nan, X., He, Y., Guan, L.: Optimal allocation of virtual machines
for cloud-based multimedia applications. In: Multimedia Signal
Processing (MMSP) (2012)
6. Zhu, W., Luo, C., Wang, J., Li, S.: Multimedia cloud computing.
In: IEEE Signal Processing Magazine (2011)
7. Andrina Granic, M.C.: Universal design within the context of
e-learning. In: Conference on Universal access in human-computer
interaction: applications and services, Berlin (2007)
8. AL-Hunaiyyan, A., Al-Huwail, N., Al-Sharhan, S.: Blended
e-learning design: discussion of cultural issues. Int. J. Cyber
Soc. Educ. 1(1), 1732, (Mar 2008)
9. Gowda, R.S., Suma, V.: A comparative analysis of traditional
education system vs. e-learning. In: International Conference on
Innovative Mechanisms for Industry Applications (ICIMIA),
Bangalore, India (2017)
10. Niharika, M., Sahoo, P.K.: Protecting cloud based multimedia
content using 3-D signatures. Int. J. Adv. Comput. Tech. Appl.
(IJACTA) 4(1), 205208 (2016)
11. Singh, U., Baheti, P.K.: Role and service of cloud computing for
higher education system. Int. Res. J. Eng. Technol. (IRJET) 4(11),
708711 (2017)
12. Zameer, A., Singh, B.: Learning Resources as a Service (LraaS),
Noida (2017)
84 V. R. Naidu et al.
Diplomacy in the Internet AgeChallenges
and Opportunities for the UAE
Melissa M. Cyrill and Aftab Kamal Pasha
Abstract
In the United Arab Emirates, internet-based tools have
increasingly shaped recent political, social, economic,
and public interactions. The number of users of social
media platforms alone reect a highly engaged online
community in the country. The multi-functionality of
internet-enabled platforms hosted on the Web 2.0, which
include blogs, microblogging sites (Twitter), social net-
working sites (Facebook), video hosting sites (YouTube),
and visual media sharing websites (Flickr, Snapchat,
Instagram)offer a range of options to the government
and state agencies to promote certain narratives, gauge
public opinion, receive real-time feedback, promote
citizen engagement, and shape the interpretation of
events, policies, and goals. At the same time, high levels
of internet penetration expose Emiratis to local, regional,
and international news and communication. With this
background, the proposed paper examines how the internet
has changed communication and, thereby, the contours of
diplomacy, including the challenges and opportunities that
countries like the UAE face in the internet age of
information abundance and real-time sharing. Lastly, the
paper briey touches upon the regional security and
geopolitical challenges faced by the UAE, namely, the
threat perceived from Iran and Qatar, and the consequent
bolstering of new partnerships.
Keywords
Internet diplomacy Information age Digital com-
munication Public diplomacy Networked society
Geopolitics of the UAE
1 Introduction
Over the course of the past decade, the internet has become a
pervasive part of the daily lives of individuals, business
operations, and interactions between citizens and their gov-
ernments in Arab countries, similar to the rest of the world.
In the Arabian Gulf states, internet penetration rates are the
highest among West Asian nations; by 2014, Qatar (95%),
Bahrain (99%), UAE (96%), and Kuwait (93%) had near
universal access to the internet, while the larger countries of
Oman (80%) and Saudi Arabia (67%) showed widespread
diffusion [1]. Mobile broadband access is also very high in
this region; it reached an average of 120.32% 2015, with the
UAE showing an access rate of 144.20% [2]. Statistics from
the online tracking source, Internet World Stats, noted that
by mid-2011, an estimated 72.5 million Arabs were internet
users; this grew to 250.3 million in early 2017 [3].
This increase in internet penetration has dramatically
altered the scope for mass communicationwith the avail-
ability of a multitude of private and public platforms
of communication (from internet-based instant messaging
services to blogging and microblogging websites and
smartphone applications). Transformation of information
communication technologies (ICTs) has implicated all
media, including the traditional domain of television, news,
and radio. These established information and broadcasting
channels now utilise internet-enabled platforms to adapt to
the changing audience consumption patterns and to remain
relevant. Parallel to these developments, website blogs and
citizen-driven news sources have also emerged. These may
have relatively smaller user bases but function as outlets of
alternative information: offering real-time updates (including
rst-hand), using different mediums to engage with news
and entertainment (satire), adopting positions different from
what is mainstream or state-endorsed, and providing a range
of perspectives on world and local events.
This has been made possible because of how the internet
in itself has changed in the past ten years. While earlier,
M. M. Cyrill (&)A. K. Pasha
Centre for West Asian Studies, Jawaharlal Nehru University,
New Delhi, India
e-mail: melissacyrill@gmail.com
A. K. Pasha
e-mail: drakpasha@gmail.com
©Springer Nature Switzerland AG 2019
A. Al-Masri and K. Curran (eds.), Smart Technologies and Innovation for a Sustainable Future,
Advances in Science, Technology & Innovation, https://doi.org/10.1007/978-3-030-01659-3_12
85
internet-based platforms like social media, video sharing
websites, and instant messaging services primarily fullled
social networking needsconnectivity, communication,
socialisation, and entertainmentnow these channels serve
as veritable tools of news gathering and publishing, broad-
casting, governance, development, diplomacy, and business.
Control over news and information is, therefore, shifting
away from a few elite sources of provision via the dispersed
ownership of online content creators. And, nowhere was this
more evident than within the Arab worldfrom Africa to
the Levant to the Gulf kingdomsduring the uprisings from
2011, initially christened in global media as the Arab Spring,
and later, the Arab Winter.
To ensure the themes of this paper are clear, it is neces-
sary to explain how diplomacyis understood as a function
of sovereign states and as an exercise. Diplomacy, as used
here by the papers authors, refers to the practical and
established methods of inuencing the decision making
process and behaviour of foreign governments and peoples.
Diplomatic objectives are secured through dialogue, nego-
tiation, and other non-coercive measures. Communication
strategies, thus, lie at the heart of diplomatic reporting and
dialogue. In fact, several denitions underline the synonymy
of diplomacy and communication; Constantinou [4] under-
stands diplomacy as a regulated process of communica-
tion, while James [5] calls it the communication system of
the international society, and Bjola and Kornprobst [6] talk
about the communication among internationally recognized
representatives of internationally recognized entities.
This is why the central premise of the paper is that the
future of diplomacy is intrinsically linked to and shaped by
the future of communication mediain effect, the commu-
nication technologies facilitated by the internet. A corollary
to this argument is that the revolutionary developments in
information communication technologies (ICTs) have both
challenged diplomacy (by virtue of accelerating connectiv-
ity) and created innite opportunities (via platforms for
innovative outreach). A simple but illustrative example is the
way microblogging or tweeting by diplomats and politicians
shapes public opinion, which is made powerful and perva-
sive by the networked nature of the internet.
Today, internet media enables governments and diplo-
mats to measure public sentiment and track changes in
public sentiment. This in turn feeds into the countrys public
policy and decision making processes. States realise that by
virtue of their ubiquitous user base and connectivity, internet
or online media can effectively stimulate direct two-way
dialogues with citizens, garner them immediate feedback,
allow them to course correct poorly received policies, and
achieve limited referendums. In this way, the internet
enables the process of political communication and inu-
ences its outcomes. It has the capacity to increase partici-
pation in the political system and spread awareness, and the
nature of its networked platforms creates a multiplier effect
allowing for the transmission of messages on a signicant
scale.
These developments tempt us to be techno-optimistic
having excessive conviction in the liberating and empow-
ering value of new technologiesyet, such expectations
must be tempered. The world of the internet or cyber space is
not an innocent, progressive alternative to the real-world
space; the internet is merely a host to those who use it, and
reects the perils, curiosity, ambition, prejudices, and aspi-
rations as experienced and asserted by those using it. This
means that while the fundamental reach of the internet can
be a force for positive and constructive change, it can be
equally disruptive or manipulated. This characteristic and
power of the internet directly feeds into the scope and
practice of diplomacy as it confronts new threats and new
goals. For instance, cyber space has now emerged as yet
another frontier, which has created a new category of
diplomatic initiativethat of digital or e-diplomacy.
To better appreciate the impact of the internet on diplo-
macy imperatives in the UAE, this paper will rstly analyse
the state of the internet in the UAE and its application in the
arena of diplomacy and civic engagement, followed by a
brief examination of the internets intervention in the con-
duct of diplomacy. With this supporting framework, the
paper will explore the challenges and opportunities for the
UAE in expanding its diplomacy initiatives in a
hyper-connected era, and will make a comment on its pre-
sent geopolitical status.
2 Internet and State-Society Relations
in the UAE
In the UAE, internet-enabled media have empowered locals,
opened up entrepreneurial opportunities, and improved
sociocultural linkages, while also exposing them to surveil-
lance and propaganda, among other things. Users of
internet-based media vocalise their thoughts on a variety of
subjects, and can communicate across a widespread geog-
raphy, irrespective of their gender, religious, or ethnic
identities, away from the immediate pressures of society and
family. This in itself is transformative, given the traditional
identity of the Gulf Arab peoples. Consequently, the Emirati
state and its institutions are keen participants on the internet,
both to promote state narratives and monitor the behaviour
of online publics. In the recent past, this has resulted in
greater citizen engagement and the cultivation of nationalist
pride, on one hand, while also in the crackdown on con-
troversial content or arrest of detractors, on the other.
The Arab Social Media Report 2017throws some light
on the users of internet-enabled media in the region. Its
ndings indicate that the proliferation of social mediaand
86 M. M. Cyrill and A. K. Pasha
increase in its users have made these channels the de facto
form of interaction for the masses in the Arab world. This is
a departure from the initial stage of growth where access to
internet platforms were limited to the elite classes [7]. In
terms of access and usage in the UAE, a 2016 social media
survey by The National, an Emirati daily, found that
WhatsApp access had reached about 97%, Facebook usage
was at 89%, followed by YouTube at 73%. At that time, the
least used platforms were Snapchat at 27% and LinkedIn at
16%. Finally, the largest cohort of social media users
belonged to the age group 1821 [8]. The youth demo-
graphic is a key feature of the Arab worlds internet land-
scapealmost 64% of social media users in the region are
under 30 years of age. In the UAE, the percentage of the
population under the age of 25 stands at 34%. A persistent
concern, however, is the gender distribution of Arab internet
users. Data collected by the Arab Social Media Report 2017,
for example, shows that only one out of three social media
users are female (201016) in the Arab world; this drops to
one out of four users in the Arabian Gulf states or 24.6% as
compared to 36% in North Africa [7].
Nevertheless, the overall penetration levels of internet
and social media in the region, and the UAE in particular,
has caused the Emirati government to utilise these domains
to actively engage with their citizens. In 2013, a national
brainstorming session was conducted for the rst time,
where citizens and members of Emirati society could reach
out and interact with respective UAE council ministers on
Twitterthey discussed a myriad of public policy matters,
such as healthcare and education. A report was subsequently
released titled: From Majlis to Hashtag Engaging Citizens
through Social Media[9]. Yet, contradicting the notion that
the UAE is socially engaged online is a short-term study by
Banu Akdenizli on how foreign ministers in the Gulf (UAE,
Bahrain, Qatar, and Saudi Arabia) use Twitter. Her conclu-
sions come from an in-depth analysis of 438 tweets between
October 1, 2016 and December 31, 2016 (this is part of an
ongoing larger study that tracks a total of 16 accounts,
including embassies, foreign ministries over a year-long
period) [10].
Akdenizli states that among the four analysed accounts,
the UAE had the most followers at 3.6 million, followed by
Saudi Arabia with 1.3 million, Bahrain with close to
350,000, and nally Qatar with 25,544. The UAE foreign
minister followed 562 people in October 2016, which
increased to 600 by December, that year. Of all the tweets
analysed by Akdenizli during this time period39.2%
belonged to Qatars foreign minister, 33.7% came from the
minister of UAE, 22.7% from Bahrain, and only 4.3% from
Saudi Arabia. Almost three fourths (74.2%) of the tweets
were original content, 20.6% were retweets, and a mere
5.3% were reply tweets, indicating a lack of interest among
the leaders in using this online tool in an interactive manner.
Only 9% of all the tweets contained a mention(of another
account on the medium that will improve exposure), and
only 2.2% posted a question to their followers. One fth
(21.3%) of the tweets contained linksmostly to interna-
tional news websites. Hashtags enhance visibility, as they
can be potentially read by individuals who are not following
the said minister. Almost half of all tweets contained a
hashtag (44.7%), and almost 90% of them were merely
about marking a location [10]. The majority of the tweets
were in Arabic (65.1% in Arabic and 34.9% in English),
which is unsurprising; the introduction of an Arabic interface
resulted in the growth of Twitters user base to 6.5 million in
2014 (posting an estimated 10 million tweets a day) [1].
Evidently, the UAE is beginning to see value in culti-
vating its online presence, either through limited engage-
ment on popular social media platforms or in the sharing of
key information online. However, the countrys diplomatic
cohort will most certainly lose out in securing long-term
inuence over public opinion if it avoids interactive com-
munication. This becomes even more signicant in the case
of shaping foreign public opinion, where the language of
communication is also important.
3 Informational Abundance and New
Threats in the Internet Age
Simplistically put, the internet structurally inverted the
few-to-many architecture of old media, during which time a
small number of people could inuence and shape the per-
ceptions and beliefs of societies en masse. In the present day,
the many-to-many environmentof the internet ensures that
every desktop and smartphone can function like a printing
press, a broadcasting station, and a place of assembly.
Transforming this role of the internet is what technolo-
gists refer to as the Web 2.0, which has enabled the creation
of new tools of media. The Web 2.0 is dened as the
second stage of development of the Internet, characterized
especially by the change from static web pages to dynamic
or user-generated content and the growth of social media
[11]. The new social and interactive media channels hosted
on the Web 2.0 contribute to the growth of networked
relations in the virtual sphere that run parallel to and spill
over into the physical public space.
Analysing this conuence of digital networks and society,
Manuel Castells has spoken of a network societywhere
important social structures and activities get organised
around electronically processed information networks [12].
Similarly, Kittilson [13] discusses the capacity of cyberspace
to function as a virtual civil society, and serve as a medium
for civic discourse, articulation, and deliberation.
Inevitably, the extended usage and added functionalities
of internet media affects the scope of their impact in the lives
Diplomacy in the Internet AgeChallenges and Opportunities 87
of peoples, governments, and corporations. Developments in
cyber space shape those in the physical world and vice versa
as social media platforms monitor the pulse of almost all
social, political, cultural, and economic mattersboth on a
macro and a micro scale. This makes communication and
interactions online highly vulnerable to manipulation and
perception management. The US Department of Defense
(DOD) denes perception management as Actions to con-
vey and/or deny selected information and indicators to for-
eign audiences to inuence their emotions, motives, and
objective reasoning as well as to intelligence systems and
leaders at all levels to inuence ofcial estimates, ultimately
resulting in foreign behaviors and ofcial actions favorable
to the originators objectives[14].
Such far-reaching and behavioural changes activated by
internet usein the way we work, socialise, network, and
interact with knowledge and informationalso fundamen-
tally alters the scope and course of diplomacy. For instance,
the sheer volume of information available that can be shared
at any time, as well as the security of this information
challenge modern day diplomats as they try to stay ahead of
online forcesboth commentary and reporting.
Today, the impact of new communication channels is felt
upon the core business of diplomacy, moving it away from
branding and image management to action-oriented dis-
course shaping. This is because what is published on the
internet, anywhere, shapes public opinion, everywhere, as it
gets shared through social media networks. Obar and
Wildman [15]dene social media as computer-mediated
technologies that facilitate the creation and sharing of
information, ideas, career interests and other forms of
expression via virtual communities and networks.
The pace of innovation and development of stand-alone
and built-in social media services proliferating
internet-enabled devices challenge the scope of denition,
but the authors identify certain common features of social
media: they are Web 2.0 internet-based applications; they
host user-generated content such as text posts or comments
or tweets, digital photos, audio feed, videos, and other
graphic data; users can create service-specic proles for the
website or applications that are designed and maintained by
the social media organisation; and they facilitate the devel-
opment of online social networks by connecting a users
prole with those of other individuals or groups [15].
Popular social media include blog sites like WordPress
and Medium, microblogging sites like Twitter, video hosting
sites like YouTube, social networking sites like Facebook,
and visual media sharing sites like Instagram, Snapchat, and
Flickr. Content shared through these social media online
status posts, tweets, memes, satirical productions, or
manipulated reportscan dramatically inuence policies,
elections, mainstream public discourse, and political
communication anywhere in the world, regardless of its
origin or authorship.
Thus, on one hand, online media offers tools for social
justice activists (by enabling fast spread of real-time video
and audio content); on the other hand, it is open to abuse by
terrorist outts and propaganda. Among the most visible
recent examples of the latter are the cyber intrusions and
propaganda during the 2016 American elections by
Russia-based hackers, and the sophisticated ability of ISIS
networkers to attract volunteers, from the world over, to ght
for the caliphatein their captured territories across Iraq and
Syria.
Out of this level of penetration, inuence, and real-time
impact has emerged what is now lexically established as the
era of post truthand fake news. In this climate of so much
information all the time, it becomes a matter of national
security as governments increasingly pay attention to what is
being communicated in their countries online and scrutinise
its verity and capacity to incite. Moreover, in this era of
informational abundance, as we spend most of our time on
smartphones, computers, and other technology devicesour
senses are routinely overwhelmed by the scope of informa-
tion available online. This is not to say that the quality of
information available to us is authentic at all times. Trolls,
bots, hacks, post-truths, and misinformation are as much at
the forefront of todays online vocabulary as is cutting-edge
innovation and breadth of news coverage.
Powers and Hensman [16] of the US Advisory Com-
mission on Public Diplomacy provide clear and simple
denitions for the most common and unsettling forces that
manipulate people and content on the internet, namely,
trolls, bots, and hackers. Trolls can be understood as indi-
viduals who post content or comment on content posted by
others, essentially in order to undermine the latter. Trolls are
known for their strength in numberswhere multiple per-
sonalities post expressly to annoy, demoralise, and hurt their
targets. Bots are used in two main waysto amplify content
on the internet and to mimic actual human beings online.
For example, on Twitter, one individual may control
several hundred bots, which can automatically retweet the
content of their favoured public personality (for example,
politician or celebrity). This creates the illusion of virality,
where the popularity of a tweet or hashtag becomes aug-
mented. Bots can respond to specic prompts using articial
intelligence, for instance, by responding to breaking news;
they can also mimic human traits online and participate in
online conversations. Hackers cause disruption through
information theft or manipulation in order to undermine trust
in and the credibility of individuals, organisations, govern-
ment institutions, or systems [16].
These represent some of the unique yet omnipresent
threats of the internet agecausing insecurity on the very
88 M. M. Cyrill and A. K. Pasha
internet-enabled platforms through which we communicate,
learn, work, and interface with vital institutions. In fact,
these threats depict a shift towards the weaponisation of
information, its host channels, and content creators. It is no
wonder then that politicians and thought leaders have ceased
to ponticate on the emancipatory ways of the internet as a
medium that could unite the world, and foster peace and
prosperity.
Yet, it will be no less ignorant to simply dismiss the
capabilities of the internet; it dissolves barriers to knowledge
and people, and provides access to the thought-processes of
individuals and communities previously considered
un-connected or not part of the conversationbecause of
disenfranchisement or discrimination. Finally, ICT devel-
opments in data gathering and computing abilities allow
governments and corporations as well as inventers and
innovators to respond to real-time needs, opinions, emer-
gencies, threats, and opportunities.
4 Diplomacy in the Internet
AgeChallenges and Opportunities
for the UAE
Diplomacy may be understood as a component of a nations
soft powerthe ability to wield inuence without resorting
to coercive means, such as war and violence. Practitioners of
diplomacy or diplomats seek to achieve the goals set by their
government, through strategies and broad tactics that are
prescribed by the foreign policy wing of the government. As
such, foreign policy and diplomacy are not synonymous;
diplomacy is an instrument of a countrys foreign policy.
And, while a countrys foreign policy may employ the use of
intelligence agents, subversive tactics, war or threat of war,
diplomacy necessarily substitutes the use of force in the
course of statecraft.
The primary tools of diplomacy are international and
public dialogue and negotiation; its conduct is entrusted to
the countrys diplomatic corps, which is the body of
non-politically trained and accredited envoys as well as the
countrys political leaders. The foremost objective of
diplomacy is the furtherance of the countrys national
interests. National interest is derived from the countrys
geography, history, economics, and the distribution of its
power capabilities in relation to its neighbours and the
international system. This includes but is not restricted to
safeguarding the countrys sovereignty as well as its terri-
torial, political, and economic security. Diplomacy is,
therefore, a continuous process; it is usually conducted in
condence, and its achievements are often the subject
material of international relations.
The role and importance of a countrys diplomatic efforts
cannot be overstated enough. Through the course of their
work, diplomats shape the image of their country abroad,
and are key messengers of their government in their inter-
actions with foreign diplomatic agents and governments.
Consequently, the role of the diplomat can be expansive, and
responsibilities range from reporting information collected
on the ground, to serving as emissaries, to convincing
stakeholders at high-table negotiations that the decision or
policy of their home country is what is best for all concerned
parties. Having enunciated the work and broad contours of
what diplomacy seeks to achieve, as well as the dramatic
evolution of internet-enabled and internet-mediated com-
munication technologies in previous sections, the next sec-
tion will focus on understanding how diplomacy is changing
with the transformation of the internet.
In the UAE, recent geopolitical events such as the per-
ceived rise of Iranian inuence, the impact of social media
during the regional uprisings from 2011 onwards, and
regional differences with Qatar as well as strategic and
economic ambitions, have come to determine the countrys
diplomatic agenda and agenda-setting process. Below are
highlighted some of the most important consequences of the
ubiquitous role played by the internet on the practice and
policy of diplomacy. The internet has both expanded the
dimensions of diplomacy and introduced new challenges,
ranging from the way it is now practiced to the threats
emanating from cyber insecurity and new methods of con-
ducting propaganda attacks.
4.1 Diplomatic Reporting
In their explanation, Parris and Bryson (2010) have asserted
that communicating in the right way, in the right voice,
with the right people, in the right order of precedence was
often more important than the objective truth or wisdom of
what you communicated[17]. While clarity, coherence, and
concise communication remains vital, it is the element of
correctness or truth that is the most challenged for diplomats
in the internet era, yet also the most importantunlike
previous times, due to the transparent accountability facili-
tated by the internet, on one hand, and its obfuscatory
capacity, on the other. The latter is in major part due to the
speed at which information travels in cyber space, and how
easily it can become entangled in value laden accounts.
Diplomats and statesmen are increasingly confronted by
the need to verify sources while also being required to report
on information as it unfolds on the ground; sometimes the
latter is a detriment to the former. Examples of this are more
liberally found among politicians as they cater to an
immediate audience of voters, such as re-posting of fake or
incorrectly presented facts, fringe opinion pieces, or even
satirical accounts. The stakes become high when it comes to
audio or video accounts of unfolding events, such as during
Diplomacy in the Internet AgeChallenges and Opportunities 89
the time of a conict or emergency when the internet
becomes populated with real-time information on social
media channels.
At another level, the growth of ICTs offers more per-
sonal and informal channels of communication[18], which
may allow ofcials in an embassy to seek conrmation of
facts and opinion from other persons of interest that might
not result in accurate analysis. It can also become a
doubled-edged sword as it may compromise the independent
ability of an embassy to assess local developments.
4.2 Transmission of Government Messages
More important than ever before in the instant communi-
cation era facilitated by the internet is ensuring that foreign
governments receive a logical and consistent position from a
country. In other words, this means that diplomats and
political representatives of a government must speak in a
singular voice, present a reliable version of, say, a decision
taken or development that has unfoldedinstead of having
multiple voices speaking multiple versions.
Perhaps the most relevant, and which will probably be
studied in depth in future, is the current Trump presidency in
the United States [19]. Known for his preference for Twitter
communiqués, it is now an oft occurrence that a message
from the American president gets contradicted by the
countrys foreign policy wing (State Department) or
spokespersons of the White House administration or the
Pentagon (Department of Defense).
This has had tremendous implications on countries who
previously considered the United States a natural ally or
looked to the US to provide security and other forms of
supportthey can no longer trust America to be reliable.
The changing American position on Qatar, depending on
who was speaking (President, State Department, or the
Pentagon) in the context of the Gulf Cooperation Council
(GCC) blockade of the country is a relevant example.
1
4.3 Shaping Public Narratives
Public diplomacy is probably the biggest beneciary in the
eld of diplomacy in the internet era. Dened without
general consensus, it is an expansive term that simply
translates as peoples diplomacy. It accounts for
government-endorsed efforts aimed at communicating
directly with foreign audiences or the people of other
countries.
Public diplomacy entails a governmentsofcial efforts to
shape foreign opinion or cultivate support for the countrys
strategic objectives. The instruments of public diplomacy are
varied, and include statements by key decision making
authorities, targeted campaigns by government organisa-
tions, and efforts to persuade international media to
favourably project ofcial policies to foreign audiences.
Here it needs to be mentioned that there are two main
types of public diplomacy.
The rst is brandingor what may be understood as
cultural communication. This is how a government tries to
improve its image without seeking particular support for any
immediate policy objective. States use this type of diplo-
macy to foster a better image of themselves in the world, to
generate goodwill, facilitate cooperation across a variety of
issues, maintain long-term alliance relationships, and
undermine external propaganda. One example would be
Qatars successful bid to host the 2022 FIFA World Cup.
The UAE has utilised this category of diplomatic initia-
tive most constructively in recent times. The creation of
Brand Dubaieffectively and persuasively showcases the
emirate as a forward looking, open-minded, economically
diverse, and commercially attractive oasis in the often
fraught Arab region. This has generated positive appeal from
around the world, as Dubai is associated with enterprise and
a pioneering spirit, seen as a thriving tourist destination, and
is attractive to corporates, artists, and marketing gurus alike.
Media coverage and advertisement of major landmarks,
such as the Burj Khalifa, Burj Al Arab, or the Palm
Jumeirah, on one hand, and events like Art Dubai, Dubai
Music Week, Dubai Drumming, Dubai Property Show,
Global Village, Dubai Food Festival, and the Dubai Inter-
national Film Festival, on the other, create a dynamic image
of the city, its business environment, and its culture. This
branding then strengthens the UAEs authority to wield
regional and international inuence.
Political advocacy is the second category of public
diplomacy. It is designed to achieve specic and immediate
policy objectives, unlike the long-term perception manage-
ment of brandingstrategies. Some recent examples may be
examined to fully grasp this category of diplomatic exercise.
The UAE was quick among the GCC states to ensure that
its public diplomacy measures engaged with its citizens
1
On May 23, 2017, Qatar and the UAE suffered a diplomatic
breakdown when the former complained of a cyber-hack that attributed
false statements to its emir, Sheikh Tamim bin Hamad Al Thani.
Subsequently, in June, a coalition within the GCC, led by Saudi Arabia
and the UAE, imposed an embargo on Qatarshutting access to air,
land, and sea routes; Qatari diplomats and residents were also expelled
from the blockading states. The states of Saudi Arabia, UAE, Bahrain,
and Kuwait claim that Qatar has maintained unacceptably cordial
relations with Iran, has worked to promote terrorist activity, and has
meddled in the internal affairs of its neighbours. The countries have
asked Qatar to shut down its agship media channel, Al Jazeera. This
diplomatic impasse remains.
90 M. M. Cyrill and A. K. Pasha
during the aftermath of the neighbourhood uprisings (from
2011 onwards), and successfully maintained the countrys
political stability. Carrying forward the example of the
ongoing GCC crisis with Qatar, political advocacy initiatives
involve UAE diplomats and royal ofcials convincing for-
eign publics, including those within the GCC, about the
validity of their claims.
More generally, public diplomacy initiatives under this
category attempt to secure the cooperation of leaders of other
countries, and minimise chances of the latter facing a
domestic backlash over unpopular actions. For instance,
after the takeover of Crimea in 2014, a move towards his-
torical validation was made by Russian state media, creating
an alternative perspective that might be accepted by people
in the countries that are seen as its allies.
4.4 E-Diplomacy
The application of internet media to the eld of diplomacy
has happened in the domain of public diplomacy as it is the
branch that interacts with societies at large. This channel of
diplomatic interaction is popularly and variously referred to
as e-diplomacy, digital diplomacy, cyber diplomacy, or even
Twitter diplomacy. Further, the expansion of this interface
between diplomats and political gures on one hand, and
foreign and domestic publics on the other, reduces the
insularity of traditional diplomacy.
Use of internet tools like social media transcends the
hierarchy of diplomatic communication, and includes ordi-
nary people in the political process by engaging in direct
(albeit not face-to-face) and sometimes sustained dialogue
instead of the previous process of unidirectional messages
either through holding events, signing Memoranda of
Understanding (MoU), making speeches, or publishing
articles. Also, by virtue of its interactive operability and its
instant ability to share content, messaging and signalling by
diplomats and political actors on social media are now
exposed to immediate and universal scrutiny.
An array of amusing and bemusing instances become part
of the 24-hour news cycle as such actions or inactions are
labelled political or diplomatic faux pas at best, or dominate
the conversation at worst because it deprives the government
of control over its own policy narrative. This could be a
handshake, a mistaken or awkward or unsuitable gesture, or
statements made in an emotional or excited state, or errors
made during live tweeting. Once the image is clicked or
post updated or tweet sent, the rapidity of access can spin the
issue out of control. Here again, Americas experiences
under the Trump presidency can prove to be instructive to
those who study and practice public diplomacy via the
internet domain.
4.5 Cyber Security
The rapid expansion of the internets user base has left it
more vulnerable to attacks and underhanded forces than ever
before. This includes deliberate strategies such as the use of
trolls and botsas explained in the previous section, mis-
information campaigns like fake news, online content like
memes and photoshopped images meant to iname its
audience, and the work of hackers such as the Wikileaks and
the e-mail leaks of high-ranking ofcials during the US
elections, among others.
All of these present a whole host of threats to todays
diplomats who necessarily share sensitive information
through online networks, and may inadvertently expose
themselves or their states agendas. The accusations hurtled
between the UAE and Qatar in 201718 is a useful
case-in-study.
4.6 New Imperatives for Diplomatic Training
Diplomatic corps around the world are now having to be
trained and retrained to function effectively in this
all-information, all-the-time ecosystem of the internet.
Nirupama Rao, Indias foreign secretary from 2009 to 2011,
makes some insightful observations in this regard. She
observes how the diplomat has become naked with his/her
smartphoneexposed at all times, and subject to the over-
sight of whole social media platforms whose subscribers
equal the populations of large-sized countries.
As Rao notes, The demands of openness and trans-
parency in policy deployment and articulation, real-time
communication, countering fake news and alternative facts
in a post truth world, clarity and conciseness, are all upon
diplomacy[20]. The Australian security specialist, Rory
Medcalf, further notes, The job descriptions for hacks,
spooks, diplomats and wonks are becoming less and less
distinct when a crisis or event breaks across the 24 hour
information cycle, pioneers from each profession nd
themselves turning to fast-paced, exible social media
Twitter, blogs, Facebook, YouTubeto help make and
project succinct meaning in a world of noise[20].
Thus, modern day practitioners of diplomacy must not
only possess the ability to communicate clearly, courteously,
concisely, and comprehensively; they need to be trained in
the use of technology and online tools, to keep abreast and
Diplomacy in the Internet AgeChallenges and Opportunities 91
ahead of the news cyclein order to secure the states
control over its agendas.
5 Geopolitical Challenges Facing UAE
DiplomacyA Brief Examination
The Arabian Gulf states perceived the 1979 Iranian Revo-
lution as having destabilised the regional security architec-
ture. To contain revolutionary Iran, countries in the Arab
Gulf formed the Gulf Cooperation Council (GCC) in 1981,
and supported Iraq in its war with Iran from 1980 to 1988.
While, subsequently, these states tried to normalize ties with
Iran, the 1991 invasion of Kuwait by Iraqi forces perma-
nently changed the security conguration of the region.
In the following decades, the terrorist attack on US soil
on September 11, 2001 acerbated regional tensions to some
degree, although, the 2003 invasion of Iraq by American
forces is what eventually precipitated geopolitical conse-
quences that have since shaken the security mapping and
defence architecture of the region. This is because with the
downfall of President Saddam Hussein in Iraq, the country
once a powerful international and regional actorfell into a
political and security vacuum, resulting in ghting between
competing groups from different ethic and sub-religious
communities.
Ultimately, distance and costs of war shaped American
post-war reconstruction efforts in Iraq where the support of a
Shia (and presumably pro-Iranian) candidate as president of
Iraq shook the strategic calculus of Sunni Arab kingdoms in
the GCC, namely, Saudi Arabia, UAE, Bahrain, Kuwait,
Qatar, and Oman. This is because some of these Arab Gulf
states anticipated an increase in Iranian inuence in Iraq,
alongside its efforts in Syria, its support of the Shia militia
group Hezbollah, Hamas in Palestine, and Shias in Bahrain
and elsewhere in the region.
The Arab uprisings of 2011 further stoked anxiety in the
GCC kingdoms, which have been known for their political
stability and relative economic security and wealth. In the
aftermath of the uprisings, Irans participation in Iraq and
intervention into Syria through the Hezbollah militia, as well
as the rise (although short lived) of the Muslim Brotherhood
and President Morsi in Egypt, caused the GCC states to
bolster their security diplomacy. A Shia crescent was added
into the regions geopolitical lexicon (by the Jordanian King
Abdullah), based on threat perceptions of Irans political
ambitions; a fear invoked due to Irans constant appeal for
regional prominence (as communicated by its previous
President Ahmadinejad as well as its Ayatollah), and despite
the Western sanctions imposed on it due to its nuclear
program.
Iran still continues to be considered a formidable threat;
particularly since the diplomatic opening overseen by the
previous US President, Barack Obama. In the context of the
UAE, Iran has refused to meet the Emiratesdemand to
vacate its three islands, which it forcibly occupied in 1971
when the British colonial forces withdrew from the Gulf
region. Although Dubai has considerable commercial ties
with Iran due to Western sanctions on Tehranthe death of
King Abdullah of Saudi Arabia and succession of King
Salman and inuence wielded by his son, Crown Prince
Mohammad bin Salman, as well as the backdrop of the Arab
uprisings, emergence of ISIS in Iraq and Syria, and growing
religious extremism in the regionhas changed diplomatic
and foreign policy objectives for the UAE.
Increasingly, and more publicly, the Emirate of Abu
Dhabi and Saudi Arabia seek to ll the regions leadership
vacuum, more so in the context of Americas strategic retreat
from the region under erstwhile President Obama. After the
visit of the new US President Donald Trump to Saudi Arabia
in May 2017, the UAE retook the initiative, and with Saudi
Arabia, launched an activist foreign policy that resulted in
two situations of recent note. First, it joined Saudi Arabias
intervention on behalf of the Yemeni regime in Sanaato
ght Houthi rebels and the armed forces swearing allegiance
to the ousted President Saleh. Second, it engineered the
diplomatic alienation of Qatar over the countrys perceived
support of enemy actors such as the Muslim Brotherhood
and Iran. This led to somewhat closer ties with President
Trumps USA. Nevertheless, the challenge facing the con-
duct of diplomacy by any state in the region is to keep apace
of the multiple and parallel role of external and non-state
forces and their inuence.
Currently, the UAE enjoys stable and thriving relation-
ships with the EU and India. The UAE remains focused on
building its strategic depth, fostering ties with security allies
like Saudi Arabia and Egypt, and establishing a diversied
and technologically advanced economyall of which have
reshaped its international and bilateral relationships. It
appears that the UAEs political and strategic position is
much better under the new circumstances.
6 Conclusion
The transformative changes to the internet and its enabled
technologies present an array of threats and opportunities for
the eld of diplomacy. This is also the case with the UAE,
where, in addition to the general impact of the internet
ecosystem on diplomacy, it confronts geopolitical challenges
as well. These political and security threats can adopt
internet-based tools to further test Emirati diplomatic
imperatives, such as through external media propaganda
shared online. Nevertheless, the developments in ICT will
not move backwards, and diplomats in todays corps need to
be trained or retrained in the use of internet-enabled
92 M. M. Cyrill and A. K. Pasha
technologies to minimise their exposure to various online
threats, such as fake news, hacking attacks, unaccounted
facts, and extremist views masquerading as legitimate
opinions. Finally, geopolitics is always in a state of ux, and
the Arab world is unfortunately a tragic entanglement of
states as well as non-state actors at odds with each other.
The UAE, with its striving towards a progressive national
character and being an oasis of calm, will need to adopt
sophisticated diplomatic techniques, such as online civic
engagement to ensure that its public image stays true to the
narrative intended by its government.
References
1. Gunter, B., Elareshi, M.: The signicance of social media in the
Arab world. In: Gunter, B., Elareshi, M., Al-Jaber, K. (eds.) Social
Media in the Arab World Communication and Public Opinion in
the Gulf States, p. 7. I.B. Tauris, London (2016)
2. Schryer, M.: GCC mobile markets. TechPolis Res. Note 7,27
(2015)
3. Internet World Stats: Usage and Population Statistics, http://www.
internetworldstats.com/emarketing.htm, Last accessed 20 Mar 2017
4. Constantinou, C.M.: On the Way to Diplomacy, 1st edn.
University of Minnesota Press, Minneapolis (1996)
5. James, A.: Diplomacy and international society. Int. Relat. 6(6),
931948 (1980)
6. Bjola, C., Kornprobst, M.: Understanding International Diplo-
macy: Theory, Practice and Ethics. Routledge, London (2013)
7. Salem, F.: The Arab social media report 2017. MBR School of
Government, Vol. 7, Dubai (2017)
8. The National: http://www.thenational.ae/uae/technology/uae-youth-
addicted-to-social-mediagraphic, Last accessed 20 Mar 2017
9. UAE Ministry of Cabinet Affairs: http://www.mbrsg.ae/
getattachment/0162a279-89b3-466b-bf1d-c9544b68fc3d/From-Majlis-
to-Hashtag-The-UAE-National-Brainstorm.aspx, Last accessed 20
Mar 2017
10. Akdenizli, B.: A snapshot of how foreign ministers in the gulf use
twitter. USC Center on Public Diplomacy Blog (2017), https://
uscpublicdiplomacy.org/blog/snapshot-how-foreign-ministers-gulf-
use-twitter, Last accessed 29 May 2017
11. Introduction to web 2.0 technologies: http://www.ictliteracy.info/
rf.pdf/Web2.0_Introduction.pdf, Last accessed 23 May 2017
12. Castells, M.: Networks of Outrage and Hope Social Movements in
the Internet Age, 1st edn. Polity Press, Massachusetts (2015)
13. Kittilson, M.C., Dalton, R.J.: The Internet and virtual civil society:
the new frontier of social capital, http://escholarship.org/uc/item/
2cj1c67k, Last accessed 2017/8/2
14. Siegel, P.C.: Perception management: IOs stepchild. In: Armis-
tead, L. (ed.) Information Warfare: Separating Hype From Reality,
p. 28, 1st edn. Potomac Books, Inc, Nebraska (2007)
15. Obar, J.A., Wildman, S.: Social media denition and the
governance challenge: an introduction to the special issue.
Telecommun. Policy 39(9), 745750 (2015)
16. Powers, S., Hensman, C.: Can public diplomacy survive the
internet? USC Center on Public Diplomacy Blog (2017), http://
uscpublicdiplomacy.org/blog/can-public-diplomacy-survive-internet,
Last accessed 22 Aug 2017
17. Parris, M., Bryson, A.: Parting Shots, 1st edn. Penguin, London
(2010)
18. Smith, R.F.: The Craft of Political Analysis for Diplomats, 1st edn.
Potomac Books, Dulles, VA (2011)
19. Allcott, H., Gentzkow, M.: Social media and fake news in the 2016
election. J. Econ. Perspect. 31(2), 211236 (2017)
20. The Wire: https://thewire.in/158962/foreign-relations-diplomacy-
social-media/, Last accessed 19 July 2017
Diplomacy in the Internet AgeChallenges and Opportunities 93
Enterprise Product Management
in the Digital World
Zornitsa Nikolova and Roumiana Antonova
Abstract
In the digital era, businesses in any industry are being
transformed fundamentally to stay competitive. Innova-
tion is increasingly shaped by changes in technology,
development methodologies, and the ways in which
consumers make purchase decisions, demanding changes
throughout the entire lifecycle of a digital product. The
lifecycle of digital products becomes more and more
complex with the need to embrace new business models
for creative businesses, including the increasing role of
business networks and collaboration to offer related
products and services. Product management in the digital
world is thus transformed to include data-driven decision
making, collaborative ownership, incremental thinking,
and continuous learning.
Keywords
Strategic management Innovation Intrapreneurship
Creative business Enterprise product management
1 Introduction
This paper discusses the impact of the digital transformation
on enterprise product management, particularly in product
companies that adopt digitalization to transform their busi-
ness models, or are offering products that help other com-
panies in their digital transformation journey. In this process,
innovation is increasingly shaped by changes in technology,
development methodologies, and the ways in which con-
sumers make purchase decisions, demanding changes
throughout the entire lifecycle of a digital product from its
conception, through creating product vision, strategy, road-
map, implementation plan, to its pricing, positioning and
ongoing innovation. The lifecycle of digital products
becomes more and more complex with the need to embrace
new business models for creative businesses, including the
increasing role of business networks and collaboration to
offer related products and services.
Yet, enterprises that have been on the market for years
seem to be managing their products using traditional para-
digms, which have worked previously but are not suited to
serve companies in their way forward. The questions that are
discussed in this paper are:
1. What are the changing requirements of the digital world
to product management in enterprises?
2. What are the methods, tools and frameworks that need to
be put in place in enterprises to enable the intrapreneurial
development of successful products for the digital era?
2 Digital Transformation and Implications
on Product Management
The term digital transformationhas become widely used,
yet to understand the impact that it has on every aspect of the
organizations operations, we need to look at its denition.
A good denition is provided by IMD:
Digital Business Transformation is Organizational
Change through the use of Digital Technologies and Busi-
ness Models to Improve Performance[1].
This denition implies that the transformation enabling
business to use technology for achieving better results is also
related to profound changes of processes and business
models changes that require also building different mindsets
and behaviors in the people who work for the organization.
It is a transformation happening in the context of high
dynamics on the market and in the technological sphere,
Z. Nikolova (&)
Leanify Ltd., Soa, Bulgaria
e-mail: zornitsa.nikolova@leanify.com
R. Antonova
Faculty of Mathematics and Informatics, Soa University, Soa,
Bulgaria
e-mail: dr.Antonova@t-online.de
©Springer Nature Switzerland AG 2019
A. Al-Masri and K. Curran (eds.), Smart Technologies and Innovation for a Sustainable Future,
Advances in Science, Technology & Innovation, https://doi.org/10.1007/978-3-030-01659-3_13
95
which imposes the need for high-speed innovation and
delivery. Furthermore, the change of business models affects
how products and services are dened and managed
throughout their entire lifecycle, and this is an implication
that we are discussing next.
2.1 Rethinking the Product Lifecycle Model
for Digital Products
A traditional product lifecycle model, as described in
research literature comes from a product sales perspective
and reects the life of the product in the marketplace (see
Fig. 1). It starts at the point when the product is rst intro-
duced to the marketplace as a complete product offering, and
goes through a phase of market growth until it reaches its
peak at the product maturity level.
In this model, product development is not considered part
of the product (sales) lifecycle. However, in this paper, we
argue that it is a rather reactive model serving only partially
to the concept of product management, as it addresses
mostly launch and post-launch activities in a more or less
traditional business model for digital products. We believe
that a technology product that may be delivered as a com-
ponent of different business models, such as on-demand
offering, or as part of a full-service delivery, actually starts
its life much earlier. This is further emphasized as the pro-
duct development discipline evolves to include customer
co-creation paradigms, where customers are exposed to the
product in its early stages, and actively participate in its
creation.
Furthermore, the lifecycle of a product may not follow a
linear ow, as the product might be enhanced or offered
through a changed business model later in its lifecycle,
which may actually change the line of its lifecycle devel-
opment. A proactive model requires that we discuss the
product lifecycle from a broader perspective starting with the
product discovery phase, which requires identication of
opportunities, and shaping the product as a solution to a
discovered problem. We also need to reect the opportuni-
ties that technology and new business models provide for
extending the maturity line and opportunities on the market
for this product. Hence, a redened product lifecycle concept
looks as depicted in Fig. 2.
Through an extended product lifecycle model the goal is
to extend the period of the product lifecycle, during which
the product actually generates value (by introducing it as
early as possible, already in the development phase, and by
extending the maturity phase with sustaining innovation, as
dened by [2]), and optimize investment during the product
lifecycle, so that return on investment is maximized, and the
enterprise can free up resources for subsequent innovation.
2.2 Implications for Product Management
in Enterprises
Product management is a discipline that is not very strictly
described and understood. As we are talking about digital
products, we would like to leverage the framework dened
for software product management by the International
Software Product Management Association (ISPMA) [3]
see Fig. 3.
The ISPMA product management framework describes
the key areas where product managers operate and take
decisionsthese are partially strategic management (mostly
for market analysis and product analysis), product strategy
and product planning. The other activities required for a
successful product development, marketing, sales and dis-
tribution, service and support, the product manager is an
orchestrator, a central gure that directs and aligns all
stakeholders in the process. Dened like this, the product
manager shall take on mostly strategic decisions, while
navigating and supporting operational activities.
A recent survey conducted by [4] however, shows that in
more than 50% of the cases product managers are primarily
tactical players, rarely engaged in real strategic decisions.
The extended product lifecycle model that we discussed
Fig. 1 Traditional product lifecycle model Fig. 2 Extended product lifecycle
96 Z. Nikolova and R. Antonova
above, creates a few implications on how the product manager
shall engage and navigate the product lifecycle particularly, it
puts a lot more focus on the product discovery and develop-
ment phase, which is now part of the value generation curve as
well, combined with a change of major decision-making
paradigms used to manage product lifecycle.
While traditionally, investment decisions have been made
based on forecasts about market realization and engineering
cost, and a go decision typically results in a development
project, during which the organization is focused to produce
the product without caring to check or challenge the previ-
ously made forecasts, extending the lifecycle means being
able to check and adapt assumptions and forecasts much
earlier, before major investments have been made. These
approaches transform the subsequent product development
steps from a linear into an iterative model, which requires a
change in how the lifecycle is being managed. Furthermore,
they put more focus on the strategic role played by the
product manager from the very start of the product lifecycle.
In addition, the possibilities to extend the product life-
cycle through maturity dene a longer engagement for the
Product Manager in sustaining innovation activities. Being
often referred to as mini-CEO [5], the Product Manager
becomes a true owner and long-term strategic thinker when
it comes to taking the maximum out of the product.
Product management in the digital world is thus trans-
formed from a plan-driven, carefully organized process to an
experiment and learning-driven, iterative work, which
requires a change in organizational culture and mindset to
enable collaborative ownership, incremental thinking, and
continuous learning. Such a culture is characterized by:
Data-driven decision making empowered by technolog-
ical advancements, such as big data, machine learning,
and articial intelligence
Customer proximity and ongoing stakeholder collabora-
tion, as well as early participation of technology experts
in strategic-level initiatives
Rapid innovation through iterative road mapping, plan-
ning, and development based on feedback loops, com-
bined with end-to-end orchestration of product-related
activities throughout the entire product lifecycle.
Fig. 3 ISPMA product management framework
Enterprise Product Management in the Digital World 97
2.3 Data-Driven Decision Making
Enterprises are in the favorite position of having a lot of
customer data already gathered, and also having the
resources to enable gathering even more targeted data.
According to an MIT research [6] however, companies lack
the capabilities and skills to use big data for their purposes.
At the same time, [7] has published a number of case studies
that show the opportunities with respect to using data to
enhance opportunities for business.
In a product management context, such opportunities can
transform into identifying now unmet needs of existing
customer base, and addressing them with new products, or
adding more value streams to existing business models. For
example, the business model for a platform solution might
be extended with additional product assets, such as content
delivered as a separate add-on based on analysis of the use
cases of existing customers with the help of collected and
analyzed usage data. Alternatively, an extension of the
business model might involve collaborating with third-party
vendors to create ecosystems and thus more attractive value
proposition.
2.4 Collaboration
The increased focus on achieving market t as early as
possible further stresses upon the role of the PM as an
orchestrator of various product-related activities, and pushes
towards early inclusion of different stakeholders into the
product lifecycle activities to prevent unnecessary iterations,
increase information at any point, and minimize wasted
effort. This means that roles such as development or mar-
keting, that are typically engaged much later in the process,
in the new setup will need to get involved early and provide
their knowhow to design and run meaningful experiments.
For example, including marketing and sales experts in pro-
duct discovery activities, including market and competitive
product analysis brings additional perspective that is valu-
able for creating a viable and desirable product offerings.
These stakeholders can provide valuable input and feedback
during product development phase, and also bring important
insights from the market in subsequent product innovations.
2.5 Iterative Work
Adopting the mentality of fast experimentation aimed at
getting the product on the positive sales curve as early as
possible, easily excludes the idea of plan-driven product
activities in any part of its lifecycle. Product discovery is a
naturally iterative work, as it requires that a lot of experi-
ments are planned, executed, and run in short periods of
time. Incremental thinking needs to be kept in subsequent
phases though, as it enables transparency into the value
buildup to the point when the product is marketable and can
start delivering value. A plan-driven approach here means
locking this opportunity into a relatively long and linear
product development process, which is counterproductive to
the goal of minimizing time-to-market and kicking off value
generation. When applied to the overall way of planning and
managing the product lifecycle, iterative work means setting
a long-term vision for the value that the product shall create,
and working towards this vision with a series of shorter-term
operational goals dened in an iteratively developed and
re-assessed product roadmap, which focuses on specic
desired outcomes and metrics to assess success rather than a
plan for specic features to be implemented in the product.
3 Methods, Tools and Frameworks
Methodologies, such as Agile software development, Lean
Startup, and Design thinking are already largely familiar and
applied in a number of companies, including large enter-
prises. Their application however is often localized to
specic departments and specic phases of the product
lifecycle. For example, Agile methods are being used in the
product execution phase to speed up delivery, while design
thinking and lean startup concepts are applied in the initial
phases of product discovery, and might be done by separate
innovationdepartments. Thus inn ovation creation and
product management remain separated as the product dis-
covery phase is separated from the rest of the lifecycle
(creative as opposed to execution phases). These applica-
tions focus mostly on the project management aspect while
product management implications remain partially addressed
and understood. In this paper, we look at the potential that
these methodologies bring to product management from the
perspective of the entire product lifecycle and the required
orchestration by product management. A holistic approach,
incorporating product conception phase into the overall
product lifecycle, and taking advantage of development
methodologies supported by technological advancements
such as big data, will reshape the product management role
into a more entrepreneurial and strategic paradigm, consis-
tently integrating execution into an iterative model of pro-
duct development and launch.
The concepts that we discuss in this paper, applied sys-
tematically and consistently throughout the product lifecycle,
support the needs of product managers for a learning-driven
process. They are based on collaboration and inclusion of all
major stake-holders in the processhence, the role of the pro
duct manager as a driver and an orchestrator of different
activities is additionally strengthened.
Lets look at the separate concepts briey.
98 Z. Nikolova and R. Antonova
3.1 Lean Startup
Lean Startup [8] is a methodology that has evolved around
the specic management needs of starting businesses. It
builds on 5 key principles:
1. Entrepreneurs are everywhere
2. Entrepreneurship is management
3. Validated learning
4. Innovation accounting
5. Build-measure-learn
The build-measure-learn loop (Fig. 4) is related to the
concept of Minimal Viable Product (MVP)a minimal
subset of the product and its features needed to run a specic
experiment and collect data, so that we can proceed to the
next step of learning.
A publication from 2014 [9] presents a review of com-
panies that apply Lean Startup methods and suggests as key
benets the formation of entrepreneurial culture within the
enterprise, as well as the creation of products customers
love.
Lean Startup is mostly associated with disruptive innova-
tion and completely new products. Hence, its application in the
product discovery phase is essential to support the organiza-
tion into identifying products that are worth investing in.
Many traditional organizations face the challenge of nding
truly innovative ideas while ltering out projects that do not
satisfy the innovation criteria for viability, desirability, and
feasibility. Lean Startup is a model that addresses these chal-
lenges. In companies applying these principles, product
managers work with their teams early on to analyze the mar-
ket, and start experimenting with it to nd a problem/solution
t, and later a market t as well. In some organizations, this is
done in specic innovation teams that work on ideas and then
hand over for delivery to other departments.
This approach works when we are talking about new
products. However, we consider Lean Startup a necessary
philosophy for any product development, even in established
markets and domains as a way to focus product managers on
optimizing return on investment throughout the entire life-
cycle of the product. Applying a validated learning mecha-
nism through the already established channels of the
enterprise can benet the sustaining innovation of existing
products, so that better investment decisions are made. One
example of such application is a product, which has reached
a plateau of sales. The product manager uses data collected
through the existing customer base to identify major use
cases and identify major investment opportunities for the
next releases. An MVP is then created for the new capa-
bilities that are planned for the product, and further experi-
ments are run to collect data from the customers and make
decisions as to which are the next features with expected
signicant return on investment that shall go into the
roadmap. This requires that product managers in the orga-
nization are familiar with the approach and have access to
the data they need to run experiments and take decisions.
The Lean Startup movement has spurred the creation of a
series of tools and practices that can nd their way into how
enterprise products are being created and extended. The
Lean Canvas [10] is an instrument that can be used for initial
mapping of product-related ideas, but it is also a helpful
instrument when it comes to extending features and devel-
oping the product further along its maturity line. The canvas
is also a valuable tool for identifying potential business
model changes that can impact the product lifecycle as well,
such as offering additional services or product supplements
through a business network. One example is identifying
business content as part of the value proposition of an
already existing enterprise business system, and nding
partners in the ecosystem who can provide such content.
3.2 Design Thinking
Design thinking is a process for creative problem solving. In
the context of product management, it is an instrument that
combines very well with the Lean Startup and Agile para-
digms and provides a structured approach to examining the
problem domain and providing tested solutionsthat is, it is
an excellent approach that can be applied when looking for
solution and market t.
The process goes through ve steps (Fig. 5), and we can
iterate between any two steps as long as we have identied
Fig. 4 Lean startup cycle
Enterprise Product Management in the Digital World 99
the need to go back and change our starting point. This is
done until the problem is well-dened in a Point of View
(POV), and a prototype is successfully tested with the target
potential users. Design Thinking uses a toolbox that supports
the development of empathy and shared understanding in the
team about the problems being solved and the added value
provided with the solutions, such as personas, customer
journey maps, storyboards, and so on.
As with Lean Startup, Design Thinking is primarily used
in the initial phase of product discovery. However, it can be
applied at a later stage too for examining specic problems
that the product needs to address with its subsequent inno-
vation. For example, a decision about investing into a mobile
application or a desktop application for a specic function of
an enterprise product requires good understanding of the
need and potential users. This is a good use case for applying
design thinking, and it may come at a relatively late stage
from the product lifecycle, for example when considering
sustaining innovations that can keep the product competitive
on the market, thus extending its maturity phase. Further-
more, the artefacts created as part of the design thinking
process, such as customer personas or journey maps, are
valuable instruments for addressing sustaining innovation
through enriching customer experiences and extending value
propositions. Both Lean Startup and Design Thinking are
concepts that focus product managers on fast learning
through experimentation and testing.
3.3 Agile Methodologies (Scrum)
Complementing knowledge of Lean Startup and Design
Thinking concepts with understanding of Agile processes
creates a framework for execution of the product manage-
ment functions in an iterative way. Scrum is a framework for
complex project execution. It denes 3 roles, a few rules,
and a simplied process model, which can be applied to any
type of activities that require team work in a dynamic
environment. It is based on iterative incremental approach,
which facilitates the process of designing and running
experiments, and building up a validated product [11].
Using Scrum as a methodology for governing the product
development phase is already a standard. According to
recent surveys conducted by Version 1, the majority of
surveyed companies apply Scrum or a modication of
Scrum for product delivery.
Scrum however, does not explicitly cover the point of
product discovery, and therefore needs to be combined with
the previously discussed methods, so that we can cover the
end-to-end product lifecycle. The product discovery work,
based on the principles of Lean Startup and following the
Design Thinking process, can however be organized and
executed according to Scrum rules. For example, experi-
ments related to identied product risks can be planned and
run in weekly iterations [12]. Subsequent product manage-
ment work on clarifying detailed requirements and preparing
them for execution can also run in iterative mode.
Work in iterations with frequent feedback cycles enables
product managers to transform their work completely and be
much more exible with respect to changes in the market. It
enables inspection and adaption for all major artifacts related
to the product lifecycleroadmap, backlog, marketing and
sales material. An iterative approach to road mapping is
described by [13] with the Goal-Oriented (GO) roadmap
framework. It integrates the principles of validated,
metrics-based learning from the Lean Startup model with the
idea of iterative development from Agile, to dene a new
road mapping model based on setting product goals, rather
than specifying features.
This leaves space for experimentation and adaptation
according to results, and leads to products that are designed
to respond to identied needs and achieve the market targets
set by the organization. Product backlogs are lled and
prioritized according to these goals and the learning done in
each iteration. Last but not least, marketing and sales
Fig. 5 Design thinking process
100 Z. Nikolova and R. Antonova
activities and materials can be iteratively designed based on
iterative product roadmaps to achieve better results as well.
With marketing and sales stakeholders involved in the pro-
cess as early as product discovery and development, learning
for them happens also throughout the entire lifecycle,
bringing marketing and sales much closer to product man-
agement and aligning communication across the
organization.
3.4 Putting Tools Together
The tools and methods discussed above have evolved around
specic needs discovered with respect to creating and
managing products but they are mostly seen as product
development tools. Looking from the perspective of the
extended product lifecycle and the Product Management
needs thereby, those tools can be applied throughout the
entire lifecycle and support the creation of culture that
empowers experiments, learning, and value discovery at any
point of the product managers journey. Figure 6outlines
the potential for such applications.
3.5 Examples of Application
Examples of how these concepts are applied can be found in
large enterprises such as SAP. The company has been using
Agile methods to manage its development processes for
more than 7 years, and in the past years has complemented
its toolset by applying design thinking in the product dis-
covery phase, as well as throughout the process of creating
its products. These are also complemented by Lean Startup
concepts to create a build-measure-learn cycle [14]. Design
thinking combined with Lean and Agile principles lies
behind the evolution of the latest SAP products, innovating
core ERP offerings and delivering more value to new and
existing SAP customers [15].
The author of this paper has several personal examples of
applying these concepts in a large enterprise. One of them
comes from a product that was assessed as reaching the
decline phase and being considered for sunsetting. Road-
maps were being developed for replacing it by a third-party
solution. While testing the direction with current product
users, product management received a very negative reac-
tion, and considered a different approach. Using the tools
provided by Lean Startup, namely Lean Canvas, the product
was reassessed against its major target users and the prob-
lems that were being solved. New opportunities were spotted
for extending the solution with new mobile capabilities, so
that it becomes competitive and can generate additional
revenue. These opportunities were further developed and
assessed through a series of experiments, using Design
Thinking approaches to rene personas and come to a
desirable, viable, and feasible product offering. The experi-
ments were based on data collected previously from the
current users, as well as additional data, collected in testing
with new potential users of the product. As a result, an add
on was created, which triggered new revenue streams and
effectively extended the legacy product lifecycle while
adding value to the organization as a whole.
A similar example from a different domain involved
rediscovering the needs of current customers and providing a
new generation of an already existing solution that is better
targeted to support clients into their changing business
environment. Applying design thinking as a starting point to
understand the target customer domain, and identify per-
sonas and their specic needs, the team working on the
product managed to establish a point of view that helped in
designing a rst beta version of the product. It was then
tested with a selected group of customers, so that the team
can measure the prototype against specic criteria for suc-
cess. The beta version, as well as subsequent development of
the product was executed in iterative Agile mode, so that
frequent deliveries can be ensured and constant feedback can
be collected. As a result, rst customers were recruited
already during the development phase, and implementation
project started immediately after the MVP was released.
4 Conclusion
We believe that enterprise product management in the digital
world is faced with different requirements that stem from a
product lifecycle, which is extended and develops itera-
tively. With respect to the main questions that we set in the
beginning of the paper:
1. What are the changing requirements of the digital world
to product management in enterprises?
Fig. 6 Tools and methods
Enterprise Product Management in the Digital World 101
Product management in the digital world is transformed
from a plan-driven, carefully organized process to an
experiment and learning-driven, iterative work, based on
data-driven decision making, customer and stakeholder
collaboration, iterative and incremental development with
quick feedback loops. Product managers need to be engaged
more with strategic decisions based on experimentation and
learning throughout the entire product lifecycle.
2. What are the methods, tools and frameworks that need to
be put in place in enterprises to enable the intrapreneurial
development of successful products for the digital era?
Product management in enterprises can leverage a set of
methodologies that have emerged to serve the needs for
innovation and customer-driven development, such as Lean
Startup, Design Thinking, and Agile methodologies. They
need to be applied systematically throughout the entire life-
cycle to enable a learning-driven iterative process and opti-
mize investment decisions at any point in the product lifecycle.
References
1. Wade, M.: Digital Business Transformation. A Conceptual Frame-
work. IMD website, http://www.imd.org (June 2015)
2. Christensen, C.: The Innovators Dilemma: When New Technolo-
gies Cause Great Firms to Fail (Management of Innovation and
Change). Harvard Business Review Press, Boston (2000)
3. ISPMA: www.ispma.org (2017). Last accessed 11 Sept 2017
4. 280 Group Website. https://280group.com/landing-pages/signup/.
Last accessed 20 Aug 2017
5. Gnanasambandam, G., Harrysson, M., Srivastava, S., Wu, Y.:
Product Managers for the Digital World. McKinsey Website.
http://www.mckinsey.com/industries/high-tech/our-insights/
product-managers-for-the-digital-world (May 2017)
6. LaValle, S., Lesser, E., Shockley, R., Hopkins M.S.,
Kruschwitz N.: Big Data, Analytics and the Path From Insights
to Value. MIT Sloan Management Review, Winter 2011
7. Gourevitch, A., Faeste, L., Baltassis, E., Marx, J.: Data-Driven
Transformation: Accelerate at Scale Now. BCG Website. https://
www.bcg.com/publications/2017/digital-transformation-
transformation-data-driven-transformation.aspx (May 2017)
8. Ries, E.: The Lean Startup: How Todays Entrepreneurs Use
Continuous Innovation to Create Radically Successful Businesses,
1st edn. Crown Business, New York (2011)
9. Gaffney, S., Lin, S., Miller, K., Nilsson, H., Ravala, S., Unnikr-
ishnan, M.: Lean Startup Methodology for Enterprises: How
Established Companies Can Leverage Lean Startup Methodology
for Sustaining and Disruptive Innovation. Engineering Leadership
Professional Program, UC Berkley (2014)
10. Maurya, A.: Running Lean: Iterate from Plan A to a Plan That
Works, 2nd edn. OReilly, CA (2012)
11. Scrum Guide Website. http://www.scrumguides.org/. Last
accessed 29 Aug 2017
12. Knapp, J., Zeratsky, J., Kowitz, B.: Sprint: How to Solve Big
Problems and Test New Ideas in Just Five Days. Simon & Schuster
(2016)
13. Pichler, R.: Strategize: Product Strategy and Product Roadmap
Practices for the Digital Age. Pichler Consulting (2016)
14. Reynard, R.: Medium.com, https://medium.com/sap-tools/
continuous-design-thinking-9a7c2530f6e0. Last accessed 22 Oct
2017
15. ODonnell, J.: TechTarget.com, http://searchsap.techtarget.com/
feature/SAPs-Sam-Yen-on-how-the-design-thinking-process-
drives-innovation. Last accessed 23 Aug 2017
102 Z. Nikolova and R. Antonova
ERP Security, Audit and Process
Improvement
Roumiana Antonova and Georgi Georgiev
Abstract
The ERP systems have rapidly increasing role for the
success of modern business. They are subject of rapid
development process and rapidly spreading with increas-
ing rate. In now days the typical ERP system has a much
better functionalities than its predecessors and also relays
on complex it infrastructure, frequently combining a wide
set of IT technologies. Security of the ERP system is an
important aspect of the entire system and must be
properly maintained in order to achieve reliable and
secure operation of the entire system. The security of an
ERP system should not be regarded as a summary of the
security of its components, but as a complex ecosystem
comprised of multiple different layers, which also have a
complex dependencies and relations between each other.
There are also the processes of user identity and rights
management that are a considered as an integral part of
the overall security. Once congured, the security of the
ERP systems could not be regarded as constant but
evolves along with the challenges caused by increased
numbers, severity and complexity of security threats
present into the digital world. In order to mitigate the
effects of such threats the security ecosystem of an ERP
solution and its components should be a subject of regular
audit and reviews to be able to be maintained at sufcient
level.
Keywords
ERP system Security Multilayer Policy
Deployments User rights Identity management
1 Introduction
The dynamics of modern business causes the need for vir-
tually every company, regardless of its size and business
area to use a variety of ERP systems. The successful
implementation and operation of the ERP system nowadays
become a critical factor for fail or success for the company
using it.
Along with the explosive growth of IT systems and
software technologies during the last decade, it is also wit-
nessed a dramatically increase with the number, severity and
complexity of the global cyber-attacks and threats.
Generally, the ERP systems tend to be vulnerable as a
potential victim of such threats, which makes mandatory the
integration of sophisticated and versatile security manage-
ment solutions and processes for all ERP components and all
layer of the ERP system. As a consequence, problems with
product integration and compatibility often arise, there might
be signicant increase with the costs of implementation of
the ERP systems and overall increase with the Total Cost of
Ownership (TCO). It also occurs the need for centralized
management of the entire protection system via
well-structured and documented process.
Seeking to mitigate the effects of such problems, many
companies stand up before the choice: to simpler and
cheaper, but less functional security approach (that inevi-
tably provide lower levels of security and cost less) or
implement high-end solution with complete security cover-
age. The attempts to save by the cost of security solutions
can later cause serious nancial losses for companiescore
business and/or impact their reputation.
The optimal security solution should be an introduction
of a unied security platform, incorporating state-of-the-art
technologies and tools to build comprehensive protection of
all IT infrastructure layers with centralized management
capabilities.
A well implemented and operational ERP system is
considered as a key tool for each business to allow efcient
R. Antonova (&)G. Georgiev
Faculty of Mathematics and Informatics,
Soa University St. Kliment Ohridski, Soa, Bulgaria
e-mail: Dr.antonova@t-online.de
G. Georgiev
e-mail: j.y.georgiev@gmail.com
©Springer Nature Switzerland AG 2019
A. Al-Masri and K. Curran (eds.), Smart Technologies and Innovation for a Sustainable Future,
Advances in Science, Technology & Innovation, https://doi.org/10.1007/978-3-030-01659-3_14
103
management of the entire business process lifecycle. Along
with the increasing complexity of existing ERP systems, the
challenges and importance of ERP systems security are also
growing. An effective ERP system must not only meet the
requirements in terms of functionality, performance and
reliability but must be also secure, providing both internal
security and integration with external security solutions.
2 The Holistic Approach to ERP Security
When it comes to the security of an ERP system, the tradi-
tional and most common approach is to evaluate the security
of the core ERP components (databases, application servers,
user access) mostly. Such approach is outdated and due to
this not possible to completely respond to the increasing
challenges of the present reality and needs to evolve.
When evaluating the security of a modern ERP, a more
holistic approach need to be implemented. Such approach
will cover the entire ecosystem of ERP software, the mul-
tiple layers of its underlying IT infrastructure, network
communication, user identity and rights management and the
complex relations/dependencies existing between them, as
illustrated on Fig. 1.
Due to the complexity of the relations of multiple com-
ponents affecting the overall ERP security, it is reasonable to
introduce an abstract multi-layer model representing the
security ecosystem (similar to the OSI Network Layers
model). This abstract model is illustrated on Fig. 2.
A certain ERP system can be implemented/delivered
using different scenarios: On-premises, Cloud based (private,
public or hybrid cloud), Software as a Service (SaaS) plus
multiple additional combinations are available.
Regardless of the delivery scenario, all the ten security
layers participating within the ERP system security model
are present and the need to be properly managed is illus-
trated. In some situations certain layers might not always be
directly exposed or not being easy to distinguished.
Into this security model, the different layers are also
grouped into 3 main groups, in order to make more convenient
matching them with the main implementation scenarios.
2.1 Managing Physical Security
The requirements for achieving a good level of physical
security for the premises hosting physical components of
ERP underlying infrastructure are pretty well dened and
conservative:
Physical Access restriction: the premises must be secured
with a solid locked door, having electronic lock capable
to read biometric data or access cards. The list of
personnel authorized for access must be maintained up to
date and each access event recorded, plus a diary record
added for the actions taken during each visit. An alarm
system must be operational and warn for an unauthorized
access events. It is not considered a good practice such
premises to have windows.
Power supply: according to best practices, there must be
present at last two different power supply sources, linked
to different suppliers. In addition, an uninterruptable
power supply (UPS) must be connected to all equipment,
with a properly calculated capacity to power up all
consumers for a short period (typically several minutes.
Heat management: the premises hosting equipment must
have air cooling system operational and with sufcient
capacity to cool the equipment even when operating at
maximum power and maintain a constant temperature.
Environmental control: a constant control must exist for
some important environmental parameters like sur-
rounding temperature and humidity
Fire safety: the premises must be equipped with
re/smoke detectors connected to an alarm system and an
automated re distinguishing system must be also
available, which system is triggered upon re detection
and uses reagents which are non-aggressive for the
electronic equipment.
For the implementation scenarios, when Cloud hosting or
SaaS are used, typically the physical security is maintained
by the Hosting company and could be easily proved if the
providers data center has passed a standard certication
process.
2.2 Infrastructure Network Security
The Infrastructure Network security is considered as one of
the most important layers in terms of overall application
security, due to it directly affects and is a foundation of the
security of several other layers (Servers, Operating system,
Database, ERP Application). The infrastructure network is
also one of the layers which are most frequently a subject of
cyber-attacks. The network design must be carefully planned
as a part of ERP implementation design and strategy, in a
way to maximize the security and provide sufcient capacity
and performance. There are some core points that need to be
considered:
Network segregation: involves developing and enforcing
a ruleset, controlling which computing devices connected
to the network are permitted to communicate with which
other computing devices
Network segmentation: logically partitioning the network
IP addresses into a small segments, which later is used
104 R. Antonova and G. Georgiev
for dedicated function. For instance the servers must
communicate to storage arrays using separate network
subnet, not visible/available from the other subnets.
The correct implementation of network segmentation and
segregation are minimizing the method and level of access to
sensitive information and signicantly reduce the perimeter
for potential cyber-attack. It can be achieved using some
common methods and techniques to ensure the security of the
network:
Implementing demilitarized zones (DMZ) and gateways
between networks nodes with different security
requirements
Implementing server and domain isolation using Internet
Protocol Security (IPsec)
Implementing storage based segmentation and ltering
using technologies such as encryption Logical Unit
Number (LUN) masking
2.3 Server Hardware Security
Based on ERP implementation scenario, the infrastructure
servers might be physical ones (box) or virtual (hosted on
virtualization platform, based on physical servers). In both
cases there must be some requirements that need to be met in
order to have a good level of security:
Fig. 1 ERP system security relations
ERP Security, Audit and Process Improvement 105
Choosing the proper hardware: since it is expected the
equipment to be used for a long term period with a
minimum failures, it is reasonable to be used hardware
produced by reputable vendors. The same hardware must
be accomplished with the proper warranty and on-site
service contract. It is also important to track the
remaining warranty for available server hardware and
plan its replacement before warranty expiration.
Capacity planning: used server hardware must be a
subject of capacity planning and checks. Only keeping
the systems with enough capacity in terms of system
resources available can be ensured awless running of
the ERP system and its good performance and stability.
Storage containment: no matter if the server hardware is
hosted on premises or in Data Center, it is a good prac-
tices to store it into locked racks.
2.4 Server Operating System Security
There are recently two most popular operating systems
familiesWindows and Unix/Linux. Regardless which of
the families is used to host the ERP system, there are 3 main
prerequisites to be met in order to be able to maintain proper
security for the entire ERP solution:
Proper version/distribution selected: both Windows and
Linux come into variety of versions, distributions and sys-
tem architecture. When selecting the proper OS, there are
some basic rules to follow:
OS Version: the most recent (stable) version/release
should be used
A proper OS architecture: 32/64 bit must be used, to
correspond to the architecture of the CPU of the hard-
ware. With the increasing popularity of virtualization and
rapid evolution of CPU architectures, the 64 bit archi-
tecture has the dominating position.
Most OS are released in different editions: the edition
matching best for ERP system requirements and used
hardware capabilities should be installed
OS security hardening applied: there are a set of common
practices referred as hardening, which are considered
to ensure a sufcient level of security by OS perspective:
Programs clean-up: by maintain the minimum set of
installed programs (only that are explicitly needed for
OS/ERP proper functioning), the number of backdoors
and perimeter of potential attack are slightly reduced
Use of service packs: keeping the OS updated to the
latest version
Patches and Patch management: plan, test, implement
and audit the released OS patches on regular basis is an
important part of security management
Policy/group based authentication: for highly privileged
(Admin) access to the OSthe list of users having such
access must be kept limited and the access should always
be provided based on certain user group membership, not
directly. There is also must to properly track and audit
each admin logon
Security Templates: groups of policies that can be applied
to the OS in automated manner
OS Firewall active: by keeping the OS rewall active
(both for inbound/outbound trafc) is allowed only for
explicitly authorized programs and processes to com-
municate, using predened list of network ports. The OS
Firewall acts as supplement of active Networks Firewalls
and allow to gain additional security
Usage of Antivirus Software: specically for Windows
based operating systems (but not limited to) is a highly
desirable to have deployed a comprehensive Antivirus
solution. Such solutions if are well designed and properly
setup, provide not only a protection against the well-known
security threats like viruses, but also can implement a
heuristic algorithms to detect and prevent zero day attacks
Fig. 2 ERP system security layers model abstract
106 R. Antonova and G. Georgiev
and malware spread. Some of the more advanced AV
solutions also provide capability for centralized, policy
based management and have some capabilities to perform
network trafc inspection and control the execution of sys-
tem processes and applications.
2.5 ERP Databases
Each modern ERP system embeds into its design a
single/multiple Database(s) to store and process the data and
business logics. Regardless the technology and type of the
Database Engine used, there are common requirements for
the ERP databases to provide a sufcient security.
Restrict User Access: under no any circumstances should
be allowed the ERP users to have direct access to the
databases. Instead, the access to database must be
available only for ERP program components (application
services, client applications) via dedicated DB connec-
tions, in secured manner.
Limit and Control Admin access: it is inevitable to have
some highly privileged accounts active, for maintain and
administer the databases. The usage of such accounts
must be strictly controlled and audited via group based
policies.
Proper hosting: the database(s) must be hosted onto a
dedicated DB instances/DB cluster, which have a suf-
cient resources present to meet the database requirements
in terms of CPU power, RAM volume, storage space and
especially storage performance.
Service accounts usage: all processes related with data-
base services must be ran under the credentials of spe-
cially created Service Accounts, having applied
additional security setting, like strong passwords rules
and interactive logon prevention.
2.6 ERP Application Services
Application services a core ERP components. They are
responsible to communicate with the underlying ERP data-
bases at one side and ERP client applications (Thick or WEB
based) at the other. Application services are also responsible
to process the data stored into the databases, apply the
business logic and present it in a proper format for the
clients. Since Application Services have both front end
(clients) and back end (databases) connections, the security
challenges are quite signicant and are considered as one of
the most critical component of the entire security schema.
There are some common security measures to be imple-
mented for ERP application services:
Additional hardening: the servers where application
services are running must have precise security harden-
ing, at the maximum possible level. This include a
detailed list of the allowed applications, processes and
also access lists for the devices/IPs allowing to commu-
nicate via front end connections (client side).
Encrypted communication: the communication with back
end (Database side) must be performed in an encrypted
format and via secured network channel.
Service accounts usage: a dedicated service accounts
must be used to run the different services, based on their
purpose and running into dedicated workspace. These
service accounts must have additional security applied,
like strong password policy and limit interactive logon.
Performance and availability monitoring: in a typical
ERP setup, the application services are the most common
bottleneck for the entire ERP system performance. These
services process a large volume of concurrent requests
and are responsible to manage a large transaction queues.
Such high load tends to cause frequent failures of the
services and their availability and performance must be
monitored in automated way, to make possible the
detection of potential failures and rapid restoration of
services operational status (either manually or automati-
cally). Only this way the security of ERP system oper-
ational status could be maintained at desired level.
2.7 Identity Management
Each ERP system is composed of number of components
and even a greater number of communication transactions
between these components. To achieve that ERP operates in
a secure way, it is important to have the identity of com-
munication participants properly managed:
User identity: the secure approach requires a 2 factor
authentication (2FA) to be performed for users, accessing
the ERP resources. In most typical scenario the 2FA
requires the user to provide a combination of pass-
word + electronic certicate (alternatively might be a
security token + PIN code) in order to prove its stated
identity.
Component identity: there are various type of compo-
nents participating within the ERP internal communica-
tion. To have a desired high levels of security, each
component must have its identity conrmed, the same
manner as users should. For the components like servers,
network devices, client devices etc., the identity is proven
by using electronic certicates, installed on each device.
All certicates must be issued by Certicate Authority,
which are trusted by all other components. In some
ERP Security, Audit and Process Improvement 107
scenarios (larger implementations) the organization has
its own Public Key Infrastructure (PKI) used to issue and
manage the certicates, while for smaller organizations
there might be used certicates issued by 3rd party
security providers.
2.8 User Rights and Access
The main purpose of an ERP system is to provide a set of
services for its users. Some of the large scale deployments
are used by hundreds thousands of users and this makes the
management of user rights and access to the system an
extremely important components of the overall security.
After a certain user identity has been proven, he is autho-
rized to access the system and gains a certain set of per-
missions to interact with it. There are a well-known sets of
practices, available to maintain good security levels:
User access policy: the authorization for certain user
account to access the ERP system must be controlled via
structured and clearly dened process. Each step of such
process must be documented and a written evidence be
present. The process is started with a lled request form,
submitted by the user. Later, the request is reviewed by
an authority, described by the process structure. Finally
the approved request is submitted to the Application
Administrator to create the identity and allow the user to
access the system.
The revoke of access: an operation which needs to be
initiated when a user no longer needs access, regardless
the reason. The revoke procedure typically is initiated by
the users direct manager/supervisor. To ensure that there
are no unnecessary active users, a periodical audit must
be performed over the users list and passwords be set to
expire on certain period.
Role based permissions: the ERP is used by users having
various needs and responsibilities. Based on needs and
responsibilities, the users must to have permissions to
access different parts of ERP data and authorization to
perform certain actions. Due to the typically large num-
ber of users and rich ERP functionality, the proper
management of user permissions is a complicated process
and if improperly managed, this might impact the level of
overall security.
To be able to handle efciently the permissions, it is
required to introduce the user rolesthis is an application
specicdenition and it is a reection of the users job
function/role by ERP perspective. After a roles are dened
into the ERP, a set of permissions should be created and
associated with this role. The good practices include to
congure roles as a group, capable to contain a list of user
names. Later assigning a user account to this group grants
this account the associated set of permissions and vice versa
removing an account form the group revokes the corre-
sponding permissions.
Some ERP systems support natively the capability to
manage internally role groups and associated set of per-
missions, while some other dontfor these not supporting
the function the list of roles and associated permission must
be managed externally, as a part of structured process.
2.9 External Network
This is the network used by ERP clients to access the sys-
tem. Depending of the specic setup, this network could be
an ofce LAN, an inter-site VPN connection, an internet
based VPN or even non secured external connection. This
external network is one of the components most exposed to
cyber-attacks and various other threats. To keep maintaining
a good security levels, there are 2 main prerequisites to be
met:
Reliable 2 factor authentication for users: due to user
passwords are vulnerable to be captured and compro-
mised, it is again reasonable to use 2FA for proving user
identity. It is also against the good practices to allow
sending user passwords trough external network in plain
(non-encrypted format)
End-to-end encrypted data exchange: all the information
exchanged between the ERP system and ERP client
applications must be performed using encryption. The
most common methods achieving this goal are by using
end-to-end VPN connection and encrypting data content
prior to be delivered vie the network. For achieving
optimal security, the 2 methods could be combined.
2.10 Client Access Devices
Into this category fall all devices which have ERP client
software installed or are used by end users to connect to ERP
using WEB interfaces. As a complementary security mea-
sures for these implemented for External Network commu-
nication, it is reasonable that devices be also secured
enough, by applying some well-known techniques:
Restrict user rights: the users should have the minimum
required set of privileges (non-admin) for the device they
use to access the ERP system.
Reliable Antivirus and Antimalware solution installed:
since this type of systems are usually connected to
108 R. Antonova and G. Georgiev
Internet, to reduce the risk of infections spread via the
global network, it is mandatory to be present an antivirus
solution with advanced capabilities and desirably with
central management capabilities.
Machine identity proof: the presence of electronic cer-
ticate issued to the machine and installed veries the
machine identity when connection is established and is a
very reasonable security measure within this context.
Regular OS and Applications patching: the workstations
and mobile devices like laptops and tablets, used as client
access devices tend to have a desktop or mobile version
of Operating System installed. These OS versions are
more vulnerable to security breaches and the OS
patches/xes are released more frequently and these
systems need to be a subject well planned and controlled
patch installations, on regular basis.
3 Security Process Documenting and Audit
Due to the security ecosystem of an ERP application is quite
complex and involves multiple layers, which not only hav-
ing their own security considerations but also possess
dependencies by some other layers, the process of managing
and documenting the security of such application is neither
easy nor simple process.
In order to be able to manage the security process ef-
ciently, one of the main prerequisites is the existence of
well-structured and documented process framework. Such
framework will describe in details the security related
properties of the application components, the details how to
achieve the desired security levels and the appropriate doc-
uments created and roles assigned for each security cong-
uration change.
3.1 Security Administration Roles
There is a set of roles participating within the security
administration, which can be assigned to individuals or
teams:
Identity administrator: this is the main role responsible to
create and manage an identity for user of
device/component. The role requires highest possible
privileges and is typically assigned to higher levels IT
staff or managers.
Application administrator: this role is responsible to
setup the ERP components, including application
updates, xes and user rights assignment inside the
application. The role requires prociency with applica-
tion operations and is assigned to mid/high levels IT staff.
Infrastructure administrator: this role covers the
administration of General IT services or infrastructure,
like servers, operating systems and platform. Typical
representative of this role is the System
Administrator/Support Engineer
Database administrator: a role which is authorized to
administer manage and support the normal operational
status for ERP underlying databases. Must possess and
advanced knowledge for the administered database
solution. Typically assigned to level 3 Database
Administrators.
Network/security administrator: this role is reserved for
the people/teams which administer the infrastructure
network and/or external network and connectivity
between the ERP infrastructure components and services.
This role also has the responsibility to perform periodi-
cally security audits and detect and eliminate proactively
any possible vulnerability. Depending on the scale of the
certain organization, the role could be handled by a
single or two different teams.
3.2 Security Documentation
The entire security of an ERP is not something static but is
more like a continuous running process, which responds to
the environment changes and attempts to update proactively
the security routines avoiding the new occurring security
threats. To be possible the process to be ran and managed
efciently, all aspects and changes from security perspective
must be properly documented.
Documenting the process starts along with the ERP
deployment design document, by describing the security
baseline routines into the High Level Design (HLD) and
Low Level Design (LLD) documents.
Later, during the ERP acceptance phase, the existing
security is evaluated in details and gap analysis is performed
between the designed and existing security setups. At the
post go live phase, the nal ERP deployment is documented
into Solution Build Document, and the entire security setup
is an integral part of this document and represents the initial
version of security baseline for the certain ERP system.
During the stabilization and optimization phase of an
ERP solution, there are frequently pop up needs to perform
changes for some security related settingsthese changes
must be documented, following the standard ITIL process
for Change Management (as best practices usage).
Another security related changes that are common part of
ERP system operations are these requesting to add, remove
users and change the users permissions for using certain
ERP resources. This documents are processed as User
Authorization Request forms, typically lled by users
ERP Security, Audit and Process Improvement 109
themselves, approved by the respective authority and nally
submitted for execution to the appropriate administrators.
3.3 Security Audits
Security audits are tasks that need to be performed, either
periodically on regular basis or on demand, as a response to
newly identied potential security threat. During the audit,
the complete security state of the ER and its underlying
components is evaluated and documented. Later the audit
output is analyzed by expert IT staff and if concluded that
some changes are needed to improve the existing security
routines, these changes are planned and implemented under
the standards of Change Management process.
Since the security audit process evaluates multiple aspects
of ERP system, a members of different Administration teams
are involved and work in collaboration to cover all per-
spectives and complex relations.
Some of the market leading ERP solutions have inte-
grated tools for internal security audit, which tools
signicantly reduce the efforts and time needed for per-
forming audits.
4 Conclusions
Managing the security of an ERP system is a complex
process, involving multiple layers, components, dependen-
cies and interactions that need to be taken under consider-
ation. The importance of proper security management must
not be underestimated due to a partially or completely failed
ERP system might have an enormous impact over the
company business and/or nance. Within security manage-
ment process are involved several different Administrator
roles, which need to work in close collaboration to achieve
optimal results. Maintaining an overall good level of security
is not a one-time effort, but is continuously running process.
As a part of this process there must be maintained a precise
documentation for each activities performed.
110 R. Antonova and G. Georgiev
Evaluating the Strength of Middle Eastern
Monarchies and Republics
Khulood Jamal
Abstract
In the wake of the Arab Spring, several states have faced
turmoil, instability and a gradual overthrow of the regime.
Interestingly, the states affected by the Arab Spring were
largely republics including Syria, Tunis and Egypt. Both
Egypt and Tunis witnessed an overthrow of the regime
while the situation in Syria continues to deteriorate, as the
Al-Assad regime shows no sign of willingness to give up
power. Two monarchies, Jordan and Bahrain, faced
demonstrations and protests but were able to withstand
any regime change. Given the realities of the Arab Spring,
scholars question the applicability of Samuel Hunting-
tons notion of the kings dilemma and his skepticism
about the future of monarchies. This paper seeks to prove
that Middle Eastern monarchies are generally stronger
than Middle Eastern republics because of institutional
exibility, the ability to exploit nancial and political
resources in order to encounter the challenges faced with
rapid social change and geopolitical realities.
Keywords
Monarchy Republic The divide and rule tactic
Institutional exibility Geopolitical power
Strong and weak states
1 Introduction
In the wake of the Arab Spring, several states have faced
turmoil, instability and a gradual overthrow of the regime.
Interestingly, the states affected by the Arab Spring were
largely republics including Syria, Tunis and Egypt. Both
Egypt and Tunis witnessed an overthrow of the regime while
the situation in Syria continues to deteriorate as the Al-Assad
regime shows no sign of willingness to give up power. Two
monarchies, Jordan and Bahrain, faced demonstrations and
protests but were able to withstand any regime change.
Given the realities of the Arab Spring, scholars question the
applicability of Samuel Huntingtons notion of the kings
dilemma and his skepticism about the future of monarchies.
This paper seeks to prove that Middle Eastern monarchies
are generally stronger than Middle Eastern republics because
of institutional exibility, the ability to exploit nancial and
political resources in order to encounter the challenges faced
with rapid social change and geopolitical realities.
2 Literature Review
Primarily, Middle Eastern monarchies enjoy greater institu-
tional exibilities than their republican counterparts. Legit-
imacy is one of the key aspects of such exibility. The right
to rule of monarchies does not stem from the so called divine
right of kings but rather due to a combination of individual
and family virtues, including noble lineage, honoured deeds,
qualities of leadership and, in the case of the kings of Jordan
and Morocco, descent from the Prophet Muhammad him-
self[1]. Because legitimacy stems from various sources,
monarchs are not bound by impersonal policies and regu-
lations of bureaucracies and legislatures unlike their repub-
lican counterparts who are required to abide by such policies
[2]. The interplay between the traditional virtues and modern
qualities is another aspect of institutional exibility. The
ruling families of monarchies hold a nomadic tribal past with
traditional customs yet, contemporary rulers are able to
acquire the skills and knowledge necessary in order to meet
the requirements of modern times [1].
A tactic that monarchies are able to employ unlike their
republican counterparts is the divide and rule tactic.
Waterbury explained this tactic by providing the example of
the Moroccan monarch who acts as the consummate arbiter
K. Jamal (&)
American University in the Emirates, Dubai, UAE
e-mail: 162410041@aue.ae
©Springer Nature Switzerland AG 2019
A. Al-Masri and K. Curran (eds.), Smart Technologies and Innovation for a Sustainable Future,
Advances in Science, Technology & Innovation, https://doi.org/10.1007/978-3-030-01659-3_15
111
who is constantly dividing and balancing his opposition and
playing off sides[3]. In order to employ this tactic,
monarchies promote social and political pluralism. In terms
of social pluralism, monarchies accept the differences
between various social groups within a given society and
emphasize such differences unlike their republican counter-
parts who merely create a standardized new Arab socialist
man[3]. In addition to accentuating social differences,
monarchies adopt policies to not only protect those differ-
ences but also to encourage individuals to be independent of
their choices whether in religious or linguistic terms. In
general, monarchies do not force a uniformed identity but
rather promote numerous identities. For example, the Jor-
danian monarch protects the culture and traditions of Bed-
ouins as well as other minorities including the Chechen
minority. In terms of political pluralism, monarchies enable
various political forces to exist and in some cases within the
parliament and in other cases within labor unions. Their
republican counterparts, on the other hand, developed a
single party system. Applying the divide and rule tactic, the
toleration of different social groups and political forces
enables monarchs to play off sides and stave off the
cyrstallisation of broad-based coalitions against their rule
the monarch is then able to play the role of arbiter between
the various factions[3].
In addition to institutional exibility, Middle Eastern
monarchies are capable of exploiting nancial and political
resources in order to encounter challenges faced with rapid
social change. Oil is the primary resource that generates
wealth and income for monarchies. According to the BP
Statistical Review issued in 2009, 64.7% of the worlds oil
reserves are situated in the Middle East and the states within
the Middle East are responsible for 37.3% of the production.
Monarchies, in particular, hold 39.5% of those oil reserves
and are responsible for 22.6% of the production. The wealth
and income generated by oil ultimately enabled monarchies
to develop the modern state system. Prior to the advent of
oil, the state structure of monarchies was under developed
and power was institutionalized within the royal court. The
system was also simple as the monarch ruled by decree and
met with oligarchs frequently. The monarch was surrounded
by selected advisors whom he delegated specic tasks. The
inux of oil revenues enabled monarchs to expand the state
apparatus and bureaucracy. For instance, monarchs began to
initiate projects to increase modernization and development.
Monarchs also invested in Western military equipment, arms
systems and intelligence to compete on the international
level [4].
In addition to the development of the modern state sys-
tem, oil revenues enabled monarchs to distribute welfare
among their citizens. An important aspect of monarchial rule
is the special relationship between the monarch and his
citizens. The monarch distributes welfare both social and
economic to the citizens in exchange for their political loy-
alty. This is particularly the case in the monarchies of the
Gulf region. Citizens in the Gulf enjoy various opportunities
and services including free access to educational and health
facilities as well as housing amongst other amenities. For
instance, citizens of the United Arab Emirates are given free
land for their houses, scholarships and various job oppor-
tunities. The distribution of socio-economic welfare ensures
monarchs that citizens will remain loyal and those who
oppose the monarchial rule or even question the legitimacy
of the royal family face heavy sanctions including detention
and deportation.
Furthermore, oil revenues have enabled monarchs to
integrate any potential rival into the state system by issuing
responsibilities. Such integration ultimately transforms
potential rivals into clients of the state. Economic develop-
ment, for instance, enables the monarch to issue responsi-
bilities by granting concessions to families of local
entrepreneurship. Thus, the monarch secures the loyalty of
the family because now the family has an interest in pro-
tecting the monarchial rule as a means to ensure that they
will continue to be given concessions. The political systems
in the Gulf region also incorporate traditional authoritative
structures within the modern state system including religious
institutions and tribes. The integration of social groups also
strengthens the patron-client relationship [4].
Moreover, oil revenues have shaped geopolitical realties
which in turn ensure the regime stability of the monarchies.
Middle Eastern monarchies have formed coalitions with the
United States and other Western powers. The Western
powers intervene in the monarchies when the ruling family is
threatened by political forces. For instance, Great Britain
protected the Omani monarchy and helped to overthrow the
Dhufari rebellion in the 1970s [5]. Protection is granted to
monarchies because it is in the strategic and economic
interest of the Western powers to maintain the stability of the
regime. As mentioned earlier, monarchies are home to a
large supply of oil reserves; therefore, Western powers view
monarchies as a means to gain access to the oil reserves and
ultimately to exert power through its strategic location. In
addition, monarchies provide the United States support and
help in its war against terror. Monarchies do not allow any
Islamic movements or groups that have suspicious terrorist
aims to operate within their territorial rule [4]. Middle
Eastern monarchies have not only formed coalitions with
Western powers but also regionally most notably the GCC,
Gulf Cooperation Council.
Monarchies have created an efcient network in which
support and solidarity is provided in times of crisis. This
112 K. Jamal
network is beneciary to the monarchs as it also strengthens
their supply of resources [6]. Geopolitical realities came into
play in Bahrain in 2011 when the monarchial rule was
threatened by the Shiite protests. GCC forces led by Saudi
Arabia were deployed to Bahrain to help shut down the
protests [7]. In addition to the military aid, GCC foreign
ministers also vowed to provide $20 billion to both Bahrain
and Oman [6]. An interesting point to mention is that the
United States failed to voice its concern with human rights
abuses inicted on the protesters by both the GCC forces and
the Kingdoms army. The lack of inaction reects the
geopolitical realities as the US has an interest in maintaining
stability in both the Bahraini monarchy and the region at
large [7].
Although Middle Eastern monarchies are generally
stronger than Middle Eastern republics, the question remains
whether or not monarchies can be identied as strong states
and republics as weak states. In order to determine the
strength of a state three indicators are used including (1) by
their ability to control their own territory, (2) by their
capacity to perform core functions, and (3) by their vulner-
ability to challenges to their legitimacy[8]. Strong states
are able to efciently and effectively exert power and control
over their own territory while weak states have a low degree
of control over their territory and cannot prevent various
actors from entering their territory and intervening in affairs.
Strong states are able to efciently and effectively perform
core functions which include providing security and more
specically protecting the human security of civilians as well
as exerting monopoly over the use of force. Weak states, on
the other hand, lack a uniform state performance and contain
large populations of disadvantaged people.
Lastly, strong states are largely not vulnerable and prone
to challenges, both internal and external, to their legitimacy.
Legitimacy entails that the state has the legal and moral right
to rule and exert power and that the international arena
recognizes such right. Weak states, on the other hand, are
not capable of exerting complete control over their territory
or performing core function; therefore, they lose legitimacy
and face internal and external challenges to their rule [8].
3 Discussion
Having discussed the indicators of strong and weak states, it
becomes evident that monarchies maybe identied as strong
states if not states gradually reaching that status while
republics are identied as weaker states. Taking the Arab
Spring as a case study, republics such as Syria and Egypt
both were prone to internal and external challenges to their
legitimacy and were not able to effectively perform core
functions hence the public unrest and dissatisfaction.
The Syrian government has long relied on robust coercion in
order to rule; however, it is not able to successfully repress
the protests and challenges to its rule. In terms of territorial
control, the Syrian government has lost some control as
various actors have entered since the advent of the uprising.
Given the institutional exibility, monarchies are seen more
legitimate in the eyes of their people; therefore, they have
faced fewer challenges to their rule.
With the exception of Jordan and Bahrain, monarchies
have not experienced the Arab Spring. Although Jordan and
Bahrain faced challenges to their monarchial rule, both were
capable of overcoming of the protests in a short period of
time. In terms of performing core functions, monarchies
such as the United Arab Emirates and Qatar ensure the
protection of human security and distribute welfare to their
citizens. Of course the degree of performance varies amongst
different monarchies yet, with the exploitation of oil the
standard of living is higher for citizens in monarchies than in
republics. Monarchies also have a relatively high degree of
control over their territories compared to republics.
4 Conclusion
To conclude, Middle Eastern monarchies are generally
stronger than Middle Eastern republics because of institu-
tional exibility, the ability to exploit nancial and political
resources in order to encounter the challenges faced with
rapid social change and geopolitical realities. With the
advent of the Arab Spring, it is easier to evaluate the strength
of the states in both monarchies and republics. Given the
current political situation, monarchies are relatively stronger
and have maintained security and legitimacy within their
territories.
References
1. Owen, R.: State, Power and Politics in the Making of the Modern
Middle East. Routledge, NewYork, NY (2004)
2. Anderson, L.: Dynasts and nationalists: why monarchies survive. In:
Kostiner, J. (ed.) Middle East Monarchies: The Challenge of
Modernity, pp. 5369. Lynne Rienner Publishers, Boulder, Colo
(2000)
3. Frisch, H.: Why monarchies persist: balancing between internal and
external vulnerability. Rev. Int. Stud. 37(1) (2011). Retrieved from
http://search.proquest.com.ezproxy.aus.edu/docview/874921867/full
textPDF?accountid=16946
4. Meyrick, J., Selvik, K., Stenslie, S.: Stability and Change in the
Modern Middle East. I.B. Tauris & Co. Ltd., London (2011)
5. Gause, F.G.: Kings for all seasons: how the Middle Easts monarchies
survived the Arab spring. In: Brookings Doha Center, p. 8 (2013).
Retrieved from http://www.brookings.edu/*/media/research/les/
papers/2013/09/24%20resilience%20arab%20monarchies%20gause/
resilience%20arab%20monarchies_english.pdf
Evaluating the Strength of Middle Eastern Monarchies 113
6. Friedman, B.: Battle for Bahrain: what one uprising meant for the
Gulf states and Iran. World Aff. 174(6) (2012). Retrieved from
http://www.worldaffairsjournal.org/article/battle-bahrain-what-one-
uprising-meant-gulf-states-and-iran
7. Yom, S.L. Understanding the resilience of monarchy during the
Arab Spring. Foreign Policy Res. Inst. (2012). Retrieved from http://
www.fpri.org/articles/2012/04/understanding-resilience-monarchy-
during-arab-spring
8. Hanlon, Q.: State actors in the 21st century security environment.
Nat. Strategy Inf. Cent. (2011). Retrieved from http://www.
strategycenter.org/wp-content/uploads/2011/07/State-Actors-21st-
Century.pdf
114 K. Jamal
Exploring the Opportunities and Challenges
of Open Source Software and Its Economic
Impact on the Cybersecurity Market
Ismail Alsharif and Adel Khelifi
Abstract
Organizations today face IT security challenges on many
fronts. These include controlling user access to systems,
resources, and data security issues that encompass secure
storage, secure transmission, data authenticity and data
integrity. These requirements are met by establishing the
right policies, controls, and mechanisms that are put in
place to effectively protect sensitive data. Therefore, this
research aims to see if open source software has the
potential to inuence the cybersecurity market that is
currently dominated by proprietary software. However, in
order to accomplish such a task, certain conditions must
be met. Such as understanding of the history behind open
source software, the positive and negative inuences it
carries when dealing with this type of software. As well
as compare and contrast current proprietary solutions with
open source solutions, in order to grasp the potential
economic impact of open source software leading
onwards into the future. The ideal ndings would be to
outline the factors that are holding back open source
software, and whether these factors are adjustable or
correctable over time. Another aim is to highlight the
potential nancial benet that comes from switching to or
prioritizing OSS security solutions. As well as come up
with any recommendations that would help aid businesses
and organizations when it comes to obtaining suitable
OSS security solutions.
Keywords
Open source software Cybersecurity Challenges
1 A Glimpse into the World of Cybersecurity
1.1 Background
In a world where information technology security is quickly
becoming a prioritized concern at the forefront of every
small, medium and large enterprise as well as in any
government institution. Which is a given based on how
everything has moved towards a digitalized landscape in the
past decade.
Ever since organizations started depending on informa-
tion technology in order to run their day to day business
practices, they in turn were slowly creating openings in their
processes that malicious attackers wanted to exploit and take
advantage of. Which inevitably led to government institu-
tions and organizations alike to protect their assets and
communication mediums from these bountiful threats as
well as attempted to manage all of the risks by studying their
infrastructure and processes involved. However, this was a
very difcult task to accomplish because whenever security
mechanisms were introduced simplicity was sacriced in the
process.
Therefore, there was a need to balance security against
complexity which was a daunting task depending on what
processes, assets, communication mediums were being
looked into. That was not all; as there was also the topic of
risk management at hand. This meant that risk managers
would have to plan almost every possible scenario that is
related to an event or a scenario and then look at the net loss
or net gain from implementing a security mechanism in
place to reduce or minimize the risk versus accepting the
risk.
These studies were done in order to not waste money on
protecting a system if the value of it being exposed or stolen
is less than implementing the security mechanism itself (IE:
protecting $200 worth of equipment by implementing a
$5000 security mechanism). One of the main reasons for
implementing cybersecurity also stems from the fact that the
I. Alsharif A. Kheli(&)
College of Computer Information Technology,
American University in the Emirates, Dubai, UAE
e-mail: adel.kheli@aue.ae
I. Alsharif
e-mail: 121120006@aue.ae
©Springer Nature Switzerland AG 2019
A. Al-Masri and K. Curran (eds.), Smart Technologies and Innovation for a Sustainable Future,
Advances in Science, Technology & Innovation, https://doi.org/10.1007/978-3-030-01659-3_16
115
e-commerce sector saw incredible growth in the past few
years, which in turn made cybersecurity a core component in
many of the worlds economies. Securing safety critical
systems is also a top priority, which helped bolster the need
for cybersecurity, due to the reliance of these systems for
responding to emergencies or protecting a countrys infras-
tructure (utilities) from any terror related threats.
Due to the ever-evolving digital landscape, many
organizations took to leverage the power of the internet in
order to help reach more customers on the web and further
solidify their relationships with their partners by using VPN
tunneling in order to enable internetworked organizations for
enhanced collaboration. However, they had to harden their
systems properly before they could leverage the power this
type of medium. One of the main reasons for hardening
ones system was to protect their asset or assets from
cybercrime. Protection from outside threats was not the only
concern as more and more attacks are carried from the
inside. Whether it is a remote malicious attacker that gained
access to data through a protected and privileged system or a
rogue employee that is accessing and leaking condential
data for monetary reasons.
1.2 Various Components that Require
Protection
Numerous components require protection, but it depends on
what type of services or processes an organization aims to
provide. Whether it is a healthcare, education, manufactur-
ing, or a federal industry, the same principles are to be
followed when discussing the components that need constant
protection.
The network, considered to be the essence of communi-
cation in any organization. Protecting it from threats and
risks is the priority of the information technology security
team. But in order to accomplish that, several tools need to
be used in unison in order to yield the proper monitoring
capabilities. These tools can range from intrusion detection
systems, intrusion prevention systems, vulnerability scan-
ners, and packet sniffers.
Application security is a large concern that sometimes
requires both hardware and software methods in order to
protect applications from possible external threats. Some
tools are also used for their ability to perform on the spot
attack simulations in order to probe for potential vulnera-
bilities or test certain security mechanisms that were previ-
ously implemented. Monitoring applications and keeping a
tab on the performance levels can help triangulate possible
threats.
Data is considered to be a quintessential asset and is
sometimes referred to as the lifeblood of an organization,
have encryption mechanisms set in place as well as some
form of le transfer management. Databases of course come
to mind discussing data, and it is necessary to have the right
tools in place that enable continues monitoring and auditing.
In addition to using encryption which would add an extra
layer of protection when it comes to sharing information
between clients.
Another component that comes to mind are the users,
considered to be one of the weakest links in any organiza-
tion. As was shown in the past decade where attacks would
target and prey on users as a way to inltrate a system. In an
ideal situation, it would be wise to have some form of user
classication in place. User monitoring as well as privileged
user monitoring, in addition to using a multi-factor authen-
tication method would aid in safeguarding sensitive data
from malicious users.
1.3 Cybersecurity Solutions Today
Since there are numerous areas that require constant pro-
tection, monitoring, and logging capabilities. A need for IT
security solutions that were able to perform these functions
rose considerably. The need for these services created a
demand that had to be met, therefore a considerable amount
of companies with some expertise in the eld wanted to
capitalize this opportunity and create IT security solutions
that would inevitably help organizations and enterprises
protect their domain.
Today, hundreds of IT centric companies are creating and
distributing their own specialized IT security software that
aims to protect the ever-growing needs of every enterprise.
The competition is striving within these companies as they
add feature after feature in an attempt to outdo one another
and create more value for their products. They also tend to
benchmark their capabilities against other competitors
products in order to send the message that they are the
leaders in the market when it comes to value, as they attempt
to cement their image as the go tobrand when it comes to
IT security needs.
However, due to the ever-increasing amount of IT secu-
rity solution providers that are trying to offer more and more
security solutions, that promise to deliver the highest level of
protection that is available in the market. Although great for
the market and the growing IT security industry, a negative
side effect is introduced. This side effect being the intro-
duction of complexity. Because of 30 information technol-
ogy security solution providers offering the same solution,
only differing in the performance levels and in the extra
features they may support. Businesses tend to spend time
trying to decide which solution to go for and how each
solution differs from the other. Which in turn constraints
resources in terms of the time it takes to gure out which
solution would best t the organization.
116 I. Alsharif and A. Khelifi
1.4 Open Source Software
After establishing some background information at the topic
at hand. It makes sense to delve into how introducing the
open source model into the realm of IT security solutions
could help invigorate the industry in an unprecedented
manner. As open source allows the participation and
collaboration of many individuals in creating or developing
a piece of software or a complete solution. This is made
possible by making the code itself public; meaning the
program instructions that are kept hidden when running is
now visible to everyone. Effectively opening the source code
to the public, which is often accompanied by the program
that is also open to any entity that seeks to use it. However,
the caveat here being that open source programs are not to be
sold, but shared, most of the time.
In contrast to open-source software, proprietary software
has its source code hidden. This is done in an attempt to keep
the programs instructions unknown to the public. The dis-
tinction between OSS and free software should also be
explained; as OSS can be even have a price tag attached to it
if the developer deemed it necessary.
An example of one of the most successful open source
softwares available today is Linux. Unbeknownst to most,
Linux is an operating system that is currently being main-
tained by volunteers that are located across the globe. It
garnered quite the reputation and is now considered one of
the leading operating systems powering more than 30% of
all the servers worldwide. Another open-source software that
has shared a similar success story is Apache, an open source
software that is powering more than 75% of web servers
globally. MySQL also comes to mind when talking about the
advent success of open source software, as it is used today
for relational database management purposes.
1.5 Open Source Software Challenges
Opponents of open source software argue that by creating
something open source, they are handicapping themselves
from a security standpoint. It is argued that because the
source code of the program is openly visible for anyone to
see that they are effectively putting themselves at a security
risk.
According to Levy [1] a technical director with the
CESG, a department of the United Kingdoms government
communications headquarters intelligence agency. He
argues that open-source software is no different from pro-
prietary software when it comes to security. That although
open-source software is open for everyone to see, it does not
directly correlate to being any less secure than proprietary
software that has its source code hidden. He states that
because it is openly visible for anyone to view that it in turn
creates this atmosphere where developers would go over
each line with much more scrutiny in place. Whereas in the
case of proprietary software, due to it being hidden from the
general public, it is subject to less scrutiny and that would
eventually lead to the release of a program that could be
open to some nasty vulnerabilities.
Nonetheless, this does not mean that open-source soft-
ware is free from its fair share of problems. It has been
widely known that the distribution of open-source software
has been a challenge for quite some time. As there have been
many concerns regarding the fact that it is possible to replace
the original les of the software with fake les that contain
malicious lines of code embedded into the les themselves.
As seen in the past, there were multiple instances where
distribution servers are attacked, replacing an original le
with an infected one. Ultimately allowing a threat to bypass
several layers of security and cause havoc.
1.6 Problem Statement
Today one of the largest costs for any organization is
implementing the required security mechanisms and main-
taining the correct controls and policies. Organizations are
spending millions on products and services instead of
looking for open-source alternatives. Organizations arent
properly searching the market and trying to look for open-
source alternatives that are just as capable as their propri-
etary counterparts. Therefore, through actively looking into
the challenges and misconceptions that OSS currently
struggles with, a more diverse market could potentially
ourish, one driven by the notion of nancial savings.
1.7 Objectives
The objective is to investigate the current scene of IT
Cybersecurity, its solutions, both proprietary and open-
source. In an attempt to draw some form of conclusion that
would help clear up whether or not it is feasible to go
towards an open-source model in the coming future.
2 Literature Review
The aim of the literature review was to try and accumulate as
much information as possible from similar studies that were
conducted in the past that focused on comparing and con-
trasting open source security solutions and proprietary
security solutions with one another. As well as discuss the
growing need to meet compliance requirements.
Exploring the Opportunities and Challenges of Open Source 117
2.1 Study Number 1
A study that was published recently by Carman [2] high-
lighted some interesting points. The issue being whether
companies and organization alike implemented endpoint
security solutions with the intention of safeguarding their
enterprise and mitigating risk in the best manner possible or
merely implementing the solutions in order to meet some of
the imposed regulatory compliance requirements.
The study believes that from the data that they had
gathered around this area, that enterprises leaned towards
meeting regulatory requirements rather than focus on having
strong controls in place. The study talks briey about how IT
security professionals today are somewhat out of touch on
which data should be protected or classied as condential,
and therefore end up applying various security solutions to
some of the data unnecessarily.
2.2 Study Number 2
Another study that was done recently by Nigelow [3], which
wanted to understand or comprehend what IT professionals
are looking for in security products and what their prefer-
ences are. Some of the highlights that resulted from this
study was the fact that over 90% of the respondents made it
clear that they believe that their overall security posture
would improve in the coming months. However, when asked
about how much heavily does compliance and governance
requirements played a role in inuencing the overall security
effort, over 70% of the respondents recognized that com-
pliance would play a large role in security planning and
decision making in general.
Also, some interesting ndings that should be pointed out
is that more than 65% of respondents believed that IT pro-
fessionals cared the most about the overall security posture
while the rest believed that CEOs and upper managements
were more concerned about security.
Respondents were also questioned on their condence on
which security programs they believed to be performing well or
above average. With the majority believing that intrusion,
detection and prevention as well as data protection have the best
overall security implementation in place. It is also mentioned
that security professionals felt that thearea that lacked the most
attention and awareness to be the user education security pro-
gram due to the fact that human factor is hard to fortify and
control unlike other sets of data or applications in place.
2.3 Study Number 3
A study that was conducted by Xing [4] in the Journal of
Industrial Engineering and Management. Xing wanted to
nd out just how much would commercial open source
software affect proprietary software from a market share
perspective and a nancial perspective as well. It aimed to
achieve this by analyzing the impact by using complex
differentiation models in a scenario where a proprietary
software product was competing with an open source
software product.
Some of the ndings that were discussed was the nan-
cial effect it had on the market. It turns out that with the
presence of an open source software, there was an overall
decrease in both the price of the software as well as in the
prot that was being made from said software. However,
with the introduction of OSS came many positive outcomes,
some of the ones that were highlighted were how much more
consumers were active on the market and how social welfare
increased dramatically over time.
2.4 Study Number 4
One study that was conducted by De [5] a Hewlett-Packard
Chair Professor that sought to understand the economic
impact of free and open source software. The study was
based on 20 different case studies from varied organizations,
such as educational institutes and commercial rms as well
as governmental departments. The goal was to replace the
currently used OS of windows with an open source OS
called FOSS.
They gradually replaced the windows software from over
50,000 desktops from schools spread across the state of
Kerala, which translated into costs savings that were esti-
mated to be around $10 million. The next target was a
commercial rm that adopted the FOSS OS for their servers,
which translated into cost savings of up to $70,000. But the
largest costs savings they had recorded was $16 million
when an insurance rm replaced their proprietary software
with open source software on over 8000 of their devices.
Ultimately the study concluded with the fact that open
source software dramatically changed the economy in an
unprecedented way by saving millions in potential costs.
2.5 Study Number 5
A study that was conducted by Peeling and Satchell [6]
which aimed to predict the future of OSS by analyzing the
current trends in the software infrastructure marketplace.
They gathered and analyzed an extremely large amount of
data in order to come up with the patterns that would be used
to predict the future growth or decay of open source
software.
They attempted to look at alternatives for functional
software that is widely used today. For example, they looked
118 I. Alsharif and A. Khelifi
for alternative OSS that would replace Microsoft word,
Microsoft Outlook, Microsoft Excel, as well as Microsoft
PowerPoint.
The conclusions that were derived from performing this
study was that it would be possible that within the coming
future that OSS would take over 50% of the software
infrastructure marketplace. And that governments around the
world would benet greatly from this change, but that
implementing them would the true challenge.
3 Materials and Methods
3.1 Replacing Proprietary Security Solutions
with Open Source Security Solutions
In this section, open source and proprietary security solu-
tions will be compared in each of their respective categories.
The categories that will be looked into are endpoint security,
unied threat management, application rewall, anti-spam,
encryption, intrusion detection, network rewalls, user
authentication, network monitoring, risk management,
forensics, anti-spyware, and mobile device management and
intrusion prevention.
The areas that were selected were based on IT security
requirements that each organization should uphold regard-
less of which industry is involved, and should at the very
least employ some, if not all of the listed solutions.
It is also worth noting that one of the areas that require a
solution is risk management, and it will outweigh most if not
all of the other areas in terms of how expensive it is. This is
due to the nature of how the risk management solution
operates, as it consolidates data from a large number of
interfaces/solutions and attempts to correlate various sets of
data that are coming in from different areas, processes them,
and presents it in a manner that the IT Security team can
make use of.
The solutions that were selected were based on their
popularity and their reputation for having solid, working
solutions that are considered to be reliable. Various sources
of information, including Gartner were used to compile the
list of solutions (Tables 1and 2).
Open Source Anti-Spam solutions versus Proprietary
Anti-Spam solutions. The OSS solution nominated in this
category is Anti-Spam SMTP Proxy, also commonly known
as ASSP. The goal of the product is to stop spam from going
through SMTP servers connected to the organization. ASSP
functions well with popular SMTP servers such as Micro-
softs Exchange and others as well. This OSS is intended to
replace Barracuda Spam and Virus Firewall. Which func-
tions just as ASSP would, however it delivers its capabilities
through hardware appliance unlike ASSPs software based
solution.
Open Source Anti-Virus/Anti-Malware solutions ver-
sus Proprietary Anti-Virus/Anti-Malware solutions.
The OSS solution nominated in this category is ClamAVs
which is considered to be one of the top open source security
solutions currently available. Its reputation in the domain of
AV protection has risen considerably in the past couple of
years. Which has allowed it to rival the capabilities of top
proprietary security products in the market. It intends to
replace various propriety solutions including, Kaspersky
Anti-Virus, McAfee Antivirus, Norton Anti-Virus, and Virus
Scan Enterprise.
Open Source Anti-Spyware solutions versus Propri-
etary Anti-Spyware solutions. The OSS solution nomi-
nated in this category is Nixory which written in Python/
PyGTK. Its aim is preventing any form of data-mining or
any spyware related activities, including key logging
attempts. The proprietary software that it aims to replace is
Webroots Spy Sweeper which offers the same functionality.
Open Source Application Firewall solutions versus
Proprietary Application Firewall solutions. The OSS
solution nominated in this category is ModSecurity which
enables the logging and monitoring of web application
activity in real-time. As well as enables web application
hardening. The proprietary software that it aims to replace is
Barracuda Web Application rewall, and NetScaler Appli-
cation Firewall.
Open Source Risk Management versus Proprietary
Risk management solutions. The OSS solution nominated
in this category is Eramba, which is an open enterprise class
IT Governance, Risk and Compliance application. It helps
aid compliance management and ensures that each and every
change on a system is validated and approved before being
pushed into a live environment. The proprietary software
that it aims to replace is MetricStream.
Open Source Encryption solutions versus Proprietary
Encryption solutions. The OSS solution nominated in this
category is AxCrypt. An open source software that is cap-
able of encrypting les on the y and in a simple yet elegant
manner. Designed primarily for windows users, AxCrypt
aims to make encrypting les an easy process that is
accomplished simply by right clicking on the le or folder
that needs to be protected. The proprietary software it aims
to replace is McAfee Anti-Theft, and Cryptoforge. As for the
Linux counterpart, Gnu Privacy Guard would replace
Sophos Safeguard Encryption.
Open Source Forensics solutions versus Proprietary
Forensics solutions. The OSS solution nominated in this
category is ODESSA. Which is an acronym for Open
Digital Evidence Search and Seizure Architectureit
includes a great number of tools that help collect and
organize digital data that can later be diagnosed and ana-
lyzed. The proprietary software it aims to replace is EnCase
Forensics, and X-ways Forensics.
Exploring the Opportunities and Challenges of Open Source 119
Open Source UTM solutions versus Proprietary UTM
solutions. The OSS solution nominated in this category is
Endian Firewall. Which turns any functional computer into a
fully-edged Unied Threat Management appliance. It is
capable of protecting a network through a slew of tools,
including rewall capabilities, anti-virus capabilities, spam
and content ltering, and application ltering as well. The
proprietary software that it aims to replace is Check Point
Security Gateways, and McAfee UTM Firewall.
Open Source Intrusion Detection solutions versus
Proprietary Intrusion Detection solutions. The OSS
solution nominated in this category is AFICK. It functions as
ale integrity checker that can report any changes that are
made to any of the systems on a network to the
administrators in charge. The proprietary software that it
aims to replace is Tripwire. Works on both Windows and
Linux.
Open Source Network Firewall solutions versus Pro-
prietary Network Firewall solutions. The OSS solution
nominated in this category is IPCop. Which offers the ability
to turn any functional computer into a rewall appliance.
Therefore, saving the trouble associated with getting a
device that functions solely as a rewall appliance. The
proprietary software it aims to replace is Barricuda NG
Firewall and Check Point Appliances. As for the Linux
based systems, pfSense would be the OSS used.
Open Source Network Monitoring solutions versus
Proprietary Network Monitoring solutions. The OSS
Table 1 OSS replacements for a
Windows operating system
environment
Type of solution Proprietary solution Open source solution
Endpoint security Kaspersky anti-virus ClamAV
Unied threat management Check point security gateways Endian rewall
Application rewall Barracuda application rewall ModSecurity
Anti-spam Barracuda spam and virus rewall ASSP
Encryption Cryptoforge AxCrypt
Intrusion detection Tripwire AFICK
Network rewalls Barricuda NG rewall pfSense
User authentication Entrust IdentityGuard WiKID
Network monitoring Omnipeek Wireshark
Risk management MetricStream Eramba
Forensics EnCase forensics ODESSA
Anti-spyware Webroots fpy fweeper Nixory
Mobile device management MobileIron Miradore
Intrusion prevention Cisco IPS Snort
Table 2 OSS replacements for a
Linux operating system
environment
Type of solution Proprietary solution Open source solution
Endpoint security Kaspersky anti-virus ClamAV
Unied threat management Check point security gateways Endian rewall
Application rewall Barracuda application rewall AppArmor
Anti-Spam Barracuda spam and virus rewall ASSP
Encryption Sophos safeguard encryption Gnu privacy guard
Intrusion detection Tripwire AFICK
Network rewalls Barricuda NG rewall IPCop
User authentication Entrust IdentityGuard WiKID
Network monitoring Omnipeek Wireshark
Risk management MetricStream Eramba
Forensics EnCase forensics ODESSA
Anti-spyware Webroots spy sweeper Nixory
Mobile device management MobileIron Miradore
Intrusion prevention Cisco IPS Snort
120 I. Alsharif and A. Khelifi
solution nominated in this category is Wireshark. To come to
be known as one of the most detailed packet inspectors that
greatly aid in the process of network monitoring. Due to its
ability to lter specic packets into categories, and record
trafc in real-time. The proprietary software that it aims to
replace is Omnipeek.
Open Source User Authentication solutions versus
Proprietary User Authentication solutions. The OSS
solution nominated in this category is WiKID. A solution
that enables two-factor authentication so that people can
access sensitive applications remotely and safely. Which is
widely used for online banking. As well as employees can
access their work servers from their own homes remotely.
The proprietary software that it aims to replace is Entrust
IdentityGuard.
Open Source Mobile Device Management solutions
versus Proprietary Mobile Device Management solu-
tions. The OSS solution nominated in this category is Mir-
adore, a solution that enables businesses to secure and
manage their devices appropriately. It also provides the
ability to automatically identify devices that are entering the
premises, as well as congure them remotely if required. The
proprietary software that it aims to replace is MobileIron.
Open Source Intrusion Prevention solutions versus
Proprietary Intrusion Prevention solutions. The OSS
solution nominated in this category is Snort. Which is highly
regarded for its ability to analyze packets in real time as well
as log them in order to nd and prevent possible threats from
causing any damage, it accomplishes this by correlating
specic information with one another. The proprietary
software that it aims to replace is Cisco IPS.
3.2 Survey Outlook and Discussions
Two different surveys were conducted in order to properly
measure opinions of the public. This was done in order to
come up with any ndings that would help aid in furthering
the research. It would have been possible to go with one
survey, but in order to properly gauge the results in an
effective manner, each survey had to have specic questions
that were targeted at a specic audience. This was done in
order to add more accuracy and depth to the ndings. The
rst survey was targeted at the general population. While the
second survey was aimed towards more IT centric people
with some form of expertise surrounding the topic.
Survey 1: General Public Survey
Question 1: How much money do you believe is spent on
information security products and services on an annual
basis?
In Fig. 1, respondents seem to underestimate the amount of
money that is being spent on security solutions and services,
with the majority agreeing on $1$25 billion being the answer.
However, it is far from the actual number that was spent during
2016s timeframe, with turns out of be just over $71 billion.
The results give us some insight in that the general population
underestimate the amount spent on these solutions.
Question 2: Do you believe that there exists a single solution
that is capable of addressing all of an organizations security
requirements or concerns?
In Fig. 2, most of the respondents believe that there does
not exist a single product that is capable of handling an
organizations many security needs. Although some notable
companies in the market are getting close to creating a single
product that is capable of addressing all of an organizations
security needs by merging different security components and
interconnecting them into a single environment.
Question 3: Do you believe organizations are properly
researching the market for security solutions before deciding
on selecting one, or just getting the popular solution that
everyone else is using?
In Fig. 3, interestingly enough, most respondents seem to
believe that organizations today are dedicating the proper
amount of resources in deciding which product/solution to
purchase. While it is true that a large number of companies
do end up selecting the market leading solutions, a majority
of organizations are carefully outlining their needs and
choosing the appropriate solutions that can accommodate the
specied needs.
Question 4: Do you believe open source software to be
generally more dangerous than proprietary software?
In Fig. 4, respondents seem to be under the impression
that open source software is more dangerous than proprietary
software. Although this statement has been proven to be
incorrect, it seems as if several false claims throughout the
years hampering the reputation of open source software has
attributed to the result that is now seen. It would take some
time as well as a different approach in order to correct the
incorrect perceived notions that the public holds towards
open source software.
Question 5: Do you believe that paid software solutions are
always superior to software solutions that are free?
In Fig. 5, most of the respondents agreed on the notion
that paid solutions are always going to be more superior to
their free counterparts. This is quite the revelation as it shows
how most peoples mindset function. Because it has a price
tag associated with a product/solution, it will not always
outperform a free solution. It can be argued that in most
cases, a paid solution might perform better than a free alter-
native, but that is not always the case. The results shed some
light into how most people think about solutions in general
and how their value would seem to increase with their price.
Exploring the Opportunities and Challenges of Open Source 121
Fig. 1 Survey question
No. 1 and its results
Fig. 2 Survey question
No. 2 and its results
Fig. 3 Survey question
No. 3 and its results
Fig. 4 Survey question
No. 4 and its results
122 I. Alsharif and A. Khelifi
Survey 2: IT Background Survey
Question 1: How exible is your organization towards the
annual budget that is dedicated towards purchasing or
maintaining IT security solutions?
In Fig. 6, the results that were gathered portrayed that
respondents believe organizations should a somewhat exi-
ble budget allocated towards maintaining and purchasing IT
security solutions. What this means is that most of the
organizations arent properly planning out the annual budget
and in turn have to adjust their budgets depending on their
needs. This possibly showcases that the individuals that are
responsible for creating these yearly budgets arent calcu-
lating the needs and factoring in the overhead required for
possible altercations.
Question 2: How many years of experience would a IT
security solution provider need to have before you would
consider purchasing or licensing their software/hardware?
In Fig. 7, the results showcase that most of the respon-
dents believe a minimum of 2 years of experience is required
for a solution provider before opting to purchase an IT
security solution from them. This indicates that organiza-
tions tend to lean towards a company that has built some
form of reputation for itself rather than go with a newly
founded company that is offering a similar IT security
solution. While prioritizing reputation is a good thing, it
could ultimately hinder the search for an optimal solution by
emphasizing reputation over functionality.
Question 3: Do you believe open source software lacks
proper enterprise-grade support?
In Fig. 8, most of the respondents leaned towards OSS
not having the proper amount of support. Which was odd, as
OSS solution providers do indeed provide enterprise-grade
support. However, it is usually exclusive to customers that
pay a subscription fee in order to access that level of support.
Thats not to say that all OSS solution providers follow suit
with this form of support, as many have fantastic support
through other channels such as community support.
Question 4: Do you believe that open source software is
secure?
In Fig. 9, interestingly enough, respondents seem to
believe the OSS is not as secure as it may seem. Which is
one of the common myths behind OSS, as it has been proven
to be an untrue assumption. Because of how OSS is boasted
as being one of the most secure forms of software due it
naturally beingwellopen. Which basically translates to
any possible vulnerable piece of code being patched up by
the community in no time.
Question 5: Do you believe that open source software is
reliable?
Fig. 5 Survey question
No. 5 and its results
Fig. 6 Survey question
No. 1 and its results
Exploring the Opportunities and Challenges of Open Source 123
In Fig. 10, the majority of respondents believe that open
source software is reliable, and it is. There are several
examples of OSS lasting for a long time and outliving other
proprietary solutions. A good example to showcase this
would be to talk about how Linux has been maintaining its
strength and success for all these years since its 1991 debut.
4 Results and Discussion
Many organizations and companies are trying their best to
follow and maintain industry standards and rules that are set
in place in order to be in compliance. This responsibility is
Fig. 7 Survey question
No. 2 and its results
Fig. 8 Survey question
No. 3 and its results
Fig. 9 Survey question
No. 4 and its results
124 I. Alsharif and A. Khelifi
shared among many industries today. Hence it is wise to
consider the nancial footprint of such solutions as they are
prone to compounding one another and in turn end up
raising the required IT security budget immensely. There-
fore, the initial proposition is to calculate cost difference that
can be achieved by replacing a number of proprietary IT
security solutions with open source solutions.
In order to estimate the potential cost that is required,
certain criteria had to be established, one of which was to
decide how many employees were currently working in the
enterprise for the sake of obtaining accurate results. In the
end, the most common size was selected, which is the small
to medium sized enterprises or SME for short. SMEs
typically contain between 50 and 250 employees, but for the
example at hand 200 was the number that was chosen.
However, another goal was to measure the potential
savings for a large enterprise that boasts around 5000
employees. Therefore, four tables would be constructed
detailing the estimated savings for both the SME and the
large enterprise. While also keeping in mind the different
operating system environments that are present in different
enterprises. Consequently, it was decided that Windows, and
Linux would be selected.
In Table 3, the total nancial savings that can be
observed from using OSS security solutions instead of
proprietary solutions in a Windows environment that is
comprised of 200 employees/users is $195,664 (+$17,000
yearly). The total nancial savings that can be observed from
using OSS security solutions instead of proprietary solutions
in a Linux environment that is comprised of 200
employees/users is $206,589 (+$17,000 yearly). As is
determined from Table 3.
In Table 4, the total nancial savings that can be
observed from using OSS security solutions instead of pro-
prietary solutions in a Windows environment that is com-
prised of 5000 employees/users is $4,890,350 (+$425,000
yearly). The total nancial savings that can be observed from
using OSS security solutions instead of proprietary solutions
in a Linux environment that is comprised of 5000
employees/users is $5,182,100 (+$425,000 yearly). As is
determined from Table 4.
As seen from the tables above, there indeed exists a
signicant nancial benet from replacing proprietary
solutions with open source solutions. However, there are
some caveats that tend to be linked with the use of open
source software. Which is that some of them do not offer free
support, as in some of the OSS solutions will have a certain
annual fee attached to them if having a functional support
channel with the developers is required. This could be
considered a downfall to OSS although not all of the solu-
tions follow this practice.
Another factor that is difcult to quantify is that switching
to OSS solutions will require some form of training for the
current workforce in order to gain the necessary skillset to
operate these solutions. Which might take time as well as
cost money. However, the nancial benet from switching
to an overall OSS focused platform will heavily eclipse the
potential cost of training required to use said solutions.
It is also important point out that some of the proprietary
solutions operate on a yearly license that needs to be
renewed, in this case, the yearly required amount is added
next to the total cost, as a way to simplify the amount of
money required and to generate a more accurate estimate.
5 Conclusions and Recommendations
In conclusion, whilst recent trends seem to be indicating that
open source security solutions seem to be thriving, now they
are considered to be realistic alternatives for various orga-
nizations in the cybersecurity eld. To have a glimpse into
the world of cybersecurity, the article presented the various
IT components that require protection and the existing
cybersecurity solutions. Five studies are discussed here to
introduce the OSS opportunities and challenges. In addition,
the open source and proprietary security paradigms are
compared in thirteen distinct categories to show the possi-
bility of considering OSS as a reliable alternative to com-
mercial software. These categories are endpoint security,
unied threat management, application rewall, anti-spam,
encryption, intrusion detection, network rewalls, user
authentication, network monitoring, risk management,
forensics, anti-spyware, and mobile device management and
intrusion prevention. Two different surveys were conducted
to properly measure opinions of the public to compare the
two software paradigms. As seen from the research, there
indeed exist nancial benets from replacing proprietary
solutions with open source solutions. However, there are
some caveats that tend to be linked with the use of open
Fig. 10 Survey question No. 5 and its results
Exploring the Opportunities and Challenges of Open Source 125
source software. Which is that some of them do not offer free
support, as in some of the OSS solutions will have a certain
annual fee attached to them if having a functional support
channel with the developers is required. This could be
considered a downfall to OSS although not all solutions
follow this practice. Another factor that is difcult to
quantify is that switching to OSS solutions will require some
form of training for the current workforce to gain the nec-
essary skillset to operate these solutions. Which might take
time as well as cost money. However, the nancial benet
from switching to an overall OSS focused platform will
heavily eclipse the potential cost of training required to use
Table 3 Estimated costs for 200 employees
Area of solution Proprietary license cost (windows
environment)
Proprietary license cost (Linux
environment)
Open source license
cost
Endpoint security $8000 (yearly) $8000 (yearly) $0
Unied threat
management
$5193 $5193 $0
Application rewall $4749 $4749 $0
Anti-spam $730 $730 $0
Encryption $1475 $12,400 $0
Intrusion detection $1199 $1199 $0
Network rewalls $2399 $2399 $0
User authentication $1600 $1600 $0
Network monitoring $9230 $9230 $0
Risk management $115,500 $115,500 $0
Forensics $3594 $3594 $0
Anti-spyware $9000 (Yearly) $9000 (Yearly) $0
Mobile device
management
$28,000 $28,000 $0
Intrusion prevention $21,995 $21,995 $0
Estimated cost $195,664 + $17,000 Yearly $206,589 + $17,000 Yearly $0
Table 4 Estimated costs for 5000 employees
Area of solution Proprietary license cost (windows
environment)
Proprietary license cost (Linux
environment)
Open source license
cost
Endpoint security $200,000 (yearly) $200,000 (yearly) $0
Unied threat
management
$129,825 $129,825 $0
Application rewall $118,725 $118,725 $0
Anti-spam $18,250 $18,250 $0
Encryption $35,625 $310,000 $0
Intrusion detection $29,975 $29,975 $0
Network rewalls $59,975 $59,975 $0
User authentication $40,000 $40,000 $0
Network monitoring $230,750 $230,750 $0
Risk management $2,887,500 $2,887,500 $0
Forensics $89,850 $89,850 $0
Anti-spyware $225,000 (yearly) $225,000 (yearly) $0
Mobile device
management
$700,000 $700,000 $0
Intrusion prevention $549,875 $549,875 $0
Estimated cost $4,890,350 + $425,000 yearly $5,182,100 + $425,000 yearly $0
126 I. Alsharif and A. Khelifi
said solutions. The implementation of the replacement of
propriety software by OSS as indicated in this paper can be
an interesting future research to validate the study with
concrete solution.
References
1. Levy, I.: Government Systems: How Much Security is Enough?
From http://security.governmentcomputing.com/features/2011/oct/
25/cesg-information-assurance-government. (2011)
2. Carman, A.: Study: High PriorityIssues Hamper Endpoint
Security Solution Implementation. From https://www.scmagazine.
com/endpoint-security-survey-illuminates-issues-for-it-profession
als/article/539374/. (2014)
3. Nigelow, S.J.: Security Channel Survey: What Security Clients
Want from Solution Providers. From http://searchitchannel.
techtarget.com/survey/Security-channel-survey-What-security-
clients-want-from-solution-providers. (2008)
4. Xing, M.: The Impact of Commercial Open Source Software on
Proprietary Software Producers and Social Welfare. From http://
www.jiem.org/index.php/jiem/article/view/1260/631. (2014)
5. De, R.: Economic Impact of Free and Open Source Software Usage
in GovernmentA Report. From http://icfoss.in/news/economic-
impact-of-free-and-open-source-software-usage-government-a-
report. (2009)
6. Peeling, N., Satchell, J.: Analysis of the Impact of Open Source
Software. Retrieved from http://www.eurim.org.uk/activities/oss/
0110qinetiqoss.pdf. (2001, October 1)
Exploring the Opportunities and Challenges of Open Source 127
Feasibility Analysis of Blockchain
for Donation-Based Crowdfunding
of Ethical Projects
Nida Khan and Rachid Ouaich
Abstract
Donation is a necessary social tool that is plagued by
many inherent shortcomings. A novel model in the form
of a decentralized app was designed in the Ethereum
blockchain to solve the challenges present and optimize
the process of Zakaah donation. Load and stress tests on
the prototype of the smart contract in the public testnet of
Ethereum were analyzed to gauge the feasibility of mass
usage. Similar tests were done in Hyperledger to conclude
on the optimum blockchain platform for Zakaah. An
anomaly was detected during the testing phase of the
decentralized app in the public testnet of Ethereum and it
was exploited to propose a novel strategy to enhance the
throughput of Ethereum. The testing is a pioneer in
evaluating the throughput and feasibility of a blockchain
based nancial product and provides a benchmark to
validate the business and technical hypotheses of other
similar nancial products and services.
Keywords
Blockchain Feasibility Donation Throughput
Zakaah Smart contract Fintech
1 Introduction
The world presently houses 795 million hungry people [1]
with approximately 4.95 billion people living on less than
$10 a day [2]. Zakaah is an obligation on Muslims to give
2.5% of their accumulated wealth annually for charitable
causes. $125 million donated by Zakaah and Sadaqah
(charity) helped 8.3 million people in 2015 [3]. The amount
$125 million represents 0.063% of the lower threshold of the
total Zakaah collected annually [4]. The process of donation
is ridden with several problems. There exists reliance on
third parties for donation-based payments [5], absence of an
easy and transparent way to donate and an inefcient dis-
tribution of money depriving the ones in need [6]. The
charities presently are always under scrutiny for the dis-
charge of money made available to them while the end
receivers remain at the mercy of charities. There are pre-
sently 1.7 billion Muslims with no transparent service to aid
in the discharge of the religious obligation of Zakaah.
The enumerated problems and the compelling need for a
transparent donation system motivated the development of
the Ethereum decentralized app, Zakaah dapp that forms the
foundation of this paper. The dapp is designed to protect
against third party fraud, ensure auditable [7] transactions
and execute real-time donations directly to the receivers.
A smart contract was coded to optimize the zakaah collec-
tion, distribution and impact documentation process through
the dapp. Blockchain is a nascent technology and there does
not exist another similar usage of smart contracts that could
have aided in the design and development process. Zakaah
dapp is a pioneer in this respect.
The paper is organized to give the relevant background in
Sect. 2. The functional architecture of the Zakaah dapp is
discussed in Sect. 3. Section 4of the paper highlights an
anomaly detected during the testing of dapp on the public
testnet of Ethereum and exploits the anomaly to analyze
submission of transactions and mining times independently
in Sect. 5.4. Zakaah is mostly discharged in the month of
Ramadhan, when Muslims observe fasting. Therefore, the
application has to be resilient to the extra load during this
month. In Sect. 5, the paper also elaborates the test results of
three different strategies employed to measure the through-
put of Ethereum during periods of extra load on the dapp and
discusses the feasibility of the different approaches adopted.
The paper also depicts in Sect. 5.5 the test results of ser-
vicing the requests of multiple users through a single node
N. Khan (&)
University of Luxembourg, Luxembourg City, Luxembourg
e-mail: nida.khan@uni.lu
R. Ouaich
ConexCap, Luxembourg City, Luxembourg
©Springer Nature Switzerland AG 2019
A. Al-Masri and K. Curran (eds.), Smart Technologies and Innovation for a Sustainable Future,
Advances in Science, Technology & Innovation, https://doi.org/10.1007/978-3-030-01659-3_17
129
functioning as an Ethereum client in comparison with setting
up a single dedicated node per user.
An analysis of the private networks of different block-
chains has already been conducted [8]. Therefore, a com-
parison of stress test results on the public Ethereum testnet
network and the private Hyperledger development environ-
ment was dealt with to aid in the proposition of an optimum
scalable blockchain-based solution to the problem. Related
work is highlighted in Sect. 6. Conclusions drawn and future
work is discussed in Sect. 7together with the proposition of
a novel strategy to improve the throughput of Ethereum and
increase the probability of transaction inclusion in the
blockchain. The decision was reached as a conclusion of the
tests conducted, which spans 0.3 million transactions suc-
cessfully submitted on the public Ethereum testnet, Ropsten
over a duration of 57 days and includes 3 contract creations
on the blockchain.
2 Background
Blockchain is a public ledger of transactions that consists of
a peer-to-peer network and a decentralized distributed
database. It is a decentralized ledger that is used to exchange
currency and perform deals and transactions without trusted
[9] intermediaries. The data structure in blockchain is a
continuously growing chain of blocks, with the latter refer-
encing the former. Each block is a record of individual
transactions that are secure against tampering. Ethereum is a
blockchain platform that provides the users with the service
to run smart contracts [10]. It is a decentralized technology
that aims to guarantee the outcomes for any user for his
interactions with any other individual or system [11].
Smart contracts are written in the programming language,
Solidity [12], which is similar to a JavaScript-like language
and are compiled down to the bytecode for the Ethereum
Virtual Machine (EVM) [13]. Smart contracts are any con-
tracts that are capable of automatic enforcement without the
need of a third party. They are computer programs that can
dene rules and consequences in an equivalent manner as
legal contracts [14]. A dapp is a decentralized app that
enables users to interact through a HTML/JavaScript web
application using a JavaScript API with the blockchain. The
dapp has its own business logic encoded in a smart contract
or several smart contacts deployed in Ethereum to ensure
persistent storage of data and transactions [15].
Hyperledger is hosted by the Linux Foundation and it is a
collaborative effort to develop blockchain-based distributed
ledgers. IBM provides blockchain solutions and services like
Hyperledger Fabric, leveraging on Hyperledger technologies
[16].
3 Functional Architecture
Zakaah dapp is conceptualized to fulll the obligation of
Zakaah according to a subset of categories dened in the
Shariah, Islamic Law, and aid in achieving some of the
Sustainable Development Goals of United Nations Devel-
opment Programme (UNDP) [17]. A charitable endowment,
waqf [18] is responsible for reviewing the verication of the
authenticity of the projects before exchanging the cryp-
tocurrency, Zakaah Coins, into physical currency. The ver-
ication of the projects hosted on the Zakaah dapp is done
by charities, where the addition of the latter is done by the
waqf. The entire architecture is built on donors and receivers
as the primary agents. Charities function solely as autho-
rizing entities and waqf is the body that triggers the
exchange into physical currency for the digital currency.
The donors and charities register through the smart contract.
A donor on registration can see a list of all the projects with their
respective charities, funding goal and category. The donor
purchases Zakaah Coins, a cryptocurrency, by transferring cash
to the bank account of the waqf. The exchange rate and the third
party payment integration in the dapp to facilitate the bank
transfer is to be determined by the business venture using the
dapp. When the donor has Zakaah Coins in his wallet, he can
donate these coins to any project he deems t. Once the funding
goal of a project is reached, the project can request the charity
for exchange of coins into physical currency.
Charities willevaluate the impact of the project. For example
if a project wants to build a well for providing drinking water
then they would have to upload on the blockchain the gov-
ernment permission to utilize that property for the said purpose.
This can be done through a function provided in the smart
contract. It is envisaged thatimages of receipts, documents and
the like will be uploaded on platforms like dropbox and the link
shared on the dapp. All the donations and all other data are
publicly available. The identity of the donors is private and can
be seen only by the donor himself and the waqf. The smart
contract ABI of the prototype of this dapp, which is deployed in
Ropsten [19] can be accessed together with the deployed
address from a GitHub repository (see [20]), facilitating public
usage of the smart contract for testing purposes.
Figure 1depicts the functional architecture of the
dapp. The design goals were accomplished keeping in mind
the need for transparency, auditability [21] and security.
4 Anomaly Detection in Dapp Testing
The implementation of the smart contract was done by using
Trufe[22] with Webpack [23]. A live demo (see [24]) of
the main functions of the smart contract in the testnet
130 N. Khan and R. Ouaich
environment ethereumjs-testrpc [25] has been done. Testnets
simulate the Ethereum network and EVM (Ethereum Virtual
Machine). ethereumjs-testrpc is a local testnet used for early
stage testing in Ethereum. Figure 2depicts a screenshot of
Zakaah dapp.
After the development and testing of the dapp on ether-
eumjs-testrpc, testing on the Ethereum public testnet, Ropsten
[19] was accomplished. In order to connect to Ropsten, Geth
[26] is used, which is useful for connecting to public net-
worked testnets. Connecting to Ropsten through Geth simu-
lates the real Ethereum network. This testing was done through
one node connected to a wireless network and the other to an
Ethernet wired connection to simulate the behavior of both
kinds of users. The behavior of the dapp was studied in case of
no Internet connectivity. It is a good design practice to test the
behavior of any application when Internet connection fails.
When Internet connectivity is non-existent or fails intermit-
tently a user might press Entermultiple times when he sees
nothing is happening [27]. It is essential to ensure the response
of the application for this kind of user behavior.
Everything that Geth persists is written inside its data
directory stored on the local node [28]. It was observed that
any transaction that is submitted in the absence of network
connectivity gets stored in the local nodes data directory for
Geth and is broadcasted to the transaction pool when net-
work connection is restored. Transactions in the dapp are
being submitted using web3.eth.sendTransaction [29] and
not web3.eth.sendRawTransaction [29]. The latter is used
for broadcasting transactions signed ofine. Essentially both
the signing of the transactions and their submission with the
return of the hash of the transaction is being done in the
absence of network connectivity. This anomaly is demon-
strated in a video, which was recorded during testing (see
[30]). Transactions were submitted with no Internet con-
nectivity through the Zakaah dapp and through a bash script
programmed to simulate the user in sub-mitting transactions
through the prototype to Ropsten.
5 Load and Stress Testing
Zakaah is an obligation which is discharged majorly during
the month of fasting, Ramadhan. Any application targeting
Zakaah donors should be able to handle the increase in load
during this time. It was therefore essential to do stress tests
on the Ethereum blockchain through the Zakaah smart
contract. A prototype of the smart contract was used to do
stress testing on the testnet, Ropsten. The prototypes of the
smart contract (Ethereum) and chaincode (Hyperledger), the
scripts used and the test results can be accessed through the
GitHub repository (see [20]).
The tests on Ropsten were conducted through 11
accounts [20]. The tests were run on two virtual machines, a
Windows-based operating system and another on Proxmox
Fig. 1 Functional architecture of Zakaah Dapp
Feasibility Analysis of Blockchain for Donation-Based 131
Virtual Environment [31]. Geth version 1.6.7-stable [26]on
linux-amd64 and Go version 1.8.1 [32] were used for the
tests. The prototype of the Zakaah smart contract was
deployed on Ropsten [20]. All transaction hashes and
timestamps can be veried through Ropsten [19]. The gas
price used in the transactions varies linearly between 30
gwei and 31 gwei and has a Transfer Wait time of 0.5 min
and a transaction Conrmation Time of less than 1 s [33].
The stress tests on Hyperledger were done on Fabric v0.6
[34]. Vagrant development environment was used with
security and privacy disabled. A single node private network
was used to complement the already available higher limit of
the throughput, 3000 transactions per second [35] of a single
node Ethereum private network in Parity [36].
5.1 Throughput Comparison of Synchronous,
Asynchronous and Offline Submission
of Transactions
Transactions in counts of 10, 100, 1000 and 10,000 were
submitted on Ropsten through the deployed smart contract
through a single account per node. It was observed that not
all transactions were mined even after a period of 24 h.
Three different mechanisms were used to submit transac-
tions. After conducting multiple tests with a single account,
10 accounts were created to submit transactions in parallel
through a single node to study the servicing of requests by a
node functioning as an Ethereum client connected to the
blockchain. Tests with 10 accounts were repeated to get an
adequate number of samples consisting of a large number of
transactions (15,000 and 40,000) to calculate the standard
deviation, margin of error, mean and condence interval
with 95% condence level on normalized data for success-
fully mined transactions to reach an unbiased conclusion on
the throughput. The value of z critical is 1.96.
Synchronous A stream of 1000 transactions was sub-
mitted to the blockchain. The test was repeated 15 times and
the results can be seen in Fig. 3. The shaded region repre-
sents the condence interval 0.5380.818, ris 0.277, µis
0.678 and margin of error is 0.140.
Asynchronous Batches of 10 transactions were submitted
after a delay of 80 s to the blockchain through the Ethereum
client. In each test, 1000 transactions were submitted and the
test was repeated 15 times. The test results can be seen in
Fig. 4. The delay of 80 s was found to give the maximum
throughput in the network conditions the tests were con-
ducted. Other delays of 10, 12, 15, 70 s among others were
tried but failed to give an optimum throughput. Figure 4
depicts that the condence interval is comparatively smaller
0.9370.961 accompanied by an increase in throughput with
aµof 0.949. The margin of error is 0.012 and ris also much
less at 0.024.
Ofine Transactions were submitted to Geth with no
Internet connectivity and post network connection estab-
lishment they were broadcasted automatically to the trans-
action pool for mining. The results can be seen in Fig. 5.
Both the margin of error 0.045 and r0.089 are small
Fig. 2 Screenshot of Zakaah Dapp
132 N. Khan and R. Ouaich
Fig. 3 Synchronous: r= 0.277,
µ= 0.678
Fig. 4 Asynchronous:
r= 0.024, µ= 0.949
Feasibility Analysis of Blockchain for Donation-Based 133
compared to synchronous but are more when compared to
asynchronous. The condence interval also is also wider
than asynchronous accompanied by a 1.6% increase in
throughput as compared to asynchronous.
5.2 Plausible Explanation for Increase
in Throughput for Asynchronous
Submission
Ethereum operates in an asynchronous environment, the
Internet. The command used to submit the transaction
through the JavaScript Console in the dapp and Geth, web3.
eth.sendTransaction is with a callback and this is also
asynchronous in nature. Therefore, an asynchronous sub-
mission of transactions gives improved throughput. If bat-
ches of data are transmitted, at periodic timeouts the
transactions that get mined increases by 27.1% in a small
population size (see Fig. 4) and 29.9% in a large population
size (see Fig. 6). The size of the batch and the timeout can be
determined by the prevailing network conditions.
5.3 Summary of Testing
Ofine test was conducted using 10, 1000 and 10,000
transactions from a single account rst. Both 10 and 1000
transactions were mined without any transactions being
dropped off by Geth as per heuristics and age. However
when 10,000 transactions were submitted only 4598 were
mined and the rest were rendered invalid. The size of the
local cache was increased from 128 to 1024 MB and the
tests were repeated with 10 accounts as mentioned before
and the total number of transactions that were mined
increased from 4598. However it still remains to be tested if
the increase in the number of transactions mined was due to
increase in the cache size of Geth on the Ethereum client or
the increase in the number of slots in the transaction pool for
multiple accounts (4096 transactions with 1024 in queue
were the transaction pool statistics for Geth on the Ethereum
client for multiple accounts with each account permitted to
have 16 executable transactions and 64 transactions in queue
[37]). It was also observed that during ofine submission,
the mined transactions were in blocks, which had more
transactions than found normally in the testnet. Hence, an
increase in the number of transactions in a block was
witnessed.
Throughput was also seen to be affected by whether the
network connection to the blockchain is through wireless or
an Ethernet cable. The wired Ethernet used had a download
speed of 814.59 Mbit/s and an upload speed of 498.60
Mbit/s. The wireless had a download speed of 14.12 Mbit/s
and an upload speed of 1.51 Mbit/s. Wireless was from a
distance of 13.97 km from the best server and reported a
network latency of 43.824 ms. The wired Ethernet was from
a distance of 14.86 km from the best server and recorded a
Fig. 5 Ofine: r= 0.089,
µ= 0.965
134 N. Khan and R. Ouaich
latency of 4.687 ms (tests conducted using [38]). The load
testing was done on both the environments whereas the
stress tests to get the standard deviation were executed on
the wireless in the wake of a larger number of users using the
wireless to access the services on the Internet [39].
100 synchronous transactions were mined in an Ethernet
connection but the throughput decreased by a considerable
percentage over a wireless connection. Asynchronous sub-
mission of transactions with the delay of 80 s gave a
throughput in the range of 92.994.9% in both Ethernet
wired and wireless connections in all ranges of the transac-
tions sent and came across as the most suited mechanism for
submitting transactions to the Ethereum blockchain.
5.4 Analysis of Submission and Mining
Functions
The anomaly detection during dapp testing provided the
opportunity to study the submission of transactions sepa-
rately from the mining. A test was conducted by sending
1000 transactions in ofine mode to measure the submission
and mining times separately. The test was repeated 6 times
resulting in an average time of 357.67 s for submission and
an average mining time of 294.67 s. The throughput in the
case of 10,000 transactions was extremely poor in ofine
mode and hence only one sample data was chosen which
recorded a throughput of 94.9% (see the data used in [20]).
The submission time for 10,000 transactions was 4240 s
whereas the mining time was 10,619 s. It was thus observed
that mining time increases at a much larger rate than sub-
mission time and is much higher than submission time when
there is network congestion by a lot of pending transactions.
However, mining time is less or equivalent to the submission
time for periods of low network trafc. It was also observed
that transactions are mined within seconds after being
broadcast from the Geth node. However, on account of
network congestion, they remain pending in Geth node and
their broadcast is delayed. Therefore, a larger cache size
would affect the throughput but more validation by testing is
needed.
5.5 Effect on Throughput by Serial and Parallel
Submission of Transactions
The throughput of Ethereum can be increased if the number
of transactions that are submitted to the blockchain increa-
ses. Ethereum has a exible gas limit for the blocks and
thereby the gas limit will increase with the increase in the
number of transactions [40], resulting in an increase in the
throughput. A test was done by submitting 100 2 syn-
chronous transactions in parallel from two nodes from two
accounts and then submitting 200 synchronous transactions
from a single node from one account over an Ethernet wired
connection. There was a difference in the total time taken by
serial and parallel submission in this case. When parallel
submission of transactions was done from two different
Fig. 6 Comparison for 40,000
transactions
Feasibility Analysis of Blockchain for Donation-Based 135
nodes, then the submission time was much less and there
was an increase in the throughput. In parallel submission of
transactions, all 200 were mined and in serial submission
only 143 were mined, hence there was a decrease in mining
time observed in serial submission. This is also because of
the limit on the transactions by a single account in the
transaction pool [37]. Tests were repeated for 1000 trans-
actions from a single account on a node and 10 accounts
submitting a total of 1000 transactions in parallel from the
same node. It was observed that the serial submission had an
average normalized mean throughput of 0.579 as compared
to 0.717 in parallel submission for 6 samples, each of 1000
transactions. This led to the conclusion that utilizing a single
node for an individual user is both infeasible technically and
practically.
5.6 Comparison with Hyperledger
The load and stress tests in Hyperledger were done on the
same pattern of 10, 100, 1000 and 10,000 transactions
submitted in a synchronous stream. The test results show
that the throughput of Hyperledger is very high compared to
the public Ethereum testnet. No transactions failed in
Hyperledger but a more thorough evaluation needs to be
done by increasing the number of nodes in the private net-
work to see the reduction in the transactions handled per
second and come up with an appropriate number of nodes in
which a reasonable throughput is obtained. A similar eval-
uation should be done for Ethereum private network by
altering relevant parameters like block gas limit to include
more transactions. Such data would help in setting up private
networks in different geographical regions similar to the
ofces of Islamic Relief, UK that function in different
countries to administer the collection and distribution of
Zakaah [3].
There is already data on comparison of private networks
of Hyperledger and Ethereum [8] but no such comparison
was available between the public Ethereum network and
Hyperledger to complete the research on different options
available. Further, the cost incurred is higher in setting up a
private network and in Ethereum, security features are not
built-in like in Hyperledger. This precludes a higher
investment of capital. Tests were repeated 6 times for a batch
of 1000 transactions from a single account per node and
Ethereum recorded an average mining time of 605.33 s with
Hyperledger at 300 s for 6000 transactions in total. The
mean throughput of Ethereum was 57.95% and Hyperledger
was 100%. The results (calculations and data can be seen in
[20]) are good for setting a base for deciding which block-
chain to use but they do not do justice to the real throughput
of the blockchain platforms. This is because as seen in
Sect. 5.5 Effect on Throughput by Serial and Parallel
Submission of Transactions, the throughput of Ethereum
increases with increase in the number of nodes sending
transactions until it reaches a certain maximum limit [8],
whereas it decreases in Hyperledger [8].
6 Related Work
Ethereum is amongst the most popular blockchain platforms
and emerges as the leader because of its smart contract
functionality. It is thus surprising that there are rare studies,
if any, having been conducted on analyzing the platform
outside formal models. Gervais et al. [41] introduce a novel
blockchain simulator to analyze the security and perfor-
mance of proof of work blockchains like Ethereum. The
present work differs in being an analysis of the performance
of the Ethereum public test network, which is active and
being used globally. In [42] Anderson et al. categorize the
transactions in Ethereum into currency transfers and contract
creations. This is different from the work accomplished in
this paper where transactions have been critically evaluated
for throughput enhancement and used to perform stress tests
on the blockchain. In [8] a benchmarking framework has
been proposed to analyze private blockchains focusing on
the performance metrics of existing blockchain platforms.
Similar work in Ethereum has been accomplished in [35] for
analyzing throughput of transactions in private network and
in [43] for benchmarking full blockchain processing time.
[44] negates the assumption that information dissemination
in the Bitcoin blockchain network is directly received by the
nodes. [45] attempts to explain the factors resulting in the
probability of transactions being mined in Ethereum as 70%.
The work accomplished in the present paper comes very
close by providing a transaction inclusion probability range
of 6367.8% with a 95% condence level for transactions
submitted synchronously (see Figs. 3and 6). In [46] Ahmed
et al. propose a decentralized smart contract system to pre-
serve transactional privacy on the blockchain. The work in
the literature so far does not embark on any analysis of a
dapp and a smart contract use case. Additionally the test
results in the paper obtained are the product of submitted
transactions and not simulations. This work is a pioneer in
many respects including providing a validated solution to
increase throughput and probability of transaction inclusion
by 92.994.9%.
7 Conclusions and Future Work
The mechanism of asynchronous submission of transactions
and the ofine collection of transactions for broadcasting
later on can be merged to realize a practical methodology to
submit transactions in the blockchain. Asynchronous
136 N. Khan and R. Ouaich
submission can be impractical depriving the users of
accessing the blockchain during the timeouts. A combination
as stated above of asynchronous with ofine mechanism can
be more realistic from the perspective of providing a good
user experience for the dapp and can be seen in Fig. 8.
During the timeout for the combination methodology, the
read requests by the users can still be returned by Geth
searching the local copy of the blockchain. A new block is
created every 15 s in Ethereum [45] and to ascertain its
inclusion in the main chain at least 3 block conrmations are
needed [47] so a timeout of even 45 s would be able to fetch
relevant data for the read queries by the users if they are
present in the recently added blocks. The transactions sub-
mitted would get stored in the local cache for Geth.
In the implementation governing asynchronous transac-
tion submission, the throughput has already been evaluated
and tested to lie in the interval 92.994.9% and this imple-
mentation can be visualized as in Fig. 7. The tests for a
combination of the two above mentioned mechanisms were
carried out by selecting random timeouts. A timeout of 30 s
was chosen in which there was no Internet connectivity and
this was followed by a period of 30 s in which the node was
connected to the blockchain. A bash script was run in par-
allel throughout the time transactions were submitted to
repeat this timeout persistently. A mean throughput of
64.76% was recorded. The second test was conducted with a
timeout of 10 s of no Internet connectivity followed by
Internet connectivity for 80 s. A mean throughput of 53.04%
was obtained. The tests were repeated for a total of 40,000
transactions. It is thus observed that the choice of timeout
has a major impact on the throughput.
Another peculiar observation during testing for the
propositions was that the rst batch of 10,000 transactions
had a throughput of 94.53%, which was followed by another
batch with 64% and then it dropped drastically in the sub-
sequent two batches to 25.47 and 25.83% respectively. The
possible explanation for this is that blockchain is presently
not able to handle a high load. The throughput will be good
for low loads and fall sharply for a high load on the
blockchain network. Asynchronous divides the load through
the timeouts. In the wake of the improvement in throughput
asynchronous transaction submission offers, it is imperative
that more work be done on Proposition II (see Fig. 8)to
provide a continuous access to the blockchain service, while
retaining the throughput increase recorded in Proposition I
(Fig. 7).
Stress test results reveal that maximum throughput is
obtained in asynchronous submission of transactions and it
is the most stable in terms of performance. Scalability issues
exist in both Ethereum and Hyperledger. The ideal
throughput evaluation in this paper might decrease when an
extremely high number of transactions are submitted in
parallel from different nodes in Ethereum on account of
network congestion. In Hyperledger too the performance
would deteriorate because of increase in the number of nodes
[8]. As per test results better throughput would be obtained
when multiple users interact with the blockchain through a
node. A business organization can set up several nodes as
Ethereum clients, distributed globally based on the number
of potential users and target markets. It was computationally
expensive to mine for the requisite ethers to submit more
than 0.3 million transactions on the public testnet and the
Fig. 7 Proposition I
Feasibility Analysis of Blockchain for Donation-Based 137
tests conducted provide a real benchmark of the performance
of the blockchain through a dapp and a smart contract.
Zakaah dapp to implement a donation-based crowd-
funding platform on blockchain would be a better proposi-
tion presently to avoid the costs of setting up a private
network. No reliable data is available on the total number of
Zakaah donors and the average donations made by them
annually or during Ramadhan enabling an estimation of the
average number of transactions needed per donor. The
importance of such an application can be realized from the
fact that if an amount equivalent to Zakaah, $192.5 billion
[48] is taken from the total wealth of $7.7 trillion dollars of
2043 billionaires in the world [49] then this has the potential
to help 12.3 billion people. This is equivalent to 1.77 times
more than the worlds population [48]. Considering the
future implications and in the absence of requisite data, the
optimum approach is to use the Zakaah dapp in a small
geographical region limiting the number of users to gather
usage statistics by employing the proposed asynchronous
transaction submission mechanism until an optimization for
Proposition II is reached.
Acknowledgements This work is funded by the Luxembourg
National Research Fund under its AFR-PPP Programme, which is
aimed at providing Ph.D. and Post Doc grants for innovation and
industry partnerships. The work came into execution by the efforts of
Anass Patel from ConexCap [50] under the able guidance of Dr. Radu
State from Services and Data Management in Distributed Systems
Research Group [51].
References
1. 2016 World Hunger and Poverty Facts and Statistics: http://www.
worldhunger.org/2015-world-hunger-and-poverty-facts-and-
statistics/
2. Luhby, T.: 71% of the Worlds Population Lives on Less Than $10
a Day. CNN Money 15. http://money.cnn.com/2015/07/08/news/
economy/global-low-income/
3. Islamic Relief, UK: http://www.islamic-relief.org.uk/
4. Global Humanitarian Assistance: Understanding the Role of Zakat
in Humanitarian Response
5. Soghoian, C., Friedrichs, O., Jakobsson, M.: The threat of political
phishing. In: Proceedings of the Second International Symposium
on Human Aspects of Information Security and Assurance,
HAISA (2008)
6. NPR - National Public Radio: Special Report: The American Red
Cross - Red Cross Spent 25 Percent of Haiti Donations on Internal
Expenses. http://www.npr.org/2016/06/16/482020436/senators-
report-nds-fundamental-concerns-about-red-cross-nances
7. Snow, P., Deery, B., Lu, J., Johnston, D., Kirby, P.: Business
Processes Secured by Immutable Audit Trails on the Blockchain
(2014)
8. Dinh, T.T.A., Wang, J., Chen, G., Liu, R., Ooi, B.C., Tan, K.-L.:
BLOCKBENCH: A Framework for Analyzing Private Block-
chains. SIGMOD17
9. Singh, S., Singh, N.: Blockchain: Future of Financial and Cyber
Security. IEEE (May 2016)
10. Ethereum: Homestead Release: Blockchain App Platform. https://
www.ethereum.org/
11. Wood, G.: Ethereum: A Secure Decentralized Generalized Trans-
action Ledger. EIP-150 Revision
12. Solidity Documentation. https://solidity.readthedocs.io/en/develop/
Fig. 8 Proposition II
138 N. Khan and R. Ouaich
13. Bhargavan, K., Delignat-Lavaud, A., Fournet, C., Golla-mudi, A.,
Gonthier, G., Kobeissi, N., Rastogi, A., Sibut-Pinote, T., Swamy,
N., Zanella-Beguelin, S.: Formal Verication of Smart Contracts
(August 2016)
14. BBVA Research: Smart Contracts: The Ultimate Automation of
Trust? Digital Economy Outlook (2015)
15. Ethereum Homestead: Contracts and Transactions: Dapps. http://
ethdocs.org/en/latest/contracts-and-transactions/developer-tools.
html
16. IBM Blockchain Based on Hyperledger Fabric from the Linux
Foundation: https://www.ibm.com/blockchain/hyperledger.html
17. Sustainable Development Goals, SDGs: http://www.undp.org/
content/undp/en/home/sustainable-development-goals.html
18. Puad, N.A.B.M., Rafdi, N.B.J., Shahar, W.S.S.B.: Issues and
challenges of waqf instrument: a case study in MAIS. In:
E-proceedings of the Conference on Management and Muamalah
(CoMM 2014), 2627, Synergizing Knowledge on Management
and Muamalah (E-ISBN: 978-983-3048-92-2) (May 2014)
19. Ropsten Revival Testnet: https://ropsten.etherscan.io/
20. Blockchain Stress Testing Scripts and Results. https://github.com/
nidakhanlu/blockchain-stresstests
21. Maupin, J.A.: Blockchains and the G20: Building an Inclusive,
Transparent and Accountable Digital Economy. SSRN, 17 Mar
2017
22. Trufe Development Framework. http://trufeframework.com/
23. Webpack Module Bundler. https://webpack.js.org/
24. Demo of the Zakaah Dapp. https://www.youtube.com/watch?v=
Bh3Pkg_UU0k
25. Testrpc - Node.js Based Ethereum Client for Testing and
Development. https://github.com/ethereumjs/testrpc
26. Geth: go-ethereum: https://github.com/ethereum/go-ethereum/
wiki/geth
27. Hewlett Packard Enterprise: Designing Always-on Apps That
Dont Crash When the Internet Connection Fails. enterprise.nxt
(May 2017)
28. Ethereum: Backup and Restore. https://github.com/ethereum/go-
ethereum/wiki/Backup-&-restore
29. JavaScript API. https://github.com/ethereum/wiki/wiki/JavaScript-
API
30. Demo of the Ofine Submission of Transactions in Ethereum:
https://youtu.be/oHVCQvaUbxo
31. Proxmox Virtual Environment. https://www.proxmox.com/en/
32. The Go Programming Language. https://golang.org/
33. ETH Gas Station. http://ethgasstation.info/. Info that existed before
Ethereums Byzantium Hard Fork, 16 Oct 2017
34. Writing, Building and Running Chaincode in a Development
Environment. http://fabricdocs.readthedocs.io/en/origin-v0.6/
Setup/Chaincode-setup.html
35. Internal Testing for Parity-only Network. https://blog.ethcore.io/
onwards/
36. Parity, Ethereum Browser. https://parity.io/
37. Transaction Pool Go File. https://github.com/ethereum/go-
ethereum/blob/master/core/tx_pool.go. Lines 125145
38. https://raw.githubusercontent.com/sivel/speedtest-cli/master/
speedtest.py
39. Tech: NTIA survey: More Americans Using Wireless Internet at
Home. https://www.fedscoop.com/ntia-survey-more-americans-
welcome-wireless-internet-into-their-home/
40. Ethereum Whitepaper. https://github.com/ethereum/wiki/wiki/
White-Paper
41. Gervais, A., Karame, G.O., Wst, K., Glykantzis, V., Ritzdor, H.,
Capkun, S.: On the security and performance of proof of work
blockchains. In: ACM Conference on Computer and Communi-
cation Security (CCS). (2016). https://eprint.iacr.org/2016/555.pdf
42. Anderson, L., Holz, R., Ponomarev, A., Rimba, P., Weber, I.: New
Kids on the Block: An Analysis of Modern Blockchains. CoRR
abs/1606.06530: n. pag. (2016)
43. Ethereum Benchmarks. https://github.com/ethereum/wiki/wiki/
Benchmarks
44. Gervais, A., Ritzdor, H., Karame, G.O., Capkun, S.: Tampering
with the delivery of blocks and transactions in Bitcoin. In:
Proceedings of the ACM Conference on Computer and Commu-
nication Security (CCS) (2015)
45. ETH Gas Station: Current Dynamics of Transaction Inclusion on
Ethereum. (April 2017). https://medium.com/@ethgasstation/
current-dynamics-of-transaction-inclusion-on-ethereum-
ae8912edc960
46. Kosba, A., Miller, A., Shiy, E., Weny, Z., Papamanthou, C.:
Hawk: The Blockchain Model of Cryptography and Privacy-
Preserving Smart Contracts
47. Coinbase Support: How do I Send Digital Currency? https://
support.coinbase.com/customer/portal/articles/971437
48. Islamic Relief Annual Reports: Calculations Done from Data in the
Annual Reports. http://www.islamic-relief.org.uk/about-us/annual-
reports/
49. Forbes: The Worlds Billionaires. https://www.forbes.com/
billionaires/#55eb261d251c
50. ConexCap: Building Financial Trust With and For Communities.
http://www.conexcap.com/
51. SEDAN, Services and Data Management. https://wwwen.uni.lu/
snt/research/sedan
Feasibility Analysis of Blockchain for Donation-Based 139
Foreign Policy of the United Arab Emirates
(UAE): Continuity and Change
Mariam Alzaabi
Abstract
This paper analyzes how the United Arab Emirates
(UAE) foreign policy was built, developed, and evolved
by exploring the states foreign policy tools throughout
two major periods of time; the Zayed era (19712004)
and the post-Zayed era (2004today). It utilizes various
theoretical methods, concepts, and frameworks of inter-
national relations such as small statesand soft power.
The paper examines the role of changing leadership, and
the effects of regional and international eventssuch as
the Arab Springand globalization on the UAE foreign
policy in the post-Zayed era. By comparing different
aspects of continuity and change in the states foreign
policy tools across the Zayed and post-Zayed eras, the
paper concludes that UAEs foreign policy in the
post-Zayed is a dynamic period that did not pivot away
from the original foreign policy goals and principle of the
Zayed era. The paper nds that the UAE foreign policy in
the post-Zayed era is a mere progressive continuation of
the Zayed FP goals and principles.
Keywords
UAE foreign policy Foreign policy tools
Small states Soft power Hard power
1 Introduction
In the past two decades, the UAE grew as one of the most
assertive and dynamic forces of the Middle East and North
Africa (MENA) region. The UAE is no longer holds the
image of a small rentier state of the Arabian Gulf as it
progressed into a key regional player with soft power, eco-
nomic and military might. For instance, the Economist
magazine has referred to the current UAE administration as
one that functions like a Little Sparta,emphasizing on the
UAEs growing hard power capabilities [1]. On the other
hand, Dubaization [2] is now an actual term that is used to
describe the process of urbanizing a city with futuristic,
pioneering architecture,which speaks volumes to the
UAEs soft power and vision of transforming itself into a
global hub and a brand for development and prosperity. The
UAEs current outlook is a huge transformation considering
the fact that the UAE was only born four decades ago (1971)
in the turbulent and hostile MENA region. It was a small
monarchic federation, with a small population, a reinter oil
wealth and most importantly a tribal society that lacked the
experience of statehood. Today, oil is no longer the only
driver for UAEs prosperous ambitions as the country has
moved away from the conventional way of doing things,
adopting a new style of foreign policy (FP) orientation and
application tools.
In this paper, we look at the UAE FP by identifying two
separate Eras of FP behavior, the Zayed era (19712004)
and the Post-Zayed era (2004Today). First, we will
examine the UAE FP goals, principles and tools during the
Zayed era. Second, we will explore the emergence of a new
age of FP during the Post-Zayed era by examining three
different domestic, regional and international factors to
explain the FP orientation of the UAE in the Post-Zayed era.
These factors include the change in UAE leadership, the
Arab Spring and the process of globalization. Finally, we
will showcase different examples of UAE FP tools in the
Post-Zayed era to understand the aspects of continuity and
changes in the UAE FP, and to answer the main question
behind this paper of did the UAE FP in the Post-Zayed era
pivot away from the original FP goals and principles of the
Zayed era?
M. Alzaabi (&)
College of Security and Global Studies, American University
in the Emirates, Dubai, UAE
e-mail: mmaalzaabi@gmail.com
©Springer Nature Switzerland AG 2019
A. Al-Masri and K. Curran (eds.), Smart Technologies and Innovation for a Sustainable Future,
Advances in Science, Technology & Innovation, https://doi.org/10.1007/978-3-030-01659-3_18
141
2 Literature Review
2.1 UAE Foreign Policy (1971Today)
There are several prominent books on the subject of UAE
FP; the majority of them were published during the Sheikh
Zayed era (1971-2004). Several authors such as [36], have
suggested that there are ve major objective conditions that
affected how the UAE FP was constructed during the Zayed
era (19712004). These objectives are: the countrys rentier
wealth, its strategic position, small citizen population, Arab
and Muslim identity and nally the tribal connections
between the small Gulf States. [7] also points out similar
attributes by exploring how the UAE came into existence
with a remarkable wealth, a small population that grew to
encompass a large number of foreigners, and federal form of
government in a tribal society like the Arabian Peninsula.
According to [3,57], the UAEs FP during the rst
30 years was majorly in the hands of the late Sheikh Zayed
AlNehyan. This is important to note, as its unlikely for the
president in most federal states to be the primary source of
authority on FP. They all suggest that Zayeds charismatic
personality has played a major role in him consuming such
position and dominating the arena of decision-making.
In regards to the UAE foreign policy during the
Post-Zayed era, there are several important works on the
subject that must be highlighted. For instance, [8] provide an
interesting look at the UAE foreign policy during the Zayed
era and the Post-Zayed era. According to [8], the change of
leadership and its effect on UAE FP identity, for instance,
the author clearly points out that Zayed was known for his
wisdom and charisma to mediate issues, while Sheikh
Khalifa bin Zayed (current UAE president) is known for his
emphasis on cooperation and coordination to achieve the
shared goals of the GCC block. Moreover, [8] points out that
the UAE FP during the Post-Zayed era have witnessed three
major changes, all of which are in relation to the new
leadership of the state, which includes the rising role of H.H.
Sheikh Mohammed Bin Zayed, Crown Prince of Abu Dhabi.
Also, [8] emphasizes that the UAE is no longer heavily
invested in Arab and Islamic matters, its now more outward
looking in its relations with the west, and consuming a role
of heavily pressuring Iran through the international sphere
and its organizations. Moreover, the author identies two
major tools used by the UAE in its FP, diplomatic ones and
economic tools afrming the concentrated efforts of UAE
foreign aid policy in its international relations.
In addition, [9] stresses on the new realities of the region
by looking into the effects of the Arab Spring on the different
GCC States. The different chapters of the book [8] highlight
major themes such as effect of regional contexts on the UAE
internal structure and political system change. For instance,
[9] referred to Sheikh Khalifas era as an anticipated gen-
erational changeand highlighted the new interests of the
UAE foreign policy because of the changing balance of
power in the region. [9] underlined the important view that
the UAE in the Post-Zayed era is a state that plays a major
role on the Arab front, citing examples of UAE participation
in the Libya No-Fly Zone and Bahrain uprisings.
An interesting view on the development of the UAE FP
after Zayed is provided by an Emirati author [10], who
makes the clear distinction that the UAE FP can be analyzed
through two stages or eras: The Zayed era (19712004) and
the Post-Zayed era (2004Current). Concerning the
post-Zayed era, [10] points out that the UAE have grown
more assertive and dynamic in nature highlighting the cur-
rent active endeavors by the UAE on the international arena.
According to [10], while Zayeds FP was idealconsuming
the natural role of a small state, the post-Zayed FP is taking
the international or global direction but totally remaining
realistic in its approach. [10] emphasizes that the economy is
what mobilizes this international approach of UAE FP,
pointing out that other aspects such as security and state
identity are less inuential.
Soubrier [11] provide another thought-provoking view
about the Post-Zayed era UAE FP, which studies the
UAE FP through the lens of the countrys domestic and
external environment. The author offers his own under-
standing of the UAE FP orientation throughout both eras, the
Zayed era and The Post-Zayed era. According to [11],
Sheikh Khalifas succession had no effect on the overall
direction of the UAE foreign policy. In fact, he looks at the
current UAE foreign policy as a continuation of Zayeds
legacy in terms of goals, commitments and FP tools. In
addition, [11], emphasizes that the country has re-emerged
on a regional scale and is more active in the Arab issues,
citing its efforts in the Arab Quartet.
Moreover, [12] focuses on the fallout of the Arab Spring
on the UAE FP in comparison to Qatars FP. According to
[12], the Arab Spring created a power vacuum that forced
GCC states to compete amongst each other to take charge of
the Arab World. Ulrichsen [12] Emphasizes on how the
Arab Spring drove the UAE to pursue a security policy that
stresses on the credibility of the ruling family. Furthermore,
[12] highlights that UAE post Arab Spring is no longer
armed neutral,the UAE is now projecting actual hard
power through its participation in several operations like
Bahrain, Libya and most importantly in Yemen. Neverthe-
less, this is not evidence that the UAE is shying away from
its core FP principles and FP continuity. In fact, [12] argues
142 M. Alzaabi
that the UAEs participation in these military operations is in
fact serving the countrys sovereignty in terms of regime
legitimacy and survival strategy.
Finally, one of the most updated and recent insights on
UAE foreign policy is provided by Saeed [13], which focus
on displaying a perspective of how FP making in the UAE
have changed. He adds to the previous works on the
UAE FP by supporting the view that Zayed was keen on
following a FP of cooperation with the international com-
munity and utilizing diplomatic means to resolve issues. On
the matter of UAE FP change or shift, [13] indicates that the
UAE FP change in the post-Zayed era is not related to one
factor (i.e. change in leadership). Nevertheless, its rather the
outcome of continuous change in the UAE foreign policy
orientation since the 1990s through the internationalization
of the country and the move away from its focus on Arab
and Islamic dimension.
2.2 Foreign Policy Tools| Soft Power
and Hard Power
States utilize different foreign policy tools and instruments to
pursue achieving their goals, principals and interests
regionally and internationally. According to [6,14], these
foreign policy tools can be seen through the broad categories
of diplomatic tools, economic tools and military tools. They
explain that the diplomatic tools are one the most prominent
instruments states use in FP. According to [6], diplomatic
foreign policy tools include the exchange of resources
through embassies and consulates. He also emphasizes that
its also about the skills states employ to partake in the
international system, mainly by joining international orga-
nizations and institution. Close-up Foundation [14] looks at
it as the ability to negotiate terms of interests between states.
Moreover, [6,14,15], all state that economic tools are
activities states use to manage and redistribute its economic
wealth within the state or internationally, and they are usu-
ally linked to activities such as trade, tariffs, sanctions, aid
and subsidies. Finally, [15] identies military instruments as
those activities of participating in military operations,
mobilization of troops, starting wars, and armed
interventions.
On the other hand, [16,17] point out that foreign policy
tools can be seen through the lens of power types identied
by [16] himself such as Soft Powerand Hard Power.
Hard power would include tools and instruments of coercion
by threatening other states and achieving the FP goals and
interests by force. Clear examples of hard power tools would
be the use of military tools by waging a war, or the use of
economic tools of sanctions. Whereas tools of soft power, a
term coined by [16] in 1991, include actions that would
stimulate attraction based on values, culture and politics.
Soft power instruments co-opt rather than coerce, and they
would usually include diplomacy, foreign aid and public
diplomacy.
In addition, for the UAE, [14] points out that diplomacy,
economic instruments and media are the most prominent
instruments of foreign policy used during the Zayed era. In
his explanation for disregarding the military tools in Zayeds
Foreign policy era, [14] claries that the UAE have disre-
garded military instruments due to the countryssmallness
and its ability to successfully employ other tools to serve
protecting its national interests.
3 UAE FP: The Zayed Era
3.1 UAE FP Goals and Principles
and the Leadership Dimension
The main FP goals of all states include maintaining state
sovereignty, supporting national security, building power
capacity, increasing the level of economic prosperity,
strengthening its international standing and achieving inter-
national peace and stability [6]. For a small state like the
UAE, its minimum target of FP includes the different aspects
of maintaining its state sovereignty, protecting its national
interests and deterring outside inuences [4].
However, the leadership dimension is a key part of the FP
making in most states. For the UAE, its FP was mainly the
reection of its founder, Sheikh Zayed AlNehyan, values
and political perceptions [6]. In 1972, Zayed laid out the
main goals of the UAE foreign policy during his rst ever
speech as a president [6]. He emphasized on how the UAE
foreign policy is all about resolving conicts peacefully with
neighboring countries, supporting Arab causes, coordinating
with Arab states in all elds, and committing to the inter-
national principles of the UN Charter [6].
On one hand, Zayeds identity as an Arab and Muslim
guided the UAE into adopting this set of FP goals. For
instance, his sense of belonging to the Arab world is what
motivated the UAE to be a great advocate and supporter for
the Palestinian case. Moreover, the Islamic value of
humanitarian support is a clear motivator for UAEs out-
standing record in providing foreign aid for the Arabs and
the Muslim world.
One the other hand, the distinctive features that are dis-
played in Sheikh Zayeds speech happen to also be a typical
set of behaviors that small states tend to follow. For instance,
small states tend to limit their behavior to their immediate
geography, project a lower contribution in world affairs, and
focus more on regional issues [18]. For the UAE, this
translate into a foreign policy that is focused on establishing
cardinal relations with neighboring Gulf States and limiting
their inuence to the Arab and Muslim dimension [5].
Foreign Policy of the United Arab Emirates (UAE) 143
Hence, we could say that objective conditions that dene the
UAE FP of the Zayed era include the different small state
attribute of size and population, but also its remarkable oil
wealth, its strategic position, and most importantly its lead-
ership. In the next section, we will showcase the different FP
tools used during the Zayed era to showcase how theyre the
reection of Zayeds FP perceptions and values as a leader.
3.2 Zayed FP Tools
Quiet Diplomacy: Iran and the Three Islands. Diplomacy
is often regarded as the most prominent tool in FP. As for the
UAE, it was the late Sheikh Zayed who initiated the concept
of quiet diplomacyas an important part of the UAE FP
strategy, especially with his way of handling the three
islands disputewith Iran [14]. Back in 1971, Iran was able
to utilize the British departure from the area to its benetas
the later have controlled the area and served as a hegemonic
power for a long time [8]. Consequently, Iran occupied the
three islands known as the greater Tumb, the lesser Tumb
and Abu Mosa on the eve of the UAE independence from
the British, and Iran evicted the islands inhabits from their
homes, which led many of them to ee to Ras Alkhaima
[19]. Iran claimed that those islands are part of its territory,
and there was no power to stop it from doing so. According
to the author, Zayed had little room to act upon as his new
state was fragile with no real power or allies, and Iran was
fully aware of that [5].
Nevertheless, the UAEs emphasis on good neighborhood
and mutual understanding is highly motivated by Zayeds
own values, which can be clearly found in his own words
[20]:
The truth is that we always seek to have our relations with our
neighbors based on full understanding and strong brotherly ties.
We can never seek to harm our friends or neighbors. If there is
any conict or misunderstandings between us and a neighbor,
friend or brother, we turn to God and ask him to inspire us
patience and ability to get with the friend or brother and
neighbor to an understanding that benets the two parties
without resorting to the detriment of the interests of the two
countries or lead them to armed conict.
As a result, Zayed used his famous quiet diplomacy
policy through protesting the Iranian claims through inter-
national platforms including the Arab League. The Emirati
claims over the islands were also showcased in a quiet
manner in the United Nations (UN) to avoid making a huge
problem out of it. Thus, diplomacy was a major tool to
establish the UAEs historic claims over the areas and
avoided going into a war that was going to lead to ciaos in an
area that is already lled with unrest [14]. One can measure
the success of such FP tool by the fact that the UAE was able
to gain the Iranian recognition back in 1972.
Economic Embargo: The Oil Crisis of 1973. A very
distinctive feature of the UAE FP is its commitment to Arab
and Islamic affairs, especially the Palestinian case [13]. As a
result, the UAE utilized a different set of FP tools in support
of the Arabs and the Muslim world. The UAE utilized a
negative economic tool through the oil embargo of 1973,
and a positive economic tool developing a foreign aid
policy.
When the Arab-Israeli war of October 1973 broke out, the
United States (US) president Richard Nixon pushed for an
over 2 million US dollars of additional support to Israel to
support the Israelis in the war [5]. Many Arab states viewed
this as an act of indirectintervention. As result, King Faisal
of Saudi Arabia came up with the idea of an oil boycotton
states supporting Israel, and asked the same from Arab states
with oil wealth. Eventually, the Organization of the Petro-
leum Exporting Countries (OPEC) was able to reach an
agreement of cutting exports by 5% only on states sup-
porting Israel. Nonetheless, Sheikh Zayed intervened calling
for a total ban of oil export on the US, as the 5% sanctions
will not do the US any harm [5].
The UAEs participation in the Oil Embargo was greatly
inuenced by UAEs leadership, its values and core
believes. For instance, Zayed made the famous line of Arab
oil is not dearer than Arab blood,[21] emphasizing the
importance of Arab Unity for the UAE. Thus, the UAE was
able alongside other Arab oil exporting states to maintain an
oil embargo for six months from October 1973 to March
1974. The UAE was able to cut its oil export to both US and
Netherlands due to their support for Israel during the war
[13]. For the rst time in Arab history, oil was able to unify
the Arab nations to pursue an interest that they could all
agree on, rather than look at Arab unity as sharing the same
history, language and religion. Besides, the embargo was
seen as a success as it was able to pressure countries such as
Japan to withdraw its support for Israel, which resulted with
lifting the ban on Japan [6].
Soft Power: Foreign Aid Policy. Another main theme in
Zayeds foreign policy was his focus and interest in con-
tributing to the Islamic world. One way of achieving that
was through an international foreign aid and development
policy. At the early stages of the UAE history, the Arab
states were the main target of the UAE foreign aid policy.
Many of them were countries engaged in the ArabIsraeli
conict such as Palestine, Egypt and Syria [11].
As a matter of a fact, the Arab world received more than
half of the UAE aid in the early years of the federation [8].
So, only four years after its establishment, the UAE managed
by 1975 to provide more than 9% of its GDP in the form of
foreign assistance [8].
According to annual Abu Dhabi Fund for Development
(ADFD) of 19741975, the countries that received UAE
144 M. Alzaabi
foreign aid in the form of loans during that period were
Jordan, Bahrain, Tunisia, Syria, Egypt and Yemen [22]. In
1976, the annual ADFD report showed how the UAE started
expanding its foreign aid receivers to include countries from
the Muslim world such as the Republic of Mali, Rorundi
Republic, Malaysia, Bangladesh and Sri Lanka [23]. By
2003, the ADFD have provided 152 loans to 45 countries of
a value reaching 11399.85 million Dirhams with the Arab
state still getting the major share of the loans provided in
terms of values reaching a 77.18%, Asian countries received
15.78%, African countries received 4.67% and the rest of the
world 2.37% [24]. Today, just like in 1975 and 1991, the
UAE remains at the top of the countries in terms of its
foreign aid programs in relation to its GDP, which we will
discuss later in the following chapters.
We can see Zayeds regard for the values of Islam and
humanitarian work were evident in the way he described his
foreign aid policy:
We in the Gulf are pursuing our foreign policy in two parallel
directions. In our relations with the Arab and Islamic countries,
we regard it as the relationship of the brothers in Islam imposed
by our religion. We treat these countries the way siblings would
treat each other. The other line is purely human. In this world, we
have a duty in the way we treat human beings, to respect them as
human beings in order for them to respect us as human beings,
and to be as much of a friend to them as they are to us [20].
Hence, one cant underestimate Zayeds role and lead-
ership, as he truly believed of sharing this wealth. It was the
Zayed factor, his charisma and words that gave the UAE the
credibility and respect of other nations.
4 The Post-Zayed Era
4.1 UAE Foreign Policy Change
and the Leadership Dimension,
the Arab Spring and Globalization
As weve pointed out previously, the UAE FP during the
Zayed era was the result of Zayeds own set of believes,
personality attributes and ideology. Therefore, its vital to
understand the role of leadership and decision makers who
took place after Zayed to analyze and make sense of the
changes in UAE FP during the Post-Zayed era. While the
change in UAE leadership is an important domesticfactor
in shaping the new Post-Zayed era FP, there are also other
factors that can explain the current orientation in the UAE FP
interests. Both the Arab Springand the process of global-
ization have majorly acted as forces that helped push the
UAE toward a new progressive and international looking FP.
UAE President, His Deputy and the Crown Prince of
Abu Dhabi. The whofactor in understanding the UAE FP
from 2004 until today is not as clear as it was back in
Zayeds era. The UAE after 2004 did not only witness the
succession of Sheikh Khalifa Bin Zayed as a President, but it
also saw the succession of Sheikh Mohammed Bin Zayed
(MBZ), Sheikh Khalifas half-brother, as the new Crown
Prince of Abu Dhabi. Besides, it also saw the succession of
Sheikh Mohammed Bin Rashid (MBR) as the Vice President
and ruler of Dubai later in 2006. According to Sheikh Dr.
Sultan bin Mohammed AlQasimi, Ruler of Sharjah, descri-
bed the leadership of Sheikh Khalifa as someone who likes
to work quietly,and that hes supported by a new blood
of young decision makers referring to both MBR and MBZ.
Hence, we identify those three personalities as key to
understanding the leadership dimension of the UAE FP in
the Post-Zayed era.
MBZ is widely known for his military grounded per-
sonality and career, which explains the realistic approach
and assertive decisions the UAE has taken in the Post-Zayed
era. According to an article in The Economist, the magazine
identies MBZ as the driving energy behind the UAEs
current ambitious and active FP, which is true since Sheikh
Khalifa fell ill back in 2014, and was absent from the
political scene [1]. On the other hand, MBR drives the lib-
eral strand of UAE FP. He is someone who is best described
by his own words as he aspires to put the UAE to be
number one, not in the region, but in the world[25]. MBR
consume a crusader leadership style of always being bold
and impetuous, pushing the boundaries of his context, and
having a clear vision in which hes pursing without any
hesitation. Thus, explaining the outward looking aspect in
the UAE FP and the emphases on soft power instruments.
The Arab Spring and Globalization. The Arab Spring
or the uprising events of 2010 that took place in different
parts of the MENA region created a huge power vacuum,
which led to a furious competition among Gulf nations to
take on leadership of the Arab world [12]. To most Gulf
monarchies, the changes in the regions dynamics were
perceived as a security threat. For the UAE, this new reality
of a reshaped Middle East meant adopting a new wave of
diplomatic and security measures to ensure the safety and
stability of the UAE, the gulf, and the region. That meant the
use of both hard power and soft power regionally and at
home with the main interest being restoring peace and
security, and ensuring the legitimacy of the ruling families.
As a result, the UAE participated in different events such as
the 2011 Bahrain uprisings, Libya No-y Zone and dis-
mantling the Muslim Brotherhood branch at home
(Al-Islah).
Moreover, the process of globalization and the interna-
tionalization of markets had remarkable effects on the UAE
economy, society and worldwide interaction. This process
has made it possible for a small nation like the UAE to be
more proactive in the international system through trade and
investments. For instance, the different investments that the
Foreign Policy of the United Arab Emirates (UAE) 145
UAE is making in different parts of Asia and Africa are
evidence to the countrys commitment to having strategic
international partners. This is clearly stated in the UAEs
Foreign Ministry website through a message from UAE
Foreign Minister, H.H. Sheikh Abdalla Bin Zayed AlNeh-
yan, as he points out that the goal of UAE diplomacy is to
enhance bilateral relations with different parts of the world
emphasizing that The UAE holds an inuential position in
several international and regional organizations, and have
many friends all over the world. We look forward to bol-
stering our relations with the fast growing countries, such as
India, Russia, China, Brazil and South Africa[26].
4.2 Elements of Continuity and Change
in UAE FP
Continuity: The Soft Power of Foreign Aid. Foreign aid
and humanitarian assistance remains at the top of the tools
and FP priorities of the UAE in the Post-Zayed era. We can
clearly see this as the UAE pledged to continue its commit-
ment to the eld of humanitarian work especially after the
dreadful terrorist attack that led to the death of the UAE
ambassador to Afghanistan earlier this year. In January 2017,
an Emirati envoy of ve-aid workers alongside the UAE
ambassador of Afghanistan, Juma Alkaabi, was killed during
a humanitarian aid mission [28]. The attack was well planned
and it was mainly targeting the Emirati personals as the group
was meant to celebrate the opening of a new orphanage in
Kandahar. Since that incident, the UAE Red Crescent has
sent 37 envoys, emphasizing on the true committed of the
UAE and its leaders[27]. Moreover, it is no secret that the
UAE is considered one of the most generous nations in the
world when it comes to foreign aid and humanitarian assis-
tance. In fact, back in 2015 the UAE was able to score as one
of the top 10 largest donating countries in terms of Ofcial
Development Aid (ODA). It was able to land as the second
highest ODA to Gross National Income (GNI) ratio of 1.09%
with an amount of 16.1 billion dirhams in terms of ODA [29].
Elements of Change in UAE FP. While the limitation of
being a small state used to constrain UAE FP behavior in the
Zayed era, the emergence of a new UAE leadership, the post
Arab Spring status of the MENA region and the process of
globalization have all forced the UAE to adopt new interests
and achieved them through different tools of FP such as soft
power instruments and hard power tools. While hard power
is mostly known as the utilization of military tools and
means of coercion, soft power as a tool of FP is complex in
nature as it requires a long term commitment of building up
a reputation for the state in certain elds that co-opt others
into buying the state believes and values rather than the use
of force or coercion. According to [15], the old state of
power politics where states acquisition of arms and strong
economy is no longer as relevant as the new age of infor-
mation where the right type of public diplomacy can yield
more gains than a hard power instrument [30]. This is
exactly what the UAE in the Post-Zayed era strives to
achieve through state branding and tourism. This aspect of
UAE FP is an element of change as a result of its new
interest of outward looking FP. Nevertheless, the UAE was
also able to defy the rules of its smallness by investing
heavily in its hard power and showcasing to the world that
its a regional power with military capabilities.
State Branding and Image Creation: Tourism. A new
interest of the UAE in the Post-Zayed era is to be more
outward looking and become an internationally inuence.
One way of achieving that was through adopting soft power
instruments by the new leadership of the UAE in the
Post-Zayed era. In fact, just recently in April 2017, MBR
announced the creation of a government council called the
Soft Power Councilthat will have the mission of drafting a
nation-wide strategy to drive the UAE forward through the
tools, instruments and appeal of soft power [31].
Today, the UAE is home to the busiest airport in the
world, Dubai International Airport that receives international
passengers of over 80 million a year, overtaking London
Heathrow Airport again this year [32]. According to Dubai
Airports Strategic Plan 2020, the Emirate is pumping an
investment of over 7.5 billion US dollars to expand its air-
port and airspace program to increase the capacity of Dubai
International Airport to 90 million by 2018 [32]. In 2016
alone, Dubai was able to host over 14 billion tourists with a
5% increase from the numbers of 2015, while aiming to
target 20 million visitors by 2020 [33]. The Emirate is one of
the hottest tourist destinations, and it is the 7th most visited
city in the world according to [34].
Moreover, to prove Dubais exceeding success in reaping
the fruits of its soft power and creating an international
appeal as a brand, the Emirate was able to run for hosting the
World Expo 2020 and it won. That makes Dubai the rst
ever MENA country to host the World Expo, which only
adds to the long-standing efforts of Dubai to position itself
on the world map. On the other hand, Abu Dhabi, the UAE
capital, has also made different efforts that complement those
of Dubais. Rather than focusing on the appeal of tourism,
Abu Dhabi has been heavily investing in the eld of sus-
tainable energy.This is an outstanding move by an Emirate
that is greatly dependent on fossil fuels to sustain its econ-
omy. Moreover, Abu Dhabis efforts were put to the test
back in 2009 when it was trying to win the bid of hosting the
headquarters of the International Renewable Energy Agency
(IRENA) against two major European powers like Germany
and Austria [35]. The Abu Dhabi win was a huge diplomatic
success that speaks volumes of UAEs soft power.
Increased Hard Power. A clear example of the UAEs
dynamic progress in its FP can be seen through the lens of
146 M. Alzaabi
increased military actions, especially after the Arab Spring
of 2011. According to Soubrier, the Post-Zayed era wit-
nessed a change in its military neutralitypolicy that
focused on dispatching its military forces for mostly
peacekeeping operations. [14]. For instance, during the
Zayed Era, the UAE have been part of several international
peacekeeping operations to restore peace and security such
as in the case Kuwait (1991), Somalia (1992) and Kosovo in
1999 [36]. This legacy of participating in peacekeeping
operations has continued throughout the Post-Zayed era. For
example, from 2007, UAE troops were part of a UN mission
in Afghanistan and the UAE military was part of a search
operation in 2014 when the Malaysian airlines plane MH370
went missing [37].
Nevertheless, the Post-Zayed era has witnessed more
assertiveness in its use of military forces. For example,
weve seen UAE troops in major combats of this age like the
in Yemen, the ght against ISIS, Libya no y zoneand
Bahrain Uprisings. Hence, questioning whether the UAE use
of hard power in terms of army mobilization as a FP tool is a
change from the UAE FP principles and goals is important to
explore and explain. In the following section, we analyze
take the Saudi led Intervention in Yemen as an example of
increased use of force by the UAE. We argue here that the
UAE is still following its original FP goals by capitalizing
on such hard power as it is using it in the benet of sup-
porting Arab causes and to preserve its own safety and
security.
The UAE participation in Yemen, The use of Hard
Power Tools. In March 2015, Saudi Arabia led an operation
called Decisive Stormto support the legitimacy of the
government of Yemen headed by President Abd Rabbu
Mansour Hadi, who requested the intervention of the Gulf
nations to support Yemens efforts of combating extremism
and terrorist factions such as Al Houthi and AlQaeda [38].
The UAE played a major role in such operation, amongst
other eight Arab nations, which mostly focused on airstrikes
[13]. However, in April 2015, phase two of the operation
was extended under the name Operation Restoring Hope
that required Emirati ground troops [13]. The fallout of the
Arab Spring sent clear warning signs to the Gulf in general.
As a result, the Saudi-Emirati front did not hesitate to
intervene in Yemen and act in a response to threat of security
and safety of the region.
The UAEs decision to intervene in Yemen is in line with
the UAE FP goals and principles of maintaining state
sovereignty and supporting national security and supporting
Arab causes. Therefore, the UAE did not really witness a
shift in its FP by increasingly being active military; it
became more realistic in its approach to how it deals with
threatening situations in the region. In fact, [12] argues that
there are elements of continuity in UAEs actions of
increased hard power projection as it is all working towards
achieving the FP goal of supporting national security.
Hence, the new UAE FP approach of displaying hard power
is merely to protect state sovereignty, security and survival,
which happen to be in line with the broad FP goals of the
UAE. Thus, while the Zayed era always resorted to peaceful
mediation situations, the Post-Zayed era is responding to
security threats more realistically through actual military
actions.
Its important to highlight here that the participation of
the UAE in the Saudi Arabian led Intervention in Yemen is
not only a military based intervention. Even though the UAE
is utilizing its armed forces in this case, the country still hold
a strong belief that the only solution to the Yemeni crisis is a
political one, afrming that by supporting the UN resolution
2216 that demands Al Houthis withdrawal [12]. Moreover,
the UAE continued to consume its humanitarian role of
providing aid in parallel to its military work. Hence, this is a
sense of continuity that is still strong in the Post-Zayed era.
5 Conclusion
In conclusion, the UAE has witnessed a great change in its
FP, as it grew to become more realistic and dynamic,
changing the image that a small state can consume. In this
paper, we looked at the UAE FP by identifying two separate
Eras of FP behavior, the Zayed era (19712004) and the
Post-Zayed era (2004Today). The Zayed era (19712004)
was mostly about how Zayeds values, perceptions and
ideology inuenced the UAE FP principles, ambitions and
tools for three decades. On the other hand, the Post-Zayed
era (2004Today) is seen as a progressive development
phase that projects continuation elements and new elements
that portray change due to adopting new interest by the new
UAE leadership, and due to other regional and international
factors. The continuation elements are evident in the UAEs
constant emphases on foreign aid tools. Instead, the change
elements are evident in the UAEs new approach of
inversing in building up soft power and hard power capa-
bilities. Weve highlighted the different efforts done by the
UAE to diversifying its FP tools by emphasizing on the
cultivation of a soft power appeal through tourism and brand
creation, but also through building up hard power capacities
in terms of military capabilities.
Finally, to answer the core question of this paper of did
the UAE FP in the Post-Zayed era pivot away from the
original values and goals set by the late Sheikh Zayed or is it
a mere progressive continuation of the Zayed FP goals and
principles?We rationalized how the progress of the
UAE FP in the Post-Zayed era should be seen as the out-
come of a new leadership in the UAE, the changing envi-
ronment of the Middle East after the Arab Spring and our
globalized world. These different factors have allowed a
Foreign Policy of the United Arab Emirates (UAE) 147
small state like the UAE to gain more leverage and project
its own voice regionally and internationally. Thus, the cur-
rent Era of UAE FP is simply progressive, dynamic and
realistic with a level of assertiveness that is changing the
image of small state behavior in the modern age of the 21st
century. Therefore, there are new UAE foreign policy
interests and response tools as a result of different domestic,
regional and international factors. Yet, they are in the line
with the general goals and principles of the Zayed era FP.
References
1. The Economist. https://www.economist.com/news/middle-east-and-
africa/21720319-driven-energetic-crown-price-uae-building-bases-
far-beyond-its. Last accessed 06 Apr 2017
2. Dubai Post. http://www.dubaipost.ae/en/stories/dubaization-gets-
the-world-talking-2017-04-26-1.1521. Last accessed 26 Apr 2017
3. Vine, P., Abed, B.: United Arab Emirates: A New Perspective. In:
Hellyer, P., Abed, I. (eds.), pp. 161168. Trident Press, London
(2001)
4. Abdulkhaleq, A.: Initiatives and Responses in UAEs Foreign
Policy. Center for Strategic and International Studies, Abu Dhabi
(2001)
5. Rugh, W.: Diplomacy and Defense Policy of the United Arab
Emirates. Emirates Center for Strategic Studies and Research, Abu
Dhabi (2002)
6. Obeid, N.: The Foreign Policy of the United Arab Emirates
between Theory and Practice. Al-Moassasa Al Jamiiya Lildirasat
(Majd), Lebanon (2004)
7. Heard-Bey, F.: Abu Dhabi, the United Arab Emirates and the Gulf
Region: Fifty Years of Transformation. Gerlach Press, Berlin
(2017)
8. Almezaini, K.: The UAE and Foreign Policy: Foreign Aid,
Identities and Interests. Routledge, New York (2011)
9. Ehteshami, A.: Dynamics of Change in the Persian Gulf: Political
Economy, War and Revolution. Routledge, New York (2013)
10. Abdulla, G.: The Making of UAE Foreign Policy: A Dynamic
Process Model. Emirates Center for Strategic Studies and
Research, Abu Dhabi (2014)
11. Soubrier, E.: Evolving Foreign and Security Policies: A Compar-
ative Study of Qatar and the United Arab Emirates. In: Almezaini,
K., Rickli, J. (eds.), pp. 123143. Routledge, London (2017)
12. Ulrichsen, K.: The United Arab Emirates: Power, Politics, and
Policymaking. Routledge, Abingdon (2017)
13. Saeed, A.: The Arab Dimension in the Foreign Policy of the
United Arab Emirates, 19902003. Center for Gulf Studies,
Sharjah (2010)
14. Close-up Foundation. http://jeffsinn.weebly.com/uploads/4/0/2/3/
40232083/national_interest_foreign_policy_lesson_planvnal.pdf.
Last accessed 01 Apr 2017
15. Nye, J.: Soft Power: The Means to Success in World Politics, 1st
edn. Public Affairs, New York (2004)
16. Shimko, K.: The Foreign Policy Puzzle: Interests, Threats and
Tools. Oxford University Press, New York (2017)
17. Jeanne, H.: Small states in World Politics. Lynne Reinner
Publishers, London (2003)
18. Waheeb, S.: The UAE Foreign policy. Raslan, Damascus (2012)
19. AlBayan Newspaper. http://www.albayan.ae/across-the-uae/2002-
11-24-1.1380692. Last accessed 22 Apr 2017
20. The Guardian. https://www.theguardian.com/news/2004/nov/03/
guardianobituaries.israel. Last accessed 22 Apr 2017
21. Abu Dhabi Fund for Development. https://www.adfd.ae/
Lists/PublicationsDocuments/Annual-Report-1974-1975.pdf. Last
accessed 23 Apr 2017
22. Abu Dhabi Fund for Development. https://www.adfd.ae/Lists/
PublicationsDocuments/Annual-Report-1976.pdf. Last accessed 23
Apr 2017
23. Abu Dhabi Fund for Development. https://www.adfd.ae/
Lists/PublicationsDocuments/Annual-Report-2002-2003.pdf. Last
accessed 23 Apr 2017
24. Gulf News. http://gulfnews.com/news/uae/government/mohammad-
i-want-dubai-to-be-no-1-1.95927. Last accessed 02 July 2017
25. Ministy of Foreign Affairs. http://mofa.gov.ae/EN/TheMinistry/
Pages/UAE-Foreign-Policy.aspx. Last accessed 22 May 2017
26. BBC. http://www.bbc.com/news/world-middle-east-38978886.Last
accessed 22 June 2017
27. AlDhafra Channel. https://www.youtube.com/watch?v=6t2aXyz_
PFw. Last accessed 06 July 2017
28. Wam. http://wam.ae/en/details/1395294106778. Last accessed 03
June 2017
29. Project Syndicate. https://www.project-syndicate.org/commentary/
the-new-public-diplomacy?barrier=accessreg. Last accessed 30
July 2017
30. Gulf News. http://gulfnews.com/news/uae/government/mohammad-
bin-rashid-launches-uae-soft-power-council-1.2019003. Last accessed
22 May 2017
31. The National. https://www.thenational.ae/business/dubai-airport-
remains-world-s-busiest-for-international-trafc-despite-slower-
2016-growth-1.63673. Last accessed 22 May 2017
32. Dubai Airports. http://www.dubaiairports.ae/corporate/media-centre/
fact-sheets/detail/dubai-airports-strategic-plan-2020. Last accessed
22 May 2017
33. Gulf News. http://gulfnews.com/business/sectors/tourism/14-9-
million-overnight-visitors-for-dubai-in-2016-1.1974824. Last accessed
22 May 2017
34. Forbes. https://www.forbes.com/pictures/ehlk45iehm/1-bangkok/
#2b3897521b25. Last accessed 30 May 2017
35. The National. http://www.thenational.ae/news/uae-news/uae-wins-
bid-to-house-irena-headquarters. Last accessed 22 May 2017
36. Gulf News. http://gulfnews.com/news/uae/government/uae. Last
accessed 12 June 2017
37. The National. https://www.thenational.ae/uae/uae-armed-forces-
join-search-for-missing-malaysia-airlines-ight-mh370-1.585388.
Last accessed 12 June 2017
38. UAE Embassy in US. http://www.uae-embassy.org/uae-us-
relations/key-areas-bilateral-cooperation/uae-us-security-
relationship. Last accessed 12 June 2017
148 M. Alzaabi
Framing Natural Disaster, Terrorist Attack
and Civil Unrest Crises by Egyptian
Journalist and Citizen Bloggers
Naheda Makhadmeh and Geri Zeldes
Abstract
News blogs provide the media and individuals with
analyses and information about crises. The importance of
news blogs in coverage of crises brings attention to the
importance of examining journalist and citizen bloggers,
and their coverage of three crises: natural disaster,
terrorist attack and civil unrest. The researchers looked
at the differences in using frames, topics, sources, and
modalities. A quantitative content analysis was conducted
of random-sample 441 Egyptian blog posts. Results
showed that citizen bloggers were more likely to cover a
natural disaster, while journalist bloggers were more
likely to cover a terrorist attack and use conict frame.
The topic most frequently used and got most space by
both bloggers was politics. On the other hand, journalist
bloggers are more likely to use sources (i.e. scientists,
eyewitnesses, media) than were citizen bloggers. Accord-
ing to the modalities, citizen bloggers were more likely to
use images that looked professional and had people in
their posts than journalist bloggers, while journalists are
more likely to use video posts than citizen bloggers. The
implications of these results were discussed. Future
studies could look at the comparison between types of
bloggers in the coverage of two continuous crises or
sudden crises to make sure that the duration does not
make a difference.
Keywords
Citizen bloggers Journalist bloggers Crisis
1 Introduction
Media professionals used to be the only individuals who
could write, publish, and broadcast news through media
platforms such as print newspapers, radio, and television.
However, with the advent of the Internet, important changes
occurred in journalism. The Internet permitted anyone to
create news on online platforms at zero cost and to compete
with media organizations. News blogs are examples of
online platforms, which allow media professionals and
non-professionals to post their opinions of news and analyze
events without limitations or gatekeeping.
News bloggers have provided the media and individuals
with analyses and information about events [1], particularly
crises and disasters. The importance of news blogs in cov-
erage of crises brings attention to the importance of exam-
ining two types of bloggers, journalists and citizen, and their
coverage of three crises: natural disaster, terrorist attack and
civil unrest. The researchers looked at the differences in
frames, topics, sources, and modalities used by each type of
blogger.
Previous framing studies have overlooked the differences
between journalists and citizen writers in crises coverage and
their framing of different types of crises. It is important to
see how previous journalism experience can make a differ-
ence in framing crises. Knowing the difference in framing
crises helps the public to understand the intentions of
bloggers. This study increases understanding of how differ-
ent types of writers framed crises by looking at who was
responsible for the crisis, how a human face was used in the
coverage (personal examples), if the conict was between
two or more parties, use of moral messages, and the eco-
nomic impact of the crisis. In addition, it helps to know the
main topics, sources, and modalities used by each type of
blogger. This research helps to understand the tasks and
goals of blogging and encourages the audience to learn the
bloggersbackgrounds and interests. The results of this
study also help predict future coverage of crises and extend
N. Makhadmeh (&)G. Zeldes
College of Mass Communication, Department of Journalism,
Yarmouk University, Irbid, Jordan
e-mail: naheda@yu.edu.jo
©Springer Nature Switzerland AG 2019
A. Al-Masri and K. Curran (eds.), Smart Technologies and Innovation for a Sustainable Future,
Advances in Science, Technology & Innovation, https://doi.org/10.1007/978-3-030-01659-3_19
149
existing knowledge by identifying different types of bloggers
and their coverage of crises. In addition, this research helps
governments, crisis managers, bloggers, news organizations,
non-governmental organizations (NGOs), and the public to
know what appropriate type of blogger to read and use when
crises happen.
This study is also signicant because few studies have
looked at crises coverage in Arab countries [24]. This is the
rst study that focuses on differences in framing between
journalists and citizen bloggers (e.g., using conict frame)
and the content of posts (e.g., using images). The researchers
selected Egypt as a case study because it has confronted
three different types of crises: natural disaster, terrorist attack
and civil unrest. The focus on Egyptian crises is up-to-date,
and the opportunity to collect data not only in English, but
also in Arabic, enhances understanding of Arab World
media, especially blogging. Egypt was the rst Arab country
to acquire Internet access, which occurred in 1993 [5], and it
has the largest number of blogs in the Arabic blogosphere
[6]. These blogs consist mostly of political content that
engage the public in the political movements, and critique
the political regime [6].
Free blog services such as WordPress, Bloggers, Mak-
toob, Blogspot, and Tumblr made for an increase in the
number of bloggers. Blog engines provide bloggers with free
templates to complement their blog category and subject.
According to Technoratis annual report, approximately 77%
of global Internet users read blogs [7,8]. The bloggers may
write about politics, women, business, technology, enter-
tainment, lifestyle, sports, and health, among other cate-
gories [9]. The Nielsen/McKinsey Company recently
estimated the global number of blogs to be more than 181
million compared to 36 million in 2006 [10]. Because of this
huge increase in the worlds blogosphere, and the effect of
blogs on the mainstream media it is important to understand
how bloggers are using blogs, to explore different types of
bloggers, and to focus communication research on blogging.
Blogs are important tools that can shape public opinion
about a crisis through framing, which could inuence per-
ceptions, impressions, and emotions.
2 Literature Review and Theoretical
Framework
This section covers three parts: (1) Blogging: This part
provides a brief history of blogging, denition of blogs,
types of bloggers, blogging in the Arab World, and blogging
in Egypt. (2) Crises: This part provides denition of crises,
types of crises, and crises in Egypt. (3) Theoretical frame-
work: This part includes media framing, media framing in
the Arab World, framing crises, framing sources, modalities
in the media, and research questions and hypotheses.
2.1 Blogging
History and Denition of Blogs. In 1997, Jorn Barger
1
created the term web logor weblogto refer the process
of posting daily entries on the World Wide Web [11]. In
1999, Peter Merholz shortened this term to blogand
referred to the blog host as a blogger[12]. A blog is a
chronologically organized website updated by an individual
(or a group of individuals) with entries/posts[13, p. 116].
Blog entries are called postsand are shown in reverse
chronological order[14]. Each entry contains a title, body,
and date/time. The body can include different elements, such
as text, images, audio, and other types of multimedia.
In 1999, Pyra Labs
2
established Blogger.com,
3
a web
service that allows web users to create their own page and
establish trends, report news, express opinions, concerns and
emotions on any issue of interest [16,17]. This service
permitted bloggers to become producers by interpreting and
analyzing news and information [18].
Blogger.com,WordPress.com and Tumblr.com are the
most popular engines hosting blogs [10,19]. These engines
publish millions of personal, organizational and topic
specic blog posts every day. For example, Tumblr pub-
lishes approximately 28,000 blog posts each minute, or
approximately 20 million posts a day [7,20]. These engines
offer bloggers complete freedom to select unique blog styles,
content and format.
The foremost goal of blogging is to create a conversation
between the blogger and his or her readers, with the hopes of
leading to a better understanding of the information in a post
[21], and to having a conversation with the audience, which
helps to explain and analyze the information [22]. In addi-
tion, blogs are tools for expressing alternative viewpoints
and inuencing social and political change. They can be fun,
gossipy, literary, and news sources. This study focuses on
news blogs, which provide their audiences with important
information and news.
Many communication researchers consider news blogs a
type of online journalism [23,24]. Another academic sees
blogs as transforming the way news and information are
disseminatedin an intimate way [25]. News bloggers pro-
vide their audiences with important information and news,
and they are the true pit bulls of reporting[25, para 7].
Types of Bloggers. The types of bloggers depend on the
types of blogs. According to [26], there are four types of
blogs: (1) citizen blogs produced by people, outside media
organizations;(2) media blogs produced by professional
1
Jorn Barger is an American blogger whose Robot Wisdom Auxiliary,
established in 1997, was the earliest inuential blog on the Web [11].
2
Pyra Labs was co-founded by Evan Williams and Meg Hourihan, the
creators of blogger.com.
3
In 2003, Google bought the Blogger Web service [15].
150 N. Makhadmeh and G. Zeldes
journalists inside media organizations; (3) audience blogs
that permit the audience to produce on platforms provided
by the media;and (4) journalist blogs that journalists
maintain outside their companies(p. 7). The latter offers
journalist bloggers the freedom to publish posts without any
control or censorship by their media organizations. In this
study, the researchers focused on two popular types of
bloggers within Egypt, journalists and citizen.
Journalist Bloggers
To dene the journalist blogger, I have to give a denition of
a journalist. A journalist is a person who works or has
worked as a news writer, reporter, or editor of news in a
newspaper, radio, television station, magazine or other news
medium. In addition, a journalist can also be a person who
works or worked on pamphlets and leaets [27]. Blogs
enabled journalists to increase their news writing and pub-
lishing activities. Therefore, a journalist blogger is a writer
with journalism background [28].
Journalist bloggers publish personal stories and articles
that they choose not to publish, or fail to publish, through the
professional media on their self-publishing spaces. These
bloggers function as journalists and incorporate the profes-
sional ethics and standards of the journalism industry.
However, not all journalist bloggers are associated with their
organizations. Some of them started blogging after they gain
experience from media organizations, and others are blog-
ging while working as journalists.
Many famous journalists are bloggers. An example of a
well-known American journalist blogger is Kevin Sites, who
covers wars and disasters for ABC, NBC, CNN, and Yahoo!
News [29]. Sites worked with CNN before the outbreak of
the war in Iraq in 2003. On the rst day of the war, CNN
asked Sites to stop posting on his personal blog (kevinsites.
net, which is now kevinsitesreports.com). He chose to leave
CNN and continue his blog coverage of the Iraqi war,
freelancing for NBC [26,30].
Previous literature [31] examines why journalists create
their blogs while they are working in the media. The
researchers found that 52% of bloggers do so to analyze and
express their personal views on lead news of media, 28% for
their own creative expression, 13.1% to write about news,
and 6.3% to write about media-related news content, such as
journalistic ethics. In addition, journalist bloggers enjoy
writing when they receive feedback and comments from
readers, which encourages dialogue and continued updating
of their blogs [32]. According [33, p. 97], political bloggers
write to inform their readers, share with them media articles
and unreported news, and to draw attention to key posts on
other blogs.This type of blogger tends to write about local
issues [6].
Another research [34] found that 52% of bloggers consider
themselves journalists because they consider their blogs as
newspapers comprised of only op-ed pages [35]. Media workers
collect important information from blogs that are able to high-
light some important issues to the forefront of the public sphere
ignored by the mainstream media [27]. Previous research [36]
states that journalist blogs are a vehicle for the expression of
nationalistic sentiments or hatred speech(p. 341), which means
that these bloggers express opinions that they cannot express in
the ofcial media, with particular regard to politics. These
journalist bloggers are using the hyperlinks to refer to the main
sources of information to increase the credibility of their blogs.
About 85% of journalist bloggers provide the links or URLs
extensively to refer to their main news sources, which are
mainly media sites and related materials [37].
Citizen Bloggers
Citizen bloggers, or ordinary bloggers, are not afliated with
media organizations and write news without journalism
training or experience. They do not depend on the standards
of professional journalism because they are not professional
journalists [26,38]. A citizen blogger engages in news
gathering and reporting, and considers a blog to be a per-
sonal journal for writing personal opinions about events,
communicating with readers via comments, and providing
readers with news, photos, videos, etc. Citizen bloggers are
also known as amateur bloggers [36, p. 333]. They think of
their blogs as a tool for self-expression. They determine their
own editorial standards, including whether to publish under
pseudonyms that enable the authorities to keep tabs on
potential troublemakers[39, para 14].
Blogging in the Arab World. A large portion of Arab
bloggers write about sensitive issues such as governmental
and human rights [40] that many people read and track to get
information not readily available in the mainstream press.
Few Arab bloggers write about travel, cooking, art, and other
things. In Egypt, for example, bloggers published videos of
people being tortured in police stations, and others of police
failing to protect victims of sexual harassment [41]. The
limits of freedom of expression laws, or lack thereof in Arab
countries cause many Arab bloggers (especially females) to
write under pseudonyms, while others, such as journalists,
use their real names. However, some of anonymous bloggers
become famous, such as Zeinobia in Egypt.
Political blogs are very popular in the Arab world, and the
number of political blog readers is increasing every day [6,
42]. Political bloggers primarily discuss their local political
Framing Natural Disaster, Terrorist Attack and Civil Unrest 151
leaders, government, and elections, while a few write about
foreign political news. Arab blogs began appearing soon
after the start of the U.S. war with Iraq in 2003 as an
expression of political views, particularly in opposition to
the war and the lack of freedom and rights. Arab bloggers
have used blogs as a platform for societal change and
reform, raising political awareness in the Arab countries,
particularly in Egypt because it has the largest cluster of
blogs in the Arab blogosphere. Egyptian bloggers used their
blogs as a new platform for freedom of expression,
encouraging Internet users in Egypt to bravely share their
opinions about the political system [41,43].
The estimated number of bloggers in the Arab world in
2009 was 600,000, only 150,000 of which are active [41].
The largest number of bloggers in the Arab world is Egyp-
tian (around 33%), followed by Saudi Arabian, Kuwaiti, and
Moroccan. Politics, religion, human rights and culture are
very popular topics in the Arabic blogosphere [6]. The
Egyptian bloggers are focusing on local politics, while Saudi
and Syrian bloggers write primarily about their personal
lives [41].
Many Arab bloggers tend to use Arabic language in their
blogs [44]. However, most Kuwaiti blogs are written in
English, and many Moroccan blogs are written in Arabic and
French. Males represent 66% of bloggers in the Arab world
and nearly 45% of them are between the ages of 25 and 35
[41]. Some examples of the popular Arabic blogs that had
the highest numbers of followers and readers in 2013 were
Ahmad Wld Jedo (http://ahmedjedou.blogspot.com/) from
Mauritania, Heber (http://7iber.org/) from Jordan [45], Sami
Ben Gharbia (http://samibengharbia.com/) from Tunisia and
Manal and Alaa (http://manalaa.net/) from Egypt.
Blogging in Egypt. According to a report by Population
Reference Bureau, the 2013 population of all 25 Arab
countries
4
is approximately 371 million. Egypt has the lar-
gest population among these countries at 84.7 million [46].
With 43 million users, Egypt also has the largest number of
Internet users among the Arab World countries, and has the
second highest number in Africa, with an Internet use per-
centage of 15.5% in 2013 [47]. The Internet provided
Egyptians a place to write about events outside of news
organizations. Blogs, Twitter and Facebook are the main
online platforms used by Egyptian journalists and citizens to
write about local events because these platforms are free of
charge and are subject to little control and censorship to
which news organizations were subjected. Internet forums,
Instagram, YouTube, and other social networking sites were
also used in Egypt to post about local events. Blogs started
in Egypt in 2003. By the end of 2004, 40 bloggers began
writing and maintaining their personal sites. That number
increased to 160,000 by July 2008. More than 30% of
Arabic blogs are Egyptian, and more than 30% of blogs
written in Arabic are Egyptian [48,49], which is the biggest
cluster in the Arabic blogosphere [50].
Previous research [42] found that most Egyptian bloggers
were blogging about the need for change in the political
system, and either in support or protest of political clusters,
such as Kefaya (Enough!), a movement looking to change
the political regime. Many famous political bloggers in
Egypt became more popular after blogging as a part of the
Kefaya movement since its start in 2004, such as Wael
Abbas, Alaa Abdel Fattah, and his wife Manal, who used
their blogs to mobilize the movements protests in 2005
[5153]. The slogan of the pro-democracy movement was
enough no to extension no to heredity.The pro-
testers railed against Hosni Mubarak who was re-elected for
afth term and his son, Jamal [43]. This movement inu-
enced the Arabic press and the commentators, and gathered
the political dissidents, activists, sympathizers, and bloggers
in one union [51].
Blogs are a popular media tool for Egyptian people and
that became more visible after the Egyptian Revolution of
2011 [3]. Blogs played a signicant role in the uprising,
especially in the rst 20 days of the revolution when many
bloggers appeared in the Arab mainstream media to provide
news and information, such as Hossam el-Hamalawy, Wael
Abbas, Nawara Negm, and Amr Ezzat [54]. Fifty three
percent of Egyptian bloggers are young (2029 years old),
and 73% are male. Egyptian bloggers write in different
languages, mostly in Arabic (67.8%) because it is their
mother language, then English (9.5%), nearly 21% write in
both Arabic and English, and 1.9% speak other languages
[49].
Egyptian journalist and citizen bloggers wrote about what
is happening in their country by sharing links and images of
demonstration suppression, torture of protesters, and people
who have been killed or injured. Renowned Arabian and
Egyptian journalist Mohammed Hasanayn Haykal said that
he is the greatest reader of blogs[42, para 2], which is one
sign of this importance as a source of information in Egypt.
Several Egyptian citizen and journalist bloggers were
arrested for blogging about pro-democracy activities,
protesting Islam, or critiquing the political regime and
pushing for change. The rst Egyptian blogger, Wael Abbas,
was among them. Ahmad Anwar, another blogger, was
arrested for uploading a video to YouTube of a dancing
Egyptian policeman [55]. These examples show that blogs
can help raise local awareness about issues in the commu-
nities. Another good example of the importance of blogs
during the crises was in the rst 20 days of the Egyptian
4
The Arab world consist of: Algeria, Bahrain, Comoros, Djibouti,
Egypt, Iraq, Jordan, Kuwait, Lebanon, Libya, Mauritania, Morocco,
Oman, Israel, West Bank, Gaza Strip, Qatar, Saudi Arabia, Somalia,
Sudan, Syria, Tunisia, United Arab Emirates, Western Sahara, and
Yemen.
152 N. Makhadmeh and G. Zeldes
revolution; many bloggers were stars in Arab media chan-
nels and provided the audiences with information and
analyses [54].
2.2 Crises
Denition of Crises. Historically, the term crisiscame
from the Greek (kpinein: to separate or to shift). The sepa-
ration between two things were in the interactive community
refers to the boundary. And to explore the boundaries,
people should identify and distinguish what happened that
made this shift [56,57]. Another research [58]dene a crisis
as an event that people seek to nd causes and make attri-
butions. Other researchers dened crisis as a serious threat
to the basic structures or the fundamental values and norms
of a system, which under time pressure and highly uncertain
circumstances necessitates making vital decisions[59,
p. 10]. This denition covers a variety of crisis types, such as
civil unrest, natural disaster, and terrorist attacks. The main
three components of this denition are serious threat,
uncertain circumstances, and urgency of making decisions.
The expected values of any society are safety, health, and
welfare, if something happened that violates these values can
lead to threats and harms. These threats bring uncertainty of
the reasons, consequences and solutions of the threat by
searching for What is happening and how did it happen?
Whats next? How bad will it be? What can we do? What
happens if we select this option? What will others do?[60,
p. 44]. When people discuss these questions to nd answers,
then it will be a crisis. The urgency of making decisions
during a crisis is also important, and time plays a big role in
facing a threat, and the sooner a decision is made, the better
[60].
Previous research [61] provided a denition of a crisis as
an unexpected or undesirable situation. This unexpected
event happens when a community, an organization, or a
nation notices big threats that may affect its ability to con-
tinue and opportunities for change. According to [60] the
crisis combines the grave threat and the escape door: the
situation may look bad, but it is not hopeless(p. 43). That
means that the results of a crisis can be completely negative,
or partially negative.
Types of Crises. In this study, the researchers focused on
three types of crises: natural disaster, terrorist attacks, and
civil unrest. A natural disaster is an adverse event that occurs
because of natural changes on earth. Natural disasters, such
as oods, earthquakes and storms, often cause loss of human
life and property damage, which affects the economy of a
community [62,63]. Recent natural disasters covered by the
media include ooding in Bosnia and Serbia in 2014,
Typhoon Haiyan hitting the Philippines in 2013, and Hur-
ricane Sandy battering the northeastern United States in
2012.
A terrorist attack is dened as a surprise event that uses
violence against civilians to attain political or religious goals
[64]. A historical example of this type of crisis is the
September 11, 2001 plane hijackings by the terrorist group Al
Qaeda, which caused the death of nearly 3000 civilians when
the planes crashed into the World Trade Center Twin Towers,
the Pentagon and a eld in Pennsylvania [65]. Civil disorder
or unrest is a form of protest against social and political
problems in a community and is normally started by civilian
groups. This type of crisis can take place in the form of
demonstrations, parades, protests, riots or sabotage. This
research focused on these three types of crises because they
are international in scope. The natural disaster is a main crisis
because it occurs suddenly. After the 9/11 terrorist attacks,
the focus on the terrorist attack crisis became important
because it affects peoples lives and changes communities.
The revolutions in the Arab countries showed that civil unrest
could affect the political systems and communities.
Crises in Egypt. Egypt has the largest population in the
Arab world. Several crises have occurred recently in Egypt
that led Internet users to be more active than in the past.
Civil unrest in particular is a crisis that causes more online
media activity, not only in Egypt, but the entire Middle East,
and has received signicant attention from media research-
ers. One of the recent civil unrest crises that occurred in
Egypt was the 2011 revolution, which began the Arab
Spring uprising. Flooding in 2010 and terrorist attacks in
2012 in the Sinai were two other recent Egyptian crises.
Below is a brief summary of each crisis.
Civil Unrest
On January 25, 2011, demonstrations started in the Egyptian
capital of Cairo as a response to an invitation launched by
youth activists on social media and in blogs, calling Egyp-
tian civilians to participate in protests demanding freedom
and human rights. Ironically, the demonstration coincided
with National Police Day. The Egyptian forces used live
ammunition against protesters, killing four and injuring
dozens. The demonstrations spread to other cities, and pro-
testers demanded that President Hosni Mubarak step down,
ending his 30-year tyrannical rule. Protesters staged a sit-in
in Cairos Tahrir Square, which has been the focal gathering
point for demonstrations against the regime. In an attempt to
defuse the crisis, Mubarak dismissed the government and
opened dialogue with the opposition, but the demonstrations
Framing Natural Disaster, Terrorist Attack and Civil Unrest 153
continued, eventually forcing him to resign from power on
February 11, 2011 [66]. Between January 25 and February
11, at least 846 people were killed and more than 6400 were
injured [67]. This was the rst uprising that brought millions
of Egyptian citizens to gather in the streets.
Terrorist Attacks
On August 5, 2012, the EgyptIsrael border terror attack
took place in the Sinai Peninsula. Sixteen Egyptian soldiers
were killed on the Egyptian military base near the Israeli
Kerem Shalom border crossing, and no Israelis were killed
or injured. This famous attack was the largest Egyptian
operation on the Israeli border since the 1973 war and
received a signicant amount of media coverage [68].
Natural Disaster
More than 1500 people died in Egypt because of natural
disasters between 1980 and 2013, and hundreds of thousands
were affected during the same period. Flooding and earth-
quakes are natural disasters that not only affect people, but
also the economy [69]. In January 2010, ooding took place
in several areas in Egypt, including the Sinai and Aswan,
killing 15 people and destroying 40 homes and 57 electrical
towers, causing the evacuation of hundreds from their
homes. This ood was the worst natural crisis in Egypt in
more than a decade, impacting the people, agriculture and
economy of Egypt [70].
2.3 Theoretical Framework
Media Framing. Framing is commonly used in communi-
cation research as a theoretical model [71]. Many framing
researchers characterize media framing as a theory (e.g., [71,
72]), while others consider it to be a method (e.g., [73,74])
or a theory and typology (e.g., [75]). Researchers who use
framing as a method look at how people understand an issue,
event, or situation. When considering framing as a theory,
researchers examine how journalists activate certain frames,
and how the audience is affected by a news frame [71]. This
study is employing framing as a theory.
Empirical literature [76]dened media framing as subtle
alterations in the statement or presentation of judgment and
choice problems(1991, p. 11). Iyengar refers to media
framing as a way to tell news stories. Journalists make some
changes to the news context and then present it to the
audiences in a way and shape that is more acceptable.
Entmansdenition of media framing is one of the most
cited in communication studies [77]. Another paper by [74]
states that media framing is select[ing] some aspects of a
perceived reality and mak[ing] them more salient in a
communicating text, in such a way as to promote a particular
problem denition, causal interpretation, moral evaluation,
and/or treatment recommendation for the item described
(p. 52). The signicant elements in his denition are selec-
tion and salience. A journalists beliefs, attitude, work
environment and other factors can affect the selection pro-
cess. By making some news facets more salient, news frames
may also consciously or unconsciously interpret causes of
problems, make moral evaluations of events, and provide
treatment for problems. When the media provide people with
solutions and treatments for the problem, issue, or event, it
may affect how they perceive, evaluate, describe and think
about that problem or event, and lead them to a particular
understanding of this news.
Framing is conceptually dened as a strategy employed
by journalists to structure news stories [78] by selecting
aspects of events and creating a relationship among them
[79]. Reese states that frames are the organizing principles
that are socially shared and persistent over time, that work
symbolically to meaningfully structure the social world
(p. 11). The main component of Reesesdenition is the
organizing process of values and beliefs that are common in
society. He argues that frames have roles in developing the
structure of the social world. This concept of media framing
came from the need to organize news and information in a
form that is more meaningful for readers, which can help
them better understand the content [80].
Another research by [71], who dened frames as schemes
of how to present and understand news, compared between
media and individual frames. He observed that some prior
framing researchers look at media frames as a practical
method that allows journalists to identify information easily
and classify it quickly. Individual frames are how people or
media audiences make sense of news and categorizes them
in groups [71,81]. Also, they refer to individual frames as
internal structures of the mind[81, p. 74].
In his paper [82] mentioned the individual frame when he
talked about two different levels of news frames: The rst is
the information-processing schemataor event-specic
schemathat refer to individual frames, and the second is
when media describe attributes of news itselfor
event-specic schema(p. 7). Entman explained that this
process creates frames that guide audiences to perceive and
think about the problem or the event, and also lead them to a
particular understanding of the news. In addition, the indi-
vidual frames are mentally stored clusters of ideas that
guide individualsprocessing of information[74, 1993,
p. 52] that direct individuals to interpret information differ-
ently according to their pervious knowledge and personal
characteristics. In addition, [74] identied four types of
frames—“the communicator, the text, the receiver, and the
154 N. Makhadmeh and G. Zeldes
culture(p. 52)that leads to the understanding that the
creator of media frames could be the sender, the receiver, or
the culture.
According to [75], media framing is a two-level process:
frame-building and frame-setting. Frame-building is the
collaboration between journalists, media, and people of
inuence, which results in frames. Frame-setting is the in-
teraction between media frames and individualsprior
knowledge and predispositions[75, p. 52]. Other
researchers have found that framing is the process by which
people develop a particular conceptualization of an issue or
reorient their thinking about an issue having implications
for multiple values[72, p. 104]. Chong and Druckman
agree with [74,75] that framing is a process or procedure,
but think that the goal of framing is to conceptualize the
content of a news article. Chong and Druckman argue that
framing occurs when individuals perceive an event from
many perspectives. Researchers have also mentioned various
moderators that believe framing has effects on peoples
perceptions of issues such as moral values.
Previously, I discussed two frame dimensions: media and
individual. This study puts journalist and citizen bloggers
under the individual frame dimension, which is dened as
how individuals describe attributes of news (p. 74). Jour-
nalist and citizen blogs do not have gatekeeping restrictions
or media organizations controlling what they publish. In
addition, this study provides an explanation as to why and
how a bloggers media experience, or lack thereof, impacts
individual frames. This creates two subcategories within the
individual frame dimension.
Media Framing in the Arab World. Studies that
examined media framing in the Arab World focused on how
media framed war, terror, human rights, and civil unrest
crises; mostly about the Arab Spring, Iraq War 2003, and
Palestinian-Israeli conict [4,8385]. Others looked at how
media framed Arab women [86,87] and political ideology
[88,89].
As an example of framing a civil unrest crisis, previous
analysis looked at how Al Jazeera English and the BBC
framed the Egyptian revolution in 2011. The researchers
examined the use of ve frames: attribution of responsibility,
conict, human-interest, morality, and economic conse-
quences. They found that both news networks focused their
coverage in two frames: the attribution of responsibility and
conict, and the network reporters represented the govern-
ment as the side who is responsible for the crisis. BBC used
also the human-interest frame, which showed personal sto-
ries of people affected by the crisis.
Another example of framing in the Arab world was by
[2]. They conducted another comparative content analysis to
examine frames of a crisis in the Arab World. The
researchers compared between the coverage of the Iraq War
2003 in Arab online news media (Qatar and Egypt) and the
Coalition media (United States and United Kingdom). The
study found that the US and UK media were more likely to
use the rebuilding of Iraq frame, whereas the Qatari and the
Egyptian media were more likely to use the military conict
and violence of war frame. In addition to frames, the
researchers examined the sources of information, and they
found that both are using government representative more
than another type of source.
Al Jazeera and Al Arabia news networks are important
sources of information to analyze media framing in the Arab
World. Many research used these two sources to look at
frames in the Arab media [9093]. These two networks are
at the top of the list of news providers in the Arab World.
Framing Crises. Prior research found common crises
frames of news: conict, human-interest, morality, economic
consequences, and attribution of responsibility [94].
Semetko and Valkenburg developed the news frames scale
depending on previous studies [76,9598]. The researchers
of this paper used scale as in [94] because it is the most
commonly used measure in framing crises research, and it is
the most commonly cited scale in Google Scholar.
Journalists used the conict frame to cover crises, which
emphasizes conict between individuals, groups, or insti-
tutions as a means of capturing audience interest[94]. In
this frame, a news story is presented as a discussion or
debate between persons, parties, groups, or governments.
The human-interest frame brings a human face or an
emotional angle to the presentation of an event, issue, or
problem(p. 95). The morality frame is used when jour-
nalists quote or cite others, and are objective and unbiased in
writing the news report [96]. The economic consequences
frame presents when a problem results in negative conse-
quences in the economy for people and society [99]. The
attribution of responsibility frame is when the writer puts the
responsibility of a problem or crisis on the government,
institution, or other individuals, and motions the reasons and
results of the problem [94].
Framing Sources. Usually, the authors of news stories
frame the event, however, the choice of news sources may
inuence the interpretation of events [100]. Using sources in
the news story predicts credibility of the information and the
writer. Journalists rely on different sources to be more
credible and objective. A source is a person, organization,
document or thing that is used as a provider of information.
Different words are used to attribute information to the
sources, such as said,”“claimed,or other words referring
to the source, such as conrmed,”“thinks,or suggests.
Journalists select their sources according to different judg-
ments, such as credibility, accessibility, and time pressure
[101]. Credibility means trustworthiness [102], accessibility
means easy to reach any time, and time pressure means the
limited time for nding sources and publishing a story
before any other news organization. Another judgment is
Framing Natural Disaster, Terrorist Attack and Civil Unrest 155
using a knowledgeable source, which means using a source
that knows more about a topic than others. Journalists
incorporate professional ethics and standards of the jour-
nalism industry, such as revealing sources of information
[103]. Government, science, business, nongovernmental
organizations (NGO), media, and individuals can be the
sources of information for bloggers [104], in addition to
documents. Knowing the most frequently used sources by
bloggers could help to understand the relationship between
the blogger and source.
2.4 Modalities in the Media
Modalities are dened as the structural properties of a thing
[105]. Prior research found that the modalities of media (e.g.,
text, audio, picture, video, graphics, tables) affect the human
memory [106,107], and provide rich information [108,109].
Each modality has specic characteristics that make audi-
ences decode the information in different ways [110], and
each characteristic (e.g., sound, image, etc.) can make the
content of information more memorable than others [111].
The latter mentioned two theories that may explain memory
processing when having different modalities. The rst is the
dual-coding theory (DCT) that predicts that the content that
has two modalities will have more outcomes than the content
using one modality. The verbal content that is presented with
a picture has a better chance of dual coding and [will]
enhance better recall than would an item without a picture
[112, p. 184]. The second theory is the cue summation in the
multiple-channel communication developed [113,114]. This
theory assumes that the learning process increased when
stimuli in the content increased. For example, the content
with image provides readers more learning cues than the
content without an image, and content with a colored image
provides readers more learning cues than the image in black
and white. This assumption came from [115] interpretation
of cue summation that is:
When cues from different modalities (or different cues
within the same modality) are used simultaneously, they may
either facilitate or interfere with each other. When cues elicit
the same responses simultaneously or different responses in
the proper succession, they should summate to yield increased
effectiveness. When the cues elicit incompatible responses,
they should produce conict and interference(p. 78).
The cue summation in the multiple-channel communi-
cation and DCT theories provide an explanation of why
using different modalities is important in blogging and how
it can affect audiences. Knowing who is using different
modalities, journalists or citizens can predict which mes-
sages affect readers more.
In another paper [116], talked about the approach of
information- processing, and memory system that goes
through three stages: First, the sensory system, which holds
the information until the mind recognizes it. Second, the
short-term memory (STM) does not hold information like in
the sensory system but recognizes it. This stage has limited
capacity of information. Last, long-term memory (LTM) that
is more complex than the previous stages, has the permanent
knowledge the individual received from his life. Using
multimedia in the content can increase the human cognition,
which enhances the information content in the LTM process.
In addition, using different modalities in the content helps to
have better communication between the message sender and
receiver, especially if the receiver is illiterate. Using pictures,
video and audio within the text can help illiterate
5
people to
decode the messages, but not with equal ease as literate
people.
2.5 Research Questions and Hypotheses
To examine the purpose of the study, nine research questions
were asked, and two hypotheses were tested: Frames.[94,
p. 95] examined ve frames of crises: conict, human
interest, morality, economic consequences, and attribution of
responsibility. The conict frame emphasizes conict
between individuals, groups, or institutions as a means of
capturing audience interest.In this frame, a news story is
presented as a discussion or debate between people, parties,
groups, or governments. The human-interest frame brings a
human face or an emotional angle to the presentation of an
event, issue, or problem.While, the morality frame
appeared when the writer used quotations or cited what
others said and were objective and unbiased in writing the
news report [96]. The economic consequences frame is
present when a problem results in negative consequences for
people and society [99]. And nally, the attribution of
responsibility frame is when the writer puts the responsi-
bility of a problem or crisis on the government, institution,
or other individuals [94].
Prior studies found that the bloggers use the attribution of
responsibility frame more frequently than the other four
frames when they cover crises [94,99,117]. This study
examines two different types of bloggers and how each type
used the different frames across different crises.
Research Question 1: How do journalists and citizen
bloggers differ in framing the Egyptian revolution in
2011?
Research Question 2: How do journalists and citizen
bloggers differ in framing the Sinai terror attack in 2012?
5
Illiterate is a person who does not have reading or writing skills.
156 N. Makhadmeh and G. Zeldes
Research Question 3: How do journalists and citizen
bloggers differ in framing the ooding in Egypt in 2010?
Topics. The topic of a story refers to the subject of an
essay or a discussion. Knowing the topics associated with
each type of blogger reects their interests and provides an
evaluation of a crisis. Because of their professional experi-
ence, journalists understand the importance of the lead
paragraph of the story and know that the lead paragraph has
to include the topic that received the most space in the story.
The lead, abstract, or summary is a very important aspect
that tells the main point of the story (e.g., topic) [118]. Thus,
its very important to examine:
Research Question 4: What were the most frequent topics
used in the lead within blog posts by Egyptian journalist
bloggers and citizen bloggers when covering the fol-
lowing crises:
(a) The Egyptian revolution in 2011.
(b) The Sinai terror attack in 2012.
(c) The ooding in Egypt in 2010.
Research Question 5: What were the most frequent topics
that got the most space within blog posts by Egyptian
journalist bloggers and citizen bloggers when covering
the following crises:
(a) The Egyptian revolution in 2011.
(b) The Sinai terror attack in 2012.
(c) The ooding in Egypt in 2010.
Research Question 6: How did the Egyptian journalist
bloggers and citizen bloggers use the topic that got the
most space in the lead paragraph when covering the
following crises:
(a) The Egyptian revolution in 2011.
(b) The Sinai terror attack in 2012.
(c) The ooding in Egypt in 2010.
Sources. Sources are the providers of information, which
include individuals, organizations and documents. Prior
studies found that journalists are using ofcial sources more
than bloggers when they cover crises [38,119,120]. The
term ofcial sources refer to the sources that are able to
establish primary interpretation of the topic in question
[121, 1978, p. 58] such as government ofcials and media
sources. In addition, journalists are using specialists
6
(e.g.,
scientists) and eyewitnesses as sources of information [26].
Moreover, journalists may have a better experience than
bloggers in how to reach the sources, especially government
sources.
Thus, it is very important to examine the following
hypotheses:
H1: Egyptian journalist bloggers use sources of infor-
mation more than citizen bloggers.
H2: When covering crises, Egyptian journalist bloggers
are more likely to use governmental, specialist (e.g., scien-
tists), and eyewitness sources than citizen bloggers.
Modalities. Modalities refer to the structural properties of
a thing [105], text, audio, picture, video, graphics, tables are
good examples of online modalities. Previous research found
that using modalities can affect the human memory [106,
107] and provide rich information [108]. News bloggers are
using different modalities to send their messages to all
people, literate and illiterate.
Textual posts are the most frequently used modality by
bloggers, and they are usually brief, direct and informal
[26, p. 5], and then come picture, video and audio posts.
Approximately 90% of textual posts include an image, 50%
include videos, and 10% include audio les [122]. The
textual blog posts contain words that have semantic coher-
ence of the topic [123]. Image blog posts contain pictures,
photographs or hyperlinks to pictures [124]. Video blog
posts contain video les or video games. Audio blog posts,
also known as podcasts, consist of audio les, podcast links,
and recordings [125127].
Pictures, audio, and video in the textual content are
powerful psychological cues that improve an individuals
memory and save time. Knowing who is using different
modalities in covering crises helps the PR and ad agencies,
as well as researchers and organizations that are working on
reducing illiteracy, to narrow their focus of research. Thus,
its very important to examine:
Research Question 7: How do Egyptian journalists and
citizen bloggers differ in modalities used to cover the
following crises:
(a) The Egyptian revolution in 2011.
(b) The Sinai terror attack in 2012.
(c) The ooding in Egypt in 2010.
Research Question 8: What kind of images did the
Egyptian journalists and citizen bloggers use in their
coverage of different crises?
Research Question 9: What kind of hyperlinks did the
Egyptian journalists and citizen bloggers use in their
coverage of different crises?
6
A specialist is a person who devotes or limits his interest to some
special branch.
Framing Natural Disaster, Terrorist Attack and Civil Unrest 157
3 Method
The researchers used a quantitative content analysis of blog
posts to look at how each type of bloggers frames, topics,
sources, and modalities in their coverage of different crises.
This section provides information about how the researchers
conducted her research, which includes: sample and data
collection, sampling procedures, operational denitions,
reliability assessment, and validity assessment. The
researchers analyzed 441 blog posts by journalists and citi-
zen bloggers about the three crises.
3.1 Sample and Data Collection
Content analysis method gives the researchers a good idea of
the content of blog posts. Several researchers have dened
content analysis as a systematic method [128130]. For
instance, [128]dened it as the systematic and replicable
examination of symbols of communication, which have been
assigned numeric values according to valid measurement
rules and the analysis of relationships involving those values
using statistical methods, to describe the communication,
draw inferences about its meaning, or infer from the com-
munication to its context, both of production and consump-
tion(p. 25). By using this method, the researchers looked at
the clusters of messages in six groups of blog posts, two types
of bloggers and three types of crises (see Table 1).
3.2 Sampling Procedures
Blog post consists of a title, date, and body, and the posts
body may contain text, links, images, videos and/or graphs.
The unit of analysis of most of the research questions and
two hypotheses was the entire blog post, which gives the
reader a good explanation of is the content of the post. While
the unit of analysis of RQ4 was the rst paragraph in the
post, which provides the reader with the main topic in the
lead. And the unit of analysis in RQ8 was the photo, and
RQ9 was the hyperlink. Two coders analyzed each blog post
and identied the meaning of each post to answer the
questions in the coding sheet.
The study population is all blog posts by Egyptian jour-
nalist bloggers and citizen bloggers during three crises: the
January 25, 2011 Egyptian Revolution, the Sinai terror
attack of August 5, 2012, and the ooding in Egypt in
January 2010. The researchers created a list of journalist
bloggers in Egypt from the search on Google.com of Egypt
journalist bloggerin English and saha, modawen, masri
in Arabic. The researchers only found 33 journalist bloggers.
To conrm this sample and get a credible and reliable
sample, the researchers used two more steps: (1) scanned
Twitter lists to search for journalists in Egypt who also have
blog accounts, and looked at their followers to determine if
any of them are journalists and bloggers in Egypt, and
(2) looked at the bloggersblogrolls,
7
which are lists of
bloggers deemed to be experts in their community [132]. As
a result, the researchers collected a list of 33 journalist
bloggers in Egypt. To conrm that this list consists of all
journalist bloggers in Egypt, the researchers created another
list of 519 journalists working for 24 Egyptian newspapers
and news sites. The researchers searched for each name in
Arabic and English and found only six journalists who have
blogs; therefore, 33 journalist bloggers is a considerable
number.
The researchers excluded eight blogs
8
that fell outside of
the study time frame; six blogs that did not blog about the
three crises, one blog that had only hyperlinks to news
articles in an online newspaper, and one photo blog because
the posts were not dated. Other Egyptian journalist
micro-bloggers that appeared in the Google and Twitter
search results were ignored, because this study focuses on
blogs rather than microblogs, such as Twitter.
Blogs include a short biography of the blogger that
includes his or her name, background, and goals in creating
the blog. To conrm the rst list of the sample, the
researchers reviewed the About me,”“About,”“Anniand
Mn Annasection of each blog and conducted a Google
search on each blogger to conrm their status as professional
journalists.
Omraneya.net was once the largest Egyptian blog
aggregator of active Egyptian blogs until it ceased publish-
ing in 2013. Therefore, the researchers used the second
largest blog aggregator, ArabO, a search engine and direc-
tory of the English and Arabic websites in 22 Arab coun-
tries, to collect samples of Egyptian citizen bloggers. This
engine contains more than 1300 active Egyptian blogs, from
which 33 were randomly selected. The researchers looked at
the About me,”“About,”“Anni,and Mn Annapage in
each blog and searched through Google to conrm that the
bloggers were not working and had not worked as journal-
ists. To conrm that all citizen bloggers in the list are not
journalists, the researchers emailed them and received
feedback from 18 bloggers that they are not journalists. Only
two worked as journalists and were moved to the journalist
bloggers list. The researchers reviewed the blog archives and
7
A blogroll is published on a bloggers homepage and are common-
place among bloggers [131].
8
Ashraf Shahata-http://pressmisr.blogspot.com/, Nada Abd Alwahed-http://
hamselnada.blogspot.com/, and Ethar El-Katatney-http://etharelkatatney.
wordpress.com/-tweeter, Hussain Hassan Hussain-http://alwardy.wordpress.
com/,Mosaab Elshamy-http://www.mosaabelshamy.com/, Nora Younis-
http://web.archive.org/web/20110202034353/,http://norayounis.com/,
Mohammed Yahia-http://theunwriting.wordpress.com/2013/05/, Jamal Abd
Alrahim-http://gamalrahim.blogspot.com/.
158 N. Makhadmeh and G. Zeldes
ignored any blog posts dated outside the three periods of the
study. The researchers analyzed all blog posts from within
the three periods (see Table 2).
3.3 Study Time Frame
This analysis covers two weeks from the rst day of each
crisis date, January 25February 11, 2011, August 519,
2012 and January 1730, 2010. The researchers used the
blogsarchives to collect a sampling of blog posts about
each crisis. The researchers collected all blog posts (in both
Arabic and English) containing specic keywords from the
rst day and two weeks after each crisis date (N = 1500)
(see Table 2). The researchers excluded any post that had
only an image, video, audio, or hyperlink without text
because examining the content of only an image, video,
audio, or hyperlink may affect the codersemotions and lead
to biased results.
The researchers collected 1500 blog posts about the three
crises. The researchers analyzed all of the posts about Sinai
terrorist attacks and ooding because they are small samples.
The researchers collected the links of posts about the revo-
lution by each type of blogger in separate word sheets. Then
they took a random sample of 140 blog posts from each
sheet until they collected 140 posts (see Table 3), resulting
in a total sample size of 441 blog posts.
3.4 Operational Definitions
To determine frames of the crises, the researchers used the
scale proposed in [94], because it is clear and general. In
each frame, there are ve questions to be answered either by
yes (1) or no (0). For the attribution of responsibility frame,
the researchers determined if the blog post implies: (1) that
some level of government has the ability to alleviate the
problem/issue,(2) some level of the government is
responsible for the issue/problem,(3) solution(s) to the
problem/issue,(4) an individual or group of people in
society is responsible for the problem/issue(p. 100). These
researchers added (5) an institution or organization is
responsible for the problem/issue.
Regarding the human-interest frame, the researchers asked if
the blog post (1) provide[s] a human example or human face
on the issue,(2) employ[s] adjectives or personal vignettes
that generate feelings of outrage, empathy-caring, sympathy, or
compassion,(3) Emphasize[s] how individuals and groups
are affected by the issue/problem,(4) go[es] into the private
or personal lives of the actors,(5) contain[s] visual infor-
mation that might generate feelings of outrage, empathy-caring,
sympathy, or compassion[94,p.100].
In the conict frame, the researchers asked if the blog post
(1) reect[s] disagreement between partiesindividuals-
groups-countries,(2) show[s] one party-individual-
group-country reproach another,(3) refer[s] to two sides or
more of the problem or issue,(4) refer[s] to winners and
losers[94, p. 100]. These researchers added (5) refer to con-
sequences of disagreement two or more sides. In looking at the
morality frame, the researchers asked if the blog post
(1) contain[s] any moral message,(2) make[s] reference to
morality, God, and other religious tenets,(3) offer[s] specic
social prescriptions about how to behave[94,p.100],and
these researchers added two questions: (4) if they contain any
action or behavior against humanity,or(5)refertoagroupof
people or individual against law.
Table 1 Six groups of blog
posts Blogger type Journalist Citizen
Crisis type
Natural disaster Journalist + a natural disaster Citizen + a natural disaster
Terrorist attack Journalist + a terrorist attack Citizen + a terrorist attack
Civil unrest Journalist + civil unrest Citizen + civil unrest
Table 2 Crises time periods and
keyword searches Crisis type Time period Keywords
Sinai terrorist attack (August
5, 2012)
August 519,
2012
Sinai attack, terror attack, Egyptian- Israeli border,
Egyptian soldiers, Kerem Shalom border crossing,
Ansar Bayt al Maqdes, Rafah
Egyptian revolution (January
25, 2011)
January 25
February 11,
2011
Revolution, demonstration, Jan 25, anti-government,
Mubarak, civil unrest, civil disorder, civil strife
Flooding in Sinai, Al-Arish
and Aswan (January 17, 2010)
January 1730,
2010
Flooding, ood, rain. Sinai, Aswan, Al-Arish, Taba,
Nuweiba and Sharm el Sheik, Red Sea, natural disaster
Framing Natural Disaster, Terrorist Attack and Civil Unrest 159
Regarding the economic consequences frame, the
researchers asked if the blog post (1) mention[s] current or
future nancial losses,(2) mention[s] the costs/degree of
expense involved,(3) contain[s] a reference to economic
consequences of pursuing or not pursuing a course of action
[94, p. 100], and the researchers added two more questions:
(4) if they refer to any nancial assistance to overcome the
crisis, or (5) link the crisis to other events that caused
nancial losses or gains.
To examine the blog post topics used in the journalists
and citizen bloggers coverage of different crises, the
researchers examined three things: (1) the topic that was
mentioned rst, (2) the one that got the most space (main
topic), and (3) if the one that got the most space mentioned
in the rst paragraph or not. The section about the topics
covers seven areas, and was answered by yes (1) or no (0):
Economy, which includes unemployment, agriculture,
economic losses, etc.
Politics, to include Mubarak, government, constitution,
law, elections, etc.
Violence and terror, detailing the number of people killed
or injured by other people, sexual harassment or other
violent behavior. Any death by natural causes is not
considered violence.
Environment, which covers issues such as ooding,
changing weather, death, injuries by natural causes.
Human rights, which entails women rights, prisoner
rights, healthcare, educational rights, etc.
Military, which covers information about troops, sol-
diers, bombs, tanks, weapons, guns, or any military
equipment or action.
Other, for topics that cannot be included in the above
categories, such as technology.
The researchers compared journalist bloggers and citizen
bloggers by looking at ve content modalities, or structural
features of the posts:
Text, a post that only contains written text. All blog posts
contain text.
Photo, a post comprised solely of photographs.
Video, when embedded videos make up the post.
Audio, when a post contains audio.
Hyperlink, when a post contains an URL or link, the
coders looked at where these links take them.
To code the type of modalities, the researchers asked yes
(1), no (0) questions: If the post contains a text, photo, video,
audio, or hyperlink. The researchers also asked yes (1), no
(0) questions: weather the photo was professional, black and
white, an infographic, and has people. To examine the
hyperlinks, the researchers asked yes (1), no (0) questions: If
the rst hyperlink contains a story, picture, video, and other.
The sources cited by bloggers are a person, organization or
document that provided information used by the bloggers.
Some bloggers use quotes or paraphrase information from
sources in posts. Various words refer to source attributions,
such as said,”“claimed,”“conrmed,”“
thinks,and
suggests.The researchers seeks to determine whether the
blogger used a source or not. To code the type of sources,
the researchers asked yes (1), no (0) questions: If the source
is government, science, business, non-governmental orga-
nization (NGO), media, and individuals [104], in addition to
the documents that a written, printed, or electronic statement
that provide information from a group or an individual. If the
source of information is other than these sources, the coders
choose otherand write the name of the source.
3.5 Reliability Assessment
Intercoder reliability is the agreement among coders about
categorizing content[128, p. 123]. According to [128],
there are three main reliability requirements: reliability
testing on randomly selected content a test for chance
agreement, and report[ing] the reliability gures for all rel-
evant variables(p. 154). In another paper [133], the authors
suggest the coefcient should be tested rst on an instrument
to check the agreement of the categoriesconceptual and
operational denitions with coders.
To measure inter-coder reliability, two coders randomly
coded 40 blog posts, a selected subsample of 10% of the
total sample. The researchers used Krippendorffs alpha and
Scotts pi. The researchers used ReCal website to calculate
the reliability scores of variables. ReCal helps the content
analysis researchers to get accurate coefcients for
nominal-level data [134]. The researchers calculated the
Table 3 Number of blog posts
of each crisis Journalist Citizen Total
Terrorist attack 58/13.15% 32/7.26% 90
Revolution 140/31.75% 140/31.75% 280
Flooding 16/3.63% 55/12.47% 71
Total 214/48.53 227/51.48% 441/100%
160 N. Makhadmeh and G. Zeldes
inter-coder reliability based on Krippendorffs alpha and
Scotts pi with nominal categories and a large sample.
Before the actual coding took place, the researchers trained
the coders by using sample blog posts from outside the study
period. During the training, the researchers tested the de-
nitions of each category. The coders agreed in most in-
stances about the proper category for each unit of analysis
[135, p. 151]; this agreement is inter-coder reliability. The
highly dened categories also help to increase reliability.
Upon completion of training, the researchers and coders
conducted a reliability check by analyzing 40 of the posts
and checking the agreement and disagreement between the
coders. Based on the coding protocol, two coders coded
independently, after reading the coding instructions and
denitions for each variable. The inter-reliability process
went through two stages. After the rst stage, the researchers
rened the protocol to make it clearer and to increase the
reliability of some variables. The range of the Krippendorffs
alpha of framing questions were between 0.89 and 0.95;
conict was 0.90 (SD = 0.03), human-interest was 0.94
(SD = 0.04), morality was 0.93 (SD = 0.1), economic con-
sequences was 0.95 (SD = 0.1), and attribution of respon-
sibility was 0.89 (SD=0.07). The averages of the inter-coder
reliabilities of the rst topics were 0.99 (SD = 0.02) (the
range between 1 and 0.95), the topic got the most space 0.99
(SD = 0.02) (the range between 1 and 0.95), type of source
0.98 (SD = 0.03) (the range between 1 and 0.92), and type
of modalities 0.96 (SD = 0.09) (the range between 1 and
0.81) (see Table 4).
3.6 Validity Assessment
Validity is an important factor of any academic research. It
shows how well an analysis measures what it is supposed to
measure [136]. Getting acceptable scientic results as evi-
dence are the main purpose of research. In a paper, [135]
suggest validity is never an all-or-nothing situation. To some
degree, the researchers must use his/her own judgment to
assess the validity. The researchers used face validity to
measure what is supposed to be measured, and how it
appears in the blog posts. Face validity in the content
analysis provides the coders with greater condence in the
measurement procedure, also gives the researchers greater
condence in the study results [137]. In measuring the
frames, the researchers used an existing scale developed by
Semetko and Valkenburg in 2000, and added some questions
to make it more consistent. To examine each of the attri-
butes, the questions in the coding sheet were quick and easy
to answer either by yes (1) or no (0). In addition, the
researchers provided the coders with instruction and guid-
ance, and tested it before coding began.
4 Results
The researchers found that journalist bloggers posted 214
blog posts during two weeks of the start of each crisis, while
citizen bloggers posted 227 blog posts; 327 blog posts were
written in Arabic (74.15%) because it is the main language
in Egypt, 80 in English (18.14%), and 34 in three or more
languages (7.71%). The bloggers provided a translation of
words other than Arabic and English. A signicant differ-
ence between journalist bloggers and citizen bloggers was
found in using language (X2(2) = 37.56, p< 0.001). Jour-
nalist bloggers (131 posts, 29.71%) were less likely to write
in Arabic than citizen bloggers (196 posts, 44.44%). Jour-
nalist bloggers (61 posts, 13.83%) were more likely to write
in English than citizen bloggers (19 posts, 4.31%). And
journalist bloggers (22 posts, 4.99%) were more likely to
write in mixed languages than citizen bloggers (12 posts,
2.72%) (see Fig. 1).
4.1 Frames
The researchers asked ve questions to examine each frame,
and every question is answered either by yes (1) or no (0).
The researchers counted the number of questions answered
by yes (1) in each frame, and came up with continuous
scales of frames. RQ1 asked whether differences existed
between the citizen bloggers and journalist bloggers
regarding frames used in a civil unrest crisis (Egyptian
Revolution in 2011). The researchers computed a one-way
ANOVA comparing the citizen bloggers and journalist
bloggers in using ve frames to cover the revolution. Sig-
nicant differences were found among bloggers in using the
attribution of responsibility frame (F(1, 278) = 7.47,
p< 0.01), and the human-interest frame (F(1, 278) = 10.27,
p< 0.01). Tukeys HSD was used to determine the nature of
the differences between the bloggers. This analysis revealed
that the journalist bloggers who used the attribution of
responsibility frame scored lower (m = 2.06, sd = 1.48) than
the citizen bloggers who used the same frame (m = 2.56,
sd = 1.54), and journalist bloggers who used the
human-interest frame scored lower (m = 1.84, sd = 1.83)
than the citizen bloggers who used the same frame
(m = 2.54, sd = 1.78).
The analysis also found a trend close to signicance
(p= 0.06) in using the morality frame (F(1, 278) = 3.41).
The mean of the citizen bloggers who used this frame was
lower (m = 0.69, sd = 1.21) than the mean of the journalist
bloggers (m = 1.00, sd = 1.55).
No signicant differences were found between the means
of citizen bloggers and journalist bloggers in using the
conict frame (F(1, 278) = 0.29, p> 0.05), and the
Framing Natural Disaster, Terrorist Attack and Civil Unrest 161
economic consequences frame (F(1278) = 0.43, p> 0.05) in
the coverage of the Egyptian revolution, 2011. The mean of
journalist bloggers who used the conict frame (m = 2.68,
sd = 1.70) was not signicantly different from the mean of
citizen bloggers (m = 2.58, sd = 1.40), and the mean of
journalist bloggers who used the economic consequences
frame (m = 0.21, sd = 0.67) was not signicantly different
from the mean of citizen bloggers (m = 0.14, sd = 0.83) (see
Table 4). The RQ2 asked whether differences existed
between the citizen bloggers and journalist bloggers in
frames used to cover a terrorist attack crisis (Sinai terror
attack, 2012). The researchers computed a one-way
ANOVA. The results show signicant differences between
journalist and citizen bloggers in using the human-interest
frame (F(1, 88) = 5.5 p< 0.05), and the conict frame (F(1,
88) = 18.68, p< 0.001). Tukeys HSD was used to deter-
mine the nature of the differences between the bloggers.
This analysis revealed that journalist bloggers who used
the human-interest frame scored lower (m = 1.21, sd =
1.60) than the citizen bloggers (m = 2.06, sd = 1.76), and
the journalist bloggers who used the conict frame scored
higher (m = 3.81, sd = 1.43) than the citizen bloggers
(m = 2.47, sd = 1.37). No signicant differences were found
between the citizen bloggers and journalist bloggers in using
the attribution of responsibility frame (F(1, 88) = 0.12,
p> 0.05), the morality frame (F(1, 88) = 0.17, p> 0.05),
and the economic consequences frame (F(1, 88) = 1.29,
p> 0.05) in the coverage of the 2012 Sinai terror attack. The
mean of journalist bloggers who used the attribution of
responsibility frame (m = 2.52, sd = 1.31) was not signi-
cantly different from the mean of citizen bloggers (m = 2.63,
sd = 1.52); the mean of journalist bloggers who used the
morality frame (m = 1.09, sd = 1.82) was not signicantly
different from the mean of citizen bloggers (m = 0.94,
sd = 1.24), and; the mean of journalist bloggers who used
the economic consequences frame (m = 0.17, sd = 68) was
not signicantly different from the mean of citizen bloggers
(m = 0.38, sd = 1.00) (see Table 4).
To answer RQ3, regarding if any differences existed
between the citizen bloggers and journalist bloggers in
framing a natural disaster crisis (Flooding in Egypt in 2010),
the researchers also used a one-way ANOVA. The
researchers found a signicant difference between the two
groups of bloggers in using the morality frame (F(1,
69) = 4.14, p< 0.05). The analysis showed that journalist
bloggers who used the morality frame scored higher
(m = 1.25, sd = 1.65) than citizen bloggers (m = 0.55,
sd = 1.07). And no signicant differences were found in
framing a ooding crisis when using the attribution of
responsibility frame (F(1, 69) = 0.38, p> 0.05), the
Fig. 1 Frequencies of languages
used
162 N. Makhadmeh and G. Zeldes
human-interest frame (F(1, 69) = 0, p> 0.05), the conict
frame (F(1, 69) = 4.13, p> 0.05), and the economic con-
sequences frame (F(1, 69) = 1.27, p> 0.05).
The mean of journalist bloggers who used the attribution
of responsibility frame (m = 2.00, sd = 1.26) was not sig-
nicantly different from the mean of citizen bloggers
(m = 1.73, sd = 1.63); the mean of journalist bloggers who
used the human interest frame (m = 3.253, sd = 1.98) was
not signicantly different from the mean of citizen bloggers
(m = 3.250, sd = 1.29); the mean of journalist bloggers who
used the conict frame (m = 2.13, sd = 2.06) was not sig-
nicantly different from the mean of citizen bloggers
(m = 1.25, sd = 1.62); and the mean of journalist bloggers
who used the economic consequences frame (m = 1.75,
sd = 1.88) was not signicantly different from the mean of
citizen bloggers (m = 1.22, sd = 1.60) (see Table 4).
Over the average of all crises, the researchers ran inde-
pendent t-tests to compare the mean scores of citizen blog-
gers and journalist bloggers. The researchers found
signicant differences between journalist bloggers and
citizen bloggers in using the human-interest frame
(t(439) = 5.12, p< 0.001), the conict frame (t(439) = 4.47,
p< 0.001), and the morality frame (t(439) = 2.60,
p< 0.01). The mean of journalist bloggers who used the
human-interest frame (M = 1.78, SD = 1.85) was signi-
cantly lower from the mean of citizen bloggers (M = 2.64,
SD = 1.71). The mean of journalist bloggers who used the
conict frame (M = 2.94, SD = 1.74) was signicantly
higher from the mean of citizen bloggers (M = 2.24, SD =
1.55), and the mean of journalist bloggers who used the
morality frame (M = 1.04, SD = 1.63) was signicantly
higher from the mean of citizen bloggers (M = 0.69, SD =
1.18) (see Fig. 2).
To look at frequencies and percentages of frames ques-
tion, see Table 5.
4.2 Topics
RQ4 asked about the topics most frequently used in leads
within blog posts by Egyptian journalist bloggers and citizen
bloggers about three crises: (a) Egyptian revolution, (b) Sinai
terror attack, and (c) ooding. The topics most frequently
used in the lead by journalists and citizen bloggers were
politics, violence and terror. Chi-square tests of indepen-
dence were calculated comparing the percentages of topic
used by each type of blogger in each crisis. The researchers
dropped the economy and some cells in the environment and
human rights topics because there were not enough data to
perform a chi-square test. In the coverage of a civil unrest
crisis (Egyptian revolution) signicant interactions were
found in the political topic (X2(1) = 13.69, p< 0.001), and
violence and terror (X2(1) = 3.89, p< 0.05).
In the coverage of a terrorist attack crisis, a signicant
interaction was found in the violence topic (X2(1) = 5.34,
p< 0.05). In the coverage of a natural disaster (ooding), a
Table 4 Analysis of variance of
frames used in a civil unrest,
terrorist attack, and natural
disaster crises
SS df F Mean square
Civil unrest (N = 280)
Attrib. 17.00 1 7.47** 17.00
Human-Intr. 33.60 1 10.27** 33.60
Conf. 0.70 1 0.29 0.70
Moral 6.60 1 3.41 6.60
Eco. 0.36 1 0.63 0.36
Terrorist attack (N = 90)
Attrib. 0.24 1 0.12 0.24
Human-Intr. 15.10 1 5.50* 15.10
Conf. 37.12 1 18.68*** 37.12
Moral 0.46 1 0.17 0.46
Eco. 0.85 1 1.29 0.85
Natural disaster (N = 71)
Attrib. 0.92 1 0.38 0.92
Human-Intr. 0 1 0 0
Conf. 9.39 1 3.14 9.39
Moral 6.15 1 4.14* 6.15
Eco. 3.51 1 1.27 3.51
Note n = 441, *p< 0.05, **p< 0.01, ***p< 0.001
Framing Natural Disaster, Terrorist Attack and Civil Unrest 163
signicant interaction was found in the military topic
(X2(1) = 6.68, p< 0.01). Citizen bloggers were more likely
to mention politics as the rst topic (130, 31.18%) than were
journalist bloggers (106 posts, 25.42%). Journalist bloggers
used violence and terror topics in the rst paragraph
(54 posts, 12.39%) more than citizen bloggers did (48 posts,
11.52%). Other topics mentioned by journalist bloggers
were about the media, women, sport, agriculture, religion,
culture, and life (see Table 5).
RQ5 asks about the topic that got the most space by
journalist bloggers and citizen bloggers in their coverage
about three crises: (a) Egyptian revolution, (b) Sinai terror
attack, and (c) ooding. The top two topics that got the most
space in the journalistsposts were politics, and violence and
terror. The researchers dropped the economy and some cells
in the environment, human rights, and military topics
because there were not enough data to perform a chi-square
test. Citizen bloggers were more likely to write about politics
and environment. In the coverage of a civil unrest crisis
(Egyptian revolution), signicant interactions were found in
the political topic (X2(1) = 32.98, p< 0.001), violence
and terror (X2(1) = 16.99, p< 0.001), human rights
(X2(1) = 5.63, p< 0.05).
In the coverage of a terrorist attack crisis, a signicant
interaction was found in the violence topic (X2(1) = 5.34,
p< 0.05). In the coverage of a natural disaster (ooding), a
signicant interaction was found in the political topic
(X2(1) = 7.31, p< 0.01), environment (X2(1) = 15.06,
p< 0.001), and military (X2(1) = 7.07, p< 0.01). Accord-
ing to the topics that got the most space, citizen bloggers
were more likely to use politics (149 posts, 35.82%) than
journalist bloggers (120 posts, 28.85%). Journalist bloggers
were using violence and terror (47 posts, 11.3%) more than
citizen bloggers did (21 posts, 5.05%). Other topics covered
by journalist bloggers include media, women, sport, agri-
culture, religion, and life (see Table 6).
To answer RQ6 and nd how each of the two types of
bloggers used the topic that got the most space in the lead
paragraph when covering: (a) Egyptian revolution, (b) Sinai
terror attack, and (c) ooding, the researchers conducted a
chi-square test. The results showed a signicant interaction
in using the topic that got the most space in the post
in the rst paragraph when covering the revolution
(X2(1) = 28.15, p< 0.001). The journalist bloggers are
more likely to put the topic that got the most space in the rst
paragraph (lead) when they cover a civil unrest crisis (132,
75.4%) than citizen bloggers (98, 42.6%). The results also
showed a signicant interaction in using the topic that got
the most space in the post in the rst paragraph when cov-
ering the ooding (X2(1) = 6.68, p< 0.05). The journalist
bloggers are more likely to put the topic that got the most
space in the rst paragraph (lead) when they cover the
Fig. 2 Estimated means of
frames by blogger type
164 N. Makhadmeh and G. Zeldes
natural disaster crisis (58, 64.4%) than citizen bloggers
(32, 35.6%). In addition, the results showed no signicant
difference between journalist and citizen bloggers in using a
topic that got the most space in the rst paragraph (lead)
when they cover terrorist attacks (X2(1) = 2.04, p> 0.05).
4.3 Sources
To test H1, a test of independent proportions was calculated
comparing the proportion using sources by journalist
bloggers and citizen bloggers. Journalist bloggers are more
likely to use sources (135, 30.6%) than were citizen bloggers
(99, 22.4%), which supports the H1. The study also found
207 (47%) blog posts do not have any source. To test H2 to
see whether Egyptian journalist bloggers are more likely to
use governmental, scientists, and eyewitness sources than
citizen bloggers, the researchers used a test of proportions.
The researchers found that citizen bloggers (34, 7.7%) are
more likely to use governmental sources than journalists (24,
5.4%). Sixteen posts by journalist bloggers used scientist
sources (16, 3.6%), while none by citizen bloggers used this
Table 5 Frequencies and percentages of the rst mentioned by type of bloggers
Civil unrest Terrorist attack Natural disaster Total
Citizen JR Citizen JR Citizen JR Citizen JR
Politics 109 80 13 26 8 0 130 106
26.14%*** 19.18%*** 3.12% 6.24% 1.92% 0% 31.18% 25.42%
Violence and terror 26 40 14 12 8 2 48 54
6.24%** 9.59%** 3.36%** 2.86%** 1.92% 0.48% 11.52% 12.93%
Environment –––36 9 36 9
–––8.63%*** 2.16%*** 8.63% 2.16%
Human rights 2 8 ––– 28
0.48% 1.92% ––– 0.48% 1.92%
Military 2 1 4 13 1 3 7 17
0.48% 0.24% 0.96% 3.12% 0.24%* 0.72% 1.68% 4.08%
N 139 129 31 51 53 14 417
Total 33.34% 30.93% 7.44% 12.22% 12.71% 3.36% 100%
Note n = 417, *p< 0.05, **p< 0.01, ***p< 0.001
Table 6 Frequencies and percentages of topics that got the most space by type of bloggers
Civil unrest Terrorist attack Natural disaster Total
Citizen JR Citizen JR Citizen JR Citizen JR
Politics 125 83 22 33 2 4 149 120
30.05%*** 19.95%*** 5.29% 7.93% 0.48%** 0.96%** 35.82% 28.85%
Violence and Terror 11 37 6 8 4 2 21 47
2.64%*** 8.89%*** 1.44% 1.92% 0.96% 0.48% 5.05% 11.3%
Environment –––47 6 47 6
–––11.3%*** 1.44%*** 11.3% 1.44%
Human rights 1 8 –– 18
0.24%* 1.92%* 0.24% 1.92%
Military 2 1 3 11 ––512
0.48% 0.24% 0.72% 2.64% 1.2% 2.88%
N 139 129 31 52 53 12 416
Total 33.41% 31.01% 7.45% 12.5% 12.74% 2.88% 100%
Note n = 416, *p< 0.05, **p< 0.01, ***p< 0.001
Framing Natural Disaster, Terrorist Attack and Civil Unrest 165
source. And journalists (37, 8.4%) are more likely to use
eyewitnesses than citizen bloggers (31, 7%). In sum, the H2
is partially supported.
The researchers looked at using media and documents as
sources of information. Results showed that journalist
bloggers are more likely to use media sources (69, 15.9%)
than citizen bloggers (26, 5.9%), while citizen bloggers are
more likely to use documents as sources of information
(29, 6.6%) than journalist bloggers (13, 2.9%) (see Fig. 3).
According to media sources, journalist bloggers use online
media (39, 8.8%) more than using ofine media (30, 6.8%),
while citizen bloggers are less likely to use online media sources
(11, 2.5%) than ofine media (15, 3.4%).
4.4 Modalities
RQ7 addressed whether blogger types differed in using
modalities to cover the different crises. A chi-square test of
independence was calculated comparing the frequency
of modalities used by journalist and citizen bloggers.
Signicant interactions were found in using images (X2(1)
= 22.84, p< 0.001), video (X2(1) = 23.09, p< 0.001), and
hyperlinks (X2(1) = 9.95, p< 0.01). Citizen bloggers were
more likely to use images in their posts (159, 36.1%) than
journalist bloggers (102, 23.1%), while journalists are more
likely to use video posts (30, 8.8%) than citizen bloggers
(9, 2%). Ninety (20.4%) blog posts by journalists had
hyperlinks, and 63 (14.3%) citizen blogger posts used
hyperlinks in their coverage of crises. In addition, the results
showed no signicant difference between journalist and
citizen bloggers in using audio (X2(1) = 0.95, p> 0.05) (see
Fig. 4).
RQ8 asked about the kind of images the Egyptian jour-
nalist and citizen bloggers use in their coverage of different
crises. Sixty-two (14.1%) of the images used by journalists
looked professional, only ve (1.1%) were in black and
white, 39 (8.8%) were info-graphics, and 81 (18.4%) had
people. Of the images used in citizen blog posts about crises,
97 (22%) look professional, 12 (2.7%) were in black and
white, 38 (8.6%) were info-graphic, and 124 (28.1%) had
people (see Fig. 5).
Lastly, journalists were more likely to use hyperlinks than
citizen bloggers (see Table 7). The researchers examined the
rst link of each post to answer RQ9 and found that 67
(15.2%) of journalistsrst hyperlinks go to stories, ve
(1.1%) to pictures, 10 (2.3%) to YouTube, and 10 (2.3%) to
main websites without stories (e.g., Twitter.com,Facebook.
com). The results also showed only 44 (10%) of the rst
hyperlinks by citizens went to stories, 15 (3.4%) to pictures,
two (0.5%) to YouTube, and one (0.2%) to a main website.
5 Discussion
After the Arab Spring revolutions, governments, organiza-
tions, researchers, and people around the world started
paying more attention to the crises. The Arab Worlds crises
are very important examples that made governments deal
with future crises easier. Predicting the results and solutions
of a crisis come from reading news and analyses about the
crisis. The blog is one medium that provides audiences with
this information. This paper offers a window into the world
of bloggers during the crises. The theoretical contribution of
this paper provides knowledge about these two different
types of bloggers, and probes the differences between how
Fig. 3 Percentage of different
sources used
166 N. Makhadmeh and G. Zeldes
they used frames, sources, and modalities. In addition, the
paper provides important contributions to the development
of framing theory and the crisis coverage.
The results of this paper show signicant differences in
the frames, sources, topics, and modalities used by two types
of bloggers in Egypt. A large number of blog posts were
about the civil unrest crisis (revolution), and a small number
of posts focused on the terrorist attack and a natural disaster
because the revolution started on the rst day of our sample
and continued through two weeks. The ooding and terrorist
attack in Sinai were one-day crises that resulted in less
coverage. In addition, the on-going nature of the civil unrest
and the magnitude and impact of the event was much
greater. As an example, the Egyptian revolution received
global attention. Major media around the world covered this
crisis because it affected the governments and the economy
[138]. Moreover, millions of Egyptian protestors went to the
streets asking for freedom and democracy. At least 846
people were killed, and more than 6400 were injured [67].
Media cover crisis that is important to most of the people.
The more people and victims appear in a civil unrest crisis,
the more media coverage of the crisis. The crisis that gets the
attention of global media can easily get the attention of
bloggers.
Citizen bloggers are more likely to cover a natural dis-
aster (ooding) than journalist bloggers. And journalist
bloggers are more likely to cover a terrorist attack. Citizen
bloggers are more open to cover what they want, and jour-
nalist bloggers are subject to their specialization. The pre-
vious research developed the hierarchy of inuences model
that shows the levels that media messages go through from
the most micro to the most macro: individual (journalist),
media routines, organization, extra media, and ideological
(culture) level. The journalists used to go through these
levels when they shape their messages, and used to have
gatekeepers on their messages. In the individual level, the
personal and professional roles and attitudes (e.g., organi-
zation regulations, journalistscode of ethics, etc.) inuence
the content of messages. This study predicts that citizen
bloggers miss those personal and professional roles. The
only way to know that is by interviewing both types of
bloggers and know what are their roles when they blog. This
explanation shows that journalists are using blogs to express
Fig. 4 Percentage of different modalities used
Fig. 5 Percentage of kind of
images used
Table 7 Sum, average, and
standard deviation of using
hyperlinks
Type of blogger Sum of hyperlinks Average SD Number of posts
Citizen 84 0.37 0.83 228
Journalists 244 1.14 3.6 213
Framing Natural Disaster, Terrorist Attack and Civil Unrest 167
their emotions, but they are still using the journalism pro-
fessional roles in an indirect way when they post on blogs.
Moreover, the Arab World faced many political crises,
conicts, and wars, which made journalists write about
politics and wars every day while they are working in media
organizations. The daily practice made them write easily
about heavy topics (terrorist attacks, wars, etc.), and they
know how to nd resources for this type of crisis. However,
citizen bloggers do not write much about heavy topics
because of fear of responsibility and freedom of expression
laws. In Egypt, the fear of responsibility and arresting
inuential bloggers made many citizen bloggers worry about
posting political posts, and write under pseudonyms, while
journalist bloggers use their real name because they are
protected by the freedom of expression laws. In terms of
language, both types of bloggers used Arabic more than
English because it is their main language. However, jour-
nalist bloggers were more likely to write in English than
citizen bloggers. The reason for that may be the experience
the journalists have in reading and nding online resources
for information, such as using foreign online newspapers.
The results showed that the journalist bloggers are more
likely to use hyperlinks that were going to media sources,
which conrms our explanation.
5.1 Frames
The research found signicant differences between two types
of bloggers in using media frames. In the coverage of the
civil unrest crisis, citizen bloggers were more likely to use
the attribution of responsibility and human-interest frames
more than journalist bloggers. For the attribution of
responsibility frame, [94] asked whether the blogger blamed
a person, party, or government. Bloggers are using blogs to
air their opinions of news and analyze events, and 52 jour-
nalist bloggers are using blogs to air their analyses on the
main news of the mainstream media, especially politics [31].
However, the journalist bloggers are keeping and not
blaming any side of the problem by staying neutral, because
otherwise their trust, credibility and reputation could be
affected. For the human-interest frame, citizen bloggers are
more likely to express their feelings of sympathy by using a
human face example that generates feelings. Journalists are
more likely to be objective in their writing and unbiased
toward a side, which are the basic ethical principles in
journalism [103,139].
On the other hand, there are many governmental news-
papers in Egypt. The journalists in these newspapers write
positive articles about the government. The results show that
the journalist bloggers who are in the study may work in
newspapers that never show the government is responsible
for a crisis. In the coverage of a terrorist attack crisis, the
researchers found signicant differences between two types
of bloggers in using human-interest and conict frames.
Citizen bloggers are using human-interest more than jour-
nalist bloggers. As mentioned in the previous paragraph,
citizen bloggers try to attract audiences by putting a human
face in their posts and trying to stir their emotions, which
will increase the interactivity with the audiences. Moreover,
journalists are more likely to use conict frame than citizen
bloggers.
According to a previous study, the conict frame was very
commonly used by American news media [96] and audiences
[75]. Another study found that this frame is the second most
common frame used by media [94], and the more serious the
newspaper, the more the conict frame was in evidence[99,
p. 108]. The researchers of this paper think that reporting
about a conict between two or more sides is showing readers
the conict between parties. In a terrorist attack crisis, usually
there is disagreement between the individuals who prepared
the attack and the government, and the people affected. This
kind of sensitive crisis needs someone who specializes in
reporting and analysis, such as journalists, who can reach the
information and the resources easily and early.
In the coverage of a natural disaster crisis, a signicant
difference between types of bloggers was found in using the
morality frame. Journalist bloggers were more likely to have
used this frame in their coverage of ooding than citizen
bloggers. Entman [74]dened media framing as select[ing]
some aspects of a perceived reality and mak[ing] them more
salient in a communicating text, in such a way as to promote
a particular problem denition, causal interpretation, moral
evaluation, and/or treatment recommendation for the item
described(p. 52). Thus, moral evaluation,or making
moral judgments, is one of the aspects of media framing.
Journalists learned that from their careers, and try to apply it
when they blog on their personal sites. In addition, the
morality frame is showing the event in context of religious
tenets, social prescriptions, or moral prescriptions [75,99].
In their paper, the authors [96] found that the morality frame
is a common frame used by journalists to cover an event in
an indirect way by using quotations or inference; they tend
to use an indirect way in reporting because of the objectivity
that is the norm in journalism.
5.2 Topics
Politics and violence and terror were the topics most fre-
quently used by both journalist and citizen bloggers in the
lead and the main body of the post. The reason for this may
be the type of crises we analyzed and the interest of each
blogger type; the revolution and the terrorist attacks were
political events. In their paper, [6] found that the largest
number of blogs in the Arabic blogosphere consist mostly of
168 N. Makhadmeh and G. Zeldes
political content that engages the public in the political
movements, critiques the political regime and protests
against human rights violations. And [28] also found that
43.7% of bloggers with professional journalism backgrounds
write about the government, and only 22.8% of bloggers
with economic and other backgrounds write about politics.
The researchers said the This variance may reect differing
philosophies of the purpose of journalism and blogging by
authors with and without traditional journalistic back-
grounds. Reecting the longstanding role of the press as the
Fourth Estate in American society, journalists often frame
stories in the context of government and other powerful
institutions exercising their control and inuence[28]. In
the coverage of the civil unrest crisis, both types of bloggers
covered the conict between pro- and anti-government,
especially the behaviors of the police. In the coverage of the
terrorist attack, the bloggers talked about conict between a
terrorist group and the government. Both topics are con-
nected to each other.
In a 2014 paper, [140] said that the more relevant
readers of your blog content, the more opportunities to
attract, engage and convert those readers…” (para 1).
Bloggers write about the issues that are more pertinent to
their readers. Since they born, Arab people read political
news to follow up on news about political crises. The Arab
Worlds communities are more interested in reading political
news because they faced many political crises: Gulf War,
Iraq War, Israel-Palestine conict, etc. Large portions of
Arab blog readers are political activists, journalists, and
politically inuential elites [42]. Thus, it is logical to cover
the political topics more than any other topics.
On the other hand, the researchers found a signicant
interaction between two types of bloggers in using the topic
that got the most space in the lead. Journalist bloggers are more
likely to put the topic that got the most space in the rst
paragraph than citizen bloggers. The lead is a main component
of the story and contains a summary of the topic and what is
the story about. This goes back to the rules that the journalists
have in news reporting and writing, and their education in
journalism and media-related elds. Journalists write news
every day, and doing the same thing every day makes the
person better at it. Thus, they are much better than citizen
bloggers in making the main topic in the post in the lead
paragraph. Fifty-two percent of bloggers consider themselves
journalists [34]. This study could help in explaining that the
bloggers who do put the main topic in the lead know the
importance of the lead, and so, consider themselves journalists.
5.3 Sources
Journalists (30.6%) are using sources more than citizen
bloggers do (24%). The researchers explained that by
justifying that journalist bloggers will go to the available
sources they used when they work(ed) in the media. Citizen
bloggers have more difculty with sources, which require
them more time to nd. The researchers found a signicant
difference between the journalist bloggers and the citizen
bloggers in using scientists. The researchers explain that by
suggesting that journalist bloggers use sources that they used
in their careers. Moreover, prior studies showed that jour-
nalists are using ofcial sources more than bloggers when
they cover crises [38,119,120]. Ofcial sources refer to the
sources that are able to establish an interpretation about
things (e.g., government, scientists) [121].
The research did not nd any differences between types
of bloggers in using governmental sources. However, a
previous researcher found that online newspaper journalists
cite ofcial sources (e.g., government) more than citizen
journalists [73]. The researchers found that the journalist
bloggers are using media (online and ofine) and document
sources more than citizen bloggers do. Because this is their
eld, journalist bloggers know much about the media sites
that can provide information on a crisis. And journalists who
use these sources often hope that these media sources will
cooperate with them in the future. In addition, using docu-
ments is a way to be objective and not biased in journalism
reporting.
5.4 Modalities
The researchers found differences between the journalist
bloggers and citizen bloggers in which modality they use.
Citizen bloggers were more likely to use images in their
posts than journalist bloggers, while journalists are more
likely to use video than citizen bloggers. Prior research
found that the modalities of media (e.g., picture, video)
affect the human memory [106,107]. The brain processes
visual content differently than text. Typically, visual content,
whether it is moving (e.g., video) or not (e.g., image), has
much more emotional impact than text. The dual-coding
theory (DCT) suggests that the content that has two
modalities will have more outcomes than the content using
one modality, and the one that has visual content has a
better chance of dual coding and enhance better recallthan
non-visual content [111,112, p. 184].
Bloggers are more likely to use visuals to show the details
of a crisis. They say a picture is worth a 1000 words,
therefore, a video that has many pictures is more important
and worth innite words. Text requires the ability to read
and time, so using visual tools is easier to send messages to
the readers than sending textual messages. The
cue-summation theory assumes that the textual content with
an image provides more learning cues than the content
without image.
Framing Natural Disaster, Terrorist Attack and Civil Unrest 169
Video is more interesting to watch than looking at frozen
picture. The journalist bloggers may know that the video is
worth more than a picture, so they put videos on their blogs
to be more social and make the readers be more engaged and
interactive, which are the main goals of blogging. In addi-
tion, the journalist blogger may have previous experience
from their work as journalist in how to upload videos on the
Internet.
Then came the natural disaster, the greatest number of
videos were about the civil unrest (27 posts, 6.1%) just
because bloggers had a camera in the place of crisis and tried
to show the magnitude of the crises, (13 posts, 2.9%). In
Egypt, many bloggers were blogging from the Tahrir
Square, where people demonstrated. The goals of using
hyperlinks in the posts are to refer to the main source of the
information to encourage the readers to go to the primary
source, increase the authority of a posted story,achieve
transparency, sharing information, increase the number of
readers, get more replies of the post, and to be more reliable
by citing the main sources of information ([22, p. 119] and
[28,141,142]). In his paper [37] found that 85% of jour-
nalist bloggers provide the hyperlinks extensively to refer to
their main news sources, which are mainly media sites and
related materials. This paper found that journalist bloggers
are using hyperlinks more than citizen. Their journalism
experience taught them to cite the sources.
In addition, using hyperlinks indicators an ability to use
new media technologies, and it reect differing sourcing
philosophies of bloggers[28, p. 9]. While, a limited use of
hyperlinks can show a limited knowledge in using this
technology [141]. As mentioned before, journalist bloggers
were using media sources more than citizen bloggers. To cite
these certain media sources, journalists used hyperlinks that
went directly to the story, and they often hope that these
sources reciprocate and cite them in the future [143,144].
Referring to these sources is a kind of praise between
journalists.
In general, using modalities is a very important aspect
that has been exploited by journalists and citizen bloggers in
the coverage of crises. Both know the importance of using
modalities in gathering more readers and building the
trustworthiness with their communities.
6 Conclusion
Framing studies discuss two levels of frames: media and
individual frames. Media frames are found in the media
content, but individual frames are in peoples heads, and
how they interpret and make sense of news and categorize
them in groups [71,81]. This research provides the framing
literature with two types of individual frames, journalists and
citizen bloggers. Bloggers express what is in their heads by
posting on blogs. The pervious knowledge and personal
characteristics can make differences in the interpretation of
news among people. In this study, journalist and citizen
bloggers are the individuals who select some aspects of the
crisis and make them more salient in a post. The differences
between the two types of bloggers in creating individual
frames, and using topics, sources, and modalities to cover
crises show that there are different levels of individual
frames; this may relate to professional norms and work
routines the journalist bloggers learned from their career as
journalists.
7 Implications
In sum, this research paper helps the public (e.g., blog
readers, students, journalism educator, crisis managers) to
know more about journalist bloggers and citizen bloggers,
and know how each type of bloggers write about crises in a
positive and negative way. For example, the study provides
the journalism educator with how different types of blogger
use a lead, and what are the main topics, sources, and
modalities used in the stories. In addition, it will help the
general public who have limited time with a summary of
who is a journalist and who is not. In addition, the paper
helps identify the parameters and boundaries of journalist
bloggers. Knowing which type of blogger, journalist or cit-
izen, is using more sources is a good indicator of credibility.
In journalism, using sources in a story, especially related to
the topic, shows the importance of the story, and in the
ability of the author to provide information. The results of
this paper help society with these questions: What hap-
pened? Who is responsible? Why did it happen? And how it
happened? After people, political and media researchers,
governments, and organizations nd answers to these
questions, they can understand a crisis and predict the
answers of future crises.
This research paper is a guide for governments and public
relation agencies to see how each type framed and used
sources during crises. For example, governments could use
the type of frame that uses media sources to send messages
to the audiences. The results of this study will also help
public relation agencies in designing strategies to face crises
and crisis management by knowing the responsibility
framing acceptance or denial of an event [145]. In addition,
it helps these agencies know the type of blogger to send
messages to reach a particular audience in a specic crisis.
During a natural disaster for example, the public relations
agencies focus on sending their messages through citizen
bloggers because they are more likely to write about this
crisis than journalists. Knowing which type of bloggers is
using different modalities also has benets for those in the
media and businesses. For example, the camera
170 N. Makhadmeh and G. Zeldes
manufacturers can provide citizen bloggers (the type who
used pictures more) free cameras to take better pictures and
promote their cameras to blog readers.
8 Limitations
This research had several limitations including difculties in
nding who is a journalist blogger and who is a citizen
blogger. All journalist bloggers in the sample of this study
were using their real name, and wrote a short biography
about themselves to convey a sense of credibility and
transparency [143]. While most of citizen bloggers in the
sample did not have a short bio that refer if they worked as
journalists or not, Thus, the researchers emailed citizen
bloggers and received responses from most. After that, the
researchers searched through Google, Twitter, and Facebook
and conrmed that the remaining citizen bloggers were not
journalists. However, some of the citizen bloggers did not
disclose that they were journalists. It is very signicant to
have a separate blog directory that has only journalist
bloggers, which will help governments, organizations,
media, PR agencies, bloggers, activists, and readers to be
more specic about to what type of blogs they want to read.
Another limitation was in nding posts about the terrorist
attacks and ooding in Sinai. The majority of blog posts
were about the Egyptian revolution because it was a famous
crisis not only in Egypt, but also in the whole world.
Another limitation was deciding not to code the content
of videos from the analysis, which may have included dif-
ferent messages and frames. Videos transmit a huge amount
of information that entices the blog readers to see or read
more about a crisis. In addition, these videos may tell more
about the frames used especially in those that affect the
emotions of readers, such as the human-interest and morality
frames. Using content analysis to nd the differences
between types of bloggers in coverage crisis is a limitation.
This method only describes the content of posts. Further
research can interview bloggers to explore their attitudes
toward choosing the topics, sources, and modalities and why
they choose it.
The data of this study were collected from 33 journalist
blogs and 33 citizen blogs in Egypt. This number of blogs
may not be enough to generalize the results on all of jour-
nalist and citizen blogs around the world. In addition, the
Egyptian bloggers may have different characteristics than
other bloggers around the world. Responsibility and freedom
of expression laws, and arresting bloggers in Egypt made
some bloggers wary of publishing against the government,
which limits the generalizability of results to a wider
population.
Another limitation of this study was the uency in a
language. In Egypt, people are mainly using Arabic because
it is the mother language. However, we found several posts
written in English and other languages with translation in
Arabic. The bloggers who wrote in this language might not
be uent in English that may affect the results of this study.
The lack of available data about the differences between the
journalist and citizen bloggers may affect the generalizability
of the data of this research. However, this study can help
future research by providing a benchmark.
9 Future Research
There is much more work to do to nd the differences
between the journalist and citizen bloggers. The natural
disaster and the terrorist attack crises were one-shot events,
while the revolution was a continuous crisis. Future studies
could look at the comparison between types of bloggers in
the coverage of two continuous crises or sudden crises to
make sure that the duration does not make a difference. In
addition, the researchers could examine economic crises,
such as air transportation. Future studies could also examine
different types of stories that are not about crises to see if the
results are consistent with the results of this paper.
During the coding process, the researchers noticed that
the sites of journalist bloggers were more sophisticated in
design and more consistent in adding more content, as their
news organizations invest their online resources and staff to
make the journalist bloggers page visually appealing and
drive visits. Future studies could compare the designs of
journalist blogs and their news organization websites to see
how much these news organizations affect the journalists
personal blogs. In addition, researchers can interview the
bloggers to see how they chose their site design.
Future studies could also look at additional factors that
can make the differences between the journalist bloggers and
citizen bloggers more clear in the coverage of a crisis, such
as the length of the posts and engagement with the audi-
ences. The researchers could analyze the content of blog
posts of a crisis to see if the bloggers are answering the main
news reporting questions: Who? What? Why? How? In
addition, the researchers could examine the differences
between a journalist associated with a news organization and
another who is not associated with a news organization to
see how current or old experience in journalism may affect
journalist bloggers.
Content of the picture is very important. Future
researchers could analyze the content of the pictures about
crises because there were a large number of pictures posted
by journalist and citizen bloggers. For example, analyzing
the written messages, info-graphic messages,is signi-
cant. Other future research could examine the kind of people
who are in the pictures, and if they are politicians or public
people. This could show the importance of the people in the
Framing Natural Disaster, Terrorist Attack and Civil Unrest 171
pictures to each type of blogger. Moreover, examining the
kind and content of documents bloggers use could help us to
answer the questions of What happened? Who is responsi-
ble? Why did it happen? And how it happened?
Lastly, the researchers could look at media framing of
similar crises that occurred at different times, and see if the
passage of time could change the frame of the same crisis,
such as the overthrow of Mohammad Hosni Mubarak on Jan
25, 2011, and Mohamed Morsi on July 3, 2013. Future
studies could examine coverage of the same crises by jour-
nalist and citizen bloggers from different countries. For
example, blogs by Egyptian and American bloggers could be
examined to determine if cultures affect the framing of the
posts.
References
1. Gamon, M., Basu, S., Belenko, D., Fisher, D., Hurst, M., König,
A.C.: BLEWS: using blogs to provide context for news articles.
ICWSM (Apr 2008)
2. Dimitrova, D.V., Connolly-Ahern, C.: A tale of two wars:
framing analysis of online news sites in coalition countries and
the Arab world during the Iraq war. Howard J. Commun. 18(2),
153168 (2007)
3. El-Nawawy, M., Khamis, S.: Egyptian Revolution 2.0: Political
Blogging, Civic Engagement, and Citizen Journalism. Palgrave
Macmillan, Basingstoke (2013)
4. Hermida, A., Lewis, S.C., Zamith, R.: Sourcing the Arab Spring:
a case study of Andy Carvins sources on Twitter during the
Tunisian and Egyptian revolutions. J. Comput. Mediated Com-
mun. 19(3), 479499 (2014)
5. Abdulla, R.: Arab media over the past twenty years: opportunities
and challenges. In: The Changing Middle East: A New Look at
Regional Dynamics, pp. 5984. (2010)
6. Etling, B., Kelly, J., Faris, R., Palfrey, J.: Mapping the Arabic
blogosphere: politics and dissent online. New Media Soc. 12(8),
12251243 (2010)
7. IACP Center for Social Media: Fun Facts. Retrieved 20 Apr 2014
from http://www.iacpsocialmedia.org/Resources/FunFacts.aspx
(2014)
8. Winn, P.: State of the Blogosphere: Introduction. Technorati, San
Francisco, 21 Aug 2009
9. Technorati: Technorati Main Page. Retrieved 20 May 2014 from
www.technorati.com/ (2014)
10. Nielsen: Buzz in the Blogosphere: Millions More Bloggers and
Blog Readers. Retrieved 1 Feb 2014 from http://www.nielsen.
com/us/en/newswire/2012/buzz-in-the-blogospheremillions-
more-bloggers-and-blog-readers.html (2012)
11. Cross, M., Bloggerati, T.: How blogs and twitter are transforming
popular culture: how blogs and twitter are transforming popular
culture. ABC-CLIO (2011)
12. Kaye, B.K.: Its a blog, blog, blog, blog world. Atlantic Journal
of Communication 13(2), 7395 (2005)
13. Sethi, S.K.: Blog/web log-a new easy and interactive website
building tool for a non-net savvy radiologist. J. Thorac. Imaging
22(2), 115119 (2007)
14. Nardi, B.A., Schiano, D.J., Gumbrecht, M., Swartz, L.: Why we
blog. Commun. ACM 47(12), 4146 (2004)
15. Gill, K.E.: How can we measure the inuence of the blogosphere.
In: WWW 2004 Workshop on the Weblogging Ecosystem:
Aggregation, Analysis and Dynamics (May 2004)
16. Blood, R.: Weblogs: A History and Perspective. Retrieved 1 Feb
2014 from http://www.rebeccablood.net/essays/weblog_history.
html (2000)
17. Wortham, J.: After 10 years of blogs, the futures brighter than
ever. Wired Mag. (2007)
18. El Gody, A.: The image of the United States in the Arab
blogshpere: readings from Al Arabiya.net. Paper presented at the
international communication association conference, 1. Retrieved
22 Mar 2014 from http://www.allacademic.com/meta/
p301249index.html (2009)
19. Bik, H.M., Goldstein, M.C.: An introduction to social media for
scientists. PLoS Biol. 11(4), e1001535 (2013)
20. James, J.: How Much Data is Created Every Minute? Retrieved
12 May 2014 from http://www.domo.com/blog/2012/06/how-
much-data-is-created-every-minute/ (2012)
21. Grabowicz, P.: Weblogs bring journalists into a larger commu-
nity. Nieman Rep. 57(3), 7476 (2003)
22. Gillmor, D.: We the Media: Grassroots Journalism by the People,
for the People. OReilly Media, Inc. (2006)
23. Deuze, M.: Online journalism: modelling the rst generation of
news media on the world wide web. First Monday 6(10) (2001)
24. Matheson, D.: Weblogs and the epistemology of the news: some
trends in online journalism. New Media Soc. 6(4), 443468
(2004)
25. Hufngton, A.: Now the little guy is the true pit bull of
journalism. The Guardian. Retrieved 17 Nov 2013 from http://
www.guardian.co.uk/commentisfree/2006/mar/14/comment.
blogging (14 Mar 2006)
26. Domingo, D., Heinonen, A.: Weblogs and journalism: a typology
to explore the blurring boundaries. Nordicom Rev. 29(1) (2008)
27. Docter, S.: Blogging and journalism: extending shield law
protection to new media forms. J. Broadcast. Electron. Media
54(4), 588602 (2010)
28. Sheehy, M., Ji, H.: Blogging the meltdown: comparing the
coverage of the economic crisis in journalistic blogs vs. economic
blogs. Web J. Mass Commun. Res. 35. Retrieved 12 May 2014
from http://www.scripps.ohiou.edu/wjmcr/vol35/35.html (2011)
29. Sites, K.: About. Kevin Sites Report. Retrieved 23 May 2014
from http://www.kevinsitesreports.com/new/?p=6 (2014)
30. Boese, C.: The spirit of Paulo Freire in blogland: struggling for a
knowledge-log revolution. Gurak et al. (2004)
31. Pandey, A.R., Srivastava, A., Shukla, P.: A content analysis of
journalistsblogs with special reference to driving forces for blog
writing. Web J. Mass Commun. Res. 43. Retrieved 20 May 2014
from http://www.scripps.ohiou.edu/wjmcr/vol43/43.html (2013)
32. Wallsten, K.: Political blogs: transmission belts, soapboxes,
mobilizers, or conversation starters? J. Inf. Technol. Polit. 4(3),
1940 (2007)
33. McKenna, L., Pole, A.: What do bloggers do: an average day on
an average political blog. Publ. Choice 134(12), 97108 (2008)
34. Iacono, E., Skerik, S.: PRWeek/PR newswire media survey:
longer hours, heavier workloads persist; but fears over further job
erosion moderate (2010)
35. Leccese, M.: Online information sources of political blogs.
J. Mass Commun. Q. 86(3), 578593 (2009)
36. Xin, X.: The impact of citizen journalismon Chinese media
and society. Journalism Pract. 4(3), 333344 (2010)
37. Singer, J.B.: The political j-blogger normalizinganewmediaform
to t old norms and practices. Journalism 6(2), 173198 (2005)
38. Lowrey, W.: Mapping the journalismblogging relationship. Jour-
nalism 7(4), 477500 (2006)
172 N. Makhadmeh and G. Zeldes
39. Posner, R.A.: Bad news. New York Times 31,111 (2005)
40. Awad, H., The future of bloggers in the Arab region: a step
towards electronic democracy. Defense Magazine. Retrieved 1
Feb 2014 from http://www.lebarmy.gov.lb/en/news/?24413#.
VAdLsNyAOxo (2010)
41. Open Arab Internet: One social network with a rebellious
message. Retrieved 29 May 2014 from http://old.openarab.net/en/
node/1633 (2014)
42. Lynch, M.: Blogging the new Arab public. Arab Media Soc. 1(1)
(2007)
43. Mohamed, A.S.: Between the Hammer and the Anvil: Blogs,
Bloggers, and the Public Sphere in Egypt. McGill University
Library (2010)
44. Russell, A., Echchaibi, N. (eds.): International blogging: identity,
politics, and networked publics, vol. 50. Peter Lang (2009)
45. Sabry, G.: Top Arabic blogs in 2013. International Center for
Journalists, Washington, DC, USA. Retrieved 29 May 2014 from
http://ijnet.org/ar/blog/204147 (2013)
46. Haub, C., Kaneda, T.: World population data sheet. Population
Reference Bureau (PRB). Retrieved 11 Apr 2014 from http://
www.prb.org/pdf13/2013-population-datasheet_eng.pdf (2013)
47. Internet World Stats: Internet usage statistics the internet big
picture. Retrieved 2 Apr 2014 from http://www.
internetworldstats.com/stats.htm (2014)
48. Arif, R.: Social movements, YouTube and political activism in
authoritarian countries: a comparative analysis of political change
in Pakistan, Tunisia & Egypt (2014)
49. Information and Decision Support Center: IDSC in brief. IDSC
Mon. Newslett. 2(3). Retrieved 29 June 2014 from http://www.
idsc.gov.eg/upload/NewsLetters/IDSC-MarchNewsletter.pdf
(2010)
50. Lim, M.: Clicks, cabs, and coffee houses: social media and
oppositional movements in Egypt, 20042011. J. Commun. 62
(2), 231248 (2012)
51. Hamdy, N.: Arab citizen journalism in action: challenging
mainstream media, authorities and media laws. Westminster
Papers Commun. Cult. 6(1), 92112 (2009)
52. Isherwood, T.: A new direction or more of the same? political
blogging in Egypt. Arab Media Soc. 6,117 (2008)
53. Hofheinz, A.: The internet in the Arab world: playground for
political liberalization. Int. Polit. Soc. 3(1), 7896 (2005)
54. Haddad, L.: Egyptian bloggers: the revolution has just begun.
Al-akhbar English. Retrieved 16 Dec 2014 from http://english.al-
akhbar.com/node/3703 (2012)
55. Dooley, B.: Dancing copsvideo blogger says freedom of
expression under attack in Egypt. Hufngton Post. Retrieved 29
May 2014 from http://www.hufngtonpost.com/briandooley/
dancing-cops-video-blogge_b_3280569.html (2013)
56. McNamee, S., Gergen, K.J. (eds.): Therapy as Social Construc-
tion, vol. 10. Sage, London (1992)
57. OConnor, J.: The meaning of crisis. Int. J. Urban Reg. Res. 5(3),
301329 (1981)
58. Coombs, W.T., Holladay, S.J.: Reasoned action in crisis com-
munication: an attribution theory-based approach to crisis
management. In: Millar, D.P., Heath, R.L. (eds.), Responding
to Crisis Communication Approach to Crisis Communication,
pp. 95115. Lawrence Erlbaum Associates, Hillsdale, NJ (2004)
59. Rosenthal, U., Charles, M.T., Hart, P.T.: Coping with crises: the
management of disasters, riots, and terrorism. Charles C Thomas
Pub Ltd. (1989)
60. Boin, A., Hart, P.T.: The Crisis Approach: Handbook of Disaster
Research, pp. 4254. Springer, New York (2007)
61. Hewitt, K. (ed.): Interpretations of calamity from the viewpoint of
human ecology (no. 1). Taylor & Francis, Milton Park (1983)
62. Bankoff, G., Frerks, G., Hilhorst, D. (eds.): Mapping vulnerabil-
ity: disasters, development, and people. Earthscan (2004)
63. Skouas, E.: Economic crises and natural disasters: coping
strategies and policy implications. World Dev. 31(7), 10871102
(2003)
64. Ganor, B.: Dening terrorism: is one mans terrorist another
mans freedom ghter? Police Pract. Res. 3(4), 287304 (2002)
65. Salaverría, R.: An immature medium strengths and weaknesses of
online newspapers on September 11. Gazette 67(1), 6986 (2005)
66. McGreal, C., Shenker, J.: Hosni Mubarak resigns and Egypt
celebrates a new dawn. The Guardian. Retrieved 22 Apr 2014
from http://www.theguardian.com/world/2011/feb/11/hosni-
mubarak-resigns-egypt-cairo (11 Feb 2011)
67. BBC News. Egypt unrest: 846 killed in protests - ofcial toll.
Retrieved 22 Apr 2014 from http://www.bbc.com/news/world-
middle-east-13134956 (2011)
68. CBS News. Egypt terror group from Sinai claims suicide attack
on Interior Minister. Retrieved 8 Dec 2013 from http://www.
cbsnews.com/news/egypt-terror-group-from-sinai-claimssuicide-
attack-on-interior-minister/ (2013)
69. Prevention Web: Egypt - disaster statistics. Retrieved 6 Dec 2013
from http://www.preventionweb.net/english/countries/statistics/?
cid=54 (2013)
70. Hassan, A., Egypt: heavy rains, ooding kill 15. Los Angeles
Times. Retrieved 29 May 2014 from http://latimesblogs.latimes.
com/babylonbeyond/2010/01/egypt-fteen-deadbecause-of-
heavy-oods.html (19 Jan 2010)
71. Scheufele, D.A.: Framing as a theory of media effects. J. Com-
mun. 49(1), 103122 (1999)
72. Chong, D., Druckman, J.N.: Framing theory. Ann. Rev. Polit.
Sci. 10, 103126 (2007)
73. Carpenter, S.: U.S. elite and non-elite newspapersportrayal of
the Iraq war: a comparison of frames and source use. Journalism
Mass Commun. Q. 84, 761776 (2007)
74. Entman, R.M.: Framing: toward clarication of a fractured
paradigm. J. Commun. 43(4), 5158 (1993)
75. de Vreese, C.H.: News framing: theory and typology. Inf. Des.
J. Doc. Des. 13(1), 5162 (2005)
76. Iyengar, S.: Is anyone responsible? How television frames
political issues. University of Chicago Press, Chicago (1991)
77. König, T.: Frame analysis: theoretical preliminaries. In: The
Cathie Marsh Centre for Census and Survey Research (2006)
78. Dunwoody, S., Peters, H.P.: Mass media coverage of technolog-
ical and environmental risks: a survey of research in the United
States and Germany. Public Underst. Sci. 1(2), 199230 (1992)
79. Reese, S.D.: Prologue-framing public life. In: Reese, S., Gandy,
O., Grant, A. (eds.), Framing Public Life: Perspectives on Media
and our Understanding of the Social World (2001)
80. Kensicki, L.J.: No cure for what ails us: the media-constructed
disconnect between societal problems and possible solutions.
Journalism Mass Commun. Q. 81(1), 5373 (2004)
81. Kinder, D.R., Sanders, L.M.: Mimicking political debate with
survey questions: the case of white opinion on afrmative action
for blacks. Social Cogn. 8(1), 73103 (1990)
82. Entman, R.M.: Symposium framing US coverage of international
news: contrasts in narratives of the KAL and Iran air incidents.
J. Commun. 41(4), 627 (1991)
83. Hamdy, N., Gomaa, E.H.: Framing the Egyptian uprising in
Arabic language newspapers and social media. J. Commun. 62
(2), 195211 (2012)
84. Kolmer, C., Semetko, H.A.: Framing the Iraq War perspectives
from American, UK, Czech, German, South African, and
Al-Jazeera news. Am. Behav. Sci. 52(5), 643656 (2009)
85. Liebes, T., First, A.: Framing the Palestinian-Israeli conict.
Framing Terrorism News Media Gov. Public 59, 74 (2003)
Framing Natural Disaster, Terrorist Attack and Civil Unrest 173
86. Amireh, A.: Framing Nawal El Saadawi: Arab feminism in a
transnational world. Signs, pp. 215249 (2000)
87. Killian, C., Olmsted, J., Doyle, A.: Motivated migrants: (Re)
framing Arab womens experiences. Women Stud. Int. Forum 35
(6), 432446, Pergamon (Dec 2012)
88. Browers, M.: Political Ideology in the Arab World. Cambridge
University Press, Cambridge (2009)
89. Hana, S.: Framing Arab socio-political space: state governmen-
tality, governance and non-institutional protestation. Con-
temp. Arab Aff. 3(2), 148162 (2010)
90. Al-Saggaf, Y.: The online public sphere in the Arab world: the
war in Iraq on the Al Arabiya website. J. Comput. Mediated
Commun. 12(1), 311334 (2006)
91. Cherribi, S.: From Baghdad to Paris Al-Jazeera and the Veil.
Harvard Int. J. Press/Polit. 11(2), 121138 (2006)
92. Elmasry, M.H., El Shamy, A., Manning, P., Mills, A., Auter, P.J.:
Al-Jazeera and AlArabiya framing of the Israel-Palestine conict
during war and calm periods. Int. Commun. Gaz. 75(8), 750768
(2013)
93. Meltzer, K.: The US launch of Al Jazeera English in Washington,
DC: an analysis of American media coverage. Journalism 14(5),
661677 (2013)
94. Semetko, H.A., Valkenburg, P.M.: Framing European politics: a
content analysis of press and television news. J. Commun. 50(2),
93109 (2000)
95. Iyengar, S.: Television news and citizensexplanations of
national affairs. Am. Polit. Sci. Rev. 81, 815831 (1987)
96. Neuman, W.R., Just, M.R., Crigler, A.N.: Common Knowledge.
University of Chicago Press, Chicago (1992)
97. Price, V., Tewksbury, D., Powers, E.: Switching trains of
thought: the impact of news frames on readerscognitive
responses. Commun. Res. 24, 481506 (1997)
98. Bennett, W.L.: News: The Politics of Illusion. Longman, New
York (1995)
99. An, S.K., Gower, K.K.: How do the news media frame crises? A
content analysis of crisis news coverage. Public Relat. Rev. 35
(2), 107112 (2009)
100. Scheufele, D.A.: Agenda-setting, priming, and framing revisited:
another look at cognitive effects of political communication.
Mass Commun. Soc. 3(23), 297316 (2000)
101. Powers, A., Fico, F.: Inuences on use of sources at large US
newspapers. Newspaper Res. J. 15(4), 8797 (1994)
102. Hovland, C.I., Weiss, W.: The inuence of source credibility on
communication effectiveness. Public Opin. Q. 15(4), 635650
(1951)
103. Christians, C.G.: Fifty years of scholarship in media ethics.
J. Commun. 27(4), 1929 (1977)
104. Messner, M., DiStaso, M.W.: The source cycle: how traditional
media and weblogs use each other as sources. Journalism Stud. 9
(3), 447463 (2008)
105. Giddens, A.: The constitution of society: outline of the theory of
structuration. Polity Press, Cambridge (2013)
106. Hoogeveen, M.: Toward a theory of the effectiveness of
multimedia systems. Int. J. Hum. Comput. Interact. 9(2), 151
168 (1997)
107. Van Dijck, J.: Mediated Memories in the Digital Age. Stanford
University Press, California (2007)
108. Appiah, O.: Rich media, poor media: the impact of audio/video
vs. text/picture testimonial ads on browsersevaluations of
commercial web sites and online products. J. Curr. Issues Res.
Advertising 28(1), 7386 (2006)
109. Fletcher, T.D., Major, D.A.: The effects of communication
modality on performance and self-ratings of teamwork compo-
nents. J. Comput. Mediated Commun. 11(2), 557576 (2006)
110. Unnava, H.R., Burnkrant, R.E., Erevelles, S.: Effects of presen-
tation order and communication modality on recall and attitude.
J. Consum. Res. 21(3), 481490 (1994)
111. Sundar, S.S.: Multimedia effects on processing and perception of
online news: a study of picture, audio, and video downloads.
Journalism Mass Commun. Q. 77(3), 480499 (2000)
112. David, P.: News concreteness and visual-verbal association do
news pictures narrow the recall gap between concrete and abstract
news? Hum. Commun. Res. 25(2), 180201 (1998)
113. Severin, W.: Another look at cue summation. AV Commun. Rev.
15(3), 233245 (1967)
114. Severin, W.J.: Pictures as relevant cues in multi-channel
communication. Journalism Mass Commun. Q. 44(1), 1752
(1967)
115. Miller, N.E.: Graphic communication and the crisis in education.
Audio Visual Commun. Rev. 5(3), 1120 (1957)
116. Moore, D.M., Burton, J.K., Myers, R.J.: Multiple-channel
communication: the theoretical and research foundations of
multimedia. Handbook Res. Educ. Commun. Technol., 851
875 (1996)
117. Cho, S.H., Gower, K.K.: Framing effect on the publics response
to crisis: human interest frame and crisis type inuencing
responsibility and blame. Public Relat. Rev. 32(4), 420422
(2006)
118. Bell, A.: The language of news media, pp. 8485. Blackwell,
Oxford. Retrieved 19 Sept 2014 from http://www2.media.uoa.gr/
lectures/linguistic_archives/mda0405/notes/Bell_Media_and_
Language.pdf (1991)
119. Corneld, M., Carson, J., Kalis, A., Simon, E.: Buzz, blogs, and
beyond: the Internet and the national discourse in the fall of 2004.
Pew Internet Am. Life Proj. (2005)
120. Liu, B.F.: Distinguishing how elite newspapers and A-list blogs
cover crises: insights for managing crises online. Public Relat.
Rev. 36(1), 2834 (2010)
121. Hall, S.C., Jefferson, C., Clarke, T.J., Roberts, B.: Policing the
Crisis: Mugging, the State and Law and Order (1978)
122. Stein, D.: State of the blogosphere 2011: Introduction and
methodology. Technorati. Retrieved 1 May 2014 from http://
technorati.com/social-media/article/state-of-the-
blogosphere2011-part3/ (2011)
123. Mei, Q., Liu, C., Su, H., Zhai, C.: A probabilistic approach to
spatiotemporal theme pattern mining on weblogs. In: Proceedings
of the 15th International Conference on World Wide Web,
pp. 533542, ACM (May 2006)
124. Cohen, K.R.: What does the photoblog want? Media Cult. Soc.
27(6), 883901 (2005)
125. Fareed, W.: Affordances analysis of an audioblog and sugges-
tions for its recruitment in oral lesson. Instr. Technol. 55 (2010)
126. Hill, J.: The voice of the blog: the attitudes and experiences of
small business bloggers using blogs as a marketing and
communications tool. Unpublished dissertation, University of
Liverpool. Available at, http://jeffreyhill.typepad.com/voiceblog/
les/MBADissertation.pdf (2005)
127. Tan, K.W.P., Detenber, B.H.: Audio weblogs: Communication
breakthrough or communication overload. In: International
Communication Association Conference. Dresden (June 2006)
128. Riffe, D., Lacy, S., Fico, F.: Analyzing media messages: using
quantitative content analysis in research: Lawrence Erlbaum
Assoc Inc. (2008)
129. Rourke, L., Anderson, T., Garrison, D.R., Archer, W.: Method-
ological issues in the content analysis of computer conference
transcripts. Int. J. Artif. Intell. Educ. (IJAIED) 12,822 (2001)
130. Stemler, S.: An overview of content analysis. Pract. Assess. Res.
Eval. 7(17), 137146 (2001)
174 N. Makhadmeh and G. Zeldes
131. Bruns, A.: Methodologies for mapping the political blogosphere:
an exploration using the IssueCrawler research tool. First
Monday 12(5) (2007)
132. Park, H.W., Thelwall, M.: Developing network indicators for
ideological landscapes from the political blogosphere in South
Korea. J. Comput. Mediated Commun. 13(4), 856879 (2008)
133. Tucker, R.K., Weaver, R.L., Berryman-Fink, C.: Research in
Speech Communication. Prentice-Hall, Englewood Cliffs, NJ
(1981)
134. Freelon, D.G.: ReCal: Intercoder reliability calculation as a web
service. Int. J. Internet Sci. 5(1), 2033 (2010)
135. Wimmer, R.D., Dominick, J.R.: Mass Media Research: An
Introduction, 3rd edn, pp. 139166. Wadsworth, California
(2003)
136. Carmines, E.G., Zeller, R.A. (eds.): Reliability and Validity
Assessment, vol. 17. Sage, Thousand Oaks (1979)
137. Potter, W.J., Levine-Donnerstein, D.: Rethinking validity and
reliability in content analysis. J. Appl. Commun. Res. 27(3), 258
284 (1999)
138. Amin, M., Assaad, R., al-Baharna, N., Dervis, K., Desai, R.M.,
Dhillon, N.S., Galal, A.: After the Spring: Economic Transitions
in the Arab World. Oxford University Press, Oxford (2012)
139. Ward, S.J.: Philosophical foundations for global journalism
ethics. J. Mass Media Ethics 20(1), 321 (2005)
140. Odden, L.: 5 ways to grow your blog community and
readership. Retrieved 30 Nov 2014 from http://www.
toprankblog.com/2014/03/grow-blog-community-readership/
(Jan 2014)
141. Gao, F.: Emerging powers of inuence: the rise of new media in
China. Doctoral dissertation, University of Florida (2011)
142. Deuze, M.: The web and its journalisms: considering the
consequences of different types of newsmedia online. New
Media Soc. 5(2), 203230 (2003)
143. Wall, M.: Blogs of warweblogs as news. Journalism 6(2), 153
172 (2005)
144. Blood, R.: The Weblog Handbook: Practical Advice on Creating
and Maintaining Your Blog. Basic Books (2002)
145. Hallahan, K.: Seven models of framing: implications for public
relations. J. Public Relat. Res. 11(3), 205242 (1999)
Framing Natural Disaster, Terrorist Attack and Civil Unrest 175
Humanities Scholar Information-Seeking
Behavior: Quantitative Approach
Mohammad Khaled Al Shboul , Othman A. Obeidat ,
and Natarajan Sundar
Abstract
This study aims to investigate the humanities scholars
information needs and behavior in an ICT environment as
a case study at Yarmouk University, Jordan. Earlier
researches showed that humanities scholars have an
incompatible relationship with ICT use even despite their
signicant use of library facilities compared to other
scholars. Not to mention, the lack of up-to-date studies,
which considers the signicant acceleration in ICT
infrastructure and the emerging digital environment.
However, the main objectives are to (a) understand
humanities scholars behavior and their information need
in an ICT environment (b) identify the barriers they
encountered, the study employed survey questionnaire
method. 280 Academic staff from four faculties of
humanities were sampled and selected. Responses were
received from 161 academicians staff members. The
nding indicated that the humanities scholars possessed
various level of awareness in the availability of sources
and services of information in their eld of subject
interest. Besides, they showed different motivations in
in-formation-seeking which were inuenced by the usage
of appropriate format and preference languages. It was
also discovered that barriers in information-seeking such
as limited of library resources, inconvenient of university
environment and personal incompetency had affect their
information-seeking satisfaction. They overcame the
barriers through personal experience and technological
literacy. Lastly, the ndings can greatly assist the library
in facilitating the needed re-sources and services which
could ease the information-seeking behavior. It also can
increase the level of satisfaction among the library users
particularly the electronic resources and services.
Keywords
Information-Seeking behavior Information needs
Humanities scholars ICT environment
Jordan
1 Introduction
The history of research of information behavior dated back
in 1948 where the conference of Royal Society discussed a
research about the scientic information [13]. Over years of
studies, researchers have studied the information behavior
and needs, features and characteristics of scholars. The study
of similarities and differences of information behavior
among library users can provide the appropriate services to
the usersinformation needs.
The access and dissemination of information has been
changed in recent years due to the tremendous evolution of
the Internet and web-based technology. Thus, have inu-
enced in one way or another the humanities scholars seeking
behavior, and the way that academic libraries are handling
and managing their resources and delivering services [4,5].
Therefore, in 21st century researcher believed that a new
study on the information behavior of humanities scholars is
required. Besides, a study on the current scenario among
non-English speaker in the developing Arab country such as
Jordan is vital requirement. Previous studies shown a sig-
nicantly substantiation differences between the information
seeking behavior of scholars in the social science [69], and
science [1014]. Furthermore, the humanities scholars
showed particular behavior during their information-seeking
process which were different than other scholars in other
disciplines [4,1315].
In the ICT environment, humanities scholars encountered
an issue in selecting the proper and efcient searching
M. K. A. Shboul (&)N. Sundar
American University in the Emirates, Dubai, UAE
e-mail: alhareth8@gmail.com
N. Sundar
e-mail: gn.sundar5@gmail.com
O. A. Obeidat
Al-Balqa Applied University, Salt, Jordan
e-mail: dr.othmanobeidat@hotmail.com
©Springer Nature Switzerland AG 2019
A. Al-Masri and K. Curran (eds.), Smart Technologies and Innovation for a Sustainable Future,
Advances in Science, Technology & Innovation, https://doi.org/10.1007/978-3-030-01659-3_20
177
criteria. They are slow and left-behind in embracing the
modern technology [4,10,16]. Barrett [17] Reported that
they did not prefer the electronic information technology.
They were also reported that they feel pressure while dealing
and using the information technology [18]. This happen due
to their incompetence skill in ICT usage compared to other
disciplines [4]. Besides, [19] humanities scholars made little
use of online databases and many of them reported about the
trouble of the search language, and lack of availability of
desired primary resources [17]. Additionally, more printed
books and journals are still being referred compared to the
electronic format [15]. Talja and Maula [20] Called the
humanities scholars low level users, particularly in the
usage of e-journals and electronic databases.
2 Aim and Objectives
This study aims to investigate the information needs and
behaviour among humanities scholars in various depart-
ments at Yarmouk University Jordan. This is to contribute to
the context of Library and Information Science in the
developing country of Arab nation. This study explores the
information needs and behaviour of humanities scholars and
the undertaken information-seeking process they do to full
their information needs. Moreover, this study investigates
the behaviour of humanities scholars in utilizing the needed
information, especially the digital resources and services in
an ICT-enriched environment for their academic tasks. This
study also explores the effectiveness of their information-
seeking process and the barriers of information-seeking
faced by them.
The detail objectives of this study are:
1. To investigate the humanities scholars information
behaviour and needs in an ICT environment at Yarmouk
University Jordan.
2. To identify the barriers that humanities scholars faced by
the while they seek for information and use it for their
academician tasks.
3 Literature Review
According to [21], information-seeking behaviour is moti-
vated by individuals information needs. It is an individuals
mental process where they identify the need to satisfy their
information needs to accomplish their task through what is
known as information-seeking behaviour.[22,23] asserted
that the information needs and information-seeking beha-
viour varies according to the demographic attributes.
The understanding of how demographic attributes
induced the information needs and affect how humanities
scholars behave in their information-seeking process is
important to be studied to help the library in providing
information services that suit and full to all group of
demographic customers. This is supported by [24] where
they mentioned that (i) personal reasons in information-
seeking, (ii) types of information being searched, and
(iii) methods and sources of information being searched,
were the factors that inuenced information-seeking of an
individual. Moreover, research on information needs and
information-seeking behaviour is crucial because it could
determine the rst step and the sequence process of the user
behaviour [25].
3.1 Traditional and Emerging
Information-Seeking Behavior
Among humanities scholars, there is a different in terms of
the way or means the seek for information. The traditional
way such as going to and use library collections by browsing
and reading the printed books and journals were still pre-
ferred by humanities scholars [15,2632]. As well they use
numerous sources of information like monographs, and
seldom discuss general bibliographic works, indexes, and
another secondary services [33].
Despite of the traditional way that humanities scholars
prefer towards the physical library and printed materials, few
of humanities scholars nd it useful with the availability of
electronic journals from the Internet [34]. There are also
positive changes of information-seeking behavior among
some of them as found by [35,36]. This includes a more
pleasant, easy to access and up-to-date information on online
catalogue. In addition, the access to download the electronic
information and to be printed it is the main reason of pref-
erence to use the electronic journals among humanities
scholars. Other than the electronic journals, e-mail, websites,
and databases that can be easily searched and modied are
the preferred medium to seek for information among them.
Additionally, [36] stressed that there were some setbacks
on the use of electronic resources. First was the lack of
knowledge and training to use the electronic search engine
and the Internet. Second was the torrential search results that
were not fully correlated to their information need. Lastly is
the credibility of the sources of the information.
Locating the Information, Location of Information-
seeking, Format and Language of Information Sources,
Tools or Channels of Information, and Types of Infor-
mation Resources Used
There is a variation among humanities scholars in terms
of how they locate their information, location of where they
178 M. K. A. Shboul et al.
seek the information, format and language used, tools of
information, and types of information resources they used.
References [8,31,3638] discovered that humanities
scholars still prefer the conventional practice to locate their
printed books and articles by going to the department or
university library. In terms of the location of where they
prefer to seek for information, majority of humanities
scholars prefer to seek information from their ofce and
home. This preference is for the electronic resources which
can conveniently access from the Internet at their ofce and
home [7,31,32,3941]. Between printed and electronic
format of information sources, the printed format especially
books and journals were preferred than the electronic one by
the humanities scholars [7,31,36].
However, according to [8,42,43] there is an increment of
use for the electronic format among the humanities scholars.
It was also found that the junior humanities scholars pre-
ferred the electronic than the senior scholars. Meanwhile, the
language used when searching the information was deter-
mined by the native language of the scholars [37], and
country of graduation of the scholars [31]. For the tools or
channels of information, humanities scholars preferred to use
the bibliographic tools, consultations with colleagues and
experts, citations tracking from books and journals, and
library catalogues [37]. Interestingly, humanities scholars
also preferred to personally consult with the colleague and
eld expert to keep update of their information [31,32]. For
the types of information resources used by humanities
scholars for teaching and research, the printed books and
journals are the main preference among them [44].
3.2 Barriers to Information-Seeking
There are several barriers and obstacles to
information-seeking that hinder the success and satisfaction
of information needs among humanities scholars. Lack of
access and availability is the main barrier to humanities
scholars, both printed and electronic format of information
resources [4,4547].
Besides, difculty to locate and obtain information
especially the electronic format were the barriers mentioned
by humanities scholars [46,48]. In addition, lack of
knowledge and awareness in terms of insufcient skill to
search also contribute to the barriers [4852]. Other than
these, barriers also include difculty of languageambigu-
ous terminology [46], as well as personal constraint such as
lack of time and seniority of age to learn the modern tech-
nology in information-seeking [52].
In summary, the literature reviews above shown a specic
situation and preference among humanities scholars in
information-seeking. It is believed, among the humanities
scholars themselves, a specic preference will vary
according to different demographic attributes such as gender,
age, years of experience, country of graduation and others.
Knowing the variety of their preference can help the library
to provide information services and resources efciently.
This is important to ensure their information need can be
fullled.
4 Methodology
To achieve the objectives of this study, a questionnaire
instrument was designed based on previous studies ques-
tionnaire surveys related to this study. This is identied as
funnelling approach according to [53,54]. A questionnaire
which includes of open-ended question and closed questions
along with Likertsvepoint Scale was designed. More-
over, the Statistical Product and Service Solutions (SPSS)
18th edition was used. The data analysis of the responses
covers descriptive and inferential statistical methods.
The pre-testing of the questionnaire was reviewed by four
reviewers from Yarmouk University (UY), Jordan Univer-
sity (JU), and two senior librarians from Al-Husayniyyah
Library. A pilot test was conducted among twenty faculty
members of humanities scholars from different departments
in Yarmouk University. The population of the study consists
of 275 humanities scholars from four human sciences fac-
ulties: Faculty of Arts; Faculty of Sharia and Islamic
Studies, Faculty of Archaeology and Anthropology, and
Faculty of Fine Arts. The questionnaires were personally
distributed, where the proportional random sampling tech-
nique was used. Out of 275 populations, the sample size
becomes 185 as recommended by [55] in their statistical
table, a total of 161 respondents responded to the ques-
tionnaire survey where all questionnaire surveys were found
usable.
5 Findings: Descriptive Statistics
5.1 Demographic Characteristics
The Yarmouk University humanities scholars sample is male
and represents 90.7% (n = 146), while only 9.3% (n = 15)
for female. Given the academic status of the population
qualications are PhD holders 90.7% (n = 146), and the rest
of the completion are master degree completed only of 9.3%
(n = 15). This fact reect the worst participation of Arab
women in the labor market of the share of Jordan among 133
countries as mentioned in the world economic competitive-
ness report [56].
As indicate the data in Table 1, that the distribution of
respondents according to the current level of their academic
appointment or rank, 31.1% (n = 50) is professor, were
Humanities Scholar Information-Seeking Behavior 179
currently working on the Universitys academic staff, 23.6%
(n = 38) of the professors is over the age of 56. Meanwhile,
with their rank fairly evenly distributed between 22.9%
(n = 37) with the highest number (n = 13) as associate
professor in age range of 3640. The most senior category,
29.9% (n = 48) is assistance professor with the highest age
range of 3640 (n = 18), followed 4145 (n = 12). Lastly,
16.1% (26) most junior category of Other stafflecturers
comprising only three age groups; 3640 (n = 13), 3035
(n = 30) and 4145 (n = 2) was reported by considerably
lower numbers of respondents.
5.2 Information Needs and Use of Electronic
and Print Resources
An earlier study which reported that the majority of
humanities scholarsresearches were using based on printed
books and scholarly journals [15]. In Table 2, the data indi-
cate the respondents have been using both services almost
equally are books with 92.5% (n = 149), the next important
source is journals (83.2%, n = 134), conference proceedings
(65.2%, n = 105), dissertations (52.7%, =85), in addition the
other type of source is Online Databases (49.6%, n = 80).
Meanwhile, audio-visual materials (44.7%, n = 72), then
government documents also important source (40.9%, n =
66) and the less popular source is newspaper (29.8%, n = 48).
In addition, Table 3, show that humanities scholars
somehow, prefer to use printed resources slightly more than
electronic resources. The differences are small in magnitude
with 52.8% (n = 85) preferred the printed format resources
compared with 47.2% (n = 76) who preferred the electronic
format resources.
Tables 2and 3signicantly conrmed earlier literature,
humanities scholars who had comparatively better computer
literacy skills than the others have more chances to use
electronic resources for academic purposes. As it is clear in
Table 2higher using database among junior scholars
(assessment and lecturer). Generally, there is an increase of
using electronic resources among humanities scholars and
junior scholars particularly, who have more computer skills
and condence compared with senior scholars comparing
earlier studies [4,15].
5.3 Identifying and Locating Relevant
Information
Respondents were requested to indicate how do humanities
scholars categorize and discover relevant information for
research and teaching process, Table 4, indicated that
entering a general query at a search engine rstly with 40.3%
(n = 65), followed by entering a specic query at a search
engine with 23.0% (n = 37) of the respondents. However,
there is a strong element of bilingualism in the teaching at an
academic institution in Jordan, for that 20.5% (n = 33) of the
respondents go to a topic-specic webpage and perform a
search there. Lastly, the data indicates that 16.1% (n = 26) of
the humanities scholars respondents go for searching aca-
demic database.
As noted, the searching process at academic databases
occupied the last option. This is because the scholars did not
Table 1 Respondentsdemographic by gender, age and academic position
Age Gender
Academic position
Professor Total Associate
Professor
Total Assistant
Professor
Total Lecturer Total
MF MF MF MF
3035 –– –– 33
1.9%
7411
6.8%
3640 –– 13 13
8.1%
10 8 18
11.3%
13 13
8.1%
4145 –– 88
5.0%
12 12
7.4%
22
1.2%
46-50 4 4
2.5%
22
1.2%
44
2.5%
––
5155 8 8
5.0%
437
4.3%
11 11
6.8%
––
>56 38 38
23.6%
77
4.3%
–– ––
Total 50 50
31.1%
34 3 37
22.9%
40 8 48
29.9%
22 4 26
16.1%
180 M. K. A. Shboul et al.
have skills for searching in academic databases and
numerous of them did not know about availability types of
this academic databases. Furthermore, it is clear the library
dont provide an adequate training program for the human-
ities scolders, especially for using electronic databases, and
there is a lack announcement about it is services and
resources providing.
5.4 Sources Used to Obtain Information
A study conducted in the United States by [57], which reported
that all academics surveyed were using the Internet to search
for information related to their research. A group of statements
was therefore compiled in order to investigate the attitude of
respondent in methods of use sources to nd information. The
relevant data about this section were asked for respondent in
Table 5, These results reported that reading textbooks in the
eld of specialization is the most often used method for
seeking information with mean score = (4.2), standard devi-
ation = (1), compares to a result of reading professional
journals in the eld of specialization with mean score = (4.1),
standard deviation = (0.9) the next most frequently indicated
reasons for using the accessed service. Compared with results
in Australian academic environment, of respondents
researchers use the e-journals databasesat Curtin University
study conducted by [58]. Followed by reading conference and
meeting papers with mean score= (3.7), with Standard Devi-
ation = (1). Also, the responses at Yarmouk University the
range of attending conferences and meeting, searching bibli-
ographic databases and talking to colleagues or experts in
ones own department occupied the same rate with mean score
= (2.9), standard deviation = (1.1). While asking librarians or
information specialists and writing to a colleague or an expert
at another university being the least frequent method with both
having a mean score of (2.5).
Table 2 Types of information
most often need to access Types of information
most often need to
access
Professor
(50)
Associate
Professor
(37)
Assistant
Professor
(48)
Lecturer
(26)
Total Percentage
(%)
Books 50 35 42 22 149 92.5
Journals 44 32 38 20 134 83.2
Conference
proceedings
30 27 31 17 105 65.2
Dissertations 12 17 34 22 85 52.7
Databases 11 14 36 19 80 49.6
Audio-visual
materials
13 14 29 16 72 44.7
Government
documents
18 17 18 13 66 40.9
Newspapers 10 11 16 11 48 29.8
Total 50 37 48 26 161 100
Table 3 RespondentsPreferred
Information Resource Format Format Frequency Percentage (%)
Printed 85 52.8
Electronic 76 47.2
Total 161 100
Table 4 Search for Answers to a
Specic Question on the Internet Search for answers to a specic question on the internet Frequency Percentage (%)
Enter a general query at a search engine 65 40.3
Enter a specic query at a search engine 37 23.0
Go to a topic specic webpage and perform a search there 33 20.5
Searching academic databases 26 16.2
Total 161 100
Humanities Scholar Information-Seeking Behavior 181
5.5 Issues Faced Regarding
Information-Seeking Behavior
The results reported in Table 6, answered that Yes61.6%
(n = 99) out of the total respondents have enough time
to seek information and respondents chose No38.4%
(n = 62) do not have enough time to seek information by
themselves was the most commonly recorded barrier. So for
that, the rate is slightly high 72% (116) have asked assis-
tance while seeking information. The reason behind this
result is because most of the respondents are not all the time
in the best situation and allocate their time on lecturing.
Table 5 Methods Respondents Use for Seeking Information (n = 161)
Methods of seeking information Never Rarely Sometimes Frequently Always Total Mean SD
Reading textbooks in my eld 26
16.1%
25
15.5%
30
18.6%
36
22.4%
44
27.4%
161
100%
4.2 1.0
Reading professional journals in my eld 24
14.9%
26
16.1%
33
20.5%
36
22.4%
42
26.1%
161
100%
4.1 0.9
Reading conference and meeting papers 24
14.9%
28
17.4%
38
23.6%
35
21.7%
36
22.4%
161
100%
3.7 1.0
Using an Internet search engine 20
12.4%
20
12.4%
39
24.3%
43
26.7%
39
24.3%
161
100%
3.3 1.3
Searching bibliographic databases 28
17.4%
32
19.9%
46
28.6%
27
16.8%
28
17.4%
161
100%
2.9 1.0
Attending conferences and meeting 25
15.4%
37
23.1%
41
25.5%
32
19.9%
26
16.1%
161
100%
2.9 0.9
Talking to colleagues or experts in my own
department
25
15.4%
40
24.9%
41
25.5%
28
17.4%
27
16.8%
161
100%
2.9 0.9
Asking librarians or information specialists 30
18.6%
44
27.4%
30
18.6%
30
18.6%
27
16.8%
161
100%
2.5 1.1
Writing to a colleague or expert at another
university
28
17.4%
40
24.9%
41
25.5%
26
16.1%
26
16.1%
161
100%
2.5 0.9
Table 6 Difculties Encountered while Seeking for Information
Item statement Responses Frequency Percentage (%)
Not having enough time to seek information by oneself Yes 99 61.5
No 62 38.5
Need assistance during seeking information Yes 116 72.0
No 45 28.0
Multitude assistance seeking Research assistance 42 36.2
Library assistance 35 30.2
Colleague 35 30.2
Other (family members) 4 3.4
Level of Internet searching skills Less than adequate 22 13.7
Adequate 7 4.3
Somewhat procient 49 30.4
Procient 53 33.0
Very procient 30 18.6
Relevancy of searching result Very irrelevant 37 23.0
Irrelevant 10 6.2
Somewhat relevant 67 41.6
Relevant 37 23.0
Very relevant 10 6.2
182 M. K. A. Shboul et al.
But these results indicate that the majority are condent
that they can search adequately from the vast searched
information. It is clear that the lack of adequate and appro-
priate time is one of the most difcult obstacles faced by
professors and prevents the use of electronic resources,
which in the end will inuence their seeking behavior.
Furthermore, who asked for assistance through
information-seeking process present 36.3% (n = 42) indi-
cated some level barriers of asked research assistance, while
30.2% (n = 35) indicated a level of both asked their col-
leagues and library assistance, and 3.5% (n = 4). It may have
been expected asked the other (family members).
In terms of the Internet searching skills 33.1% (n = 53)
they response to the latter question indicating a level of
procient and somewhat procient is 30.4% (n = 49). Also,
reported suffering adequate is 4.3% (n = 14) and Perhaps
contrary to expectations and was the least indicated barrier,
13.7% (n = 22) shows that their Internet searching skills are
less than adequate. With regard to the relevance of search
results, the respondent shows their research result is very
irrelevant with 23% (n = 74) compared with only 6.2%
(10) who reported that their search results are irrelevant. It is
possible, however, that this general response regarding
Internet searching skills.
6 Conclusion
6.1 Computer Use
The study shows that the junior scholars who have a com-
puter and more internet searching experience than the senior
scholars, will be more likely to use electronic resources and
internet for the academic purposes. A suitable condition and
good speed of Internet connection play signicant role for
the preference of Internet surng in the ofce. This study
discovers variation in the motives for information-seeking
among the scholars that could be determined using appro-
priate format and understandable language, where preparing
the class and completing the research is the most signicant
reason for information-seeking. However, study reveals that
scholars depend heavily on printed materials as a primary
source of information for teaching purpose. Meanwhile,
senior scholars are still preferred to use printed monograph
and textbooks for teaching purpose, while printed journal for
research eld. Meanwhile, the junior scholars prefer to use
both electronic and printed format of information resources.
It is also evident that there is an increase in using electronic
resources compared with the previous studies.
6.2 Identifying and Locating Relevant
Information
Regarding to identifying the relevant information, this study
found that humanities prefer to take a general idea of the
subject by entering a general query on a search engine and
then locate the search in a more specic way by entering a
specic query on the search engine. This study shows that
the humanities scholars prefer to locate information by
downloading the softcopy and save the copy in the hard
drive. This underpinned the ndings from the earlier studies.
Furthermore, factors such as uneasiness reading from a
computer screen for a long time and lack of computer skills,
made the senior scholars prefer printed papers than the
electronic copy.
6.3 Sources Used to Obtain Information
For obtaining information, this study conrms that human-
ities scholars still have the uppermost number of users who
use the library resources. The senior scholars still prefer to
use the printed materials such as reference books to obtain
relative information. But, the electronic resources like elec-
tronic databases and journals are preferred by the junior
humanities scholars.
6.4 Issues Faced Regarding
Information-Seeking Behavior
This study discovers that lack of time and relevance of
research result, were considered as barriers or factors that
against senior scholars from using the electronic resources
and inuenced their information-seeking behavior. Because
time issue is frequently the sign of deeper dilemma, there-
fore, senior professors are asking for assistance during
information-seeking process. As a result, they are willing to
have a training on information-seeking, but timidly; most of
them like to be trained individually.
In conclusion, the need to know and identify the
information-seeking behavior and see the behavioral pattern
among various demographic background of humanities
scholars can assist the library management. The assistance
could be specic for certain information needs based on the
identied categories. It will help for a smooth and efcient
information-seeking process and reduce the barriers they
might face which will satisfy the humanities scholars
information needs.
Humanities Scholar Information-Seeking Behavior 183
References
1. Urquhart, D.J.: The distribution and use of scientic and technical
information. In: The Royal Society Scientic Information Confer-
ence, pp. 408419 (1948)
2. Bernal, J.D.: Scientic information and users. In: Aslib Proceed-
ings, vol. 12, Issue 12, pp. 423, 438 (1960)
3. Wilson, T.D.: Models in information behavior research. J. Docu-
mentation 55(3), 249270 (1999)
4. Tahir, M., Mahmood, K., Shaque, F.: Use of electronic
information resources and facilities by humanities scholars. The
Electron. Libr. 28(1), 122136. (2010). www.emeraldinsight.com/
0264-0473.htm. Last accessed 11 Oct 2012
5. Quan-Haase, A., Martin, K.: Digital humanities: the continuing
role of serendipity in historical research. In: Proceedings of the
2012 i-Conference, February 710, 2012, Toronto, ON, ACM,
New York, NY, pp. 456458 (2012)
6. Al-Suqri, M.N.: Information Needs and Seeking Behavior of
Social Science Scholars at Sultan Qabous University in Oman:
Mixed-Method Approach. (Unpublished doctoral dissertation).
Emporia State University, Kansas, United States of America
(2007)
7. Bhatti, R.: Information Needs and Information-Seeking Behavior
of Faculty Members at the Islamic University of Bahawalpur.
Library Philosophy and Practice (e-journal), Paper 314 (2010)
8. Kumar, A.: Assessing the information need and information
seeking behavior of research scholars of M.B.P.G. College: a case
study. Int. J. Digital Libr. Serv. 3(3), 112 (2013)
9. Msagati, N.: Awareness and use of scholarly electronic journals by
members of academic staff: a case study of Dar es Salaam
University College of Education (DUCE). Libr. Philos. Pract.
(e-journal), 125 (2014)
10. Raq, M., Ammeen, K.: Information seeking behavior and user
satisfaction of university instructors: a case study. Libr. Philos.
Pract. (e-journal) (2009)
11. Jamali, H., Asadi, S.: Google and the scholar: the role of google in
scientistsinformation-seeking behavior. Online Inf. Rev. 34(2),
282294 (2009)
12. Norbert, G.L., Lwoga, E.T.: Information seeking behavior of
physicians in Tanzania. Inf. Dev. 29(2), 172182 (2013)
13. Nor Liyana, M.S., Noorhidawati, A.: Ascertain the information
seeking behavior of computer science students. In: 3rd Interna-
tional Conference on Libraries, Information and Society, pp. 113
(ICoLIS) at the University of Malaya, Petaling Jaya, Malaysia
(2014)
14. Sarkhel, J., Khan, Md: Information needs and information seeking
behavior of faculty members of a agricultural universities in
Bangladesh: a study. Int. J. Soc. Sci. 24(1), 2336 (2014)
15. Baruchson-Arbib, S., Bronstein, J.: Humanists as information
users in the digital age: the case of Jewish studies scholars in
Israel. J. Am. Soc. Inf. Sci. Technol. 58(14), 22692279 (2007)
16. Delgadillo, R., Lynch, B.P.: Future historians: their quest for
information. Coll. Res. Librar. 60(3), 245259 (1999)
17. Barrett, A.: The information-seeking habits of graduate student
researchers in the humanities. J. Acad. Librarianship 31(4), 324
331 (2005)
18. Massey-Burzio, V.: The rush to technology: a view from the
humanists. Libr. Trends 47(4), 620639 (1999)
19. Bates, M.J.: The Getty end-user online searching project in the
humanities: Report No 6: overview and conclusions. Coll. Res.
Libraries 57(6) (1996)
20. Talja, S., Maula, H.: Reasons for the use and non-use of electronic
journals and databases: a domain analytic study in four scholarly
disciplines. J. Documentation 59(6), 673691 (2003)
21. Ansari, M.N.: Information seeking behavior models: a review.
Pak. Libr. Inf. Sci. J. 39(4), 316 (2008)
22. Devadason, F.J., Lingman, P.P.: A methodology for the identi-
cation of information needs of users. IFLA J. 23(1), 4151 (1997)
23. Ucak, N.O., Kurbanoglu, S.S.: Information need and information
seeking behavior of scholars at a Turkish University. Proceedings
Paper. In the 64th IFLA General Conference, 1621 Aug 1998,
Amsterdam. http://www.nlc-bnc.ca/ia/IV/ia64/041-112e.htm
24. Leckie, G.J., Pettigrew, K.E., Sylvain, C.: Modeling the informa-
tion seeking of professionals: a general model derived from
research on engineers, health care professionals, and lawyers. Libr.
Q. Inf. Community Policy 66(2), 161193 (1996)
25. Hsieh-Yee, I.: Effects of search experience and subject knowledge
on the search tactics of novice and experienced searchers. J. Am.
Soc. Inf. Sci. 44(3), 161174 (1993)
26. Wilson, T.D.: On user studies and information needs. J. Documen-
tation 37(1), 315 (1981)
27. Stone, S.: Humanities scholars: information needs and uses.
J. Documentation 38, 292313 (1982)
28. Sievert, D., Sievert, M.E.: Humanists and technologists: the case of
philosophers. In: Borgman, C.L., Edward, Y.H. (eds.) Information
Technology, Planning for the Next Fifty Years. Proceedings of the
First Annual Meeting of the American Society for Information
Science, vol. 25, pp. 9499. Medford, New Jersey (1988)
29. Wiberley, S.E., Jones, W.G.: Patterns of information seeking in the
humanities. Coll. Res. Libr. 50, 638645 (1989)
30. Gould, C.C., Pearce, K.: Information Needs in the Sciences: An
Assessment. Research Libraries Group, Mountain View, CA
(1991)
31. Tahir, M., Mahmood, K., Shaque, F.: Information needs and
information-seeking behavior of arts and humanities teachers: a
survey of the University of the Punjab, Lahore, Pakistan. In:
Library Philosophy and Practice, Paper 227 (2008)
32. Mostofa, S.M.: A study of information needs and seeking behavior
of faculty members of Darul Ihsan University in Bangladesh.
Libr. Philos. Pract. (e journal). http://digitalcommons.unl.edu/
libphilprac/983. Last accessed 05 Dec 2013 (2013)
33. Watson-Boone, R.: The information needs and habits of human-
ities scholars. RQ 34(2), 203216 (1994)
34. Brockman, W.S., Neumann, L., Palmer, C.L., Tidline, T.J.:
Scholarly Work in the Humanities and the Evolving Information
Environment. Digital Library Federation and the Council on
Library and Information Resources. Washington, D.C. http://www.
clir.org/pubs/reports/pub104/pub104.pdf. Last accessed 12 Sept
2014
35. Ileperuma, S.: Information gathering behavior of arts scholars in
Sri Lankan universities: a critical evaluation. Collect. Build. 21(1),
2231 (2002)
36. Ellis, D., Oldman, H.: The english literature researcher in the age
of the internet. J. Inf. Sci. 31(1), 2936 (2004)
37. de Romanos de Tiratel, S.: Accessing information use by
humanists and social scientist: a study at the Universidad de
Buenos Aires, Argentina. J. Acad. Librarianship 26(5), 346354
(2000)
38. Suriya, M., Sangeetha, G., Nambi, M.A.: Information-seeking
behavior of faculty members from Government Arts Colleges in
Cuddalore District. In: Kaul, H.K., Patil, S.K. (eds.) Library and
Information Networking (NACLIN 2004), pp. 285292. New
Delhi (2004)
39. Patitungkho, K., Deshpande, N.J.: Information seeking behavior of
faculty members of Rajabhat Universities in Bangkok. Webology
2(4). http://www.webology.ir/2005/v2n4/a20.html (2005)
40. Wenderoth, C.: Research behaviors of theological educators and
students: the known and the unknown. In: American Theological
Library Association Summary of Proceedings 61, 180.200 (2007)
184 M. K. A. Shboul et al.
41. Sukovic, S.: Convergent ows: humanities scholars and their
interactions with electronic texts. Libr. Q. 78(3), 263284 (2008)
42. Xuemei, G.: Information-seeking behavior in the digital age: a
multidisciplinary study of academic researchers. Coll. Res. Libr.
71(5), 435455 (2010)
43. Nicholas, D., Williams, P., Rowlands, I., Jamali, H.R.: Research-
ers-journal use and information seeking behavior. J. Inf. Sci. 36(4)
(2010)
44. Tibbo, H.R.: Primarily history in America: how U.S. historians
search for primary materials at the dawn of the digital age. Am.
Archivist 66(1), 950 (2003)
45. Meho, L.I., Haas, S.W.: Information-seeking behavior and use of
social science faculty studying stateless nations: a case study. Libr.
Inf. Sci. Res. 23(1), 525 (2001)
46. Buchanan, G., Cunningham, S.J., Blandford, A., Rimmer, J.,
Warwick, C.: Information seeking by humanities scholars. Lect.
Notes Comput. Sci. 3652, 218229 (2005)
47. Adeniran, P.: User satisfaction with academic libraries services:
academic staff and students perspectives. Int. J. Libr. Inf. Sci. 3(10),
209216 (2011)
48. Quigley, J., Peck, D.R., Rutter, S., Williams, E.: Making choices:
factors in the selection of information resources among science
faculty at the University of Michigan. In: Issues in Science and
Technology Librarianship. http://www.istl.org/02-spring/refereed.
html (2002)
49. Adams, J.A., Bonk, S.C.: Electronic information technologies and
resources: use by university faculty and faculty preferences for
related library services. Coll. Res. Libr. 56(2), 119131 (1995)
50. Starkweather, W.M., Wallin, C.: Faculty response to library
technology: insights on attitudes. Libr. Trends 47(4), 640812
(1999)
51. Ibrahim, A.E.: Use and user perception of electronic resources in
the Arab Emirates University (UAEU). Libri 54,1829 (2004)
52. Xuemei, G.: Information-seeking behaviour in the digital age: a
multidisciplinary study of academic researchers. Coll. Res. Libr.
71(5), 435455 (2010)
53. Frankfort-Nachmias, C., Nachmias, D.: Research Methods in the
Social Sciences, 5th edn. Edward Arnold, London (1996)
54. Oppenheim, A.N.: Questionnaire Design, Interviewing and Atti-
tude Measurement. Biddles Ltd, Great Britain (2000)
55. Krejcie, R.V., Morgan, D.W.: Determining sample size for
research activities. Educ. Psychol. Meas. 30(3), 607610 (1970)
56. World Economic forum. The global competiveness report 2010
2011. Available at: http://www3.weforum.org/docs/WEF_Global
CompetitivenessReport2010-11.pdf (2010)
57. Heterick, B.: E-content: faculty attitudes toward electronic
resources. Educause Rev. 37(4), 1011 (2002)
58. Genoni, P., Merrick, H., Willson, M.: Scholarly communities,
e-research literacy and the academic librarian. Electron. Libr.
24(6), 734746 (2006)
Humanities Scholar Information-Seeking Behavior 185
Hybrid Alliances: Efficiency, Business
Continuity and Future Foresight in a World
of Challenges
Marios Panagiotis Efthymiopoulos
Abstract
Modern alliances, regional, or international, short-term or
long-term, require security resilience, business continuity
and sustainability. Alliances need to be practically
efcient and provide efcacy and accuracy when practi-
cally applied. In an age of change, alliances have become
hybrid in nature and thus need to be reshufed. In a
period of strong, real-time geo-strategic changes, in a
constantly changing security environment, there is a need
for strong actions. Countries and leaders, seek modern
and long-term alliance capacity building that will provide
eventually stability, sustainability, safety and growth for
their own countries and regions. Based on the initial
theory of Steven WaltsOrigins of Alliances, this
research paper seeks to demonstrate a clear need for
strategic realignment of alliances through appropriate
understanding of security threats and challenges, yet also
leadership and vision that does more to promote regional
and international environment strategic and security
cooperation. A new long-term commitment, in a period
of reshufing of strategic alliances will eventually provide
asafety netthat will trigger growth, sustainability and
development. This policy and research paper, currently
examines countriespragmatic practical engagement for
the establishment of a balance of power, through alliances
that are of hybrid nature; achieved through diverse
elements of true diplomatic involvement, military pre-
paredness, active engagement and knowledge sharing
capacity, in a world, where regional or international
security or stability seems to be at stake.
Keywords
Interoperability Resilience Business
Security continuity Strategic planning
Operations Tactics Global policy
Hybrid alliances
1 Introduction
One of the emerging and greatest challenges, of our multi-
polar landscape, is dening or shaping strategic alliances. In
the completion of 17 years inside the 21st century, we evi-
dently notice a great reshufing of alliances. It is based on
something greater, than reason or interest. Power and
inuenceto conquer or to establish a new world order,
seem to be some of the main reasons behind all actions and
methodologies. Alliances reshufe their cards. They are
re-aligned with new interests due to power and inuence. An
argument that we will analyse below.
According to [1] on Alliances, “…the greatest challenge
is the translation of overwhelming might…” of alliances “…
into effective inuence. Conditions of the 20th century
chess board, according to [2], leveraged power through
bilateral and multilateral alliances, that were based on power
and inuence. Even more so, the creation of Alliances,
based on [3], Origins of Alliances, assumed a role of power
effectiveness but also inuence in a world that was back in
the days, ready to change, yet again.
By the end of 2017, the world is in fact a state of alliance
uidity. Alliances are being reshufed. Alliances have been
transpired to become hybridin nature. As we know, they
are founded based on elements and objectives of security
and strategic affairs; challenges and threats yet also oppor-
tunities. Alliances are created based on tactical objectivity,
political acceptance but also necessity of power and inu-
ence, that needs in 2017, to be redened as challenges and
threats themselves are not symmetrical yet seem to be cer-
tainly hybrid. In this paper, we state clearly, that the main
M. P. Efthymiopoulos (&)
College of Security and Global Studies, American University in
the Emirates, Dubai, United Arab Emirates
e-mail: marios.panagiotis@aue.ae
©Springer Nature Switzerland AG 2019
A. Al-Masri and K. Curran (eds.), Smart Technologies and Innovation for a Sustainable Future,
Advances in Science, Technology & Innovation, https://doi.org/10.1007/978-3-030-01659-3_21
187
characteristics of alliances are now in change. Within the
duration of this research, an examination and analysis of
main key points, on old and new characteristics of alliances,
will be dened, examined and critically analysed.
The world faces, non-traditional challenges as foresaid,
dened as of hybrid nature. This current paper justies the
frontierof terminology and necessity of the term hybrid
natureas dened and examined in the below sections.
Strong geostrategic changes are coming about. Alliances
are restructuring. They are necessary. They are however,
reformed; redened. In a game of powerin which pro-
jection of power and inuence are evident more than ever
alliances are re-shufed or newly constructed. In the age of
technological modernity, alliances need strong strategic
management, tactical agility and leadership. Alliances need
to be of long-term value rather than short term objectives;
they need to be or become robust in or through capacity
building; continue to acquire technological advances that
ease while effort alliance networking and operational
capacity efciency when military action is requested. As
such, we need to forecast a possible development or other-
wise stated, the future of alliances, through agility and
operational/tactical capacity development, training and tac-
tical deliverables. Strong strategic commitment is needed
and strong understanding of all regional and global strategic
changes. Efcient and pragmatic alliances will allow for
resilience on regional or global security, while allow for
tactical operational effectiveness when engaged.
In the Euro-Atlantic and Eurasian continents, regional
and internationally led alliances such as NATO [4], are
committed to long strategic alignment against symmetrical
and asymmetrical threats. Although, the commitment should
continue, alliances should enlarge yet also evolve and be
re-shaped when needed. While, threats and challenges, have
managed to evolve and become hybrid from asymmetrical,
so should alliances, be hybrid; redened.
The current policy and research paper, argues that alli-
ances need to be restructured as emerging challenges have
now become hybrid. Walt [3], articulates on understanding
forces that shape international alliances should be a vital
concern for most statesmen. Alliances should be redened
to meet challenges and opportunities; both in operational and
tactical capacity; based on their hybrid capacityto evolve
and to re-evolve again and again, when and where is needed.
Concepts, objectives and tactical targets, need to be clearly
and strategically dened. Alliances, should last for a
long-period of time political and military consensus, posi-
tioning and operational capacity. Member-countries should
be engaged; nancially, operationally, political and diplo-
matically committed. All need to commit strategically and
tactically; they need to contribute in meeting, hybrid
demands for a continued strong security resilience and
business continuity.
By the end of 2017, challenges and stakes seem to be
greater and higher; clear in methodological options but
hybrid in objectives. Threat elements are hybrid in nature.
Risk and threat assessments are considerable; distinguish-
able, external and internal, regional and international; mul-
tilevel and multidimensional. Threats suddenly come from
both the one, the capable, the technologically agile or
knowledgeable, the lonely wolf; and the many, the orga-
nized or from guerrilla ghtersor rogue states.
Currently, security stakes are high; challenges constantly
emerge. Any current or new alliances, should reect the need
to secure and to provide stability and safety against any
possible insecurities. A foresight on future security is of
necessity. Minority reports can help towards this goal: to
assist in operations and practice; what will become to
become a tool of operational effectiveness, to observe,
understand and operation the possible future of security.
Minority reports, will be the responseon criminal acts prior
to their establishment, facing current and future threats.
There may be involve, game theories and intelligence risk
analysis methods, strategically providing the frontier line
of security. Minority reports if adopted, should provide
interoperable alliance, operational solutions, before threats
become actually existential and possibly destructive.
A strategic alliance plan of hybridhybrid challenges/
targets should be thus established.
Walt [3], assures that on Alliances strategy is a set of
hypotheses or predictions. This research paper suggests that
strategy is and should be a clear-cut crisis strategic man-
agement process and tool of professional and training edu-
cation; a strategic methodological plan, that should be
applicable in both real operations and future challenges,
considering changes; being of scal austerity nature, political
and geostrategic challenges, ideological, societal or religious
challenges.
The research builds on the assumption that alliances
should be strengthened, reshaped and continuously mod-
ernized, operationally and tactically. On Morals of War and
conict, alliances should clearly project moral and ethical
values; shaping and or formatting rules, regulations and
ethics on war, peace and resolutions of any or all possible
conicts symmetrical and asymmetrical; Alliances should
nd out methods on which war and/or conict zones need to
end. Alliances should reect the wider international com-
munity that are otherwise revoked as in Kissinger [5] book
World Order. Provide tangible solutions for long-lasting
actual peace and peacetime security cooperation that will
render growth and development a reality.
Evolution of the existing concept of what constitute an
alliance is imperative. Evolution and push-out to a whole
new frontier, onto a new modern and practical concept is
also imperative. We need to recognise that current or future
threats are no longer conned in a region and/or area or
188 M. P. Efthymiopoulos
analogic dimension. Hybrid threats are real and are here
now; Along with non-symmetrical threats like terrorism or
weapons of mass destruction or even pandemic diseases or
food safety, security issues are far more, far more real and
far more many and interrelated with each other, than ever.
Protective action is thus necessary. Preventive and protective
measures and procedures are necessary to be managed;
managing crisis is a must, as they need to occur, prior to
their occurrence.
National security is of primary necessity; Protection
seems to be the objective, yet also the tool. Protection
means, safety, equals to sustainability and growth. This
equation reects both country/countries, regions and space.
Security seems thus to be a societal advancement element. It
reects both national security and supranational security (in
an alliance) form and format. Their very existence and
development require investment, in both, soft and hard
skills; adding to them clear-cut strategic management of
logistics and scal needs and requests.
Security is today more than ever, a pre-requisite; A
pre-requisite for stability and possibility sustainability;
peaceful resolution of current or possible future conicts.
Security is thus a model of business continuity; in where a
strong resilience in both tactical and operational methods
and adaptability, may lead to practical solutions today and
beyond on challenges and threats. Security when properly
adopted and adapted should reect a forecast methodology,
which we will need to adopt comprehend and strategize in a
new modernized alliance level format, whether international
or regional.
The following sub-chapters, introduce, analyses and
critically evaluates the necessity of the theoretical concept of
what the author denes as the need to establish or reshape
Alliances in a Hybrid manner. In the hope that the termi-
nology of Hybrid Alliancecan further be dened, exam-
ined and possibly applied, the theory on Hybrid alliances,
should be considered as a strategic tool; an element of
thinking in an alternate way and dimension thinking and
acting on security; reecting the real world of security,
strategy, intelligence and specialized education and
training on security resilience and business continuity,
among others.
In a new world order, according to Henry Kissingers
book [5], alliances are an integrative part to world balance.
Alliances hold the key for growth and sustainability of a
regions peace, stability but also prosperity. Through inter-
nationally led and accredited, by the sole international
organization, the United Nations (UN), alliances such as
NATO [4] and are security providers projecting sustain-
ability and growth, featuring safety and security, that is
however is no longer static; stakes are stronger and greater;
as the enemy is not symmetrical and threats are hybrid.
When alliances do become hybrid themselves, meaning
self-adaptable, self-interoperable and operationally agile and
exible, then we can rest assure that threats and challenges
can be swiftly and successfully tackled. We should know the
enemy, and we should respond to the enemy appropriately.
Alliances can only achieve strategic aims and visions, when
successfully integrated in a system of operational agreement
that will eventually lead to potential success against threats
and challenges of all kinds.
This paper explores and examines the importance of
current and future hybrid challenges. Hybrid challenges
come about versus, traditional symmetrical/asymmetrical
threats. The paper explores the necessity of modern and
pragmatic strategic thinking in the levels of alliance coop-
eration, coordination and practical effectiveness.
In turn, I contemplate the importance of leadership and
vision for growth in a world of business continuity and
security resilience and efciency. Power and inuence are
elements that establish strong alliances. Needless to stress,
they need to be organized and long-term associated with
current but most importantly future challenges.
The theory on Hybrid Alliances, meaning the necessity to
self-adapt, self-operate and self-determine, should be put to
the test, when considering the future of security, peace and
conict. Hybrid alliances are today a reality that is currently
takes such form, where inuence and power matters at a time
of much needed and newly created regional or international
balance of power. They should reect a new era of security
terminology.
Hybrid Alliance methodology is a current terminology
with future elements attached. It is an important outcome
that does not deprive from any author, reader and evaluator
for what science is meant to be: Future foresighting and
made possible when applied in a growing society complete
with opportunities but also threats.
The targeted audience for such a theory are security
experts and strategists in the relevant or specialized elds.
The research is part of a multidisciplinary approach to
security, strategy and operational capacity-building.
Following the below analysis, the author projects early,
important lessons to be learned as outcomes. The author
provides proposals, which necessitate strong alignment to
long-term strategic planning and management that does
more to provide effectiveness, military agility and interop-
erability in a world of global interconnectedness.
As a disclosure to the paper that follows, I wish to stress
that this current research includes views which are solely and
independently expressed. They reect my positioning on the
future of security through alliances.
The term Hybrid Alliancesshould be considered as new
term, which may be used as a tool for strategic thinking. It is
the rst time that is used and reects innovation in security
thinking; it is a new security terminology that I deem as
important to reect on, to analyse and to examine. The
Hybrid Alliances: Efficiency, Business Continuity 189
current paper is of multidisciplinary approach; concentrating
in the elds of international security and strategy.
This paper is both a research and policy proposal paper. It
is part of a larger research that is of specialization in security
and strategy, is of practical value, as it includes policy
analysis and policy proposals. A larger scale research will be
published soon after the publication of this research as a
collective analysis book on Hybrid Alliances.
2 On Hybrid Alliances
According to Henry Kissingers book on World Order, the
world or rule-based system, faces challenges, as the in-
ternational community’“expected all allies to abide by
rules[5]. According to the author, for countries to do their
fair share, play by the 21st century rules or to be responsible
stake-holders in a common system, there is still no clear
denition or practical formulation of what constitutes,
according to the reader faircontribution to any possible
alliance [5]. He further goes on to stress that the international
community in invoked insistently now that any other era.
Yet it presents no clear or agreed set of goals, methods, or
limits[5].
According to [3], alliances depend on what we may call
as natureof the external threat and as such alliances are
formed. In this paper, I assume that alliances happen due to
inuence, power and opportunity. A possibility of fore-
sight of the future, may actually help create enough mi-
nority reportsto foresee threats and challenges. As such, as
Walt states, States shall no more bandwagoning, with the
source of threat[3], rather we state that alliances shall be
ready, through the source of self-adaptiveness and security
operational and tactical preparedness and resilience.
As [3] stresses, alliances can hold a behavior based on the
external threat. In this paper, we assume that alliances have
already a security cultureattached. As we explain next, due
to geographical proximity, interests and diversity of current
but also new and future threats, alliances are or can be
inevitable. Reasoning is quite clear: interconnectedness.
According to [3], alliances can hold offensive and
aggressive intentions. That is true. However, alliances are
also dully formed, due to opportunity. Alliance creation,
may be created for those seeking to become strong or to be
stronger, due to their active abilities and competences but
also availability and need. Alliances are always necessary.
They not only strengthen cultures, but strengthen continuity,
business continuity and security resilience.
Alliances cannot be dominatedfrom specialized solely
characteristics. They are formed to complement methods of
interests and of power efciency that are of mutual impor-
tance; understanding the necessity of need, or request to be
part of an alliance is an opportunity, as long as foreign and
security objectives are clear; a denition of the role that each
state will play should be clear.
Alliances, according to the above mentioned can there-
fore be characterized terminologically as Hybrid. As alli-
ances, cannot be decreed as solid. History of alliances
easily proves such argument. Alliances can either long-term
or short-term; reecting solely the necessity; do renew
themselves at times of challenge and threat to face conse-
quences. As such [6] wonders: What if alliances were to be
reformed in our near future? In his World Order,[5],
wonders how to dene it; threats will or do continue to
emerge; challenges are seen and risks are now high. Current
alliances need to reshape. Clearly due to the following: the
threat of terrorism and war, short-term proxy wars, tech
wars, weapons of mass destruction, climate change food and
health security to mention just a few. When and if a new
world order is declared, when alliances are hybrid shaped;
when a system of rule is established on alliances, on oper-
ations, tactics and more importantly hybrid strategy, only
then we may dene a clear-cut strategy. In a world order of
hybrid adaptiveness and capabilities, the system of rule will
become clearer; well dened and managed; skills vision and
positioning in operations will be clear as the reports and
objectives on how to counter all forms of extremism will be
made as a clear-cut risk management tool.
Within the 21st century, as the 4th technological revo-
lution unfolds, at a time of technological advances, smart
grids, networks and grids, outer space communications,
Articial intelligence, genetics and robotics are quick sha-
pers of conditions and new and emerging situations, sharing
of knowledge and information that is accurate and to the
point is necessary. Access to large data gathering and
information is deemed as a necessity in a world of hybrid
threats, yet also hybrid alliances that are self-reliable and
self-adaptive to threats of the future.
Alliances bring and will continue to bring cultures toge-
ther; societies will eventually continue to grow closer to each
other as slogansaccording to [5]. Methods created, reg-
istered as initiatives are present to reect the needs of today.
In a world of smart dominance and rule, alliances ought
however to be more exible and diverse and multidimen-
sional in all vision, mission, strategy and operations. Hybrid
alliances seem to be the only option that will keep the
security relevance of action and methodology against all
kinds of threats, alive.
3 Challenges When Building Hybrid
Alliances
A strong challenge on and about Hybrid Alliances is to
dene and seek out a true and operational model of coop-
erative security for possible allies. It should be model for
190 M. P. Efthymiopoulos
self-command structure of operational, tactical and leader-
ship capacity to deliver actual security, through elements of
cooperative growth between the allies that seek to
re-establish cooperative objectives. Future visions of oper-
ations of Hybrid Alliances, can actually provide strategic-led
solutions to existing or future issues in a world of an order,
that according to [5], is yet to dened, while the international
community is constantly invoked.
While seeking models of economic, society and security
prosperity and sustainability and self-modernization in
countries and cities, cooperative hybrid security of allied
countries, stands out as a good method of bringing a balance
of power for the region. Any possible current or future
alliance to be shaped that holds a cooperative security pol-
icy, will enable practical efforts to provide security resilience
for the long-term whether threats are asymmetrical or hybrid
in nature.
Hybrid Alliances are a model of business continuity,
dening countries and regions. Alliances are/will be used as
a tool or method that connects all security elements with the
world of sustainability and economic/societal stability and
growth; It is/will use elements of traditional security provi-
dence, helping to create a sustainable business model of
growth, safety and stability. This model is/will help establish
a regional or global society not only as security resilient but
business oriented, sustainable; it will be considered a
methodological method of resolution, of current, existing
and/or possible future conicts.
The challenge on Hybrid Alliances, is evident: for new
alliances to take shape, form and or be dened as hybrid, we
need to seek out force-command and leadership with a
vision that supersedes current issues, challenges and threats
in a world that its order is yet to be dened. In this world of
Hybrid alliances, we seek operational capacity building,
power and inuence of leadership that acquires and requires
strong legitimacy and power effectiveness; Alliances
reecting future models of societal global and regional
governance; Models of hybrid nature: Self-nurtured and
self-adaptive to new challenges, risks and threats.
In a modern and constantly self-modernizing society, the
method of understanding cooperative delivery of security,
that is the approach to alliance formation, should be sim-
plied. Necessary rules of and for political stability are
needed; Resilience to peace is requested; resilience to busi-
ness sustainability, growth and development should be the
approach to cooperative security. In a truly global and
interconnected society, alliance formation, should reect
moral, ethical and societal needs and requests.
Current canonical forces and force-command structures
of allies are seen to be restrained from rules and regulations
of a system that was built on element(s) of competition or
threat(s) of ideological differentiated nature; where the pos-
sibility of war or instability was or still is imminent.
Currently, alliances are on a track of change; threats differ;
the opportunityto change is there; thus, alliances will also,
just change for the sake of changing.
Alliances with no hybrid command structure, abilities, or
self-engagement rules self-adaptability can be only consid-
ered as staticalliances with a possible end date. Modern
Alliance posture and business resilience requires power-base
inuence, long-term project planning and tactical effective-
ness; actual engagement and methodological adaptation to
new rules and new dimensions without procedural or polit-
ical engagement.
Defense as the frame for alliance cooperation, for political
and strategic engagement reects the need for the rule of law
and democracy but it does not reect modern and future
threats. Defense methodology is static, as are current alli-
ances. It expects things to happen so allies may be engaged
or defend. In defense, preventive or pre-emptive methods are
of defense nature. But they are not Hybrid. They are not
mature enough to operate. They cannot provide for a future
foresight strategic minority reportthat will necessitate the
adaptability process of what defense should look like in the
near future to come, that will elaborate all possible future
challenges taking into account symmetrical, asymmetrical
threats and now the possibility of Hybrid threats.
Hybrid alliances are challenges to continue and be built
around the concept of alliance-making, where forces join
against a common or many threats. Alliances are thus not a
new phenomenon. Empires, from Ancient Periods and
Antiquity, such as the one of Alexander the Great and its
Corinthian Alliance, stand out as similar in morality and
notion; they are reective to todays world. An example
NATO [4]. Alliances ooded with pluralism of democratic
values. Decision-making processes depend and depended on
the element of power and interests; created and sustained
based on elements that onesinterest may reect or be the
interest of the other one. More so, when the interests
reected or reect past and current threats. When future is
introduced based on interest and power effectiveness.
According to [7], New Warsor future wars, are or can
be about the claim to power on the basis of seemingly
traditional identities-nation, tribe, religion. Agreeing and or
accepting the above, equally means that security needs to be
re-dened based on sound arguments that are not solely of
static defense posture, rather hybrid. Methodologically
achievable to reach out for tactical training and
preparedness.
As such one may ask: what if, power was not about
symmetrical and static threats? What if threats were modules
of future issues, related with among others technological
advances such as articial intelligence, robotics, genetics
and humanoid development? Would threats arrive and/or be
more destructive from the one, rather the many in a
dimensional world above the internet of things?
Hybrid Alliances: Efficiency, Business Continuity 191
Hybrid threats need hybrid reaction. Through alliance
sharing of information and research material, these chal-
lenging realities should be faced. More so, when we may
become capable to anticipate them in or through an estimate
as we already named it as strategic minority report.
Mearsheimer [8], assures us that in the eld of security
and or strategy, security competition is endemic to daily
life. Security should be able to reconstruct it-self, adapt to
new and emerging situations both analogic and multi-
dimensional. Security, should continue to be provided and
states or alliances should continue to be providers. More so,
when challenges and/or threats can be considered hybrid.
Military or political alliances are and should continue to
be security providers. When security apparatus, needs to
re-adapt, so should alliances. When alliances become hybrid
in both nature and operations the security apparatus is sud-
denly changed as the risk assessment assures of imminent
hybrid threat assessments. Security resilience therefore
seems to be a necessity. As alliances are constantly and
knowingly, challenged, allied members are as well. The
question is, are we capable for strong futuristic led leader-
ship that does more to provide sustainability and resilience to
allies and member states?
4 Leadership and Vision for Growth
in the Field of Security
Leadership requires agility and understanding. It can be
taught yet is considered for few to be a gift of nature, to a
person. Leadership denes creativity, notions of collabora-
tion and aspiration. Vision, mission and innovation as
methodologies, stand out at times of grave and tremendous
change that maybe needed, or be inspired to do so. Lead-
ership is an asset value. I personally, believe, that leadership
cannot be dictated or taught. Skills can be dictated to a point
or extent. Yet true vision and methodology of approach to
subject may not.
The importance of leadership and vision for growth in a
world of business continuity and security resilience and
efciency, is of essence. Leaders need to lead. Take deci-
sions. Learn the importance of alliance interconnectedness
and growth. Leaders should be an example. Of character and
abilities to hear, learn, decide and implement. Leaders
should empower and inuence in a positive nature followers
and supporters. They should dream and share dreams with
what the city or state can be. A great leader may also be a
great marketer; a great manager and a great decision-maker.
All above are elements, we seek in a leader that will not
only allow for the establishment of strong alliances but for
innovation and future foresight to become an integrative part
of alliance success, posture and effective power measure-
ment in what we are yet to dene as the world order.
Walt [3] used in his theory, the Middle East, due to the
fascinating scale of changes, happening in and through
alliances in between the Arab World. And even today the
scale of changes due to foreseen and unforeseen circum-
stances in the Arab World and the Gulf are tremendous. In a
world and country plentiful of structural and institutional
changes, leadership stands out as the most important asset
value for the sustainability and growth of the Middle East
and Gulf region, that is more than seemingly emerging.
Dening the future is not easy. Predicting even more so. But
when dreams come true you cannot but to seek, to learn how
and apply.
The United Arab Emirates, the Government of Dubai
with its vibrant city [9] stand out, through the vision of
20302117 of the UAE as a model of current and future
cooperative security. The UAE vision is a set complete of
cultural values; national diversity, tolerance but also security
resilience; important elements, which stand out as key to
current and future success [9] but also education to current
and future allies of the UAE; achievable, through culture and
traditions, technological agility and research. Leading suc-
cess derives from vision. A vision and concept of leadership,
decision making and process but also security resilience and
business continuity and enhancement.
In his book my VisionH. H. Mohammed Bin Rashid
Al Maktoum, Prime Minister of the United Arab Emirates
and Ruler of Dubai [10], envisions sustainability growth and
development for the United Arab Emirates, thus becoming
an exemplary case of success, and therefore assuring security
resilience, business continuity and partnering with the
international community. His Royal Highness, the ruler of
Dubai, anticipates the future; does not bandwagoning; and
suggests development as an element of growth. He knows
and understands that development and constant moderniza-
tion are difcult[10]. As nothing is impossible.
Visionary leadership is as shown above, important for
alliances. Alliances stand out, as a good opportunity for
growth and development and in this case cooperative secu-
rity as a modus operandi. Tactical and operational projection
planning, interoperability of forces, tolerance, diversity of
language and cultures are important objectives and tools of
reaching out to cooperative security that is hybrid in nature.
Sustainability of hybrid alliances, is an importance goal to
reach at. Consensus building and operational burden shar-
ingshould be applicable. These are elements justifying
operational capacity and business continuity. Foresighting
the future is also of essence. Predicting challenges, maybe
the sole important aspect of success for alliance continuity
and constant change.
Resilience within hybrid alliances is important. Security
resilience should continue to include continuity that is not
deprived of development through future prediction and
foresighting. Security allocation and vision of leaders,
192 M. P. Efthymiopoulos
should allow for strong leadership in strategic, operational
and tactical levels. Quality of decision-making should
increase. Inuence and national participation in target met
objectives is of necessity.
Security allocation, enhanced cooperation in alliance
posture such as NATO, as a political military alliance,
should project the need for strong leadership in strategic,
operational and tactical levels in assuring the future of
security against possible threats and obstacles to modern-
izations of countries and increase of democratic values of
cooperation and trade. Quality of decision-making and
affordability in comprehending anticipating and sustaining
the future of security, should increase.
Therefore, strong engagement, rule and posture is of
paramount importance to the success of alliances. Mini-
mizing the risk of solitude, and achieving maximum open-
ness and cultural diversity, military and operational success
through joined and continued preparedness, collaboration
and continued interoperability that will be solely based on
the element of yes we can.
5 Forecasting the Future: Continuity
and Change in Hybrid Alliances
By forecasting a much-needed security resilience framework,
we result to a much needed diplomatic and military pre-
paredness framework of security cooperation among states
that wish or are willing to take part in alliance formations.
What is necessary to stress is that any new alliance, hybrid in
nature, should reect current challenges and threats.
Reecting, acknowledging and dening threats current or
future considering all aspects of dimensionality and diversity
of threats, in this paper I dened a new meaning and role of
alliance formation when considered hybrid.
Todays regional and global security environment requires
at this point continuity through constant change. Change that
according to Walt, is dened based on threat. This paper
denes threat as a non-ending story, as challenges will
never cease to exist. Challenges and threats cannot dene
alliances. Rather alliances need to dene or predict the future.
Future resilience in alliance formation or sustainability
requires strong understanding of growth and development,
through opportunities that denes a global, multi-
dimensional societal and security culture, where nation,
states and regions, can dene their own peaceful develop-
ment and possibly resolution of conicts inside or outside
the sphere of inuence.
Hybrid Alliances hold the key for prospective growth in a
new geostrategic world that is complete with challenges and
threats. Hybrid alliances, require agility in leadership,
strategic, operational and tactical accuracy; preparedness,
capacity building; deployability efciency and operational
effectiveness. By dening alliances, this does not mean that
alliances will rest and or remain the same forever, as inter-
ests change according to [11].
That is why, characterizing necessary growth in alliance
current formation requires, hybrid alliance positioning and
posture. Eliminating static formations and decision making
to acquire multi-dimensionality in effectiveness and
decision-making, simplifying rules and decisions, while
adapting to a constantly changing environment without
expecting the threat or challenge to rise to surface.
6 Conclusion
During the course of this research paper, I established the
theoretical assumption that goes in line with current security
operational requests, on current or future alliance formation
or reformation. The future cannot be dictated, but can be
predicted and shaped. When alliances are of hybrid in nat-
ure, self-determinant, self-adaptive and predictive of future
threats and challenges, then alliances can be a. reformed, b.
reshaped, c. newly shaped, considering long-term strategic
planning for stability regionally or globally positively
affecting business continuity, security resilience, safety,
sustainability and growth.
References
1. Randal Sherwood, E.: Alliances and American National Security.
US Army War College, Carlisle. http://www.StrategicStudies
Institute.army.mil/. Last accessed 2017/11/15
2. Brzezinski, Z.: The Grand Chessboard: American Primacy and Its
Geostrategic Imperatives. Basic Books, New York (1997)
3. Walt, S.: The Origins of Alliances. Cornell University Press, Ithaca
and London (1987)
4. The Ofcial Site of the North Atlantic Alliance, NATO. www.
nato.int. Last accessed 2017/11/17
5. Kisssinger, H.: World Order. Penguin Books, New York (2014)
6. Efthymiopoulos, M.P.: International Security and Transatlantic
Relations. Sakkoulas Press, Thessaloniki-Athens (2012)
7. Kaldor, M.: New and Old Wars, Organized Violence in a Global
Era, 3rd edn. Stanford University Press, Stanford (2014)
8. Mearsheimer, J.J.: The Tragedy of Great Power Politics, updated
edn. University of Chicago Press, Chicago (2014)
9. The Ofcial Portal of the UAE Government: Vision 20302117.
https://government.ae/en/more/uae-future/2030-2117. Last
accessed 2017/11/17
10. Al Maktoum, H.H., Bin Rashid, M.: My Vision. Motivate
Publishing, The Dubai Government Media Ofce, Dubai (2015)
11. British Broadcasting Company BBC: All you need to know about
the UK Exit from the EU. http://www.bbc.com/news/uk-politics-
32810887. Last accessed 2017/11/17
Hybrid Alliances: Efficiency, Business Continuity 193
Impact of Corporate E-Learning Systems
in Enhancing the Team Performance
in Virtual Software Teams
Rajalakshmi Subramaniam and Senthilkumar Nakkeeran
Abstract
E-learning at workplace in other words Corporate
E-learningis being becoming extremely important in
todays globalized organizational scenario. Especially
software organizations that facilitate lot of opportunities
for its staff members to work in a virtual environment rely
upon E-learning solutions to a great extent. E-learning
solutions are available in various forms and various tools
are available in the market developed with the intention to
serve the customized needs of software organizations
depending upon the kind of knowledge transfer they
would like to impart to their work force. This research
intends to analyze empirically the impact of Corporate
E-learning solutions in enhancing the team performance
of virtual software teams. An empirical study has been
conducted on the primary data collected from 202
software professionals spread across various software
organizations in India and are leading the virtual teams.
A multiple linear regression analysis has been conducted
in analyzing the data collected. The results reveal that
successful implementation and usage of E-learning sys-
tems in software organizations for training employees will
enhance the performance of teams even though there are
geographically dislocated from one another.
Keywords
Team work quality Corporate E-learning systems
Virtual team performance Virtual software teams
E-learning system success
1 Introduction
Owing to the tremendous advancement of technology and the
growing importance of E-learning, this technology is being
adapted widely in both public and private organizations in
India. Time, place, access, supporting technology, interaction,
personalization and control are some of the characteristics
which make them as one of the most preferable elements in
operating training in corporate companies. Kumar and Gulla
[1] studied about the possibilities, promises and realities of
corporate e-learning. Conception, operation, implementation
and specication are some of the important aspects that make
corporate e-learning system an important tool. Most of the
organizations use sophisticated learning management system
(LMS) tool or software to train their employees these days.
Better management and technical support has been achieved
by the implementation of e-learning in most of the organiza-
tions successfully. Moreover, the modularity, privacy, speed,
style of learning, customization, evaluation, consistent
delivery and exibility make e-learning systems an indis-
pensable tool for corporate training [2].
E-learning systems have played a signicant role in team
training and have proven to enhance the performance of team
members of most of the corporate companies that have
employed them so far. Apart from these, most of the enter-
prises have identied E-learning technology as an enabler in
attaining the organizational goal in an effective manner.
E-learning has created the possibility of quick reaction to
change the environment. Possibility of lifelong learning,
trainings interactivity, direct verication possibility of train-
ing effects and the absorption easiness are some of the vital
aspects that make e-learning method as an indispensable
technique in the corporate world [3]. Table 1summarizes
few of the most frequently used E-learning tools by various
Indian corporate sector in training their employees.
E-learning has proven to be very cost effective in training
employees especially when they are geographically dislo-
cated from each other. E-learning has proven to have yielded
R. Subramaniam (&)S. Nakkeeran
Department of Management Studies, Anna University,
Chennai, India
e-mail: s.raji217@gmail.com
S. Nakkeeran
e-mail: sen_nsk76@annauniv.edu
©Springer Nature Switzerland AG 2019
A. Al-Masri and K. Curran (eds.), Smart Technologies and Innovation for a Sustainable Future,
Advances in Science, Technology & Innovation, https://doi.org/10.1007/978-3-030-01659-3_22
195
positive return on investment to most of the organizations
through its cost effectiveness. IBM, one of the giant tech-
nocrats, has conrmed that huge savings can be achieved via
the initiatives of team training through E-learning. Team
training through e-learning system requires team members to
demonstrate self-direction and lot of discipline [4].
E-learning systems are more conducive to team members
who are independent learners and tech-savvy within a team.
While there have been numerous benets identied to have
been achieved by corporate companies in adapting
E-learning technology for employee training, this study tries
to nd out the answer for the following research question:
Does successful implementation of e-learning systems
(ELSS) in software organizations enhance virtual team
performance (VTP)?
2 Literature Review and Conceptual
Framework
2.1 Meaning and Definition of Virtual Teams
Earnhardt [5]dened the virtual team as an interdependent
group working on the project across varying time and space.
This also has relied on the technologies of information and
communication. In other words, the virtual teams have the
capability to meet the requirements through electronic means
successfully. The virtual teams share the responsibility in out-
come of team. It comes together for a time with a nite amount.
Additionally, the virtual team uses the information technologies
which prevail among the form of communication.
Ebrahim et al. [6]dened the virtual team as the group of
people who interact through the independent task guided by
common work across links strengthened by technologies of
transport, communication and information. In other words,
the virtual teams are referred as the distributed team of work
whose members are dispersed geographically with the
technologies of electronic information and communication.
According to [7], virtual teams are dened as the groups
of people who work together although they are dispersed
across time, organizational boundaries and space in a
frequent manner. In addition to these, it is also dened as the
groups of organizationally dispersed workers brought toge-
ther by technologies of information to accomplish more than
one organizational task.
2.2 Dimensions of Successful E-Learning
Systems
Information Quality. Alkattabi et al. [8] analyzed the
framework of information quality for e-learning systems.
Accuracy, believability, consistency, objectivity, veriabil-
ity, interpretability, accessibility and response time are some
of the quality dimensions signicantly linked with the dif-
ferent information quality creates a signicant inuence on
the e-learning system. Intrinsic information quality, contex-
tual informational quality, representational informational
quality and accessibility information quality are some of the
information quality linked with the e-learning system. Alla
and Faryadi [9] studied the effect of information quality in
e-learning system. Their study has found out that the accu-
racy has become the strongest dimension which affects the
quality of information of e-learning system followed by
validity, relevancy and accessibility respectively.
Service Quality. Service quality of e-learning system has
created the positive impact on the organizational outcomes.
In the context of e-learning system, the high service quality of
e-learning induces higher user satisfaction and system usage
[10]. Hence, the service quality of e-learning has provided the
clear basis for the success of e-learning service. Sugant [11]
designed the framework for measuring the service quality of
e-learning services. The service quality dimensions have
varied between e-services. Design and presentation, struc-
ture, content, usability, technology and responsiveness rela-
ted to information and service quality paved the way to attain
the highest service quality of e-learning systems. The users
perceptions about the system and information quality have
inuenced the beliefs about the service quality.
System Quality.Alla[12] studied the impact of system
quality in e-learning system. Usability, accessibility, relia-
bility and stability are some of the main dimensions of
Table 1 Few famous corporate e-learning systems in practice in Indian IT organizations at present
S. no Name of e-learning system Advantages
1 Talent LMSS Supports for videoconferencing with multiple platforms
2 Docebo It is an user-friendly system
3 Litmos It helps to enable corporate learners to get the customer service they need by using any mobile devices
4 Mindash It helps to achieve specic performance goals and training objectives effectively
5 Oracle Taleo Cloud
Service
Very exible and customizable for the learners
6 Capabiliti It provides complete data security with seamless integration
196 R. Subramaniam and S. Nakkeeran
system quality of e-learning system. Among these, the
usability is act as the strongest dimensions on the e-learning
system efciency. The author also pointed that the system
quality has the tendency to increase or decrease the ef-
ciency of the learning system. It also has become very clear
that the attributes of system quality seems to be more sig-
nicant in the area of e-learning success. The authors pre-
dicted that the system quality is positively related to the
satisfaction of the user when compared to other dimensions
of e-learning system [13].
User Satisfaction. Wang et al. [14] pointed that the user
satisfaction is act as the critical success factor which surro-
gate of e-learning systems. Information quality and the
readiness for online learning are the two factors positively
affected the e-learner satisfaction. Moreover, self-efcacy
and the self-regulated learning management are showing the
negative relationships with the e-learner satisfaction with the
learning management systems (LMS) [15].
System Use. Institutional support to the system users has
been pointed as the main dimensions of the success of the
system. In fact, the incorporated quality of system acts as the
main determinant of system use by the instructors. System use
has operationalised in various ways. The author has found a
strong relationship between the intention to use and the system
use [16]. In fact, the system use has measured by the extent to
which the instructors ensured the functions of e-learning
system. In addition to these, the system use is considered as the
measure of success under mandatory use and discretionary use
and hence it is considered as the e-learning success dimen-
sions. In this sense, the content quality of e-learning acts as the
main predictor of system use by learners.
Net Benets. User satisfaction and net benets are the
two vital dimensions of e-learning system that create an
impact on the performance of an organization. Enhanced
learning, empowered, time savings and success are the
positive aspects of net benets whereas, the lack of contact,
isolation, quality concerns and technology dependence are
pointed as the negative aspects of net benets [17]. Net
benets of e-learning systems have acquired among indi-
viduals, organizations and society. The e-learning system
usage among the employees is signicantly associated with
the performance of task [18] (Table 2).
2.3 Impact of E-Learning Systems on Team
Performance
Srivastava and Agarwal [19] studied about new trend of
e-learning in education and corporate training. Mobile tech-
nologies, e-learning process simulation, adaptive learning
environments (ALEs) and developments of e-learning tools
standards are some of the latest trends in e-learning played a
signicant role on virtual team performance. Likewise,
e-learning is pointed as the better option to enhance the
performance of the team members to attain the objectives of
an organization in a successful manner. Moreover, self paced
courses and facilitated asynchronous type of e-learning cre-
ated a signicant impact on the virtual team performance.
Fatma [20] analyzed the trends, issues and challenges of
e-learning. Embedded learning and blended method of
e-learning creates an impact on the performance of the team.
Blackboard.Inc tools have used for the business and gov-
ernment collaboration and this has created a signicant
impact on the success of the organizations. Moreover, an
asynchronous activity of e-learning uses some of the tech-
nologies to creates the team members more effective.
E-learning has complemented the process and it can helped
to reached out to he masses. It also has the tendency to cover
distances and it also has spreaded across multiple locations
especially towards an organization. The content of e-learning
seems to be repetitive until it is cleared by the trainee.
David [21] studied the impact of e-learning in workplace.
Improved and consistent rates of lifelong learning, enhanced
productivity and improved competitiveness and innovation
are some of the key outcomes of e-learning within an
organization. Anytime, anywhere, any place, time reduction,
increased payback, reinforcement, motivation, community
building, exible access and monitoring of the leaning
process are some of the benets of using e-learning creates a
positive impact on the virtual team performances. The
authors have pointed out that the e-learning is effective to
link learning with work of an employee.
Corporate e-learnings impact on employees was ana-
lyzed by Ellis and Kuznia [22]. Proper training by e-leaning
systems towards employees and their teams shows higher
organizational commitment and enhanced virtual team
Table 2 Dimensions of
successful e-learning system Dimensions of successful e-learning system Author Year
Information quality All and Faryadi 2013
Service quality Sugant 2014
System quality Draheeb and Fabil 2016
User satisfaction Eom 2014
System use Samarasinghe 2012
Net benets Chen and Kao 2012
Impact of Corporate E-Learning Systems in 197
performances. E-Learning has the tendency to produce
custom-made training courseware to attain the enhancing
training solutions. It also has the ability to maintain detailed
records of training to track the performance of an employee.
This has further increased the virtual team performance in an
effective manner. The authors also predicted that the
increasing usage of e-learning by the corporate leaders has
affected the working environment and hence it affects the
attitudes of employees towards the corporation.
A study done by Cheng and Chen [23] analyzed the
impact of e-learning on workplace on the job training.
System quality, information quality, system use and user
satisfaction are some of the perceived characteristics and
system use behavior of e-learning creates an impact on the
individuals and thereby inuencing the performances of the
team. In this sense, the authors predicted that the e-learning
system is positively related with the user satisfaction. It can
be also predicted that the e-learning is act as the powerful
tool for the team members to attain the competitive advan-
tages over others in an organization.
Wang et al. [24] has used the performance oriented
approach to e-learning in the workplace. The authors have
analyzed that the e-learning has a tendency to align the needs
of individual and organizational learning, performance of
work and supporting social interaction among individuals.
Key performance indicator of e-learning is exible and
popular approach to conduct the performance measurement
in an organization. It also has helped the team members to
make sense of their work context to enhance their organi-
zational performances. The authors also have focused on the
development of e-learning in view of short-term needs to
enhance the job performances.
Hatane [25] studied the impact of e-learning on
employability skills development in small organizations.
Limited facilities and work culture are pointed as the main
challenging factor of e-learning creates a negative impact on
the virtual team performances. Learning success or failure
through e-learning is seen in the employeesperformance.
Immediate cost savings, exibility, reduced time and travel
of e-learning are creating the positive impact on the virtual
team performance of an organization. Purpose, learners,
support, other media and choose what you need are some of
the optimal benets of e-learning creates a signicant impact
on the performance of team and its successful outcome.
Conceptual Framework and Hypothesis
The following gure presents the conceptual Framework
explaining the relationship between Virtual Team Perfor-
mance and Successful Implementation of E-learning system
at IT organizations (Fig. 1).
The following is the hypothesis to be tested in this study
Null Hypothesis: Successful implementation of e-learning
systems in software organizations does not enhance virtual
team performance.
Alternate Hypothesis: Successful implementation of e-
learning systems in software organizations enhances virtual
team performance.
3 Research Methodology
3.1 Approach of Research Employed
This research makes use of a deductive approach also known
as quantitative approach. Previous research has dened
deductive approach as the one in which a research design is
developed for the test of a set of hypothesis that has been
derived and proposed through extensive review of existing
literature. The researcher in this particular study has exten-
sively reviewed the factors that determine the successful
implementation of E-learning systems within organizations
and the relationship between E-learning and virtual team
performance and derived hypothesis that connect each and
every factor of E-learning system success with that of virtual
team performance. This study therefore can be considered to
have adapted a quantitative or deductive approach. Data
collection is restricted to software organizations within
Fig. 1 Conceptual framework explaining the relationship between
virtual team performance and successful implementation of e-learning
system at IT organizations
198 R. Subramaniam and S. Nakkeeran
Chennai India that make use of E-learning systems to train
their employees. The research design employed is descrip-
tive research design. Simple random sampling is the sam-
pling design that has been adapted in this research.
Collection of primary data was done through distribution of
questionnaires to the target respondents through online sur-
vey data collection tool. The questionnaire links of the sur-
vey instrument generated by the online survey tool was sent
to 245 respondents. After data coding of the collected data,
the nal gure of number of valid responses arrived at was
202 thereby making the response rate as 82%. It was taken
care of by the researcher that the data has been collected
from the team leaders of virtual teams of software organi-
zations. It has been ensured that the person who is
responding to the survey has used E-learning system himself
for at least 3 months and has led a particular virtual team for
at least four months.
3.2 Research Instrument
The researcher has designed the research instrument with
three sections in it. Dimensions of successful implementa-
tion of E-learning and Virtual team Performance are the two
major variables involved in this study. The rst section of
the questionnaire measures E-learning system success. In
order to measure whether E-learning system has been
implemented successfully in an organization, the researcher
has employed ELSS instrument proposed and adapted [26]
by as it is. E-learning system success in this research is
quantied into six parameters namely system quality,
information quality, service quality, system use, user satis-
faction, net benets and measured in the form of a 34 item
scale. Virtual team performance makes the second section of
the instrument. In order to measure team performance the
researcher has employed the instrument proposed by Jones
and Harrison [27]. The instrument proposed by Jones and
Harrison [27] measures performance of teams that are
exclusively put up in software organizations through a 7
item scale. Since it suits best for this research, the researcher
has employed the same. The third and nal section of the
questionnaire surveys the demographic details of the par-
ticipants such as age, gender, years of experience, educa-
tional background and details of the institution in which the
respondent is currently put up.
3.3 Techniques for Statistical Analysis
This research makes use of multiple linear regression in
order to nd the relationship between the dependent variable
virtual team performance and independent variable suc-
cessful implementation of E-learning Systems at organiza-
tions. According to [28], multiple linear regression is best
suited when there is one dependent variable and many
independent variables. In our case the dependent variable is
virtual team performance of virtual teams and the indepen-
dent variables is E-learning system success which is deter-
mined by 6 characteristics namely system quality,
information quality, service quality, system use, user satis-
faction, net benets. Therefore this research nds Multiple
Linear regression analysis as the most appropriate technique
for identifying the relationship between the variables and
testing the proposed hypothesis of this research. SPSS has
been employed in order to carry out the statistical analysis.
3.4 Techniques for Validation of Instrument
and Findings
Reliability is an important strategy that has to be identied
for any instrument to consider it suitable for collection of
primary data. Cronbach alpha is the most widely adapted
tool for calculating reliability of an instrument. It has been
suggested by George and Mallery [29] that the value of
Cronbach amust be greater than 0.7 for an instrument to be
accepted reliable. In this research the Cronbach alpha value
obtained for the adapted research instrument is 0.9 which is
above the cut off limits. Therefore it can be considered
reliable. Further in order to ensure the validity of the adapted
research instrument, the researcher has adapted the instru-
ments that have been adapted by many researchers in the
past and have been proven to render valid results.
4 Data Analysis and Interpretation
This section presents the statistical analysis of the impact of
E-Learning System Success (ELSS) on Virtual Team Per-
formance (VTP) in a software industry. The virtual team
performance is the dependent variable while e-learning
system success is the independent variable. The e-learning
system success has six attributes: information quality, sys-
tem quality, service quality, system use, user satisfaction and
net benets. To achieve this goal, the following research
hypothesis and its respective research question were set to
guide in the analysis process. The analysis process will
involve analysis of socio-demographic factors, descriptive
statistics of both dependent and independent variable and
lastly multiple linear regression. The study had 202
respondents who were mainly employees from software
organizations across, Chennai, India.
Impact of Corporate E-Learning Systems in 199
4.1 Analysis of Socio-demographic Factors
This section is involved with analysis of social and demo-
graphic data concerning the employees in software industry.
The socio-demographic variables of the employees that were
analyzed include; age, gender, working experience and
designation type. The statistical methods used for analyzing
socio-demographic data are descriptive statistics and
graphical techniques.
Distribution of Age. Table 3shows that the age group
2030 years were 36.1%, followed by those aged
3040 years at 23.8%, while those aged above 40 years
were 23.3% and those aged 1820 years were the least at
16.8%. The results indicate that the age group 2030 years
was the modal age group among in the software industry.
Gender. The data analysis shows that the male were
54.5% while the female were 45.5%. This indicates that the
males were relatively more than males in the software
industry. These results can also be displayed by a pie chart
(Fig. 2).
Working experience. Results in Fig. 3show that the
working experience of employees who had worked for
15 years were 29.7%, those with work experiences of
610 years and 1115 years were both at 29.2% lastly those
with work experience above 16 years were 11.9%. The
results indicate that the work experience of 15 years was
the most common among in the software industry
employees.
4.2 Dependent Variable: Mean and Standard
Deviation of VTP
Results in Table 4show the minimum rated virtual team
performance is 2.00 and the maximum rated virtual
team performance is 4.50 at a scale of 5. The mean virtual
team performance is 3.3465 with a standard deviation of
0.3943. The results at a scale of 5 show that averagely, VTP
was at a moderate state and evenly spread across the soft-
ware industries in India. This assertion can be exhibited
using a normal curve inscribed on a histogram (Fig. 4).
Table 3 Age
Age Frequency Percent Cumulative percent
1820 34 16.8 16.8
2030 73 36.1 53.0
3040 48 23.8 76.7
40+ 47 23.3 100.0
Total 202 100.0
Fig. 2 Pie chart of gender distribution
Fig. 3 Pie chart of working experience distribution
Table 4 Dependent variable
Variable N Minimum Maximum Mean Std.
deviation
VTP 202 2.00 4.50 3.3465 .3943
Valid N
(listwise)
202
200 R. Subramaniam and S. Nakkeeran
4.3 Independent Variable: Mean and Standard
Deviation of E-Learning System Success
(ELSS)
Table 5shows the minimum and maximum values for each
ELSS variables, it also shows themean and standard deviation of
each of the ELSS variables. It is worth noting that all the six
variables analyzed were scaled within 5 values, being; 1, 2, 3, 4
and 5 representing; strongly disagree, disagree, neither agree nor
disagree, agree and strongly agree respectively. In all the six
variables, the minimum rated value was 1.67 while the
maximum rated ELSS variable value is 4.43 at a scale of 5. The
means and standard deviations of the ELSS variables are:
(l=3.1304andr= 0.4963), (l=3.1301andr= 0.4829),
(l=3.0554andr= 0.4843), (l=2.8449andr= 0.6684),
(l=3.1106andr= 0.5447) and (l= 2.9931 and r=0.4874)
for system quality, information quality, service quality, system
use, user satisfaction and net prots respectively.
The results averagely indicate that all the ELSS variables
were at moderate states and normally spread across the
software industries in India. Therefore, the descriptive
statistics on VTP and ELSS variables did not explain much
about the relationship between them. With this regard, the
research found it imperative to analyze this relationship
using correlations and regression in multiple linear regres-
sion analysis.
Fig. 4 Histogram of virtual team
performance distribution
Table 5 ELSS-mean and
standard deviation ELSS variables N Minimum Maximum Mean Std. deviation
System quality 202 2.33 4.33 3.1304 .49631
Information quality 202 2.29 4.43 3.1301 .48287
Service quality 202 2.20 4.20 3.0554 .48428
System use 202 1.67 4.33 2.8449 .66843
User satisfaction 202 1.67 4.33 3.1106 .54473
Net benets 202 2.10 4.10 2.9931 .48741
Impact of Corporate E-Learning Systems in 201
4.4 Multiple Linear Regression
Correlations. Table 6shows that all the ELSS variables
except user satisfaction are signicantly correlated to virtual
team performance (VTP). The system quality is signicantly
and fairly correlated with virtual team performance
(r = 0.407 and Sig = 0.000), information quality is signi-
cantly and moderately correlated with virtual team perfor-
mance (r = 0.327 and Sig = 0.000), service quality is
signicantly and strongly correlated with virtual team per-
formance (r = 0.581 and Sig = 0.000), system use is sig-
nicantly and strongly correlated with team performance
(r = 0.628 and Sig = 0.000) and net benets is signicantly
and strongly correlated with virtual team performance
(r = 0.691 and Sig = 0.000).
Therefore, it is worth noting that system quality, infor-
mation quality, service quality, system use and net benets
are signicantly correlated with virtual team performance
and can be used in linear regression modelling of VTP using
variables of ELSS.
4.5 Regression Model Summary
When virtual team performance (VTP) is modelled using
system quality, information quality, service quality, system
use, user satisfaction and net benets the model correlation
coefcient is 0.775 and it respective R-squared is 0.600. This
is a stronger R-squared value that shows that the model can
account for about 60% of the variability of virtual team
performance using system quality, information quality, ser-
vice quality, system use, user satisfaction and net benets as
appropriate predictors (Table 7).
4.6 ANOVA Table of the Regression Model
The results indicate that of the regression model, in which
virtual team performance is predicted using system quality,
information quality, service quality, system use, user satis-
faction and net benets has a F-value of 48.820 with p-value
of 0.000. Consequently, this shows that the model is signif-
icant and should be adopted for prediction and explanatory
purposes. Next we obtain the model parameters (regression
coefcients) that will be used to quantify and predict the
virtual team performance using system quality, information
quality, service quality, system use, user satisfaction and net
benets as appropriate predictors. The table below shows the
regression coefcients of the regression model (Table 8).
4.7 Regression Model Coefficients
The results in Table 9indicate that constant (t = 15.241 and
sig = 0.000), system quality (t = 2.455 and sig = 0.015),
information quality (t = 3.759 and sig = 0.004), service
Table 6 Correlation between VTP and ELSS
VTP System
quality
Information
quality
Service
quality
System
use
User
satisfaction
Net
benets
VTP Correlation 1 .407
**
.327
**
.581
**
.628
**
.002 .691
**
Sig. .000 .000 .000 .000 .981 .000
N 202 202 202 202 202 202 202
**Correlation is signicant at the 0.01 level (2-tailed)
Table 7 Model summary table
Model R R square Adjusted R square Std. error of the estimate
Regression .775
a
.600 .588 .25309
Predictors: (Constant), Benets, Satisfaction, System use, System quality, Information quality, Service quality
a
Dependent variable: VTP TT
Table 8 ANOVA table
Model Sum of Squares df Mean square F Sig.
1 Regression 18.762 6 3.127 48.820 .000
a
Residual 12.490 195 .064
Total 31.253 201
a
Predictors: (Constant), BEN QT, SAT QT, USE QT, SYS QT, INF QT, SER QT
202 R. Subramaniam and S. Nakkeeran
quality (t = 4.573 and sig = 0.000), system use (t = 4.278
and sig = 0.000), user satisfaction (t = 5.279 and sig =
0.000) and net benets (t = 3.791 and sig = 0.003).
According to the results, all p-values (Signicant values) in
the model are less than 0.05, hence, we reject the null
hypothesis, accept the alternate hypothesis and conclude
that, successful implementation of e-learning systems in
software organizations enhances virtual team performance.
The multiple linear regression model can be expressed
mathematically as:
TP ¼2:288 0:339 SYS 0:744 INF þ1:162 SER 0:471 USE
0:336 SAT þ1:091 BEN
where
VTP Team
performance
SYS system quality
INF information
quality
SER service quality
USE system use
SAT user satisfaction
BEN net benets
These results indicate that when system quality increases
by 1 virtual team performance decreases by 0.339 and when
information quality increases by 1 virtual team performance
decreases by 0.744. on the other hand, when service quality
increases by 1 virtual team performance increases by 1.162
while if system use increases by 1 virtual team performance
will decreases by 0.471. When user satisfaction increases by
1 virtual team performance decreases by 0.336 while if net
benets increases by 1 virtual team performance will
increases by 1.091.
5 Discussion and Conclusion
Learning is an integral part of the corporate training strategy.
E-learning systems form an important role in imparting
effective training at corporate organizations belonging to the
software industry. The results of the study reveal that suc-
cessful implementation of E-learning systems depend upon
six basic factors namely system quality, information quality,
user satisfaction, system use, service quality and net benets.
It is also understand from the test of hypothesis that suc-
cessful implementation of E-learning systems in corporate
will contribute towards the enhancement of performance of a
team even though they are, virtual, in nature. In other words,
the members of a software team can exhibit enhanced per-
formance even though they are geographically dislocated
from each other.
Considering the theoretical implications of this research, it
has opened up new dimensions for future researchers to
explore more in the academic arena of software team perfor-
mance and corporate E-learning. Considering the practical
implications of the study, this research brings into light the
expectations that user of E-learning systems especially
belonging to the software industry have towards the features of
E-learning systems implemented at their workplace. Further
this research gives an idea to the team leaders and team
members who are a part of virtual team in making effective use
of E-learning systems and enhance performance of the team.
Table 9 Coefcients of the
regression model Coefcients t Sig.
B Std. error
(Constant) 2.288 .150 15.241 .000
System quality 0.339 .138 2.455 .015
Information quality 0.744 .190 3.759 .004
Service quality 1.162 .254 4.573 .000
System use 0.471 .056 4.278 .000
User satisfaction .336 .064 5.279 .000
Net benets 1.091 .115 3.791 .003
Impact of Corporate E-Learning Systems in 203
6 Future Scope of the Research
Like any other research this research also have its own
limitations. This research has been conducted with specic
reference to Indian software organizations and that too for
virtual teams. This study can be further extended by
repeating the same for physical software teams in India as
well as other regions across the globe in order to test if the
results hold same. Further this study can be conducted with
respect to industries other than that of the software industry
and their results can be compared against the ndings of this
research by the future researchers.
References
1. Kumar, P., Gulla, U.: Corporate e-learning: possibilities, promises
and realities. DESIDOC J. Libr. Inf. Technol. 31(3), 179188 (2011)
2. Roy, A., Raymond, L.: Meeting the training needs of SMEs: is
e-learning a solution? Electron. J. e-Learn. 6(2), 8998 (2008)
3. Kisielnicki, J., Sobolewska, O.: E-learning as a strategy of
acquiring a companys intellectual capital. Interdisc. J. E-Learn.
Learn. Objects 6(2010)
4. Rao, P.: E-Learning in Indiathe role of national culture and
practical implications (2010). Retrieved from: http://ceur-ws.org/
Vol-570/paper010.pdf
5. Earnhardt, M.P.: Identifying the key factors in the effectiveness
and failure of virtual teams. Leadership Advance Online, vol. XVII
(2009)
6. Ebrahim, N., Shamsuddin, A., Taha, Z.: Virtual teams for new
product developmentan innovative experience for R&D engi-
neers. Eur. J. Educ. Stud. 1(3), 109123 (2009)
7. Ebrahim, N.A., Ahmed, S., Taha, Z.: Virtual teams: a literature
review. Aust. J. Basic Appl. Sci. 3(3), 26532669 (2009)
8. Alkattabi, M., Neagu, D., Cullen, A.: Information quality frame-
work for e-learning systems. Knowl. Manage. E-Learn. Int. J. 2(4)
(n.d)
9. Alla, M.M.S.O., Faryadi, Q.: The effect of information quality in
e-learning system. Int. J. Appl. Sci. Technol. 3(6) (2013)
10. Chen, L.H., Kuo, Y.F.: Understanding e-learning service quality
attributes of a commercial bank by using Kanos model. Total
Qual. Manage. Bus. Excellence 22(1), 99116 (2011)
11. Sugant, R.: A framework for measuring service quality of
e-learning services. In: Third International Conference on Global
Business, Economics, Finance and Social Sciences (GB14Mumbai
Conference), Mumbai (2014)
12. Alla, M.M.S.O.: The impact of system quality in e-learning
system. J. Comput. Sci. Inf. Technol. 1(2) (2013)
13. Dreheeb, A.E., Basir, N., Fabil, N.: Impact of system quality on
userssatisfaction in continuation of the use of e-learning system.
Int. J. e-Educ. e-Bus. e-Manage. e-Learn. 6(1) (2016)
14. Wang, Y.S., Shih, Y.W., Li, C.R.: Assessing user satisfaction with
e-learning blog systems. Int. J. e-Educ. e-Bus. e-Manage. e-Learn.
2(6) (2012)
15. Eom, S.B.: Understanding e-learnerssatisfaction with learning
management systems. Bull. IEEE Tech. Committee Learn. Tech-
nol. 16(2/3) (2014)
16. Samarasinghe, S.: e-learning systems success in an organizational
context (2012). Retrieved from: http://mro.massey.ac.nz/xmlui/
bitstream/handle/10179/4726/02_whole.pdf?sequence=
1&isAllowed=y
17. Lee-Post, A.: e-learning success model: an information systems
perspective. Electron. J. e-Learn. 7(1), 6170 (2009)
18. Chen, H.-J., Kao, C.-H.: Empirical validation of the importance of
employeeslearning motivation for workplace e-learning in
Taiwanese organizations. Australiasian J. Educ. Technol. 28(4),
580598 (2012)
19. Srivastava, E., Agarwal, N.: E-learning: new trend in education
and training. Int. J. Adv. Res. 1(8), 797810 (2013)
20. Fatma, S.F.: E-learning trends issues and challenges. Int. J. Econ.
Commer. Res. 3(2), 0110 (2013)
21. David, O., Salleh, M., Iahad, N.: The impact of e-learning in
workplace: focus on organizations and healthcare environments.
Int. Arab J. e-Technol. 2(4) (2012)
22. Ellis, P.F., Kuznia, K.D.: Corporate e-learning impact on employ-
ees. Glob. J. Bus. Res. 8(4) (2014)
23. Cheng, W.T., Chen, C.C.: The impact of e-learning on workplace
on the job training. Int. J. e-Educ. e-Bus. e-Manage. e-Learn. 5(4)
(2015)
24. Wang, M., Ran, W., Liao, J., Yang, S.J.H.: A performance-
oriented approach to e-learning in the workplace. Educ. Technol.
Soc. 13(4), 167179 (2010)
25. Hatane, S.E.: The impact of e-learning on employability skills
development in small organization (A study case of a small
organization in Blitar, East Java, Indonesia). In: The Sixth
International Conference on eLearning for Knowledge-Based
Society, Thailand (2009)
26. Wang, Y.S., Wang, H.Y., Shee, D.Y.: Measuring e-learning
systems success in an organizational context: scale development
and validation. Comput. Hum. Behav. 23(1), 17921808 (2007)
27. Jones, M.C., Harrison, A.W.: IS project team performance: an
empirical assessment. Inf. Manage. 31(2), 5765 (1996)
28. Hair, J.F., Black, W.C., Babin, B.J., Anderson, R.E.: Multivariate
Data Analysis, 7th edn. Prentice Hall, Upper Saddle River, New
Jersey (2010)
29. George, D., Mallery, P.: SPSS for Windows Step by Step: A
Simple Guide and Reference. 11.0 Update, 4th edn. Allyn &
Bacon, Boston (2003)
204 R. Subramaniam and S. Nakkeeran
IoT Based Water Usage Monitoring System
Using LabVIEW
P. Arun Mozhi Devan , K. Pooventhan, C. Mukesh Kumar,
and R. Midhun Kumar
Abstract
Wireless communication devices development has a
considerable impact on several elds like healthcare,
agriculture, houses and various others applications.
Amongst these, the signicant application is the improve-
ment of monitoring system for various functions. Auto-
mated water utilization monitoring system proposes an
efcacious manner of controlling the wastage of water at
home, colleges, hospitals, industries, shops, and malls by
the use of LabVIEW software and Wireless sensor nodes.
At many locations of the world, water is luxuriously
wasted whereas many areas dont have sufcient. So in
order to track/monitor the water ow, Sensor nodes are
placed at every water outlets which sense the course of
water. Continuous monitoring is done using the concept
Internet of things (IoT) via the wireless sensor nodes. The
server collects the information through Wi-Fi/LAN to the
process and tracks the usage, additionally, amount of
water wastage is calculated at each outlet. When water is
used in surplus/prexed rate, an alert is sent to the user for
indication by using this user can constantly keep a track
of the water usage or wastage through a cell or laptop
with an internet connection. This proposed water utiliza-
tion and monitoring system allows the individuals,
colleges, hospitals, industries, department shops, malls
and motels to keep a track on their water bills and allows
the government and authorities to accomplish/control the
water supply.
Keywords
Water monitoring LabVIEW Wireless sensor nodes
IoT
1 Introduction
At present Conventional water meters are used to calculate
the amount of water used at homes for billing cause. This
doesnt provide an efcient method of monitoring the water
usage. The water is wasted at each and every outlet know-
ingly or unknowingly which adds as much as a big quantity
ultimately. Efcient management of the water used at homes
could be very lots essential as about 50% of water provided
to the cities gets wasted thru its incorrect utilization [1].
Water control is only possible if the user is aware of the
quantity of water he makes use of and the quantity available
to him. Hence there is a need for enhancing the conventional
water measurement meters for the users to continuously
screen their water usage. Agricultural countries like India,
news about multiplied farmer suicides (about 26% in 2014)
cannot be overlooked, wherein one of the predominant
motives for its miles the unavailability of water [2]. At many
places, water is luxuriously wasted while our farm lands
dont have enough. Automated water usage monitoring
machine proposes a powerful manner of controlling the
wastage of water at houses and industries with the aid of
permitting the person to continuously display and manage
the use of water. The user is able to screen his water uti-
lization at each faucet now and again thru his smartphones or
laptops and also needless water wastage is also prevented.
This water tracking device includes 3 modules: Wi-Fi
sensor module; Central module; Server module. Wireless
sensor module collects the records from each water outlets,
P. Arun Mozhi Devan (&)K. Pooventhan C. Mukesh Kumar
R. Midhun Kumar
Electronics and Instrumentation Engineering,
Sri Ramakrishna Engineering College, Coimbatore, India
e-mail: arunmozhideven.p@srec.ac.in
K. Pooventhan
e-mail: pooventhan.k@srec.ac.in
C. Mukesh Kumar
e-mail: mukeshkumar.1506026@srec.ac.in
R. Midhun Kumar
e-mail: midunkumar.1506022@srec.ac.in
©Springer Nature Switzerland AG 2019
A. Al-Masri and K. Curran (eds.), Smart Technologies and Innovation for a Sustainable Future,
Advances in Science, Technology & Innovation, https://doi.org/10.1007/978-3-030-01659-3_23
205
at the server all of the computation is performed and the
signals are generated and central module acts as an interface
between the server and the sensor module. Wireless sensor
networks (WSN) are spatially dispensed autonomous sensors
to display physical or environmental situations, which
include temperature, sound, stress, and so forth. Internet of
Things (IoT) is a growing idea which may be included in
conjunction with Wi-Fi sensor networks for efcient track-
ing from a remote area. Section 2discusses the associated
works papers listed out in, the techniques for implementation
is discussed in Sect. 3and the proposed methods are
explained in Sect. 4. Sections 5and 6discusses the results
acquired and conclusion.
2 Related Works
A mechanism for estimation of senior well-being condition
based usage of family home equipment linked through
multiple sensing units is proposed in [3]. It is a WSN
(wireless sensor network) based household monitoring sys-
tem for senior people activity tracker which involves func-
tional evaluation of daily activities.
Paper [4] discusses the design of a sensor network for
monitoring and manipulation of the water distribution
mechanism. The application of this system lies in detecting
seepage or any other structural faults present in underground
pipelines. It has various sensors for this reason integrated
with GPS and a 3G modem. The sensor nodes are expensive
and the replacing of it may difcult as its deployed in
underground.
The paper [5,6] discusses the development of a prototype
for tracking and content material management system for
agriculture. It is a Zigbee based tracking module using Wi-Fi
sensor nodes. The sensors are coupled to LAN that is used to
show the information on the server.
A Wi-Fi sensor based environmental water monitoring
method is proposed in [7]. This system routinely displays
video regarding the water temperature and pH from sur-
rounded water. This water monitoring methodology is
appropriate for the complicated and signicant water mon-
itoring of large areas, inclusive for reservoirs, lakes, rivers,
swamps, and shallow or deep ground waters.
The efforts are taken for developing a wireless frame
sensor networks based totally energy saving integrated cir-
cuit featured with the protocol is designed for medicinal
programs to have been explained in a paper [8].
In [9] the author has advanced Smart Coastthat has
been proposed for best water control which is designed
primarily based on WSN (wireless sensor network) concept
Its a Wi-Fi sensor based device for sensing and calculating
the usefulness of water. It is a miniaturized and smart
tracking device.
3 Methodology
This arrangement consists of two core modules, (1) Server
Module (2) Wireless sensor module [10]. The Wi-Fi sensor
module as shown in Fig. 1which collects the denite time
data at respective households. These data is sent to Lab-
VIEW module thru Wi-Fi or LAN. The LabVIEW module
can be accessed from any far inaccessible area with an
internet linking [11].
The basic block of computerized water usage monitoring
machine consists of specically three components, (i) Wire-
less sensor module (ii) Central Module (iii) Server Module.
Wireless sensor module connects the various sensor nodes to
central node. Then its connected to Server thru a commu-
nique link Sensor module includes (1) Sensor (2) Sensor
Circuitry (3) RF Transceiver module (4) Indicators and
(5) Power source as shown in Fig. 2. The sensor senses the
water ow and sends the statistics to the sensor circuitry.
The received signal is amplied at the sensor circuitry. RF
module is used as a transceiver to transmit the sensed
statistics and receive the control alerts. The power source is
used to power up the sensor circuitry, RF module, and
indicators.
The Central module includes an Arduino board that is
linked to numerous modules together with (1) RF module
(2) Solenoid valve (3) Wi-Fi/Ethernet Shield (4) Water ow
meter (5) Indicators (6) Power supply as presented in Fig. 3.
The server collects the raw statistics over the internet for
tracking the water utilization. For this purpose, it contains
(1) Computational block (2) Monitoring/Display block
(4) Feedback/Control block as presented in Fig. 4.
The computational block computes the desired parame-
ters based on numerous algorithms. These parameters are
Wireless
Sensor
Module
Central
Module
Server
Module
Fig. 1 Block diagram of an automated water usage monitoring system
Sensor RF Transceiver
Sensor
Circuit Power Source
Indicators
Fig. 2 Block diagram of wireless sensor module
206 P. Arun Mozhi Devan et al.
displayed with the help of monitor/display. These parame-
ters are used to create remarks or manipulate indicators.
4 Proposed System
The idea of automated water utilization monitoring system
lies in alerting the user for excess usage of water at every
outlet, also providing the consumer a way to screen his/her
water bills time to time.
4.1 Wireless Sensor Module
Water ow at every outlet can be sensed by the wireless
sensor node at every water outlet [12]; (i) which is shown in
Fig. 5characterize the wireless sensor nodes placed at the
water outlet. An apartment of seven water outlets is con-
sidered. These sensor nodes are wirelessly linked to a central
module by a solo hop Central module is represented by
(ii) in Fig. 4. Indicators at the central module indicate the
average amount of water that can be used by the user. The
indicator is also used display the water outlet which is cur-
rently used. Centralized node shown in Fig. 6consists of
arduino board is connected to water ow meter and solenoid
valve which is connected to main water inlet. Reset button is
also included in the system [13].
When a water outlet is opened for more than a certain
amount of time stated at the Server module, an alert is given
on the indicator and through the mail. If the consumer
doesnt reply within a prescribed time restriction the sole-
noid valve shuts the supply to the house. When the con-
sumer identies the alert and closes the particular outlet he
can press the reset button to re-establish the water distribu-
tion. An effectual way for the full quantity of water utiliza-
tion can be done using water ow meter [14].
4.2 Server Module
LabVIEW module acts as a server to manipulate and display
the information to and from the wireless sensor nodes. The
LabVIEW develops the information received from the cen-
tral module to show the processed data and additionally
create appropriate manipulation signals. The central module
data is used to check the water outlet or faucets status. It is
used to decide the quantity of time the water outlet is
retained open. The utilization time is displayed in seconds.
Based on the utilization time and information from the water
ow meter, an effective algorithm is used to calculate the
quantity of water used. The current utilization is displayed
from the calculated value. Each time the status turns off the
present usage. The cumulative information from the present
utilization is used to calculate the overall usage and its
displayed. A time stamp is inserted into it to reset it each
month.
The information from the usage time and present uti-
lization is used to formulate the alert and warn the machine.
The conditions for warning and alert scheme are revealed in
Table 1. These situations are formulated to reduce the
Arduino
Board
Indicators Power
Source
RF
Solenoid valve Water flow meter
Fig. 3 Block diagram of central module
Computational
Block
Monitoring /
Display
Feedback
Control Block
Fig. 4 Block diagram of server module
Fig. 5 System concept design
IoT Based Water Usage Monitoring System Using LabVIEW 207
wastage of water. Its important purpose is to alert the person
of the over utilization at every water outlet. To resume the
water ow to the residence the user can close the apt water
outlet and can press the reset button. This approach gives an
effective way of controlling wastage of water while it is left
unattended.
Figure 7shows the warning systemsowchart of the
server. The system begins the process by checking the status
of the outlet. If the tap constantly makes use of water greater
than the stated value then the warning signal is activated.
Then the machine examines whether the tap is on or off. If
the tap is off then, once again the system assess the status of
the tap. The owchart of alert system for server was shown
in Fig. 8. The system examines if the tap is continuously on
for greater time than the threshold time restriction then the
alert signal is activated. Then the system inspects whether
the tap is on or off. If the tap is off then the system again
examines the status of the tap. The supply control systems
owchart for the server was shown in Fig. 9. The system
checks if the tap continuously on for greater time than the
brink time limit then the alert signal is activated. After that
the system checks whether tap is on or off. If its off then the
system once again examines the status of the tap. Automated
water utilization monitoring system offers the person the
ability to view the water utilization data within the server
through any gadget at any time using an internet connection.
The water utilization parameters inside the LabVIEW
module such as usage time, present utilization, overall usage,
warning and alert status of every water outlet the present
invoice amount can be accessed by using the person through
Fig. 6 Central module design
Table 1 Conditions for warning
and alert system Output devices Warning limit (Liters) Alert time (min)
Wash basin 10 15
Shower 25 15
kitchen tap 10 15
Flush 15 15
Fig. 7 Warning system owchart
208 P. Arun Mozhi Devan et al.
his/her smart phones, PDA and desktops by using internet
accessibility from any browser.
5 Results and Discussions
The essential a part of the water control management system
is LabVIEW which will act as a server. On and off buttons
will simulate the water outlets with the help of server
developed. The on/off status of the buttons is used for an
additional computation for developing alert, warning signal
and govern the alert signals. Server module alerts the user
through e-mail. From this the user can able to get the proper
warning signals from the server module to help the con-
sumer to access the status.
The advanced server device with the capabilities inte-
grated together for an automatic water usage utilization
system to offer a effective manner of controlling the over
usage and unnecessary wastage are shown Fig. 10. The front
panel view of water utilization thru manual simulation where
shown in Fig. 11.
By using a switch water outlet has manually simulated for
switching on and off of the water outlet. If the wash basin tap
uses more than or equal to 10 L of water continuously,
which is denitely an over usage then the warning is acti-
vated. This signal activates the LED on the respective Wi-Fi
sensor node. This suggests the person close the tap. If a
particular water outlet is kept open for more than 15 min i.e.
when the consumer ignores the warning signal or left unat-
tended then an alert signal is regenerated. Alert and warning
signal generation where shown in Fig. 12.
The alert signal generates a beep sound at the central
module and additionally, it ashes the LED indicating
which water outlet is open. If the consumer doesnt respond
to the alert signal within a minute the server sends an
e-mail to the person informing the information about the
over utilization of water on exact tap. The system waits
again for two more minutes to close the water outlet. Even
after two minutes if the water outlet is left unattended the
then the server informs the central module to close down
the primary water supply. Solenoid valve shuts the primary
water supply and the module keep on displaying the outlet
is open.
The consumer will get a weekly notication about the
status of his/her water bills. He/she also can request a noti-
cation when the water bill exceeds a specic restrict.
Thereby the consumer can maintain the water bill and its
usage. The graph as shown in Fig. 13 indicates the usage at
every water outlet in the Server module.
Fig. 8 Alert system owchart
Fig. 9 Supply control system owchart
IoT Based Water Usage Monitoring System Using LabVIEW 209
Fig. 10 Graphical representation of water usage at server
Fig. 11 Manual stimulation of water usage
210 P. Arun Mozhi Devan et al.
Fig. 12 Alert and warning system display at server
Fig. 13 Graphical representation of water usage at server
IoT Based Water Usage Monitoring System Using LabVIEW 211
6 Conclusion
The development of technology paved the way to increase
in conceptions like WSN, IoT, and 5G and many others.
There are some fundamental assets in the world which
might be important to preserve life, but with the advance-
ment in the generation, most of those sources are being
depleted or destroyed in a certain manner. These advanced
technologies are in general exploited to make our existence
easier. But there are a lot of these technologies that arent
but exploited or given importance, which can be used to
decrease the depletion of the natural resources preserving
the ecological balance and making the existence of our
forthcoming generation easy and trouble free living
environment.
In this paper, weve created an automatic water usage
monitoring system which lets in plummeting the depletion
of the water. The server module has been designed with all
capabilities together with the generation of status and
reports of every tap in the house, malls and apartments the
present usage of water at each outlet and the total quantity
of water used at every outlet respectively. The current water
bill of water used is displayed with the entire amount of
water bill. The warning and alert signals to control the water
ow to the house, malls and apartments are displayed in
combination with email facility to notify the consumer
approximately the water utilization based totally on
above-mentioned situations. The switching of an each water
tap is simulated utilizing manual controls. The hardware
part consists of the Wi-Fi sensor module and central module
yet to be developed it needs to be synchronized to the server
module and needs to be validated in the various real-time
conditions.
References
1. Hegde, N.: Water scarcity and security in India. In: BAIF at the
Indian Science Congress (2012)
2. Hebous, S., Klonner, S.: Economic Distress and Farmer Suicides
in India: An Econometric Investigation. University of Heidelberg,
Discussion Paper Series No. 565, May 2014
3. Suryadevara, N.K., Mukhopadhyay, S.C.: Wireless sensor network
based home monitoring system for wellness determination of
elderly. IEEE Sens. J. 12(6) (2012)
4. Whittle, A.J., Allen, M., Preis, A., Iqbal, M.: Sensor networks for
monitoring and control of water distribution system. In: The 6th
International Conference on Structural Health Monitoring of
Intelligent Infrastructures, Hong Kong, 911 Dec 2013
5. Chung, W.-Y., Caya, M.V.C., Chen, C.-L.: Wireless sensor based
monitoring and content management system for agricultural
application. Position papers of Federated Conference on Computer
Science and Information System FedCSIS, pp. 7578 (2013)
6. Rasin, Z., Abdullah, M.R.: Water quality monitoring system using
Zigbee based wireless sensor network. Int. J. Eng. Technol.
IJET-IJENS 09(10) (2009)
7. Jiang, P., Xia, H., He, Z., Wang, Z.: Design of a water
environment monitoring system based on wireless sensor net-
works. Sensors 9, 64116434 (2009)
8. Zhang, X., Jiang, H., Zhang, L., Zhang, C., Wang, Z., Chen, X.: An
energy-efcient ASIC for wireless body sensor networks in medical
applications. IEEE Trans. Biomed. Circ. Syst. 4(1), 1118 (2010)
9. OFlynn, B., Martínez-Català, R., Harte, S., OMathuna, C., Cleary,
J., Slater, C., Regan, F., Diamond, D., Murphy, H.: Smart coasta
wireless sensor network for water quality monitoring. In: 32nd IEEE
Conference on Local Computer Networks, pp. 815816 (2007)
10. Labview User Manual &LabVIEW Run-time Engine Technical
Specication. Retrieved from http://www.ni.com
11. Johnson, G., Jennings, R.: LabVIEW Graphical Programming
12. Dargie, W., Poellabauer, C.: Fundamentals of wireless sensor
networks: Theory and practice (2010)
13. Sridharan, S.: Water quality monitoring system using wireless
sensor network. Int. J. Adv. Res. Electron. Commun. Eng.
(IJARECE) 3(4) (2014)
14. Zhao, F., Guibas, L.J.: Wireless sensor networks: An information
processing approach (2004)
212 P. Arun Mozhi Devan et al.
Learning Analytics: Developing
a Data-Centric Teaching-Research Skill
Alrence S. Halibas , Bobby Sathyaseelan ,
and Muhammad Shahzad
Abstract
This paper highlights the importance of developing
data-centric teaching-research skills of 21st-century
teachers. It critically examines the literature related to
the teaching-research nexus and learning analytics, and
presents a model of the integration of these concepts, and
their relevance to the teaching and learning process. This
paper also presents the desirable skills set of learning
analysts and identies the analytic tools that they can use
to carry out this role. Finally, this paper suggests the
future direction of teacher training and professional
development programs that will equip teachers with the
right teaching-research skills and tools to help the
millennial learners gain academic success. This study
recommends that teachers need to be well informed about
their students by having access to their data and acquiring
the necessary competencies to perform appropriate data
analysis. Furthermore, they are expected to engage with
analytical tools and educational technologies in order to
realize a more effective teaching and learning experience,
and improve academic outcomes.
Keywords
Learning analytics Teaching-research nexus
Pedagogical approach
1 Introduction
Systematic collection and analysis of data informs educa-
tional practice and learning. Educational research on student
learning allows teachers to assess their teaching effectiveness
and make evidence-based decisions about their teaching.
With the advent of content management systems, learning
management systems, virtual learning environment, and
other digital learning environments, learning styles and
pedagogical methods for teaching are reinvented and trans-
formed to answer the learning needs of the 21st-century
students [1]. It is also in this regard that data-driven
decision-making in education has become increasingly
prevalent and relevant. Information systems and analytic
systems are currently being used by leading academic
institutions to better understand and meet the needs of stu-
dents, and are gradually gaining popularity and widespread
use in colleges and universities around the world. Online
learning management systems support teaching and learning
activities by providing access to course content, delivering
assessments, and allowing online communication and col-
laboration among teachers and students. Moreover, these
systems hold a great deal of learnersdata that can possibly
reveal their online learning behaviors. Combining the
learning log data produced by these systems and data from
student information systems provide opportunities for aca-
demic institutions to apply business intelligence and ana-
lytics in order to improve their services as well as student
outcomes and retention [2].
The study of [3] imparted that with the aid of analytical
systems, academic institutions nowadays are able to use a
wider scope of data analytics. Thus, several institutions have
started to embrace analytics to drive business goals, and
address strategic management challenges of teaching and
learning, cost reduction, and organizational efciency and
productivity [4]. These institutions have used data analytics
to monitor and measure large amounts of learnersinfor-
mation that are produced by information systems, and gen-
erate data trends that are useful in the strategic decision
making [5]. They utilized student information to assess
learning progress, improve the student experience, predict
academic performance, and identify potential teaching and
learning issues [6]. Furthermore, the study of [7] reported
that there are two core analytic concepts, namely academic
analytics and learning analytics, which operates on the meso
layer and micro layer of an organization, respectively.
A. S. Halibas (&)B. Sathyaseelan M. Shahzad
Gulf College, Muscat, Oman
e-mail: alrence@gulfcollege.edu.om
©Springer Nature Switzerland AG 2019
A. Al-Masri and K. Curran (eds.), Smart Technologies and Innovation for a Sustainable Future,
Advances in Science, Technology & Innovation, https://doi.org/10.1007/978-3-030-01659-3_24
213
This paper discusses the use of analytics in the micro layer,
which collects and analyses data to assess and optimize
student learning.
According to [8], the essence of Scholarship of Teaching
and Learning (SoTL), otherwise known as the Nexus,isto
inform teaching by means of inquiry and produce evidence
of student learning. It is through teachersincrease
accountability, responsibility, and understanding of the
impact of their practices that enables enhancement in the
educational process. Teaching in the 21st-century classroom
is a challenging profession that requires teachers to carry out
multiple tasks other than classroom instruction. This
includes the adoption of innovative technologies and
understanding learning in online and blended learning
environments [9]. Teachers are expected to assume various
roles such that of a lecturer, supervisor, advisor, researcher,
and the likes [10]. A teacher is expected to have a good
range of ICT skills needed for effective teaching, including
substantive skills related to data analysis. In order to acquire
this critical skill set, a teacher must be developed not only to
become a technically procient individual, but also be
trained to become a skilled learning analyst who is able to
assess, interpret and explain the data, and perform suitable
actions to improve the learning process [11]. At present
times, there is a great expectation for teachers to engage in
active learning through research. This is further gravitated by
their continuing use of traditional approaches to education
that may not always address the learning needs of the new
breed of students.
Moreover, there are numerous barriers to adoption of
emerging technologies in the academic institutions, but a
signicant percentage is due to teacherslack of substantive
ICT skills which limit the adoption and integration of ICT in
their teaching and learning. There are still teachers who
prefer to use conventional teaching methods and are unac-
ceptably technology illiterate. Even with the availability of
Learning Management Systems (LMS), a signicant per-
centage of teachers are using these systems by just doing the
usual tasks of uploading lecture materials, conducting online
quizzes, and engaging students in discussion forums. Most
of them are not fully aware that they can do so much more
with the student data being produced by these systems.
Nowadays, teachers are expected to practice a
learner-centered approach to teaching via the Internet that
provides a more exible learning environment [12]. Hence,
teachers are expected to carry out the role of data analysts
who are able to customize learning in order to realize an
effective learning experience for students. Doing so requires
teachers to become learning analysts.
This paper critically reviews the teaching-research nexus
and learning analytics. Thereafter, the paper will present a
conceptual model on the utilization of learning analytics in
the teaching-research nexus. Subsequently, it examines the
role of teachers as learning analysts in addition to their roles
as researcher, and content and pedagogical expert. Likewise,
this paper identies the limitations of analytic tools and
technologies, thus, recommends skills needed for data col-
lection, analysis, and presentation. It nally concludes by
recommending actions that teachers and management can
take.
This paper provokes educators to redesign their peda-
gogical practices in order to integrate learning analytics in
their practice. This paper hopes to impact the academic
institutions by inuencing their teaching and learning prac-
tices. It further hopes to educate academic leaders and
practitioners on the usefulness of learning analytics in the
teaching-research nexus for a more data-informed educa-
tional management. Furthermore, this paper hopes to inu-
ence an institutions preparedness in rening its teacher
training and development programs that include the acqui-
sition of learning analytic skills.
2 The Teaching-Research Nexus
There exist a strong integration and positive relationship that
links research and teaching [13]. The Teaching-Research
Nexus draws on several approaches and/or dimensions that
include learning through research that engages students in
research work, research-led teaching that uses research to
inform teaching, research on teaching that looks at the
effectiveness of teaching and learning using research for
continual improvement, teaching-informed research that
stimulates research ideas to assess specic teaching strate-
gies and approaches and evaluate student learning experi-
ences, learning how to do research that promotes a
community of academic researchers, and so on. Nonetheless,
the conduct of research into student learning to inuence
teaching is the focus of this paper.
Teachers perform research that looks into their teaching
and learning effectiveness by collecting and analyzing rele-
vant student data, which includes academic performance and
learning behavior [14]. These data are extremely helpful for
teachers so that they can understand their students better and
make more informed evidence-based decisions to improve
the learning outcomes and gauge the effectiveness of their
teaching. Teachers must have access to student data that they
need for their scientic inquiry to gain insights into the
student experiences and tailor their instruction to meet their
needs. Additionally, teachers are encouraged to practice
evidenced-based teaching. Doing such necessitates teachers
to engage in scholarly teaching that systematically analyzes
evidence of student learning through research.
Accordingly, the ndings of several educational resear-
ches that focus on student learning and experience have
helped enhance pedagogical practices of teachers. Moreover,
214 A. S. Halibas et al.
these researches have also been valuable in understanding
the complex nature of learners, which teachers must be
aware of so that they can give timely feedback to students.
Thus, teachers need to do more than facilitating knowledge
transfer and acquisition; they need to be effective educators
who are active in research.
On the other hand, academic institutions are challenged to
create communities of inquiry and foster the philosophy of
continuous improvement [15]. The management should
provide an environment that promotes academic inquiry on
student learning to improve learning and teaching practices
[16]. The next section discusses the importance of data
analytics in the teaching-learning nexus.
3 Learning Analytics
In order to keep pace with the digital revolution and the
exponential growth of data, numerous academic institutions
have started to adopt learning analytics and use the data
produced by their information systems, learning manage-
ment systems, and other digital learning environments to
efciently deliver teaching and effectively facilitate learning.
Learning Analytics (LA) is an emerging eld of study
brought about by Technology Enhanced Learning (TEL) and
uses techniques from related elds of study, including
Educational Data Mining (EDM), academic analytics, busi-
ness intelligence, and web analytics [17]. Learning analytics,
which is a combination of statistical analysis and predictive
modelling, enables academic institutions to systematically
and quickly gather, analyze, and distribute results to relevant
academic stakeholders. The study of [15]denes analytics as
the use of data, statistical analysis and explanatory and
predictive models to gain insights and act on complex
issues. Analytics is also dened as the application of
analytic techniques to analyze educational data, including
data about learner and teacher activities to identify patterns
of behavior and provide actionable information to improve
learning and learning-related activities [18].
Learning Analytics involve analysis of learnersinfor-
mation to better inform students regarding their perfor-
mance. Likewise, it provides teachers with insights that are
necessary to improve learning quality as well as inuence
academic decisions of institutions by providing data-driven
reports [19]. Furthermore, several authors claimed that
learning analytics support learnersacademic experience,
performance, and achievement [20], and helps teachers and
academic institutions understand and predict learnersneeds
and demands, performance and retention [21,22]. The
teachersinvolvement in learning analytics is essential,
especially in developing personalized learning mechanisms
that address students-at-risk. Analytics can improve student
performance [23], provide teachers with insights on the
effectiveness of their pedagogical approaches [24], and the
link between these two [25]. Likewise, analytics aid teachers
in identifying students at risk of failure, and enable teachers
to customize the teaching content and provide appropriate
educational opportunities.
Teachers collect various data that are produced by stu-
dents from different activities and platforms such as log les,
online test results, social interactions, discussion forums,
course material downloads, and other related activities that
assess the students learning and these data are combined
with studentsdemographic data for data analytics. Addi-
tionally, these data are gathered near to real-time, analyzed
and carefully interpreted, and serve as a basis for interven-
tion programs. The teachers utilized these analytic insights to
understand and quickly respond to their learnersneeds,
apply appropriate teaching and learning strategies, and pro-
vide immediate educational support [26].
4 The Integration of the Nexus and Learning
Analytics
The conceptual model, as shown in Fig. 1, presents the
Learning Analytics-based Teaching-Research Nexus, which
is drawn from the focused literature review on
Teaching-Research Nexus and Learning Analytics men-
tioned beforehand. This paper also referred [25]s 5-step
model of learning analytics that describes how data is cap-
tured, reported, predicted, acted and rened. Similarly, this
paper also referenced [27]s combinatorial concept of
Learning Analytics and action research.
In the given model, the application of learning analytics
in the Teaching-Research Nexus is viewed as an iterative
process that improves teaching and learning. It usually starts
with teaching and learning problem identication of the
teacher. As in another case, it may start with data extraction,
analysis, and presentation to examine trends and patterns as
regards student learning behaviors. The next cycle proceeds
to the development and implementation of content, tech-
nology, and pedagogical solution, which comprise of goals,
success indicators, timelines, and benchmarks, to address the
teaching and learning problem. The cycle continues as these
programs are evaluated for their effectiveness and repeated
as necessary.
Student learning and academic outcomes are enhanced in
the teaching-research nexus where teaching and learning
practices are rened as a result of research. The model
demonstrates the critical role of the teacher who identies a
teaching or learning issue and conducts a scientic investi-
gation or action research to test his/her research question(s).
The start point in the LA-based Teaching-Research Nexus
can happen anywhere in the cycle. Take for instance, a
teacher may extract and analyze data from LMS, MIS and
Learning Analytics: Developing a Data-Centric 215
other sources of student information to validate his/her
research hypothesis. The result of a teachers research may
transform teaching and learning practices through appropri-
ate intervention programs that inuence innovation in con-
tent, pedagogical and/or technological approaches. In a
sample scenario wherein a teacher has a research question on
whether online mock exams contribute to studentsacademic
performance. The teacher needs to determine if students who
regularly practice for the exam scored better than those who
did not. Through the research result, a teacher is informed on
the impact of mock exams to student learning. The teacher
will use the result as a basis in formulating suitable educa-
tional programs and mechanisms aimed at the individual,
departmental, and institutional levels. The cycle continues
toward assessing the effectiveness of the new educational
approach. In a different scenario, a teacher can collect and
analyze of student data to determine learning trends and
patterns. This will enable the teachers to understand learning
behavior so that appropriate educational interventions are
applied. Again, the cycle continues towards evaluating the
effectiveness of the intervention program.
4.1 Limitations of Learning Analytics Tools
As new educational technologies emerge every second,
teachers must be able to innovate and utilize data analysis
tools and technologies to inform their teaching. Teachers use
Virtual Learning Environments (VLEs) in uploading teach-
ing materials, conducting exam drills and communicating
with students online through discussion forums and email
facilities. Most VLEs provide a dashboard for teachers to
manage course content, engage and interact with students in
a learning process. The VLEs and other learning manage-
ment systems are now integrated with add-on features that
track individual learners performance by measuring users
online behavior, assignment submission rate, utilization of
learning materials, participation in discussion forums and
exams, and so on. There are also several LA toolkits for
teachers that have been designed and implemented to help
institutions visualize relevant data and evaluate their
technology-enhanced teaching and learning practices. As an
example, [28] designed and implemented an exploratory
Learning Analytics Toolkit (eLAT) that enable teachers to
Fig. 1 Learning analytics-based teaching-research nexus concept
216 A. S. Halibas et al.
analyze and correlate studentslearning object usage, user
properties, user behavior and assessment results with an aim
to improve teaching and learning and identify appropriate
intervention programs. In addition, Purdue Universitys
Course Signals is an early intervention solution that analyses
student performance and predicts students at risk [23] using
44 indicators in their predictive model. The courses that used
this tool showed improvement in student performance [29].
Similarly, IBM SmartCloud for Education offers predictive
analytics to get real-time insights of student performance.
Likewise, Blackboard Analytics and Moodle LA plugins are
some of the online learning platforms with built-in analytics
tools that provide learning indicators. Blackboard, for
instance, provides a platform for improving the instructional
design and presents teachers with reports that show trends
that affect studentsachievements. It also helps teachers
identify struggling learners, understands relationships
between individual graded items and course grades, and
offers linguistic analysis and visualizations. The Moodle LA
plugins measure the student engagement through its report-
ing tools.
Unlike traditional approaches to evaluating and analyzing
learning, there is a massive amount of data that teachers can
use to support their research questions. LA toolkits collect
and analyze student data in this regard; however, most
monitoring tools and reports generated by VLEs have pre-
dened indicators and key metrics which are not customized
to a teachers research question(s). Hence, teachers can only
use the limited data available from VLEs which might not be
entirely useful to solve the learning issues. Furthermore, [30]
revealed that the available analytical tools, however
sophisticated, are not sufcient to answer the questions of
teachers. They maintained that the utilization of learning
analytics is merely a part of a larger process of academic
management, and institutions should also consider organi-
zational culture, practices, policies, technology infrastructure
in order to achieve academic success. Their nding is sup-
ported in the study of [29] that revealed the shortcomings of
LA toolkits and the lack of teachersinvolvement in the
design process of LA tools. In this regard, it is necessary that
teachers are equipped with the skills needed for research and
data analysis. Dependence on VLEs to provide them the
necessary information can only do so much for them. Nev-
ertheless, academic institutions need to identify the appro-
priate analytics solution and support the professional
development of teachers.
4.2 The Teachers as Learning Analysts
A data analyst is a professional who is able to lter and
produce meaningful information from a massive amount of
data and conduct a thorough data analysis and interpretation
of these data and present these in a meaningful way. The
teachers, who act as data workers or data analysts, have
always been analyzing data pertaining to how their students
learn especially when evaluating and reporting assessments.
They have unknowingly played the role of data analysts, or
better known as learning analysts, in an academic context.
Teachers have long been using learnersdata to monitor and
improve student learning for educational enhancement
and/or remedial action. Regrettably, some teachers often use
intuition rather than informed knowledge on handling stu-
dent data for academic judgment. To a signicant extent, this
practice has its benets; however, academic decisions can be
further improved if teachers have the right knowledge and
skills to utilize analytical systems in their decision-making.
The following items describe the essential skills for a
Learning Analyst.
Database Skills. Teachers should be able to know basic
database concepts such as information retrieval and data
warehousing. Furthermore, they should be able to utilize
basic database programs like MS Access that allows them to
create tables, store and retrieve data and most importantly,
query data. An ambitious teacher, perhaps an IT teacher,
might be able to query and retrieve data from more
sophisticated databases like MS SQL. More so, this teacher
might write computer programs that feed the data set to
machine learning algorithms, thereby, having better grasps
of the results for a more accurate interpretation.
Data Mining and Statistics Skills. Some data analyses
are derived from statistics. It has been observed that most
teachers are dependent on mathematical expert or statistician
to generate statistical models for them. Having strong sta-
tistical knowledge allows teachers to perform descriptive or
inferential analysis of their learnersdata. Descriptive
statistics produce the quantitative analysis of data such as the
mean, median, and mode, on the other hand, inferential
statistics produces inferences of data using regression anal-
ysis, parametric and non-parametric tests [19]. The data
extracted from LMS may be analyzed by statistical software
packages like Excel, SPSS, Matlab, Mathematica and the
likes. These are analytics tools that provide a statistical
summary that recognized data congurations and patterns
and predict future events to improve educational outcomes
[31]. Teachers must know more than descriptive statistics,
they must have ground knowledge on inferential statistical
methods, especially regression analysis, which is a foremost
statistical approach being used in data mining [32]. More-
over, teachers need to learn the basics of Knowledge Data-
base Discovery (KDD) and other data mining concepts that
include clustering, classication, association rule mining,
social network analysis as well as its dynamics with statistics
using regression analysis for modelling relationships [28].
Presentation Skills. Unorganized student data is mean-
ingless and useless to teachers who possess limited
Learning Analytics: Developing a Data-Centric 217
knowledge in the use of learning analytic tools; therefore,
data visualization tools are necessary to support them. These
tools allow teachers to make sense of the data through a
logical organization. In a VLE, teachers are given dash-
boards that show analyzed data through graphical visual-
izations. The teachers will interpret the graphical
information and evaluate whether these data have an effect
on their studentslearning. Such is not the case when
teachers are confronted with teaching and learning issues by
which a VLE cannot provide data visualization indicators.
Hence, teachers must be able to garner some insights into the
learning experience of students, extract data from the LMS,
feed to the statistical software, interpret its results and
effectively communicate it to the intended audience.
Teachers must have the essential problem-solving skills,
analytical skills, and creative presentation skills to effec-
tively communicate their research ndings. They are
expected to design computer-based presentations using
commonly utilized tools such as MS Excel and MS Pow-
erpoint in order to make the data understandable to relevant
stakeholders. Conversely, they can use high-end presentation
tools that make use of interactive visualization to create
online dashboards like Javascript.
5 Conclusion and Recommendation
This paper proposed an LA-based Teaching-Research con-
cept that models a data-driven approach to decision-making
in teaching and learning practices. It is interesting to see how
academic institutions will implement this model to better
support student learning and improve academic outcomes.
Furthermore, this paper presented a need for academic
institutions to support teachers by investing in teacher
training and professional development programs on learning
analytics specically focused on the acquisition and pro-
ciency of database, statistics, and data visualization and
presentation skills. This paper recommends that academic
institutions should take an active stance on the application of
analytics and evidence-based approach to teaching and
learning. Specically,
Teachers should:
Utilize and/or improve their research and analytic skill-
set; and
Perform evidence-based research using appropriate
learning analytic methods.
Management should:
Assess an institutionsreadiness for adoption of learning
analytics;
Assess the skill set of teachers and check their pro-
ciency in data analytics through an institutional survey;
Gauge the implementation of their research-teaching
nexus as regards the conduct of research to inform
teaching;
Intensify the teaching-research nexus practice to include
learning analytics;
Acquire the necessary infrastructure, tools, and software
that are needed to implement learning analytics;
Provide professional development courses for teachers in
the use and practice of learning analytic tools in order to
develop their teaching practice; and
Require teachers to utilize the analytics data that are
embedded in VLEs.
References
1. Beetham, H., Sharpe, R.: Rethinking Pedagogy for a Digital Age:
Designing for 21st Century Learning. Routledge, UK (2007)
2. Dietz-uhler, B., Hurn, J.E.: Using Learning Analytics to Predict
(and Improve) Student Success: A Faculty Perspective. J. Interact.
Online Learn. 12,1726 (2013)
3. Mônaco De Moraes, E., Terra, M., Silva, D., Souza, M.C.: Models
to implement learning analytics: a literature review. In: POMS
27th Annual Conference, Florida (2016)
4. Mih, C.M.: Learning analytics solution for building personalized
quiz sessions. In: IEEE 2017 18th International Carpathian Control
Conference (ICCC), pp. 140145, Sinaia, Romania (2017)
5. Mattingly, K.D., Rice, M.C., Berge, Z.L.: Learning analytics as a
tool for closing the assessment loop in higher education. Knowl.
Manage. E-Learn. 4, 236247 (2012)
6. Johnson, L., Smith, R., Willis, H., Levine, A., Haywood, K.: The
2011 Horizon Report (2011)
7. Sergis, S., Sampson, D.G.: School analytics: a framework for
supporting school complexity leadership. In: Competencies in
Teaching, Learning and Educational Leadership in the Digital
Age: Papers from CELDA 2014, pp. 79122 (2016)
8. Hutchings, P., Huber, M.T., Ciccone, A.: Why the Scholarship of
Teaching and Learning Matters Today. The Scholarship of
Teaching and Learning Reconsidered: Institutional Integration
and Impact, pp. 123 (2011)
9. Lodge, J.M., Corrin, L.: What data and analytics can and do say
about effective learning. npj Sci. Learn. 2, 5 (2017)
10. Grant, K., Fitzgerald, S.: The nexus between teaching and
research: a qualitative study using two focus group on academic
information systems teachers. J. Bus. Res. 3,3756 (2005)
218 A. S. Halibas et al.
11. Siemens, G., Baker, R.S.J.D.: Learning analytics and educational
data mining. In: Proceedings of 2nd International Conference on
Learning Analytics and Knowledge LAK 12, p. 252 (2012)
12. Zhang, D., Nunamaker, J.F.: Powering e-Learning in the new
millennium: an overview of e-Learning and enabling technology.
In: Information Systems Frontiers, pp. 207218 (2003)
13. De Witte, K., Rogge, N., Cherchye, L., Van Puyenbroeck, T.:
Economies of scope in research and teaching: a non-parametric
investigation. Omega (United Kingdom) 41, 305314 (2013)
14. Baldwin, G.: The Teaching-Research Nexus. Melbourne (2005)
15. Bichsel, J.: Analytics in higher education: benets, barriers,
progress, and recommendations. Educ. Cent. Appl. Res. 131
(2012)
16. Killion, J.: Coaches help mine the data. National Staff Develop-
ment Council (2008)
17. Bienkowski, M., Feng, M., Means, B.: Enhancing Teaching and
Learning Through Educational Data Mining and Learning Ana-
lytics: An Issue Brief. Ofce of the Educational Technology, US
Department of Education, Washington, D.C., (2012)
18. Van Harmelen, B.M., Workman, D.: Analytics series analytics for
learning and teaching. CETIS Anal. Ser. 1,141 (2012)
19. Dawson, S., Mcwilliam, E., Tan, J.P.: Teaching smarter: how
mining ICT data can inform and improve learning and teaching
practice. In: Proceedings ASCILITE, pp. 221230 (2008)
20. Clow, D.: An overview of learning analytics. Teach. High. Educ.
18, 683695 (2013)
21. May, T.A.: Analytics, university 3.0, and the future of information
technology. Educ. Rev. 46, 66 (2011)
22. Kellen, D.A.: Utilizing technology as leverage for instructional
improvement in the classroom (2014). http://ovidsp.ovid.com/
ovidweb.cgi?T=JS&PAGE=reference&D=psyc11&NEWS=N&AN
=2014-99070-439
23. Arnold, K.E., Pistilli, M.D., Arnold, K.E.: Course signals at
Purdue: using learning analytics to increase student success. In:
2nd International Conference on Learning Analytics Knowledge,
pp. 25 (2012)
24. Greller, W., Drachsler, H.: Translating learning into numbers: a
generic framework for learning analytics. Educ. Technol. Soc. 15,
4257 (2012)
25. Campbell, J.P., DeBlois, P.B., Oblinger, D.G.: Academic analyt-
ics. Educ. Rev. 42,4057 (2007)
26. Johnson, L., Adams, S., Cummins, M.: NMC Horizon Report:
2012 Higher Education Edition (2012)
27. Dyckhoff, A.L., Lukarov, V., Muslim, A., Chatti, M.A.,
Schroeder, U.: Supporting action research with learning analytics.
In: Proceedings of the Third International Conference on Learning
Analytics and KnowledgeLAK 13, pp. 220229 (2013)
28. Dyckhoff, A.L., Zielke, D., Bültmann, M., Chatti, M.A.,
Schroeder, U.: Design and implementation of a learning analytics
toolkit for teachers. Educ. Technol. Soc. 15,5876 (2012)
29. Scheffel, M., Drachsler, H., Stoyanov, S., Specht, M.: Quality
indicators for learning analytics. J. Educ. Technol. Soc. 17,
124140 (2014)
30. Ahadad, S., Arnold, K., Baron, J., Bayer, I., Brooks, C., Little, R.,
Rocchio, R., Shehata, S., Whitmer, J.: The Predictive Learning
Analytics Revolution: Leveraging Learning Data for Student
Success. EDUCAUSE Center for Analysis and Research (ECAR)
(2015)
31. Ferguson, R.: Learning analytics: drivers, developments and
challenges. Int. J. Technol. Enhanc. Learn. 4, 304317 (2012)
32. Benjamini, Y., Leshno, M.: Statistical methods for data mining.
Data Min. Knowl. Discov. Handb. 523540 (2010)
Learning Analytics: Developing a Data-Centric 219
Measuring Ciphertext Randmoness Using
Die Hard Randomness Index
Mohammed M. Alani
Abstract
In this paper we present a novel quantitative measure of
randomness based on Diehard randomness tests. The
proposed method relies on the results of diehard tests in
calculating a randomness index; namely Diehard Ran-
domness Index (DRI). The presented index can be helpful
in measuring randomness in bit sequences generated from
pseudo-random and random number generators to iden-
tify which has better randomness properties. The paper
also show sample calculations of the proposed index to
measure randomness of ciphertext resulting from encryp-
tion using block-ciphers.
Keywords
Random Randomness test Ciphertext
Encryption Diehard tests Pseudo-random
1 Introduction
Random numbers have been the subject of study for a very
long time. Different researchers have worked on generating,
testing, and employing random numbers over the past dec-
ades. D. H. Lehmer have identied random sequences as a
vague notion embodying the ideas of a sequence in which
each term is unpredictable to the uninitiated and whose digits
pass a certain number of tests, traditional with statisticians
and depending somewhat on the uses to which the sequence
to be put[1].
In an empirical denition, random numbers can be
identied as sequences of real numbers generated either as
physical data obtained from random experiment or as a
computer-generated sequence produced by a deterministic
program.
In general, random sequences are generated from two
types of generators; random numbers generators, and
pseudo-random number generators. Random number gen-
erators employ a non-deterministic source along with a
processing function to produce a random sequence.
Pseudo-random number generators use one or more seeds
with a deterministic function to generate the sequence [2].
Throughout the years, many statistical testing suites were
developed to test the randomness of sequences. In 1995,
Diehard randomness tests battery was introduced by Prof.
Marsaglia [3]. In 2002, Marsaglia and Tsang introduced
three tests as difcult-to-pass. They claimed that a
sequence that passes these tests is highly likely to pass all of
the diehard tests [4]. These three tests were referred to as
Dieharder tests in some literature. In 2010, Alani introduced
a new way of interpretation of Diehard test results with
simplied graphical presentation [5].
In 1998, Crypt-XS tests suite was created by a group of
researchers at the Information Security Center in Queensland
University of Technology, Australia [6]. National Institute of
Standards and Technology (NIST) issued a detailed report
on randomness tests in 2001 and later a revised version in
2010 that was the product of collaborative effort of Com-
puter Security Division and Statistical Engineering Division
[7,8]. All of these testing suites were used to test random
and pseudo-random number generators of cryptographic
applications.
Other researchers also tackled the randomness testing
topic and provided new tests other than the three mentioned
above. Soto, who was one of the NIST group working on
[8], published a paper about statistical testing of random
number generators. In [9], Soto addresses issues like statis-
tical testing suites, evaluation frameworks, and the inter-
pretation of or results for testing randomness or random
number and pseudo-random number generators.
In [10], a comparison was made between the theoretical
of distances between consecutive n-tuples drawn in an
n-dimensional space, to the actual distances produced by a
specic random number generator to devise a randomness
M. M. Alani (&)
Khawarizmi International College, Abu Dhabi,
United Arab Emirates
e-mail: m@alani.me
©Springer Nature Switzerland AG 2019
A. Al-Masri and K. Curran (eds.), Smart Technologies and Innovation for a Sustainable Future,
Advances in Science, Technology & Innovation, https://doi.org/10.1007/978-3-030-01659-3_25
221
test. In [11], a framework for a uniform test for algorithmic
randomness over a uniform space was introduced. The paper
tackled several questions related to Bernoulli distributions
and arbitrary distributions.
In 2006, randomness tests based on randomness walk
were introduced in [12]. The paper focused on statistical
properties of one-dimensional random walks. Three new
randomness tests were proposed based on probabilities
related to excursions, height and expansion of random
walks.
A software library for empirical testing of random number
generators was introduced in [13]. The software, written in
ANSI C, offered a collection of utilities for empirical statis-
tical testing of uniform random number generators. The
software included implementation of some classical statisti-
cal tests along with several other tests including original ones.
In 2010, research was published on the use of Bells
Theorem certication for random numbers in [14]. Although
the paper did not focus on randomness testing, it is
considered an important ground for further research in ran-
dom number generation. The paper introduced a method of
generating 42 new random numbers with 99% coincidence.
A new test for randomness was introduced in [2]. The
proposed test focuses on determining the number of different
xed length patterns that appear along with the binary
sequence. The next section discusses the details of Diehard
tests as this paper introduces a method of calculating a
randomness index; namely Diehard Randomness Index. This
method depends on the counts of Failure, Doubt, and
Success points identied in [5].
2 Diehard Randomness Tests
Diehard tests were introduced by Marsaglia as a software
package to simplify the implementation on the test users.
The battery of tests includes twelve tests. Some of these tests
are repeated with different parameters. The main 12 tests are:
1. Birthday spacing: When choosing random points on a
large interval, the spacings between the points should
be asymptotically Poisson distributed. The test name
was taken from birthday paradox introduced in [15].
2. Overlapping permutations: This test is done through
analyzing sequences of ve consecutive random num-
bers. The 120 possible orderings should occur with
statistically equal probability.
3. Ranks of matrices: This test is done by selecting some
number of bits from some number of random numbers
to form a matrix over {0,1}, then determining the rank
of the matrix. The count of the ranks should follow a
certain distribution.
4. Monkey tests (bit stream tests): This test takes its name
from the innite monkey theorem [16]. The test is
performed by treating sequences of some number of
bits as wordsand counting the overlapping words in
a stream. The number of wordsthat dont appear
should follow a known distribution.
5. Count the 1s: The test is done through counting the 1
bits in each of either successive or chosen bytes and
converting the counts to letters, and counting the
occurrences of ve-letter words.
6. Parking lot test: Randomly place unit circles in a
100 100 square. If the circle overlaps an existing
one, try again. After 12,000 tries, the number of suc-
cessfully parkedcircles should follow a certain nor-
mal distribution.
7. Minimum distance test: Randomly place 8000 points in
a 10,000 10,000 square, and then nd the minimum
distance between the pairs. The square of this distance
should be exponentially distributed with a certain
mean.
8. Random spheres test: Randomly choose 4000 points in
a cube of edge 1000. Center a sphere on each point,
whose radius is the minimum distance to another point.
The smallest spheres volume should be exponentially
distributed with a certain mean.
9. The squeeze test: Multiply 231 by oat random integers
on [0,1) until you reach 1. Repeat this 100,000 times.
The number of oats needed to reach 1 should follow a
certain distribution.
10. Overlapping sums test: Generate a long sequence of
random oats on [0,1). Add sequences of 100 consec-
utive oats. The sums should be normally distributed
with characteristic mean and sigma.
11. Runs test: Generate a long sequence of random oats
on [0,1). Count ascending and descending runs. The
counts should follow a certain distribution [17].
12. The craps test: Play 200,000 games of craps, counting
the wins and the number of throws per game. Each
count should follow a certain distribution.
All of these tests are aimed at testing randomness. Normal
or close-to-normal distributions are expected from all the
counts produced by these tests. In this context, the chi-squared
goodness-to-t is used to produce p-values that should be
uniform on [0,1). The p-values obtained by p¼FXðÞ, where
Fis the assumed distribution of the sample random variable X;
often normal. In fact, the assumed Fis nothing but an
asymptotic approximation. In this asymptotic approximation,
the t will be worst in the tails. Hence, a p-value near 0 or 1 is
an indicator of deviation from randomness.
In some tests, more than one p-value was produced. In
some of these tests, a Komogorov-Smirnov (KS) test was
222 M. M. Alani
run on the multiple p-values to yield a single p-value as an
indicator of randomness [18].
As it was indicated in [4], Birthday spacing test and
monkey tests are considered more important than the others.
Thus, the results of these tests are given in more details as
compared to other tests like Count the 1s. The number of
p-values produced from each test and the one used in the
proposed index can be different based on the importance of
the test. Table 1shows the number of p-values the index
calculation will employ.
3 Interpretation of Test Results
In this paper, we will adopt the interpretation introduced in
[5]. The 47 p-values are distributed over three distribution
areas in the range [0,1). The range will be divided into three
areas; Success Area, Doubt Area, and Failure Area. Table 2
shows the limits of these areas.
This interpretation indicates that have more p-values in
the failure area indicates divergence from randomness
properties, while having more p-values in the success area
indicates better randomness properties. The ranges identied
in Table 2can be expressed graphically as in Fig. 1.
The number of p-values produced by each test can be
thought of as the weight of the text and how it affects the nal
result. For example, Monkey test is considered of highest
effect on the nal result because it produces 20 p-values. In
the second degree of effect on the nal result, the Birthday
Spacing test produces 9 p-values, and so on.
4 Diehard Randomness Index
Based on the previous section, we will use the following
naming convention:
sas the number of p-values in the success area
das the number of p-values in the doubt area
fas the number of p-values in the failure area
DRI as the Diehard Randomness Index
We will start from a simple expression:
DRI ¼sf
This expression is written with the notion that more
p-values in the safe area mean better randomness properties,
while more p-values in the failure area mean worse
randomness properties.
Table 1 Number of p-values
used from diehard tests Test name Number of p-values
Birthday spacing 9
Overlapping permutations 2
Binary rank 3
Count the 1s2
3D spheres 1
Squeeze 1
Overlapping sums 1
Craps 2
Min. distance 1
Parking lot 1
Monkey test 20
Runs 4
Total number of p-values 47
Table 2 Success, doubt, and
failure areas ranges Area Range
Failure 0 < p-value 0.1
0.9 p-value 1
Doubt 0.1 < p-value 0.25
0.75 p-value < 0.9
Success 0.25 < p-value < 0.75
Measuring Ciphertext Randmoness Using Die Hard Randomness Index 223
Now, we will use dto dampen the DRI expression
because more points in the doubt area mean less effect of the
success points.
DRI ¼sf
d
To cancel the possibility of division by zero, we will add
one to the denominator,
DRI ¼sf
dþ1
As we have 47 p-values, the maximum possible value of
DRI is now 47, and the minimum is 47. To shift the index
to positive value, 47 will be added to it,
DRI ¼sf
dþ1þ47
To re-scale the index in the area (0,1), it will be divided
over its current maximum value, which is 94,
DRI ¼
sf
dþ1þ47
94
DRI ¼sf
94 dþ1ðÞ
þ47
94
Hence, the Diehard Randomness Index can be calculated by
DRI ¼sf
94 dþ1ðÞ
þ0:5ð1Þ
This index can be used in comparing the randomness
properties of different sequences. The higher the index value is,
the better randomness properties the sequence has. On the other
hand, the lower the index is, the worse randomness properties
the sequence has. Form the index equation above, the mini-
mum value of the index is 0, while the maximum value is 1.
5 Sample Calculations
Since most of the randomness tests focus on the randomness
properties in cryptographic applications, we will use data
resulting from block-cipher encryption as an example of the
index calculation. This test data was taken from [5].
5.1 Plaintext
A sample test le was created from combining .doc, .avi, and
.mp3 les to compose the plaintext le for the experiment.
The le was formatted to comply with the Diehard test
requirements. The nal test sample size was around
13 MB. Table 3shows the resulting p-values of the plaintext
le and Fig. 2shows the graphical representation of
the p-values according to the description mentioned in
Sect. 3.
5.2 Ciphertext of 3DES
The sample le was encrypted using 3DES algorithm. The
168-bit key used in encryption was generated using a
pseudo-random number generator. Table 4shows the
resulting p-values of the ciphertext le and Fig. 3shows the
graphical representation of these p-values.
5.3 Ciphertext of AES
The sample le was encrypted using AES algorithm. The
256-bit key in the encryption was generated using a pseudo-
random number generator. Table 5shows the resulting
p-values of the ciphertext le ad Fig. 4shows the graphical
representation of these p-values.
5.4 DRI Calculation
Table 6shows the summary of the p-values of plaintext,
3DES-encrypted ciphertext, and AES-encrypted ciphertext
and the distribution of these p-values over safe, doubt, and
failure areas.
Using Eq. (1), we receive the following result.
DRIplaintext ¼047
94 0þ1
ðÞ
þ0:5¼47
94 þ0:5¼0
Fig. 1 Failure, doubt, and success areas [5]
224 M. M. Alani
Table 3 Diehard tests results for plaintext [5]
Test name p-value Test name p-value
Birthday spacing 1.000000 Monkey test 1.000000
1.000000 1.000000
1.000000 1.000000
1.000000 1.000000
1.000000 1.000000
1.000000 1.000000
1.000000 1.000000
1.000000 1.000000
1.000000 1.000000
Overlapping permutations 1.000000 1.000000
1.000000 1.000000
Binary rank 1.000000 1.000000
1.000000 1.000000
1.000000 1.000000
Count the 1s 1.000000 1.000000
1.000000 1.000000
3D spheres 1.000000 1.000000
Squeeze 1.000000 1.000000
Overlapping sums 1.000000 1.000000
Craps 1.000000 1.000000
0.999899 Runs 1.000000
Min. distance 1.000000 1.000000
Parking lot 1.000000 1.000000
1.000000
Fig. 2 p-values of plaintext le
Measuring Ciphertext Randmoness Using Die Hard Randomness Index 225
DRI3DES ¼18 7
94 22 þ1ðÞ
þ0:5¼11
2162 þ0:5
¼0:50508788
DRIAES ¼25 9
94 13 þ1ðÞ
þ0:5¼19
1316 þ0:5
¼0:51443768
6 Discussion
The plaintext randomness index was zero as expected,
because the le was not a generated using a random or a
pseudo-random generator. A DRI of zero means that the
sequence does not have any randomness properties.
The 3DES-encrypted ciphertext produced a DRI of
0.5050. This means that this sequence does have some
randomness properties, but it did not satisfy most of the
tests. In general, a DRI value of less than 0.5, means that
sequence is closer to uniform than it is to random. Hence, the
DRI
3DES
cannot be categorized as very good.
The AES-encrypted ciphertext produced a DRI of 0.5144.
This means that this sequence has better randomness properties,
as compared to 3DES, but also did not satisfy most of the tests.
Generally, when a sequence scores a DRI of 0.5, it means
that it has equal number of p-values in the success area and
in the failure area. This indicates that the sequence in equal
distance between being random and uniform. A DRI value
less than 0.5 indicates that the sequence is closer to uniform
than it is to random, while a DRI value more than 0.5
Table 4 Diehard tests results for
3DES-encrypted le [5]Test name p-value Test name p-value
Birthday spacing 0.742890 Monkey test 0.91658
0.893112 0.07795
0.559102 0.78356
0.850000 0.16944
0.104397 0.43842
0.620756 0.93809
0.267198 0.03979
0.748315 0.24436
0.856381 0.76818
Overlapping permutations 0.780205 0.94594
0.145390 0.75295
Binary rank 0.389660 0.85963
0.780205 0.25775
0.159133 0.57658
Count the 1s 0.599488 0.65755
0.305525 0.16651
3D spheres 0.928702 0.75736
Squeeze 0.542369 0.86222
Overlapping sums 0.834684 0.28326
Craps 0.523433 0.18585
0.023614 Runs 0.310885
Min. distance 0.541504 0.752972
Parking lot 0.238872 0.819962
0.298053
Fig. 3 p-values for 3DES-encrypted le
226 M. M. Alani
Table 5 Diehard tests results for AES-encrypted le [5]
Test name p-value Test name p-value
Birthday spacing 0.764805 Monkey test 0.64197
0.310685 0.76317
0.333483 0.18398
0.687379 0.96262
0.036211 0.31987
0.420004 0.88587
0.168696 0.03091
0.767771 0.81122
0.267583 0.46618
Overlapping permutations 0.530497 0.28484
0.999037 0.14852
Binary rank 0.326572 0.41916
0.385797 0.70826
0.318936 0.55267
Count the 1s 0.983250 0.99172
0.301962 0.67958
3D spheres 0.441769 0.81185
Squeeze 0.876453 0.25926
Overlapping sums 0.012551 0.05466
Craps 0.787202 0.68707
0.359208 Runs 0.377076
Min. distance 0.173347 0.613504
Parking lot 0.861114 0.587110
0.037080
Fig. 4 p-values for AES-encrypted le
Table 6 Number of p-values in
success, doubt, and failure areas Data type fds
Plaintext 47 0 0
3DES-encrypted 7 22 18
AES-encrypted 9 13 25
Measuring Ciphertext Randmoness Using Die Hard Randomness Index 227
indicates that the sequence is closed, in properties, to random
than it is to uniform.
7 Conclusions
In this paper, we have introduced a quantitative measure of
randomness based on Diehard battery of randomness tests.
The randomness index, named Diehard Randomness Index,
can be useful in comparing the randomness of random
sequences generated using random-number or pseudo-
random number generators. The index resulting from the
calculation is in the area (0,1) in which the higher value
indicates better randomness properties and the lower value
indicates divergence from randomness properties.
The proposed index was calculated from plaintext, 3DES
encrypted ciphertext, and AES-encrypted ciphertext. The
calculations indicated that AES ciphertext has higher
randomness index (i.e. better randomness properties) as
compared to 3DES ciphertext.
References
1. Papoulis, A., Pillai, S.U.: Probability, Random Variables and
Stochastic Processes. McGraw-Hill, New York (2002)
2. Alcover, P.M., Guillamón, A., Ruiz, M.C.: A new randomness test
for bit sequences. Informatica 24(3), 339356 (2013)
3. Marsaglia, G.: Diehard battery of tests of randomness (1995).
[Online]. Available: http://www.stat.fsu.edu/pub/diehard/
4. Marsaglia, G., Tsang, W.W.: Some difcult-to-pass tests of
randomness. J. Stat. Softw. 7(3) (2002)
5. Alani, M.M.: Testing randomness in ciphertext of block-ciphers
using diehard tests. Int. J. Comput. Sci. Netw. Secur. 10(4), 5357
(2010)
6. I.S. Institute: Crypt-XS tests of randomness (1998). [Online].
Available: http://www.isi.qut.edu.au/resources/cryptx/
7. Rukhin, A., Soto, J., Nechvatal, J., Smid, M., Barker, E., Leigh, S.,
Levenson, M., Vangel, M., Banks, D., Heckert, A., Dray, J., Vo,
S.: A Statistical Test Suite for Random and Pseudorandom
Number Generators for Cryptographic Applications. NIST (2010)
8. Rukhin, A., Soto, J., Nechvatal, J., Smid, M., Barker, E., Leigh, S.,
Levenson, M., Vangel, M., Banks, D., Heckert, A., Dray, J., Vo,
S.: A Statistical Test Suite for Random and Pseudorandom
Number Generators for Cryptographic Applications (2001)
9. Soto, J.: Statistical testing of random number generators. In:
Proceedings of the 22nd National Information Systems Security
Conference, Virginia (1999)
10. Duggan, M.J., Drew, J.H., Leemis, L.M.: A test of randomness
based on the distance between consecutive random number pairs.
In: Proceedings of the 2005 Winter Simulation Conference (2005)
11. Gacs, P.: Uniform test of algorithmic randomness over a general
space. Theor. Comput. Sci. 341(13), 91137 (2005)
12. Doganaksoy, A., Calık, C., Sulak F., Turan, M.S.: New random-
ness tests using random walk. In: Proceedings of National
Conference on Cryptology II, Turkey (2006)
13. LEcuyer, P., Simard, R.: TestU01: a C library for empirical testing
of random number generators. ACM Trans. Math. Softw.
33(4) (2007)
14. Pironio, S., Acín, A., Massar, S., de La Giroday, A.B., Matsuke-
vich, D.N., Maunz, P., Monroe, C.: Random numbers certied by
Bells theorem. Nature 464(7291), 10211024 (2010)
15. McKinney, E.H.: Generalized birthday problem. Am. Math. Mon.
73, 385387 (1966)
16. Isaac, R.: The Pleasures of Probability. Springer, New York (1995)
17. Wald, A., Wolfwitz, J.: An exact test for randomness in the
non-parametric case based on serial correlation. Ann. Math. Stat.
14(4), 378388 (1943)
18. Soong, T.T.: Fundamentals of Probability and Statistics for
Engineers. John Wiley and Sons, Chichester (2004)
228 M. M. Alani
Medical Grade QoS Improvement Using
IEEE802.11e WLAN Protocol
LuaeA. Al-Tarawneh
Abstract
This paper describes an adaptive service differentiation
scheme for medical grade QoS over WLAN healthcare
networks. The wireless transmission of medical applica-
tions over wireless networks needs special QoS require-
ments meanwhile, IEEE802.11 Standard does not fulll
the QoS requirement yet. Enhanced Distributed Channel
Access (EDCA) of the IEEE 802.11e Standard is used to
enhance the QoS, where trafc priorities are categorized
according to their criticality. The simulation has been
performed to deliver three trafcs with different priorities.
The proposed algorithm is evaluated using NS2 simula-
tion. The simulation results shows that the medical access
categorization and the contention window control mech-
anism signicantly improve the performance of a medical
network over IEEE 802.11E. Comparison results show
signicant advantage for the new proposed scheme.
Keywords
IEEE802.11 Standard WLAN Medical network QoS
1 Introduction
Using wires to communicate various medical information
such as medical images, monitoring and diagnostic signals,
and any other information belonging to patients, require
connecting a huge number of devices and equipments in a
hospital, which leads to a massive wired communication
environment that is costly and provides a potential hazard for
patient safety [1]. In [2,3], several factors are given that
should be taken into account to provide QoS thresholds for
medical data transportation over a healthcare network
including: availability, condentiality and privacy, latency
of data delivery and support for mobility. The importance of
such factors is obvious, and in no way can it be underesti-
mated when considering the shift to using wireless networks
to provide these services.
Nowadays, wireless networks and information technolo-
gies are playing a revolutionary role in telemedicine and
e-health services. Medical applications driving the installa-
tion of wireless Local Area Networks (LANs) include
electronic medical records (EMR) updates, wireless infusion
pumps, barcode medication administration (BCMA), voice
over Internet Protocol (VoIP) and support for patient and
visitor convenience through Wi-Fi hotspots. As these
applications are served from different locations including
hospitals, ambulances, ships, and planes, the wireless com-
munication network availability and its quality for medical
information (MI) exchange are very important. So healthcare
networks should be able to convey data at any time while
ensuring the QoS for the specic healthcare applications.
In this paper, an adaptive scheme has been proposed for
the contention window (CW) of the access method of the
IEEE 802.11e standard, denoted as Enhanced Distributed
Channel Access (EDCA), where medical grade priorities of
trafc are dened according to service criticality. Adaptation
is carried out by adjusting the size of (CW) for each trafc
access category. This scheme is evaluated by simulation and
the results are compared with those obtained for conven-
tional IEEE 802.11e with and without medical grade prior-
itization. Comparison results show a pronounced advantage
for the proposed adaptive EDCA scheme.
The rest of this paper is organized as follows: In Sect. 2,I
discuss the concept of medical-grade QoS for healthcare
communication systems. In this regard, access categories are
dened according to medical criticality rather than by delay
constraint, as the case for conventional IEEE 802.11e stan-
dard. Section 3reviews the main characteristics of the IEEE
802.11e Medium Access Control (MAC) protocol, my pro-
posed adaptation scheme on (CW) is introduced in Sect. 4,
while in Sect. 5, simulation of the scheme is outlined. Per-
formance evaluations and results are presented in Sect. 6.
L. A. Al-Tarawneh (&)
Directorate of Biomedical Engineering, Royal Scientic Society
Amman, Amman, Jordan
e-mail: lu.tarawneh@gmail.com
©Springer Nature Switzerland AG 2019
A. Al-Masri and K. Curran (eds.), Smart Technologies and Innovation for a Sustainable Future,
Advances in Science, Technology & Innovation, https://doi.org/10.1007/978-3-030-01659-3_26
229
2 Medical-Grade QoS Priorities
Depending on the characteristics of physiological signals
that are taken from the patients body through special sen-
sors, they can be divided into certain types of trafc with
priorities that indicate the level of their criticality [1]. Such
trafc types include: physiological signals like ECG, EMG,
EEG, EOG, body temperature, blood pressure, and medical
image and so on; and alarm signals like heart failure,
infusion pump alert and any other telemetry type signal.
In [1], a proposed access categorization for medical grade
wireless LAN according to medical criticality is shown in
Table 1. As given in this table, alert and alarm signals are
given highest priority; meanwhile, real time streaming data
(telemetry) like monitoring patients with heart disease are
given high priority. Medical applications such as medical
images, which could be compressed and stored in local
memory with no time sensitivity, are given medium priority.
Other non medical application (such as email), are given
lowest priority.
QoS requirements for medical grade trafc in healthcare
facilities are discussed in [1,4,5].
Representative values for such QoS requirements are
given in Table 2[1]. For example, maximum allowed values
of latencies for life critical information such as alarms and
alerts should not exceed more than 200 ms, while for non
medical applications, such as guest access through medical
network, a 1000 ms latency is no problem.
It follows that WLAN healthcare networks should convey
medical information with priorities and requirements con-
sistent with the information contained in Tables 1and 2;
thereby supporting human life conditions, where an unsuc-
cessful transmission or a signicant delay would be a matter
of life and death.
3 IEEE 802.11e MAC Protocol
The legacy version of IEEE 802.11 protocol, released in
1997, operate on 2.42.5 GHz [6]. It uses Carrier Sense
Multiple Access with Collision Avoidance, (CSMA/CA) as
a medium access method. In this method, no differentiations
or priorities are assigned to different types of trafc.
Standard IEEE 802.11-2007 has incorporated the latest
IEEE 802.11e-2005 draft, as Amendment 8, for enhancing
the 802.11 MAC access methods to support Quality of
Service (QoS). This includes providing the security and
authentication mechanism, and enhancing the ability of all
the physical layers such as 802.11a and 802.11b to guarantee
parameterizing and prioritizing services. So new features are
becoming part of this standard including the access methods:
the Hybrid Coordination Function (HCF) and (EDCA) to
support new QoS applications.
EDCA is a contention based channel access method
which can provide differentiated services [6,7]. While it is
part of HCF for infrastructure networks, it may be used as a
separate coordination function for ad hoc wireless networks
[8]. The QoS supported by EDCA is provided by the
introduction of Access Categories (ACs) and other param-
eter entities. There are four ACs and four back off parameter
entities that exist in every QoS Station (QSTA). The ACs are
labeled according to the priority application such as AC_BK
(background), AC_VO (voice), AC_VI (video), and AC-BE
(best effort).
The standard denes eight User Priority (UP) values for
this trafc that are mapped to the different ACs as given in
Table 3.
Every one of those categories behaves as a single DCF
contending entity, and each entity has its own contention
parameters: CWmax [AC], CWmin [AC], Arbitration Inter
Frame Space (AIFS [AC]), and Transmission Opportunity
(TXOP) LIMIT [AC], which are announced periodically by
the Quality Access Point (QAP) via beacon frames. If those
parameters take shorter values, then the channel access delay
for the corresponding AC, will be shorter, and thus gain
higher priority to access the medium. The (AIFS)s intro-
duced by the EDCA are illustrated in Fig. 1.
This shows that the time to access the channel, when it is
sensed as idle, is congured to indicate relative priorities [7,
8].
EDCA also provides differentiation by varying the size of
the contention window (CW) depending on the i-th AC, AC
[i]. Both CWmin and CWmax are dened according to the
priority desired. The initial value for the back off counter is a
random number dened by the contention widow (CW),
similar to Legacy DCF. The contention window may be the
initial minimum size CWmin [AC].
Enhanced back off selects its counter as a random number
drawn from the interval [1, CW + 1] instead of [0, CW] as in
Legacy. However, the smaller CWmin [AC], the higher the
Table 1 Access categorization
according to medical criticality Application Criticality
AC0 Alarm signals, telemetry alarms, infusion pump alerts Highest
AC1 Real-time streaming data (telemetry, infusion pump) High
AC2 Other medical application Medium
AC3 Non-medical applications (guest access, email) lowest
230 L. A. Al-Tarawneh
priority in channel access, but collision probability increases
with smaller CWmin [AC].
While the priority differentiation mechanism used by
EDCA improves the QoS for multimedia real time trafc,
still there is room for improvement if the EDCA parameters
can be adapted to the network conditions. For example, after
a successful transmission, the backoff algorithm always
reduces the CW size to CWmin. Thus under conditions of
high channel load, this leads to more collisions, and conse-
quently a reduced QoS performance.
There exists a large body of recent research to support
service differentiation by providing different MAC parame-
ters that enabled high priority trafc to access the medium
over other trafc. One example is to use a smaller contention
window (CW) causing a smaller back off interval (BI), as
given in [9,10].
Table 2 Representative values
for QoS requirements of medical
application in healthcare facilities
Packets/s kb/packet Peak
(kb/s)
Average
(kb/s)
Events/h Maximum
latency(ms)
Telemetry
(diagnostic)
5 5.1 25.6 25.6 Stream 200
Telemetry
(alarms)
5 1.0 5.1 0.1 10/h 200
Infusion pump
(status)
1 1.0 1.0 1.0 Continuous 200
Infusion pump
(alert)
1 1.0 1.0 0.1 1/h 200
Clinician
notier
5 2.6 12.8 0.1 20/h 200
BCMA 2 0.4 0.8 0.1 30/h 500
EMR images 200 20.5 41.00 41 1% 200
Guest access 100 10 1000 30 3% 1000
Email 200 20.5 4100 41 1% 200
Table 3 UP to AC mappings Priority UP (same as 802.1D user
priority)
802.1D
designation
AC Designation
(informative)
Lowest
Hi
g
hes
t
1 BK AC_BK Background
2AC_BK Background
0 BE AC_BE Best effort
3 EE AC_BE Best effort
4 CL AC_VI Video
5 VI AC_VI Video
6 VO AC_VO Voice
7 NC AC_VO Voice
Fig. 1 Some IFS relationships
Medical Grade QoS Improvement Using IEEE802.11e WLAN Protocol 231
Studies in [11], proposed a new function which depended
on decreasing the contention window slowly after each suc-
cessful transmission using a xed multiplicative factor,
instead of setting it to CWmin. In [12], an Adaptive Enhanced
Distributed Coordination Function (AEDCF), scheme was
derived from EDCF which is based on adjusting the size of
the contention window after each transmission. Results of
this scheme showed good enhancement over (EDCF), espe-
cially in conditions of high trafc load. In [8], a new approach
was introduced based on a dynamic adaptation of the Mini-
mum Contention Window (CWmin). Here, priority between
the access categories is provided by tuning the size of
(CWmin) adaptively after each successful transmission.
We are interested here to reset the CW to a new proposed
contention window such that each virtual window related to
its category or priority type. In queue will have its own
updated new contention. EDCA of the IEEE 802.11e stan-
dard, CW is doubled after each unsuccessful transmission as
a binary exponential retransmission (BER), until it reaches
the maximum value CWmax. After successful transmission,
CW is reset to CWmin. For long channel reservation with
heavy trafc load, the average throughput will be decreased
due to overall packet latency and loss. For medical appli-
cations, Qos requirements in healthcare networks, require
special medicalgrade QoS through wireless transmission.
EDCA provide different Access Categories, AC[i] with
different priorities. Each AC[i] has its own parameters
(CWmin, CWmax, and AIFS), which are preset through the
MAC layer.
So I seek to propose an adaptive algorithm to avoid hard
and abrupt decreasing of CW from its previous value to the
value CWmin. Considering the medical trafc queue with
the highest priority AC[0], I note from Table 2that it is
characterized by small packet size and small frequency of
occurrence. With such low occurrence, the expected colli-
sions would have low probability. And with a small packet
size, retransmission could take place with no restrictions or
fragmentations.
4 Proposed Adaptive Control Mechanism
Hence, in my proposed scheme, I can make CW remain
constant and not be doubled after each unsuccessful
transmission.
Now, I consider the remaining trafc queues with prior-
ities AC[1] covering real time streaming (Telemetry) trafc,
as having high priority, and AC[2] covering other medical
applications as having medium priority. To fulll the priority
differentiation with pronounced enhancement, my scheme
propose the following adaptive new contention window:
(a) After every successful transmission:
CWnew½i¼CWmin½iþ2i2fj
avgðCWmax½iCWmin½iÞ
for AC 1½and AC 2½;
ð1Þ
and
CWnew i½¼CWmin i½
for AC 0½:
ð2Þ
where fj
avg is the average collision rate at step j, where j refers
to the j-th update period T
update
, which is computed
dynamically in each period, in units of time slots, as an
exponentially weighted moving average as follows:
fj
avg ¼1aðÞfj
curr þafj1
avg ð3Þ
fj
avg denote the instantaneous collision rate for station P,
and is dened:
fj
curr ¼Num CollisionsjP½

Num data sentjP½
ð4Þ
Num (data_sent
j
[P]) is the total number of packets that
have been sent in the same period j by ows belonging to
station P, and Num (successful_Ack [P]) is the number of
successfully received acknowledgments for station P. In
other words, Eq. (4)denes the packet loss rate of station P
in the same period j by ows belonging to station P during
j-th time period. fj1
avg represents the previous (j 1) time
period averaging collision rate. adenotes a weighting or
smoothing factor that is determined by simulations. Period
(T
update
) and the smoothing factor (a) are usually selected
experimentally. When my simulation for 20 stations is run
for 25 times, and the averaged results are displayed to show
the dependence of the goodput and mean audio delay per-
formance parameters on a, for a xed value of
T
update
= 6000 time slots, I nd that by selecting a0.5 in my
simulations, a good trade off between mean audio delay and
goodput would be achieved.
(b) After every unsuccessful transmission CWnew[i] is:
CWnew i½¼Min 2 CWprev i½;CWmax i½ðÞ
for AC 1½and AC 2½
and
CWnew i½¼CWmin i½
for AC 0½:
ð5Þ
232 L. A. Al-Tarawneh
To guarantee CWnew not to exceed the upper limit
CWmax, the following condition is applied:
CWnew i½¼Min CWnew i½;CWmax i½ðÞð6Þ
5 Network Simulation
5.1 NS2 Simulation
The performance of the proposed adaptation scheme for CW
was evaluated by simulation using NS-2 simulator [13,14].
After each updated period of time (T
update
), the contention
window is updated according to the equations of parts
(a) and (b) of the proposed scheme for AC[0], AC[1], and
AC[2] in sequence. The network used covers a region of
500 m 500 m with one access point (AP) in the middle,
and user stations are spread randomly over the area. The
number of stations is increased from two to 45 stations,
where each station represents a Quality station (QSTA)
equipped with my adaptive CWnew[i] scheme.
Table 4shows the selected MAC parameters for the three
access categories ACs, according to their medical critically.
This indicates highest priority for alarms, high priority for
real time streaming (telemetry), and medium priority for
other medical applications. In this simulation, all nodes send
their packets to the access point (AP). All nodes up to
number 15 are specied to generate all three types of trafc
with corresponding priorities: AC[0], AC[1] and AC[2]. All
remaining stations generate only two types of trafc corre-
sponding to priorities: AC[2] and AC[1]. In each node,
alarm is implemented as an exponential trafc source and the
real time applications are implemented as constant bit rate
(CBR) trafc. Meanwhile, the other medical applications are
implemented using Pareto trafc[1].
5.2 Performance Parameters
To evaluate the performance of the proposed adaptation
scheme and be able to compare it with other schemes, the
following parameters are dened as measures of perfor-
mance [11,12]:
Mean delay: it is the average delay of all the ows that
have the same priority in the different stations.
Collision rate: this rate is calculated as the average
number of collisions that occur per second.
Gain of goodput: it is the average goodput of a particular
scheme compared with the basic EDCA. For the pro-
posed CWnew[i], it is calculated as follows:
Gain of goodput ¼AGcwnew AGEDCA
AGEDCA 100%ð7Þ
where AG denotes average goodput.
6 Simulation Results
To evaluate the performance of our proposed adaptive ser-
vice differentiation scheme, I studied the effect of varying
trafc loads on certain performance parameters and com-
pared that with the same parameters as obtained using
conventional EDCA with and without medical grade prior-
ities. In my simulation, the trafc load is represented by the
number of stations and at which different types of trafc are
generated. The average delay and the average goodput for
AC[0] and AC[1] are selected as typical parameters, which
are calculated as dened in Sect. 5.2 [14].
Figure 2, shows the average delay of category AC[0], the
highest priority ow (alarms and faults). The proposed
adaptive EDCA gives lower delay than the conventional
scheme with and without medical prioritization. The graph
shows 40% reduction for the mean delay when the number
of stations reaches 45. This improvement even reaches 60%
at a load of 10 stations.
Figure 3, shows the simulation results of the average
delay for high priority trafc AC(1) [real time streaming
telemetry (diagnostic)]. Again, we can see from this gure
that my adaptive scheme, offers good improvement for AC
[1] over EDCA with medical grade and without medical
grade ACs. While this improvement is not noticeable when
the number of. stations is below 5, it reaches 29% at a load
of 10 stations, and 32% at full load of 45 stations.
Figure 4, displays the simulation results obtained for
collision rate. The collision rates are almost the same when
the trafc load is below 10. However, the proposed adaptive
scheme offers 50% for 15 stations, and 44% improvement
for 45 stations. This signicant improvement could be
explained by noting that the adaptive adjustment for
(CW) reduces the aggregate collisions through the channel.
Table 4 Mac parameters for
three trafc categories Parameters Medium priority High priority Highest priority
CW
min
31 15 7
CW
max
1023 500 200
AIFS (µs) 52 43 34
Medical Grade QoS Improvement Using IEEE802.11e WLAN Protocol 233
Figure 5shows the Gain of goodput, reecting the effect
of collision reduction which leads to increasing the number
of successful transmissions with low time delay. As expec-
ted, the proposed adaptive EDCA scheme shows enhanced
improvement on goodput, as the calculated values show an
improvement up to 24% at 40 stations, when compared with
EDCA without medical ACs.
7 Conclusion
This paper proposed a new adaptation scheme for QoS
enhancement based on previous development [15] for IEEE
802.11e WLAN with medical ACs. I extended the basic
EDCA with medical ACs, by varying the contention window
(CW) adaptively after each successful transmission. The per-
formance of my proposed scheme was tested and validated
using NS2 simulation software. The results obtained, were
compared with the basic EDCA with and without medical ACs.
Simulation results show that the proposed scheme
achieves better performance with respect to collision rate, to
average delay and to gain of goodput for all prioritized trafc
categories.
Future work could be extended to investigate the medical
WLAN under infrastructure networks where channel access
control is achieved by using hybrid coordination function
HCF and hybrid coordination channel access HCCA.
References
1. Park, K., Shrestha, D., Ko, Y., Vaidya, N., Sha, L.: IEEE
802.11WLAN for Medical-grade QoS. In: WiMD09, New
Orleans, Louisiana, USA, pp. 38, May 2011
5 10 15 20 25 30 35 40 45
0
20
40
60
80
100
120
Number of stations
AC ( 0 ) Average delay (ms)
IEEE 802.11e without medical ACs.
IEEE 802.11e with medical ACs.
Proposed adaptive EDCA with medical ACs.
Fig. 2 AC(0) average delay versus number of stations
510 15 20 25 30 35 40 45
20
40
60
80
100
120
140
160
180
200
Number of stat ions
AC(1) Average delay (ms)
IEEE 802.11e without m edical A Cs.
IEEE 802.11e with medic al ACs .
Proposed adapt ive EDCA with medi cal A Cs.
Fig. 3 Ac(1) average delay versus number of stations
510 15 20 25 30 35 40 45
0
100
200
300
400
500
600
700
800
900
1000
Number of stat ions
Collision rate (collisions/s)
IEEE 802. 11e without m edical A Cs.
IEEE 802.11e wit h medical ACs.
Proposed adapt ive EDCA with medic al ACs .
Fig. 4 Collision rate versus number of stations
5 10 15 20 25 30 35 40 45
0
5
10
15
20
25
Number of stations
Gain on goodput (%)
Proposed adaptive EDCA with medical ACs.
IEEE 802.11e with medical ACs
Fig. 5 Gain of goodput versus number of stations
234 L. A. Al-Tarawneh
2. Zvikhachevskaya, A., Markarian, G., Mihaylova, L.: Quality of
service consideration for the wireless telemedicine and e-health
services. In: Proceedings of the IEEE Wireless Communications
and Networking Conference, Budapst, Hungary, pp. 58, Apr 2009
3. Cypher, D., Chevrollier, N., Montavont, N., Golmie, N.: Prevail-
ing over wires in healthcare environments: benets and challenges.
IEEE Commun. Mag., pp. 5663 (Apr 2006)
4. MD PnP ProgramMedical Device Plug-and- PlayInteroper-
ability Program. http://mdpnp.org/Home_Page.php
5. Baker, S., Hoglund, D.: Medical-grade, mission-Critical wireless
networks. IEEE Eng. Med. Biol. Mag. 27(2), 8695 (Mar/Apr
2008)
6. Part II: Wireless Medium Access Control (MAC) and Physical
Layer specications: Medium Access Control (MAC) Enhance-
ments for QoS, IEEE 802.11e/Draft D5.0, July 2003
7. Mangold, S., Choi, S., May, P., Klein, O., Hiertz, G., Stibor, L.:
IEEE 802.11e wireless LAN for QoS. In: Proceedings of European
Wireless 02, Florence, Italy, Feb 2002
8. Gannoune, L., Robert, S.: Dynamic tuning of the contention
window minimum (CW
min
) for enhanced service differentiation in
IEEE. 802.11 wireless AD-HOC networks. In: PIMRC 2004, 15th
IEEE International Conference, vol. 1, 58 Sept 2014
9. Aad, I., Castelluccia, C.: Differentiation mechanisms for
IEEE802.11. In Proceeding Joint Conference of the IEEE Com-
puter and Communications Societies (INFOCOM), vol. 1,
pp. 209218 (2001)
10. Ksentini, A., Naimai, M., Nafaa, A., Gueroui, M.: Adaptive
service differentiation for QoS provisioning in IEEE 802.11
wireless ad hoc networks. In: PE-WASUN, pp. 3945 (2004)
11. Aad, I., Ni, Q., Castelluccia, C., Turletti, T.: Enhancing IEEE
802.11 performance with slow CW decrease. IEEE 802.11e
working group document 802.1102/674 ro (2002)
12. Romdhan, L., Ni, Q., Turletti, T.: Adaptive EDCF: enhanced
service differentiation for IEEE 802.11 wireless ad-hoc networks.
Wirel. Commun. Netw. WCNC 2(Mar 2003)
13. NS Network Simulator 2. from: http://www.isi.edu/nsnam/ns.
Retrieved 20 Aug 2006
14. AEDCF, see http://wwwsop.inria.fr/planete/qni/Research/
AEDCF/, last accessed 15 Apr 2017
15. Al-Tarawneh, L., Ayoub, J.: Adaptive service differentiation over
802.11e MAC protocol. In: Proceeding of the 4th WSEAS
Cambridge, Harverd, USA, pp 5459, 2729 Jan 2010
Medical Grade QoS Improvement Using IEEE802.11e WLAN Protocol 235
Memristor-Based Tunable Analog Filter
for Physiological Signal Acquisition
for Electrooculography
Juhi Faridi and Mohd. Samar Ansari
Abstract
In this paper we demonstrate that Memristors can be used
in conjunction with CMOS to implement a
continuous-time tunable analog bandpass lter for use
in the area of biomedical signal acquisition. The idea here
is to implement a single band pass lter which can
provide frequency tuning between EEG, EOG and ECG
signals. Frequency tuning is achieved by varying the
resistance of the Memristor (Memristance). The proposed
circuit promises lower power dissipation and smaller-
sized implementations than CMOS counterparts. This
circuit is capable of ltering out biomedical signals
(specically Electrooculography (EOG) signals) and the
same is demonstrated for the frequency range of 616 Hz.
The power consumption of the band pass lter designed
was found to be 127 nW at 0.25 V supply. The HSPICE
simulation results were found in accordance to the
qualitative discussion.
Keywords
Memristor Bandpass lter Electrooculography
1 Introduction
The idea of combining the design and problem solving skills
of engineering with medical/biological sciences for
health-care purposes has led to the emergence of the (rela-
tively) new eld of research known as the biomedical engi-
neering. Most of the work in this eld consists of research
and development of bio-compatible prostheses, various
diagnostic and/or therapeutic medical devices ranging from
clinical equipment to ultra-miniaturized implants, resonance
imaging and tomography set-ups etc. Almost all of the above
mentioned techniques and equipment work on the fact that a
human body constantly communicates information about its
health, and this data can be captured and used through
physiological-signal acquisition instruments that can measure
heart rate, blood pressure, brain state, eye movements, heart
activity etc. These biomedical indicators are very low voltage
and low frequency signals which need to be suitably pro-
cessed before recording and monitoring.
Processing of such biomedical signal involves the anal-
ysis of signal measurements to provide useful information
upon which clinicians can make decisions. Technological
advancements have led to miniaturization of monitoring
devices and power sources opening up a whole new world of
possibilities and innovations. An approach in this direction is
the employment of wearable and implantable technologies
which sense parameters of various diseases or disorders and
are capable to transfer data to a remote center; direct the
patient to take a specication; or automatically perform a
function based on the sensor reading. The idea of wearable
and implantable electronics on human body poses restriction
on the power consumption and size, and demands efcient
operations at reduced power supply voltages. The major
concerns of currently active research on such devices and
instruments are therefore: reducing the size; lowering the
power consumption; and to make the instruments measure
the minutest potential difference. This is where the new
device Memristor is expected to enable the chips to be
smaller and better, because it is smaller in size (as compared
to an on-chip resistor, or even transistor-based resistance
emulators); retains memory; and is two orders of magnitude
more efcient from power perspective as compared to tra-
ditional resistor technology.
A typical block diagram of a biomedical signal process-
ing unit is shown in Fig. 1where the band-pass lter
(BPF) forms an important block. In this paper the idea is
move the bandpass lter from the domain of discrete time
ltering to the analog signal processing domain, and
J. Faridi (&)Mohd. S. Ansari (&)
Department of Electronics Engineering, Aligarh Muslim
University, Aligarh, India
e-mail: faridij.262@gmail.com
Mohd. S. Ansari
e-mail: mdsamar@gmail.com
©Springer Nature Switzerland AG 2019
A. Al-Masri and K. Curran (eds.), Smart Technologies and Innovation for a Sustainable Future,
Advances in Science, Technology & Innovation, https://doi.org/10.1007/978-3-030-01659-3_27
237
thereafter to implement a single tunable band pass lter
which can select different frequencies corresponding to
various physiological signal types.
This paper includes a brief introduction in Sect. 1
explaining the need and advantages of incorporating Mem-
ristors with typical transistors in analog front-end design to
obtain the desired benets. Section 2briey reviews the
literature presented on Memristor and their rapid rise to
importance in the eld of biomedical engineering. Section 3
includes an overview of a previously presented work of
which this paper is an improved version with qualitative
discussion on how the frequency tunablity is much more
advantageous than the gain tunablity offered in the reference
paper. Section 4includes the HSPICE simulation results for
Memristance programming and frequency tunable bandpass
lter proposed in this work. Section 5concludes the paper
by presenting summary and concluding remarks.
2 Existing Works
In 1971 [1] came out with the seminal paper titled Mem-
ristorThe Missing Circuit Elementin which he proposed
a new two-terminal circuit element-called the Memristor
characterized by a relationship between the charge and ux
linkage. He introduced it as the fourth basic circuit element
(the other three being R, L and C). It is to be noted that a
physical Memristor device was not feasible at that time, and
that became a reality later in 2008 when [2] reported an
actual working prototype in The Missing Memristor Found
where they showed, using a simple analytical example, that
Memristance arises naturally in nanoscale systems in which
solid-state electronic and ionic transport were coupled under
an external bias voltage. These results served as the foun-
dation for understanding a wide range of hysteresis
exhibiting current-voltage behavior observed in many
nanoscale electronic devices.
After the physical Memristor was made realizable in
2008, a signicant quantum of research work in this eld
was carried out including the Memristor modeling and
implementation of digital and analog circuits thereby
reducing the complexity of the circuits. This was possible
because the Memristor was supposed to have a striking
feature of memory as it was capable of remembering the
amount of current passed through it. Various Memristor
models were also put forward to enable researchers to design
simple and efcient circuits. In 2010, [3] presented a SPICE
model for the Memristor which was fabricated at HP Labs in
2008 and validated it by simulating simple circuits. The
proposed model opened avenues to design and simulate
Memristor circuits using SPICE. In the same year, [4] came
out with a new simulation program with integrated circuit
emphasis macromodel of the physically implemented
Memristor. It proved to be a powerful tool for engineers to
design and experiment new circuits with Memristors. In
2013, [5] presented mechanisms for reliable SPICE simu-
lations of Memristors, Memcapacitors and Meminductors
wherein they proposed a collection of models of different
memory circuit elements and provided a methodology for
their accurate and reliable modeling in SPICE. To aid the
aspiring researchers in this eld, the authors were generous
enough to provide netlists for these models in various pop-
ular SPICE versions (PSpice, LTspice, HSpice).
While Memristor models were being developed as soon
as its physical implementation came into existence, another
dimension of research progressed to practically implement
the Memristor in analog and digital domains using existing
ICs. The rst approach in this direction was in 2010 when
[6] presented a practical approach to obtain programmable
analog circuits with Memristors. The approach was to apply
low voltages to Memristors during their actual operation as
analog circuit elements and signicantly higher program-
ming voltages to set/alter the Memristors states. They
demonstrated that the state of Memristors did not change
during analog mode of operation provided all the signal
levels were kept much lower than the programming voltage
levels. A year later, in 2011 [7] presented various Memristor
applications for programmable analog ICs. A ne-resolution
programmable resistance was achieved by varying the
amount of ux across Memristors. Resistance programming
Fig. 1 Typical physiological
signal acquisition and processing
ow
238 J. Faridi and Mohd. S. Ansari
was achieved by controlling the input pulse width and its
frequency. A Memristor was subsequently designed for a
pulse-programmable mid-band differential gain amplier
with high resolution.
A research contribution demonstrating the Memristor
characteristics and Memristance variation with frequency
was presented by [8] in 2012, wherein they presented the
idea of Memristor resistance modulation for analog appli-
cations. It was shown that the linear resistance can be ran-
domly programmed with accuracy and reproducibility.
Analog circuits of tunable memristive low-pass and
high-pass lters demonstrated frequency tuning by resis-
tance modulation.
As the research progressed on Memristor to implement
analog lters, their application in the eld of biomedical
signal acquisition and conditioning came into existence.
A major step in this direction was in 2014 when [9] pre-
sented analytical and dynamical models for a
Memristor-based high-pass lter and amplier. In the same
year, the same authors also presented their work on fre-
quency and time domain characteristics of a Memristor-
based continuous-time low-pass and high-pass lters [10].
More recently, [11] put forward an ultra-low-voltage
ultra-low-power Memristor-based band-pass lter and its
application to EEG signal acquisition. Several analog
applications of Memristor, its SPICE macro-models and
`Memristor Emulatorswith Memristor-like behavior were
presented. This paper was an extended version of the study
where the design of an ultra-low-voltage, ultra-low-power
DTMOS-based (emulated) Memristor was presented espe-
cially for the Memristor based low frequency biomedical and
chaotic applications, which was then used in a second-order
Sallen-Key band-pass lter for EEG data processing.
3 Memristor-Based Continuous-Time Analog
Filter
The band pass lter forms a basic building block of a
biomedical signal processing system as shown in Fig. 1.
This section includes: (i) a brief overview of the lter
topology used (Sallen-Key); (ii) a discussion on the previ-
ously published works on this topology, and how the
existing circuits offer limited advantage; and (iii) the pro-
posed band-pass lter circuit which can be employed to
select pertinent frequencies for different types of physio-
logical signals.
3.1 Traditional Sallen-Key Band-Pass Filter
A conventional Sallen-key band-pass lter is shown in
Fig. 2. The transfer function for such a second-order band-
pass lter can be expressed as
HðsÞ¼
1
R1C1ð1þR4
R5Þs
s2þsð1
R1C1þ1
R3C1þ1
R3C2R4
R2R5C1Þþ R1þR2
R1R2R3C1C2
ð1Þ
Further, the gain can be expressed as
H0¼K¼1þR4
R5
ð2Þ
The center frequency (x
o
) and the quality factor (Q) are
given in (3) and (4) respectively.
x0¼2pf0¼ffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffi
R1þR2
R1R2R3C1C2
rð3Þ
Q¼ffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffi
R1þR2
R1R2R3C1C2
q
1
R1C1þ1
R3C1þ1
R3C2R4
R2R5C1
ð4Þ
From (2) through (4), it is evident that there is no tun-
ablity in the circuit of Fig. 2. To obtain electronic tuning of
one or more lter parameters, some modications/additions
are required in the circuit.
3.2 An Existing Sallen-Key BPF with Gain
Tunablity
As discussed in the previous section, Yener et al. proposed a
Memristor-based BPF, wherein the gain was made tunable
by replacing the resistor R5 in Fig. 2with a Memristor as
shown in Fig. 3, and demonstrated that this resulted in an
Fig. 2 Traditional Sallen-Key band pass lter
Memristor-Based Tunable Analog Filter for Physiological Signal 239
electronic control over gain as becomes evident from (5)
[11].
H0¼K¼1þR4
MqðÞ ð5Þ
However as was also mentioned in the previous section,
having the gain controlled electronically by varying the
Memristance is not of signicance, as the signal level may
be amplied at several other points in the block diagram of
Fig. 1, if so required. The capability of tuning the center
frequency of the band-pass lter appears to be more
advantageous in the sense that the same lter circuit could
then be used for acquisition of different physiological
signals.
3.3 Proposed Memristor-Based Sallen-Key BPF
with Electronic Frequency Tuning
The proposed Memristor-based circuit for a continuous-time
analog band-pass lter with electronic frequency control is
presented in Fig. 4. A comparison between the circuits of
Figs. 2and 4leads to the fact that for the latter circuit, the
center frequency of the BPF would now be governed by the
Memristance M(q) instead of the resistance R3 [with the
dependence on all other passive components remaining the
same as in (3)]. Hence, the center frequency of the proposed
BPF can now be given by (6). The expression for the quality
factor for the proposed lter is now given by (7). The
expression for Ho remains the same as before i.e. as given by
(2).
x0¼2pf0¼ffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffi
R1þR2
R1R2MqðÞC1C2
sð6Þ
Q¼ffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffi
R1þR2
R1R2MqðÞC1C2
q
1
R1C1þ1
MqðÞC1þ1
MqðÞC2R4
R2R5C1
ð7Þ
It can be observed from (6) that in order to tune the center
frequency of the proposed lter, the Memristance M(q)
needs to be rst set to an appropriate value using the
so-called programming voltage signal. Thereafter, the input
signal (to be ltered) may be applied at the input terminal of
the circuit of Fig. 4. It is assumed that the input signal
amplitude is several orders of magnitude smaller than the
programming voltage, and therefore the value of the Mem-
ristance M(q) remains unaltered on the application of the
input signal.
4 Simulation Results
HSPICE simulations have been performed to get a perfor-
mance evaluation of the proposed BPF of Fig. 4. 0.18 lm
TSMC models were utilized to implement the same
sub-threshold DTMOS operational amplier which was used
in [11]. Variable Memristance M(q) was obtained by varying
the amplitude of the programming voltage applied across the
Memristor. The values of expected and obtained ON resis-
tances after programming the Memristor are listed in
Table 1. The average percentage error in Memristance
variation was found to be 0.04%.
The values of resistances and capacitances used during
simulations were: R1 = 17:5 kX; R2 = 12.4 kX;
R5 = 7.2 kX; C1 = 2.2 lF; C2 = 2.2 lF. The Spice model
for Memristor put forward by [5] was used. Power supplies
were kept at 0.25 V.
The feature of electronic tuning of the center frequency of
the proposed BPF was further tested using the HSPICE
simulations. Table 2lists the pass-bands obtained for the
circuit of Fig. 4with the Memristance M(q) set to different
values as mentioned in the table. The results of center fre-
quency tuning simulations are also presented in Fig. 4. With
a judicious selection of the Memristance value, the center
frequency may be set as per the requirement of the physio-
logical signal to be acquired. The estimated power con-
sumption of the circuit as returned by HSPICE simulation
software was approximately 127 nW.
Fig. 3 Memristor based Sallen-Key band pass lter for gain control
Fig. 4 Proposed Memristor based Sallen-Key band-pass lter with
electronic frequency tuning
240 J. Faridi and Mohd. S. Ansari
Fig. 5 Simulation results for frequency tuning of the proposed lter
Memristor-Based Tunable Analog Filter for Physiological Signal 241
5 Conclusion
In this paper, we present a frequency tunable band-pass lter
capable of selecting the biomedical signals which are low
voltages and low frequency signals. The proposed lter
designed is simulated using HSPICE wherein 0.18 lm
CMOS TSMC models were used during simulations along
with the Biolek Spice model for Memristors. The designed
circuit is found to have a pass-band range of 616 Hz
(Fig. 5) which can be employed in the ltering of EOG
signals. The total power consumed was found to be 127 nW.
Hence the designed circuit can efciently be used in
biomedical signal ltering due to low voltage low frequency
operation with low power consumption and small size.
References
1. Chua, L.: Memristor-the missing circuit element. IEEE Trans.
Circ. Theory 18(5), 507519 (1971)
2. Strukov, D.B., Snider, G.S., Stewart, D.R., Williams, R.S.: The
missing memristor found. Nature 453(7191), 8083 (2008)
3. Mahvash, M., Parker, A.C.: A memristor spice model for
designing memristor circuits. In: 2010 53rd IEEE International
Midwest Symposium on Circuits and Systems (MWSCAS),
pp. 989992. IEEE, New York (2010)
4. Rak, A., Cserey, G.: Macromodeling of the memristor in spice.
IEEE Trans. Comput. Aided Des. Integr. Circ. Syst. 29(4), 632
636 (2010)
5. Biolek, D., Di Ventra, M., Pershin, Y.V.: Reliable spice simula-
tions of memristors, memcapacitors and meminductors. arXiv
preprint arXiv:1307.2717 (2013)
6. Pershin, Y.V., Di Ventra, M.: Practical approach to programmable
analog circuits with memristors. IEEE Trans. Circuits Syst.
I Regul. Pap. 57(8), 18571864 (2010)
7. Shin, S., Kim, K., Kang, S.M.: Compact models for memristors
based on charge-ux constitutive relationships. IEEE Trans.
Comput. Aided Des. Integr. Circ. Syst. 29(4), 590598 (2010)
8. Lee, T.W., Nickel, J.J.: Memristor resistance modulation for
analog applications. IEEE Electron Device Lett. 33(10), 1456
1458 (2012)
9. Yener, S.C., Mutlu, R., Kuntman, H.: A new memristor-based
high-pass lter/amplier: its analytical and dynamical models. In:
Radioelektronika, 24th International Conference, pp. 14. IEEE,
New York (2014)
10. Yener, S.C., Mutlu, R., Kuntman, H.H.: Frequency and time
domain characteristics of memristor-based lters. In: 2014 22nd
Signal Processing and Communications Applications Conference
(SIU), pp. 20272030, IEEE, New York (2014)
11. Yener, S.C., Uygur, A., Kuntman, H.H.: Ultra low-voltage ultra
low-power memristor based band-pass lter design and its
application to EEG signal processing. Analog Integr. Circ. Sig.
Process 89(3), 719726 (2016)
Table 1 Actual and measured
values of resistances for the
Memristor model
R
ON
expected (kX)R
ON
measured (kX) Percentage error (%)
3 3.046 1.53
4 4.010 0.25
5 5.072 1.44
6 6.029 0.48
7 7.013 0.18
8 8.002 0.02
9 9.000 0.00
10 9.990 0.10
20 20.020 0.10
24 24.001 0.0004
Table 2 Frequency tuning for
different Memristance Memristance (kX) Pass band (Hz) Central frequency (Hz) Peak gain (dB)
24 3.48.6 6.02 8.9
14.6 5.88.2 7.00 17.4
10 10.46.8 8.07 12.5
9 6.512.1 9.03 8.9
8 6.513.6 10.07 6.4
7 6.315.8 11.08 3.4
6 6.119.2 12.09 0.9
242 J. Faridi and Mohd. S. Ansari
Migration from the Arab Spring Countries
to Europe: Causes and Consequences
Mohammed T. Bani Salameh
Abstract
This study aims to discuss the issues of migration from
the Arab Spring countries to the European countries in
terms of its causes and consequences. The study
concluded that migration from the Arab Spring countries
refers to what can be called as the factors of expulsion in
the countries of the Arab Spring and the factors of
attraction in the receiving countries of migrants, these
motives or factors can be classied as political, economic
and social factors. Furthermore, the revolutions of the
Arab Spring have created a disastrous situation for
migrants, both within their own countries and in the host
countries, especially in light of the increasing number of
migrants and the negative effects of their migration.
Migration has become a challenge faced by both export-
ing and receiving countries.
Keywords
Migration Arab Spring Europe
1 Introduction
The Arab Spring revolutions have brought about major
changes in the Arab world and its neighboring countries, and
more changes will occur in the coming years. The revolu-
tions have generally been followed by years, perhaps even
decades, of instability, resulting in deep and comprehensive
changes.
The changes taking place in the Arab world have sig-
nicantly affected migration, asylum seekers, and peoples
movement, as well as the policies pursued by countries on
migration-related issues. If these revolutions succeed,
democratic political regimes that respond to the peoples
demands for freedom and restore citizenscondence in the
state on an economic level will be established. Poverty and
unemployment rates will decline, and there will be economic
growth rates reected in the increase in citizensquality of
life. These improvements will affect the emigration rates,
which are expected to decline in view of the stability of the
situation in the Arab Spring countries, and perhaps this will
lead to reverse migration; that is, if the situation stabilizes
and political freedoms and economic security prevail, the
migrants will return to their countries of origin.
The Arab Spring revolutions which raised European fears
of large waves of unwanted immigration have prompted
European countries to strengthen their border control efforts
to address the risks of illegal immigration.
In this study, we try to identify the causes and conse-
quences of immigration from Arab Spring countries.
2 Literature Review
A vast body of literature has been written on the Arab
migration to Europe. The task of exploring this tremendous
body of literature is further complicated by the different
arguments presented by the authors. However, to keep the
review to a compact size, the researcher reviewed some
exigent literature that shed light on the subject. Among the
major studies that address migration ows to Europe and
Europes response are the following.
2.1 Mohamed Mutawea Study (2015), Entitled:
European Union and Migration Issues:
Major Problems, Strategies
and Developments [1]
This study aimed at identifying the characteristics and ori-
entations of European policy on issues of migration and
political asylum as they became a pressing issue on the
European agenda after the Arab Spring revolutions, which
M. T. Bani Salameh (&)
Yarmouk University, Irbid, 21163, Jordan
e-mail: mohammedtorki@yahoo.com
©Springer Nature Switzerland AG 2019
A. Al-Masri and K. Curran (eds.), Smart Technologies and Innovation for a Sustainable Future,
Advances in Science, Technology & Innovation, https://doi.org/10.1007/978-3-030-01659-3_28
243
led to an increase in the number of immigrants to Europe
from the countries of the Middle East and Africa in an
unprecedented manner in European history, prompting most
EU leaders to consider a strategic move aimed at countering
this unprecedented wave of immigration.
One of the ndings of the study is that European policies
in the eld of immigration and asylum are not uniform and
rely heavily on the national policies of each European
country in the rst place. It can be said that Europe is
divided into two camps: Central and North Europe, in
exchange for the camp countries in the South, as the camp of
the South states that it is on the front line directly with the
issues of migration and bear the greatest burden in dealing
with them, and calls for redistribution of the burden of this
issue on the rest of the EU as a European problem, not an
internal issue, while Central and Northern Europe countries
consider the issue of immigration essentially as an internal
issue and they receive a great deal of illegal immigration and
asylum applications.
The study concluded that the Arab youth did not reap the
fruits of their revolutions and aspirations, but broke the
barriers of fear not only from dictatorships, but also from the
sea, so that he crossed the sea in dilapidated boats in order to
realize his dreams on the other side of the sea, even if his
dreams led to drowning.
2.2 Ben Bouaziza Esté Study (2015), Entitled: EU
Policy in the Face of Illegal Migration [2]
The study aimed to identify the policy adopted by the EU to
deal with the problems of illegal immigration, which has
become a concern for the EU countries because of the
problems it poses from various types, especially the potential
relationship between terrorism and migrants.
The study examined the motives and mechanisms of the
EU in the ght against illegal immigration. The study
reached a number of results, the most prominent of which is
the phenomenon of illegal immigration that has been linked
to European security by considering it a threat. European
countries are seeking to stop the increasing tide of illegal
immigrants. The security approach is the method adopted by
the EU countries in dealing with the issue of illegal immi-
gration. Security was and remains the subject that is included
every time in the policy of all the EU countries and seeks to
achieve it, but to no avail. This is due to several reasons
including most of the agreements relating to the regulation of
migration to the countries located on the two shores of the
Mediterranean, and did not move to all EU countries, and
that the support provided under these agreements is limited
and does not achieve the desired goals and that the majority
of projects that were launched to combat illegal migration
based on security solutions, were impractical.
2.3 James Hollifield Study (2014) Entitled,
Controlling Immigration: A Global
Perspective. Stanford University Press,
3 Edition [3]
This study aimed at providing a systematic, comparative
assessment of the efforts of a selection of major countries,
including the U.S., to deal with immigration and immigrant
issuespaying particular attention to the ever-widening gap
between their migration policy goals and outcomes.
Retaining its comprehensive coverage of nations built by
immigrants and those with a more recent history of immi-
gration, the study pays particular attention to the tensions
created by post-colonial immigration, and explores how
countries have attempted to control the entry and employ-
ment of legal and illegal Third World immigrants, how they
cope with the social and economic integration of these new
waves of immigrants, and how they deal with forced
migration. The core argument of this work is that immi-
gration policies are converging globally, but also failing to
achieve their goals.
2.4 Elena Ambrosetti and Angela Paparazzo
Study (2013) Entitled, Which Future
for Migration in Europe? A Brief Analysis
of the EU Migration Policies
in the Mediterranean [4]
The study aimed at identifying the EU policies on migration
before and after the events of the Arab Spring in order to
assess these policies and to determine their success in
reducing the issue of illegal migration. The study paid spe-
cial attention to Italy as one of the most receiving countries
of the migratory waves of the southern Mediterranean.
One of the main ndings of the study was that the policies
of restricting or combating illegal migration were not
effective in preventing waves of migrants from the southern
Mediterranean towards Europe, and therefore, doubts are
raised about these policies, especially in light of the presence
of trans-boundary societies and the role of migrants who
succeed in reaching Europe in facilitating the arrival of more
migrants as well as networks of human trafcking and in
effective EU sanctions against illegal immigrants.
Overall, the study considers that the sterile policies pur-
sued by the EU countries, especially Italy before and after
the Arab Spring revolutions have not stopped migration.
244 M. T. Bani Salameh
On the contrary, these measures seem to have had a positive
impact in the sense that they encouraged more immigrants to
board the sea and migrate to Europe.
2.5 Philippe Forges and Christine Fandrich
Study (2012) Entitled, Migration After
the Arab Spring [5]
This study aimed to provide a statistical analysis of migra-
tion before and after the Arab Spring revolutions in the
countries of the Southern Mediterranean, as well as review
and evaluate the Arab and European policies on the issue of
migration. The study relied on statistical information and
data collected directly from the specialized ofces of the EU
Member States, based on surveys conducted in a number of
Arab countries such as Tunisia, Egypt, Libya and Morocco.
One of the fundamental discoveries of the study was that:
The revolution in Tunisia did not lead to a signicant
increase in the number of Tunisian immigrants to Europe,
but the rates of migration from Tunisia to Europe remained
at the same rates before the revolution. In contrast to Tunisia,
the Libyan revolution and the Syrian revolution led to a huge
increase in the number of immigrants from Libya and Syria
to Europe. The Libyan revolution and the Syrian revolution
led to the emergence of two of the largest refugee crises in
the European neighborhood. The European reaction to these
crises was the launching of a series of regional protectionist
programs to absorb the refugees and provide them with
protection in their home areas and in neighboring countries,
to prepare for their return home after the war and thus pre-
vent their migration to Europe, The countries of the world
and the international organizations have participated in these
efforts as well as the Arab countries hosting the refugees.
European countries also seek to nance projects and reform
initiatives in the southern Mediterranean countries to estab-
lish democratic political systems capable of managing the
state in a new way that prevents the conditions of conict
and violence that ultimately lead to migration.
2.6 Michael Bommes, Heinz Fassman
and Wiebke Sieves Study (2012) Entitled,
Migration from the Middle East and North
Africa to Europe [6]
The study aimed to analyze the phenomenon of migration
from North Africa and the Middle East to Europe by reviewing
the history of migration, its models and its effects on European
countries, as well as the European policies on the issue of
immigration and the scenarios and future of immigration to
Europe in light of the available gures on this subject.
The main ndings of the study was that, the main factors
driving for migration in the countries of North Africa and the
Middle East are the increase in the population of North
Africa and the Middle East, with limited employment
opportunities in the light of the slow economic growth.
Thereafter, the events of the Arab Spring and the resulting
violence and instability led to an increase in the pace of
migration to Europe.
And the effects of migration on the countries sending the
refugees as many of the countries of North Africa and the
Middle East lose as a result of the migration of this trained
manpower in economic terms. There are also the social
consequences of the high frequency of migration from these
countries to Europe, especially since the vast majority of
migrants are young males.
With regard to the European position on migration, the
study pointed out that EU countries see illegal immigration
from the Middle East and North Africa as a major threat to
European security. EU countries have therefore sought to
stop illegal migration ows using political, economic and
security mechanisms.
2.7 Joel Peters Study (2012) Entitled,
the European Union and the Arab Spring:
Promoting Democracy and Human Rights
in the Middle East. Lexington Books [7]
The study aimed to analyze the response of the European
Union to recent uprisings in the Middle East. The past years
had witnessed a wave of popular uprisings across North
Africa and the Middle East which the Western media dubbed
the Arab Spring.Demanding greater freedoms, political
reform, and human rights, the protesters swept away many
of the regions authoritarian autocratic regimes. The events
of the Arab Spring have been truly historic. They led to
profound changes in the domestic order of Middle Eastern
states and societies and impacted the international politics of
the region. Additionally, these events necessitate a com-
prehensive reappraisal by the United States and most notably
by the EU in their relations with the states and peoples of the
region.
This collection investigates three central questions: What
role did the European Union play in promoting democracy
and human rights in the countries of North Africa and the
Middle East? How did the EU respond to the uprisings of the
Arab street? What challenges is Europe now facing in its
relations with the region?
Migration from the Arab Spring Countries to Europe 245
2.8 Andrew Geddes Study (2008) Entitled,
Immigration and European Integration:
Towards Fortress Europe, Manchester
University Press [8]
This study aims at providing comprehensive analysis of the
EUs free movement framework, of the development of
co-operation on immigration and asylum policy, of the
mobilisation by groups seeking to represent migrants
interests in EU decision-making, the interface between
migration, welfare and the EUs social dimension, and the
impact of enlargement on migration and asylum.
Geddes addresses three key questions that underpin EU
responses to migration policy. First, what role does the EU
play in the regulation of migration? Second, how and why
have EU measures developed to promote the integration of
migrants and their descendants? Third, what impact do EU
measures on migration and asylum have on new member
states and non member states? Migration is at the heart of the
contemporary European Union.
The updated edition covers important recent develop-
ments, addressing new migration ows and the external
dimension of EU action on migration and asylum and
placing in all these in the context of a widerEurope.
This paper build upon the previous literature in order to
better understand the Arab Spring migration to Europe as a
complex social fact which brings into play demographic,
economic, political, sociological, historical and other factors.
Mohamed Mutawa, The European Union and Migration
Issues: Major Problems, Strategies and Developments,
(In Arabic). The Arab Future, Issue: 431, Center for Arab
Unity Studies, Beirut, Lebanon, 2015.
3 The Causes and Consequences of Arab
Spring Migration to Europe
Migration from the Arab Spring countries refers to what can
be called the factors of expulsion in the countries of the Arab
Spring and the factors of attraction in the receiving countries
of migrants, these motives or factors can be classied to be
political, economic and social factors as follows.
3.1 Political Factors
Tunisia, Egypt, Libya, Syria and Yemen have witnessed a
range of political conditions over the past few years as a
result of the accumulation of miserable situation of political
and civil rights, which led to a state of popular explosion that
began with peaceful protests and then developed into chaos,
persecution, civil war, instability and widespread violence.
These circumstances led to sudden large waves of migration,
including temporary displacement of citizens inside and
outside their countries. The effects of the conicts and unrest
experienced by the Arab spring countries not only affected
the citizens of these countries but also affected the interna-
tional migrants who live and work in these countries at the
start of the unrest, especially Libya and Yemen [9].
The uprisings in Syria and Libya have had a profound
impact on migration patterns in the region. The conict in
Libya has led to the displacement of large numbers of
migrant workers, Libyan citizens, and refugees to neigh-
boring countries. In late 2011, 422,000 Libyans left Libya,
most of them went to Tunisia, Algeria, Egypt and Chad [10].
As the violence escalates and public order collapses in 2014,
many migrants have left again, with some 400,000 displaced
within Libya.
In the midst of this chaos, the waves of mixed migration
to Europe increased through Libya, the Mediterranean, and
in 2014 there were about 140,000 refugees and immigrants
[11].
The conict in Syria has had a signicant impact, and its
repercussions have spread to all neighboring countries
(Jordan, Lebanon, Turkey, Iraq), as well as to Arab coun-
tries, Europe, South America and the United States. About
one third of Syrias citizens have lost their homes, and over
two million have found refuge in neighboring countries (of
these, half are under 18 years old). The rest of the displaced
population (estimated at six million) is still in Syria. It is
difcult to verify the numbers, but the trend is clear.
Approximately 700,000 Syrian refugees are in Turkey, about
200,000 of them in refugee camps near the border, and it was
reported recently that the Turkish government has begun to
construct a fence along the border in order to prevent the
arrival of more refugees. A quarter of million Syrians,
mostly Kurds, have ed to Iraq, a country that itself suffers
from chronic political and security instability. Egypt is host
to about 125,000 Syrian refugees, in addition to tens of
thousands of refugees from Libya and Sudan. Some dis-
placed Iraqi and Palestinian refugees in Syria had been
displaced again [12].
Yemen was before the Arab spring revolutions and con-
tinued as a sending, receiving and transit country. It is
sometimes difcult to distinguish between migrants and
refugees who take Yemen as a nal destination or transit
point to continue their journey to Saudi Arabia. The con-
tinued civil war in Yemen has caused the displacement of
millions, and the continuation and complexity of the conict,
has made it difcult to obtain accurate and comprehensive
statistics on the Yemeni situation [13].
Although, the Tunisian and Egyptian revolutions were
less violent and bloody than the rest of the Arab Spring, the
stumbling of the democratic process, especially in Egypt
246 M. T. Bani Salameh
after the military coup, led to the migration of a large pro-
portion of Egyptian and Tunisians citizens to neighboring
countries that are most democratic, secure and stable.
3.2 Economic Factors
The economic conditions in the countries of the Arab Spring
are disappointing. The levels of poverty and unemployment
are high. The per capita income of the gross national product
has not increased during the past years; most economic
planning programs have failed, the problem of external
indebtedness has worsened, corruption has increased, all
economic structural adjustment programs which were fol-
lowed by debtor countries in cooperation with the World
Bank and the International Monetary Fund had failed. On
the contrary, these programs had increased poverty and
unemployment rates and have increased the gap between the
rich and the poor.
If the waves of migration in Tunisia, Egypt, Libya, Syria
and Yemen are the primary motive for escaping from con-
ict, widespread violence and persecution, escape from
economic hardship and seeking better livelihoods and
opportunities for life abroad is one of the main reasons why
many people ee or emigrate [14].
If the economic expulsion factors in the Arab Spring
countries are a cause of migration, in addition, we nd
economic attractors in the receiving countries, in which their
economy helps to receive immigrants, especially European
countries where immigrants engage in certain occupations
such as agriculture, construction, cleaning and other pro-
fessions or sectors that domestic workers refuse and migrant
workers accept. These employers often warn that without
access to cheap foreign labor, the costs of producing their
products will rise and they may be forced to close their
businesses. Foreign labor is part of the economics of
industrial democracies, and this explains the continued ow
of migrants to Europe, despite stringent restrictions and high
unemployment rates in the receiving countries [15].
Economic factors are linked to the unbalanced population
growth factor in developing countries, including the Arab
Spring and the developed countries. The population in
developing countries is growing faster than in developed
countries. In Germany, for example, the program of
importing migrant workers began in the mid-1960s to
expand the industry. When it decided to stop importing labor
in 1973, the migration stream was supposed to stop, but that
did not happen because many years of attractions have
increased the importance of foreign labor, and German
businessmen are accustomed to the presence of foreign
labor, continued to use these labor and thus emigration to
Germany had continued [16].
With regard to migration from the Arab Spring countries,
statistics indicate that large numbers of Egyptians, Tuni-
sians, Libyans and Syrians have been able to get employ-
ment in the countries they went to. Several sectors such as
agriculture, construction, restaurants, hotel service and home
care for the sick and the elderly are beneting from the
activity of these immigrants and led employers to tolerate
their informal residence. Furthermore, they do not pay taxes,
do not receive their civil rights, face difcult working con-
ditions due to the nature of their illegal residence, and are
subjected to many violations, pressures and exploitation
[17].
3.3 Social Factor
Social factors are closely linked to economic factors. Pov-
erty, hunger, unemployment and low standards of living,
despite being an economic factor, have social and psycho-
logical repercussions in the society in which they arise.
In the countries of the Arab Spring in general, the citizen
suffers from an unprecedented level of deterioration of social,
economic life, social exclusion, alienation and social
inequality, poverty is one of the secretions of chaos and civil
war experienced by these countries, and the resulted in mal-
nutrition and other problems. These factors are repulsive
especially with the presence of other political and economic
factors. These social conditions have led many Syrians,
Egyptians, Libyans, Tunisians and Yemenis to emigrate [18].
Among the social factors that have led many immigrants
from the Arab Spring countries to migrate, is the possibility
to live with relatives in the Diaspora large numbers of
immigrants from Arab Spring countries have decided to stay
rather than return to their countries with deteriorating
economies and unjust governments. Those who were able to
legalize themselves or get the right to asylum did their best
to obtain entry permits for their wives and children [19].
A signicant number of migrants from Tunisia, Egypt,
Libya, Yemen and Syria have been able to use family
reunication laws in European countries to bring in more
migrants despite the obstacles faced by these communities in
previous countries.
4 The Consequences of Migration
The Arab Spring revolutions in Tunisia, Egypt, Libya,
Yemen and Syria have brought about the largest displace-
ment in the Middle East in recent times. Millions of people
have been compelled to ee their homes as a result of the
armed conict, violence and chaos that followed the Arab
Spring protests.
Migration from the Arab Spring Countries to Europe 247
These migrations have had their effects and repercussions
both on the level of exporting countries and receiving
countries or of migrants themselves, as will be address in the
following section.
4.1 Implications for Arab Spring Countries
The waves of large-scale migration pose great challenges to
the countries of the Arab Spring, especially Egypt, Libya,
Yemen, Syria, and to a lesser extent Tunisia, especially since
these countries have limited capabilities to meet their needs
and ll the shortage due to migration. The situation is
exacerbated by the continuation and complexity of the
conict, especially in Yemen, Syria and Libya and the
prospects for a peaceful solution and the return of the situ-
ation to what it was before the outbreak of revolutions have
diminished [20].
The negative repercussions are intensied by the lack of
funding especially for the internally displaced, especially in
Syria, Libya and Yemen, where the majority of assistance
goes to those who have refugee status, and the responsibility
for assisting the internally displaced in their own countries.
The migration of millions of Syrians, Yemenis, Libyans and,
to a lesser extent, Egyptians and Tunisians, have created
great implications for their countries especially when spe-
cialists, capitalists and business owners leave in large
numbers whose departure will have serious consequences for
the economy [21].
Even after the return of refugees and migrants, after years
of conict, war and destruction of infrastructure, these
conditions have a signicant impact. This is evidence in
Libya, Syria and Yemen, where social amenities have
deteriorated and in many cases displaced persons and
migrants were unable to return to their original homes and
found themselves compelled to live in temporary camps or
alleged irregular camps or public buildings, without access
to justice, security, and development.
The sudden return of migrants from crisis-prone countries
may pose major challenges, especially for countries with
large waves of returnees, whose economy relies on remit-
tances from abroad, and when returning migrants require
nancial, emergency or other humanitarian assistance.
In Egypt, which is the largest recipient of remittances in the
Arab region, hundreds of thousands of migrants working in
Libya have been forced to return to their home countries in
recent years due to violence, prompting the Egyptian gov-
ernment to take the necessary measures to facilitate their
return, despite the economic and social difculties Egypt
faces.
4.2 Effects on Migrants
Migration has many effects on migrants, especially those
forced to leave their homes and internally displaced persons
from the Arab Spring countries that are forced to live in
camps.
Refugees are often characterized by residing in remote
areas with limited natural resources, lack of basic infras-
tructure, poor planning and sometimes even restrictions on
the rights and freedoms of persons.
These conditions can lead to overcrowding and insecurity
within the camps, especially for women and boys, as well as
malnutrition and outbreaks of communicable diseases. In the
months following the establishment of the Zatari camp in
Jordan, measles, scabies, diarrhea, hepatitis (A) and other
diseases were recorded due to overcrowding and lack of
sanitation facilities. Incidents of harassment and sexual
violence have led to high levels of insecurity, however, the
conditions have improved since then.
The camps may contribute to social tensions, adversely
affecting the local environment through deforestation that
leads to soil erosion, loss of habitats and wildlife, in addi-
tion, it leads to air pollution, water depletion and pollution,
and other energy and transportation problems. The needs and
capacities of refugees and displaced persons are linked to
their vulnerability and their ability to withstand. At the
height of some crises, everyone living close to the scene of
the crisis may face a lot of risk due to the spread of the
repercussions of resource scarcity and chaos. This was the
case in the 2011 famine that unfolds in Somalia and left 3.7
million people in need of humanitarian assistance and in
other cases, the case of internally displaced persons in
Sudan, and Yemen. The extension of the periods of dis-
placement or replication may lead to undermining the ability
of individuals to withstand the repeated risk. The ability to
withstand the repeated risks affected by demographic, social,
and economic characteristics. Some groups are vulnerable
because of their health or age, such as children, the elderly
and persons with disabilities. Some groups have special
needs because of the lack of support systems, such as
women heads of household, ethnic and religious minorities,
the poor and victims of trafcking and, in some cases, the
population is at risk of their legal status, especially those
residing in a particular country as non-regular refugees, such
as those from sub-Saharan Africa in Libya, and other factors
affecting vulnerability are sex abuse and sexual orientation.
Women and girls in conict situations may be at greater risk
of sexual violence, while men and boys are at greater risk of
forced recruitment and joining armed groups, although they
are not immune to sexual violence, and the conditions
248 M. T. Bani Salameh
surrounding crises and displacement, with the collapse of
traditional support structures, the lack of the rule of law and
the resorting of populations to riskier coping strategies and
the use of irregular transport to ensure cross-border and
remittance migration will increases the vulnerability of
refugees, displaced persons and other migrants [22].
As for the effects of immigration on immigrants from the
Arab Spring countries in the countries where they are settled,
especially the European countries, the former countries are
considered by the immigrants from the Arab Spring coun-
tries to be the Promised Land. They are politically and
security ally stable countries and their economic conditions
are excellent compared to their countries of origin. Their
return to their country of origin is very unlikely. However,
this survival has its price as these immigrants suffer rst
from the so-called cultural shock due to the difference of
language, environment, customs and traditions, and even
many customs and traditions of those immigrants are com-
pletely contradictory to what prevails in the new commu-
nities, especially within the social and family issues, and the
role of women and womens rights. Western societies less
interaction and less cohesiveness makes immigrants dealings
with new communities difcult, and they become trauma-
tized as a result of these differences [23].
The other problem of migrants from the Arab Spring
countries to the European countries is the problem of social
integration. The cultural and historical specicities of
immigrants from the Arab Spring countries to the new
societies hamper their integration and exacerbate the prob-
lem. These immigrants, even in the case of getting foreign
citizenship, does not change a thing, as they are continue to
be seen as second-class citizens.
When migrants attempt to adhere to their customs and
cultural identities, they face many problems, especially in
raising children and trying to raise them in a way that reects
their culture and identity. Finally, immigrants from Arab
Spring countries face the problem of marrying foreigners
which entails the impossibility of raising children resulting
from this marriage in line with the culture and identity of
migrants [22].
5 Effects on European Countries
The European countries face great challenges as a result of
the inux of large numbers of immigrants from the Arab
Spring countries. These challenges have political, security,
economic, cultural and social repercussions. These reper-
cussions vary according to a range of factors, including the
number of migrants to the population, the wealth of the host
country, the demographic, economic, and social character-
istics of migrants, and measures taken by both ofcial
institutions and civil society organizations to address the
problem of migration from the Arab Spring countries. The
burdens borne by European countries vary according to the
Geographical location of these countries, nations of the
South, such as Italy, Spain, Greece and France. Dealing with
the issue of immigration varies from northern countries such
as Germany, the Netherlands, Denmark, Norway, Sweden
and others, and Britain, which has become outside the
European Union has a totally different position [24]. The
following is a presentation of the main effects of migration
from the Arab Spring countries to Europe.
5.1 Political Impacts
The mass exodus from the Arab Spring countries, whether
those suffering from civil wars such as Libya, Syria and
Yemen, or those suffering from political crises and deterio-
rating economic conditions such as Tunisia and Egypt, has
become a major political challenge to European countries,
resulting in enormous pressures, political divisions, disputes
and disagreements among European countries, on how best
to deal with the problem of migration and work to resolve or
mitigate its consequences, especially the way that some
European countries deal with the problem of migration
considered by other European countries as a means to
stimulate and encourage immigrants to migrate to Europe
[25].
For example, human trafcking gangs are hauling
migrants from Libyan shores by dingy wooden and rubber
boats to trade them towards the Italian shores, where Italian
relief ships are rescuing them and allowing them to enter the
country.
As in the case of Germany, where some European
countries take a lot of drawbacks to Germany in that, it is
more caring and more welcoming to immigrants. Many
European countries considered Italian and German policies
as a sort of behaving recklessly and could seriously damage
the cohesion and unity among European countries.
Europe has been under the pressure of immigration to
forcedly build physical barriers on its national borders now
than during the Cold War. Many European countries are
planning to build border walls and security fences across the
continent after the Berlin Wall was removed and made
tremendous progress on the path of economic and political
integration. The pace of integration has declined, and the
voices calling for withdrawal from the Union have
increased. If Britain is the rst of these countries, it is
unlikely to be the latter [26].
If the reasons for secession are multiple, security con-
cerns and migration are at the highest priority for secession.
The mass migration of hundreds of thousands of desperate
Migration from the Arab Spring Countries to Europe 249
people eeing the Arab and Islamic countries, which have
been spared by civil wars, is a continuous migration and
there are no indications of stopping them.
European anti-immigration attitudes, whether or not from
the Arab Spring or the Middle East in general, have revealed
the falsity of the European claims of openness and global-
ization, the opening of borders, the transfer of funds, infor-
mation, ideas and commodities, and human rights and
fundamental freedoms. The advocates of globalization,
freedom and democracy, they themselves are calling for the
ght against immigration on the grounds of national sover-
eignty and national interest. If each State has the right to
protect its national borders and to maintain its security,
stability and interests, sovereignty cannot be divided so that
there is sovereignty against migration, and other sovereignty
with freedom of movement, information, ideas, capital,
goods and others [27].
Among the political implications of migration from the
Arab Spring countries to Europe is the escalation of the
extreme right in European countries, especially in Belgium,
the Netherlands, Spain, France, Italy and Britain, where
there were terrorist attacks in the scene that claimed the lives
of many innocent people. The results of these terrorist acts
was the growing hostility towards Arab and Muslim immi-
grants, linking immigration to extremism, distorting the
image of Arabs and Muslims and portraying them as a threat
to Europes security and stability [28].
The anti-immigration process has become a popular
European demand, as it is clear that many Europeans are
turning to anti-immigration political parties or extremist
slogans against foreigners. If these demands may not be met
by moderate political parties and decision-makers in Europe,
so that the process of immigration is adjusted and its
repercussions reduced, the extremist force and racism will
adopt the demands of stopping migration, increasing its
popularity in raising society, and if these parties arrive into
power, it will exercise racist policies that bring to mind the
arrival of Nazi and fascist parties into power before the
Second World War [29].
There is no doubt that the growth of the repercussions of
anti foreigners in general and the Arabs and Muslims
especially in Europe, and the increase in the proportion of
extremist right currents in the decision-making centers and
hence the tightening of migrants exacerbates the serious
political repercussions of the migration problem. The
approach of security in dealing with the problem of migra-
tion, and the justication of aggression and racism practiced
against immigrants could lead to more chaos and disruption
of daily life, undermining stability in Europe [30].
5.2 Economic Impacts
There are many negative economic effects of the inux of
immigrants from the Arab Spring countries to Europe. With
the inux of immigrants, the economic burden is increasing
due to increased pressures on housing, education, social
services and employment opportunities, which affects the
political stability and economic situation of European
countries.
The arrival and sheltering of immigrants from the Arab
Spring countries has had enormous nancial burdens. These
countries have been obliged to secure such basic expenses as
shelter, food, school costs, language learning, etc., as well as
increased security spending to combat migration [31].
European countries suffer not only from migrants who
come from conict zones and who deserve to be granted
asylum but from other types of migrants who come from
safe areas and are called economic migrants seeking greater
wealth and a better standard of living through asylum or
migration. European countries are tougher in dealing with
this segment; however, the issue of return to their countries
of origin is a thorny issue and cost European countries a lot
of effort and expenditures for legal and political reasons [32].
One of the economic implications of the crisis of immi-
grants from the Arab Spring countries to Europe is how the
EU can deal with the fundamental problems in the countries
of migrants, which started the migration crisis in the rst
place. The handling of the migration crisis requires the EU
countries to provide nancial, economic and military assis-
tance to these countries. The relationship between migration,
economic conditions are closely linked, so migration has
become a factor of pressure on European countries and push
them to work to nd economic alternatives to migration such
as easing restrictions on trade and the creation of partner-
ships and assistance for economically distressed countries to
help these countries raise living standards and create job
opportunities in countries exporting migrants. The freedom
of trading of goods and capital is an approved recipe for
limiting migration. Economic development in countries
exporting migrants, including the Arab Spring countries, is
one of the best recipes to reduce the phenomenon of
migration [33].
Among the economic impacts of migration from the Arab
Spring countries to Europe, has been that European countries
have in the past preferred to channel their nancial and
economic assistance to the countries of Eastern Europe for
cultural reasons at the expense of the countries in the
southern Mediterranean such as Egypt, Tunisia, Algeria,
sub-Saharan countries and others. As the conict in Libya
250 M. T. Bani Salameh
escalates and the deterioration of economic conditions in
Egypt and Tunisia increased, the rates of migration from
former countries to Europe, which forced the European
countries to change their vision so that these countries will
not, directed a large part of their economic assistance to the
southern Mediterranean countries.
Many EU countries have been forced to transfer a large
part of their economic assistance to the southern Mediter-
ranean countries and the Arab Spring countries. These
countries urgently need huge and urgent economic assis-
tance to respond to the needs of citizens, displaced persons
and migrants. This humanitarian assistance requires the joint
efforts of the international community in general, not only
European countries, but the support of rich and remote
countries that are not affected by migration such as Japan,
China and the United States of America whose contribution
is well below the required level. In Lebanon, for example,
the World Food Program (WFP) announced in 2012 that
food vouchers for Syrian refugees would be reduced by half.
In general, the countries hosting refugees as a result of the
Arab Spring revolutions from Turkey, Lebanon and Jordan
to Egypt, Tunisia and Algeria were underfunded, weakening
their ability to withstand the crisis and mitigate its conse-
quences [34].
Despite the various adverse economic impacts of migra-
tion from the Arab Spring countries to Europe, there are
positive impacts on migration. The age structure of the EU
population is changing rapidly. In 2015, one out of every
three Europeans in the labor market is more than 50 years
old, while the number of people between the ages of 2029
is 20% lower. This means that Europes labor force is aging.
Migration is 70% of the population growth in Europe.
However, every retired European person needs the support
of three workers, and if population trends in Europe continue
to be like that, then migration becomes the solution due to
population requirements, and shrinking population and the
aging workforce in Europe solved through migratory ows
that address demographic problems [35].
5.3 Cultural and Social Impacts
The large and unexpected migration from the Arab Spring
countries to Europe has many social and cultural effects.
Most of the immigrants from the Arab Spring countries to
Europe are Arabs and most of them are Muslims. The entry
of hundreds of thousands into European societies will have
many social and cultural repercussions. These immigrants
need along period of time so that they can overcome the
cultural and social trauma and to assimilate new conditions
and coexistence or integrate with them [36].
There is no doubt that the inux of immigrants from the
countries of the Arab Spring to Europe, with the values and
cultural values they carry, is totally different from what is
happening within the receiving countries of the European
Union, which leads to the question of the possibility of
coexistence or clash between the two civilizations: the Arab
Islamic civilization and the European civilization. Many
immigrants from Arab Spring countries try to preserve their
cultural and religious identity. This is evident in their dress,
eating, customs, traditions, practices, and other cultural and
social activities. Political systems in the European Union
countries in many European cities have many features of
Arab cities in terms of markets, shops, restaurants, places of
worship and others, which impede the integration of immi-
grants in new societies, while at the same time promoting
racist discourse towards them, especially linking migration
to extremism and terrorism, This is common in many
European media and literature, especially after the involve-
ment of Muslim immigrants in a series of bloody events in
Europe.
The feeling of division and confrontation is reinforced by
Europes expectation that after the demise of the Soviet
Union and the end of the Cold War, conservative danger are
its southern border overlooking the Mediterranean Sea
through the inux of illegal immigration and radical Islamic
movements, especially the Islamic State Organization(ISIS),
which has succeeded in penetrating security and European
barriers, thus recruiting many Muslims living in Europe and
carrying out terrorist operations in a number of European
countries [37].
The Europeans also link migration to the threat of their
identity, culture and civilization, in view of the migrants who
are adhering to their customs, traditions and identity, and
refusing to adopt the customs, traditions and identity of
European host countries. Some explain the anti-immigration
attitude of many Europeans, regardless of whether they are
ofcials or ordinary citizens, the European countries fears
that this space will become a Muslim Arab, especially since
Islam is the fastest spreading religion in the world including
Europe, which fuel incitement against Arab and Muslim
immigrants to Europe, and translates its attacks on these
migrants.
Among the cultural and social effects associated with the
issue of Islamic civilization is that the European Union, in its
current form, is a club of Christian countries. With hundreds
of thousands of immigrants owing into Europe through
Turkey, many European countries have become more rigid
in Turkeys accession to the Union. This position is rein-
forced by the fact that Turkey is an Islamic state, it has
borders with Syria, Iraq and Iran and they are among the
most unstable countries in the world and the most exporting
of migrants.
Among the cultural and social effects of migration from
the Arab Spring countries to Europe is the change in the
patterns of production and consumption of food. Many of the
Migration from the Arab Spring Countries to Europe 251
immigrants from the Arab Spring countries who settled in a
number of European countries have had an impact on
changing many of the habits of Europeans in the food and
other changes in theater and even sports [38].
There are also large-scale effects of immigrants on the
media by broadcasting programs dedicated to immigrants
and minorities dealing with issues of concern to them. The
spread of the Internet and the means of social media have led
to the fact that Arab immigrants in Europe have their own
websites and discussion forums that are managed, monitor
and analyze by them to relate their issues and interests, etc.
Here, it must be stressed that there is no justication for
European countries to adopt a policy of hostility towards
Arab and Muslim migrants, rather cooperation, partnership,
coexistence, social and political upbringing based on toler-
ance, dialogue, citizenship and pluralism, are the best means
of achieving stability in the society and facilitates the inte-
gration of migrants. In addition, after some time, cultural and
social norms weaken among the children and grandchildren
of immigrants and the Arab countries from which they
originate.
5.4 Security Implications
European countries have faced signicant security chal-
lenges as a result of hosting large numbers of migrants from
the Arab Spring countries. Many European countries have
taken border measures dominated by security concerns such
as the use of sanctions, occupation and security control, and
despite all these measures, as is common in various countries
of the world, concerned with the issue of migration, which
integrate the conclusion that it is physically impossible to
exercise effective border control in open countries, as in
industrialized countries, that explains large numbers of
clandestine immigrants in European countries. The closure
of borders and standing order against the movement of the
transition to European countries put at stake the reality of
Western democracies and their enrichment by the slogans of
democracy, freedom and human rights.
In addition, maintaining the freedom of movement of
European citizens among the various EU countries under the
Schengen Agreement requires that the borders be open and
that the European borders are safe and controlled. If these
limits can not be secured, the ows of migrants will continue
which would threaten the political stability of the European
Union and could lead to the strengthening of separatist
tendencies in it, leading to the weakening and dismember-
ment of the Unions [39].
The security concerns in the European countries have
been reinforced by the outbreak of the Arab Spring revolu-
tions and its consequences, for example, the emergence of
the extremist terrorist organization ISIS, which has claimed
responsibility for many terrorist operations in a number of
European countries such as France, Germany and Britain,
despite ISIS geographically distant from Europe, it suc-
ceeded in penetrating the European barriers and the
recruitment of many European immigrants who joined the
ranks of the organization in Syria and Iraq, or who remained
in Europe and carried out many of the terrorist acts [40].
Thus ISIS has become a serious threat to European
countries.
What increased the European fears is that, the threat of
Arab and Muslim immigrants to Europe is no longer asso-
ciated with an increase in their numbers, but they are even
more linked to smuggling of arms, drugs and human beings,
the recruitment of terrorists, the practice of robberies, loot-
ing, theft and assault on public property. A report prepared
by the European Police Agency (EPA) noted that human
trafcking and illegal migration are run by gangs using the
usual drug smuggling routes to enter the countries of the
continent. Women, children and illegal immigrants are
trafcked. Security reports conrm that trafckers and
organized crime play a major role in this lucrative trade. In
2015, more than one million people reached the European
Union illegally and with the continuation of the conict in
the Arab Spring countries, especially Syria, Libya and
Yemen, the ood of migrants to Europe will continue.
Thousands of migrants from the Arab Spring countries
have tried to reach Europe through Turkey and Greece, but
the construction of the iron fence between these two coun-
tries has closed the door on this road and boat trips have
become a refuge for migrants on the Mediterranean, hoping
to reach Italy or Greece as transit countries to the rest of the
European Union.
There is no doubt that most of the immigrants from the
Arab Spring countries to Europe are looking for hope for life
and stability, but the fears are caused by some Muslim
immigrants who carry extremist ideas or some terrorists who
disguise themselves as immigrants and commit terrorist acts
thereby causing a great burden on the Europe.
6 Conclusions
The primary objective of this paper was to document and
explain the massive population displacement of Arabs as the
most manifestation of the crisis in the Arab Spring countries.
Since the beginning of the so-called Arab Spring, the Arab
Spring countries witnessed a signicant increase in the
number of immigrants and displaced persons and their pro-
portion of the total population. The years 20102020 might
well go down in history as the decade of Arab refugees.
The beginning of the 21st century will be remembered for
the large numbers of Arab people evicted from their homes
and communities and forced to nd a living elsewhere.
252 M. T. Bani Salameh
The magnitude of this displacement serves as a poignant
example of the importance of the phenomenon in the Middle
East as well as of its complexity. There are several reasons
behind the migration from and through the Arab Spring
countries, and although the economic factor is always the
most important motive for migration, under the Arab Spring,
there are political, social, security and religious factors no
less important than the economic factor. The study reached
several results, the most prominent of which are:
1. The Arab spring revolutions have had a signicant
impact on migration from the Arab Spring countries,
especially in Syria, Libya and Yemen. In 2014, the
Syrian refugees constituted the largest group of refugees
in the world. The violence in Libya led to the displace-
ment of nearly 1 million people of migrant workers,
refugees and asylum seekers, while the number of
internally displaced persons in Yemen reached more than
11% of the total population.
2. The question is not of which the main causes of dis-
placement (war or underdevelopment) is more important
or prevalent. Nor is it always the number of people dis-
placed that determines the signicance of the event.
Rather, the important point to draw is that displacement
needs to be seen as an outcome of a combination of
causes involving a multiple set of factors.
3. There are many negative effects of the phenomenon of
migration from the countries of the Arab Spring, and
these effects are not limited to the host countries, but
extends to the countries of origin, and these effects are
economic, cultural, social, political and security.
4. Forced migration in the countries of the Arab Spring has
placed great burdens on countries of destination, asylum,
transit and origin, as well as migrants themselves. For
countries of origin, large-scale internal displacement
poses major challenges to these countries, while the
negative impact on host countries is exacerbated. Refu-
gees and displaced persons are suffering from extremely
difcult and tragic conditions, especially those relying on
networks of organized crime.
5. As the EU countries removed their internal boundaries,
they became increasingly concerned about strengthening
external boundaries, to prevent an inux from Middle
East and North Africa. The successful mobilization of
extreme right groups over immigration and supposed
threats to national identity helped bring these issues to
the centre of the political stage.
6. It is certain that immigrants from the Arab Spring countries
have an urgent reason to emigrate a lot, and if the European
countries are right to combat this phenomenon in order to
preserve its security and stability and interests, they must
take into account as much as possible the balance between
combating immigration and considerations to human
rights and human dignity.
7. Migration is a global problem and not a national or
regional problem of a particular country or continent,
efforts to combat or control immigration is a global issue.
The globalisation of migration provides grounds for
optimism, because it does give some hope of increased
unity in dealing with the pressing problems which beset
our small planet.
References
1. Mutawa, M.: The European Union and migration issues: major
problems, strategies and developments. In: The Arab Future Confer-
ence, Center for Arab Unity Stuies, Beirut, Leanon (2015)(in Arabic)
2. Bouziza B.: EU Policy Against Illegal Immigration, Studies and
Research. University of Djelfa, Algeria (2015)
3. Hollield, J.: Controlling Immigration: A Global Perspective, 3rd
edn. Stanford University Press, USA (2014)
4. Ambrosetti, E., Paparazzo, A.: Which Future for Migration in
Europe? A Brief Analysis of the EU Migration Policies in the
Mediterranean Area. Universities Roma, Italy (2013)
5. Forges, P., Fandrich, C.: Migration after the Arab Spring.
Migration Policy Center, European University Institute, Florence,
Italy (2012)
6. Bommes, M., Fassman, H., Sieves, W.: Migration from the Middle
East and North Africa to Europe. Amsterdam University Press,
Amsterdam (2012)
7. Peters, J.: The European Union and The Arab Spring: Promoting
Democracy and Human Rights in the Middle East. Lexington
Books, Lanham (2012)
8. Geddes, A.: Immigration and European Integration: Towards
Fortress Europe. Manchester University Press, Manchester (2008)
9. International Migration Report: Migration, Displacement and
Development in a Changing Arab Region (2016)
10. Attir, M.: Illegal Migration in Libya after the Arab Spring. Middle
East Institute, USA, 18 Sept 2012
11. Guzansky, Y., Striem, E.: The Arab Spring and Refugees in
Middle East, INSS. Insight, No. 496 (2013)
12. Levion, D.: Addressing the Debate on the Economic Impact of
Migration. IMF (2017)
13. UNHCR: Yemens Brutal Conict Pushing One Million Displaced
to Return to Danger (Joint UNHCR-IOM Press Release) (2017)
14. Malik, A., Awadallah, B.: The Economics of Arab Spring. World.
Dev. 45, (2012)
15. Najmi, R.: Arab Spring and its impact on migration to Europe, at
the following link: www.dw.com/ar/a-15661959
16. Martin, P. Zurcher, G.: Managing Migration: The Global Chal-
lenge. Translated by Fawzi Sahawneh. University of Jordan
Publications, Amman, Jordan (1999)
17. Hassan, O., Awad, Y.: Illegal Immigration and Crime. Naif Arab
University for Security Sciences, Riyadh, p. 17 (2008)
18. On the relationship between the Arab people and their govern-
ments, see for example the report of Carnegie endowment, Arab
fractures: citizens, states and social contracts, at the following link:
carnegieendowment.org/2017/02/01/arab-fractures-citizens (2017)
19. Mueh, M.: Social Migration Interactions, in a series of seminars
for Moroccans Emigrating Abroad, Al-Natour (2012)
Migration from the Arab Spring Countries to Europe 253
20. The Arab Spring is causing the largest wave of immigrants since
World War II. The Center for Strategic Research and Strategic
Studies. http://rawabetcenter.com/archives/2430. Last accessed 2015
21. Shuaibati, M.: Migration of competencies and their economic,
political and social implications. Addiyar. http://www.addiyar.
com/article/800643. Last accessed 2014
22. Wagner, R.: How Europe ghts against Muslim assimilation. Arab
News (2012)
23. Abdelou, A., Amkor, A.: European Arabs: identity education and
citizenship. Contemp. Arab Aff. 8(2) (2015)
24. Barry, A.: Europe dilemma: immigration and the Arab Spring.
Foreign Policy. http://fpif.org/europes_dilemma_immigration_
and_the_arab_spring/. Last accessed 2012
25. Meaken, J.: European migration: crisis and consequences. Tomor-
rows World. https://www.tomorrowsworld.org/magazines/2016/
march-april/european-migration-crisis-and-consequences. Lasted
accessed 2016
26. House of lords, library note: leaving the European Union: future
UK-EU relationship. http://researchbriengs.parliament.uk/Research
Brieng/Summary/LLN-2016-0063. Last accessed 2016
27. Houboub, M.: The Secret Immigration and the Press of the Two
Banks. Antoine Society, p. 37 (2005)
28. The most prominent terrorist attacks in Europe and its repercus-
sions on the Muslims. Sasa Post. https://www.sasapost.com/
terrorist-in-europe/. Last accessed 2015
29. Rollins, T.: Refugee VS economic migrant: are EU policies
changing? www.aljazeera.com/indepth/features/2016. Last accessed
2016
30. North, B.: The Rise of Right. Wing Nationalist Parties in Europe
(2017)
31. Vake Walk Staff: Arab Spring negative impact on european
economy. Polities (2012)
32. Saif, I.: Re-examination of Euro-Mediterranean Relations. Carne-
gie Middle East Center. http://carnegie-mec.org/2011/10/11/ar-
pub-45704. Last accessed 2012
33. Khalil, H.: The Arab Spring between European Interventions and
Arab Aid (2016)
34. Ruwij, A.: Migration to Europe a crisis of the Eurozone. Building
Information Network. http://annabaa.org/arabic/development/415.
Last accessed 2015
35. Stokes, B.: The immigration crisis is tearing Europe apart. Foreign
Policy (2012)
36. Zakai, N.: Geopolitics of secret immigration in the mediterranean
sea. Arab Polit. (19), 29 (2016)
37. European Migration Network: Impact of Immigration on Europes
Societies (2016)
38. Al-Naqaz, S.: Turkey cannot join the European Union and these
are the reasons, raialyoum. 16/5/2016 at the following link: www.
raialyoum.com/?p=441052
39. Noak, R.: These 8 places in Europe could be the next to try for
independence. Washington Post (2014)
40. Deaden, L.: Isis recruiting violent criminals and gang members
across Europe in dangerous new crime terror nexus. The
Independent, Monday, Oct 2016
254 M. T. Bani Salameh
Multi-channel Buffer Enabled Technique
for Video Streaming in IEEE 802.15.4
Razi Iqbal
Abstract
Increase in the use of wireless technologies has opened
doors for development of various wireless applications to
provide solutions to different problems in domains like,
security and surveillance, entertainment, transportation,
communication and education. To reduce the overall cost
and power consumption of the systems to be deployed in
developing countries, short range wireless technologies
like ZigBee (IEEE 802.15.4) are gaining popularity.
However, due to limitation of data rate, some applications
that involve transmission of heavy data are still consid-
ered far-fetched. This paper presents a technique that
enables ZigBee to be utilized for heavy data transmission
such as video streaming. For this purpose, a technique
based on the concept of multi-channel and buffer is
introduced in this article. In order to illustrate the
efciency and reliability of the proposed technique, it is
compared with currently available video streaming tech-
niques like, single channel buffer less, single channel
buffered and multi-channel buffer less. Several simula-
tions are performed on these available techniques to
gauge the efciency of these techniques at low data rate of
around 250 kbps. The results of the simulations are then
compared with the simulation results of the proposed
technique to ensure its efcacy.
Keywords
ZigBee Video streaming Short range wireless
technologies
1 Introduction
Video streaming is a concept of sending images in a com-
pressed form over the Internet and displaying this data to a
user in real time. In video streaming the user does not need
to download the le as data is unceasingly transferred from
sender to receiver in continuous stream. Videos are large
amount of data which needs to be compressed before
sending over a small data rate. At the receiver compressed
data is decompressed and displayed to the user. Most
modern browsers use compressing and decompressing
techniques for video streaming. Streaming media has many
types like videos, images, sounds and animations. There are
many applications of video streaming on the Internet like
online television, YouTube and Skype etc. There are two
main types of video streaming, live streaming and archived
streaming.
Live streaming is the type of video streaming that refers
to the data delivered over the Internet from source media
(like digital camera or audio interface). In this method, an
encoder is used to encode the signals and a media publisher
and a network is used to send data to a receiver. Live
streaming also enables the users to interact with each other
using video chats in real time. A popular example of live
streaming for chats is Skype video chat.
The second type is archived streaming that is referred to
the data stored on server. In this system videos are stored on
a server that is connected to the Internet and the client can
access the video by connecting to the Internet. The main
examples of this type of streaming are video streaming
websites like YouTube and Dailymotion. In video stream-
ing, bandwidth of the network is very important. If the
bandwidth of the network is good, the quality of streaming
would be decent but if the bandwidth is low the quality of
the streaming would be below par.
There are several short range wireless technologies
available now a days. For instance, ZigBee is gaining pop-
ularity due to its low cost and low power consumption. It is a
R. Iqbal (&)
American University in the Emirates, Dubai,
United Arab Emirates
e-mail: razi.iqbal@aue.ae
©Springer Nature Switzerland AG 2019
A. Al-Masri and K. Curran (eds.), Smart Technologies and Innovation for a Sustainable Future,
Advances in Science, Technology & Innovation, https://doi.org/10.1007/978-3-030-01659-3_29
255
sister technology of Bluetooth and IrDA. In this technology
signals travel in zig zag style that is why it is called ZigBee.
It works on 868 MHs/915 MHs/2.4 GHz frequencies. It has
very low data rate of 250 Kbps but has very low complexity.
In developing countries where providing energy is a key
challenge, a low power technology is required. However,
some applications need heavy data transfer to operate, e.g.,
video streaming. An efcient technique is required to enable
the use of low data rate for communication in such appli-
cations. Currently, there is a gap in literature that provides a
reliable technique to enable short range and low data rate
technologies to transmit videos. This paper provides an
efcient technique that enables short range wireless tech-
nologies like ZigBee to transmit images and videos over
100 m distance.
Rest of the paper is organized as follows: Sect. 2provides
the review of literature, Sect. 3presents the available video
streaming techniques. Section 4highlights the proposed
model for transmitting videos over low data rate technolo-
gies using multi-channel and buffer. Section 5provides the
ow of the proposed system, Sect. 6presents the simulation
results and Conclusion part concludes the article.
2 Literature Review
ZigBee technology is suitable for Wireless Sensor Networks
[1]. The WSN (Wireless Sensor Networks) is used for many
purposes like remote monitoring, sensor readings, vehicular
ad hoc network and many more. Wireless Sensors Networks
consist of many petite nodes. These networks face many
problems like energy usage, network lifetime and topology
maintenance. In this research study the author uses two new
schemes for lifetime maximization of a network. In these
schemes, physically powerful node arrangement based
method is used. This scheme is used to wrap the fast
preservation of node failure.
ZigBee technology and fundamentals about the network
have been described by the experts [2]. He also provides
details about the architecture of these standards and briey
enlightens the layer architecture. He also elucidates the RF
(Radio Frequency), Physical Layer and MAC (Media Access
Control) layer. He briey describes about how IEEE MAC
Layer works and how to establish a connection in a network.
ZigBee is a low cost and power efcient PAN technology
[3]. It can be used to transmits diversity to transfer image
from one node to another. It is proved that it is possible to
save transmission time up to 40%. The proposed system
used multi-channel with multiple radio interface system to
maximize the throughput of a network.
Compression techniques are used to compress large
amount of data before sending. Authors explained that old
data compression techniques and encoding methods were
not sufcient for this problem [4]. Because the bandwidth of
medium was low and range of communication was very
short. The receiving image was not clear. He used MPEG-4
standards for audio and video compression because it is a
new compression method that provides better compression
rate than the older version MPEG-2. He further explained
that MPEG-4 is a suitable standards for low bandwidth and
has better error detection and correction mechanism. In his
studies author tries to nd the best solution to the problem.
According to this study a better compression technique can
signicantly improve the quality of video. In this research
study Bluetooth technology is used for communication. But
the main drawback of Bluetooth is it not energy efcient.
Compression techniques are used to compress large
amount of data before sending [4]. There is the need of
encoding and compression of the video data [5]. In this study
author tries to explain the basic concepts, algorithms and
systems of video streaming. They explained different types
of video streaming like point-to-point, multi cast and broad
cast. The authors further described key challenges in video
streaming by highlighting the transport and bit rate control
according to band width and error detection and correction
for overcoming channels.
A reliable application to transfer pictures of MPEG over
ZigBee Networks has been researched by authors [6].
MPEG VBR (Variable Bit Rate video) is data starving and
current undue time wait and data loss over wireless com-
munication. For this purpose a trafc shaping buffer is used
to handle the transmission over ZigBee channel. The author
developed NF (Neural Fuzzy) scheme to alter the trafc
shaping buffer output rate and RFB (Ruled Base Fuzzy)
scheme to regulate the input data rate of trafc shaping
buffer.
ZigBee reliability and efciency in multi hop wireless
standards is studied [7]. The core requirements of WSN is
low energy consumption and reliability of the network. The
authors evaluated the performance of ZigBee in multi-hop
WSNs where sleep/Wakeup scheduling protocols are used
for low energy consumption. The authors worked on med-
ium access control layer and tuned its parameters to improve
the reliability of the communication.
The review of literature provides a view of the gap in the
transmitting videos over the network using shot range and
low data rate wireless technologies like ZigBee. Some
studies use Wi-Fi technology for wireless communication. In
Wi-Fi Energy consumption is main issue. The main advan-
tage of Wi-Fi is bandwidth and the range of network is better
than then the Bluetooth and any other wireless technology.
However, it is not suitable to be used in areas where several
wireless modules are required, since it will increase the
overall cost and power consumption of the system. This
problem can be solved using ZigBee because of its low
power consumption and inexpensive hardware modules.
256 R. Iqbal
3 Video Streaming Techniques
Video streaming has been an attractive eld of research
throughout the world because of its potential for delivery of
services and type of applications. Growth of connected
devices has signicantly increased the demand of applica-
tions based on videos, e.g., video streaming for watching
online videos, transmitting surveillance videos to security
rooms and video conferencing for business purposes etc. The
key requirements for these applications are quality of
delivery, cost, efciency and reliability. In order to fulll
these requirements different techniques are used based on the
application [8]. Below are some of the current available
video streaming techniques for short range wireless
technologies.
3.1 Single Channel Buffer Less Video Streaming
A traditional way of streaming videos over the wireless radio
is to transmit the whole video through the available band-
width. This technique has been around for decades that
provides a simple and cost effective solution to video
streaming. However, one of the drawbacks of this technique
is the loss of packets while transmitting heavy data like
videos over a single channel due to packet collision [5]. In
case of low bandwidth, this technique is not suitable as the
packet collision is high and delivery is low. To evaluate this
technique, simulations are performed and the results are
presented in Fig. 1.
As illustrated in Fig. 1, although, the total bandwidth of
ZigBee is 250 kbps, however, the maximum throughput
using Single Channel and Buffer Less technique yields less
data rate (100 kbps) for video transmission because of high
packet loss. This technique is efcient for use of small data;
however, the results show that this technique is not capable
of transmitting heavy data like videos.
3.2 Single Channel Buffered Video Streaming
In order to enhance the capabilities of Single Channel data
transmission techniques, a concept of using Buffer is intro-
duced. Buffer is a temporary storage that stores the data
before actually displaying it to the output device. Keeping
the data in the buffer allows the recipient devices to improve
the performance of the data before presenting the nal output
[5]. This technique of using buffer is extremely popular for
video streaming. However, one of the drawbacks of this
technique is although the buffer still has capacity to store
Fig. 1 Single channel buffer less video streaming simulations using ZigBee on NS2
Multi-channel Buffer Enabled Technique for Video 257
data but reception of the data at the recipient is very slow
due to low data rate transmission of the communication
technology like ZigBee. Simulations are performed to gauge
the efciency of this technique for transmission of videos
through ZigBee. Figure 2presents the results of the
simulations.
As illustrated in Fig. 2, although, the total bandwidth of
ZigBee is 250 kbps, however, the maximum throughput
using Single Channel and Buffered technique yields less data
rate (150 kbps) for video transmission because of high
packet loss. This technique is efcient for use of small low
quality images; however, the results show that this technique
is not capable of transmitting high quality images or
low-resolution videos.
3.3 Multi-channel Buffer Less Video Streaming
To further enhance the quality of delivery of data, a tech-
nique of using multi-channels for data delivery is used these
days. In this technique, data is sent through different chan-
nels that enables the avoidance of collision of packets and
hence results in better transmission. This technique is widely
used in current short and long range wireless technologies
for transmission of data, however, low data rate technologies
are still prone to delays in data transmission when it comes
to heavy data communication like videos [7]. Simulations
are performed to measure the efciency of this technique for
delivering the videos over ZigBee by utilizing all 16 chan-
nels provided by ZigBee. Figure 3illustrates the results of
the simulations.
As illustrated in Fig. 3, although, the total bandwidth of
ZigBee is 250 kbps, however, the maximum throughput
using Multi Channel Buffer less technique yields less data
rate (190 kbps) for video transmission because of high
packet loss. This technique produces better results as com-
pared to Single Channel Buffered and Buffer less technique;
however, the results show that this technique is not capable
of transmitting high quality images or low-resolution videos.
4 Proposed System Model
The proposed model presents a technique of using
multi-channel with buffer integration to transmit heavy data
like videos over the network using ZigBee as a
Fig. 2 Single channel buffered video streaming simulations using ZigBee on NS2
258 R. Iqbal
communication medium. A ZigBee sender module is used to
send images by utilizing all 16 channels offered by ZigBee.
A buffer is used at the receiver to hold the data and ulti-
mately the data is decompressed to display the video.
Figure 4illustrates the proposed model.
In the proposed model, the image of the video is rst
compressed using MPEG-4 compression technique. These
compressed images are then handed over to the ZigBee
module (sender) which uses its multi-channel transfer tech-
nique to send this image to the destination. It is important to
note here that ZigBee has 16 channels, which makes it a
good choice for multi-channel transmission by avoiding
packet collision and trafc congestion. When image is
received at the receiving end by another ZigBee module, it is
rst placed in the buffer. The buffer will keep the images till
its full. At the same time, the buffer will keep on sending this
information to nal destination where each image is
decompressed using same MP4 technique. One of the rea-
sons of keeping the images in the buffer is to make the
stream of images smooth for viewing by the user. If images
are sent as they arrive, sometimes user has to wait for the
images to arrive. This technique of having images in the
buffer before they are actually displayed to the user would
make user experience better.
5 Proposed System Flow
The process starts by compressing the image using MP4
compression technique. When the image is ready to be sent,
the channel is checked for congestion; if the channel is not
congested, the image is sent in the form of the packets over
the network. However, if the channel is congested, next
available channel is checked for availability. Similar process
is followed for each packet and each channel. As soon as the
data is received at the receiver side, it is checked for errors
and the data is placed in the buffer which is then ultimately
decompressed into the original image using the same com-
pression technique, e.g., MP4 in this case and nally the data
is displayed to the user. Figure 5illustrates the proposed
ow of the system.
Fig. 3 Multi channel buffer less video streaming simulations using ZigBee on NS2
Multi-channel Buffer Enabled Technique for Video 259
6 Simulation Results
Several simulations were performed to measure the efcient
and reliability of the proposed method. In the simulations per-
formed on NS2 simulator, packet loss and delivery of
transmission are measured to ensure that the proposed tech-
nique can be used for developing applications that involve
transmission of videos over low data rate of around 250 kbps.
In order to ensure the proper communication between the
nodes, communication range is kept to 30 m, however, with
typical ZigBee modules, the range can be increased up to
Fig. 4 Proposed system model based on multi-channel buffered technique
Fig. 5 Proposed system ow
260 R. Iqbal
100 m. Similarly, to ensure reliable data delivery, packet size is
kept to 1024 bytes with burst time and idle time set to 2 ms.
Simulations are carried out based on the following criteria
(Table 1).
The proposed technique provides a robust approach of
transmitting videos over low data rate wireless technology,
e.g., ZigBee etc. Simulation results show that the bandwidth
is efciently utilized by stipulating around 230 kbps out of
maximum 250 kbps. Packet losses are still occurring, how-
ever, the rate at which the data is delivered has improved as
compared to techniques like Single and Multi Channel
buffered and buffer less. Figure 6presents the simulation
results for the proposed technique.
This technique sets a foundation for further research
where improvements in reduction of packet losses can be
made to enhance the efciency of the proposed technique.
Similarly, improvements in delivery time can be made by
increasing the packet size and uctuating the burst and idle
time. The range of the communication can also be increased
by introducing the concept of multi-hop communication for
Table 1 Simulation parameters
Parameter Values
Max. bandwidth 250 kbps
Max. distance between the nodes 30 m
Packet size 1024 bytes
Burst time 2 ms
Idle time 2 ms
Antenna type Omni antenna
Max. nodes in IFQ 50
No. of hopes 1
Fig. 6 Simulation results for proposed multi-channel buffered technique using ZigBee on NS2
Multi-channel Buffer Enabled Technique for Video 261
short range wireless technologies, however, it will have an
impact on the delivery time and reliability of the data
delivery which can be another research direction in this
regard.
7 Conclusion
The paper presents a technique for transmitting heavy data
trafc over the short range and low data rate communication
technology ZigBee. The technique proposed the use of
multi-channels integrated with buffer to improve the video
streaming over the network. The use of multi-channels
provides smooth path for the packet without collisions to
reach the destination. Later at the destination, each packet is
stored in the buffer to ensure sleek operation for the user to
view the video. Simulations were performed to gauge the
efciency, accuracy and reliability of the proposed tech-
nique. The simulation results of the proposed technique are
compared with the results of currently available techniques
for transmitting heavy data over low data rate. The results
showed that the proposed technique provides high data
delivery by consuming more than 90% of the bandwidth
through multi-channel technique. The delivered data still
requires some renement as packet losses are still occurring,
which will be a future work in this research.
References
1. Diongue, D.: A new sentinel approach for energy efcient and hole aware
wireless sensor networks. Int. J. Comput. Sci. Inf. Secur. 11(9) (2013)
2. Jon Adams, T.: ZigBee wireless technology and 802.15.4
radio-enabling simple wireless: semiconductor. Retrieved from
http://s3.amazonaws.com/zanran_storage/www.utdallas.edu/
ContentPages/8133370.pdf
3. Pirak, C., Chantharat, W.: Image transmission over ZigBee network
with transmit diversity. In: 2011 International Conference on
Circuits, System and Simulation IPCSIT, vol. 7. IACSIT Press,
Singapore (2011)
4. Smith, B.: Video over Wireless Bluetooth Technology. Department
of Electronics and Computer Science, University of Southampton
5. Apostolopoulos, J.G., Tan, W., Wee, S.J.: Mobile and Media
Systems Laboratory. HP Laboratories, Palo Alto, HPL-2002-260,
18 Sept 2002
6. Kazemian, H.B.: An Intelligent Video Streaming Technique in
ZigBee Wireless. FUZZIEEE, Korea, 2024 Aug 2009
7. Anastasi, G., et al.: Reliability and energy efciency in multi-hop
IEEE 802.15.4 wireless sensor networks. In: 2010 IEEE Sympo-
sium on Computers and Communications (ISCC) (2010)
8. Kalashnikov, A.N., Challis, R.E., Unwin, M.E., Holmes, A.K.:
Effects of frame jitter in data acquisition systems. IEEE Trans.
Instrum. Meas. 54(6), 21772183 (2005)
262 R. Iqbal
Multimedia Applications in Education
Smilen Antonov Savov, Rumiana Antonova, and Kamen Spassov
Abstract
The aim of this paper is to focus on some of the
multimedia applications used in educational process. This
paper offers several denitions of multimedia, identies a
sample of the most popular multimedia technologies, the
most important tools and provides a discussion of their
content and sources for further information. The paper
stresses on ve major multimedia components such as:
text, sound, video, graphics design, and animation. The
paper illustrates how the students learn, improve, update
their knowledge and test themselves through multimedia
technologies. The paper shows the pros and cons of
multimedia education technologies, using some tradi-
tional and experimental techniques. In the various stages
of the application of multimedia in education, the
importance is described in the visualization of industry
4.0 and in the software tools of digital transformation.
Keywords
Multimedia Digital transformation Education and
social innovation Oral cultures Creative industries
1 Introduction
The cultures are diversied in accordance of their informa-
tion channels. In the oral culture exist an equality of infor-
mation channels. That is why the communication here is of
multimedia type. When we use the word multimediain
todays complicated informational highway world, we have
to say that this newtype of communication is not new!
There is also a popular term of NEW MEDIAoften used.
The german composer Wagner uses this type of communi-
cation in his gigantic opera show spectacles. Wagner was
convinced that the separate branches of artmusic, archi-
tecture, painting, poetry, and dancewould attain new
poetic heights when put to the service of the drama, which
he viewed as the ideal medium for achieving his vision. His
totalizing approach to music theatre also foreshadowed the
experience of virtual reality.[1: p. 4]. He used in his
virtual worldlibretto (text), musical score and acoustical
design (sound), lighting effects (dramaturgy of light), Deus
Ex Machinastage technologies (special effects as anima-
tion), Camera Obscura(proscenium arch acted as the
interface, TV screen or video), and of course graphics
designpresented as stage sets and props.
The result was a spectacular grandiose show that touched
all the human senses [1]. So to speak, the multimedia
experience and usage for entertainment and educational
purposes is not new. In our present world the Digital,
Cyber, WWW revolution, sets the framework and base of
Multimedia Digital Renaissance. With the help of new
hardware and software we experience a revival of multi-
media world that can be used largely for better communi-
cation, education, and for artistic purposes. The focus of this
paper is the usage of present multimedia applications in
educational processes. In todays world of multimedia we
understand a harmonious simultaneous existence of ve arts
such as text, graphics design, video, animation, and sound
(Fig. 1). We can also add one very important element:
Interactivity (Fig. 2). With the recent development of the
multimedia education technologies we must add the WWW
Internet and Long Distance Learning, Virtual Reality
training, 3D Mapping, software assisting disabled indi-
viduals, articial intelligence technical innovations, retinal
implants, and many others.
The multimedia education communication consists of
synchronized presentation and perception of its ve ele-
ments, which are integral aspects of communication system.
S. A. Savov (&)R. Antonova K. Spassov
Soa University, Soa, Bulgaria
e-mail: smilen.savov@abv.bg
R. Antonova
e-mail: E-Mail-Family@web.de
K. Spassov
e-mail: kspassov@gmail.com
©Springer Nature Switzerland AG 2019
A. Al-Masri and K. Curran (eds.), Smart Technologies and Innovation for a Sustainable Future,
Advances in Science, Technology & Innovation, https://doi.org/10.1007/978-3-030-01659-3_30
263
The Medium is the Massage, said Marshall McLuhan, and
he was right because the communication message is an
integral part connected with the verbally active individual
and that is why it acquires a performance character [2]. Here
the oral communication requires and produces presentation
which is visual and concrete, direct and local. According to
Mr. McLuhan, the stages of communication are: primary
oral culture,literal written culture,typographic (Gutten-
berg) galaxy, and present electronic era [3]. McLuhan
claims that all human created innovations represent additions
Fig. 1 Multimedia components
Fig. 2 Interactivity
264 S. A. Savov et al.
to his/her body, and more specically the media technology
is enlargement of our senses. Oral cultures live in an Ear
World, and written societies live in an Eye World, which
is an Yin and Yang type of co-existence. In the present
postmodern electronic era (Digital World), the Eye World
is enriched by the Sound sensitivitycomponent, creating
the New Media, so to speak Multimedia (Fig. 3).
The secondary oral communication is inuenced by tech-
nical innovations that form the recent decades (Radio, Televi-
sionCable and Satellite, Cinema, Mobile Phone
Communication, and Internet). The new mediatechnologies
allow immediate transfer of text, video and sound messages all
over the world. In teaching, the synchronicity of message
transfer-receiving, gives a possibility of simultaneous visual
dialogue communication, via Internet using Skype and Face-
book Phone or other messaging applications. The technical
innovations lead towards abandoning of dominating medium
text. The education process now is enriched with Hyper Text,
Hot Spots,andText Translate when we use Internet. Using the
WWW-Internet offers various ways of showing and sharing
information via Web sites, Web blogs, Social Media, online
courses and interactive tutorials. We witness a new communi-
cation event called Staging, which is present in primary oral
communication as well as modern communication [3].
Staging is linked with arrangement of cultural predeter-
mined elements of communication process in a social
framework via communication channels perceived in situ.
Inuenced by the Digital New Media, the communication
is again approaching the spoken word, it becomes immediate
and expressive, and distinguishes it from the traditional
written communication. The contemporary communication
is mandatory to be Global. Even Reality TV Showsare
boasting that they are happening right now, at the present
moment, and are staged and aired LIVE On the Air. The
reality phenomenon requires local characteristics to be
replaced by expressive forms of the global culture. The
present multimedia communication is heading towards the
diffuse space of the global society. This means to rediscover
of situational-gestural, additive method and to transform the
humanity through the electronic (digital) communication
into a Global Tribe, according to McLuhan: We now live in
aglobal villagea simultaneous happening.[2: p. 63].
The communication in education using Multimedia is
reaching all of us. There are four main styles of communi-
cation: oral (previously mentioned), written language,
audio-visual, multi (plural) medial [3]. In Multimedia type
exist a social succession of several ways of communication.
Important communication channel is the Internet Global
Network, seeming uncontrollable, giving access to anyone,
which is a possibility of social communication articulation of
geographically, ideologically and economically isolated
students to the universitiesInternet Cyber Campuses [3].
The long-distance learning methods offer new possibilities
of reaching and a chance to spread out the information but
also to test the students with on-line test quizzes. Nowadays,
the online Universities and courses are widely used. The
courses are including text, video, audio tutorials, 3D ani-
mation presentations, e-books, tests, more interesting
WYSIWYG (What You See is What You Get) Interfaces
with hot spots, buttons and drag and dropoptions. With
Fig. 3 McLuhans communication
Multimedia Applications in Education 265
the help of E-Commerce web-based applications, the web
server databases store and retrieve important information
faster and secure.
2 Multimedia as an Intellectual Educational
Tool
2.1 Learning with Educational Multimedia
Applications
Starting always rst with text (script, scenario, copyright, or
storyboard) the rst art is a frame to our multimedia
applications used in education. The revolutionary Hyper-
textwith its Hyperlinkis a study aid that provides
multi-dimensional Cyber space note taking. The hypertext
leads the student to other links of valuable information. It
gives more information via accessing the large databases and
gives enormous knowledge references.
In such way is created a new literatureform called
Softpoetry. Softpoetry transforms literature into visual art
where words become theatre. Here the communication and
interactivity with the reader is provided by the hypertext
technology [3: p. 121].
The collection of information does not guarantee that the
student learns effectively. The student learns only by creat-
ing hypertext (Adobe Dreamweaver [4]). The students create
their own nodes and links among them. The student can
explore the topic to be structured. He/she organizes and
restructures it and links the sub-structures all together.
Applications, which provide the user with the possibility to
create or construct objects by using graphic programs or
linking nodes together, are not only component objects but
also cognitive concepts or models, which are dependent on
the learnerscurrent knowledge base.
Multimedia can be used to demonstrate complicated
processes such as the human body circulatory system or the
TV weather report system (cloud, rain developments). Fur-
thermore, the student can use the software to take many
more accurate measurements and explore creatively a phe-
nomenon and consider additional factors. With the help of
multimedia interactive features, the student controls the pace
and the content of what will be seen on the screen. The
student can understand complex interrelationships. They
control the learning process.
According to prof. Todorov, the Edutainment (combining
education and entertainment) multimedia titles are gaining
popularity. They include multimedia fairytales, games,
musical programs, and encyclopedias- dictionaries, with
virtual reality components. One example is Eyewitness Vir-
tual Reality Cat, an e-book with videos, photos, images, and
sound. The student becomes a cat-investigator, in a museum
virtual environment full of various artifacts, history, and
mythology information. The edutainment titles are the
newest hit of present multimedia.[3: p. 119].
2.2 Learning Through Computer-Supported
Problem Solving e-Games
When it comes to problem solving, is recommended the use
of computer-based tests and quizzes. In particular, using
problem sets in the context of so called on-line adventure
games.Multimedia adventure games can be seen as infor-
mation sets where possible pathways and the questions,
which can be asked, are predetermined. Normally, this type
of games varies in the number of possible pathways, in the
level of difculty and sophistication, and in the complexity
of answers to predetermined questions or problems. The
following aspects support the use of adventure games for
problem-solving approaches.
(a) Help and support. Due to the interactive nature of this
type of games, the students get feedback, help and support
from the computer. It is likely that students in this learning
environment still needs an instructor for some guidance.
(b) Coping with a variety of acquired responses. The
range of responses is one of the key elements in determining
the level of cognitive demand within these games. Problems
can be solved in many different ways. One advantage is that
students are confronted with different response possibilities
in the sense of responding according to different perspec-
tives. From a more negative point of view, this prescribed
feature of giving possible solutions can limit students
creativity.
(c) Time effectiveness. Most games are well designed
and offer the possibility to save the data at any point and
return to this point at a later time.
(d) Trial and error e-learning. Computer games offer
opportunities for boundless experimentation in the eld of
problem solving. The students can experiment with the
different possibilities in a very short period of time. In
reality, it is difcult to provide this type of trial/error learning
in an appropriate period of time and very often it is not
possible to test different possibilities in the elds of science.
(e) Interest and commitment. Students really like this
type of games because the games place everything in the
meaningful context of a compelling ctional (virtual) world
that seems to be real and living. Problem solving is a
complex intellectual process involving the coordination of a
range of demanding and interrelated skills, which include:
understanding and representing the problem and identi-
fying what type of information is relevant for the
solution;
266 S. A. Savov et al.
gathering and organizing relevant interactive
information;
constructing and managing a plan of action or an inter-
active strategy;
reasoning, hypothesis-testing and decision-making
process;
using various problem-solving tools, monitoring solu-
tions, and evaluating interactive results.
3 Interactive Learning with Multimedia
Materials
The computer can support different forms of collaborative
interaction depending on what form of collaborative activity
is desired. Airplane pilots, police ofcers, doctors, race car
drivers are taught by computer-based multimedia Virtual
Reality game-type training and testing units (air-craft
trainers) to improve their knowledge and safety skills.
When trying to solve a problem while participating in
computer-based group work, the focus should be on a clear
task structure and the provision of feedback on solutions.
Multimedia offers unique opportunities for the production
and representation of shared classroom experience. The
interactive character of modern technology can support
reasoning by amplifying the nature and boundaries of sci-
entic models of objects and events. We can controlthe
video, sound, and game. We can stop, rewind the video,
choose an information channel, take notes, and test ourselves
using the interactive multimedia quiz applications. Via
interactivity, the students create knowledge which is essen-
tially a matter of learning to argue, ask questions, search
information, and be more curious. The technology replaces
the need for students to participate in ongoing conversations
with partners sharing interests and commitments. Technol-
ogy should not be seen as replacing such communication but
rather as providing a resource for supporting it. Students
need support from responsive and more competent others,
such as instructors and professors, to think through the many
problems and to achieve progress. Professors can support
studentsinteractions around digital technologies in different
ways. They can encourage and enable students to practice
critical thinking in the classroom by having an exploratory
talk (discourse talk).
The present Multimedia revolution in education merges a
high-tech unit with art. This endeavour is a collaborative
work of computer specialists from the Silicon Valley and the
lm producers of Hollywood. It is possible the new hybrid
term of Siliwood to be synonymous with the new creative
potential[3: p. 122].
3.1 Web-Based Multimedia Applications
in Education
Various web-based multimedia applications are uploaded
on servers to provide information, knowledge, tests, know
howhelpful information to all students. Here are some of
them:
Podcasts and vodcasts [5]
Podcasts (or netcasts) are audio les and vodcasts are
audio-video les stored on a public or private domains or on
websites specialized on audio and audiovisual les (i.e.
iTunes, Podcast Alley, Podcast Directory). Podcasting is the
private or publiccreation and distribution of these les.
YouTube and YouTubeEdu [6]
YouTube is a video portal owned by Google. It provides the
possibility to watch, edit and comment videos. It has a simple
structure and is available in 15 different languages. Looking at
Youtube.com [6], a popular video and audio portal, we see the
fast development of podcasts within the last years that is due to
the fact that nowadays audio and video les are easy to create
(using students’“smart phones), edit, download, and dis-
tribute. It is possible to subscribe to a podcast series which
enables the subscriber to be alert when a new podcast episode
is created. In comparison with traditional audio or video
media, podcasts are much easier to produce and make avail-
able to a global audience. Using their i-phones, students can
create and upload movies and animations to lm festival sites
and also get awarded.
The use of podcasts
One opportunity to use podcasts in class could be the cre-
ation of radio shows, or podcasts for language or science
lessons. Like in the case of blogs, there are practically no
limits here. By creating their own podcasts, students can
experience their own knowledge and learning processes,
present their opinions, their understanding of complex
topics. Furthermore, getting acquainted with storyboards (for
video or animation movies) make students plan carefully,
reect on the order, prominence, and emphasis of the ele-
ments of the podcast [5].
3.2 Editing Graphics, Video, and Sound [7]
Live television Shows”—Live streaming web TV
Student performances such as musicals, ballet, character or
(period) dances, drama pieces, school conferences, and
interviews can be easily broadcasted by student TV channels
Live televisiononline. Prerequisites for a schools own
Multimedia Applications in Education 267
television station are a fast and stable Internet connection, a
computer with a microphone, a HD (high denition) video
camera or webcam or built-in video camera and a free
account at an online video streaming site (ustream.tv)[8].
Another opportunity would be to follow up regular podcasts
by scientists because the students are involved in discussing
a similar topic. By subscribing to the podcast, the user will
be alerted when new podcasts are available.
Adobe TV [9]
The multimedia collection contains a number of websites with
content relevant to the subject of education in general. Others
provide information on topics related to particular pieces of
software. It is closely related to the portfolio of products
developed and sold by the company. The content, however, is
more general than the content of traditional user guides.
Software to turn photos into video
Students and teachers can use free software like Photo to
Movie. They can use the software, among other things, to
display photos, add titles, backgrounds, music, effects, and
zoom into specic parts of photos [10].
Video-editing software: Windows Movie Maker,
Adobe Premiere and Adobe After Effects
Software to select particular video clips and/or add cover
text. Students can also add speech, sounds and music [11].
Other professional editing tools are Adobe Creative Cloud
Premiere Pro [11] and Adobe Creative Cloud After Effects
[12]. Also iMovie,JayCut.com are often used for editing
video content.
Audio editors and recorders
Students can handle elements like speech, sounds and music.
Students can record audio les from microphone, edit and
convert existing sound les, change the speed of a recording,
and mix sounds together. Free software of this kind is
Audacity [13].
3.3 Multimedia Web Development Tools
Authoring freeware to assist teachers and students in the
publishing of web content and e-learning objects (without
the need to become procient in HTML) includes Exe
Learning [14]. Students and teachers can also apply com-
mercial tools like Adobe Captivate or Articulate [15]. Stu-
dents knowing HTML code, can use Adobe Creative Cloud
Dreamweaver for creating web sites with main HTML code,
JAVA Applications, JAVA Script applets [4].
Adobe Edge, a web motion and interaction design tool
that allows students and professors to bring animated content
to websites, using the web standards HTML5, JavaScript,
and CSS3 (Cascading Style Sheets) [16].
Asynchronous JavaScript and XML (AJAX), a group
of web development techniques that students and teachers
can use to create asynchronous web pages that send data to
and retrieve data from a server in the background without
interfering with the display and behavior of displayed con-
tent [17].
jQuery, a JavaScript Library that simplies HTML
document traversing, event handling, animating, and Ajax
interactions for rapid web development [18].
Dojo, a tool that enables rapid development of web
applications, including JavaScript and CSS features [19].
PHP, a scripting language that is suited for web devel-
opment and can be embedded into HTML code [20].
Java, a programming language, which the students and
teachers can use to build client-server web applications. It is
a complicated language and requires many hours of pro-
gramming experience [21].
Flash, a development tool for animations and a
browser-based playerproduced by Adobe Creative Cloud.
The software provides viewing of 2D or 3D animation
applications, content, and videos [22].
Silverlight, a development tool and browser-based plug-in
produced by Microsoft. It can be used for creating web
applications with a relatively high level of interactivity [23].
3.4 Collection of Multimedia Education
Applications on the Web
Wikimedia [24]
It is operated by the Wikimedia Foundation, distributes free,
multilingual content, and provides the full content of various
wiki-based projects to the public free of charge. The Foun-
dation operates the worlds largest collaboratively edited
reference projects. These projects include:
Wikipedia, an encyclopedia applying the latest database
search engines for more and quality information;
WikiBooks, open-content e-books in different languages;
WikiSource, an online library of rare historical publications,
collected and maintained by various users. Applying one or
more of these sites into an educational setting, the students
can be assigned the role of end users as well as the role of
producers. Due to the limited amount of time in practice,
educators may want to focus on the rst role, i.e. on pre-
senting and retrieving linear and non-linear information
about a given subject matter. The information is usually
considered valid, since it is provided and edited by many
users, but learners can criticize the content based on com-
parisons with similar content from another updated source.
268 S. A. Savov et al.
WDL [25]
The objectives of the WDL (The World Digital Library) are,
among other things, to expand the volume and variety of
cultural content on the Internet and to provide resources for
educators, scholars, and general audiences. Their mission is
to make available on the Internet cultural treasures around
the world. These resources include manuscripts, maps, rare
books, musical scores, recordings, lms, prints, pho-
tographs, and architectural drawings. The learners can be
assigned the role of end users of WDL. Since the multimedia
resources are categorized, the learners can look for resources
regarding a particular topic, place, time, or institution.
Moreover, they can browse for specic types of items. They
can enter their own search words.
MERLOT [26]
(Multimedia Educational Resource for Learning and Online
Teaching) is a website, which gathers free and open online
resources. The aim is to share high quality learning materials
and pedagogy. The content is assembled from various
sources worldwide. The activities of the MERLOT website
are based on the collaboration and support of its individual
members, institutional and corporate partners, as well as the
editorial board. Key services include building and sustaining
online academic communities, online teaching and learning
initiatives, and building, organizing, reviewing and devel-
oping applications of online teaching-learning materials.
Input comes from an ongoing communication with its
worldwide supporters and contributors. The users can
browse a collection of subject categories in order to search
for learning materials (arts, business, education, humanities,
mathematics and statistics, science and technology, and
social sciences). Students can nd submitted materials,
authored materials, commented, learning exercises or pro-
vided personal collections.
OCW Consortium [27]
The OCW (Open CourseWare) Consortium is a worldwide
community of education institutions and associated organiza-
tions committed to advancing open courseware, i.e. free and
open digital publication of educational materials for colleges
and universities. Educators can search courses using a spe-
cialized search engine, browse courses by the language in
which they are published. Educators can also explore courses
from a particular source or publishing institution. This unit
introduces the challenges for disabled students who may use
computers in different ways when taking part in e-Learning. It
covers the technology and techniques used by disabled stu-
dents, the adjustments to teaching methods that might be rea-
sonable, design decisions which affect the accessibility of
e-Learning tools and strategies for evaluation.
Open educational resources portal [28]
The title of this website, temoa, represents the words to
seek, investigate, inquire. It is proposed by Tecnológico de
Monterrey. The website is a multilingual catalogue of open
educational resources described and evaluated by an aca-
demic community. The resources are categorized by area of
knowledge, educational level and language. Moreover, the
website provides a search engine with intuitive lters.The
educational materials are, among others, provided by:
Massachusetts Institute of Technology; Exeter Research and
Institutional Content archive (ERIC); Access to Research
Resources for Teachers (ARRT); Rice University; The Open
University; HowStuff Works (A Discovery Company).
FREE (Federal Resources for Educational Excellence)isa
website hosted by the federal government of the United
States and maintained by the U.S. Department of Education.
The aim of this site is providing high quality educational
resources for free [29].
ERIC (Educational Resource Information Centre)isan
online digital database of education research and information
resources [30].
World Lecture Project [31]
The website is hosted by the World Lecture Project associ-
ation. It contains video lectures on a variety of topics from
all over the world.
MIT World (Massachusetts Institute of Technology)
hosts a website called MIT World, which is a free and open
site that provides on-demand video of signicant public
events at MIT [32].
BioDigital Human [33]
Multimedia web site with video, text, sound, graphics and
animation about human body and its anatomical functions.
Google Earth [34]
Various maps and areal views of the Planet Earth.
3.5 Multimedia Applications for Graphics
and 3D Authoring
Software to view and edit images
Software to view and edit images. Students and teachers
can pick gures, crop images or produce a variety of effects.
Moreover, they can change the format of images. Since size
matters on the Internet, editors can also be used to compress
images. Most often, the ofce software mentioned above
includes software for image processing. An example of
freeware for this purpose is IrfanView [35].
Multimedia Applications in Education 269
Adobe Photoshop Creative Cloud, Adobe Creative
Lab, Adobe Illustrator [36]
These are the best professional images, photos, graphics, and
special effects software used by all, such as: photographers,
artists, moviemakers, editors, PR specialists, and graphics
artists. Photoshop creates raster image les, compared to
Illustrator, specialized in a vector graphics with Alpha
channel. The created graphics after manipulation can be used
in a various multimedia applications and presentations.
Professional 3D Animation and software to produce
3D presentations
Students and teachers can use Poser, and Blender software
to create interactive 3D content [37]. Professional software
includes 3D Studio Max for 3D modeling and animation
[38], AutoCad, and Mudbox produced by Autodesk, and
Adobe Creative CloudCharacter Animator. The most
advanced 3D software applications are Pixologic ZBrush-
Core (for sculpting and modeling) and Autodesk MAYA (for
computer animation) [39].
3.6 Software to Produce e-Learning Objects, VR
Objects, and Presentations
KNOT-Mac (Knowledge Network Organizing Tool for
Macintosh)
These are tools that introduce many online applications,
supporting higher order thinking strategies and creativity for
students [40].
QuickTime VR engine Can help create a Virtual Reality
area in a web site, showing an interior of buildings, for
examples VR 3D Models of ancient fortresses, castles, hotel
interiors etc. The students can create their VR les and
embed them into HTML code [41].
Multimedia Education Presentations
And nally all the students can create their own Multimedia
presentations, using Microsoft Ofce Power Point and Prezi
[42]. These modern multimedia applications can incorporate
graphics, sound, video, animation, text, and interactivity.
4 Conclusion
Effective teaching and learning is impossible nowadays
without the use of various Multimedia applications tech-
niques and innovations of the so-called digitalpedagogy.
Within a high-tech information-educational environment,
multimedia components (sound, graphics, video, animation,
and text) are most powerful tools, when creatively
combined, to assists teachers to enhance their professional
capacity and helps students to enrich their knowledge
potential and to achieve their educational goals. Moreover,
modern multimedia in combination with Internet, social
media and open educational resources contribute to the
Global Student network where quality education is more
accessible for all no matter time and distance.
References
1. Packer, R., Jordan, K.: Multimedia from Wagner to Virtual
Reality. Norton & Company, USA (2001)
2. McLuhan, M.: The Medium is the Massage. Bantam Book, USA
(1967)
3. Todorov, J.: Audiovisual & IT in education. Veda Slovena (2009)
4. Adobe creative cloud dreamweaver. http://www.adobe.com/
products/dreamweaver.html
5. Podcasts for students. http://www.bookwink.com;http://www.
storynory.com
6. Video and audio portals. http://www.youtube.com;http://www.
iTunes.com;http://www.youtube.com/education
7. Editing movie. http://www.JayCut.com;http://www.iMovie.com
8. Ustream TV application. http://www.ustream.tv
9. Adobe TV. http://tv.adobe.com
10. Photo to movie. http://www.lqgraphics.com/software/phototomovie.
php
11. Professional video editing: windows movie maker. http://explore.
live.com/windows-live-movie-maker; Adobe creative cloud pre-
miere. http://www.adobe.com/products/premiere.html
12. Professional video special effects: adobe creative cloud after
effects. http://www.adobe.com/products/aftereffects.html
13. Audacity. http://audacity.sourceforge.net
14. Exe learning. http://exelearning.org/wiki
15. Adobe captivate & articulate. http://www.adobe.com/dk/products/
captivate.html;http://www.articulate.com
16. Adobe creative cloud and adobe edge. http://www.adobe.com/
creativecloud.html;http://labs.adobe.com/technologies/edge
17. AJAX. http://en.wikipedia.org/wiki/Ajax_(programming)
18. jQuery. http://jquery.com
19. Dojo. http://dojotoolkit.org
20. PHP. http://www.php.net
21. JAVA. http://en.wikipedia.org/wiki/Java_(programming_language)
22. FLASH. http://www.adobe.com/products/ashplayer.html
23. Silverlight. http://www.microsoft.com/silverlight
24. Wikimedia. http://Wikimedia.org
25. WDL. http://www.wdl.org
26. MERLOT. http://www.merlot.org
27. OCW consortium. http://www.ocwconsortium.org
28. Open sources. http://www.temoa.info
29. FREE. http://www.free.ed.gov
30. ERIC. http://www.eric.ed.gov
31. World lecture project. http://world-lecture-project.org
32. MIT world. http://www.mitworld.mit.edu
33. Biodigital human. http://www.biodigitalhuman.com
34. Google earth. http://www.google.com/intl/en/earth/index.html
35. Irfan view. http://www.irfanview.com
36. Adobe photoshop creative cloud and adobe creative lab. http://www.
photoshop.com/;http://labs.adobe.com/technologies/photoshop/
37. Poser and blender. http://my.smithmicro.com/;http://www.
blender.org
270 S. A. Savov et al.
38. 3D studio max. http://usa.autodesk.com/3ds-max
39. Pixologic Zbrush and Autodesk MAYA. http://pixologic.com;
https://www.autodesk.com/products/maya/overview
40. KNOT-Mac (Knowledge network organizing tool for macintosh).
http://ictmindtools.net
41. QuickTime VR. http://www.easypano.com/panorama-software.
html;http://sky.easypano.com/panoramic-images/Panoramic%
20Image-160.html
42. Microsoft ofce power point and Prezi. https://products.ofce.com/
powerpoint;https://prezi.com/
Multimedia Applications in Education 271
Non-invasive Extremist Identification
and Asset Maintenance
Vladimir Tomaševićand Stanko Bulajić
Abstract
Reactivity plagues academics and eld operatives alike
and generates false data that invariably lead to inappro-
priate resource allocation and ultimately failure to attain
the desired operational and strategic goals. The only eld
tried and proved method of asset management, in terms of
extremism control and successful prevention and/or
damage control, is to maintain non-invasive identication
and tagging methods that are the prerequisite for later
intelligence gathering. Migratory crisis generated by the
conicts in Syria has opened a new gateway in interna-
tional ow of extremism and increased migrant ow has
given cover for transnational communication from
Afghanistan, via Iran, Syria, and the Balkans into the
EU and onwards. Furthermore it has given an opportunity
for known and identied elements to disappear of the
radar and become reintroduced in extremist activities
back from where they have originated. Three main
non-invasive methods of identication have been devel-
oped and tested; all of which are grounded in inter-group
social interactions within the migrant community.
Despite being publicly debated; they for the time being
are insurmountable for extremists as they rely on two
main causalities which they cannot control: behaviour of
children and numbers of migrants.
Keywords
Extremist identication Anti-terrorism
Balkans
1 Reactivity and Relating Issues
1.1 Theoretical Implications of Reactivity
Researchers in the eld of social sciences are well
acquainted with the so called Hawthorne effect, the
quintessential example of the reactivity in observation.
Reactivity means that the subjects of observation change
their behaviour when/if they are aware that their behaviours
are being observed [1]. This important aspect of qualitative
studies, including security studies, has a contamination effect
of the natural social environment and thus on the nal
ndings [2]. Reactivity presents the most important threat of
the validity of scientic research ndings when the research
is focused on human behaviours or characteristics [3]. Thus,
the scientists have to take great efforts in reducing the par-
ticipantsreactivity [2].
Obtrusive observation exists when a participant is com-
pletely aware that is being observed and changes the beha-
viour in a way that he or she believes it would satisfy the
observers expectations [4]. Also, participants change their
behaviour when seeking positive impressions of themselves
[5]. Unobtrusive observation exists when a participant is not
noticing the observation [4]. Researchers should unequivo-
cally address reactivity by training eld observers to be able
to be unobtrusive. Facial expressions, posture, movements
and reactions of the eld observers to the situations and
events can also change participantsbehaviours, so training
of the eld observers to be unresponsive is extremely
important in any eld survey.
Different researchers point out the ve factors that con-
tribute to reactivity that has to be taken into the account
when conducting research in security studies:
1. Social (non)acceptability of certain behaviours, so
socially undesirable behaviours are suppressed and
desirable behaviours expressed.
V. Tomašević(&)S. Bulajić
Belgrade School of Engineering Management,
Union Nikola-TeslaUniversity, Belgrade, Serbia
e-mail: vladimir.tomasevic@m.rs
S. Bulajić
e-mail: stanko.bulajic@m.rs
©Springer Nature Switzerland AG 2019
A. Al-Masri and K. Curran (eds.), Smart Technologies and Innovation for a Sustainable Future,
Advances in Science, Technology & Innovation, https://doi.org/10.1007/978-3-030-01659-3_31
273
2. Personal characteristics and age may inuence if a sub-
ject or subjects (e.g. children) react less to the direct
behaviours than the other participants.
3. The closeness of an observer and visibility of observation
instruments may cause conspicuousness of subjects.
4. Some characteristics of observers (age, gender, etc.) can
inuence the participantsresponses.
5. The rationale of observation can inuence participants
involvement [6].
It is clear that the scientists have to determine if they
observed natural activities of the subject and not their
reaction to the observers. In theory, reactivity is not a
problem when participants are unaware of the research
context so that they can behave naturally [6].
Many researchers agree that the most valid results are
obtained from observations when reactivity is scaled down.
Scaling down of reactivity is achieved through so called
participant observation, when the real role of the observer is
not known to the participants [7]. To accomplish that, the
observer must be able to completely take the participant
role, but even in those situations, the observersbehaviour
might change the course of the observation study. Even in
the cases of observing someones behaviour through one
way mirror, the participants behaviour might be changed if
he or she is aware of the situation. In many cases, in security
studies it is impossible to organize participant observations
due to problems with the concealing the observers true
identity (ethnical origin, language, culture, etc.). In many
cases the data collected might be tainted because the
observations were not being recorded (or were poorly
recorded) and the observers relying only on memory [8].
Some of the researchers, while observing family inter-
actions through audio taping, found out that participants
followed the same behavioural patterns when they didnt and
did know if the tape recorder was on or off [9]. Also, some
market research (e.g. the research done for Kimberly Clark
and their brand Huggies) in 1980s suggested that using the
video to tape the observed behaviour, changed the partici-
pants behaviours only at the beginning of the study. After a
while, the participants were behaving like the cameras were
not recording their behaviours [10].
1.2 Practical Field Implications of Reactivity
One of the largest challenges of security studies research is
that in the last two decades, even in situations where the
observers are not visible, people change their behaviours in
circumstances when they believe they are under the obser-
vation of security cameras (in the major streets, airports,
train stations, government buildings, etc.). Airport security
practices include observations of specic emotions and
behaviours and proling [11], thus airport security proce-
dures being the most obvious example.
In security studies, it is also necessary not to forget, in
terms of research design, the issue of the validity of the data
collected through interviews and questionnaires when the
participants (e.g. refugees) may try to give socially desirable
answers in order to reach certain personal goals.
Taking all of the aforementioned into account it is clear
that subjects of observations and those that may perceive to
be so, exhibit behaviour that both invalidates scientic data
collection, and more importantly annuls all efforts of
extremist identication and latter tagging methods that are to
follow. Therefore this article focuses on unobtrusive iden-
tication methods of potential extremists and thus enables
security services to maintain a secure channel of tagging and
personal following that this article refers to as asset
management.
2 Refugee and Migrant Movement
as ExtremistsOpportunities
2.1 Conditions for Migrant and/or Refugee
Generation
International survey of international crises has yielded a
summary of events that generate a steady ow of migrants
into Serbia through itssouthern border with the FYR of
Macedonia: unresolved status and stressful situation of
refugees and displaced persons from Syria, Afghanistan,
Iraq, Eritrea, Pakistan, Nigeria, Somalia, Sudan, Gambia
and Mali; organized crime, robbery, rioting and the
expression of dissatisfaction with the authorities and indi-
vidual incidents; human; illegal migration and border
breaches; disputes with neighbouring countries; the inability
of the EU to resolve the issue of migrant crisis and indi-
vidual decisions of neighbouring countries in the long run;
import of terrorism; illegal trafcking and smuggling of
weapons; the rise of right-wing extremism; problems with
economic development; endangering energy security
activities [12]. Complexity and the seriousness of threats to
the security to the EU and other nations is partially generated
by the migratory crisis as it creates a window for extremists
to perpetrate borders under false auspices as genuine
refugees.
The aforementioned current international affairs have
created conditions under which refugees and or migrants are
now a force that needs to be taken into account when ana-
lysing security aspects of developed nations.
274 V. Tomaševićand S. Bulajić
2.2 Migrant and/or Refugee Defining
Denitions state that an economic migrant is a person whose
primary motivation for leaving is economic gain. Lately, the
term migrantis seen as an umbrella term for three groups
of individuals seeking a new location for settlement [13],
although according to the UNHCR this is not justiable [14].
According to the UNHCR So, at UNHCR we say refugees
and migrantswhen referring to movements of people by sea
or in other circumstances where we think both groups may
be presente.g. boat movements in Southeast Asia.
This article takes the position that a refugeeis a person
or persons eeing war or persecution across an international
border. This article takes the position that migrantsare
people moving for reasons not included in the legal deni-
tion of a refugee. This is the current position of UNCHR
[14].
2.3 Current Migrant and/or Refugee Situation
in Serbia
The migrant crisis that is shaking Europe is the result of
long-standing conicts in the Middle East, Afghanistan and
North Africa, which arose due to the political and economic
instability of states in the region and the deep social and
cultural contradictions of societies within them, followed by
physical violence against the population, war crimes,
agrant violation of human rights, the destruction of material
and cultural goods. These factors have caused mass migra-
tions of the population from the conict-affected area rst to
neighbouring countries, and then to Europe as their nal
destination. In 2015, Europe faced the biggest humanitarian
catastrophe since the end of the Second World War. The
massive and uncontrolled ow of migrants was a great
surprise for the European Union, as well as other countries
on the European continent. According to the UN refugee
agency [14], in 2015 more than 820,000 illegal migrants
arrived in the EU by sea, mostly in Greece (673,000) and
Italy (142,000). Most of these migrants arrived from Syria
(52%), Afghanistan (19%), Iraq (6%) and 145 Eritrea (5%),
but this wave also includes people from Pakistan, Somalia,
Nigeria, Sudan, Gambia and Mali[15].
The migrant crisis, created in Syria, has expanded to the
Balkan region, which has become the main area for the
transit of migrants to the countries of Western Europe. Due
to the increased number of migrants, and based on the
decision of the Government of the Republic of Serbia, all
elements of the security and defence system have been
engaged, who have taken appropriate measures within their
jurisdiction.
The goal of the response is to efciently manage the
migrant crisis through the establishment of security,
nancial, social and humanitarian mechanisms and proce-
dures for a comprehensive and efcient analysis, monitoring,
forecasting and managing the migrant crisis, while ensuring
a stable state of security on the territory of the Republic of
Serbia and respecting and applying international and
national legal norms and standards, in cooperation with
neighbouring countries, the EU and other relevant interna-
tional actors and organizations. This is achieved through the
denition and implementation of specic tasks related to
military security, political, legal and diplomatic, as well as
socio-humanitarian activities [16].
Since May 2015, as well as other candidate countries in
the Western Balkans, Serbia has faced a massive inux of
refugees and migrants in transit from Greece to Hungary or
Croatia. Most of them are displaced from Syria, Iraq and
Afghanistan. In 2015, the government registered more than
815,000 refugees who went through Serbia. After the closure
of the so-called Western Balkan migration route in March
2016 and implementing the EU and Turkey agreements, the
number of entries reduced drastically.
2.4 Refugees and Migrants as Cover
for Extremists
The constant ow of refugees and migrants has proven to be
a window of opportunity of transferring extremists across
borders into their intended destination countries under cover
and pretence of refugee status.
This article does not seek to analyse migrants which may
be a result of economic or social (including politically,
sexually or otherwise dened) backgrounds or refugees
(weather genuine or not) but only extremists which use these
covers in order to achieve their goal of reaching their nal
destination. Current eld intelligence indicates that about 3%
of all migrants or refugees could potentially be extremists
(terrorists, common criminals, and/or those escaping justice
from their countries of origin). This would imply that
approximately 5075 extremiststransit through Serbia daily
into Western Europe constantly for the past 3 years [17].
2.5 Need for Unobtrusive Extremist
Identification
Taking into account how the theory indicates that the best
method of observation is unobtrusive and agent eld expe-
rience which conrms that once subjects are publicly iden-
tied or compromised; a clear need for unobtrusive
extremist identication arises.
The following text clearly identies how tested scientic
methods have been used to identify extremists amongst
migrants and refugees, three models of how this is done and
Non-invasive Extremist Identification and Asset Maintenance 275
evidence is given to how the results have been tested and
validated.
The authors need to point out that signicant elements
have been edited in order to protect secondary inferences on
how valid models of identication are still in use. The
models described are now termed as un-staredwhich
denotes that their classied status has been removed and
they are now readily available for academia to use, study and
share publicly. Elements which pertain to this and related
studies that are still deemed as classied may and can be
accessed once appropriate clearance is granted.
3 Extremist Identification
3.1 The Need of the Observed to Become
Unobservable
Extremists and those that have been identied as those with
reasonably close family and/or organisational ties to those
that have proven terrorist track records continuously main-
tain the need for subversive, under the radar, and unob-
servable behaviour [18]. By the nature of this behaviour,
individuals that have an aim of reaching their nal destina-
tion in Western Europe exhibit this primary trait: they
remain low-key even when presented with credible chances
of advancing their passage from the main legal channels
available such as the Red Cross/Crescent, UNCHR, Caritas
or other similar organisations [19].
Using this observed trend, eld tests, in vivo, in the
period 20152017 have been conducted. Field testing has
been conducted in Belgrade Refugee Centre with aid of
professional social and intelligence workers as well as
impartial volunteers. The results have show that out of a
sample of 1000 individuals accompanying adolescents that
have clearly and visibly remained passive when offered
organised and ofcially sanctioned help; secondary security
screening of the 1000 individuals has shown that 91% of
examined individuals have claimed to have lost their per-
sonal identication papers, whilst 71% of the sample have
after secondary search and extensive interviewing been
discovered to have been giving a false country of origin, and
84.5% of those giving false information of point of origin
have a criminal record of some form in their native countries
(note denition of criminal record is taken as a crime in the
country of origin) whilst through undisclosed genetic
matching; 97% of the tested individuals did not have a
genetic match with those that claim to be their dependants.
The results point out that clearly, those who avoid contact in
terms of assistance from ofcials and are accompanied by
children that they claim as their own, once in Serbia, have
something to hide, which is the precursor to potential sub-
versive behaviour.
Although it is appreciated that there may be research
limitations due to the fact that only migrants and refugees
have been examined in this particular Centre, however, this
Centre itself is responsible for processing all of the migrants
and refugees before they either legally leave the country or
disappear once they fail to report i.e. illegally leave the
country and enter the EU.
3.2 Identified Incongruence of the Expected
and Unexpected
Assadi et al. [20] have demonstrated that parents (originating
from some of the countries from where refugees or migrants
appear) that have higher formal educational backgrounds
maintain a more authoritarian stance towards their children.
However, certain individuals of clearly lower formal edu-
cational levels have demonstrated same behaviour with
children in their surroundings, while the children in their
immediate environment do not seem to respond to traditional
parental stimuli [21] from the same individuals. In other
words, there is incongruence both on the side of parental and
child behaviour to what should be observed in the eld.
Furthermore, once these individuals realise that they are
in the focus of attention of local authorities, or those that
they perceive as persons of decision making capabilities,
they exhibit in-ordinarily high levels of interaction and care
with their children or adolescents that they present as such,
or present themselves as victims on behalf of their
dependants.
3.3 Modes of Identification
Three main modes of identication have been derived from
the study of 1000 individuals in Belgrade Refugee Centre:
1. Individuals that are accompanied by adolescents and
those that pose as their family members exhibit beha-
viour that is not congruent with widely dened family
values: children although obedient are note completely
familiar with one member of the group (it does not have
to necessarily be a male member; in 25% of the cases it
was the false mother that was the perpetrator). Within
96 h of intensive observation, children in 100% of the
cases where extremists were identied, gave away the
real nature of the relationship between the perpetrator and
other members of the group (family, friends from the
neighbourhood, or other associates).
2. Certain individuals are inaccessible by those that pose as
Security services. Whenever eld operatives, or even
false probes, that are identied amongst the migrant
community as those that work for the Police, Military or
276 V. Tomaševićand S. Bulajić
Immigration approach or attempt to approach a specic
individual; some form of incident or commotion appears
and that individual disappears. They are generally
shielded by 23 aids that are those that divert attention
and whos task it is to divert attention to themselves.
These individuals are those that are not accompanied by
adolescents and appear very low key. However, they are
easily identied by clearly being avoided by what would
be perceived as middle-income and/or educated migrants
that are clearly not refugees but economic migrants.
3. Social migrants, those travelling for economic benet,
those that are being smuggled for the illegal sex industry
in Europe, common petty criminals, those perceived as
sexual deviants in their countries, or all those that stand
to gain from reaching their nal destination as a means to
an end in terms of nancial prosperity rather than simple
avoidance of war-devastated countries avoid any contact
with potential extremists. They are generally afraid of
being seen with then publicly, they avoid any contact
with them in order to avoid conict or being recruited to
help. Thus, economic and social migrants may some-
times share common spaces with genuine refugees, but
will avoid those they perceive as criminals; and in return
for safe passage to their country of choice: in a controlled
test of 100 individuals that were selected, as social and
nancial migrants rather than genuine refugees, 100%
were willing to participate, while 76% of those tested
have successfully identied potential extremists (those
that were later conrmed as individuals with connections
to organised crime).
3.4 Testing of Results
One of the fundamental tests is repeatability under controlled
circumstances. Unfortunately, in social sciences, experi-
ments are difcult to repeat, especially from the aspect of
reactivity and repeatability in security studies once original
postulates and methods are publicly announced.
However, a large sample of studied subjects that accounts
for 0.1% of the entire refugee and migrant population that
has passed through Serbia and the fact that up to date, 1 year
after to completion of this research, no change in behaviour
in the eld has been noticed even though these methods have
been abandoned for more advanced ones indicate validity of
the data. Furthermore, once identied, subjects are through
certain nanotechnologies tagged, followed, maintained and
managed. Over the past year, once having left Serbia and
having reached their destination in the EU, over 80% have
been proven, in terms of successful arrests and conviction
rates, to be clearly connected to extremist elements and
criminal organisations, further conrming the validity of the
obtained data.
4 Asset Management
Once the potential perpetrator has been identied, they are
located and tagged. Tagging/marking is done using latest
advancements in nanotechnology (further information only
upon security clearances have been granted). These indi-
viduals are then treated as assets to eld operatives even
though they themselves are not aware that their position has
been compromised.
From the point of view of the experimentation and
research conducted, asset management is important only for
up to 20 weeks from identication at the Refugee Centre.
Their management once leaving Serbia is passed on to the
relevant authorities in their respective countries.
4.1 Asset Confirmation
Conrmation of the successful identication comes in the
form of continued interest in the subjects on the part of the
host nationsintelligence services. The fact that so far, our
cooperation has not ceased but in fact increased indicates
further conrmation of this model and validates the results.
4.2 Time of Asset Transition
Assets are managed in three distinct phases:
1. Phase 1 is the time from the moment they are identied
as potential perpetrators or as those that may belong to an
extremist or criminal organisation until they leave the
territory of the Republic of Serbia. This phase has
traditionally proven to be between 4 and 10 weeks.
2. Phase 2 is the time from when they enter EU and their
journey within the EU where they settle (their trail and
traces of communication may serve as vital intelligence
to those that are already operating within the boundaries
of the EU but have not been identied yet). This phase
has traditionally proven to be between 8 and 10 weeks.
3. Phase 3 begins from the moment they are deemed to have
reached the destination from where they may commit
certain illegal activities or plan to leave the EU or other
countries such as the US or Russian Federation. This
phase has traditionally proven to be between 16 weeks
and several years.
Non-invasive Extremist Identification and Asset Maintenance 277
Further information only upon security clearances has
been granted.
5 Conclusions
Identication of extremist or individuals afliated to known
criminal organisations is prone to reactivity and this paper
has tried to address this issue by showing that it is possible to
take known academic approaches and known parameters of
social experiments and research and gain valid and valuable
data. This research including 1000 refugees/migrants in the
Refugee Centre in Belgrade over a period of two years and
has shown that there are three main models in observation in
social interaction that enable intelligence ofcers in the eld
to gather data. Three main models are social interaction
incongruences between grown individuals and adolescents
which appear to be solely staged for the benets of what they
think social workers need to see in order to grant safe pas-
sage. In this model, the key to identication are children
which even with years of training or being fed false infor-
mation give away the fact that they are not related to their
guardians. Any suspicion can be eliminated by simple
readily available genetic testing whereby the subjects need
not be aware of this. The second method is grounded in the
inability of getting in touch of those that are perceived as
security services through sequences of staged events on the
part of the migrant refugee community. The third method
again arises from social interaction and is grounded in the
fact that social and economic migrants are happy to identify
suspicious individuals in exchange for safe passage and as a
rule of thumb always avoid any contact with extremists and
criminals.
Once threats have been identied, they are given the
status of an involuntary or subconscious eld asset that is
managed in three specic phases. These phases are geo-
graphically a timer restrained and dened. Further infor-
mation only upon security clearances has been granted.
References
1. Oswald, D., Sherratt, F., Smith, S.: Handling the hawthorne effect:
the challenges surrounding a participant observer. Rev. Soc. Stud.
(RoSS) 1(1) (Autumn 2014)
2. Pellegrini, A.D.: Observing Children in Their Natural Worlds: A
Methodological Primer, 2nd edn. Lawrence Erlbaum Associates,
Mahwah, NJ (2004)
3. Corbetta, P.: Social Research. Theory, Methods and Techniques.
SAGE Publications, Thousand Oaks, CA (2003)
4. Rubin, A., Babbie, E.: Essential Search Methods in Social Work,
3rd edn. Brooks/Cole, Cengage Learning, Belmont, CA (2011)
5. Lewis-Beck, M.S., Bryman, A., Futing-Liao, T. (eds.): The SAGE
Encyclopaedia of Social Science Research Methods, vol. 3. SAGE
Publications, Thousand Oaks, CA (2004)
6. Hartmann, D.P., Barrios, B.A., Wood, D.D.: Principles of
behavioral observation. In: Haynes, S.N., Heiby, E.M. (eds.)
Comprehensive Handbook of Psychological Assessment, Behav-
ioral Assessment, vol. 3. Wiley, Hoboken, NJ (2004)
7. Monette, D.R., Sullivan, T.J., Cornell, R.D.: Applied Social
Research. A Tool for the Human Services, 8th edn. Brooks/Cole,
Cengage Learning, Belmont, CA (2011)
8. Coolican, H.: Research Methods and Statistics in Psychology, 5th
edn. Routlege, New York, NY (2009)
9. Kantowitz, B.H., Roediger, H.L. III, Elmes, D.G: Experimental
Psychology, 9th edn. Wadsworth, Cengage Learning, Belmont,
CA (2009)
10. Bernard, R.H.: Social Research Methods. Qualitative and Quan-
titative Approaches. Sage, Thousand Oaks, CA (2013)
11. Frowd, F.M., Leite, C.C.: Effect at the airport. In: Salter, M.B.,
Mutlu, C.E. (eds.) Research Methods in Critical Security Studies.
An Introduction. Routledge, US, Canada (2013)
12. Group of Authors: Strategic Forecasting and Development of
Scenarios of Crisis Development in Strategic Planning and Crisis
Resolution. Department of Strategy, Military Academy. Belgrade,
Serbia (2016)
13. Park, J.: Europes migration crisis. CFR Backgrounders. Council
of Foreign Relations (2015). URL: http://www.cfr.org/migration/
europes-migration-crisis/p32874. last accessed 2017/2/28
14. Edwards, A.: UNHCR viewpoint: Refugeeor migrant’—Which
is right? (2015). URL: http://www.unhcr.org/55df0e556.html. Last
accessed 2016/2/5
15. Bagdonas, Ą.: The EU migration crisis and the Baltic security.
J. Baltic Secur. 1(2), 727 (2015)
16. ibid 12
17. Group of Authors: Strategic Forecasting and Development of
Scenarios of Crisis Development in Strategic Planning and Crisis
Resolution. Department of Strategy, Military Academy, Belgrade,
Serbia (2017)
18. Janković, D.: Bezbednosne anomalije migratornih kretanja-borba
protiv krijumčarenja i trgovine ljudima, Thesis submitted in patrial
fulllment for the requirements to the degree of Bachelor of
Engineering Management, Union Nikola-Tesla. School of
Engineering Management, Institute for Security Studies, Belgrade,
Serbia (2017)
19. Vukadinović, M.: Rešavanje azilantskog pitanja kao uslova u
zaštiti granice kao kritične infrastrukture države, Thesis submitted
in patrial fulllment for the requirements to the degree of Bachelor
of Engineering Management, Union Nikola-Tesla. School of
Engineering Management, Institute for Security Studies, Belgrade,
Serbia (2017)
20. Assadi, S.M., Zokaei, N., Kaviani, H., Mohammadi, M.R., Ghaeli,
P.: Effect of socio-cultural context and parenting style on
scholastic achievement among Iranian adolescents. Soc. Dev. 16
(1), 169180 (2007)
21. Dwairy, M., Achoui, M., Abouserie, R., Farah, A.: Parenting style,
individuation, and mental health of Arab adolescents: a third
cross-regional research study. J. Cross Cult. Psychol. 37(3), 111
(2006)
278 V. Tomaševićand S. Bulajić
Open Platform for Network Functions
Virtualization in the Digital Era
Stela Ruseva, Rumyana Antonova, and Nikola Naidenov
Abstract
Network Functions Virtualization (NFV) is a network
architecture philosophy, which offers a new way to
design, deploy and manage networking services. NFV
enables a new level of service agility and manageability,
while also allowing better asset utilization. To achieve
these and other goals NFV can be used in combination
with Software Dened Networking, another technology
that uses network abstraction. This article analyses Open
Platform for NFV (OPNFV), an open source project, and
its signicance in providing for an open source reference
platform to validate multivendor, interoperable NFV
solutions. The OPNFV platform architecture and some
of the components, integrated into OPNFV from
upstream projects to build the NFV Infrastructure are
also covered in the article. OPNFV is a carrier-grade
platform, aimed at accelerating the deployment of new
NFV products and services that meets the industrys
needs by introducing specic technology components,
based on their use cases and deployment architectures. To
ensure consistency, performance and interoperability
among virtualized network infrastructures, OPNFV
encourages an open ecosystem of participants and enables
broad industry collaboration.
Keywords
Open platform for NFV (OPNFV) Network
functions virtualization (NFV) VNF Cloud
computing OpenStack Software-Dened
networking (SDN)
1 Introduction
The industrys attention is presently focused on software
congurable SDN networks as well as virtualization tech-
nologies with NFV functions. Some topics, connected to this
matter, are discussed in this article [1]: How the operator and
its business as a whole transform; What can be offered to the
telecom operators by Operations Support Systems manu-
facturers; How todays IT industry players can adequately
meet the revolution in networking technologies with proper
management systems in telecommunications.
According to the article [2], the basic necessities in
industry are:
Increased exibility of services;
Increased operative effectiveness;
Cloud-based models of offered services;
Dynamic allocation of services to provide necessary
exibility;
Possibility to equip the hardware for general use with
new functionalities;
Integration of the existing open-source NFV systems;
Complete collaboration, coordination and testing of the
interacting systems;
Proved, guaranteed quality of network services.
NFV picks out network functions (such as NAT, re-
walling, intrusion detection, DNS and cashing) from the
patented hardware devices so that they are able to work on
software. NFV has been designed to provide network com-
ponents necessary for the maintenance of the completely
virtualized infrastructurevirtual servers, storage and even
whole networks. It uses conventional IT virtualization
technologies which operate with large amounts of data,
switches and storage hardware in order to virtualize network
functions. NFV can be applied to any functions related to
data transfer or to control functions in cable or wireless
network infrastructure [1,3].
S. Ruseva R. Antonova (&)N. Naidenov
Faculty of Mathematics and Informatics, Soa University
St. Kliment Ohridski,Soa, Bulgaria
e-mail: Dr.Antonova@t-online.de
S. Ruseva
e-mail: stela@fmi.uni-soa.bg
N. Naidenov
e-mail: niknn@ucc.uni-soa.bg
©Springer Nature Switzerland AG 2019
A. Al-Masri and K. Curran (eds.), Smart Technologies and Innovation for a Sustainable Future,
Advances in Science, Technology & Innovation, https://doi.org/10.1007/978-3-030-01659-3_32
279
A glimpse back in time sheds light and conrms the
benets from NFV, respectively the development of the
OPNFV project in the context of these problems. It is
obvious that the idea of NFV comes from the network
providers who have looked for a way to accelerate the
introduction of new network services in order to achieve
their own aims at increasing their income. The constraints of
hardware have compelled them to apply conventional
technologies for IT virtualization in their networks. A few
suppliers have united and established The European
Telecommunications Standards Institute (ETSI). ETSI
Industry Specication Group for Network Functions Virtu-
alization (ETSI ISG NFV) is a group which has been
charged with the development of the virtualization speci-
cations and the architecture for various functions in the
telecom nets, for instance the NFV MANO standard. ETSI
also takes part in and supports the recently announced
OPNFV joint project [1].
As NFV uses virtualization technologies and practices,
known in cloud computing, it is reasonable to think of
including OpenFlow-based Software Dened Networking in
the NFV infrastructure. Though NFV and SDN are not
dependent on each other, they are highly complementary.
The practical applications of NFV need dynamic, automated
control of ow routing deployed by various providers. These
problems can be solved with OpenFlow.
SDN is a dynamic, manageable architecture for optimal
using of resources. It can reduce prices and it is adaptable to
the needs of modern applications like high-speed connec-
tion, dynamic changes in the network infrastructure, etc. Just
like NFV, SDN uses network abstraction, capitalizes from
virtualization and heavily depends on it.
SDN is an approach throughout the computer networks
which allows the network services to be managed by
abstraction of lower-level functions. The SDN architecture
helps direct programming of control functions, according to
various situations. This is done by separating the system
which makes decisions where to send the trafc (control
plane) from the lower-level systems which forward the
packets (data plane). Thus the operating network infras-
tructure is separated from the applications and network
services. SDN requires methods by which these systems
(control pane and data plane) exchange information. Open-
Flow is used for this purpose.
OpenFlow [1] was the rst standard communication
interface dened between the controls and forwarding layer
of the Software-Dened Networking (SDN) architecture.
OpenFlow allows manipulation and direct access to the data
forwarding layer of network devices, such as routers and
switchesphysical or virtual ones.
In the conventional router or switch the functions of the
data path and the control path are performed by the same
device. OpenFlow separates these two functions. The data
path section is still the switch, while the high-level router
functions are placed in another controller, usually a server.
The OpenFlow switch and the controller exchange infor-
mation through OpenFlow protocol which denes the format
of the messages, e.g. packet-received, send-packet-out,
modify-forwarding table, get-stats, etc.
The Data-path section of the OpenFlow switch is an
abstraction of a ow table. Each ow in the table contains
information about the packet heathers: they are scanned for
coincidence in the heather elds and if found any, operations
are carried out with the packets, for instance, sending a
packet through a certain port, modication of a eld in the
heather of a packet or dropping of a packet. When the
OpenFlow switch receives a packet which does not corre-
spond to any of the lines in the table, the packet is sent to the
controller. Then the controller decides what to do with the
packet: to drop it or to add a record in the ow table and
dene how to proceed with such packets in the future.
OpenFlow allows the introduction of new innovative
protocols for routing or commutation in the existing net-
work. Its applications include mobility of virtual machines,
high-security networks and new generations of IP-based
mobile networks.
OpenFlow is an open standard which allows testing of
experimental protocols in common campus networks.
OpenFlow can be added as functionality to commercial
Ethernet switches, routers and wireless access points (AP).
Experiments can be carried out with no necessity for pro-
ducers to reveal information concerning the operation of
their network devices.
Figure 1shows a specic case of the NFV use: Managed
Router Service introduced by means of NFV [4]. NFV is
used to virtualize the router function, that way instead of
installing a number of expensive dedicated appliances: a
router in every customer site and a separate aggregation
router, the routing function runs on top of a virtual machine
on general-purpose server hardware. The purpose of SDN
(in this case an OpenFlow enabled switch) is to separate the
control and data planes. By combining NFV with SDN, we
can achieve even more optimization, as the control of the
data plane has been abstracted and standardized, allowing
for network and application development without the need to
upgrades the network devices involved and moving all the
control functions to a centralized location (for ex. a data
center).
2 OPNFV Project
The benet of source projects, which enable broad collab-
oration and testing, is ever more obvious in the IT industry.
OPNFV operates with organizations, which dene standards
(including ETSIs, NFV, ISG) in order to coordinate a
280 S. Ruseva et al.
long-lasting integration and test NFV solutions. This close
coordination of principally independent processes is crucial
to the creation of a NFV ecosystem. It can timely eradicate
contradictions, identify solutions and set actual standards. It
results in a faster and economical approach to introduction of
NFV. NFV platform performs functions like management
and observation of components as well as failure recovery. It
provides security mechanismsanything that is needed for
data transfer to public networks.
Figure 2shows a general view of the platform and the
current activities which aim at achieving the desired inte-
gration, systemized in three ranges [5]. The specic idea is to
mainly use other upstreamOpen source projects as com-
ponents. The main efforts are concentrated on their inte-
gration. A lot of system tests of the so created platform
follow. Testing is based on specic cases of NFV use. In the
course of the process, the platform has to respond to new
requirements as well as to new functionalities.
All that being said, it is obvious that Network Functions
Virtualization needs to be managed properly from its early
stages. For that reason NFV MANO was created. It is a
working group of ETSI ISG NFV. NFV MANO is also the
framework appointed by ETSI for the management and
orchestration of all resources in the cloud data center. This
includes computing (processor power), network data storage
resources and virtual machines. NFV MANO is divided into
three functional blocks: NFV Orchestrator, VNF Manager
and Virtualized Infrastructure Manager (VIM) [6].
The initial aim and rst step of OPNFV is to provide
NFV Infrastructure (NFVI), Virtualized Infrastructure
Management (VIM) and APIs with other NFV elements,
which all form the basic infrastructure, needed for the Vir-
tualized Network Functions (VNFs) and Management and
Orchestration (MANO) components.
Figure 3shows the OPNFV architectural framework [7].
The OPNFV project focused initially on the so called
NFV infrastructure layer/plane. Both network functions
virtualization infrastructure (NFVI) and virtualized infras-
tructure manager (VIM) are the two functional blocks
making up the base for the introduction of application
software which would be working in virtualized
environment.
Fig. 1 An example of NFV in
combination with OpenFlow
Fig. 2 A general view of the
platform, focusing on basic
activities and collaborations
Open Platform for Network Functions Virtualization 281
NFVI allows access to basic resources for computing,
data storing and network services by means of hypervi-
sors and SDN functions.
VIM controls NFVI and has the managing functions
necessary for the introduction of applications working in
a virtualized environment. The term virtual network
functions(VNFs) usually refer to these applications.
OPNFV is working on creating of a reference platform
and is not trying to re-invent these already existing com-
ponents. The project focuses mainly on concordance
between the interfaces of the components and aims at
establishing a standard of a functional platform.
In the computer industry, there are a lot of initiatives
about the mentioned above components and functionalities
discussed in private or public forums. The OPNFV project is
trying to join these components in a modular, widely known
model for introduction of NFV technologies accessible to all
partners in industry.
To achieve this goal OPNFV focuses on the interfaces
throughout the components and the way these components
interact. These interfaces can be brought to four basic elds.
The purpose of the Virtual Network Function interfaces,
referring to the VL-Ha, is to create common interfaces
between the platform and the operating hardware underneath
or to separate the software from the hardware. In this way,
the software will not be dependent on the hardware it is
operating with. One can expect the appearance of numerous
standard implementations which enable the operators to:
Share infrastructure resources for different purposes.
Redistribute resources for different purposes.
Improve simultaneously software in hardware.
Use software and hardware components from different
producers.
The interfaces whose applications are used to operate
with the virtual infra-structure (Vn-Nf) are OPNFV inter-
faces belonging to the applications. They are a cut-point
between the software of a platform and hosted services.
Application developers directly develop them for virtualized
media or migrate their applications towards a virtualized
infrastructure. In both cases they need guaranteed capacity
and reliability of the platform they work on as well as its
ability to operate on different scale.
These basic principles and the ability of the platform to
operate on/with a common/mutual packet of APIs (interfaces
for application programming) provide a long lifespan and
compatibility of these applications.
The interfaces between the Virtual Infrastructure and the
VIM (Nf-Vi) are internal to the OPNFV interfaces which
control the NFVI virtualized resources and set coordinated
Fig. 3 OPNFV architectural framework focusing on the infrastructure layer
282 S. Ruseva et al.
and comprehensible behavior of the processes within the
platform. These interfaces generate critical functions for
maintenance and for the system operations like:
Organized management of the NFVI virtual systems for
calculations, data storage and network services.
Distribution and connectivity of the virtual infrastructure
resources.
Monitoring of the systemthe already used part of the
resources, capacity, failures etc.
The interfaces from the VIM to the VNF manager and the
organizing system (Or-Vi and Vi-Vnfm) are interfaces which
enable the application control systems and the organizing
systems to interact with the virtual infrastructure manager.
These interfaces realize visibility of the operations and the
virtual system itself. Thus, the application control systems
can accomplish management and optimization of the virtu-
alized network functions operating in NFVI. The organizing
systems can co-ordinate various elements at end-to-end
communication among particular services.
3 OPNFV Components Analysis
Ceph is the chosen data storage technology. Ceph provides
object, block and le storage with access to a unied system.
Ceph also provides distributed object storage. Its libraries are
accessible to clientsapplications and to the RADOS (reli-
able automatic distributed object store) storage system.
Cephs software libraries give the applications written C, C+
+, Java, Python and PHP access to the object storage system
by using their intrinsic APIs. Moreover, REST interface,
which is compatible with applications written for Amazon
S3 and OpenStack Swift, is accessible through the RADOS
Gateway. Ceph RADOS Block Device (RBD) also gives
access to the images of the block devices which are frag-
mented and are replicated all over the storage cluster [8].
The le system CephFS is operating with the same object
storage system which furnishes object storage and interfaces
to the block devices. The server cluster for Ceph metadata
provides a service which creates a map of the le names and
the le system directories corresponding to objects stored in
RADO Store clusters. The metadata server cluster can
expand or shrink, which makes it possible for it to rebalance
dynamically the le system, so that data can be spread
evenly among the cluster hosts. Ceph provides unlimited
storage of le systems and better data security in the crucial
to businesses applications. Customers can mount or attach a
POSIX-compatible CephFS le system by using a client
software from the LINUX core. The Ceph client was added
to the Linux core in 2010. The servers operate like standard
Linux daemons.
ETSI NFV architecture contains a platform for cloud
orchestration as a component. This platform makes use of
general (widely used) functionality which is being built in
various solutions, for instance, to create infrastructure as a
service (IaaS) clouds. Although the developers of OPNFV
project do not display bias towards a particular platform, it is
a fact that the creation of a reference implementation needs
the use of a particular platform for cloud orchestration, not a
generalized class of such solutions. For the time being,
OPNFV society has chosen OpenStackanother open
source platform for cloud orchestration. This does not dis-
count the possibility that some developers who want to
contribute to the project could rewrite the code using an
alternative platform for the purpose.
OpenStack was chosen because of its basic benetto
acquire the necessary exible cloud infrastructure which
gives the users computation power [9]. OpenStack is a cloud
operational system which can control great aggregates of
resources making computations (for example various
hypervisors), data storage and network resources. They are
all controlled by a single operating panel. Thus the operators
can control and monitor the whole infrastructure in a cen-
tralized way and the users can request resources through web
interface [10].
OpenStack is referred to as an Infrastructure as a Service
(IaaS) cloud technology. This means that OpenStack sup-
ports the infrastructure by enabling/and enables the users to
quickly add new units, for instance, virtual machines. Other
components of the cloud can operate on these virtual
machines as well. Various tasks connected to the manage-
ment of the cloud media can be accomplished even during its
operation. Applications can easily be adjusted to the number
of users on the move by simply including more or less
communicating among themselves units for doing a certain
task (horizontal scaling) [10].
It is also important that OpenStack itself is open software.
It is being developed by a whole society, not by a single
producer, which makes it ideal for a heterogeneous infras-
tructure. Since its source code is an open one, it could be
modied for the OPNFV needs. It is obvious that on the one
hand OpenStack is necessary for OPNFV and on the other
hand it is not enough for it [10].
Another current problem is the fact that a lot of middle
box devices which are to be virtualized have almost
unachievable output requirements. It is known that middle
box is a device which checks, lters or manipulates the
trafc not only to transfer packets. Examples of such middle
box devices are Firewall, Network Address Translator,
Intrusion Detection System, Load Balancer, WAN Opti-
mizer. These interstitial/intermediate/medial/median devices
have to manipulate and forward numerous packets without
delay at the speed which the physical network allows
through networks that have capacity of terabits and even
Open Platform for Network Functions Virtualization 283
larger. As a result, OPNFV needs improved technology to
accelerate the operation of virtual machines on data carried
through the network. Techniques optimizing hypervisors,
net drivers, etc. should be embodied in OPNFV [9].
In order to optimize NFV, in addition to the need of high
productive platforms working with virtual machines, virtual
machines should be positioned on particular hosts, based on
expected communication models. OpenStack can take into
account other factors except for the efcient use of com-
puting resources and plan where to start a virtual machine so
that this machine can perform certain tasks [9].
Improved, large-scale, distributed platforms and tech-
nologies for data storage have to be supported because of the
scale of service providersnetworks, precise measurement of
the used services by the customer, determining of prices as
well as agreements for servicing, etc. The good thing is that
OpenStack requirements exist for quite a long time, so
OPNFV can use some already ready solutions [9].
Another prerequisite for acquiring maximum benet from
NFV is that network trafc is handled by virtual functions
(VNFs) in a denite order depending on various conditions.
Virtual machines are in the role of middle boxes. Agile,
programmable networks which use automated software
system to deliver services, exibility and rescaling according
to the necessities are needed. The realizations of these
requirements will substantially reduce working expenditures.
The network sub-system plays a vital role in the cloud
organization which good solution to the outlined problems is
SDN [9].
There are two key questions when speaking about NFV
network with OpenStack.
Making network functions in the virtualized media
high-productive.
Using/deploying exible and powerful technology for
automated creation of rules for the network devices
needed for the implementation of service function chains
(SFCs) [9].
Some useful explanations are necessary referring to
SFCs: Service Function chaining can dene classied list of
network services or service functions (for instance, rewall
load balancer, deep packet inspection) for the passing
packets. SFC is itself an arranged chain of service functions
through which the packets have to pass. It can be difcult to
classify and process packets in a denite order in a network
topology, where a great number of remote devices perform a
certain function. For instance, a packet may have to be
inspected for viruses by DRI before entering the inner net-
work. This packet has to be distributed by a load balancer
beforehand and rerouted towards a certain DPI device. After
the inspection it has to pass through NAT, etc. The existing
models for delivering/deploying network functions have a
lot of problems like dependence on the network topology,
problems with the classication of packets and the need of
certain constant order for packet processing. SFC solves the
problems by creating a frame which looks after the gathering
of denite instances which deploy a certain service in a
common shell. This shellis a service and it is inde-
pendent from the topology of the network. A controller can
easily manage the network in this way [11].
The SDN controller has to respond to the requirements of
SFCs and use NFV orchestrators interface. A program
interface (API) based on intentions (goals, desired results)
has to be used. There has to be determined what virtual
functions to be included, as far as the conguration of the
network itself goes to the second place. This solution
requires furnishing of SDN controller with API. API enables
the NFV orchestrator to create convenient SF chains. In this
case they do not require details like specic protocols and
technologies necessary for the realization of the rules for
trafc rerouting within a specic chain (SFC) [9].
As a nal goal, the needs of communication virtual
machines should be transferred to the SDN controller in a
way that certain requirements could be fullled. The
requirements satisfy agreements on service level (SLAs) and
cover specied speed of the connection, maximum latency,
variations in packet delays (jitter), price of service, etc. This
is very important particularly for the delivery of cloud ser-
vices. The details concerning this realization have to be
concealed in the SDN controller, as if it is a black box.
A suitable description of communication needs has to be
provided for the purpose. Thus, very intrinsic technologies
become accessible to amateurs who are interested only in the
opportunity to satisfy certain necessities of their businesses
[9]. OPNFV also addresses the development of NFV solu-
tions across other open source environments.
Through system level integration, deployment and test-
ing, OPNFV creates a reference NFV platform, aimed at
accelerating the transformation of enterprise and service
provider networks towards NFV-based architecture.
Already, some of the biggest companies in the IT industry
are collaborating for the development of the OPNFV project.
Members of the project include: the largest telecommuni-
cations and company (AT&T), the largest mobile telecom-
munications company (China Mobile), CISCO, Hewlett
Packard, IBM, Intel, Ericsson, Nokia, Huawei Technologies,
Red Hat, VMWarea major cloud computing and platform
virtualization software provider, etc. (for the full list of
companies, see [12]). This open industry collaboration
ensures that that the OPNFV standard will bring NFV
infrastructure, suitable for a broader range of practical use
cases for the business. Participation in the OPNFV project is
open to anyone interested.
284 S. Ruseva et al.
4 Conclusion
Open Platform for NFV (OPNFV) is an open source project,
which brings together the work of standards bodies, open
source communities, service providers and commercial
suppliers to deliver a standardized NFV platform for the IT
industry that combines multivendor, interoperable NFV
solutions. OPNFV has a key role in the evolution of NFV
components across different open source ecosystems.
References
1. The SDN, NFV & Network Virtualization Ecosystem. https://
globenewswire.com/news-release/2015/12/10/794548/0/en/The-
SDN-NFV-Network-Virtualization-Ecosystem-2015-2030-SDN-
and-NFV-Investments-will-Grow-at-a-CAGR-of-54-Between-
2015-and-2020-to-Account-for-over-20-Billion-in-Revenue-by-
the-End-.html/. Last accessed 10 Dec 2016
2. Introducing Open Platform for NFV. https://www.opnfv.org/sites/
opnfv/les/pages/les/opnfv_overview_deck_06042015.pdf/. Last
accessed 10 Dec 2016
3. Network Functions VirtualisationIntroductory White Paper.
https://portal.etsi.org/NFV/NFV_White_Paper.pdf,https://portal.
etsi.org/NFV/NFV_White_Paper2.pdf,https://portal.etsi.org/NFV/
NFV_White_Paper3.pdf/. Last accessed 16 Oct 2016
4. NFV and SDN: Whats the Difference? https://www.sdxcentral.
com/articles/contributed/nfv-and-sdn-whats-the-difference/2013/
03/. Last accessed 11 Feb 2016
5. OPNFV Platform Overview. http://artifacts.opnfv.org/opnfvdocs/
colorado/docs/overview/index.html/. Last accessed 31 Dec 2016
6. What is NFV MANO? https://www.sdxcentral.com/resources/nfv/
nfv-mano/. Last accessed 01 Mar 2017
7. Opnfv whitepaper 103014. http://www.slideshare.net/OPNFV/
opnfv-whitepaper-103014/. Last accessed 31 Oct 2016
8. Ceph: The Future of Storage. http://ceph.com/docs/,http://ceph.
com/ceph-storage/object-storage/,http://ceph.com/ceph-storage/
le-system/. Last accessed 12 Dec 2016
9. OpenStacks Role in an OPNFV Reference Implementation.
https://www.sdxcentral.com/articles/contributed/openstacks-role-
opnfv-reference-implementation/2014/11/. Last accessed 19 Nov 2015
10. OpenStack. http://www.openstack.org/. Last accessed 04 Apr 2017
11. Service Function ChainingHelium, Lithium and the Way
Forward. http://events.linuxfoundation.org/sites/events/les/slides/
SFC-Helium-Lithium-and-beyond.pdf/. Last accessed 28 Sept
2016
12. MembersOPNFV. https://www.opnfv.org/about/members/. Last
accessed 16 Oct 2016
Open Platform for Network Functions Virtualization 285
Optimizing Turbo Codes for Secret Key
Generation in Vehicular Ad Hoc Networks
Dhouha Kbaier Ben Ismail, Petros Karadimas, Gregory Epiphaniou,
and Haider Al-Khateeb
Abstract
We present an algorithm that allows two users to establish a
symmetric cryptographic key by incorporating the most
important features of the wireless channel in vehicle-to-
vehicle (V2V) communication. Non-reciprocity compen-
sation is combined with turbo codes (TCs) for error
reconciliation purposes. For fair comparisons, the indexing
technique is applied in conjunction with the non-recipro city
compensation technique. A series of simulations are run to
calculate key performance indicators (KPIs). High entropy
values are obtained throughout all rounds of simulation
during the key extraction process. Furthermore, simulation
results indicate a signicant improvement in bit mismatch
rate (BMR) and key generation rate (KGR) when TCs are
used. Increasing the number of iterations in the TC can
signicantly improve the Bit Error Rate (BER), thus
generating more symmetric keys. The key generation rate
was reported high ranging from 17 to 19 for the 256-bit
symmetric keys per minute with TCs, while it is ranging
from 2 to 5 when compared with a sample indexing
technique published in the public domain. Finally, simu-
lations proved also improvements for different key lengths
as part of the error reconciliation process when TCs are
used with an almost regular permutation (ARP) instead of a
random permutation.
Keywords
Almost regular permutation Bit mismatch rate
Entropy Error reconciliation Key generation
Quantization Scatterersmobility Thresholding
Turbo codes VANET
1 Introduction
Traditional wireless communications are vulnerable to
man-in-the-middle attacks where certain aspects of con-
dentiality, integrity, and availability are violated. Conven-
tional cryptographic solutions based predominantly
on-stream ciphers generate shared secrets using
pre-computational techniques or public key cryptography
[1]. Public key cryptography, in particular, has proved to
increase computational complexity during secret key gen-
eration, especially for low-end energy efcient devices [2].
Channel-based key extraction approaches try to exploit the
physical properties of wireless channels such as reciprocity
and temporal/spatial variability in an attempt to provide the
necessary randomness for the symmetric key creation [3,4].
Vehicular ad hoc network (VANET) based applications
are expected to address challenges that current transportation
systems are facing, since they can provide solutions for a
safer, more efcient and sustainable future intelligent trans-
portation systems (ITS). In a typical VANET environment
where access to infrastructure is given (see Fig. 1), the
wireless links between nodes and co-existent adversaries
experience uncorrelated channel attributes. Nodes are also
distributed and self-organized with the majority of wireless
communication carried out by on-board units (OBU) inte-
grated with additional services and processes running [5].
Therefore, these channels in vehicular networks can offer
some level of condentiality during the key generation
process between parties, which reduce the computational
complexity and relax certain barriers related to key man-
agement requirements.
In this paper, all the essential vehicle-to-vehicle (V2V)
communication characteristics are incorporated in the key
generation process such as three-dimensional (3D) multipath
propagation and surrounding scatterersmobility (i.e. other
vehicles). We employ the comprehensive parametric
stochastic V2V channel model presented in [6] to syntheti-
cally generate the receivers channel response (Bobs
D. K. B. Ismail (&)G. Epiphaniou H. Al-Khateeb
Faculty of Science and Engineering, University of
Wolverhampton, Wolverhampton, UK
e-mail: d.kbaier@wlv.ac.uk
P. Karadimas
School of Engineering, University of Glasgow,
Glasgow, Scotland, UK
©Springer Nature Switzerland AG 2019
A. Al-Masri and K. Curran (eds.), Smart Technologies and Innovation for a Sustainable Future,
Advances in Science, Technology & Innovation, https://doi.org/10.1007/978-3-030-01659-3_33
287
channel), from which the transmitters response (Alices
channel) arises after applying the non-reciprocity compen-
sation technique presented in [7]. After the necessary
thresholding used to allocate bits according to designated
signal levels, we utilize turbo coding (TC) techniques for
information reconciliation. We focus on several parameters
that affect the performance of TCs such as number of
decoding iterations, generator polynomials, constraint
lengths of the component encoders and the interleaver type.
For fair comparisons, the indexing technique [8] was applied
in conjunction with the non-reciprocity compensation tech-
nique in [7]. Simulations are run, and performance analysis
is carried out. The key generation rate (KGR) and bit mis-
match rate (BMR) are computed in both scenarios.
This paper is organized as follows. Section 2presents an
overview of the most important error correction codes that
can be potentially used in the information reconciliation
stage. Then, the authors present their algorithm and the
adopted V2V channel model in Sect. 3. Furthermore, Sect. 4
deals with information reconciliation using TCs in VANET,
while Sect. 5focuses on the importance of privacy ampli-
cation. A Graphical User Interface (GUI) was designed to
run the developed algorithm. Thus, simulations are run, and
performance analysis is carried out in Sect. 6. Several key
performance indicators (KPIs) are employed. Finally, Sect. 7
draws some conclusions.
2 Error Reconciliation
Error reconciliation is the next step in the secret key gen-
eration process to correct miss-matched information due to
imperfect reciprocity and random noise in the channel. The
bit mismatch rate is dened as the number of bits that do not
match between two devices divided by the total number of
bits extracted prior to error reconciliation and privacy
amplication. Several error reconciliation algorithms have
been introduced with different tradeoffs between communi-
cation and computational complexity, throughput error cor-
rection capabilities (e.g. Cascade [9] and Winnow [10]).
Gallagers Low Density Parity Check (LDPC) codes have
recently been shown to increase the rate of error reconcili-
ation with computational overhead added as part of their
operation. LDPC can be more efcient than Cascade as they
can become rate adaptive leading to more efcient interac-
tive reconciliation protocols [11,12].
The invention of turbo codes (TCs) [13] was a revival for
the channel coding research community. Historical turbo
Fig. 1 Vehicular networking
architecture
288 D. K. B. Ismail et al.
codes, also sometimes called Parallel Concatenated Convo-
lutional Codes (PCCCs), are based on a parallel concatena-
tion of two Recursive Systematic Convolutional
(RSC) codes separated by an interleaver. They are called
turboin reference to the analogy of their decoding prin-
ciple with the turbo principle of a turbo compressed engine,
which reuses the exhaust gas in order to improve efciency.
The turbo decoding principle calls for an iterative algorithm
involving two component decoders exchanging information
in order to improve the error correction performance with the
decoding iterations. This iterative decoding principle was
soon applied to other concatenations of codes separated by
interleavers, such as Serial Concatenated Convolutional
Codes (SCCCs) [14,15], sometimes called serial turbo
codes, or concatenation of block codes, also named block
turbo codes [16,17]. The near-capacity performance of turbo
codes and their suitability for practical implementation
explain their adoption in various communication standards.
In [18] the authors proposed utilizing Turbo codes for rec-
onciliation purposes. Further investigation in [19] show that
TCs are good candidates for reconciliation. The efcacy of
TCs with regards to their error correction capabilities in
various wireless communication standards is also recorded
in [20]. Further work in [21] demonstrates the improved
performance of TCs over Reed Solomon and CCs which are
the de facto error correction codes used in 802.11p vehicular
networks. However, this work does not comprehensively
incorporate physical propagation characteristics such as 3D
scattering and scatterersmobility which is addressed in this
work.
3 Detailed Architectural Design
Figure 2presents the algorithms strawman. Starting from
the rst step, synthetic data are generated for the purpose of
demonstration by employing the Monte Carlo simulation
method [22,23]. The input parameters of the algorithm are
provided by the inherent physical attributes of the dynamic
V2V propagation channel. Indeed, the comprehensive
parametric stochastic V2V channel model presented in [6]is
adopted. The vehicles are in motion and all are generally
equipped with both Tx and Rx.
Based on that channel model, the receivers samp les (Bobs
channel estimates) are generated. From the received data, the
transmitted data (Alices channel estimates) are modeled by
considering the non-reciprocity compensation technique pre-
sented in [7]. At this phase, a lossy quantization process is
preferred due to its computational simplicity. The target is to
end up with a maximum secret bit extraction rate and entropy.
The number of bits that do not match between Alice and Bob to
the number of bits extracted by the quantization process
determines the bit mismatch rate. Turbo decoding is then
performed in order to generate a symmetric output, i.e. sym-
metric keys for Alice and Bob. Performance of the reconcili-
ation method can be evaluated by measuring the BMR and the
Bit Error Rate (BER). For fair comparisons, the indexing
technique was applied in conjunction with the non-reciprocity
compensation technique.
4 Information Reconciliation Using Turbo
Codes in VANET
The invention of turbo codes (TCs) [13] was a revival for the
channel coding research community. The near-capacity
performance of turbo codes and their suitability for practi-
cal implementation explain their adoption in various com-
munication standards as early as the late nineties: rstly, they
were chosen in the telemetry coding standard by the CCSDS
(Consultative Committee for Space Data Systems) [24], and
for the medium to high data rate transmissions in the third
generation mobile communication 3GPP (Third Generation
Partnership Project)/UMTS (Universal Mobile Telecommu-
nications System) standard [25]. They have further been
adopted as part of the Digital Video BroadcastReturn
Channel via Satellite and Terrestrial (DVB-RCS and
DVB-RCT) links [26,27], thus enabling broadband inter-
active satellite and terrestrial services. More recently, they
were also selected for the next generation of
Fig. 2 Detailed architectural design
Optimizing Turbo Codes for Secret Key Generation in Vehicular 289
3GPP2/cdma2000 wireless communication systems [28]as
well as for the IEEE 802.16 standard (WiMAX) [29]
intended for broadband connections over long distances. In
our approach, we use TCs for reconciliation purposes in
VANET environment. In Sect. 6, simulations are run, and
performance analysis is carried out.
5 Privacy Amplification
Masquerading or eliminating information exchanged during
this process is usually dened as privacy amplication [30,
31]. Privacy amplication is used to transform a string which
is only partially secret to a highly secret string usually
shorter. This process is also used to account for any infor-
mation exposed during error reconciliation phase and ensure
that eavesdroppers do not gain signicant advantage to the
point where they are able to reconstruct a signicant part of
the key. The Winnow protocol discards certain bits during
error reconciliation (privacy maintenance) whereas Cascade,
LDPC, and TCs do not. In Cascade, the binary search must
rerun on previous blocks, whereas for LDPC and TCs only
one pass is necessary so there is no need to discard bits
before the error reconciliation is complete. The number of
bits is tracked and then subtracted from the nal key rec-
onciled. The last step in the key generation process assumes
that the information extraction about the shared key used
should be computationally expensive to adversaries. Most of
the existing approaches focus on different threat models and
assumptions around the level of access to the channel.
Trapdoorfunctions are used as means to assure a certain
level of authentication and integrity in this process. These
functions are also used as a mean to reduce the size of the
nal key and amplify any errors if hashing a reasonable copy
of the key is attempted, to a degree that even exhaustive
search of the key space would be infeasible.
6 Simulations Results
The authors have designed a Graphical User Interface
(GUI) to run the developed algorithm. Figure 3illustrates
the main KeyGen simulation with a visualization of the
whole process towards the establishment of symmetric keys.
It also illustrates samples for both Bob and Alice based on
the parametric stochastic model introduced in this work
generating the synthetic data for different scenarios in V2V
communications. The algorithm currently avoids using sta-
tistical measures and it is solely based on the channel fading
process. The parameters are fully customizable from the
tools menu of the software demo. The GUI is not funda-
mental for the core algorithmic operation and can be omitted
in real-life implementations or fabricated products. The
thresholding scheme employed inuences the number of
samples discarded from both Alice and Bob. The GUI output
also demonstrates the number of keys established during the
simulation and the total time required generating those keys.
6.1 Key Performance Indicators
First, the probing rate for both Alice and Bob fP¼fPA ¼fPB
are considered the same for the purpose of channel estimates
collection. The core Key Performance Indicators (KPIs) of
interest in our protocol up to this stage are the key generation
rate, the randomness of the generated bits for symmetric
keys and bit mismatch rate (BMR). The entropy is the de
facto metric which quanties the uncertainty of the gener-
ated bit string. The higher the entropy, the limited the ability
to deduce a secret key established by Eve is. Usually, BMR
is measured as a ratio of the number of bits that do not match
between Alice and Bob to the number of bits extracted at the
thresholding stage.
6.2 Our Methodology
Bobs generated sequence after quantization is fed to the
input of a TC. During this process, a single threshold is
adopted as a lossless quantization scheme with the potential
to substantial increase the key generation rate [32]. Turbo
decoding is then performed in order to generate a symmetric
output, i.e. symmetric keys for Alice and Bob. Performance
of the reconciliation method can be evaluated by measuring
the BMR and the Bit Error Rate (BER). The comparison is
made against the sample indexing technique already applied
in our algorithm as discussed in Sect. 1. We calculated BMR
by considering the discarded indexes after Alices and Bobs
channel probing. Thus, the BMR is measured as a ratio of
the number of bits that do not match between Alice and Bob
to the number of bits extracted by the adopted quantization
process after appropriate thresholding.
6.3 Simulation Results
In Table 1, we compute also the key generation rate for
different key lengths. TCs are rst run with a random per-
mutation and one decoding iteration. Compared to the
samplesindexing method in [8], there was a signicant
improvement on both BMR and key generation rate.
The BMR with single thresholding is only 0.02 whereas the
estimated BMR with the indexing technique is around 0.22.
Note that the BMR with the indexing technique is nearly the
same for different key lengths which is coherent with the
uniform method used by authors and algorithm presented in
290 D. K. B. Ismail et al.
[8]. The key generation rate was also reported high consid-
ering different key lengths requested. For instance, the secret
key rate to generate the 256-bit symmetric key is 17 good
keys per minute with TCs while it varies from 2 to 5 sym-
metric keys per minute with the indexing technique.
Then, in Table 2we compute the key generation rate
where TCs are run with an almost regular permutation
(ARP) permutation and several decoding iterations. Indeed,
increasing the number of iterations in the TC can signi-
cantly improve the BER, thus generating more symmetric
keys. However, a compromise should be found since this
operation is computationally expensive and adds a delay in
the process. We report the BER performance of the TC for
the block size 5000 bits, at coding rate in Fig. 4. Thus, the
total number of samples is 10,000 bits for both Alice and
Bob. For a signal to noise ratio SNR = 0.8 dB, the simulated
BER to generate a symmetric shared key between Alice and
Bob after error reconciliation is estimated to 4:9102for
the 1st iteration using TCs while the BER is 2:5103for
the 4th iteration and only 1:8103for the 8th iteration.
Note that the KGR reaches a limit and remains the same
beyond 4 decoding iterations. In the simulations of Table 2,
the maximum number of turbo decoding iterations is set to 4
iterations. As shown in Table 2, simulations proved also
improvements for different key lengths as part of the error
reconciliation process when TCs are used with an ARP
permutation instead of a random permutation. Finally, high
entropy values were obtained throughout all rounds of
simulation during the key extraction process. Note that the
higher the entropy, the limited the ability to deduce a secret
key established by an adversary such as Eve.
In future studies, we would like to further investigate TCs
for error conciliation purposes. We will focus on other
parameters that affect the performance of TCs such as
component decoding algorithms, generator polynomials and
constraint lengths of the component encoders.
Fig. 3 An implementation of alices and bobs samples
Table 1 Simulation results in
secret key generation Indexing technique Turbo codes
Key length (bits) 128 256 512 128 256 512
BMR 0.22 0.02
Entropy (bits/sample) 0.850.97 0.940.99
KGR (keys/min) 37251235 17 8
Table 2 Key generation rate
with ARP permutation and
different decoding iterations
Turbo codes
Key length (bits) 128 256 512
Iteration 1 36 18 9
Iteration 439199
Optimizing Turbo Codes for Secret Key Generation in Vehicular 291
7 Conclusion
We proposed an algorithm considering the most important
features in V2V communication such as 3D multipath
propagation and surrounding scatterersmobility. Synthetic
data were generated for the purpose of a demonstration by
employing the Monte Carlo simulation method. Simulations
were run successfully by combining non-reciprocity com-
pensation with turbo codes. Increasing the number of itera-
tions in the TC can signicantly improve the BER, thus
generating more symmetric keys. Moreover, simulations
proved improvements for different key lengths as part of the
error reconciliation process when TCs are used with an ARP
permutation instead of a random permutation. Compared
with a sample indexing technique in the public domain,
results have shown signicant improvements for key gen-
eration rate and bit mismatch rate with high entropy values
obtained throughout all rounds of simulation.
References
1. Robshaw, M.J.B., Billet, O.: New Stream Cipher DesignsThe
eSTREAM Finalists, vol. 4986. Series Lecture Notes in Computer
Science. Springer (2008)
2. Jha, N.K., Raghunathan, A., Potlapally, N.R., Ravi, S.: A study of
the energy consumption characteristics of cryptographic algo-
rithms and security protocols. IEEE Trans. Mobile Comput. 5
(undened), 128143 (2006)
3. Mukherjee, S.A., Fakoorian, A., Huang, J., Swindlehurst, A.L.:
Principles of physical layer security in multiuser wireless
networks: a survey. CoRR, vol. abs/1011.3754 (2010) [Online].
Available: http://arxiv.org/abs/1011.3754
4. Shehadeh, Y.E.H., Hogrefe, D.: A survey on secret key generation
mechanisms on the physical layer in wireless networks. Sec. Com-
mun. Netw. 8(2), 332341 (2015, Jan) [Online]. Available: http://
dx.doi.org/10.1002/sec.973
5. Qu, Z., Wu, F., Wang, Y., Cho, W.: A security and privacy review
of vanets. IEEE Trans. Intell. Transp. Syst. 16(6), 29852996
(2015)
6. Karadimas, P., Matolak, D.W.: Generic stochastic modeling of
vehicle-to-vehicle wireless channels. Veh. Comm. 1(4), 153167
(2014) [Online]. Available: http://dx.doi.org/10.1016/j.vehcom.
2014.08.001
7. Liu, H., Wang, Y., Yang, J., Chen, Y.: Fast and practical secret key
extraction by exploiting channel response. INFOCOM. IEEE,
30483056 (2013)
8. Mathur, S., Trappe, W., Mandayam, N., Ye, C., Reznik, A.: Secret
Key Extraction from Level Crossings over Unauthenticated
Wireless Channels, pp. 201230. Springer, US (2010) [Online].
Available: http://dx.doi.org/10.1007/978-1-4419-1385-2_9
9. Brassard, G., Salvail, L.: Secret-Key Reconciliation by Public
Discussion, pp. 410423. Eurocrypt 93. Springer (1993) [Online].
Available: http://citeseer.ist.psu.edu/viewdoc/summary?doi=10.1.
1.42.9686
10. Buttler, W.T., Lamoreaux, S.K., Torgerson, J.R., Nickel, G.H.,
Donahue, C.H., Peterson, C.G.: Fast, efcient error reconciliation
for quantum cryptography. Phys. Rev. A 67, 052303 (2003, May)
[Online]. Available: http://link.aps.org/doi/10.1103/PhysRevA.67.
052303
11. Martınez-Mateo, J., Elkouss, D., Martin, V.: Blind reconciliation.
Q. Inf. Comput. 12(910), 791812, (2012) [Online]. Available:
http://www.rintonpress.com/xxqic12/qic-12-910/0791-0812.pdf
12. Martınez-Mateo, J., Elkouss, D., Martn, V.: Interactive reconcil-
iation with low-density parity-check codes. In: 6th International
Symposium on Turbo Codes Iterative Information Processing,
pp. 270274 (2010, Sep)
13. Berrou, C., Glavieux, A., Thitimajshima, P.: Near Shannon limit
error-correcting coding and decoding: turbo-codes. In Proceeding
of ICC 93, Geneva, Switzerland, vol. 2, pp. 10641070 (1993,
May)
14. Benedetto, S., Divsalar, D., Montorsi, G., Pollara, F.: Serial
concatenation of interleaved codes: performance analysis, design,
Fig. 4 BER performance of TC
for a block length of 5000 bits.
All simulations use the BCJR
algorithm with 8 decoding
iterations
292 D. K. B. Ismail et al.
and iterative decoding. IEEE Trans. Inf. Theory 44(3), 909926
(1998)
15. Benedetto, S., Montorsi, D.: Iterative decoding of serially
concatenated convolutional codes. Electron. Lett. 32(13), 1186
1188 (1996)
16. Benedetto, S., Montorsi, D.: Serial concatenation of block and
convolutional codes. Electron. Lett. 32(10), 887888 (1996)
17. Pyndiah, R.M.: Near-optimum decoding of product codes: block
turbo codes. IEEE Trans. Comm. 46(8), 10031010 (1998)
18. Nguyen, K., Assche, G.V., Cerf, N.J.: Side-information coding
with turbo codes and its application to quantum key distribution.
CoRR, vol. cs.IT/0406001 (2004) [Online]. Available: http://arxiv.
org/abs/cs.IT/0406001
19. Benletaief, N., Rezig, H., Bouallegue, A.: Toward efcient
quantum key distribution reconciliation. J. Q. Inf. Sci. (2014)
20. Yeo, E., Anantharam, V.: Iterative decoder architectures. IEEE
Commun. Mag. 41(8), 132140 (2003)
21. Kiokes, G., Economakos, G., Amditis, A., Uzunoglu, N.K.: A
comparative study of IEEE 802.11 p physical layer coding
schemes and FPGA implementation for inter vehicle communica-
tions. Mod. Trafc Transp. Eng. Res. 2(2), 95102 (2013)
22. Hirschausen, P., Davis, L., Haley D., Lever, K.: Identify key
design parameters for Monte Carlo simulation of Doppler Spread
channels. In: Communications Theory Workshop (AusCTW),
Sydney (2014)
23. Hoecher, P.: A statistical discrete-time model for the WSSUS
multipath channel. IEEE Trans. Veh. Tech. 41(4) (1992)
24. T. Synchronization and C. Coding. Recommendation for Space Data
System Standards. Technical report, CCSDS 131.0-B-1. Blue Book
25. Third Generation Partnership Project (3GPP) Technical Speciation
Group, Multiplexing and channel coding (FDD), TS 25.212,
v2.0.0. (June 1999)
26. DVB, Interaction channel for satellite distribution systems,
ETSI EN 301 790, v. 1.2.2. (2000)
27. DVB, Interaction channel for digital terrestrial television, ETSI EN
301 958, v. 1.1.1. (2001)
28. Third Generation Partnership Project 2 (3GPP2), Physical layer
standard for CDMA 2000 spread spectrum systems, Release D,
3GPP2 C.S0002-D, Version 1.0. (2004, Feb)
29. IEEE standard for local and metropolitan area networks. Part 16:
air interface for xed broadband wireless access systems, IEEE
802.16-2004 (2004, Nov)
30. Shehadeh, Y.E.H., Hogrefe, D.: A survey on secret key generation
mechanisms on the physical layer in wireless networks. Secur.
Comm. Netw. 8(2), 332341 (2015)
31. Wang, T., Liu, Y., Vasilakos, A.V.: Survey on channel reciprocity
based key establishment techniques for wireless systems. Wireless
Netw. 21(6), 18351846 (2015)
32. Azimi-Sadjadi, B., Kiayias, A., Mercado, A., Yener, B.: Robust
key generation from signal envelopes in wireless networks. In:
Proceedings of the 14th ACM Conference on Computer and
Communications Security, pp. 401410, Series CCS 07, New
York, NY, USA. ACM (2007) [Online]. Available: http://doi.acm.
org/10.1145/1315245.1315295
Optimizing Turbo Codes for Secret Key Generation in Vehicular 293
PROBSOL: A Web-Based Application
to Develop Problem-Solving Skills
in Introductory Programming
Sohail I. Malik , Roy Mathew , and Maytham M. Hammood
Abstract
Problem-solving skills are considered as an important part
of learning to program for novice programmers. Different
techniques such as pseudocode and owchart are used to
develop these skills. In this study, a web-based applica-
tion PROBSOLwas developed and offered to the
novices in an introductory programming course to acquire
problem-solving skills. The PROBSOL application is
based on pseudo-code technique. One of the advantages
of this application for novices is to focus on problem
domain without worrying about the syntax of the
programming language. Practice questions related to all
the topics included in the introductory programming
course were prepared and offered in the application. The
results show a positive impact on the studentslearning
outcomes and attrition rate. Students (treatment group)
who used the PROBSOL application show better results
compared to the control group.
Keywords
Problem-solving skills Pseudo code Introductory
programming
1 Introduction
Programming is an important and fundamental skill that
needs to be developed to meet the requirements of an
information society. Programmers are considered to be
builders of the information society. They develop software
applications consumersuse every day, multimedia appli-
cations which provide constant streaming and entertainment
information, and complex systems which perform essential
tasks.
The Bureau of Labor Statistics [1] predicts high demand
for programmers in the employment market in coming years.
To meet the requirements of the market, computer science
(and related disciplines) degree programs emphasise the
programming eld by including programming studies in
the rst semester of the degree programs. To become a
programmer requires the development of multiple skills
including critical thinking, problem-solving, being detailed-
oriented, as well as learning the syntax and semantics of the
programming language. For novices, to acquire all these
skills is considered a challenging and difcult task. They
have to focus on learning both problem-solving strategies
and the syntax and semantics of the programming language
to acquire these skills.
High failure and drop-out rates from introductory pro-
gramming (IP) courses continue to be of signicant concern
to computer science disciplines despite extensive research
attempting to address the issue [27]. Researchers have
identied that novice programmers spend more time trying
to understand programming language syntax and semantics
(programming knowledge) [8] rather than paying attention to
planning the problem (problem-solving strategies) [812].
Koulouriet [13] argued that teaching problem solving
before programming yielded signicant improvements in
student performance(p. 1).
In this study, a web-based application PROBSOLwas
developed and offered to the novices in an introductory
programming course to acquire problem-solving skills.
The PROBSOL application is based on pseudo-code tech-
nique. One of the advantages of this application for novices
is to focus on problem domain without worrying about the
syntax of the programming language.
This paper is divided into a number of sections. It starts
with a review of the literature, followed by a brief intro-
duction to the PROBSOL application. The methodology
S. I. Malik (&)R. Mathew M. M. Hammood
Buraimi University College, Al-Buraimi, Oman
e-mail: Sohail@buc.edu.om
R. Mathew
e-mail: Roy@buc.edu.om
M. M. Hammood
Computer Science Department, Tikrit University, Tikrit, Iraq
e-mail: Maytham@buc.edu.om
©Springer Nature Switzerland AG 2019
A. Al-Masri and K. Curran (eds.), Smart Technologies and Innovation for a Sustainable Future,
Advances in Science, Technology & Innovation, https://doi.org/10.1007/978-3-030-01659-3_34
295
used for this study is then described, and research results are
reported and discussed. The paper concludes with a sum-
mary of the outcomes.
2 Literature Review
De Raadt [8]denes problem-solving as A mechanism for
achieving a solution to a programming problem(p. ix). This
denition is also applicable in our context. It is commonly
accepted that teaching problem-solving techniques is not an
easy task [14]. Additionally, different researchers have
shown that students in IP courses do not concentrate on
developing problem-solving skills and instead spend more
time on coding the programming problems [15].
The ACM-IEEE Joint Task Force on Computing Cur-
ricula [16] provides guidelines for computing undergraduate
programs. The latest revision, Computer Science Curricula
2013 (CS2013), provides comprehensive guidance on cur-
ricular structure and development in a variety of educational
contexts [16]. The CS2013 body of knowledge is organised
into 18 knowledge areas (KA). The most important pro-
gramming related KAs include Programming Languages
(PL), Software Development Fundamentals (SDF), Algo-
rithms and Complexity (AL) and Software Engineering
(SE). Computer programming concepts and skills topics are
introduced in these KAs for introductory and advanced
computer science programming courses. Software Devel-
opment Fundamentals (SDF) is a newly introduced KA in
CS2013. It focuses on the entire software development
process in introductory programming. Due to its broad
spectrum, it includes KAs which could be included in other
software-oriented KAs [e.g. programming constructs and
problem-solving (PL), development methodologies (SE),
and algorithm analysis (AL)]. SDF provides basic concepts,
and those KAs cover advanced topics in the above-
mentioned areas. Computer programming knowledge (syn-
tax and semantics) and problem-solving strategies are given
equal attention in these KAs. Problem-solving skills are also
included as one of the characteristics of computer science
graduates which means that graduates should know how to
identify and design solutions to real world problems instead
of just writing code [16]. The Australian Computer Society
[17] also suggested emphasising both problem-solving
strategies and programming knowledge in the teaching and
learning of programming languages.
De Raadt [18] reviewed forty textbooks prescribed to
students in introductory programming. Problem-solving
topics were covered in varying degrees in the analysed
books. De Raadt [18] mention that only six books out of
forty investigated integrated problem-solving aspects
throughout, implying that most of the analysed books
focused only on language syntax. Some authors provide a
large number of examples and put less emphasis on
problem-solving instructions. Some books cover
problem-solving topics in early chapters, but they are not
integrated into the remainder of the book. There are a small
number of books where problem-solving is integrated
throughout the books using case studies and examples [18].
Winslow [19] discussed problem-solving learning pro-
cesses for students. He emphasised that, for novices,
understanding programming language syntax, semantics and
problem-solving skills are equally important. He divided
program problem solving into four steps:
(1) Understand the problem
(2) Determine how to solve the problem:
(a) in some form, and
(b) in computer compatible form
Note that novices have trouble going from ato
b
(3) Translate the solution into computer language program,
and
(4) Test and debug the program(p. 19).
Soloway [20] suggested Goals and Plans as a
problem-solving strategy for analysing problems and con-
structing programs. With a given problem, the process
begins with the instructor determining the goals that need to
be achieved to solve the problem. These goals are then
mapped to plan(p. 26) [8].
Hyde [21] developed the Problem Solving Process
(PSP) for an introductory programming course which pro-
moted problem-solving skills in students. PSP consists of the
steps shown in Fig. 1. It is clear that PSP requires students to
nish four steps before typing the program on the computer.
The PSP promotes problem-solving skills in students.
Koulouriet [13] conducted a study in an introductory
programming course to determine the benets of problem-
solving training before programming. They compared the
performance of two groups of students with and without
problem-solving training. They revealed that students pro-
vided with problem-solving training performed better than
those without problem-solving training. They discussed a
possible explanation was that novice programmers start
working with syntax and semantics of the language without
considering or analysing the problem statement. The
problem-solving training helps students to understand and
interpret the problem in terms of devising a programming
solution, which they can then translate into lines of code.
This argument is also supported by [22].
Different tools have been developed to teach the
problem-solving skills to the novices in an introductory
programming course. Malik [23] developed the ADRI editor
296 S. I. Malik et al.
based on the four stages of the ADRI approach and offered
in an introductory programming course. The editor offers
pseudo-code and owchart techniques to develop the
problem-solving skills. Novices have to write the
pseudo-code for a given problem statement. The editor does
not support any feature to identify errors or provide the
correct solution for the given problem statement. Oda [24]
proposed a method to automatically generate a pseudo-code
from a source code by using the statistical machine trans-
lation (SMT) framework. Taheri [25] discussed that pro-
granimate is a web-based environment which uses
owcharts to nd solutions for basic programming problems
for novices.
3 Research Question
The study focuses on determining the impact of the
PROBSOL application on students learning process in the
introductory programming course.
The research question being addressed in this study is:
What is the impact of the PROBSOL application on the students
learning outcomes in the introductory programming course?
The research question is explored in Sect. 6.
4 Introduction to the PROBSOL Application
The PROBSOL is a web-based application based on the
pseudo-code technique. The application can be used to
develop problem-solving skills to the novice programmers in
introductory programming. Figure 2shows the main page of
the PROBSOL application.
Practice questions related to all the topics included in the
introductory programming course were prepared and offered
in the application. Figure 3depicts when a user selects a
question related to topic 1 in the IP course. A problem
statement is shown for each question.
The application uses three list boxes (Random steps,
Right Steps and Solution). The Random steps list box shows
all the pseudo-code steps solution for a given problem
statement in a random manner. The user selects the steps in
the Random steps list box one by one and moves it to the
Right Steps list box by clicking Right arrow button as shown
in Fig. 4. The solution list box (depicted in Fig. 5) shows the
correct pseudo-code solution for a given problem statement.
When the user clicks the Check Solution Button, and
the answer is incorrect, the lines or steps containing errors
are displayed in Right Steps list box with red colour, indi-
cating that those lines are there with mistakes (depicted in
Fig. 5). Those lines of codes with red colour are not placed
in its correct position, and the order is wrong in Right Steps
list box. The Solution list box shows the correct solution of
the question with its proper intended order. It also evaluates
your solution, and the number of lines with mistakes are
shown with its calculated number of Errors (e.g., Error
No. 3) under the Wrong Answer part which is displayed
between Right Steps and Solution list boxes.
Different warning and error messages are displayed in the
application for example when the user clicks Right Arrow
Button without selecting any option from the Random Step
list box, or the user clicks Right Arrow Button when the
Random Step list box is empty.
5 Methodology
The research question was explored by comparing the nal
grades of students over two semesters to determine the impact
of the PROBSOL application on the studentsachievements.
The application was offered to the students of the IP course in
the semester 2, 201617. Studentsgrades were compared with
the previous semester (semester 1, 201617) to determine the
impact of the application if any of the studentsachievements.
The grades were compared based on the criteria described in
Table 1. Students were divided into three categories, high,
medium and low achievers based on their marks. More infor-
mation about the three categories is provided in Sect. 6.
Gather Data for Program
Final Document
Problem Analysis
Algorithm Development
Translate to Computer Program
Type in Program on computer
Verify Program
Solve the program
Problem Formulation
Fig. 1 Problem solving process (PSP) Hyde [21]
PROBSOL: A Web-Based Application to Develop Problem-Solving 297
Fig. 2 Main page of the PROBSOL application
Fig. 3 The PROBSOL application with selected question
298 S. I. Malik et al.
Data collection was performed after obtaining ethical
approval from Buraimi University College. Studentsgrades
were collected after the de-identication process performed by
the Registration department at Buraimi University College.
6 Results and Discussion
The grades of students who nished the IP course after
introducing the PROBSOL application were compared with
the previous semester grades. The purpose is to determine
the impact of the application on the studentsachievements.
Studentsgrades were analysed following the three cat-
egories proposed by [26]. Table 1depicts the three
categories.
Malik et al. [26] allocated students into three categories
(high, medium and low achievers) based on their marks.
Students who obtain marks in between 50 and 64 are con-
sidered a slow achievers; those in between 65 and 84 are
medium achievers, where students in between 85 to 100 are
considered as high achievers.
Figure 6shows the comparison of studentsgrades in the
IP course.
The PROBSOL application provides a small, but positive
improvement in the high achiever category, with 12% of the
students who passed the course with the PROBSOL appli-
cation in this category compared with 11% for the traditional
approach. The medium achiever category shows an increase
of 3%; 49% of the students reached the medium achiever
category compared with 52% for the PROBSOL application.
There is a small positive improvement in the low achiever
category of 1%; 23% of students with the PROBSOL
application compared with 22% for the traditional approach.
The failure rate with the PROBSOL application semester is
6% compared with the 8% for the traditional approach
semester, a reduction of 2%. Likewise, the dropout rate (those
students who do not complete the course) with the PROB-
SOL application semester is 7% compared with the 10% for
the traditional approach semester, and it is reduced by 3%.
This result is consistent with previous ndings of [27].
Overall, the PROBSOL application provides a positive
impact on the teaching and learning process of the IP course.
It emphasises students to avoid programming shortcut
(Problem Statement !Codes) and follows proper pro-
gramming process (Problem Statement !Solution plans
Codes). It also provides an opportunity to the students to
focus only on the solution for the given problem statement
without much worry about the syntax of the programming
language. Moreover, it emphasizes students to pay equal
attention to the problem solving strategies besides the syntax
and semantics of the programming language. This argument
is supported by [2831].
The design of the PROBSOL application is simple and
user-friendly which also facilitates the learning process.
Fig. 4 The PROBSOL application with intermediated solution
PROBSOL: A Web-Based Application to Develop Problem-Solving 299
Students only need to select appropriate steps in the given
solution and click the appropriate button to move the step
from one list box to another. This simple process helps the
students to focus more on the solution of the given problem
statement instead of commands. Moreover, the PROBSOL
application is web-based which also facilitates student atti-
tudes towards learning. Paramasivam [32] concluded that
computers in instruction process improve student attitude
towards learning. Moreover, female students in computer
science department perceived web as the easiest area of
study [33]. Eldow [34] also suggested to use E-learning
methods in the teaching process.
Practice questions related to all the topics in the IP course
are embedded in the application which facilitates the learn-
ing process. The questions are categorised based on the
teaching topics of the course. Students can choose questions
by topic.
The result demonstrates that the PROBSOL application
engages students in understanding the programming con-
cepts. Students performed better in all the high, medium and
low achievers categories. The application also promotes
deep-learning among students while solving the given
problem statement. Moreover, the application provides the
more detail-oriented experience of the programming domain.
The failure rate was reduced for the semester offered with
the PROBSOL application compared to the semester offered
with the traditional approach. The application develops
studentsinterest in the course by providing them a clear
picture of the programming domain. Ultimately, this trend
will help studentsenrolment and retention in the computer
Fig. 5 The PROBSOL application with three list boxes
Table 1 Three categories of
students Category Mark range
High achiever 85100
Medium achiever 6584
Low achiever 5064
Adapted from Malik and Coldwell-Neilson [26]
300 S. I. Malik et al.
science eld. This result is consistent with previous ndings
of [31].
The dropout rate was reduced also for the semester
offered with the PROBSOL application compared with the
previous semester offered without the PROBSOL applica-
tion. The PROBSOL application helps students to develop
their programming logic from the beginning of the semester
which ultimately develop their condence and interest in the
learning process.
7 Conclusion
The PROBSOL application was introduced in the introduc-
tory programming course for students to acquire
problem-solving skills. The application is based on
pseudo-code technique. The application is web-based, easy
to access and use. The application includes a number of
questions related to all the topics in the course.
The PROBSOL application provides a positive impact on
the teaching and learning process of the IP course. The
students performed better in the high, medium and low
achievers categories. Moreover, the attrition rates (failure
and dropout) were improved in the semester which was
offered with the PROBSOL application compared with the
previous semester which was offered with the traditional
approach.
The PROBSOL application engages students in under-
standing the programming concepts. It promotes deep-
learning and discourages programming shortcut (Problem
Statement !Codes). It also encourages students to follow
proper programming process (Problem Statement !Solu-
tion plans !Codes).
References
1. Bureau of Labor Statistics, U.S. Department of Labor. Occupa-
tional Outlook Handbook, 201415 Edition, Computer
Programmers. http://www.bls.gov/ooh/computer-and-information-
technology/computer-programmers.htm. Last accessed 28 Aug
2015
2. Guzdial, M., Soloway, E.: Log on education: teaching the
Nintendo generation to program. Commun. ACM 45(4), 1721
(2002)
3. Lahtinen, E., Ala-Mutka, K., Järvinen, H.M.: A study of the
difculties of novice programmers. ACM SIGCSE Bull. 37(3), 14
18 (2005)
4. Sykes, E.R.: Determining the effectiveness of the 3D Alice
programming environment at the computer science I level. J. Edu.
Comput. Res. 36(2), 223244 (2007)
5. Yadin, A.: Reducing the dropout rates in an introductory
programming course. ACM Inroads 2(4), 7176 (2011)
6. Watson, C., Li, F.W.B.: Failure rates in introductory programming
revisited. In: Proceedings of ITiCSE, ACM, Uppsala, Sweden
(2014)
7. Zingaro, D.: Examing interest and grades in computer science 1: a
study of pedagogy and achievement goals. Trans. Comput. Edu. 15
(3). ACM (2015)
8. De Raadt, M.: Teaching programming strategies explicitly to
novice programmers. Ph.D. thesis, University of Southern
Queensland, Australia. Retrieved June 2013, USQ ePrints (2008)
9. Webster, M.: Overview of Programming and Problem Solving,
Merriam-Websters Collegiate Dictionary, 10th edn. Retrieved on
15 July 2013, http://computerscience.jbpub.com/vbnet/pdfs/
mcmillan01.pdf (1994)
10. Kölling, M., Rosenberg, J.: BlueJa language for teaching
object-oriented programming. In: Proceedings of the 27th SIGCSE
11%
49%
22%
8% 10%
12%
52%
23%
6%
7%
0%
10%
20%
30%
40%
50%
60%
High Achiever Medium
Achiever
Low Achiever Fail Dropout
Percentage
Students
Sem 1, 2016-17 (TradiƟonal Approach)
Sem 2, 2016-17 (PROBSOL applicaƟon)
Fig. 6 Impact of the PROBSOL
application on students
achievements
PROBSOL: A Web-Based Application to Develop Problem-Solving 301
Technical Symposium on Computer Science Education, pp. 190
194. St. Louis, MO, USA (1996)
11. Ala-Mutka, K.: Problems in learning and teaching programming
a literature study for developing visualizations in the
codewitz-minerva project. Codewitz Needs Anal. Retrieved 20
Dec 2013, http://www.cs.tut./*edge/literature_study.pdf (2004)
12. Iqbal, S., Harsh, O.K.: A self review and external review model for
teaching and assessing novice programmers. Int. J. Inf. Edu.
Technol. 3(2), 120123 (2013)
13. Koulouri, T., Lauria, S., Macredie, R.D.: Teaching introductory
programming: a quantitative evaluation of different approaches.
Trans. Comput. Edu. 14(4). ACM (2015)
14. Allan, V.H., Kolesar, M.V.: Teaching computer science: a problem
solving approach that works. SIGCUE outlook, ACM 25(12), 2
10 (1997)
15. Yoo, J., Yoo, S., Seo, S., Dong, Z., Pettey, C.: Can we teach
algorithm development skills?. In: Proceedings of the 50th Annual
Southeast Regional Conference, pp. 101105, ACM, New York
(2012)
16. ACM-IEEE Joint Task Force on Computing Curricula: Computer
Science Curricula 2013, ACM Press and IEEE Computer Society
press. http://dx.doi.org/10.1145/2534860 (2013)
17. Australian Computer Society: The ICT Profession Body of
Knowledge. Retrieved 25 Sep 2015, https://acs.org.au/__data/
assets/pdf_le/0013/24502/The-ICT-Profession-Body-of-
Knowledge-23-Sept-2013.pdf (2013)
18. De Raadt, M., Toleman, M., Watson, R.: Textbooks Under
Inspection, University of Southern Queensland, Australia.
Retrieved May 2013, http://eprints.usq.edu.au/167/1/TechReport_
Draft_10.pdf (2005)
19. Winslow, L.E.: Programming pedagogya psychological over-
view. ACM SIGCSE Bull. 28(3), 1722 (1996)
20. Soloway, E.: Learning to program = learning to construct mech-
anisms and explanations. Commun. ACM 29(9), 850858 (1986)
21. Hyde, D.C., Gay, B.D., Utter, D.: The integration of a problem
solving process in the rst course. In: Proceedings of the
Tenth SIGCSE Technical Symposium on Computer Science
Education, pp. 5459, ACM, (1979)
22. Malik, I.S., Coldwell-Neilson, Jo.: A model for teaching an
introductory programming course using ADRI. Edu. Inf. Technol.
Springer, https://doi.org/10.1007/s10639-016-9474-0 (2017)
23. Malik, I.S.: Enhancing practice and achievement in introductory
programming using an ADRI editor. In: Proceedings of the IEEE
International Conference on Teaching, Assessment and Learning
for Engineering, pp. 3239, IEEE, Thailand, 79 December,
https://doi.org/10.1109/tale.2016.7851766 (2016)
24. Oda, Y., Fudaba, H., Neubig, G., Hata, H., Sakti, S., Toda, T.,
Nakamura, S.: Learning to generate pseudo-code from source code
using statistical machine translation. In: Proceedings of 30th
IEEE/ACM International Conference on Automated Software
Engineering (ASE), USA, https://doi.org/10.1109/ase.2015.36
(2015)
25. Taheri, S.M., Sasaki, M., Ngetha, H.N.: Evaluating the effective-
ness of problem solving techniques and tools in programming. In:
Proceedings of Science and Information Conference (SAI) IEEE,
https://doi.org/10.1109/sai.2015.7237253.uk (2015)
26. Malik, I.S., Coldwell-Neilson, J.: Impact of a new teaching and
learning approach in an introductory programming course. J. Edu.
Comput. Res. 55(6), 789819. Sage https://doi.org/10.1177/
0735633116685852 (2017)
27. Malik, I.S., Coldwell-Neilson, J.: Comparison of traditional and
ADRI based teaching approaches in an introductory programming
course. J. Inf. Technol. Edu. Res. 16, 267283. http://www.
informingscience.org/Publications/3793 (2017)
28. Malik, I.S.: Improvements in Introductory Programming Course:
Action Research Insights and Outcomes. Syst. Pract. Action Res.
Springer, https://doi.org/10.1007/s11213-018-9446-y (2018)
29. Malik, I.S., Mathew, R., Chowdhury, M.U., Coldwell-Neilson, J.:
Impact of assurance of learning (AOL) in programming course for
novices. In: Proceedings of 2nd BCS the Chartered Institute for IT
International Conference, BCS Learning and Development, United
Arab Emirates (2014)
30. Malik, I.S., Coldwell-Neilson, J.: Gender differences in an
introductory programming course: new teaching approach, stu-
dentslearning outcomes, and perceptions. Edu. Inf. Technol.
Springer, https://doi.org/10.1007/s10639-018-9725-3 (2018)
31. Malik, I.S.: Role of ADRI model in teaching and assessing novice
programmers. Ph.D. thesis, Deakin University, http://hdl.handle.
net/10536/DRO/DU:30088862 (2016)
32. Paramasivam, G., Manohar, J., Malik, I.S.: Bringing technology
into the classroom: receptivity and satisfaction level of faculty
members using smart boardan experimental study. In: Proceed-
ings of International Conference on Applied Information and
Communication Technology, Oman (2014)
33. Malik, I.S., Al-Emran, M.: Social factors inuence on career
choices for female computer science students. Int. J. Emerg.
Technol. Learn. 13(5), 5670 (2018)
34. Eldow, A., Shakir, M., Abdullah, M.Y., Iqbal, S.: Using Informa-
tion communication technology as a teaching tool in Sudanese
Governmental Universities of Khartoum State. Int. J. Inf. Visual. 1
(4), 150156
302 S. I. Malik et al.
Process Mining of Event Logs from Horde
Helpdesk
Radim Dolak and Josef Botlik
Abstract
One of the most important goals of process mining is the
ability to extract information from event logs. The main
purpose of this paper is to describe the possibility of using
process mining in helpdesk systems. We can use process
mining for example for performance managing and
optimize of the most important helpdesk processes from
existing event logs that are stored in helpdesk systems.
The case study deals with using Disco software tool for
process mining of helpdesk event logs in Horde. There
will be described processes such as acquisition, preparing,
importing and process mining of data from the event log
in Horde helpdesk system. Disco software tool will be
used for automatic discovery of process model map with
detailed information about events, activities, cases, and
resources in helpdesk system.
Keywords
Process mining Event logs Helpdesk
Horde Disco
1 Introduction
There are many helpdesk systems that store the information
about events in the log les. Basic process mining tech-
niques are used for extracting event logs from data sources
such as information systems databases, transaction logs, web
pages, excel les, results of information process audits etc.
We will discuss the issue of analyzing event logs from
Horde helpdesk system. Horde helpdesk system is imple-
mented at our Institute of Information Technology at School
of Business Administration in Karvina.
The structure of this paper is divided into the following
chapters: Process mining, Process mining software, Help-
desk systems, Case study: Process mining of event logs from
Horde helpdesk system and nally Conclusion.
2 Process Mining
We can read much information about process mining in
books and scientic articles written by professor van der
Aalst and his research team. Process mining should be
dened as a relatively young research discipline that sits
between computational intelligence and data mining on the
one hand, and process modeling and analysis on the other
hand [1]. The process mining spectrum is quite broad and
extends far beyond process discovery and conformance
checking. Process mining objectives are overlapping with
those of other approaches, methodologies, principles,
methods, tools, and paradigms [2]. The main idea of process
mining is to discover, monitor and improve real processes
by extracting knowledge from event logs [3].
The starting point for process mining is an event log and
all process mining techniques assume that it is possible to
sequentially record events such that each event refers to an
activity and is related to a particular case [4]. Process Mining
Manifesto [5] deals with very important aspects such as
process discovery, conformance checking, social network or
organizational mining, construction of simulation models
with the possibility of model extension and repair. Process
mining is very useful for its ability to nd out how proce-
dures in real situations work and for comparing the actual
process with some predened process [6].
R. Dolak (&)J. Botlik
Department of Informatics and Mathematics, School of Business
Administration in Karvina, Silesian University in Opava, Karvina,
Czech Republic
e-mail: dolak@opf.slu.cz
J. Botlik
e-mail: botlik@opf.slu.cz
©Springer Nature Switzerland AG 2019
A. Al-Masri and K. Curran (eds.), Smart Technologies and Innovation for a Sustainable Future,
Advances in Science, Technology & Innovation, https://doi.org/10.1007/978-3-030-01659-3_35
303
3 Process Mining Software
We can nd some process mining software tools in both
categories: open source or commercial. There is best known
and famous open source framework called ProM. ProM has
been developed at the Eindhoven University of Technology
by a team of professor van der Aalst. The biggest benetof
ProM is its extensible framework that supports a wide
variety of process mining techniques in the form of plugins.
We can use plugins for mining, export plugins, import,
analysis or conversion. It is possible to download ProM
software together with many different plugins both free of
charge. ProM platform is independent of the operating sys-
tem and it is implemented in Java [7]. The most downloaded
and interesting plugins are mining and analysis plugins [8].
The functionality of ProM is according to Aalst [1]
unprecedented and there is no product offering a comparable
set of process mining algorithms. It is possible to use in
ProM 6, for example, these process mining algorithms such
as alpha miner, heuristic miner, genetic miner, fuzzy miner,
social network miner etc.
There are also commercial process mining tools such as
Disco by Fluxicon, ARIS Process Performance Manager,
Interstage Automated Process Discovery by Fujitsu etc. The
best known commercial process mining tools are Disco
mining software developed by Fluxicon. Disco by Fluxicon
is a very user-friendly tool which is characterized by very
fast process mining algorithms, tools for efcient log man-
agement and also a ltering framework. Disco process
mining tool simply works and it is able to works with large
event logs and complex models. Disco provides according to
ofcial website [9] useful functionality for optimizing per-
formance, control deviations, or explore variations such as
automated process discovery, process map animation,
detailed statistics, cases, lters, import, and export. The core
functionality of process mining tools is the automated dis-
covery of process maps from the imported event logs. It is a
big advantage for beginners that Disco provides an intu-
itively understandable way of process map visualization in
the discovering the main paths of the process ows in the
form of coloring and thickness of paths [10].
4 Helpdesk Systems
We can consider helpdesk systems as a comprehensive system
for users that offers the opportunity to create a technical task to
IT department specialist, to ask questions or to communicate
ICT problems and achieve timely, relevant and accurate
advice and guidelines from IT department. Tasks are also
called tickets and are usually divided into ques/modules. Each
module has usually its own controller, which is responsible for
forwarding the query to the person who will solve it. Simply
stated, the goal of most help desk operations is to provide
clients with a single point of contact for the information
request, IT services, and a problem resolution [11]. Helpdesk
is a single point of contact within a company for
technology-related questions and incidents [12]. Proactivity is
very important in helpdesk processes for many years. Proac-
tivity in a user support department takes many forms. One of
the most common of these is a regular study of user problems
encountered with a view to preventing them in future. Another
is the creation of an inventory of user equipment to help with
diagnosing and solving problems the user may have [13].
Horde Helpdesk System
Institute of Information Technology at School of Business
Administration in Karvina has implemented Horde helpdesk
system a few years ago. Horde Groupware is a free, enter-
prise ready, browser based collaboration suite. Users can
manage and share calendars, contacts, tasks, notes, les, and
bookmarks with the standards compliant components from
the Horde Project [14]. There is implemented inside Horde
system ticket-tracking application called Whups. It is very
exible in design and can be used for help-desk requests,
tracking software development, and anything else that needs
to track a set of requests and their status [15]. Currently,
Whups supports the following features [16]:
Support for multiple Queues(aka Projects)
Custom ticket types, states, priorities, attributes per
Queue
Create, update, assign, close tickets
Search for tickets matching specic criteria
A complex query building for building and
saving/storing custom searches
Guest access (in addition to login access)
E-mail notication of changes to tickets
Ticket creation and updating through e-mail messages
Permissions support.
Help Desk service for users at School of Business
Administration in Karvina is a part of university email sys-
tem [17]. The tasks are created in the section called tickets
in the main menu. Tasks are divided into modules provides
routing query and faster processing. Users are informed by
e-mail about the state of a solution of their tasks. There are
the following task ques:
opf_HW
opf_blocking classrooms
opf_administration staff
opf_others
304 R. Dolak and J. Botlik
opf_IS stag
opf_eLearning
opf_WWW and thesis topics
opf_IS iskam.
5 Case Study: Process Mining of Event Logs
from Horde Helpdesk System
We will discuss the issue of process mining of event logs
from Horde helpdesk system using Disco software tool in
this case study. The basic information about Horde helpdesk
system at Institute of Information Technology at School of
Business Administration in Karvina was mentioned in the
previous chapter.
5.1 Preparing Data from Events Log
We have obtained events log from Horde helpdesk system.
This ticketing system is implemented at our faculty IT
department. There is the nal statistics about events log from
Horde helpdesk ticketing system during all year 2015: 1734
events, 523 cases, 12 different activities, 8 different ques for
tickets, 110 different users of helpdesk system and 6 IT
specialist solving users tickets.
We can see an example of events log from Horde help-
desk which is available in a module called Ticketsand the
option Searchas standard displayed the web page. We can
select multiple items of displayed tickets such as no
assigned, assigned, solved, canceled. It is possible to save
results as HTML or CSV le (Table 1).
It is possible to click on idand we will see more details
about the ticket in the form of a web page with timestamps,
comments, actual states etc. It was necessary to match
according to ID both data sources. There is following
structure of columns for transformed events log:
ID
State
Type
Priority
Queue
User
Owners
Activity
Timestamp
Summary.
We can see an example of events log after data trans-
formation for one helpdesk user solving eLearning problem
with error copying, non-existent courses in the following
Table 2called Transformed events log.
There are the following basic activities (processes) in help
desk system:
created
add the requirement
change queue
assigned
reassigning
removed assignment
question
answer
comment
solved
unresolved
cancelled.
We can see the minimum requirements for importing
events log to Disco tool for example in Disco Users Guide
[18]. There are necessary at least three elements in events log
for providing process mining analysis in Disco: Timestamp,
Case ID, and Activity. We can also use other elements such
as for example resources, costs, state, priority etc. We can
see columns of transformed events log for importing process
into Disco process mining tool on the left side of bullet item
list and the right side is representing columns in Disco.
ID = Case ID in Disco
Owners = Resource in Disco
Table 1 Default events log
Id Summary State Type Priority Queue Requester Owners Created Updated Assigned Due Resolved
51 Error copying,
non-existent courses
Solved Standard Basic opf_eLearning user xy Robert 13.2.2015
10:27
13.2.2015
11:05
13.2.2015
10:46
N/A 13.2.2015
11:05
……
64 Blocking Solved Standard Basic opf_blocking
classrooms
user xy John 19.2.2015
8:25
19.2.2015
10:59:51
19.2.2015
10:59:51
N/A 19.2.2015
10:59:51
……
85 PC repair Solved Standard Basic opf_HW user xy John 24.2.2015
17:27
25.2.2015
7:46
25.2.2015
7:46
25.2.2015
7:46
Process Mining of Event Logs from Horde Helpdesk 305
Activity = Activity in Disco
Timestamp = Timestamp in Disco.
There are also other columns in transformed events log
that can be analyzed in Disco as other elements. All other
elements can be ltered and used for detailed analysis. There
are the following other columns in transformed events log:
state
type
priority
queue
user
summary.
5.2 Process Mining Analysis in Disco
Process mining analysis in Disco consists of tools for rep-
resenting process model map, activity event classes, events
over time, an overview of using resource and tasks queues.
There will be providing analysis of events log from Horde
helpdesk ticketing system with the total amount of 523 cases
with 1734 events which were generated by during the year
2015 in our case study.
Process model map. Process model map is in Disco
process mining tool is interactive so it is possible to make
basic or deeper process model map. We can see only the
most frequent paths in the ow but it is also possible to
change the level of detail by using the interactive setting in
the software (setting detail of paths in percent). We can see
also a different number of activities (setting detail of activ-
ities in percent). Disco supports also the easy creation of
animations for visualizing analyzed processes. We can use
animations for nding out some spot bottlenecks, errors etc.
The following Fig. 1shows the discovered process model
map for the absolute frequency of cases.
We can check according to the process model map that it
was created 523 tickets and 497 were solved, were 25 can-
celed and only 1 was unresolved. All 523 created tickets
were assigned to their owners (IT department specialist).
There are additional processes such as questions, answers,
comments, changing queues, reassigning, adding the
requirements or removing assignment. We can now imagine
how processes in helpdesk system work but for better
analysis about efciency and performance is necessary to
changed lters and used mean, median, maximum and
minimum duration for analysis of the most important
activities related to Horde helpdesk system.
We can see in the following Fig. 2that median duration
between creating ticketand assigning the ticket to owner
is 39.9 min. This is not so bad result and we can compare
this median duration with a mean duration which is 8.8 h
and we can investigate the longest inactivity from duration
between creating ticketand assigning the ticket to owner
which was 12 days (Fig. 3). We can get detailed statistics
about paths between two processes by clicking on appro-
priate path. It is possible to discover, for example, that
between processes assignedand solvedis mean duration
66.8 h and maximum duration 15 weeks (Fig. 3).
We can see the maximum duration of all observed
helpdesk activities in the following Fig. 3. All too long times
between processes are highlighted in red thick line (as-
signed!solved15 weeks, assigned!cancelled
57.1 days, assigned!unresolved16.5 weeks, as-
signed!comment81.9 days and com-
ment!solved57 days. If we compared this maximum
times (Fig. 3) with median duration (Fig. 2) so we will see
that there is no systemic problem but there is the only
problem with individual examples that were complicated to
solve.
Activity event classes. Activities are divided into 12
groups. We can see that activity called createdhas fre-
quency 523 and activity assignedhas also 523 so every
created task was assigned to the owner for IT department to
Table 2 Transformed events log
ID State Type Priority Queue User Owners Activity Timestamp Summary
51 Solved Standard Basic opf_eLearning user
xy
Robert Created 13.2.2015
10:27
Error copying, non-existent
courses
51 Solved Standard Basic opf_eLearning user
xy
Robert Assigned 13.2.2015
10:46
Error copying, non-existent
courses
51 Solved Standard Basic opf_eLearning user
xy
Robert Comment 13.2.2015
10:53
Error copying, non-existent
courses
51 Solved Standard Basic opf_eLearning user
xy
Robert Comment 13.2.2015
10:57
Error copying, non-existent
courses
51 Solved Standard Basic opf_eLearning user
xy
Robert Solved 13.2.2015
11:05
Error copying, non-existent
courses
306 R. Dolak and J. Botlik
Fig. 1 Process model map with absolute frequency of cases. Source Own analysis in Disco
Fig. 2 Median duration of helpdesk activities. Source Own analysis in Disco
Process Mining of Event Logs from Horde Helpdesk 307
solve it. It was solved a total amount of 497 tasks, canceled
was 25 tasks and only 1 was unresolved.
During the solving task was written 140 comments by IT
department to users that have created their tasks to be solved.
Some tasks were more complicated and it was necessary to
ask questions from IT department to users. There were 10
cases with questions but only in 7 cases, the users answered
them. If IT department did not receive the necessary infor-
mation it was impossible to solve to tasks and these tasks
were canceled.
Relative frequency of tasks was the following: solved
(94.41%), canceled (5.42%) and unsolved (0.17%).
Overview of using resource and tasks queues. There
was provided a detailed analysis of using resource and tasks
queues using data from 1.1.2015 to 1.12.2015. We can see
that use of resources from IT department (IT specialists) is
uneven because there are totally 6 IT specialists but the most
exposed of them solved globally 54.84%.
Relative frequency according to the division into queues
was the following: opf_blocking classrooms (42.56%),
opf_others (15.57%), opf_HW (15.34%), opf_IS stag
(8.54%), opf_eLearning (8.02%), opf_administration staff
(6.06%), opf_WWW and thesis topics (3.23%) and opf_IS
iskam (0.69%).
There were tasks from 110 different users (academics,
secretaries, technical department, students). Most tasks were
created by secretaries of different departments at the faculty
such as Department of Economics and Public Administra-
tion, Department of Business Economics and Management,
Department of Finance and Accounting, Department of
Informatics and Mathematics and Department of Tourism
and Leisure Activities. There were also tasks created by 33
students.
6 Conclusion
The main goal of this paper was to use process mining
techniques to analyzed processes in Horde helpdesk system
at our university. The main outputs based on Disco process
mining tools include the following results: process model
map, information about activity events, events over time, an
overview of using resources and of course statistics about the
efciency of helpdesk processes such as absolute frequency
of cases, median and maximum duration of some important
helpdesk activities.
We can assume a greater use helpdesk system at our
university so we are planning to compare as a future work if
there are some differences in efciency of helpdesk pro-
cesses and user behavior in different years.
Acknowledgements The work was supported by the SGS/19/2016
project called Advanced mining methods and simulation techniques in
business process domain.
Fig. 3 Maximum duration of helpdesk activities. Source Own analysis in Disco
308 R. Dolak and J. Botlik
References
1. van der Aalst, W.M.P.: Process Mining: Discovery, Conformance
and Enhancement of Business Processes. Springer, Berlin (2016)
2. van der Aalst, W.M.P.: Process Mining: Data Science in Action.
Springer, Berlin (2011)
3. van der Aalst, W.M.P.: Process mining in CSCW systems. In:
Proceedings of the Ninth International Conference on Computer
Supported Cooperative Work in Design, pp. 18. IEEE Press, New
York (2005)
4. van der der Aalst, W.M.P., et al.: Process mining manifesto. In:
Daniel, F., Barkaoui, K., Dustdar, S. (eds.) Business Process
Management Workshops 2011. LNBIP, vol. 99, pp. 169194.
Springer, Heidelberg (2011)
5. Process Mining Manifesto, http://www.win.tue.nl/ieeetfpm/lib/exe/
fetch.php?media = shared:process_mining_manifesto-small.pdf
6. van der Aalst, W.M.P., Weijters, A.J.M.M., Maruster, L.: Work-
ow mining: discover-ing process models from event logs. IEEE
Trans. Knowl. Data Eng. 16(9), 11281142 (2004)
7. ProM, http://www.promtools.org/doku.php
8. van der Aalst, W.M.P., Reijers, H.A., Weijters, A.J.M.M., van
Dongen, B.F., Aalves de Mediros, A.K., Song, M.S., Verbeek, H.
M.W.: Business process mining: an industrial application. Inf.
Syst. 32, 713732 (2007)
9. Fluxicon, http://www.uxicon.com/disco/
10. Günther, C.H.W., Rozinat, A.: Disco: discover your processes. In:
Proceedings of the Demonstration Track of the 10th International
Conference on Business Process Management, pp. 4044.
Springer, Berlin, Heidelberg (2012)
11. Beisse, F.: A Guide to Computer User Support for Help Desk and
Support Specialists. Course Technology, Boston (2014)
12. Knapp, D.: A Guide to Customer Service Skills for the Service
Desk Professional. Course Technology, Boston (2011)
13. Bruton, N.: How to Manage the IT Help Desk. The Bruton
Consultancy, Oxford (2002)
14. Horde LLC, GroupwareThe Horde Project, https://www.horde.
org/apps/groupware
15. Horde LLC, WhupsThe Horde Project, https://www.horde.org/
apps/whups
16. Horde LLC, DocumentationWhupsThe Horde Project, https://
www.horde.org/apps/whups/docs/README
17. HelpDesk (Lístky) [Ústav informačních technologií], https://uit.
opf.slu.cz/horde/helpdesk
18. Fluxicon Disco Users Guide, https://uxicon.com/disco/les/
Disco-User-Guide.pdf
Process Mining of Event Logs from Horde Helpdesk 309
Public Library Services to Children
in the United Arab EmiratesA Study
Natarajan Sundar , N. Radhakrishnan ,
and Mohammad Khaled Issa Al-Shboul
Abstract
It is important to establish children libraries for children
in any country and encourage them to promote reading
habits and help them to develop their talents. Keeping that
in mind, all the public libraries including Dubai Public
Libraries, Sharjah Public libraries, MCYCD (Ministry of
Culture, Youth and Community Development), and
National Library have been developed childrens library
and dedicated to children ages between 3 and 16 in
United Arab Emirates (UAE.). Other than the common
services of borrowing and reference services, children
libraries provide a range of activities which include
storytelling, audio video materials, drawing competitions,
cultural competitions, seminars, lectures and offering
special services for disabled children. This paper aims to
identify the development and services offered towards
children in public libraries in UAE.
Keywords
Childrens library Library services Public library
United Arab Emirates
1 Introduction
United Arab Emirates cabinet has declared 2016as the
UAE Reading year[1]. It has been understood that the
country supports and encourages the reading habits among
the people and particularly young children. H.H. Sheikh
Mohammad Bin Rashid Al Maktoum, Vice President and
Prime Minister of the UAE and Ruler of Dubai launched the
Arab Reading Challengeto motivate millions of students
in the Arab world to read 50 million books by Sep 2015 [2].
The challenge 201516 edition was attracted 3.59 million
students from 54 nationalities, which represented 30,000
schools in 21 countries. The total prize value for all the
different categories was Dh.11 million ($2,994,827).
Reading opens minds, magnies hunger for knowledge and
instils the values of openness and moderation that dene
great civilizations[3].
The study discusses the childrens library services offered
in the United Arab Emirates at national, public and private
levels. The Central and state government bodies support and
facilitate the services to the public libraries. Childrens
library serves to certain age categories between 3 and 13 and
increase opportunities to explore educational, cultural and
recreational nature. IFLA recommends that the children
should be encouraged using libraries from an early age. The
main objectives of the childrens libraries are;
To improve and implant children about reading habits.
To facilitate the access to the global information
including open sources and media.
To recognize the potential and capabilities of young
minds.
To develop the social awareness and help children to use
the right information from different sources.
To promote lifelong learning and involve them in various
activities.
2 Library Services to Children
Library leads a range of activities which include storytelling,
educational movies, drawing competitions, cultural compe-
titions, seminars, lectures, organizing trips, special training
courses and providing special services for disabled children.
Further it organizes summer program, book fairs to attract
N. Sundar (&)M. K. I. Al-Shboul
American University in the Emirates, Dubai, UAE
e-mail: gn.sundar5@gmail.com
M. K. I. Al-Shboul
e-mail: alhareth8@gmail.com
N. Radhakrishnan
Department of LIS, Periyar University, Salem, India
e-mail: mkuradha@gmail.com
©Springer Nature Switzerland AG 2019
A. Al-Masri and K. Curran (eds.), Smart Technologies and Innovation for a Sustainable Future,
Advances in Science, Technology & Innovation, https://doi.org/10.1007/978-3-030-01659-3_36
311
more readers so as to promote reading habits. Libraries offer
ICT programs to children for computer usage and safe search
on internet.
2.1 Childrens Collection
The materials include a rich collection of books and variety
of cognitive materials suitable for children with different age
group to attract and develop the skills of imagination. Books
deal with fun stories, education, religious, basic science
historical collections and encyclopedias of diversied
knowledge. Other than books, the collections include jour-
nals, magazines, audio-visuals, map, and microlms, etc.
2.2 Library Membership
In general, public libraries provide services to the public
without any charges for utilization. To become an active
member of the library or community, membership fee is
being collected from the public. Public libraries membership
is available for nationals and residents of UAE to benet the
services being offered. Public libraries of MCYCD (Ministry
of Culture, Youth and Community Development) are
available. The membership for children category (below
12 years old) requires parents consent and charged AED 50
(USD 14) for annual membership with refundable deposit of
AED 50 (USD 14) [4].
2.3 Activities
Most of the Libraries i.e. public or private organize events,
workshops, and seminars in regular interval to attract chil-
dren at a large. Dubai public library organized summer
program in 2017 entitled Our Summer is Arts and Culture
to help the children enjoy the holidays to some extent. The
educational and entertaining activities were designed for the
whole family. The program was hosted by Dubai public
library branches at Al Twar, Al Rashidiya, Al Mankhool,
Umm Suqeim and Hatta during July 16Aug 10, 2017.
Participation fee was free for the library members and AED
500 for non-members. Programs had categorized for the age
group between 58 years, both boys and girls; 913 years;
69 years. Some programs were scheduled separately for
boys and girls for the age group between 10 and 13.
According to the National (2014, Aug 10) news daily that
Abu Dhabi Tourism and Culture Authority (TCA, Abu
Dhabi) had launched month-long series of Public Libraries
Summer 2014 event at Khalifa Park Library and Bahia Park,
in partnership with Abu Dhabi City Municipality. The event
offered a diverse educational and entertainment programs for
children aged between 6 and 12, activities related to the
importance of healthy food, basic scientic activities and
group discussions. Children learned about the importance of
recycling waste for other purposes during the workshop [5].
3 Children Libraries in UAE
The National library, Abu Dhabi was established in 1981
and started providing services to public in 1984. The chil-
drens library was set-up in 1986 at national library in order
to promote better habits in children. Most of the library
collections are available in Arabic, English and French
languages [4]. In April 2010, Umm Al Quwain public library
was renovated with separate and specially designed for
children with the collection of 33,209. Branch library
remain opens for public throughout the week; except Friday
and public holidays from 9 am to 2 pm and 4 pm to 9 pm
[6].
Al Bateen childrens collections were distributed amongst
all other libraries to form the basis among the neighborhood
libraries for the purpose. To avoid keeping the collection in
one place where children should travel, better move the
collections in public libraries where children could visit
along with their teachers. It is identied that from Al
Mazyad Mall childrens library receive 100 of children
during busy times [7].
4 Guidelines and Standards
International Federation of Library Associations recom-
mends the following guidelines to the childrens libraries
that every child has right to develop his/her potential with
fee and open access to information, materials and programs
for all, irrespective of age, race, gender, religious, language
or social status [8]. It has been emphasized that Childrens
libraries should promote the rights through different activi-
ties for children and adult including exhibitions, promotion
of books, workshop, reading and literacy sessions [9].
Childrens library should have space enough to accom-
modate school groups.
Furnishing must be exible and shelves should be lower,
accessible (Max. height 1.5 m) throughout the section.
Library must be a safe place; must be avoided any risk,
e.g. staircases, sharp edges of shelves.
312 N. Sundar et al.
5 Abu Dhabi Tourism and Culture Authority
(TCA)
Abu Dhabi Tourism and Culture Authority (TCA, Abu
Dhabi) manage National library and few more public
libraries. The branches have spread over the emirate and
each of the libraries has a phone number to call for any
information about the location and hours of operation [10].
5.1 Khalifa Park Library
Khalifa park library was established in July 2013 and this
branch has its childrens section. Childrens library contains
20,000 books including ction and non-ctions. More than
400 French books are available including stories, dictionaries,
scientic books, and etc. This branch library has separate
activity room where children can listen stories, watch puppets
show and movies. Branch offers activities like storytelling and
Back-to-school event as well. Branch can be contacted
through the provided email id: national-library@tcaabudhabi.
ae. Library opens Sunday to Thursday, 8 am to 8 pm and
Saturday 4 pm to 8 pm.
5.2 Mazyad Mall Library
This library was established in March 2012 and exclusive
children section launched due to the presence of several
primary schools in the surrounding areas. Childrens library
contains more than 3000 latest titles in all subjects. This
branch has an activity area where children can listen stories,
and watch puppets show. Branch opens from Sunday to
Thursday between 9 am to 9 pm and Saturday 4 pm to 9 pm
(Fig. 1). Library can be communicated to the email id:
MBinZayed-Library@tcaabudhabi.ae.
5.3 Al-Bahia Library
The Al-Bahia library was constituted in 2012 and has more
than 30,000 titles including childrens collection with an
emphasis on novels. Stories are available for children from 5
to 10 years old. Different types of activities are offered like
storytelling, book signing, art displays, national day, and
back-to-school event. The center has an email
national-library@tcaabudhabi.ae. The library opens Sunday
to Thursday 8 am to 8 pm and Saturday 4 pm to 8 pm.
Fig. 1 Mazyad Mall Library
Public Library Services to Children in the United Arab Emirates 313
Virtual tour can be accessed http://360emirates.com/
abudhabi/360-virtual-tour/al-bahia-park-library/.
5.4 Al Marfa Library
The Al Marfa library was opened in October 2013. It
rewards the regular children visitors by allowing them to
choose their gifts from the gifts shelves which attract more
children. Childrens story collections are classied for the
age group of 510 years and 1118 years old. Separate
activity hall is available for children to listen to stories,
watch puppets show and movies. This branch motivates the
general readers to take free books. (http://360emirates.com/
abudhabi/360-virtual-tour/al-marfaa-library/). Center opens
Sunday to Thursday 8 am to 8 pm and closed on Friday
(Fig. 2).
5.5 Zayed Central Library
Zayed Central library was located in Al Ain, Abu Dhabi and
opened in 2016 with the collection of 136,000, childrens
section and separate activity room. This branch opens Sunday
to Thursday 8 am to 8 pm and closed on Fridays. Email id is
alain-library@tcaabudhabi.ae for the communication.
6 Childrens Library at MCYCD Public
Libraries
The public libraries of the Ministry of Culture, Youth and
Community Development (MCYCD) have opened at the
federal level in the Northern and Western regions of the
UAE (Abu Dhabi, Ras Al Khaimah, Um Al Quwain, Ajman
and Fujairah). The MCYCD has 10 libraries UAE-wide
available for UAE nationals and residents as well. They are:
Abu Dhabi public library (established in September 2009);
Umm al-Quwain public library (inaugurated in July 2005
and built new center in April 2010); Dibba Al-Fujaira public
library (re inaugurated in March 2006 after renovation);
Delma public library (Renovated and inaugurated in May
2008); Ras Al-Khaima public library (inaugurated in January
2004); Ajman public library (established in 2011); Al Fujaira
public library (inaugurated in July 2005); Madinat Zayed
public library (renovated and inaugurated in March 2006);
Masapublic library (inaugurated in April 2008); Beach
Library (inaugurated in 2014).
Libraries at the MCYCD give special attention to children
to promote reading habits for younger generation. In this
context, public libraries have allocated special area for
children sections that provide diverse collections of pro-
grams and increase intellectual skills among the users.
Childrens library is divided into age categories of 36,
Fig. 2 Al Marfa Library
314 N. Sundar et al.
710, and 1113. To achieve its aim and objectives, chil-
drens area of the library has created an attractive environ-
ment with the best design, xtures, and furniture. Childrens
library programs include quiz, events to encourage father to
read for his child, materials to reach reading, coloring,
drawing, ICT programs for safe search in internet (Ministry
of Culture and Knowledge Development, UAE).
7 Childrens Library at Dubai Public Library
Dubai Public Library is managed and run by Dubai Culture.
It includes eight branches across the emirates. Out of these
eight branches, seven public libraries have their own chil-
drens library other than the Al Ras, Branch. According to
Dubai Culture (Government of Dubai), in 1989 new libraries
were opened in major locations around the emirates in busy
and bustling communities of Hor Al Anz, Rashidiya, Safa
and Umm Suqeim. Library was opened in 1998 to serve
Hatta residents. In 2007 Al-Twar library was opened and
more recently, in 2012 Al-Mankhool library joined with
Dubai Public Library Network. Dubai public library believes
to work so as to create the personality of the children,
improve their talents, ability and guide them in best direc-
tion. Childrens library plays a vital role in enhancement and
renement of the childrens intellect and tendencies. These
libraries are inter-connected with computer systems and
provide wide range of information facilities and knowledge
in both Arabic and English languages. Childrens library
offers a variety of activities including featured stories, edu-
cational lms, drawing, cultural competition, seminars, and
special services for disabled children [11].
8 Sharjah Public Library
Sharjah library was established in 1925, which was then
renamed as Qasimi Library. The public library in Sharjah
was set-up in ve different branches across the city before it
was found permanent residence in 2011 at Cultural Square.
There is a hall for children age group between 3 and 12,
which has educational toys, games and books. Children
under 8 years should be accompanied by their parents.
Library charges AED 10 (USD 3) for the insurance of a
borrowers card and refundable deposit of AED 150 (USD
41). Membership for children under 19 years old requires
the consent of the guardian. The library operates from 8 am
to 10 pm from Saturday to Thursday and visitors can log on
to shjlib@shjlib.gov.ae for more information [12].
9 Recommendations
In order to establish the quality of childrens library, the
following recommendations are vital to achieve the reading
habits of young minds and develop their talents:
1. Increase the number of childrens libraries in remote
areas.
2. Encourage parents to read for their children.
3. Promote school activities like in childrens libraries.
4. Develop the childrens librarians professional skills by
proving training.
5. Extend the library timings and open even on the
week-ends and public holidays.
10 Conclusion
Information Literacy gains much importance in this elec-
tronic age. Libraries have started to stimulate the user
community to keep them updated on various issues. Huge
amount of funds is invested to modernize the existing system
to attract more number of visitors by and large. Most of the
public libraries has childrens section in the United Arab
Emirates. A periodical survey on the use of Public Libraries
will bring out the impact and the growth users in toto. There
are very limited studies carried out on Public Libraries in
UAE in general and Children Libraries in particular. Hence
an attempt has been made to study the existing library ser-
vices available in Public Libraries across the United Arab
Emirates. This paper will be fruitful to those who take up
research in Library and Information Science in UAE and
GCC.
References
1. UAE Year of Reading 2016. https://uaecabinet.ae/. Last accessed
25 June 2017
2. Hanif, N.: Sheikh Mohammed Bin Rashid Launches Child Reading
Challenge with Dh11 m in Rewards. The National. https://www.
thenational.ae/. Last accessed 16 July 2017 (2015, Sep 16)
3. Arab reading challenge. http://arabreadingchallenge.com/
newsdetails/2017/04/14/vip-news-2. Last accessed 19 July 2017
4. Ministry of Culture and Knowledge Development (MCKD).
https://mckd.gov.ae/sites/MCYCDVar/en-us/pages/
AboutOurLibrary.aspx. Last accessed 22 July 2017
5. TCA Abu Dhabi Launches Public Libraries Summer 2014 events.
The National. https://www.thenational.ae/. Last accessed 16 July
2017
Public Library Services to Children in the United Arab Emirates 315
6. Abu Dhabi eGovernment Gateway. https://www.abudhabi.ae/.
Last accessed 18 July 2017
7. Sengati-Zimba, M., Mavodza, J., Abu Eid, E.: Innovative Public
Libraries in United Arab Emirates: Taking library services in
public spaces. Paper presented at: IFLA WLIC 2015Cape Town,
South Africa in Session 147Asia and Oceania (2015)
8. The Background text to the Guidelines for Childrenslibraries
services. Retrieved from https://www.ia.org/les/assets/libraries-
for-children-and-ya/publications/guidelines-for-childrens-libraries-
services_background-en.pdf. Last accessed09 June 2017 (2003, Dec)
9. Libraries for Children and Young Adults Section: Guidelines for
Childrens Libraries Services. IFLA. https://www.ia.org/les/
assets/libraries-for-children-and-ya/publications/guidelines-for-
childrens-libraries-services-en.pdf. Last accessed 15 July 2017
10. Abu Dhabi Tourism and Culture Authority (TCA, Abu Dhabi).
http://tcaabudhabi.ae/. Last accessed 18 July 2017
11. Dubai Public Library. http://www.dubaiculture.gov.ae/. Last
accessed 13 June 2017
12. Al Serkal, M.M.: Sharjah Library has Permanent Home: building
Opens at New Location After Being Moved Five Times Since
Inception. Gulfnews. http://gulfnews.com. Last accessed 20 July
2017 (2011, May 28)
316 N. Sundar et al.
Security and Privacy in Smart Cities:
Issues and Current Solutions
Talal Ashraf Butt and Muhammad Afzaal
Abstract
Internet of Things (IoT) paradigm is making it possible
for everyday objects to integrate with the Internet. This
has laid the foundations for the inception of future Smart
cities based on systems that consist of a plethora of IoT
devices to enable novel applications. The smart cities
paradigm deals with the public data that is prone to
different security and privacy risks at different level of
smart cities architecture. Therefore, the importance of
ensuring security and privacy is paramount in this
paradigm. This paper focuses on the security and privacy
issues involved in the smart cities. The paper highlights
the key applications of smart cities and then investigates
its architecture from security point of view. The paper
also reviews the current security and privacy solutions for
smart cities and emphasizes the open issues and research
challenges that still need to be addressed in this new
paradigm.
Keywords
Security Privacy Smart city Internet of things
1 Introduction
The progress of Information Technology (IT) is impacting
human life in multifaceted ways. Information and Commu-
nication Technology (ICT) resources are heavily deployed
and enhancing the provision of services in our daily lives.
The excessive use of ICT resources can be measured from
the fact that door locks, window curtains, curtains, TVs,
cars, toasters, air conditioners, coffee machines etc. can be
controlled through smart phones. In the current era, the
concepts like smart commerce, smart environment, smart
communication, and smart mobility have emerged to take
the impact of ICT to the next level in the form of smart
cities [1].
Smart cities involve a large number of sensors collecting
and sending data to base station, and other Internet enabled
devices which communicate with each other in order to
process data. Each of these millions of devices continuously
generates important data which are transmitted through
heterogeneous networks to appropriate data centers for
processing. After processing, certain decisions are taken
based upon the analytics [2].
Data is the most important asset for any individual in the
smart world. This data may include location coordinates,
travelling history, credit card numbers, and medical records
to name a few. These data are handled by pieces of hardware
and software which might have some vulnerabilities, which
can be exploited to get unauthorized access to the data [3].
False data can be injected in good one in order to mislead the
decisions taken by concerned parties. Forged healthcare data
may lead to the wrong prescription of medicine, which
eventually may result in severe health consequences for the
patient. GPS enabled smart phones may pose a severe threat
to ownersprivacy. Usually we set the GPS coordinates of
our home and ofce as the originating point. Also, latest
smart phones store the route taken by the smart phone carrier
which can be used to track their whereabouts. Access to
these GPS data can disclose the absence from a certain point
which may eventually attract the burglars and intruders [4].
This paper takes an Architectural point of view to
determine the Security and privacy issues in the smart cities.
Furthermore, this paper identies the current security solu-
tions and research challenges in enabling security and pri-
vacy in a smart city. Sections 2and 3cover the details of
smart citys architecture and applications, and the security
and privacy vulnerabilities are highlighted in Sect. 4.
Finally, Sect. 5covers the current security solutions and
research challenges and then paper is concluded.
T. A. Butt (&)M. Afzaal
American University in the Emirates, Dubai, UAE
e-mail: talal.ashraf@aue.ae
M. Afzaal
e-mail: muhammad.afzaal@aue.ae
©Springer Nature Switzerland AG 2019
A. Al-Masri and K. Curran (eds.), Smart Technologies and Innovation for a Sustainable Future,
Advances in Science, Technology & Innovation, https://doi.org/10.1007/978-3-030-01659-3_37
317
2 Smart City Architecture
Smart city intelligent applications rely on data harvested by
ubiquitous sensors. These data is transmitted to the cloud by
the integration layer that manages the heterogeneity of sen-
sor devices and networks. The architecture of a smart city is
thus composed of Perception, Integration, Cloud, Applica-
tion and business layers as shown in Fig. 1. Furthermore, the
security and management is required at all layers.
2.1 Perception Layer
This layer perceives the environment and in response gen-
erates the data. The devices involve at this layer ranges from
the RFID tag to smart phones [5]. The main goal of this layer
is to sense the environment and identify objects/things to
collect data.
2.2 Integration Layer
Integration layer is fed with the data collected by the per-
ception layer. The purpose of this layer is to integrate the
heterogeneous networks to the cloud layer. Therefore, its
role is akin to the network layer in TCP/IP protocol suite.
There is a vast diversity of the communication protocols
employed by the sensor devices depending on the capabili-
ties of the devices. The communication protocols include
RFID, Zigbee, 6LowPAN, Bluetooth, WiFi, 4G etc. [6].
Therefore, there are a range of systems that required to be
integrated into the overall smart city architecture. This layer
fullls these integration requirements by passing the
received data to Cloud layer.
2.3 Cloud Layer
Cloud layer is the major layer that includes many compo-
nents such as storage, computation and analytics [7]. This
layer receives data from the Integration layer to process and
store it for the consumption of Smart cities applications. At
this layer, all the things in a smart city are represented by
virtual things. These virtual things will make the availability
possible for those real physical things that need to sleep most
of the time to save their energy consumption. The huge sets
of data received at this layer is stored and managed by Big
Data technologies [8].
2.4 Application Layer
As name suggests, different smart citys applications operate
at this layer. Some applications also perform analytics to the
collected data to aid different smart cities applications.
Furthermore, the smart autonomous applications based on
Articial Intelligence execute at this layer [9].
2.5 Business Layer
Business layer helps to create different business model based
on services provided by the smart city system. Different
services are created using the processed data and those ser-
vices are further composed into new services to offer new
value-added services to the users of a smart city.
3 Smart City Applications
Smart city paradigm opens new avenue for novel applica-
tions by connecting the physical world with the ICT sys-
tems. The data harvested from these physical spaces are
processed and made available in the form of different ser-
vices that allow applications to use the sensed data or control
the physical world, as shown in Fig. 2. This section covers
the detail of few key categories of applications in a smart
city.
3.1 Smart Transportation
The smart transportation concept is the materialization of
Intelligent Transport System (ITS). This application uses the
smart citys processed data to manage the mobility demands
of a city such as congestion management, real-time predic-
tions of local transport arrivals, parking space management,
and real-time freeway management etc. [10].
Fig. 1 Smart citys architecture
318 T. A. Butt and M. Afzaal
3.2 Smart Energy
Reducing the energy consumption and to prevent the failure of a
power grid for a city or an individual consumer are a few of the
many challenges for a city management authority [11]. Smart
energy applications utilize the widely deployed sensor data to
monitor and manage energy from its generation to its con-
sumption. The applications allow authorities to make all indi-
viduals accountable to their energy usage and carbon footprint.
3.3 Smart Healthcare
Smart healthcare applications aim to improve quality of
current healthcare systems by continuously monitoring
patientsreal-time data to diagnose infectious diseases at
early stages [12]. Furthermore, it provides the functionality
of medical surveillance for people suffering with chronic
diseases and remote consultation. The applications consume
the cloud services that provides the processed health data,
such as ECG and EIT signals that gathered from wearable
and other sensor devices. The big data element enables smart
healthcare applications to track down the trends to avoid
spread of infections and plagues.
3.4 Smart Education
Smart Education applications exploit the data gathered from
different sources in the eld to enable active learning in a
smart city [13]. The data are collected from infrastructure,
people and information that is processed by big data tech-
nologies. The process of education is improved by the pro-
vision of smart services. Furthermore, this knowledge based
society is being further extended to remote areas to improve
the life of the people.
3.5 Smart Environment
This category of applications deals in making different
environments, smart by controlling vastly deployed sensor
devices [14]. These applications intelligently manage cli-
mate with the aid of ubiquitous sensing and actuation. Few
examples of these applications include building manage-
ment, city noise management, CO
2
heavy area detection and
management, green reserve management, and resource waste
control systems.
3.6 Smart Security
These applications rely on the sensors based context-aware
security systems to provide risk prevention applications [15].
These applications provide the ever needed a security solu-
tion to ensure public safety against extreme natural disasters
and terrorists.
3.7 Smart Industry
Smart Industry based applications are committed to support
Industry 4.0 era [16]. These applications provide a basis for
autonomous intelligent machines that will use the data
generated by heterogeneous sensor devices. This reduces the
downtime of machines and real-time data ow to assist
supply chain management. Overall, these applications will
benet the industry by improving the working conditions
while saving on the cost involved in labor and energy.
4 Security and Privacy Issues
Smart cities cant be considered smart unless these can
provide the required level of security. The general security
and privacy requirements include ensuring availability,
integrity, privacy, access control, condentiality, and non-
repudiation. The smart city harnesses sensed data from
physical spaces that contains granular details about the
people living in those environments. The journey of this data
starts at a sensor node and ends at the user application.
Therefore, the smart city poses unique security requirements
because its a system of interlinked systems that share data
with each other. This the key argument that discourages the
wide-spread usage of smart city services.
The architecture of a smart city can be described as a
complex integration of different systems to provide various
city-wide services, as shown in Fig. 1. However, any device
running a software is posed to different vulnerabilities. This
list of vulnerabilities increased rapidly when the device joins
a network, because now it can be remotely hacked as well.
Fig. 2 Smart city application categories
Security and Privacy in Smart Cities: Issues and Current 319
The smart city consists of millions of devices, therefore,
even one single compromised device will make the whole
collection vulnerable. The hackers can perform range of
cyber-attacks by exploiting the vulnerabilities.
4.1 Types of Security and Privacy
The security requirements of a smart city can be divided into
two categories. The operational security requirement is to
ensure that the employed technology and infrastructure is
secure and is immune to any cyber-attack. The second is
related to the data that is generated and communicated
within the infrastructure using different technologies. How-
ever, the data security and protection is dependent on the
operational security, as anyone who will break into a system
will be capable to violate the data access policy.
Privacy. Privacy, the state of being isolated from undesired
attention and heed, is a basic human right as described in many
declarations and jurisdictions [17]. However, the concept of
privacy differs according to different cultures, contexts and the
type of information. Privacy has various dimensions:
Identity privacy deals with the protection of personal data
related to an individual
Bodily privacy focus on the protection of physical
aspects
Territorial privacy protects the personal property and
space of an individual
Mobility privacy aims to secure the location coordinates
and protection against tracking
Communications privacy deals with the protection of the
communication channels against eavesdropping. These
channels include, but not limited to hardware devices
which facilitate the data transfer, communication medi-
ums either wired or wireless
Transactions privacy focuses to protect the queries and
responses against monitoring.
Categories of Attacks. The cyber-attacks are generally
categorised into one of these three attacks:
1. Availability attacks: This classication is for attacks that
either deny some services or completely bring the system
down.
2. Condentiality attacks: These attacks are related to the
unauthorised monitoring and information access.
3. Integrity attacks: These attacks seek to break into system
to amalgamate or alter the stored information. Further-
more, these attacks alter the congurations such as
stopping critical services, infecting system with viruses
or making the system inefcient.
4.2 Security Vulnerabilities and Issues
in Smart Cities
A systems security vulnerability explains the security hole
that can be caused by number of issues such as weak
encryption, human error etc. In a smart city this issue is
further aggravated by physically dispersed sensors in public
spaces and the systems multifold complexity and interde-
pendencies between its components that makes it vulnerable
to various cyber-attacks.
Constrained Devices at Perception Layer. Internet of
Things connects all RFID and sensor devices to the Internet.
RFID based objects are passive as they require a reader and a
gateway to connect to the Internet e.g. smart cards used for
transport systems. On the other hand, sensor devices include
sensors, actuators and microcontrollers. Nowadays, there are
variety of sensors available to sense diverse phenomenon
such as temperature humidity, location, velocity, proximity,
etc. Moreover, the traditionally dumb devices e.g. electronic
devices, doors and even lights are notifying and being
remotely controlled by users. Most of these sensor devices
are constrained in resources and have no effective security or
privacy mechanism [18]. This makes these devices prone to
be hacked and opens portal for all sort of security risks.
Weak Encryption. One of the traditional way to secure a
networked software device is to utilize encryption. It is
believed that the encrypted channel ensures the system
protection against attackers. The current smart city initiatives
are deploying systems without testing them for
cyber-security threats. However, it is an important aspect in
a smart cities where majority of the IoT devices have con-
straints and cant support viable encrypted links. Even the
encrypted links are prone to other security issues because
attackers can still break into encrypted systems using
side-channel and cold boot attacks. These issues are the main
hurdle in the way of wide acceptance of smart city systems.
Communication Technologies at Integration Layer.
There are various communication technologies that are used
by different IoT devices depending on their capabilities.
These technologies include RFID, NFC, Bluetooth, BLE,
ZigBee, 6LoWPAN based on IEEE 802.15.4, WiFi,
LPWAN (Low Power Wide-area-network), 3G and 4G
mobile technologies. All these technologies have security
vulnerabilities that make these susceptible to be hijacked
[19]. Even the most sophisticated technologies such as 4G
mobile technologies have vulnerabilities in its infrastructure.
Cloud Layer. The cloud layer provides the required
exibility to support scalability in smart cities. However,
cloud systems also have security issues such as Outsourcing,
Multi-tenancy and massive data that requires intense com-
putation. Outsourcing requires to provide remote access that
results in less control on data and eventually causes
320 T. A. Butt and M. Afzaal
insecurity and privacy violations. This can be dealt with by
making sure that cloud provider is trustworthy and the out-
sourced data is veriable from security and privacy per-
spectives. Multi-tenancy enables multiple users to utilize the
cloud platform. The cloud can use different resource allo-
cation policies to store data of different users on a single
physical machine. Therefore, multi-tenancy poses several
security vulnerabilities [20]. Another aspect related to cloud
computing is that traditional security techniques requires
heavy communication or computation overhead to deal with
clouds massive amount of data. This overhead becomes
infeasible e.g. in case of hashing the entire data set that is
remotely stored.
Systems Complexity and Cascade Effect. Smart city
systems are large-scale and complex systems containing
heterogeneous devices and networks. The smart citys
architecture (Fig. 1) has multiple layers where each layer is
composed of plethora of devices and technologies. The web
of interdependencies between its components and with other
systems pose a big challenge to measure and mitigate risk in
presence of many stakeholders. The multiple links between
system components expose them to security risks even each
system is independently secured. Moreover, these interde-
pendencies become an issue while maintaining or upgrading
an interface of a system component. The highly intercon-
nected components are also prone to create cascade effects,
where an attack on one system e.g. Smart Transport can
severely affects other systems as well. This security risk
greatly challenges the realization of a smart city where one
successful attack can bring down all systems of a city
management.
Software Bugs. A software based device can become
vulnerable to cyber-attacks because of software bugs, which
leave holes for attackers to sneak into a system. This factor is
further intensies in complex systems that contain millions of
lines of codes where these bugs can open a backdoor for
attackers. Once an attacker enters a smart city system then he
can get the control of the system and exploit the available data.
User Equipment. Different users of a Smart city are able
to consume value-added services and participate in crowd-
sensing [4] by using their mobile devices that are prone to
many vulnerabilities. Firstly, each mobile phone can be
uniquely identied by its IMEI (International Mobile Station
Equipment Identity). This IMEI can be related to an owner
to get his personal information and can be used to track a
mobile device. Furthermore, many users have reckless
behaviour towards giving access permissions to malicious
applications. Once such application will get a permission it
can access users information and control the device.
Human Factor. The smart city systems are hardly
allowed to operate fully autonomously, because these sys-
tems can cause Kafkaesque situations. Therefore, the human
are almost always are in the loop of decision making with
some of interaction with the smart city systems [21]. The
human error either by mistake or deliberate can result in data
leakage or system malfunction. There are many ways in
which a smart city user with authority e.g. the municipalitys
employee can sabotage the system.
Legacy Systems. Legacy systems are everywhere and
most of the authorities require to integrate the existing
infrastructure to a smart city. Most of the legacy systems are
insecure and mostly created decades ago without taking into
account the todays security challenges. These systems are
not regularly upgraded and have inherent vulnerabilities,
thus provide a freeway to attackers. Even new systems in a
smart city require to be regularly patched ideally without any
downtime.
5 Security and Privacy Solutions
RFID tags are extensively used in smart city applications.
This RFID proliferation has given rise to many security
concerns like eavesdropping and threats to privacy of tag
owner. Many solutions have been proposed to deal with
these issues. An RFID tag identication algorithm [22]
ensures secure identication of multiple RFID tags simul-
taneously and RFID reader authentication with low com-
putational power. SASI [23], another RFID authentication
protocol, is a more robust and ultra-lightweight scheme
which provides strong authentication and integrity for the
communication between RFID tags and its reader. Both
these schemes need less computational power for encryption
purposes which is why they are preferred.
In order to keep smart city sensor devices secure from
intruders, they should be placed in a location where access is
restricted and they are out of reach of unauthorized per-
sonnel. Whenever a smart city sensor is deployed in the
network, it should be authenticated to check if it is autho-
rized to collect and send data in that network. An authenti-
cation scheme [24] facilitates key establishment and ensures
that only authorized devices with proper credentials can
participate in communication with an access point. A com-
pressed version of IPSec [25] can be used for end-to-end
encrypted communication between a smart city sensor
device and an IPv6 enable device to ensure privacy.
Integration layer gets data from sensors and delivers to
the cloud layer. For this purpose, it uses different commu-
nication protocols like Zigbee, 6LoWPAN, Bluetooth, WiFi
etc. Anyone in the coverage area of these communication
technologies can grab the packets resulting in compromise of
data privacy. This issue can be overcome by encrypting the
packets using strong encryption techniques. The constraints
of lower computation power and limited memory inside
smart city sensors lead us to use lightweight cryptographic
algorithms [25].
Security and Privacy in Smart Cities: Issues and Current 321
The exposure of data processed and stored on cloud
servers is another issue. Homomorphic encryption algo-
rithms provide the ease of processing encrypted data coming
from different sources [26,27]. This way the privacy of data
is ensured without halting the processing pipeline while
getting the same results.
The smart city devices use different software to perform
their actions. The bugs in the software provide the backdoor
to potential adversaries to exploit the functionality and
integrity of smart city applications. These weaknesses in
software can be avoided by training the developers about
writing secure code and embedding security concepts in the
software at each stage in Software Development Life Cycle
[2830]. Moreover, the software should be passed through
different testing phases to discover any security holes and
potential vulnerabilities.
6 Future Research Challenges
Limited computational power in smart city sensor devices
makes them unsuitable for high level computations done
with cryptography. Moreover, constrained memory in them
also make them inappropriate for large key sizes for
encryption/decryption.
Due to its requirement for high computational power,
Public Key Infrastructure (PKI) cannot be used on devices
like smart city sensors. An edge-router based authentication
scheme uses PKI over IPv6 [31], but it increases the over-
head and limits the scalability. Therefore, more research is
required to nd some alternative of PKI, which requires low
computational power and hence consumed less energy.
Smart city sensors are integrated with the system to work
uniformly. This integration is made possible in terms of the
interdependencies among them. If one component is com-
promised, it may open doors for hackers to the other devices as
well. This may have a cascading effect upon the smart city
components and result in the failure of the whole system. This
opens new research directions to mitigate the interdependen-
cies and to bind the adversarial effects only to the compro-
mised system.
Users participating in crowdsensing may give access to
malicious parties to their personal data. This grant of access
might be unintentional because of lack of awareness and use
of apps which may affect the systems security. There is a
need to spread awareness about the secure use of mobile
devices and a strict control over the release of apps.
Legacy systems have been in use for a long time and it is
not easy to replace them at once. These systems were
designed without considering the security challenges we are
facing today. Many vulnerabilities have been already dis-
covered and their patches are also available. The problem is
that the system owners do not apply the patches regularly.
Also the patches are usually designed by inexperienced
programmer and they may introduce new vulnerabilities.
7 Conclusion
Smart cities are complex systems that are composed of
heterogeneous devices that communicate using a plethora of
protocols. These devices and protocols are vulnerable to
many security and privacy issues. This paper describes the
smart citys architecture and applications. Furthermore, it
reviews the security and privacy issues in a smart city from
the perspective of its architecture. It also discusses the
available solutions pertinent to these issues and highlights
the open research challenges in the realization of a secure
smart city.
References
1. Hernández-Muñoz, J.M., Vercher, J. B., Muñoz, L., Galache, J.A.,
Presser, M., Gómez, L.A.H., Pettersson, J.: Smart Cities at the
Forefront of the Future Internet, pp. 447462 (2011)
2. Albino, V., Berardi, U., Dangelico, R.M.: Smart Cities: denitions,
Dimensions, Performance, and Initiatives, vol. 22, pp. 321.
Taylor & Francis (2015)
3. Popescul, D., Radu, L.D.: Data Security in Smart Cities:
challenges and Solutions, vol. 20, p. 29. Inforce Association
(2016)
4. Yang, K., Zhang, K., Ren, J., Shen, X.: Security and Privacy in
Mobile Crowdsourcing Networks: challenges and Opportunities,
vol. 53, pp. 7581. IEEE (2015)
5. Zanella, A., Bui, N., Castellani, A., Vangelista, L., Zorzi, M.:
Internet of Things for Smart Cities, vol. 1, pp. 2232. IEEE (2014)
6. Yaqoob, I., Hashem, I.A.T., Mehmood, Y., Gani, A., Mokhtar, S.,
Guizani, S.: Enabling Communication Technologies for Smart
Cities, vol. 55, pp. 112120. IEEE (2017)
7. Petrolo, R., Loscri, V., Mitton, N.: Towards a Smart City Based on
Cloud of Things, a Survey on the Smart City Vision and
Paradigms, vol. 28. Wiley Online Library (2017)
8. Hashem, I.A.T., Chang, V., Anuar, N.B., Adewole, K., Yaqoob, I.,
Gani, A., Ahmed, E., Chiroma, H.: The Role of Big Data in Smart
City, vol. 36, pp. 748758. Elsevier (2016)
9. Al Nuaimi, E., Al Neyadi, H., Mohamed, N., Al-Jaroodi, J.:
Applications of Big Data to Smart Cities, vol. 6, p. 25. Springer
(2015)
10. Xiong, Z., Sheng, H., Rong, W., Cooper, D.E.: Intelligent
transportation systems for smart cities: a progress review. Sci.
China Inf. Sci., 17 (2012)
11. Karnouskos, S., Da Silva, P.G., Ilic, D.: Energy Services for the
Smart Grid City, pp. 16 (2012)
12. Solanas, A., Patsakis, C., Conti, M., Vlachos, I.S., Ramos, V.,
Falcone, F., Postolache, O., Pérez-Martínez, P.A., Di Pietro, R.,
Perrea, D.N., et al. Smart Health: a Context-Aware Health
Paradigm Within Smart Cities, vol. 52, pp. 7481. IEEE (2014)
13. Jeong, J.-S., Kim, M., Yoo, K.-H.: A Content Oriented Smart
Education System Based on Cloud Computing. Citeseer (2013)
14. Filipponi, L., Vitaletti, A., Landi, G., Memeo, V., Laura, G., Pucci,
P.: Smart City: an Event Driven Architecture for Monitoring
Public Spaces with Heterogeneous Sensors, pp. 281286 (2010)
322 T. A. Butt and M. Afzaal
15. Al-Muhtadi, J., Ranganathan, A., Campbell, R., Mickunas, M.D.:
Cerberus: a Context-Aware Security Scheme for Smart Spaces,
pp. 489496 (2003)
16. Lee, J., Kao, H.-A., Yang, S.: Service Innovation and Smart
Analytics for Industry 4.0 and Big Data Environment, vol. 16,
pp. 38. Elsevier (2014)
17. Martínez-Ballesté, A., Pérez-Martínez, P.A., Solanas, A.: The
Pursuit of CitizensPrivacy: a Privacy-Aware Smart City is
Possible, vol. 51, pp. 136141. IEEE (2013)
18. Granjal, J., Monteiro, E., Silva, J.S.: Security for the internet of
things: a survey of existing protocols and open research issues, vol.
17, pp. 12941312. IEEE (2015)
19. Jing, Q., Vasilakos, A.V., Wan, J., Lu, J., Qiu, D.: Security of the
Internet of Things: perspectives and Challenges, vol. 20, pp. 2481
2501. Springer (2014)
20. Xiao, Z., Xiao, Y.: Security and Privacy in Cloud Computing, vol.
15, pp. 843859. IEEE (2013)
21. Nam, T., Pardo, T.A.: Conceptualizing Smart City with Dimen-
sions of Technology, People, and Institutions, pp. 282291 (2011)
22. Karthikeyan, S., Nesterenko, M.: RFID Security Without Exten-
sive Cryptography, pp. 6367 (2005)
23. Chien, H.-Y.: SASI: a New Ultralightweight RFID Authentication
Protocol Providing Strong Authentication and Strong Integrity,
vol. 4, pp. 337340. IEEE (2007)
24. Qiu, Y., Ma, M.: An authentication and key establishment scheme
to enhance security for M2M in 6LoWPANs. In: 2015 IEEE
International Conference on Communication Workshop (ICCW)
(2015)
25. Engels, D.W., Saarinen, M.-J.O., Schweitzer, P., Smith, E.M.: The
Hummingbird-2 Lightweight Authenticated Encryption Algorithm,
vol. 11, pp. 1931. Springer (2011)
26. Tebaa, M., El Hajji, S., El Ghazi, A.: Homomorphic Encryption
Appl. Cloud Comput. Secur. 1,46 (2012)
27. López-Alt, A., Tromer, E., Vaikuntanathan, V.: On-the-y Mul-
tiparty Computation on the Cloud via Multikey Fully Homomor-
phic Encryption, pp. 12191234 (2012)
28. Brown, M., Paller, A.: Secure software development: why the
development world awoke to the challenge. Inf. Secur. Techn.
Rep. 13(1), 4043 (2008)
29. Kang, J., Park, J.H.: A secure-coding and vulnerability check
system based on smart-fuzzing and exploit. Neurocomputing
(2017)
30. Khan, R.: Secure software development: a prescriptive framework.
Comput. Fraud Secur. 2011(8), 1220 (2011)
31. Goswami, S., Misra, S., Taneja, C., Mukherjee, A.: Securing
intra-communication in 6LoWPAN: a PKI integrated scheme. In:
2014 IEEE International Conference on Advanced Networks and
Telecommuncations Systems (ANTS) (2014)
Security and Privacy in Smart Cities: Issues and Current 323
Smart City Framework Development:
Challenges and Solutions
Ahmed N. AL-Masri, Anthony Ijeh, and Manal Nasir
Abstract
This paper addresses the concept of the smart city and its
signicance to citizens. In this regard, recent literature
about smart cities and in response to the increasing use of
the concept is discussed. The study aims to introduce a
developed framework to be used in modern smart cities
with citizen engagement. Eight factors contribute to the
smart city to be smarter: management and organization,
technology, governance, policy context, citizen and
communities, economy, built infrastructure, and natural
environment. These factors are the base of an integrative
framework that can be used to inspect how local
governments are picturing smart city plans. The main
framework suggests proposed agendas for smart city
which lead to practical implications for government
expertise. In this research, a smart city is dened in
different areas of the world based on several literatures.
Finally, the study is focused on Dubai vision for smart
city, which is based on the high business and innovation
center.
Keywords
Smart city Smart city framework Citizen engagement
1 Introduction
Building new cities is facing many challenges and difcul-
ties especially regarding, Energy resources, Environment,
Water, Society, Transportation, Infrastructure, Healthcare,
Education, Governance, and Economy. The 21st century has
been strangled by international terrorism, economic world
crisis, regional wars, and civil unrests. On the other hand, the
development of technological environments and utilities
push the social to be more in sustainable world.
The smart cities are dened as a uniting Eco World,
Digital World and Social World into the Trinity World,
unifying the ecological principles of the eco world devel-
opment, the technological principles of the information
world development, and the social principles of the human
world development. Hence, it time to change into Smart Eco
Planet of eco-intelligent social communities of various
geographical sizes and scales: countries, regions, cities,
towns, villages, districts, and neighborhoods. Combining
spontaneous order principles and smart communities plan-
ning, the Smart city is self-organizing as global knowledge
ecosystems, involving natural ecosystems, social cohesion,
smart economy, intelligent people, efcient global gover-
nance, complete mobility, sustainable living and creative
working.
Accordingly, the new world of new cities calls for con-
verging models, initiatives, principles, strategies, standards,
solutions, and technologies. Moreover, it requires merging
all its key domains, physical, natural, digital and knowledge
worlds, assets, and resources to develop a smarter world with
intelligent eco-communities and integrated infrastructures,
such as the future internet/web of things or distributed RES
Networks, the replacement of the unsustainable fossil fuel
infrastructures.
This study reviews the best cases studies in the world up
to this date. Most of the experiences that gained in building
new smart cities are proving that a true sustainable com-
munity is a physically efcient, digitally smart, socially
intelligent, and ecologically sustainable community, driven
by physical capital and natural capital, social capital and
digital capital. The smart cities concept includes all the
principal utilities for human being in intelligent and
self-automation for present and future such as universities,
social service, e-government system, intelligent universities
A. N. AL-Masri (&)A. Ijeh M. Nasir
American University in the Emirates, Dubai, UAE
e-mail: Ahmed.almasri@aue.ae
A. Ijeh
e-mail: Anthony.ijeh@gmail.com
M. Nasir
e-mail: manalnasir11@gmail.com
©Springer Nature Switzerland AG 2019
A. Al-Masri and K. Curran (eds.), Smart Technologies and Innovation for a Sustainable Future,
Advances in Science, Technology & Innovation, https://doi.org/10.1007/978-3-030-01659-3_38
325
with online system, hospitals, natural resources and knowl-
edge assets, human resources and intellectual capital [1].
2 Significance of the Study
The signicant part of the worlds capital is summaries by
new cities and intelligent buildings, commercial property
and residential property and infrastructure investment. The
real concern of building smart cities has raise after the
increscent of world population and global worming (Green
house) which shown side effects to the human and opposite
positional of building new intelligent world with all the
available technologies.
Besides that, the limitation of the energy resources is
pushing all the researchers and engineers to nd new natural
recourses and reduce the CO
2
increment. On the other side,
cities are the base of economic growth and technological
progress which the way for the legacy cities to expose the
new world in becoming greener, more intelligent, more
efcient, more attractive, more social and more digital which
can even enhance the country economics.
3 Smart City Concept
Although there is an increase in frequency of use of the
phrase smart city, there is still not a clear and consistent
understanding of the concept among practitioners and aca-
demia. Only a limited number of studies investigated and
began to systematically consider questions related to this
new urban phenomenon of smart cities [2]. However, they
have reviewed the denitions of the smart cities in many
journals based on how large is the city.
Reference [3], they denoted a smart city as a complete
intelligent city connected together in term of new technology
and utilities. In 2012, Chourabi et al. [4]dened the smart
city is promising a plan to alleviate that has been raised by
the urban population growth and rapid urbanization. The
study of last authors was based on their investigation of
many and extensive literature from various penalizing areas.
In addition, they have founded eight critical factors which to
be considered for smart city:
1. Management and organization.
2. Technology and innovation.
3. Governance.
4. Policy context.
5. People and communities.
6. Economy.
7. Built infrastructure.
8. Natural environment.
These factors are the basic framework that should be
considered by any local or international investment company
or local government to build smart city initiatives. The
framework follows the promoted agendas base on the
development in few next years include research and outlines
of practical implications for all factors. In the following
section, a literature review of some important factors will be
discussed in detail.
Management rule for smart city
Smart city management system means building and carrying
out ways for a city to realize its full potential for while
maintaining efcient day-to-day operations. The smart cities
are expected to be large and complicated at the same time
due to high integration system between each part of the city.
A control system and monitoring is required to dynamically
take advantage of its tools and facilities. However, only little
research talked about the innovation in management and
policy while the literature of technology innovation is rich
[5]. All the problems are handled by the human resources of
that city and in several cases, it is suggested to build
sub-management centers to solve the small issues that could
rise in some part of the city.
The uses of the sub centers have two important advan-
tages: First, it will reduce the load on the top management
center, thus enhance the efciency by handling more tasks.
Second, it would secure the city when the system under
contingency, for example: a problem in transportation
occurred due cars conjunction can be solved in one
sub-management center without affecting another center.
City leaders must think holistically about operations
insight, law enforcement and emergency management,
government and agency administration, and urban planning
including smarter buildings [6].
Technology and innovation
This part includes many areas such as building and
contraction, education, energy resources, water and west
water treatment and environmental. The focus in this
research is on the energy section and renewable energy
production. The energy usage is conscientious of about 75%
of global warming gases emissions and utilities [7]. There-
fore, the smart city is built to reduce the pollution and
greenhouse effect by decrease total energy consumption, use
renewable resources and maintaining share the energy
between production and consumption. In this matter, the
smart city must implement the smart grid concept and
technologies into its energy infrastructure [811]. The
renewable energy is considering all natural resource such as
solar and wind [12].
326 A. N. AL-Masri et al.
Governance
The most important advantage of developing new cities is
government services and easy access such as the
e-government development and fast response in providing
all service to the citizen. The governance factor is one of the
most important factors that could increase the number of
urban population [13]. The government is controlling all the
rules and regulations of any future plan for every city under
its control.
Built infrastructure
The comfortable built infrastructure increases the building
facility availability which can improve the productivity for
all parties. The smart cities organize a better skilled people
and it will increase the experience of the city citizens. In
terms of data exchange, the data communication will be
transferred faster due to the systems integration and common
communication protocols used along the city/community
and premises programmable controllers. The proper con-
trolling and monitoring environment would provide an
automation level which would require less tenants interac-
tion with maintenance and operation call center which means
less complaints [14].
4 Case Studies of the Advanced Smart Cities
4.1 Singapore Experience
The Singaporean started developing the country to be a
smart city and the point that become as a smart city is on
1999. The challenge of converting the ignorant or skeptical
onlookers to the new technologies is already a major chal-
lenge. But an even greater challenge is to put IT in the
service of humankind instead of using it for the subversion
or the destruction of the values and ways of life people hold
dear. As with the nuclear energy, IT can be a force for good
or evil. The smart community should be smart enough to
make the right choice [15]. Form the Singaporean experi-
ence the IT and new technology is the most wonderful path
that can change the entire country into smart city.
4.2 Amsterdam Smart City
Amsterdam Smart City is a sole corporation between the
people of Amsterdam, businesses; knowledge institutions
and a local authority that was implemented with aspire of
achieving saving more energy now and in the future. Ams-
terdam Smart City could be viewed as an acceleratorof
climate/energy programmers. By bringing parties together
and by initiating projects in which smart technologies and
different approaches are tested, it is possible to develop best
practices for future large-scale implementation of similar
initiatives [16]. From the point of the people of Amsterdam
in building a smart city is the energy and reducing the pol-
lution and global warming affects [17]. The following are the
pillars on which Amsterdam Smart City operates:
1. Cooperation at every possible level is essential to achieve
viable results. It could be a public private partnership, but
it must incorporate the close involvement of the
(end) user.
2. Driven by smart technology and the need to bring about
behavioral change.
3. Knowledge exchange: All the acquired knowledge and
experience will be shared via ASC
4. Only economically viable initiatives will ultimately be
rolled out on a large scale.
4.3 Berlin Smart City/Germany
The challenge of combining competitiveness and sustain-
ability cities are urban, developed, social, environment and
fashion strategies. Communication and Information tech-
nology is one of the key factors in this building the smart
city. Like such utilities can be implemented by individuals
(People), businesses (International or local commerce) or
public institutions (E-government) [5].
Berlin is the capital city of Germany (since 1871 and was
17011945 the capital city of Prussia. During 19481990
East Berlin was capital of GDR while Bonn was capital in
West Germany) and one of the 16 states of Germany,
location shown in Fig. 1. With a population of 3.5 million
people, Berlin is Germanys largest city and is the second
most populous city proper and the eighth most populous
urban area in the European Union [18].
Berlin is selected as one of the top 10 smart cities on the
planet [19] and also considered as a developing city all
across the union, green-ness (8th in Europe) and high quality
of life. In collaboration with Vattenfall, BMW, and others,
Berlin is testing out vehicle-to-grid (V2G) technologies in
the hopes of creating a virtual power plant from electric
vehicles.
Many research and studies have been demonstrated in
Berlin as part of the smart city development and real-time
application. The internet interconnection performance
should be stabilize and performed very well for example the
radio stations and increase the channels [20]. In additions,
they include many fashion residential areas, community
services, more than three universities, hospitals, malls and
tourism places.
Smart City Framework Development: Challenges and Solutions 327
The aim of building the smart city in Berlin is to reduce
Green House Gasses (GHG) emission intensity related to
energy use by 60%, also to reduce peak temperature by 2 °C
and to reduce the nal disposal of solid waste and GHG
emission per waste generation by 50%. To implement the
high performance in new technology application especially
the energy and the implementation of the smart grid
including the solar and wind power production.
The features of the Berlin master plan are following the
European slandered for the smart city [21], which summa-
rized as follows:
The utilization of city infrastructure is enhanced in order
to improve the economic and also the political efciency.
An underlying prominence on business and investment
development.
A strong recommendation for building the social inclu-
sion of various city residents in smart city for social
benets.
Cooperate on developing the most advance of high tech
and innovated industries in long term for city expansion.
Give an attention to the social responsibility and rela-
tional capital in the smart city growth.
Environmental and sustainability is one of the major
intentional components of smart cities.
The vision on developing the city is on the innovation
and technology development by 1999 [22]. The government
has focus on how to build global city that concern strategic
economic as one of the major impact in developing Berlin
and make it internationally extending control such as Paris
and London. Berlin smart City is targeting four matters
which are summarized as follows:
1. The concept of a green city
Green means living in a low pollution environment, which
consumes less energy and low CO
2
emissions. The customer
can easily monitor their energy consumption in a smart city
by using the smart grid utilities. Smart cities include inno-
vative technologies for communication which may guide the
citizen living that area to reduce the energy bills and save
more money. For example: the people can save additional
energy by using the solar and wind power production and
hybrid vehicles or by using smart electricity household
devices.
2. A city for the next generations
Building a digital city contribute on the future. Berlin city
would become a smart city by taking a smart approach in
order use it in the communication services, mobility and
ecology and governance.
3. A city full of potential
The city grows in different ways. One of the important
strategies is expanding demographically. All people would
stay or live in the area involve in the development and be
compatible to work with each other, therefore, everyone will
contribute in keep all facilities up to date and not stop in one
point.
4. High tech city
The basic of building any smart city should toward a
high-tech innovation including the high technology, advance
industry or factory, high education level and high perfor-
mance computerize system.
The promotion of low-carbon policies has to be a main
theme especially in related sectors; Residential, Transporta-
tion, Commercial, Public Amenities and Utilize, Govern-
ment Institutions and Power Generation land use. The
implementation of Integrated City Planning and Manage-
ment through development plans and the implementation of
Low-carbon Society scenario, it is expected to reduce CO
2
emission. To identify necessary actions, integrated modeling
based on the European Union standard is applied as shown
in Fig. 2. The models estimate balanced and quantitative
future activity levels. A Smart City of Berlin is well per-
forming in 6 models, built on arrangement of donations of
self-decisive, independent and aware people living in that
area.
4.4 Dubai Towered Smart City
Dubai moving towered transferring itself to become a smart
city by 2021 led by Smart Dubai with the vision to be the
happiest city on earth[23]. The project of smart Dubai
started with government services and moved to the private
partners with measuring the happiness across the city by
using customer feedback on the provided services.
The second focus of smart Dubai is technology and
innovation which will serve all the residents and visitors.
The main objectives to enrich Dubai city with technology
and innovation are focusing on four factors: Seamless,
Efcient, Safe and Personalized. The ofce of smart Dubai
city collecting all data by the impact management ofce to
oversee and monitor the operational strategy in this large
scale. Smart Dubai ofce aligned its mission to achieve these
objectives by the following:
328 A. N. AL-Masri et al.
Smart Living
Smart Economy
Smart people
Smart mobility
Smart Environment
Smart Governance
The nal project will be fully estimated by 2021 which
will come after year of EXPO 2020 to achieve its mission to
be the happiest city on earth.
4.5 Other Experiences of the New Lunched
Smart Cities
Worldwide, existing cities are ether build or re-build their
major infrastructure and utilities which is in a staggered
fashion. On the other hands, there are other cities that have
the luxury of incorporating the Smart City vision in its
Fig. 1 Berlin smart city location
Fig. 2 Methodology for Berlin smart city
Smart City Framework Development: Challenges and Solutions 329
entirety from scratch. These cities share many things, like
free economic zone, renewable energy, smart buildings,
smart transportation, broadband connectivity, balance
between green and covered spaces, and strategic geographic
placement. There are some notable examples around the
globe, as shown in Fig. 3. These cities deploy various
information and communication technology components like
radio-frequency identication (RFID), embedded systems,
Wi-Fi, WiMax, LTE, ZigBee, machine-to-machine com-
munication, asset management, energy management, unied
communications, and collaboration [13].
5 Conclusion and Recommendations
The objective of this review is to cover the most recent
research and development on the smart city in term of de-
nition, component and rules. Critical factors have been dis-
cussed to make sure main conditions of smart city are
available. Furthermore, several experiences have been viewed
and most of the smart cities development are focus on these
based rules or conditions. Finally, Dubai vision on moving to
become a smart city discussed with its strategy. The last
Fig. 3 Some new lunched smart cities
330 A. N. AL-Masri et al.
signicant factors that should be considered to build a smart
city in any country recommended as shown in Fig. 4.
References
1. Abdoullaev, A.A.: Smart world: a development model for
intelligent cities. In: The 11th IEEE International Conference on
Computer and Information Technology (CIT-2011), pp. 128
(2011)
2. Schuurman, D., Baccarne, B., De Marez, L., Mechant, P.: Smart
ideas for smart cities: investigating crowdsourcing for generating
and selecting ideas for ICT innovation in a city context. J. Theor.
Appl. Electron. Commer. Res. 7,4962. https://doi.org/10.4067/
s0718-18762012000300006 (2012)
3. Hamilton, R., Paraszczak, J., Harrison, C., Williams, P.,
Kalagnanam, J., Hartswick, P., Eckman, B.: Foundations for
smarter cities. IBM J. Res. Dev. 54,116 (2010). https://doi.org/
10.1147/JRD.2010.2048257
4. Chourabi, H., Nam, T., Walker, S., Gil-Garcia, J.R., Mellouli, S.,
Nahon, K., Pardo, T.A., Scholl, H.J.: Understanding smart cities:
an integrative framework. In: 2012 45th Hawaii International
Conference on System Science IEEE, pp. 22892297 (2012)
5. Nam, T., Pardo, T.A.: Smart city as urban innovation. In:
Proceedings of the 5th International Conference on Theory and
Practice of Electronic GovernanceICEGOV 11, p. 185 (2011)
6. IBM Smarter Cities. http://www.ibm.com/smarterplanet/us/en/
smarter_cities/management/index.html. Accessed 1 Jan 2013
(2013)
7. Morvaj, B., Lugaric, L., Krajcar, S.: Demonstrating smart build-
ings and smart grid features in a smart energy city. In: Proceedings
of the 2011 3rd International Youth Conference on Energetics
(IYCE), pp. 18 (2011)
8. Xia, Y., Xu, Z., Zhang, P., Sun, H., Wang, J., Qiao, W., Li, F.,
Wan, H.: Smart transmission grid: vision and framework. IEEE
Trans. Smart Grid 1, 168177 (2010). https://doi.org/10.1109/
TSG.2010.2053726
9. Wei, C.W.C.: A conceptual framework for smart grid. Power
Energy Eng. Conf. (APPEEC), 2010 Asia-Pacic. https://doi.org/
10.1109/appeec.2010.5448786 (2010)
10. Khanna, A.: Smart grid, smart controllers and home energy
automationcreating the infrastructure for future. Smart Grid
Renew. Energy 3, 165174 (2012). https://doi.org/10.4236/sgre.
2012.33024
11. Novosel, D.: Experiences with deployment of smart grid projects.
In: Innovative Smart Grid Technologies (ISGT), 2012 IEEE PES,
pp. 13 (2012)
12. Wang, R., Jin, L., Xiao, R., Guo, S., Li, S.: 3D reconstruction and
interaction for smart city based on World Wind. In: 2012
International Conference on Audio, Language and Image Process-
ing (ICALIP), pp. 953956 (2012)
13. Washburn, D., Sindhu, U., Balaouras, S., Dines, R.A., Hayes, N.,
Nelson, L.E.: Helping CIOs Understand Smart CityInitiatives
(2009)
14. Al-hader, M., Rodzi, A.: The smart city infrastructure development
& monitoring. Theor. Empir. Res. Urban Manag. 2(11), 8794
(2009)
15. The Singapore case, Mahizhnan, A.: Smart cities. Cities 16,1318
(1999). https://doi.org/10.1016/S0264-2751(98)00050-X
16. Panagiotis Tsarchopoulos, Amsterdam Smart City Smart Stories
2011 (2011) URENIO Research Unit, http://www.urenio.org/
2011/04/20/amsterdam-smart-city-smart-stories-2011/
17. Baron, G., Brinkman, J., Wenzler, I.: Supporting sustainability
through smart infrastructures: the case for the city of Amsterdam.
Int. J. Crit. Infrastruct. 8, 169 (2012). https://doi.org/10.1504/
IJCIS.2012.049036
18. An initiative of the European Commission (2018) http://eu-
smartcities.eu/place/berlin
19. Cohen, B.: The Top 10 Smart Cities on the Planet (2012) https://
www.fastcompany.com/90186037/the-top-10-smart-cities-on-the-
planet
20. Juraschek, F., Zubow, A., Hahm, O., Scheidgen, M., Blywis, B.,
Sombrutzki, R., Gunes, M., Fischer, J.: Towards smart Berlinan
experimental facility for heterogeneous smart city infrastructures.
In: 2012 IEEE 37th Conference on Local Computer Networks
Workshops (LCN Workshops), pp. 886892 (2012)
21. Caragliu, A., Del Bo, C., Nijkamp, P.: Smart cities in Europe.
J. Urban Technol. 18,6582 (2011). https://doi.org/10.1080/
10630732.2011.601117
22. Krätke, S.: Berlin: towards a global city? Urban Stud. 38, 1777
1799 (2001). https://doi.org/10.1080/00420980120084859
23. Smart Dubai Ofce. https://2021.smartdubai.ae/
Planning and management
Public safety
Smarter buildings and urban plan-
ning Government and agency ad-
ministration
Infrastructure
Energy and water
Environmental
Transportation
Human
Social programs
Healthcare
Education
Fig. 4 Factors to be considered
in smart city
Smart City Framework Development: Challenges and Solutions 331
Smart City Transportation Services,
Customer Satisfaction and Impact
on the Quality of Life
Aleksandar Aleksic, Nikolina Ljepava, and Marija Ristic
Abstract
Growing demand for enhanced features of urban living
conditions inuenced an outburst of Smart Cities all over
the world. A Smart City adopts application of wide range
of information and communication technologies and
citizen-centric solutions with the goal of providing
sustainable economic development and an increased
quality of life. The increased quality of life is also found
to be closely related with an increased customer satisfac-
tion and overall well-being of the citizens residing in the
Smart City. Although Smart City features and services
may be analyzed from the perspectives of human,
technology, and institutional factors, an issue of improv-
ing the quality of life may be designated as one of the
most important topic in the area. The current study
provides a comparative analysis of the impact of various
Smart City services on the quality of life. The base for
proposed Smart City services has been derived from the
wide range of references ([8]; standard ISO 37120:2014;
[7]). The study ndings indicate that Smart Cities should
continuously assess the performance of services in order
to identify the ones that have the major impact on quality
of life. The future research could explore in more details
the relationships between Smart City services, quality of
life and overall citizen satisfaction.
Keywords
Smart city Customer satisfaction Key performance
indicators
1 Introduction
Customer satisfaction [1] and Quality of life (QOL) have
been signicant topic of interest during recent decades.
Different stakeholders, such as business consultants, schol-
ars, corporations and many others have been analyzing
organizations in order to please their customers, to perform
assessment, tracking and analysis of customer satisfaction so
they could stay competitive and provide better QOL.
As this topic has been found to be more signicant from
the perspective that satisfaction has impact on customers to
repeat purchase decisions, it became obvious that satisfac-
tion is making impact on company prots [2]. It may be
noticed that signicant part of research has been conducted
form the corporate side and for the corporate purpose, but in
the same time, it cannot be assumed that customer service
and satisfaction are limited to the private sector. Public
organizations also put their effort in order to provide certain
level of quality of their services so they can achieve satis-
faction with products and services they deliver.
Quality of life may be considered as a multidimensional
construct [3]. As that kind, it may include different aspects of
human experience, e.g. physical, economic, social, emo-
tional, etc. QOL may be considered to be subjective in one
part of its nature since it is relied on values and preferences
of analyzed population so there is no unique denition of it
[4]. The stated facts are the main reason why QOL is difcult
to measure. Its relationship with customer satisfaction is
always present since the change of one may impact other
construct. It is worth to mention that each one of them is
impacted by different subjective evaluations and opinions
related to the quality of goods and existing services. Cus-
tomer satisfaction is closely connected with transactions, and
over time, it form life experience. At some point it may be
concluded that it may be considered as component of QOL if
it is associated with any important transaction [5]. The
motivation of enterprises to manage customer satisfaction is
based on goals how to increase the number of customers,
A. Aleksic (&)M. Ristic
University of Kragujevac, Kragujevac, Serbia
e-mail: aaleksic@kg.ac.rs
N. Ljepava
American University in the Emirates, Dubai,
United Arab Emirates
e-mail: nikolina.ljepava@aue.ae
©Springer Nature Switzerland AG 2019
A. Al-Masri and K. Curran (eds.), Smart Technologies and Innovation for a Sustainable Future,
Advances in Science, Technology & Innovation, https://doi.org/10.1007/978-3-030-01659-3_39
333
how to achieve customer loyalty, revenue, etc. Although
increasing prot is one of main goal for every organization,
excellent organizations put a lot of attention on customer
care and his/her experience with the product or service
which is provided by company. Customer satisfaction lar-
gely depends on the quality and customer experience that is
provided with product or service [6].
As research in this eld has been trying to cover different
aspects, the unique denition of customer satisfaction has
been widely analyzed and debated. It is common belief that
customer satisfaction can be experienced in different way
and it is related to products and services. In the same time, it
may be assumed that is highly personal assessment that
include expectations and previous experience. Some schol-
ars support the fact that customer satisfaction is affecting
customersrepeat purchase decisions and subsequent com-
pany prots [2]. In simple language, customer satisfaction
may be understood as a customers evaluation of their pur-
chase and consumption experience with a product, service,
brand, or company [1]. As there is a signicant number of
fast growing cities around the globe which is supported with
tremendous expansion of technology with a purpose to
enhance conditions of citizensliving, there is one big open
issue to be analyzed: how to manage customer satisfaction in
smart cities?
Explanation of the label smart city can make under-
standing of the research more clear and concise. In marketing
perspective, smartness is centered on a user perspective and
due to broad base of community members; smart is utilized
compared to the more elitist termintelligent. It this way, it
is assumed that smart is more user-friendly than intelligent
[7]. As there is no common denition of smart city, this
research is focused to one of the smart city domains
transport, mobility, and logistics [8]. It may be assumed that
smart city monitors and integrates conditions of all of its
critical infrastructures [7]. This include roads, tunnels, sub-
ways, rails, airports, bridges, seaports, communications,
water, power, event major buildings. From one side, smart
city is optimizing its resources, but in the same time, it should
plan its preventive maintenance activities and monitor secu-
rity aspects while maximizing services to its citizens and
increasing their satisfaction.
The main objective of this paper is to propose the base for
questions that are going to be utilized to the survey for
assessment of the level of customer (citizens) satisfaction in
developing economy such as the UAE. In this case, cus-
tomers would be citizens of Dubai. Managing appropriate
indicators of customer satisfaction should have improvement
of QOL as a nal consequence.
This paper is organized in the following manner. The
second section of the paper represents literature review. The
third section is clarifying the framework for customer
satisfaction assessment and the third section is proposing
ASCI model as a solution for measuring customer satisfac-
tion with the services of smart city. In the same time, this
section proposes the base for selecting questions for the
process of customer satisfaction measurement. The section
ve sets the conclusion and future perspectives of research.
2 Literature Review
One of the recognized approaches claims that QOL, on the
conceptual level, has two dimensions: macro and micro [9].
Both dimensions are interconnected since at macro level,
QOL is related to physical and articial environment, and at
the micro level, QOL is based on the perceptions of indi-
vidual. As it is mentioned in introduction section, exactly
micro level is impacted by transactions and customer satis-
faction. As smart city is seen as a multidimensional concept
with complex social, political and cultural settings, it may
happen that different persons that live in same conditions
which may perceive quality of life in different manner.
Having in mind the mentioned issue, it is very important to
determine appropriate customer satisfaction model with
appropriate performances to be measured, analyzed and
managed if smart city is oriented to continual improvement
of QOL of its citizens.
Customer satisfaction refers to the customers overall
evaluation of the product or service after he/she purchases it
[10]. One of the most usual mistakes is that organization is
more oriented to itself than customers. During the last few
decades as customer satisfaction research has been expand-
ing, it has diverted in two directions as two different types of
evaluations: transaction-specic satisfaction and cumulative
satisfaction [1]. The rst one relates to customers evaluation
of his/her experience including reactions to a product or
service faced transactions. In this manner, the research was
focused on the effects of positive and negative emotions on
satisfaction [11]. During 1990s research in this eld started
to include cumulative satisfaction which may be seen as
customers overall experience with a product or service
provider. This approach is nowadays wider accepted since
recognized models support it, such as American Customer
Satisfaction Index (ACSI). In ACSI model, one of the main
entities is perceived value and perceived quality of product
or service. As customersperceived quality of the service is
the focus of this paper, an analysis of main perspectives of
smart city, which is service provider in this context, should
be analyzed.
Different issues have been raised within the smart cities
and literature may be generalized into hardand soft
domains of a smart city [8]. These domains may be further
analyzed through the socio-economic impact on the quality
334 A. Aleksic et al.
of life in smart cities. It may be assumed that smart city can
be analyzed from three perspective which generate perceived
value of services provided by smart city [7].
The rst perspective represents smart infrastructure as good
functioning infrastructure is necessary for smart city func-
tioning. The infrastructure should be strongly enhanced with
the use of technology, mainly information and communication
technology (ICT) [12]. Integration of smart computing tech-
nologies with critical components and infrastructure may
designated as one of important features of smart city [17].
Smart computing may be treated as a core of perceived value
for customers since it encompasses integration of hardware,
software, and network technologies that provide IT systems
with a goal to enable decisions are made in more easier and
smooth way [13]. As a nal consequence, a quality of life in
smart cities should be enhanced. As a perceived value for
customers, mobile, virtual, and ubiquitous technologies may
offer benets to citizens. Besides mentioned factors, pleasant
bird view during the transportation in Dubai metro may be
considered as perceived value to tourists and citizens on some
routes. Dubai may offer internet-based government services
that enable ubiquitous connectivity supported with a wide
range of public access points.
The second main perspective of smart city may be
articulated through the human factors which reect human
infrastructure, human capital and education [7]. In this way,
it may be considered that people that live in smart cities and
using its services are supposed to be identied as smart
people with personal afnities to lifelong learning, exibil-
ity, creativity, cosmopolitanism or open-mindedness [14]. It
is noticeable that human factors in Dubai, like in other smart
cities, include includes social inclusion of various urban
residents in public services such as knowledge networks and
enable diversity and cultural mix, social/human/relational
capital [12]. Determination of perceived quality of smart city
services is more complex since human infrastructure is
constituent of smart city and residents are very aware of
services that are offered by smart city.
The third import perspective of smart city essential for
understanding perceived quality represents institutional [14].
This factor is signicant since smart city initiatives should be
strongly supported by government. This perspective
encompasses different institutional factors and includes
supportive policies and the relationship between government
agencies and non-government parties [15]. Smart govern-
ment should do more than basic regulation of the outputs of
economic and societal systems. Smart government should is
supposed make interactive connections with citizens, com-
munities, and businesses in real time integrating service
delivery, and placing the most needed transactions on the
web providing citizen-centric environment. It may be con-
sidered that Dubai transitional components are made up of
visions, leadership, and organizational transition in structure.
Having in mind mentioned perspectives of smart city,
which is applicable to Dubai, it may be concluded that
perceived quality in the model of customer satisfaction
measurement should be aligned with those perspectives.
Besides the perceived quality, reputation may have even
stronger impact on overall customer satisfaction [16,17].
3 The Framework for Customer Satisfaction
Assessment
This paper assumes that the model for satisfaction, mea-
surement tracking and analysis of customer satisfaction
should be in compliance with existing framework proposed
by ISO 10001:2012 (Fig. 1). There are four main activities
within this framework: (1) Identifying customer expecta-
tions, (2) Gathering customer satisfaction data, (3) Analyz-
ing customer satisfaction data, and (4) Providing feedback
for improvement.
Fig. 1 Monitoring and
measuring customer satisfaction
(ISO 10001:2012)
Smart City Transportation Services, Customer Satisfaction 335
3.1 Identifying Customer Expectations
It is common thing to assume that organization, in this case
smart city, should identify its customers. This is applicable
to current and potential customers, and smart city to deter-
mine the expectations of its citizens and customers. After the
determination of the customer group, the organization
should identify individual customers whose expectations
should be analyzed. During the determination of the cus-
tomer expectations, the organization should take in account
the stated requirements, implied requirements, regulatory
requirements and other requirements. It is worth to mention
that customers will not always explicitly dene all aspect of
the service since some features can be presupposed or simply
they may not be known to customer. Firstly, the organization
should understand customer requirements in comprehensive
way. Very important inuence on the customer satisfaction
is articulated on how the mentioned expectations are met
from the side of service provider. In order to understand
requirements, the organization should gather information
related to service characteristics. Those characteristics
should be ranked according to their relative importance.
3.2 Gathering Customer Satisfaction Data
In the same time, organization should examine existing
sources of data that reects characteristics of service that
reects the customer satisfaction which represent the indirect
measure of customer satisfaction. Those sources of data may
be frequency or trend in customer complaints or reports from
surveys, regulatory agency reports or publications. The
analysis of such data may inuence on shaping the appro-
priate indicators of customer satisfaction. The signicant
part of data for measuring the customer satisfaction is sup-
posed to be obtained directly from customers. The methods
for gathering customer satisfaction data depends on different
factors such as number, geographical or cultural distribution
of customers. These methods should be collected in sys-
tematic and detailed manner and they should be documented.
The tools for collecting data should be selected having in
mind customer type and accessibility, timeline for data
collection, available resources, privacy and condentiality
and other issues.
3.3 Analyzing Customer Satisfaction Data
When the data regarding customer satisfaction is collected, it
is supposed to be analyzed to provide a certain insight
encompassing the degree of customer satisfaction, relevant
information of the organizations process(es) that have impact
on customer satisfaction, primary areas for improvement, etc.
3.4 Communicate Customer Satisfaction
Information
One of the most sensitive activities in organization after
obtaining and analyzing data related to customer satisfaction
is addressing areas of improvement and providing feedback
for improvement. The relevant information should be pre-
sented to appropriate organizational units of organization so
that information may be articulated into activities for service
improvement and be input for future strategy. In that man-
ner, organization may establish processes to review customer
satisfaction information and formulate action plans for
improvement. Customer satisfaction information which may
be positive or negative can also help the organization
understand and respond to customer expectations.
3.5 Monitoring Customer Satisfaction
The explained framework should be supported with appro-
priate monitoring activity. Amongst all, this means that
organization should verify that the customer group selected
are appropriate while having in mind the purpose of data
gathering and that the customer satisfaction data, both direct
and indirect are valid. In the end, organization should assess
the effectiveness of taken actions.
4 The Proposed Indicators for Customer
Satisfaction Measurement with Significant
Impact on QOL
One of the frequently used models is ACSI (American
Customer Satisfaction Index). This model supports measur-
ing the market characteristics of organizations, branches and
national economies as a whole but in the same time it may be
used for determination of the customer satisfaction with a
certain company product or service. In that manner, con-
siderations in this paper are limited to the level of company.
It may be considered that this model has two essential fea-
tures. The rst one is that customer satisfaction cannot be
measured directly, because it is a hidden variable that
involves a subjective assessment of product quality. The
second is that model includes, in addition to customer
experience (quality obtained), customer expectations
regarding product quality in future (Fig. 2).
The obtained quality reects customer experience based
on its prior use of the product. In addition, the quality
obtained reects two components of customer experience:
(1) customization of products to the needs and wishes of
customers and (2) reliability, safety and product safety.
The obtained value is estimated in relation to the price
paid by the buyer for the purchased product/service. The (+)
336 A. Aleksic et al.
sign indicates that there is a positive relation between the
presented entities. Customer expectations depend on the level
of customer information about products and organization.
They are positively corresponding to the perceived quality and
the (added) value. Theoretically, increasing total customer
satisfaction should reduce customer complaints and increase
customer loyalty. The relationship between customer com-
plaints and loyalty cannot be measured directly. It is worth to
mention that in the case of positively resolved complaints,
customersloyalty increases. Also, theoretically, customer
satisfaction is supposed to be more affected by the cus-
tomization component than the component of the reliability of
the product/service. In that manner, customer expectations are
more important in economic sectors with fewer variations in
production and consumption. Customer satisfaction is sup-
posed to be more conditioned by quality than the value or price
of a product. The proposed base of survey questions for
modeling perceived quality in determination of customer
satisfaction is presented in Table 1. The purpose of the men-
tioned questionnaire is measuring the level of customer (citi-
zens) satisfaction with services of Road and Transportation
Agency (RTA) in Dubai.
If core indicators are analyzed, it may be suggested that
increasing their values, their increasing makes signicant
impact on the level of QOL. The proposed base for questions
related to survey that should be used for determine the
perceived value of customers should be very useful since
marketing managers have realized that customer satisfaction
is central concept of market business. The ACSI index is
complementary to conventional measures, such as produc-
tivity indices and prices, which treat the quality of products
and services as residual size. Having in mind the mentioned,
it may be noticed that the ACSI index has an important
advantage because it deals with the essence of quality. It is
formed based on the experience of customers who have been
consuming and using products and services.
Fig. 2 ASCI index model
Table 1 Perceived quality indicators derived from standard ISO 37120:2014
Indicator Core indicator/supporting indicator
18.1 Kilometres of high capacity public transport system per 100,000 population Core indicator
18.2 Kilometres of light passenger public transport system per 100,000 population Core indicator
18.3 Annual number of public transport trips per capita Core indicator
18.4 Number of personal automobiles per capita Core indicator
18.5 Percentage of commuters using a travel mode to work other than a personal vehicle Supporting indicator
18.6 Number of two-wheel motorized vehicles per capita Supporting indicator
18.7 Kilometres of bicycle paths and lanes per 100,000 population Supporting indicator
18.8 Transportation fatalities per 100,000 population (Supporting indicator)
18.9 Commercial air connectivity (number of non-stop commercial air destinations) (Supporting indicator)
Smart City Transportation Services, Customer Satisfaction 337
5 Conclusion
New market conditions impose the need for continuous
process of assessment, tracking and analysis of customer
satisfaction to enterprises if they want to stay relevant and
obtain leading position. This paper explains the framework
for assessment, tracking and analysis of customer satisfac-
tion in the scope of smart city services. The proposed
framework is derived from the standard Quality management
Customer satisfactionGuidelines for monitoring and
measuring ISO 1004:2012. The proposed model for deter-
mining customer satisfaction is ACSI which is aligned with
the mentioned standard. Authors believe that this model
could be appropriate for measuring customer satisfaction
with the smart city services in Dubai. Services of the smart
city are analysed from three perspectives: smart infrastruc-
ture, human infrastructure, and institutional factors.
It may be suggested that represents the widest range of
human experience[18]. In that manner, there are open
questions how to measure QOL respecting the whole smart
city or individual that live in it. QOL has been widely rec-
ognized as multidimensional so it is impacted by different
constructs and its measurement should include many indi-
cators and components. In the same time, customer satis-
faction may be seen as extremely important in marketing
encompassing the knowledge from research how customer
make decisions closely connected to psychology and market
research.
The main contribution of the paper is proposal of the base
for determining the right questions for the questionnaire
which should be used for measuring the value of the cus-
tomersperceived quality with services of Road and
Transportation Agency (RTA) in Dubai in the proposed
model. The mentioned base is derived from the indicators
dened by standard ISO 37120:2014 Sustainable develop-
ment of communitiesIndicators for city services and
quality of life. This base should be used for dening ques-
tionnaire for assessment. Future research is oriented to
dening of overall model for customer satisfaction with
services of smart city such as Dubai.
References
1. Johnson, M.: International Encyclopedia of the Social & Behav-
ioral Sciences, 2nd edn, pp. 630632 (2015)
2. Johnson, M.D., Gustafsson, A.: Improving Customer Satisfaction,
Loyalty and Prot: an Integrated Measurement and Management
System. Jossey-Bass, San Francisco (2000)
3. Boschmann, E., Kwan, M.: Toward socially sustainable urban
transportation: progress and potentials. J. Transp. Geogr. 2(3),
138157 (2008)
4. Fischer, J.M., Amekudzi, A.: Quality of life, sustainable civil
infrastructure and sustainable development: strategically expand-
ing choice. J. Urban Plann. Develop. 137(1), 2938. American
Society of Civil Engineers (2011)
5. Fischer, J.M., Mshadoni, M., Kennedy, A.A.: Why and how to use
customer opinions: a quality-of-life and customer satisfaction-
oriented foundation for performance-based decision-making.
Transp. Rev. Transnational Transdisciplinary J. 34(1), 86101 (2014)
6. Pham, T., Ahammad, M.: Antecedents and consequences of online
customer satisfaction: a holistic process perspective. Technol.
Forecast. Soc. Change. http://dx.doi.org/10.1016/j.techfore.2017.
04.003 (2017)
7. Nam, T., Pardo, T.: Conceptualizing smart city with dimensions of
technology, people, and institutions. In: The Proceedings of the
12th Annual International Conference on Digital Government
Research, vol. 11, 1215 June, College Park, MD, USA (2011)
8. Neirotti, P., De Marco, A., Cagliano, A., Mangano, G., Scorrano,
F.: Current trends in smart city initiatives: some stylised facts.
Cities 38,2536 (2014)
9. Kirpalani, V.H.: International marketing and the quality-of-life. In:
Samli, A.C. (ed.) Marketing and Quality-of-life Interface, pp. 204
219. Quorum Books, New York, NY (1987)
10. Choi, W., Rho, M.J., Park, J., Kim, K.-J., Kwon, Y.D., Choi, I.Y.:
Information system success model for customer relationship
management system in health promotion centers. Health Care
Inf. Res. 19(2), 110120 (2013)
11. Oliver, R.L., Swan, J.E.: Equity and disconrmation perceptions as
inuences on merchant and product satisfaction. J. Consum. Res.
16, 372383 (1989)
12. Hollands, R.G.: Will the real smart city please stand up? City 12
(3), 303320 (2008)
13. Vijaykumara, S.G., Saravanakumar, M., Balamurugan, M.: Unique
sense: smart computing prototype. Procedia Comput. Sci. 50, 223
228 (2015)
14. Gifnger, R., Gudrun, H.: Smart cities ranking: an effective
instrument for the positioning of cities? ACE: Architect. City
Environ. 4(12), 725 (2010)
15. Yigitcanlar, T., Velibeyoglu, K.: Knowledge-based urban devel-
opment: the local economic development path of Brisbane,
Australia. Local Econ. 23(3), 195207 (2008)
16. Parahoo, S., Harvey, H., Radi, G.: Satisfaction of tourists with
public transport: an empirical investigation in Dubai. J. Travel
Tourism Mark. 31, 10041017 (2014)
17. Washburn, D., Sindhu, U., Balaouras, S., Dines, R.A., Hayes, N.
M., Nelson, L.E.: Helping CIOs understand smart cityinitia-
tives: dening the smart city, its drivers, and the role of the CIO.
Cambridge, MA: Forrester Research, Inc. Available at http://
public.dhe.ibm.com/partnerworld/pub/smb/smarterplanet/forr_
help_cios_und_smart_city_initiatives.pdf (2010)
18. Woold-Dauphinee, S.: Assessing quality of life in clinical
research: from where have we come and where are we going?
J. Clin. Epidemiol. 52(4), 355363 (1999)
338 A. Aleksic et al.
Smart Classrooms
Zoltan Horvath and Donludee Jaisut
Abstract
For the Zgeneration, life would be inconceivable without
smart devices, furthermore they would like to reach every
useful information instantly. In the digital society it is
getting more and more important to give the most
important information for the users through their smart
devices. During our research we made groups of users with
the help of smart beacons, and beyond indoor positioning
we gave them extra information, like electronic notes,
closed book exam etc. One of the main goals in our
development was to use our smart devices instead of paper
to reduce the expenses of the university. For the indoor
positioning, with the help of a pointcloud, we produced a
3D map beside the vectorgraphical, which is going to be
the basic of further developments, as well as we created a
surface on the physical web, where administrative oper-
ations can be made by the students and teachers.
Keywords
Beacons Indoor positioning Kalman lter
Physical web
1 Introduction
Many experiments have already been made in the eld of
indoor navigation and positioning; however, an adequate
solution has not been found yet. This is why we would like
to develop a hybrid system that would solve this problem.
Preliminary works for our research have already been done.
We have collected 2,700,000 pieces of data from the sensors
we are planning to use; this way we already know how they
would behave during the measurements [1]. Furthermore, we
have started the production of an own propeller that is much
more efcient compared to the commercial models. This is
important because we can lift a heavier load with the drone
and the battery life can also be improved [2]. In our previous
research we nd out the next four facts:
1. indoor positioning is not possible with either sensor.
2. the reected signals distort the accuracy of the
measurements.
3. some sensors cant give real values in intensive electro-
magnetic elds [3].
4. the increased computing power would drain the battery.
These facts are also important because of smart devices
have become an integral part of our lives and users meet
with them day by day. In our days, every student or lecturer
possesses one or more smart device. But they meet only few
information within the walls of the building, even notica-
tions. In this research we would like to serve one option. The
goal in this research is that we create extra contents on the
physical web which allows to help users in the indoor
navigation, give the actually lessons and material if the
lecturer uploads this. If this material is available then the
student can edit on the lecture. To enable this we created the
content manager platform. It has been uploaded with the
classrooms schedules, slides and other e-curriculums. The
output periphery of this platform will be the smart beacon.
This beacons broadcast the information about the class-
rooms, included the GPS coordinates which are crucial to
indoor navigation [2].
Z. Horvath (&)
University of Pecs, Pecs, Hungary
e-mail: hz@gamma.ttk.pte.hu
D. Jaisut
Kasetsart University, Bangkok, Thailand
©Springer Nature Switzerland AG 2019
A. Al-Masri and K. Curran (eds.), Smart Technologies and Innovation for a Sustainable Future,
Advances in Science, Technology & Innovation, https://doi.org/10.1007/978-3-030-01659-3_40
339
2 Materials and Methods
2.1 Beacons
In this research we work with Sensoro Smart Beacon 4AA,
all features of iBeacon and eddystone supported with this
beacon. With these devices, we can give more space for
developers but more importantly to users also. Other useful
properties are including UUID, Major, Minor, Tx Power,
Interval, Upgrade Over-The-Air supported, ne-tuned
antenna, optimized transmitting strength, covering a larger
area. As for the security side, we can manage the hardware
level password, preventing malicious conguration modi-
cation and broadcast rotated encrypted major/minor, prevent
reading major, minor from squatters. The developer part is
more interesting, because available the pre-conguration
service for batch order, out of the box and deployment tool
provided, batch update conguration on site. The onsite
adaptive capacity is 12° Tx power, more control on signal
covering. Central Monitor Dashboard provided, monitor
mass device status including battery level, temperature,
motion count, light level and other conguration (Tx Power,
Adv Interval). At the management part the next two prop-
erties are important, extended iBeacon protocol (patent),
broadcasting device battery level and sensor data. The
inspection tool provided, collection mass device battery
level and sensor data in a dead simple way without con-
nection to each device.
Our sensors are available via Sensoro cloud (http://cloud.
sensoro.com/) which gives extra help in the programing and
access. The data update is much faster and easier. Over this
cloud there are lots of different app available whereby we
can manage our beacons with smartphones, tablets or PC.
The rst step is the registration of the beacons. We can do
this with iBeacon, Eddystone, Beaconinside or SecureBea-
con ID (available on the beacons); after this we can upload
contents, for example GPS coordinates. After this can we
join to the physical web. If we are ready after our beacons
will be visible on the maps.
On the maps we show that two beacons are activated
which are classrooms in this case. To this classroom we have
uploaded the schedule of classroom so the students know
which lecture is inside or which coming (and where) if
connect to the beacon. Around the under beacon is red circle
what is the reach of geofences function. The aim of this
function is that the beacon is moving out from this range (in
this case 26 m)because somebody has moved the beacon
it would send notication to the system administrator
about the movement. But we can add any notication to the
beacon for the students. For example this can be which
software is available at the exam, what is the password
today. We can give a sort description about the event
whereof gets notication the user on the smartphone. After
this we can declare the type of notication as well as the
advanced settings. In this section we can lter the operation
system or the timeframe.
2.2 Indoor Positioning
When we are talking about indoor navigation, everybody
knows that the GPS signals are not available indoors. But we
give these coordinates to beacons because if we have maps
about the building then the coordinates are working. These
maps are the VenueMaps. How to do the GPS coordinates
and signals work on the map? The answer is georeferencing.
The VenueMaps be connected with other maps wherewith
connected with their (Google Maps, Bing maps, etc.).
Because this maps are online/ofine the devices can take
identication our position inside and calculate our way
between classrooms. At the indoor positioning we can use
the triangulation method with beacon. This method is same
as outdoors. We set up the signal strength of beacons that we
are front of the door of classroom then the strongest the
signal and the other beacon signal is not visible [4]. But if
we moving from this position with 1 m than the other bea-
con will be visible. In this case, the user can detect where
he/she is in the building. Indoors we must calculate with a
disgure effect producing the reectance signals. These
signals broken on a different surface, material, object and
would generate a wrong position. In our previous research
we were ltering these signals with Kalman Filter. Fur-
thermore we can work with other sensors (accelerometer,
gyroscope, compass) which can detect and analyze the
moving.
2.3 Venue Maps
We have met this name by the Here application some years
ago. In this research we have used this app because the API
is open source. HERE Venue Maps API returns detailed
up-to-date information on geometry, metadata, Points of
Interest (POI) and indoor routing. Supported return types are
Images (PNG) or JSON. In the Here Android SDK with the
Position manager we can give GPS coordinates to our
map. At the georeferencing, the next three elements are
important:
GPSpositioning using the real GPS available on the
device.
GPS_NETWORKpositioning is provided using a
wireless network or the real GPS available on the device
NETWORKpositioning using a wireless network.
340 Z. Horvath and D. Jaisut
The current status of a particular location method is
represented by the LocationStatus value returned from the
PositioningManager.getLocationStatus(LocationMethod)
method.
Because we talk about the indoor positioning we must
allow the wi-based localization [5].
Talking about indoor positioning, we have to enable wi-
based localization, we can do this with the next sub-class:
(PositioningManager.LocationMethod.GPS_NETWORK)
The next things is the Position indicator class that is
important to dene the correct position. Position Indicator is
a special map marker object that allows the current client
device position to be shown on a map. Every HERE SDK
Map object has an integrated position indicator, set to
invisible, by default. The indicator can be retrieved and set
to visible by calling Map.getPositionIndicator() and Posi-
tionIndicator.setVisible(). By default, the position indicator
is rendered as a marker surrounded by a circle, the diameter
of which illustrates the accuracy of the indicated position.
You can change this marker by calling PositionIndicator.
setMarker(Image).
In the cloud at Sensoro beacon is deployment map, where
we can upload our private vector graphic map and add
positions. However this not at all because over the position
we can add mac address of beacon to map. The X and Y
coordinates are possible the GPS coordinates or our private
coordinate system. With the mac address can identied the
beacon that which beacon is where. Thus, the GPS coordi-
nates will not be asked separately if this has already been
assigned to the particular beacon. After this must refresh the
beacon position on the map (Fig. 2). We have created the
VenueMaps in Android Studio. At the rst step must iden-
tied the basic area and declare the objects. This can be
ofces, classrooms, toilet, etc. of course that must declare
area to this objects.
We can give this with the next code:
Additionally what was very important for us that upload
with content this objects. In the next code we can show
where is the classroom, what are the GPS coordinates, etc.
"DepartmentNuame":"Department of IT",
"placeId":"",
"names":{"ENG":"F/111 Classroom"},
"addresses":
{"ENG":{"postalCode":"7624",
"countryCode":"HUN",
"houseNumber":"6",
"BuildingID":"F",
"GPS":"46.076689" "18.206118"
"BeaconId":"B-5Tw1bb"}
When we positioned all rooms and ofces and write in the
code the additional information then the results will be the
next (Fig. 1). On Fig. 1green color means the classrooms,
yellow the ofces. This map is available via the beacons that
connect via beacon on the physical web.
2.4 Kalman Filter
Results provided by sensors are not enough to obtain
evaluable data for indoor positioning. As we have already
proven, it is necessary to use different algorithms to get
evaluable and reliable data. First, we examined how useful
the Kalman lter is, since it is quite effective in processing
data measured by the original signal from the scattered ones
[6]. During our research, we recorded nearly 14,000 records,
so it seemed obvious to examine the raw data with linear
regression [7], since it gives a line; this is called a regression
line. Its general formula is the following (1)[8]:
Y¼b0þb1Xð1Þ
The preprocessing of data which we collected during our
research has been done on a background running server.
"object":
{
"id":"HzTest_21932",
"category":{"id":"17"},
"preview":"ClassRoom",
"type":"space/polygon",
"contentId":"7711421"}},
{"area":[237,257,236,258,235,259,236,260,236,261,237,262,238,262,239,262,240,
262,240,261,241,262,242,261,243,261,244,261,245,259,246,259,247,258,247,257,24
7,256,246,256,246,255,246,254,245,254,244,254,243,255,242,256,241,256,240,256,2
39,257,238,258,238,257]
Smart Classrooms 341
An automatized logarithm selected and deleted the values
from the data set, which were beyond the measurement error
limit. We specied this error limit depending on the signal
strength, in ±5%. With this value we can reach the 1 m
accuracy in case of indoor positioning. After that, the cal-
culation of the position from the data is done through an
account on the physical web. This is necessary because the
increased calculation need by the algorithms use more
power, and with this technique it wont draw the batteries of
the users devices. During our examinations we have
observed, that mostly the Kalman lter and the extended
Kalman lter requires the most calculation.
The basic idea of the linearized Kalman lter is to start
with a nonlinear system and then nd a linear system whose
states represent the deviations from a nominal trajectory of
the nonlinear system. We can then use the Kalman lter to
estimate the deviations from the nominal trajectory. This
calculation indirectly gives us an estimate of the states of the
nonlinear system. We must use here the Extended Kalman
Filter. The idea of the EKF (extended Kalman lter) is to use
our estimate of x as the nominal trajectory in the linearized
Kalman lter. After making these substitutions into the lin-
earized Kalman lter equations and going through some
mathematical manipulations, we get the following EKF
algorithm:
State equation :xkþ1¼fx
k;uk
ðÞþwkð2Þ
Output equation :yk¼hx
k
ðÞþvkð3Þ
At each time step, compute the following derivative
matrices, evaluated at the current state estimate:
Ak¼f0^
xk;uk
ðÞ ð4Þ
Ck¼h0^
xk
ðÞ ð5Þ
We encounter it especially when we measure too much
reected signals during recording. Of course, these errors
can be ltered further, even with as mentioned above, or
with the Bayesian Histogram (6):
fyðÞ¼X
k
h¼1
1ðnh1\ynhÞph
nnh1
ðÞ
;y2Rð6Þ
Histogram lters have been useful in robotics for local-
ization due to their computational efciency [9]. However,
they do not offer an easy way to guarantee convergence due
to information loss in the approximation step.
Another possibility for indoor positioning is to be closer
to windowsthis way we might catch GPS and GLONASS
signal. But in this case, reected signal causes quite big
distortion. This happens due to the signal being refracted on
objects and then spreading scattered to the receiver. This
error can be ltered relatively successful with the help of the
Kalman lter, since we can monitor GPS signals [2]. If we
know which signal our smartphone is using, we can deter-
mine the corresponding satellite frequency [10]. After this,
we can use the Kalman lter by giving the original fre-
quency, which then lters out the other results as errors
Fig. 1 Shortest path tree with beacons and stickers
342 Z. Horvath and D. Jaisut
leaving only the original and right data [6]. It is instructive
rst to review the analysis step in the standard Kalman lter,
where the analyzed estimate is determined by a linear
combination of the vector of measurements d and the fore-
casted model state vector w
f
[6]. The linear combination is
chosen to minimize the variance in the analyzed estimate w
a
,
which is then given by the Eq. (7):
wa¼wfþKdHwf
 ð7Þ
The Kalman gain matrix K is given by (8)
K¼PfHTðHP fHTþWÞ1ð8Þ
The error covariance of the analyzed model state vector is
reduced with respect to the error covariance of the forecasted
state as (9):
Pa¼wawt
ðÞwawt
ðÞ¼wfwt
þKðddtHwt
½½wfwt
þKddtHwfþHwt

Þ
¼IKHðÞwfwt

wfwt

TIKHðÞTKðddt
ðÞðddtÞ2KtÞ
¼IKHðÞPfIHtKt
ðÞþKWKt
¼PfKPH fPfHtKtþKHP
fHtþW

Kt
¼IKHðÞPf
ð9Þ
The analyzed model state is the best linear unbiased
estimate [8]. This means that wa is the linear combination of
wf and d that minimizes (10):
TrP ¼wwt
ðÞwwt
ðÞ ð10Þ
if model and observation errors are unibased and are not
correlated. However, even with this ltering, we could not
reach the desirable precision: multiple steps of ltering
resulted in only 67% precision in indoor positioning.
Unfortunately, neither the combination of the previously
mentioned two methods work [11]. Though, we work with
drones that are equipped with cameras nowadays, we can use
them to our advantage [7]. Here we must note that such a
camera and image-processing system is needed to be
developed that is able to process any signal fast to avoid
crashing into objects unexpectedly emerging [12].
Between the strength of signal and the distance is strong
correlation. If we walk still from beacon then the signal will
be weaker the original signal and the reectance signals will
be stronger. If we would like clear the signals we can use
different lters. If we are talking about beacons then the
RSSI (Received Signal Strength Indicator) is very important
[13]. The RSSI value resembles the power of a received
radio signal (measured in dBm). The higher the RSSI value,
the higher the signal strength [14].
In our earlier research we have achieved satisfactory
results with the Kalman lter therefore we have used this
lter in this research again. With the RSSI we can calculated
our position from the transmitter. To this we can use the
Log-Distance path loss model (11):
SSI ¼10nlog10
d
d0

þA0ð11Þ
where
ddescribes the distance between the transceiver and
recipient
nthe signal propagation exponent
A
0
a referenced RSSI value at d
0
Usually d
0
is taken to be 1 such that A
0
becomes the
signal strength measured at a distance of 1 m of the device.
The general form of the Kalman lter is as follows (12):
xk¼Fkxk1þBkUkþWkð12Þ
where
F
k
is the state transition model which is applied to the
previous state x
k1
;
B
k
is the control-input model which is applied to the
control vector U
k
;
W
k
is the process noise which is assumed to be drawn
from a zero mean multivariate normal distribution with
covariance Q
k
The Kalman lter is a minimum mean-square error esti-
mator. The error in the a posteriori state estimation is
xk^
xkj. We seek to minimize the expected value of the
square of the magnitude of this vector. This is equivalent to
minimizing the trace of the a posteriori estimate covariance
matrix P
k|k
. By expanding out the terms in the equation
above and collecting. The trace is minimized when its matrix
derivative with respect to the gain matrix is zero. Using the
gradient matrix rules and the symmetry of the matrices
involved. Solving this for K
k
yields the Kalman gain (13):
Kk¼Pkjk1HT
kS1
kð13Þ
This gain, which is known as the optimal Kalman gain, is
the one that yields MMSE (Minimum mean-square error)
estimates when used. With this we can separate the reec-
tance signals from the originals. Furthermore here we used
the Dijkstras shorthest path algorithm for the indoor posi-
tioning, which was the medium, where we implemented the
values from the RSSI. During the positioning we used a
weighted graph G=V,E,/, where Vis a nonempty set of
Smart Classrooms 343
nodes; Eis a set of edges, one for each link; and /is a
weight function from Eto nonzero positive real numbers.
The number of nodes is denoted n, and the number of the
directed edges m. A directed edge in Eis denoted by an
ordered pair of nodes from V.
On the next gure (see Fig. 1) we can see, that we located
the geolocalized beacons on the important junctions, while
we located the simple beacons in the classrooms, and we
used the stickers in the ofces. The purpose of the latters
that we can track the user inside the building with them.
Since we located this stickers (they are beacons, they called
stickers because of their size) on the laptops of the teachers.
The intent with this was that if a student is looking for one of
the teachers, but the teacher he is looking for is not in his
ofce, then the student can check on our map, where is the
teacher currently (assuming that he took the device with
himself), or if the device was in the ofce without the tea-
cher, then with the help of the physical web the teacher
could have left a message for the students, that when is he
going to be available again.
Inside the building we could count the path in two dif-
ferent ways with geolocalized beacons. One of the paths was
the path for disabled people (barrier-free), while the other
was the shortest path. We have used the simple beacons,
becauseas we mentioned earlierthe students can reach
the electronic curriculum, and a schedule of a given class-
room. (Note: Stickers were available with an Android device
only after if they were activated with a device which uses
iOS system.).
3 Results
In our research we take some new places that are available
from lots of different and popular maps (google maps, Bing
maps and Here maps). We did do that is accessible to as
many platforms our solution for indoor navigation. Via Here
or with LiveSight we can show where are this places. On the
map are the two classrooms, which can cater to our beacons.
This are with F/103 and F/104 ID. The positioning was
conducted at the classroom F/107. After this the gyroscope
and accelerometer detects the movement plus the user can
see via mobile screen his location because the mobile camera
is working in this situation [15]. In the background our
framework working with the basic map and this give the
beacons positions if we are out of the beacons range. Indoor
positioning is achieved with a hybrid solution, as mentioned
earlier [16]. The position of classrooms available via phys-
ical web and with the beacons ID. With this method this
information is readable with two different methods. This
methods are independent from each other, so if the beacons
are not available then we can do the positioning using the
map. At the positioning with beacons used in commonly
known triangulation (see Fig. 2). The beacon signal strength
was set, to enable the operation point without disturbing
each other.
The red circle means the range of each beaconthis set
with signal strengthwhich is 2.5 m because this is the
critical distance (just in our this research!) where we can
lter the reectance signals, thus the accuracy of the mea-
surements was 12 cm (without lters). The green cloud
means the broadcast of signals [17]. This is so important
because these are causing inaccuracies in determining the
position. Another succeeded in reducing the scatter signals
when the beacons compiled towards the inside of the room,
and aluminum foil was placed between the backsheet and the
wall. With this methods we can control the scatter of signals
and this will not cause such a large confusing overlap of
adjacent beacons. In this case the accuracy would decrease
by 7 cm. We can show in the F/103 classroom [18] big
scattering which is the result of a cooled down room and a
reduced humidity. As mentioned earlier, the air character-
istics greatly inuences the spread of broadcast by the bea-
con signal, this can be seen in the following Table 1.
With the temperature increase the positioning accuracy is
decreased which is the main cause of humidity. The water
containing big molecules breaks the waves as a distortion of
the results. As demonstrated by the table, 10 (C) inch
increase in temperature will cause almost 12 cm distortion.
Furthermore important fact that the increase in energy con-
sumption, which increased almost by 80%. In this case, if we
can control the humidity, it can be reduce the aforemen-
tioned adverse effects. We can show this in the next Table 2.
In this case the signals need not cross on the bigger
molecules water droplets (which break the signalsway) so
they can spread faster and easier. This means that the battery
lifetime will be longer because there is no need to strengthen
the signal strength to more preciseness results. The precision
of the results can be improved further by using the Kalman
lter, the accelerometer and gyroscope combination. When
the device nished with the positioning at the classroom then
the user conrm that he/she is at the classroom. At this time
the device identied the original signal and ignore the others.
After this two-step when the user start walking then come
the accelerometer and the gyroscope. From this datasof
sensor and with the basic map calculate our system which
beacon whose will meet the signal of the device [18]. There
is a need of a Kalman lter, with, in this case, we can reduce
errors caused by scattered signals. We cans how this results
in Table 3.
Of course, the system is self-development, so if you
position the device has been carried out to conrm at bea-
cons, then the next time it will automatically detect the initial
signs of that beacon. This results are in the next Table 4.
As shown in table, no signicant differences were is
observed between the use of the Kalman lter and ignore. It
344 Z. Horvath and D. Jaisut
Fig. 2 Beacon range with reectance signals without Kalman lter
Table 1 Factors of air affecting the characteristic of a positioning
Temperature (°C) Density (kg/m
3
) Humidity (g/m
3
) Energy (mAh/day) Accuracy (cm) Range (m)
20 1.2045 17.3 162 5.7 2.5
25 1.1843 23.7 192 9.2 2.5
30 1.1648 30.4 287 17.3 2.5
Table 2 Factors of air affecting the characteristic of a permanent positioning humidity conditions
Temperature (°C) Density (kg/m
3
) Humidity (g/m
3
) Energy (mAh/day) Accuracy (cm) Range (m)
20 1.2045 17.3 162 5.7 2.5
25 1.1843 17.3 178 6.2 2.5
30 1.1648 17.3 192 6.6 2.5
Table 3 Accuracy of positioning with and without Kalman lter
Classroom Signal-strength
(dBm)
Humidity
(g/m
3
)
Accuracy (without Kalman
lter)
Accuracy (with Kalman
lter)
Range
(m)
F/103 45 17.3 5.7 2.8 2.5
F/107 45 17.3 6.2 3.2 2.5
F/104 45 17.3 6.6 3.2 2.5
Table 4 Accuracy of positioning with self-learning system
Classroom Signal strength
(dBm)
Humidity
(g/m
3
)
Accuracy (without Kalman
lter)
Accuracy (with Kalman
lter)
Range
(m)
F/103 45 17.3 2.9 2.8 2.5
F/107 45 17.3 3.4 3.2 2.5
F/104 45 17.3 3.1 2.9 2.5
Smart Classrooms 345
is therefore advisable in the second, but no later than fourth
positioning conrmation disabling the Kalman lter. Of
course, helpful use of the lter, however, the performance
computations is resource-intensive, making the battery life
will be shorter. This will not be evident during at single
indoor navigation, but rather also for use in a half or full day.
The resource requirements use of the Kalman lter is
described in the following Table 5.
The difference between the F/107 and F/103-104 class-
rooms is due to much more diffuse signals in the product,
because there are more densely placed the beacons. So it
takes longer to lter out the rst verication of the original
signal positioning. The use of the lter is still an extremely
important factor that the physical web browser content we
can open.
4 Conclusion
The goal of our research was to achieve indoor navigation,
using the tools available to everyone nowadays. We used
smart phones sensors during our investigations, as the
accelerometer, gyroscope and the compass, and the beacons
as output peripheral. It functioned as a physical web output
peripheral, where you not only can see the rooms where the
users position, but also endowed with extra information.
The navigation as a kind of background support, have pre-
pared a basic map about the test area. This map is available
on mobile platforms and the user can see in real-time where
to moves actually in the building. To the detection of
moving as mentioned above helped the accelerometer and
gyroscope. The beacon signals used in indoor positioning
with triangulation techniques. Indoor we meet very often
with reected signals so very important that we must sepa-
rate this from original signals. To this we have used the
Kalman lter in the previous research and successfully l-
tered the signals, thereby specifying the measurement results
are. We have just completed the solutions listed in the
phones with visionfunction. This was done using the
back-panel camera as it can make LiveSight applications.
Here come up as POI the places which made by us and as it
can be achieved the indoor navigation. The next step will be
at our research that we use the geofences function which is
available at beacons. In this case some beacons will not be
xed, we will also put on this beacons on drones, smart-
phones etc. The xed beacons sense this mobilebeacons
when arrived in the range and this information will be visible
on the map and in which direction it moves towards the next
beacon. Naturally this information are implementable in our
indoor map as development another map will not be
necessary.
References
1. Horvath, Z., Horvath, H.: More sensors or better algorithm? Int.
J. Comput. Comm. Control (IJCCC) (3). Springer, Heidelberg
(2014)
2. Horvath, Z., Horvath, H.: The measurement preciseness of the
GPS built in smartphones and tablets. Int. J. Electron. Comm.
Technol. 1(5), 1719 (2014)
3. Horvath, Z., Ildiko, J., Wu, T., Xuan, C.: Sensitivity of Sensors
Built in Smartphones. ISBN:978-3-662-47926-1 (2015)
4. Ding, N., Wagner, D., Chen, X., Pathak, A., Hu, Y.C., Rice, A.:
Characterizing and modeling the impact of wireless signal strength
on smartphone battery drain. In: Proceedings of the ACM
SIGMETRICS/International Conference on Measurement and
Modeling of Computer Systems, pp 2940 (2013)
5. Galvan-Tejada, C.E., Garcia-Vazquez, J.P., García-Ceja, E.,
CarrascoJiménez, J.C., Brenaa, R.F.: Evaluation of four classiers
as cost function for indoor location systems. Procedia Comput. Sci.
32, 453460 (2014)
6. Yang, S.C., Kalnay, E., Hunt, B.: Handling nonlinearity in an
ensemble Kalman Filter: experiments with the three-variable
lorenz model. Mon. Weather Rev. 140(8), 26282646 (2012)
7. Valavanis, K.P., Vachtsevanos, G.J.: Handbook of Unmanned
Aerial Vehicles. https://doi.org/10.1007/978-90-481-9707-1_144.
Springer, Heidelberg (2015)
8. Gerrit, B., Van Leeuwen, P.J., Evensen, G.: Analysis scheme in
the ensemble Kalman lter. Mon. Wea. Rev. 126, 17191724
(1998)
9. Stella, M., Russo, M., Begušic, D.: Fingerprinting based localiza-
tion in heterogeneous wireless networks. Expert Syst. Appl. (2014)
10. Rébay, V.: Possibility of using smartphones in distributed
computing networks. In: Proceedings of the International Confer-
ence on Advances in Computer & Electronics Technology
ACET2014, pp. 114118. (ISBN:978-1-63248-024-8),
Hong-Kong (2014)
11. Sa, I., Hrabar, S., Corke, P.: Outdoor ight testing of a pole
inspection UAV incorporating high-speed vision. In: Field and
Table 5 Change of energy use with and without Kalman lter
Classroom Signal strength (dBm) Humidity (g/m
3
) Energy with lter (mA/min) Energy without lter (mA/min) Range (m)
F/103 45 17.3 4.7 1.2 2.5
F/107 45 17.3 3.8 0.9 2.5
F/104 45 17.3 4.6 1.3 2.5
346 Z. Horvath and D. Jaisut
Service Robotics (105) of the series Springer Tracts in Advanced
Robotics pp. 107121. https://doi.org/10.1007/978-3-319-07488-
7_8 (2015)
12. Dandois, J.P., Olano, M., Ellis, E.C.: Optimal altitude: overlap,
and weather conditions for computer vision UAV estimates of
forest structure. Remote Sens. 7(10), 1389513920. https://doi.org/
10.3390/rs71013895 (2015)
13. Liang, Y., Jia, Y.: A nonlinear quaternion-based fault tolerant
SINS/GNSS integrated navigation method for autonomous UAVs.
Aerosp. Sci. Technol. 5(40), 191199 (2015, Jan)
14. Bulten, W.: Kalman lters explained: removing noise from RSSI
signals. In: IEEE International Conference on the Internet-
of-Things Design and Implementation. https://www.
wouterbulten.nl/blog/tech/kalman-lters-explained-removing-
noise-from-rssi-signals/. Last accessed 21 June 2017
15. Castro, P., Chiu, P., Kremenek, T., Muntz, R.: A probabilistic
room location service for wireless networked environments. In:
Ubicomp, Ubiquitous Computing, pp. 1834. Springer (2001)
16. Galvan-Tejada, C.E., Garcia-Vazquez, J.P., Brena, R.: Magnetic-
eld feature reduction for indoor location estimation
applying multivariate models. In: Articial Intelligence (MICAI),
12th Mexican International Conference on IT, pp. 128132, IEEE
(2013)
17. Albawendi, S., Appiah, K., Powell, H., Lotf, A.: Overview of
behavioural understanding system with ltered vision sensor. In:
2015 International Conference on Interactive Technologies and
Games. https://doi.org/10.1109/itag.2015.21 (2015)
18. Rautaray, S.S., Agrawal, A.: Vision based hand gesture recogni-
tion for human computer interaction: a survey. Artif. Intell. Rev.
43(1), 154. Springer, Heidelberg (2015)
Smart Classrooms 347
Social Media and Disaster Management
in India: Scope and Limitations
Dhanashree Giri and Aman Vats
Abstract
Social media, as a boon to internet users has emerged as
the rst choice of communication among the youth world
over. It is being used phenomenally by the youth these
days for connecting with each other in terms of data
sharing, collaborating, exchanging views, and so on. In
fact, social media has time and again proved its utility
during emergency situation. Be it Nepal earthquake 2015,
Cyclone in Odisha 2013 or Floods in Queensland in 2011,
social media has played a vital role in informing and
bringing the world together on one platform in dealing
with disasters. Though, social media fast is becoming one
of the widely used mode of communication, it is
important enough that the scope and limitations of social
media are explored and understood. Social media pro-
vides platform for dissemination of disaster information
such as observing situations in remote areas, public
tracking from ground zero, for collaborative develop-
ments such as collecting donations, providing a platform
for people with similar ideologies to unite, and so on.
While there are positive sides of social media, there is no
denying from the fact that it has its own drawbacks like
spreading rumours, promoting ill-fated acts such as
terrorism and cyber-crime like ransomware. Regardless
of the fact that social media is indirectly a breach of
privacy, it is gaining reputation world over for its
usefulness. In short, this mode of communication is here
to stay and grow with time and with paradigm shift of use
of media from one way communication to two way
message dissemination, it equally becomes important that
disaster managers include social media in their scheme of
things as well. This paper highlights the advantages and
disadvantages of using social media in disaster situations
and gures out the scope of this medium of mass
communication and limitations that can be potential threat
to social medias extensive use with reference to disaster
management in India. The literature review research is
carried out by the researchers to develop the three case
studies in order to detail possibilities of social medias use
in disaster preparedness particularly, warning system,
education, awareness generation and data base
management.
Keywords
Social media Disaster relief Information dissemina-
tion Crisis management Disaster preparedness
1 Introduction
Social media has become the most popular channel of
information and communication in todays world. It is pre-
dominantly dependent on internet. India was exposed to the
internet in 1986, when the Educational Research Network
(ERNET) was initiated in the country. In Indian context
ERNET was the precursor to the internet. The ERNET
mainly provided support for the Research and Educational
purposes in the premier education institutions of the country.
Initially, the usage of the internet was mainly restricted to
emails, which was not a formal mode of communication at
that period in time and even the legal sanctity of the emails
could not be vouched for. However, over three decades of
induction of internet in India, there has been radical change
in the usages of the technology. On August 15, 1995, Videsh
Sanchar Nigam Limited (VSNL) launched public internet
access in India [1]. With this the general population of India
began to get internet access. The desktop computers were
mainly used for accessing the internet initially. Gradually,
with the advancement in the Personal Computers, the usage
of internet became more popular in India. Its use proliferated
D. Giri (&)A. Vats
Amity School of Communication, Amity University, Noida, Uttar
Pradesh, India
e-mail: giridhanashree3@gmail.com
A. Vats
e-mail: avats@amity.edu
©Springer Nature Switzerland AG 2019
A. Al-Masri and K. Curran (eds.), Smart Technologies and Innovation for a Sustainable Future,
Advances in Science, Technology & Innovation, https://doi.org/10.1007/978-3-030-01659-3_41
349
with the advent of laptops, tablets, and later the mobile
phones especially low budget smart phones.
The introduction of 2G/3G/4G technology, which
brought high internet speed at comparatively low cost and
provision of large amount of data download facility, added
to the spread of the internet technology. The ease of use
internet technology by people of every walk of life also
offered the foundation for the use of internet technology
driven media in cases of emergencies.
Last decade of the twentieth century and the rst decade of
the millennium saw a surge in various social media network-
ing sites, popular sites were Orkut, and Hi5 provided a plat-
form for sharing the information immediately. When people
were just learning to use these types of two way communi-
cation tools, an all-new variant Facebook was introduced in
2004 which became very popular among the youths. It revo-
lutionised the world of social networking. Since then, social
networking platforms have been used for variety of purposes
like sharing photos, video, location sharing, phone, video
calling and advertising. Moreover, Facebook also paved way
for many other social networking podiums such as WhatsApp,
Instagram, Flickr, LinkedIn, Twitter, SnapChat, WeChat and
so on. The developments in the networking eld and intro-
duction of broadband network and Wi-technologies, sup-
ported with the introduction of smartphones that gradually
became affordable even to the low income group of popula-
tion, resulted in the rise of social networking sites usage. This
rise also resulted in demand for development of one touch,
easy to use applications which are for short called Apps.
These App-based interactions further increased the familiarity
and popularity of the Smart phones, and other mobile devices
such as tablets increasing social media users manifold.
Today, after almost 30 years of introduction of internet in
India, social networking in this country is so high that India
has become the second largest user of internet [2] in the
world with record of 342.65 million subscribers in the year
2016 [3]. Twitter and Facebook, in recent past, have done
tremendous jobs in breaking the news not only in normal
situations, but also in emergencies and during disasters. With
increasing number of users and user friendly applications for
all sorts on devices like desktop, laptop, palmtops and
mobiles, the internet penetration in Indian household seems
to be doing quite well. Even while analysing the main-
streaming media handling of the disaster management, the
vital role played by internet technology cannot go unrec-
ognized and that of social media can never be undermined.
In the past few decades there is an increase in the
occurrence of disasters due to climatic, tectonic and
unplanned human activities. Certainly, the vulnerabilities
have also increased the focus of media onto the issue arising
out of various hazards that surrounds the society at large.
Floods in India, is a very common phenomenon and with its
increased frequency, the concern of mediabroadcast,
electronic or print, have increased in reporting as well as
supporting the public in the time of disaster. The induction
of social media is of great hope for the disaster management
experts and also the general masses for dealing with various
phases of disaster management such as early warning, pre-
paredness drill, rescue and evacuation, rehabilitation and
resettlement.
The research questions of this study are to examine:
Whether the social media has been used for dealing with
the disaster in any country? If so, what are the learning
points?
Whether, India can also emulate the success stories of
social media in dealing with the disaster?
What may be the limiting factors for success of social
media in disaster management?
The three case studies viz., Haiti Earthquake case of
2010, Queensland ood 2011, and Chennai ood 2015,
discussed below, depict the success of the social media in
dealing with emergencies caused by disasters in the
respective countries.
1.1 Haiti Earthquake 2010
In January 2010, Haiti was hit by a severe earthquake which
recorded 7.0 magnitude on the Richter scale. The ofcial
report states that more than 200,000 people died and as
many were left homeless and affected, with estimated
damage of 8.1 billion US Dollars, by the massive quake [4].
The CNN reported the earthquake news in Haiti only after
pictures of the massive quake was rst posted on Twitter and
Facebook. During Haiti earthquake the unparalleled use of
Information System (IS) increased [4]. Twitter reporting is
so fast and real that, by the time mainstream media aired
those extreme events, they already became a trend word on
Twitter search[5]. While Twitter was faster than main-
stream media during Haiti tragedy, Google also introduced
Google Person Finderfor the rst time on the electronic
media platform, which was deployed to work as tool for the
people to nd their kin stuck in disaster. This tool is usually
embedded during crisis situations on the Googles website,
which also features disaster tools like satellite photographs,
shelter locations, road conditions, and power outage infor-
mation generation, that supports in providing faster, better
and real time response during crisis situation [6]. Launched
by few Google volunteers, Google Person nder tracks a
person through targeted advertisements, Analytics tool and
personalized search engine results that is helpful in crisis
times for nding a person [7].
In emergencies, there is a critical time constraint on
evacuating affected people, locating and delivering available
350 D. Giri and A. Vats
resources, as well as generating relevant information and
distributing it to appropriate parties in a timely manner.
Relevant data are crucial to making informed decisions
about where to focus attention and where to distribute lim-
ited resources; however, how to obtain reliable, accurate,
and timely geospatial data is always a challenge, especially
in situations where disasters develop rapidly[8]. In such
circumstances, social medias interventions have certainly
been helpful in minimising the time required to disseminate
information. Twitter and various blog have played major
role in dissemination of timely information in various
international agitations in the past, like in the protest held in
Iran in 2009. In Haiti earthquake, for the rst time, Twitter
was also used as a source to raise funds of more than eight
million US Dollars for the earthquake victims [9]. Not only
Twitter, social media enthusiasts have also mainstreamed
Facebook in sending out information related to crisis situa-
tions to the family and friends.
During Haiti crisis, many groups emerged on Facebook
for fundraising and getting disaster related updates.
According to reports of Pew Research Center Journalism &
Media, 2010 [9], a group named Earthquake Haitihad
nearly 170,000 members, making it one of the largest groups
on Facebook for Haiti Earthquake relief. During this event,
people were using social media as never before, and were
exploring different ways to call for direct action. Instead of
linking news to other sources of information, Twitter was
signicantly used for making call for action purposes,
especially, for raising money for the victims. In fact, the
majority of the 2.3 million tweets on the subject were not
original posts, but were instead re-tweets of something
another person had already posted. According to Sysomos,
59% of the tweets about Haiti were re-tweets. Many of those
re-tweets involved the campaign to use text messaging to
raise funds for the Red Cross. Anyone with a cell phone
could text the word Haitito 90999 and $10 would be
added to their phone bill as a donation to the effort.[9]. It is
evident that blogging, micro-blogging sites and mainstream
social media websites like Blogs, Twitter, Facebook and
Instagram respectively are being used as never before in
information generation during disaster times in helping
managing the crisis situation.
Thus scope of social media during Haiti earthquake, has
been clearly seen from quick information dissemination, to
fund raising drive and also Google persons nder thus
paving the way for using tools like Facebook, Twitter,
Flickr, and other blogging sites to send out information to
different parts of the world and different sections of society.
1.2 Queensland Flood 2011
Another success story of Social media can be traced in its
use by Queensland Police Department during Floods in
2011. In the year 20102011, Victoria (a state in Australia)
was hit by series of oods (beginning in September 2010
through March 2011). Due to good reach of internet net-
work, even during the oods people were connected with
each other. Social media was ooded with information on
the disaster and people were kept informed by the use of
social media tools like Facebook and other blogging sites.
The Victoria State Emergency Service (VICSES) provided
information to communities through social media and also
developed a strategic intelligence capability to obtain intel-
ligence from social media sources[10]. Majority of people
were informed through the Facebook page, which was cre-
ated by Queensland Police Service for providing regular
updates on the oods. A report by [11] specied that 74%
respondents acknowledged using government or media
Facebook groups and websites with an overwhelming
majority visiting the Queensland Police Service Facebook
group. Other sources like the State Emergency Services
(SES), Australian Broadcasting Corporation (ABC) News,
Bureau of Meteorology, VicRoads (Victoria Roads
Authority), Victorian Police, Royal Automobile Club of
Queensland (RACQ) and various other commercial and non-
were also referred to by the respondents during the disaster.
In this event Facebook was more prominent source of
information than Twitter. As Associate Professor Axel Bruns
and Dr. Jean Burgess from the Queensland University of
Technology admitted that the most popular hashtag (#) used
on Twitter was #qldoods. They argued that average of
fourteen to sixteen thousand tweets per hour was recorded
during the disaster. These hashtags were strategically used
for the appropriate co-ordination and information dissemi-
nation [12]. During the oods Police Media of Queensland
Police Service department was deployed for reaching out to
the public in timely manner. Some of the services provided
by Police Media in the event weretimely dissemination of
information related to disaster through the use of social
media sites (Facebook and Twitter in particular), live
streaming of videos related to oods especially, media
conferences of Queensland Police Service (QPS) via Face-
book and their YouTube channels. Three major hashtags
#qldoods, #TCYasi or #mythbusters were used for dis-
semination of information on Twitter. Same were used while
uploading daily audios of local coordinators of the state on
Facebook; myth busting information dissemination and 24*7
Social Media and Disaster Management in India 351
moderation of social media accounts of QPS; coordinating
with language interpreter to assist foreign tourist during
crisis [13]. Analysing the variable of timely dissemination of
information, it is clearly argued that QPS was attentive
during the ood peaks, which certainly helped QPS in
posting regular tweets and audio and videos on Facebook
even during the odd hours. Moreover since the content was
being posted by the Police, it was denitely more trust-
worthy and there was less scope of rumours being dissem-
inated. All this made the QPS post reliable source along with
print media (newspapers) and broadcast media (TV and
radio). In the report of Queensland Police ServiceDisaster
Management and Social Mediaa case study [14], the
graphical representation shows that Facebook likes, sud-
denly went up from 20,000 to 160,000 in just one month
between Jan and Feb 2011, when disaster was in its peak.
This denitely represents that improvement of technology
has led to a shift in the patterns of media usage. Many people
are now connecting on social media and they completely
rely on the information shared on this electronic platform
(Fig. 1).
In Queensland Flooding case, the use of face book was
more prominent in comparison to twitter, face book and
Google person nder. Safety Checkfeature launched by
Facebook was supported by its location tracking feature.
Thus Social media has spread its wings ever since its
inception and when it comes to disaster management, the
scope has been widened.
1.3 Chennai Floods 2015
An example of extensive use of social media in India can be
traced to December 2015 when Chennai was hit by series of
heavy rainfall which resulted in severe urban oods. It lasted
for more than a month. The National Disaster Response
Force (NDRF) was busy in rescue and relief operations, A
strategy was framed to reach people through social media
instead of being dependent more on broadcast media/print
media. The information sharing was quick through social
media. Social media platforms such as Facebook, Twitter
and WhatsApp being two way communication podiums on
which, people can not only receive messages, but also they
can send instant videos, messages to share real time infor-
mation instantly across the globe.
It is evident from the study carried out by [15] that about
63% people accepted using social media for news and
information. During Chennai oods, each and every call,
tweet, SMS, WhatsApp message, email and phone calls or
any other electronic trafc coming from Chennai was being
acknowledged by few dozens of National Disaster Relief
Force (NDRF) personnel working 24 7 for response and
relief. Giving social media usage a totally different direction
this NDRF team was responding to the messages sent by the
victims to ensure people feel they are being heard and relief
is reaching out to them.
The messages which were coming in from all social
media channels were disseminated to the teams working at
Fig. 1 Growth of Likeson
Facebook page of QPS from May
2010 to February 2011 [13]
352 D. Giri and A. Vats
ground zero. The NDRF was also posting pictures on its
Twitter handle @NFRFHQ and some of the trending hash-
tags were #NDRF, #ChennaiRains, #PrayforChennai,
#ChennaiFloods. During Chennai oods, whole community
came together to save lives. Private companies like Ola (a
taxi ride company) also launched boat rides app free of cost
for rescue operations [16]. Skype also announced free
international calls on landline and mobiles. Facebook used
its Safety Checktool on its home page. This tool was
incidentally rst launched during Nepal Earthquake. The
search engine giant Google also initiated a link Resources
for Chennai Floodsto help the victims. Moreover, some
Indian companies like Reliance, Vodafone, Aircel also were
offering free benets to those stuck in oods. Airtel (one of
the Indian telecom establishments) offered loan credit of Rs.
30, free calls benet and about 50 MB data to the ood
victims [15]. Chennai oods, was considered to be one of
the costliest disasters in the history, with estimated loss of
$2.2 billion out of $6.2 billion was incurred during Chennai
Floods [17]. WhatsApp calls were convenient for connecting
with family and friends as it had lower call drops. Paytm
(money transfer and payment application) worked as a
bridge between those who wanted to donate and the ood
survivors during the calamity.
Some of the images below provide the evidence that
social media has spread its fangs and not just Twitter and
Facebook but other electronic sources are also becoming
more useful in the disasters. A team led by Professor Amit
Seth, who has already worked in Jammu and Kashmir
Flooding in 2014, developed crowdsourcing maps to provide
help to people who were worried about their kin stuck in
oods [18]. It provided necessary data about ooded street
and locations of ood relief camps. Blogging communities
like Chennai Rains were broadcasting regular weather
updates to reduce the rumours related to weather (Figs. 2,3
and 4).
2 Discussions and Recommendations
These achievements indeed help concluding that social
media has a lot of scope in the future. While there are
scopes, and achievements that can never go unnoticed, yet
there are some limitations that must be taken care of while in
disastrous situations.
2.1 Scope
During the dawn of millennium, GIS technologies were the
only source of collection of geospatial data. Although, a very
effective tool to get satellite imagery of the disaster hit
region, it is expensive and takes time to generate images.
Adding to it, this mechanism lacks information sharing and
collaborating during disaster times [8,20]. It was felt that
there was a need to mainstream social media into disasters as
well. In the recent past many protests and agitations have
been handled and coordinated with the use of social media.
With Haiti earthquake, social medias worth was also
applied to disaster situations. From fund raising to mapping
out disaster hit areas, social medias scope has increased in
no time.
According to [8], social networks can play two major
roles in effective emergency management. First, information
generated and disseminated over social networks is incred-
ibly valuable for disaster response. Second, the study of the
relationships, behaviours, and interactions in social networks
may provide important insights for gathering information,
planning evacuations and sheltering, and other rescue
efforts.Social media has become integral part of our lives
and it has a very high consumption in the todays time.
During Queensland Flood more than 1200 tweets were
recorded every hour, which proves the widespread use of
social media in dissemination of information faster than any
other media source [21].
Fig. 2 Location nder launched by Facebook during disaster in
Chennai [19]
Fig. 3 Facebook launched safety check feature during events like
Nepal earthquake and Chennai oods [19]
Social Media and Disaster Management in India 353
Talking about social media, every platform that falls under
this category has different roles to play during the disaster.
Since, Twitter is a micro-blogging social media site, it can be
used for faster dissemination of short but effective messages
like SoS texts and fund raising notes. Facebook has a totally
different use, when it comes to disasters. This social media
platform can be useful for sharing videos and photos related to
disasters, information like coordinating activities, locating
family and friends that is much sorted on Facebook than any
other social media. While YouTube can play vital role in
dissemination of information from the local coordinating
government bodies, WhatsApp and Skype can connect people
from around the globe. During disaster many teams and
experts are coordinating with people stuck in the situation.
With social media connecting with people in the disaster hit
region from a remote area has become easier than before.
Availability of Big Data has also enabled people with
multi-dimensional use of social media. Big Data is set of
large amount of complex and unorganized data that is col-
lected from networks all around the globe and produced into
comprehensive analytics that can be used in improving
business operations and now also in disaster response [22].
Big data helps create a kind of spatial data infrastructure,
making the foundation of policies, protocols, and ways to
exchange information an on-going priority. Such sharing of
data helps both responders and survivors to create new
best-case scenarios[22]. Using crowdsourcing maps is the
latest trend being incorporated in disaster relief that can be
produced using Big Data analytics. The differences between
Twitter and Facebook also came into play, where Twitter
was used for widespread, fast communication of informa-
tion, Facebook was used for providing detailed information,
such as coordinating activities and contacting ood-affected
friends and family [21].
Some of the potential areas where social media has
important space are:
(1) Use of social media can help in locating people in
disasters like in Chennai Flood.
(2) A two way communication enabled by social media is
far better than other media sources.
(3) Information dissemination is quicker which lets people
take necessary action in timely manner.
(4) Raising money for help and collaboration with impor-
tant organisations become easy as seen in Haiti
Earthquake.
(5) Relief operations are more timely and effective as evi-
denced in Chennai ood.
(6) Social media provides information to local authorities
alerting them for calamity like situations thus providing
opportunities for early/timely evacuation from the areas
prone to disasters.
(7) Continuous data collection and dissemination of new
information can be very useful.
Fig. 4 Flooded streets mapped
by using crowd sourcing for the
purpose of helping people stuck
in oods [19]
354 D. Giri and A. Vats
2.2 Limitations
With increasing scope of advanced technology, there are
limitations too. With advanced technology and increasing
use of social media, the question often arises whether the
news or videos circulated in social media are real. This is
due to improper use of social media which raises nger on
the reliability of such media. A misuse of social media may
lead to questioning its credibility and authenticity. Regular
monitoring of social media becomes necessary, if it is
serving disaster issues. Disaster situations often are associ-
ated with some rumours and some hype.
According to [5], rumours are collective behaviour sur-
rounding information and based on the psychology of
humans. This means when disaster strikes, many people are
looking to get rst hand situation report. Due to this
eagerness to get information about the surroundings, often
some people try to mislead and spread rumours thus,
sometimes leading to tension and agitation, which otherwise
could be avoided, if social media information is regularly
watched and monitored by the responsible authority. While
we see that in Haiti earthquake, rumours did circulate, which
might have led to difculty in rescue operations. In disaster
like Queensland Flooding and Chennai Floods, this aspect
was taken care of well from the beginning as most of the
social media activity was being monitored by government
sources. Any scope of misinformation or rumour was elim-
inated by issuing clarication audio or video messages by
the authorized agencies on the concerned pages and media.
Accessing rst hand authentic data is one of the most
important concerns that strike along with disasters. Addi-
tionally there is always a trust issue in accepting information
generated by volunteers [23]. According to [3], in India the
broadband users are 149.75 millions and narrowband users
are 192.90 millions while the population of India is more
than 1.3 billion and rising every hour [24]. Looking at
current scenario, even though social media has been
increasing its scope, but with the ratio of broadband users
and population scenario in India, it is evident that many
people in India are still deprived of social media availability.
Moreover, when urban and rural population is compared, the
user ratio varies 609.69 million to 449.17 million respec-
tively [3]. This means that most of the rural population is yet
not connected with internet/broadband/telephone services
and in such situation, social media usage seems a far cry.
Adding to this constraint, not everyone is comfortable using
social media, especially, older generation, people in the
lower economical strata and those who are not literate.
This also means that not everyone can possibly handle
social media accounts in professional manner. Disaster man-
agers need to be trained in using social media before they are
sent to respond to disaster events. According to [25], the
publics views on the disaster and response to it could be
erroneous, immediate corrections, necessitating a commit-
ment of communications resources, may be necessary. This
means that not everyone would have same views related to
disaster rescue and relief operations and during crisis times it
becomes necessary to keep a check on what people are posting
throughout all social media channels. The negative views of
people during crisis can further complicate the situation. Such
chaos denitely becomes overwhelming at the time of crisis
and this could rather be an added burden to the people moni-
toring social media sites regularly during disasters [25]. Some
signicant disadvantages in the use of social media are:
(1) The scope of developing rumours cannot be ruled out
from social media.
(2) Misuse of data available on social media serves as a
high potential risk for losing privacy.
(3) At times, authenticity of the information spread through
social media cannot be trusted.
(4) Monitoring rumours on social media can be difcult
task. It needs to be cleared immediately through
prompts, videos and audios, which can be a time taking
task.
(5) Internet in India is not available to each and every class
of people, which restricts the use of internet to mostly
urban and few rural population.
(6) Few segments of population do not fully understand the
use of social media and they are not even interested in
connecting with the world through social media
networking.
(7) Even if the technology is provided, most of the people
working at the ground level during crisis do not
understand the usage of social media and are not very
comfortable in disseminating information through
social media.
(8) Training the professionals who hail from different strata
of society for using social media in disaster time can be
a huge task.
(9) Network connectivity issues are common in the higher
altitudes in India and this denitely means that not
many people are exposed to social media who live in
hills.
As the nal conclusion researchers would like to submit
that social media if utilised in a streamlined and objective
manner can prove to be constructive tool in mitigating the
post disaster complications in any eventuality. The focus of
all the stakeholders needs to be on the maximum utilisation
of the platform in a restrained way so as to drive maximum
benets without confounding the chaos and uncertainty.
Social Media and Disaster Management in India 355
References
1. Ramani, S.: The story of how the internet came to India: an
insiders account (14 Aug 2015). Retrieved from News18.com:
http://www.news18.com/news/tech/the-story-of-how-the-internet-
came-to-india-an-insiders-account-1039533.html
2. Verma, L.K., Goyal, R.: Internet penetration and e-commerce
developments in India. Int. J. Innovations Adv. Comput. Sci.
(4 May 2015) (Special Issue). Retrieved from http://www.
academicscience.co.in/admin/resources/project/paper/
f201505031430646289.pdf
3. TRAI: TRAI Annual Report 201516. Telecom Regulatory
Authority of India, New Delhi (2016)
4. Dugdale, J., Van de Walle, B., Koeppinghoff, C.: Social media and
SMS in the Haiti earthquake. In: WWW 2012 Companion
SWDM12 Workshop. ACM, Lyon (2012). Retrieved 08 09 2017
from https://www.researchgate.net/publication/241624291_Social_
media_and_SMS_in_the_Haiti_Earthquake
5. Oh, O., Kwon, K.H., Rao, R.H.: An exploration of social media in
extreme events: rumor theory and twitter during the Haiti
earthquake 2010. In: Thirty First International Conference on
Information Systems. Gateway to the Future, St. Louis (2010)
6. Google Person Finder: Wikipedia. https://en.wikipedia.org/wiki/
Google_Person_Finder. Accessed July 2017
7. Vince: How google person nder helps in times of disaster (14
Nov 2013). Retrieved from Vulcan Post: https://vulcanpost.com/
1765/google-person-nder-helps-times-disaster/
8. Li, L., Goodchild, M.F.: The role of social networks in emergency
management: a research agenda. Int. J. Inf. Syst. Crisis Response
Manage. 2(4), 4959 (OctDec 2010)
9. Pew Research Center Journalism & Media: Social media aid the Haiti
relief effort (21 Jan 2010). Retrieved from journalism.org: http://
www.journalism.org/2010/01/21/social-media-aid-haiti-relief-effort/
10. Charlwood, J.: Use of social media during ood events. ood-
plainconference.com. (2012). Retrieved from http://www.
oodplainconference.com/papers2012/Jilly%20Charlwood%
20Full%20Paper.pdf
11. Bird, D., Ling, M., Haynes, K.: Flooding facebookthe use of
social media during the Queensland and Victorian oods. Aust.
J. Emerg. Manage. 27(1), 2733 (2012). Retrieved 08 10 2017
from https://riskfrontiers.com/pdf/ooding_facebook.pdf
12. Sykes, E.: Emergency 2.0: how social media proved itself in the
Queensland oods (2011). Retrieved from http://www.abc.net.au;
http://www.abc.net.au/local/audio/2011/04/05/3182906.htm
13. Media and Public Affairs Branch, Queensland Police Service:
Queensland police service: disaster management and social media
a case study. Creative Commons Attribution (n.d.)
14. Queensland police servicedisaster management and social media
a case study (n.d.). Retrieved from police.qld.gov.au: https://
www.police.qld.gov.au/corporatedocs/reportsPublications/other/
Documents/QPSSocialMediaCaseStudy.pdf
15. Chandrashekar, G., Sampath, N.: Social media and disaster
management. Global Media J. Indian Ed. Students Res. 7(1) (June
2016)
16. PTI: Ola launches boat service in ood-affected Chennai (17 Nov
2015). Retrieved from gadgetsnow.com: http://www.gadgetsnow.
com/tech-news/Ola-launches-boat-service-in-ood-affected-Chennai/
articleshow/49816195.cms
17. IANS: Chennai oods caused economic loss of $2.2 bn: study (30
Mar 2016). Retrieved from timesondia.indiatimes.com: http://
timesondia.indiatimes.com/city/chennai/Chennai-oods-caused-
economic-loss-of-2-2-bn-Study/articleshow/51618326.cms
18. Fernandes, S.: Chennai oods: how social media and crowd-
sourcing helps people on ground (5 Dec 2015). Retrieved from
https://www.oneindia.com/india/chennai-oods-rescue-operations-
social-media-technology-twitter-1947228.html
19. Pradnya: Digital marketing blog. (17 Dec 2015). Retrieved from
http://www.digitalvidya.com;http://www.digitalvidya.com/blog/
how-social-media-helped-during-chennai-oods-as-a-disaster-
management-tool/
20. National Research Council: Successful Response Starts with a
Map: Improving Geospatial Support for Disaster Management.
National Academies Press, USA (2007)
21. Social media and the Queensland oods (2017). Retrieved from
publicrelationssydney.com.au: https://publicrelationssydney.com.
au/social-media-and-the-queensland-oods/
22. Allerin: Big data in disaster management (17 May 2017).
Retrieved from Allerin.com: https://www.allerin.com/blog/big-
data-in-disaster-management
23. Murray, J. (ed.): Managing Crises and Disasters with Emerging
Technologies: Advancements. IGI Global (2012)
24. Worldometers: India population (LIVE) (16 Aug 2017). Retrieved
from Worldometers: http://www.worldometers.info/world-
population/india-population/
25. Kalson, D.: Pros and cons of social media before, during and after a
crisis. (01 Sept 2015). Retrieved from Preparedex: http://www.
preparedex.com/pros-and-cons-of-social-media-before-during-and-
after-a-crisis/
356 D. Giri and A. Vats
Strengthening Your Social Media Marketing
with Live Streaming Video
Matthew A. Gilbert
Abstract
With more than 3 billion users worldwide, social media
has transformed marketing; it offers individuals and
organizations alike the ability to effectively and afford-
ably attract, convert, and transform consumers. Mirroring
the growth of social media (and in many ways fueling it)
are mobile devices: there are more than 5 million unique
mobile users worldwide with nearly 2.8 million people
accessing social media with mobile devices and 80% of
worldwide internet users owning at least one smartphone.
Mobile video is a particularly promising platform to
communicate to consumers; 80% of Internet trafc will be
video by 2019 and 74% of consumers are more likely to
buy a product or service after watching a branded video.
However, recorded video is costly and cumbersome to
produce; live streaming video decreases costs while
increasing customer engagement and enhancing inu-
ence. Recognizing that live streaming video can
strengthen social media marketing strategies, this paper
reviews the rise of social media, explains the role of live
streaming video, previews live streaming video platforms,
proposes live streaming video strategies, shares live
streaming video survey results, and evaluates the impact
of live streaming video.
Keywords
Content marketing Facebook Instagram
Live streaming video Marketing Mobiles
Smartphones Social media marketing
Periscope
1 Introduction
Social media offers individuals and organizations alike a
marketing channel with which they can effectively and
affordably attract, convert, and transform consumers [1].
With more than 3 billion social media users worldwide [2],
social media has arguably transformed modern marketing.
Mirroring the growth of social media (and in many ways
fueling it) are mobile devices. Kemp [3] reports more than 5
million unique mobile users worldwide with nearly 2.8
million of those individuals actively using their mobile
devices to access social media.
Given this, marketers should create content for consumers
using portable digital devices. Mobile video is a particularly
promising platform: 80% of Internet trafc will be video by
2019 [4] and 74% of consumers are more likely to make a
purchase after watching a branded video [5]. However,
recorded video is costly and cumbersome to produce; live
streaming video increases engagement and decreases costs
while increasing inuence [6].
Recognizing that individuals and organizations alike can
strengthen their social media marketing with live streaming
video, this paper reviews the rise of social media, explains
the role of live streaming video, previews live streaming
video platforms, proposes live streaming video strategies,
shares live streaming video survey results, and concludes by
discussing the risks and rewards of live streaming video.
2 Rise of Social Media
More than 3 billion people40% of the global population
actively use social media; with one million new users per
day worldwide this growth shows no indication of slowing
down [2]. Looking at the Middle East, 93 million people use
social media; within this population the United Arab Emi-
rates boasts 9,200,000 social media users (99% penetration)
[3]. Embraced by consumers, social media has arguably
M. A. Gilbert (&)
American University in the Emirates, Dubai,
United Arab Emirates
e-mail: matthew.gilbert@aue.ae
©Springer Nature Switzerland AG 2019
A. Al-Masri and K. Curran (eds.), Smart Technologies and Innovation for a Sustainable Future,
Advances in Science, Technology & Innovation, https://doi.org/10.1007/978-3-030-01659-3_42
357
transformed marketing while offering benets and presenting
unique risks to marketers.
Benets of social media include: gaining customer
insights, increasing brand awareness and loyalty, running
targeted ads with real-time results, generating higher con-
verting leads, providing rich customer experiences, increas-
ing website trafc and search ranking, learning about your
competitors, sharing content faster and easier, creating
geotargeted content, and building relationships [7].
But with benets come risks; common challenges and
obstacles include: connecting authentically with your audi-
ence, creating a social media marketing strategy, managing
organic reach, creating consistently high-quality content,
distributing content to a large audience, encouraging sharing,
supporting intuition with data, creating quality visuals, pri-
oritizing projects, and picking the right platform [8].
Because there are so many social media platforms its
tough for marketers to know where to align their efforts.
Consumers have more difculty differentiating the many
messages they receive via social media on a daily basis. Its
therefore important to focus on the most popular platforms
while delivering the most customer-friendly content.
Marketers can balance the benets and risks of social
media across a plethora of platforms. As presented by Kemp
[2], Facebook dominates social media with more than 2
billion active monthly users; this is followed by YouTube
(1.5 billion), WhatsApp (1.2 billion), Facebook Messenger
(1.2 billion), Chinese mobile text and voice message app
WeChat (938 million), Chinese instant messaging service
QQ (861 million), Instagram (700 million), Chinese social
network Qzone (638 million), Tumblr (357 million), and
Twitter (328 million).
These numbers indicate strong growth among messenger
apps, but tracking their performance country-by-country is
difcult because they dont publish their user numbers for
individual markets consistently [2]. Nevertheless, as Dunn
[9] claries, more people use messaging apps than social
networks thanks to more affordable devices, falling data
costs, and innovative and fun features,(para. 2). This
growth correlates to increased use of articial intelligence
and bots by marketers in messenger apps; there are currently
more than 100,000 bots on Facebook alone performing
various functions including brand awareness, customer ser-
vice, content delivery, product purchases, travel and trans-
portation information, and more [10].
Mirroring the growth of social media (and in many ways
fueling it) are mobile devices. Worldwide there are more
than 5 billion mobile users (67% penetration) with nearly 2.8
billion of those using mobile devices to access social media
[2]. More than 650,000 new mobile users are added daily,
adding to the population of mobile device users worldwide
that consumes more than 2.3 GB of data monthlya 70%
year-on-year increase from June 2016 [2].
In the Middle East, mobile devices play an even bigger
role in daily life: there are more mobile phone subscriptions
(312 million) than people (246 million); within that popu-
lation, 83 million people actively use social media via
mobile devices [3]. Radcliffe [11] elaborates that for many
users, mobile is the only way that they interact with social
networks,(p. 3).
3 Role of Live Streaming Video
Video has emerged as one of the most effective forms of
social media content; mobile video is a particularly
promising. Research reveals 55% of consumers prefer video
over other forms of content including blogs, long form
articles, podcasts, and research [12]. Ross [13] further shares
that an average video post generates 135% more organic
reach than a photo post.
Video is being consumed at an ever-increasing rate: the
number of daily video views on Facebook doubled to 8
billion while the number of video posts increased 94% in the
US and globally [14]. Additionally, 74% of consumers are
more likely to make a purchase after watching a branded
video [5]; 46% of those surveyed have done so. This aligns
with the projection that 80% of all Internet trafc will be
video by 2019 [4].
However, while it is an effective medium for marketers,
video can be both costly and cumbersome to produce.
Conversely, live streaming video offers an affordable and
efcient alternative option [6]. Given that audiences expect
live streaming video to be less polished than recorded video,
[6] live video is likely to yield increased engagement and
decreased production costs.
Echoing this idea, Facebook Founder Mark Zuckerberg
emphasizes, live videogives people more intimate
environments and more raw environments where you have a
reason to just be yourself. It doesnt need to feel like its
super curated,[14]. Further to Zuckerbergs point, consider
that consumers spend three times longer watching live video
than video that was recorded [15].
Adding to this insight, Golum [16] reports several facts
including: 80% of people prefer live video to reading a blog,
81% watched more live video in 2016 than in 2015, 82%
prefer live video to posts; live video outpaced the growth of
other online video with 113% increase in ad sales.
Considering 80% of worldwide internet users own a
smartphone [17], marketers should create video content
while keeping in mind that a large percentage of their
audience will be watching their videos on mobile devices.
This concept connects to live streaming video because a
majority of videos that are streamed live are created by
individuals with handheld mobile devices. While handheld
mobile devices are the rst of four levels of live streaming, it
358 M. A. Gilbert
is nonetheless a common entry point for individuals and
organizations streaming live videos [18].
Stelzner [19] explains that live streaming video is
attractive to consumers because, when people are watching
you on live video, they know youre not faking itWhen
you offer something in a live video, its easier to sell it
because youre not really selling. When somebody asks a
question, your answer proves the value of your products or
services,(para. 17 and 18).
The popularity of live streaming video is ever-increasing.
Yeung [20] reports that Periscope, Twitters live streaming
video app, hosted 200 million broadcasts in its rst year with
users watching more than 110 yearsworth of live video
daily. Further, viewership increased 91% in the second half
of its rst year [20].
4 Live Streaming Video Platforms
Given the aforementioned information the question is not if a
marketer should embrace live streaming video, but with
which platform? There are several live streaming video
platforms; some popular options closely connected with
social media platforms include:
Facebook Live
Facebooks live video system launched in April 2016. Users
can broadcast live from a smart phone or other device and
publish their video to the newsfeed of their prole or page
[21].
Instagram Live
Launched in November 2016 Instagrams live video plat-
form allows users to share a live video with their followers in
real time and for 24 hours after the initial broadcast via
Instagram Stories [22].
Periscope
A mobile live-streaming app founded in 2014 that lets users
shoot and broadcast video in real time and makes them
available online for another 24 hours; purchased by Twitter
in March 2015 [23].
Vimeo Live
After purchasing live video streaming platform Livestream,
Vimeo will integrate its features, enabling video creators to
capture, edit, stream and archive their live events [24].
YouTube Live
A feature that allows a user to stream video from a mobile
device, webcam, or desktop to host webinars, broadcast
vlogs, and more in real time [25].
5 Live Streaming Video Strategies
Leveraging live streaming video requires a strategy tied to
organizational goals and linked with key performance indi-
cators. Strategies will differ among the organizations using
it, but all strategies should address four components: Con-
tent, Equipment, Production, and Broadcasteach is
explained in greater detail below.
5.1 Content Strategy
The content you share using live streaming video should
align with organizational goals and marketing objectives.
Broadcasters also need to remain mindful of which platforms
their target audience is most likely to use and the type of
content from which they would gain the most value.
Timoteo [26] suggests 14 general types of live streaming
video content strategies including the following:
Broadcasting live events.
Conducting an interview.
Crowdsourcing feedback.
Demonstrating your sense of humor.
Giving a behind-the-scenes peek.
Giving a project status update.
Hosting training seminars or courses.
Introduce new products or services.
Inviting customers to submit reviews.
Offering customer service help.
Running a contest or launching a game.
Scheduling a question and answer hour.
Setting customer service expectations.
Showing how your product is created.
5.2 Equipment Strategy
Once the topics for a live video stream are dened through a
content strategy, Petrucci [18] lists four levels of equipment
from which to choose to broadcast live video:
Level 1, The Sele Stream: The simplest method of live
broadcasting, this level involves holding a mobile device
Strengthening Your Social Media Marketing 359
by hand. While the easiest avenue of entry, the video can
be shaky (unless a tripod is used) and the audio is limited
to what is native to the device. This level is ideal for
informal and random videos sharing something fun.
Level 2, Phone and Extra Gear: This level involves
adding an external microphone, light, and video stabi-
lizer to a phone; the cost is approximately $200. Con-
sidering that, we often see with our ears: high-quality
audio can improve low-quality video; likewise,
low-quality audio can make high-quality video seem
amateur,[27], these changes will certain strengthen the
quality of the stream.
Level 3, Live from a Computer: This level involves
shifting from a handheld device to a desktop computer. It
ensures a much higher quality stream, but it is a much
more complicated endeavor that requires software such
as Open Broadcast Software (OBS) or Wirecast, but both
add a watermark to your video unless you are prepared to
license the software. The computer used must also be a
high-quality machine and the broadcaster must have an
advanced degree of technical aptitude.
Level 4, TV Quality from a Dedicated Streaming System:
This level offers professional grade quality broadcasting,
but requires advanced technical skill and a signicant
nancial investment. Everything can be customized with
full control over branding and the user experience of the
live video stream. A dedicated machine is needed to
produce the live stream and only professionals should be
involved.
5.3 Production Strategy
Once topics for a live video stream are dened in a content
strategy and an equipment strategy is determined, Stelzner
[19] suggests following a four-part live streaming video
production strategy based on ideas from Petrucci [18]:
Part 1: Produce a show reliably once a week on the same
day, at the same time.
Part 2: Stream randomly in real time twice weekly on a
different day than the weekly broadcast; this leads to
audience loyalty which can be converted into revenue.
Consider eventually sharing behind-the-scenes content
daily.
Part 3: Repurpose recordings of live videos into other
forms of edited content such as podcasts, YouTube
videos, or any other media that align with the live
streaming strategy; consider boosting a recorded live
video on Facebook or sharing it via email.
5.4 Broadcast Strategy
Stelzner [19] offers insights into a broadcast strategy that
might help an individual on camera settle nerves and manage
their adrenaline. The steps include the following:
Start with a short tease to get things started and give time
for your audience to arrive.
Welcome your audience, referring to them collectively
by a unique name of choice.
Inform your audience what you are going to do or teach
them in your live broadcast.
Ask your audience a question and ask them to share their
responses as a comment.
Engage with the audience following their responses and
replies to your question.
Restate the videos topic and share the promised infor-
mation with your audience.
Conclude the show with a call to action that is tied to a
specic goal or strategy.
5.5 Live Streaming Video Survey
Golum [16] stresses quality content is the motivator for
successful live streaming video. With the three facets of live
streaming video strategy now dened, additional insight can
be gained by exploring different (and similar ways) live
streaming video is used in real-world situations by reviewing
results of a live streaming video survey.
5.6 Methodology
To better understand how different individuals and organi-
zations have embraced live video streaming, a survey was
created and a selected group of participants was invited to
complete it. The survey, which was originally designed for a
book chapter project that was not completed, was made
available on Google Docs as a form with ten questions, two
of which were optional. The questions include the following
[28]:
1. Which live streaming video platform(s) do you use?
2. Why do you use live streaming videos to market your
products/services?
3. Which products/services do you market with live
streaming videos?
4. How do you market your products/services with live
streaming videos?
360 M. A. Gilbert
5. Who is the target market of your live streaming videos?
6. How do you promote your live streaming videos?
7. How frequently do you broadcast live streaming
videos?
8. With which metrics do you evaluate your live streaming
videos?
9. Describe a success you have experienced using live
streaming videos to market your products/services.
(Optional)
10. Describe a challenge you have faced using live
streaming videos to market your products/services.
(Optional)
5.7 Participants
Five participants were invited to complete the survey; they
submitted their answers between July 30, 2016 and
December 6, 2016. Although the small number of responses
hinders generalizing ndings or making broad recommen-
dations, the answers offer a qualitative look into the live
streaming video strategy of ve different individuals and
organizations across an array of industries and locations, as
follows:
American University in the Emirates (AUE): A privately
owned university in Dubai, United Arab Emirates
licensed by the UAE Ministry of Education to offer
undergraduate and graduate degrees in seven colleges.
This survey was completed by Ms. Nadia Al-Dhahir,
who was working as a content writer at the time she
completed the survey, but has since left the university.
Marketing Melodie: The San Diego, California digital
marketing and social media training agency of Mrs.
Melodie Tao Girvin.
Mike Garson Productions: The Los Angeles, California
production company of Mr. Mike Garson, a classically
trained jazz and rock pianist who has worked with David
Bowie, the Smashing Pumpkins, Nine Inch Nails, and
numerous symphonies. This survey was completed by
Mr. Mark Bakalor, manager of Mike Garson
Productions.
Satisfactionist Consulting: The San Francisco, California
consulting agency of Dr. Ben Olmos, Ph.D., an adjunct
professor, business consultant, and public speaker.
Scott Monty Strategies: The Ann Arbor, Michigan con-
sulting agency of Mr. Scott Monty, the CEO and
Co-Managing Partner at Brain+Trust Partners, and
Former Global Digital & Multimedia Communications
Manager at Ford Motor Company.
5.8 Findings
Given the small sample size of this survey (for which each
participants answers are shared in the Appendix) it is dif-
cult, if not irresponsible, to draw conclusions. However, the
responses do offer insights into actual use cases of live
streaming video and therefore provide value. Each question
is shared in a table in the Appendix with the answers from
each participant presented either as they were submitted, or,
in some cases, minimally edited for clarity and expediency.
6 Conclusion
Reviewing the live streaming video survey results it is clear
that, while there are similarities among live streaming video
broadcasters, there is not a one size ts allapproach.
Savvy marketers will develop a strategy aligned with the
goals of the individual and organization for which they are
broadcasting content.
Given the relative newness of the medium and the evo-
lution of each platform it is reasonable to recommend that
exibility and adaptability are two key characteristics that
are ideal to embrace. Ultimately, a combination of
well-dened strategy mixed with improvisational efforts
should yield a good balance and lead to content that is both
engaging and relevant. In understanding the present impact
and future potential of live streaming video it is also
important to consider its positive and negative.
There is certainly signicant merit to the medium. As noted
by Hertzberg [29], live video will continue to prove a
rewarding and highly engaging way to connect with con-
sumers. As more brands go live, we will continue to witness
creative and groundbreaking new ways to connect with audi-
ences and customers in an authentic and seamless way,(p. 3).
However, live streaming video is not without its risks.
Chief among them are ethics and privacy concerns in addi-
tion to legal and law enforcement issues. Dewey [30] cau-
tions, rawness is fast emerging, in fact, as the central
paradox of live streaming: The very intimacy and immediacy
that make the medium attractive are also the things that make
it almost impossible to keep clean(p. 1).
As for suggestions for future research it would be bene-
cial to further explore the use of live streaming video
within specic market segments and industries, taking a
Strengthening Your Social Media Marketing 361
deeper dive to more thoroughly understand how it is and
could be used. It would also be interesting to investigate a
specic regions current and potential use of live streaming
video and to compare differences between different regions
and cultures.
Additional research should also be conducted to ascertain
the usefulness of live streaming video as a tool for improving
accountability and increasing transparency in both the public
and private sectors within smart cities. Whatever is next for
live streaming video it will almost certainly push boundaries
culturally, professionally, and personally while expanding
capabilities technologically and economically.
Appendix
See Tables 1,2,3,4,5,6,7,8,9and 10.
Table 1 Which live streaming video platform(s) do you use?
Participant Response
American University in the Emirates Facebook Live
Marketing Melodie Facebook Live
Snapchat Live Stories
YouTube
Mike Garson Productions Facebook Live
Satisfactionist Consulting Facebook Live
Google Hangouts
YouTube
Scott Monty Strategies Facebook Live
Table 2 Why do you use live streaming videos to market your products/services?
Participant Response
American University in the
Emirates
It helpspeopleknow an event is happening if they have missed any advertisementsit brings more
engagement
Marketing Melodie It gives people a behind the scenes look into my business. Theyfeel like they are a part of my team. It also
humanizes my brand and develops a stronger connection because they are seeing raw footage of me live, just
like if they were right next to me
Mike Garson Productions The immediate connection with Mikes fans is powerful. We can launch a live broadcast on either Periscope or
Facebookand immediately be connected with his followers on the platforms. They allow for back and forth
communication and instant feedback and provide content we can use down the line
Satisfactionist Consulting Live mediacreates a greater level of engagement and intimacy with my audience. It makes me as a brand
more genuine and allows people to get to know me in a way in which print media and websites cant match.
Live streaming allows my audience to see not just what I do but how I do it. They also get to participate in the
process
Scott Monty Strategies To provide a preview for a weekly publication and to create a personal connection with my audience
Table 3 Which products/services do you market with live streaming videos?
Participant Response
American University in the
Emirates
Mostly events for the university
Marketing Melodie I use it to promote my personal and professional brand, Marketing Melodie. I live stream speaking
engagements to promote my speaking services
Mike Garson Productions Weve used them with the intention of reaching fans, sharing stories and increasing his audience which has had
the extra benet of organically marketing his products and services including his biography, albums and
writing, and performance services
Satisfactionist Consulting I am marketing my subject matter expertise through the art of conversation with others who are relevant in my
eld of study, which is business. Through conversation Ihelp others engage and learn, showcase my own
knowledge and insights, and promote the guestsand the work they are doing
Scott Monty Strategies My newsletter (and by extension, my consulting/speaking practice)
362 M. A. Gilbert
Table 4 How do you market
your products/services with live
streaming videos?
Participant Response
American University in
the Emirates
By showing the physical building and the students and facultystudents
are able to get an insight into how it feels to study at the university
Marketing Melodie I use it to build relationships and engage with my audience so they see me
as a resource and trust worthy brand. This way when they do need my
services, I will be top of mind
Mike Garson Productions Mike is his own amazing walking, talking, playing product. We dontdo
any hard selling via our live streaming broadcasts, though they certainly
help to gain interest, awareness, and increase his audience
Satisfactionist Consulting To promote my work and engage potential clients I started doing a podcast,
which focuses on interviewing entrepreneurs, business leaders, and
academic professionals
Scott Monty Strategies I mention the newsletter outright and provide a subscription link in the
slates and in the description of the video. The rest is implied
Table 5 Who is the target
market of your live streaming
videos?
Participant Response
American University in
the Emirates
Prospective students, 1635 years old
Marketing Melodie Professionals who are entrepreneurs, service professionals, and business
owners
Mike Garson Productions Fans of Mike and David Bowie looking to hear stories, music, and
information about available products, upcoming concerts, and more
Satisfactionist Consulting For my consulting services I am targeting males and female between 35 and
55 who are managers, senior leaders, and or owners of organizations. For
my podcast I focus on males and females between the ages of 1865 who
are entrepreneurs, business leaders, academic professionals, and college
students who are interested in topics related to business
Scott Monty Strategies General business people
Table 6 How do you promote
your live streaming videos? Participant Response
American University in
the Emirates
By doing as many as I can. This way people start to ask if a future event will
be on Facebook Live
Marketing Melodie I use Facebook, Instagram, LinkedIn, and Twitter to promote my live
streaming videos. I also send out past streams to my email list
Mike Garson Productions A majority of our publicity is done via announcements on Facebook,
Twitter, and MikeGarson.com in addition to the internal promotion of
launching a live broadcast with tens of thousands of followers
Satisfactionist Consulting I promote each episode to my followers on Facebook both on my public
prole and on my podcasts Facebook page. In between live streaming
events I also promote each podcast episode by boosting each post using
Facebook ads
Scott Monty Strategies Twitter, Facebook, website, and newsletter
Table 7 How frequently do you
broadcast live streaming videos? Participant Response
American University in the
Emirates
About twice a week
Marketing Melodie 46 times a month
Mike Garson Productions Depends on whats going on in the world and when Mikes schedule
allows
Satisfactionist Consulting I do a live stream once a week in support of my podcast and business
overall
Scott Monty Strategies Once a week
Strengthening Your Social Media Marketing 363
Table 8 With which metrics do
you evaluate your live streaming
videos?
Participant Response
American University in
the Emirates
Facebook analytics
Marketing Melodie Analytics on my website and Facebook Insights
Mike Garson Productions Facebook and Periscope provide internal analytics specic to broadcasts,
coupled with our standard website and store analytics
Satisfactionist Consulting I am currently using the view count on YouTube, which is where my
Hangouts On Air get published but I also monitor downloads of my
podcast, engagements on Facebook, and views to my business web page to
for additional insights
Scott Monty Strategies Mostly on views and on the level of engagement with comments
Table 9 Describe a success you
have experienced using live
streaming videos to market your
products/services? (Optional)
Participant Response
American University in
the Emirates
The enrolled students accelerated and the university name became better
known
Marketing Melodie I have received more views and shares on my Facebook Live updates on my
business page than other posts. Iget more visibility and brand awareness
Mike Garson Productions No answer
Satisfactionist Consulting Using Facebook ads my posts are reaching a broader audience around the
country as well as other parts of the world I would not have initially thought
would be interested in my podcast. Each month we are learning more about
how to engage the right audience and interest in the show is gaining
momentum. Each week we test new targeting methods and new ways of
publishing posts to gain interest in what we are doing. In our rst month we
had over 500 downloads from around the United States as well as placed we
never thought about like Netherlands, Italy, Dubai, Canada, and the UK
Scott Monty Strategies No answer
Table 10 Describe a challenge
you have faced using live
streaming videos to market your
products/services? (Optional)
Participant Response
American University in
the Emirates
As they are live videos, a lot can go wrong such as someone saying
something inappropriate
Marketing Melodie No easy way to save and edit the videos for later use
Mike Garson Productions Despite using the latest phone hardware, video and sound quality havent
been the best. Wereworking with more advanced video and sound
hardware to provide multi camera broadcasts with improved sound quality
to enhance our audiences experience
Satisfactionist Consulting Using Google Hang Outs On Air was not as intuitive as I would had
hopedI had to be sure I was logged into my primary business account
with GoogleI had to authorize my Google Apps account to allow me to
setup a YouTube Channel andto use Google Hangouts. I also had to
allow my account to be associated with Google+ Because my partner did
not have an email account with the same domain name as my companyI
had to authorize Google Hangouts to send him an email outside the
companyI tried using Facebook Live Stream along with Open Broadcast
Software (OBS) but it was a tremendous resource drain on my computer and
created difcultiesto simultaneously live stream and tape my podcast
form the same computer. I ended up getting feedback loops with the
audioI also tried using an iPhone on a tripod to live stream but this would
not allow my viewers to hear who I was interviewing or interact with the
show. Another optionwas to record my Skype conference calls and
publish them on YouTube but this does not allowaudience participation
Scott Monty Strategies Im always concerned with the production value. As a solo practitioner, it
can be difcult to get everything set up and act as director, producer, writer,
and engineer, all while being the on-air host. Ive managed to integrate OBS
to allow me to be more creative and offer higher production values by
streaming from my desktop web cam
364 M. A. Gilbert
References
1. Hyder, S.: The Zen of Social Media Marketing, 4th edn. BenBella
Books, Dallas, TX (2016)
2. Kemp, S.: Number of social media users passes 3 billion with no
signs of slowing. The Next Web (2017). Retrieved from https://
thenextweb.com/contributors/2017/08/07/number-social-media-
users-passes-3-billion-no-signs-slowing/
3. Kemp, S.: Digital in 2017: global overview. We Are Social (2017).
Retrieved from https://wearesocial.com/special-reports/digital-in-
2017-global-overview
4. Cisco: Cisco visual networking index: forecast and methodology,
20142019 white paper. Cisco, San Jose, CA (2015). Retrieved
from http://www.cisco.com/c/en/us/solutions/collateral/service-
provider/ip-ngn-ip-next-generation-network/white_paper_c11-
481360.html
5. The Science of Social Video (2016). Retrieved from https://go.
brightcove.com/marketing-social-research
6. Piontek, K.: The periscope trend: using live video in content
marketing. Articulate Inbound Content Marketing (2016).
Retrieved from http://www.articulatemarketing.com/periscope-
live-video-in-content-marketing
7. Copp, E.: 10 benets of social media for business. Hootsuite Blog
(2016). Retrieved from https://blog.hootsuite.com/social-media-
for-business/
8. Peters, B.: Solving the 10 most common social media marketing
challenges. Buffer Social (2016). Retrieved from https://blog.
bufferapp.com/solving-the-10-most-common-social-media-marketing-
challenges
9. Dunn, M.: Why messaging apps and bots are the future. Likeable
Blog (2017). Retrieved from https://www.likeable.com/blog/why-
messaging-apps-and-bots-are-the-future
10. Mathison, R.: Facebook messenger bots for business: a guide for
marketers. Hootsuite Blog. (2017). Retrieved from https://blog.
hootsuite.com/facebook-messenger-bots-guide/
11. Radcliffe, D.: Social media in the middle east: the story of 2016.
Social Media in the Middle East. Damian Radcliffe, Eugene,
Oregon (2016). Retrieved from https://damianradcliffe.wordpress.
com/2016/12/07/report-social-media-in-the-middle-east-the-story-
of-2016/
12. An, M.: The future of content marketing: how people are changing
the way they read, interact, and engage with content. Hubspot
(2016). Retrieved from https://research.hubspot.com/reports/the-
future-of-content-marketing
13. Ross, P.: Native facebook videos get more reach than any other
type of post [Blog] (2015). Retrieved from https://www.
socialbakers.com/blog/2367-native-facebook-videos-get-more-
reach-than-any-other-type-of-post
14. Mohan, P.: Mark Zuckerberg: soon, the majority of content we
consume will be video. Fast Company (2016). Retrieved Mar 27
2016 from http://www.fastcompany.com/3057024/fast-feed/mark-
zuckerberg-soon-the-majority-of-content-we-consume-will-be-video
15. Savage, J.: Top 5 video marketing trends for 2016 [INFO-
GRAPHIC]. SocialMediaToday (2016). Retrieved from http://
www.socialmediatoday.com/marketing/top-5-video-marketing-
trends-2016-infographic
16. Golum, C.: 62 must-know live video streaming statistics. The
Stream (2016). Retrieved from https://livestream.com/blog/62-
must-know-stats-live-video-streaming
17. Miles, G.: 8 Mobile marketing stats to help you plan for 2016
(2016). Retrieved from http://www.socialmediatoday.com/
marketing/8-mobile-marketing-stats-help-you-plan-2016
18. Petrucci, L.: The new 4 levels of LIVE streaming! (2018).
Retrieved from https://livestreamingpros.com/the-new-4-levels-of-
live-streaming/
19. Stelzner, M.: Live video strategy: how to create a show that
engages. Social Media Examiner (2017). Retrieved from https://
www.socialmediaexaminer.com/live-video-strategy-how-to-create-
a-show-that-engages-luria-petrucci/
20. Yeung, K.: Twitters periscope broadcasts 200 million streams in
its rst year. VentureBeat (2016). Retrieved Mar 30 2016 from
http://venturebeat.com/2016/03/28/twitters-periscope-broadcasts-
200-million-streams-in-its-rst-year/
21. Bernazzani, S.: How to use facebook live: a bookmarkable guide.
Hubspot (2016). Retrieved from https://blog.hubspot.com/marketing/
facebook-live-guide
22. Constine, J.: Instagram stories hits 250 M daily users, adds live
video replays. Tech Crunch (2017). Retrieved from https://
techcrunch.com/2017/06/20/instagram-live-video-replays/
23. Shieber, J., Constine, J., Constine, J., Perez, S., Lynley, M., Perez,
S., et al.: Periscope. TechCrunch (2017). Retrieved from https://
techcrunch.com/topic/company/periscope/
24. Perez, S.: Vimeo acquires livestream, launches its own live video
product. TechCrunch (2017). Retrieved from https://techcrunch.
com/2017/09/26/vimeo-acquires-livestream-launches-its-own-live-
video-product/
25. Hines, K.: How to broadcast with youtube live. Social Media
Examiner (2016). Retrieved from https://www.socialmedia
examiner.com/how-to-broadcast-with-youtube-live/
26. Timoteo, J.: 14 ways your business can successfully use
live-streaming video. Impact (2017). Retrieved from https://
www.impactbnd.com/blog/ways-to-use-live-streaming-video
27. Gilbert, M.A.: EdX E-Learning Course Development, 1st edn.
Packt Publishing, Birmingham, England (2015)
28. Gilbert, M.A.: Live streaming video survey (2016). Available at:
https://docs.google.com/forms/d/17PDfh2KG3yBcCcKW1Qhrhe1
ttSsSciQtOqFIOWQcfKI/viewform
29. Hertzberg, J.: Best practices: how to use live video to enhance
events. Adage (2016). Retrieved from http://adage.com/article/
digitalnext/practices-live-video-enhance-events/304099/
30. Dewey, C.: The (very) dark side of live-streaming that no one
seems able to stop. The Washington Post (2016). Retrieved from
https://www.washingtonpost.com/news/the-intersect/wp/2016/05/
26/the-very-dark-side-of-live-streaming-that-no-one-seems-able-to-
stop/
Strengthening Your Social Media Marketing 365
The Complexity of Governing Smart
CitiesAn Integrated Approach
Geetha A. Rubasundram
Abstract
Smart Cities are emerging as a strategy to manage the
problems generated by urban population growth and rapid
urbanization. The push for sustainable growth via the
Sustainable Development Goals (SDG), as well as the
motivation of companies to adopt the Integrated Report-
ing (IR) framework (which also echoes sustainable value
creation) interlinks the collaborative governance relation-
ship between global institutions, countries, government,
businesses and the public. The comparison of smart
governance or e-governance, to the traditional concept of
good governance is relevant to ensure consistency of
goals and motivations, across all levels of stakeholders.
This study initially identied rms recognized for their
nancial reporting, as a proxy for rm level good
governance, which were then grouped into the top ve
countries based on frequency. The countries identied
were UK (17%), Sweden (12%), Germany (11%), Japan
(11%) and France (8%). All ve countries are developed
nations and are members of the OECD and UN. The
results suggest an interesting East meets Westperspec-
tive, with each of the countries reecting different cultural
values that motivate the route to good governance. The
ve countries were initially measured using the traditional
measures of good governance and culture, and subse-
quently compared to e-governance and e-participation
indexes. Data for this research have been extracted from
reliable sources such as the World Bank, United Nations,
Transparency International, World Justice Project and
OECD. The research reports inconsistent results when
using different basis of assessments, which indicates the
lack of integration across goals and methods, differing
between platform and the genuine intent to participate or
to allow participation.
Keywords
Culture e-governance e-participation
Good governance Sustainable development goals
1 Introduction
Development has seen a signicant shift from rural to urban.
Cities are becoming overcrowded with an approximate
66.4% of the worlds population expected to reside in cities
by 2050 [1]. This is already causing sustainable issues due to
the lack of integrated and organized development. Consid-
ered as building blocks of sustainable development[1],
smart cities may be the solution for sustainable value
creation.
Smart cities should aim at to improve quality of life, as
well as the efciency and quality of services provided by
governing entities and business [2]. This implies a need for a
continuous and integrated communication cycle between
governments, rms and society for the success of sustainable
development, leading to transparency and accountability,
which in turn, forms the basis of good governance. Good
governance has long been seen as means to achieve devel-
opment and as a development objective in itself [3]. The
above mechanisms are reected in the Sustainable Devel-
opment Goals (SDG). The Organisation of Economic
Cooperation and Development (OECD) and United Nations
(UN) have moved their focus to the new set of 17 SDGs
G. A. Rubasundram (&)
Asia Pacic University, Kuala Lumpur, Malaysia
e-mail: geetharubasundram@yahoo.com
G. A. Rubasundram
University of Malaya, Kuala Lumpur, Malaysia
©Springer Nature Switzerland AG 2019
A. Al-Masri and K. Curran (eds.), Smart Technologies and Innovation for a Sustainable Future,
Advances in Science, Technology & Innovation, https://doi.org/10.1007/978-3-030-01659-3_43
367
starting from 2016 and up to 2030. Three of the goals that
are relevant to this paper include:
SDG
11
Make cities and human settlements inclusive, safe,
resilient and sustainable
SDG
16
Promote peaceful and inclusive societies for sustainable
development, provide access to justice for all and build
effective, accountable and inclusive institutions at all
levels
SDG
17
Strengthen the means of implementation and revitalize the
global partnership for sustainable development
Source [4,5]
Though the SDG is not legally binding, it is believed that
ability of civil society and citizens to pressurize governments
to embark on the goals, would lead to the success of the
goals. This reafrms the need for the integrated relationship
as posited above.
Technology provides the platform for this three-tier
integration, in lieu of the smart city development. How-
ever, the success depends on the integration of the people
process- technology, and this might be complex due to the
variety of stakeholders involved. Culture could be the driver
of this integration with the ultimate goal of change. Culture
can be a powerful driver of local development and has the
ability to promote a system wide integration of diversied
activities across a value chain (vertical integration) or across
value chains (horizontal integration) [6]. The research fur-
ther argues that legitimate stakeholders must also have the
capacity to participate, including weaker voices due to
unbalanced power distributions. This should also include
knowledge sharing as a social interaction culture [7].
Therefore, members of the public should have access to
relevant information, and be heard. The decision making
process should also be transparent and ensure the voice of
the masses is heard. But, unfortunately, the current gover-
nance structure requires minimal involvement of citizens in
decision-making [2,8], which leads to the question of
whether the smart technologies are just a platform. However,
it is imperative to note that traditional governance mecha-
nisms may be outdated, leading to the emergence of new
governance arrangements [9] which should include measures
of technology adaption as well.
To understand the complexity of the dynamics, this
research draws upon the ActorNetwork Theory
(ANT) and its application in terms of a Cultural District [6],
as well as the Actor Centred Instituionalist (ACI) theory.
ANT is a social-philosophical approach that attempts to
understand complex social situations by looking at relational
or associated elements, whilst Cultural Districts are tools for
urban planning authorities to foster the development of
urban centers and revitalizing declining neighbourhoods [6].
The research identied three main issues: (i) the
identication and involvement of key stakeholders (ii) the
maintenance of the collaboration process and (iii) the
long-term implementation of collaborative outcomes. ACI,
combines the rational choice theory and new institutional-
ism, seeking to explain policies and outcomes from inten-
tional actions of the various interdependent actors shaped by
institutional settings [9].
This research raise two crucial concerns that sets the
direction of this paper, in its aim to understand if the smart
technology is just a platform. In order to identify the
involvement of key stakeholders, this research looks at the
role of institutions in motivating the acceptance of change.
Secondly, in order to assess the maintenance of the collab-
orative process and the long-implementation of collaborative
outcomes, this research uses the proxy measures of tradi-
tional governance in comparison with a more technology
based governance measure to understand if there had been
any change over the years.
The rest of the paper is structured as follows: Sects. 2
and 3cover the literature review for the role of institutions
and the comparison of governance measures. This is fol-
lowed by the results and discussion in Sects. 4and 5, and
nally the conclusion at the end of this paper in Sect. 6.
2 Role of Institutions
The popular denition of [10] refers to institutions as any
form of constraint that human beings devise to structure
political, economic and social interaction. North [11] views
institutions as rules of the game, with rms and organisa-
tions being the players. Rasiah [12]reects the multi level
stakeholder collaborations in his research where institutions
may inuence individuals, rms and organisations condi-
tional conduct; either directly sharing the behavior of indi-
viduals and rms, or through organisations, networks and
other groupings collective action problems. Likewise, it is
possible to look at institutions from a formal and informal
perspective.
To identify the key stakeholders within the formal ele-
ment of institution, this research will reect the earlier
mentioned three-tier relationship of government, rms and
society. An additional angle would be also taken to identify
the possibility of global governance institutions such as the
OECD and UN having some sort of inuence on the changes
discussed. These global institutions indirectly inuence the
paths of their member countries, together with other insti-
tutions such as the European Union and European Com-
mission, in their quest for sustainability, accountability and
good governance, although on multilateral (non-hierarchical)
basis. Likewise, the involvement of global governance
institutions could also motivate the push towards smart
368 G. A. Rubasundram
cities. As an example, although Europe and Japan may not
have a formal agreement in place to cooperate on smart
projects, they are bound together with the commitment of the
global institutions that they belong to, as well as the various
public-private partnerships in relation to smart city projects.
Some examples of the projects include OurSpace, an open
source, social networking and Web 2.0 to encourage young
people and members of the European and National Parlia-
ments to share ideas and engage in debates that affect their
everyday life; Horizon 2020 to carry out research and
innovation activities on open government, Puzzled by Policy
which helps the public with policy matters etc.
Firms seem to be the motivating factor, playing a key role
in collaborating with the government and society. Although
as per [11]denition above, rms are deemed to be the
players, but many rms have taken the lead on the SDG
goals, actively interacting with governments to achieve the
said goals. This paper revolves around the mechanism of
communication, and hence looks at the rm as an institution,
with an assumed ability to inuence the decisions. Networks
of private rms can provide a basis of self-organisation of
society and economy, within the multilevel public-private
relationship and have the advantage of exibility over eco-
nomic governance through hierarchies [9]. Hence, the per-
spective of rms would be a starting point for this research,
based on the quality of its knowledge sharing perspective via
its reporting quality. Apart from its Corporate Social
Responsibility reporting requirements, there is a growing
attention on Integrated Reporting (IR) internationally as a
motivation for rms to re-evaluate their business strategies
and aim for sustainable value creation. IR is dened as a
concise communication on an organisations strategy, gov-
ernance, performance and prospects that would lead to short,
medium and long term value creation [13]. Apart from the
South Africa Kings III compulsion, many other countries
have embarked on motivating rms and organisations to use
this reporting framework.
Licht et al. [14] considers culture as an informal institu-
tion, as it operates as a constraint using unwritten, unspoken
rules of the game, consistent with [11]dened element.
Researchers such as [12,14,15] have discussed the role of
culture in terms of governance, absence of corruption and
rule of law. Culture as an informal institution of social norms
and underlying values; shares common elements as tech-
nology, with education (growth of knowledge) being the
acquisition of both [15]. Change could impact perceptions,
requirements and the way things are done (i.e. culture).
Although many perceive culture to be static, [15] distin-
guishes between slow-moving (e.g. culture) and fast-moving
institutions (e.g. political institutions), with slow-moving
institutions being able to inuence fast-moving institutions.
However, authorities acknowledge the challenges dealing
with the differing pace of change, complexity and the need
for integrated systems to be in place, compared to the pre-
vious silo method of administration [16]. Zhao et al. [8]
likewise nd that culture has an effect on e-government.
3 Comparing the Measures of Governance
Governance by itself in its traditional form is a complex and
multifaceted relationship. Although in essence, the meaning
of governance remains the same, the complexity of its scope
and depth has increased signicantly especially in this cur-
rent era of technology and innovation. Based on the devel-
opments in the last few years, it is signicant to question the
role of governance in lieu of this, as well as whether the
manner on good governance is characterized is sufcient to
address the movement in smart technology, rms and cities,
and eventually countries. In a traditional manner, the World
Bank views good governance as characterized by pre-
dictable, open and enlightened policy making, a bureaucracy
imbued with a professional ethos; an executive arm of
government accountable for its actions; and a strong civil
society participating in public affairs; and all behaving under
the rule of law [17]. The World Banks World Governance
Indicators (WGI) ranks countries with respect to Voice and
Accountability, Political Stability and Violence, Govern-
ment Effectiveness, Rule of Law, Regulatory Quality and
Control of Corruption. The Rule of Law, Voice and
Accountability and Control of Corruption angles are also
reected in other indexes from Transparency International
and World Justice Project. An interesting development to
further offer a robust comparison is the Sustainable Gover-
nance Index (SGI) that further aims to combine the element
of Governance and Sustainability.
Smart cities should be treated as an organic whole; as a
network and linked system [2,18]. This holistic perspective
using technology to bind systems and thinking should be used
to address public issues on the basis of multi-stakeholders [1,
19]. Building on the work of the European Smart City Project,
[19] considers a smart city is one with at least one initiative
addressing one or more of the following six characteristics:
Smart Governance, Smart People, Smart Living, Smart
Mobility, Smart Economy and Smart Environment. The same
report also mentions that the smart initiative seems to be more
focused on Smart Mobility and Smart Environment, with
Smart Governance projects being mainly implemented in
France, Spain, Germany, the UK, Italy and Sweden, with
Japan using ICT to address a range of issues such as rapidly
aging society on health care, energy shortages, environmental
challenges and public safety.
For the purpose of its relevance, this paper focuses on the
Smart Governance initiative. Manville et al. [19] describes
Smart Governance as a within city and across city gover-
nance collaboration, including services and interactions
The Complexity of Governing Smart 369
which integrate private, civil and European Community
organisations to achieve smart objectives such as trans-
parency and open data, using ICT and e-government in
participatory decision making and co-created services.
Rodriguez Bolivar [2] differentiates between institutional
conservation (traditional governance of smart cities) that
leads to a bureaucratic model; and institutional transforma-
tion (smart urban governance), which leads to a more
self-governance model. This has led to the creation of
Electronic Governance (E-Governance), Electronic
Government (E-Government) and Electronic Participation
(E-Participation) indexes, all of which aim to assess and rank
a countries governance level based on technology, which
includes as well the involvement of citizens.
The Electronic Government (E-Government) aligns the
traditional view of WGI and SDG, but by using ICT.
The SDG 2030 agenda is reected in the E-Government, as
the growth of ICT and global interconnection does not only
reduce the digital gap, but also develops knowledge societies
and hence, increasing the potential for human progress;
which in turn can promote transparency, accountability and
efciency in public service delivery via citizen engagement
[1]. With the increasing use of social media, countries are
increasingly networking and engaging with the public,
towards participatory decision making, also known as
E-Participation, which would subsequently hope to achieve
e-democracy. Improvements in E-Participation are driven
more by civic activism of the public, rather than the coun-
tries available resources or expensive technologies.
E-Participation is the process of engaging citizens through
ICTs in its policy, decision making and service design and
delivery in order to make it participatory, inclusive and
deliberative [1] shifting towards a government with you
rather than government to you, ranging from passive or
active engagement by the civil society. E-Participation can
be divided into three (3) levels: Information (Informative
Public Participation), Consultation (Consultative Public
Participation) and Cooperation (Cooperative Public Partici-
pation). Efforts to promote Whole-of Government
(WoG) service delivery and policies have to be accompanied
with efforts to ensure organisational cultures, coordination
mechanisms and nancial and accountability systems sup-
port collaboration among public institutions [1].
4 Methodology
This study analyses data extracted from secondary sources. In
order to assess a more interactive mechanism of governance,
this research assesses good governance from the initial basis
of rm level governance, to build on country proles and the
focus on smart cities. An indicator of rm level good gov-
ernance is reected in the quality of its corporate reports, as
indicated as a proxy for knowledge sharing. Using the Best
Report List2016 from ReportWatch, the research analysed
the 300 rms, and segregated the rms according to the
country of origin, taking the top ve countries based on
frequency. This database of rms was selected for this
research as the reports were submitted voluntarily to
ReportWatch, which reects the commitment of the rm to
good governance. Created in 1996, ReportWatch has fre-
quently been regarded as one of the most comprehensive and
authoritative survey on international annual reports.
Data for the country level has been obtained from trust-
worthy sources such as the World Bank, UN, OECD and other
country level data such as from municipalities or ministries.
Due to the limited research and available information to gauge
smart cities and municipalities/ministries in a robust manner,
country level indicators are used as a basis of comparison for the
complex smart city performance and governance, with quali-
tative information being used as a basis of enhancing the dis-
cussion for the municipality and local city level. Zhao et al. [8]
has also used this in their study of culture and E-Indexes.
A key indicator of good E-Governance would come from
the E-Government index. The progress of the E-Government
effectiveness has been published in nine editions United
Nations Department of Economic and Social Affairs
(UNDESA) survey, measuring effectiveness of the delivery
of basic economic and social services to people in terms of
education, health, labour and employment, nance and
social welfare and environment. The survey assesses the
e-government based on relative measures across countries in
comparison to absolute measures. The survey measures the
progress of E-Government using the E-Government Devel-
opment Index (EGDI), a composite index based on the
weighted average of three normalized indices; Telecommu-
nications Infrastructure Index (International Telecommuni-
cations Union), Human Capital Index (United Nations
Educational, Scientic and Cultural Organisation
UNESCO) and Online Service Index (Independent survey
questionnaire that assesses the national online presence of all
193 United Nations Member States). The survey question-
naire assesses a number of features related to online service
delivery, including whole of government approaches, open
government data, e-participation, multi channel service
delivery, mobile services, usage up-take, digital divide as
well as innovative partnerships through the use of ICT,
under the supervision of UNDESA. The E-Participation
Index (EPI), which forms part of the E-Government mea-
sures E-participation according to a three level model of
participation that includes E-information (provision of
information on the internet), E-consultation (organizing
public consultations online) and E-decision making
(involving citizens directly in the decision process).
The more traditional good governance indicators, as
formed by the World Bank Worldwide Governance
370 G. A. Rubasundram
Indicators (WGI) are used to assess the ve countries as
well. Although the methodology of the WGI indicators have
been questioned, researchers have still used the indicators
due to the global coverage of that they have been produced
by World Bank researchers. Data by the researchers has been
generated since 19962015. This research took the 2015
percentile rank, in order to be able to match with the time
period of the rm nancial statements recognition of 2016.
The percentile rank ranges from 0 to 100, in comparison
with a country recognized for its best practice of 100. Based
on [20] the WGI project uses six dimensions of governance:
Voice and Accountability (VA) to measure political, civil
and human rights.
Political Stability and Absence of Violence/Terrorism
(PSAVT), to measure the probability of violent threats
(including terrorism) to/or changes in government.
Government Effectiveness (GE) to measure the compe-
tence and quality of public service delivery/bureaucracy.
Regulatory Quality (RQ) to measure the regularity of
market-unfriendly policies.
Rule of Law (RoL), to measure the quality of contract
enforcement, police, and courts, in line with the prospect
of crime and violence.
Control of Corruption (CoC), to measure the possibility
of misuse of public power for private gain (i.e. bribery
and corruption).
To have a robust perception, this research also extracted
information from Transparency Internationals (TI) Corrup-
tion Perception Index (CPI). Each year, TI score countries
based on how corrupt their public sector are perceived to be,
providing a connection between corruption and inequality.
The CPI combines the perceptions of business people and
country experts from various sources to assess the level of
corruption in the public sector. The CPI 2016 is calculated
using 13 different data sources from 12 different institutions.
The data is then standardized to a scale ranging from 0 to
100, where 0 is the highest level and 100 is the lowest level
of perceived corruption, and then averaged, followed with a
standard error and condence interval [21].
The World Justice Project (WJP) takes into account nine
(9) factors to assess the Rule of Law: (1) Constraints on
Government Powers, (2) Absence of Corruption, (3) Open
Government, (4) Fundamental Rights, (5) Order and Security,
(6) Regulatory Enforcement, (7) Civil Justice, (8) Criminal
Justice and (9) Informal Justice; and further disaggregated into
forty-seven (47) specic sub-factors. The data collected from
forty-four (44) of the sub-factors from factors 1 to 8, is pro-
cessed and normalized on a 0 (lowest) to 1 (highest) scale, and
nally validated against qualitative and quantitative
third-party sources to identify any inconsistencies [22].
Not to be confused with the Sustainable Development
Goals (SDG), the Bertelsmann Stiftung Sustainable Gover-
nance Indicators (SGI) is built on three (3) pillars; Policy
Performance, Democracy and Governance. The basis of this
indicator differs from the other indicators, as in the SGI relies
on a combination of qualitative assessments by country
experts and quantitative data drawn from ofcial sources, and
undergoes a six-stage peer review to minimize the subjective
bias and ensure the validity of the assessment [23].
In order to understand the impact and change of culture,
this research uses the indicators as per the Hofstede study.
[24,25] analysed IBM employees value scores collected
between 1967 and 1973. Similar to the WGI, the Hofstede
research has also been criticized and considered outdated by
some. Since it is based on a one rm basis, it is important to
this research as it removes the rm level cultural biasness
which maybe prevalent in multi rm analysis and focuses on
a country level culture. The scale runs from 0 to 100 with 50
as a midlevel, with a score of under 50 being low and above
50 being high.
The Hofstede indicators consist of:
Power Distance (PD)The expectation and acceptance
of unequal power distribution by the less powerful
members (based on ranks and backgrounds) of a coun-
trys institutions and organisations. The higher the score
of PD, the more the acceptance of privileges.
Individualism (IN)Comparing the level of interdepen-
dence between members of the society, differentiating
between a group oriented Collectivistsociety and a more
self or immediate family oriented Individualistsociety.
Masculinity (MAS)Higher scores reects a masculine
society driven by competition, achievement and success,
with the values in built from school and continued in the
individuals organisational life. A low score (Feminine)
focuses on values such as caring for others and enjoying
a better quality of life.
Uncertainty Avoidance (UAI)Measures the threat level
felt when facing ambiguous situations, and the creation
of beliefs and institutions in the attempt to avoid the
ambiguous situation. The higher the UAI score, the more
equipped the country is to avoid any uncertain situation.
Long Term Orientation (LTO)Compares the lower
scoring normative societies that prefers to maintain tra-
ditions and the higher scoring pragmatic societies that
encourage change with a strong emphasis on education.
Indulgence (IND)Contrasts indulgencebased on
weak control and restraint of desires based on upbringing
indicating strong control.
This is then compared to current culture as discussed in
other relevant literature to understand the changes, if any.
The Complexity of Governing Smart 371
Lastly, the achievements and success of the ve countries in
terms of SDG goals as well as Smart City projects is further
discussed.
5 Findings
The countries identied are United Kingdom (UK), Sweden,
Japan, Germany and France. All are members of OECD and
United Nations (UN).
The discussion on culture is based on Table 1. Japan is
somewhat neutral in terms of its perception of PD, not
accepting or rejecting the unfairness of the system. This is
reected in their education system, with the principle that
individuals are born equal and success is achieved by hard
work. UK, Sweden and Germany do not accept unfair PD,
whilst France seems to have a higher PD, implying the
acceptance of unfairness.
The four European countries also seem to be more indi-
vidualistic, with Japan being the exception and being
somewhat group oriented. However, for masculinity, there
seems to be a gap between Japan and Sweden, with Japan
being highly masculine and Sweden being highly feminine.
Both Germany and UK are somewhat masculine, with
France at the borderline feminine. Being masculine is
reected in the drive for excellence and being possible
workaholics. Japans mild collectivism (IN), as compared to
the other four countries reects the lack individual assertion,
with competition noted more amongst groups. The unique
French combination of high PD and IN suggests that sub-
ordinates may reject formal obedience requirements, and this
could cause conicts. Swedens more feminine approach
posits a work-life balance, valuing equality and participative
style of decision-making.
Germany, Japan and France have higher LTO, with UK
and Sweden score indicating a neutral position. Japans
scores the highest for LTO, reected in its constantly high
rate of R&D investment even during economic constraints.
This reafrms its priority of sustainability over protability,
to maintain stakeholders and society in the longer term.
Germany, Japan and France score low in IND; with UK and
Sweden more indulgent in comparison. UK and Sweden also
have low UAI whilst Germany, Japan and France have high
UAI. Japans high UAI indicates good planning skills,
insinuating being prepared for any situation accordingly.
The discussion on WGI is based on Table 2. The Euro-
pean based countries score well in almost all sectors, except
for PSAVT. This is especially so with Sweden. However,
Japans scores the highest in PSAVT, whilst is the lowest
amongst the ve countries for VA. France is the lowest for
PSAVT, GE, RQ, ROL and COC, with only PSAVT
recording a signicant lower mark together with UK and
Germany. This could be due to the higher number of terrorist
attacks. Sweden is top with a perfect score of 100 for both
VA and ROL, and a close to perfect score for COC.
[23] shows Sweden in the lead, with Germany and UK
slightly trailing behind, and Japan and France lagging
behind in comparison with the other three countries. The
same pattern is noted with the Rule of Law rank, Open
Government Rank and Absence of Corruption Rank, with
the exception of UK with rank lesser than Japan for the
Absence of Corruption Rank (Table 3).
Table 1 Hofstede cultural dimensions
Country PD IN MAS UAI LTO IND
France 68 71 43 86 63 48
Germany 35 67 66 65 83 40
Japan 54 46 95 92 88 42
Sweden 31 71 5 29 53 78
UK 35 89 66 35 51 69
Source [24,25]
Table 2 Worldwide governance indicators
Country VA PSAVT GE RQ ROL COC
France 86 57 89 84 88 88
Germany 96 70 94 93 93 93
Japan 79 82 96 85 89 91
Sweden 100 81 96 97 100 99
UK 92 62 94 99 94 94
Source [26]
372 G. A. Rubasundram
Transparency International [21] is also consistent with
[23] with France and Japan lagging behind the other three
countries in terms of policy performance. In terms of
democracy, UK ranks lower than Sweden, Germany and
France. Governance ranking reects that Germany ranks
lower than UK, but much higher than Japan and France by a
wide margin. Sweden scores the best in all three pillars
(Table 4).
The ve countries score well in all three (3) E-
Government, E-Participation and Online Service Index,
based on Table 5. The United Kingdom and Japan are the
top two countries for E-Participation, with France being at
number twelve (12), and Germany and Sweden tying for
number twenty-seven (27), across the 193 United Nations
countries.
6 Discussion
6.1 The United Kingdom
The UK ranks the lowest among the ve countries resear-
ched, and positions itself at 15th out of 34 countries for the
SDG. It ranks high in terms of low rate of domestic material
consumption, among the ve most generous countries in
terms of development assistance, among the best performing
in terms of air quality and wastewater management. It scores
poorly in terms of its income gap inequality, access to
modern energy, has high levels of nitrogen and phosphorous
used in farming which harms the environment, and a high
rate of obesity. Interestingly, one of the key weaknesses as
Table 3 Corruption perception index and world justice project rule of law
Country CPI
a
Rule of law
(score)
b
Rule of law
(rank)
b
Open govt.
(score)
b
Open govt.
(rank)
b
Absence of
corruption (score)
b
Absence of
corruption (rank)
b
France 69 0.72 21 0.77 13 0.74 19
Germany 81 0.83 6 0.79 10 0.84 10
Japan 72 0.78 15 0.68 21 0.83 13
Sweden 88 0.86 4 0.84 5 0.91 5
UK 81 0.81 10 0.84 7 0.82 14
Source
a
[21]
b
[22]
Table 4 Sustainable governance index 2017
Country Policy perf.
(score)
Policy perf.
(rank)
Democracy
(score)
Democracy
(rank)
Governance
(score)
Governance
(rank)
France 6.22 16 7.08 21 6.05 26
Germany 7.39 6 8.78 5 7.04 11
Japan 5.83 23 5.80 33 6.17 24
Sweden 8.03 1 9.19 1 8.40 1
UK 6.99 8 7.29 23 7.19 9
Source [23]
Table 5 E-government, E-participation and online service index
Country E-government development index (2016) E-participation index (2016) Online service index (2016)
France 0.8456 0.8983 0.9420
Germany 0.8210 0.7627 0.8406
Japan 0.8440 0.9831 0.8768
Sweden 0.8704 0.7627 0.8768
UK 0.9193 1.0000 1.0000
Source [1]
The Complexity of Governing Smart 373
highlighted in the UK SDG Index is the failure to manage
inequality, which further corroborates with the Hofstede
cultural research; reporting a lower PD score amongst the
higher society, in comparison to the working class.
The UK government has promoted Open Data as a means
of holding the government accountable, improving the
quality of public services and creating new businesses. Some
key players and initiatives include the Public Sector Trans-
parency Board, Public Data Group and the Open Data
Institute [3]. These initiatives justify the perfect score of
1000 achieved for the Online Service Index and the
E-Participation Index for 2016. However, if comparing it to
the traditional WGI and SDG, there seems to be discrepancy
in the reporting of between traditional and technology.
This is further expanded in the [23] report. The report
supports that increasing amounts of government information
is available online with outreach campaigns targeting
specic groups. However, citizens are still reported to have
moderate level of policy knowledge. The media is broadly
independent, with reported scandals between the press and
politicians, with the government reported reluctance to
report on issues of state surveillance. The lower score on the
[23] democracy pillar however is a cause of concern, and
more efforts need to be incorporated.
6.2 Sweden
Sweden scores rst out of the thirty-four OECD countries for
the SDG. In line with its culture leaning towards being
feminine, it leads the OECD in female representation in
parliament by a good 45%. It is amongst the top three
countries to combat climate change, with good employment
rate and economic performance. However, surprisingly, it
rates low for its education especially in terms of the PISA
results where it is positioned at number 28 out of 34. It also
ranks low for energy efciency and terrestrial biome pro-
tection. Based on feminine culture and low PD, it is expected
that it would score well in terms of good governance, which
is reected in the traditional WGI and SDG. However, in
terms of technology and the assessment of E-Indexes, it
ranks 27 out of the 193 countries, which does not corrobo-
rate with the earlier results. An example of its citizen
empowering platform is the Delivery and Access to Local
Government and Services (DALI) Project in Gotenborg,
Sweden which aims to empower citizens, providing infor-
mation about the municipal processes and services, and
acting as a medium for debate.
Sweden ranks rst place in all aspects of the SGI Index,
consistent with its SDG results. Sustainable Governance
Indicators SGI [23] reports that its electoral process is well
regulated, but monitoring and disclosure policies with
regards to funding are weak. Media independence is well
protected, rule of law is strong and corruption is rare, with
growing reports of abuse at local levels. The public has a
strong interest in politics, with political party decision
making gradually becoming more open.
6.3 Japan
Japan ranks 13th out of the 34 OECD countries for the SDG.
Japan is a leader in terms of Goal 12: Consumption and
Production, Goal 4: Education and as well as healthy life
expectancy. The score for education reects on their culture
that focuses on education. They score well in the risk of
homicide, and are one of the slimmest countries of the
world. However, they perform poorly in terms of gender
equality and control of poverty. Granier and Kudo [27]in
their study of Japan differentiate between Smart Cities and
Smart Community, to which the Smart Community differs in
their focus of participation of all stakeholders among which
the citizens and behavioral change through lifestyle inno-
vation. The same research analyses the unique characteristics
of Japans democracy due to its history and culture, con-
trasting the rather passive and mostly reactive citizens prior
to the 1990s and the more institutionalized and participatory
mechanisms subsequent to the 1990s, till date. Manville
et al. [19] reports that civil society groups have increasingly
participated in expressing public concerns, however, it has
little effect on policies.
Granier and Kudo [27] also found that citizen participa-
tion is guaranteed in two processes, one where residents are
briefed before the project initiation and the other is feedback
meeting during implementation, with no direct participation
during the project design. Several interesting points were
reected during the research, especially with the expecta-
tions of the city ofcials for the citizens to cooperate, the
companies involved consider citizens not competent in ICT
and energy issues, hence the perception that the citizens
lacked legitimacy to actively participate, and should only
focus on a specic and limited set of actions. This contrasts
with the [23] report that nds that the citizen policy
knowledge is strong, which debates that it is a deliberate
attempt to not consider the public perception. This is con-
sistent with their lower WGI score for VA. Therefore, even
though Japan may be positioned number 2, after UK in the
E-Index scores, the overall use of the technology to achieve
citizen participation seems articial. This is agreed by [28]
who discusses the possibility that Japanese planners are not
aware of the global discourse on the need for citizen par-
ticipation in smart cities.
Japans efforts to increase the public trust in the gov-
ernment and media needs to improve. Increasing reports of
government control over the media and other changes to
legislation has concerned many on the growing threat of
374 G. A. Rubasundram
press freedom and public information access. This is also
linked to issues of transparency in campaign funding, with
reports of scandals [23].
6.4 Germany
Germany ranks sixth out of the thirty-four OECD countries
in the SDG. As Europes economic powerhouse, it scores
high in terms of economic performance, employment and
narrow poverty gap. It also scores well in terms of conser-
vation, low homicide rate and relatively high expenditure in
terms of research and development. However, like the UK, it
also has a level of nitrogen and phosphorous use, high risk of
pollution for soil, air and water, low protection of animal and
birds and high waste per capita.
The concept of citizen participation is not new in Germany;
with the rst citizens initiative (Bürgerinitiative) founded in
1947 to protect German forests, and subsequently grew to
prevent dominance of West German bureaucracy. The citi-
zens initiative active participation takes a more adversarial
position with increased interest caused by changes in value
and engagement with social and environmental issues. The
existence of the citizen centered municipality (Bürgerkom-
mune) and volunteer centers or citizen foundations (Bürger-
stiftungen) add value and reect the initiatives taken over the
years. A minimum of signatures of 2.517% is needed to
formally submit a demand for a local referendum including, to
rescind a council decision. Since 2005, Germany has provided
their citizens with the possibility to submit online petitions to
the German parliament, participate in online discussions and
also able to co-sign petitions [29]. Although Germany seems
to have a historical basis of citizen participation, a key hin-
drance for the further development of this is the lack of
nancial initiatives [30]. This explains that although Germany
is positioned number 27 among the E-Indexes, the VA score in
WGI is reasonably higher than the other three countries, with
the exception of Sweden.
The Berlin Smart City attaches great importance to its cit-
izens rights to self -determination with regards to informa-
tion; data protection is a fundamental right and therefore one of
the foundations of a free and democratic society. In a smart
society, it must be possible for the public to remain anony-
mous when travelling through the city i.e. to ensure data with
regards to their movement is not passed around to private
sector or state agencies. Another initiative is the proposed
E-Government law aiming to set the preconditions required to
link up all procedures. Under the E-Government law, the
participation of the urban society is supported electronically.
One example is the platform Service City Berlin 2016,a
commitment to make the city more business and citizen
friendly, transparent, participatory and efcient [31].
Sustainable Governance Indicators SGI [23] reports citi-
zens demonstrate a low average level of political knowledge,
reecting declining interest in political and parliamentary
debates and declining trust in the media. However, stake-
holders such as employers organisations and unions remain
powerful, providing a good platform for further debate and
improvement.
6.5 France
France ranks tenth out of the thirty-four OECD countries
assessed for the SDG performing well in its activities com-
bating climate change. It has lower greenhouse gas emis-
sions per GDP than 29 other OECD countries. France also
has made commendable strides towards ending poverty. The
French also expect 72 years of life in full health, putting it
among the top ten countries for this indicator. However, it
requires signicant policy action to reduce inequality caused
by socio economic status in terms of education opportuni-
ties. Also, the French generate about 530 kg of municipal
waste per capita, ranking 24th among the OECD countries.
In 2015, the city of Paris launched Paris, smart and sus-
tainable city(ville intelligente et durable), with the inten-
tion to transform Paris into a sustainable, connected and open
city. It aimed to integrate technology such as sensor net-
works, data collection and analysis, to promote collaboration
between Parisians and civil servants in order to build efcient
public service via the co-construction of policies. Using citi-
zen participation as a key element, an online portal called
Madame la Maire, jai une idée(Lady Mayor, I have an idea)
was launched. The portal provides a central platform to help
Parisians contribute to the life of the city by proposing ideas
and projects, which primarily serve to dene the budget of the
city. The ideas and projects are then debated, augmented and
enriched in a collaborative approach, and voted on for appli-
cation. It also organizes workshops to co-construct projects
amongst the interested stakeholders. Reports reect that at
least 5000 proposals were submitted for the 2015 budget, with
hundreds proposed for a vote.
Though this is a good step for France, it is ranked number
12 amongst the E-Indexes among the 193 countries. Com-
paring this to its historical culture of high PD, it is not sur-
prising that it scores lower among the ve countries in terms
of the WGI good governance, consistent with the CPI and
WJP scores as well. The SDG reports structural problems and
a lack of consistency, which has also caused the country to
lack competition. The low PSAVT is line with
terrorism-related state of emergency which was extended to
2017, following the Nice attack in 2016. France ranks low
middle in terms of democracy and governance, both cor-
ruption and legal uncertainty continue to be a concern, amidst
The Complexity of Governing Smart 375
the strengthening of framework and rules. Citizens policy
knowledge is deemed to be relatively poor, with a reluctance
to accept change noted [23]. This differs with the high UAI as
measured by the Hofstedes Cultural Dimension as normally
high UAI countries prefer to be structured, well planned and
are more open to changes. This could explain the rising
tensions with the increasing demonstrations and social vio-
lence reported, with more French becoming dissatised.
Sustainable Governance Indicators SGI [23] reports that
trust in government, and the reection on the French gov-
ernments credibility has reduced due badly managed com-
munications. Media independence is legally guaranteed, but
is somewhat affected by government subsidies and corporate
ownership. However, to end on a positive note, dynamic
new technology start-ups seem to be breathing new life into
the business sector, with the rise of the online sector
appearing to improve the quality of democracy.
7 Conclusion
Despite wide ranging initiatives and investments, progress to
integrate systems in smart cities is slow. Factors affecting
this could include information failures, coordination failures
especially in terms of silo systems and aged infrastructure,
the inability of cities to gain rst mover advantage, lack of
nance and the lack of trust in data privacy and system
integrity [16]. To be successful, clear and genuine visions
are needed to support innovative, participative and trans-
parent cultures to be embedded within all levels of society,
publicprivate partnerships and legislations.
However, this is not reected based on the study carried out.
Discrepancies when comparing between the traditional good
governance indexes and technology based E-Indexes reect
that it still remains uncoordinated and not being utilized
appropriately. In the traditional approaches, Sweden and Ger-
many are leaders, with UK generally being in third place and
France and Japan, taking the last two positions. This is con-
sistent with both France and Japans Power Distance scores.
Zhao et al. [8] found that PD had a negative correlation with
E-Government development. In the E-Participation platform,
UK, France and Japan take the lead, with Sweden and Germany
taking the last two positions. Likewise, it is obvious that citizen
input is not expected beyond a very specic and limited set
of expression and actions [27] as possibly reported in Japan.
This is consistent with Japans lower WGI VA score and
SGI Democracy score. The gap between UKsperfect
E-Participation score and the SGI score for democracy, SDG
rank in comparison with the other four countries and WJP Rule
of Law is a matter of concern and reects the same.
Smart cities stakeholders need to enhance the genuine effort
to actually achieve collaborative and participative gover-
nance. Although, most cities are still at the beginning stages of
the smart city life cycle, the silos remain and are still haunting
the positive input-output expectation and returns on invest-
ment. Citizens should be allowed to be more pro-active in
voicing their opinions and ensuring that governance,
accountability and transparency is upheld. Though the ve
countries score reasonably well in terms of their WGI indi-
cators, the impact of the VA is yet to be seen in the e-capacity.
The subjectivity of the e-framework indicators also need to be
scrutinized further as measures to include a key performance
indicator with clear input-output ratios, taking into time
frames of receiving feedback, assessment and inclusion of the
feedback should be taken into account. Of course, one would
need to logically accept that not all feedback maybe con-
structive to the development of the budget or project, but clear
process ows and criterias should be in place to ensure that
there is interaction and a proper feedback mechanism. Media
and other marketing efforts to ensure that citizens have access
to basic infrastructure need to be in place, have knowledge of
the e-systems need to be in place, to build the trust and open
communication between the members of the public and the
government. The ow of communication and good gover-
nance should be two-way, from the global governance per-
spective to a country level basis, and nally down to the smart
cities and a more local perspective. A bottoms up perspective
is important as well, with the public pushing for more active
participation. However, this does not seem to be as effective.
Further research is required, to identify the gaps in terms
of collaboration of the various institutions and goals
required, as well as the security of the systems as well the
data contained. The responsibility of the smart city should
not just be municipality based, but a top down, bottoms
approach should be incorporated to ensure a consistent and
integrated result is achieved beyond cities, countries and
institutions. More surveys could be carried out to gauge the
public expectation and satisfaction of the e-government
initiatives as there seems to be a lack of required informa-
tion. With the high level of migration, cultures are expected
to change albeit slowly, and governance codes and conducts
are expected to integrate, reducing the subjectivity of the
current indicators. The role of global and country-level
institutions is expected to increase, with the need to increase
the level of genuine participation from the members of the
public. Otherwise, being smart or the e-platforms remains as
it is, a tool that requires further public spending without any
real benet in terms of governance or sustainability, being
further aggravated with the diminishing public trust in
governments and media reported.
376 G. A. Rubasundram
References
1. United Nations E-Government Survey 2016, E-Government in
Support of Sustainable Development. Department of Economic
and Social Affairs, United Nations New York (2016).
https://publicadministration.un.org/egovkb/en-us/Reports/UN-E-
Government-Survey-2016. Last accessed 21 Sept 2017
2. Rodriguez Bolivar, M.P: Transforming City Governments for
Successful Smart Cities. Public Administration and Information
Technology 8, Springer International Publishing Switzerland
(2015)
3. Thomas, M.A: What do worldwide governance indicators mea-
sure? Eur J. Dev. Res. 22(1), 3154 (2010)
4. United Nations Transforming Our World: The 2030 Agenda
for Sustainable Development A/RES/70/1. https://sustainable
development.un.org/content/documents/21252030%20Agenda%20
for%20Sustainable%20Development%20web.pdf. Last accessed
21 Sept 2017
5. Kroll, C.: Sustainable Development GoalsAre the Rich Coun-
tries Ready? Bertelsmann Stiftung September 2015 with the
support of the UN Sustainable Development Solutions Network
(2015)
6. Arnaboldi, M., Spiller, N.: Actornetwork theory and stakeholder
collaboration: the case of cultural districts. Tour. Manage. 32,
641654 (2011)
7. Tuan, L.T.: From corporate governance to balanced performance
measurement. Knowl. Manage. Res. Pract. 2014(12), 1228 (2014)
8. Zhao, F., Shen, K.N., Collier, A.: Effects of national culture on
e-government diffusiona global study of 55 countries. Inf.
Manage. (2014). https://doi.org/10.1016/j.im.2014.06.004(2014)
9. Van Kersbergen, K., Van Waarden, F.: Governance as a bridge
between disciplines: cross-disciplinary inspiration regarding shifts
in governance and problems of governability, accountability and
legitimacy. Eur. J. Polit. Res. 43,143171 (2004)
10. North, D.C: Institutions. J. Econ. Perspect. 5(1), pp 97112 (1991)
(Winter)
11. North, D.C: Economic performance through time. Am. Econ. Rev.
84(3), 35968 (1994)
12. Rasiah, R.: The role of institutions and linkages in learning and
innovation. Int. J. Institutions Econ. 3(2), pp 165172 (2011)
13. IIRC Integrated Reporting. In The International Integrated Report-
ing Council. http://www.theiirc.org/. Last accessed 21 Sept 2017
14. Licht, A.N., Goldschmidt, C., Schwartz, S.H: Culture rules: the
foundations of the rule of law and other norms of governance.
J. Comp. Econ. 35 659688 (2007)
15. Roland, G.: Understanding Institutional Change: Fast-Moving and
Slow-Moving Institutions. Studies in Comparative International
Development (2004)
16. BIS Smart Cities: Background Paper, Department of Business
Innovation and Skills. https://www.gov.uk/government/uploads/
system/uploads/attachment_data/le/246019/bis-13-1209-smart-
cities-background-paper-digital.pdf. Last accessed 21 Sept 2017
17. World Bank: Governance, The World Banks Experience. World
Bank, Washington DC (1994)
18. Nam, T., Pardo, T.A: Conceptualizing smart city with dimensions
of technology, people and institutions. In: The Proceedings of the
12th Annual International Conference on Digital Government
Research. https://www.ctg.albany.edu/publications/journals/dgo_
2011_smartcity/dgo_2011_smartcity.pdf. Last accessed 9 Sept 2017
19. Manville, C. et al.: Mapping Smart Cities in the EU, Directorate
General for Internal Policies, Policy Department A: Economic and
Scientic Policy. European Parliaments Committee on Industry,
Research and Energy (Available from http://www.europarl.europa.
eu/RegData/etudes/etudes/join/2014/507480/IPOL-ITRE_ET(2014)
507480_EN.pdf. Last accessed 21 Sept 2017
20. Kaufmann, D., Kraay, A., Mastruzzi, M.: The worldwide gover-
nance indicators: a summary of methodology, data and analytical
issues. World Bank Policy Research Working Paper No. 5430
(2010) http://papers.ssrn.com/sol3/papers.cfm?abstract_id=1682130.
Last accessed 21 Sept 2017
21. Transparency International, Corruption Perceptions Index 2016.
https://www.transparency.org/news/feature/corruption_perceptions_
index_2016. Last accessed 21 Sept 2017
22. WJP: Rule of Law Index 2016, World Justice Project. https://
worldjusticeproject.org/our-work/wjp-rule-law-index/wjp-rule-law-
index-2016. Last accessed 21 Sept 2017
23. Sustainable Governance Indicators SGI. Bertelsmann Siftung.
http://www.sgi-network.org/2017/. Last accessed 21 Sept 2017
24. Hofstede, G.H: Cultures Consequences: Comparing Values,
Behaviours, Institutions and Organisations Across Nations. sec
ed Sage, Thousand Oaks, CA (2001)
25. Hofstede, G.H.: Cultures Consequences: International Differences
in Work Related Values. CA, Sage, Thousand Oaks (1980)
26. World Bank Worldwide Governance Indicators. https://data
catalog.worldbank.org/dataset/worldwide-governance-indicators.
Last accessed 21 Sept 2017
27. Granier, B., Kudo, H.: How are citizens involved in smart cities?
Analyzing citizen participation in Japanese Smart Communities.
Inf. Polity 21,6176 (2016). https://doi.org/10.3233/IP-150367
IOSPress(2016)
28. DeWit, A.: Japans rollout of smart cities: what role for the
citizens? Asia PacicJ.11(24) (Number 2) (2013)
29. Vrabie, C.I., Tirziu, A.M.: E-participationa key factor in
developing smart cities. In: EIRP Proceedings, vol. 11. The
European Citizen and Public Administration (2016)
30. Tessmann, J., Kirchner, I.: The Participation of Citizens in
German Local Government. City Mayors. http://citymayors.com/
government/german-local-government.html. Last accessed 21 Sept
2017
31. Berlin Senate Department, Smart City Strategy Berlin, Senate
Department for Urban Development and the Environment Berlin.
http://www.businesslocationcenter.de/imperia/md/blc/wirtschafts
standort/standort/content/strategie_smart_city_berlin_en.pdf. Last
accessed 21 Sept 2017
The Complexity of Governing Smart 377
The Impact of Smart Technology
on Advertising: A Case Study of Pepsi-Egypt
Bassant Eyada and Mai El Nawawy
Abstract
Brands are turning technology in a way to attract and
engage consumers in new and innovative ways. Adver-
tising embracing technologies have proved to have
greater impact and more sophisticated ways to reach
their target audience, gain great social connection and
product value. Advertising is an experience delivered to
the consumers, the more the interaction the more
memorable and effective the experience becomes, leading
to higher levels of brand loyalty and motivation. The
creativity in using digital capabilities is considered a very
effective way to breathe life into advertising campaigns.
The research aims to explore the new technologies used in
advertising in Egypt, using the Pepsi Campaign created
during the month of Ramadan 2017, with a different,
smart and futuristic approach using digital advertising
channels for campaign activation. In the past Ramadan
campaigns Pepsi adverts were mainly nostalgic, remind-
ing Egyptians with the glory of the past, carrying the
same concept of gatherings, reunions, and get together.
With the increasing importance of digital technology and
smart phones in precise, and with the increasing reliance
on smart phones, it has become almost impossible to ask
consumers to let go of their phones. With almost 2.32
billion smart phone users worldwide, and 23.6 million
users of smartphones in Egypt, the campaign narrows the
gap between the brands slogan Lets Complete our
Gatheringversus what is happening in reality. Using an
interactive video and by utilizing the smartphones, Pepsi
asks consumers not to put aside their phones to watch the
ad, but to use their phones to watch it. The research
explores the impact of technology on advertising trends.
Keywords
Advertising Smart advertising Smart technology
Pepsi campaign Egypt
1 Introduction
The development of technology has changed the life of
every human being on earth; with a very strong impact on
the way people communicate with each other and the way
they lead their lives. With the widespread of smart phones
and technology, the world has become totally reliant on this
technology in every detail of human lives, people now tend
to greet each other at various occasions with e-cards, emails,
text messages, whatsapp chats and many other online
applications. The traditional methods of reading, sharing
information, communicating, living, and watching TV have
changed dramatically, people nd it more convenient to
communicate through a smart phone application, read books
with e-readers, tablets and smartphones, watching TV has
also evolved with the development of technology, nowadays
people do not need to be sitting in front of the TV to watch
what they want, they can watch whatever they want wher-
ever they want with the help of their smartphones. Based on
Flurry Analytics research, the average time a person spends
on mobile device daily is almost 3 h and 40 min, a survey
done by Bank of America in 2013, exploring mobile trends
among adult consumers across the US, indicated that 47% of
US consumers would not last a day without their smart-
phones, the survey also found that young millennials of ages
1824 consider their phones more important than their
self-hygiene, 60% consider their smartphones more impor-
tant than coffee, stating that they check their phones every
6.5 min [1].
Technology has changed the consumer behavior, as
consumers became more mobile, more social, and with more
simultaneous consumption. These changes are creating a
major transformation of marketing and advertising aspects,
B. Eyada (&)M. El Nawawy
American University in the Emirates, Dubai, UAE
e-mail: bassant.eyada@aue.ae
M. El Nawawy
e-mail: mai.elnawawy@aue.ae
©Springer Nature Switzerland AG 2019
A. Al-Masri and K. Curran (eds.), Smart Technologies and Innovation for a Sustainable Future,
Advances in Science, Technology & Innovation, https://doi.org/10.1007/978-3-030-01659-3_44
379
creating challenge for the brands to connect with their
consumers through their devices and social media, which
highly impact the increased relevancy of the targeted audi-
ence and content.
2 Literature Review
2.1 Traditional Versus Digital Advertising
In some denitions, traditional advertising refers to the
content of the advertising rather than the medium being
used, a traditional advert is the one that has no other purpose
than to sell the advertised product, other denitions refer to
traditional by means of the format of the medium being used
such as radio, TV, and print ads, usually considered as a
one-way form of communication.
According to McLuhan, the manner in which a message
is being communicated has a much more profound effect on
consumers than the content of the message itself. McLuhans
[2] statement The medium is the messagedenes the
medium as an extension to the humans mind, body and
senses. Smartphones are hence considered as a medium that
extends social connectivity, the medium exerts a much more
powerful effect on consumers than the content delivered.
McLuhan states the personal and social consequences of
any medium, that is, of any extension of ourselves, result
from the new scale that is introduced into our affairs by each
extension of ourselves, or by any new technology.
With the vast shifting of technology, over the past two
decades the traditional forms of advertising is being gradu-
ally displaced, digital advertising is taking over television
advertising in total dollar spending in 2017, whereas the
market share of radio, TV and print advertisements has been
shrinking over the past 10 years [3].
In their article Martinez and her colleagues [4] state that
ineffective traditional advertising planning methods and the
growth in the digital advertising are among the reasons that
urged a need for new tools and methods for advertising in
the age of the internet. Throughout their paper they studied
Programmatic advertising as one of the new effective forms
of automation in the new online advertising ecosystem. They
dened programmatic advertising as advertising business
that develops buying and selling processes via software
based on automation.
In the digital age, advertisers are no longer committed to
place their ads on the traditional media and to bare subsi-
dizing content production. Stole [5] believes that it is not
necessary for advertisers in the digital age to waste their
money on consumers with no interest in the products being
advertised, as smart advertisingcan target individuals and
personalize their needs wherever they went via the internet
and their smart phones.
This shift towards digital campaigning has redirected
advertising strategies to a more mobile centric direction,
considering that smart phones are not only receivers of
information, but are transmitters as well. Consumers tend to
use their smartphones for everyday instant decisions; where
to shop, where to eat, and fastest route etc. With this, speed
and relevance become the most important points to be
considered by brands, advertising needs to reach consumers
at their convenience with the relevant message, specic
timing, and most importantly leaving the intended impres-
sion. With brands not only competing with their local
entrants, but with competitors all over the world innovation
and marketing wise, digital advertising therefore has a huge
advantage over traditional forms of advertising. With the
rapid change in technology, digital advertising has more
potential of grabbing consumer attention, creating a two-way
communication status with the brand through interactivity,
on-the-move access, and data-driven targeting (Fig. 1).
A few good reasons are behind the shifting from tradi-
tional to digital advertising, based on a study done by Wall
Street Journal in 2014, 60% of television viewers download
or record the TV shows on their smart devices so they can
watch them skipping the ads, consumers shift to the internet
as a source of information for the brands or services they are
they are interested in. Digital advertising allows advertisers
to measure and accurately determine the Return of Invest-
ment, as an example, in 2013, Rafes Potato Chips had spent
only 29% on digital advertising, while nowadays it is
spending 100% of their ads on digital media. Under Armor
was also spending 70% on TV advertising, in 2016, it shifted
its budget to 5050% split between TV and digital adver-
tising. The main reason was that digital advertising has the
ability of more specic targeting, reaching the exact people
at the exact time, with more exibility in testing and opti-
mizing advertising results and feedback. Internet ad spend
grew 17% in 2016, an average rate forecast of 11% is
expected between 2016 and 2019 globally. By 2019 it is
expected that internet advertising accounts for 41.7% of
global ad spend [6].
Egypt has a resilient advertising industry which was
buoyant even during the nancial crisis during 2009. Headed
by telecom services, the online advertising industry has
grown of 71.9% from 2007 till 2012, comprising mainly of
search engine advertising and display advertising. While
video, mobile and online advertising are minimal in the
industry [7]. Net advertising spent on TV has been estimated
at $368 million in 2015, which is 12.5% more than 2014.
Rates for TV slots increased by 15% during 2015, a one
minute time slot costs between %1360 and $8180 depending
on the channel [8] (Fig. 2).
In 2017, Bentley launched the Bentley Inspirator App
as part of its campaign, available only on IOS, the app uses
an emotion recognition software to suggest the most suitable
380 B. Eyada and M. El Nawawy
car for the consumer, the app analyzes the consumers facial
reactions through the smartphone camera, and based on that
suggests the best car color, features and specications for
him. In another campaign, Bentley uses NASAs space
exploration technology to create a zoom in feature on the
smartphones where consumers can zoom in with almost 53
billion pixels, starting with a wide panoramic view of San
Franciscos Golden Gate Bridge, zooming in until the
Bentley motif stitched signature is seen on the headrest of a
Bentley car on the bridge.
2.2 Digital Advertising and Customer Loyalty
Companies and corporates performing in the online sector
realize the privilege of the digital world and value the
quantity and the quality of the data and technologies pre-
vailed on the digital platforms. These resources are used to
empower all parties in the communication processes,
including advertising as one of these processes. By the late
90s, Yahoo, Google, later Facebook and other similar
companies, started to realize the information they have about
Fig. 1 Growth in digital advertising. Source Adage.com published February 23, 2017
Fig. 2 Digital advertising surpassing TV. Source Wall street journal
The Impact of Smart Technology 381
internet users and their using patterns for the online platform
is important for advertising and commercial sectors. Differ-
ent plans and protocols were made to track peoples online
activities [5].
Digital channels provide the best tools for message per-
sonalization, changing the role of the consumer from being a
customer to becoming an interactive part of the advertise-
ment gives the advantage of better information search
options and allowing them to spend more time with the
advertised brand. This customer involvement based on their
channel and content preferences increases the level of
interest, which enhances customer loyalty.
Brand communication is a term used to describe the
communication between the brand and the consumer,
establishing a relationship that can mainly occur through
digital media advertising. There are factors affecting this
relationship, mainly frequency and content. For this rela-
tionship to extend, a pattern of repeated purchases and a
positive attitude need to exist. A brand communication
strategy relies heavily on four main components: the target
audience; where advertisers need to know exactly who they
are, what are their main interests, their attitudes, lifestyles,
demographic descriptions, and their preferred form of
communication. The message; the story of the brand must be
relevant and persuasive to the selected target audience. It
should relate to their lifestyle, beliefs and way of thinking.
The message communicated needs to change the mindset of
the audience who do not follow the product, it also needs to
reinforce brand image to those who do. Creativity; the cre-
ativity of the advertisement is fully related to the message
being communicated, it has to determine the end effect
required from the whole communication process. Creativity
also relies on the emotional role of the brand within con-
sumers lives, as messages play on two main levels rational,
which states facts, features and benets of the brand, and
emotional which is how the message will leave the con-
sumers thinking about the brand. The increase of the emo-
tional strength of the message leads to long-term brand
existence within the consumerslives. Media; the selection
of the type of media used to advertise must be part of the
consumers everyday habits, the message will only reach the
consumers if it is where they are, if it targets the audience
when they are most receptive. The proper allocation of the
message with the repeated frequency of advertising moves
the consumer effectively through the four stages of the A.I.
D.A response model: Awareness, Interest, Desire and
Action.
Nike sets an efcient example of using digital media and
smartphone technology to create consumer involvement in
several of its campaigns. One example is their campaign
Time is Preciousa series of videos that use no visuals, but
only black and white text. With these videos, Nike gives a
message to stop texting and wasting time on smartphones
and start training. The campaign starts with the text This
commercial is just one minute out of the ten hours a day you
spend glued to your screens.
In another campaign, in 2009, Nike sets up an interactive
digital billboard in Times Square, New York, allowing
people to text their own words for a chance to win Nike
shoes. The audience had to dial a number displayed on the
billboard, and use their smartphones to customize the shoe
on the screen. In 2010, Nike launched its Nike Gridgiant
virtual game board campaign in the UK. The players would
need to reach different checkpoints around London to earn
points. The campaign was considered as the rst attempt to
merge real life sports with digital advertising. Another
campaign promoting Nikes free running shoes, a digital
campaign was created challenging people to clock their
fastest running time over two miles. The application Shazam
App was used to download the song I would run to you
requesting people to sing it while running.
Bringing brands closer to consumers everyday life is the
key point to brand loyalty, changing the role of consumers to
co-producers of the ads. The relation between customers and
advertising in the digital and internet world has been going
through different developing stages. As Stole [5] mentioned
that early internet users were not welcoming the rst intro-
duced online advertisements like banners and pop-up ads.
Yet, the CEO of Procter and Gamble Edwin Artz as say that
emerging technologies were giving people the opportunity
to escape from advertising grasp altogetheryet, corpora-
tions needed to, as Artz adds grab all this new technology
in our teeth once again and turn it into a bonanza for
advertising [5].
2.3 The Digital Sphere and Advertising
The digital ecosystem is serving the marketing and adver-
tising industry in a great deal. It has been providing the
industry with unlimited paths and abilities, starting from the
research and data collection stage, passing by the content
creation, production and presentation, in addition to target-
ing the needed audience with the tailored messages, reaching
the stage of obtaining an instant and interactive feedback
from the consumers. With all the technologies and digital
features available advertising can be put in the right context
of the consumerslives. In his article, Digital Advertising
Trends You Need to Know, Grensing-Pophal states that in
the report Digital Marketing Landscape: The Power of
Digital experience in 2014it was mentioned that the
majority of the respondents in the study considered the
creation of digital experiences as highor very highand it
was found that there is a relationship between organizations
placing a high priority on digital experiences and revenue
growth [9].
382 B. Eyada and M. El Nawawy
Grensing-Pophal has listed a number of the most signif-
icant digital advertising trends. On the top of the list comes
the Big Data Trend. The author explains this trend as, not
only the ability of the marketers to gather and measure data
about the market needs, but also to manage this huge amount
of data to be able to draw useful conclusions and to take
meaningful decisions. It is said that the within the frame of
the Big Data trend, the internet has been giving more
strength for small marketing and advertising corporations,
empowering them against larger competing entities. Another
noteworthy feature for digital and smart technologies is their
ability to chase consumers and engage them in the com-
munication process wherever they are. This feature was
presented by Grensing-Pophal in his list as the Location
Based Communication Trend. The author pointed out that it
is a key digital advertising trend as it blurs the line between
benet and intrusion. Backing the same idea, the CEO and
founder of Connectivity Marketing and Media in Florida
says with GPS pinpointing becoming more and more
prevalent, and with advances in smartphone technology,
many brands are beginning to utilize push technology that
allows them to push specic ads within a radius of a con-
sumers phone[9].
Smart phones and Mobiles are the main players in the
digital era, and when it comes to the advertising sector, these
new media are growing and are leading the communication
and marketing processes. As Grensing-Pophal mentions the
opportunities in mobile are evolving as consumers are
depending more and more on their smart devices wherever
they go. The prevalence of new and digital technologies in
media and advertising sectors, is presenting new forms of
content presentation, like micro- blogging and micro- video.
Applications like twitter and Vine are being presented as part
of the marketing and advertising tools used to send tailored
messages to homogenous and heterogeneous audiences with
controlled budgets and unlimited options [9].
Having the opportunity to present the different formats
for Advertising in the age of the new media can be con-
nected to the concept of Multiplatform Consumption.
Grensing-Pophal has listed this concept as a signicant
digital advertising trend, arguing that delivering the com-
munication content effectively across multiple platforms is
a must for 21st-century marketers[9]. As Stole concludes
that The commercially driven internet model heightens the
blurring of advertising and media content and obscures
distinctions between producers and consumers of news,
entertainment, and advertising[5].
2.4 2017 Pepsi Campaign
Every year during the month of Ramadan, large companies
and corporations are competing to present their campaigns
and to seize the highest share of consumersviewer-
ship. Content managers and producers are utilizing all the
available resources and tools to execute a successful cam-
paign to reach and persuade the target audience with the
messages of the campaign. In Egypt, Ramadan is a special
month, which is labeled as the month of family and charity.
Most of the time marketing and advertising campaigns
presented during Ramadan, are stressing the celebrated
values and traditions for this Holy month.
Big advertising campaigns during and after Ramadan are
part of the social and media debate, to the extent that
sometimes it is considered a media entertainment content in
itself, with dedicated viewers and followers. In 2015, there
was a 17% jump in ad spending during the month of
Ramadan, accounting for almost 30% of total ad spending in
Egypt for 2015.
For the past decade Pepsi has been sending one message
in its Ramadan campaign. This message focuses on values
related to family and the idea of (lets all be together.) In the
previous Pepsi campaigns, new technologies have been
serving the creativity of the presentation of the message in
the campaign, yet, this year Pepsi has been taking the usage
of technology and new media to another level, through
engaging the technology in the social life of the viewer. Not
only sending messages on the importance and joy of being
together in the ads of the campaigns, but also asking the
viewers to come together physically to be able to watch the
ad displayed and if they are not together they will not be able
to watch it.
In the previous Ramadan campaigns of 2013, 2014, and
2015, Pepsi had been always insisting on the message of
gathering people together, with the concept that Ramadan is
the month of family and friends gathering, Pepsi used
celebrities from different eras of the Egyptian Cinema and
reminded people of the glories of the past, bringing together
the entertainment icons who carry the best memories. In
2017, Pepsi introduces a new tactic of advertising, with the
amount of time youth are spending on their smart phones,
Pepsi decides to use this technology to create the ad. Car-
rying their message of lets complete our gathering
bridging the gap between the slogan and reality, in order to
view the ad, three smartphones are required to be placed next
to each other for the full view. The strategy was to actually
use the smart phones technology to enjoy this advertising
experience that would not be complete without the gathering
of family or friends. The ad was divided into three sections,
as mentioned, each part is seen on one smart phone, without
having the other two smart phones, the picture would be
incomplete. The ad is known to be the rst ever multi
screen mobile ad.
The ad starring the famous Egyptian actor Samir Gha-
nembeing a multi generational gure and an icon of family
entertainment, long with four other millennials tells a story
The Impact of Smart Technology 383
of a group of friends getting together for Iftar, and although
together how they are all busy doing different things and
distracted by their smart phones. At the end of the ad, the
actor states that we have took the rst step to put you all
together, now its time to put down your phones and focus
on one another lets get together. The message was clear
reinforced by the technology used to compel the people to
unite, considered as a reality check to make the people
realize that they are actually now together enjoying time
with one another, the ad was able to shift smart phone
technology from being an individualistic used tool to a
collective social experience (Figs. 3,4and 5).
Fig. 3 The advertisement as seen with three smartphones
Fig. 4 A combined view of the three parts of the advertisement
384 B. Eyada and M. El Nawawy
The text has also been divided among the three parts so
that viewers can only read the whole slogan only if the three
phones are put together.
3 Research Methodology
This study is considered a pioneer and a pilot study in the
area of smart advertising. The results presented here is not to
be generalized yet, it can give an indication and a scientic
base for future researchers in this new area.
3.1 Semi-structured Interviews
Semi- structured interviews is a qualitative research method.
When using Semi- structured interviews, pre-structured and
xed questions are set, asking the interviewee to answer
them openly.
Studying the effects of technology on presenting adver-
tisements, along with examining the impact of using smart
technology on consumersperception and brand image, and
the inuence of the digital message on their behavior, the
researchers resorted to the qualitative semi-structured inter-
views method.
A purposive sample of ve participants was selected
based on the criteria that the interviewee has watched the
studied advertisement presented by Pepsi Egypt in Ramadan
2017. The scope of the interviews focuses on investigating
how participants see the effects of using smart technology in
advertising, and to what extend did the use of these
technologies inuence the brand image and the perception of
the consumers about the advertised brand. In addition to this,
the interviews will discuss the effects of using new and smart
technologies on the behavior of the audiences regarding the
addressed message.
The questions of the interview were preceded by a l-
tering question asking participants whether they have wat-
ched the stated advertisement or not. If they answered that
they have watched it, they are asked to complete the inter-
view. The purpose of this question is to help the researchers
to choose the purposive sample of the study with the criteria
stated. The Semi- structured interviews have 3 xed ques-
tions serving the purpose of the study. They are stated as
follows:
How do you see the new advertisement released by Pepsi
Egypt in Ramadan 2017?
To what extend did the new advertisement released by
Pepsi Egypt in Ramadan 2017 affect your perception of
the brand?
Do you think that the use of smart technology helped
achieve the aim of the advertisement?
3.2 Effects of Technology on Advertising
Participant (1) believes that the advertisement presented by
Pepsi in 2017 was very creative and new. The idea of using
technology to connect people together and try to make use of
audiencesnew digital activities is very smart. He adds that
Fig. 5 A combined view of the three parts showing the text Lets Get Together
The Impact of Smart Technology 385
way Pepsi created the advertisement can tell us that they are
targeting audiences with specic characteristics and age
group, may be different than those solely watching
television.
On the same line, Participant (2) has admired the tech-
nology presented in the advertisement, stating that it is very
interesting that Pepsi was able to bring people together
physically and changing its old motto to real life activity. He
adds that he tried to watch each part of the advertisement
alone but he couldnt understand it, except when the three
parts of the advertisement were put together on the three
mobile phones.
Participant (3) said that she liked the idea and the pre-
sentation of the advertisement, and she believed that it was
brilliant to use new technology that we use every day to
bring people together, and it very well serves the motto that
Pepsi have long been adopting Lets come together.
Participant (4) liked the idea of the advertisement, and the
way Pepsi tried to apply their campaign motto lets come
together. He adds that the way of presenting the adver-
tisement and the technology used is enhancing the message
of the advertisement. Yet, he believed that he would prefer
to watch the advertisement on the television the traditional
way. On the other hand, participant (5) said she would prefer
to watch the advertisement on the traditional media, as she
thought the advertisement was so complicated to watch and
to comprehend the idea.
3.3 Effects of Using New Technology
on Audiences Brand Perception
Participant (1) thinks that the image of reputable and
well-known brands like Pepsi, cant be changed easily based
on one of its advertisement, as the brand equity is bigger
than that, yet, the way Pepsi presented this advertisement
made me think of it as a creative company trying to use new
tools to reach its audience.
On the other hand, the participant (2) said that the
advertisement hasnt changed his perception regarding Pepsi
Company, adding that when he was watching the adver-
tisement he was more focused on the idea of advertisement
Participant (3) said that the advertisement that Pepsi pre-
sented in Ramadan 2017 didnt affect the way I see the
brand. She adds I was not surprised with what Pepsi pre-
sented, as I always see them as creative and I have always
seen their advertisements as new and futuristic.
Participant (4) said that he was surprised with this
advertisement and the way it was presented, and using this
digital technology made him think of Pepsi as a creative and
updated company. Participant (5) believes that the adver-
tisement hasnt changed the Pepsi brand image, although she
didnt like the use of the technology in the advertisement,
yet, for her Pepsi is still a successful corporation which has
always been releasing creative ads.
3.4 New Technology and Audiences Behavior
Participant (1) states that although he likes the idea of the
advertisement presented by Pepsi in 2017, he nds it a bit
complicated, and to encourage more audience to watch this
advertisement technical issues should be made much easier.
He adds that the creativity of the idea will not be the only
factor affecting my social behavior.
On the same line, participant (2) states that using this new
digital version in the advertisement made the message very
clear and lovable. He added it urged me out of curiosity to
meet up with my friends to watch the full advertisement.
Participant (3) said that although she liked the advertisement
and described it as new and creative, she doesnt think that it
affected her social behavior, she only was gathered with her
friends to watch the advertisement.
Participant (4) says that presenting Pepsi advertisement
with this new way made the idea and the message of the
campaign very clear, yet, it doesnt affect his social behavior
on the long run. Participant (5) says that what can more
affect her behavior is the message presented more than the
technology and the medium used to present the
advertisement.
4 Research Findings and Conclusion
Smart technologies, smart phones and mobiles have become
a major part of peoples everyday lives. The rate of digital
media users are increasing, people are being more and more
exposed to the digital world. In 2017, almost one third of
advertising is being spent on digital media. Digital media is
gaining ground globally, the validity and persuasiveness of
digital advertising is on the increase. Advertisers are moving
from the high cost traditional media to the relatively low cost
digital and mobile advertising. Smart phones and Mobiles
are the main players in the digital era, when it comes to the
advertising sector, smart technology and phones have the
ability to chase consumers and engage them in the com-
munication process wherever they are.
Digital channels provide the best tools for message per-
sonalization, changing the role of the consumer from being a
passive message receiver to becoming an interactive part of
the advertisement. This customer involvement based on their
channel and content preferences increases the level of
interest, which enhances customer loyalty over time. The
repeated use of technology as a part of the advertising pro-
cess enhances brand image, solely when positively serving
the aim of the advertising campaign.
386 B. Eyada and M. El Nawawy
Continuous use of technology may change consumer
behavior, as consumers became more mobile, more social,
and with more simultaneous consumption. These changes
are creating a major transformation of marketing and
advertising aspects, creating challenge for the brands to
connect with their consumers through their devices and
social media, which highly impact the increased relevancy of
the targeted audience and content. Consumer behavior
changes rapidly with time and advancing technology,
inuencing their purchase decisions, how they consume
time, and interact with different brands.
5 Recommendations
1. With the expanding use of smartphones and with the
increasing percentage of time spent on interactivity with
the internet and smart phone technology, advertising in
Egypt needs to reconsider the amount of money being
spent on traditional advertising versus digital advertising.
2. Technology has changed the consumer behavior; people
tend to let go of television in favor of watching their
favorite shows online. The main reason behind this is the
fact that they can skip watching the ads, causing a loss
for the brand existence in consumers minds. People need
to be targeted where they exist, with selection of media
technology that best ts and integrates within their daily
lifestyle.
3. More research to be conducted on the psychological
inuence of smart technology and the digital
environment on the social interaction and consumer
behavior.
4. The use of smart technology in advertising should be
used as a tool to serve the advertisement aim, not to be an
ultimate aim itself.
References
1. Tanyel, F., Stuart, E., Griffen, J.: Have Millennialsembraced
digital advertising as they have embtaced digital media? J. Promot.
Manage. 19, 652673 (2013)
2. Mcluhan, M.: Understanding Media: The Extensions of Man, 1st
edn. McGraw Hill (1964). ISBN 8114675357
3. www.socialmedia.biz/2016/10/13/how-digital-marketing-is-
supplanting-traditional-advertising
4. Martinez, I., Aguado, M., Boeykens, Y.: Ethical Implications of
digital advertising automation: the case of programmatic advertising
in Spain. El profesional de la información, 26(2), 201210 (2017).
Retrieved from EbscoHost Database
5. Stole, I.: Persistent pursuit of personal information: a historical
perspective on digital advertising strategies. Crit. Stud. Media
Commun. 31(2), 129133 (2014)
6. Executive Summary: Advertising Expenditure Forecasts March
2017. www.zenithmedia.com
7. Ken Research. Egypt Online Advertising Market Outlook to
2017: Favorable Prospects in Online Search Advertising (February
2014)
8. www.oxfordbusinessgroup.com/analysis/bouncing-back-after-
difcult-period-advertising-expenditure-once-again-rise. Retrieved
12-07-2017
9. Grensing-Pophal, L.: Digital advertising trends you need to know.
Econtent (2014). http://www.econtentmag.com
The Impact of Smart Technology 387
The Onion Router: Is the Onion Network
Suitable for Cloud Technologies
Galia Novakova Nedeltcheva, Elior Vila, and Marina Marinova
Abstract
The present paper introduces the Onion Router
(TOR) also known as anonymity network. In the time
of cloud technologies, when everything is stored partially
or completely remote the question for our information
safety is felicitous all the time. Usually the answer is no.
Of course, there is an explanation for that, too. Compa-
nies think that their software is perfectly safe, because
they previse every known threat and make it stableno
known viruses and bugs are provided with this imple-
mentation. The key word is known. Yes, expert pro-
grammers can write safe and reliable code, to resist on
any familiar menace, but attackers are always a step
forwardthey nd a new code vulnerability and prevail
the software. Then developers provide a x. Then
everything starts all overthat is the vulnerability life
cycle. For the rst time developers take a step forward
so called TOR. It is an attempt for a safer network, a
tentative to stop tracing packets, so our personal data
could be safe even in the cloud. Main purpose of this
paper is to provide discussion about cloud technologies,
TOR network and how they can work together. As main
subject is pointed a group parameter hold solution which
purpose is to increase the security level of the TOR
network itself.
Keywords
Cloud Onion router (TOR) Security
1 Introduction
Cloud technologies has become an immutable part of the IT
infrastructure. Increasingly more and more companies star-
ted migrating to cloud technologies where they upload a part
or their whole information. There are many reasons for
switching to cloudnot all the business has enough
resources to build own hardware network with trustworthy
devices, cables and all-time support. As well, specialists are
needed who have to develop and manage the software
components of this organizationto ensure permanent
access of employees, but with no risk of exposing and
stealing business information, to create database backups in
order to provide traceability and activity history.
An important note is that cloud technologies are service,
not a product, and as one requirements should be covered, so
the clients using it are satised and feel sure for their
information. Banks, hospitals and other own personal cli-
entsdata and this requires usage of innovative and secure
technologies. Having the cloud integrated in their structure,
that kind of organizations has to guarantee that the personal
info is perfectly secured, but at the same time all authorized
employees can access it. This is a great challenge for cloud
providers because they need to restrict the access to
resources from outside of companys network, but to ensure
it inside.
Another challenge is to transfer information securely
from clients device to the cloud. Figure 1shows the
structure of the Internet.
A request from a client device is made, the computer
nds the router in the current segment, through its routing
table. The router nds and connects to the next router in the
structure and so on until the data reaches its destination. For
faster results the routers save the path and if a request to the
same destination is made, the router uses the already stored
path.
This, considered as an advantage and speed improve-
ment, became a vulnerability, too. Every router stores the
G. N. Nedeltcheva (&)M. Marinova
Faculty of Mathematics and Informatics James Boutchier Str.,
Soa University St. Kliment Ohridski, 1164 Soa, Bulgaria
e-mail: g.novak@fmi.uni-soa.bg
E. Vila
Faculty of Natural Sciences, University of Elbasan A. Xhuvani,
Rinia Str., 3000 Elbasan, Albania
e-mail: elior.vila@uniel.edu.al
©Springer Nature Switzerland AG 2019
A. Al-Masri and K. Curran (eds.), Smart Technologies and Innovation for a Sustainable Future,
Advances in Science, Technology & Innovation, https://doi.org/10.1007/978-3-030-01659-3_45
389
destination path in its routing table and if this router is
compromised this could lead to man in the middle,so
attacker can collect all the data. The creators of TOR have
spotted this exposure and tried to avoid it implementing The
Onion Router.
2 The Onion Router (TOR)
The variety of people who use TOR is actually part of what
makes it so secure. TOR hides you among the other users on
the network, so the more populous and diverse the user base
for TOR is, the more your anonymity will be protected [2].
The main protection that TOR offers is against the so
called trafc analysis. This is used to interfere between the
users on public networkby knowing the source and des-
tination, malicious software could nd out the clients
behavior and copy it with no good intention.
The internet data packets have two partsdata payload and
a header, which is used for routing. The payload is the actual
data that is sent and the header stores info about the source,
destination, size, checksum, etc. Some of the more powerful
trafc analysis uses very complicated algorithms and statistic
info for the clients way of communication which cantbe
secured even with sophisticated encryption, because it would
encrypt only the payload part and not the headers.
TOR prevents the usage of trafc analysis by using dif-
ferent access points (onions) on the Internet for each trans-
action and neither one of them can link the source with the
destination. This path is chosen randomly. Every time there
is a new connection in the routing, a separate encryption
negotiation is made and the access points know from which
node it receives data and knows to which it should send, but
never knows the whole path.
Once a circuit has been made, there is no limit for the
type of data or the applications that could be applied to the
TOR network. This is so, because no access point knows
the source and destination. All applications that support the
Socket Secure Internet Protocol can be used inside TOR.
This circuit is reused about ten minutes after which a new
one is created so, no one can track the sequence (Fig. 2).
3 Group Parameter Hold
3.1 Group Parameter Hold
Group parameter hold is the root of the implementation for
improving the security of TOR. It consists of variables of the
Fig. 1 Structure of the internet
[1]
Fig. 2 Tor network [3]
390 G. N. Nedeltcheva et al.
type vector<unsigned_int32>group_parameter_hold. Identi-
ers of the groups will be stored in them, through which the
parts of the package will transfer. The most important part of
the solution is that only one part of package is allowed to
pass through a specic group.
3.2 Router Grouping
For the current implementation are used 10 groups of routers
of router_group type.
struct router_group
{
unsigned _int32 ID;
unsigned _int32 group_id;
};
Where ID is identicator for a current router, group_id is
group identicator which this router belongs.
Two initial operations are performedgroups creating
and router_group parameters initialization (Table 1).
The function which sets random group_id to a group of
routers, gets as parameters router_group and positive integer
number n:
At the end all the groups are collected in vec-
tor<router_group>groups:
groups.push_back(n0);
groups.push_back(n1);
groups.push_back(n2);
groups.push_back(n3);
groups.push_back(n4);
groups.push_back(n5);
groups.push_back(n6);
groups.push_back(n7);
groups.push_back(n8);
groups.push_back(n9);
3.3 Where the Implementation Is Added
in the Packet Structure?
struct TOR_ipv4_protected
{
unsigned _int8 version:4, ihl:4;
unsigned _int8 dscp:6, ecn:4;
unsigned _int16 total_length;
unsigned _int16 identification;
unsigned _int16 flags:3, fragment_offset:13;
unsigned _int8 time_to_live;
unsigned _int8 protocol;
unsigned _int16 header_checksum;
unsigned _int32 source_ip_address;
unsigned _int32 destination_ip_adress;
unsigned _int32 router_group_tаken;
};
For the needs of this implementation, unsigned _int32
options is replaced with unsigned _int32 router_group_taken.
In order to use group parameter hold, all the packages
have to store identication information, which indicates that
they are part of same package. The next example presents
simple implementation in which all packet parts of
packet_10 are initialized with value 1010. In the same
manner Packer_20 is initialized with 2020. That solution is
implemented only for the purposes of the present paper and
only 2 packages will be considered routing through the
network.
Example:
Example:
//Initialize parts of first packet
vector<TOR_ipv4_protected> packet_10;
for (int i=0; i<4; ++i)
{
TOR_ipv4_protected _new;
_new.identification = 1010;
packet_10.push_back(_new);
}
//Initialize parts of second packet
vector<TOR_ipv4_protected> packet_20;
for (int i=0; i<4; ++i)
{
TOR_ipv4_protected _new;
_new.identification = 2020;
packet_20.push_back(_new);
}
void group_id_random_assign (router_group &r, unsigned _int32 n)
{
random_group = rand()%100;
r.ID = n; r.group_id = random_group;
}
The Onion Router: Is the Onion 391
3.4 How the Implementation Is Used?
The most important part of the implementation is that it is
required if parts belong to certain package, they must go
through different groups.
void send_packets_to_random_groups(vector<TOR_ipv4_protected>
&packet_all)
{
srand (time(NULL));
for(int i = 0; i < packet_all.size(); i++)
{
__int32 random_hops = 1;
for (int j = 0; j < random_hops; j++)
{
__int32 random_group_index = rand()%groups.size();
router_group group = groups[random_group_index];
if (!check_for_exisiting_index(group_parameter_hold, group.ID))
send_packet_to_group(packet_all[i],
groups[random_group_index]);
}
}
}
Table 1 Creation and group
assign operations Creation Group assign
router_group n0;
router_group n1;
router_group n2;
router_group n3;
router_group n4;
router_group n5;
router_group n6;
router_group n7;
router_group n8;
router_group n9;
group_id_random_assign (n0, 1);
group_id_random_assign (n1, 2);
group_id_random_assign (n2, 3);
group_id_random_assign (n3, 4);
group_id_random_assign (n4, 5);
group_id_random_assign (n5, 6);
group_id_random_assign (n6, 7);
group_id_random_assign (n7, 8);
group_id_random_assign (n8, 9);
group_id_random_assign (n9, 10);
392 G. N. Nedeltcheva et al.
The group that the package takes is chosen randomly.
Using groups[random_group_index] a random group index
is set. This repeats for every package part checking if it
hasnt already taken it. All passes are stored in group_pa-
rameter_hold and the check is performed by:
bool check_for_exisiting_index(vector<unsigned __int32> used_indecies,
unsigned __int32 index)
{
router_group new_group = find_router_group_by_router_id(index);
for (std::vector<unsigned __int32>::iterator it=used_indecies.begin(); it
!= used_indecies.end(); ++it)
{
router_group used_group = find_router_group_by_router_id(*it);
if (new_group.group_id == used_group.group_id)
return true;
}
return false;
}
Boolean function which returns true if a current part of a
package has already passed through the group and it is false
if the pass is not allowed. When a group is taken, it is added
to group_parameter_hold so the next part of the same
package cannot choose this group again. This is done by:
void send_packet_to_group(TOR_ipv4_protected &part, router_group&
router)
{
part.router_group_taken = router.ID;
group_parameter_hold.push_back(router.ID);
}
3.5 Console Output
The two packages, their parts and the routers are presented
on the console output. When a package is identied with
1010 it shows that it is a part of a bigger package, consisting
of parts with the same identier. The precondition of not
taking the same group more than once is met: the rst is
taking group 80, second chooses 81, the third0 and the
fourth goes through group 33. The router identiers partic-
ipating in a current group are printed, too2, 1, 81, 4
(Figs. 3and 4).
Second compilations output is presented:
Now the values of routers and groups are different. The
reason is that the algorithm always assigns them randomly.
This implies next level securitythere is no template on
choosing the values.
The Onion Router: Is the Onion 393
Fig. 3 One exit of group hold algorithm
Fig. 4 Another random exit is presented when a second compilation is triggered
394 G. N. Nedeltcheva et al.
3.6 Advantages and Disadvantages
of the Implementation
One of the main advantages of this implementation is that
safety is improved. The implementation is limited to
non-complex tasks which allows easy maintenance. Dening
simple operations makes easy to perform unit and integration
verication. This solution is not only TOR limitedit makes
sense even in other cloud services. In a world where com-
puter threats are permanently increasing it is good to have
high security standards. This is a technology and as such it
has vulnerabilities, too.
Two of the most common cyber threats are the provision
of timely and qualitative countermeasures to the attacks, as
well as the extreme complexity that they have reached today
[4]. In the present section are described advantages and
disadvantages of the current implementation.
Advantage 1: Prevent man-in-the-middle attack
Man-in-the-middle is a very often performed attack fol-
lowing this scenario (Fig. 5).
User 1 and User 2 are communicatingUser 1 sends
information to User 2, but instead of reaching its destination
directly the message goes through a third machine owned by
the attacker and then reaches User 2. When User 2 tries to
send information back to User 1 it is again caught by the
man-in-the-middle. Not only trafc of a low level can be
interrupted, but high level trafc like e-mails and messages
are endangered, too. Moreover, if the attacker does not
change the information when it passes through him, User 1
and 2 may not suspect they are eavesdropped. This is one of
the reasons of not sending sensitive information through the
network, because somebody can be in the middle of its route.
Next level of man-in-the-middle attack is changing the
information. Even more, eliminating one of the users and
pretending to be him instead.
Solution: As soon as the group parameter hold solution
allows only one pass in current group, the man-in-the-middle
as part of come group would be able to catch only a part of
the information. The rest of it will be distributed across the
other router groups.
Advantage 2: Prevent DOS and DDOS attacks in certain
conditions.
Denial of service (DOS) and Distributed DOS are fol-
lowing this scenario (Fig. 6):
The attacker takes control over several machines in the
network. The next step is: everyone starts sending queries to
a certain server. The purpose of this attacker is DOS of the
destination due to inability to process all the data. This can
be critical for a software company in case of DOS of a mail
server for examplethen the employees would not receive
e-mails any more. The clients would not be able to connect,
too. Regarding the server itselfit will have no more
additional free space to process all the fake requests.
Solution: This implementation can prevent DOS and
DDOS attacks only in certain conditions, if all the requests
are treated as part of a same package. In this case they will
be distributed through the router groups. When they reach
the last group, no more fake requests can be sent. The reason
is that the algorithm allows only one part of the same
package to take a single group of routers. This will limit the
amount of requests to the number of groups implemented.
Advantage 3: Group solution is used widely in many soft-
ware technologies. That is why it will be easily perceived by the
IT society. The developers, network and system administrators
Fig. 5 Man-in-the-middle attack
[5]
The Onion Router: Is the Onion 395
are familiar with group strategies and use them well. Providing
a familiar work environment will result in greater continuity and
experiencethe advantages and the vulnerabilities of this
solution are already known (group policies as a management
strategy [8], VLANS [9] for improving security). Security
teams have been working on improvements in algorithms using
groups for a long time and the proposed implementation can
easily be upgraded for a higher level of security.
Disadvantage 1: With an extremely small number of
routers, groups and lots of packages, the group implemen-
tation solution will not work. The reason is in the require-
ment that no two parts of a package pass through the same
group. For example, lets have 100 routers randomly allo-
cated in 15 groups, each group having at least one router and
20 parts belonging to the same packet. In this situation, at
most 15 parts will be routed to the network, and the
remaining 5 will not be sent because there will be no
unspotted group.
The following parameters are introduced:
Let:
namount of routers
mamount of groups
lparts from a single package
Constrains and limitations:
nm and each m contains at least 1 element belonging to
n and m l
Disadvantage 2: Group parameter hold solution may
lead to lower performance. The reason is the following
verication:
()
if(!check_for_exisiting_index(group_parameter_hold,
group.ID))
()
It is called for every packet part routing. This veries that
the group is chosen for the rst time and there is no other
part which has already gone through it.
Disadvantage 3: Centralized memory containing all used
groups
()
vector<unsigned __int32>group_parameter_hold;
()
In order to ensure different group pass every time,
there is a place where all taken groups are stored. That is the
way to verify if the next hop is allowed. In the current
implementation this is covered by values stored in vector
structure.
Fig. 6 Distributed denial of
service attack [6]
396 G. N. Nedeltcheva et al.
Disadvantage 4: Another problem of the presented
solution is that for the current implementation there is no
mechanism of processing a lot of packages in parallel. The
operations are executing in a pipe, i.e. there is no way to start
new operation if the previous one has not yet nished.
4 Statistics of the Solution
In the current implementation there are n routers, distributed
in m groups and l package. In the following statistics are
presented different values for n, m and l representing the
number of possibilities for choosing different routes that
package can take.
Area of denition: There are no groups without included
routers.
N/AIn case the packages are more than groups dened
it is not applicable for the algorithm.
Current limitations: the packages and routers are distin-
guishable, but the groups are not (Table 2).
The algorithm in fact is providing more different route
possibilities. In real life all the groups, routers and packages
are distinguishable which increase the amount of routes.
5 Conclusion
In the present paper is presented an implementation aiming at
improving TOR security. The solution can also be used out-
side of it, because it offers a versatile grouping method. This
implementation would also enhance the security of other
cloud-based solutions as threats grow with technology
developments [7]. It is considered within the onion router
network, because it is subject to many hacker attacks.
Suggestions to improve the security of a new implementation
are always up to date and entire teams work on the security part
of the product being developed. Moreover, when talking about
Cloud services, the biggest concerns of customers are referred
to security. The idea of groups comes naturally, as it is widely
used in the IT [8,9]. So, in combination with cloud computing,
it becomes a pretty useful idea to improve the security level.
Table 2 Initial solution statistics namount of routers mamount of groups lamount package parts Possible different routes
11 1 1
11 l2 N/A
12 8l Out of area of denition
21 1 1
21 l2 N/A
22 1 2
22 2 2
22 l3 N/A
23 8l Out of area of denition
31 1 1
31 l2 N/A
32 1 2
32 2 2
32 l3 N/A
33 1 3
33 2 6
33 3 6
33 l4 N/A
34 8l Out of area of denition
8nmn8l Out of area of denition
8n8mlm N/A
nm1 m
n m 2 V (2; m)
n m l V (l; m)
The Onion Router: Is the Onion 397
The main purpose of this paper is to attempt a new level
of security not only in TOR, but in every routing system.
The group parameter hold is added in the package structure
which would not require additional space beyond the IPv4
package. The check if a group is available is not a complex
task so reducing performance in big amount is not expected.
The complete solution is at an early stage of development
and is used only for the purposes of this paper. The imple-
mentation is proprietary and does not borrow the source
code from third parties. Any information used by other
sources and authors is noted and described in the section
References.
References
1. Structure of Internet. http://www.lao.ca.gov/2000/013100_inet_tax/
FIG_1.GIF
2. TOR Project. https://www.torproject.org/about/overview.html.
en#whyweneedtor
3. Tor Network. http://www.extremetech.com/wp-content/uploads/
2014/08/Tor-software.png
4. Willian, D., Nedeltcheva, G.N.: Security in the supply chain of ICT
companies. In: 6th International Conference on Application of
Information and Communication Technology and Statistics in
Economy and Education (ICAICTSEE 2016). December 23rd
2016, University of National and World Economy (UNWE), Soa,
Bulgaria
5. Man in the Middle Attack. http://www.carmelowalsh.com/wp-
content/uploads/2015/03/mitm.png
6. Distributed Denial of Service Attack, http://harshaddhale.weebly.
com/uploads/7/5/3/3/7533197/9414632.jpg?598
7. Galia Novakova Nedeltcheva, Willian Dimitrov. Security Dynamics
adaptation of ICT structure to Cloud Computing and IoT
opportunities and threats. 2nd Intern. Conference High Technolo-
gies, Business, Society (HTBS)2017. Borovets, Bulgaria, 1316
March 2017. http://www.hightechsociety.eu
8. The Benets of Group Policy, http://blog.tcitechs.com/blog/
benets-group-policy/
9. Benets of VLAN, https://www.slideshare.net/logitrainsocial/
benets-of-vlan
398 G. N. Nedeltcheva et al.
The Role of e-Governance in IoT Semantic
Interoperability
Lyubomir Blagoev and Kamen Spassov
Abstract
In the article, we analyze the Semantic Interoperability
problems in Internet of Things. Currently it is hard to
integrate IoT components from different companies and
groups in a solution. The thesis discussed is that it is
unrealistic to expect creation of a common IoT environ-
ment that provides Semantic Interoperability because big
players are working to enforce their own standards.
e-Governance is presented as a generator of different
environments and also as a creator of resources of IoT
environments with Semantic Interoperability. Govern-
ments can play a role in IoT development by encouraging
the transfer of Semantic Interoperability from
e-Governance to IoT sphere. The problem of electronic
identication of individuals, articial assistants, orga-
nizations and objects in IoT environment is raised. There
is also a reverse effect: the development of IoT affects the
e-Governance development. The transfer of practices to
IoT in the area of Semantic Interoperability will lead to
the evolvement of a common semantic space in which
people interact with physical objects, organizations and
countries.
Keywords
Semantics Interoperability Internet of things
IoT e-Governance
1 Introduction
Internet of Things (IoT) development requires solving of
different problems. For two of them the proposed current
solutions are not so successful:
Security of IoT implementations;
Sematic Interoperability (SI) in integration of complex
IoT solutions.
The vision presented by Blagoev and Spassov [1]denes
SI as intrinsic to IoT implementations but also as a prereq-
uisite for realization of other IoT specics. All who work in
IoT need an environment that provides a comprehensive and
Common Semantic Interoperability (CSI). By now there are
many limited in their scope IoT solutions with Local
Semantic Interoperability (LSI) locally applied by different
companies or groups. It is hard to integrate different IoT
solutions each one with specic LSI.
The problem of SI is recognized long ago when systems
were dened as complexbut not as intelligent. The
problem was not named as semantic, but just as a problem
that can be solved using standards. Different organizations
like W3C, ISO, IEC created a lot of standards in this
direction, but the problem is still in place. Even such an
institution like European Union started and supports the
initiative SEMIC [2] as an essential element of a large-scale
program to achieve SI. But the application of the created for
this purpose is advisory rather than binding, which in itself
reects the lack of condence that CSI can be achieved even
in a community that has declared its intention to achieve
integration on the basis of generally accepted principles and
rules.
Gradually the problem of CSI acquired a paradoxical
characterall are aware of the problem, all are ready to
participate in creation of resources for its solution, but there
is no consensus, and above all, there is no desire for com-
mon utilization of the resources created.
L. Blagoev (&)K. Spassov
e-Governance Laboratory, Bulgarian Academy of Sciences,
Soa, Bulgaria
e-mail: lyuboblagoev@gmail.com
K. Spassov
e-mail: kspassov@gmail.com
©Springer Nature Switzerland AG 2019
A. Al-Masri and K. Curran (eds.), Smart Technologies and Innovation for a Sustainable Future,
Advances in Science, Technology & Innovation, https://doi.org/10.1007/978-3-030-01659-3_46
399
2 Who and What Semantic Interoperability
Needs?
Small IT players need SI to integrate their products with the
products of big players. They want to be able to integrate
with the products of all IT giants to achieve greater market
share. Therefore, small IT players need CSI. IT giants,
however, have opposite interestsfor them it is advanta-
geous to maintain LSI to keep in their orbit smaller IT
players and this way to protect better their market share. In
turn, IT end users have the same interest as smaller IT
playersthey would like to be able to assemble suitable for
their needs IT congurations without compatibility problems
of their components. This creates the impression that con-
sumers and small IT players are able to put enough pressure
on IT giants to adopt CSI.
An example from the recent past shows that this is not
possible. In 2006 AIIM launched a project interoperable
Enterprise Content Management (iECM) [3]. This project
was initiated under pressure from end users of the products
of large-scale projects involving the integration of hetero-
geneous systems. The aim of the project was the creation,
dissemination and application of a set of standards for
interaction of heterogeneous systems, which is also a key
feature of IoT implementations.
The project did not succeed. We can say IT giants ruined
it. Moreover, AIIM now is not what it used to be in 2006.
Which can be seen as bleak fate for anyone who tries to
establish CSI.
3 Is It Possible a Global CSI?
The answer is negative, but not as a conclusion from the
short but extremely dynamic IT history in recent decades.
We need to take into account the impending impact of
another player in IT eld. It is still seen as submissive to IT
development, as a consumer of IT implementations, but the
future will change that.
This player is e-Governance
From what has been achieved so far in different countries, a
major conclusion can be made: the more successful an
e-Governance implementation is the more comprehensive SI
is achieved. This results in a large volume of unied and
provided with formalized presentation denitions of con-
cepts, data, and processes. Here it is necessary to make an
important clarication: an environment with SI within an
e-Governance is subordinated to national law, which gives
the semantics of basic denitions of concepts, data and
processes. These denitions are not always optimal but
semantics set in is mandatory to use. An important element
of building e-Governance is to create denitions (including
formalized) with semantics equivalent to the relevant
enshrined in legislation. As a result of the establishment of
e-governance each country will establish national environ-
ment with SI. These environments more or less will differ
and SI could be consider as LSI.
This is currently happening in the EU regardless of the level
of harmonization of national legislations of the member states
and the European Program (currently ISA2 [4]) to achieve the
SI within the EU. Particularly indicative are the results of the
project to create Core vocabularies [5]. The work of working
groups for the creation of several widely used data models
uctuated between achieving optimal (whatever that means)
and as close as possible to the legal regulation of the semantics
of the same data in Member States. The second, as can be
expected, turned out to be mission impossible. The created
data models are not directly applicable in most Member States
because they do not comply with semantics of the national
legal regulations for them. Hence, the only signicant result of
the work on these Core vocabularies is that W3C recognized
some of the models and added them to their collection of
denitions of concepts, data and processes.
So far, the impact of e-Governance as SI-playeris
limited and suppressed with some acceptable compromises
(e.g. data for addresses, names of people, etc.) but only in
terms of off-line connectivity with datasets supported by
states. Soon, as a result of the Open data initiatives state
institutions will have to provide on line access to data
maintained by them and so will require some SI to the
integration of IT implementations in the private sector with
relevant IT congurations of state institutions.
Thus, each country will form a national SI (i.e. LSI) for
the following main reasons:
The establishment of SI environment for the purpose of
e-governance in any given country, which does not comply
with national legislation, requires modication of large
amounts of this legislation and related datasets supported
according to it. This is very costly, economically unaccept-
able, and will not happen with a leap, and if it happens, it
will happen gradually. Given the pace with which of EU
member states harmonize the laws, it can be estimated that
the reduction of differences in national legislations to a level
acceptable for a European SI will take, let say, 4050 years.
Any national legislation regulates semantics of about 15
20,000 concepts, data, and processes, which by itself is a
huge resource that slowly but surely will develop into for-
malized and unied denitions of the same concepts, data,
and processes during the process of e-Governance
development.
At this stage of IoT development, the inclusion of a
device in the IoT-conguration is seen in very narrow
400 L. Blagoev and K. Spassov
boundaries concerning mainly a functional integration, rep-
resented by a small set of concepts, data, and processes.
Recent advances the Articial Intelligence (AI) added as a
mandatory element of an IoT-conguration so-called as-
sistants. Their work requires the maintenance of a rich
semantic representation of different devices. Many of their
features are subject to legal regulation or control. Hence,
they have a statutory regulation and are parts of SI frame-
work of e-Governance with available denitions of concepts,
data, and processes.
Obviously, it is economically sound and sometimes
mandatory to reuse the already built e-Governance SI
resources in a country to achieve SI in IoT. Naturally, ICT
industry will react to such an economic stimulus and will
build some kind of national IoT SI. As a result, the devel-
opment and penetration of a globalSI becomes unrealistic.
However, this does not block the work on the creation and
distribution of IoT-compatible congurations.
4 The Question Is not Who Needs IoT SI?
the Question Is for What Purpose IoT SI
Is Needed?
IoT-interaction is constructed as a set of connected infor-
mation objects representing external physical objects or
systems. The connectivity is represented through the
exchange of data between objects and data processing in the
objects. In [6] this set of objects is called Home Digital
Community, which in itself is a typical IoT-conguration. In
such a conguration, both human and external
devices/systems are represented by corresponding commu-
nity objects. Conguration itself is assembled and ensures its
functioning in an environment LSI.
LSI in such an isolated environment is protected (ac-
cording [6]) from the inuence of external environments
through their SI communication infrastructure. The resour-
ces of this infrastructure provide a transition from arbitrary
external environment with SI to isolated environment LSI
and vice versa.
In such SI oriented architecture [6] the type of LSI
practically not only does not depend on external
devices/systems, but there is no signicant incentive to
choose a SI even due to market reasons. The cause is the
inevitable development of interface communication infras-
tructure, the volume and complexity of which depends on
the variety of external systems and devices involved in an
IoT-conguration. There are two important requirements to
such LSI environment:
1. Sustainability of LSI that provides seamless and viable
future development of IoT functionality. Such sustain-
ability requires ensuring the absence of changes in the
denitions of concepts, data and processes established in
LSI. Legislation can provide such sustainability. There-
fore, if a LSI is a further development of the
e-Governance SI in the country, it will be easy to achieve
the above-mentioned sustainability.
2. Transition from user friendlyto semantic friendly
user interface. Created IoT congurations will include
known types of systems and digital presentation of
familiar physical objects from the world in which we
live. To make it comfortable for IoT users of these sys-
tems and physical objects it is necessary to use familiar
adopted by all semantic representation. e-Governance SI
framework maintains such a representation.
e-Governance can play a signicant role in addressing the
SI problem in IoT. This role has to be recognized by the
state. The state has to invest more intensively in the estab-
lishment of e-Governance, because its results can be applied
in a much broader scale than is implicit in the very idea of
e-Governance.
5 IoT Identification and e-Governance
Another IoT-problem that is discussed still in future time is
the identication of individuals, organizations and objects
presented on the Internet. This problem has a variety of
technical solutions but the choice of a particular solution and
provision of security of its implementation is the responsi-
bility of the states within the realized e-Governance projects.
Here arises again the interoperability problem, this time
with additional complexity because it has to be solved at the
interstate level. In this regard, the EU has developed and
currently applies appropriate regulatory solution with Reg-
ulation 910 of 2014. The results of its application can serve
as a model for intergovernmental agreements to solve the
problem of IoT identication worldwide.
6 IoT Influence on e-Governance
There is also a reverse effect: the development of IoT affects
the e-Governance development. The current work on
e-Governance in different countries affects partly or does not
address at all the introduction of intelligence in
e-Governance. So customer service is limited to providing
administrative services in electronic form, access to open
data collected by the administrations, and services on the
open data provided to citizens and companies from third
parties.
The transfer of intelligence from the IoT world to the
e-Governance will transform administrations from perform-
ers of service requests of citizens and businesses into
The Role of e-Governance in IoT Semantic 401
intelligent assistants solving or assisting in solving their
problems related to the use of administrative services or, in
general, resources maintained by the state.
So far, the developed models of concepts, data, and
processes serving the practice of establishing and maintain-
ing sustainable SI in e-Governance are not designed to be
extended with additional semantic descriptions. This applies
to works such as the European Asset Description Metadata
Schema (ADMS) [7] and for earlier developments in dif-
ferent countries e.g. Bulgarian National Model of Data and
Processes in Administration (NMDPA) [8].
One of the most important but not the only one, extension
of the used concept models, data, and processes for the SI
concerns the introduction of lexical representation in the
composition of these models. This requires integration in
these models of lexical databases (for example, WordNet
[9]). In many cases, this can be a relatively difcult task.
Other important extensions of these models will serve the
learning process, decision-making, etc. In other words, the
perception of the work on the IoT and building
e-Governance as loosely coupled activities could lead to
duplication of identical inherently developments. This is not
only uneconomical but it will continuously generate con-
icts of semantic incompatibility.
7 Conclusion
Work on IoT emerged as a logical and essentially new stage
of development of information technology at which human
presence in the Internet integrates with the presence of
physical objects from the surrounding world. This can be
seen as a meeting of service systems to support human
activities with physical objects management systems. This
meeting enriches IoT with the experience of real-time con-
trol systems. The time for meeting of IoT with e-Governance
has come. The benets of this meeting will not only result in
exchanging know how, but rather will lead to mutual con-
vergence of resources. It will lead to the evolvement of a
common semantic space in which people interact with
physical objects, organizations and countries. This meeting
is inevitable. It can become a hard way when no planning
and management or relatively easy when engineers and
politicians work together. Hope we will choose the easier
way.
References
1. Blagoev, L., Spassov, K.: The end of IoT Enthusiasm or the
Beginning of a new IoT Vision. Soa University, Spring Scientic
Session of Faculty of Mathematics and Informatics, Soa, Bulgaria
(2016), available at https://www.researchgate.net/publication/
302278861_The_end_of_IoT_Enthusiasm_or_the_Beginning_of_
a_new_IoT_Vision
2. Semantic Interoperability Community (SEMIC), available at https://
joinup.ec.europa.eu/community/semic/description
3. AIIM Announces the Formation of the Interoperable Enterprise
Content Management (iECM) Consortium (2006), available at
http://www.marketwired.com/press-release/aiim-announces-
formation-interoperable-enterprise-content-management-iecm-
consortium-680568.htm
4. ISA
2
Program, Interoperability Solutions for Public Administra-
tions, Businesses and Citizens, available at https://ec.europa.eu/isa2/
home_en
5. Core Vocabularies: Meta Data Standards. https://ec.europa.eu/isa2/
solutions/core-vocabularies_en
6. Blagoev, L., Spassov, K.: Smart Home as a Digital Environment.
Soa University, Spring Scientic Session of Faculty of Mathe-
matics and Informatics, Soa, Bulgaria (2015), available at https://
www.researchgate.net/publication/275032974_Smart_Home_as_a_
Digital_Environment
7. Asset Description Metadata Schema (ADMS), W3C (2013),
available at http://www.w3.org/TR/vocab-adms/
8. Blagoev, L., Spassov, K.: National model of data and processes in
administration (NMDPA)part of the semantic network of the
administration. In: International Conference InfoTech-(2013), avail-
able at https://www.researchgate.net/prole/Lyubomir_Blagoev/
publication/272022118_NMDPA_Part_of_the_Semantic_Network_
of_the_Administration/links/54d8dfeb0cf25013d0406d9e.pdf
9. Fellbaum, C. (ed.): WordNet: An Electronic Lexical Database. MIT
Press, Cambridge, MA (1998), available at https://mitpress.mit.edu/
books/wordnet
402 L. Blagoev and K. Spassov
The Role of the Roads and Transport
Authority (RTA) in the Transformation
of Dubai into a Smart City
Hatem Ahmed Adela
Abstract
This paper investigates the contribution of the Roads and
Transport Authority (RTA) to enable Dubai to be a smart
city for the period 20052016. The relationship between
RTA and Dubai development manifest obviously,
whereas, the appliance of the integrated urban develop-
ment plans requires developing projects include the
potential technological aspects that would enable the city
to be a smart city. The research analyzes the RTA projects
that enable Dubai to include elements of the smart city
which imply the potential technological aspects, as well
as providing an econometrics analysis by using cointe-
gration analysis and error correction model. The conclu-
sion indicates that the RTAs smart transport systems
contribute to increasing the value added of the informa-
tion and communication sector in Dubai, as well as the
increase in the number of New Vehicles Registered in
Dubai and the Road Lengths in Dubai leads to an increase
in Investment of Information and Communication Sector.
Where the sectors investment is signicantly affected by
the development of the RTA projects that implement the
world rst-class technology and highest smart systems.
Keywords
Dubai The roads and transport authority (RTA)
Smart city Infrastructure investment Integrated
urban development plans
1 Introduction
The dense populations in the modern cities impose chal-
lenges to experiment new approaches intended to facilitate
the continuing growth by the integration of all the economic
activities, based on the information technology, urban
infrastructure, professional human resources and norms of
behaviour. As well as the globalization puts the cities in a
competition to gain a maximum utility form their resources,
in addition to the increase of the citizenswants. The hurdle
of these overwhelming challenges requires the urban system
collaborative to develop the inter-disciplinary collaboration
that controls both of macroeconomic activity and micro
levels. The implementation of the urban system collaborative
creates a smart city.
Dubai is the largest city in the United Arab Emirates; the
population increased from 1.3 million in 2005 to 2.7 million
in 2016, as well as the number of tourists increased from 6.1
million in 2005 to 14.9 million in 2016 [1]. It derived its
fame and prosperity from trade and became one of the
biggest trade centers in the world. It started the Planning for
urban development over the past two hundred years and
implemented the integrated economic policies for consoli-
dating the Dubais thriving commercial center. Dubai set up
a modern municipality in 1938 to improve the city to its
rapid economic growth and to plan future infrastructure
development with the idea of keeping Dubais character as a
merchant community [2].
The recent approach of Dubai economic policies places
the concept of the smart city in the center of integrated
economic Planning for achieving the urban development.
Where, technological developments have become increas-
ingly omnipresent in Dubai for optimizing the use of nite
resources to provide a sustainable boom without disturbing
the environment and deliver sustainable prosperity to their
citizens to improve the quality of their life, as well as for
achieving the happiness of present and future generations.
Therefore, it launched Strategic Plan 2015 which
describes the future of Dubai into six themes; the most
signicant of them is to be a smart and sustainable city,
through drive major investments in broadband infrastructure
that supports the economic and social life of Dubai as a city
matches world-class of efciency and citizen accessibility.
As well as allow the city growth through a diversity of
H. A. Adela (&)
American University in the Emirates, Dubai, UAE
e-mail: hatem.adileh@aue.ae
©Springer Nature Switzerland AG 2019
A. Al-Masri and K. Curran (eds.), Smart Technologies and Innovation for a Sustainable Future,
Advances in Science, Technology & Innovation, https://doi.org/10.1007/978-3-030-01659-3_47
403
economic sectors. The government structures and local
authorities built for city sustainable, efciency and innova-
tion. Dubai looks forward to the city of the future; it
establishes all crucial infrastructures such as the high stan-
dard roads, bridges, and water and energy systems, with an
accurate system of maintenance activities.
It also needs security, which considered a core require-
ment for a smart city. Where the economic development in
Dubai requires the existence of different nationalities and the
necessity of control them. It needs more than other smart
cities to digital actions to be implemented automatically
when an event happens and empowers citizens and inhabi-
tants to have a readiness to variant events. The signicant
role of the Roads and Transport Authority (RTA) on Dubai
development shows through determinants that included in
the two main denitions of the smart city. First, focuses on
the investments lead to sustainable development, through the
integrated urban development plans, which reects in sus-
tainable smart urban economic growth, increased quality of
life and management of natural resources.
Second, identies the smart city by digital intelligence
based on technology and human intelligence based on
knowledge and innovation. While technologies develop at a
fast pace and put pressure towards their usage technological
push, the demand for implementation of smart cities is also
important application pull. This approach focuses on the
application by local authorities of the human and digital
intelligence in planning development. From both view-
points, the Roads and Transport Authority (RTA) not only
an authority meant to contributes to overall urban develop-
ment through Dubai adopts the integrated urban develop-
ment plans for achieving the growth, but also specic project
contributes as part of strategic planning to make Dubai as a
smart city.
This study focuses on endeavours made by local
authorities. The Roads and Transport Authority (RTA) as a
model contributes towards becoming Dubai a smart city.
Accordingly, the research was divided into three parts. The
rst part investigates the literature review, which focuses on
the role of the public authorities in transforming cities into
smart ones. The second investigates the role of the RTA in
such transformation of the city of Dubai. The third part
estimates the relationship between the RTA projects and the
information and communication technology (ICT) develop-
ment in Dubai.
Research Objective
The study aims to investigate the role of the Roads and
Transport Authority (RTA) on achieving the integrated
urban development plans to enable Dubai to be a smart city
by using the modern econometric methods, which have not
been highlighted, especially, in the recent researches.
Research signicance
The study manifests the role of massive authorities through
the integrated urban development plans to enable the cities to
be smart, the Roads and Transport Authority (RTA) in Dubai
as a model. Also, illustrates the importance of further studies
that examine the contribution of the public authorities on
cities to be smart by using the econometric methods.
Methodology
The study based on the inductive approach to analyzing the
role of the Roads and Transport Authority (RTA) to trans-
form Dubai into a smart city. Also, the econometric methods
Co-integration analysis and error correction modelfor
estimating the relationship between the RTA projects and the
development of information and communication technology
(ICT) sector in Dubai.
2 Literature Review
There are two main streams of research initiatives of the
smart city. First, every procedure relative to governance and
agencies authorities use new thinking paradigms to promote
the economy and the quality of citizenslife. Second, the
smart city is all about the integration of Information and
Communications Technology (ICT), networks of sensors
and intelligent devices conduct the city movement. There is
no generally agreed upon denition what makes a city smart,
almost researches indicate to technological dimensions,
implementations of Information and Communications
Technology (ICT) in cities. Other indicates to the infras-
tructure investment. Therefore, a city considered smart when
investments both in traditional and in modern sectors with
the involvement of public authorities and efcient conduct of
natural resources for achieving sustainable economic growth
and increase the quality of life.
The phrase of smart city has been adopted since 2005 by
many technology companies (Cisco 2005; IBM 2009; Sie-
mens 2004) for the application of complex information
systems to integrate the operation of urban infrastructure and
services such as buildings, transportation, electrical and
water distribution, and public safety. It has since evolved to
mean almost any form of technology-based innovation in the
planning, development, and operation of cities [3].
404 H. A. Adela
Joshi et al. [4] considers the most important factor
affecting the smart city initiative is Sustainability by the
integrative framework of Social, Management, Economy,
Legal, and Technology. Where, the urban civilization chal-
lenges are the pollution level, scarcity of resources and
trafc, it can develop and conduct all infrastructures: roads,
tunnels, and water and energy networks. Also, foster needs
related to security.
Mitchell [5]denes the smart city technologically, that
uses broadband infrastructure to support e-Governance and
effective environment for operating the transactions ef-
ciently. Dirks and Keeling [6] consider the transport as one
of the core systems of smarter cities; they identied the
smart city which has interrelationships between core city
systems: Communication, Business, Transport, Energy,
Water, and Human Capital. Cairney and Speak [7] consider
the smart city initiative exists by developing the information
technology capacities in collaboration with public sector
institutions for business and community development.
Bronstein [8] explains the signicance of architectural forms
of buildings related to other structures such as the streets and
the overall design of a community to create an environment
for industrial development, productivity improvement and
facilitate the dense.
Ballas [9] indicates to the role of the government and
public authorities for the goal of enhancing the quality of life
for their citizens and creating of subjective happiness. They
are embracing the notion of a smart city for targeting social
justice, urban and regional planning and sustainable devel-
opment. Washburn et al. [10] identies a smart city is a city
with a great presence of Information and Communications
Technology (ICT) implements on the critical infrastructure
and services. Caragliu et al. [11] indicates to the role of
investments of governmental agencies in human capital,
transportation and communication infrastructure for
enhancing sustainable economic growth and a high quality
of life, with an optimizing of natural resources. Chen [12]
denes a smart city which can provide the infrastructure
needed, software networks services, devices and sensors to
optimize electrical, transportation and other logistical oper-
ations for conducting daily people life.
Jensen et al. [13] formulates a model of smart cities based
on trafc generation rules to be applied over the Geographic
Information Systems. Eger [14] indicates to a smart com-
munity which makes decisions depends on crucial technol-
ogy and high-speed broadband infrastructures to satisfy
society and business needs. Raj and Raman [15] identies a
smart city based on information technology used by smart
governance, the inow among different subsystems for
enhancing citizen services, business services and makes the
ecosystem more efcient to enable the city sustainable.
Komninos et al. [16] indicates to the role of the road map
on Smart City. the research proposes a smart cities
innovation roadmap framework for supporting the innova-
tion strategies of the smart city. Neirotti et al. [17] explains
the concept of a smart city through applications: natural
resources, energy, transport the pertinent, mobility, build-
ings, living, government, economy and citizens. Hall [18]
identies a smart city that monitors and integrates conditions
of all its critical infrastructures including roads, bridges,
tunnels, rails, subways, airports, seaports, communications,
water, power, major buildings, as well as optimize its
resources, plan its preventive maintenance activities and
monitor security aspects. Harrison et al. [19] identies a
smart city which implies the ows of information both
vertically, within the infrastructure system and horizontally,
among the many different infrastructure systems.
Angelidou [20] identies a smart city by two dimensions.
First, relatives to knowledge and innovation economy based
on technology, where the technological advancement
improves urban function management in elds such as
transport, energy, healthcare, water and waste technological
push. Second, relatives to the demand for implementation
of the smart city, the technologies development put pressure
towards their usage for implementation to solve the prob-
lems efciently and sustainability application pull.
Ahvenniemi et al. [21] suggests that the performance of
smart cities should be measured not only by implementing
smart solutions, but also through its ecological, economic
and social sustainability, that contribute to smart urban
growth and development, He concludes the use of the term
smart sustainable citiesinstead of sustainable cities or
smartcities. Demetri [22] identies a smart city which has
some aspects. First, the infrastructure investment uses
broadly with the extensive use of information and commu-
nication technologies to optimize the services for citizens
and businesses. Second, it takes economic advantage of the
benets of ICT opportunities to increase local prosperity and
competitiveness. Third, the Social role of the human in
urban development is highlighted; a smart city involves the
citizen participation in urban planning and territorial plan-
ning. Fourth, Environmental guarantees and renewable use
of exploitation and natural heritage, where resources are
scarce, and cities increasingly rely on the availability of
tourist and natural resources. Fifth, Road trafc management
saving time and helping to reduce road congestion and
public transport help citizens to improve urban mobility.
3 The Contribution of the RTAs
Technological Investment to Transform
Dubai a Smart City
The Roads and Transport Authority (RTA) established in
2005 through an organizational structure that adopts an
integrated corporate governance model to plan and
The Role of the Roads and Transport 405
implement road and marine networks and keep up with the
latest technologies and innovative methods to support the
fact that Dubai is one of the fastest growing cities in the
world. Therefore, the Authority has set its strategic objec-
tives towards the contribution to transforming Dubai into a
smart city and implementing happiness strategies, as well as
achieving environmental sustainability (Fig. 1).
It adopts the Smart Systems Since the Government of
Dubai launched the smart government program within the
strategic plan 2021 to make Dubai a smart city. The RTA
implements many different applications such as RTA Mobile
Applications, RTA Smart Drive, Drivers and Vehicles App,
RTA Dubai App, Smart Taxi, Salk App, Public Transport
App, Sharekni App and Wojhati App. In addition to, a
signicant number of smart services for Driver and Car
owner services, Public transport services and Business ser-
vices [24] that contribute towards environmental conserva-
tion. Whereas, the customers can save an average of 28 km
per transaction processed through smart applications and
websites, as well as reducing carbon emissions by 10 kg per
transaction [25].
The RTA strategy designed to make public transportation
by smart systems the preferred choice for mobility through
the integration between road networks and public transport
systems for reducing carbon emissions compared to private
vehicles and launched a pilot project for Compressed Natural
Gas (CNG) buses and a carbon footprint measurement
project for vehicles in Dubai. Therefore, the energy con-
sumed per passenger Decreased by 7% from 2013 to 2015.
Also, the carbon emissions decreased by 8.8% in 2016 and
aim to reach 16% in 2021 concomitant to the strategy for
energy and carbon reduction for supporting energy preser-
vation and Green Economy in the projects and services. As
well as, it applied plans comprise the implementation of
power saving road lights and establishment of transport
network infrastructure inherent with green building
requirements and the usage of environmental-friendly vehi-
cles of public transport eet. Additionally, it Plans to
increase in the length of the public buses network to reach
around 4300 km in 2020, then to be 5400 km in 2030 and
increase in the marine transport network to be 60 km with 22
stations [26]. It has completed the installation of 618 mon-
itors that display bus schedules of 461 bus stops. Passengers
can acquire information about bus arrival time at bus stations
[27].
Furthermore, the RTA executes one of the most vital
technological projects of smart transportation, the Enterprise
Command and Control Centre (EC3) at a cost of AED 335
million and covers an area of 6996 m
2
, which further Dubai
ambition in transforming Dubai into the smartest city
worldwide in the eld of transport [28]. A unied platform
brings control of different modes of transport under one
umbrella for linking different operations control centers of
the operational agencies including the Dubai Metro, Dubai
Fig. 1 The roads and transport
authority structure [23]
406 H. A. Adela
tram, public buses and taxis and trafc systems control
centers with a central and integrated control unit that com-
municates simultaneously with all RTAs agencies and
sectors.
As well as, it has launched in 2017 an Integrated Mobility
Platform project which enabling customers easy access to all
RTAs mass transit systems through a single window by
smart app integrating with services provided by other entities
in Dubai, organizing electronic taxi booking services and
running limo services [29]. The project offers the available
mobility options that enable the user to plan the journey and
arrange the booking and payment in a smooth and integrated
method. Furthermore, it accomplished environmental-
friendly Hybrid taxis in 2008 which reduce carbon emis-
sions by more than 27% compared to other vehicles and
plans to increase the Hybrid vehicles by 50% by 2021.
Therefore, the number of public transport passengers has
increased from 163 million passengers in 2006 to 539 mil-
lion passengers in 2015 and carried over 1 million passen-
gers per day in the same year.
A smart dynamically charge for cars on the busiest
highway implements by Salk toll system into Dubai for
reducing trafc congestion and Carbon emissions. While
generating revenue ow has reached about 1.4 billion by
2016. Also, implements a new NFC Near Field Commu-
nicationbased on Smart NOL card service that enables
customers to pay the fare for daily trips by passing their
Smartphone through the devices installed at the gates of
Dubai Metro, public buses and water buses [30].
Additionally, a Smart Dubai Metro is the largest driver-
less metro network in the world contributes to the reduction
of carbon emissions by 309 thousand tons in 2015, the
removed CO
2
emissions by using Dubai Metro decrease
from 59 tCO
2
in 2013 to 125 tCO
2
in 2015 [31]. Where, it
works by electricity according to an integrated system for
public transport and implement the highest technology like
the usage of electricity generation of brakes. Therefore,
Dubai Metro reached its break-even plan within just a few
years and accomplished positive outcomes in terms of
cost/benet analysis. Till the end of August 2017, the Metro
has lifted 1.028 billion riders and generates about AED
10 billion. It plans to raise the share of public transport in the
peoples mobility to 30% by 2030 and reach to 70 Metro
stations by 2020 [32].
The RTA launched in 2016 Hi-tech transport system to be
the worldsrst operational Hyperloop trains system which
is expected to begin operations for passengers in 2020.
Passengers will be able to book travel on the magnetically
levitated system with a Smartphone applications and
travel between the Emirates at 1200 km per hour [33].
The RTA trials the air taxi in 2017 to launch the rst vehicle
capable of carrying two passengers after signing an agree-
ment with specialist German Company in the manufacturing
of Autonomous Air Vehicles. The air taxi is characterized by
its autonomous ying and powered by electricity with high
safety features; it has 18 rotors to ensure safe cruising and
landing of the taxi in case of any rotor failure. The project
contributes to eliminate congestion, generate new revenues
and sustain Dubai into a smart city [34].
Therefore, The RTAs smart system implementations
contribute to increasing the value added of the information
and communication sector in Dubai from AED 11.1 billion
in 2007 to AED 14.5 billion in 2015 at a growth rate of
30.6%. Despite the decline in the investment of the sector
from AED 5.8 billion in 2007 to AED 3.6 billion in 2015 by
37.9%, as well as the foreign direct investment in the sector
increased by 123 during the period. This indicates the ef-
ciency of the smart systems in Dubai, especially, in the
transport sector. Where the investment increased from AED
11.2 billion in 2007 to AED 23.4 billion in 2015, also, the
contribution to the GDP increased from 10 to 11.4% during
the period [35].
4 Estimate the Relationship Between
the RTA and the Investment
of the Information and Communication
Sector
This model aims to estimates the relationship between the
development of the Information and Communication sector
(ICT) and the independent variables which express the
expansion of the RTA activities in Dubai.
4.1 Source of Data
The study used annual time series data during the period
19952016, the data of GDP at constant prices and the
investment of the information and communication sector
obtained from the Dubai Statistics Center, the data on road
lengths and the number of vehicles registered obtained from
the Roads and Transport Authority (RTA).
4.2 Model Variables
CIVN: The Investment of Information and Communica-
tion Sector
DGDL: GDP at Current Prices of Dubai
CARN: The Number of New Vehicles Registered in
Dubai
RODL: The Road Lengths in Dubai
The Role of the Roads and Transport 407
4.3 Model Formulation
The linear formulation of the relationship gave spurious
results, the diagram of the variables showed up the insta-
bility of the mean and the variance, where T and R
2
coef-
cients recorded very high values. Therefore, the data
transformed into logarithms and the model formulated
according to the logarithmic formula, which releases the
series of variance and the difference method releases the
series of the general trend to become stationary in the mean
and variance.
The investment function of the information and technol-
ogy sector can be expressed as the following formula:
Log CIVNt=a + B
1Log DGDLt+B
2Log CARNt
+B
3Log RODLt
ð1Þ
4.4 The Parameters Estimation Includes
the Following Steps
Unit Root Test Results. Augmented Dickey-Fuller test
considered the best method to test the unit root and deter-
mines the degree of variables integration. The Unit Root test
is applied on time-series of variables according to the
following formulas (Table 1):
DCIVNt¼aþbCIVNt1þX
v
ðr¼1Þ
DCIVNtrþUt
DDGDLt¼aþbDGDLt1þX
L
j¼1
DDGDLtjþUt
DCARNt¼aþbCARNt1þX
k
i1
DCARNtiþUt
DRODLt¼aþbRODLt1þX
m
e¼1
DRODLteþUtð2Þ
where:
H
0
:b=0
H
1
:b<0
The equations by intersection and trend.
Lags determined according to minimize the degree of
autocorrelation of errors
ADF values are T. Statistic values corresponding to
parameter B, whereas b=(1B) which are compared
to T. Critical values from expanded MacKinnon tables;
Mac.val.
The table shows that: ABS [t
tab
] < ABS [t
cal
]
Therefore, the null hypothesis is rejected, and the alter-
native hypothesis is accepted, that the variables are inte-
grated of the rst order I (1), the rst differences are
stationary, where the alternative hypothesis is accepted at
1% signicance level for all variables except the GDP of
Dubai at 5% signicance level.
Cointegration Test Results. Johansen Co-integration
Test uses to test the long-term relationship among the vari-
ables of the rst order I (1) based on Augmented Dickey-
Fuller test of the unit root, through comparing the calculated
Eigenvalue (k) with the Tabulated values kmax and ktrace
statistical tests of the roots (Table 2).
where:
Trace
test:
k
H
0
:r=0
H
1
:r=1,2,3
Max
test:
k
H
0
:r=0
H
1
:r=1
The linearity of the time series of the variables under
consideration is tested in the presence of lags. Also, the
variables integrated of the rst order and determined
according to A Kaike Information Criterion (AIC). The
Cointegration test in the table shows the variables are
cointegrated. kTrace test indicates one cointegrated equation
at 5% signicance level.
Table 1 Augmented
dickey-fuller test results Series (ADF) test statistics of unit root
Max lags Levels ADF Max lags Ist difference ADF
Mac.val Mac.val
1% 5% 1% 5%
CIVN 2 3.770 3.005 1.135 2 3.78 3.012 5.182
DGDL 2 3.770 3.005 0.785 2 3.78 3.012 3.016
CARN 2 3.769 3.005 0.267 2 3.78 3.012 4.340
RODL 2 3.770 3.005 0.071 2 3.78 3.012 3.082
408 H. A. Adela
Whereas: k
trace
(cal)
<k
trace
(tab)
Test k
max
indicates one cointegrated equation among
variables at 5% signicance level.
Where: k
max
(cal)
<k
max
(tab)
Estimation the Parameters of Error Correction
Model. The error correction model formula contains both
the long-term relationship including the lags, in addition to
short-term relationship including time-series differences,
which reects the change in values from period to another.
The error correction model formula is as follows:
DCIVNt¼a+B
1DDGDLt+B
2DCARNt
+B
3DRODLt+B
4DUt1+E
t
ð3Þ
where: Δindicates the rst difference.
ΔU
t-1
: the lag value for error of one period due to
Co-Integration regression
The long-term relationship of the CIVN function by two
lags as the follows:
CIVNt¼10:96163 þ3:86 DGDLt
ð20:827Þ
þ5:97 CARNt
ð22:422Þþ2:86 RODLt
ð26:739Þ
ð4Þ
The equation shows up the following:
1. The equation is consistent the economic theory hypoth-
esis, whereas, there is a positive correlation between the
Investment of Information and Communication Sector
(CIVN) and GDP of Dubai at Current Prices (DGDL),
the number of New Vehicles Registered in Dubai
(CARN) and the Road Lengths in Dubai (RODL).
2. The variables are signicant at 1% level.
3. The increase in GDP of Dubai (DGDL) by 1% leads to
an increase in the Investment of Information and
Communication Sector (CIVN) by 3.8%, whereas, the
multiplier impact of investment manifests after two lags.
This Indicates Dubais interest in rapidly developing the
sector to transform into a smart city.
4. The increase in the number of New Vehicles Registered in
Dubai (CARN) and the Road Lengths in Dubai (RODL)
by 1% leads to an increase in the Investment for Infor-
mation and Communication Sector (CIVN) by 5.6, 2.9%,
respectively, that indicates the sectors development is
signicantly affected by the increasing of RTA projects,
which implement the highest world-class technology of
smart systems in the transportation sector (Table 3).
The Vector Error Correction (VEC) indicates the fol-
lowing relationship:
D(CIVN) = 0.93 ΔCIVN
t-1
1.74 ΔCIVN
t-2
+ 1.21
ΔDGDL
t-1
+ 3.80 ΔDGDL
t-2
1.09 ΔCARN
t-1
2.77
ΔCARN
t-2
0.74 ΔRODL
t-1
+ 0.24 ΔRODL
t-2
+ 0.27
The error correction model (ECM) proves that the devi-
ation between variables from the general trend in the long
term has corrected through the short-term relationship, the
variable for adjusting the deviation is (CIVN) by 1.67% and
(CARN) by 2.7% during the second period.
As well as, the Theils Inequality coefcient test indicates
the high efciency of the model forecasting, whereas Theils
coefcient amounted 0.008 (Table 4).
There is a causality relationship, which shows in bidi-
rectional between both the GDP of Dubai (DGDL) and the
Investment of Information towards Communication Sector
(CIVN) at signicant level 1%, as well as, shows in one
direction between both (CIVN), (DGDL) towards (RODL)
at 1, 5% signicant level respectively, Moreover, the causal
relationship shows between (CARN) towards both (DGDL),
(CIVN) at 1% signicant level. This refers the addition of
(DGDL) and (CARN) to the (CIVN) function leads to
improve the results of the regression correlation.
Table 2 Johansen co-integration
test results Test statistics Estimated co-integration equations
0r1r2r3r
(
k
) Eigen value 0.866 0.601 0.301 0.095
k
trace
(cal) 71.315 28.986 9.651 2.98
5% (tab) 47.856 29.797 15.494 3.841
k
max
(cal) 42.329 19.334 7.553 2.982
5% (tab) 27.584 21.131 14.264 3.841
The Role of the Roads and Transport 409
5 Conclusions
The Roads and Transport Authority (RTA) has set up its
strategic objectives towards the consolidation of Dubai into a
smart city. It implements the most vital technological pro-
jects of smart transportation such as the Enterprise Com-
mand and Control Center (EC3), Integrated Mobility
Platform project, environmental-friendly Hybrid taxis, the
largest driverless metro network in the world, the Hyperloop
trains system, the air taxi, a dynamically charge for cars on
the busiest highway, a new NFC Near Field Communica-
tion. Also, many different applications such as RTA Mobile
Applications, RTA Smart Drive, Drivers and Vehicles App,
RTA Dubai App, Smart Taxi, Salk App, Public Transport
App, Sharekni App and Wojhati App. Additionally, a sig-
nicant number of smart services for Driver and Car owner
services, Public transport services and Business services.
The RTA aims to environmental sustainability, whereas,
the smart applications save an average of 28 km per trans-
action processed and reducing carbon emissions by 10 kg
per transaction, as well as the public transport systems
contribute to decreasing the carbon emissions by 8.8% in
2016 and aims to reach 16% in 2021. In addition to, the
Dubai metro decreased the CO
2
emissions from 59 tCO
2
in
2013 to 125 tCO
2
in 2015. The number of public transport
passengers has increased to carry over 1 million passengers
per day. Therefore, the RTA generates total revenue ow
amount to AED 7.6 billion in 2016, it has accomplished the
budget balance and contributed to 16% in the Dubai
government budget.
The RTAs smart transport systems contribute to
increasing the value added of the information and commu-
nication sector in Dubai to AED 14.5 billion in 2015 at a
growth rate by 30.6% compared with 2007, despite the
decline in the sector investment by 37.9% in 2015. This
indicates the efciency of the smart systems in Dubai,
especially, in the transport sector which contributes to
increasing the GDP from 10% in 2007 to 11.4% in 2015.
Johansen Cointegration Test shows up a long-term rela-
tionship between variables of the rst order I (1) at 5%
signicance level.
The increase in the number of New Vehicles Registered
in Dubai (CARN) and the Road Lengths in Dubai (RODL)
Table 4 Granger causality test
results Dependent variable Independent variable Chi- Sq. Prop
D(CIVN) D(DGDL) 13.40 0.000
D(CIVN) D(CARN) 12.24 0.002
D(RODL) D(DGDL) 5.96 0.050
D(RODL) D(CIVN) 16.26 0.000
D(DGDL) D(CIVN) 8.63 0.013
D(DGDL) D(CARN) 22.11 0.000
Table 3 Vector error correction
(VEC) results Variable The coefcient of speed adjustment T. statistic
CIVN
t-1
0.932 1.75
CIVN
t-2
1.67 2.44
DGDL
t-1
1.21 1.255
DGDL
t-2
3.80 3.397
CARN
t-1
1.97 1.268
CARN
t-2
2.77 3.212
RODL
t-1
0.74 1.157
RODL
t-2
0.24 0.686
C 0.273665 1.818
Coint Eq1 0.271070 1.754
R
2
0.70
Adj. R
2
0.43
F-statistic 2.610
A Kaike 0.120
Theil Coa 0.008
410 H. A. Adela
by 1% leads to an increase in Investment of Information and
Communication Sector (CIVN) by 5.6, 2.9%, respectively.
This indicates the sectors investment is signicantly affec-
ted by the development of the RTA projects that implement
the world rst-class technology and highest smart systems.
The variables responsible for correcting the deviation of
variables in the long term is (CIVN) by 1.67% and (CARN)
by 2.7% during the second period.
Granger Causality Test shows the causality relationship
in bidirectional between both the GDP of Dubai (DGDL)
and the Investment of Information towards Communication
Sector (CIVN) at 1% signicant level. As well as the
causality relationship shows in one direction between
(CARN) towards both (DGDL), (CIVN) at 1% signicant
level. Moreover, it shows between both (CIVN), (DGDL)
towards (RODL) at 1, 5% signicant level, respectively. The
Theils Inequality coefcient test amounted 0.008. This
indicates the high efciency of the model forecasting.
References
1. Dubai Statistics Center, Population and Vital Statistics. Retrieved
from https://www.dsc.gov.ae/en-us/Themes/Pages/Population-and-
Vital-Statistics.aspx?Theme=42. Accessed at 9 May 2017
2. Al Sayegh, F.: Merchantsrole in a changing society: the case of
Dubai, 190090. Middle Eastern Stud. 98 (January 1998).
Retrieved from http://www.tandfonline.com/doi/abs/10.1080/
00263209808701211?journalCode=fmes20
3. Harrison, C., Donnelly, I.A.: A Theory of Smart Cities. IBM UK
Limited, pp. 23 (Jan 2011). Retrieved from http://www.
interindustria.hu/ekonyvtar/en/Smart%20cities%20and%20commu
nities/Publications/A%20theory%20of%20smart%20cities.pdf
4. Joshi, S., Saxena, S., Godbole, T.: Shreya. Developing Smart
Cities: An Integrated Framework. In: Procedia Comput. Sci. 93,
902909 (2016). Retrieved from http://www.sciencedirect.com/
science/article/pii/S1877050916315022
5. Mitchell, W.J.: Designing the digital city. In: Ishida, T., Isbister, K.
(eds.) Digital Cities, Lecture Notes in Computer Science, vol.
1765, pp. 16. Springer, Berlin Heidelberg (2000). Retrieved from
https://link.springer.com/chapter/10.1007/3-540-46422-01
6. Dirks, S., Keeling, M.: A Vision of Smart Cities; How Cities Can
Lead the Way into a Prosperous and Sustainable Future. IBM
Institute for Business Value, Dublin, pp. 116 (2009). Retrieved
from https://www-03.ibm.com
7. Cairney, T., Speak, G.: Developing a Smart City: Understanding
Information Technology Capacity and Establishing an Agenda for
Change, p. 7. Center for Research and Innovation, Canada
8. Bronstein, Z.: Industry and the Smart City. Dissent mag. 56(3),
2734 (2009) (New York). Retrieved from https://www.
dissentmagazine.org
9. Ballas, D.: What makes a happy city? Elsevier 32(1), 3950 (July
2013). https://doi.org/10.1016/j.cities.2013.04.009. Accessed at
15 Aug 2017
10. Washburn, D., Sindhu, U., Balaouras, S., Dines, R.A., Hayes, N.,
Nelson, L.E.: Helping CIOs Understand Smart CityInitiatives:
Dening the Smart City, Its Drivers, and the Role of the CIO,
pp. 117. Cambridge, MA: Forrester Research (February 2010).
Retrieved from https://www.forrester.com/report/Helping+CIOs
+Understand+Smart+City+Initiatives/-/E-RES55590
11. Caragliu, A., Del Bo, C., Nijkamp, P.: Smart cities in Europe.
J. Urban Technol., 6582(Aug 2011). Retrieved from http://dx.doi.
org/10.1080/10630732.2011.601117
12. Chen, T.M.: Smart grids, smart cities need better networks. IEEE
Netw., 5767 (2010). Retrieved from https://www.bibsonomy.org/
bibtex/68a13e3135c90f769fa4d8eccad71541
13. Dagli, C.H. (ed.): Location intelligence application in digital data
activity dimensioning in smart cities. In: Jensen, M., Gutierrez, J.,
Pedersen, J. (eds.) Conference Organized by Missouri University
of Science and Technology, pp. 418224 (2014). Retrieved from
http://vbn.aau.dk/les/206058762/1_s2.0_S1877050914012642_
main.pdf
14. Eger, J.M.: Smart growth, smart cities, and the crisis at the pump a
worldwide phenomenon. J. e-Government Policy Regul. 32(1),
4753 (Jan 2009). Retrieved from http://dl.acm.org/citation.cfm?
id=1552016
15. Raj, P., Raman, C.A.: Intelligent Cities Enabling Tools and
Technology, pp. 45. Taylor & Francis Group, LLC (2015).
Retrieved from https://arthurlimantara.les.wordpress.com/2017/
03/intelligent-cities-enabling-tools-and-technology.pdf
16. Cunningham, P., Cunningham, M. (eds.): Developing a policy
roadmap for smart cities and the future internet. In: Komninos, N.,
Schaffers, H., Chaffers, P.M. (eds.) eChallenges e-2011 Confer-
ence Proceedings, IIMC International Information Management
Corporation, pp. 18 (2011). Retrieved from http://www.urenio.
org/wp-content/uploads/2008/11/2011-eChallenges_ref_196-
Roadmap-for-Smart-Cities-Publised.pdf
17. Neirotti, P., De Marco, A., Cagliano, A.C.: Current trends in smart
city initiatives: some stylised facts. Elsevier 3(38), 2536 (June
2014). Retrieved from https://doi.org/10.1016/j.cities.2013.12.010
18. Hall, R.E.: The vision of a smart city. In: 2nd International Life
Extension Technology Workshop, p. 1. Paris (Sept 2000).
Retrieved from https://digital.library.unt.edu/ark:/67531/
metadc717101/m2/1/high_res_d/773961.pdf
19. Harrison, C., Eckman, B., Hamilton, R., Hartswick, P., Kalagna-
nam, J., Paraszczak, J., Williams, P.: Foundations for smarter
cities. IBM J. Res. Dev. 54(4), 116 (July/Aug 2010). Retrieved
from http://fumblog.um.ac.ir/gallery/902/Foundations%20for%
20Smarter%20Cities.pdf
20. Angelidou, M.: Smart cities: a conjuncture of four forces. Sci.
Direct 47,95106 (2015). Retrieved from http://www.
sciencedirect.com/science/journal/02642751/47?sdc=1
21. Ahvenniemi, H., Huovila, A., Pinto-Seppä, I., Airaksinen, M.:
What are the differences between sustainable and smart cities? In:
VTT Technical Research Centre of Finland, pp. 234245 (2017).
Retrieved from http://www.dobramesta.cz/cms_soubory/aktuality/
121.pdf
22. Demetri, M.: What is a Smart City? An Intelligent, Digital and
Inclusive City. Heres How to Recognize it (April 2016).
Retrieved from http://www.marcodemitri.it/smart-city-citta-
intelligenti/. Accessed at 20 Aug 2017
23. Road and Transportation Authority (RTA): RTA Strategic Plan
20142018, p. 14. Retrieved from https://www.le:///C:/Users/
Hatm/Desktop/RTA_Strategy_Plan.pdf. Accessed at 25 Aug
2017
24. Road and Transportation Authority (RTA), Retrieved from https://
www.rta.ae/wps/portal/rta/ae/home. Accessed at 29 Aug 2017
25. Road and Transportation Authority (RTA): Sustainability Report
2015, pp. 130 (2015). Retrieved from https://www.rta.ae/wps/
wcm/connect/rta/ca723973-88ee-407c-935c-MOD = AJPERES&
CACHEID = ca723973-88ee-407c-935c-43a2e7dd1d5. Accessed
at 2 Sept 2017
The Role of the Roads and Transport 411
26. Road and Transportation Authority (RTA): Almasar, the Ofcial
Monthly magazine of Dubais RTA, vol. 99, p. 14 (September
2016). Retrieved from https://www.rta.ae/links/magazine/masar/
Al_Masar_99_Eng.pdf. Accessed at 9 Feb 2017
27. Road and Transportation Authority (RTA): Retrieved from
(=https://www.rta.ae/wps/portal/rta/ae/home. Accessed at
30 Aug 2017
28. Gulf News, Transport. Retrieved from http://gulfnews.com/news/
uae/transport/mohammad-opens-enterprise-command-and-control-
centre-1.2031307. Accessed at 14 Sept 2017
29. Road and Transportation Authority (RTA): Almasar, the Ofcial
Monthly magazine of Dubais RTA, Op. Cit., p. 16. Retrieved
from https://www.rta.ae/links/magazine/masar/Al_Masar_99_Eng.
pdf. Accessed 15 Sept 2017
30. Road and Transportation Authority (RTA). Retrieved from http://
www.nol.ae/RtaPortal/Portal.portal?lang=ae&_ns=false.Accessed
at 15 Sept 2017
31. Road and Transportation Authority (RTA): Sustainability Report
2015, Op. Cit., p. 26
32. Gulf News, Transport. Retrieved from http://gulfnews.com/news/
uae/transport/in-8-years-a-billion-riders-used-dubai-metro-1.2087
413. Accessed at 2 Sept 2017
33. Mail online, Science and Tech (9 Nov 2016). Retrieved from http://
www.dailymail.co.uk/sciencetech/article-3915822/Dubai-
Hyperloop-One-study-potential-Abu-Dhabi-line.html. Accessed at
14 Sept 2017
34. Gulf News, Transport. Retrieved from http://gulfnews.com/news/
uae/transport. Accessed at 16 Sept 2017
35. Dubai Statistics Center, National accounts. Retrieved from https://
www.dsc.gov.ae/ar-ae/Themes/Pages/National-Accounts.aspx?
Theme=24&year=2015#DSC_Tab1. Accessed at 5 Sept 2017
412 H. A. Adela
The Social Significance of Corporate Security
Dusko Tomic and Eldar Saljic
Abstract
An illness starts from the most vulnerable parts of the
body, can be caused by inheritance factors or unhealthy
behaviorthe crisis hotspots in corporations manifests in
sectors, where bad management is taking place. The
incubation phase starts, when the pathogenic elements
multiply and it comes to neglecting of, so it seems,
unsolvable problems. If they reach a certain threshold, the
pathogenic elements defeat the defense system of the
body and make the patient start feeling sickan escala-
tion of the crisis. An illness manifests and a ght for
recovery or survival can take place. A similar scenario
exists in corporations: even today, in the XXI century,
where the main concern is data protection, corporations
create possible points of vulnerability and thus make it
possible to be a victim of cyber-attacks (which are used as
a supporting business strategy in order to gain informa-
tional superiority towards corporationsbeing a step
ahead) by neglecting administrative or technical security
issues. The competition ghts are still ongoing. Some
corporations suffer from deviations of the rational plan.
Modern corporations in the western societies are fairly
rational and scientic in their management approach.
Their rational system of thinking can be closed down to
risk calculations and prediction of possible ways of failure
by creating procedures for failure-detection of abnormal
patterns, which, to a large degree, leads to failures and
crisis. But, why is this happening? Its impossible to
predict when a crisis would occur. The rational
scientic approach, and within it the description of all
the possible risk markers, the prediction of ways to fail
and tying a quantied risk factor to each scenario leads to
a false sense of security. If there is already a crisis point
developingthe risk that seemed to be pretty small
becomes acceptable and is being neglected, because
people are more likely to forget that risksno matter how
small they arecan occur. The normalization of risk
often leads to a very frequent acceptance: this cant
happen. Thus, when there is a crisis happening, everyone
seems to be surprised.
Keywords
Corporation Security Competition Risk
1 Introduction
Corporate security in the XXI century is a great challenge for
top-managers. For a modern corporation to be secure and to
conduct business under modern conditions its often not
enough that the threat is absent. What counts is its ability to
adapt to newly created conditions and function under pressure.
Its not just possible to observe the functioning of a
corporation from an isolated standpointin a clear form,
because aside from new trends, globalization also brings
new threats and new risksnew challenges. Today, corpo-
rate security is considered the key factor to existence and
sustainable functions of a corporations system.
Corporate security is part of the security structure, which
is based on societal goals that coordinate business activities
of business entities and regulate their socially responsible
behavior in accordance to the law [1].
In feudal societies, the social community was obligated to
protect their citizens from criminals. During that time, crime
was solved with the gathering of informations from citizens
(witnesses), so that, in the end, the perpetrator would be
caught. The main problem in the middle ages was that such
systems favored the social status of the individual over
clearly present facts. Thus, we can conclude that in most
cases, solving a crime in the medieval time was unjust
(unprofessional), because the structures that were used to
D. Tomic (&)E. Saljic
College of Security and Global Studies,
American University in the Emirates, Dubai, UAE
e-mail: dusko.tomic@aue.ae
E. Saljic
e-mail: eldar.saljic@aue.ae
©Springer Nature Switzerland AG 2019
A. Al-Masri and K. Curran (eds.), Smart Technologies and Innovation for a Sustainable Future,
Advances in Science, Technology & Innovation, https://doi.org/10.1007/978-3-030-01659-3_48
413
solve crimes were more pointed towards the status of an
individual within a community than true facts.
Until the end of the 13th century, the fundamentals of the
rule of law had been laid, and in the year 1215, the English
King John released the Manga Carta, which described the
judicial process towards an individual. In Serbia, we have
Tsar Dusan and the Code of Dusan. The need for security
personal and property protectionwas being more and more
present in the higher circles of societies. They received this
protection from the Kings or Tsars military. Regardless of
whether we call them Knights or Samurais, their assignment
was the sameprotect the most valuable.
In the 17th century, with the development of trading
companies in Western Europe and the Americas, the capital
grew and states expanded. The development and the
expansion of a state results in a population growth, and with
it also come higher crime and violence rates, something that
the police couldnt handle quite well.
Such a negative situation was favorable for the devel-
opment of private security structuresa private police, with
the goal of protecting private property. Each change in
international relations impacts the security of corporations
directly. States come together because of their personal
interesteconomic or strategic interests or security reasons.
When it comes to a change of these interest in foreign
relations, the security relations change immediately.
The beginning of the 20th century shows large steps
towards the development of a state and private security.
During the Cold War (strategic associationsa bipolar
world), the World was polarized into two opposing mili-
taristic and political blocksthe Warsaw pact (with Russia,
then the Soviet Union as the leader) and the Atlantic Pact
NATO (with the USA being the leader).
This period alone proved secrecy to be of upmost
importance. Security (in the state and private sector) was
focused on protecting informations. The never stopping arms
race resulted in constant external security threats. Because
the needs of the weapon systems and other managements
during the Cold War have become more sophisticated, it
caused the level of personal and property protection to grow.
During that period, it was established that the information is
the key value of power, and the necessity for methods to
protect these informations in any eld imaginable was pre-
sent in the security and corporate sectors. The safety of
corporations supporting the governments defensive and
offensive needs expanded and developed rapidly with the
goal of protecting property or informations that were a part
of the national state apparatus as well (for example classied
contracts), something also known as industrial defense [2].
The political, economic and social changes at the end of
the 1970s largely motivated the increase of criminal doings,
which led to the expansion of private security. Security
controls in corporations was developed and perfected
because of a large need for reliable workforce. World War II
brought forward a large number of people with knowledge
about security, law enforcement, investigation experience,
and with it the possibility of their employment in the private
sector. Contract appendixes and corporation management
explicitly mentioned security control with the goal of
property protection. At that time, security control consisted
of searching employees in corporations in order to prevent
them from stealing tools or other small crimes.
When it comes to the security after the Cold War, we
must mention that up until 1999, Europe and Russia have led
mostly by neglecting policies, because geographically, these
2 regions have been far away from each other. There have
been threats to internal security in former socialistic republic
with so called national cracks (Bosnia, Ukraine), where
politics went as far as to practically be non-existent. Thus,
the NATO was always proled as a security guarantor.
At the end of the 1990s, with the Cold War nished, it
was clear that the age of prosperity clearly was very far
away. The crime rate grew, and the crimesconicts
become more and more complex. A threat to corporations
security came with that exact globalization, well, not gen-
erally, but the increasing global competition and the need for
informations about the business of competing corporations
in order for one corporation to be one step ahead became an
epidemic.
Today, in the era of the third technological revolution,
apart from technological development, the number of
cyber-attacks towards corporations with the goal of stealing
informations of value or sabotaging certain activities
important for the companies are growing. This has led to the
development and the perfection of the corporate security
sector.
The corporate security sector is of crucial importance for
a corporation, since its protecting the corporation from
potential threats to vital structures inside the corporation and
establishes the basics for qualitative and quantitative man-
agement decisions. It also grants top management an access
to classied informations and guarantees their security
through processes and procedures which prevent them from
being leaked outside of a corporation [3].
2 The Relation Between Corporate
and Private Security
The survival and the sustainable development of a state as a
political union, which the governing class uses to maintain
its economic and political values is established through a
macro-security system that consists of several multi layered
systems of micro-security.
The modern states encounter diverse problems. With the
goal of protecting the vital national values and up keeping of
414 D. Tomic and E. Saljic
the inner peace (prevention of anarchy) on the one side and
defending the state from external threats to the other side, the
state develops a monopoly for using legitimate force [3].
Private security is one part of the system of national
security and its role, competence scope and duties is deter-
mined through legislative provisions. According to some
analysts, there have been 2 moments that have largely
affected the private security sector:
Moment I is the trend of privatization, present in coun-
tries of West Europe and North America since the 1980s.
Moment II is the surplus of military, intelligence and
police staff. This is a consequence caused by the end of
Cold War, where people from mentioned areas would
search work in private security sector, which at that time
gained more attraction.
There is a very important difference between private and
corporate security, because private security is a specic sub-
system in relation to the national security system of a state. We
can divide the private sector into the private security sector
actions of personal private security, business security and
property protection (vital national infrastructures, facilities
and oil pipelines, protection of humanitarian workers and
convoy protections, detective works).
The private sector also contains the work of private
military companies and many others commercially under-
lined realized security actions [3]. These mercenaries are
soldiers rented by a foreign country or rebel movements in
order to contribute in armed conicts, through direct or
indirect involvement in the conict through trainings,
logistics, consulting or collection of datathey do this
outside the jurisdiction of armed forces and the state they
belong toprivatized punishment facilities.
Private security companies are clearly structured and have
corporate associations with clearly dened hierarchy. They
offer security services and compete with other similar compa-
nies for jobs on the market. Privatization of the military
industry, however, motivated by the revolutionary wave of
privatization of all spheres of life made it possible for private
companies to be potential providers of security and military
services. Under post-ColdWar conditions, weapon and military
equipment, as well as the surplus of military staff is being sold,
and together with the neoliberal privatization, corporations
quickly saw the chance in the possibilities that the government
provided with the privatization of certain state sectors.
During the privatization era, states wanted to reduce
military cost and let private companies take over certain
parts of that sector. The reason for this was that the world
leading forcestraditional actors in regional and
interregional conicts during the Cold Warreduced their
engagement in conict solutions. Private military companies
in that time quickly saw a big chance and lled that
vacuumthey automatically absorbed the excessive military
staff and equipment and started offering a wide spectrum of
military and security services to different interested parties.
After the Cold War ended, a second wave of growth for
private military and security companies started ourishing
after the military intervention in Afghanistan and Iraq.
The private sector in western countries occurred conse-
quently to demands towards state institutions to do their jobs
more effectively. However, in Serbia, this happened for a
very different reason. Because of the full collapsing of the
state in one moment and its inability to conduct its main
functions, between 1990 and 2000, Serbia experienced an
enormous increase of industrial production, a rapid decrease
of exports, chronic unemployment, while the grey economy
grew exponentially larger.
In addition, Serbia experienced a downfall of the rule of
law and the effectiveness of institutions to provide better
security for its citizens. During the 1990s, in 1993 to be
exact, it comes to the abolition of the State self-protection
law. This law dictated assignments and responsibilities of
corporate subjects within the security system. Companies,
which until then were conducting business within state
owned companies, however, continued to follow the rules of
this law by inertia. Problems occurred because with the
abolition of State self-protection, there was an empty void in
the security sector, which wasntlled by state actors, and
therefore private capital came into play. Acting according to
market demands, and in absence of a judicial regulation, this
sector didnt integrate in the security system of Serbia.
After the change of power on October 5th 2000, there
have been several attempts to perfect the security apparatus.
Most of the companies began to ourish with the entrance of
foreign companies on the Serbian market at the end of the
20th century, and the most important clients in Serbia
became foreign banks.
The growth of the private security sector since the
beginning of democratization illustrates through the surplus
of police and military staff nding employment inside pri-
vate security companies during the decreasing numbers of
military and police. The Serbian Military does not have
evidence about how many former employees was employed
in the private sector. Noticing big interests, the Military
established a retraining program for jobs inside private
security companies [4]. The most effort to perfect and
develop the private security sector was put in by the Society
for physical and technical security within the Economic
chamber of Serbia (PKS) in the year 2005.
The Social Significance of Corporate Security 415
3 The Content and Basic Features
of Corporate Security
Today, in the 21st century, corporate security is more
threatened than ever. corporate security in modern times
became a strategic function of corporate subjects. One of the
things is he drastic growth of many organizationsgroups
and individuals who have the same interest in the threat of
the existence or sustainable development of a corporation or
are paid to do so from other corporation (danger subjects)
that sees the opposing corporationin this case the victim
corporation as competition. Operations of destructive orga-
nizations or individuals can also have other reasons than the
desire for competitive advantages: religious, economic,
political and ideological.
These different kinds of threats or attacks can have an
internal or external character to it. They can occur suddenly
or after some time, and cause great damage to the functional
system of a corporation (reputation, business strategy leaks
and competition analysis leaks, which can further result in a
loss of morals and motivation of employees as well as
crumble their trust for the institution they work for). Threats
to the existence of a corporation can be due to drastically
unsuitable weather conditions. Direct security threat sources
for corporations can be:
Technicaltechnological accidents;
Natural disasters;
Crimes with damages to the business subject (diversions,
sabotage, terrorism, destruction/damage to the production
line);
Classic crimes;
Corporate crimesfrom employees in ties with business
partners (abuse of position and power, corruption, brib-
ery, fraud and money laundering, robbery, inuencing or
business practices at the expense of the company);
Crimes of general danger and crimes against human
health and the environment;
Cybercrimes;
Trafc accidents;
Leaks of condential data;
Offenses (negligent businesses, violation of work disci-
pline, and the transgression and usurping of duties and
permissions);
Social conicts and other conicts within the organiza-
tion [5].
The criteria for danger indicators to vital values of one
corporation are, on one side, all threatening actions a dan-
gerous subject takes in order to gain personal advantage or
cause harm through his negligence, and on the other side,
these danger sources can also be natural forcesnatural
disasters. Dangerous subjects for the value system of a
corporation can also be of internal and external type.
The internal type understands: company members/
employeesindividuals and organized groups, including
top management, which through their actions or lack of
action present a security threat; While the external type
differentiates between individuals/collectives from the
companys surroundings, which in cooperation with
individuals/organized groups within the company affects its
security.
The motives for harming corporations can be innite,
starting from conicts within employeesrivalry, discrep-
ancies, misunderstandings or uneven nancial and status
wishes; destructive behavioralcohol or drug addiction;
Kleptomania; debt; illness; earlier attraction to criminal
behavior and actions etc. The relation of internal and
external forms of corporate threat is close to 80:20%, but the
amount of damage done to a corporation is reversed,
meaning that there is a higher amount of damage dealt when
employees are involved into causing them [5].
One of the most dangerous forms of corporate is the act
known as the result of making decisions from the top
members (managers, chief executive and other ofcers)
within the company. These inuential structures, which are a
part of the corporate apparatus and have the task to make
lawful decisions, based on business rules with the goal of
making prot with the corporation can also pull entirely
opposite strings. We, of course, talk about high prole
employees who, with planned actions, directly or indirectly
commit unlawful activities in order to gain personal
advantage and wealth. Such proled criminals often use their
status in order to avoid criminal responsibilities and sanc-
tions, sometimes unnoticed or even supported by subjects of
national security.
This type of crime often happens in countries where there
are cracks within the national security structures [5].
Human made or natural threats to the security of corpo-
rations is something that is present every day. But, when an
unpredicted crisis or extraordinary situation inside the space
of a corporation or in its surrounding occurs, it lifts the
vulnerability of corporations to potential hazards [6].
Raising awareness of employees, members and staff
about potential threatsfactors of threatening actions;
appropriate training of those to take action during extraor-
dinary situations. This way, the sector of corporate security
can make itself be prepared for everything that might or
actually never will happen, while not strictly relying on the
rationalscientic principal of coping mechanisms. This is
why the European Union suggests an implementation of
integral security inside corporations.
Such security contains all kinds of security and safety
tasks. From good practical experience it is believed that
416 D. Tomic and E. Saljic
connecting these tasks by a unique security manager would
lead to a more productive organization, coordination and
control of given tasks and therefore a to a more rational and
improved way of doing business [3]. Based on all possible
potential dangers we talked about, we can conclude that the
job of a security manager inside a corporation is not easy.
His task consists of things such as gathering of information,
security and risk evaluations, IT-security, crisis manage-
ment, re, explosion and accident protection, as well as
safety and health measures in the workplace.
4 Integral Security in Corporations
In their ght for survival on the market, the most successful
cooperation, banks and other nancial organization (mainly
the large ones, even multinational) from the Western Bal-
kans understand that security is of vital importance for their
normal functioning. Because of that, they put their efforts
into early identications and evaluations of threats to their
business, proactive and reactive actions and risk manage-
ment, as well as effective and broader implementation of
defense mechanisms.
They notice that corporate security is a crucial segment
for the normal functioning of a corporation. It is sure that
one aftermath of the economic crisis and recession is the
neglecting of corporate security sectors, which is why it is
present in the most countries in the Western Balkans [6].
Different factors show that the majority of top management:
employees in the corporate security sector and private
security companies still are former members of the military
or police, from that post-Cold War period. People of this
prole do not possess the wider knowledge and required
abilities needed today in order to adapt their work inside this
modern security environment to the principals and business
goals of a corporation.
Corporations are based on private equity. Today, this is
the most complex organizational business system. A corpo-
ration is a capital group that gained the necessary funds for
founding and business of such organizations by issuing
shares. Corporations are widely inuenced by their working
environment, because they actually gain their resources from
exactly the environment they are operating in. The resources
are actives, humans, informations, machines, abilities, raw
materials and nancial capital. The system of corporate
security in corporations, according to the guidelines of the
European Union can be dened as integral security. Such
security system contains many subsystems, which are a vital
character for the normal functioning of a corporation. In
order for a corporation to function normally, or optimally,
the security sectors need to be present in all corporate
functions [7].
Corporate security management is the managing activity
of certain members and the micro-security system of a cor-
poration. Through this (the managing activity), managers
protect the value system of a company from any form of
self-destruction and aggression within the real environment.
The rolethe task of the security manager is to recognize,
discourage, prevent, ght and sanction each subject proven
to be dangerous and has been led to cause harmful changes
in the value system of a company.
The corporate security manager fulls his tasks by
applying two mutually interlaced models of operative
treatment:
Preventiveit discourages subjects from undertaking
harmful actions and prevents their realization;
Repressivesanctioning a harmful perpetrator in a lawful
way and recovery from the caused effects.
The raised awareness about security and potential hazards
has undoubtfully shown capital owners and top-managers
that development and perfection of security personnel within
a corporation is a basic requirement for optimal functioning.
Because corporate security is divided into micro-security
sectors, each one of them has the task to:
Analyze actual risks;
specify tasks and duties;
strongly follow the organization and the correct functions
of physicaltechnical security of all objects within the
company;
apply and support security measures for safety and
health, environment protection, re and explosion
protection;
use protection method to shield corporations from cor-
ruption, abuse of power, fraud, theft and money
laundering;
specify protective measures for corporate and business
secrets;
concretization of measures regarding movement and
housing controls of foreign citizens in objects on corpo-
rate compound;
organization and functions of all information systems for
personal and property, as well as business protection of
the corporation, most certainly the protection of
informations;
harmonization of normative acts in all security segments
with the national laws;
evaluation of potential hazards for those who work on
protecting the vital values of a corporation [5].
The corporate security manager is a person who is trained
and authorized to plan, organize, execute strategies,
The Social Significance of Corporate Security 417
coordinate and control the work of a prot organization
(rm, company, corporation, trust, and bank). The security
manager has many assignments and has a large responsi-
bility towards a safer working manner in order to provide
better and optimally organized working businesses. He does
so by creating and implementing integrated security systems
inside every eld.
According to the guidelines of the European Union, the
following should be included in an integrated corporate
security system:
1. Organizing unit for corporate security:
Head of the organizing unit;
Intelligence security manager;
Security business specialist;
Personal protection specialist;
Defense preparation specialist;
2. Organizing unit for work protection, re protection,
environmental protection:
Head of the organizing unit;
work protection and re protection specialist
Environmental protection specialist [1].
5 Resource Protection of Critical
Infrastructure
The term critical infrastructure becomes more and more
interesting right after the attacks on the USA on September
11 2001. After such a scenario, the critical infrastructure
became an important part of national security in every state.
The USA dene critical infrastructure and resources as
crucial elements for the daily functions of economic, social
and cultural systems of a state. Under the term critical
infrastructure, we consider all natural and material goods,
property, technical systems, communications, business
activities and vital services for the state. This further leads us
to the assumption that any damage, destruction or interrup-
tion of these resources automatically inuences national
security, economy, vital state functions, health, population
and the strong state order. The margins of critical infras-
tructures are not dened the same way for all countries,
preferably due to different political situations and geographic
locations (Table 1).
In the last couple of years, it has come to a perfection of
strategies for critical infrastructure protection. These strate-
gies are focused on effective and preventive actions in case
of negative scenarios (terrorist attacks or great national
disasters). The Directives of the European Council
2008/114/ES clearly dene sectors, which need to be dened
in order to get a critical infrastructure (Table 2).
Critical infrastructure is tied to different levels and a
glitchin one sector can cause problems to ow over to
other segmentsin other words, it can cause a domino
effect. Critical infrastructures in a state are complex sub-
sidiary systems between which there is great mutual
dependency.
For example, there is a great connection and mutual
dependency in governments between intelligence and com-
munications elements and the elements of national infras-
tructures: transport, production and distribution of electric
energy and other energy sources, banking, public healthcare,
federal and local government, water supply, media, science,
education, upbringing, emergency services. This undoubt-
edly shows us that the intelligence and communications
sector has the central infrastructural position, and its systems
and processes are attractive targets of terrorist attacks. In a
case of a telecommunications system fallout, elements that
are closely tied to this sector need to be taken as priority,
because the target of the attacks may not always be the
targeted sector.
These systems today are almost certainly the target of
younger generations of terrorists. The reason for the drastic
increase of terroristic operational capabilities is the simple
and easily available sophisticated technology and tools.
These include high end computing and communication
equipment, resources and services for high quality message
encryptions, weapons for temporarily disabling and extort-
ing secret informations and data, machines and tools for
creating weapons, and servers and information systems for
different data sets, including satellite imaging easily avail-
able on the internet.
Because of these operational capabilities, resources of
critical infrastructures are under constant threat from hacker
attacks. Informations do not change their value, and today,
hackers can easily enter critical infrastructures servers,
cause great harm, and collect a large quantity of key infor-
mations. Sabotage of the internal intelligence systems has a
larger impact than planting an explosive inside a factory.
The key actors of these activities can be members of ter-
roristic organizations, a group of organized criminals or
members of a hacker network.
6 The European Law Regulation About
Critical Infrastructures
The European Council has asked the Commission to prepare
safety strategies for critical infrastructures. The Commission
has accepted a document on the October 20 2004, which
speaks about terrorism as the sole threat. It is the Critical
infrastructure protection in the ght against terrorism, and
it suggests what can be done to improve the European
418 D. Tomic and E. Saljic
prevention, preparedness and response to a terrorist attack
critical infrastructure.
The Council adopted the European program for of critical
infrastructure protection (EPZKI/EPCIP) and agreed about the
arrangements of the Commission for a Critical infrastructure
Warning information Network (IMUKI/CIWIN). In Novem-
ber of 2005, the Commission adopted a Green Paper about the
European Program for critical infrastructure protection. This
way, the EU denes the European critical infrastructure as an
infrastructure containing physical resources, services, devi-
ces, information technology, safety networks and infrastruc-
tures, as well as security, economic and social wealth.
The relationship of the Republic of Serbia with critical
infrastructure protection
The key infrastructure in Serbia are energy, waterworks,
postal services, telecommunication and railway companies,
healthcare institutions, airports, river havens, water systems,
schools, universities and bus station owners.
The Republic of Serbia makes important efforts towards
creating an integrated safety and rescue system, which would
be used in a case where crucial national resources would be
threatened. By passing the Emergency Situations Law in
2009, the state decided that the Ministry of the Interior should
be in charge of creating threat evaluations for natural and other
disasters. Article 46 of that law states that by evaluating the
threats it would be possible to identify sources of possible
other hazards, predict consequences and measurestasks in
order to secure and rescue mission in a similar situation.
The threat evaluation contains especially:
1. The characteristics of a territory, critical facilities, critical
places and areas regarding threats of national disasters
and other hazards with eventual international effects of
impact;
2. vulnerabilities of territories from natural or other
disasters;
3. analysis of possible aftermaths from natural or other
disasters;
4. Needs and possibilities for the protection of people,
material goods and the environment from possible con-
sequences of natural or other disasters [2].
Table 1 Critical infrastructures of different countries [8]
Canada Great Britain USA Germany Norway Switzerland
Energy
(electrical and
nuclear power
objects, liquied
natural gas and
crude oil,
production and
transport
systems)
Energy Energy Energy (electrical,
crude oil and gas)
Energy and objects Objects and services
Communications Telecommunications Informations and
telecommunications
Telecommunications
and intelligence
infrastructure
Oil and gas delivery Telecommunications
Services
(nances, food
distribution,
public
healthcare)
Healthcare services Public healthcare Public healthcare
(including
distribution of
drinking water and
food)
Telecommunications Intelligence
distribution
Table 2 Critical infrastructures of different countries [8]
Sector Subsidiary sector Critical infrastructure
Energy 1. Electric energy Infrastructure and objects needed for production and distribution of electric energy
2. Oil Producing and rening oil
3. Gas Producing and rening gas
Transport 4. Road transport
5. Railway transport
6. Air transport
7. Transport on inland waterways
8. Oceanic and sea transport
The Social Significance of Corporate Security 419
With the passing of the Development strategies for an
informational society in the Republic of Serbia until 2020
bill, itsdened that it is necessary to develop and perfect
threat protection with the use of information technologies for
critical infrastructural systems.
The National security strategies of the Republic of
Serbiamention the term critical infrastructureindirectly,
but it points towards the problems of economic development
of the Republic of Serbia after a long period of sanctions and
destructions of vital economic organs and transportation
infrastructures. The mutual energetic dependency and the
vulnerabilities of the infrastructure for producing and
transporting energy sources, high technology crime and
hazards to informational and telecommunication systems [4].
The Government of the Republic of Serbia presented an
outline of the Physical-technical object protection Law in the
year of 2002. This law suggested that objects of strategic
importance for the Republic of Serbia or its citizens, or
objects that create great danger to the environment and
public health must have physical or technical security, where
the special security requiring objects are:
1. Production, rening, distribution and storage facilities for
crude oil, oil derivatives and gas;
2. Objects for producing, rening, distributing and storing
water;
3. Objects for producing and distributing electric energy;
4. Objects for producing, using and store radioactive or
other dangerous and hazardous matter;
5. Objects of great importance for transportations in all
means;
6. Objects with great importance for science, culture and art;
7. Gathering places for a large number of people and other
objects that the Government nds necessary to protect [8].
7 Conclusion
The existence and implementations of corporate security
systems protects a company from potentially dangerous
activities. With the use of modern methods, technologies and
principles, security managers have a better understanding of
the challenges they face. This way, they can develop effec-
tive strategies for preventive and repressive actions in crisis
and emergency situations. With the raising awareness about
security, capital owners and top-managers understand that
through development and perfections of corporate security,
they can secure themselves a way to meet their nancial and
strategic goals.
Crisis and emergency situations are a part of every-day
life, and with social development, their sources and phe-
nomenal chances increase, while the inability to prepare
results in human losses and great material damage. Because
of the complexity and of crisis situations and emergencies,
states have created methods to recognize vulnerability indi-
cators of infrastructures, dene measures for risk decrease,
create recovery plans from crisis and emergency situations,
support sensitivity from private and public operators towards
the problem of critical infrastructure protection and develop
methods that support international cooperation.
In order to prevent its critical infrastructure, the European
Union changed many directives, signed laws and created
strategies that make it possible to prevent and repress in
times of a crisis or an emergency situation and prevent the
creation in the rst place. The Republic of Serbia should
adopt the Critical Infrastructure Law in its process of joining
the EU, which would be adapted to the Directives
2008/114/ES. This would regulate an important sector which
today is still not adequately regulated.
References
1. Tomic, D., Mijalkovski, M., Maric, P.: National Security system.
PI PRESS, Pirot (2012)
2. Slobodan, A., Marina, S.: Importance and Role of Private Security
Within the National Security System. Faculty of political sciences,
Belgrade (2012)
3. Trivan, D.: Corporate Security. Protekta, Belgrade (2014)
4. Stojanovic, S.: Private Security Companies in SerbiaFriend or
Foe?. Center for civil and military relations, Belgrade (2008)
5. Tomic, D., Mijalkovski, M.: Security Management. Faculty of
engineering management, Belgrade (2015)
6. Jakovljevic, V.: Gacic Jasmina: Critical Infrastructure Protection in
Crisis Situations. Faculty of Security, Belgrade (2013)
7. Skero, M., Ateljevic, V.: Critical Infrastructure Protection and Basic
Adaptation Elements with the European Council 2008/ 114/ ES.
Bureau of European Integrations, Belgrade (2014)
8. Skero, M.: Serbian Security-Intelligence Agency (BIA), Vladimir
Ateljevic, Government of the Republic of Serbia, Bureau of
European Integrations Critical infrastructure protection and basic
adaptation elements with the European Council 2008/ 114/ ES
(2008)
420 D. Tomic and E. Saljic
The Value of Intelligent Cybersecurity
Strategies for Dubai Smart City
Khulood Ali Jumah AlJarman AlZaabi
Abstract
Cities all over the world are becoming increasingly
smarter, including Dubai Smart City. The Smart Cities
vision is to automate critical public services, make
improvements for community interaction, and achieve
signicant levels of efciency in a connected and
technology-driven society, such as in trafc control.
However, this has positioned Smart Cities to be a target of
compromised Cyber Security, which can potentially
undermine the information systems of local departments,
general security, law enforcement, and transport systems.
Dubai is a dynamic and emerging economy that has the
potential to become a major economic center of the
Middle East and North Africa (MENA) region owing to
its strength in strategic information. The main purpose of
this paper is to explore, evaluate, and discuss components
of overall strategic security, innovation, management, and
the development of Dubai in terms of Cyber Security.
This study also showcases conducted survey results based
on the Smart City Cyber Security program. Furthermore,
it demonstrates the current and future challenges faced by
Smart Cities from cyber-threats, including the develop-
ment of strategic security plans to defend against
sophisticated cyberattacks, and encourages citizens to
take responsibility and implement awareness of how to
proactively counter cyberattacks on Smart Cities. How-
ever, it is imperative to evaluate the strategies that are
required to prepare Dubais Electronic Security Center to
align with Dubai Vision 2021 in order for Dubai to be one
of the securest Smart Cities in terms of Cyber Security
around the globe. This research aims to argue that to
develop Dubais Electronic Security Center, strategies
should be a top priority for Dubai to ensure the security of
the Smart City and to diminish cybercrime in Dubai.
Keywords
Smart city Dubai smart city Dubai cyber security
strategies
1 Smart Sustainable Cities:
Concept and Goals
Cities such as Dubai, Singapore, San Diego, Barcelona, and
New York are gradually becoming smart and intelligent.
Smart Cities are cities run by technology where connected
networks monitor utilities, trafc, and waste management,
such as in the case of Smart Bins, which noties the relevant
authorities when the need for emptying arises [1]. In Smart
Cities, everything is monitored using cameras and sensors,
making it simple for individuals to live a healthy, secure, and
fullled life [2]. According to the Singaporean 2014 census,
the urban population is growing and accounts for 54% of its
citizens, which also implies that the senior citizen population
is also increasing [2]. However, with a Smart City in place,
management of these individuals will be unproblematic
because there will be smooth coordination between the
health care system, water and food resources, and transport
networking systems, which will make it simple for residents
to live in the city [2].
According to Baharash Architecture [3], a smart city may
dene as the destination where soft and infrastructural
developments are smoothly securely integrated together with
technology. The primary objective is making the networks
and services more intelligence and efcient while achieving
collaboration between the private and public sector. There-
fore, the entire smart city vision is creating a digitally and
collaborative system that improves the economic, environ-
mental and social sustainability of the city thereby enhancing
the quality of life of the people as well as protecting the
regions environmental base [3]. Furthermore, IOActive Labs
denes a Smart City as a city that uses technology to
automate and improve city services, making citizenslives
K. A. J. A. AlZaabi (&)
American University in the Emirates, Dubai,
United Arab Emirates
e-mail: kalzaabi6@gmail.com
©Springer Nature Switzerland AG 2019
A. Al-Masri and K. Curran (eds.), Smart Technologies and Innovation for a Sustainable Future,
Advances in Science, Technology & Innovation, https://doi.org/10.1007/978-3-030-01659-3_49
421
better[4]. Currently, the citiesworldwide adoption of
newly advanced technological systems has as its goal the
collection, processing and utilization of the data of its resi-
dents and its infrastructures [5]. This has resulted in cities
becoming smarter, which has enhanced the efciency of
their public services for their citizens, permitting them to
optimize resources and even reduce the nancial expendi-
tures of their cities [4]. Moreover, diverse Smart Cities have
invested a sizable budget to become smart, such as Dubais
intention to switch 1000 government services to become
smart. Saudi Arabia is investing around US$70 billion into
intelligent cities, and nearly $7.4 billion was invested in
South Africa for smart projects [4].
However, this increased their likelihood of becoming a
target of cybercriminal activities, which discloses their
information systems concerning local departments, general
security, schools, power plants, law enforcement, transport
systems, and hospitals [5]. Therefore, to safeguard infor-
mation from any unintended access or loss, many Smart
Cities are working toward enhancing their Cyber Security.
IOActive Labs conducted research to respond to current and
future cyberattacks targeting Smart Cities, and showcased
cyberthreat activities toward trafc control systems. The
results showed that the security posture of the Smart Cities
infrastructure was threatened. Furthermore, IOActive Labs
generated a report encompassing all possible security vul-
nerabilities and their corresponding offensive Cyber Security
techniques, and forwarded it to the Computer Emergency
Response Teams (CERTs) and all vendor-related Smart
Cities software developers with the purpose of enhancing the
interconnected technology levels of security [4]. In addition,
a study conducted by the consulting rm Frost & Sullivan
estimated that more than $1 trillion is spent annually on
Cyber Security in different Smart Cities across the world. By
the year 2020, many cities in the world aspire to be as fully
advanced as modern Smart Cities [6], as seen in Fig. 1.
When we see that the data that feeds Smart City systems
is blindly trusted and can be easily manipulated that the
systems can be easily hacked and there are security problems
everywherethat is when Smart Cities become dumb
cities,Mr. Cerrudo said [6].
A Smart City installs numerous cameras and sensors that
aid the government in monitoring everything, including
crowd movement, trafc, and even the cleanliness of public
spaces [7]. Further, in addition to tackling issues such as
waste collection, trafc management, and street lighting,
Smart City technology unites medical facilities, universities,
and Research and Development centers (R&D) to work with
the government in a holistic manner. This is to achieve better
living conditions as well as greater business opportunities for
the residents living in a Smart City [8]. However, the ben-
ets of the concept of a Smart City are also loaded with
challenges that may negatively affect or even destroy the
development of a city.
The technology of a Smart City such as those in Dubai
and Singapore promises to change the concept of the
Internet-of-Things (IoT)into Internet-of-Everything[1].
However, we are all aware of how devices such as Fitbits
Fig. 1 Global smart cities.
Source Frost and Sullivan [69]
422 K. A. J. A. AlZaabi
and Smart Meters (products of the IoT) have resulted in
information security issues and limited access standards for
both data security and wireless networks [2]. Given a Smart
City that has public transportation, public water systems,
waste management, power grids, street lighting, and physical
security, we expect an alarming rise in Cyber Security issues
[8]. Figure 2shows diverse forms of Smart Cities Services
around the globe.
With this in mind, it is important to consider how the IoT,
Smart Cities, Cyber Security, and cyberspace issues may end
up affecting worldwide Smart Cities [9]. The scope of this
paper is to explore, evaluate, and discuss components of
technological strategic security innovations, management,
and the development of Smart Cities. Furthermore, the
studys foundation for Smart Cities is Smart City Cyber
Security (SCCS) in terms of their functionality, safety,
democracy, and livability.
2 Smart Cities: How IoT Technologies Are
Changing Urban Life, Challenges,
and Solutions
There is a plethora of related works conducted by
researchers that assess the signicance of involving IoT
technologies within Smart Cities. This has caused a sky-
rocketing trend into researching urban life, with both posi-
tive and negative impacts. This section aims to analyze the
SCCS program in the context of other studies, and examines
the existing body of knowledge relating to Smart Cities,
challenges, and solutions.
According to [10], a Smart City is a kind of city that
integrates diverse modern technologies for efcient service
provisions and the enhancement of citizenslifestyles. It has
become evident that by the year 2030, over 60% of the
worlds population will be living in urban centers. Therefore,
population growth in urban areas calls for advanced man-
agement frameworks and approaches that rely on informa-
tion technology systems and techniques, thereby smartening
the delivery of city-related services [10]. However, [11]
highlight that modern cities are deprived of critical elements
such as socioeconomic development and quality of life that
can easily be delivered by Smart Cities. Therefore, tech-
nologies applied in Smart Cities can ll gaps and help make
a city more sustainable, efcient, and livable [11]. Smart
Cities achieve all this by integrating the functionality of
critical infrastructures such as tunnels, communication
channels, roads, waterways, and communication power
supplies. Through this, Smart Cities ensure the maintenance
of activities and help to optimize available resources while
ensuring security [12].
To achieve this goal, [13] suggested that blockchain
technologies can be used in securing Smart Cities. By using
blockchain technologies, it becomes easy to integrate social,
physical, and business infrastructures in providing better
services and ensuring efciency in utilizing available
resources [13]. Therefore, the adoption of cloud computing,
the IoT, and interconnected networks has made it possible
for Smart Cities to bridge the socioeconomic and
quality-of-life gaps that modern cities are currently facing
[14]. However, there is a need for interaction between
governments and local communities to achieve the ultimate
Fig. 2 Smart cities services.
Source Smartcitiesworld.net [70]
The Value of Intelligent Cybersecurity 423
goals of the Smart Environment, Smart People, and Smart
Living. Regardless of this technological advancement, Smart
Cities are at risk of becoming victims of cybercriminals.
Nevertheless, [15] suggest that risks or threats from
cyberattacks may be neutralized by investing in forensic
investigation processes. These will help protect Smart Cities
against any future incidents of cyberattacks [15]. In a similar
perspective, [16] recommend that urban management should
pay more attention to issues relating to the security and pro-
tection of information being transmitted using network pro-
tocols. By doing this, managers will achieve better designs and
protect users from any form of criminal manipulation. Dubai
has emerged as a digital city with its Dubai Cyber Strategy
plan, which aims to smart wire the entire Dubai area by the
year 2020 [16]. For this reason, [18] argues that cities must
have strategic security measures to ensure their smart net-
works and infrastructures are kept secure. Finally, [17] notes
that with the emerging IoT technologies, better architectural
infrastructure must be utilized to host the advanced tech-
nologies [17]. Therefore, by using the IoT, gaps in the quality
of life and socioeconomic challenges experienced by modern
cities will be solved by Smart Cities [18].
This paper complements existing research papers in
addressing the necessity of interconnected technologies to
ensure the continuity of sustainable Smart Cites, and there-
fore, the development of urban life around the globe.
However, these technologies pose extreme risks to Smart
Citiessafety and security that have been witnessed by
previous researchers. This resulted in the development of
strategic plans and solutions to thwart cyberthreats against
ever-evolving global Smart Cities. However, most of the
previous works focused on a global Smart City and did not
highlight a comprehensive SCCS program, which demon-
strates Dubai Electronic Security Centers strategic plans in
making Dubai the securest city in the MENA region. Fur-
thermore, this study presents Dubais initiatives through
implementing diverse technologies including nanotechnol-
ogy to secure its sustainable Smart City. Additionally, the
author showcases various cyberthreats against Smart Cities
and illustrates Dubais smart laws toward enhancing the
Smart Citys level of security. Last, this study suggests
recommendations and develops awareness among the citi-
zens of a Smart City, as well as the companies that devel-
oped the Smart Citiestechnologies.
3 Dubai Vision 2021: Unveiling Dubai
Electronic Security Centers Cyber Security
Strategies Toward Dubai Smart City
As highlighted initially, UAE is making strong strides
towards achieving its mission and vision of creating the
smartest cities in the world. The high-tech infrastructure and
execution of diverse, smart initiatives in Dubai have already
laid a foundation for Dubai to become the world recogniz-
able smart city. According to Navigant, a global research
rm, execution of smart initiatives in Dubai has made it
possible for the city to near its vision of becoming a smart
city. Looking it from an Internet of Things perceptive, UAE
is one of the worlds best-prepared nations as far as cyber
security is concerned. According to United Nations Inter-
national Telecommunication Union, UAE ranks 17 out 105
countries. That has been made possible by the active
involvement of the UAE government in ensuring safe and
secure cyberspace. For example, the Dubai government
launched the Cyber Security Strategic plan that focused on
enhancing the protection of all governmental services.
According to Andrew Calthorpe, the Chief Executive of
UAE Smart City consultancy rm Condo Protego, as a smart
city and government services digitalized; expanded utiliza-
tion of Internet of Things is critical increasing the national
infrastructural risks. For example, in the year 2016, about 23
billion devices are connected to the networks; however,
prospects predict that by 2020, over 50 billion devices will
be connected. That implies that issues related to
cyber-attacks will transition from being disruptive to
destructive for hybrid clouds, critical national infrastructure,
and mobile devices. Therefore, Condo Protego suggests that
there is a need for strong and advanced solutions in threat
detention and responses that will offer future-proof services
and reliable cyber security solutions with easy to use anal-
ysis, full visibility, and actions that prevent cyber-attacks in
real time [19].
Dubai Smart City project was anchored in the vision of
His Highness Sheikh Mohammed bin Rashid Al Maktoum,
the Vice President and Prime Minister of the United Arab
Emirates and the Ruler of Dubai in 2013, to make Dubai the
happiest city on earth. The motive has been backed with
various initiatives like Information Communication Tech-
nologies [ICT] and the Internet of Things [IoT] to back the
implementation of new efcient and intelligent infrastruc-
tures and services. The initiative will focus on remodeling
the city into one of the smartest destinations on earth. The
foundation of this strategy based on three Ps Public, Pri-
vate, Partnerships,that drives a common game plan
between the public and private sectors while embracing a
greener circular economy. It is essential to look back to
understand how Dubai is implementing the smart city
strategy. To achieve this, it is critical to assess why Dubai
focuses on becoming a smart city and what it means to
Dubai and the world at large [3].
In the last few years, Dubai has adopted visionary and
extraordinary transformation. Looking back in history,
Dubai has evolved from a 10,000 desert-dwelling population
in the 1900s to a modern cosmopolitan city with over 2.7
million people. As a fast-growing urban center affected by
424 K. A. J. A. AlZaabi
numerous climate change conditions, local agencies have
faced by multiple challenges on how they can effectively
improve the quality of life of their citizens while reducing
their articial impact on the natural environment. For a few
years now, United Arabs Emirates has ranked as one region
with the highest annual carbon dioxide emissions index per
capita [3]. While considering this, Dubai becoming a smart
and sustainable city is no longer a choice, but a necessity for
local agencies. That conrms the primary reason why Dubai
has an ambitious plan of evolving into the most sustainable
and smartest city in the world.
Additionally, the United Arab Emirates is projecting to
welcome over 45 million people by 2021. Out of the 45
million people, 31 million will are expected to be inter-
national tourists. Therefore, these economic facts checks
have also contributed to the acceleration of plans and
developments aimed at generating smart projects that will
push innovative designs that effectively push boundaries
within the built Dubais economy. For example, other than
the Expo 2020, there are other plans such as a new
ultra-fast hyperloop train that move from Dubai to Abu
Dhabi in less than 12 min and with a capability of reaching
a top speed of over 750 mph and Oasis Eco Resort as
showninFig.3. This foundation will also lay down the
strategy of launching the worlds greenest eco-resort in the
region [3].
However, while because Dubai ranked 65th position in
the IESE Cities in Motion Index 2016, then, it appears that
Dubai as a city has much work to do to achieve smart city
recognition. Following this, the Dubai Smart City project
aimed at achieving this initiative as interlinked with the
World Expo themes. As per now, Dubai is preparing for the
Expo 2020 having obtained the bid in 2013 under the theme
of connected minds-creating the future.Looking deep into
this theme, Opportunity, Mobility and Sustainability appears
like some of the sub-themes that tied to the bid and which
will make Dubai become the rst city in South Asia, North
Africa, and Middle East region to successfully host the
World Expo [34,37,38,40]. Therefore, with the vision for
2020 Expo approaching, then, Dubai as a city is involved in
an intense race of becoming the smartest city. Having
understood this, it is now essential to review what makes a
smart [3].
As per the year, 2016 IESE Cities in Motion Index, New
York City appeared as the smartest city in the world.
Therefore, while taking New York as a benchmark, below
diagram (Fig. 4) proves the journey and improvements that
Dubai must undertake to take up the position as the most
innovative and smart city.
The exploration proves that the success of New York as a
smart city is as a result of coordination, partnerships, and
commitment between various departments both from the
public and private entities. Additionally, the people-centered
approach and effective collaboration amplify the success
even higher. In this exposure, Dubai learns the need to
include government and private departments in nding sus-
tainable solutions to the 21st century challenges facing the
region. Therefore, government agencies must create an
environment where different stakeholders can explore new
opportunities and effectively deliver technologies and ser-
vices aimed at creating smart environments for smart people.
From the 2016 exposure, Dubai managed to create seven
strategies that will pave the way for becoming the smartest
and most innovative city in the region. These strategies
include Smart Living, Smart Governance, Smart People, and
Smart ICT infrastructure, Smart Economy, Smart Mobility
and Smart Environment. Achievement of these strategies
based on smart city initiatives that are underway in Dubai [3].
Dubai Smart City emerged as a leading partner not only
in technological innovation but also in the design and
development of infrastructure and strategic security [20].
The Cyber Security strategy for Dubai Smart City was
Fig. 3 Examples of dubai projects in 2020. Source [3]
The Value of Intelligent Cybersecurity 425
launched by the United Arab EmiratesVice President and
P.M., Sheikh Mohammed bin Rashid Al Maktoum [21].
Dubais Smart City plan has four critical strategic pillars
that act as the guide for every smart initiative. The pillars
include; efciency, seamless, safe and impactful. Efciency
achieved through optimized utilization of citys resources.
Seamless considers the provision of integrated day to day
services that are convenient and easy for everyone to use. On
safe, it focuses on applying carefully evaluated risk man-
agement with the focus on protecting information and the
people. The impactful pillar aims to provide effective solu-
tions that enrich the lives of residents, businesses, and vis-
itors. Therefore, these pillars create the foundation that will
help in guiding the smart city project. They conrm how
well the entire project well managed as they based on global
leading research and practices [22].
The Dubai Electronic Security Center (DESC) will deal
with any electronic security threats, forms of cybercrimes,
and potential cyberattacks. The center focuses on making
Dubai the safest digital city in the world. Additionally, the
center works with all government agencies to ensure that the
Emirates enjoy an upgraded level of electronic security [20].
Furthermore, it focuses on making sure that precautionary
measures are put in place and that information security
systems are created and maintained in line with international
standards [23]. Therefore, this paper will focus on exploring
how the Cyber Security strategy will maintain Dubais Smart
City and informational security. Additionally, through
societal awareness, Dubai Electronic Security Center ensures
that compliance with laws and regulations is applied to all
cyberspace missions to enhance the cybersecurity of the
entire region. All strategic plans include establishing initia-
tives to combat cyberattacks, cybercrime, and threats [21].
Preparations for Dubai Vision 2021 have involved
research with a focus on developing, modifying, and using
technology in enhancing electronic security. Furthermore, it
has created an infrastructure to protect government infor-
mation, information systems, and telecommunication net-
works in Dubai with a focus on achieving a fair and secure
environment by the year 2021. Finally, it has strategic plans
to create a safe cyberspace that ensures the secure exchange
of data and information through the use of electronic media.
In conclusion, Dubai Electronic Security Center hosts the
work of the Dubai Cyber Security Strategy and ensures that
every smart infrastructure in the region is protected, data
exchange is secure, and that hackers have no opportunity to
inltrate the networks.
Sheikh Mohammed bin Rashid Al Maktoum launched the
Dubai Cyber Security Strategy with the aim of strengthening
the citys infrastructure in innovation, security, and safety
[24]. It aims to offer protection under the integrated pro-
tection against all dangers related to cyberspace. Further-
more, it aims to support innovations in Dubais cyberspace
and lay a foundation for good economic growth and pros-
perity in the region. Rather than protecting cyberspace, the
strategy plans to bring together both the private and gov-
ernment sectors in ensuring that a secure cyberspace is
maintained within the Dubai digital world [25]. From a
managerial perspective, the plan incorporates different
stakeholders who ensure that low chances of cyberattacks
will be experienced in Dubais Smart City [12].
Dubai Electronic Security Center created a platform for
implementing the Dubai Cyber Security Strategy. This
foundation aims at creating a uniting factor for individuals,
private institutions, and governments in providing a secure
cyberspace. Through this collaboration, Dubai Electronic
Security Center lays an infrastructure for protecting Dubai
from Cyber-Security-related risks and improving the econ-
omy and innovations in the region [21].
The core components of the strategic plan are dedicated
to making Dubai the most secure city in the region and to
create a smart, integrated, and connected Smart City [26]. In
its implementation, the Dubai Cyber Security Strategy car-
ries with it ve main domains. With these domains, Dubai
will stand as a leader in safety, security, and innovation, both
in infrastructure and technology (See Fig. 5).
Cyber Smart Nation: In this domain, the strategy
focuses on raising public awareness of the importance of
having a secure cyberspace and an understanding of the
signicance of Cyber Security within Dubais Smart City
[27]. Furthermore, it will involve the development of
capabilities and skills that will be required in managing
Fig. 4 IESE smart city dimensions. Source [3]
426 K. A. J. A. AlZaabi
risk among private institutions, governments, and indi-
viduals in Dubai [27,28]. It ensures a strong system is
built, and that society is made aware of all available
dangers of cybercrime and how they may protect them-
selves [18]. This includes the use of antiviruses in
phones, using strong passwords for their Wi-Fi connec-
tions, and proper conguration of devices such as baby
cameras, security systems, Smart TVs, or smartphones.
Mohammed Bin Rashid academy of scientists focused on
creating an expert scientic community of diverse sci-
entic disciplines. With the acquired knowledge, they
will easily explore the developmental needs of scientic
and technological elds for smart future of the United
Arabs Emirates. Therefore, availability of such programs
enhances the role of scientists in the UAEs 50th
Development Process thereby paving the way for the
smooth transition into the smart city environments [29].
Innovation: This domain focuses on increasing scientic
research in elds related to networks and the electronic
security eld. It purposes to establish a free, fair, and
secure innovative cyberspace for all people in Dubai [4].
In a nutshell, it will create an innovative cyberspace for
all people in the UAE that is secure and free for all [30].
A cyberspace is dened as an environment where com-
munication occurs between computers over a network.
Financial institutions, corporations, governments, hospi-
tals, businesses, and military camps collect, process,
analyze, and store their condential information on
computers that communicate through cyberspace, made
possible by computer networking [31]. Therefore, the
Smart Nation Program must pay more attention to Cyber
Security and cyberspace protection owing to increased
issues of sophisticated cyberattacks [8].
Cyber Security: This domain focuses on protecting
individualscondentiality, availability, and credibility.
This will then be boosted by the privacy of personal data
[32]. As a result of this innovation, individual transac-
tions will be very secure, and fears of hacking, phishing,
or even data theft [33] will be eliminated when sharing
information online. Naturally, data compromised by
hackers, network outages, and computer malware and
viruses are some of the incidents that affect an individual
who has one or more online accounts, which include
email. In the current world of digital applications, mobile
use, data networks, and Smart Cities, issues of cyber
insecurity will continue to increase. Therefore, there is a
need for growth in the number of professionals working
toward protecting individuals online [2]. This is Cyber
Security. Cyber Security is security related to information
technology and focuses on securing each network and
safeguarding computers, data, and programs from unau-
thorized destruction, access, or alteration. From a Smart
Citespoint of view, Cyber Security is a vital issue that
must be considered by the Smart Nation Program.
Cyber Resilience: Domain four is aimed at maintaining the
exibility of Dubais cyberspace while ensuring the avail-
ability and ensuring the continuity and availability of inno-
vative information technology systems in case cyberattacks
are experienced [21]. Additionally, it will be involved in
exchanging information and supporting the management of
events related to Cyber Security. Finally, it will advance
mechanisms to combat any cyber-related threats [21].
Fig. 5 Dubai cyber security
strategy. Source [25]
The Value of Intelligent Cybersecurity 427
National and International Collaboration: The core
purpose of this domain is to establish and nurture local
and internal partnerships that are aimed at consolidating
cooperation frameworks with diverse sectors at both the
local and global levels to confront the threats and risks
available in cyberspace [33]. Therefore, the strategic plan
is not only aimed at creating a safe cyberspace but also in
ensuring that users and international partners are
involved in ensuring the safety of the information and
infrastructures hosted in the Smart City [34].
4 A Look into Dubais Initiatives for a Secure
Sustainable Smart City
Even though Smart Cities offer signicant conveniences for
their citizens, the interconnected technologies that enable
these cities might cause physical damage to the infrastruc-
ture and loss of human life [35].
Dubai Smart City is at the forefront of sustainability and
is considered a future city. As a Smart City, Dubai Smart
City falls under six broad categories: smart living, smart
governance, smart people, smart economy, smart mobility,
and smart environment [21], as shown in Fig. 6.
In making Dubai Smart City a future city, technologies
such as Smart Transport Roadmaps, the Dubai Now Plat-
form (the one-stop shop where citizens can access govern-
mental services), the Happiness Meter, and Clean Energy
Strategies 2050 ensure the development of the infrastructure
and the population as a whole [36]. See Fig. 7.
Happiness Meter: One major focus of Dubai is
becoming the happiest city globally. This initiative
created by his Highness Sheikh Mohammed bin Rashid
Al Maktoum. The core strategy is implementing Happi-
ness Meters on all government applications, electronic
devices, and websites used in diverse government enti-
ties. The happiness meter focuses on measuring peoples
happiness on a daily basis. It will then evaluate how
satised people based on the services rendered by both
the private and governmental sectors. The primary focus
of this initiative is improving the happiness of all resi-
dents, employees, and visitors by both the environment
and services offered to them. About the year 2016, the
UAE was ranked 23rd globally as per the United
Nations World Happiness Report. Therefore, by the year
2020, Dubai focuses on becoming the happiness known
city on earth [3].
The Smart District Guidelines: Dubai has generated the
Smart District guidelines that aimed to educate various
stakeholders such as developers and architects on how to
embrace the smart city initiatives within the designs to
ensure smooth ow of the entire project development. By
doing this, the guidelines ensure that ownership of pro-
posals granted to every district and which will have
unique districts needs and achievements [3].
Smart Dubai Index: The collaboration of Dubai Statistic
Centre and the International Telecommunication Union
has enabled fast development of unique smarty citys key
performance indicators (KPIs). The core aim of the per-
formance indicators is assessing and evaluating how
different facilities and services are doing. Also, the key
performance indicator will help the government in mea-
suring how their progress is pushing towards achieving
the smart city goals [3].
Dubai Data: The collaboration between different stake-
holders is critical in achieving smart city objectives.
Fig. 6 Six strategic categories of
the dubai smart city. Source [47]
428 K. A. J. A. AlZaabi
Therefore, the Dubai Data initiative created with the aim
of enhancing information sharing between various gov-
ernmental agencies, city planners, business owners and
residents. With this platform, sharing data will be simple
between different stakeholders hence improving the
entire quality of life of residents. One reliable indicator of
this Dubai Data strategy is that once it launched, it
labeled as the global most comprehensive and ambitious
data initiative. With the similar determination of
achieving the smart goal objectives, then, the ability to
achieve the objectives are valid [3].
Smart Dubai Platforms: The Smart Dubai Platform will
provide real-time analytics tools for the private sector,
tourists, private sectors and governmental entities. In this,
every individual will require and username and password
to access the platform. For the residents, it will tie to the
Emirates ID making it simple for residents to access
hundreds of smart city services from the platform. For
example, under this platform, it will be simple for resi-
dents to assess their energy consumption, waste man-
agement or waste usage. On the other hand, a tourist can
simply nd the most efcient transport options to use.
Finally, a parent accesses merely the most cost-effective
information for their children. In this, the platform will
bring information closer to the people thereby improving
the quality of their life [3].
Dubai Blockchain: Dubais Blockchain aimed at offer-
ing the smoothest, secure and safest information
exchange pathway. The entire service provision will
digitalize where over 100 million government documents
would be accessed online. According to experts, this
move will save over 144 metric tons of carbon dioxide
emissions annually. Furthermore, it will ensure a redis-
tribution of up to 25.1 million houses of the economic
productivity in the region thereby saving over 5.5 billion
of Dirhams annually [37].
The Dubai Blockchain strategy created the roadmap for
effective introduction of the Blockchain technologies for
Dubai and helped in the creation of an open platform that
enables easy sharing of technologies with different cities
across the globe. According to Smart Dubai reports, the
Blockchain strategy created on three pillars of governmental
efciency, the industry creation and nally international
leadership. The rst pillar which is government efciency
focused on increasing governmental efciency by trans-
forming service provision into paperless digital layers for all
city-based transaction as well as supporting the Smart Dubai
initiatives both in public and private sector. In this, it means
that required documentation such as license renewals, visa
applications and bill payments which account for over 100
million documents annually will do digitally. Experts
believe that the move will save up to 114 MTons Carbon
dioxide emissions from trip reductions and eventual redis-
tribution of over 25.1 million hours of UAE economic
productivity in the saved document processing time [37].
Industry creation holds position as the next important pillar
that will enable citizens and partners in creating new busi-
nesses using the provided technologies. That implies that the
Blockchain will provide a platform for the creation of thou-
sands of business opportunities within the private sector.
Some of the industries that will directly benetfromthis
Fig. 7 Six dubai smart city
initiatives. Source [3]
The Value of Intelligent Cybersecurity 429
move include the banking sector, digital commerce, tourism,
FinTech, urban planning, transportation and smart energy.
The third pillar explores the International leadership pillar that
opens up the Blockchain for international counterparts to
effectively enhance the security, safety, and convenience for
the foreign visitors and travelers to Dubai. For example,
international travelers will enjoy faster entry with
pre-approved passport, easy mobility within the city and
enhanced security clearance and visas. Furthermore, they will
enjoy guaranteed wireless connectivity, pre-authenticated
temporary digital wallets, and payments. In so doing, better
Global Trust Network ties with partners from North America,
Europe, and Asia will be achieved [37].
It is crucial to pinpoint that the Dubai Blockchain strategy
executed by a partnership between the Dubai Future Foun-
dation under the leadership of his Highness Sheikh
Mohammed bin Rashid Al Maktoum. This foundation paves
the way for the much-needed collaboration between the
public [42 governmental entities] and private sectors in
creating the best working environment for application of
Blockchain technologies [37].
5 A Look into IoT, Machine Learning
and Artificial Intelligence
Next section introduces the IoT, Machine Learning and
Articial Intelligence, Nanotechnology, and Open and Big
Data Analytics concepts that are associated with the global
Smart CitiesCyber Security Program.
Internet-of-Things: Currently, the IoT has scaled up a
notch, introducing us to Smart Cities. The IoT is described
as an era in which networking or the Internet touches
issues such as health facilities, energy grids, manufac-
turing, nancial institutions, and educational establish-
ments such as universities, research and development
centers, and transportation facilities [1], as shown in
Fig. 8. The IoTs connect devices over the web, giving
them an opportunity to communicate with each other and
nally help humans to solve issues [9]. All citizens from
next-generation smart cities will have unlimited access to
affordable internet infrastructure wired and wireless net-
works. Additionally, any device that can transfer data
over the provider networks will label as an Internet of
Things component which will, directly and indirectly,
improve the lifestyle of Dubai residents. For example,
trafc lights, vehicles, bridges, parking structures and
entire transport system will embed with an intelligent
control system allowing secure communication and
coordination. In doing this, the transport system will
become smart, safer, secure and efcient. Smart Meters
are for energy conservation and remote power controls,
and Smart Fridges inform us when a certain item needs to
be replenished. The same will apply to energy, waste
management, and water supply [38]. In Dubai, the
Smart City will take this human-tech relationship to a
higher level.
In achieving this, Oasis Eco Resort will have to get
embedded with sensors that will offer real-time infor-
mation to users. Internet of Things will directly impact on
the sustainability of every infrastructure in the region.
For example, temperature and lighting will be controlled
automatically based on various variables. Some of the
variables to be considered include smoke, moisture
levels, room temperatures, noise or even presence of
Fig. 8 Overview on IoT
architecture including different
application areas. Source
Intechopen.com [72]
430 K. A. J. A. AlZaabi
smoke or re. The sensors will detect any change from
the norm hence increasing operational safety, security
and efciency. For example, building management may
update with real data on energy consumption, waste
collection, and water usage. By providing this informa-
tion, it will maximize the efciency of services at the
right time. Therefore, adoption of Internet of Things will
work in reducing errors, increasing efciency of services
as well as improving delivery of services in real-time.
However, despite all these benets, the major problem
that is potentially available is using internet of things to
make cities resilient.
Machine Learning and Articial Intelligence:In
making Dubai Smart City a city of the future, the tech-
nologies of machine learning and articial intelligence
are continuously being used. With machine learning, the
technological devices used in the city can effortlessly
inform the meaning of the data or what the documents
imply. For example, technologies can easily scan photos
or take photos, automatically read faces and eyes, and
reveal the identity of a specic person based on the
biodata that is hosted by governmental agencies [21].
Furthermore, Smart Cities will use robots at some points
to perform duties that humans cannot successfully
accomplish. For instance, robots will be used at the
one-stop government shop. This will ensure that no
human errors are experienced during transactions [39].
On the other hand, articial intelligence will identify
situations where the population needs changes and will
assist in dening how the changes will be implemented.
For instance, it may bring about technological innova-
tions that utilize individual data to suggest services (en-
ergy, health, or nancial) that a specic UAE citizen
requires to live a fullled life [28]. Figure 9showcases
how articial intelligence intersects with a Smart City.
The smart Dubai city will have a well-crafted roadmap
for articial intelligence. According to HE Dr. Aisha Bint
Butti Bin Bishr, the director of Smart Dubai ofce, arti-
cial intelligence will boost Dubai to the smartest and
happiest city in the world as it will directly contribute in
creating articial intelligence that is critical in acceler-
ating the regions growth. The result of these technolo-
gies and articial intelligence is making Dubai safe,
seamless and efcient and impactful in the lives and
experiences of the people [40].
Nanotechnology: The role of Dubai Electronic Security
Center in implementing strategic Cyber Security is
focused on ensuring that all UAE citizens are secure and
safe [18]. First, the center ensures that cyberspace is
created where individuals can easily share information,
conduct business online, and perform their errands
without fear of loss or theft of information. On the other
hand, the center has promoted the adoption of tech-
nologies such as nanotechnology, which involves the
Fig. 9 Articial intelligence intersects with smart cities. Source Frankdiana.net [73]
The Value of Intelligent Cybersecurity 431
utilization of science, engineering, and technology in
very small sizes of about one to a hundred nanometers
[41]. These technologies can detect re accidents at the
early stages. Nanotechnology plates used in Dubai Smart
City infrastructures are automatically activated when
temperatures rise, and they then release gases that are
capable of extinguishing res [20]. Therefore, on the
issue of protection, nanotechnologies have made it pos-
sible for Smart City users to have assured security [42].
Open and Big Data Analytics: Open and Big Data ana-
lytics will make it simple for Dubai Smart City to emerge as
a sustainable and future model city. For instance, with
Radio-Frequency Identication (RFID) tags installed in
each car, innovative technologies will be able to measure
and regulate vehicle trafc. The RFID tags will then send
the geolocation of all cars and devices in trafc to the
central monitoring unit, where trafc is easily monitored
and controlled. Similarly, through the use of the IoT,
devices such as Smartphones, Smart Televisions, and
Smart Ofces can easily understand the needs of every
region within the United Arab Emirates [21].
In a Dubai Smart City, effective garbage collection will
be accomplished courtesy of open and big data generated by
users. For instance, before putting the garbage into the bin,
every resident will be required to press a button on the bin.
This button tallies the number of users per day. With this,
city planners, surveyors, and architects can understand the
needs of each region and the sustainable systems that can be
installed to ensure environmental safety.
Additionally, children will be required to wear bracelets
that have sensors. This will help parents to track where their
young ones are at specic times. This will also work in
controlling the energy grid and consumption rates of each
family [43]. For instance, the areas that are scantly populated
may have some street lights switched off. By doing this,
more energy will be saved [20]. (See Fig. 10).
Analyzing the exact amount of resources and services
consumed in real-time is one capability that next generation
of smart cities should have to have a better understanding the
precise amount of energy, waste, and water consumed in the
city. With such information, it will be easy to manage the
efciency and use of resources and services. Additionally, it
will provide a good environment for evaluating the amount
of resources and services required based on the trends that
the trends and demands of services by the populations.
Therefore, availability of these data ensures that the cities
transform into resilient cities [3].
Therefore, from smart cars, intelligent location applica-
tions and public Wi-Fi are some of the examples that the
United Arab Emirates is striving it abilities and boundaries
of technologies in achieving smart city. Focusing on tree
technologies, it is critical highlighting that ever since the
Bedouins days, date palm has remained a constant source of
nourishment and refuge in the emirates desert climate. With
the modern iteration of the traditional date palm,
phone-charging and Wi-Fi emitting has given forth to a
prospective Smart Palm. The impressive-looking articial
trees stand six meters and using solar energy in providing
Wi-Fi hotspots and charging spots for phones and other
electronic gadgets. Additional information offered by the
technology tree includes weather. These innovations have
given room for Kite Beach and Smart Palms, and Zabeel
Park has provided more innovative spaces for everyone in
need [44].
Regardless of its cutting-edge technologies, Dubai is one
tricky city to navigate as many of the neighborhoods lack
the traditional stress address system. However, this year,
Fig. 10 Smarter cities: turning
big data into insight. Source
IBM.com [74]
432 K. A. J. A. AlZaabi
an innovative Makani Dubai system was introduced where
every building has a unique number that can use in locating
rough areas and locations in the city. The Makani system
works best with an integrated application that is supported by
GPS navigator, Garmin and which allows all users to locate
any location by foot, private care or public transport. Addi-
tionally, there are a number of applications for all users and
visitors to Dubai. For example, the Dubai Tourism applica-
tion provides a very comprehensive guide on different things
and locations in the city such as entertainment listing,
restaurants, and landmarks. Additionally, malls such as
Dubai Marina Mall, Dubai Mall and the Mall of the Emirates
have their apps that can help visitors to help their clients in
exploring shopping and product offerings available [44].
In relations to creating happiness of the citizens and their
visitors, transitioning into a sustainable transportation model
remains a critical pillar. According to the International
Energy Agency, transport sector accounts for about 23% of
the total global greenhouse gases emissions [38]. Therefore,
a sustainable transport system can contribute to the promo-
tion of the three pillars of sustainable development: eco-
nomic, environmental and social. Thus, the shift to smart
cities remains a perfect solution to overcoming all challenges
faced while the country is growing. That is because; it will
increase the efciency and the safety of the public transport
networks. Furthermore, it will create environmental-friendly
vehicles that will help people in planning their trips and
consumption patterns through the Dubai open data platforms
[26]. Therefore, with the availability of this data, it will
become easy for individuals and governments to increase
their transport effectiveness. In Dubai, the Dubai Strategy for
Self-Driving Smart Transport strives to convert over 25% of
the total number of trips into driverless trips by the year
2030. The pilot project for smart vehicles that can carry up to
10 passengers is already underway. Through reliance on the
integrated platform, all stakeholders including developers,
investors and government will benet from ample informa-
tion that is critical in improving the efciency of the Dubai
smart city performance. When this transformation is hap-
pening, a report by Cisco highlights that adoption of Internet
of Things will provide a massive number of job opportuni-
ties in cities (valued at Dh 17.9 billion) by the year 2020. For
example, over 1 million coders and over $1 million offer
opportunities will create courtesy of Smart City Dubai [19].
About the Dubai Plan 2021, the city will be smart, integrated
and connected efciently making it a preferred living,
working and visiting place for most people globally [26].
The Dubai International Financial Centre in collaboration
with a global consulting rm Accenture has created a new
FinTech accelerator program aimed at offering mentorship
programs for startup entrepreneurs in support of innovative
tech developments. One of the core aims of the program is
transforming Dubai International Financial Centre into a
globally recognized FinTech hub. As per now, it is home to
numerous applications such as mobile payment providers
such as Beam Wallet, Careem the Uber-like local app and
the online shopping application on Souq.com [45].
In similar scale, NEDAA, a Dubai-government owned
Telecommunication Company is also planning to utilize the
already laid internet of things ecosystem in getting a col-
laborative working partnership with Nokia. As stated by
Gaurav Dhar, the owner of Marshal Equipment and Trading,
Dubai carries on the ability to remain the technological hub
for multiple levels needs and which makes it possible for it
to give Singapore, New York, and London a hard time when
it comes to tech innovation and competitiveness[45].
As innovation advances, the Roads and Transport
Authority promises that Dubai motorists will not be waiting
for long at the signals as the authority will introduce smart
pedestrian signals that ensure safety while crossing roads.
These smart applications are in line with RTAs vision for
safe and smooth transport for all in Dubai [45]. The smart
signals are already in use in Al Saada St and aimed at
reducing the waiting time at the pavements. In so doing, it
reduced the amount of time required for the vehicles to pass.
All the trafc signals are sensor-based smart systems that
controlled through an optical ground system and which work
in modifying the crossing paths and the trafc signals. By
doing this, it ensures safer road use by all individuals [22].
The United Arab Emirates generates one of the regions
largest amounts of electronic water with each resident pro-
ducing about 17.2 kg of e-waste yearly. Following this, to
meet the ever-growing e-waste recycling demands, UAE
focuses on developing the smartest e-waste bib by the year
2020. The e-bin will be a smart mobile-based electronic
recycling technology that focuses on improving the ef-
ciency of e-waste recycling. The bin will have a
touch-screen technology making it simple for the recycling
company and the user to communicate with it effectively.
For example, the bin will be in a position of notifying the
user on whether it is full and the next possible empty e-bin in
the area. In the same way, it will notify the company to come
collect the already fetched waste. This technology will fully
rely on solar energy and which will make the entire project
an environmentally friendly approach to smartness [45].
As a city, Dubai seeks to uniquely distinguish itself as a
global leader in delivering smart living and smart economic
opportunities for all. For instance, from an economic
dimension, it provides the business community with smooth
access to both the East and West through a well innovative
infrastructure. Smart Logics exemplies the economic
infrastructure within the Dubai Seaports, and the air was
thereby helping in driving the global competitiveness. On
the other hand, the international exposure to smart tourism
and MICE departments create impactful experiences for
Dubai destined visitors. That is all focused on achieving a
The Value of Intelligent Cybersecurity 433
developmental and smart infrastructure that can service the
over 50 million visitors by the year 2020 [45].
About smart living, Dubai strives to maintain exceptional
cultural, vibrant lifestyle and quality of life a safe and secure
environment. That has modeled on Mohammed bin Rashids
unique model of government that strives to bring smart
services to the users. For example, the launch of The Dubai
Government Excellence Program (DGEP) 20 years ago
creates the best customer service experience in the city. With
this, smart homes, connected neighborhoods will become a
norm in Dubai [45].
6 Current and Future Challenges Linked
with Smart CitiesTechnologies
The Smart Nation Program will have double or triple the
advantages of having well-performing cities. Smart Cities
are now dependent on smart technologies for all of their
responsibilities, with everything integrated into the IoT and
ICT technologies for easy control and regulation [26].
A Smart City encompasses four main components: Smart
Vehicles, Smart Grids, unmanned aerial vehicles, and smart
service provision and automation systems [20] including
street lights and trafc control systems, public transport,
parking application systems, and water and energy man-
agement systems [46]. However, Smart Cities come with
their own security problems, which will make it challenging
to maintain and control the capabilities of the system.
According to [11], there is a need to look at all external
factors (social, management, legal, technology, sustainabil-
ity, and economic) that can inuence Smart Cities and their
implementation. Therefore, while looking at this, the rst
challenge that is currently affecting populations is linked to
information protection and safety during the exchange. This
is a result of increased incidences of hacking and phishing of
networks [47].
By adopting smart environments, smart transport sys-
tems, smart e-health, smart education, and smart service
provisions, the absence of human operators or intervention is
expected. However, owing to the high number of connec-
tions in the network, a small cascading error caused by
viruses or malware inltrated into the systems by users may
result in a massive loss of data and information [10]. It is
important to highlight that owing to the high number of
connection networks, there are increased chances that one
virus from a smartphone may slowly get into other major
systems such as banking structures [21]. Therefore, con-
trolling the massive automated infrastructure becomes a
signicant challenge.
In the current world, there is an increased growth in cyber
activists. Therefore, the Smart City platform provides them
with an enabling ground where they can quickly launch
attacks from simple infrastructures such as home cameras on
massive targets such as a Smart Citys energy grid, garbage
collection systems, or health provision systems [26]. In the
modern world, smart cities are suffering from simple mal-
ware and worms such as Ransomware, but in the future,
there are increased chances of backdoors that will inltrate
the system and ultimately break down the network provision
channels [13]. If the data is altered, service providers will
never be the same again. Smart vehicles will begin having
unprecedented accidents, energy access will become a sig-
nicant challenge, accessing healthcare providers will be a
problem, and eventually, control of important capabilities
such as air conditioning systems will break down [45].
Therefore, manipulation of data through network jamming
will be a major concern and challenge in the future.
Additionally, one of the major security issues of Smart
Cites is that sensors in different equipment and devices
around the city may be hacked and fed with fake and
malicious data [7]. This could result in signal failures, data
theft, system shutdowns (governmental, healthcare, and
transport management), the contamination of the water
supply, and security breaches [48]. According to computer
security experts, the wireless sensors that are integrated with
Smart Cities might lead cybercriminals to fully control the
Smart Citiesinfrastructure including trafc lights and water
management. Furthermore, Cesar Cerrudo, an Argentine
security researcher and chief technology ofcer at IOActive
Labs, [4] showcased how easy it is to hack 200,000 trafc
control sensors that are integrated within critical hubs such
as Washington, New York, New Jersey, San Francisco,
Seattle, Lyon, and Melbourne by intercepting these sensors
from 1500 feet away using drones [4]. He also exposed how
the companiesfailure in implementing encryption within
this trafc had allowed the problem to occur. In addition, for
the past year, security researchers at the Black Hat Europe
Conference in Amsterdam showed the effortlessness of
manipulating smart meters and power line communication
technology through exploiting encryption issues, which
causes blackouts in parts of Smart Cites. In 2014, the
Department of Homeland Security reported that a sophis-
ticated threat actorhad guessed the interconnected systems
password, which caused damage to the control system net-
work at a public utility [6].
Furthermore, in 2014, hackers were reported to have
compromised over 100,000 Smart TVs, refrigerator units,
and many other household appliances. Another case was
witnessed with the Linux worm known as Linux.Darlloz,
which could hijack numerous home appliances such as
routers, set-top boxes, and security cameras [49]. Therefore,
many IoT devices, desktop computers, and mobile devices
are susceptible to being attacked by cybercriminals. There
have been many cases of hackers inuencing the direction of
a vehicle, redirecting money to different accounts, and
434 K. A. J. A. AlZaabi
interfering with program proceedings over mass media. This
has also affected the functionality and stability of many
Smart Cities. The motivation behind conducting an SCCS is
1 to assess the knowledge level, including the attitudes of the
residents, on the recommended Smart City precautions in
terms of Cyber Security; 2. to evaluate the role of different
governmental agencies in ensuring SCCS; and 3. to analyze
the challenges associated with Smart Cities and how well the
involved parties can lower the risks of cyberattacks. It is
important to note that the smarter a city is, the higher the
number of computers and computer systems are used. More
computers require more network integration between sys-
tems, which creates a wider openspace where data col-
lected by the systems can be accessed.
Smart Cities will have thousands of interconnected
tech-based devices. Now, cybercriminals can create and use
self-propagating malware, the alternatives of which have been
known to multiply across several connected networks. Crim-
inals can use these wormsto easily acquire commodied
information while taking control of major systems. Thus,
countries are now responsible for making their cities smart; for
this, they should invest in their human resource development
with the intention of developing and improving their skills in
the complex nature of IT systems. The Cyber Security skill
sets related to Information Technology (IT) and Operational
Technology (OT) are highly crucial to be developed to secure
all smart-technology-based tools and systems [50]. Having
analyzed the benets and risks of Smart Cities, this paper will
argue how peoples attitudes toward the new technology will
determine the security or insecurity of the people living in a
city. Many people are not concerned about Cyber Security and
are unaware of the dangers of living in a Smart City that
encompasses interconnected devices. This is one attitude that
gives cyber insecurity an opportunity to grow, while
camouaging itself with technological innovations. Figure 11
showcases ve challenges in building a Smart City.
In the future, billions of devices will be placed in the
network. Which means that the devices will be involved in
continuous communication and will listen to each other.
With this in mind, the issues of user privacy and trans-
parency come into play [15]. Additionally, all homeowners
will perceive the use of smart cities and devices as the norm;
therefore, they will not mind the control of security threats
[10]. Therefore, their personal information such as addres-
ses, credit card data, emails, or condential information will
be shed from the networks and used by hackers to com-
promise their lives [51]. This means that as technological
innovation matures, the current challenges facing smart
cities will enlarge in scale and will eventually affect a large
number of infrastructure and automation systems upon
which the population depends [52].
The United Arab Emiratesgovernment has ensured that
Dubai Smart City adopts the sustainability and future of
smart cities globally. Therefore, this section posits that
promoting a rapport between the government and the pop-
ulation will ensure the success of the Dubai Smart City. By
empowering the citizens with information, it will be simple
for the region to provide a safe, fair, and secure cyberspace.
This study argues that through the adoption of technologies
such as nanotechnology, the IoT, and the utilization of big
data, the region will enjoy the safest and most secure
cyberspace for smart living, smart transactions, smart envi-
ronment, and smart services.
Therefore, this section will craft questions that will
answer the study hypothesis (Argument), while looking at
how different sectors (social, political, and economic) work
together to achieve Cyber Security in Dubais Smart City.
The following are the key study questions:
What are the new strategies of Dubai Electronic Security
Center that prepare the center to achieve Dubai Vision
2021 to be among the securest smart cities in terms of
Cyber Security around the globe?
Are there any major political, social, economic, or mili-
tary issues that confront the global community and may
affect its acceptability of Cyber Security as an important
aspect of life?
What are the challenges facing international security that
may eventually nd a route into Smart Cities?
What is the role of the military force and diplomacy to
ensure Cyber Security, as well as promoting peace and
stability?
What is the importance of global collaboration in making
Smart Cities the city of the future?
Is the IoT safe as far as Smart Cities are concerned? What
lessons should people (both locally and internationally)
draw from how the cities are planned and managed?
What are the vulnerabilities posed by the Smart Cities
infrastructure and residents? What are the corresponding
techniques and tools to proactively defend against SCCS
challenges?
Fig. 11 Five challenges in building smart city. Source Maximum-
governance.com [75]
The Value of Intelligent Cybersecurity 435
The study questions are aimed at evaluating all possible
facts and assumptions of individualattitudes from gov-
ernments, institutions, or individuals, which result in the
growth of Cyber Security issues, despite the positive benets
associated with Smart Cities and IoT.
7 Smart City Cyber Security Program
This study focuses on three interconnected dimensions of
Smart City Cyber Security: strategic planning, technology,
and privacy. The researchers methodology relies on quali-
tative and quantitative methods to analyze and evaluate the
issue of Cyber Security in relation to Smart Cities. The
reason behind applying the qualitative method in this case is
to describe the security elements and issues associated with
Cyber Security both locally and internationally. This paper is
based on a survey that evaluates how well individuals are
aware of cyberattacks associated with Smart Citiesinter-
connected technologies worldwide, to implement an aware-
ness to guide them in protecting their lives and property
against sophisticated new Smart-City-based cyberthreats.
The data used in this study were collected from a survey
that was carried out in August 2017, and the study respon-
dents included 40 employees working for government and
the private sector in diverse job positions. There were 32
(84.21%) males and 06 (15.79%) females to achieve a
quantied conclusion to this study. The participantsrole
was to answer the survey questions to enhance their
awareness toward Cyber-Security-related Smart City issues.
The researcher used a random sampling method, which was
the most effective method of accessing potential study par-
ticipants. The survey data was collected using tables because
they are the most effective way of obtaining data and offer an
easy platform for analysis. The research analyzed the mean
of the entire population, as well as separate gender means, to
evaluate their participation and their attitude toward Cyber
Security concerns. These are the survey questions:
Are you aware of the Smart City Program coming up in
our city? Dene the term Smart City.
Do you know what Cyber Security is? Dene the term
Cyber Security.
Have you ever experienced a cyberattack?
Can a Smart City cyberattack cause physical damage to
the infrastructure of a Smart City?
Do you expect an occurrence of cyberthreats against
Smart Cites in the upcoming years?
Do you think that cyberattacks on Smart Cities can
threaten the citizens and privacy of a Smart City?
Do you agree with developing interconnected technolo-
gies based on a Smart City that is maintained by the
Internet-of-Things (IoT)?
Do you agree with using big data analytics for Smart
Cities?
In the utilization of this study, I collected data from the
respondents, compared them with what I know already about
the Smart City in Dubai, and then conrmed the arguments
with documentation relating to the Dubai Smart City. By
doing this, the acquired information about the Cyber Secu-
rity Strategy and how it will increase the sustainability and
smartness of Dubai as the home of a Smart City is evident.
In addition to this survey, I used peer-reviewed articles and
books that dealt with Smart Cities and specically Dubai
Smart City. The following section will demonstrate the
respondentspoints of view toward the Smart City Cyber
Security survey.
The researcher gained the expected results by using the
proposed methodology, summarized the survey results, and
listed them in Table 1(see Fig. 12).
From the survey results, those who have never attended
school comprise 5% of the total, two years in college 5%,
graduated from college 42.50%, graduate school 2.50%, and
completed graduate school 42.50%. This means that over
90% of the individuals used in this study are educated,
which makes the quality of the data collected rst-rate.
Table 1 Smart city cyber security
Characteristics Survey results (%)
1. Aware of the smart city program 55
2. Familiar with cyber security denition 87.18
3. Have you ever experienced a cyber-attack 47.5
4. Smart city cyberattacks might cause physical damage to smart city infrastructures 84.62
5. Expectations regarding the occurrence of the cyberthreats against smart city in upcoming years 94.74
6. Cyberattacks on smart city might threaten a smart city citizens life and his/her privacy 100
7. Agree with some interconnected technologies that are maintained by internet-of-things (IoT) 86.11
8. Agree with using big data analytics for smart cities 90
436 K. A. J. A. AlZaabi
The survey indicated that around 55% of all respondents
were aware of the upcoming Smart City Program that will be
implemented in their city. This high percentage assures their
ability to articulate a response to What is a Smart City
Program?Around 87.18% of the overall respondents were
familiar with the term Cyber Security,which conrms the
reliability, utility, and relevance of the applied data.
However, of the respondents that were familiar with this
term, only 47.5% previously experienced a cyberattack.
Moreover, only 84.62% from the total number of respon-
dents agree that a Smart City cyberattack might cause
physical damage to the Smart Citys infrastructure. In
addition, 94.74% of them expect to witness cyberthreats
against a Smart City in the year 2017. Additionally, 100% of
the participants believe that a loss of life and privacy of a
citizen can occur owing to cyberattacks on a Smart City.
Furthermore, 13.89% of the overall respondents disagree
with the development of interconnected technologies that are
maintained by the IoT of the Smart City, while 10% of them
disagreed with using big data analytics for Smart Cities.
8 Intelligent Cyber Security Strategies
for Dubai Smart City
As the global population increases and resources become
scarcer, the efcient and sustainable utilization of limited
resources has become a critical concern. Cities must learn
from diverse initiatives launched by better ranked smart
cities. Integrating multiple Information Communication
Technologies and the Internet of Things within the already
established environments should remain a key priority as it
will work in transforming Dubai into the smartest city.
With this, it will become simple to manage, increase ef-
ciency as well as access to services in real-time. Moreover,
access to education, e-government, community services,
healthcare, and education will be improved. However,
achievement of these will require a complete collaboration
between the government, citizens and the private sector. The
understanding between all the stakeholders will assure
achievement of the Dubai Smart City initiative where smart
people and smart services will thrive [3].
Smart Cities such as Dubai Smart City are a key factor in
the sustainable consumption of resources and natural mate-
rials. Dubai Smart City is built on open and big data, which
makes it the city of the future. However, without assured
safety, security, and protection, Smart Cities may become
dangerous infrastructures. Therefore, the ability of the UAE
government to launch a Cyber Security Strategy has made
the region more secure, smarter, and attractive for smart
people to live in [36].
The development of a Dubai Smart City and support from
a Cyber Security strategy ensures that the UAE will solve
environmental parking (trafc), economic, and health prob-
lems. Furthermore, it ensures that population needs are
controlled and achieved without affecting the interaction
with their specic units in society [53]. From the survey
question, it was evident that 45% of individuals had expe-
rience with cyberattacks. In addition, 84.62% of the
respondents believe that cyberattacks have the possibility of
damaging the infrastructure of the Smart City in Dubai, and
their response was, Most denitely, and Digital Immunity is
the only way to protect the city.Additionally, 94.74% of
the interviewees believe that Smart Cities will be exposed to
cyberthreats in the future, as Smart Cities have witnessed a
40% growth every year around the globe. Moreover, it was
clear that all 40 respondents (100%) believe that cyberat-
tacks on Smart Cities have the possibility of threatening the
privacy and citizens of a Smart City. The following are some
of the respondentscomments: Citizensdata reside in a
city-wide Smart City Platform. Any security attack on the
platform will compromise the citizensprivacy,and Most
denitely, cyberattacks will pull the carpet from underneath
everyone.
For that reason, 86.11% agree that the development of
interconnected technologies that are maintained by the
Internet-of-Things (IoT) would work in reducing the threats.
In relation to this workability and sustainability of Smart
Cities, 90% believed that use of big data analytics would
make it simple to deliver services. City data is considered
big data, which is made of structured and unstructured data,
and without applying analytics there is no real value to
stakeholders (citizens, government, businesses),reported
one of the survey respondents. Furthermore, they agreed that
big data analytic techniques were invented to help Smart
City planners. Given these results, it is now clear that
Fig. 12 Smart city cyber security
The Value of Intelligent Cybersecurity 437
the Cyber Security Strategy by Sheikh Mohammed bin
Rashid Al Maktoum will increase the sustainability of the
Smart City.
According to the collected data, less than 45% of the
overall respondents were not aware of the upcoming Smart
City program in their city. Two of the respondents dene a
Smart City as a connected city,and a smart city is a
holistic environment where human infrastructures are
gracefully integrated with physical infrastructure.By con-
trast, 12.82% of the participants failed to dene Cyber
Security terminology, and some of the responses were as
follows: Protecting physical and digital networks, IT
components, applications and data from attacks.”“The
Internet, the mother of invention, creativity and innovation,
has created universal malware that covers the world. Cyber
Security is the medicine.”“Protecting cyberspace against
cyberthreats.”“Protecting corporate data from theft.Fur-
thermore, 47.5% of them never experienced any cyberat-
tacks, either as an individual or as a business entity. One of
the respondents stated, Ransomware is one of the evils.
Sometimes, people might be targets of cybercrimes; how-
ever, owing to their levels of education or age, this could
hinder them from distinguishing between legal and illegal
activities, which could be the case for some of the partici-
pants in this survey.
Although the enterprise companies are familiar with
Cyber Security, they, however, do not have strategic security
planning to employ the term Cyber Security,nor do they
have a strategic plan for conducting a risk assessment on
their valuable assets. Moreover, most of the businesses failed
to enforce security policies or even sell interconnected
technologies that are maintained the IoT and Internet of
Everything without encryption or even authentication. This
can impact a Smart Citys Cyber Security and might cause
physical damage to the Smart Citys infrastructure or even
loss of a citizens life.
Furthermore, most people think that Smart Citymeans
safebecause everything will be smart, intelligent, and
under control. Therefore, they assume that nothing will
happen without detection, as there will be CCTV cameras
implemented in the Smart Citys surveillance, and so forth.
Cyber Security should have three pillars: people, procedure,
and technology. Most of the respondents think only about
smart technology, which might have conguration errors,
encryption and authentication that do not support these
technologies, crackable or even default passwords, and of
which can be maintained properly by people. In addition,
procedures that are implemented by people are the weakest
pillars in the Cyber Security triangle. Thus, if a malicious
user can penetrate and manipulate the interconnected trafc
signal system, he or she will be able to cause physical
damage, collisions between vehicles, and the loss of human
lives residing in a Smart City. The same applies to the
interconnected vehicle system. Moreover, if the attacker
exploits the interconnected devicesvulnerabilities given
that they store citizensor even businessessensitive infor-
mation, then he or she will be able to disclose privacy items,
which is a cybercrime.
The surveys participants are unfamiliar with critical
thinking or even best-practice security strategic plans, which
led the researcher to have only 94.74% of the overall
respondents expecting ever-rising cyberthreats against a
Smart City in the upcoming years. Unfortunately, the survey
indicates that most respondents agree with having inter-
connected technologies that are maintained by the IoT within
the Smart City. These are the same people who have poor
knowledge of Smart City cyber risks. Furthermore, the
conducted survey indicates that 90% of the surveys par-
ticipants agree with using big data analytics for a Smart City
to store a signicant amount of data related to the Smart
Citys interconnected devices. However, the same people are
not worried about how dangerous it is to implement this
technology, or even the risks of cloud computing, and how
difcult it is to trace any crimes related to the cloud (Cloud
Forensics).
Additionally, there was another issue among the partici-
pants: more males were aware of cyberattacks and Cyber
Security issues than their female counterparts. This conrms
the argument that personal attitudes toward a certain issue
determines its success or failure. In my study, males are
more concerned about Cyber Security issues in a Smart City
than females. This can explain why more females are vic-
timized by cyberattacks. Therefore, I can conrm my
hypothesis that individual attitudes determine personal
knowledge of cyber-related issues and concerns. The fewer
individuals that are concerned about Cyber Security, the
higher the opportunity for hackers to hit back [54]. There-
fore, in the case of a Smart City, the Smart Nation Program
must offer public teaching, disseminate awareness, and build
capacity with regard to using the interconnected system in a
safe manner [2]. This will help to seal the gap that hackers
would use to terrorize innocent citizens worldwide living in
Smart Cities.
Tripwire conducted a survey called the Tripwire 2016
Smart Cities Survey: Cyber Risks, and their ndings com-
plement my survey results. Their survey assessed the chal-
lenges of the Cyber Security of a Smart City, and their
participants included 200 IT professionals who work in both
state and local government. Their study indicates that only
88% of the overall respondents were wary of cyberattack
impacts against the Smart Citys critical infrastructure,
which would cause a threat to public safety. In addition,
around the same percentage expected to witness a cyberat-
tack against the Smart Citys services in the year 2016 [35].
An example of a critical Smart City service is smart
energy grid technology, which ensures satisfactory energy
438 K. A. J. A. AlZaabi
consumption by users. It is believed that this technology
reduces costs and environmental impacts, and improves the
efciency of energy consumption [1].
Every residential building is tted with a smart meter and
sensor, which are then connected to the users IP address [7].
The connection makes it easy to determine user consumption
patterns, and it offers an opportunity for end-user control. By
doing this, government bodies and other relevant bodies in
the energy industry can offer advice to the consumer through
the same platform. However, this free information-sharing
platform has its own effects on the security of both the users
and governments information. With this system in place,
hackers are free to hack into the system, change details, and
access userspersonal information such as phone numbers
and bank details [48]. According to [55], many users are not
concerned about how the system works; they work with
functioning devices, which gives hackers a great opportunity
to access their personal details and data [55].
Furthermore, the Smart City offers real-time information,
which is made possible by Global Positioning Systems
(GPS), Wi-Fi, and RFID technologies. The systems offer
data analytics and prediction techniques that make it simple
for individuals to [56] enjoy both public and private travel.
For example, sensors actively collect information about city
trafc, then send it through GPS communication or wireless
networks to a centralized control system, which assists the
trafc departments in decision-making and the synchro-
nization of trafc light operations [57]. The Smart City
improves the common Electronic Patient Records stored in
healthcare centers. In addition, the connection of healthcare
systems with this technology will make it easy for the
population to access their health care clinicians and profes-
sionals [2]. According to the Association for Dubai Elec-
tronic Security Center (DESC), partners in creating the
Smart City must also collaborate in teaching the population
about Cyber Security and issues surrounding the entire
techno-novation in Dubai. This is because the growth in
technology results in increased security risks, which may
affect the entire population. A literature review indicates that
the population appreciates Smart City elements without
having an increased understanding of the risks associated
with sharing their information online [48].
Furthermore, almost three years since its establishment,
the Smart-City-state success story of Dubai is at the cutting
edge of an industrial revolution. At present, the IoT inter-
connects the cyber and physical systems of Dubai, such as
sensors and smart technology-based systems, with the digital
aspects that connect the entire society and overall critical
infrastructures, which include transportation, health, defense,
and nance. Investment in infrastructure is projected to grow
during the next four years. However, as Dubai as a Smart
City becomes more and more associated with cyberspace, so
does its risk of cyberthreats. During the last century, Dubai
has become a ourishing city, but Dubai as a Smart City will
have to develop and prepare a cyber-smart workforce, along
with advanced technology, strategies, and new and effective
cyber risk management solutions [58]. As Dubai is indeed a
city of strategic technology in the world, it is an emerging
economy that can become a major economic center of the
Middle East and North Africa (MENA) in the Asian region.
For Smart City, big data and analytics have a wider appli-
cation in six areas:
Security/Policing: Through big data and analytics, Smart
Cities now seek to move toward developing a safer city
that enables police to control crime without requiring
them to put themselves at risk of physical harm [59].
City Planning: Using modeling and data, Smart Cities
are mapping the infrastructural outcomes of space use
with a high degree of accuracy for civic planning of the
growing population and infrastructure needs [59].
Transportation: Through analytics, Smart Cities have
created a exible and effective public transport system
with increased efciency and decreased number of
delays. Analytics and big data have enabled the Smart
Citiestransport system to predict upcoming events and
peak times, and monitor equipment with reliability. This
has also helped to decrease road accident ratios [60].
Future Proong: With predictive analytics and model-
ing, Smart City planners are now capable of foreseeing
potential growth areas and assess how large this increase
will be [60].
Web Provision: Analytics has enabled Smart Cities to
direct bandwidth at optimal levels in nancial and com-
mercial areas during weekdays, and this pace is shifted
toward residential areas on Saturdays and Sundays.
Analytics has the potential to optimize bandwidth as
needed in this Smart City Project [59].
Effective Spending: Using analytics and data, the Smart
Cities also seek to target public spending in areas where
it is most required. This facilitates the effective assess-
ment of the most appropriate areas of public spending
and reaps its maximum output. This will also help the
Smart City to reduce waste and enhance infrastructure
[59].
Analytic Measures in Smart Cities: To ensure the
effective utilization of analytics and big data in Smart
City Projects, it is imperative to develop an effective
Cyber Smart Workforce. Although there are improved
technical Cyber Security defenses, human beings need a
strong knowledge base and skills to be developed in
cyberspace. An effective and secure cyber infrastructure
The Value of Intelligent Cybersecurity 439
requires a skilled workforce, and such a workforce needs
to be trained in the best Cyber Security strategies, prac-
tices, and technology. It is essential for a Cyber-Smart
City workforce such as that in Dubai to comprehend
ways to ensure the tight security of converged Informa-
tion Technology (IT) and Operational Technology
(OT) [59].
This approach allows Smart Cities to exercise absolute
power and control over cyber episodes. Analytical and
investigative skills have also been developed and enhanced
by means of collaboration between different agencies oper-
ating at the government level [53]. San Diego is among the
most active city in enhancing Cyber Security in the world
today. San Diego is the headquarters of Qualcomm, the US
Navy, and the Marine Corps. It is deemed to have the largest
military concentration across the world [49]. Thus, the city
has a lethal potential of Cyber Security maintenance.
Through implementers and planners such as Dr. Sandra
Brown, the vice chancellor of research at The University of
California, San Diego, as well as David Graham, who acts as
the citys deputy COO in charge of neighboring services, the
city has stepped up its efforts in combining elements of local
academia, individual talents, and entrepreneurship to make
the city smarter.
The program of MetroLab has also been implemented to
ensure that the Smart Citys measures and goals will be fully
set and achieved soon. Metrolab acts as a network connec-
tion that supports the city, university, and overall develop-
ment in San Diego. This has been achieved through the
contribution of Sandra Browns and David Grahams
departments, which are geared toward the smart develop-
ment of San Diego. In addition, the GPS Connected Qual-
comm 3G network enhances data transfer across all sectors
of the city. San Diego has a couple of institutions and
departments in charge of Cyber Security. These include San
Diego State Universitys Center for Commercialization of
Advanced Technology, the University of California, and the
Information System Security Association (ISSA). Although
most of the information systems are encrypted, these insti-
tutions and departments have developed different software
applications, which can be effective in the protection and
recovery of data in cases of cyberattacks in the future [49].
From a legal perspective, cyberattacks and hacking in
Dubai are punishable under the clauses given by the United
Arab Emirates (UAE) Cyber Security Federal Law No. 12 of
2016 concerning combating information technology crimes.
The act states that any individual who falsely accesses
unauthorized information by causing a computer to down-
load data either manually or by using a program is termed
guilty [61]. Dubai Smart City and its vulnerability to Cyber
Security fall under UAE Cyber Security Federal Law
No. 12 of 2016. It offers laws that guard and protect users
from technology against unauthorized disclosure of com-
puter access codes, obstruction of computer use, and unau-
thorized interception of computer networks with the aim of
modifying or stealing data. This subject truly shows the
importance of disseminating information among the popu-
lation against Cyber Security attacks, and plays a part in
supplementing the protection offered by the UAE Cyber
Security Federal Law No. 12 of 2016. The Smart City
technology in Dubai brings the interdependence and inter-
connectedness of services into a single dashboard controlled
by the government and stakeholders, who are responsible for
ensuring the development (adhering to the policies and
practices) of people living in Dubai.
It is believed that the Smart City system guarantees an
efcient and resilient governance, security, and on-time
delivery of services. While in San Diego, different informa-
tion system attacks committed by hackers are being reported
globally. According to S. Shrivastava, many attackers take
advantage of trafc on a networkssystemtoholditfor
ransom and interfere with its functioning. Hackers can encrypt
data and prevent it from being viewed by those in charge [62].
N. Nigam et al. also came up with a process through which
attackers use wormhole attacks and ransomware in a bid to
control information systems [63]. Therefore, cyberattacks
have existed for many years, conducted by hackers and
cyberattackers. However, cyberattacks can be prevented by
using effective security to prevent access of data on the sys-
tems. Table 2showcases cyberattackersactivities against
Smart-City interconnected technologies.
The current and future challenges faced by Smart Cities
from cyberthreats include information theft, use of malware,
viruses, or hacking into the overall server or control rooms.
By doing this, hackers may interfere with control systems,
thus causing accidents, an oversupply of power, or even
reduced access to energy or medical services. Therefore,
despite the advantages associated with Smart Cities, more
danger than good may be experienced if everything is not
streamlined. For this reason, citizens must be taught how to
secure their information while using IOT devices that
transmit data. Therefore, while using devices such as
Smartphones, Smart Televisions, or even home security
cameras, the population must be educated on how to protect
their data from falling into the wrong hands. Thus, they will
achieve security, safety, and protection from hackers or any
other related vices.
Hence, owing to the increasing application of IoT devices
such as Smartphones, Smart Televisions, and Smart Home
appliances, the number of cyberattacks against these systems
is rising. Therefore, to ensure the safety and security of
information, there is a need to create laws that govern
manufacturing and updates to IoT devices.
440 K. A. J. A. AlZaabi
9 Safe Cities: Using Smart Guidance
to Secure CitizensPrivacy
In relation to domain one (a Cyber Smart Nation), the
government can inform its citizens of ways of protecting
their computers and IoT devices such as Smart TVs, Fringes,
or even security controls. Citizens may be informed of the
importance of installing antivirus programs and rewalls,
and updating their operating systems [15]. Information is the
power that the government will offer its citizens, which will
increase their knowledge of how different systems work and
how they can protect themselves.
According to crime opportunity theory, most offenders go
for rational choices and therefore target events that offer high
reward with little or no risk involved. Therefore, citizens
must be given information on how to lower any opportuni-
ties for criminals to access their networks. This decreases the
chances of criminals or hackers nding loopholes in the
systems or networks. In addition, the government may pro-
vide hotlines where citizens can make distress calls when
they feel their networks have been compromised. Early
intervention ensures that malware or viruses are wiped out of
the networks before they hit a large number of users [64].
Lastly, information departments and their afliates must
ensure that citizens are updated on the need for passwords
when it comes to accessing sensitive information. This will
help to restrict access to sensitive data and information by
unauthorized personnel. Thus, citizens are knowledgeable
about the need for privacy and condentiality of their
information. Citizens may be advised on critical facts such
as never sharing their credit card or personal information
with any website as it increases the chances of data com-
promise and theft. Furthermore, citizens must be given
information on how to encrypt their data as well as purchase
cyber insurance policies. All personal computers and infor-
mation stored on servers and databases should be encrypted.
This means that hackers have no option of accessing any
sensitive information hosted in the cloud. Moreover, there is
a need to purchase a solid cyber insurance policy that covers
all costs and losses that may occur in a cyberattack. There-
fore, because the government has all information that is
required by citizens to protect themselves, it is the states
responsibility to ensure that all individuals are informed.
This will lower the possibility of cyberattacks [65].
10 Todays Plan Will not Work Tomorrow
A Smart City requires agility and forecasting. For Dubai
Smart City, this is the only way to lead the E-world into a
Smart City world. Therefore, leadership (government, poli-
cymakers, and regulators) must have tangible innovations
and ideas to implement Cyber Security preventive policies
and a safer E-environment for Dubai Smart City user.
According to [48], Cyber Security is more a culture and
attitude than compliance. Therefore, society must change its
attitude toward the perception of Cyber Security in order to
improve security and reduce the number of potential
cyberattack threats. This means that the complete protection
of Smart City citizens begins with the users: they need to
protect themselves, and they need to seal all available
loopholes that hackers may use to attack systems [48]. In
addition, the criticality of using big data to improve the
performance and sustainability of Smart Cities [20]will
reduce the conict between individuals and the environment
in society [36]. Moreover, technology and innovation will
eventually ensure a sustainable use of resources regardless of
the growth of the population [21].
In summary, Cyber Security issues are harbored within
the personal attitudes of the users, which pose threats to
Smart City technology [66]. In addition, Dubai has the
potential to become a technologically leading city in the
MENA region despite the reality that cyberspace agencies
and the workforce require a skill set to combat cyberattacks.
For this, the government needs to develop tangible ideas to
Table 2 Cyberattackersactivities against smart city-interconnected technologies
Cyberattacks against smart city
1. Attackers can manipulate the trafc lights, as some of the devices used in trafc control systems are without any encryption
2. Wireless street lighting systems, which have encryption issues and therefore cause street blackouts
3. City management systems. attackers utilize system bugs and cause security breaches
4. Cloud and SaaS solutions. Cybercriminals or cyberterrorists target city servers and cloud infrastructure to launch distributed denial of service
(DDoS) attacks
5. Smart power and water grid. Attackers can devastate smart grid and water, resulting in losses of business and lives
6. Public transportation. manipulating the transportation information systems affects peoples behavior and might cause overcrowding
7. Surveillance cameras. Targeted by denial of service (DoS) attacks can make the city blind
8. Location-based services. As these services depend on location, by performing GPS spoong, an attacker can manipulate the location
information
The Value of Intelligent Cybersecurity 441
obtain tangible and innovative results. For this very reason,
Dubai needs to develop a workforce that is highly skilled,
well versed, and has the ability to protect the city by making
highly strategic plans, as this will play a pivotal role in
making Dubai a Smart City in the world.
11 Smart Laws for Dubai Smart
Sustainable City
To continue their success, Smart Cities need to develop
effective Cyber Smart policies and regulations. These poli-
cies should be developed in such a manner that will assist in
enhancing the level of Cyber Security of highly critical
technology infrastructures of smart buildings or institutions.
Typically, Smart Cities depend strongly on interconnected
infrastructures to boost the overall economy. An extraordi-
nary amount of data is the fuel for Smart Cities, and such
data is currently at greater risk owing to increased cyberat-
tacks. Nevertheless, smart and effective policies will protect
big data because smart policies and practices have the
potential to restrain industrial espionage while strengthening
the protection of intellectual property. To make this possible,
increased foreign direct investment is the best approach
because organizations operating internationally will gradu-
ally move to and expand in countries that provide absolute
protection of their intellectual property. This will promote
inventiveness and attempts to nd new approaches to over-
come cyberthreats.
The government of the United Arab Emirates must ensure
that strict laws are made for controlling how IoT devices
(such as Smartphones, home security networks, and home
devices including televisions and refrigerators) are manu-
factured. This will lower instances of insecurity or data theft
within the Smart City networks. Furthermore, Smart Cities
worldwide should employ the following recommendations:
Public-private partners should unite to bring leverage in
improving Smart City Cyber Security. This would
address both current and emerging technological threats.
Regulators and policy makers should attempt to address
economic barriers of different infrastructures to achieve a
secure cyberspace.
Politicians (members of Parliament) should always pri-
oritize research and development toward improving
Smart City Cyber Security.
Global supply chains (social, economic, and political)
can only be secured by adopting practices and other
global standards.
12 Sustainability of Dubai Smart City
as a City of the Future
The core question throughout the study was the ability of
Cyber Security strategies to ensure the sustainability and
growth of Dubai Smart City as a city of the future. However,
the survey results and literature analyzed proved that the ve
domains of the Cyber Security strategy (innovation, Cyber
Smart nation, national and international collaboration, cyber
resilience, and cyber security) can ensure that the UAE
cyberspace will be safe, secure, and free for all. Furthermore,
it is evident that Smart Cities create huge and complex attack
surfaces where hackers can easily access usersinformation.
The longer the computer integration network, the wider the
gaps that hackers can use to access this unauthorized
information [67]. A cross-examination of participants in the
Smart City Cyber Security survey tested negative in terms of
their knowledge and understanding of the Cyber-Security-
related Smart City. This is an indication that individuals are
not concerned about Cyber Security issues. The increased
dispersion of personal information in public spaces can
eventually result in cyberattacks against their Smart City.
The overall outcome of the study is that over 80% of
individuals in the region are aware of cyberattacks and
cyber-related issues. However, they still fear that their Smart
City is vulnerable to cybercrimes and attacks. For that rea-
son, Dubai Smart Ofces must launch campaigns to educate
society on how to ensure their safety while using IoT devices
such as Smart Televisions, computers, laptops, Smartphones,
and other home appliances such as music systems and
security locks. Nevertheless, there is an assurance that the
Cyber Security strategy will be effective in ensuring the
security and protection of Dubai Smart City users.
The military has a role to play to ensure the security of
their land by collaborating with international-community
military forces to ensure peace and stability. The president of
Dubai showcased the importance of having an intelligent
Cyber Security strategy, which can be used in ghting future
criminal and terrorism activities that might occur through the
technology in Dubais Smart City [68]. In addition, military
personnel may be used for teaching people how to handle
technological devices and how to detect that a system has
been hacked or fed malicious data. In so doing, peace and
stability will be achieved within Smart Cities. Additionally,
future work should focus on how individual data may be
protected from leaking from Smart City technologies into
hackershands. It is necessary to showcase the most effec-
tive way of teaching the grassroots population about Cyber
Security.
442 K. A. J. A. AlZaabi
Increasing the number of devices into a network courtesy
of the IoT increases the chances of hackers inltrating the
networks and attacking unsuspecting Smart City users. For
that reason, future research should focus on controls that
should be placed to ensure that individuals using IoT devices
such as Smartphones are not exposed to hacking or data
phishing.
In conclusion, the leadership of His Highness Sheikh
Mohammed bin Rashid Al Maktoum will not only help
Dubai to become a smart city but also work in creating a
massive number of technological experts through the train-
ing programs launched by the Smart Dubai ofce. Addi-
tionally, access to services will become effective and
affordable to both visitors and residents in Dubai. Therefore,
the smart city development project is a sustainable project
that will transform the quality of life of people in the UAE
region.
References
1. Curry, D., Cate, L., Donal, P., Kristina, H.: Are Happier Citizens
Making Singapore a Smart City Leader?. Readwrite, SmartNation
Singapore. http://readwrite.com/2016/09/12/pragmatism-keeps-
singapore-global-smart-city-leader-cl4/.6. Accessed 14 Sept 2017
(2016)
2. Smart Nation SingaporeForbes. http://www.smartnation-forbes.
com/. Accessed 14 Sept 2017
3. Baharash Architecture: How Dubai is Becoming a Smart City.
Baharash Architecture. Retrieved 11 Nov 2017, from http://www.
baharash.com/dubai-smart-city/
4. Cerrudo, C.: An Emerging US (and World) Threat: Cities Wide
Open to Cyber Attacks. IOActive Labs, 2015. http://www.ioactive.
com/labs/resources-white-papers.html. Accessed 14 Sept 2017
5. ICUD: Smart Cities Cyber Security (SCCS). ICUD Laboratory for
Contemporary Urban Design. http://lcud.tau.ac.il/project/2016smart-
cities-cyber-security-sccs/. Accessed 14 Sept 2017 (2016)
6. Perlroth, N.: Smart City Technology may be Vulnerable to
Hackers. Bits (blog). 21 Apr 2015. http://bits.blogs.nytimes.com/
2015/04/21/smart-city-technology-may-be-vulnerable-to-hackers/?
_r=1. Accessed 14 Sep 2017
7. Venkataramanan, M.: 2016. Smart Cities will be Necessary For
Our Survival. Wired UK. http://www.wired.co.uk/article/smart-
city-planning-permission. Accessed 14 Sept 2017
8. Innovation Enterprise: 2016. Smart Cities Innovation Summit,
Singapore. The Innovation Enterprise. https://theinnovationenterprise.
com/summits/smart-cities-singapore-2017. Accessed 14 Sept 2017
9. Konomi, S., Roussos, G.: Enriching Urban Spaces with Ambient
Computing, the Internet of Things, and Smart City Design.
Engineering Science Reference, Hershey (2016)
10. AlDairi, A., Loai, T.: Cyber security attacks on smart cities and
associated mobile technologies. Procedia Comput. Sci. 109, 1086
1091 (2017)
11. Joshi, S., Saxena, S., Godbole, T., Shreya: Developing smart
cities: an integrated framework. Procedia Comput. Sci. 93, 902
909 (2016)
12. Repko, J., DeBroux, S.: Smart Cities Literature Review and
Analysis. Last modied 2012. https://www.researchgate.net/
publication/236685572_Smart_Cities_Literature_Review_and_
Analysis. Accessed 30 Oct 2017
13. Biswas, K., Muthukkumarasamy, V.: Securing smart cities using
blockchain technology. In: 2016 IEEE 18th International Confer-
ence on High Performance Computing and Communications; IEEE
14th International Conference on Smart City; IEEE 2nd Interna-
tional Conference on Data Science and Systems (HPCC/
SmartCity/DSS) (2016)
14. Gil-Garcia, J.R., et al. (eds.): Smarter as the New Urban Agenda a
Comprehensive View of the 21st Century City. Public Adminis-
tration and Information Technology 11. https://doi.org/10.1007/
978-3-319-17620-8_2
15. Baig, Z.A., Szewczyk, P., Valli, C., Rabadia, P., Hannay, P.,
Chernyshev, M., Johnstone, M., et al.: Future challenges for smart
cities: cyber-security and digital forensics. Digit. Invest. 22,313
(2017)
16. Popescul, D., Radu, D.L.: Data security in smart cities: challenges
and solutions. Informatica Economica 20(1), 2938 (2016)
17. Gaurav, S.: Developing smart cities using internet of things: an
empirical study. In: IEEE Conference Publication, Ieeexplore.Ieee.
org, last modied 2016. http://ieeexplore.ieee.org/document/
7724278/authors. Accessed 30 Oct 2017
18. Efthymiopoulos, M.P.: Cyber-security in smart cities: the case of
Dubai. J. Innov. Entrep. 5, 11 (2016). https://doi.org/10.1186/
s13731-016-0036-x
19. Khaleejtimes: Dubai Tops Middle Easts Smart City List. Khalee-
jtimes.com. Retrieved 11 Nov 2017, from https://www.khaleejtimes.
com/technology/dubai-tops-middle-easts-smart-city-list
20. Vinod Kumar, T.M.: E-Governance for Smart Cities. Springer,
Singapore (2015)
21. Zaatari, S.: Dubai Smart City Achieving Targets. Gulfnews. http://
gulfnews.com/news/uae/government/dubai-smart-city-achieving-
targets-1.1975240. Accessed 14 Sept 2017
22. Psemagazine: Building the Smart City. Public Sector Excellence
Magazine- UAE. Psemagazine.com. Retrieved 11 Nov 2017, from
http://psemagazine.com/building-the-smart-city/
23. UAE Government: Smart City Dubai. Government Portal. https://
government.ae/en/about-the-uae/the-uae-government/smart-uae/
smart-dubai. Accessed 14 Sept 2017
24. Bernd, D.: A Smart City For Happy Citizens. Khaleejtimes.Com,
last modied 2017. https://www.khaleejtimes.com/news/uae-
health/a-smart-city-for-happy-citizens. Accessed 30 Oct 2017
25. Government: Dubai Cyber Security Strategy. Dubai.Ae. Last
modied 2017. http://www.dubai.ae/en/Pages/DCSS.aspx. Accessed
30 Oct 2017
26. Al Tayer, M.: Sustainable Transportation and Smart Cities, the
Dubai Model. Gulfnews. Last modied 2016. http://gulfnews.com/
opinion/thinkers/sustainable-transportation-and-smart-cities-the-
dubai-model-1.1911556. Accessed 30 Oct 2017
27. Arabian Business: Dubai Launches New Cyber Security Strategy as
Threats Rise. Arabianbusiness.Com. http://www.arabianbusiness.
com/dubai-launches-new-cyber-security-strategy-as-threats-rise-
676338.html. Accessed 14 Sept 2017
28. Kwang, T.W.: A Look into Dubais Smart City Initiatives.
Enterprise Innovation. Asias Premier Business and Technology
Publication. https://www.enterpriseinnovation.net/article/look-
dubais-smart-city-initiatives-1141254266. Accessed 14 Sept 2017
29. Emirates Scientists Council: MBRASMohammed Bin Rashid
Academy of Scientists. Sc.gov.ae. Retrieved 11 Nov 2017, from
http://www.sc.gov.ae/mbras-en
30. DT News: Dubai Cyber Security Strategy. News of Bahrain. http://
www.newsofbahrain.com/viewNews.php?ppId=34720&TYPE=
Posts&pid=21&MNU=2&SUB=50. Accessed 14 Sept 2017
31. Jaffe, E.: What Smart Cities Can Learn From SingaporeS Smart
NationSidewalk Talk. Medium. https://medium.com/sidewalk-
talk/what-smart-cities-can-learn-from-singapore-s-smart-nation-
e19a7efefa3a#.p05f1u4x4. Accessed 14 Sept 2017
The Value of Intelligent Cybersecurity 443
32. Middle East Insurance Review: UAE: Dubai Launches Cyber
Security Strategy. Middle East Insurance Review. http://www.
meinsurancereview.com/News/View-NewsLetter-Article?id=39334
&Type=MiddleEast. Accessed 14 Sept 2017
33. Al-Awsat, A.: Dubai Launches Cyber Security Strategy
ASHARQ AL-AWSAT English. ASHARQ AL-AWSAT English.
https://english.aawsat.com/theaawsat/news-middle-east/dubai-
launches-cyber-security-strategy. Accessed 14 Sept 2017
34. Smart Dubai, (c).: Smart Dubai. Smartdubai.Ae. Last modied
2017. http://www.smartdubai.ae/foundation_dimensions.php.
Accessed 30 Oct 2017
35. Tripwire: Tripwire 2016 Smart Cities SurveyCyber Risks.
Tripwire. Last modied 2016. http://www.tripwire.com/company/
research/tripwire-2016-smart-cities-survey-cyber-risks/. Accessed
14 Sept 2017
36. Ministry of Infrastructure Development: Dubai at the Forefront of
Smart City Technology Adoption. Smartcitiesdubai.Com. http://
www.smartcitiesdubai.com/news-detail:a293efdb-ff61-75dd-a80b-
59267fdb72ca.html. Accessed 14 Sept 2017
37. Smart Dubai: Smart Dubai- Dubai Blockchain Strategy. Smart-
dubai.ae. Retrieved 11 Nov 2017, from http://www.smartdubai.ae/
dubai_blockchain.php
38. Smart Dubai: Smart Dubai- Dubai Seeks to Distinguish Itself as
the Global Leader Delivering Smart Economy and Smart Living
opportunities for all. Smartdubai.ae. Retrieved 11 Nov 2017, from
http://www.smartdubai.ae/foundation_dimensions.php
39. Kumar, N., Kumbhat, S.: Essentials in Nanoscience and Nan-
otechnology. Wiley, Hoboken, New Jersey (2016)
40. Smart Dubai. Smart Dubai- Smart Dubai Launches its Development
Roadmap for Articial Intelligence. Smartdubai.ae. Retrieved 11
Nov 2017, from http://www.smartdubai.ae/story0328.php
41. Slingerland, J.: Nanotechnology. Essential Library, an imprint of
Abdo Publishing, Minneapolis, Minnesota (2016)
42. Berger, M. Nanotechnology: the future is Tiny. Cambridge, Royal
Society of Chemistry
43. Expotrade: Dubai Smart City Initiatives. Smartcitiesdubai.Com.
http://www.smartcitiesdubai.com/dubai-smart-city-initiative.html.
Accessed 14 Sept 2017
44. Visitdubai: Smart CityDubai into a Smart Future. Visitdubai.-
com. Retrieved 11 Nov 2017, from https://www.visitdubai.com/
en/articles/smart-city
45. Ramachandran, R.: Evolution of a Wholesome Smart City: Dubai
2.0. Linkedin.com. Retrieved 11 Nov 2017, from https://www.
linkedin.com/pulse/evolution-wholesome-smart-city-dubai-20-
radhika-ramachandran/
46. Cerrudo, C., Hasbini, A., Russell, B.: Cyber Security Guidelines
for Smart City Technology Adoption. Cloud Security Alliance
47. Gsma: Smart Cities Overview Resources. Internet of Things,
Internet of Things, last modied 2017. https://www.gsma.com/iot/
smart-cities-overview-resources/. Accessed 30 Oct 2017
48. Man, J.: Cybersecurity is About Attitude, Culturenot Strictly
Compliance. Wired. https://www.wired.com/insights/2014/04/
cybersecurity-attitude-culture-strictly-compliance/. Accessed 14
Sept 2017
49. Song, H., Zhang, D., Jara, A., Wan, J., Boussetta, K.: IEEE Access
Special Section Editorial: Smart Cities. IEEE Access 4
50. Mylrea, M.: CO15214 Singapores Smart City: Securing it from
Emerging Cyber Threats. RSIS. Last modied. https://www.rsis.
edu.sg/rsis-publication/rsis/co15214-singapores-smart-city-securing-
it-from-emerging-cyber-threats/#.V_qr4KO9pjo. Accessed 14
Sept 2017
51. Popescul, D., Radu, LD.: Data security in smart cities: challenges
and solutions. Informatica Economica 20(1), 2938 (2016)
52. VisitDubai: Smart CityDubai into a Smart Future. Visitdubai.
Com, last modied 2017. https://www.visitdubai.com/en/articles/
smart-city. Accessed 30 Oct 2017
53. Obaidat, M.S., Nicopolitidis, P.: Smart Cities and Homes: Key
Enabling Technologies. Morgan Kaufmann is an imprint of
Elsevier, Cambridge, MA (2016)
54. Purnell, J.: Singapore is Taking the Smart Cityto a Whole New
Level. WSJ. http://www.wsj.com/articles/singapore-is-taking-the-
smart-city-to-a-whole-new-level-1461550026. Accessed 14 Sept
2017
55. Tan, A., Van, A.: Singapore Smart Guide. APA Publications,
Singapore (2013)
56. IEEE International Symposium on Broadband Multimedia Sys-
tems and Broadcasting: Broadband multimedia systems and
broadcasting (BMSB). In: 2015 IEEE International Symposium
on 1719 June 2015
57. Calder, K.E.: Singapore: Smart City, Smart State. Brookings
Institution Press, Washington, D.C. (2016)
58. Flick, T., Morehouse, J.: Securing the Smart Grid: Next Gener-
ation Power Grid Security. Elsevier (2010)
59. Strohbach, M., Ziekow, H., Gazis, V., Akiva, N.: Towards a big
data analytics framework for IoT and smart city applications. In:
Modeling and Processing for Next-Generation Big-Data Tech-
nologies, pp. 257282. Springer International Publishing
60. Wang, L., Shiyan, H., Betis, G., Ranjan, R.: A computing
perspective on smart city [guest editorial]. IEEE Trans. Comput.
65(5), 13371338 (2016)
61. UNODC: Computer Misuse and Cybersecurity Act. Unodc.Org.
https://www.unodc.org/res/cld/document/computer-misuse-and-
cybersecurity_act_html/2014_COMPUTER_MISUSE_AND_
CYBERSECURITY_ACT.pdf. Accessed 14 Sept 2017
62. Shrivastava, S.: Rushing attack and its prevention techniques. Int.
J. Appl. Innov. Eng. Manage. 2(4), 453456
63. Nigam, N., Sharma, V.: A comprehension on wormhole attack
prevention technique using THREADS in MANET. Int. Inventy:
Int. J. Eng. Sci. 2(10), 1417 (2013)
64. UrbanTide: Overview of the Smart Cities Maturity Model. Urban
Tide. Last modied 2017. https://static1.squarespace.com/
static/5527ba84e4b09a3d0e89e14d/t/55aebffce4b0f8960472ef49/
1437515772651/UT_Smart_Model_FINAL.pdf. Accessed 30 Oct
2017
65. Manville, C., et al.: Mapping Smart Cities in the EU. Last modied
2014. http://www.europarl.europa.eu/RegData/etudes/etudes/join/
2014/507480/IPOL-ITRE_ET(2014)507480_EN.pdf. Accessed
30 Oct 2017
66. Purnell, J.: Singapore is Taking the Smart Cityto a Whole new
Level. WSJ. 14 Accessed Sept 2017
67. Peters, S.: Smart Cities4 Biggest Security Challenges. Dark
Reading. http://www.darkreading.com/vulnerabilitiesthreats/
smart-cities-4-biggest-security-challenges/d/d-id/1321121. Accessed
14 Sept 2017
68. Huiwen, N.G.: Cybercrime Threat a Big Challenge for Singapore:
President Tony Tan. The Straits Times. http://www.straitstimes.
com/singapore/courts-crime/cybercrime-threat-a-big-challenge-for-
singapore-president-tony-tan. Accessed 14 Sept. 2017
69. Frost and Sullivan.: Global Smart City Market A $1.5 Trillion
Market Opportunity by 2020. Retrieved September 14, 2017, from
https://www.slideshare.net/FrostandSullivan/global-smart-city-
market-a-15-trillion-market-opportunity-by-2020. (2013)
70. SmartCitiesWorld news team.: Smart cities services worth $225bn
by 2026. Retrieved September 14, 2017, from https://www.
smartcitiesworld.net/news/news/smart-cities-services-worth-225bn-
by-2026-1618. (2017)
444 K. A. J. A. AlZaabi
71. Baharash Architecture.: How Dubai is becoming a smart city.
Baharash Architecture. Retrieved 11 November 2017, from
http://www.baharash.com/dubai-smart-city/. (2017)
72. Haidine A, El Hassani S, Aqqal A and El Hannani A (n.d.). doi:
https://doi.org/10.5772/64611 Chapter 4 The Role of Communi-
cation Technologies in Building Future Smart Cities
73. Diana F.: Articial Intelligence Intersects with Mobile and Cloud.
Retrieved September 14, 2017, from https://frankdiana.net/2016/
08/10/articial-intelligence-intersects-with-mobile-and-cloud/. (2016)
74. IBM.: Infographic - Smarter Cities: Turning Big Data into Insight.
Retrieved September 14, 2017, from https://www-03.ibm.com/
press/us/en/photo/42063.wss. (2013)
75. Aggarwal A.: Five challenges to overcome for Smart Cities to
happen. Retrieved September 14, 2017, from http://maximum
governance.com/perspectives/ve-challenges-to-overcome-for-
smart-cities-to-happen/. (2016)
The Value of Intelligent Cybersecurity 445
User and Item Preference Learning
for Hybrid Recommendation Systems
Kaavya Prakash , Fayiz Asad , and Siddhaling Urolagin
Abstract
With the abundance of items, features, services and
products available on the web, it becomes quite tedious to
sort through and nd what is desired. A recommendation
system, therefore, provides a solution for this by only
retrieving desired information from relevant data sets.
A similarity metric is applied on the retrieved data and
recommendations are made based on the predicted
similarity. Typically, there are three major recommenda-
tion methodscollaborative, content-based and hybrid.
Collaborative (user-based) works on the premise that
similar users are bound to like the same items. Whereas,
content-based (item-based) ltering tries to recommend
items that are similar to the ones the user has liked
previously. While functioning independently, the above
two methods have certain aws. Content-based systems
cannot make predictions outside of the users content
prole and collaborative systems cannot make recom-
mendations for cold start problems. To alleviate these
issues, we seek to combine these two methods into a
hybrid recommender system. Hybrid recommender, as the
name suggests, is a segmented approach to recommen-
dation where each segment consists of either the collab-
orative or content-based model. In this paper, we propose
meta-level cum switching hybrid model that incorporates
the dual hybridization techniques into the above men-
tioned hybrid model. The type of hybridization method
applied depends on the ability of each individual model to
generate results. I.e. In situations where both the individ-
ual segments can generate results, the meta-level
hybridization is used. Whereas, in a situation where any
of the individual methods are unable to provide a result,
the switching hybridization is enabled to shift to the
method that is able to function in that scenario.
Keywords
Recommender systems Collaborative ltering
Content-based ltering Hybrid recommender
Pearsons coefcient Meta-level hybridization
Switching hybridization Cosine similarity
1 Introduction
Since the number of items in any online database is large, the
process of nding items we like may prove to be tedious.
A recommendation system assists the user to nd items
he/she may like by monitoring the users preferences and
makes valuable suggestions. This system has been incor-
porated in most devices and platforms and is designed to
optimize a consumers choice. Most recommender algo-
rithms follow a two-step procedure. The rst step is to gather
data on various users and items (information retrieval [1])
and the second is to interpret the data so as to make valuable
recommendations (data mining [2]). There are three main
types of recommendation approachescollaborative,
contentbased and hybrid. Collaborative ltering [3] is based
on the collective intelligence of the entire user base, focusing
on whorather than what. Predictions are made by taking
into account the users choices in the past and by its
resemblance to other users. A similarity metric is calculated
between each user pair. The users with the highest similarity
metric to the given user will make up his/her neighborhood
[4] and the recommendations will reect on their collective
preferences. Content-based [5] focuses on the user prefer-
ence [6] of items and recommends similar items based on
user-item similarity. It focuses on the understanding of the
K. Prakash (&)F. Asad S. Urolagin
Department of Computer Science, Birla Institute of Technology
and Science, Pilani, Dubai, UAE
e-mail: kaavyapraksh@gmail.com
F. Asad
e-mail: fayizasad@gmail.com
S. Urolagin
e-mail: siddhaling@dubai.bits-pilani.ac.in
©Springer Nature Switzerland AG 2019
A. Al-Masri and K. Curran (eds.), Smart Technologies and Innovation for a Sustainable Future,
Advances in Science, Technology & Innovation, https://doi.org/10.1007/978-3-030-01659-3_50
447
product itself instead of collective user preferences. An
important element in making predictions is learning the user
model. The user model contains information about the user,
such as purchase history, product reviews etc., and a user
prole [7] is generated using this information. An item
prole [8], like a user prole consists of item information
such as color, type, category etc. A similarity function cal-
culates the extent of similarity between a user and item
prole. If the similarity is high, it makes for a good rec-
ommendation. Hybrid recommender, as the name suggests,
is a segmented approach to recommendation where each
segment consists of either the collaborative or content-based
model. These individual segments can be combined using
any of the following techniquesweighted [9], switching
[10], mixed [11], feature combination [12], feature aug-
mentation [13], cascade [14] and meta-level [15]. Such
systems have been introduced to alleviate some of the
specic problems of single recommendation paradigm
approach. For instance, a purely collaborative system suffers
from the cold start problem for new users. Similarly, items
outside a users content prole will not be recommended in a
content-based system. Hence, a hybrid system, which has the
potential to provide synergies, is utilized to produce efcient
results.
Therefore, we propose a novel idea for a meta-level cum
switching hybrid recommender model that incorporates both
collaborative and content-based abilities into a single sys-
tem. The collaborative model contributes ratings (both actual
and predicted) and the content-based model makes the rec-
ommendations. Meta level hybridization lets us use the
model generated by the collaborative ltering as input for the
content-based system. When the recommender is unable to
function due to the shortcomings of one model, the
switching method is implemented. In this situation, the
segment unable to perform is ignored and the other segment
is executed. For instance, if the collaborative system is
unable to make a single prediction, that segment is ignored
and the hybrid model switches to a purely content-based
system. To optimize the proposed model further, the nor-
malized user ratings [16] is calculated prior to run time.
Similarly, the Pearsons coefcient [17] (used during col-
laborative ltering) for every user or item pair can be
computed as new users are added into the system. The
proposed hybrid model aims to optimize the working and
make more accurate recommendations. In this paper, we
discuss the method of similarity computation in Sect. 2and
collaborative and content-based models are discussed in
Sects. 3and 4. The proposed approach for our novel method
is explained in Sects. 5. In Sect. 6, experimental results are
given and Sect. 7covers the conclusion.
2 Calculating Similarity
Personalized recommendations rely heavily on nding a
preference model of a given user. The similarity metric [18]
can be used to capture the intuition on how similar or
dissimilar the users are to one another. While there are
various approaches to calculating similarity such as Jac-
cards similarity [19], Cosine similarity [20] etc. (e.g. [5,7,
8,19,20]), we here briey review the Centered Cosine
similarity approach or Pearsons correlation as given in (1),
which will be extended towards the remainder of this paper.
qX;Y¼cov X;YðÞ
rXrY
ð1Þ
When Pearsons correlation coefcient is applied to a
population it is commonly represented by qand thus
it is known as population correlation coefcient. The
population correlation coefcient uses rxand ryas the
population standard deviations and cov X;YðÞas the popu-
lation covariance. Pearsons correlation coefcient can also
be applied to datasets. For instance, consider one dataset {x
1
,
,x
n
} containing nvalues and another dataset {y
1
,,y
n
}
containing nvalues, then Pearsons correlation coefcient
(denoted by r) is given in (2).
r¼rxy ¼nRxiyiRxiRyi
ffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffi
nRx2
iRxi
ðÞ
2
q ffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffi
nRy2
iRyi
ðÞ
2
qð2Þ
3 Collaborative Filtering
The idea behind collaborative ltering is using the collabo-
rative preferences of a group to make recommendations to
any other user. This group may consist of either users or
items. The key aspect in collaborative ltering is to nd a set
of users similar to another user needing recommendations.
Assume that the user needing recommendation is X. The
similarities between users are calculated after comparing
their individual rating vectors, i.e. for a movie recommender,
the group of similar users would ideally be the ones who like
and dislike the same movies as user X. This group is referred
to as the neighborhood Nof X. The recommendations made
to user Xis based on the preferences of Xs neighborhood.
Collaborative ltering method is purely based on past
behavior, not the context and hence it does not require any
additional information. Thus this method can be used any-
where from e-commerce to retail outlets [4]. There are two
types of collaborative ltering algorithms: User-User [21]
448 K. Prakash et al.
and Item-Item [4]. The user-user collaborative ltering
approach makes rating predictions based on user pair simi-
larity i.e. it makes recommendations based on what the
users neighborhood have collectively liked in the past.
Whereas, item-item recommendation depends on how sim-
ilar the item is to the userspast preferences.
A user-item matrix (3) is created based on the users
purchased items, reviews and ratings as shown in Fig. 1.
Since no user could have rated all the items, rating prediction
becomes necessary to make future recommendations. The
rating that user Xwould give item Iis solely based on the k
Nearest Neighbors (kNN) [4]ofXI. The neighborhood
model (Fig. 1) comprises of the kNN of user Xand every
item. The most preferred items from the neighborhood
model is recommended to User X.
R¼
R1;1 R1;n
.
.
.
.
.
.
.
.
.
Rm;1 Rm;n
2
6
43
7
5ð3Þ
4 Content-Based Filtering
Content-based recommender system suggests items to a
customer that are similar to previous items rated highly by
the same customer. Rather than user-user similarity, it
focuses on user-item similarity to make recommendations.
For each item, an item prole is created as shown in Fig. 2,
which is later used to build user proles. The item prole
comprises of a set of features about the item such as title,
author, actor, director for movies, metadata and tags for
video and images etc. Each item prole can be envisioned as
a boolean or real valued vector. In the case of movies the
item prole is a boolean vector consisting of 0, 1 for each
actor, director etc. depending on whether that actor or
director participated in that movie. Once the item proles are
created the next task is to create a user prole. For instance,
take a user who has rated items i
1
through i
n
, where r
1
through r
n
are the rating vectors, the simplest way to con-
struct a user prole from a set of item proles is to average
the weighted item proles [17].
Uxi ¼RiGxð4Þ
In the above formula (4), the User prole for user iand
feature xis given by the dot product of the rating vector of
user igiven by Riand the feature vector of xdenoted by Gx.
A variant of this is to normalize the rating as well as the
feature matrix. Normalizing ratings helps to capture the idea
that some ratings are actually negative and some are posi-
tive. But the baseline is that users are very different from
each other. Some users are generous in their ratings while
others are very critical. So for one user a 4/5 might be a
widely positive rating whereas for another user it may be an
average rating. In order to accommodate this, it is required to
baseline each users rating by their average rating and then
subtract the average rating from each of the individual rat-
ings. Once this normalization has been done, the prole
weights can be computed. Recommendations rely on both
user and item proles. Each user prole is compared to
individual item proles to calculate their similarity. Both the
user and item prole are vectors in a high dimensional space
and a good similarity metric between the pair of vectors is
the angle between them. The angle can be estimated using
the cosine similarity (5). This distance, U, is the cosine
similarity between the user Xand the item I. As the angle
decreases, Xand Iare more and more similar to each other
and its more likely that Xwill give a higher rating to item
I. Predictions can now be made by selecting the items with
the highest cosine similarity. These items are recommended
to the user.
Fig. 1 Collaborative ltering model
User and Item Preference Learning 449
Ux;iðÞ¼cosh¼xi
x
jj
i
jj ð5Þ
5 Proposed Hybrid Recommendation Model
In this paper we propose a novel hybrid recommender model
that incorporates both collaborative and content-based abil-
ities into a single system. In addition to combining the two
recommendation methods, our system also optimizes the
results by incorporating dual hybridization techniques. The
two techniques we are incorporating aremeta-level and
switching. The meta-level technique seeks to input the result
obtained by collaborative ltering into the content-based
system to get a more rened recommendation set. If it so
happens that either collaborative or content-based models
cannot generate recommendation scores, the meta-level
technique is abandoned and the hybrid model follows the
switching technique (Fig. 3). The switching technique
decides between the usages of either collaborative or
content-based system based on a certain condition. This
decision is made on the basis of data availability i.e. during a
cold start, it functions as a content-based recommender and
during item prole unavailability, collaborative recom-
mender is utilized. Our novel hybrid design (Fig. 3) follows
a 2 step procedure where collaborative ltering is rst used
to predict the unknown ratings of a user, which (along with
his actual ratings) are sent as input into the content-based
system. The content-based system utilizes this input to
construct a stronger user prole and make better recom-
mendations. The ratings are calculated for one user at a time
and only his/her ratings (both actual and predicted) are sent
into the content-based system. Since we are using user-user
collaborative ltering, all user-pair similarities are calculated
using Pearsons coefcient (2). The normalized rating
matrix, used for calculating Pearsons coefcient, is obtained
using (6).
Rij ¼Rij Pn
j¼0Rij
ti
"# ð6Þ
R
ij
denotes the rating given by user ifor movie j, m and
nare the number of users and movies respectively and t
i
is
the number of rated movies by user i. Pearsons coefcient
values for each user-pair ranges between 1 and 1, where
negative Pearsons value denotes dissimilarity and positive
Pearsons value denotes similarity. The magnitude of the
Pearsons coefcient is used to quantify the extent of simi-
larity or dissimilarity. The resulting similarity metric is used
to nd the neighborhood Nof User X-Item I. Each user-item
pair has a neighborhood of users who have rated that item
and whose likes and dislikes are a close match to that user.
The collaborative preferences of these users are used to
predict the ratings of user X. The neighborhood can consist
of any number of users and only depends the size of the data
set. After calculating the neighborhood of X, we can begin to
predict the ratings of X. Rating prediction is necessary since
no user would have rated all movies. The rating matrix will
therefore have many empty spaces. Predicting the rating of
user Xfor item Iis possible if and only if all the users is Xs
neighborhood have rated that item. Predicted similarity
XIis equal to the dot product of all the ratings for Iin
XIsneighborhood with their respective Pearsons coef-
cient divided by the summation of all Pearsons coefcient
of the entire neighborhood.
Rx¼Pn
i¼1uiri
Pn
i¼1ri
ð7Þ
Fig. 2 Content-based ltering model
450 K. Prakash et al.
In the above Eq. (7), nis the number of users in the
neighborhood, u
i
is the rating of user iand r
i
is the Pearsons
coefcient for user i. Using this, almost all missing ratings of
user Xcan be predicted as long as his/her neighborhood has
rated that item. The collaborative ltering algorithm requires
the calculation of similarity metric of each user-pair, which
is time consuming and inefcient if done and run time. Thus
to increase the efciency of our program, we pre calculate
the average rating of each user as the ratings are entered.
This ensures that not all calculations are done at runtime.
The results from the collaborative ltering algorithm is
passed into the content-based recommender which utilizes
the ratings of user Xto calculate his/her user prole. The dot
product of the user prole with each item prole gives the
percentile preference. The similarity of user prole and item
prole is also calculated using cosine similarity. Content-
based ltering requires the creation of item proles. For our
movie recommender system, each movie is classied into
different genres. Movies may belong to more than one genre,
and item proles are generated for each movie based on the
genres they belong to. The item-genre matrix is simply a
boolean matrix where 1 denotes the presence of that genre in
the movie and 0 denotes its absence. Item proles are created
on normalized data which is obtained after dividing each
entry by the square root of the total number of attributes in
that row (8).
Iij ¼item profile entry for item iand attribute j
ffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffi
total number of attributes of item iðÞ
pð8Þ
The user proles are calculated only for the user needing
recommendations. This ensures that unwanted computations
dont take place. Just like item proles, the user proles are
calculated for different genres. To generate the user prole
for user X, we take the dot product of that users ratings with
each individual genre column. The user prole includes the
prole of all item attributes, i.e. all genres. Following the
creation of user and item proles we compare each user
prole to individual item proles and calculate their simi-
larity using cosine similarity. If a user prole and item
prole have a high similarity, we can infer that it would be a
good recommendation. The similarity is calculated for every
user-item pair. The items with the highest similarity metric
make up the recommendation list. This implies that the
smaller the distance between the two proles, the larger their
similarity. Calculation of similarity for User Xand mitem
proles is shown in (9).
cos h¼X
m
j¼1
UxIj
Ux
jj
Ij
ð9Þ
The value of similarity is calculated as cosh. As the angle
hdecreases, Xand Iare more and more similar to one other.
This implies that similarity is directly proportional to cosh.
The similarity of all the other user-item combinations are
calculated. The recommendations reect the ones with the
highest similarity metric. The recommendations should only
include the items the user has not yet rated or purchased. We
need to thus verify that our list of recommendations doesnt
have any redundant data. The recommended list is therefore
compared with the original rating matrix. If it so happens
that the user has already rated or purchased one of the items
in the recommended list, that item is replaced with the item
having the next highest similarity metric. This is done until
all the recommendations in the set are veried.
Fig. 3 Meta-level cum switching hybrid recommendation model
User and Item Preference Learning 451
6 Experimental Results
MovieLens [22] is an online database that provides datasets.
It has been collected by the GroupLens Research Project at
the University of Minnesota. It consists of 100,000 ratings
(15) from 943 users on 1682 movies and each user has
rated at least 20 movies. The ml-latest-small dataset contains
attributes of these 1682 movies. There are 17 genres and for
each genre, a value of 1 denotes that the movie belongs to
that genre and 0 otherwise. In this section the efcacy of our
proposed hybrid model is shown on a subset of MovieLens
dataset consisting of 7 users and 6 movies. Given below in
Table 1is the rating matrix computed from the dataset.
Since user preference is an emotional and psychological
aspect, it may so happen that each rating given by a user
could have a slightly more or less signicance when com-
pared to another users ratings. In such cases, it becomes
customary to normalize the data (Table 2) before proceeding
forward. This helps remove the demographic of lenient and
strict raters.
In the above matrix, 0 corresponds to neither liking nor
disliking a movie whereas anything positive implies like and
anything negative implies dislike. The magnitude of the
ratings signies how much a user likes or dislikes a movie.
If, at this stage, the rating prediction is not possible due to
the sparsity of the matrix, the system applies the switching
technique. When the switching technique is applied at this
step, the system ignores the collaborative approach and
continues to the content-based recommender. The content-
based recommender can work with a sparse matrix, thereby
making this an efcient solution. Else, if even one rating can
be predicted, the system continues using the meta-level
technique. Since rating prediction is possible for all
unknown ratings of user 1 in this dataset, our system con-
tinues using meta-level hybridization.
The above Table 3displays the Pearsons coefcients of
users 2 through 7 when calculated with user 1. Pearsons
coefcient is 0 for certain users. It suggests that their ratings
have been constant irrespective of the type of movie or
genre. Thus, these usersinputs become invalid. The next
step is to construct a neighborhood of users for every movie
not rated by user 1 using the kNN algorithm. For our dataset,
we will consider the 2 nearest neighbors. Therefore, the
neighborhood of each unrated movie would consist of two
users most similar to user 1 (who have a positive Pearsons
coefcient when calculated with user 1) who have rated that
movie. Using the Pearsons coefcient from Table 3, the
unknown ratings for user 1 can be predicted as shown in the
rst row of Table 7. For any movie m, this is done by taking
the dot product of the ratings and the Pearsons coefcients
of the 2 nearest neighbors of that movie and dividing it by
the summation of the Pearsons coefcient of the two users
in that neighborhood. Ratings are left unpredicted or mapped
to 0 if the user-movie pair has a neighborhood less than 2
users. The predicted ratings, along with the actual ratings of
user 1 are sent as input into the content-based system.
The item prole matrix/item attribute matrix (Table 4)is
a boolean matrix where every entry corresponds to either a 1
Table 1 Rating matrix Users/movies M1 M2 M3 M4 M5 M6
U1 4 2 1
U2 3425 2
U3 5 1 4
U4 32 414
U5 5 1 5
U6 1 2 2
U7 235
Table 2 Normalized rating
matrix Users/movies M1 M2 M3 M4 M5 M6
U1 1.666666 0 0.33333 0 1.33333 0
U2 0.2 0.8 1.2 0 0 1.2
U3 0 1.666666 0 2.33333 0.666666 0
U4 0.2 0 0 1.2 1.8 1.2
U5 0 0 1.333333 2.66666 0 1.333333
U6 0.66666 0 0.333333 0 0.333333 0
U7 0 1.33333 0 0.33333 0 1.666666
452 K. Prakash et al.
or 0 depending on weather the movie belongs to that genre
or not. We are considering 6 genres namely Adventure, Action,
Romance, Drama, Mythical, Sci-Fi and each move belongs to
at least one of them. As discussed above, normalized values
ensures a much more accurate prediction, the following
Table 5shows the normalized item-prole matrix obtained by
diving each non-zero value by the square root of the row sum.
Table 5shows the normalized matrix. Each row signies
the item-prole for the corresponding movie. User prole for
user 1 is generated for each genre by taking the dot product
of his/her ratings for movies M1 through M6 with the
individual genre columns. To get purely content-based
results, only the actual ratings of user 1 are considered for
calculation and not the predicted ratings. This would be
applied in situations where no predictions can be made using
collaborative ltering and the system changes to the
switching technique. The purely content-based system
results is tabulated in the second row of Table 7. As for the
hybrid system, we combine both the actual and predicted
ratings to get a more thorough user prole (Table 6).
The user prole generated above in Table 6is a vector of
user 1s preferences. Using cosine similarity on both user 1s
prole and all the other movie proles one at a time, we
calculate his/her predictions. The nal results, as shown in
the third row of Table 7, are the predictions using our
Hybrid Recommendation Model which incorporated both
collaborative and content-based methods using meta-level
hybridization.
Table 3 Pearsons coefcient
when compared with user 1 User id U2 U3 U4 U5 U6 U7
Pearsons coefcient when
calculated with user 1
0.017758 0.13977 0.514270 0.06299 0.94491 0
Table 4 Item-attribute table Movie/genre Adventure Action Science ction Drama Romance Mythical
M1 1 1 0 0 0 1
M2 1 1 0 0 0 0
M3 0 1 0 0 0 0
M4 1 1 1 0 0 0
M5 0 0 0 1 1 1
M6 1 0 1 0 0 0
Table 5 Normalized item prole
matrix Movie/genre Adventure Action Science ction Drama Romance Mythical
M1 0.577350 0.577350 0 0 0 0.577350
M2 0.707106 0.707106 0 0 0 0
M3 0 1 0 0 0 0
M4 0.577350 0.577350 0.577350 0 0 0
M5 0 0 0 0.577350 0.577350 0.577350
M6 0.707106 0 0.707106 0 0 0
Table 6 User prole for hybrid
system Genre Adventure Action Science ction Drama Romance Mythical
U1 1.102745 0.083148 1.915928 0.879090 0.879090 0.603481
Table 7 Predicted similarity for
user 1 through collaborative,
content-based and hybrid
recommender
Predicted similarity for
user 1
M1 M2 M3 M4 M5 M6
Collaborative system 4 2.066757 2 4.033378 1 3.933243
Content-based system 0.645668 0.705455 0.394332 0.576002 0.48767 0.42662
Hybrid recommender 0.253563 0.414456 0.01066 0.656559 0.54561 0.811655
User and Item Preference Learning 453
According to the third row of Table 7, the top 3 movie
recommendations for user 1 would be M6, M4, M2. Since
the similarity metric for M6 is high, we can say that the
distance between prole of user 1 and M6 is small. It may so
happen that some of the recommended movies might have
already been watched and rated by the user, therefore these
recommendations become futile. Hence, we need to modify
the recommendation list to only include movies the user has
not yet seen. From the rating matrix (Table 1) we can
observe that user 1 has not watched any of the movies in the
recommended list, hence we can display these recommen-
dations. Comparing the predicted values of collaborative,
content-based and hybrid from Tables 4,7and 8respec-
tively, certain observations can be made. The collaborative
prediction for M2 is 2.066757, which suggests that it is not a
very good recommendation but its content-based score is
rather high at 0.705455. Since both recommendation sys-
tems give varying predictions, it becomes very hard to
decide which result to display. To alleviate this problem, we
use our proposed meta-level hybrid model. Our novel hybrid
model shows that the similarity metric of M2 is rather
average at 0.414456. This therefore lets us recommend better
movies than M2 to the user. Similarly, the collaborative
score for M6 is quite high whereas its content-based pre-
diction is average. When the resulting hybrid model is
observed, M6 has a very high similarity metric. This
emphasizes the fact that the neighborhood of user 1 is much
more versatile than the item prole information. Hence, a
purely content-based system would not have been able to
predict this movie correctly. This way the Hybrid Recom-
mender discovers beyond the narrow view of the
content-based model.
The above Fig. 4is constructed based on Tables 7and 8.
It diagrammatically shows the predicted similarity metric of
all users 1 through 7. Each color represents different users
and their similarities for movies 1 through 6. Similarity
metrics greater than zero denote a positive preference and
ones lesser than zero denotes negative preference. For
instance, it is observed that users 1, 2, 4 and 6 have a
positive preference to M4 whereas the rest have a negative
preference to it. It can also be observed that users 1 and 2
like the movie slightly better than user 4 and substantially
better than user 6. Similarly, if we consider user 1s pref-
erences, it can be noted that he/she likes movies 1, 2, 4 and 6
and dislikes the rest. The magnitude of like and dislike can
also be assessed through Fig. 4. Hence, a good recommen-
dation set for user 1 would be movies 6 and 4 since they
have high similarity. Furthermore, as observed in Fig. 4,no
movie recommendations can be made for user 5 through
meta-level hybrid model (since user 5 has negative prefer-
ence to all movies), hence, we display the recommendations
using the switching technique. Since we already have the
predicted ratings obtained during collaborative ltering, we
can make recommendations based on those predictions. The
two highest rating predictions for user 5 are movies 2 and 5
as observed in the rst row of Table 7and therefore they
would make good recommendations.
7 Conclusion
With the ever increasing number of services and products on
the web, a recommender system is a solution much in
demand that can optimize the options available and push
forward the choices one is looking for from the rest. By
methods of content-based and collaborative ltering we can
have recommendations based on either a users lone pref-
erence for similar items or based on the preferences of other
Table 8 Predicted similarity
through hybrid recommender
system for all users
Users/movies M1 M2 M3 M4 M5 M6
U2 0.497846 0.464373 0.00147 0.439517 0.703833 0.539335
U3 0.43975 0.3841574 0.18637 0.77806 0.182883 0.82114
U4 0.091868 0.3660328 0.094159 0.64425 0.67274 0.722462
U5 0.50576 0.5774956 0.17255 0.89765 0.10271 0.97738
U6 0.45548 0.3072973 0.69508 0.074837 0.26302 0.583155
U7 0.77766 0.851328 0.45691 0.45579 0.082552 0.23515
-1
0
1
M1 M2 M3 M4 M5 M6
SIMILARITY
MOVIE ID
User 1 User 2 User 3 User 4 User 5 User 6 User 7
Fig. 4 Similarity metric representation for all users
454 K. Prakash et al.
similar users, collectively called a neighborhood. While
functioning independently, the above two methods have
certain aws. Content-based systems cannot make predic-
tions outside of the users content prole and collaborative
systems cannot make recommendations for cold start prob-
lems. To alleviate these issues, these two methods are
combined to make a hybrid recommender system.
We proposed a novel idea of a hybrid model that incor-
porates the advantages of both the above algorithms into a
single system. The proposed system is classied as both
meta-level and switching since it alternates between the two
techniques to achieve an optimal functioning model. As
dened in a meta-level system, the collaborative model con-
tributes predictions (if any) which are used by the
content-based model to generate recommendations. If no
input is available, it alternates to the switching model. The
proposed hybrid recommendation system can be used on any
e-commerce website to recommend items to the users. Since it
combines both collaborative and content-based ltering to
provide a single result, it eliminates the need for two indi-
vidual and separate recommenders that many websites cur-
rently use. A single set of rened recommendations will be
more efcient than providing many lists for the user the sort
through and choose from. In addition, since our hybrid system
uses both switching and meta-level techniques, it can cater to
the needs of new stores even though they only have a small
user base. An extension of the same system can to be used in
websites that dont have a user database, which would
rely only on the screen time and click ratio rather than user
ratings.
8 Recommendations
The proposed hybrid recommendation system can be used
on any e-commerce website to recommend items to the
users. Since it combines both collaborative and content
based ltering to provide a single result, it eliminates the
need for two individual and separate recommenders that
many websites currently use. A single set of rened rec-
ommendations will be more efcient than many unrelated
lists for the user the sort through and choose from. In
addition, since our hybrid system uses both switching and
mixing of techniques, it can cater to the needs of new stores
even though they only have a small user base. An extension
of the same system can to be used in websites that dont have
a user database, which would rely only on the screen time
and click ratio rather than user ratings. The applications of
such a system can be witnessed not only online but also in
retail stores that measure the user model based on previous
user purchases and make recommendations through any
form of electronic media.
References
1. Yang, X., Steck, H., Liu, Y.: Circle-based recommendation in
online social networks. In: Proceedings of the 18th ACM SIGKDD
International Conference on Knowledge Discovery and Data
MiningKDD 12 (2012)
2. Qian, X., Feng, H., Zhao, G., Mei, T.: Personalized recommen-
dation combining user interest and social circle. IEEE Trans.
Knowl. Data Eng. 26, 17631777 (2014)
3. Ekstrand, M.: Collaborative ltering recommender systems.
Found. Trends® Hum. Comput. Inter. 4,81173 (2011)
4. Herlocker, J., Konstan, J., Borchers, A., Riedl, J.: An algorithmic
framework for performing collaborative ltering. ACM SIGIR
Forum. 51, 227234 (2017)
5. Li, H., Cai, F., Liao, Z.: Content-based ltering recommendation
algorithm using HMM. In: 2012 Fourth International Conference
on Computational and Information Sciences (2012)
6. Rashid, A., Karypis, G., Riedl, J.: Learning preferences of new
users in recommender systems. ACM SIGKDD Explor. Newsl 10,
90 (2008)
7. Amato, G., Straccia, U.: User prole modeling and applications to
digital libraries. In: Research and Advanced Technology for
Digital Libraries, pp. 184197 (1999)
8. Choi, K., Suh, Y.: A new similarity function for selecting
neighbors for each target item in collaborative ltering. Knowl.
Based Syst. 37, 146153 (2013)
9. Avadhut, D.M.: Novel weighted hybrid approach in recommen-
dation method. Int. J. Eng. Comput. Sci. (2017)
10. Sattar, A., Ghazanfar, M., Iqbal, M.: Building accurate and
practical recommender system algorithms using machine learning
classier and collaborative ltering. Arab. J. Sci. Eng. 42, 3229
3247 (2017)
11. Lekakos, G., Caravelas, P.: A hybrid approach for movie
recommendation. Multimed. Tools Appl. 36,5570 (2006)
12. Zanker, M., Jessenitschnig, M.: Case-studies on exploiting explicit
customer requirements in recommender systems. User Model.
User-Adap. Inter. 19, 133166 (2008)
13. Cremonesi, P., Turrin, R., Airoldi, F.: Hybrid algorithms for
recommending new items. In: Proceedings of the 2nd International
Workshop on Information Heterogeneity and Fusion in Recom-
mender SystemsHetRec 11 (2011)
14. Lampropoulos, A., Lampropoulou, P., Tsihrintzis, G.: A
cascade-hybrid music recommender system for mobile services
based on musical genre classication and personality diagnosis.
Multimed. Tools Appl. 59, 241258 (2011)
15. Zanker, M.: A collaborative constraint-based meta-level recom-
mender. In: Proceedings of the 2008 ACM Conference on
Recommender systemsRecSys 08 (2008)
16. Wang, Y., Chin, K.: Technical importance ratings in fuzzy QFD
by integrating fuzzy normalization and fuzzy weighted average.
Comput. Math Appl. 62, 42074221 (2011)
17. Benesty, J., Chen, J., Huang, Y., Cohen, I.: Pearson correlation
coefcient. In: Noise Reduction in Speech Processing, pp. 14 (2009)
18. Pirró, G.: A semantic similarity metric combining features and
intrinsic information content. Data Knowl. Eng. 68, 12891308
(2009)
19. Chahal, M.: Information retrieval using Jaccard similarity coef-
cient. Int. J. Comput. Trends Technol. 36, 140143 (2016)
20. Ye, J.: Cosine similarity measures for intuitionistic fuzzy sets and
their applications. Math. Comput. Model. 53,9197 (2011)
21. Linden, G., Smith, B., York, J.: Amazon.com recommendations:
item-to-item collaborative ltering. IEEE Internet Comput. 7,76
80 (2003)
22. Harper, F., Konstan, J.: The Movielens datasets. ACM Trans
Interact. Intell. Syst. 5,119 (2015)
User and Item Preference Learning 455
Using a Simulation Game to Teach
the Concept of ERP
Jennifer Nightingale
Abstract
For decades, research has shown how the use of
simulations can make a positive impact on student
learning. Simulations have the potential to engage
students in a higher level of learning that allows
understanding of concepts as opposed to rote learning
where students deleteconcepts from their brains as
soon as they have completed related assessment activ-
ities. Simulations are among the most often used
pedagogies in industry and government. While the
simulations that are used in industry can be much more
complex than those integrated into the curriculum,
simulations can be extended to student instruction with
careful curriculum development. Because undergraduate
students have little to no business experience, it can be
difcult to understand the concept of Enterprise
Resource Planning (ERP) systems. Additionally,
post-secondary environments may not have the funding
needed to support an ERP for curricular reasons.
A simulation game, such as Lemonade Tycoon, can
engage students in learning about different modules
included in ERP systems along with the concepts of
CRM. This simulation or strategy game allows students
to manage their own lemonade stand and are respon-
sible for paying rent, hiring staff, purchasing assets and
ingredients, manufacturing the product, and collecting
customer feedback. These tasks dovetail with several
modules included within an ERP such as Manufactur-
ing, Financials, Human Resources, and Sales and
Marketing. The use of a simulation in the classroom
validates the importance of how information systems
are critical to everyone within an organization, not just
the IT staff, while involving the students in their own
learning.
Keywords
ERP Simulation Active learning CRM
Experiential learning
1 Introduction
For decades, instructors have gradually incorporated a
variety of instructional technologies into the classroom as a
form of experiential learning, one of which is the use of
simulations. The Millennials, a generation that has always
been immersed in technology, have learning expectations,
styles, and needs different from previous generations [13]
and, because they embrace multiple means of self-
expression, experiential learning is important.
The 21st century students have spent their lives in a
technology-rich environment. These students, a new gener-
ation of technology-savvy individuals, possess exceptional
levels of skill with information technology. They think about
and use technology very differently from earlier student
cohorts and are characterized as preferring teamwork,
experiential activities, and the use of technology [4]. To
keep todays studentsattention in the classroom,
faculty must toss aside the dying notion that a lecture and
successive reading assignment are enough to teach the
lesson[2].
Simulations are one way in which high school, under-
graduate, and MBA students can benet from a hands-on
experience of running a company and how making deci-
sions can directly affect performance. While the most
common use of simulations is in the corporate environment,
simulation games are being used in academic settings to
teach students about decision making and problem solving
in business. Additionally, students are not only able to
acquire an overall understanding of the business world, but
will also gain awareness of the skills that are essential to
succeed.
J. Nightingale (&)
Slippery Rock University of Pennsylvania, Pennsylvania, USA
e-mail: jennifer.nightingale@sru.edu
©Springer Nature Switzerland AG 2019
A. Al-Masri and K. Curran (eds.), Smart Technologies and Innovation for a Sustainable Future,
Advances in Science, Technology & Innovation, https://doi.org/10.1007/978-3-030-01659-3_51
457
2 Business Model-Type Simulations
From manufacturing to government, regardless of what
industry or sector, simulations are used in a variety of ways
to train employees on specic skills or processes. For
example, factory workers in an organizations supply chain
can learn how to use an expensive or dangerous piece of
machinery prior to operating it. Military personnel can learn
to y via the use of simulations before they even leave the
ground. The use of simulations allows the organization to
protect the safety of its employees while maintaining the
value of its assets.
2.1 Simulation Categories
Hall [5] classies these types of simulations into six cate-
gories. Each category addresses different training require-
ments and outlines different design and usage issues.
Moreover, simulations can be classied based on the type of
interaction in which learners participate: interaction between
groups of learners and whether the trainer or the learners use
them.
Total Enterprise Simulations. Give a general overview
of a company and give experience of making executive
management decisions. Hall [5] places these simulations
into four subgroups: strategic management, business
appreciation, tactical management and totality
simulations.
Functional Simulations. Focus on each of the functional
areas of business while ensuring that nancial aspects are
addressed within each business function.
Concept Simulations. Short simulations ranging from
two to four hours and include three to four decisions.
While this type focuses on specic business issues and
concepts, they are used to reinforce a topic, test partici-
pantsunderstanding of an issue or concept and offer a
change of pace to participants.
Planning Simulations. Focus on what-ifanalysis.
These simulations are best if used where managers need
to recognize the business implications of a topic.
Process Simulations. Based on mathematical models and
used in such tasks such as forecasting, inventory plan-
ning and market share analysis. These simulations stress
that using a quantitative technique or analysis method is
only part of the objective. The facts and details must be
considered when interpreting the results. Additionally,
there needs to be a balance between the quantitative and
qualitative issues.
Other Simulations. These include simulations such as
role-playing activities such as sales negotiation, where a
planning simulation is linked to a total enterprise simu-
lation or a functional simulation or where the simulation
has a dened branching structure[5].
2.2 Simulations in a Business Environment
Using simulated environments in business is not a new
concept. Organizations implement simulations in business to
minimize risk and make better decisions. It allows employ-
ees to manipulate a variety of parameters, such as quantity
and expenses, to determine how these variables will affect
the bottom line. Duggan [6] explains that simulation models
can give employees a graphical display of information that
can be edited and animated, showing [them] what might
happen if [they] take certain actions.Once employees have
acquired the desired knowledge, they can apply the results to
their business, helping them with risk management and
decision making.
Situations in which simulations are used in business
include training, process improvement, predictive modeling
and managing risk. The use of business simulations creates a
more practical experience where concepts can be applied to
real-world decision making. These simulations engage the
user via a competitive environment [7].
Training allows users to engage in complex processes vis-
à-vis a realistic environment. The United States Department
of Agriculture (USDA) developed an e-learning simulation
to help 400500 human resources managers across the U.S.
learn how to use PeopleSofts human resources management
system, giving users step-by-step directions for entering
new employee data [8]. Gannage [7] explains that learning
by doing in a virtual environment greatly improves knowl-
edge retention and stimulates ones desire to learn and
grow.
By using simulations to help evaluate business processes,
analysts have the ability to assess the effectiveness of the
process and improve them as needed. Generally, a simula-
tion model will focus on a functional area such as manu-
facturing or marketing. In manufacturing, for example,
analysts can identify bottlenecks and simulate incremental
changes to see the effect the modication has on the pro-
duction line [6]. Once the optimal solution has been dis-
covered through trial and error within the simulation,
management can implement the change within the
organization.
Predictive modeling is a process that uses data mining
and probability to forecast various outcomes. Once data is
collected, a statistical model ranging from a simple linear
equation to a complex neural network mapped out by
sophisticated software [9]. Predictive modeling has been
used not only in weather prediction, but also in Bayesian
458 J. Nightingale
spam lters and target marketing. Walmart discovered that
U.S. consumers like to purchase Pop-Tarts just before a
hurricane hits. Not just any avor of Pop-Tarts however, as
American consumers prefer strawberry Pop-Tarts. Wal-
marts analysis found that stores would sell seven times
more strawberry Pop-Tarts before a hurricane hits than at
any other time [10].
3 The Experiential Learning Theory
There is no question that ERP has had a substantial effect on
organizations from business to government to academia. In
1955, the RAND Corporation developed the rst modern
business simulationMonopologsthat required its par-
ticipants to perform as inventory managers in a simulation of
the U.S. Air Force logistics system [11]. In 1956, the
American Marketing Association (AMA) developed the rst
widely known business game, Top Management Decision
Simulation, for use in management seminars administered
by the AMA. Shortly thereafter, the Top Management
Decision Game was created by Schreiber. This was the rst
business simulation game known to have been used in a
business policy class at the University of Washington in
1957 [12].
Since the onset of simulation game development and
usage, the number of games has grown exponentially and
many studies have reported on business simulation usage in
the postsecondary education environment. Researchers
concluded that the use of simulations is one of the best ways
to teach millennials as recent business graduates are expec-
ted to have developed a process orientationand an inte-
grated viewof business [13]. Faria states that simulations
have been used in business schools for six decades and in
1962, a survey of AACSB member schools reported that
over 71% of these schools were using simulations in at least
one of its courses [12].
Many refer to simulations as a method of experiential
learning where interaction is required for learning to occur.
Kolb [14]denes experiential learning as the process
whereby knowledge is created through the transformation of
experience.This denition embodies six basic conventions:
Learning is a process, not an outcome.
Learning derives from experience.
Learning requires an individual to resolve dialectically
opposite demands of grasping and transmitting
experience.
Learning is holistic and integrative.
Learning requires interaction between person and the
involvement.
Learning results in knowledge creation [1416].
Additionally, Kolbs ELT suggests that people primarily
learn in four ways: affectively, perceptually, symbolically,
and behaviorally [14,15].
The four methods within the ELT, its associated abilities
and the skill development that accompanies each method are
outlined by Kumar and Bhandarker in Table 1. The learning
process begins with a concrete experience, which becomes
the foundation for observations and reections. The obser-
vations and reections are then combined to reach a concept
or theory, then the concepts or theories can be further tested
and serve as the guides for creating new experiences, where
the entire cycle begins again with another concrete experi-
ence [17].
The experiential learning theory continues to be one of
the most inuential theories of management learning today.
Although many have scrutinized the ELT, it continues to
exercise signicant impact in management learning and
education despite dogged criticism from various research
scholars [16]. Some of the Association of Business Simu-
lations and Experiential Learning (ABSEL) researchers
believe that experiential learning is a bit simplistic to
consider that the student is motivated by the exercise alone;
one needs to also consider the context in which the exercise
is introduced and administered, and the instructor doing
that[18]. Additionally, they argue that the process of
experiential teachingmay in fact facilitate learning, by rst
inuencing the instructor to make more enthusiastic class
Table 1 Methods associated
with experiential learning Method Expected participant behavior Innate abilities required Skill
development
Concrete
experience
Immerse oneself in the
environment
Intuitive and affective
responses to the situation
Affective
(sensing/feeling)
Reection
observation
Tentative and impartial
perspective toward the
learning situation
Willingness to patiently
consider many possible
alternatives
Perceptual
(observing)
Abstract
conceptualization
Remain focused and avoid
distractions
Logical thinking and
rational evaluation
Symbolic
(thinking)
Active
experimentation
Receptive to experiment and
think beyond the obvious
Action orientation and
risk-taking behavior
Behavioral
(acting)
Using a Simulation Game to Teach 459
presentations[18]. Regardless of which perspective the
focus is placed, it is evident that the experience creates an
environment that is conducive to building a level of
knowledge transfer.
4 Using a Simulation to Introduce ERP
As many organizations have been successful in using sim-
ulations as a training method, experiential learning has been
proven successful in implementations with leading organi-
zations around the world, including GlaxoSmithKline,
Hewlett-Packard, IBM, Delta Airlines, United States Postal
Service, FedEx, T-Mobile and John Deere [19]. Companies
use simulation tools to develop employee skills and capa-
bilities at all levels within the organization. In academia, the
prociencies formed through using business simulations
ultimately improve both theoretical and applied knowledge,
which then easily translates into the business world [9].
4.1 Todays College Students
American college students include game play in their college
experience just like studying and partying. The Pew Internet
Research found that 70% of college students play video
games at least once in a while’” and suggested that almost
half skip studying to play video games [20].
Because of todays college studentsvast desire to play
video games, business simulations can appeal to them. First, it
generates a risk-free learning environment where not only the
acceptance of failure exists, it gives the ability for participants
to learn from their mistakes. Second, business simulations
create an environment where students have the ability to
interact with other players in either a collaborative or com-
petitive manner. Third, because of a simulations capability to
be more engaging, students can receive real-time feedback on
the decisions they make while playing. Next, in business
management games, students can fully immerse themselves
by becoming the protagonists of their companys story, and
determining its faith through decisions made in a volatile
environment. Not only does this give students a greater sense
of purpose, but they will be much more like ly to think carefully
about their actions when they dont only exist in theory[21].
Finally, students are able to earn rewards, such as badges and
rankings, which can serve as the studentsown indicator of
how he or she is progressing through the simulation [22].
4.2 Experiential Learning and ERP
Much has been written about how learning by doing
increases the level of retention and there is no question that
experiential learning is popular within business schools.
Several studies have focused on using simulations to teach
the concept of ERP and researchers have had positive
results. Seethamraju [13] found that the ERP simulation
game helped students appreciate the signicance of pro-
cesses and their management, in addition to making it easy
and fun to acquire much sought-after software skills that
could potentially enhance their employability.Shen [23]
results indicated that student knowledge of ERPs role in
supporting business processes increased signicantly after
participating in simulation activities. Chen, Keys, and Gaber
learned the following by integrating ERPsim into the
classroom.
the antecedent effects of two important IS constructs
(enjoyment and cognitive appraisal) on learning behavior
and learning outcomes during studentsinvolvement with
ERPsim. The study provides empirical evidence that some
major IS constructs (i.e., enjoyment and cognitive appraisal
of using information systems) play important roles in
shaping the effectiveness of using simulation game software
to learn business processes and ERP software [24].
Finally, [25] results indicate that the use of an ERP
simulation game enhanced student learning and inuenced
student attitudes toward ERP.
4.3 Using Lemonade Tycoon as a Method
to Teach ERP
Using a strategy game to facilitate ERP is a more
cost-effective method than having to spend thousands of
dollars to participate in academic programs established by
SAP or Oracle. Lemonade Tycoon is one of many strategy
games that can be used to teach business concepts and is
available online with either a one-hour trial, $6.99 unlimited
use or for $4.95 per month with an Unlimited Shockwave
10-day free trial [26].
Once the instructor introduced students to the simulation,
students worked individually to become acclimated to the
game. Students then worked in teams to see how success-
fully they could manage the business. Once the teams
operated the business for a virtual week, they were asked to
compile data based on their performance. Data analysis was
based on each teams performance and teams were asked to
respond to specic questions for data analysis. Team rank-
ings were posted for the class to review. Finally, students
were given another opportunity to manage their business and
improve their performance. Upon completion, teams dis-
cussed the changes that they made along with whether it
aided in positive or negative results. When lesson com-
menced, students were asked to submit feedback based on
both their experience and knowledge of ERP and complete
the following:
460 J. Nightingale
Assignment 1. You have become a business owner
congratulations! Your investors want you to report how
youre progressing, so they know they made the right
decision with investing in you.
What to do:
Download Lemonade Tycoon. You have a free 60 min
trial, so be sure youre ready to get started when you run
the program.
Run your business for 1 week.
You will need to purchase inventory.
Consider hiring employees and purchasing upgrades.
Pay attention to your daily results. Think about how
you can improve your sales and minimize costs.
Make adjustments as needed.
Answer the following questions in a Word document
What did you learn about running your own business?
What adjustments did you make to increase sales or
minimize costs?
How do different functional areas (i.e., accounting,
HR) need data from other areas to operate efciently?
Insert your screenshots (Charts, Prot and Loss, and
Balance Sheet) and explain what each one is telling you
about your business.
To reinforce the learning experience, students were then
asked to select another strategy game, such as Monopoly
Tycoon, RollerCoaster Tycoon, or My Fantastic Park, and
asked to complete the following:
Assignment 2. You were so successful with your
Lemonade Stand that you have decided to branch out.
What to do:
Download the selected strategy game. You have a free
60 min trial, so be sure youre ready to get started when
you run the program.
Run your business for 1 week.
Purchase inventory as needed.
Hire employees and purchase upgrades as needed.
Improve your sales and minimize costs as needed.
Answer the following questions in a Word document
Why did you select this game? How is it similar
to/different from Lemonade Tycoon?
Discuss how this game relates to an ERP?
Does it have a CRM component? If yes, explain.
What did you learn about running your own business?
What adjustments did you make to increase sales or
minimize costs?
How do different functional areas (i.e., accounting,
HR) need data from other areas to operate efciently?
Insert screenshots and explain what each one is telling
you about your business.
The methodology and evaluation strategy used in this
lesson informally aligned with Kirkpatricks Framework
[27] and Blooms Taxonomy. Although Kirkpatricks
Framework is generally used when evaluating corporate
training programs, Schumann, Anderson, Scott, and Lawton
adapted the framework to the college setting and assessed
the effectiveness of simulation exercises [28]. The frame-
work consists of four levels of evaluation that include
measuring the reactions of the students, the level of learning
that took place, the behavior of the learners and whether the
learners are using what they learned, and the extent to which
results are improved [27,28].
Level 1. Kirkpatricksrst level of evaluationreaction
measures how the participants feel about the experience
[27]. This data was not only useful for the instructor to
assess the success of the learning experience, but addition-
ally to gain suggestions for future improvements. The
anecdotal feedback was positive. Not only did this instruc-
tional instrument result in a more affordable method to
facilitate business and ERP concepts, students found this
easier to comprehend versus the instructors previous
chalk-and-talk methodology as it was more relatable.
Students felt that simulation created an interactive experi-
ence that visually enhanced the concepts being taught and
thought it was a coolway to teach a concept that initially
seemed to be extremely confusing.
Level 2. The second level of the framework is learning.
Kirkpatrick [27] outlines learning as the degree in which
participants change attitudes, improve knowledge, or
increase skill because of the simulation. Upon completion,
students were asked how different functional areas (i.e.,
accounting, marketing, human resources) need data from
other areas to operate efciently. They quickly learned that
for every action there was a reaction, meaning that if they
raised the price of the product, it would affect sales, which
would affect other functional areas such as accounting.
Level 3. Kirkpatricks third level of evaluation is
behavior. In a corporate environment, behavior could pertain
to whether the trainees are applying what they learned in the
training program to tasks within their own job responsibili-
ties. Simulations may be an effective technique to support
the transfer of learning from the simulation to other settings.
Students were asked what they learned about running their
own business and to explain the adjustments they made to
increase sales or minimize costs. They were given the initial
guidance to purchase inventory, consider hiring employees
and purchasing upgrades, and to pay attention to the daily
Using a Simulation Game to Teach 461
results. From doing so, they were asked to make adjustments
as needed.
Level 4. The fourth level in Kirkpatricks Framework is
results. Results denote the degree to which the output of the
participants workgroup or organization has improved
because of the experience [27]. Schumann, Anderson, Scott,
and Lawton express that there is a void in the literature that
reports the effect of simulation exercises on results either
from the students or from the employers perspectivesand
that the direction of research would need to determine the
degree to which the simulation experience accounts for
different results[28]. This can pose challenges in both
measurement and research design.
5 Future Research
A more formalized methodology needs to be developed that
includes both Kirkpatricks Framework and Blooms Tax-
onomyspecically higher order thinking skills such as
synthesis and application. Additionally, more data needs to
be collected to assess whether a simulation game meets the
sufciently fullls the objectives set forth in the course
description. Anecdotal feedback served as an adequate
starting point to determine that Lemonade Tycoon had the
potential to educate students about business concepts such as
ERP. However, as recommended by Schumann, Anderson,
Scott, and Lawton, if the results for the four levels of
Kirkpatricks Framework are combined into one holistic
assessment, researchers may be able to draw inferences and
make tentative conclusions[28]. By combining research
across the range of the framework, a sufcient pool of evi-
dence could aid in interpreting the value of simulations in
post-secondary curricula.
6 Conclusion
Methods that allow students to draw their own conclusions
based upon personal experiences appear to facilitate learn-
ing. A simulation game, such as Lemonade Tycoon, can
engage students in learning about different modules included
in ERP systems along with the concepts of CRM. This
simulation or strategy game enables students to manage their
own lemonade stand. Furthermore, students are responsible
for paying rent, hiring staff, purchasing assets and ingredi-
ents, manufacturing the product, and collecting customer
feedback. These tasks dovetail with several modules inclu-
ded within an ERP such as Manufacturing, Financials,
Human Resources, and Sales and Marketing. The use of a
simulation in the classroom validates the importance of how
information systems are critical to everyone within an
organization, not just the IT staff, while involving the stu-
dents in their own learning.
References
1. Murphy, B., Smark, C.: Convergence of learning experiences for
rst year tertiary commerce students: are personal response systems
the meeting point? J. Am. Acad. Bus. 10(1), 186191 (2006)
2. Oblinger, D.G., Oblinger, J.L.: Educating Net Gener. EDU-
CAUSE, Boulder, CO (2005)
3. Skiba, D.J., and Barton, A.J.: Adapting your teaching to accom-
modate the net generation of learners [electronic version].
Online J. Issues Nurs. 11(2) (2006). Retrieved 25 May 2017,
from ProQuest Nursing and Allied Health Source database
4. Kvavik, R.B.: Convenience, communications, and control: how
students use technology. In: Oblinger, D.G., Oblinger, J.L. (eds.)
Educating the Net Generation. Educause, Boulder, CO (2005)
5. Hall, J.J.S.B.: Types of Simulation [V0.0 25/01/11]. Chapter 1:
Types of Simulation, pp. 116 (2011)
6. Duggan, T.: Application of Simulation in Business. http://
smallbusiness.chron.com/application-simulation-business-73684.
html. Last accessed 28 July 2017
7. Gannage, G.: The Use of Simulations in Business. http://
onlinelearningtips.com/2013/05/the-use-of-simulations-in-
business. Last accessed 31 July 2017
8. Hoffman, T.: Sidebar: The USDAs e-Learning Simulation,
ComputerWorld, 2003/08/04. http://www.computerworld.com/
article/2571111/it-skills-training/sidebarthe-usda-s-e-learning-
simulation.html. Last accessed 31 July 2017
9. TechTarget Network: website. http://searchdatamanagement.
techtarget.com/denition/predictive-modeling. Last accessed 1
Aug 2017
10. Girard, J.P.: Diapers, Pop-Tarts, and Dog Food, Prairie Business
Magazine. http://www.johngirard.net/diapers-pop-tarts-and-dog-
food. Last accessed 1 Aug 2017
11. Jackson, J.R.: Learning from experience in business decision
games. Calif. Manag. Rev. 1(1), 2329 (1959)
12. Faria, A.J.: Business simulation games: current usage levelsan
update. Simul. Gaming 29(3), 295 (1998)
13. Seethamraju, R.: Enhancing student learning of enterprise integra-
tion and business process orientation through an ERP business
simulation game. J. Inf. Syst. Educ. 22(1), 1929 (2011)
14. Kolb, D.A.: Experiential learning: experience as the source of
learning and development. Prentice-Hall, Englewood Cliffs, NJ
(1984)
15. Kolb, A., Kolb, D.A.: Learning styles and learning spaces:
enhancing experiential learning in higher education. Acad. Man-
age. Learn. Educ. 4(2), 193212 (2005)
16. Kayes, D.C.: Experiential learning and its critics: preserving the
role of experience in management learning and education. Acad.
Manage. Learn. Educ. 1(2), 137149 (2002)
17. Kumar, S., Bhandarker, A.: Experiential learning and its relevance
in business school curriculum. Dev. Bus. Simul. Experiential
Learn. 44, 244251 (2017)
18. Gentry, J.W., McGinnis, L.P.: Experiential teaching may lead to
experiential learning. Dev.Simul. Experiential Learn. 34,13 (2007)
19. Innovative Learning Solutions: website. https://www.ilsworld.
com/corporations.php. Last accessed 2 Aug 2017
462 J. Nightingale
20. Games on NBC News: website. http://www.nbcnews.com/id/
3078424/ns/technology_and_science-games/t/college-students-are-
avid-gamers/#.WYPUM8J4fIV. Last accessed 3 Aug 2017
21. Cesim: website. https://www.cesim.com/blog/bid/101791/5-rea
sons-why-business-simulations-are-great-learning-tools-and-why-
your-students-will-love-them. Last accessed 1 Aug 2017
22. Barker, J.: The Fearless Classroom: A Practical Guide to
Experiential Learning Environments. Taylor & Francis, Abingdon,
Routledge (2014)
23. Shen, Y., Nicholson, J., Nicholson, D.: Using a group role-play
exercise to engage students in learning business processes and
ERP. J. Inf. Syst. Educ. 26(4), 265280 (2015)
24. Chen, L., Keys, A., Gaber, D.: How does ERPsim inuence
studentsperceived learning outcomes in an information systems
course? An empirical study. J. Inf. Syst. Educ. 26(2), 135146
(2015)
25. Cronan, T.P., Douglas, D.E.: Assessing ERP learning (manage-
ment, business process, and skills) and attitudes. J. Organ. End
User Comput. 25(2), 5974 (2013)
26. Shockwave: website. http://www.shockwave.com/gamelanding/
lemonade.jsp. Last accessed 10 Aug 2017
27. Kirkpatrick, D.L.: Evaluating Training Programs: The Four
Levels, 2nd edn. Berrett-Koehler, San Francisco, CA (1998)
28. Schumann, P.L., Anderson, P.H., Scott, T.W., Lawton, L.: A
framework for evaluating simulations as educational tools. Dev.
Bus. Simul. Experiential Learn. 28, 215220 (2001)
Using a Simulation Game to Teach 463
ResearchGate has not been able to resolve any citations for this publication.
Article
Full-text available
Information seeking is an impressive challenge and it is one of the substantial issues for Information Science. This study was undertaken to determine the information-seeking behavior and library use by faculty members at the Agricultural University in Bangladesh. The overall purpose of the study was to determine their information requirements and also determine the purpose of library services available for them in the library. The study collected data on the information requirements of faculty members. Data were gathered from 600 faculty members out of 905 through open and closed questionnaires. Findings indicate that guidance in the use of library resources and services is necessary to help them meet some of their information requirements. Finding also their seeking problems, using searching tools and level of satisfaction overall resources and services. Introduction: Information use is a behavior that leads an individual to the use of information in order to need his/her information needs. Information used is an indicator of information needs, but they are not identical. Any individual does not use all the information they need. Information behavior is a broad term and encompasses the ways individuals articulate their information needs, seek, evaluate and use information. In other words, information-seeking behavior is purposive in nature and conspires with a need to satisfy some goal. The information-seeking behavior of the faculty members as well as their information needs i.e., the information which is being sought may vary according to age, sex, education, profession, etc. So, the function of the libraries and the information-seeking behavior of the users are to be correlated very carefully.
Article
Full-text available
As multimedia content is increasing exponentially, it is the urgent need of the hour to protect the content.A new design was proposed for large scale multimedia content protection. This design creates visual signatures compact , robust and depth.This design used to protect different multimedia content types, such as images, audio clips,2-D videos, 3-D videos, music clips. The system can be deployed on private clouds, public clouds or any combination of public-private clouds. We propose two novel methods: (i)Signature method to create 3-D videos (ii) Distributed matching engine to store signatures of objects.In this method signatures (finger print) are extracted or created from original multimedia objects and through online sites. Signatures are also created from query (suspected) objects downloaded from online sites.As this design is based on cloud infrastructures it achieves rapid deployment on content protection system. Our experimental result shows that more than 15,000 videos and 1 million images shows the high accuracy and scalability. In addition when we compare our system and protection system used by YouTube has been failed to detect 3-D videos. Where as our system detect more than 98% of them. Our analysis shows that the system is more efficient,both cost and storage wise.
Article
Full-text available
This study reports on gender differences in an introductory programming (IP) course that uses a new teaching and learning approach based on the ADRI (Approach, Deployment, Result, Improvement) model. The teaching materials of the IP course were redesigned based on the new approach. The grades of the final exam were compared to determine the impact of the new teaching and learning approach on genders. A survey was conducted to collect students’ feedback. The responses of the survey were compared for each question among genders and T-test and Mann-Whitney U test were used to analyse the data. The results show that female students performed better in the high achiever category and male students performed better in the medium and low achiever categories in the final exam. The survey responses indicated that male students were more satisfied than female students with the new teaching and learning approach. The four stages of the ADRI approach support students’ cognitive gains and engagement. The students’ retention was higher which supports students’ affective engagement in the IP course. Overall, both the female and male students appreciate the ADRI approach in the IP course.
Article
Full-text available
The low and shrinking numbers of female students studying computer science is a well-known problem in most of the western countries. The dominant perception about computer science field considered it as a masculine domain. In contrast, this study was performed in the IT department where female students are dominant compared to male students. The purpose of this study is to explore the influence of different factors on female students in choosing a career in the IT field. A survey was deployed to collect responses of female students in the IT department. The results show that female students are interested in computer science stream and nullify the dominant perception of computer science as a masculine domain. They want to learn technology, become an active member of the digital native world, and interested in coding literacy.
Book
Full-text available
First in-depth empirical research about privatization of security in Serbia.
Article
There are various medium of communication like electronic media, print media, internet and mobile communications. Present study focuses on electronic media and its impact on society-changing value system in Pakistan. It also tries to explore different roles and objective of electronic media in changing the society. The study measures diverse aspect of media which influence the society. Pakistan is an Islamic democratic country where media has faced numeral restriction in past eras. From last decade electronic media has got freedom in Pakistan and a large number of electronic channels are established in Pakistan. At the present time media has a powerful affect on individual's lives. Especially electronic media reshape the masses lifestyle and promote a global culture.